source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/Balabit | Balabit was a Hungarian security firm specializing in the development of IT security systems and related services that help businesses reduce the risk of data breaches associated with privileged accounts.
Balabit claims to have more than 1,000,000 corporate users worldwide. The company operates globally with offices across the United States and Europe, together with network of reseller partners.
In January 2018, Balabit was acquired by One Identity, a U.S.-based provider of identity and access management solutions.
History
Balabit was founded in 2000 by 6 private individuals including Zoltán Györkő (CEO), Balázs Scheidler (SVP Engineering) and Endre Wagner (SVP Services).
The company's first technology iteration was Zorp, an advanced application layer firewall suite.
After becoming the leading firewall solution in Hungary in 2004 according to IDC, Balabit started to develop additional product portfolios.
In January 2018, Balabit was acquired by One Identity, a U.S.-based provider of identity and access management solutions. The acquisition included all assets, including privileged access management-related solutions, such as privileged session and privilege analytics products, as well as the company's syslog-ng log management solutions.
Log management
1998 syslog-ng Open Source Edition (OSE)
2007 syslog-ng Premium Edition (PE)
2008 syslog-ng Store Box (SSB)
Privileged Access Management
2006 Balabit's Privileged Session Management (formally known as Shell Control Box)
2015 Balabit's Privileged Account Analytics (formally known as Blindspotter)
References
Software companies of Hungary
Companies based in Budapest
Companies established in 2000
Science and technology in Hungary
Hungarian brands |
https://en.wikipedia.org/wiki/Newsreader%20%28Usenet%29 | A newsreader is an application program that reads articles on Usenet distributed throughout newsgroups. Newsreaders act as clients which connect to a news server, via the Network News Transfer Protocol (NNTP), to download articles and post new articles. In addition to text-based articles, Usenet is also used to distribute binary files, generally in dedicated "binaries" newsgroups.
The term newsreader is sometimes (erroneously) used interchangeably with news aggregator.
Newsreaders that help users to adhere to the established conventions of Usenet, known as netiquette, are evaluated by the Good Netkeeping Seal of Approval (GNKSA).
Types of newsreaders
There are several different types of newsreaders, depending on the type of service the user needs—whether intended primarily for discussion or for downloading files posted to the alt.binaries hierarchy:
Desktop newsreaders
Designed to integrate well with common GUI environments, and often integrated with a web browser or email client. Examples: Windows Live Mail, Mozilla Thunderbird, Xnews, Forté Agent, Unison, Newswatcher and Pan.
Traditional newsreaders
Designed primarily for reading/posting text posts; limited and often cumbersome binary attachment download functionality. Gnus, as well as more specialized newsreaders such as slrn, nn and tin.
Binary downloaders
Although Usenet originally started as a text-based messaging system without any file attachment ability, many Usenet users today do not participate in discussion groups, as was common during the 1980s and 1990s and only use newsgroups for downloading files such as music, movies, pornography, software and games. Therefore, streamlined clients have been developed for quickly grabbing binary articles, and without the extraneous clutter of text reading and posting features for which file downloaders have little use.
See also
Comparison of Usenet newsreaders
List of Usenet newsreaders
References |
https://en.wikipedia.org/wiki/Nickelodeon%20Studios | Nickelodeon Studios was a production studio and theme park attraction run by the television network Nickelodeon at Universal Studios Florida.
Opening on June 7, 1990, as The First World Headquarters for Kids, the studio attracted young tourists as contestants and audience members for Nickelodeon's live-action programming. At its peak, the studio employed 400 people and was the largest production studio in Florida, bringing $110 million in business to the state by 1994.
The studio closed permanently on April 30, 2005, after much of Nickelodeon's production had moved to Nickelodeon on Sunset. Nickelodeon Studios ended its run having produced over 2,000 episodes of original programming.
History
Planning and construction
In November 1988, Nickelodeon contracted space within the soon to be built Universal Studios Florida for its first production studio. Universal had determined through market research that a working studio was crucial in attracting guests to a movie themed park, and they offered Nickelodeon a sweetheart deal to supply that production. The promise of a custom-built studio at no expense, coupled with rent-free production, lured Nickelodeon away from negotiating with Disney-MGM Studios. The contract stipulated that Nickelodeon promote Universal Studios Florida on-air 1,000 times per year, while also broadcasting the park's television commercials.
Turner Construction Company began erecting two soundstages (Stages 18 and 19) and an adjacent video production facility within the Production Central area of the park in 1989.
The exterior of the facility was designed by network production designer Byron Taylor, and the interior was designed by network art director Don St. Mars. Viacom senior vice president Scott Davis would supervise the design and construction of the complex, and he was later named the first general manager of Nickelodeon Studios.
Super Sloppy Double Dare in April 1989 and Think Fast in January 1990 were the first Nickelodeon productions filmed at Universal Studios Florida, and they were shot on the Stage 21 while Nickelodeon Studios was still being constructed. Like other Nickelodeon game shows, both programs were previously filmed at WHYY-TV in Philadelphia. Nickelodeon's live-action productions had traditionally been shot on rented soundstages in multiple cities, which was not cost-effective and limited the network's growth.
Prior to the studio's completion, Double Dare executive producer Andy Bamberger, Double Dare creator Geoffrey Darby, Nickelodeon President Geraldine Laybourne, and Nickelodeon Studios general manager Scott Davis wrote their names in the cement floor of the video production building's second story. Bamberger, who also served as executive producer of Make the Grade and Total Panic, wrote "I Love TV Production" above his name.
Opening and reception
On June 7, 1990, Universal Studios Florida officially opened to the public. Nickelodeon Studios Opening Day Celebration! was broadcast live from t |
https://en.wikipedia.org/wiki/Nova%20%28radio%20network%29 | The Nova Network is a group of Australian radio stations owned wholly or in part by Nova Entertainment. The Perth station is a joint venture between Nova Entertainment and ARN.
Each station has its own local Breakfast show with daytime, drive and night shifts networked across all stations.
Stations
Network shows
Nova syndicates a number of programmes across its network.
These include:
The Chrissie Swan Show, Weekdays 2pm 4pm
Ricki-Lee, Tim & Joel, Weekdays 4pm 6pm
Fitzy & Wippa with Kate Ritchie, Weeknights 6pm 7pm
Smallzy's Surgery, Weeknights 7pm 10pm
Saturday mornings with Matt Denny & Angie Kent
Ben, Liam & Belle around Australia, 6am 10am (Sunday)
The Maddy Rowe Aus Music Show, 6pm 7pm (Sunday)
Confidential with J.Mo and Angie Kent, 7pm 8pm (Sunday)
Local announcers
Nova 96.9 – Sydney:
Fitzy & Wippa with Kate Ritchie, Weekdays 6am 9am
Jamie Row, Weekdays 9am 11am
Mel Tracina, Weekdays 1pm 2pm
Nova 100 – Melbourne:
Ben, Liam & Belle, Weekdays 6am 9am
Jamie Row, Weekdays 9am 11am
Mel Tracina, Weekdays 1pm 2pm
Nova 106.9 – Brisbane:
Ash, Luttsy & Susie, Weekdays 6am 9am
Maddy Rowe, Weekdays 9am 11am
Dan Cassin, Weekdays 1pm 2pm
Nova 91.9 – Adelaide:
Ben, Liam & Belle, Weekdays 5am 6am
Jodie & Haysey, Weekdays 6am 9am
Maddy Rowe, Weekdays 9am 11am
Dan Cassin, Weekdays 1pm 2pm
Nova 93.7 – Perth:
Nathan, Nat & Shaun, Weekdays 6am 9am
Ross Wallman, Weekdays 9am 11am
Ben Carney, Weekdays 1pm 2pm
Criticism
Nova have received criticism for frequently rotating songs on their playlist. In a piece about the 2020 ARIA Music Awards, NME Australia's Andrew P. Street wrote that the 2004 rollout of Nova FM had "accidentally turned Thirsty Merc and Missy Higgins into stars, before the network swapped to its current format of 14 endlessly repeated songs."
References
External links
Daily Mail and General Trust
Nova Entertainment
Australian radio networks
Contemporary hit radio stations in Australia |
https://en.wikipedia.org/wiki/List%20of%20Archie%20Comics%20publications | Archie Comics is an American comic book company.
A
B
C
D
E
F
G
H
J
K
L
M
N
O
P
R
S
T
V
W
Y
Z
External links
Archie Comics at the Big Comic Book DataBase
Archie Comics publications |
https://en.wikipedia.org/wiki/Bryggenet | Bryggenet is a community network in the Islands Brygge quarter of Copenhagen, Denmark. Bryggenet serves an area of about 4000 residences with fast Internet access, cable TV and radio, and telephone services at cost prices.
Bryggenet was started in 2001 by a group of volunteers, initially with the intent of providing fast and cheap internet access to the residents of a number of co-ops in the quarter, but the project quickly expanded into TV and telephone. All three services went live in early 2003 and have now been working for over 7 years, generally quite well. Since the start, still more co-ops and housing estates have signed up. As of mid-2005 more than 3500 apartments take part.
Internet access is provided in two sizes: 'basic internet' with 70 Mbit/s per 1000 subscribers, and 'fast internet' with 280 Mbit/s per 1000 subscribers. Prices are currently approx. $10/month and $25/month flat fee.
Cable TV is also available in two sizes: 'small' with 8 must-carry or inexpensive channels (Danish, local and Scandinavian); and 'large' with 36 channels (Danish, local, Scandianvian, English, US, German, French, Spanish, Arabic and various thematic channels). The exact composition of each package is determined by subscriber votes every few years. Prices are approx. $7/month and $25/month.
Telephone lines are provided by normal analog technology. A subscription is approx. $7/month and call rates approx. 20% lower than most commercial operators. Local calls are free of charge.
Bryggenet owns the infrastructure. The backbone is a net of fibre optic cables throughout the area, connecting each member building. The internal wiring of each building are normal cat5 PDS cables for internet and telephone, and television. Internet access is provided by a fibre optic cable to Teliasonera, one of the major Scandinavian telecom players; TV and radio signals are delivered via a set of satellite dishes locally; and telephone lines by pools of ISDN lines.
All in all Bryggenet represents an investment of about $2 million, plus countless working hours of the volunteers.
External links
website
Community networks |
https://en.wikipedia.org/wiki/Elif | Elif may refer to:
People
Elif (name)
Other
Elif, Gaziantep, a town in the Araban District of Gaziantep Province, Turkey
Elif (TV series), a Turkish TV series
In computing, used as part of a Structured If (short for else if)
First letter of the alphabet:
A
Aleph
Alpha
Turkish feminine given names
Feminine given names
Turkish unisex given names |
https://en.wikipedia.org/wiki/Floating%20car%20data | Floating car data (FCD) in traffic engineering and management is typically timestamped geo-localization and speed data directly collected by moving vehicles, in contrast to traditional traffic data collected at a fixed location by a stationary device or observer. In a physical interpretation context, FCD provides a Lagrangian description of the vehicle movements whereas stationary devices provide an Eulerian description. The participating vehicle acts itself consequently as a moving sensor using an onboard GPS receiver or cellular phone. The most common and widespread use of FCD is to determine the traffic speed on the road network. Based on these data, traffic congestion can be identified, travel times can be calculated, and traffic reports can be rapidly generated. In contrast to stationary devices such as traffic cameras, number plate recognition systems, and induction loops embedded in the roadway, no additional hardware on the road network is necessary.
Floating cellular data
Floating cellular data is one of the methods to collect floating car data. This method uses cellular network data (CDMA, GSM, UMTS, GPRS). No special devices/hardware are necessary: every switched-on mobile phone becomes a traffic probe and is as such an anonymous source of information. The location of the mobile phone is determined using (1) triangulation or (2) the hand-over data stored by the network operator. As GSM localisation is less accurate than GPS based systems, many phones must be tracked and complex algorithms used to extract high-quality data. For example, care must be taken not to misinterpret cellular phones on a high speed railway track near the road as incredibly fast journeys along the road. However, the more congestion, the more cars, the more phones and thus more probes. In metropolitan areas where traffic data are most needed the distance between cell sites is lower and thus precision increases. Advantages over GPS-based or conventional methods such as cameras or street embedded sensors include: No infrastructure or hardware in cars or along the road. It is much less expensive, offers more coverage of more streets, it is faster to set up (no work zones) and needs less maintenance. In 2007, GDOT demonstrated in Atlanta that such system can emulate very well road sensors data for section speeds. A 2007 study by GMU investigated the relationship between vehicle free flow speed and geometric variables on urban street segments using FCD.
Vehicle re-identification
Vehicle re-identification methods require sets of detectors mounted along the road. In this technique, a unique serial number for a device in the vehicle is detected at one location and then detected again (re-identified) further down the road. Travel times and speed are calculated by comparing the time at which a specific device is detected by pairs of sensors. This can be done using the MAC addresses from Bluetooth devices, or using the radio-frequency identification (RFID) serial numbers |
https://en.wikipedia.org/wiki/FCD | FCD may refer to:
Health and medicine
Fibrocystic disease
Fleck corneal dystrophy
Focal cortical dysplasia
Food composition data
Fuchs' corneal dystrophy
Other uses
Family Computer Disk System, an add-on for Nintendo's Family Computer game console
FC Dallas, an American soccer team
First Chief Directorate, a KGB intelligence organ
Floating car data, also known as floating cellular data
Forum for Democratic Change, a political party in Uganda
Foundation for Child Development
Free City of Danzig, a semi-autonomous city-state that existed between 1920 and 1939
Freedom from Chemical Dependency, a non-profit organization that provides substance abuse prevention education for schools. |
https://en.wikipedia.org/wiki/Netcat | netcat (often abbreviated to nc) is a computer networking utility for reading from and writing to network connections using TCP or UDP. The command is designed to be a dependable back-end that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and investigation tool, since it can produce almost any kind of connection its user could need and has a number of built-in capabilities.
It is able to perform port scanning, file transferring and port listening.
Features
The original netcat's features include:
Outbound or inbound connections, TCP or UDP, to or from any ports
Full DNS forward/reverse checking, with appropriate warnings
Ability to use any local source port
Ability to use any locally configured network source address
Built-in port-scanning capabilities, with randomization
Built-in loose source-routing capability
Can read command line arguments from standard input
Slow-send mode, one line every N seconds
Hex dump of transmitted and received data
Optional ability to let another program service establish connections
Optional telnet-options responder
Rewrites like GNU's and OpenBSD's support additional features. For example, OpenBSD's nc supports TLS, and GNU netcat natively supports a tunneling mode supporting UDP and TCP (optionally allowing one to be tunneled over the other) in a single command, where other versions may require piping data from one netcat instance to another.
Ports and reimplementations
The original version of netcat was a Unix program. The last version (1.10) was released in March 1996.
