source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/Balabit
Balabit was a Hungarian security firm specializing in the development of IT security systems and related services that help businesses reduce the risk of data breaches associated with privileged accounts. Balabit claims to have more than 1,000,000 corporate users worldwide. The company operates globally with offices across the United States and Europe, together with network of reseller partners. In January 2018, Balabit was acquired by One Identity, a U.S.-based provider of identity and access management solutions. History Balabit was founded in 2000 by 6 private individuals including Zoltán Györkő (CEO), Balázs Scheidler (SVP Engineering) and Endre Wagner (SVP Services). The company's first technology iteration was Zorp, an advanced application layer firewall suite. After becoming the leading firewall solution in Hungary in 2004 according to IDC, Balabit started to develop additional product portfolios. In January 2018, Balabit was acquired by One Identity, a U.S.-based provider of identity and access management solutions. The acquisition included all assets, including privileged access management-related solutions, such as privileged session and privilege analytics products, as well as the company's syslog-ng log management solutions. Log management 1998 syslog-ng Open Source Edition (OSE) 2007 syslog-ng Premium Edition (PE) 2008 syslog-ng Store Box (SSB) Privileged Access Management 2006 Balabit's Privileged Session Management (formally known as Shell Control Box) 2015 Balabit's Privileged Account Analytics (formally known as Blindspotter) References Software companies of Hungary Companies based in Budapest Companies established in 2000 Science and technology in Hungary Hungarian brands
https://en.wikipedia.org/wiki/Newsreader%20%28Usenet%29
A newsreader is an application program that reads articles on Usenet distributed throughout newsgroups. Newsreaders act as clients which connect to a news server, via the Network News Transfer Protocol (NNTP), to download articles and post new articles. In addition to text-based articles, Usenet is also used to distribute binary files, generally in dedicated "binaries" newsgroups. The term newsreader is sometimes (erroneously) used interchangeably with news aggregator. Newsreaders that help users to adhere to the established conventions of Usenet, known as netiquette, are evaluated by the Good Netkeeping Seal of Approval (GNKSA). Types of newsreaders There are several different types of newsreaders, depending on the type of service the user needs—whether intended primarily for discussion or for downloading files posted to the alt.binaries hierarchy: Desktop newsreaders Designed to integrate well with common GUI environments, and often integrated with a web browser or email client. Examples: Windows Live Mail, Mozilla Thunderbird, Xnews, Forté Agent, Unison, Newswatcher and Pan. Traditional newsreaders Designed primarily for reading/posting text posts; limited and often cumbersome binary attachment download functionality. Gnus, as well as more specialized newsreaders such as slrn, nn and tin. Binary downloaders Although Usenet originally started as a text-based messaging system without any file attachment ability, many Usenet users today do not participate in discussion groups, as was common during the 1980s and 1990s and only use newsgroups for downloading files such as music, movies, pornography, software and games. Therefore, streamlined clients have been developed for quickly grabbing binary articles, and without the extraneous clutter of text reading and posting features for which file downloaders have little use. See also Comparison of Usenet newsreaders List of Usenet newsreaders References
https://en.wikipedia.org/wiki/Nickelodeon%20Studios
Nickelodeon Studios was a production studio and theme park attraction run by the television network Nickelodeon at Universal Studios Florida. Opening on June 7, 1990, as The First World Headquarters for Kids, the studio attracted young tourists as contestants and audience members for Nickelodeon's live-action programming. At its peak, the studio employed 400 people and was the largest production studio in Florida, bringing $110 million in business to the state by 1994. The studio closed permanently on April 30, 2005, after much of Nickelodeon's production had moved to Nickelodeon on Sunset. Nickelodeon Studios ended its run having produced over 2,000 episodes of original programming. History Planning and construction In November 1988, Nickelodeon contracted space within the soon to be built Universal Studios Florida for its first production studio. Universal had determined through market research that a working studio was crucial in attracting guests to a movie themed park, and they offered Nickelodeon a sweetheart deal to supply that production. The promise of a custom-built studio at no expense, coupled with rent-free production, lured Nickelodeon away from negotiating with Disney-MGM Studios. The contract stipulated that Nickelodeon promote Universal Studios Florida on-air 1,000 times per year, while also broadcasting the park's television commercials. Turner Construction Company began erecting two soundstages (Stages 18 and 19) and an adjacent video production facility within the Production Central area of the park in 1989. The exterior of the facility was designed by network production designer Byron Taylor, and the interior was designed by network art director Don St. Mars. Viacom senior vice president Scott Davis would supervise the design and construction of the complex, and he was later named the first general manager of Nickelodeon Studios. Super Sloppy Double Dare in April 1989 and Think Fast in January 1990 were the first Nickelodeon productions filmed at Universal Studios Florida, and they were shot on the Stage 21 while Nickelodeon Studios was still being constructed. Like other Nickelodeon game shows, both programs were previously filmed at WHYY-TV in Philadelphia. Nickelodeon's live-action productions had traditionally been shot on rented soundstages in multiple cities, which was not cost-effective and limited the network's growth. Prior to the studio's completion, Double Dare executive producer Andy Bamberger, Double Dare creator Geoffrey Darby, Nickelodeon President Geraldine Laybourne, and Nickelodeon Studios general manager Scott Davis wrote their names in the cement floor of the video production building's second story. Bamberger, who also served as executive producer of Make the Grade and Total Panic, wrote "I Love TV Production" above his name. Opening and reception On June 7, 1990, Universal Studios Florida officially opened to the public. Nickelodeon Studios Opening Day Celebration! was broadcast live from t
https://en.wikipedia.org/wiki/Nova%20%28radio%20network%29
The Nova Network is a group of Australian radio stations owned wholly or in part by Nova Entertainment. The Perth station is a joint venture between Nova Entertainment and ARN. Each station has its own local Breakfast show with daytime, drive and night shifts networked across all stations. Stations Network shows Nova syndicates a number of programmes across its network. These include: The Chrissie Swan Show, Weekdays 2pm 4pm Ricki-Lee, Tim & Joel, Weekdays 4pm 6pm Fitzy & Wippa with Kate Ritchie, Weeknights 6pm 7pm Smallzy's Surgery, Weeknights 7pm 10pm Saturday mornings with Matt Denny & Angie Kent Ben, Liam & Belle around Australia, 6am 10am (Sunday) The Maddy Rowe Aus Music Show, 6pm 7pm (Sunday) Confidential with J.Mo and Angie Kent, 7pm 8pm (Sunday) Local announcers Nova 96.9 – Sydney: Fitzy & Wippa with Kate Ritchie, Weekdays 6am 9am Jamie Row, Weekdays 9am 11am Mel Tracina, Weekdays 1pm 2pm Nova 100 – Melbourne: Ben, Liam & Belle, Weekdays 6am 9am Jamie Row, Weekdays 9am 11am Mel Tracina, Weekdays 1pm 2pm Nova 106.9 – Brisbane: Ash, Luttsy & Susie, Weekdays 6am 9am Maddy Rowe, Weekdays 9am 11am Dan Cassin, Weekdays 1pm 2pm Nova 91.9 – Adelaide: Ben, Liam & Belle, Weekdays 5am 6am Jodie & Haysey, Weekdays 6am 9am Maddy Rowe, Weekdays 9am 11am Dan Cassin, Weekdays 1pm 2pm Nova 93.7 – Perth: Nathan, Nat & Shaun, Weekdays 6am 9am Ross Wallman, Weekdays 9am 11am Ben Carney, Weekdays 1pm 2pm Criticism Nova have received criticism for frequently rotating songs on their playlist. In a piece about the 2020 ARIA Music Awards, NME Australia's Andrew P. Street wrote that the 2004 rollout of Nova FM had "accidentally turned Thirsty Merc and Missy Higgins into stars, before the network swapped to its current format of 14 endlessly repeated songs." References External links Daily Mail and General Trust Nova Entertainment Australian radio networks Contemporary hit radio stations in Australia
https://en.wikipedia.org/wiki/List%20of%20Archie%20Comics%20publications
Archie Comics is an American comic book company. A B C D E F G H J K L M N O P R S T V W Y Z External links Archie Comics at the Big Comic Book DataBase Archie Comics publications
https://en.wikipedia.org/wiki/Bryggenet
Bryggenet is a community network in the Islands Brygge quarter of Copenhagen, Denmark. Bryggenet serves an area of about 4000 residences with fast Internet access, cable TV and radio, and telephone services at cost prices. Bryggenet was started in 2001 by a group of volunteers, initially with the intent of providing fast and cheap internet access to the residents of a number of co-ops in the quarter, but the project quickly expanded into TV and telephone. All three services went live in early 2003 and have now been working for over 7 years, generally quite well. Since the start, still more co-ops and housing estates have signed up. As of mid-2005 more than 3500 apartments take part. Internet access is provided in two sizes: 'basic internet' with 70 Mbit/s per 1000 subscribers, and 'fast internet' with 280 Mbit/s per 1000 subscribers. Prices are currently approx. $10/month and $25/month flat fee. Cable TV is also available in two sizes: 'small' with 8 must-carry or inexpensive channels (Danish, local and Scandinavian); and 'large' with 36 channels (Danish, local, Scandianvian, English, US, German, French, Spanish, Arabic and various thematic channels). The exact composition of each package is determined by subscriber votes every few years. Prices are approx. $7/month and $25/month. Telephone lines are provided by normal analog technology. A subscription is approx. $7/month and call rates approx. 20% lower than most commercial operators. Local calls are free of charge. Bryggenet owns the infrastructure. The backbone is a net of fibre optic cables throughout the area, connecting each member building. The internal wiring of each building are normal cat5 PDS cables for internet and telephone, and television. Internet access is provided by a fibre optic cable to Teliasonera, one of the major Scandinavian telecom players; TV and radio signals are delivered via a set of satellite dishes locally; and telephone lines by pools of ISDN lines. All in all Bryggenet represents an investment of about $2 million, plus countless working hours of the volunteers. External links website Community networks
https://en.wikipedia.org/wiki/Elif
Elif may refer to: People Elif (name) Other Elif, Gaziantep, a town in the Araban District of Gaziantep Province, Turkey Elif (TV series), a Turkish TV series In computing, used as part of a Structured If (short for else if) First letter of the alphabet: A Aleph Alpha Turkish feminine given names Feminine given names Turkish unisex given names
https://en.wikipedia.org/wiki/Floating%20car%20data
Floating car data (FCD) in traffic engineering and management is typically timestamped geo-localization and speed data directly collected by moving vehicles, in contrast to traditional traffic data collected at a fixed location by a stationary device or observer. In a physical interpretation context, FCD provides a Lagrangian description of the vehicle movements whereas stationary devices provide an Eulerian description. The participating vehicle acts itself consequently as a moving sensor using an onboard GPS receiver or cellular phone. The most common and widespread use of FCD is to determine the traffic speed on the road network. Based on these data, traffic congestion can be identified, travel times can be calculated, and traffic reports can be rapidly generated. In contrast to stationary devices such as traffic cameras, number plate recognition systems, and induction loops embedded in the roadway, no additional hardware on the road network is necessary. Floating cellular data Floating cellular data is one of the methods to collect floating car data. This method uses cellular network data (CDMA, GSM, UMTS, GPRS). No special devices/hardware are necessary: every switched-on mobile phone becomes a traffic probe and is as such an anonymous source of information. The location of the mobile phone is determined using (1) triangulation or (2) the hand-over data stored by the network operator. As GSM localisation is less accurate than GPS based systems, many phones must be tracked and complex algorithms used to extract high-quality data. For example, care must be taken not to misinterpret cellular phones on a high speed railway track near the road as incredibly fast journeys along the road. However, the more congestion, the more cars, the more phones and thus more probes. In metropolitan areas where traffic data are most needed the distance between cell sites is lower and thus precision increases. Advantages over GPS-based or conventional methods such as cameras or street embedded sensors include: No infrastructure or hardware in cars or along the road. It is much less expensive, offers more coverage of more streets, it is faster to set up (no work zones) and needs less maintenance. In 2007, GDOT demonstrated in Atlanta that such system can emulate very well road sensors data for section speeds. A 2007 study by GMU investigated the relationship between vehicle free flow speed and geometric variables on urban street segments using FCD. Vehicle re-identification Vehicle re-identification methods require sets of detectors mounted along the road. In this technique, a unique serial number for a device in the vehicle is detected at one location and then detected again (re-identified) further down the road. Travel times and speed are calculated by comparing the time at which a specific device is detected by pairs of sensors. This can be done using the MAC addresses from Bluetooth devices, or using the radio-frequency identification (RFID) serial numbers
https://en.wikipedia.org/wiki/FCD
FCD may refer to: Health and medicine Fibrocystic disease Fleck corneal dystrophy Focal cortical dysplasia Food composition data Fuchs' corneal dystrophy Other uses Family Computer Disk System, an add-on for Nintendo's Family Computer game console FC Dallas, an American soccer team First Chief Directorate, a KGB intelligence organ Floating car data, also known as floating cellular data Forum for Democratic Change, a political party in Uganda Foundation for Child Development Free City of Danzig, a semi-autonomous city-state that existed between 1920 and 1939 Freedom from Chemical Dependency, a non-profit organization that provides substance abuse prevention education for schools.
https://en.wikipedia.org/wiki/Netcat
netcat (often abbreviated to nc) is a computer networking utility for reading from and writing to network connections using TCP or UDP. The command is designed to be a dependable back-end that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and investigation tool, since it can produce almost any kind of connection its user could need and has a number of built-in capabilities. It is able to perform port scanning, file transferring and port listening. Features The original netcat's features include: Outbound or inbound connections, TCP or UDP, to or from any ports Full DNS forward/reverse checking, with appropriate warnings Ability to use any local source port Ability to use any locally configured network source address Built-in port-scanning capabilities, with randomization Built-in loose source-routing capability Can read command line arguments from standard input Slow-send mode, one line every N seconds Hex dump of transmitted and received data Optional ability to let another program service establish connections Optional telnet-options responder Rewrites like GNU's and OpenBSD's support additional features. For example, OpenBSD's nc supports TLS, and GNU netcat natively supports a tunneling mode supporting UDP and TCP (optionally allowing one to be tunneled over the other) in a single command, where other versions may require piping data from one netcat instance to another. Ports and reimplementations The original version of netcat was a Unix program. The last version (1.10) was released in March 1996. There are several implementations on POSIX systems, including rewrites from scratch like GNU netcat or OpenBSD netcat, the latter of which supports IPv6 and TLS. The OpenBSD version has been ported to the FreeBSD base, Windows/Cygwin, and Linux. Mac OS X comes with netcat installed as of OSX 10.13 or users can use MacPorts to install a variant. A DOS version of netcat called NTOOL is included in the FreeDOS Package group Networking. It is based on the WatTCP stack and licensed under the European Union Public Licence Version 1.1. Known ports for embedded systems includes versions for Windows CE (named "Netcat 4 wince") or for the iPhone. BusyBox includes by default a lightweight version of netcat. Solaris 11 includes netcat implementation based on OpenBSD netcat. Socat is a more complex variant of netcat. It is larger and more flexible and has more options that must be configured for a given task. On February 1, 2016, Santiago Zanella-Beguelin and Microsoft Vulnerability Research issued a security advisory regarding a composite Diffie-Hellman parameter which had been hard-coded into the OpenSSL implementation of socat. The implausibility that a composite might have been unintentionally introduced where a prime number is required has led to the suspicion of sabotage to introduce a backdoor software vulnerability. This socat bug affected version 1.7.
https://en.wikipedia.org/wiki/Much
Much may refer to: Much (TV channel), a cable network in Canada and its domestic and international spin-offs Much TV, a satellite cable channel in Taiwan Much (album), a 2001 album by Ten Shekel Shirt Much the Miller's Son, one of Robin Hood's Merry Men from the earliest tales Much, North Rhine-Westphalia, a municipality in Germany Hans Much (1880–1932), a German author and physician Rudolf Much (1862–1936), an Austrian philologist and historian See also German-language surnames
https://en.wikipedia.org/wiki/Kurt%20Huang
Kurt Huang is co-founder, president, and chief product officer of BitPass. He has a Computer Science degree from Harvard and an MD from Stanford. Named to the 2004 list of the world's 100 Top Young Innovators by MIT's Technology Review magazine. He was born in Chicago to immigrants from Taiwan. References Living people American computer businesspeople American people of Chinese descent American people of Taiwanese descent Harvard University alumni Stanford University School of Medicine alumni Year of birth missing (living people)
https://en.wikipedia.org/wiki/Line%2010%20%28Beijing%20Subway%29
Line 10 of the Beijing Subway () is the second loop line in Beijing's rapid transit network as well as the second longest and most widely used line. The line is in length, and runs entirely underground through Haidian, Chaoyang and Fengtai Districts, either directly underneath or just beyond the 3rd Ring Road. The Line 10 loop is situated between outside the Line 2 loop, which circumnavigates Beijing's old Inner City. Every subway line through the city centre intersects with Line 10, which has 24 transfer stations along route, and 45 stations in all. Line 10's color is capri. Line 10 was the world's longest rapid transit loop line since its completion in May 2013 till March 2023 and one of the longest entirely underground subway lines requiring 104 minutes to complete one full journey in either direction. History Planning The Beijing Subway network was originally conceived to have only one loop line. The booming economy and explosive population growth of Beijing put huge demand on Line 2, surpassing its designed capacity. In 2001 and 2002, the China Academy of Urban Planning and Design proposed two "L-shaped" lines named Line 10 and 11. Together they would form a second loop around Beijing and relieve pressure on line 2. Phase I On December 27, 2003, in preparation for the 2008 Summer Olympics in Beijing, Phase 1 of Line 10 started construction. On July 19, 2008, Phase I of Line 10 entered operation ahead of the opening of the Olympic Games. It was in length and had 22 stations. Phase I consisted of the northern and eastern sides of Line 10's rectangular loop from to forming an inverted "L"-shaped line. Phase II Construction on Phase II began on December 28, 2007. which meant that the original plan for Line 11 was not incorporated into the final network design and was instead absorbed into Line 10. Line 10 formed the second full loop around Beijing. In 2010, the Ministry of Railways proposed that Fengtai Railway Station was to be renovated and expanded to become a bigger intercity rail terminal for Beijing, with access to the Beijing-Guangzhou high-speed railway. The rationale was to ease intercity traffic pressure on Beijing West railway station. Due to the need to reorganize the stations on Line 10 to better serve the new rail terminal, work stopped on 2 stations, namely Mengjiacun (孟家村) and Niwa (泥洼). The planning department proposed that the original Mengjiacun and Niwa subway stations be merged into the new Fengtai railway station, known as the "three stations into one" program. Local residents, after realizing their travel to a subway station would be greatly lengthened, quickly opposed the plan. Planners reconsidered and moved Niwa station north to its current position and Mengjiacun station north to be renamed as Fengtai Railway Station. The original station shells were demolished and new stations built in their respective new locations. Niwa station started reconstruction in February 2012, while Fengtai railway station starte
https://en.wikipedia.org/wiki/QSDK
The QSDK is a streaming scene graph retained-mode Application Programming Interface (API) combined with a cell-portal system to connect scene graphs. Audio and animation are fully supported. It is available on Macintosh, PlayStation 2 and Xbox platforms, and for free on PC platforms. External links Qube Software Q Developer Network 3D scenegraph APIs
https://en.wikipedia.org/wiki/DBF
DBF may refer to: .dbf, a file format introduced by dBASE database system, since adopted by other applications as well (database file) dBf, decibels above a femtowatt, a unit used to measure power and gain Distributed Bellman-Ford, a Distance-vector routing protocol Danmarks Badminton Forbund (Denmark's Badminton Union) Diesel Boats Forever (Diesel Boats Forever) Design/Build/Fly aircraft design competition Oracle tablespace filename extension Digital beamforming in radar, sonar, audio, and other sensor arrays Direct breastfeeding Distributed-feedback laser – a type of a laser Drunk Bitch Friday – formerly a weekly bit on the Lex and Terry morning radio show See also
https://en.wikipedia.org/wiki/Fusebox%20%28programming%29
Fusebox was a web application framework for CFML and PHP. Originally released in 1997, the final version, 5.5.2, was released in May 2012. In January 2012 the rights to Fusebox were transferred from TeraTech to a team of five developers, who removed the rights and placed the framework in the hands of the community. Fusebox was intended to be easy to learn and provide benefits by helping developers structure their code through a set of simple conventions. Fusebox also allowed advanced developers to build large applications, leveraging design patterns and object-oriented programming techniques if they wish. Overview Fusebox provided web application developers with a standardized, structured way of developing their applications using a relatively straightforward and easy to learn set of core files and encouraged conventions. In addition to the framework itself, Fusebox became closely associated with a Web application development methodology developed by its proponents known as "FLiP" (for Fusebox Lifecycle Process). (Many people refer to Fusebox as a "methodology", but in fact, it was a development framework. FLiP, however, is a methodology). The framework has been ported and used in ASP, JSP, Lasso, Perl/CGI and PHP as well, though the CFML and PHP versions of Fusebox were the only versions to gain momentum. Fusebox dealt primarily with the effort of wiring together view states (pages) with controller actions (form submits, etc.) and the front-end of the business-logic tier. The framework did not address creating and maintaining business logic such as database interaction or service layers Concepts Fusebox, Circuits and Fuseactions The original concepts behind Fusebox were based on the household idiom of an electrical fusebox that controls a number of circuits, each one with its own fuse. In a Fusebox web application, all requests are routed through a single point (usually index.cfm for CFML) and processed by the Fusebox core files. The application is divided into a number of circuits (usually in sub-directories) which are intended to contain related functionality. Each circuit in the application is further divided into small files called fuses that should perform simple tasks. As such, Fusebox is considered an implementation of the front controller, a common design pattern. URLs within a Fusebox web application are usually of the form index.cfm?fuseaction=cname.fname where "cname" is the name of a circuit and "fname" is an XML-defined "method" within that circuit known as a fuseaction. The query-string variable name "fuseaction" can vary depending on configuration parameters, so not all applications using Fusebox need to use the action variable "fuseaction". Naming conventions Fusebox encourages, but does not enforce, separation of presentation logic from business logic. It uses a number of file naming conventions to encourage this separation: presentation files begin with dsp (display) or lay (layout), database access files begin with qry
https://en.wikipedia.org/wiki/Register-transfer%20level
In digital circuit design, register-transfer level (RTL) is a design abstraction which models a synchronous digital circuit in terms of the flow of digital signals (data) between hardware registers, and the logical operations performed on those signals. Register-transfer-level abstraction is used in hardware description languages (HDLs) like Verilog and VHDL to create high-level representations of a circuit, from which lower-level representations and ultimately actual wiring can be derived. Design at the RTL level is typical practice in modern digital design. Unlike in software compiler design, where the register-transfer level is an intermediate representation and at the lowest level, the RTL level is the usual input that circuit designers operate on. In fact, in circuit synthesis, an intermediate language between the input register transfer level representation and the target netlist is sometimes used. Unlike in netlist, constructs such as cells, functions, and multi-bit registers are available. Examples include FIRRTL and RTLIL. Transaction-level modeling is a higher level of electronic system design. RTL description A synchronous circuit consists of two kinds of elements: registers (Sequential logic) and combinational logic. Registers (usually implemented as D flip-flops) synchronize the circuit's operation to the edges of the clock signal, and are the only elements in the circuit that have memory properties. Combinational logic performs all the logical functions in the circuit and it typically consists of logic gates. For example, a very simple synchronous circuit is shown in the figure. The inverter is connected from the output, Q, of a register to the register's input, D, to create a circuit that changes its state on each rising edge of the clock, clk. In this circuit, the combinational logic consists of the inverter. When designing digital integrated circuits with a hardware description language (HDL), the designs are usually engineered at a higher level of abstraction than transistor level (logic families) or logic gate level. In HDLs the designer declares the registers (which roughly correspond to variables in computer programming languages), and describes the combinational logic by using constructs that are familiar from programming languages such as if-then-else and arithmetic operations. This level is called register-transfer level. The term refers to the fact that RTL focuses on describing the flow of signals between registers. As an example, the circuit mentioned above can be described in VHDL as follows: D <= not Q; process(clk) begin if rising_edge(clk) then Q <= D; end if; end process; Using an EDA tool for synthesis, this description can usually be directly translated to an equivalent hardware implementation file for an ASIC or an FPGA. The synthesis tool also performs logic optimization. At the register-transfer level, some types of circuits can be recognized. If there is a cyclic path of logic
https://en.wikipedia.org/wiki/Binary%20system%20%28disambiguation%29
Binary system may refer to: Binary number system, the base-2 internal "machine language" of computers Binary opposition, a bipolar distinction in philosophy, structuralism and critical theory Binary system (astronomy), a system of two celestial bodies on a mutual orbit Binary asteroid Binary star Contact binary Contact binary (asteroid) Double planet In chemistry, a system involving two steps, processes or substances Mixture Azeotrope Binary System, a music duo featuring rock musician Roger Miller Binary Systems (Aberdeen) is a Graphic Design company based in Aberdeen, Scotland ca:Sistema binari pt:Binário
https://en.wikipedia.org/wiki/Wetrix
Wetrix is a 3D puzzle video game developed by Zed Two, the studio of brothers Ste and John Pickford, for the Nintendo 64 and personal computers in 1998, and the Dreamcast and Game Boy Color in 1999 (as Wetrix+ and Wetrix GB respectively). The player's goal is to hold water bubbles falling on a 3D isometric landscape. To do this, enclosures are created with Uppers, which fall in a similar manner to Tetris blocks, that raise the ground. While water can be evaporated with fireballs, hazards such as Mines, Ice Cubes, and earthquakes also fall and ruin the player's construction. The Pickfords conceived a Tetris-esque puzzle game out of a water demo they worked on for another one of their Zed Two games, the hack and slash Vampire Circus. For design, the biggest focus was on the basic elements' interaction with each other, as well as the puzzle game style's originality; the use of falling blocks was the only similarity between Wetrix and Tetris. Zed Two signed a two-game deal with Ocean Software, a week before its merge with Infogrames. It required the brothers to turn Vampire Circus into Taz Express (2000), while allowing the brothers free rein with Wetrix. The PC version was produced from January to October 1997 by the brothers themselves, while the Nintendo 64 port was developed with three additional programmers from around June to Christmas 1997. The Nintendo 64 version sold over 105,000 units in the West, and just above 12,000 in Japan, while the PC version sold 30,000 copies. Wetrix was generally well-received by critics, who applauded its addictiveness and original concept but were critical of the limited camera mobility and divided on its difficulty, steep learning curve, and two-player mode. It garnered the highest rating for a review of a Western-developed title from the Japanese magazine Famitsu Weekly in years. The critical and commercial success motivated Imagineer, developers of the Game Boy Color port, to commission Zed Two to develop a sequel, the PlayStation 2 launch title Aqua Aqua, which made little alterations to the main gameplay. Gameplay Wetrix is an isometric puzzle video game where the player, on a square landscape, produces mounds to hold water bubbles falling from the sky. Uppers, pieces that raise a part of the landscape that come in the shapes of rectangles, squares, and T-shapes, create walls for the lakes, while Downers do the opposite. If there is no wall in its way, water will seep off the edges and into a drain represented by a water meter; the game ends once it is full. Fireballs pop up which can evaporate water, which gives the player an amount of points depending on how much water was vaporized. By evaporating water with fireballs, the player is also able to reduce the level of the drain in order to avoid losing. There are also hazards that ruin the player's structure, such as Mines which blast holes into the ground, Ice Cubes that freeze the water, and earthquakes that quickly turn the landscape flat once it is
https://en.wikipedia.org/wiki/GPF
GPF may refer to: Canon de 155mm GPF, a French heavy artillery gun *Gallons per flush*, a measure of flush toilet water efficiency General protection fault, a computer error on the Intel x86 architecture General Purpose Frigate (Canada) Global Peace Foundation Global Philanthropy Forum Global Policy Forum, an American international government accountability organization Gozarto Protection Force, a Syrian militia Grand Prix of Figure Skating Final Greater palatine foramen Grosse Pointe Farms Yaroslavl Global Policy Forum, an international forum
https://en.wikipedia.org/wiki/Sparse
Sparse is a computer software tool designed to find possible coding faults in the Linux kernel. Unlike other such tools, this static analysis tool was initially designed to only flag constructs that were likely to be of interest to kernel developers, such as the mixing of pointers to user and kernel address spaces. Sparse checks for known problems and allows the developer to include annotations in the code that convey information about data types, such as the address space that pointers point to and the locks that a function acquires or releases. Linus Torvalds started writing Sparse in 2003. Josh Triplett was its maintainer from 2006, a role taken over by Christopher Li in 2009 and by Luc Van Oostenryck in November 2018. Sparse is released under the MIT License. Annotations Some of the checks performed by Sparse require annotating the source code using the __attribute__ GCC extension, or the Sparse-specific __context__ specifier. Sparse defines the following list of attributes: address_space(num) bitwise force context(expression,in_context,out_context) When an API is defined with a macro, the specifier __attribute__((context(...))) can be replaced by __context__(...). Linux kernel definitions The Linux kernel defines the following short forms as pre-processor macros in files linux/compiler.h and linux/types.h (when building without the flag, all these annotations are removed from the code): #ifdef # define __user __attribute__((noderef, address_space(1))) # define __kernel __attribute__((address_space(0))) # define __safe __attribute__((safe)) # define __force __attribute__((force)) # define __nocast __attribute__((nocast)) # define __iomem __attribute__((noderef, address_space(2))) # define __must_hold(x) __attribute__((context(x,1,1))) # define __acquires(x) __attribute__((context(x,0,1))) # define __releases(x) __attribute__((context(x,1,0))) # define __acquire(x) __context__(x,1) # define __release(x) __context__(x,-1) # define __cond_lock(x,c) ((c) ? ({ __acquire(x); 1; }) : 0) # define __percpu __attribute__((noderef, address_space(3))) #ifdef CONFIG_SPARSE_RCU_POINTER # define __rcu __attribute__((noderef, address_space(4))) #else # define __rcu #endif extern void __chk_user_ptr(const volatile void __user *); extern void __chk_io_ptr(const volatile void __iomem *); #else # define __user # define __kernel # define __safe # define __force # define __nocast # define __iomem # define __chk_user_ptr(x) (void)0 # define __chk_io_ptr(x) (void)0 # define __builtin_warning(x, y...) (1) # define __must_hold(x) # define __acquires(x) # define __releases(x) # define __acquire(x) (void)0 # define __release(x) (void)0 # define __cond_lock(x,c) (c) # define __percpu # define __rcu #endif #ifdef # define __bitwise __attribute__((bitwise)) #else # define __bitwise #endif Examples The types __le32 and __be32 represent 32-bit integer types with different endianness. However, the C language does not allow to specify that variables of these
https://en.wikipedia.org/wiki/Incremental%20compiler
An incremental compiler is a kind of incremental computation applied to the field of compilation. Quite naturally, whereas ordinary compilers make a so-called clean build, that is, (re)build all program modules, an incremental compiler recompiles only modified portions of a program. Definition Imperative programming In imperative programming and software development, incremental compilation takes only the changes of a known set of source files and updates any corresponding output files (in the compiler's target language, often bytecode) that may already exist from previous compilations. By effectively building upon previously compiled output files, an incremental compiler avoids the wasteful recompiling of entire source files, where most of the code remains unchanged. For most incremental compilers, compiling a program with small changes to its source code is usually near instantaneous. It can be said that an incremental compiler reduces the granularity of a language's traditional compiling units while maintaining the language's semantics, such that the compiler can append and replace smaller parts. Many programming tools take advantage of incremental compilers to provide developers with a much more interactive programming environment. It is not unusual that an incremental compiler is invoked for every change of a source file, such that the developer is almost immediately informed about any compilation errors that would arise as a result of their changes to the code. This scheme, in contrast with traditional compilation, shortens a programmer's development cycle significantly, because they would no longer have to wait for a long compile process before being informed of errors. One downside to this type of incremental compiler is that it cannot easily optimize the code that it compiles, due to locality and the limited scope of what is changed. This is usually not a problem, because for optimization is usually only carried out on release, an incremental compiler would be used throughout development, and a standard batch compiler would be used on release. Interactive programming In the interactive programming paradigm, e.g. in Poplog related literature, and an interactive compiler refers to a compiler that is actually a part of the runtime system of the source language. The compiler can be invoked at runtime on some source code or data structure managed by the program, which then produces a new compiled program fragment containing machine code that is then immediately available for use by the runtime system. If the newly compiled fragment replaces a previous compiled procedure the old one will be garbage collected. This scheme allows for a degree of self-modifying code and requires metaprogramming language features. The ability to add, remove and delete code while running is known as hot swapping. Some interactive programming platforms mix the use of interpreted and compiled code to achieve the illusion that any changes to code are accessible
https://en.wikipedia.org/wiki/Against%20the%20Law%20%28TV%20series%29
Against the Law is an American legal comedy-drama television series that aired on the Fox network from September 23, 1990, until April 5, 1991. Starring Michael O'Keefe and Suzzanne Douglas, the series centered on the brash Boston lawyer, Simon MacHeath, who left his job at a prestigious law firm to start his own defense practice. Seventeen one-hour episodes were broadcast from September 23, 1990, to April 5, 1991. Cast Michael O'Keefe as Simon MacHeath Suzzanne Douglas as Yvette Carruthers Elizabeth Ruscio as Elizabeth Verhagen Rosalind Chao as Toy Feng M. C. Gainey as J.T. "Miggsy" Meigs Fritz Weaver as Skipper Haverhill Barbara Williams as Phoebe Lance Norris as the SWAT Team Leader Episodes References External links 1990s American comedy-drama television series 1990 American television series debuts 1991 American television series endings Fox Broadcasting Company original programming 1990s American legal television series Television series by MGM Television English-language television shows Television shows set in Boston
https://en.wikipedia.org/wiki/Universal%20Abit
Universal ABIT Co., Ltd (formerly ABIT Computer Corporation) was a computer components manufacturer, based in Taiwan, active since the 1980s. Its core product line were motherboards aimed at the overclocker market. Abit experienced serious financial problems in 2005. The brand name "ABIT" and other intangible properties, including patents and trademarks, were acquired by Universal Scientific Industrial Co., Ltd. (USI) in May 2006. The parent firm closed the brand as of 31 March 2009. History ABIT was founded in 1989. In 1991, they had become the fastest growing motherboard manufacturer, claiming US$10 million in sales. In 2000, ABIT underwent an initial public offering (IPO) on the TAIEX stock exchange. To keep pace with their "good" sales figures, they opened a factory in Suzhou, China, and moved to new headquarters in Neihu, Taipei. The number of motherboards sold was claimed to have doubled between 2000 and 2001. Abit chose to outsource two low-end boards for trial production from June 2002 to Elitegroup Computer Systems. Confirmation of the outsourcing move was made public in July 2002, accounting for 10% of Abit's motherboard shipments for the first model, and by August 2002, this would increase to 15-20% for the second model, for the company's niche products, such as servers and routers, Abit's factory in Taoyuan, Taiwan factory will then serve as their base. Abit had somewhat of a blow in March 2003, when Oskar Wu, a leading engineer on the famous Abit NF7-S motherboard, resigned after the NForce series to become head of the LANParty range at competitor DFI. On 15 December 2004, the Taiwan Stock Exchange downgraded ABIT's stock due to questionable accounting practices. Investigations revealed that the majority of their import/export business was conducted through seven companies, all located at the same address and each of which had a capital of only HK$2. This made it easy to inflate the reported number of motherboards sold. The Hong Kong media also reported that the management was being investigated for embezzling funds from the company. In June 2005, ABIT partnered with Wan Hai Industries. This container shipping company, also a principal investor in China Airlines, brought the company much needed capital, since the company had financial problems at this time, partly due to a class action lawsuit involving faulty capacitors on their products, but also because of marketing highly technical products to the general public while offering longer-than-average warranties and generous return policies. On 25 January 2006, ABIT announced that USI intended to purchase ABIT Computer's motherboard business and brand and announced a special shareholders meeting to discuss the sale of ABIT's Neihu building, changing ABIT's company name, the disposition of the company's assets, and the release of the directors from non-competition restrictions. ABIT sold its own office building in Taipei to Deutsche Bank in order to raise money to cut its debt
https://en.wikipedia.org/wiki/Premiere%20Networks
Premiere Networks (formerly Premiere Radio Networks, shortened as PRN) is an American media company, a wholly owned subsidiary of iHeartMedia, for which it currently serves as its main original radio content distribution and production arm. It is the largest syndication company in the United States. Founded independently in 1987, it is headed by Julie Talbott, who serves as president. Premiere Networks either syndicates and/or (co-)produces more than 90 individual programs and radio programming services/networks to more than 5,500 affiliates across the U.S., reaching about 245 million listeners monthly. Premiere offers talk, entertainment and sports programming featuring well-known personalities including Ryan Seacrest, Delilah, JoJo Wright, Mario Lopez, Bobby Bones, Crook & Chase, Clay Travis and Buck Sexton, Glenn Beck, Steve Harvey, Big Boy, George Noory, John Boy and Billy, Sean Hannity, Elvis Duran, Dan Patrick, Bill Cunningham, Cody Alan, Johnjay and Rich, Jay Mohr, Leo Laporte and others. The company is based in Sherman Oaks, California, with 13 offices nationwide. Many Premiere produced/distributed programs are also available on several on-demand audio streaming services, including iHeartMedia's own iHeartRadio platform and iHeart.com website. It also acts as a Primary Entry Point in the Emergency Alert System for its terrestrial radio affiliates. History Premiere was founded in 1987 with an investment of (equivalent to $ in ). Founders included Steve Lehman, Tim Kelly, Louise Palanker and Ed Mann. The network produced three programs with approximately 250 affiliates. In 1992, Premiere entered the agreement with Mediabase, and later acquired the said company in 1994. In 1997, Jacor Communications acquired both Premiere and EFM Media (producer of the talk program The Rush Limbaugh Show), and in turn, Clear Channel Communications ultimately bought Jacor. Following the merger with AMFM Inc. in 2000, its syndication arm, AMFM Radio Networks, and its radio shows, were folded into Premiere's operations. Premiere entered a long-term agreement with Fox Sports to launch Fox Sports Radio, with Premiere handling distribution of the network to radio affiliates. Distribution Premiere Networks' programs are currently distributed over satellite, NexGen Digital WANcasting, and downloadable via FTP. The FTP server serves both primary and backup delivery needs for weekly pre-recorded content. For years, Premiere used the popular Starguide Digital III satellite system to distribute their programs prior to their transition to X-Digital Systems (XDS) for satellite delivery. Premiere's entertainment programs are distributed on a mixture of fee and barter-based deals. Program schedule All times are Eastern. Programs are organized alphabetically by franchise and display their date and time if they're available for online download, and additional information. See also List of programming syndicated by iHeartMedia. - The show requires a paid subscr
https://en.wikipedia.org/wiki/CATH%20database
The CATH Protein Structure Classification database is a free, publicly available online resource that provides information on the evolutionary relationships of protein domains. It was created in the mid-1990s by Professor Christine Orengo and colleagues including Janet Thornton and David Jones, and continues to be developed by the Orengo group at University College London. CATH shares many broad features with the SCOP resource, however there are also many areas in which the detailed classification differs greatly. Hierarchical organization Experimentally determined protein three-dimensional structures are obtained from the Protein Data Bank and split into their consecutive polypeptide chains, where applicable. Protein domains are identified within these chains using a mixture of automatic methods and manual curation. The domains are then classified within the CATH structural hierarchy: at the Class (C) level, domains are assigned according to their secondary structure content, i.e. all alpha, all beta, a mixture of alpha and beta, or little secondary structure; at the Architecture (A) level, information on the secondary structure arrangement in three-dimensional space is used for assignment; at the Topology/fold (T) level, information on how the secondary structure elements are connected and arranged is used; assignments are made to the Homologous superfamily (H) level if there is good evidence that the domains are related by evolution i.e. they are homologous. Additional sequence data for domains with no experimentally determined structures are provided by CATH's sister resource, Gene3D, which are used to populate the homologous superfamilies. Protein sequences from UniProtKB and Ensembl are scanned against CATH HMMs to predict domain sequence boundaries and make homologous superfamily assignments. Releases The CATH team aim to provide official releases of the CATH classification every 12 months. This release process is important because it allows for the provision of internal validation, extra annotations and analysis. However, it can mean that there is a time delay between new structures appearing in the PDB and the latest official CATH release, In order to address this issue: CATH-B provides a limited amount of information to the very latest domain annotations (e.g., domain boundaries and superfamily classifications). The latest release of CATH-Gene3D (v4.3) was released in December 2020 and consists of: 500,238 structural protein domain entries 151 mln non-structural protein domain entries 5,481 homologous superfamily entries 212,872 functional family entries Open-source software CATH is an open source software project, with developers developing and maintaining a number of open-source tools. CATH maintains a todo list on GitHub to allow external users to create and keep track of issues relating to the CATH protein structure classification. References Protein structure Protein folds Biological databases Protein classificati
https://en.wikipedia.org/wiki/Toronto%20Computer%20Leasing%20Inquiry
The Toronto Computer Leasing Inquiry was a judicial inquiry into allegations of conflict of interest, bribery and misappropriation of funds around computer leasing contracts entered into by the City of Toronto government in 1998 and 1999. It was held concurrently with the Toronto External Contracts Inquiry. Background On January 1, 1998, the Municipality of Metropolitan Toronto and its six lower-tier cities (Toronto, Scarborough, North York, Etobicoke, East York and York) were amalgamated into the single "megacity" of Toronto. In one of the new city's first official acts of business, computer equipment was leased for city councillors' offices from MFP Financial Services, at a value of $1,093,731. City staff have not been able to produce any documentation to prove that this contract was awarded through proper procedures. In May, 1999, the city issued a Request For Quotations for its new computer acquisition needs. MFP was one of the bidders, and was awarded the contract in July of that year. MFP was contracted to provide $43 million of computer equipment to the city on a three-year lease agreement. However, the final lease agreement was not signed until after the 90-day price guarantee had expired. That fall, the city sold its owned computer equipment to MFP, and then leased it back as well. Over the duration of the agreement, the city paid $85 million to MFP, rather than the original $43 million approved by city council. As well, many of the equipment schedules were for five-year leases rather than three. Some of these leases were later restructured to extend the lease terms even further, resulting in additional costs. In December of that year, the city acquired 10,000 Oracle database licenses, again through an MFP lease. This turned out to be a serious overestimate of the city's actual needs. These issues came to light in late 2001, after an investigation by Toronto city councillors David Miller and Bas Balkissoon. In February, 2002, the Toronto Computer Leasing Inquiry was established by city council. The commissioner of the inquiry is Madam Justice Denise Bellamy of the Ontario Superior Court of Justice. The Inquiry MFP's lead salesman on the city contract was Dash Domi, the brother of former Toronto Maple Leafs player Tie Domi. Much of the testimony presented to the inquiry alleged an improper financial relationship between Domi and former city councillor Tom Jakobek, the city's budget chief at the time of the contracts. The inquiry was presented with evidence that Jakobek's name, along with other city staff, was on the passenger manifest for a flight, paid for by MFP, to a Leafs game in Philadelphia. For several weeks, witnesses testified that they could not recall whether Jakobek was actually on the flight, but Jakobek eventually admitted that he had been present, and apologized for lying under oath. Some of Jakobek's office staff have testified that Dash Domi was granted special access to Jakobek's office, although other staff me
https://en.wikipedia.org/wiki/Cable%20modem%20termination%20system
A cable modem termination system (CMTS, also called a CMTS Edge Router) is a piece of equipment, typically located in a cable company's headend or hubsite, which is used to provide high speed data services, such as cable Internet or Voice over Internet Protocol, to cable subscribers. A CMTS provides many of the same functions provided by the DSLAM in a DSL system. Connections In order to provide high speed data services, a cable company will connect its headend to the Internet via very high capacity data links to a network service provider. On the subscriber side of the headend, the CMTS enables communication with subscribers' cable modems. Different CMTSs are capable of serving different cable modem population sizes—ranging from 4,000 cable modems to 150,000 or more, depending in part on traffic, although it is recommended for an I-CMTS to service, for example, 30,000 subscribers (cable modems). A given headend may have between 1–12 CMTSs to service the cable modem population served by that headend or HFC hub. One way to think of a CMTS is to imagine a router with Ethernet interfaces (connections) on one side and coaxial cable RF interfaces on the other side. The Ethernet side is known as the Network Side Interface or NSI. A CMTS has separate RF interfaces and connectors for downlink and uplink signals. The RF/coax interfaces carry RF signals to and from coaxial "trunks" connected to subscribers' cable modems, using one pair of connectors per trunk, one for downlink and the other for uplink. In other words, there can be a pair of RF connectors for every service group, although it is possible to configure a network with different numbers of connectors that service a set of service groups, based on the number of downstream and upstream channels the cable modems in every service group use. Every connector has a finite number of channels it can carry, such as 16 channels per downstream connector, and 4 channels per upstream connector, depending on the CMTS. For example, if the cable modems on every service group use 24 channels for downstream, and 2 channels for upstream, then 3 downstream connectors can service the cable modems on two service groups, and be serviced by 1 upstream connector. A service group may serve up to 500 households. A service group has channels, whose bandwidth is shared among all members of the service group. The channels are later regrouped at the cable headend or distribution hub and serviced by CMTSs and other equipment such as Edge QAMs. The RF signals from a CMTS, are connected via coaxial cable to headend RF management modules for RF splitting and combining, with other equipment such as other CMTSs so that several CMTS can service one service group, and then to an "optics platform" or headend platform, which has transmitter and receiver modules that turn the RF signals into light pulses for delivery over fiber optics through an HFC network. Examples of optics platforms are the Arris CH3000 and Cisco Prisma II. At t