There are several implementations on POSIX systems, including rewrites from scratch like GNU netcat or OpenBSD netcat,
the latter of which supports IPv6 and TLS. The OpenBSD version has been ported to the FreeBSD base,
Windows/Cygwin,
and Linux.
Mac OS X comes with netcat installed as of OSX 10.13 or users can use MacPorts to install a variant.
A DOS version of netcat called NTOOL is included in the FreeDOS Package group Networking. It is based on the WatTCP stack and licensed under the European Union Public Licence Version 1.1.
Known ports for embedded systems includes versions for Windows CE (named "Netcat 4 wince") or for the iPhone.
BusyBox includes by default a lightweight version of netcat.
Solaris 11 includes netcat implementation based on OpenBSD netcat.
Socat is a more complex variant of netcat. It is larger and more flexible and has more options that must be configured for a given task. On February 1, 2016, Santiago Zanella-Beguelin and Microsoft Vulnerability Research issued a security advisory regarding a composite Diffie-Hellman parameter which had been hard-coded into the OpenSSL implementation of socat. The implausibility that a composite might have been unintentionally introduced where a prime number is required has led to the suspicion of sabotage to introduce a backdoor software vulnerability. This socat bug affected version 1.7. |
https://en.wikipedia.org/wiki/Much | Much may refer to:
Much (TV channel), a cable network in Canada and its domestic and international spin-offs
Much TV, a satellite cable channel in Taiwan
Much (album), a 2001 album by Ten Shekel Shirt
Much the Miller's Son, one of Robin Hood's Merry Men from the earliest tales
Much, North Rhine-Westphalia, a municipality in Germany
Hans Much (1880–1932), a German author and physician
Rudolf Much (1862–1936), an Austrian philologist and historian
See also
German-language surnames |
https://en.wikipedia.org/wiki/Kurt%20Huang | Kurt Huang is co-founder, president, and chief product officer of BitPass. He has a Computer Science degree from Harvard and an MD from Stanford.
Named to the 2004 list of the world's 100 Top Young Innovators by MIT's Technology Review magazine.
He was born in Chicago to immigrants from Taiwan.
References
Living people
American computer businesspeople
American people of Chinese descent
American people of Taiwanese descent
Harvard University alumni
Stanford University School of Medicine alumni
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Line%2010%20%28Beijing%20Subway%29 | Line 10 of the Beijing Subway () is the second loop line in Beijing's rapid transit network as well as the second longest and most widely used line. The line is in length, and runs entirely underground through Haidian, Chaoyang and Fengtai Districts, either directly underneath or just beyond the 3rd Ring Road. The Line 10 loop is situated between outside the Line 2 loop, which circumnavigates Beijing's old Inner City. Every subway line through the city centre intersects with Line 10, which has 24 transfer stations along route, and 45 stations in all. Line 10's color is capri.
Line 10 was the world's longest rapid transit loop line since its completion in May 2013 till March 2023 and one of the longest entirely underground subway lines requiring 104 minutes to complete one full journey in either direction.
History
Planning
The Beijing Subway network was originally conceived to have only one loop line. The booming economy and explosive population growth of Beijing put huge demand on Line 2, surpassing its designed capacity. In 2001 and 2002, the China Academy of Urban Planning and Design proposed two "L-shaped" lines named Line 10 and 11. Together they would form a second loop around Beijing and relieve pressure on line 2.
Phase I
On December 27, 2003, in preparation for the 2008 Summer Olympics in Beijing, Phase 1 of Line 10 started construction. On July 19, 2008, Phase I of Line 10 entered operation ahead of the opening of the Olympic Games. It was in length and had 22 stations. Phase I consisted of the northern and eastern sides of Line 10's rectangular loop from to forming an inverted "L"-shaped line.
Phase II
Construction on Phase II began on December 28, 2007. which meant that the original plan for Line 11 was not incorporated into the final network design and was instead absorbed into Line 10. Line 10 formed the second full loop around Beijing. In 2010, the Ministry of Railways proposed that Fengtai Railway Station was to be renovated and expanded to become a bigger intercity rail terminal for Beijing, with access to the Beijing-Guangzhou high-speed railway. The rationale was to ease intercity traffic pressure on Beijing West railway station. Due to the need to reorganize the stations on Line 10 to better serve the new rail terminal, work stopped on 2 stations, namely Mengjiacun (孟家村) and Niwa (泥洼). The planning department proposed that the original Mengjiacun and Niwa subway stations be merged into the new Fengtai railway station, known as the "three stations into one" program. Local residents, after realizing their travel to a subway station would be greatly lengthened, quickly opposed the plan. Planners reconsidered and moved Niwa station north to its current position and Mengjiacun station north to be renamed as Fengtai Railway Station. The original station shells were demolished and new stations built in their respective new locations. Niwa station started reconstruction in February 2012, while Fengtai railway station starte |
https://en.wikipedia.org/wiki/QSDK | The QSDK is a streaming scene graph retained-mode Application Programming Interface (API) combined with a cell-portal system to connect scene graphs. Audio and animation are fully supported.
It is available on Macintosh, PlayStation 2 and Xbox platforms, and for free on PC platforms.
External links
Qube Software
Q Developer Network
3D scenegraph APIs |
https://en.wikipedia.org/wiki/DBF | DBF may refer to:
.dbf, a file format introduced by dBASE database system, since adopted by other applications as well (database file)
dBf, decibels above a femtowatt, a unit used to measure power and gain
Distributed Bellman-Ford, a Distance-vector routing protocol
Danmarks Badminton Forbund (Denmark's Badminton Union)
Diesel Boats Forever (Diesel Boats Forever)
Design/Build/Fly aircraft design competition
Oracle tablespace filename extension
Digital beamforming in radar, sonar, audio, and other sensor arrays
Direct breastfeeding
Distributed-feedback laser – a type of a laser
Drunk Bitch Friday – formerly a weekly bit on the Lex and Terry morning radio show
See also |
https://en.wikipedia.org/wiki/Fusebox%20%28programming%29 | Fusebox was a web application framework for CFML and PHP. Originally released in 1997, the final version, 5.5.2, was released in May 2012. In January 2012 the rights to Fusebox were transferred from TeraTech to a team of five developers, who removed the rights and placed the framework in the hands of the community.
Fusebox was intended to be easy to learn and provide benefits by helping developers structure their code through a set of simple conventions. Fusebox also allowed advanced developers to build large applications, leveraging design patterns and object-oriented programming techniques if they wish.
Overview
Fusebox provided web application developers with a standardized, structured way of developing their applications using a relatively straightforward and easy to learn set of core files and encouraged conventions. In addition to the framework itself, Fusebox became closely associated with a Web application development methodology developed by its proponents known as "FLiP" (for Fusebox Lifecycle Process). (Many people refer to Fusebox as a "methodology", but in fact, it was a development framework. FLiP, however, is a methodology). The framework has been ported and used in ASP, JSP, Lasso, Perl/CGI and PHP as well, though the CFML and PHP versions of Fusebox were the only versions to gain momentum.
Fusebox dealt primarily with the effort of wiring together view states (pages) with controller actions (form submits, etc.) and the front-end of the business-logic tier. The framework did not address creating and maintaining business logic such as database interaction or service layers
Concepts
Fusebox, Circuits and Fuseactions
The original concepts behind Fusebox were based on the household idiom of an electrical fusebox that controls a number of circuits, each one with its own fuse. In a Fusebox web application, all requests are routed through a single point (usually index.cfm for CFML) and processed by the Fusebox core files. The application is divided into a number of circuits (usually in sub-directories) which are intended to contain related functionality. Each circuit in the application is further divided into small files called fuses that should perform simple tasks. As such, Fusebox is considered an implementation of the front controller, a common design pattern.
URLs within a Fusebox web application are usually of the form index.cfm?fuseaction=cname.fname where "cname" is the name of a circuit and "fname" is an XML-defined "method" within that circuit known as a fuseaction. The query-string variable name "fuseaction" can vary depending on configuration parameters, so not all applications using Fusebox need to use the action variable "fuseaction".
Naming conventions
Fusebox encourages, but does not enforce, separation of presentation logic from business logic. It uses a number of file naming conventions to encourage this separation: presentation files begin with dsp (display) or lay (layout), database access files begin with qry |
https://en.wikipedia.org/wiki/Register-transfer%20level | In digital circuit design, register-transfer level (RTL) is a design abstraction which models a synchronous digital circuit in terms of the flow of digital signals (data) between hardware registers, and the logical operations performed on those signals.
Register-transfer-level abstraction is used in hardware description languages (HDLs) like Verilog and VHDL to create high-level representations of a circuit, from which lower-level representations and ultimately actual wiring can be derived. Design at the RTL level is typical practice in modern digital design.
Unlike in software compiler design, where the register-transfer level is an intermediate representation and at the lowest level, the RTL level is the usual input that circuit designers operate on. In fact, in circuit synthesis, an intermediate language between the input register transfer level representation and the target netlist is sometimes used. Unlike in netlist, constructs such as cells, functions, and multi-bit registers are available. Examples include FIRRTL and RTLIL.
Transaction-level modeling is a higher level of electronic system design.
RTL description
A synchronous circuit consists of two kinds of elements: registers (Sequential logic) and combinational logic. Registers (usually implemented as D flip-flops) synchronize the circuit's operation to the edges of the clock signal, and are the only elements in the circuit that have memory properties. Combinational logic performs all the logical functions in the circuit and it typically consists of logic gates.
For example, a very simple synchronous circuit is shown in the figure. The inverter is connected from the output, Q, of a register to the register's input, D, to create a circuit that changes its state on each rising edge of the clock, clk. In this circuit, the combinational logic consists of the inverter.
When designing digital integrated circuits with a hardware description language (HDL), the designs are usually engineered at a higher level of abstraction than transistor level (logic families) or logic gate level. In HDLs the designer declares the registers (which roughly correspond to variables in computer programming languages), and describes the combinational logic by using constructs that are familiar from programming languages such as if-then-else and arithmetic operations. This level is called register-transfer level. The term refers to the fact that RTL focuses on describing the flow of signals between registers.
As an example, the circuit mentioned above can be described in VHDL as follows:
D <= not Q;
process(clk)
begin
if rising_edge(clk) then
Q <= D;
end if;
end process;
Using an EDA tool for synthesis, this description can usually be directly translated to an equivalent hardware implementation file for an ASIC or an FPGA. The synthesis tool also performs logic optimization.
At the register-transfer level, some types of circuits can be recognized. If there is a cyclic path of logic |
https://en.wikipedia.org/wiki/Binary%20system%20%28disambiguation%29 | Binary system may refer to:
Binary number system, the base-2 internal "machine language" of computers
Binary opposition, a bipolar distinction in philosophy, structuralism and critical theory
Binary system (astronomy), a system of two celestial bodies on a mutual orbit
Binary asteroid
Binary star
Contact binary
Contact binary (asteroid)
Double planet
In chemistry, a system involving two steps, processes or substances
Mixture
Azeotrope
Binary System, a music duo featuring rock musician Roger Miller
Binary Systems (Aberdeen) is a Graphic Design company based in Aberdeen, Scotland
ca:Sistema binari
pt:Binário |
https://en.wikipedia.org/wiki/Wetrix | Wetrix is a 3D puzzle video game developed by Zed Two, the studio of brothers Ste and John Pickford, for the Nintendo 64 and personal computers in 1998, and the Dreamcast and Game Boy Color in 1999 (as Wetrix+ and Wetrix GB respectively). The player's goal is to hold water bubbles falling on a 3D isometric landscape. To do this, enclosures are created with Uppers, which fall in a similar manner to Tetris blocks, that raise the ground. While water can be evaporated with fireballs, hazards such as Mines, Ice Cubes, and earthquakes also fall and ruin the player's construction.
The Pickfords conceived a Tetris-esque puzzle game out of a water demo they worked on for another one of their Zed Two games, the hack and slash Vampire Circus. For design, the biggest focus was on the basic elements' interaction with each other, as well as the puzzle game style's originality; the use of falling blocks was the only similarity between Wetrix and Tetris. Zed Two signed a two-game deal with Ocean Software, a week before its merge with Infogrames. It required the brothers to turn Vampire Circus into Taz Express (2000), while allowing the brothers free rein with Wetrix. The PC version was produced from January to October 1997 by the brothers themselves, while the Nintendo 64 port was developed with three additional programmers from around June to Christmas 1997.
The Nintendo 64 version sold over 105,000 units in the West, and just above 12,000 in Japan, while the PC version sold 30,000 copies. Wetrix was generally well-received by critics, who applauded its addictiveness and original concept but were critical of the limited camera mobility and divided on its difficulty, steep learning curve, and two-player mode. It garnered the highest rating for a review of a Western-developed title from the Japanese magazine Famitsu Weekly in years. The critical and commercial success motivated Imagineer, developers of the Game Boy Color port, to commission Zed Two to develop a sequel, the PlayStation 2 launch title Aqua Aqua, which made little alterations to the main gameplay.
Gameplay
Wetrix is an isometric puzzle video game where the player, on a square landscape, produces mounds to hold water bubbles falling from the sky. Uppers, pieces that raise a part of the landscape that come in the shapes of rectangles, squares, and T-shapes, create walls for the lakes, while Downers do the opposite. If there is no wall in its way, water will seep off the edges and into a drain represented by a water meter; the game ends once it is full. Fireballs pop up which can evaporate water, which gives the player an amount of points depending on how much water was vaporized. By evaporating water with fireballs, the player is also able to reduce the level of the drain in order to avoid losing. There are also hazards that ruin the player's structure, such as Mines which blast holes into the ground, Ice Cubes that freeze the water, and earthquakes that quickly turn the landscape flat once it is |
https://en.wikipedia.org/wiki/GPF | GPF may refer to:
Canon de 155mm GPF, a French heavy artillery gun
*Gallons per flush*, a measure of flush toilet water efficiency
General protection fault, a computer error on the Intel x86 architecture
General Purpose Frigate (Canada)
Global Peace Foundation
Global Philanthropy Forum
Global Policy Forum, an American international government accountability organization
Gozarto Protection Force, a Syrian militia
Grand Prix of Figure Skating Final
Greater palatine foramen
Grosse Pointe Farms
Yaroslavl Global Policy Forum, an international forum |
https://en.wikipedia.org/wiki/Sparse | Sparse is a computer software tool designed to find possible coding faults in the Linux kernel. Unlike other such tools, this static analysis tool was initially designed to only flag constructs that were likely to be of interest to kernel developers, such as the mixing of pointers to user and kernel address spaces.
Sparse checks for known problems and allows the developer to include annotations in the code that convey information about data types, such as the address space that pointers point to and the locks that a function acquires or releases.
Linus Torvalds started writing Sparse in 2003. Josh Triplett was its maintainer from 2006, a role taken over by Christopher Li in 2009
and by Luc Van Oostenryck in November 2018.