https://en.wikipedia.org/wiki/Marr%E2%80%93Hildreth%20algorithm
In computer vision, the Marr–Hildreth algorithm is a method of detecting edges in digital images, that is, continuous curves where there are strong and rapid variations in image brightness. The Marr–Hildreth edge detection method is simple and operates by convolving the image with the Laplacian of the Gaussian function, or, as a fast approximation by difference of Gaussians. Then, zero crossings are detected in the filtered result to obtain the edges. The Laplacian-of-Gaussian image operator is sometimes also referred to as the Mexican hat wavelet due to its visual shape when turned upside-down. David Marr and Ellen C. Hildreth are two of the inventors. Limitations The Marr–Hildreth operator suffers from two main limitations. It generates responses that do not correspond to edges, so-called "false edges", and the localization error may be severe at curved edges. Today, there are much better edge detection methods, such as the Canny edge detector based on the search for local directional maxima in the gradient magnitude, or the differential approach based on the search for zero crossings of the differential expression that corresponds to the second-order derivative in the gradient direction (both of these operations preceded by a Gaussian smoothing step). For more details, see the article on edge detection. See also Blob detection CVIPtools References Feature detection (computer vision)
https://en.wikipedia.org/wiki/PHIGS
PHIGS (Programmer's Hierarchical Interactive Graphics System) is an application programming interface (API) standard for rendering 3D computer graphics, considered to be the 3D graphics standard for the 1980s through the early 1990s. Subsequently, a combination of features and power led to the rise of OpenGL, which became the most popular professional 3D API of the mid to late 1990s. Large vendors typically offered versions of PHIGS for their platforms, including DEC PHIGS, IBM's graPHIGS and Sun's SunPHIGS. It could also be used within the X Window System, supported via PEX. PEX consisted of an extension to X, adding commands that would be forwarded from the X server to the PEX system for rendering. Workstations were placed in windows typically, but could also be forwarded to take over the whole screen, or to various printer-output devices. PHIGS was designed in the 1980s, inheriting many of its ideas from the Graphical Kernel System (GKS) of the late 1970s, and became a standard by 1988: ANSI (ANSI X3.144-1988), FIPS (FIPS 153) and then ISO (ISO/IEC 9592 and ISO/IEC 9593). Due to its early gestation, the standard supports only the most basic 3D graphics, including basic geometry and meshes, and only the basic Gouraud, "Dot", and Phong shading for rendering scenes. Although PHIGS ultimately expanded to contain advanced functions (including the more accurate Phong lighting model and Data Mapping), other features considered standard by the mid-1990s were not supported (notably texture mapping), nor were many machines of the era physically capable of optimizing it to perform in real time. Technical details The word "hierarchical" in the name refers to a notable feature of PHIGS: unlike most graphics systems, PHIGS included a scene graph system as a part of the basic standard. Models were built up in a Centralized Structure Store (CSS), a database containing a "world" including both the drawing primitives and their attributes (color, line style, etc.). CSSes could be shared among a number of virtual devices, known under PHIGS as workstations, each of which could contain any number of views. Displaying graphics on the screen in PHIGS was a three-step process; first the model would be built into a CSS, then a workstation would be created and opened, and finally the model would be connected to the workstation. At that point the workstation would immediately render the model, and any future changes made to the model would instantly be reflected in all applicable workstation views. PHIGS originally lacked the capability to render illuminated scenes, and was superseded by PHIGS+. PHIGS+ works in essentially the same manner, but added methods for lighting and filling surfaces within a 3D scene. PHIGS+ also introduced more advanced graphics primitives, such as Non-uniform rational B-spline (NURBS) surfaces. An ad hoc ANSI committee was formed around these proposed extensions to PHIGS, changing its name to the more descriptive and (optimistically) exte
https://en.wikipedia.org/wiki/IntelliJ%20IDEA
IntelliJ IDEA is an integrated development environment (IDE) written in Java for developing computer software written in Java, Kotlin, Groovy, and other JVM-based languages. It is developed by JetBrains (formerly known as IntelliJ) and is available as an Apache 2 Licensed community edition, and in a proprietary commercial edition. Both can be used for commercial development. History The first version of IntelliJ IDEA was released in January 2001 and was one of the first available Java IDEs with advanced code navigation and code refactoring capabilities integrated. In 2009, JetBrains released the source code for IntelliJ IDEA under the open-source Apache License 2.0. JetBrains also began distributing a limited version of IntelliJ IDEA consisting of open-source features under the moniker Community Edition. The commercial Ultimate Edition provides additional features and remains available for a fee. In a 2010 InfoWorld report, IntelliJ received the highest test center score out of the four top Java programming tools: Eclipse, IntelliJ IDEA, NetBeans and JDeveloper. In December 2014, Google announced version 1.0 of Android Studio, an open-source IDE for Android apps, based on the open source community edition. Other development environments based on IntelliJ's framework include AppCode, CLion, DataGrip, GoLand, PhpStorm, PyCharm, Rider, RubyMine, WebStorm, and MPS. In September 2020, Huawei announced and released version 1.0 of DevEco Studio, an open-source IDE for HarmonyOS apps development, based on Jetbrains IntelliJ IDEA with Huawei's SmartAssist for Windows and macOS. System requirements Features Coding assistance The IDE provides certain features like code completion by analyzing the context, code navigation which allows jumping to a class or declaration in the code directly, code refactoring, code debugging , linting and options to fix inconsistencies via suggestions. Built in tools and integration The IDE provides integration with build/packaging tools like Grunt, bower, Gradle, and sbt. It supports version control systems like Git, Mercurial, Perforce, and Subversion. Databases like Microsoft SQL Server, Oracle, PostgreSQL, SQLite, and MySQL can be accessed directly from the IDE in the Ultimate edition, through an embedded version of DataGrip, another IDE developed by JetBrains. Plugin ecosystem IntelliJ supports plugins through which one can add additional functionality to the IDE. Plugins can be downloaded and installed either from IntelliJ's plugin repository website or through the IDE's inbuilt plugin search and install feature. Each edition has separate plugin repositories, with both the Community and Ultimate editions totaling over 3000 plugins each as of 2019. Supported languages The Community and Ultimate editions differ in their support for various programming languages as shown in the following table. Supported in both Community and Ultimate Edition: CSS, Sass, SCSS, Less, Stylus Groovy HTML, XML, JSON, YAML Java
https://en.wikipedia.org/wiki/CA%20Gen
Gen is a Computer Aided Software Engineering (CASE) application development environment marketed by Broadcom Inc. Gen was previously known as CA Gen, IEF (Information Engineering Facility), Composer by IEF, Composer, COOL:Gen, Advantage:Gen and AllFusion Gen. The toolset originally supported the information technology engineering methodology developed by Clive Finkelstein, James Martin and others in the early 1980s. Early versions supported IBM's DB2 database, 3270 'block mode' screens and generated COBOL code. In the intervening years the toolset has been expanded to support additional development techniques such as component-based development; creation of client/server and web applications and generation of C, Java and C#. In addition, other platforms are now supported such as many variants of Unix-like Operating Systems (AIX, HP-UX, Solaris, Linux) as well as Windows. Its range of supported database technologies have widened to include ORACLE, Microsoft SQL Server, ODBC, JDBC as well as the original DB2. The toolset is fully integrated - objects identified during analysis carry forward into design without redefinition. All information is stored in a repository (central encyclopedia). The encyclopedia allows for large team development - controlling access so that multiple developers may not change the same object simultaneously. Overview It was initially produced by Texas Instruments, with input from James Martin and his consultancy firm James Martin Associates, and was based on the Information Engineering Methodology (IEM). The first version was launched in 1987. IEF (Information Engineering Facility) became popular among large government departments and public utilities. It initially supported a CICS/COBOL/DB2 target environment. However, it now supports a wider range of relational databases and operating systems. IEF was intended to shield the developer from the complexities of building complete multi-tier cross-platform applications. In 1995, Texas Instruments decided to change their marketing focus for the product. Part of this change included a new name - "Composer". By 1996, IEF had become a popular tool. However, it was criticized by some IT professionals for being too restrictive, as well as for having a high per-workstation cost ($15K USD). But it is claimed that IEF reduces development time and costs by removing complexity and allowing rapid development of large scale enterprise transaction processing systems. In 1997, Composer had another change of branding, Texas Instruments sold the Texas Instruments Software division, including the Composer rights, to Sterling Software. Sterling software changed the well known name "Information Engineering Facility" to "COOL:Gen". COOL was an acronym for "Common Object Oriented Language" - despite the fact that there was little object orientation in the product. In 2000, Sterling Software was acquired by Computer Associates (now CA). CA has rebranded the product three times to date and
https://en.wikipedia.org/wiki/B8
B8, B VIII or B-8 may refer to: Transport Roads B8 (Croatia), an expressway part of the Istrian Y highway network B8 road (Cyprus) B8 road (Kenya) B8 road (Namibia) Bundesstraße 8, a road in Germany Other uses in transport B8 (New York City bus) serving Brooklyn Bavarian B VIII, a German steam locomotive model Bensen B-8, a 1955 United States small single-seat autogyro , a B-class submarine of the Royal Navy Mazda B8, a piston engine Fokker XB-8, a bomber prototype built for the United States Army Air Corps B8, the IATA code for Eritrean Airlines LNER Class B8, a class of British steam locomotives Biology Proanthocyanidin B8, a B type proanthocyanidin Vitamin B8, a name sometimes used for inositol HLA-B8, an HLA-B serotype Other B8 (bronze), an alloy used in cymbals b8 (spam filter), a statistical spam filter implemented in PHP Boron-8 (B-8 or 8B), an isotope of boron B8, a type of stereoautograph A subclass of B-class stars An international standard paper size (62×88 mm), defined in ISO 216 The musical note 7 keys above a standard Grand Piano The postcode for Saltley, England B8, the category for warehousing under the United Kingdom planning regulations B-VIII reactor, an unsuccessful experiment that was part of the German nuclear weapons program
https://en.wikipedia.org/wiki/Z5
Z5 may refer to: Harbin Z-5, Chinese helicopter Mazda Z engine a file extension used by Z-machine Z5 (computer) designed by Konrad Zuse the GMG Airlines IATA airline code German destroyer Z5 Paul Jakobi the Beijing-Nanning-Hanoi Through Train (southbound) Zbrojovka Z5 Express, a Czech car of the 1930s LNER Class Z5, a class of British steam locomotives Nikon Z 5 mirrorless camera
https://en.wikipedia.org/wiki/JFT
JFT may refer to: Job File Table, a data structure in DOS-compatible operating systems Johnson–Forest Tendency, an American Trotskyist organization Jones Falls Trail, in Baltimore, Maryland, United States Mazda J engine
https://en.wikipedia.org/wiki/GDL
GDL may refer to: Computing Game Description Language Generalized distributive law Genomics Digital Lab, a series of educational games Geometric Description Language Gesture Description Language GNU Data Language Google Developers Live Other uses Dirasha language Gas diffusion layer of a proton-exchange membrane fuel cell Gas Dynamics Laboratory, a Soviet rocket research and development laboratory Gas dynamic laser Gateway Distriparks, an Indian logistics company , a German trade union Glucono delta-lactone, a food additive Godley railway station, in England Goyim Defense League, an internet troll network Graduate Diploma in Law Graduated driver licensing Guadalajara International Airport, in Mexico Guadeloupe, ITU code Grand Duchy of Lithuania
https://en.wikipedia.org/wiki/Burroughs%20MCP
The MCP (Master Control Program) is the operating system of the Burroughs B5000/B5500/B5700 and the B6500 and successors, including the Unisys Clearpath/MCP systems. MCP was originally written in 1961 in ESPOL (Executive Systems Problem Oriented Language). In the 1970s, MCP was converted to NEWP which was a better structured, more robust, and more secure form of ESPOL. The MCP was a leader in many areas, including: the first operating system to manage multiple processors, the first commercial implementation of virtual memory, and the first OS written exclusively in a high-level language. History In 1961, the MCP was the first OS written exclusively in a high-level language (HLL). The Burroughs Large System (B5000 and successors) were unique in that they were designed with the expectation that all software, including system software, would be written in an HLL rather than in assembly language, which was a unique and innovative approach in 1961. Unlike IBM, which faced hardware competition after the departure of Gene Amdahl, Burroughs software only ever ran on Burroughs hardware due to a lack of compatible third party hardware. For this reason, Burroughs was free to distribute the source code of all software it sold, including the MCP, which was designed with this openness in mind. For example, upgrading required the user to recompile the system software and apply any needed local patches. At the time, this was common practice, and was necessary as it was not unusual for customers (especially large ones, such as the Federal Reserve) to modify the program to fit their specific needs. As a result, a Burroughs Users Group was formed, which held annual meetings and allowed users to exchange their own extensions to the OS and other parts of the system software suite. Many such extensions have found their way into the base OS code over the years, and are now available to all customers. As such, the MCP could be considered one of the earliest open-source projects. Burroughs was not the first manufacturer to distribute source code and was a late entry to electronic computing (compared to its traditional rivals NCR, IBM, and Univac). Now that MCP runs on commodity hardware, some elements of the MCP based software suite are no longer made available in source form by Unisys. The MCP was the first commercial OS to provide virtual memory, which has been supported by the Burroughs large systems architecture since its inception. This scheme is unique in the industry, as it stores and retrieves compiler-defined objects rather than fixed-size memory pages, as a consequence of its overall non-von Neumann and uniformly stack-based architecture. Unisys stopped producing the hardware in the early 2010s, and the operating system is now run under emulation. File system The MCP provides a file system with hierarchical directory structures. In early MCP implementations, directory nodes were represented by separate files with directory entries, as other systems did.
https://en.wikipedia.org/wiki/Out%20of%20Control%20%28Kelly%20book%29
Out of Control: The New Biology of Machines, Social Systems, and the Economic World () is a 1992 book by Kevin Kelly. Major themes in Out of Control are cybernetics, emergence, self-organization, complex systems, negentropy and chaos theory and it can be seen as a work of techno-utopianism. Summary The central theme of the book is that several fields of contemporary science and philosophy point in the same direction: intelligence is not organized in a centralized structure but much more like a bee-hive of small simple components. Kelly applies this view to bureaucratic organizations, intelligent computers as well as to the human brain. Reception The book was not widely reviewed when first released in 1992, but got visibly reviewed and extensively cited during the next several years. Reviews often discussed Kelly's hive-mind analogy as a metaphor for the New Economy. Reviewers have called this book a "mind-expanding exploration" (Publishers Weekly) and "the best of an important new genre" (Forbes ASAP). Critics of the book have contended that its position leaves us without a critical approach to politics and social power. References Further reading The book's homepage (includes the complete book online) 1992 non-fiction books 1992 in the environment Systems theory books Works about technology Futurology books Collective intelligence
https://en.wikipedia.org/wiki/Rod%20Smith
Rod, Rodney or Roderick Smith may refer to: Sports Rod Smith (sportscaster), sportscaster with The Sports Network Rodney Smith (skateboarder), American skateboarder, co-founder of Zoo York Rodney Smith (cricketer) (born 1944), English cricketer Rodney Smith (wrestler) (born 1966), American Olympic wrestler Rod Smith (ice hockey) (1894–1961), ice hockey player Gridiron football Rod Smith (wide receiver) (born 1970), American football wide receiver Rod Smith (defensive back) (born 1970), American football defensive back Rod Smith (running back) (born 1992), American football running back Rodney Smith (wide receiver) (born 1990), American football wide receiver Rodney Smith (running back) (born 1996), American football running back Rod Smith (Canadian football) (1925–2016), Canadian Football League player Rod Smith (American football coach) (born 1973), American football coach and quarterback Others Rod Smith (politician) (born 1949), former Florida State Senator and Chair of the Florida Democratic Party Rod Smith (R/C modeling pioneer) (born 1926), R/C modeling pioneer Rod Smith (poet) (born 1962), American poet and editor (edits the journal Aerial and publishes Edge Books) Roderick Smith (RCAF officer) (1922–2002), flying ace of the Royal Canadian Air Force during the Second World War R. T. Smith (Rodney, born 1947), American poet and editor Rodney Smith (photographer) (1947–2016), portrait photographer Rodney "Gipsy" Smith (1860–1947), British evangelist Rodney K. Smith, American academic Roots Manuva (born 1972), British rapper born Rodney Smith Rodney Smith, Baron Smith (1914–1998), British surgeon Rodney Smith (judge) (born 1974), Federal judge in Florida
https://en.wikipedia.org/wiki/William%20Stallings
William Stallings is an American author. He has written computer science textbooks on operating systems, computer networks, computer organization, and cryptography. Early life Stallings earned his B.S. in electrical engineering from University of Notre Dame and his PhD in computer science from Massachusetts Institute of Technology. Career He maintains a website titled Computer Science Student Resource. He has authored 17 titles, and counting revised editions, a total of over 40 books on these subjects. He has been a technical contributor, technical manager, and an executive with several high-technology firms. He works as an independent consultant whose clients have included computer and networking manufacturers and customers, software development firms, and leading-edge government research institutions. Recognition He was awarded Computer Science textbook of the year from the Text and Academic Authors Association three times. Books Computer Organization and Architecture Cryptography and Network Security: Principles and Practice Data and Computer Communications Operating Systems - Internals and Design Principles Wireless Communications & Networks Computer Security: Principles and Practice Local and Metropolitan Area Networks Network Security Essentials: Applications and Standards Business Data Communications - Infrastructure, Networking and Security References External links Williamstallings.com - Website for the books of William Stallings Computer Science Student Resource Site American computer scientists 21st-century American engineers American technology writers University of Notre Dame alumni MIT School of Engineering alumni Year of birth missing (living people) Living people
https://en.wikipedia.org/wiki/Ninety-Nines
The Ninety-Nines: International Organization of Women Pilots, also known as The 99s, is an international organization that provides networking, mentoring, and flight scholarship opportunities to recreational and professional female pilots. Founded in 1929, the Ninety-Nines has 153 chapters and 27 regional 'sections' across the globe as of 2022, including a 'virtual' chapter, Ambassador 99s, which meets online for those who are too busy or mobile to be in one region for long. Amelia Earhart was elected as their first president in 1931, and the organization has continued to make a significant impact supporting the advancement of women in aviation since its inception. In 1982, the Ninety-Nines received the National Aviation Hall of Fame Spirit of Flight Award, and were inducted into the Oklahoma Air Space Museum Hall of Fame in 2001. In 2002, the organization was selected as the recipient of the Frank G. Brewer Trophy by the National Aeronautic Association, and in 2014 became inducted into the International Air & Space Hall of Fame at the San Diego Air & Space Museum. History In August 1929, a small group of female pilots met informally in Cleveland, Ohio following the United States Women's Air Derby, and that group agreed that there was a need to form an organization to support women in the burgeoning field of aviation. Invitations to an initial meeting at a later date were sent out to all 117 female pilots licensed at the time. On November 2, 1929, the organization was founded at Curtiss Field near Valley Stream, New York by 26 licensed female pilots for the mutual support and advancement of "Women Pilots." At the suggestion of Amelia Earhart, the organization's name was taken from the number of charter members, settling on "Ninety-Nines" based on responses received by Christmas. Membership Charter members include: Amelia Earhart (president 1931–1933) Mary C. Alexander Ruth Elder Viola Gentry Fay Gillis Mary Goodrich Florence Klingensmith Opal Kunz Ila Loetscher Ruth Rowland Nichols Phoebe Omlie Thea Rasche Marjorie Stinson Louise Thaden Mary Webb Nicholson Helen Cox Bikle Nellie Zabel Willhite Other notable members include: Margaret Adams Ruth Alexander Suzie Azar Pancho Barnes Janet Zaph Briggs Maie Casey, Baroness Casey Katherine Sui Fun Cheung Jackie Cochran (president 1941–1943) Eileen Collins Marjorie Crawford Betty Gillies Linda M. Godwin Kathryn Hach-Darrow Nancy Hopkins Elvy Kalep Peggy Kelman Theresa M. Korn Dot Lemon Elsie MacGill Anésia Pinheiro Machado Pamela Melroy Betty Miller (pilot) Terry Neese Norah O'Neill Dorothy Rungeling Sheila Scott Katharine Stinson Jane Straughan Manila Davis Talley Penny Thompson Bobbi Trout Hermelinda Urvina Patty Wagstaff Shannon Walker Nancy-Bird Walton Jessie E. Woods Edna Gardner Whyte (president 1955–1957) Jeana Yeager Charter member Margaret Thomas "Tommy" Warren believes she might have been the youngest charter member of the 99's –
https://en.wikipedia.org/wiki/Shadow%20of%20Memories
(Shadow of Destiny in North America) is a mystery adventure game developed by Konami Computer Entertainment Tokyo and published by Konami. Originally released for the PlayStation 2 in 2001, it was later ported to Xbox (which is only released in Europe) and Microsoft Windows in 2002. A PlayStation Portable version was released on October 1, 2009 in Japan and on January 26, 2010 in North America. Gameplay The objective of Shadow of Memories is to guide player character Eike Kusch through the fictional German town of Lebensbaum (Life's Tree) as he travels through time to prevent and unmask his murderer. The game takes place in three parts: a prologue, eight chapters, and an epilogue. In the prologue and each chapter, Eike dies, is resurrected by the non-player character Homunculus, and travels back in time before his death with the intent of changing events to prevent it. Shadow of Memories lacks traditional action elements, and Eike cannot attack nor does he have a bar displaying his health. The digipad, a time-traveling item given to Eike by Homunculus, requires energy units, which the player can find scattered around the town. The gameplay primarily consists of time-traveling through the different eras, finding items, and interacting through dialogue with the non-player characters. Actions taken in one time period affect future ones; for example, if Eike removes a seal from the squire's manor in 1580, the seal will not appear in the present era. Additionally, the game keeps two digital clocks: one depicting the time in the present-day era and another for whichever era Eike time-travels to. The amount of time Eike spends in the different eras also passes in the present-day one. The cut-scenes and dialogue takes up varying amounts of in-game time. When the clock arrives at the time of Eike's death, the chapter restarts, however, if Eike is not in his time period at the time of his death, the game ends. Plot Set in a fictional German town named Lebensbaum (The Tree of Life), Shadow of Memories revolves around a 22-year-old man named Eike Kusch, who dies in the beginning of the game from being stabbed after leaving a small diner. However, he is resurrected by Homunculus (voiced by Charles Martinet in the first English dub), a djinn or genie, who offers to send him back in time to prevent his death and gives him the time-traveling digipad. Eike explores four eras—2001, 1979/1980, 1902 and 1580 to 1584 — as he attempts to unmask his killer and figure out a way of stopping his own murder at various points in the present. Along the way he encounters several characters: Dana, a modern-day waitress whom he accidentally brings back to the year 1580 and loses; the present-day fortune teller, who tells Eike the hour of his death; Eckart Brum, the curator of a private art museum who lost his wife and infant daughter in a shooting; Dr. Wolfgang Wagner, an alchemist living in 1580 with his wife, Helena, and their two children, Hugo and Margarete; and Alfred
https://en.wikipedia.org/wiki/CTN
CTN may refer to: Television bTV Action, a Bulgarian channel (formerly known as CTN) Cambodian Television Network, Cambodia Channel 31 (Sydney), which used the callsign CTN-31 Christian Television Network, a Christian broadcast television network in the United States Chung T'ien Television, a television network based in Taiwan (formerly Chinese Television Network) Connecticut Network, or CT-N (often misidentified as CTN) MTVU, United States (formerly College Television Network) Transport Charlton railway station (National Rail station code CTN), London, England Compagnie Tunisienne de Navigation, a Tunisian ferry operator Cooktown Airport (IATA: CTN) Croatia Airlines (ICAO: CTN) Other uses CTN (retail), Confectionery, Tobacco, and News retailers CTN Animation Expo, Creative Talent Network Animation Expo in Burbank, California ctn, a notation for cotangent trigonometric function Camp Tel Noar, a USA summer camp Cardiac troponin, see troponin test Central de Trabajadores Nicaragüenses, the Nicaraguan Workers' Centre Cryptologic Technician, a U.S. Navy specialist rating
https://en.wikipedia.org/wiki/Omidyar%20Network
Omidyar Network is a self-styled "philanthropic investment firm," composed of a foundation and an impact investment firm. Established in 2004 by eBay founder Pierre Omidyar and his wife Pam, Omidyar Network has committed over US$1.5billion to nonprofit organizations and for-profit companies across multiple investment areas. According to the OECD, Omidyar Network's financing for 2019 development increased by 10% to US$58.9 million. Structure Composed of a 501(c)(3) and a Limited Liability Company (LLC), Omidyar Network is structured to work across the social, business, and government sectors. Like a traditional foundation, it makes grants through its 501(c)(3) entity; through its LLC, it invests in for-profit entities. It is a part of The Omidyar Group. In 2018, Omidyar Network spun off its Governance & Citizen Engagement initiative. The group now operates as Luminate, a global philanthropic organization that invests in civic empowerment, data and digital rights, financial transparency, and independent media. It is led by Stephen King. In 2019, Omidyar Network spun off its Financial Inclusion initiative. The group now operates as Flourish and is led by Tilman Ehrbeck, Arjuna Costa, and Emmalyn Shaw. People As of 2022, the CEO of Omidyar Network is Mike Kubzansky. Its board of directors include the managing directors of The Omidyar Group, Jeff Alvord and Pat Christen. As of 2022, the organization has offices in Silicon Valley, Bengaluru, London, Mumbai, Nairobi, and Washington, D.C. Investees Omidyar Network invested in the microfinance sector, including Unitus Inc. In 2009, the Omidyar Network donated $2 million over two years to the Wikimedia Foundation, and at the same time, Matt Halprin of Omidyar Network was appointed to Wikimedia's board of directors. From 2012, Omidyar Network has been a partner of Better Than Cash Alliance. In 2017, Omidyar Network together with AVINA Americas and Avina Foundation founded the Latin American Alliance for Civic Technology (ALTEC) to invest in and support the development in Latin America of civic technology platforms and related scalable technologies. In 2020, it invested $150,000 in the legal assistance organization Whistleblower Aid. See also Acumen Fund Bill and Melinda Gates Foundation Blue Haven Initiative Jasmine Social Investments Mulago Foundation Peery Foundation Philanthrocapitalism Skoll Foundation References External links The Omidyar Group Foundations based in the United States 2004 establishments in California
https://en.wikipedia.org/wiki/PBJ
PBJ or PB&J is a peanut butter and jelly sandwich, popular in North America. PBJ or PB&J may also refer to: PBJ (TV network), a children's television network in the United States PB&J Television PBJ-1, US Navy variant of the B-25 Mitchell bomber PB&J Otter, kid's program PBJ or PB&J may abbreviate for: Peanut Butter Jelly (song) Peanut Butter Jelly Time, song Probation before judgment In Maryland, deferred adjudication is called "Probation Before Judgment" or "PBJ" for short. Progressive Black & Journalists, an African-American journalism organization Peter Bjorn and John, a Swedish indie pop band Patrick Baldwin Jr., an American basketball player for the Golden State Warriors See also or or
https://en.wikipedia.org/wiki/IBM%20PALM%20processor
The PALM (Program All Logic in Microcode) is a 16-bit central processing unit (CPU) developed by IBM. It was used in the IBM 5100 Portable Computer, a predecessor of the IBM PC, and the IBM 5110 and IBM 5120 follow-on machines. It is likely PALM was also used in other IBM products as an embedded controller. IBM referred to PALM as a microprocessor, though they used that term to mean a processor that executes microcode to implement a higher-level instruction set, rather than its conventional definition of a CPU on an integrated circuit. The PALM processor was a circuit board containing 13 bipolar gate arrays packaged in square metal cans, 3 conventional transistor–transistor logic (TTL) ICs in dual in-line packages, and 1 round metal can part. The PALM was used to implement an emulator, which in turn could run machine instructions originally written for other machines; this is how IBM System/360 APL ran on the 5100. PALM has a 16-bit data bus, with two additional bits used for parity. PALM can directly address 64KB (64KiB) of memory. The IBM 5100 could be configured with up to 64+KB (APL + BASIC ROMs make 64+KB) of Executable ROS (ROM) and up to 64KB of RAM. A simple bank switching scheme was used to extend the address space. In 1973, the IBM Los Gatos Scientific Center developed a portable computer prototype called SCAMP (Special Computer APL Machine Portable) based on the PALM processor with a Philips compact cassette drive, small CRT display, and full-function keyboard. References External links about various Microcode implementations Pictures Daves Old Computers, This page has a link with a picture of the IBM PALM circuit board as well as many photos of the IBM 5100. The Maintenance Information Manual linked at the bottom of the page includes an appendix describing the microcode. PALM IBM microprocessors
https://en.wikipedia.org/wiki/Individual%20Computers%20Catweasel
The Catweasel is a family of enhanced floppy-disk controllers from German company Individual Computers. These controllers are designed to allow more recent computers, such as PCs, to access a wide variety of older or non-native disk formats using standard floppy drives. Principle The floppy controller chip used in IBM PCs and compatibles was the NEC 765A. As technology progressed, descendants of these machines used what were essentially extensions to this chip. Many other computers, particularly ones from Commodore and early ones from Apple, write disks in formats which cannot be encoded or decoded by the 765A, even though the drive mechanisms are more or less identical to ones used on PCs. The Catweasel was therefore created to emulate the hardware necessary to produce these other low-level formats. The Catweasel provides a custom floppy drive interface in addition to any other floppy interfaces the computer is already equipped with. Industry standard floppy drives can be attached to the Catweasel, allowing the host computer to read many standard and custom formats by means of custom software drivers. Supported formats: Versions The initial version of the Catweasel was introduced in 1996 and has since undergone several revisions. The Catweasel Mk1 and Mk2, for the Commodore Amiga 1200 and Amiga 4000, sold out in October 2001. The Mk3 added PCI compatibility and sold out in mid-2004. It was succeeded by the Mk4. The Mk2 was re-released in 2006 as a special "Anniversary Edition". Mk1 The original version of the Catweasel was introduced in 1996 for the Amiga computer, and was available in two versions - one for the Amiga 1200 and one for the Amiga 4000. The Amiga 1200 version connected to the machine's clock port; the Amiga 4000 version connected to the machine's IDE port. A pass-through was provided on the Amiga 4000 version so that the IDE port could still be used for mass storage devices. ISA A version of the Catweasel controller was developed for use in a standard PC ISA slot as a means of reading custom non-PC floppy formats from MS-DOS. Custom DOS commands are required to use the interface. Official software and drivers are also available for Windows. Mk2 and Mk2 Anniversary Edition The Mk2 Catweasel was a redesign of the original Catweasel, merging the Amiga 1200 and Amiga 4000 versions into a single product that could be used on both computers, and providing a new PCB layout that allowed it to be more easily installed in a standard Amiga 1200 case. The continued popularity of the Catweasel Mk2 led to a special "Anniversary Edition" of this model being released in 2006. The PCB of the Anniversary Edition received minor updates, however it retained the same form factor and functionality as the Mk2. Z-II The Catweasel Z-II version was an Amiga Zorro-II expansion that combined the Catweasel Mk2 controller with another Individual Computers product, the Buddha, on a single board providing floppy and IDE interfaces to the host compute
https://en.wikipedia.org/wiki/Philips%20P2000
The Philips P2000T home computer was Philips' first real entry in the home computer market in 1980, after the Philips Videopac G7000 game system (better known in North America as the Magnavox Odyssey2) which they already sold to compete with the Atari 2600 and similar game systems. There was also a P2000M version with an additional 80-column text card for use with a monochrome monitor. This version shipped with a monitor cabinet also housing a dual 5.25" floppy drive. The P2000C version, introduced in 1982, was portable. The P2000 systems can be emulated with the MESS software, and since 2015 they are part of MAME. Other emulators also exist. P2000T The P2000T was a Z80-based home computer that used a Mullard SAA5050 teletext display chip to produce the video picture and a small Mini-Cassette recorder for 42 kilobytes of mass storage capacity. The Mini-Cassette was treated as a floppy drive from the user's perspective while using the automatic search for a program (CLOAD command) or free space (CSAVE ). A command to display the directory of the cassette also exists. Philips used components they already produced for other markets (television sets and dictation machines) to quickly design a small computer system. It was partially designed by Austrian professor Dieter Hammer. They also copied the ROM cartridge system from their Videopac G7000 game system. One of these cartridges contained Microsoft BASIC. It was also possible to use cassette tape floppies. Although the teletext video chip permitted a quick entry into the home computer market, it was also the major weakness of the P2000T. Using the teletext standard in itself was not a bad idea because it did support eight colors and rudimentary semigraphics. But unlike later entries in the home computer market also supporting a teletext display mode, such as the venerable BBC computer and the Oric Atmos, the P2000T did not support a high resolution display mode. This made it very difficult to develop interesting games for it, with only a few titles being released. As a result, the P2000T had only limited success, and Philips later replaced it with their MSX machines. The machine did gain popularity in Netherlands, especially in the areas of science, education, and data communications (videotex). Initially, in 1981, the computer cost 3000 guilders (€2725 in 2015's money). In 1984 the price was lowered to 1200 guilders (€967 in 2015's money). P2000M The P2000M incorporated two 5,25-inch floppy disk drives, besides a built-in monochrome screen. It could run CP/M or Microsoft BASIC applications, depending on the cartridge used. It was incompatible with the P2000T due to the way it handled display of special characters (color, "graphics mode"), which made most P2000T games unplayable. References External links P2000 architecture Philips products Z80-based home computers Home computers
https://en.wikipedia.org/wiki/Nobuo%20Yoneda
was a Japanese mathematician and computer scientist. In 1952, he graduated the Department of Mathematics, the Faculty of Science, the University of Tokyo, and obtained his Bachelor of Science. That same year, he was appointed Assistant Professor in the Department of Mathematics of the University of Tokyo. He obtained his Doctor of Science (DSc) degree from the University of Tokyo in 1961, under the direction of Shokichi Iyanaga. In 1962, he was appointed Associate Professor in the Faculty of Science at Gakushuin University, and was promoted in 1966 to the rank of Professor. He became a professor of Theoretical Foundation of Information Science in 1972. After retiring from the University of Tokyo in 1990, he moved to Tokyo Denki University. The Yoneda lemma in category theory and the Yoneda product in homological algebra are named after him. In computer science, he is known for his work on dialects of the programming language ALGOL. He became involved with developing international standards in programming and informatics, as a Japanese representative on the International Federation for Information Processing (IFIP) IFIP Working Group 2.1 on Algorithmic Languages and Calculi, which specified, supports, and maintains the languages ALGOL 60 and ALGOL 68. References External links 1930 births 1996 deaths Japanese computer scientists 20th-century Japanese mathematicians University of Tokyo alumni Academic staff of the University of Tokyo Academic staff of Gakushuin University Academic staff of Tokyo Denki University
https://en.wikipedia.org/wiki/Datalog
Datalog is a declarative logic programming language. While it is syntactically a subset of Prolog, Datalog generally uses a bottom-up rather than top-down evaluation model. This difference yields significantly different behavior and properties from Prolog. It is often used as a query language for deductive databases. Datalog has been applied to problems in data integration, networking, program analysis, and more. Example A Datalog program consists of facts, which are statements that are held to be true, and rules, which say how to deduce new facts from known facts. For example, here are two facts that mean xerces is a parent of brooke and brooke is a parent of damocles: parent(xerces, brooke). parent(brooke, damocles). The names are written in lowercase because strings beginning with an uppercase letter stand for variables. Here are two rules: ancestor(X, Y) :- parent(X, Y). ancestor(X, Y) :- parent(X, Z), ancestor(Z, Y). The :- symbol is read as "if", and the comma is read "and", so these rules mean: X is an ancestor of Y if X is a parent of Y. X is an ancestor of Y if X is a parent of some Z, and Z is an ancestor of Y. The meaning of a program is defined to be the set of all of the facts that can be deduced using the initial facts and the rules. This program's meaning is given by the following facts: parent(xerces, brooke). parent(brooke, damocles). ancestor(xerces, brooke). ancestor(brooke, damocles). ancestor(xerces, damocles). Some Datalog implementations don't deduce all possible facts, but instead answer queries: ?- ancestor(xerces, X). This query asks: Who are all the X that xerces is an ancestor of? For this example, it would return brooke and damocles. Comparison to relational databases The non-recursive subset of Datalog is closely related to query languages for relational databases, such as SQL. The following table maps between Datalog, relational algebra, and SQL concepts: More formally, non-recursive Datalog corresponds precisely to unions of conjunctive queries, or equivalently, negation-free relational algebra. s(x, y). t(y). r(A, B) :- s(A, B), t(B). CREATE TABLE s ( z0 TEXT NONNULL, z1 TEXT NONNULL, PRIMARY KEY (z0, z1) ); CREATE TABLE t ( z0 TEXT NONNULL PRIMARY KEY ); INSERT INTO s VALUES ('x', 'y'); INSERT INTO t VALUES ('y'); CREATE VIEW r AS SELECT s.z0, s.z1 FROM s, t WHERE s.z1 = t.z0; Syntax A Datalog program consists of a list of rules (Horn clauses). If constant and variable are two countable sets of constants and variables respectively and relation is a countable set of predicate symbols, then the following BNF grammar expresses the structure of a Datalog program: <program> ::= <rule> <program> | "" <rule> ::= <atom> ":-" <atom-list> "." <atom> ::= <relation> "(" <term-list> ")" <atom-list> ::= <atom> | <atom> "," <atom-list> | "" <term> ::= <constant> | <variable> <term-list> ::= <term> | <term> "," <term-list> | "" Atoms are also referred to as . The atom to the left of the :- symbol is
https://en.wikipedia.org/wiki/Grace%20%28plotting%20tool%29
Grace is a free WYSIWYG 2D graph plotting tool, for Unix-like operating systems. The package name stands for "GRaphing, Advanced Computation and Exploration of data." Grace uses the X Window System and Motif for its GUI. It has been ported to VMS, OS/2, and Windows 9*/NT/2000/XP (on Cygwin). In 1996, Linux Journal described Xmgr (an early name for Grace) as one of the two most prominent graphing packages for Linux. History Grace is a descendant of the ACE/gr plotting tool (also known as Xvgr), based on Xview libraries from OpenWindows. Xvgr was originally written by Paul Turner of Portland, Oregon, who continued development until version 4.00. In 1996, development was taken over by the ACE/gr development team, led by Evgeny Stambulchik at the Weizmann Institute of Science, Israel. Development of Xmgr was frozen at version 4.1.2 in 1998 and the Grace project was started as a fork, released under the GPL. The name stands for "GRaphing, Advanced Computation and Exploration of data" or "Grace Revamps ACE/gr" Turner still maintains a non-public version of Xmgr for internal use. The first version of Grace was numbered 5.0.0 and the latest stable version, 5.1.25 (released February 2015). Whether the development of the next major release 6.0.0 is still in progress is unclear. The latest preview versions numbered 5.99.* were released in 2007. Currently maintained versions Noteworthy alternate versions of Grace include GraceGTK, forked from Grace 5.1.22 in 2009 by Patrick Vincent, and QtGrace, released in 2011 by Andreas Winter. Both of these versions of Grace work natively on Windows operating systems and had releases in 2017. Features Grace can be used from a point-and-click interface or scripted (using either the built-in programming language or a number of language bindings). It performs both linear and nonlinear least-squares fitting to arbitrarily complex user-defined functions, with or without constraints. Other analysis tools include FFT, integration and differentiation, splines, interpolation, and smoothing. Programs using Grace GROMACS MOLPRO NAMD Visual Molecular Dynamics AptPlot See also List of graphing software References External links Grace Home page ACE/gr Home page QtGrace Home page GraceGTK Home page Free plotting software Plotting software Software that uses Motif (software) X Window programs
https://en.wikipedia.org/wiki/Mungyeong
Mungyeong (; ) is a city in North Gyeongsang Province, South Korea. The local government, economy, and transportation networks are all centered in Jeomchon, the principal town. Mungyeong has a lengthy history, and is known today for its various historic and scenic tourist attractions. The city's name means roughly "hearing good news." Recently, development has been somewhat stagnant with the decline of the coal industry. Since the 1990s, the proportion of people who rely on the tourism industry through Mungyeong Saejae has gradually increased. The city of Mungyeong was created after Jeomchon City and rural Mungyeong County were combined in 1995. It is now an urban-rural complex similar to 53 other small and medium-sized cities with a population under 300,000 people in South Korea. History The Mungyeong area is believed to have been controlled by a mixture of Jinhan and Byeonhan states during the Samhan period in the first centuries of the Common Era. The Jinhan state of Geungi-guk may have been located near Sanyang-myeon. Byeonhan states such as Sabeol-guk and Gosunsi-guk, which probably controlled the Hamchang area of Sangju, may also have extended their control over adjacent areas that are now part of Mungyeong. However, this stage of local history is almost entirely hypothetical, since very little evidence of any kind remains. At any rate, the rising power of Silla controlled the area by 505. Capitalizing on the territory's strategic potential, Silla set up various mountain fortresses in the area to control movement in and out of western Korea. Control of transit through the area would have gained even greater importance after Silla's 553 seizure of the Han River valley on the western side of the mountains. At this time the low Haneuljae pass near Poam Mountain was probably the favored crossing, in contrast to the higher Mungyeong Saejae pass which came into favor in the Joseon period. As Silla reorganized its administrative structure under King Seongdeok in 757, the Mungyeong area was placed under the province of Sangju, and divided among various hyeon, or local districts. During this Unified Silla period the temple of Gwaneumsa, of which all but a few traces have vanished, was constructed near Haneuljae in present-day Mungyeong-eup. In the early Goryeo period, in 983, King Seongjong reorganized local government yet again. Most of Mungyeong remained divided into assorted hyeon, under the central jurisdiction of Sangju. In 1390, Mungyeong-gun (Mungyeong County) begins to appear in the records, although not with its current boundaries. In the Joseon period, the Eight Provinces were laid out and thus Mungyeong became part of Gyeongsang, which it remains. During later Joseon times, the road from Seoul to Busan was established running over Mungyeong Saejae. Beginning in the 18th century, gates were erected on the road to control traffic and protect travelers from brigandage. These gates are still preserved today. The first rai
https://en.wikipedia.org/wiki/PII
PII may refer to: Personal data, also known as personally identifiable information (PII) Pentium II, a computer processor Polaris Inc., New York Stock Exchange stock symbol PII Public-interest immunity, previously known as Crown privilege, in English common law Publisher Item Identifier, in scientific journals Professional indemnity insurance Proto-Indo-Iranian language Indonesian Islamic Party
https://en.wikipedia.org/wiki/Connolly%20station
Connolly station () or Dublin Connolly is one of the busiest railway stations in Dublin and Ireland, and is a focal point in the Irish route network. On the North side of the River Liffey, it provides InterCity, Enterprise and commuter services to the north, north-west, south-east and south-west. The north–south Dublin Area Rapid Transit (DART) and Luas red line light rail services also pass through the station. The station offices are the headquarters of Irish Rail, Iarnród Éireann. Opened in 1844 as Dublin Station, the ornate facade has a distinctive Italianate tower at its centre. History On 24 May 1844 the Dublin and Drogheda Railway (DDR) began public operations from an interim terminus at the Royal Canal, and on the same day the foundation stone for what is now Connolly station was laid by Earl de Grey, Lord Lieutenant of Ireland. The station was opened for operations on 29 November 1844 as Dublin Station, but was renamed Amiens Street Station ten years later, after the street where it is located. The terminus building, which was also to be the DDR's headquarters, designed by William Deane Butler, was constructed of Wicklow granite at a cost of £7,000 and opened in 1846. The flight of steps from the street was to prove difficult for luggage porters and some thirty year later a sloped ramp from opposite Store Street was created to allow step-free pedestrian and vehicle access to platform level. Originally the station served only a single mainline to Drogheda, and in 1853 through services to Belfast commenced, and an amalgamated company, the Great Northern Railway Ireland (GNRI) taking over operations. In 1879, architect John Lanyon designed a red sandstone and brick headquarters for the GNRI. In 1891, the City of Dublin Junction Railway opened a separate station called Amiens Street Junction immediately next to the DDR's station. Amiens Street Junction had through platforms, allowing passengers to travel over the Loopline Bridge to Westland Row on the city's Southside and onwards to Rosslare. In 1937, the MGWR's Broadstone Station was closed, and the services to Sligo were transferred to Westland Row via Amiens Street Junction. After the amalgamation of the GNR (I) at the end of the 1950s, the two stations were merged into one, simply called Amiens Street. The platforms built by the DDR became platforms 1–4, now used for Intercity and Enterprise trains to Sligo and Belfast; the platforms built by the CDJR became platforms 5–7, used for DART, Commuter and Rosslare services; the DDR's station building became the main passenger entrance and ticket hall; and the CDJR's building fell into disuse. In 1966, the 50th anniversary of the Easter Rising, Amiens Street was selected as one of fifteen main stations in Ireland to have their names changed to honour patriots executed for their roles in the rising. Amiens Street was renamed Connolly Station, after revolutionary socialist James Connolly. Services to Galway and County Mayo, via Mullinga
https://en.wikipedia.org/wiki/Dragon%20Data
Dragon Data Ltd. was a Welsh producer of home computers during the early 1980s. These computers, the Dragon 32 and Dragon 64, strongly resembled the Tandy TRS-80 Color Computer ("CoCo")—both followed a standard Motorola datasheet configuration for the three key components (CPU, SAM and VDG). The machines came in both 32KB and (later) 64KB versions. History The history of Dragon Data in the period 1982–84 was a checkered one. The company was originally set up by toy company Mettoy, and after initial good sales looked to have a bright future. At its high point it entered negotiations with Rexnord's Tano Corporation to form a North American branch. Mettoy then suffered financial difficulties, casting a shadow on the future of Dragon Data before it was spun off as a separate company. However, a number of circumstances (the delay in introducing the 64K model, poor colour support with a maximum of 4 colours displayable in "graphics mode" and only 2 colours in the highest 256 × 192 pixel mode, the late introduction of the external disk unit and of the supporting OS9-based software) caused the company to lose market share. To combat this, under the control of GEC, Dragon Data worked on the next generation of Dragon computers; the Dragon Alpha (or Professional) and Beta (or 128). These systems only made it to the prototype stage before the business went into receivership and was sold on to the Spanish startup Eurohard in 1984. Eurohard also suffered financial problems and went into receivership a couple of years later after the release of the Dragon 200. In addition to the Dragon 32 and 64, an MSX-compatible machine, the Dragon MSX reached the prototype stage. References Smeed, D. & Sommerville, I. (1983). Inside the Dragon. Addison-Wesley. External links A Slayed Beast - History of the Dragon computer – From The DRAGON Archive Dedicated DRAGON wiki Defunct computer hardware companies Defunct computer companies of the United Kingdom Defunct companies of Wales Home computer hardware companies Computer companies established in 1982 Computer companies disestablished in 1984 1982 establishments in Wales 1984 disestablishments in Wales Manufacturing companies of Wales