Sparse is released under the MIT License.
Annotations
Some of the checks performed by Sparse require annotating the source code using the __attribute__ GCC extension, or the Sparse-specific __context__ specifier. Sparse defines the following list of attributes:
address_space(num)
bitwise
force
context(expression,in_context,out_context)
When an API is defined with a macro, the specifier __attribute__((context(...))) can be replaced by __context__(...).
Linux kernel definitions
The Linux kernel defines the following short forms as pre-processor macros in files linux/compiler.h and linux/types.h (when building without the flag, all these annotations are removed from the code):
#ifdef
# define __user __attribute__((noderef, address_space(1)))
# define __kernel __attribute__((address_space(0)))
# define __safe __attribute__((safe))
# define __force __attribute__((force))
# define __nocast __attribute__((nocast))
# define __iomem __attribute__((noderef, address_space(2)))
# define __must_hold(x) __attribute__((context(x,1,1)))
# define __acquires(x) __attribute__((context(x,0,1)))
# define __releases(x) __attribute__((context(x,1,0)))
# define __acquire(x) __context__(x,1)
# define __release(x) __context__(x,-1)
# define __cond_lock(x,c) ((c) ? ({ __acquire(x); 1; }) : 0)
# define __percpu __attribute__((noderef, address_space(3)))
#ifdef CONFIG_SPARSE_RCU_POINTER
# define __rcu __attribute__((noderef, address_space(4)))
#else
# define __rcu
#endif
extern void __chk_user_ptr(const volatile void __user *);
extern void __chk_io_ptr(const volatile void __iomem *);
#else
# define __user
# define __kernel
# define __safe
# define __force
# define __nocast
# define __iomem
# define __chk_user_ptr(x) (void)0
# define __chk_io_ptr(x) (void)0
# define __builtin_warning(x, y...) (1)
# define __must_hold(x)
# define __acquires(x)
# define __releases(x)
# define __acquire(x) (void)0
# define __release(x) (void)0
# define __cond_lock(x,c) (c)
# define __percpu
# define __rcu
#endif
#ifdef
# define __bitwise __attribute__((bitwise))
#else
# define __bitwise
#endif
Examples
The types __le32 and __be32 represent 32-bit integer types with different endianness. However, the C language does not allow to specify that variables of these |
https://en.wikipedia.org/wiki/Incremental%20compiler | An incremental compiler is a kind of incremental computation applied to the field of compilation. Quite naturally, whereas ordinary compilers make a so-called clean build, that is, (re)build all program modules, an incremental compiler recompiles only modified portions of a program.
Definition
Imperative programming
In imperative programming and software development, incremental compilation takes only the changes of a known set of source files and updates any corresponding output files (in the compiler's target language, often bytecode) that may already exist from previous compilations.
By effectively building upon previously compiled output files, an incremental compiler avoids the wasteful recompiling of entire source files, where most of the code remains unchanged. For most incremental compilers, compiling a program with small changes to its source code is usually near instantaneous.
It can be said that an incremental compiler reduces the granularity of a language's traditional compiling units while maintaining the language's semantics, such that the compiler can append and replace smaller parts.
Many programming tools take advantage of incremental compilers to provide developers with a much more interactive programming environment. It is not unusual that an incremental compiler is invoked for every change of a source file, such that the developer is almost immediately informed about any compilation errors that would arise as a result of their changes to the code. This scheme, in contrast with traditional compilation, shortens a programmer's development cycle significantly, because they would no longer have to wait for a long compile process before being informed of errors.
One downside to this type of incremental compiler is that it cannot easily optimize the code that it compiles, due to locality and the limited scope of what is changed. This is usually not a problem, because for optimization is usually only carried out on release, an incremental compiler would be used throughout development, and a standard batch compiler would be used on release.
Interactive programming
In the interactive programming paradigm, e.g. in Poplog related literature, and an interactive compiler refers to a compiler that is actually a part of the runtime system of the source language. The compiler can be invoked at runtime on some source code or data structure managed by the program, which then produces a new compiled program fragment containing machine code that is then immediately available for use by the runtime system. If the newly compiled fragment replaces a previous compiled procedure the old one will be garbage collected. This scheme allows for a degree of self-modifying code and requires metaprogramming language features. The ability to add, remove and delete code while running is known as hot swapping. Some interactive programming platforms mix the use of interpreted and compiled code to achieve the illusion that any changes to code are accessible |
https://en.wikipedia.org/wiki/Against%20the%20Law%20%28TV%20series%29 | Against the Law is an American legal comedy-drama television series that aired on the Fox network from September 23, 1990, until April 5, 1991. Starring Michael O'Keefe and Suzzanne Douglas, the series centered on the brash Boston lawyer, Simon MacHeath, who left his job at a prestigious law firm to start his own defense practice.
Seventeen one-hour episodes were broadcast from September 23, 1990, to April 5, 1991.
Cast
Michael O'Keefe as Simon MacHeath
Suzzanne Douglas as Yvette Carruthers
Elizabeth Ruscio as Elizabeth Verhagen
Rosalind Chao as Toy Feng
M. C. Gainey as J.T. "Miggsy" Meigs
Fritz Weaver as Skipper Haverhill
Barbara Williams as Phoebe
Lance Norris as the SWAT Team Leader
Episodes
References
External links
1990s American comedy-drama television series
1990 American television series debuts
1991 American television series endings
Fox Broadcasting Company original programming
1990s American legal television series
Television series by MGM Television
English-language television shows
Television shows set in Boston |
https://en.wikipedia.org/wiki/Universal%20Abit | Universal ABIT Co., Ltd (formerly ABIT Computer Corporation) was a computer components manufacturer, based in Taiwan, active since the 1980s. Its core product line were motherboards aimed at the overclocker market. Abit experienced serious financial problems in 2005. The brand name "ABIT" and other intangible properties, including patents and trademarks, were acquired by Universal Scientific Industrial Co., Ltd. (USI) in May 2006.
The parent firm closed the brand as of 31 March 2009.
History
ABIT was founded in 1989. In 1991, they had become the fastest growing motherboard manufacturer, claiming US$10 million in sales.
In 2000, ABIT underwent an initial public offering (IPO) on the TAIEX stock exchange. To keep pace with their "good" sales figures, they opened a factory in Suzhou, China, and moved to new headquarters in Neihu, Taipei. The number of motherboards sold was claimed to have doubled between 2000 and 2001.
Abit chose to outsource two low-end boards for trial production from June 2002 to Elitegroup Computer Systems. Confirmation of the outsourcing move was made public in July 2002, accounting for 10% of Abit's motherboard shipments for the first model, and by August 2002, this would increase to 15-20% for the second model, for the company's niche products, such as servers and routers, Abit's factory in Taoyuan, Taiwan factory will then serve as their base.
Abit had somewhat of a blow in March 2003, when Oskar Wu, a leading engineer on the famous Abit NF7-S motherboard, resigned after the NForce series to become head of the LANParty range at competitor DFI.
On 15 December 2004, the Taiwan Stock Exchange downgraded ABIT's stock due to questionable accounting practices. Investigations revealed that the majority of their import/export business was conducted through seven companies, all located at the same address and each of which had a capital of only HK$2. This made it easy to inflate the reported number of motherboards sold. The Hong Kong media also reported that the management was being investigated for embezzling funds from the company.
In June 2005, ABIT partnered with Wan Hai Industries. This container shipping company, also a principal investor in China Airlines, brought the company much needed capital, since the company had financial problems at this time, partly due to a class action lawsuit involving faulty capacitors on their products, but also because of marketing highly technical products to the general public while offering longer-than-average warranties and generous return policies.
On 25 January 2006, ABIT announced that USI intended to purchase ABIT Computer's motherboard business and brand and announced a special shareholders meeting to discuss the sale of ABIT's Neihu building, changing ABIT's company name, the disposition of the company's assets, and the release of the directors from non-competition restrictions. ABIT sold its own office building in Taipei to Deutsche Bank in order to raise money to cut its debt |
https://en.wikipedia.org/wiki/Premiere%20Networks | Premiere Networks (formerly Premiere Radio Networks, shortened as PRN) is an American media company, a wholly owned subsidiary of iHeartMedia, for which it currently serves as its main original radio content distribution and production arm. It is the largest syndication company in the United States. Founded independently in 1987, it is headed by Julie Talbott, who serves as president.
Premiere Networks either syndicates and/or (co-)produces more than 90 individual programs and radio programming services/networks to more than 5,500 affiliates across the U.S., reaching about 245 million listeners monthly. Premiere offers talk, entertainment and sports programming featuring well-known personalities including Ryan Seacrest, Delilah, JoJo Wright, Mario Lopez, Bobby Bones, Crook & Chase, Clay Travis and Buck Sexton, Glenn Beck, Steve Harvey, Big Boy, George Noory, John Boy and Billy, Sean Hannity, Elvis Duran, Dan Patrick, Bill Cunningham, Cody Alan, Johnjay and Rich, Jay Mohr, Leo Laporte and others. The company is based in Sherman Oaks, California, with 13 offices nationwide.
Many Premiere produced/distributed programs are also available on several on-demand audio streaming services, including iHeartMedia's own iHeartRadio platform and iHeart.com website.
It also acts as a Primary Entry Point in the Emergency Alert System for its terrestrial radio affiliates.
History
Premiere was founded in 1987 with an investment of (equivalent to $ in ). Founders included Steve Lehman, Tim Kelly, Louise Palanker and Ed Mann. The network produced three programs with approximately 250 affiliates. In 1992, Premiere entered the agreement with Mediabase, and later acquired the said company in 1994.
In 1997, Jacor Communications acquired both Premiere and EFM Media (producer of the talk program The Rush Limbaugh Show), and in turn, Clear Channel Communications ultimately bought Jacor. Following the merger with AMFM Inc. in 2000, its syndication arm, AMFM Radio Networks, and its radio shows, were folded into Premiere's operations.
Premiere entered a long-term agreement with Fox Sports to launch Fox Sports Radio, with Premiere handling distribution of the network to radio affiliates.
Distribution
Premiere Networks' programs are currently distributed over satellite, NexGen Digital WANcasting, and downloadable via FTP. The FTP server serves both primary and backup delivery needs for weekly pre-recorded content. For years, Premiere used the popular Starguide Digital III satellite system to distribute their programs prior to their transition to X-Digital Systems (XDS) for satellite delivery.
Premiere's entertainment programs are distributed on a mixture of fee and barter-based deals.
Program schedule
All times are Eastern. Programs are organized alphabetically by franchise and display their date and time if they're available for online download, and additional information.
See also List of programming syndicated by iHeartMedia.
- The show requires a paid subscr |
https://en.wikipedia.org/wiki/CATH%20database | The CATH Protein Structure Classification database is a free, publicly available online resource that provides information on the evolutionary relationships of protein domains. It was created in the mid-1990s by Professor Christine Orengo and colleagues including Janet Thornton and David Jones, and continues to be developed by the Orengo group at University College London. CATH shares many broad features with the SCOP resource, however there are also many areas in which the detailed classification differs greatly.
Hierarchical organization
Experimentally determined protein three-dimensional structures are obtained from the Protein Data Bank and split into their consecutive polypeptide chains, where applicable. Protein domains are identified within these chains using a mixture of automatic methods and manual curation.
The domains are then classified within the CATH structural hierarchy: at the Class (C) level, domains are assigned according to their secondary structure content, i.e. all alpha, all beta, a mixture of alpha and beta, or little secondary structure; at the Architecture (A) level, information on the secondary structure arrangement in three-dimensional space is used for assignment; at the Topology/fold (T) level, information on how the secondary structure elements are connected and arranged is used; assignments are made to the Homologous superfamily (H) level if there is good evidence that the domains are related by evolution i.e. they are homologous.
Additional sequence data for domains with no experimentally determined structures are provided by CATH's sister resource, Gene3D, which are used to populate the homologous superfamilies. Protein sequences from UniProtKB and Ensembl are scanned against CATH HMMs to predict domain sequence boundaries and make homologous superfamily assignments.
Releases
The CATH team aim to provide official releases of the CATH classification every 12 months. This release process is important because it allows for the provision of internal validation, extra annotations and analysis. However, it can mean that there is a time delay between new structures appearing in the PDB and the latest official CATH release,
In order to address this issue: CATH-B provides a limited amount of information to the very latest domain annotations (e.g., domain boundaries and superfamily classifications).
The latest release of CATH-Gene3D (v4.3) was released in December 2020 and consists of:
500,238 structural protein domain entries
151 mln non-structural protein domain entries
5,481 homologous superfamily entries
212,872 functional family entries
Open-source software
CATH is an open source software project, with developers developing and maintaining a number of open-source tools. CATH maintains a todo list on GitHub to allow external users to create and keep track of issues relating to the CATH protein structure classification.
References
Protein structure
Protein folds
Biological databases
Protein classificati |
https://en.wikipedia.org/wiki/Toronto%20Computer%20Leasing%20Inquiry | The Toronto Computer Leasing Inquiry was a judicial inquiry into allegations of conflict of interest, bribery and misappropriation of funds around computer leasing contracts entered into by the City of Toronto government in 1998 and 1999. It was held concurrently with the Toronto External Contracts Inquiry.
Background
On January 1, 1998, the Municipality of Metropolitan Toronto and its six lower-tier cities (Toronto, Scarborough, North York, Etobicoke, East York and York) were amalgamated into the single "megacity" of Toronto. In one of the new city's first official acts of business, computer equipment was leased for city councillors' offices from MFP Financial Services, at a value of $1,093,731. City staff have not been able to produce any documentation to prove that this contract was awarded through proper procedures.
In May, 1999, the city issued a Request For Quotations for its new computer acquisition needs. MFP was one of the bidders, and was awarded the contract in July of that year. MFP was contracted to provide $43 million of computer equipment to the city on a three-year lease agreement. However, the final lease agreement was not signed until after the 90-day price guarantee had expired.
That fall, the city sold its owned computer equipment to MFP, and then leased it back as well.
Over the duration of the agreement, the city paid $85 million to MFP, rather than the original $43 million approved by city council. As well, many of the equipment schedules were for five-year leases rather than three. Some of these leases were later restructured to extend the lease terms even further, resulting in additional costs.
In December of that year, the city acquired 10,000 Oracle database licenses, again through an MFP lease. This turned out to be a serious overestimate of the city's actual needs.
These issues came to light in late 2001, after an investigation by Toronto city councillors David Miller and Bas Balkissoon. In February, 2002, the Toronto Computer Leasing Inquiry was established by city council. The commissioner of the inquiry is Madam Justice Denise Bellamy of the Ontario Superior Court of Justice.
The Inquiry
MFP's lead salesman on the city contract was Dash Domi, the brother of former Toronto Maple Leafs player Tie Domi. Much of the testimony presented to the inquiry alleged an improper financial relationship between Domi and former city councillor Tom Jakobek, the city's budget chief at the time of the contracts.