https://en.wikipedia.org/wiki/Temporal%20Key%20Integrity%20Protocol
Temporal Key Integrity Protocol (TKIP ) is a security protocol used in the IEEE 802.11 wireless networking standard. TKIP was designed by the IEEE 802.11i task group and the Wi-Fi Alliance as an interim solution to replace WEP without requiring the replacement of legacy hardware. This was necessary because the breaking of WEP had left Wi-Fi networks without viable link-layer security, and a solution was required for already deployed hardware. However, TKIP itself is no longer considered secure, and was deprecated in the 2012 revision of the 802.11 standard. Background On October 31, 2002, the Wi-Fi Alliance endorsed TKIP under the name Wi-Fi Protected Access (WPA). The IEEE endorsed the final version of TKIP, along with more robust solutions such as 802.1X and the AES based CCMP, when they published IEEE 802.11i-2004 on 23 July 2004. The Wi-Fi Alliance soon afterwards adopted the full specification under the marketing name WPA2. TKIP was resolved to be deprecated by the IEEE in January 2009. Technical details TKIP and the related WPA standard implement three new security features to address security problems encountered in WEP protected networks. First, TKIP implements a key mixing function that combines the secret root key with the initialization vector before passing it to the RC4 cipher initialization. WEP, in comparison, merely concatenated the initialization vector to the root key, and passed this value to the RC4 routine. This permitted the vast majority of the RC4 based WEP related key attacks. Second, WPA implements a sequence counter to protect against replay attacks. Packets received out of order will be rejected by the access point. Finally, TKIP implements a 64-bit Message Integrity Check (MIC) and re-initializes the sequence number each time when a new key (Temporal Key) is used. To be able to run on legacy WEP hardware with minor upgrades, TKIP uses RC4 as its cipher. TKIP also provides a rekeying mechanism. TKIP ensures that every data packet is sent with a unique encryption key(Interim Key/Temporal Key + Packet Sequence Counter). Key mixing increases the complexity of decoding the keys by giving an attacker substantially less data that has been encrypted using any one key. WPA2 also implements a new message integrity code, MIC. The message integrity check prevents forged packets from being accepted. Under WEP it was possible to alter a packet whose content was known even if it had not been decrypted. Security TKIP uses the same underlying mechanism as WEP, and consequently is vulnerable to a number of similar attacks. The message integrity check, per-packet key hashing, broadcast key rotation, and a sequence counter discourage many attacks. The key mixing function also eliminates the WEP key recovery attacks. Notwithstanding these changes, the weakness of some of these additions have allowed for new, although narrower, attacks. Packet spoofing and decryption TKIP is vulnerable to a MIC key recovery attack that, if suc
https://en.wikipedia.org/wiki/Not%20Quite%20C
Not Quite C (NQC) is a programming language, application programming interface (API), and native bytecode compiler toolkit for the Lego Mindstorms, Cybermaster and LEGO Spybotics systems. It is based primarily on the C language but has specific limitations, such as the maximum number of subroutines and variables allowed, which differ depending on the version of firmware the RCX has. The language was invented by David Baum. He has released two books on the subject. Simple program example A simple test program written in NQC for an RCX with a motor connected to output port A could look like this: task main () // Main program { SetPower(OUT_A, OUT_FULL); // Turn on motor A at 100% power. OnFor(OUT_A, 200); // Let the motor run for two seconds, and then turn it off. } Thus, motor A will go at full speed for two seconds before being turned off. Compilers and integrated development environments NQC compilers and integrated development environments (IDEs) are available for many platforms including Microsoft Windows, Mac OS X, Linux, BeOS, and MS-DOS. One is the Bricx Command Center. References External links NQC Homepage NQC tutorial by Mark Overmars NQC tutorial by Matt Miller Compiler sources: for Ubuntu IDE sources: for DOS for BeOS for OS X (Snow Leopard or Earlier) for Windows for Linux Lego Mindstorms C programming language family Robot programming languages
https://en.wikipedia.org/wiki/MicroBee
MicroBee (or Micro Bee) was a series of networkable home computers by Applied Technology, which became publicly listed company MicroBee Systems Limited soon after its release. The original Microbee computer was designed in Australia by a team including Owen Hill and Matthew Starr. The MicroBee's most distinctive features are its user configurable video display (capable of mimicking the displays of other computers and devices including the TRS-80, Sorcerer and SOL20 with later colour and graphic models 40 and 80 column terminals, Super-80, ZX Spectrum, early arcade machines, Amstrad CPC 464) and its battery backed non-volatile RAM and small size allowing it to be powered off, transported, and powered back on and resume activities on the currently loaded program or document. It was originally packaged as a two board unit with the lower "baseboard" containing all components except the system memory which was mounted on the upper "core board". Components The original main board consisted of: Z80 CPU Z80 PIO 6545 CRT controller 2 KB Screen RAM 2 KB Character ROM (128 characters) 2 KB Programmable Character Graphics (PCG) RAM (128 characters) Keyboard Speaker Tape Input/Output Video Out Serial Port User Parallel Port Power Connector The original coreboards consisted of: Either 32KB capacity or 56KB capacity 6116 battery backed Non-volatile RAM Either 16KB BASIC ROM or 4KB BOOT ROM 50 way System Expansion port Provision for 8KB Expansion ROM on 32KB Max capacity version A floppy disk drive unit and S-100 Bus expansion unit were available. They connected to a microbee by a 50 way ribbon cable to the System Expansion port. The microbee had two networking options - BeeNet and StarNet. The BeeNet was a low cost low speed LAN (Local Area Network) for 16-32K ROM Models and the StarNet was for the 64K and larger DRAM models. The BeeNet uses a bus topology that uses synchronous serial transfers. The StarNet uses a single Star topology using dedicated 8 bit parallel data bus connections between the central hub and its remote spokes. Ancestry The microbee was the integration, simplification and modernisation of the following S-100 cards sold by Applied Technology, Microworld BASIC and DGOS Monitor for their System Z.A.T. chassis. DG680 CPU - Z80 Single board Computer designed by David Griffiths MW640/DG640 VDU - Visual Display Unit designed by David Griffiths. (The DG640 VDU was itself was based upon the Processor Technology VDM-1.) TCT-PCG - Programmable Character Generator for the DG640 VDU designed by Craig Barratt MW864 - MEGAMEMORY 64K Static RAM Memory board designed by Owen Hill MW2516 - 16K ROM 16K ROM Card designed by Owen Hill MW6545 - User Programmable VDU designed by John Wilmshurst The removal of the S-100 bus support and configuration hardware and some other features made the microbee much simpler and cheaper than its ancestors. Examples: The VDU Attribute RAM of the DG640 VDU was not employed in the or
https://en.wikipedia.org/wiki/Vijay%20S.%20Pande
Vijay Satyanand Pande is a Trinidadian–American scientist and venture capitalist. Pande is the former director of the biophysics program and is best known for orchestrating the distributed computing disease research project known as Folding@home. His research is focused on distributed computing and computer-modelling of microbiology and on improving computer simulations regarding drug-binding, protein design, and synthetic bio-mimetic polymers. Pande became the ninth general partner at venture capital firm Andreessen Horowitz in November 2015. He is the founding investor of their Bio + Health Fund. Career Pande is an adjunct professor of bioengineering at Stanford University. Previously, he was the Henry Dreyfus Professor of Chemistry and professor of structural biology and of computer science. He was also director of the biophysics program. Pande serves on the boards of Apeel Sciences, Bayesian Health, BioAge Labs, Citizen, Devoted Health, Freenome, Insitro, Nautilus Biotechnology, Nobell, Omada Health, Q.bio, and Scribe Therapeutics, a CRISPR company co-founded by 2020 Nobel Laureate Jennifer Doudna. He has also been a founder and advisor to startups in Silicon Valley. Pande has written for TIME, STAT News, Fortune, and the New York Times, among others. Globavir Biosciences, Inc. In 2014, Pande co-founded Globavir Biosciences, an infectious disease startup addressing antibiotic resistance threats in developed countries as well as needs in viral infections around the world, including Ebola and dengue fever. Pande Lab at Stanford University Pande founded the Pande Lab at Stanford University. The lab brings together researchers from many departments, including Chemistry, Computer Science, Structural Biology, Physics, Biophysics, and Biochemistry. Distributed computing Pande is the founder of the Folding@home research project. The protein-folding computer simulations from the Folding@home project is said to be "quantitatively" comparable to real-world experimental results. The method for this yield has been called a "holy grail" in computational biology. The Folding@home project was recognized by the Guinness Book of World Records in 2007 as the most powerful distributed computing network in the world. Pande directed the Genome@home project with the goal to understand the nature of genes and proteins by virtually designing new forms of them. Genome@home started to close as early as March 2004, after accumulating a large database of protein sequences. Some of the programs and libraries involved are free software with GPL, LGPL, and BSD licenses, but the folding@home client and core remain proprietary. Stanford Bitcoin Group and Bitcoin Mafia With colleague Balaji Srinivisan, Pande supervised the Stanford Bitcoin Group, a bitcoin research team born of hackathon activities in Pande and Srinvisan’s Stanford CS 184 class. The Stanford Bitcoin Group consisted of seven core members and included Ryan Breslow, a founder of Cognito, a devel
https://en.wikipedia.org/wiki/Military%20patrol%20at%20the%201924%20Winter%20Olympics
At the 1924 Winter Olympics, in Chamonix, France, a military patrol competition was held. The Olympic results database lists the official medal winners for the event, as does the Official Report (1924), yet several sources have incorrectly counted this competition as a demonstration event only. The event was also demonstrated in 1928, 1936, and 1948, but those results are still considered unofficial. A full 36 years would pass before the modern version of the sport, biathlon, became an official Winter Olympic sport. The official website of the IOC now treats Men's Military Patrol at the 1924 Games as a separate discipline, without mixing it with the sports of Skiing or Biathlon. However, the 1924 Official Report treats it as an event within the sport of skiing. The competition was held on Tuesday, January 29, 1924. Each team had 4 people and the distance was 25 km. The targets were balloons at 150m. Six teams started the event, but only four finished with Italy and Poland withdrawing due to bad conditions. Results Participating nations A total of 24 biathletes from six nations competed at the Chamonix Games: Medal table Sources: References Bibliography Official Report (1924) of both Summer and Winter games: External links International Olympic Committee results database 1924 Winter Olympics events 1924 1924 in biathlon 1924 in cross-country skiing 1924 in military history Men's events at the 1924 Winter Olympics
https://en.wikipedia.org/wiki/Byzantine%20fault
A Byzantine fault (also Byzantine generals problem, interactive consistency, source congruency, error avalanche, Byzantine agreement problem, and Byzantine failure) is a condition of a computer system, particularly distributed computing systems, where components may fail and there is imperfect information on whether a component has failed. The term takes its name from an allegory, the "Byzantine generals problem", developed to describe a situation in which, to avoid catastrophic failure of the system, the system's actors must agree on a concerted strategy, but some of these actors are unreliable. In a Byzantine fault, a component such as a server can inconsistently appear both failed and functioning to failure-detection systems, presenting different symptoms to different observers. It is difficult for the other components to declare it failed and shut it out of the network, because they need to first reach a consensus regarding which component has failed in the first place. Byzantine fault tolerance (BFT) is the resilience of a fault-tolerant computer system to such conditions. Definition A Byzantine fault is any fault presenting different symptoms to different observers. A Byzantine failure is the loss of a system service due to a Byzantine fault in systems that require consensus among distributed nodes. As an analogy of the fault's simplest form, consider a number of generals who are attacking a fortress. The generals must decide as a group whether to attack or retreat; some may prefer to attack, while others prefer to retreat. The important thing is that all generals agree on a common decision, for a halfhearted attack by a few generals would become a rout, and would be worse than either a coordinated attack or a coordinated retreat. The problem is complicated by the presence of treacherous generals who may not only cast a vote for a suboptimal strategy, they may do so selectively. For instance, if nine generals are voting, four of whom support attacking while four others are in favor of retreat, the ninth general may send a vote of retreat to those generals in favor of retreat, and a vote of attack to the rest. Those who received a retreat vote from the ninth general will retreat, while the rest will attack (which may not go well for the attackers). The problem is complicated further by the generals being physically separated and having to send their votes via messengers who may fail to deliver votes or may forge false votes. Byzantine fault tolerance can be achieved if the loyal (non-faulty) generals have a majority agreement on their strategy. There can be a default vote value given to missing messages. For example, missing messages can be given a "null" value. Further, if the agreement is that the null votes are in the majority, a pre-assigned default strategy can be used (e.g. retreat). The typical mapping of this story onto computer systems is that the computers are the generals and their digital communication system links are th
https://en.wikipedia.org/wiki/Protocol%20Independent%20Multicast
Protocol-Independent Multicast (PIM) is a family of multicast routing protocols for Internet Protocol (IP) networks that provide one-to-many and many-to-many distribution of data over a LAN, WAN or the Internet. It is termed protocol-independent because PIM does not include its own topology discovery mechanism, but instead uses routing information supplied by other routing protocols. PIM is not dependent on a specific unicast routing protocol; it can make use of any unicast routing protocol in use on the network. PIM does not build its own routing tables. PIM uses the unicast routing table for reverse-path forwarding. There are four variants of PIM: PIM Sparse Mode (PIM-SM) explicitly builds unidirectional shared trees rooted at a rendezvous point (RP) per group, and optionally creates shortest-path trees per source. PIM-SM generally scales fairly well for wide-area usage. PIM Dense Mode (PIM-DM) uses dense multicast routing. It implicitly builds shortest-path trees by flooding multicast traffic domain wide, and then pruning back branches of the tree where no receivers are present. PIM-DM is straightforward to implement but generally has poor scaling properties. The first multicast routing protocol, DVMRP used dense-mode multicast routing. See RFC 3973. Bidirectional PIM (Bidir-PIM) explicitly builds shared bi-directional trees. It never builds a shortest path tree, so may have longer end-to-end delays than PIM-SM, but scales well because it needs no source-specific state. See RFC 5015. PIM Source-Specific Multicast (PIM-SSM) builds trees that are rooted in just one source, offering a more secure and scalable model for a limited number of applications (mostly broadcasting of content). In SSM, an IP datagram is transmitted by a source S to an SSM destination address G, and receivers can receive this datagram by subscribing to channel (S,G). See informational RFC 3569. PIM-SM is commonly used in IPTV systems for routing multicast streams between VLANs, Subnets or local area networks. Versions There are two PIM versions. The versions are not directly compatible though may coexist on the same network. Network equipment may implement both versions. PIMv2 has the following improvements over PIMv1: A single RP is used per group. RP discovery is accomplished by a Bootstrap Router (BSR). Groups are either sparse or dense mode; Interfaces can be either. General improvements to protocol flexibility and efficiency. Sparse mode Protocol Independent Multicast - Sparse-Mode (PIM-SM) is a protocol for efficiently routing Internet Protocol (IP) packets to multicast groups that may span wide-area and inter-domain internets. The protocol is named protocol-independent because it is not dependent on any particular unicast routing protocol for topology discovery, and sparse-mode because it is suitable for groups where a very low percentage of the nodes (and their routers) will subscribe to the multicast session. Unlike earlier dense-mode multicast routi
https://en.wikipedia.org/wiki/UFS
UFS may refer to: Computers Universal Flash Storage Unix File System Unsupervised Forward Selection, a data reduction algorithm Other UFS (trade union), former trade union in the United Kingdom United Family Services United Feature Syndicate, commonly known as United Media United Feeder Service, a company formerly part of the United Express carrier network Universal Fighting System, a collectible card game Universal Frame System, A bolt locking system standard in the construction of aggressive inline skates Universidade Federal de Sergipe, a Brazilian public university University of the Free State, in South Africa UFS the stock ticker for Domtar
https://en.wikipedia.org/wiki/The%20Michigan%20Review
The Michigan Review is a news publication in Ann Arbor, Michigan. The Review, published biweekly, is funded primarily by grants from the conservative/libertarian Collegiate Network, donations, and by advertising revenue. History The Review was founded by Thomas Fous and Ronald J. Stefanski, in response to an editorial in The Michigan Daily attacking Fous, who was then the chairman of the university's College Republicans. Fous consulted with editors of The Dartmouth Review, as well as Detroit News writer Alan Miller to help direct the formation of the paper. The nascent group secured 501(c)(3) status for The Review, and empaneled an honorary advisory board, which included Paul W. McCracken, Russell Kirk, Irving Kristol, and R. Emmett Tyrrell. In late November 1982, the first issue of The Review debuted on the campus of the University of Michigan, as well as on campuses across the state of Michigan. The issue's founding editorial, entitled "In Response to Needs and Demands," laid out the history and mission of The Review. A copy of this editorial was reprinted in the April 16, 2007, issue. Since its founding issue, The Review has gone through numerous incarnations, from a long-form magazine format, to an opinion journal format, to more traditional newspaper format. The current publication resembles a more traditional newspaper format than anything else. Though its paper size is that of a tabloid, its content and presentation is more traditional than stereotypical tabloids, which tend to sensationalize stories. The Review has gained national attention during its history. It was an important voice on campus against the University of Michigan's speech code, which was eventually struck down as unconstitutional by federal courts. Additionally, The Review has long been engaged in a fight against U-M's use of affirmative action policies in its admissions processes. Its work on this issue has brought the journal national press exposure, including interviews on national and international news, as well as numerous articles by Review editors published in national outlets, like the National Review, the Christian Science Monitor, and The American Spectator. The Review also played an important role in its coverage of the Michigan Civil Rights Initiative, a ballot initiative passed in 2006 that bans the use of racial and gender preferences in the state of Michigan. Review alumni have achieved some measure of success in the national arena, working for such media outlets as the National Review, The Weekly Standard, The American Spectator, The Hill, and Investor's Business Daily, and writing speeches for President George W. Bush. See also The Mendota Beacon References External links 1982 establishments in Michigan Newspapers established in 1982 Student newspapers published in Michigan University of Michigan mass media
https://en.wikipedia.org/wiki/Total%20least%20squares
In applied statistics, total least squares is a type of errors-in-variables regression, a least squares data modeling technique in which observational errors on both dependent and independent variables are taken into account. It is a generalization of Deming regression and also of orthogonal regression, and can be applied to both linear and non-linear models. The total least squares approximation of the data is generically equivalent to the best, in the Frobenius norm, low-rank approximation of the data matrix. Linear model Background In the least squares method of data modeling, the objective function, S, is minimized, where r is the vector of residuals and W is a weighting matrix. In linear least squares the model contains equations which are linear in the parameters appearing in the parameter vector , so the residuals are given by There are m observations in y and n parameters in β with m>n. X is a m×n matrix whose elements are either constants or functions of the independent variables, x. The weight matrix W is, ideally, the inverse of the variance-covariance matrix of the observations y. The independent variables are assumed to be error-free. The parameter estimates are found by setting the gradient equations to zero, which results in the normal equations Allowing observation errors in all variables Now, suppose that both x and y are observed subject to error, with variance-covariance matrices and respectively. In this case the objective function can be written as where and are the residuals in x and y respectively. Clearly these residuals cannot be independent of each other, but they must be constrained by some kind of relationship. Writing the model function as , the constraints are expressed by m condition equations. Thus, the problem is to minimize the objective function subject to the m constraints. It is solved by the use of Lagrange multipliers. After some algebraic manipulations, the result is obtained. or alternatively where M is the variance-covariance matrix relative to both independent and dependent variables. Example When the data errors are uncorrelated, all matrices M and W are diagonal. Then, take the example of straight line fitting. in this case showing how the variance at the ith point is determined by the variances of both independent and dependent variables and by the model being used to fit the data. The expression may be generalized by noting that the parameter is the slope of the line. An expression of this type is used in fitting pH titration data where a small error on x translates to a large error on y when the slope is large. Algebraic point of view As was shown in 1980 by Golub and Van Loan, the TLS problem does not have a solution in general. The following considers the simple case where a unique solution exists without making any particular assumptions. The computation of the TLS using singular value decomposition (SVD) is described in standard texts. We can solve the equation for B
https://en.wikipedia.org/wiki/Soft%20updates
Soft updates is an approach to maintaining file system meta-data integrity in the event of a crash or power outage. Soft updates work by tracking and enforcing dependencies among updates to file system meta-data. Soft updates are an alternative to the more commonly used approach of journaling file systems. Method of operation Soft updates allow only asynchronous metadata writes that do not render the on-disk file system inconsistent, or that the only inconsistency that ever happens is a storage space leak (space marked allocated when not used by any file). It avoids having to do ordered synchronous metadata writes by temporarily "rolling back" any part of a metadata block that depends on another potentially non-flushed or partially rolled-back block when writing it. In effect, blocks may be flushed at any time and the soft-update code will always provide the disk a consistent version of it (as long as it knows which blocks have physically been flushed). Recovery then simply becomes a matter of running a background walk of the file system when it is next mounted to garbage collect any allocated space that has been orphaned. This also permits the filesystem to selectively flush certain files without having to flush all metadata blocks or all of the records. Data that is unlinked from the metadata dependency graph before writing it to disk has begun does not need to be written to disk at all. For example, creating a file, using it for a short period of time, and then deleting it may cause no disk activity at all. Soft updates require periodic flushing of the metadata to nonvolatile storage. Implementations FreeBSD supports soft updates for the UFS file system and they have been enabled by default during installation for many years. Soft updates are manually enabled or disabled during file system creation with an option to the newfs command. They can be disabled or enabled anytime thereafter with an option to the tunefs command. FreeBSD 9.0 introduced a journaling supplement to soft updates for the purpose of eliminating a background fsck for garbage collection after a crash. However, enabling journaling on a filesystem with soft updates disables the ability to make filesystem snapshots. This may cause issues when filesystems are dumped with the -L option, as snapshots are used to guarantee filesystem coherency during the dump. OpenBSD supports soft updates for the FFS file system. Soft updates are enabled when the file system is mounted by exercising an option to the mount command. NetBSD supported soft updates until the 6.0 release (2012) at which time it was deprecated in favor of WAPBL journaling. Comparison to journaling file systems Neither journaling nor soft updates guarantees that no data will be lost, but they do make sure that the filesystem remains consistent. An advantage of a file system with soft updates is that it can be mounted immediately after a crash, since there is no log replay. Notes External links Ma
https://en.wikipedia.org/wiki/Mark%20Trueblood
Mark Trueblood is an American engineer and astronomer. He pioneered the development of robotic telescopes, as the author of several articles and two books, including Microcomputer Control of Telescopes and Telescope Control, co-authored with Russell M. Genet. Trueblood worked on the Gemini Observatory. He is the owner and operator of Winer Observatory in Sonoita, Arizona, which is the site of several professional research projects. The asteroid 15522 Trueblood is named in his honor. Biography Trueblood was born in 1948 in Cincinnati, Ohio, and spent most of his childhood there, where his parents encouraged his interest in astronomy. At the age of 12, he read Jean Texereau's book "How to Make a Telescope" and ordered a mirror-grinding kit from what was then the Edmund Scientific Company. He completed a 6-inch f/8 mirror and the telescope when he was 14, the same year his father's company transferred the family to Geneva, Switzerland for two years. Mark attended the International School of Geneva during the years 1962–1964, returning to Cincinnati the summer of 1964. He graduated from Finneytown High School in June, 1966 as the Salutatorian of his class. He went on to Brown University that autumn, where he graduated in May 1971 with the degrees AB-ScB (Honors) in Physics. He attended the Ph.D. program at Wesleyan University for one year, then moved to the Washington, D.C., area in the autumn of 1972. There he worked for the Smithsonian Institution for two years, then a succession of "Beltway Bandit" software government contractors, primarily on contracts with NASA's Goddard Space Flight Center. During his 18 years in the Washington, D.C., area, he spent his final nine years with the Ford Aerospace Corporation, rising to the position of Program Manager. Among his assignments at Ford, he headed the development of the Hubble Space Telescope control center at GSFC. While in the DC area, Trueblood attended the University of Maryland and earned his master's degree in Astronomy in 1983. Michael F. A'Hearn, the Deep Impact Principal Investigator, supervised his thesis on "Small Telescope Automation." In 1990, Trueblood moved to Tucson, Arizona, to assume a position with the National Optical Astronomy Observatory (NOAO, which serves as the US national observatory) at the National Solar Observatory. There he worked for almost four years on the Global Oscillation Network Group (GONG) program as a software engineer. He began work in December 1994 in what is now the NOAO Gemini Science Center, assisting the NGSC Director in overseeing the development of instruments in the US for the Gemini 8-meter telescopes. In 2012, Trueblood left NOAO to join the OSIRIS-ReX project at the University of Arizona. He retired in 2013, but still tracks Near Earth Objects (asteroids and comets with the potential of striking Earth) using regional 2-meter class telescopes. References External links Biography at the Winer Observatory 1948 births Living people Wesleyan Universi
https://en.wikipedia.org/wiki/Tpoint
TPoint is computer software that implements a mathematical model of conditions leading to errors in telescope pointing and tracking. The model can then be used in a telescope control system to correct the pointing and tracking. Such errors are typically caused by mechanical or structural defects. For example, TPoint can analyze and compensate for systematic errors such as polar misalignment, mechanical and optical non-orthogonality, lack of roundness in telescope mounting drive gears, as well as for flexure of the mounting caused by gravity. TPoint is in use on the majority of professional telescopes worldwide, including the Anglo-Australian Observatory, Keck Observatory, Gemini Observatory, and many others. It has significantly improved the performance and efficiency of telescope operation and has had an especially strong impact on the development of automated and robotic telescopes. TPoint is also widely used by amateur astronomers. Software Bisque distributes TPoint for Mac OS and Windows as an add-on to TheSkyX Serious Astronomer Edition and TheSkyX Professional; this version is used to improve the pointing on amateur telescopes. History TPoint was invented and developed by Patrick Wallace. It grew out of work he and John Straede performed at the Anglo-Australian Telescope (AAT) between 1974 and 1980 using Interdata 70 computers. In the early 1980s, it was ported to the Digital Equipment Corporation VAX running under the VMS operating system and between 1990 and 1992 was also ported to run on the PC/MS-DOS platform as well as various UNIX platforms. A TPoint add-on is available for TheSkyX Serious Astronomer Edition and TheSkyX Professional Edition from Software Bisque, and it runs under both Macintosh OS and Microsoft Windows. External links TPoint official webpage Software Bisque TPoint Page References Telescopes Numerical software
https://en.wikipedia.org/wiki/Fuzzy%20Control%20Language
Fuzzy Control Language, or FCL, is a language for implementing fuzzy logic, especially fuzzy control. It was standardized by IEC 61131-7. It is a domain-specific programming language: it has no features unrelated to fuzzy logic, so it is impossible to even print "Hello, world!". Therefore, one does not write a program in FCL, but one may write part of it in FCL. Example RULE 0: IF (temperature IS cold) THEN (output IS low) RULE 1: IF (temperature IS very cold) THEN (output IS high) Limitations FCL is not an entirely complete fuzzy language, for instance, it does not support "hedges", which are adverbs that modify the set. For instance, the programmer cannot write: RULE 0: If (Temperature is VERY COLD) then (Output is VERY HIGH) However, the programmer can simply define new sets for "very cold" and "very high". FCL also lacks support for higher-order fuzzy sets, subsets, and so on. None of these features are essential to fuzzy control, although they may be nice to have. External links fuzzyTECH, a commercial fuzzy logic development system containing the specification document for IEC1131-7 (select Fuzzy Application Library) IEC 1131-7 CD1 IEC 1131-7 CD1 PDF fuzzylite, A fuzzy logic controller library written in C++. Free Fuzzy Logic Library (FFLL), an implementation library written in C++. JFuzzyLogic, open source FCL + Fuzzy Logic Package (sourceforge, java) AwiFuzz, open source implementation written in C++ covering all three levels of IEC 61131-7 Fuzzy Controller Language Domain-specific programming languages IEC 1131-7 CD1 pyfuzzy, open source implementation written in python. Fuzzy logic
https://en.wikipedia.org/wiki/FCL
FCL may refer to: Computing Flow chart language Framework Class Library, a .NET library Free Component Library, a Pascal library Fuzzy Control Language Sport 1. FC Lichtenfels, a German football club FC Lorient, a French football club FC Luzern, a Swiss football club FC Lootos Põlva (women) or FCL Lootos, an Estonian football club Florida Complex League, a US-based rookie league in professional baseball Transport Ferrocarril de Langreo, a defunct Spanish railway Florida Coastal Airlines, a defunct American airline Flying Colours Airlines, a defunct British airline Full container load Other uses Christopher Columbus Foundation or Fondazione Cristoforo Colombo per le Libertà, a political party in Italy Faculdade Cásper Líbero, a Brazilian journalism school Fault current limiter Federated Co-operatives, a Canadian retail co-operative First Colony Life Insurance Company, a defunct American insurer FishCenter Live, an American television series Foundation Coal Holdings, an American coal mining company Free convective layer Fundação Cásper Líbero, Brazilian media company See also JAR-FCL (Pilot License), Joint Aviation Requirements Flight Crew License
https://en.wikipedia.org/wiki/The%20Den%20%28TV%20programme%29
The Den was a long-running children's television strand of Ireland's public broadcaster Raidió Teilifís Éireann. First broadcast on 29 September 1986 on RTÉ1, it moved to Network 2 two years later. Initially a continuity strand for weekday afternoon programmes, The Den later expanded during the late 1990s and the 2000s until it became synonymous with RTÉ's children's output. At various times during its run, it was known as Dempsey's Den, Den TV and Den2. In mid-2010, RTÉ Television announced an overhaul of its children's output, with the launch of RTÉjr and TRTÉ. The Den aired for the last time on 19 September 2010. It returned for six weeks from November 2020. Overview The Den is considered to have pushed the boundaries of what was considered acceptable viewing for children and young people, often employing irreverent and occasionally satirical humour within its continuity links. It also introduced anthropomorphic puppet characters to Irish culture, including Zig and Zag, Podge and Rodge, Soky the Sock Monster, and Dustin the Turkey. Zig and Zag later transferred to Channel 4, Podge and Rodge moved onto adult comedy programming on RTÉ (including their own talk show), and Dustin represented Ireland in the Eurovision Song Contest. In later years, The Den took up much of Network 2's schedule, airing for over 11 hours each weekday and on weekend mornings. It also acquired a reputation for airing new episodes of imported shows before other television networks in Europe. There were no commercial breaks during shows on The Den, although there were commercial breaks between shows. Broadcast history Following on from the success of a Children's BBC strand in the UK, RTÉ launched its own strand for children's programming, Dempsey's Den, on 29 September 1986. Initially it was a two-hour strand each weekday afternoon on RTÉ 1 featuring nearly all of the broadcaster's youth output (the main exceptions being Bosco and Jo Maxi). Taking a cue from CBBC's Broom Cupboard format, Dempsey's Den was broadcast live from a tiny, single-camera presentation studio at RTÉ Television Centre, used mostly for in-vision continuity. Upon its move to Network 2 in September 1988, Dempsey's Den gained an extra hour of airtime each weekday. Ian Dempsey fronted the strand until the summer of 1990, although he continued to present the music feature Pop Goes the Den for a number of years. Ray D'Arcy took over The Den from 1990 to 1998, followed by Damien McCaul (1998-2003), Francis Boylan Jr (2003-2005) and Kathryn McKiernan (2005-2008). 1986–1998 The Den launched as Dempsey's Den in 1986, with Ian Dempsey as presenter. He was joined by Zig and Zag in 1987. They were joined by Dustin the turkey in December 1989, after Zag won Dustin in a golf tournament. The Den format changed little over its first decade on air. It generally consisted of several cartoons and music videos, at least one RTÉ production, a daily birthday slot, and on certain days of the week, a viewers' quiz.
https://en.wikipedia.org/wiki/Celebrity%20Poker%20Showdown
Celebrity Poker Showdown is an American celebrity game show that aired on the cable network Bravo from 2003 to 2006. It was a limited-run series in which celebrities played poker, with eight tournaments during its five-season run. In each show, five celebrities played a no limit Texas hold 'em tournament for charity. The winners of each qualifying game won a silver commemorative poker chip and advanced to the championship game. The winner of the championship game won the grand prize for his or her charity as well as a gold commemorative poker chip. Each tournament featured 25 celebrities and consisted of six episodes, five qualifying games and one championship game. In an interview with TV Guide, host Dave Foley said that a ninth tournament is not being produced, as Bravo did not order any new episodes. Setup, logistics, and personalities The first seven tournaments were taped at the Palms Casino in Paradise, Nevada in front of a live studio audience. With the eighth tournament, Harrah's Entertainment became the "official casino of Celebrity Poker Showdown." When a player was eliminated, he or she moved to the "Loser's Lounge" to watch the rest of the game. With the move to New Orleans for the eighth tournament, the Lounge was renamed for sponsor Southern Comfort as the "SoCo Lime Lounge". The first series was hosted by actor/comedian Kevin Pollak; the episodes of that run were an hour in length, except for the Championship telecast, which was two hours in length. In 2004, the show expanded all episodes to two hours in length and Dave Foley took over hosting duties. Most episodes of his run were two hours in length, and only one episode (the Championship telecast of the fifth tournament) was an hour in length. Professional poker player Phil Gordon provided the color commentary for the first seven tournaments. Phil Hellmuth took over the commentary spot in the eighth tournament. All the games were officiated by Tournament Director Robert Thompson. Thompson used the catchphrase "Shuffle up and deal!" Several celebrities appeared in multiple tournaments, and five won games in separate tournaments. David Cross won in the first and third tournaments; Dulé Hill won in the second and seventh; Kevin Nealon won in the fourth and seventh; Jason Alexander won in the fifth and eighth; and Michael Ian Black won in the second and eighth tourneys. No celebrity won more than one championship game. The series was produced by Andrew Hill Newman and Joshua Malina. Tournament winnings The first six tournaments were played for a total of $250,000 in prize money as follows: The four players eliminated in each of the first 5 games: $5,000 each Fifth Place in the Championship: $7,500 Fourth Place in the Championship: $10,000 Third Place in the Championship: $12,500 Second Place in the Championship: $20,000 First Place in the Championship: $100,000 Starting with the Seventh Tournament, the "prize pool" was increased to $1,000,000 and divided as follows:
https://en.wikipedia.org/wiki/Hell%3A%20A%20Cyberpunk%20Thriller
Hell: A Cyberpunk Thriller is a point-and-click adventure game released in 1994, developed by Take-Two Interactive Software and published by GameTek for the DOS. It was ported to 3DO, Macintosh and Microsoft Windows. The game was notable for being one of the first CD-ROM-only games to use speech with hi-res graphics, and was designed by the same team as BloodNet, the story of which is referenced to during one of Hell's subplots. Dennis Hopper, Grace Jones, Stephanie Seymour, and Geoffrey Holder are among the actors in the game. Seymour and Holder appear in live action footage, while the rest of the cast, including Hopper and Jones, lend their voices to computer-animated representations. The story is told through a variety of partial screen full-motion video (FMV) movies in the PC version; the 3DO version uses the same movies, but runs entirely in full screen. The game is set in a dystopian 2095, and the United States of America is under the control of a fascist theocracy called the "Hand of God". Unlike theocracies of the past, this government can send criminals and insurgents to hell, and has even brought a few of them back to tell their tale. In this third-person perspective, dystopian environment, players control Gideon Eshanti and Rachel Braque, two loyal agents (and lovers) of a new law enforcement agency created by the theocracy: Artificial Reality Containment, or ARC, a Cultural Revolution-like organization that enforces a ban on cybernetic technology in general and virtual reality in particular. Hell was commercially successful, with sales of 300,000 units within six months of its release. Hell is the first of the three Take-Two developed FMV adventure games, the other two being Ripper and Black Dahlia. Gameplay Hell: A Cyberpunk Thriller generally follows the conventional gameplay rules of point-and-click adventures, though with a particular focus on solving codes. Players can choose to have either Gideon Eshanti or Rachel Braque as their lead character, but this has no effect on the puzzles, only changing some story sequences near the end of the game. The player must also acquire several supporting party members throughout the game, each of whom comes with their own small inventory of items. Party size is limited, and if the player ejects one party member for a new one, the ejected party member will take all his items with him, even if they have been placed in someone else's inventory slots. However, party members can be re-recruited simply by visiting the spot where they were originally recruited. Unlike most point-and-click adventure games, approaching some of the puzzles in Hell incorrectly results in a game over, with a brief cutscene in which Braque and Eshanti's deaths are reported to Solene Solux. Puzzle errors Due to several script oversights and programming errors that appear in both the PC and 3DO versions, some of the game's puzzles cannot be solved by following the clues provided. For one, the demon Abonides shouts out
https://en.wikipedia.org/wiki/KMFM%20%28radio%20network%29
KMFM is a network of radio stations that was formed from the merger of seven Independent Local Radio stations and one digital station (on the Kent Digital Multiplex) owned by the KM Group, broadcasting to the county of Kent in the United Kingdom. Whilst the station broadcasts as one countywide station, it is officially eight separate licenses. KMFM offers its listeners local news and music. KMFM plays a mix of music, mainly covering the current Top 40 hits after adopting a contemporary hit radio format in 2012. The previous KMFM format had been aimed at an older audience. As of June 2023, the network broadcasts to a combined audience of 191,000, according to RAJAR. Original stations When the original stations were rebranded, KMFM operated each of the seven stations locally on FM throughout Kent, with one county-wide station on DAB on the NOW Kent multiplex. Apart from KMFM Ashford, each station was previously independent before being bought by the KM Group and rebranded. Programming All KMFM stations adopted a common programming in March 2012. The previous local breakfast DJs had been made redundant following the close of their breakfast shows the previous Friday, and all other shows presented by them were also removed from the network. KMFM Extra, until then a separate station with a unique schedule, was closed down in June 2012 and replaced on DAB with the regular KMFM service. Each area however still offers local advertisements and sponsorships (in the case of the DAB and online services, countywide adverts are heard). Originally each station produced its own programming during daytime. Apart from Medway, from 2007 each station grouped with its neighbour (West Kent and Maidstone; Canterbury and Thanet; Ashford and Shepway and White Cliffs Country) to network programmes between 11am and 7pm. The programmes were merged in April 2009 to create two groups with their own networked programming – West (Maidstone, Medway and West Kent) and East (Ashford, Canterbury, Shepway and White Cliffs Country and Thanet). At other times (evenings and weekends) programming was broadcast across all seven stations. In September 2009, KMFM was given permission to network all its programmes apart from Monday to Saturday breakfast, and Sunday afternoons. Saturday breakfast and Sunday afternoons were networked in 2010. Breakfast shows for KMFM Maidstone and KMFM West Kent were merged in January 2011. Studios Originally all seven stations broadcast from studios within their transmission area. KMFM Canterbury moved to the Ashford studio in 2008, and KMFM Shepway and White Cliffs Country joined it in April 2009. KMFM Thanet broadcast from Cliftonville near Margate (having been relocated from Margate harbour). All three stations in the west network broadcast from Medway. Each station has however retained its sales teams within the transmission area. Since the merger of all stations, all programmes are produced and broadcast from the Medway studios. The Ashford a
https://en.wikipedia.org/wiki/BGS
BGS may stand for: Art and entertainment Bee Gees, a rock and disco group Beautiful Game Studios, a computer game developer Bethesda Game Studios, a video game developer Brasil Game Show, yearly Brazilian video game convention Bunny Girl Senpai, Japanese light novel series Science and technology Below ground surface, in scientific reports; see Australian Aboriginal prehistoric sites Baller–Gerold syndrome Berkeley gas-filled separator, an instrument that uses a magnetic deflection system filled with gas at low pressure; see Isotopes of flerovium Braunstein-Ghosh-Severini Entropy, of a network British Geological Survey, an organisation in the United Kingdom British Geriatrics Society, the professional body of specialists involved with health care of the elderly in the United Kingdom Schools Bandon Grammar School, an independent, fee-paying school in Bandon, County Cork Bangor Grammar School, a voluntary school in Bangor, County Down Bankstown Grammar School, in Australia Bedford Girls' School, an independent grammar school in Bedford, England Beverley Grammar School, a state grammar school in Beverley, England Bexley Grammar School, a co-educational grammar school in Bexley, England Boston Grammar School, in Boston, England Bourne Grammar School, in Bourne, England Bradford Grammar School, an independent grammar school in Bradford, England Brisbane Grammar School, one of the oldest high schools in Queensland, Australia Brighton Grammar School, in Melbourne, Australia Bristol Grammar School, an independent grammar school in Bristol, England Burnham Grammar School, a co-educational grammar school in Burnham, Buckinghamshire Bury Grammar School, an independent grammar school in Greater Manchester, England Transport Begusarai railway station, Bihar, India, Indian Railways station code Bugis MRT station, Singapore, MRT station abbreviation Other uses Bachelor of General Studies, an interdisciplinary undergraduate-level academic degree BackGround Sound, such as in video games and anime Beta Gamma Sigma, a business honor society Bouquet, Garcin & Schivre, a French electric car manufactured between 1899 and 1906 Brigadier General Staff, the chief staff officer in a British army Corps Bundesgrenzschutz, the German Federal Border Guard, now called the German Federal Police
https://en.wikipedia.org/wiki/IBM%20Future%20Systems%20project
The Future Systems project (FS) was a research and development project undertaken in IBM in the early 1970s, aiming to develop a revolutionary line of computer products, including new software models which would simplify software development by exploiting modern powerful hardware. History Background Until the end of the 1960s, IBM had been making most of its profit on hardware, bundling support software and services along with its systems to make them more attractive. Only hardware carried a price tag, but those prices included an allocation for software and services. Other manufacturers had started to market compatible hardware, mainly peripherals such as tape and disk drives, at a price significantly lower than IBM, thus shrinking the possible base for recovering the cost of software and services. This changed more dramatically when Gene Amdahl left IBM and set up a company making System/370 compatible systems that were both faster and less expensive than IBM's offerings. In early 1971, an internal IBM task force, Project Counterpoint, concluded that the compatible mainframe business was indeed a viable business and that the basis for charging for software and services as part of the hardware price would quickly vanish. Another strategic issue was that the cost of computing was steadily going down while the costs of programming and operations, being made of personnel costs, were steadily going up. Therefore, the part of the customer's IT budget available for hardware vendors would be significantly reduced in the coming years, and with it the base for IBM revenue. It was imperative that IBM, by addressing the cost of application development and operations in its future products, would at the same time reduce the total cost of IT to the customers and capture a larger portion of that cost. At the same time, IBM was under legal attack for its dominant position and its policy of bundling software and services in the hardware price, so that any attempt at "re-bundling" part of its offerings had to be firmly justified on a purely technical basis, so as to withstand any legal challenge. Future Systems In May–June 1971, an international task force convened in Armonk under John Opel, then a vice-president of IBM. Its assignment was to investigate the feasibility of a new line of computers which would take advantage of IBM's technological advantages in order to render obsolete all previous computers - compatible offerings but also IBM's own products. The task force concluded that the project was worth pursuing, but that the key to acceptance in the marketplace was an order of magnitude reduction in the costs of developing, operating and maintaining application software. The major objectives of the FS project were consequently stated as follows: make obsolete all existing computing equipment, including IBM's, by fully exploiting the newest technologies, diminish greatly the costs and efforts involved in application development and operations, provid
https://en.wikipedia.org/wiki/Mix%20Megapol
Mix Megapol is a private Swedish radio network controlled by Bauer Media Group. It launched in 1993 under the name Skärgårdsradion (Archipelago Radio). Later that year the name was changed to Radio Megapol when the broadcasting permissions were auctioned out. In 1997 the word "Mix" was added and their slogan became "The best mix of hits and oldies". Mix Megapol is on air in 24 cities from Kiruna in the north to Malmö in the south. They have over two million listeners per week. Their target group is people aged between 25 and 45. Affiliates External links Mix Megapol Radio stations in Sweden Bauer Media Group
https://en.wikipedia.org/wiki/Nelonen%20%28TV%20channel%29
is a Finnish commercial television channel. It started out as Helsinki's local television channel PTV in 1990 on the HTV cable network (now part of DNA Welho), and changed its name first to PTV4. On June 1, 1997, the channel expanded to national coverage and changed its name to Nelonen, the Finnish name of the number four. Nelonen is mostly owned by Sanoma Corporation, which owns the Helsingin Sanomat and Ilta-Sanomat newspapers. Its largest owner was Aatos Erkko. Much of its programming is imported Australian, American, British, and European programs with Finnish captions. Its main market is the 25-44 demographic. Programming Finnish series and shows Amazing Race Suomi Big Brother Extreme Duudsonit Haluatko miljonääriksi? Koskinen Mysteerilaulajat Reikä seinässä Selviytyjät Suomi Talent Suomi The Voice of Finland Vain elämää Imported series, telenovelas and animated shows 90210 Accidentally on Purpose Alias All in the Family American Chopper America's Got Talent America's Next Top Model Avatar: The Last Airbender Bad Girls Battlestar Galactica Big Brother Australia (series 12 onwards) Big City Greens Big Love BoBoiBoy Bob the Builder Brainiac: Science Abuse Breaking Bad Britain's Next Top Model Brotherhood Californication Canada's Next Top Model Cashmere Mafia Castle Camp Lazlo (2006-2009) Charmed Commander in Chief Criminal Minds Dawson's Creek Days of Our Lives Damages Deadwood Desperate Housewives Detroit 1-8-7 Dexter Digimon Dirt Dirty Sexy Money Dr. Phil Drop Dead Diva DuckTales Early Edition Everybody Hates Chris Everybody Loves Raymond Extreme Makeover Fear Factor Felicity FlashForward Footballer's Wives Frasier FashionTelevision Ghost Whisperer Greek Gravity Falls Grey's Anatomy Harper's Island How to Get Away with Murder Inspector Rex Jericho Jerseylicious Judging Amy Kung Faux Kyle XY La Usurpadora Las Vegas LazyTown Less than Perfect Life as We Know It Lost Mad Men Married... with Children MasterChef Australia Medical Investigation Medium Men Behaving Badly My Little Pony: Friendship Is Magic My Little Pony: Pony Life MythBusters Newlyweds: Nick and Jessica NCIS NCIS: Los Angeles Nurse Jackie Oggy and the Cockroaches Oz Phineas and Ferb Pimp My Ride Pretty Little Liars Punk'd Quantico Queer as Folk Rescue Me Rome RSPCA Animal Rescue Robson Arms Samantha Who? Santa Barbara Scrubs Secret Diary of a Call Girl Seinfeld Sex and the City South Park Star vs. the Forces of Evil So You Think You Can Dance So You Think You Can Dance Canada Space: Above and Beyond Special Agent Oso Sunset Beach That '70s Show The 4400 The Bachelor The Cleaner The Comeback The Cut The Emperor's New School The Game The Good Wife The King of Queens The Nanny The Oprah Winfrey Show The Shield The Sopranos The Voice The West Wing Threshold Total Wipeout Total Wipeout USA Wander Over Yonder Trailer Park Boys Ugly Betty Weeds What About Brian Wife Swap Wildfire Wizards of Waverly Place Logos and identities Criticism Nelonen was launched quickly and in an unprepar