The inquiry was presented with evidence that Jakobek's name, along with other city staff, was on the passenger manifest for a flight, paid for by MFP, to a Leafs game in Philadelphia. For several weeks, witnesses testified that they could not recall whether Jakobek was actually on the flight, but Jakobek eventually admitted that he had been present, and apologized for lying under oath.
Some of Jakobek's office staff have testified that Dash Domi was granted special access to Jakobek's office, although other staff me |
https://en.wikipedia.org/wiki/Cable%20modem%20termination%20system | A cable modem termination system (CMTS, also called a CMTS Edge Router) is a piece of equipment, typically located in a cable company's headend or hubsite, which is used to provide high speed data services, such as cable Internet or Voice over Internet Protocol, to cable subscribers. A CMTS provides many of the same functions provided by the DSLAM in a DSL system.
Connections
In order to provide high speed data services, a cable company will connect its headend to the Internet via very high capacity data links to a network service provider. On the subscriber side of the headend, the CMTS enables communication with subscribers' cable modems. Different CMTSs are capable of serving different cable modem population sizes—ranging from 4,000 cable modems to 150,000 or more, depending in part on traffic, although it is recommended for an I-CMTS to service, for example, 30,000 subscribers (cable modems). A given headend may have between 1–12 CMTSs to service the cable modem population served by that headend or HFC hub.
One way to think of a CMTS is to imagine a router with Ethernet interfaces (connections) on one side and coaxial cable RF interfaces on the other side. The Ethernet side is known as the Network Side Interface or NSI.
A CMTS has separate RF interfaces and connectors for downlink and uplink signals. The RF/coax interfaces carry RF signals to and from coaxial "trunks" connected to subscribers' cable modems, using one pair of connectors per trunk, one for downlink and the other for uplink. In other words, there can be a pair of RF connectors for every service group, although it is possible to configure a network with different numbers of connectors that service a set of service groups, based on the number of downstream and upstream channels the cable modems in every service group use. Every connector has a finite number of channels it can carry, such as 16 channels per downstream connector, and 4 channels per upstream connector, depending on the CMTS. For example, if the cable modems on every service group use 24 channels for downstream, and 2 channels for upstream, then 3 downstream connectors can service the cable modems on two service groups, and be serviced by 1 upstream connector. A service group may serve up to 500 households. A service group has channels, whose bandwidth is shared among all members of the service group. The channels are later regrouped at the cable headend or distribution hub and serviced by CMTSs and other equipment such as Edge QAMs.
The RF signals from a CMTS, are connected via coaxial cable to headend RF management modules for RF splitting and combining, with other equipment such as other CMTSs so that several CMTS can service one service group, and then to an "optics platform" or headend platform, which has transmitter and receiver modules that turn the RF signals into light pulses for delivery over fiber optics through an HFC network. Examples of optics platforms are the Arris CH3000 and Cisco Prisma II. At t |
https://en.wikipedia.org/wiki/Marr%E2%80%93Hildreth%20algorithm | In computer vision, the Marr–Hildreth algorithm is a method of detecting edges in digital images, that is, continuous curves where there are strong and rapid variations in image brightness. The Marr–Hildreth edge detection method is simple and operates by convolving the image with the Laplacian of the Gaussian function, or, as a fast approximation by difference of Gaussians. Then, zero crossings are detected in the filtered result to obtain the edges. The Laplacian-of-Gaussian image operator is sometimes also referred to as the Mexican hat wavelet due to its visual shape when turned upside-down. David Marr and Ellen C. Hildreth are two of the inventors.
Limitations
The Marr–Hildreth operator suffers from two main limitations. It generates responses that do not correspond to edges, so-called "false edges", and the localization error may be severe at curved edges. Today, there are much better edge detection methods, such as the Canny edge detector based on the search for local directional maxima in the gradient magnitude, or the differential approach based on the search for zero crossings of the differential expression that corresponds to the second-order derivative in the gradient direction (both of these operations preceded by a Gaussian smoothing step). For more details, see the article on edge detection.
See also
Blob detection
CVIPtools
References
Feature detection (computer vision) |
https://en.wikipedia.org/wiki/PHIGS | PHIGS (Programmer's Hierarchical Interactive Graphics System) is an application programming interface (API) standard for rendering 3D computer graphics, considered to be the 3D graphics standard for the 1980s through the early 1990s. Subsequently, a combination of features and power led to the rise of OpenGL, which became the most popular professional 3D API of the mid to late 1990s.
Large vendors typically offered versions of PHIGS for their platforms, including DEC PHIGS, IBM's graPHIGS and Sun's SunPHIGS. It could also be used within the X Window System, supported via PEX. PEX consisted of an extension to X, adding commands that would be forwarded from the X server to the PEX system for rendering. Workstations were placed in windows typically, but could also be forwarded to take over the whole screen, or to various printer-output devices.
PHIGS was designed in the 1980s, inheriting many of its ideas from the Graphical Kernel System (GKS) of the late 1970s, and became a standard by 1988: ANSI (ANSI X3.144-1988), FIPS (FIPS 153) and then ISO (ISO/IEC 9592 and ISO/IEC 9593). Due to its early gestation, the standard supports only the most basic 3D graphics, including basic geometry and meshes, and only the basic Gouraud, "Dot", and Phong shading for rendering scenes. Although PHIGS ultimately expanded to contain advanced functions (including the more accurate Phong lighting model and Data Mapping), other features considered standard by the mid-1990s were not supported (notably texture mapping), nor were many machines of the era physically capable of optimizing it to perform in real time.
Technical details
The word "hierarchical" in the name refers to a notable feature of PHIGS: unlike most graphics systems, PHIGS included a scene graph system as a part of the basic standard. Models were built up in a Centralized Structure Store (CSS), a database containing a "world" including both the drawing primitives and their attributes (color, line style, etc.). CSSes could be shared among a number of virtual devices, known under PHIGS as workstations, each of which could contain any number of views.
Displaying graphics on the screen in PHIGS was a three-step process; first the model would be built into a CSS, then a workstation would be created and opened, and finally the model would be connected to the workstation. At that point the workstation would immediately render the model, and any future changes made to the model would instantly be reflected in all applicable workstation views.
PHIGS originally lacked the capability to render illuminated scenes, and was superseded by PHIGS+. PHIGS+ works in essentially the same manner, but added methods for lighting and filling surfaces within a 3D scene. PHIGS+ also introduced more advanced graphics primitives, such as Non-uniform rational B-spline (NURBS) surfaces. An ad hoc ANSI committee was formed around these proposed extensions to PHIGS, changing its name to the more descriptive and (optimistically) exte |
https://en.wikipedia.org/wiki/IntelliJ%20IDEA | IntelliJ IDEA is an integrated development environment (IDE) written in Java for developing computer software written in Java, Kotlin, Groovy, and other JVM-based languages. It is developed by JetBrains (formerly known as IntelliJ) and is available as an Apache 2 Licensed community edition, and in a proprietary commercial edition. Both can be used for commercial development.
History
The first version of IntelliJ IDEA was released in January 2001 and was one of the first available Java IDEs with advanced code navigation and code refactoring capabilities integrated.
In 2009, JetBrains released the source code for IntelliJ IDEA under the open-source Apache License 2.0. JetBrains also began distributing a limited version of IntelliJ IDEA consisting of open-source features under the moniker Community Edition. The commercial Ultimate Edition provides additional features and remains available for a fee.
In a 2010 InfoWorld report, IntelliJ received the highest test center score out of the four top Java programming tools: Eclipse, IntelliJ IDEA, NetBeans and JDeveloper.
In December 2014, Google announced version 1.0 of Android Studio, an open-source IDE for Android apps, based on the open source community edition. Other development environments based on IntelliJ's framework include AppCode, CLion, DataGrip, GoLand, PhpStorm, PyCharm, Rider, RubyMine, WebStorm, and MPS.
In September 2020, Huawei announced and released version 1.0 of DevEco Studio, an open-source IDE for HarmonyOS apps development, based on Jetbrains IntelliJ IDEA with Huawei's SmartAssist for Windows and macOS.
System requirements
Features
Coding assistance
The IDE provides certain features like code completion by analyzing the context, code navigation which allows jumping to a class or declaration in the code directly, code refactoring, code debugging
, linting and options to fix inconsistencies via suggestions.
Built in tools and integration
The IDE provides integration with build/packaging tools like Grunt, bower, Gradle, and sbt. It supports version control systems like Git, Mercurial, Perforce, and Subversion. Databases like Microsoft SQL Server, Oracle, PostgreSQL, SQLite, and MySQL can be accessed directly from the IDE in the Ultimate edition, through an embedded version of DataGrip, another IDE developed by JetBrains.
Plugin ecosystem
IntelliJ supports plugins through which one can add additional functionality to the IDE. Plugins can be downloaded and installed either from IntelliJ's plugin repository website or through the IDE's inbuilt plugin search and install feature. Each edition has separate plugin repositories, with both the Community and Ultimate editions totaling over 3000 plugins each as of 2019.
Supported languages
The Community and Ultimate editions differ in their support for various programming languages as shown in the following table.
Supported in both Community and Ultimate Edition:
CSS, Sass, SCSS, Less, Stylus
Groovy
HTML, XML, JSON, YAML
Java
|
https://en.wikipedia.org/wiki/CA%20Gen | Gen is a Computer Aided Software Engineering (CASE) application development environment marketed by Broadcom Inc. Gen was previously known as CA Gen, IEF (Information Engineering Facility), Composer by IEF, Composer, COOL:Gen, Advantage:Gen and AllFusion Gen.
The toolset originally supported the information technology engineering methodology developed by Clive Finkelstein, James Martin and others in the early 1980s. Early versions supported IBM's DB2 database, 3270 'block mode' screens and generated COBOL code.
In the intervening years the toolset has been expanded to support additional development techniques such as component-based development; creation of client/server and web applications and generation of C, Java and C#. In addition, other platforms are now supported such as many variants of Unix-like Operating Systems (AIX, HP-UX, Solaris, Linux) as well as Windows.
Its range of supported database technologies have widened to include ORACLE, Microsoft SQL Server, ODBC, JDBC as well as the original DB2.
The toolset is fully integrated - objects identified during analysis carry forward into design without redefinition. All information is stored in a repository (central encyclopedia). The encyclopedia allows for large team development - controlling access so that multiple developers may not change the same object simultaneously.
Overview
It was initially produced by Texas Instruments, with input from James Martin and his consultancy firm James Martin Associates, and was based on the Information Engineering Methodology (IEM). The first version was launched in 1987.
IEF (Information Engineering Facility) became popular among large government departments and public utilities. It initially supported a CICS/COBOL/DB2 target environment. However, it now supports a wider range of relational databases and operating systems. IEF was intended to shield the developer from the complexities of building complete multi-tier cross-platform applications.
In 1995, Texas Instruments decided to change their marketing focus for the product. Part of this change included a new name - "Composer".
By 1996, IEF had become a popular tool. However, it was criticized by some IT professionals for being too restrictive, as well as for having a high per-workstation cost ($15K USD). But it is claimed that IEF reduces development time and costs by removing complexity and allowing rapid development of large scale enterprise transaction processing systems.
In 1997, Composer had another change of branding, Texas Instruments sold the Texas Instruments Software division, including the Composer rights, to Sterling Software. Sterling software changed the well known name "Information Engineering Facility" to "COOL:Gen". COOL was an acronym for "Common Object Oriented Language" - despite the fact that there was little object orientation in the product.
In 2000, Sterling Software was acquired by Computer Associates (now CA). CA has rebranded the product three times to date and |
https://en.wikipedia.org/wiki/B8 | B8, B VIII or B-8 may refer to:
Transport
Roads
B8 (Croatia), an expressway part of the Istrian Y highway network
B8 road (Cyprus)
B8 road (Kenya)
B8 road (Namibia)
Bundesstraße 8, a road in Germany
Other uses in transport
B8 (New York City bus) serving Brooklyn
Bavarian B VIII, a German steam locomotive model
Bensen B-8, a 1955 United States small single-seat autogyro
, a B-class submarine of the Royal Navy
Mazda B8, a piston engine
Fokker XB-8, a bomber prototype built for the United States Army Air Corps
B8, the IATA code for Eritrean Airlines
LNER Class B8, a class of British steam locomotives
Biology
Proanthocyanidin B8, a B type proanthocyanidin
Vitamin B8, a name sometimes used for inositol
HLA-B8, an HLA-B serotype
Other
B8 (bronze), an alloy used in cymbals
b8 (spam filter), a statistical spam filter implemented in PHP
Boron-8 (B-8 or 8B), an isotope of boron
B8, a type of stereoautograph
A subclass of B-class stars
An international standard paper size (62×88 mm), defined in ISO 216
The musical note 7 keys above a standard Grand Piano
The postcode for Saltley, England
B8, the category for warehousing under the United Kingdom planning regulations
B-VIII reactor, an unsuccessful experiment that was part of the German nuclear weapons program |
https://en.wikipedia.org/wiki/Z5 | Z5 may refer to:
Harbin Z-5, Chinese helicopter
Mazda Z engine
a file extension used by Z-machine
Z5 (computer) designed by Konrad Zuse
the GMG Airlines IATA airline code
German destroyer Z5 Paul Jakobi
the Beijing-Nanning-Hanoi Through Train (southbound)
Zbrojovka Z5 Express, a Czech car of the 1930s
LNER Class Z5, a class of British steam locomotives
Nikon Z 5 mirrorless camera |
https://en.wikipedia.org/wiki/JFT | JFT may refer to:
Job File Table, a data structure in DOS-compatible operating systems
Johnson–Forest Tendency, an American Trotskyist organization
Jones Falls Trail, in Baltimore, Maryland, United States
Mazda J engine |
https://en.wikipedia.org/wiki/GDL | GDL may refer to:
Computing
Game Description Language
Generalized distributive law
Genomics Digital Lab, a series of educational games
Geometric Description Language
Gesture Description Language
GNU Data Language
Google Developers Live
Other uses
Dirasha language
Gas diffusion layer of a proton-exchange membrane fuel cell
Gas Dynamics Laboratory, a Soviet rocket research and development laboratory
Gas dynamic laser
Gateway Distriparks, an Indian logistics company
, a German trade union
Glucono delta-lactone, a food additive
Godley railway station, in England
Goyim Defense League, an internet troll network
Graduate Diploma in Law
Graduated driver licensing
Guadalajara International Airport, in Mexico
Guadeloupe, ITU code
Grand Duchy of Lithuania |
https://en.wikipedia.org/wiki/Burroughs%20MCP | The MCP (Master Control Program) is the operating system of the Burroughs B5000/B5500/B5700 and the B6500 and successors, including the Unisys Clearpath/MCP systems.