https://en.wikipedia.org/wiki/Formatted%20text
In computing, formatted text, styled text, or rich text, as opposed to plain text, is digital text which has styling information beyond the minimum of semantic elements: colours, styles (boldface, italic), sizes, and special features in HTML (such as hyperlinks). Terminology Formatted text cannot rightly be identified with binary files or be distinct from ASCII text. This is because formatted text is not necessarily binary, it may be text-only, such as HTML, RTF or enriched text files, and it may be ASCII-only. Conversely, a plain text file may be non-ASCII (in an encoding such as Unicode UTF-8). Text-only formatted text is achieved by markup which too is textual, while some editors of formatted text like Microsoft Word save in a binary format. Beginnings of formatted text Formatted text has its genesis in the pre-computer use of underscoring to embolden passages in typewritten manuscripts. In the first interactive systems of early computer technology, underlining was not possible, and users made up for this lack (and the lack of formatting in ASCII) by using certain symbols as substitutes. Emphasis, for example, could be achieved in ASCII in a number of ways: Capitalization: Surrounding with underscores: Surrounding with asterisks: Spacing: Surrounding by underscores was also used for book titles: Markup languages Formatting can be marked by tags distinguished from the body text by special characters, such as angle brackets in HTML. For example, this text: The dog is classified as Canis familiaris in taxonomy. is marked up in HTML thus: <p>The dog is classified as <i>Canis familiaris</i> in taxonomy.</p> The italicised text is enclosed by an opening and a closing italics tag. In LaTeX, the text would be marked up like this: The dog is classified as \textit{Canis familiaris} in taxonomy. Most markup languages can be edited with any text editor, needing no special software. Many markup languages can also be edited with specialized software designed to automate some functions or present the output as WYSIWYG. Formatted document files Since the invention of MacWrite, the first WYSIWYG word processor, in which the typist codes the formatting visually rather than by inserting textual markup, word processors have tended to save to binary files. Opening such files with a text editor reveals them embedded with various binary characters, either around the formatted text (e.g. in WordPerfect) or separate from it, at the beginning or end of the file (e.g. in Microsoft Word). Formatted text documents in binary files have, however, the disadvantages of formatting scope and secrecy. Whereas the extent of formatting is accurately marked in markup languages, WYSIWYG formatting is based on memory, that is, keeping for example your pressing of the boldface button until cancelled. This can lead to formatting mistakes and maintenance troubles. As for secrecy, formatted text document file formats tend to be proprietary and undocumented, leading to d
https://en.wikipedia.org/wiki/Security%20Assertion%20Markup%20Language
Security Assertion Markup Language (SAML, pronounced SAM-el, ) is an open standard for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider. SAML is an XML-based markup language for security assertions (statements that service providers use to make access-control decisions). SAML is also: A set of XML-based protocol messages A set of protocol message bindings A set of profiles (utilizing all of the above) An important use case that SAML addresses is web-browser single sign-on (SSO). Single sign-on is relatively easy to accomplish within a security domain (using cookies, for example) but extending SSO across security domains is more difficult and resulted in the proliferation of non-interoperable proprietary technologies. The SAML Web Browser SSO profile was specified and standardized to promote interoperability. Overview The SAML specification defines three roles: the principal (typically a human user), the identity provider (IdP) and the service provider (SP). In the primary use case addressed by SAML, the principal requests a service from the service provider. The service provider requests and obtains an authentication assertion from the identity provider. On the basis of this assertion, the service provider can make an access control decision, that is, it can decide whether to perform the service for the connected principal. At the heart of the SAML assertion is a subject (a principal within the context of a particular security domain) about which something is being asserted. The subject is usually (but not necessarily) a human. As in the SAML 2.0 Technical Overview, the terms subject and principal are used interchangeably in this document. Before delivering the subject-based assertion from IdP to the SP, the IdP may request some information from the principal—such as a user name and password—in order to authenticate the principal. SAML specifies the content of the assertion that is passed from the IdP to the SP. In SAML, one identity provider may provide SAML assertions to many service providers. Similarly, one SP may rely on and trust assertions from many independent IdPs. SAML does not specify the method of authentication at the identity provider. The IdP may use a username and password, or some other form of authentication, including multi-factor authentication. A directory service such as RADIUS, LDAP or Active Directory that allows users to log in with a user name and password is a typical source of authentication tokens at an identity provider. The popular Internet social networking services also provide identity services that in theory could be used to support SAML exchanges. History The Organization for the Advancement of Structured Information Standards (OASIS) Security Services Technical Committee (SSTC), which met for the first time in January 2001, was chartered "to define an XML framework for exchanging authentication and authorization
https://en.wikipedia.org/wiki/New%20Faces
New Faces is a British television talent show that aired in the 1970s and 1980s. It has been hosted by Leslie Crowther, Derek Hobson and Marti Caine. It was produced for the ITV network by ATV, and later by Central. Original series: 1973–1978 The show first aired as a pilot on the ATV network on 31 May 1973 with host Leslie Crowther and a judging panel consisting of Noele Gordon, Tony Hatch, Clive James and John Smith assessing performances from ten acts looking for a break in show business. Welsh singer Jennifer Jones won the show that also featured a man who blew up a hot water bottle until it burst followed by a few choruses of "Spanish Eyes". A further pilot aired on 7 July 1973 with new host Derek Hobson and a full series followed from 29 September 1973 to 2 April 1978. It was recorded at the ATV Centre in Birmingham. The show's theme tune, "You're a Star!", was performed by singer Carl Wayne, formerly of The Move and it was eventually released, becoming a minor hit. Winners went on to have careers in television entertainment, such as Lenny Henry. Many top entertainers began their careers with a performance on this programme. The acts were evaluated by a panel of experts, including Tony Hatch, Mickie Most, Clifford Davis, Arthur Askey, Ted Ray, Ed Stewart, Jack Parnell, Alan A. Freeman, Muriel Young, Lonnie Donegan, Lionel Blair, Ingrid Pitt, Shaw Taylor, Terry Wogan and Noel Edmonds. Four judges would make up the panel each week. Contestants received marks out of ten from the four judges in three categories such as "presentation", "content" and "star quality" – The "star quality" category was later replaced by "entertainment value". The highest score any act could attain was thus 120 points. Patti Boulaye was the only act who ever attained the maximum mark, doing so in the programme's final season. Les Dennis received 119 points, with only Tony Hatch giving him less than a perfect '10' for Presentation. Arthur Askey was on the same panel and started singing "Tony is a spoilsport" when Hatch awarded Dennis 9 as his final score. Series 1–6 Winners Series One Final (1973) Series Two Final (1974) Series Three Final (1975) Series Five Final (1977) Series Six Final (1978) Revived version The series was revived by Central for three series between 1986 and 1988, presented by past winner, Marti Caine. Her catchphrase was bellowed at the voting studio audience: "Press your buttons... NOW!". The show also featured a panel of experts including the journalist Nina Myskow, who often made critical comments. In this incarnation, the home audience decided who won by sending in postcards (phone voting was soon introduced by BBC rival Bob Says Opportunity Knocks), though, the audience did vote for its favourite act using a gigantic lightboard known as Spaghetti Junction lighting up to a varying degree as they pushed their buttons. 1986 final Note: The James Stone who appeared in this final is the same one who appeared in the Britain's Got Talent
https://en.wikipedia.org/wiki/TickIT
TickIT is a certification program for companies in the software development and computer industries, supported primarily by the United Kingdom and Swedish industries through UKAS and SWEDAC respectively. Its general objective is to improve software quality. History In the 1980s, the UK government's CCTA organisation promoted the use of IT standards in the UK public sector, with work on BS5750 (Quality Management) leading to the publishing of the Quality Management Library and the inception of the TickIT assessment scheme with DTI, MoD and participation of software development companies. The TickIT Guide TickIT also includes a guide. This provides guidance in understanding and applying ISO 9001 in the IT industry. It gives a background to the TickIT scheme, including its origins and objectives. Furthermore, it provides detailed information on how to implement a Quality System and the expected structure and content relevant to software activities. The TickIT guide also assists in defining appropriate measures and/or metrics. Various TickIT Guides have been issued, including "Guide to Software Quality Management and Certification using EN29001". References Bamford, Robert; Deibler, William (2003). ISO 9001: 2000 for Software and Systems Providers: An Engineering Approach (1st ed.). CRC-Press. External links TickITplus Information assurance standards Information technology governance Information technology organisations based in the United Kingdom Software quality
https://en.wikipedia.org/wiki/Echo%20Island
Echo Island is an Irish television programme for children and young adults, shown on RTÉ Network 2. It was shown at 17:00 during The Den, after which programmes like The Legend of the Hidden City would air. The show effectively took over from Jo Maxi, which had been aimed at the teenaged youth of Ireland. Birth Echo Island began broadcasting in 1994 with two episodes a week. This was extended to four episodes the following year with two of these being Irish language editions. The series ran for six seasons; in later years it proved a useful showcase for some of the best young rock bands in Ireland. Many of the presenters were chosen for their bilingualism, including Dara Ó Briain. A similar format show called Stream replaced it, splitting up each day with a different topic such as Gaming, Sports and other types of activities and did away with Echo Island'''s "Make and Do" and "Pet" sections. Stream did not air as in Irish, because by that stage TG4 was providing an Irish-language children's service. Presenters Many current presenters either began, or spent part of, their early careers on Echo Island, including Derek Mooney and Bláthnaid Ní Chofaigh, Carrie Crowley, Mary Kingston, Dara Ó Briain and Peter O'Meara, Danann Breathnach, Sinéad Chaomhánach, Christine Ní Chearraláin, Tom O'Brannigan and Pádraic Ó Neachtain. Format Similar in format to the BBC's Blue Peter (but with a desert island setting and design), Echo Island featured a resident Moluccan Cockatoo called Rocco, who provided the series with a constant stream of noisy background chatter. Each episode was based around an interview in "The Shack" with an adult guest, who was asked to bring along some items of significance from their childhood. U.S. ambassador Jean Kennedy Smith, for instance, appeared on the 15 November 1994 episode to promote a Christmas card competition. President Mary McAleese appeared on the programme on the 19 December 1997 episode, while the Australian didgeridoo player Rolf Harris was a guest on the 13 October 1998 episode. Competitions, items on art and cookery, fundraising campaigns, the "Echovision Song Contest" for young performers and the "Pet Clinic" where TV Vet, Pete Wedderburn, answered viewers calls about their pets were some of the features. Each Friday edition featured young "stringers" who reported from all around Ireland on events happening in their locality. This item contained an apparently live two-way video link between the presenter in studio and the children on location and was an advanced production technique in its day. Since Dara Ó Briain appeared on a number of other RTÉ programmes including The Panel, Don't Feed The Gondolas and It's A Family Affair. He has since become one of the best known Irish comedians in the United Kingdom, having appeared on many of the BBC's top programmes such as Mock The Week and Three Men in a Boat. Derek Mooney has since become one of Ireland's best known TV and radio presenters. He currently has his we
https://en.wikipedia.org/wiki/McHale%27s%20Navy
McHale's Navy is an American sitcom starring Ernest Borgnine that aired 138 half-hour episodes over four seasons, from October 11, 1962, to April 12, 1966, on the ABC television network. The series was filmed in black and white and originated from a one-hour drama titled "Seven Against the Sea", broadcast on April 3, 1962 as part of the Alcoa Premiere anthology series. The ABC series spawned three feature films: McHale's Navy (1964); a sequel, McHale's Navy Joins the Air Force (1965); and a 1997 sequel-remake of the original series. "Seven Against the Sea" (1962) Academy Award–winning dramatic actor Ernest Borgnine first appeared as Quinton McHale in an hour-long one-shot drama called "Seven Against the Sea", which aired as an episode of Alcoa Premiere in 1962, an ABC dramatic anthology also known as Fred Astaire's Premiere Theatre and hosted by Fred Astaire, who introduced television audiences to the Quinton McHale character. It is considered the pilot show for the series although it is an hour-long drama instead of a half-hour situation comedy and is starkly different in tone. Plot During World War II, Lieutenant Commander Quinton McHale (Borgnine) is the commanding officer of the U.S. Navy PT boat PT-73, stationed at the Pacific island base of Taratupa. In the late spring of 1942, the Japanese heavily bomb the island, destroying the base. Only 18 of 150 naval aviators and Marines on the base survive. With Japanese patrols in the region too heavy for a Navy rescue mission, McHale and his men survive by hiding on the island. Assisted by the native tribes whom they befriend, the sailors live a pleasant island existence. After months of leisurely life, strait-laced, by-the-book Annapolis graduate Lieutenant Durham (Ron Foster) parachutes onto the island. His job is to assume duties as McHale's executive officer and help him get the base on Taratupa back into action. Durham faces an uphill battle: The men have gone native. One man has started a native laundry service, and McHale operates a still, making moonshine for the men and the natives. In addition, McHale is friendly with the native chief and even bathes with him. When Durham informs McHale of his orders, McHale refuses to follow them. It is clear that while McHale is as loyal as any American, following the devastation caused by the Japanese on the island, he is reluctant to risk losing more men. His concern now is for their survival until they can be rescued, which creates friction between Durham and McHale. When they get word that a Marine battalion is pinned on a beach and an enemy cruiser is planning to attack the beachhead in the morning, McHale's attitude changes. McHale is ordered to use all his boats to protect the beachhead and the Marines, but he has no boats, since the Japanese sank them all. However, McHale manages to capture a Japanese PT boat patrolling the island. Surprising the men and Durham, McHale does not plan to use the boat to evacuate his men or the Marine battalio
https://en.wikipedia.org/wiki/Digital%20on-screen%20graphic
A digital on-screen graphic, digitally originated graphic (DOG, bug, network bug, or screenbug) is a watermark-like station logo that most television broadcasters overlay over a portion of the screen area of their programs to identify the channel. They are thus a form of permanent visual station identification, increasing brand recognition and asserting ownership of the video signal. The graphic identifies the source of programming, even if it has been time-shifted—that is, recorded to videotape, DVD, or a digital personal video recorder such as TiVo. Many of these technologies allow viewers to skip or omit traditional between-programming station identification; thus the use of a DOG enables the station or network to enforce brand identification even when standard commercials are skipped. DOG watermarking helps to reduce off-the-air copyright infringement—for example, the distribution of a current series' episodes on DVD: the watermarked content is easily differentiated from "official" DVD releases, and can help identify not only the station from which the broadcast was captured, but usually the actual date of the broadcast as well. Graphics may be used to identify if the correct subscription is being used for a type of venue. For example, showing Sky Sports within a pub requires a more expensive subscription; a channel authorized under this subscription adds a pint glass graphic to the bottom of the screen for inspectors to see. The graphic changes at certain times, making it harder to counterfeit. On the other hand, watermarks pollute the picture, distract viewers' attention and may cover an important piece of information presented in the television program. Extremely bright watermarks may cause screen burn-in on some types of TV sets. Usage of visually perceptible embedded watermarks requires the program author to have a separate clean copy for archival purposes, but this practice was not common decades ago when watermarking became popular among broadcasters. Watermarks present an issue when archival videos are used for a documentary that strives to create a coherent story. In some cases, watermarks are blurred or digitally removed if possible to clean up the picture. In the absence of visually perceptible watermarks content control can be ensured with visually imperceptible digital watermarks. In some cases, the graphic also shows the name of the current program. Some television networks may place additional logos or text alongside their DOG to advertise significant upcoming programs. For example, broadcasters of the Olympic Games often add the Olympic rings to their DOG for a period of time leading up to—and during—the Games. Usage Many news broadcasters, as well as a few television networks in such cases, also place a clock alongside their bug. In the United States, Canada, Australia, and New Zealand, DOGs may also include the show's parental guideline rating. In Australia, this is known as a Program Return Graphic (PRG). It has bec
https://en.wikipedia.org/wiki/Jerry%20Saltzer
Jerome Howard "Jerry" Saltzer (born October 9, 1939) is an American computer scientist. Career Jerry Saltzer received an ScD in Electrical Engineering from MIT in 1966. His dissertation 'Traffic Control in a Multiplexed System' was advised by Fernando Corbató. In 1966, he joined the faculty of the Department of Electrical Engineering and Computer Science at MIT. One of Saltzer's earliest involvements with computers was with MIT's Compatible Time-Sharing System in the early 1960s. In the later 1960s and early 1970s, he was one of the team leaders of the Multics operating system project. Multics, though not particularly commercially successful in itself, has had a major impact on all subsequent operating systems; in particular, it was an inspiration for Ken Thompson to develop Unix. Saltzer's contributions to Multics included the now-standard kernel stack switching method of process switching, as well as oft-cited work on the security architecture for shared information systems. Saltzer led the Computer Systems Research group of MIT's Laboratory for Computer Science. In the late 1970s and early 1980s, the Computer Systems Research group was one of the key players in the development of the Internet and ring network technology for local area networks. During this time, Saltzer patented the Proteon ProNet ring network. Another contribution in that area was the end-to-end principle in systems design (Saltzer and Schroeder's design principles), which is one of the important underlying principles that governs the operation of the Internet. From 1984 to 1988 Saltzer served as Technical Director of MIT's Project Athena. "Saltzer@mit.edu" is one of the few Athena usernames with a capital letter, and legend has it that several special case hacks were required to support this functionality. In September 1995 Saltzer retired from his full-time faculty position, but continued writing and teaching part-time at MIT. Family Saltzer is known to all (colleagues, students, friends and family) as "Jerry". In 1961 he married Marlys Anne Hughes. They have two children: Rebecca (born 1962) and Sarah (born 1963). He has two grandchildren: Hannah (born 1997), and Caroline (born 1999). Other interests Saltzer is also very interested in 19th century landscape art of the western United States; he has prepared the catalogue raisonné of the paintings of the painter Frederick Ferdinand Schafer (de). Software Saltzer has been the programmer, a designer, or the inspiration, for a number of important pieces of systems software, which are either still in use or have descendants still being used today: RUNOFF, a very early text-formatting program which was the basis for roff and nroff TYPSET, the "Project MAC editor", was the first interactive text editor, developed to write documentation PCIP, the first TCP/IP stack for the IBM PC, which became the basis for a company called FTP Software Kerberos, an authentication protocol, part of Project Athena, still widely used to
https://en.wikipedia.org/wiki/Jack%20Dennis
Jack Bonnell Dennis (born October 13, 1931) is a computer scientist and Emeritus Professor of Computer Science and Engineering at Massachusetts Institute of Technology. The work of Dennis in computer systems and computer languages is recognized to have played a key role in hacker culture. As a Massachusetts Institute of Technology faculty member he sponsored easier access to computer facilities at MIT during the early development of the subculture. Much of what would later become Unix came from his early collaboration with Dennis Ritchie and Ken Thompson. This collaborative and open philosophy lives on today. Dennis was also a member of the historic Tech Model Railroad Club, which incubated much of the early slang and traditions of hacking. Early life and education Dennis graduated from the Massachusetts Institute of Technology (MIT) as Bachelor of Science (1953), Master of Science (1954), and Doctor of Science (1958). His doctoral thesis analyzed the relation between mathematical programming problems and electrical networks. After completing his doctorate, Dennis became part of the MIT's Department of Electrical Engineering and Computer Science's faculty, being promoted to full professor in 1969. Career As a professor at MIT, Dennis was influential in the work of student Alan Kotok and fellow professors Marvin Minsky and John McCarthy. He gave young programmers access to multi-million dollar computers and allowed them to see where their abilities could take them, inspiring a generation of MIT graduates who would shape the computer industry at DEC, Xerox Parc and ARPA. Dennis was one of the founders of the Multics project. His most important contribution to the project was the concept of the single-level memory. Multics was not fully successful as a commercial project, but it was important because it influenced the design of many other computer operating systems, most importantly the direct inspiration for Ken Thompson (who also worked on the project) to design the first incarnation of Unix. In recognition of his work on the Multics project, Dennis was elected as IEEE Fellow. Dennis' research at the MIT focused in Computer Theory and Computer Systems, specifically: Theoretical Models for Computation Computation Structures Structure of Computer Systems Semantic Theory for Computer Systems Semantics of Parallel Computation Computer System Architecture Dennis has also worked as an independent consultant and research scientist on projects related with parallel computer hardware and software since his retirement from MIT in 1987. He has worked with the NASA Research Institute for Advanced Computer Science as visiting scientist, with the Architecture Group of Carlstedt Elektronik (Gothenburg, Sweden), and with Acorn Networks, Inc., as Chief Scientist. A great part of Dennis' career has been devoted to non-von Neumann models of computation, architecture, and languages, where programs are not attached to a program counter. Along with his
https://en.wikipedia.org/wiki/Peter%20J.%20Denning
Peter James Denning (born January 6, 1942) is an American computer scientist and writer. He is best known for pioneering work in virtual memory, especially for inventing the working-set model for program behavior, which addressed thrashing in operating systems and became the reference standard for all memory management policies. He is also known for his works on principles of operating systems, operational analysis of queueing network systems, design and implementation of CSNET, the ACM digital library, and codifying the great principles of computing. He has written numerous influential articles and books, including an overview of fundamental computer science principles, computational thinking, and his thoughts on innovation as a set of learnable practices. Early life and education Denning was born January 6, 1942, in Queens, New York, and raised in Darien, Connecticut. He took an early interest in science, pursuing astronomy, botany, radio, and electronics while in grade school. At Fairfield Prep, he submitted home-designed computers to the science fair in 1958, 1959, and 1960. His second computer, which solved linear equations using pinball machine parts, won the grand prize. He attended Manhattan College for a Bachelor in EE (1964) and then MIT for a PhD (1968). At MIT he worked on Project MAC and contributed to the design of the pioneering Multics operating system. His PhD thesis, "Resource allocation in multiprocess computer systems", introduced seminal ideas in working sets, locality, thrashing, and system balance. Career and research At Princeton University from 1968 to 1972, Denning wrote his classic book, Operating Systems Theory (1973), with E G Coffman. He collaborated with Alfred Aho and Jeffrey Ullman on optimality proofs for paging algorithms, and on a simple proof that compilers based on precedence parsing do not need to backtrack. At Purdue University (1972–1983) he supervised numerous PhD theses validating locality-based theories of memory management and extending the new mathematics of operational analysis of queueing networks. He co-founded CSNET. He became department head in 1979 and completed another book on computational models, Machines, Languages, and Computation, with Jack Dennis and Joe Qualitz. At NASA Ames from 1983 to 1991, he founded the Research Institute for Advanced Computer Science (RIACS) and turned it into one of the first centers for interdisciplinary research in computational and space science. At George Mason University from 1991 to 2002 he headed the Computer Science Department, was an associate dean and vice provost, and founded the Center for the New Engineer. The Center was a pioneer in web-based learning. He created a design course for engineers, called Sense 21, which was the basis of his project to understand innovation as a skill. He created a course on Core of Information Technology, the basis of his Great Principles of Computing project. At Naval Postgraduate School since 2002, he
https://en.wikipedia.org/wiki/Robert%20M.%20Graham%20%28computer%20scientist%29
Robert M. Graham (1929 in Michigan, US – January 2, 2020) was a cybersecurity researcher computer scientist and Professor Emeritus of Computer Science at the University of Massachusetts Amherst. He was born to a Scottish emigrant. He received his undergraduate and graduate degrees from the University of Michigan. While working at the UofM's Computing Center he co-authored two compilers, GAT for the IBM 650 and MAD for the IBM 704/709/7090. In 1963 he moved to MIT to participate in the development of Multics, one of the first virtual memory time-sharing computer operating systems. He had responsibility for protection, dynamic linking, and other key system kernel areas. Later worked at University of California, Berkeley, City College of New York, and the University of Massachusetts Amherst. Officially retired in 1996, but continued to teach until the end of 2003. In 1996 he was inducted as a Fellow of the Association for Computing Machinery. He is the author of numerous books and professional articles. References External links Robert M. Graham Home Page 1929 births 2020 deaths American computer scientists Fellows of the Association for Computing Machinery Multics people University of Michigan alumni
https://en.wikipedia.org/wiki/Hallam%20FM
Hallam FM is an Independent Local Radio station based in Sheffield, England, owned and operated by Bauer as part of the Hits Radio network. It broadcasts to South Yorkshire. As of September 2023, the station has a weekly audience of 280,000 listeners according to RAJAR. History The station started broadcasting on 1548 kHz/194m AM, 95.2 and 95.9 MHz FM under the name of Radio Hallam from its studios at Hartshead in Sheffield City Centre on 1 October 1974. The first presenter heard on air was ex-BBC Radio 1 DJ Johnny Moran - the first record he played was I've Got the Music in Me by Kiki Dee, which stuck after a minute and a half. On 1 October 1985, Radio Hallam's broadcast area significantly increased when it began to broadcast to all of South Yorkshire. In 1987, Radio Hallam merged with neighbouring Yorkshire stations Pennine Radio in Bradford and Viking Radio in Hull to form the now-defunct Yorkshire Radio Network. The frequencies were changed during the 1980s to 96.1 FM for Rotherham, 97.4 FM for Sheffield, 102.9 FM for Barnsley, and 103.4 for the remainder of South Yorkshire. After a take-over of the parent company YRN by the Metro Radio Group, the AM frequency became Great Yorkshire Gold. As part of Hallam's licence agreement, the Rotherham transmitter ceased to be used by the station in the 1990s. Hallam also moved its studio facilities to 900 Herries Road, close to Sheffield Wednesday's Hillsborough ground. The office space at Hartshead was formerly used by the Sheffield Star newspaper. As the Metro Radio Group was bought by EMAP, Hallam FM also became part of the Big City Network in Northern England. In 2011, Bauer Media's Big City Network was replaced by the Place Portfolio, containing the group's local radio stations. As of October 2019, Hallam FM's Sheffield studios are shared with sister Yorkshire station Viking FM, following the closure of Viking's studios in Hull. Broadcasting Hallam FM's main competitors are BBC Radio 1, Capital Yorkshire & Heart Yorkshire. Other local competing stations include BBC Radio Sheffield, Greatest Hits Radio North Derbyshire and Greatest Hits Radio Yorkshire. The station broadcasts on analogue frequencies on 97.4 FM (Tapton Hill, Sheffield), 103.4 FM (Clifton, near the M18) and 102.9 FM (Ardsley) in Sheffield, Doncaster and Barnsley respectively. Almost the whole region is covered on 103.4 FM. The station also broadcasts via DAB on the Bauer Radio multiplex, and online and via their app. Programming Networked programming originates from Bauer's Manchester studios. The station's flagship breakfast show, Big John @ Breakfast, is produced and broadcast from Bauer's Sheffield studios, weekdays from 6-10am. News Bauer's Sheffield newsroom broadcasts local news bulletins hourly from 6am-7pm on weekdays, and from 7am-1pm on Saturdays and Sundays. Headlines are broadcast on the half-hour during weekday breakfast and drivetime shows, alongside traffic bulletins. National bulletins from Sky News Radio
https://en.wikipedia.org/wiki/Kerrang%21%20Radio
Kerrang! Radio is a specialist digital rock music radio station related to Kerrang! magazine. It is owned and operated by Bauer and forms part of the Kiss Network. As of September 2023, the station has a weekly audience of 364,000 listeners according to RAJAR. Stations History Initial launch: 2002/2003 Launched as a digital station on Freeview in 2002, expanded to London from 2003. It was also known as Kerrang! 105.2 FM in the West Midlands from 2004 to 2013 when its studios in Lionel Street, Birmingham, 105.2 was turned over to Planet Rock (which was then replaced by Absolute Radio from 2015) in June 2013. It was London only until May 2018 to make way for Hits Radio. In July 2002, ahead of the Radio Authority's advertisement for a new regional FM franchise for the West Midlands, Kerrang! magazine launched an FM radio station in Birmingham on a short-term Restricted Service Licence at a frequency of 87.7 FM. The station was broadcast from the grounds of Birmingham City Football Club and was initially on air for one month only. Kerrang! Radio as a permanent service first launched in late 2002 as a largely automated rock music service delivered over the Freeview platform, as one of a suite of stations its parent company (then Emap) added to the then-new Freeview TV system, the others including fellow digital jukebox stations Smash Hits Radio, Q Radio and Heat Radio, and relays of London stations Kiss 100 and Magic 105.4 FM. This new Kerrang! Radio was also streamed online, and served as a sibling to Kerrang! TV which launched around the same time: these stations being connected with the Kerrang! print magazine in name, ownership and style. This digital 'jukebox' version of Kerrang! was subsequently rolled out to DAB digital radio, beginning with transmission in London from 1 November 2003. The DAB service was extended to other areas from 2004, joining Emap-owned multiplexes in northern England (largely replacing The Hits Radio) and also made available on the regional multiplexes for the West Midlands and central Scotland. FM radio station: 2004–2013 Kerrang! Radio first went on air in June 2004, following Kerrang!'s successful bid for the West Midlands regional FM franchise the previous October. The station was based at new dedicated studios located in Lionel Street, Birmingham, officially opened by Black Sabbath's guitarist Tony Iommi. Broadcasting on the new 105.2 FM Midlands frequency, Kerrang! Radio replaced the prior digital Kerrang! Radio on DAB, TV platforms and online. The new station's format mixed modern and classic rock with speech content targeted at a young adult rock audience. In the FM era the station ran a somewhat more mainstream, adult-rock tone of daytime output than the magazine, featuring more indie and alternative rock than the magazine, which traditionally focused on heavier rock genres. The night shows were conversely very much fuelled by the traditional Kerrang! Magazine sound, with a wider and less mainstream styl
https://en.wikipedia.org/wiki/Victor%20A.%20Vyssotsky
Victor Alexander Vyssotsky (February 26, 1931 – December 24, 2012) was a mathematician and computer scientist. He was the technical head of the Multics project at Bell Labs and later executive director of Research in the Information Systems Division of AT&T Bell Labs. Multics, whilst not particularly commercially successful in itself, directly inspired Ken Thompson to develop Unix. Later, Vyssotsky was the founding director of Digital's Cambridge Research Lab. In 1960, Vyssotsky co-created the BLODI Block Diagram Compiler at Bell Labs. In 1961, together with Robert Morris Sr. and Doug McIlroy, he devised the computer game Darwin (later known as Core War) on an IBM 7090 at Bell Labs. References External links Core War at Virus Bulletin: Resources Victor A. Vyssotsky hosts a UNIX documentary UNIX: Making Computers Easier To Use -- AT&T Archives film from 1982, Bell Laboratories 1931 births 2012 deaths American people of Russian descent American computer scientists American mathematicians American computer programmers Scientists at Bell Labs Multics people
https://en.wikipedia.org/wiki/Smooth%20North%20West
Smooth North West is a regional radio station owned by Communicorp UK and operated by Global as part of the Smooth network. The station broadcasts to the North West of England from studios at Spinningfields in Manchester. History GMG Radio ownership The station was launched by Radio Investments Ltd on 1 September 1994 as Jazz FM, but was also known as JFM in an attempt to appeal to listeners who could be put off by the use of the word "jazz". Jazz FM originally played a wide variety of jazz, pandering to more smooth jazz during the daytime in order to attract the 25- to 45-year-old target market which was required to make the station a success. However, the focus of the music later changed, and by the early 2000s, it was focusing more on soul and softer R&B alongside jazz. 100.4 Jazz FM broadcast its daytime shows from its Manchester station, but specialist shows such as Dinner Jazz and Legends of Jazz with Ramsey Lewis were networked from its London sister station 102.2 Jazz FM. In 2003, the Guardian Media Group did extensive research into the type of music that listeners in the north-west wanted to hear. They concluded that many people were dissuaded by the name "jazz", and as a result, 100.4 Jazz FM closed on 13 February 2004 and relaunched as Smooth FM on 2 March 2004. The station now began to play more modern music during the day, but continued a mostly jazz themed output at night. The arrangements for local and networked programming remained for a time, but from March 2005, only Mike Chadwick's The Saturday Night Experience was networked from 102.2 Smooth FM. All other programming was produced and aired in the North West. The station was relaunched again as Smooth Radio 100.4 on 26 March 2007. The launch occurred at the same time as London based 102.2 Smooth FM, however Smooth Radio 100.4 continued with its own unique soul music based format. On 5 July 2007, GMG Radio announced that it was requesting a change of format from Ofcom, which would bring Smooth Radio 100.4 in line with the rest of the network. It proposed an easy listening music service mixed with speech for the over 50's, coupled with an improved local news service. Ofcom approved the changes on 11 October 2007. In March 2008, GMG requested a format change to remove its jazz commitments it has in place for Smooth Radio 100.4. Part of the plans included a relaunch of Jazz FM from the jazzfm.com service broadcasting on DAB in Glasgow and online on the MXR North West multiplex. In a meeting on 22 April 2008 Ofcom denied GMG's request to drop its jazz commitments. GMG said that it would be relaunching Jazz FM despite the decision. Local and networked programming originated from studios at Laser House in Salford Quays. In 2010, GMG announced that it would be merging its five Smooth stations in England to create a nationwide Smooth Radio service based in Salford. The new station was launched on 4 October 2010 and could be heard both on DAB and on the locally on the FM frequ
https://en.wikipedia.org/wiki/Monadic
Monadic may refer to: Monadic, a relation or function having an arity of one in logic, mathematics, and computer science Monadic, an adjunction if and only if it is equivalent to the adjunction given by the Eilenberg–Moore algebras of its associated monad, in category theory Monadic, in computer programming, a feature, type, or function related to a monad (functional programming) Monadic or univalent, a chemical valence Monadic, in theology, a religion or philosophy possessing a concept of a divine Monad See also Monadic predicate calculus, in logic Monad (disambiguation)
https://en.wikipedia.org/wiki/LDR
LDR may refer to: Science, medicine and technology LDraw filename extension Low-dynamic-range rendering (LDR rendering) in 3D computer graphics, vs. high-dynamic-range rendering Light Dependent Resistor, or photoresistor Lateral digit reduction in birds; see Origin of birds#Digit homology A Local Democracy Reporter, working for the United Kingdom's Local Democracy Reporting Service Other uses European Liberal Democrat and Reform Party (European Parliament group) Lana Del Rey, American singer-songwriter (born 1985) Loan-deposit ratio Long-distance relationship of a couple Luxembourg Depositary Receipt
https://en.wikipedia.org/wiki/Data%20manipulation%20language
A data manipulation language (DML) is a computer programming language used for adding (inserting), deleting, and modifying (updating) data in a database. A DML is often a sublanguage of a broader database language such as SQL, with the DML comprising some of the operators in the language. Read-only selecting of data is sometimes distinguished as being part of a separate data query language (DQL), but it is closely related and sometimes also considered a component of a DML; some operators may perform both selecting (reading) and writing. A popular data manipulation language is that of Structured Query Language (SQL), which is used to retrieve and manipulate data in a relational database. Other forms of DML are those used by IMS/DLI, CODASYL databases, such as IDMS and others. SQL In SQL, the data manipulation language comprises the SQL-data change statements, which modify stored data but not the schema or database objects. Manipulation of persistent database objects, e.g., tables or stored procedures, via the SQL schema statements, rather than the data stored within them, is considered to be part of a separate data definition language (DDL). In SQL these two categories are similar in their detailed syntax, data types, expressions etc., but distinct in their overall function. The SQL-data change statements are a subset of the SQL-data statements; this also contains the SELECT query statement, which strictly speaking is part of the DQL, not the DML. In common practice though, this distinction is not made and SELECT is widely considered to be part of DML, so the DML consists of all SQL-data statements, not only the SQL-data change statements. The SELECT ... INTO ... form combines both selection and manipulation, and thus is strictly considered to be DML because it manipulates (i.e. modifies) data. Data manipulation languages have their functional capability organized by the initial word in a statement, which is almost always a verb. In the case of SQL, these verbs are: SELECT ... FROM ... WHERE ... (strictly speaking DQL) SELECT ... INTO ... INSERT INTO ... VALUES ... UPDATE ... SET ... WHERE ... DELETE FROM ... WHERE ... For example, the command to insert a row into table employees: INSERT INTO employees (first_name, last_name, fname) VALUES ('John', 'Capita', 'xcapit00'); Variants Most SQL database implementations extend their SQL capabilities by providing imperative, i.e. procedural languages. Examples of these are Oracle's PL/SQL and IBM Db2's SQL_PL. Data manipulation languages tend to have many different flavors and capabilities between database vendors. There have been a number of standards established for SQL by ANSI, but vendors still provide their own extensions to the standard while not implementing the entire standard. Data manipulation languages are divided into two types, procedural programming and declarative programming. Data manipulation languages were initially only used within computer programs, but with the adv
https://en.wikipedia.org/wiki/Staging
Staging may refer to: Computing Staging (cloud computing), a process used to assemble, test, and review a new solution before it is moved into production and the existing solution is decommissioned Staging (data), intermediately storing data between the sources of information and a data warehouse (DW) Disk staging, using disks as an additional, temporary stage of backup process before finally storing backup Staging site, a website used to assemble, test, and review its newer versions before it is moved into production Other uses Staging (cooking), a chef works briefly and without pay in another chef's kitchen to learn new techniques and cuisines Staging (rocketry), the use of multiple engines and propellant to launch a rocket Staging (stagecoaches), the business of running stagecoaches or the act of journeying in them Staging (theatre), the process of selecting, designing, adapting to, or modifying the performance space for a play or film Cancer staging, a description (usually numbers I to V) of how much the cancer has spread Home staging, preparing a residence for sale in real estate Staging area, a location used to prepare items for use, such as for a military operation Staging, in bird migration, the practice of pausing at places along a migration route to rest and feed before proceeding Staging or scaffolding, in construction, a temporary work platform Staging, in drag racing, the process of aligning cars on the starting line drag racing
https://en.wikipedia.org/wiki/Oracle%20Call%20Interface
In computing, the Oracle Call Interface (OCI) consists of a set of C-language software APIs which provide an interface to the Oracle database. OCI offers a procedural API for not only performing certain database administration tasks (such as system startup and shutdown), but also for using PL/SQL or SQL to query, access, and manipulate data. The OCI library, based on Oracle's undocumented User Programmatic Interface (UPI), acts as an "interpreter" between applications and the low-level database network protocol. History Oracle Corporation first released OCI (under the name HLI, the Host Language Interface) with Oracle Database version 6 in 1988. As HLI (and subsequently OCI) operated as wrappers for UPI, their original naming conventions closely resembled those of the UPI calls they were based upon. For example, the rollback statement: the call upirol in UPI became orol in OCI. Later, in Oracle8 (released in 1997), OCI calls acquired more descriptive names; orol became OCITransRollback. Subsequent improvements have been made in every version of OCI, including 11g (released in 2007). Oracle Corporation claims that OCI is "So reliable that every SQL statement in the Oracle Database executes with OCI". Implementations OCI is so popular that, in addition to Oracle, several other vendors have implemented their own libraries compatible with the OCI API. To date, OCI-compatible libraries exist for the ANTs Data Server (ADS), EnterpriseDB, and the Linter SQL RDBMS OCI-based libraries Several libraries are based on top of OCI, including: Oracle's Type-II JDBC Driver (part-Java, part native) Oracle's enhanced C++ library, Oracle C++ Call Interface (OCCI), which provides an object-oriented interface with the object-relational features of the Oracle database. Oracle's OLE DB Driver Oracle's ODBC Driver Oracle's .NET Data Provider, ODP.NET Microsoft's ODBC Driver for Oracle Easysoft's ODBC-Oracle Driver Trolltech's Qt C++ toolkit OCI driver (QOCI) Due to the complexity of the OCI API, several easier-to-use OCI wrapper libraries also exist, such as: the open-source libsqlora8 library (deprecated). the open-source OCILIB library. the Open BSD licensed Oracle Template Library OTL library. References External links Oracle Call Interface FAQ Public OCI Support Forum (OTN) Oracle software
https://en.wikipedia.org/wiki/Dream%20Job%20%28season%202%29
The second season of Dream Job, the ESPN American reality television show that searches for new on-air talent for the network, began on Tuesday, September 14, 2004. Like the show's first season, this edition was also looking for a new anchor for SportsCenter. A talent search for the show had begun in late June, 2004. ESPN anchor Stuart Scott returned to host the new season. Judges The show's judging panel had changes. Gone were first season judges Tony Kornheiser and LaVar Arrington, who had begun play for the Washington Redskins in the 2004–2005 NFL season. Kornheiser and Arrington were replaced by Cold Pizza contributor and Around the Horn panelist Woody Paige, and ESPN NBA analyst Stephen A. Smith. Cold Pizza co-host Kit Hoover and ESPN Vice-president of Talent, Al Jaffe, returned for the second season. Unlike the judging panel, the voting for season two did not change. The viewing public still had one vote (which was given to the contestant who had received the highest number of votes from online voting and text messaging) to cut a contestant with. In the first two episodes, the judges were given one vote apiece to vote for a contestant to be cut, with two given to them for the third episode only, making episodes 4-10 also one-cut-apiece shows. Contestants Like the first two episodes of season one, the contestants were introduced in 2 groups of six. In episode one, the competing contestants were Valerie Hawrylko, a 31-year-old management consultant from Oakton, Virginia; Brian Startare, a 33-year-old health care management worker from Glassboro, New Jersey; Anish Shroff, a 22-year-old radio anchor who has recently graduated from Syracuse University; Grant Thompson, a 28-year-old writer and actor from Los Angeles; Joe Voyticky, a 37-year-old attorney from Brooklyn, New York; and K.C. James, a 44-year-old account executive from Los Angeles. James had won the Wendy's Wild Card Contest to gain entry onto the show. The next group of six was introduced in episode two, and, for the first time, featured a second Wendy's Wild Card winner. Episode two's competitors were Jason Ashworth, a 23-year-old assistant tour manager from New Freedom, Pennsylvania; Winston Bell, a 35-year-old banker from Cleveland; Jason Horowitz, a 21-year-old student at Syracuse University who originally hails from West Bloomfield, Michigan; Stephanie Rich, a 35-year-old travel coordinator from Arlington, Texas; Whitney Scott, a 24-year-old sports information assistant from Lockwood, Missouri; and David Holmes, the second Wendy's Wild Card winner, a 22-year-old student at Kent State University from Uniontown, Ohio. Episodes Episode One Like the first season, the first two episodes of the second season began with the main game being "My SportsCenter", and like the series premiere on February 22, 2004, each of the six contestants competing in the first episode of season two read two SportsCenter highlights, most of them being from sporting events from the past weekend. Thom
https://en.wikipedia.org/wiki/CKO
CKO was a Canadian radio news network which operated from 1977 to 1989. The CKO call sign was shared by twelve network-owned stations, as listed below. The network was owned by Canada All-News Radio Ltd. AGRA Industries was originally a 45 percent partner in the network, but by 1988 it was the sole owner. David Ruskin was the network's founding president. History On July 12, 1976, the Canadian Radio-television and Telecommunications Commission (CRTC) approved a licence for CKO to Canada All News Radio Limited. Twelve transmitters were required to be in place across the country and ready for broadcast by the fall of 1979. With a recorded message from Prime Minister Pierre Trudeau to launch it, the CKO radio network started broadcasting on July 1, 1977 with stations in Ottawa and Toronto. Power problems delayed the start of the Ottawa station by an hour. Stories included much American content, plus two features about prostitutes. One announcer mispronounced Arkansas several times in one newscast and was reportedly dismissed. Later that year, stations were added in Montreal (by acquisition of AM station CFOX), London, Vancouver and Calgary. The Vancouver station began with a news staff of ten, including news director Cam Scott, Gerry Gifford, Richard Dettman, Stan Crossley, Bill Rodger, Norm Bright and Joanna Piros. Scott was replaced in 1978 by Peter Ray, who had been transferred from the Montreal station. After Ray's departure that year, Tom Spear was hired from CHWK Chilliwack in December 1978 until most local programming was curtailed in August 1980. The news network began live broadcasts of the Canadian government's Question Period in late 1977; for nearly all Canadians, it was the first regular, live access to House proceedings as it would be well over two years before the CBC Parliamentary Television Network began regular nationwide video distribution to most cable systems. In November 1977, the Calgary station was opened with Bob Quinn as its first news director. He expanded coverage in Alberta and was instrumental in the network's coverage of the Kosmos 954 satellite crash in the Northwest Territories in January 1978 and the crash of Pacific Western Airlines Flight 314 in Cranbrook, BC a few weeks later. Reporter Bill Pringle was the first journalist at the crash scene. Calgary coverage centered on local news and the booming Alberta energy sector. The Calgary and Edmonton reporters joined forces to broadcast the 1978 Commonwealth Games in Edmonton. The Calgary stationed featured numerous local features reflecting the skills on the staff and balanced network's national approach. Calgary and Edmonton produced a regional afternoon newscast, "Alberta Today". It was often co-anchored by Cliff Oginski in Edmonton and Calgary's Bill Pringle. In 1978, a station was added in Edmonton under station manager/news director Garfield Chesson. He made CKO Edmonton a key supplier of national news reportage in the era of the Trudeau government's Na