MCP was originally written in 1961 in ESPOL (Executive Systems Problem Oriented Language). In the 1970s, MCP was converted to NEWP which was a better structured, more robust, and more secure form of ESPOL.
The MCP was a leader in many areas, including: the first operating system to manage multiple processors, the first commercial implementation of virtual memory, and the first OS written exclusively in a high-level language.
History
In 1961, the MCP was the first OS written exclusively in a high-level language (HLL). The Burroughs Large System (B5000 and successors) were unique in that they were designed with the expectation that all software, including system software, would be written in an HLL rather than in assembly language, which was a unique and innovative approach in 1961.
Unlike IBM, which faced hardware competition after the departure of Gene Amdahl, Burroughs software only ever ran on Burroughs hardware due to a lack of compatible third party hardware. For this reason, Burroughs was free to distribute the source code of all software it sold, including the MCP, which was designed with this openness in mind. For example, upgrading required the user to recompile the system software and apply any needed local patches. At the time, this was common practice, and was necessary as it was not unusual for customers (especially large ones, such as the Federal Reserve) to modify the program to fit their specific needs. As a result, a Burroughs Users Group was formed, which held annual meetings and allowed users to exchange their own extensions to the OS and other parts of the system software suite. Many such extensions have found their way into the base OS code over the years, and are now available to all customers. As such, the MCP could be considered one of the earliest open-source projects.
Burroughs was not the first manufacturer to distribute source code and was a late entry to electronic computing (compared to its traditional rivals NCR, IBM, and Univac). Now that MCP runs on commodity hardware, some elements of the MCP based software suite are no longer made available in source form by Unisys.
The MCP was the first commercial OS to provide virtual memory, which has been supported by the Burroughs large systems architecture since its inception. This scheme is unique in the industry, as it stores and retrieves compiler-defined objects rather than fixed-size memory pages, as a consequence of its overall non-von Neumann and uniformly stack-based architecture.
Unisys stopped producing the hardware in the early 2010s, and the operating system is now run under emulation.
File system
The MCP provides a file system with hierarchical directory structures. In early MCP implementations, directory nodes were represented by separate files with directory entries, as other systems did. |
https://en.wikipedia.org/wiki/Out%20of%20Control%20%28Kelly%20book%29 | Out of Control: The New Biology of Machines, Social Systems, and the Economic World () is a 1992 book by Kevin Kelly. Major themes in Out of Control are cybernetics, emergence, self-organization, complex systems, negentropy and chaos theory and it can be seen as a work of techno-utopianism.
Summary
The central theme of the book is that several fields of contemporary science and philosophy point in the same direction: intelligence is not organized in a centralized structure but much more like a bee-hive of small simple components. Kelly applies this view to bureaucratic organizations, intelligent computers as well as to the human brain.
Reception
The book was not widely reviewed when first released in 1992, but got visibly reviewed and extensively cited during the next several years. Reviews often discussed Kelly's hive-mind analogy as a metaphor for the New Economy.
Reviewers have called this book a "mind-expanding exploration" (Publishers Weekly) and "the best of an important new genre" (Forbes ASAP).
Critics of the book have contended that its position leaves us without a critical approach to politics and social power.
References
Further reading
The book's homepage (includes the complete book online)
1992 non-fiction books
1992 in the environment
Systems theory books
Works about technology
Futurology books
Collective intelligence |
https://en.wikipedia.org/wiki/Rod%20Smith | Rod, Rodney or Roderick Smith may refer to:
Sports
Rod Smith (sportscaster), sportscaster with The Sports Network
Rodney Smith (skateboarder), American skateboarder, co-founder of Zoo York
Rodney Smith (cricketer) (born 1944), English cricketer
Rodney Smith (wrestler) (born 1966), American Olympic wrestler
Rod Smith (ice hockey) (1894–1961), ice hockey player
Gridiron football
Rod Smith (wide receiver) (born 1970), American football wide receiver
Rod Smith (defensive back) (born 1970), American football defensive back
Rod Smith (running back) (born 1992), American football running back
Rodney Smith (wide receiver) (born 1990), American football wide receiver
Rodney Smith (running back) (born 1996), American football running back
Rod Smith (Canadian football) (1925–2016), Canadian Football League player
Rod Smith (American football coach) (born 1973), American football coach and quarterback
Others
Rod Smith (politician) (born 1949), former Florida State Senator and Chair of the Florida Democratic Party
Rod Smith (R/C modeling pioneer) (born 1926), R/C modeling pioneer
Rod Smith (poet) (born 1962), American poet and editor (edits the journal Aerial and publishes Edge Books)
Roderick Smith (RCAF officer) (1922–2002), flying ace of the Royal Canadian Air Force during the Second World War
R. T. Smith (Rodney, born 1947), American poet and editor
Rodney Smith (photographer) (1947–2016), portrait photographer
Rodney "Gipsy" Smith (1860–1947), British evangelist
Rodney K. Smith, American academic
Roots Manuva (born 1972), British rapper born Rodney Smith
Rodney Smith, Baron Smith (1914–1998), British surgeon
Rodney Smith (judge) (born 1974), Federal judge in Florida |
https://en.wikipedia.org/wiki/William%20Stallings | William Stallings is an American author. He has written computer science textbooks on operating systems, computer networks, computer organization, and cryptography.
Early life
Stallings earned his B.S. in electrical engineering from University of Notre Dame and his PhD in computer science from Massachusetts Institute of Technology.
Career
He maintains a website titled Computer Science Student Resource. He has authored 17 titles, and counting revised editions, a total of over 40 books on these subjects. He has been a technical contributor, technical manager, and an executive with several high-technology firms. He works as an independent consultant whose clients have included computer and networking manufacturers and customers, software development firms, and leading-edge government research institutions.
Recognition
He was awarded Computer Science textbook of the year from the Text and Academic Authors Association three times.
Books
Computer Organization and Architecture
Cryptography and Network Security: Principles and Practice
Data and Computer Communications
Operating Systems - Internals and Design Principles
Wireless Communications & Networks
Computer Security: Principles and Practice
Local and Metropolitan Area Networks
Network Security Essentials: Applications and Standards
Business Data Communications - Infrastructure, Networking and Security
References
External links
Williamstallings.com - Website for the books of William Stallings
Computer Science Student Resource Site
American computer scientists
21st-century American engineers
American technology writers
University of Notre Dame alumni
MIT School of Engineering alumni
Year of birth missing (living people)
Living people |
https://en.wikipedia.org/wiki/Ninety-Nines | The Ninety-Nines: International Organization of Women Pilots, also known as The 99s, is an international organization that provides networking, mentoring, and flight scholarship opportunities to recreational and professional female pilots. Founded in 1929, the
Ninety-Nines has 153 chapters and 27 regional 'sections' across the globe as of 2022, including a 'virtual' chapter, Ambassador 99s, which meets online for those who are too busy or mobile to be in one region for long.
Amelia Earhart was elected as their first president in 1931, and the organization has continued to make a significant impact supporting the advancement of women in aviation since its inception. In 1982, the Ninety-Nines received the National Aviation Hall of Fame Spirit of Flight Award, and were inducted into the Oklahoma Air Space Museum Hall of Fame in 2001. In 2002, the organization was selected as the recipient of the Frank G. Brewer Trophy by the National Aeronautic Association, and in 2014 became inducted into the International Air & Space Hall of Fame at the San Diego Air & Space Museum.
History
In August 1929, a small group of female pilots met informally in Cleveland, Ohio following the United States Women's Air Derby, and that group agreed that there was a need to form an organization to support women in the burgeoning field of aviation. Invitations to an initial meeting at a later date were sent out to all 117 female pilots licensed at the time. On November 2, 1929, the organization was founded at Curtiss Field near Valley Stream, New York by 26 licensed female pilots for the mutual support and advancement of "Women Pilots." At the suggestion of Amelia Earhart, the organization's name was taken from the number of charter members, settling on "Ninety-Nines" based on responses received by Christmas.
Membership
Charter members include:
Amelia Earhart
(president 1931–1933)
Mary C. Alexander
Ruth Elder
Viola Gentry
Fay Gillis
Mary Goodrich
Florence Klingensmith
Opal Kunz
Ila Loetscher
Ruth Rowland Nichols
Phoebe Omlie
Thea Rasche
Marjorie Stinson
Louise Thaden
Mary Webb Nicholson
Helen Cox Bikle
Nellie Zabel Willhite
Other notable members include:
Margaret Adams
Ruth Alexander
Suzie Azar
Pancho Barnes
Janet Zaph Briggs
Maie Casey, Baroness Casey
Katherine Sui Fun Cheung
Jackie Cochran
(president 1941–1943)
Eileen Collins
Marjorie Crawford
Betty Gillies
Linda M. Godwin
Kathryn Hach-Darrow
Nancy Hopkins
Elvy Kalep
Peggy Kelman
Theresa M. Korn
Dot Lemon
Elsie MacGill
Anésia Pinheiro Machado
Pamela Melroy
Betty Miller (pilot)
Terry Neese
Norah O'Neill
Dorothy Rungeling
Sheila Scott
Katharine Stinson
Jane Straughan
Manila Davis Talley
Penny Thompson
Bobbi Trout
Hermelinda Urvina
Patty Wagstaff
Shannon Walker
Nancy-Bird Walton
Jessie E. Woods
Edna Gardner Whyte
(president 1955–1957)
Jeana Yeager
Charter member Margaret Thomas "Tommy" Warren believes she might have been the youngest charter member of the 99's – |
https://en.wikipedia.org/wiki/Shadow%20of%20Memories | (Shadow of Destiny in North America) is a mystery adventure game developed by Konami Computer Entertainment Tokyo and published by Konami. Originally released for the PlayStation 2 in 2001, it was later ported to Xbox (which is only released in Europe) and Microsoft Windows in 2002. A PlayStation Portable version was released on October 1, 2009 in Japan and on January 26, 2010 in North America.
Gameplay
The objective of Shadow of Memories is to guide player character Eike Kusch through the fictional German town of Lebensbaum (Life's Tree) as he travels through time to prevent and unmask his murderer. The game takes place in three parts: a prologue, eight chapters, and an epilogue. In the prologue and each chapter, Eike dies, is resurrected by the non-player character Homunculus, and travels back in time before his death with the intent of changing events to prevent it. Shadow of Memories lacks traditional action elements, and Eike cannot attack nor does he have a bar displaying his health. The digipad, a time-traveling item given to Eike by Homunculus, requires energy units, which the player can find scattered around the town. The gameplay primarily consists of time-traveling through the different eras, finding items, and interacting through dialogue with the non-player characters. Actions taken in one time period affect future ones; for example, if Eike removes a seal from the squire's manor in 1580, the seal will not appear in the present era.
Additionally, the game keeps two digital clocks: one depicting the time in the present-day era and another for whichever era Eike time-travels to. The amount of time Eike spends in the different eras also passes in the present-day one. The cut-scenes and dialogue takes up varying amounts of in-game time. When the clock arrives at the time of Eike's death, the chapter restarts, however, if Eike is not in his time period at the time of his death, the game ends.
Plot
Set in a fictional German town named Lebensbaum (The Tree of Life), Shadow of Memories revolves around a 22-year-old man named Eike Kusch, who dies in the beginning of the game from being stabbed after leaving a small diner. However, he is resurrected by Homunculus (voiced by Charles Martinet in the first English dub), a djinn or genie, who offers to send him back in time to prevent his death and gives him the time-traveling digipad. Eike explores four eras—2001, 1979/1980, 1902 and 1580 to 1584 — as he attempts to unmask his killer and figure out a way of stopping his own murder at various points in the present. Along the way he encounters several characters: Dana, a modern-day waitress whom he accidentally brings back to the year 1580 and loses; the present-day fortune teller, who tells Eike the hour of his death; Eckart Brum, the curator of a private art museum who lost his wife and infant daughter in a shooting; Dr. Wolfgang Wagner, an alchemist living in 1580 with his wife, Helena, and their two children, Hugo and Margarete; and Alfred |
https://en.wikipedia.org/wiki/CTN | CTN may refer to:
Television
bTV Action, a Bulgarian channel (formerly known as CTN)
Cambodian Television Network, Cambodia
Channel 31 (Sydney), which used the callsign CTN-31
Christian Television Network, a Christian broadcast television network in the United States
Chung T'ien Television, a television network based in Taiwan (formerly Chinese Television Network)
Connecticut Network, or CT-N (often misidentified as CTN)
MTVU, United States (formerly College Television Network)
Transport
Charlton railway station (National Rail station code CTN), London, England
Compagnie Tunisienne de Navigation, a Tunisian ferry operator
Cooktown Airport (IATA: CTN)
Croatia Airlines (ICAO: CTN)
Other uses
CTN (retail), Confectionery, Tobacco, and News retailers
CTN Animation Expo, Creative Talent Network Animation Expo in Burbank, California
ctn, a notation for cotangent trigonometric function
Camp Tel Noar, a USA summer camp
Cardiac troponin, see troponin test
Central de Trabajadores Nicaragüenses, the Nicaraguan Workers' Centre
Cryptologic Technician, a U.S. Navy specialist rating |
https://en.wikipedia.org/wiki/Omidyar%20Network | Omidyar Network is a self-styled "philanthropic investment firm," composed of a foundation and an impact investment firm. Established in 2004 by eBay founder Pierre Omidyar and his wife Pam, Omidyar Network has committed over US$1.5billion to nonprofit organizations and for-profit companies across multiple investment areas. According to the OECD, Omidyar Network's financing for 2019 development increased by 10% to US$58.9 million.
Structure
Composed of a 501(c)(3) and a Limited Liability Company (LLC), Omidyar Network is structured to work across the social, business, and government sectors. Like a traditional foundation, it makes grants through its 501(c)(3) entity; through its LLC, it invests in for-profit entities. It is a part of The Omidyar Group.
In 2018, Omidyar Network spun off its Governance & Citizen Engagement initiative. The group now operates as Luminate, a global philanthropic organization that invests in civic empowerment, data and digital rights, financial transparency, and independent media. It is led by Stephen King.
In 2019, Omidyar Network spun off its Financial Inclusion initiative. The group now operates as Flourish and is led by Tilman Ehrbeck, Arjuna Costa, and Emmalyn Shaw.
People
As of 2022, the CEO of Omidyar Network is Mike Kubzansky. Its board of directors include the managing directors of The Omidyar Group, Jeff Alvord and Pat Christen.
As of 2022, the organization has offices in Silicon Valley, Bengaluru, London, Mumbai, Nairobi, and Washington, D.C.
Investees
Omidyar Network invested in the microfinance sector, including Unitus Inc.
In 2009, the Omidyar Network donated $2 million over two years to the Wikimedia Foundation, and at the same time, Matt Halprin of Omidyar Network was appointed to Wikimedia's board of directors.
From 2012, Omidyar Network has been a partner of Better Than Cash Alliance.
In 2017, Omidyar Network together with AVINA Americas and Avina Foundation founded the Latin American Alliance for Civic Technology (ALTEC) to invest in and support the development in Latin America of civic technology platforms and related scalable technologies.
In 2020, it invested $150,000 in the legal assistance organization Whistleblower Aid.
See also
Acumen Fund
Bill and Melinda Gates Foundation
Blue Haven Initiative
Jasmine Social Investments
Mulago Foundation
Peery Foundation
Philanthrocapitalism
Skoll Foundation
References
External links
The Omidyar Group
Foundations based in the United States
2004 establishments in California |
https://en.wikipedia.org/wiki/PBJ | PBJ or PB&J is a peanut butter and jelly sandwich, popular in North America.
PBJ or PB&J may also refer to:
PBJ (TV network), a children's television network in the United States
PB&J Television
PBJ-1, US Navy variant of the B-25 Mitchell bomber
PB&J Otter, kid's program
PBJ or PB&J may abbreviate for:
Peanut Butter Jelly (song)
Peanut Butter Jelly Time, song
Probation before judgment In Maryland, deferred adjudication is called "Probation Before Judgment" or "PBJ" for short.
Progressive Black & Journalists, an African-American journalism organization
Peter Bjorn and John, a Swedish indie pop band
Patrick Baldwin Jr., an American basketball player for the Golden State Warriors
See also
or
or |
https://en.wikipedia.org/wiki/IBM%20PALM%20processor | The PALM (Program All Logic in Microcode) is a 16-bit central processing unit (CPU) developed by IBM. It was used in the IBM 5100 Portable Computer, a predecessor of the IBM PC, and the IBM 5110 and IBM 5120 follow-on machines. It is likely PALM was also used in other IBM products as an embedded controller.
IBM referred to PALM as a microprocessor, though they used that term to mean a processor that executes microcode to implement a higher-level instruction set, rather than its conventional definition of a CPU on an integrated circuit. The PALM processor was a circuit board containing 13 bipolar gate arrays packaged in square metal cans, 3 conventional transistor–transistor logic (TTL) ICs in dual in-line packages, and 1 round metal can part.
The PALM was used to implement an emulator, which in turn could run machine instructions originally written for other machines; this is how IBM System/360 APL ran on the 5100.
PALM has a 16-bit data bus, with two additional bits used for parity. PALM can directly address 64KB (64KiB) of memory. The IBM 5100 could be configured with up to 64+KB (APL + BASIC ROMs make 64+KB) of Executable ROS (ROM) and up to 64KB of RAM. A simple bank switching scheme was used to extend the address space.
In 1973, the IBM Los Gatos Scientific Center developed a portable computer prototype called SCAMP (Special Computer APL Machine Portable) based on the PALM processor with a Philips compact cassette drive, small CRT display, and full-function keyboard.
References
External links
about various Microcode implementations
Pictures
Daves Old Computers, This page has a link with a picture of the IBM PALM circuit board as well as many photos of the IBM 5100. The Maintenance Information Manual linked at the bottom of the page includes an appendix describing the microcode.
PALM
IBM microprocessors |
https://en.wikipedia.org/wiki/Individual%20Computers%20Catweasel | The Catweasel is a family of enhanced floppy-disk controllers from German company Individual Computers. These controllers are designed to allow more recent computers, such as PCs, to access a wide variety of older or non-native disk formats using standard floppy drives.
Principle
The floppy controller chip used in IBM PCs and compatibles was the NEC 765A. As technology progressed, descendants of these machines used what were essentially extensions to this chip. Many other computers, particularly ones from Commodore and early ones from Apple, write disks in formats which cannot be encoded or decoded by the 765A, even though the drive mechanisms are more or less identical to ones used on PCs. The Catweasel was therefore created to emulate the hardware necessary to produce these other low-level formats.
The Catweasel provides a custom floppy drive interface in addition to any other floppy interfaces the computer is already equipped with. Industry standard floppy drives can be attached to the Catweasel, allowing the host computer to read many standard and custom formats by means of custom software drivers.
Supported formats:
Versions
The initial version of the Catweasel was introduced in 1996 and has since undergone several revisions. The Catweasel Mk1 and Mk2, for the Commodore Amiga 1200 and Amiga 4000, sold out in October 2001. The Mk3 added PCI compatibility and sold out in mid-2004. It was succeeded by the Mk4. The Mk2 was re-released in 2006 as a special "Anniversary Edition".
Mk1
The original version of the Catweasel was introduced in 1996 for the Amiga computer, and was available in two versions - one for the Amiga 1200 and one for the Amiga 4000. The Amiga 1200 version connected to the machine's clock port; the Amiga 4000 version connected to the machine's IDE port. A pass-through was provided on the Amiga 4000 version so that the IDE port could still be used for mass storage devices.
ISA
A version of the Catweasel controller was developed for use in a standard PC ISA slot as a means of reading custom non-PC floppy formats from MS-DOS. Custom DOS commands are required to use the interface. Official software and drivers are also available for Windows.
Mk2 and Mk2 Anniversary Edition
The Mk2 Catweasel was a redesign of the original Catweasel, merging the Amiga 1200 and Amiga 4000 versions into a single product that could be used on both computers, and providing a new PCB layout that allowed it to be more easily installed in a standard Amiga 1200 case.
The continued popularity of the Catweasel Mk2 led to a special "Anniversary Edition" of this model being released in 2006. The PCB of the Anniversary Edition received minor updates, however it retained the same form factor and functionality as the Mk2.
Z-II
The Catweasel Z-II version was an Amiga Zorro-II expansion that combined the Catweasel Mk2 controller with another Individual Computers product, the Buddha, on a single board providing floppy and IDE interfaces to the host compute |
https://en.wikipedia.org/wiki/Philips%20P2000 | The Philips P2000T home computer was Philips' first real entry in the home computer market in 1980, after the Philips Videopac G7000 game system (better known in North America as the Magnavox Odyssey2) which they already sold to compete with the Atari 2600 and similar game systems. There was also a P2000M version with an additional 80-column text card for use with a monochrome monitor. This version shipped with a monitor cabinet also housing a dual 5.25" floppy drive. The P2000C version, introduced in 1982, was portable.
The P2000 systems can be emulated with the MESS software, and since 2015 they are part of MAME. Other emulators also exist.
P2000T
The P2000T was a Z80-based home computer that used a Mullard SAA5050 teletext display chip to produce the video picture and a small Mini-Cassette recorder for 42 kilobytes of mass storage capacity. The Mini-Cassette was treated as a floppy drive from the user's perspective while using the automatic search for a program (CLOAD command) or free space (CSAVE ). A command to display the directory of the cassette also exists.
Philips used components they already produced for other markets (television sets and dictation machines) to quickly design a small computer system. It was partially designed by Austrian professor Dieter Hammer. They also copied the ROM cartridge system from their Videopac G7000 game system. One of these cartridges contained Microsoft BASIC. It was also possible to use cassette tape floppies.
Although the teletext video chip permitted a quick entry into the home computer market, it was also the major weakness of the P2000T. Using the teletext standard in itself was not a bad idea because it did support eight colors and rudimentary semigraphics. But unlike later entries in the home computer market also supporting a teletext display mode, such as the venerable BBC computer and the Oric Atmos, the P2000T did not support a high resolution display mode. This made it very difficult to develop interesting games for it, with only a few titles being released.
As a result, the P2000T had only limited success, and Philips later replaced it with their MSX machines. The machine did gain popularity in Netherlands, especially in the areas of science, education, and data communications (videotex).
Initially, in 1981, the computer cost 3000 guilders (€2725 in 2015's money). In 1984 the price was lowered to 1200 guilders (€967 in 2015's money).
P2000M
The P2000M incorporated two 5,25-inch floppy disk drives, besides a built-in monochrome screen. It could run CP/M or Microsoft BASIC applications, depending on the cartridge used. It was incompatible with the P2000T due to the way it handled display of special characters (color, "graphics mode"), which made most P2000T games unplayable.
References
External links
P2000 architecture
Philips products
Z80-based home computers
Home computers |
https://en.wikipedia.org/wiki/Nobuo%20Yoneda | was a Japanese mathematician and computer scientist.
In 1952, he graduated the Department of Mathematics, the Faculty of Science, the University of Tokyo, and obtained his Bachelor of Science. That same year, he was appointed Assistant Professor in the Department of Mathematics of the University of Tokyo. He obtained his Doctor of Science (DSc) degree from the University of Tokyo in 1961, under the direction of Shokichi Iyanaga. In 1962, he was appointed Associate Professor in the Faculty of Science at Gakushuin University, and was promoted in 1966 to the rank of Professor. He became a professor of Theoretical Foundation of Information Science in 1972. After retiring from the University of Tokyo in 1990, he moved to Tokyo Denki University.
The Yoneda lemma in category theory and the Yoneda product in homological algebra are named after him.
In computer science, he is known for his work on dialects of the programming language ALGOL. He became involved with developing international standards in programming and informatics, as a Japanese representative on the International Federation for Information Processing (IFIP) IFIP Working Group 2.1 on Algorithmic Languages and Calculi, which specified, supports, and maintains the languages ALGOL 60 and ALGOL 68.
References
External links
1930 births
1996 deaths
Japanese computer scientists
20th-century Japanese mathematicians
University of Tokyo alumni
Academic staff of the University of Tokyo
Academic staff of Gakushuin University
Academic staff of Tokyo Denki University |
https://en.wikipedia.org/wiki/Datalog | Datalog is a declarative logic programming language. While it is syntactically a subset of Prolog, Datalog generally uses a bottom-up rather than top-down evaluation model. This difference yields significantly different behavior and properties from Prolog. It is often used as a query language for deductive databases. Datalog has been applied to problems in data integration, networking, program analysis, and more.
Example
A Datalog program consists of facts, which are statements that are held to be true, and rules, which say how to deduce new facts from known facts. For example, here are two facts that mean xerces is a parent of brooke and brooke is a parent of damocles:
parent(xerces, brooke).
parent(brooke, damocles).
The names are written in lowercase because strings beginning with an uppercase letter stand for variables. Here are two rules:
ancestor(X, Y) :- parent(X, Y).
ancestor(X, Y) :- parent(X, Z), ancestor(Z, Y).
The :- symbol is read as "if", and the comma is read "and", so these rules mean:
X is an ancestor of Y if X is a parent of Y.
X is an ancestor of Y if X is a parent of some Z, and Z is an ancestor of Y.
The meaning of a program is defined to be the set of all of the facts that can be deduced using the initial facts and the rules. This program's meaning is given by the following facts:
parent(xerces, brooke).
parent(brooke, damocles).
ancestor(xerces, brooke).
ancestor(brooke, damocles).
ancestor(xerces, damocles).
Some Datalog implementations don't deduce all possible facts, but instead answer queries:
?- ancestor(xerces, X).
This query asks: Who are all the X that xerces is an ancestor of? For this example, it would return brooke and damocles.
Comparison to relational databases
The non-recursive subset of Datalog is closely related to query languages for relational databases, such as SQL. The following table maps between Datalog, relational algebra, and SQL concepts:
More formally, non-recursive Datalog corresponds precisely to unions of conjunctive queries, or equivalently, negation-free relational algebra.
s(x, y).
t(y).
r(A, B) :- s(A, B), t(B).
CREATE TABLE s (
z0 TEXT NONNULL,
z1 TEXT NONNULL,
PRIMARY KEY (z0, z1)
);
CREATE TABLE t (
z0 TEXT NONNULL PRIMARY KEY
);
INSERT INTO s VALUES ('x', 'y');
INSERT INTO t VALUES ('y');
CREATE VIEW r AS
SELECT s.z0, s.z1
FROM s, t
WHERE s.z1 = t.z0;
Syntax
A Datalog program consists of a list of rules (Horn clauses). If constant and variable are two countable sets of constants and variables respectively and relation is a countable set of predicate symbols, then the following BNF grammar expresses the structure of a Datalog program:
<program> ::= <rule> <program> | ""
<rule> ::= <atom> ":-" <atom-list> "."
<atom> ::= <relation> "(" <term-list> ")"
<atom-list> ::= <atom> | <atom> "," <atom-list> | ""
<term> ::= <constant> | <variable>
<term-list> ::= <term> | <term> "," <term-list> | ""
Atoms are also referred to as . The atom to the left of the :- symbol is |
https://en.wikipedia.org/wiki/Grace%20%28plotting%20tool%29 | Grace is a free WYSIWYG 2D graph plotting tool, for Unix-like operating systems. The package name stands for "GRaphing, Advanced Computation and Exploration of data." Grace uses the X Window System and Motif for its GUI. It has been ported to VMS, OS/2, and Windows 9*/NT/2000/XP (on Cygwin). In 1996, Linux Journal described Xmgr (an early name for Grace) as one of the two most prominent graphing packages for Linux.
History
Grace is a descendant of the ACE/gr plotting tool (also known as Xvgr), based on Xview libraries from OpenWindows. Xvgr was originally written by Paul Turner of Portland, Oregon, who continued development until version 4.00. In 1996, development was taken over by the ACE/gr development team, led by Evgeny Stambulchik at the Weizmann Institute of Science, Israel. Development of Xmgr was frozen at version 4.1.2 in 1998 and the Grace project was started as a fork, released under the GPL. The name stands for "GRaphing, Advanced Computation and Exploration of data" or "Grace Revamps ACE/gr" Turner still maintains a non-public version of Xmgr for internal use. The first version of Grace was numbered 5.0.0 and the latest stable version, 5.1.25 (released February 2015). Whether the development of the next major release 6.0.0 is still in progress is unclear. The latest preview versions numbered 5.99.* were released in 2007.
Currently maintained versions
Noteworthy alternate versions of Grace include GraceGTK, forked from Grace 5.1.22 in 2009 by Patrick Vincent, and QtGrace, released in 2011 by Andreas Winter.
Both of these versions of Grace work natively on Windows operating systems and had releases in 2017.
Features
Grace can be used from a point-and-click interface or scripted (using either the built-in programming language or a number of language bindings). It performs both linear and nonlinear least-squares fitting to arbitrarily complex user-defined functions, with or without constraints. Other analysis tools include FFT, integration and differentiation, splines, interpolation, and smoothing.
Programs using Grace
GROMACS
MOLPRO
NAMD
Visual Molecular Dynamics
AptPlot
See also
List of graphing software
References
External links
Grace Home page
ACE/gr Home page
QtGrace Home page
GraceGTK Home page
Free plotting software
Plotting software
Software that uses Motif (software)
X Window programs |
https://en.wikipedia.org/wiki/Mungyeong | Mungyeong (; ) is a city in North Gyeongsang Province, South Korea. The local government, economy, and transportation networks are all centered in Jeomchon, the principal town. Mungyeong has a lengthy history, and is known today for its various historic and scenic tourist attractions. The city's name means roughly "hearing good news." Recently, development has been somewhat stagnant with the decline of the coal industry. Since the 1990s, the proportion of people who rely on the tourism industry through Mungyeong Saejae has gradually increased.
The city of Mungyeong was created after Jeomchon City and rural Mungyeong County were combined in 1995. It is now an urban-rural complex similar to 53 other small and medium-sized cities with a population under 300,000 people in South Korea.
History
The Mungyeong area is believed to have been controlled by a mixture of Jinhan and Byeonhan states during the Samhan period in the first centuries of the Common Era. The Jinhan state of Geungi-guk may have been located near Sanyang-myeon. Byeonhan states such as Sabeol-guk and Gosunsi-guk, which probably controlled the Hamchang area of Sangju, may also have extended their control over adjacent areas that are now part of Mungyeong. However, this stage of local history is almost entirely hypothetical, since very little evidence of any kind remains.
At any rate, the rising power of Silla controlled the area by 505. Capitalizing on the territory's strategic potential, Silla set up various mountain fortresses in the area to control movement in and out of western Korea. Control of transit through the area would have gained even greater importance after Silla's 553 seizure of the Han River valley on the western side of the mountains. At this time the low Haneuljae pass near Poam Mountain was probably the favored crossing, in contrast to the higher Mungyeong Saejae pass which came into favor in the Joseon period.
As Silla reorganized its administrative structure under King Seongdeok in 757, the Mungyeong area was placed under the province of Sangju, and divided among various hyeon, or local districts. During this Unified Silla period the temple of Gwaneumsa, of which all but a few traces have vanished, was constructed near Haneuljae in present-day Mungyeong-eup.
In the early Goryeo period, in 983, King Seongjong reorganized local government yet again. Most of Mungyeong remained divided into assorted hyeon, under the central jurisdiction of Sangju. In 1390, Mungyeong-gun (Mungyeong County) begins to appear in the records, although not with its current boundaries.
In the Joseon period, the Eight Provinces were laid out and thus Mungyeong became part of Gyeongsang, which it remains. During later Joseon times, the road from Seoul to Busan was established running over Mungyeong Saejae. Beginning in the 18th century, gates were erected on the road to control traffic and protect travelers from brigandage. These gates are still preserved today.
The first rai |
https://en.wikipedia.org/wiki/PII | PII may refer to:
Personal data, also known as personally identifiable information (PII)
Pentium II, a computer processor
Polaris Inc., New York Stock Exchange stock symbol PII
Public-interest immunity, previously known as Crown privilege, in English common law
Publisher Item Identifier, in scientific journals
Professional indemnity insurance
Proto-Indo-Iranian language
Indonesian Islamic Party |
https://en.wikipedia.org/wiki/Connolly%20station | Connolly station () or Dublin Connolly is one of the busiest railway stations in Dublin and Ireland, and is a focal point in the Irish route network. On the North side of the River Liffey, it provides InterCity, Enterprise and commuter services to the north, north-west, south-east and south-west. The north–south Dublin Area Rapid Transit (DART) and Luas red line light rail services also pass through the station. The station offices are the headquarters of Irish Rail, Iarnród Éireann. Opened in 1844 as Dublin Station, the ornate facade has a distinctive Italianate tower at its centre.
History
On 24 May 1844 the Dublin and Drogheda Railway (DDR) began public operations from an interim terminus at the Royal Canal, and on the same day the foundation stone for what is now Connolly station was laid by Earl de Grey, Lord Lieutenant of Ireland. The station was opened for operations on 29 November 1844 as Dublin Station, but was renamed Amiens Street Station ten years later, after the street where it is located. The terminus building, which was also to be the DDR's headquarters, designed by William Deane Butler, was constructed of Wicklow granite at a cost of £7,000 and opened in 1846. The flight of steps from the street was to prove difficult for luggage porters and some thirty year later a sloped ramp from opposite Store Street was created to allow step-free pedestrian and vehicle access to platform level.
Originally the station served only a single mainline to Drogheda, and in 1853 through services to Belfast commenced, and an amalgamated company, the Great Northern Railway Ireland (GNRI) taking over operations. In 1879, architect John Lanyon designed a red sandstone and brick headquarters for the GNRI.
In 1891, the City of Dublin Junction Railway opened a separate station called Amiens Street Junction immediately next to the DDR's station. Amiens Street Junction had through platforms, allowing passengers to travel over the Loopline Bridge to Westland Row on the city's Southside and onwards to Rosslare.
In 1937, the MGWR's Broadstone Station was closed, and the services to Sligo were transferred to Westland Row via Amiens Street Junction.
After the amalgamation of the GNR (I) at the end of the 1950s, the two stations were merged into one, simply called Amiens Street. The platforms built by the DDR became platforms 1–4, now used for Intercity and Enterprise trains to Sligo and Belfast; the platforms built by the CDJR became platforms 5–7, used for DART, Commuter and Rosslare services; the DDR's station building became the main passenger entrance and ticket hall; and the CDJR's building fell into disuse.
In 1966, the 50th anniversary of the Easter Rising, Amiens Street was selected as one of fifteen main stations in Ireland to have their names changed to honour patriots executed for their roles in the rising. Amiens Street was renamed Connolly Station, after revolutionary socialist James Connolly.
Services to Galway and County Mayo, via Mullinga |
https://en.wikipedia.org/wiki/Dragon%20Data | Dragon Data Ltd. was a Welsh producer of home computers during the early 1980s. These computers, the Dragon 32 and Dragon 64, strongly resembled the Tandy TRS-80 Color Computer ("CoCo")—both followed a standard Motorola datasheet configuration for the three key components (CPU, SAM and VDG). The machines came in both 32KB and (later) 64KB versions.
History
The history of Dragon Data in the period 1982–84 was a checkered one. The company was originally set up by toy company Mettoy, and after initial good sales looked to have a bright future. At its high point it entered negotiations with Rexnord's Tano Corporation to form a North American branch. Mettoy then suffered financial difficulties, casting a shadow on the future of Dragon Data before it was spun off as a separate company. However, a number of circumstances (the delay in introducing the 64K model, poor colour support with a maximum of 4 colours displayable in "graphics mode" and only 2 colours in the highest 256 × 192 pixel mode, the late introduction of the external disk unit and of the supporting OS9-based software) caused the company to lose market share.
To combat this, under the control of GEC, Dragon Data worked on the next generation of Dragon computers; the Dragon Alpha (or Professional) and Beta (or 128). These systems only made it to the prototype stage before the business went into receivership and was sold on to the Spanish startup Eurohard in 1984. Eurohard also suffered financial problems and went into receivership a couple of years later after the release of the Dragon 200.
In addition to the Dragon 32 and 64, an MSX-compatible machine, the Dragon MSX reached the prototype stage.
References
Smeed, D. & Sommerville, I. (1983). Inside the Dragon. Addison-Wesley.
External links
A Slayed Beast - History of the Dragon computer – From The DRAGON Archive
Dedicated DRAGON wiki
Defunct computer hardware companies
Defunct computer companies of the United Kingdom
Defunct companies of Wales
Home computer hardware companies
Computer companies established in 1982
Computer companies disestablished in 1984
1982 establishments in Wales
1984 disestablishments in Wales
Manufacturing companies of Wales |
https://en.wikipedia.org/wiki/Temporal%20Key%20Integrity%20Protocol | Temporal Key Integrity Protocol (TKIP ) is a security protocol used in the IEEE 802.11 wireless networking standard. TKIP was designed by the IEEE 802.11i task group and the Wi-Fi Alliance as an interim solution to replace WEP without requiring the replacement of legacy hardware. This was necessary because the breaking of WEP had left Wi-Fi networks without viable link-layer security, and a solution was required for already deployed hardware. However, TKIP itself is no longer considered secure, and was deprecated in the 2012 revision of the 802.11 standard.
Background
On October 31, 2002, the Wi-Fi Alliance endorsed TKIP under the name Wi-Fi Protected Access (WPA). The IEEE endorsed the final version of TKIP, along with more robust solutions such as 802.1X and the AES based CCMP, when they published IEEE 802.11i-2004 on 23 July 2004. The Wi-Fi Alliance soon afterwards adopted the full specification under the marketing name WPA2.
TKIP was resolved to be deprecated by the IEEE in January 2009.
Technical details
TKIP and the related WPA standard implement three new security features to address security problems encountered in WEP protected networks. First, TKIP implements a key mixing function that combines the secret root key with the initialization vector before passing it to the RC4 cipher initialization. WEP, in comparison, merely concatenated the initialization vector to the root key, and passed this value to the RC4 routine. This permitted the vast majority of the RC4 based WEP related key attacks. Second, WPA implements a sequence counter to protect against replay attacks. Packets received out of order will be rejected by the access point. Finally, TKIP implements a 64-bit Message Integrity Check (MIC) and re-initializes the sequence number each time when a new key (Temporal Key) is used.
To be able to run on legacy WEP hardware with minor upgrades, TKIP uses RC4 as its cipher. TKIP also provides a rekeying mechanism. TKIP ensures that every data packet is sent with a unique encryption key(Interim Key/Temporal Key + Packet Sequence Counter).
Key mixing increases the complexity of decoding the keys by giving an attacker substantially less data that has been encrypted using any one key. WPA2 also implements a new message integrity code, MIC. The message integrity check prevents forged packets from being accepted. Under WEP it was possible to alter a packet whose content was known even if it had not been decrypted.
Security
TKIP uses the same underlying mechanism as WEP, and consequently is vulnerable to a number of similar attacks. The message integrity check, per-packet key hashing, broadcast key rotation, and a sequence counter discourage many attacks. The key mixing function also eliminates the WEP key recovery attacks.
Notwithstanding these changes, the weakness of some of these additions have allowed for new, although narrower, attacks.
Packet spoofing and decryption
TKIP is vulnerable to a MIC key recovery attack that, if suc |
https://en.wikipedia.org/wiki/Not%20Quite%20C | Not Quite C (NQC) is a programming language, application programming interface (API), and native bytecode compiler toolkit for the Lego Mindstorms, Cybermaster and LEGO Spybotics systems. It is based primarily on the C language but has specific limitations, such as the maximum number of subroutines and variables allowed, which differ depending on the version of firmware the RCX has. The language was invented by David Baum. He has released two books on the subject.
Simple program example
A simple test program written in NQC for an RCX with a motor connected to output port A could look like this:
task main () // Main program
{
SetPower(OUT_A, OUT_FULL); // Turn on motor A at 100% power.
OnFor(OUT_A, 200); // Let the motor run for two seconds, and then turn it off.
}
Thus, motor A will go at full speed for two seconds before being turned off.
Compilers and integrated development environments
NQC compilers and integrated development environments (IDEs) are available for many platforms including Microsoft Windows, Mac OS X, Linux, BeOS, and MS-DOS. One is the Bricx Command Center.
References
External links
NQC Homepage
NQC tutorial by Mark Overmars
NQC tutorial by Matt Miller
Compiler sources:
for Ubuntu
IDE sources:
for DOS
for BeOS
for OS X (Snow Leopard or Earlier)
for Windows
for Linux
Lego Mindstorms
C programming language family
Robot programming languages |
https://en.wikipedia.org/wiki/MicroBee | MicroBee (or Micro Bee) was a series of networkable home computers by Applied Technology, which became publicly listed company MicroBee Systems Limited soon after its release. The original Microbee computer was designed in Australia by a team including Owen Hill and Matthew Starr.
The MicroBee's most distinctive features are its user configurable video display (capable of mimicking the displays of other computers and devices including the TRS-80, Sorcerer and SOL20 with later colour and graphic models 40 and 80 column terminals, Super-80, ZX Spectrum, early arcade machines, Amstrad CPC 464) and its battery backed non-volatile RAM and small size allowing it to be powered off, transported, and powered back on and resume activities on the currently loaded program or document.
It was originally packaged as a two board unit with the lower "baseboard" containing all components except the system memory which was mounted on the upper "core board".
Components
The original main board consisted of:
Z80 CPU
Z80 PIO
6545 CRT controller
2 KB Screen RAM
2 KB Character ROM (128 characters)
2 KB Programmable Character Graphics (PCG) RAM (128 characters)
Keyboard
Speaker
Tape Input/Output
Video Out
Serial Port
User Parallel Port
Power Connector
The original coreboards consisted of:
Either 32KB capacity or 56KB capacity 6116 battery backed Non-volatile RAM
Either 16KB BASIC ROM or 4KB BOOT ROM
50 way System Expansion port
Provision for 8KB Expansion ROM on 32KB Max capacity version
A floppy disk drive unit and S-100 Bus expansion unit were available. They connected to a microbee by a 50 way ribbon cable to the System Expansion port.
The microbee had two networking options - BeeNet and StarNet. The BeeNet was a low cost low speed LAN (Local Area Network) for 16-32K ROM Models and the StarNet was for the 64K and larger DRAM models.
The BeeNet uses a bus topology that uses synchronous serial transfers. The StarNet uses a single Star topology using dedicated 8 bit parallel data bus connections between the central hub and its remote spokes.
Ancestry
The microbee was the integration, simplification and modernisation of the following S-100 cards sold by Applied Technology, Microworld BASIC and DGOS Monitor for their System Z.A.T. chassis.
DG680 CPU - Z80 Single board Computer designed by David Griffiths
MW640/DG640 VDU - Visual Display Unit designed by David Griffiths. (The DG640 VDU was itself was based upon the Processor Technology VDM-1.)
TCT-PCG - Programmable Character Generator for the DG640 VDU designed by Craig Barratt
MW864 - MEGAMEMORY 64K Static RAM Memory board designed by Owen Hill
MW2516 - 16K ROM 16K ROM Card designed by Owen Hill
MW6545 - User Programmable VDU designed by John Wilmshurst
The removal of the S-100 bus support and configuration hardware and some other features made the microbee much simpler and cheaper than its ancestors.
Examples:
The VDU Attribute RAM of the DG640 VDU was not employed in the or |
https://en.wikipedia.org/wiki/Vijay%20S.%20Pande | Vijay Satyanand Pande is a Trinidadian–American scientist and venture capitalist. Pande is the former director of the biophysics program and is best known for orchestrating the distributed computing disease research project known as Folding@home. His research is focused on distributed computing and computer-modelling of microbiology and on improving computer simulations regarding drug-binding, protein design, and synthetic bio-mimetic polymers. Pande became the ninth general partner at venture capital firm Andreessen Horowitz in November 2015. He is the founding investor of their Bio + Health Fund.
Career
Pande is an adjunct professor of bioengineering at Stanford University. Previously, he was the Henry Dreyfus Professor of Chemistry and professor of structural biology and of computer science. He was also director of the biophysics program.
Pande serves on the boards of Apeel Sciences, Bayesian Health, BioAge Labs, Citizen, Devoted Health, Freenome, Insitro, Nautilus Biotechnology, Nobell, Omada Health, Q.bio, and Scribe Therapeutics, a CRISPR company co-founded by 2020 Nobel Laureate Jennifer Doudna. He has also been a founder and advisor to startups in Silicon Valley.
Pande has written for TIME, STAT News, Fortune, and the New York Times, among others.
Globavir Biosciences, Inc.
In 2014, Pande co-founded Globavir Biosciences, an infectious disease startup addressing antibiotic resistance threats in developed countries as well as needs in viral infections around the world, including Ebola and dengue fever.
Pande Lab at Stanford University
Pande founded the Pande Lab at Stanford University. The lab brings together researchers from many departments, including Chemistry, Computer Science, Structural Biology, Physics, Biophysics, and Biochemistry.
Distributed computing
Pande is the founder of the Folding@home research project.
The protein-folding computer simulations from the Folding@home project is said to be "quantitatively" comparable to real-world experimental results. The method for this yield has been called a "holy grail" in computational biology.
The Folding@home project was recognized by the Guinness Book of World Records in 2007 as the most powerful distributed computing network in the world.
Pande directed the Genome@home project with the goal to understand the nature of genes and proteins by virtually designing new forms of them. Genome@home started to close as early as March 2004, after accumulating a large database of protein sequences.
Some of the programs and libraries involved are free software with GPL, LGPL, and BSD licenses, but the folding@home client and core remain proprietary.
Stanford Bitcoin Group and Bitcoin Mafia
With colleague Balaji Srinivisan, Pande supervised the Stanford Bitcoin Group, a bitcoin research team born of hackathon activities in Pande and Srinvisan’s Stanford CS 184 class. The Stanford Bitcoin Group consisted of seven core members and included Ryan Breslow, a founder of Cognito, a devel |
https://en.wikipedia.org/wiki/Military%20patrol%20at%20the%201924%20Winter%20Olympics | At the 1924 Winter Olympics, in Chamonix, France, a military patrol competition was held. The Olympic results database lists the official medal winners for the event, as does the Official Report (1924), yet several sources have incorrectly counted this competition as a demonstration event only. The event was also demonstrated in 1928, 1936, and 1948, but those results are still considered unofficial. A full 36 years would pass before the modern version of the sport, biathlon, became an official Winter Olympic sport. The official website of the IOC now treats Men's Military Patrol at the 1924 Games as a separate discipline, without mixing it with the sports of Skiing or Biathlon. However, the 1924 Official Report treats it as an event within the sport of skiing.
The competition was held on Tuesday, January 29, 1924. Each team had 4 people and the distance was 25 km. The targets were balloons at 150m. Six teams started the event, but only four finished with Italy and Poland withdrawing due to bad conditions.
Results
Participating nations
A total of 24 biathletes from six nations competed at the Chamonix Games:
Medal table
Sources:
References
Bibliography
Official Report (1924) of both Summer and Winter games:
External links
International Olympic Committee results database
1924 Winter Olympics events
1924
1924 in biathlon
1924 in cross-country skiing
1924 in military history
Men's events at the 1924 Winter Olympics |
https://en.wikipedia.org/wiki/Byzantine%20fault | A Byzantine fault (also Byzantine generals problem, interactive consistency, source congruency, error avalanche, Byzantine agreement problem, and Byzantine failure) is a condition of a computer system, particularly distributed computing systems, where components may fail and there is imperfect information on whether a component has failed. The term takes its name from an allegory, the "Byzantine generals problem", developed to describe a situation in which, to avoid catastrophic failure of the system, the system's actors must agree on a concerted strategy, but some of these actors are unreliable.
In a Byzantine fault, a component such as a server can inconsistently appear both failed and functioning to failure-detection systems, presenting different symptoms to different observers. It is difficult for the other components to declare it failed and shut it out of the network, because they need to first reach a consensus regarding which component has failed in the first place. Byzantine fault tolerance (BFT) is the resilience of a fault-tolerant computer system to such conditions.
Definition
A Byzantine fault is any fault presenting different symptoms to different observers. A Byzantine failure is the loss of a system service due to a Byzantine fault in systems that require consensus among distributed nodes.
As an analogy of the fault's simplest form, consider a number of generals who are attacking a fortress. The generals must decide as a group whether to attack or retreat; some may prefer to attack, while others prefer to retreat. The important thing is that all generals agree on a common decision, for a halfhearted attack by a few generals would become a rout, and would be worse than either a coordinated attack or a coordinated retreat.
The problem is complicated by the presence of treacherous generals who may not only cast a vote for a suboptimal strategy, they may do so selectively. For instance, if nine generals are voting, four of whom support attacking while four others are in favor of retreat, the ninth general may send a vote of retreat to those generals in favor of retreat, and a vote of attack to the rest. Those who received a retreat vote from the ninth general will retreat, while the rest will attack (which may not go well for the attackers). The problem is complicated further by the generals being physically separated and having to send their votes via messengers who may fail to deliver votes or may forge false votes.
Byzantine fault tolerance can be achieved if the loyal (non-faulty) generals have a majority agreement on their strategy. There can be a default vote value given to missing messages. For example, missing messages can be given a "null" value. Further, if the agreement is that the null votes are in the majority, a pre-assigned default strategy can be used (e.g. retreat).
The typical mapping of this story onto computer systems is that the computers are the generals and their digital communication system links are th |
https://en.wikipedia.org/wiki/Protocol%20Independent%20Multicast | Protocol-Independent Multicast (PIM) is a family of multicast routing protocols for Internet Protocol (IP) networks that provide one-to-many and many-to-many distribution of data over a LAN, WAN or the Internet. It is termed protocol-independent because PIM does not include its own topology discovery mechanism, but instead uses routing information supplied by other routing protocols. PIM is not dependent on a specific unicast routing protocol; it can make use of any unicast routing protocol in use on the network. PIM does not build its own routing tables. PIM uses the unicast routing table for reverse-path forwarding.
There are four variants of PIM:
PIM Sparse Mode (PIM-SM) explicitly builds unidirectional shared trees rooted at a rendezvous point (RP) per group, and optionally creates shortest-path trees per source. PIM-SM generally scales fairly well for wide-area usage.
PIM Dense Mode (PIM-DM) uses dense multicast routing. It implicitly builds shortest-path trees by flooding multicast traffic domain wide, and then pruning back branches of the tree where no receivers are present. PIM-DM is straightforward to implement but generally has poor scaling properties. The first multicast routing protocol, DVMRP used dense-mode multicast routing. See RFC 3973.
Bidirectional PIM (Bidir-PIM) explicitly builds shared bi-directional trees. It never builds a shortest path tree, so may have longer end-to-end delays than PIM-SM, but scales well because it needs no source-specific state. See RFC 5015.
PIM Source-Specific Multicast (PIM-SSM) builds trees that are rooted in just one source, offering a more secure and scalable model for a limited number of applications (mostly broadcasting of content). In SSM, an IP datagram is transmitted by a source S to an SSM destination address G, and receivers can receive this datagram by subscribing to channel (S,G). See informational RFC 3569.
PIM-SM is commonly used in IPTV systems for routing multicast streams between VLANs, Subnets or local area networks.
Versions
There are two PIM versions. The versions are not directly compatible though may coexist on the same network. Network equipment may implement both versions. PIMv2 has the following improvements over PIMv1: A single RP is used per group. RP discovery is accomplished by a Bootstrap Router (BSR). Groups are either sparse or dense mode; Interfaces can be either. General improvements to protocol flexibility and efficiency.
Sparse mode
Protocol Independent Multicast - Sparse-Mode (PIM-SM) is a protocol for efficiently routing Internet Protocol (IP) packets to multicast groups that may span wide-area and inter-domain internets. The protocol is named protocol-independent because it is not dependent on any particular unicast routing protocol for topology discovery, and sparse-mode because it is suitable for groups where a very low percentage of the nodes (and their routers) will subscribe to the multicast session. Unlike earlier dense-mode multicast routi |
https://en.wikipedia.org/wiki/UFS | UFS may refer to:
Computers
Universal Flash Storage
Unix File System
Unsupervised Forward Selection, a data reduction algorithm
Other
UFS (trade union), former trade union in the United Kingdom
United Family Services
United Feature Syndicate, commonly known as United Media
United Feeder Service, a company formerly part of the United Express carrier network
Universal Fighting System, a collectible card game
Universal Frame System, A bolt locking system standard in the construction of aggressive inline skates
Universidade Federal de Sergipe, a Brazilian public university
University of the Free State, in South Africa
UFS the stock ticker for Domtar |
https://en.wikipedia.org/wiki/The%20Michigan%20Review | The Michigan Review is a news publication in Ann Arbor, Michigan. The Review, published biweekly, is funded primarily by grants from the conservative/libertarian Collegiate Network, donations, and by advertising revenue.
History
The Review was founded by Thomas Fous and Ronald J. Stefanski, in response to an editorial in The Michigan Daily attacking Fous, who was then the chairman of the university's College Republicans. Fous consulted with editors of The Dartmouth Review, as well as Detroit News writer Alan Miller to help direct the formation of the paper. The nascent group secured 501(c)(3) status for The Review, and empaneled an honorary advisory board, which included Paul W. McCracken, Russell Kirk, Irving Kristol, and R. Emmett Tyrrell.
In late November 1982, the first issue of The Review debuted on the campus of the University of Michigan, as well as on campuses across the state of Michigan. The issue's founding editorial, entitled "In Response to Needs and Demands," laid out the history and mission of The Review. A copy of this editorial was reprinted in the April 16, 2007, issue.
Since its founding issue, The Review has gone through numerous incarnations, from a long-form magazine format, to an opinion journal format, to more traditional newspaper format. The current publication resembles a more traditional newspaper format than anything else. Though its paper size is that of a tabloid, its content and presentation is more traditional than stereotypical tabloids, which tend to sensationalize stories.
The Review has gained national attention during its history. It was an important voice on campus against the University of Michigan's speech code, which was eventually struck down as unconstitutional by federal courts. Additionally, The Review has long been engaged in a fight against U-M's use of affirmative action policies in its admissions processes. Its work on this issue has brought the journal national press exposure, including interviews on national and international news, as well as numerous articles by Review editors published in national outlets, like the National Review, the Christian Science Monitor, and The American Spectator. The Review also played an important role in its coverage of the Michigan Civil Rights Initiative, a ballot initiative passed in 2006 that bans the use of racial and gender preferences in the state of Michigan.
Review alumni have achieved some measure of success in the national arena, working for such media outlets as the National Review, The Weekly Standard, The American Spectator, The Hill, and Investor's Business Daily, and writing speeches for President George W. Bush.
See also
The Mendota Beacon
References
External links
1982 establishments in Michigan
Newspapers established in 1982
Student newspapers published in Michigan
University of Michigan mass media |
https://en.wikipedia.org/wiki/Total%20least%20squares | In applied statistics, total least squares is a type of errors-in-variables regression, a least squares data modeling technique in which observational errors on both dependent and independent variables are taken into account. It is a generalization of Deming regression and also of orthogonal regression, and can be applied to both linear and non-linear models.
The total least squares approximation of the data is generically equivalent to the best, in the Frobenius norm, low-rank approximation of the data matrix.
Linear model
Background
In the least squares method of data modeling, the objective function, S,
is minimized, where r is the vector of residuals and W is a weighting matrix. In linear least squares the model contains equations which are linear in the parameters appearing in the parameter vector , so the residuals are given by
There are m observations in y and n parameters in β with m>n. X is a m×n matrix whose elements are either constants or functions of the independent variables, x. The weight matrix W is, ideally, the inverse of the variance-covariance matrix of the observations y. The independent variables are assumed to be error-free. The parameter estimates are found by setting the gradient equations to zero, which results in the normal equations
Allowing observation errors in all variables
Now, suppose that both x and y are observed subject to error, with variance-covariance matrices and respectively. In this case the objective function can be written as
where and are the residuals in x and y respectively. Clearly these residuals cannot be independent of each other, but they must be constrained by some kind of relationship. Writing the model function as , the constraints are expressed by m condition equations.
Thus, the problem is to minimize the objective function subject to the m constraints. It is solved by the use of Lagrange multipliers. After some algebraic manipulations, the result is obtained.
or alternatively
where M is the variance-covariance matrix relative to both independent and dependent variables.
Example
When the data errors are uncorrelated, all matrices M and W are diagonal. Then, take the example of straight line fitting.
in this case
showing how the variance at the ith point is determined by the variances of both independent and dependent variables and by the model being used to fit the data. The expression may be generalized by noting that the parameter is the slope of the line.
An expression of this type is used in fitting pH titration data where a small error on x translates to a large error on y when the slope is large.
Algebraic point of view
As was shown in 1980 by Golub and Van Loan, the TLS problem does not have a solution in general. The following considers the simple case where a unique solution exists without making any particular assumptions.
The computation of the TLS using singular value decomposition (SVD) is described in standard texts. We can solve the equation
for B |
https://en.wikipedia.org/wiki/Soft%20updates | Soft updates is an approach to maintaining file system meta-data integrity in the event of a crash or power outage. Soft updates work by tracking and enforcing dependencies among updates to file system meta-data. Soft updates are an alternative to the more commonly used approach of journaling file systems.
Method of operation
Soft updates allow only asynchronous metadata writes that do not render the on-disk file system inconsistent, or that the only inconsistency that ever happens is a storage space leak (space marked allocated when not used by any file). It avoids having to do ordered synchronous metadata writes by temporarily "rolling back" any part of a metadata block that depends on another potentially non-flushed or partially rolled-back block when writing it.
In effect, blocks may be flushed at any time and the soft-update code will always provide the disk a consistent version of it (as long as it knows which blocks have physically been flushed). Recovery then simply becomes a matter of running a background walk of the file system when it is next mounted to garbage collect any allocated space that has been orphaned. This also permits the filesystem to selectively flush certain files without having to flush all metadata blocks or all of the records.
Data that is unlinked from the metadata dependency graph before writing it to disk has begun does not need to be written to disk at all. For example, creating a file, using it for a short period of time, and then deleting it may cause no disk activity at all.
Soft updates require periodic flushing of the metadata to nonvolatile storage.
Implementations
FreeBSD supports soft updates for the UFS file system and they have been enabled by default during installation for many years. Soft updates are manually enabled or disabled during file system creation with an option to the newfs command. They can be disabled or enabled anytime thereafter with an option to the tunefs command. FreeBSD 9.0 introduced a journaling supplement to soft updates for the purpose of eliminating a background fsck for garbage collection after a crash. However, enabling journaling on a filesystem with soft updates disables the ability to make filesystem snapshots. This may cause issues when filesystems are dumped with the -L option, as snapshots are used to guarantee filesystem coherency during the dump.
OpenBSD supports soft updates for the FFS file system. Soft updates are enabled when the file system is mounted by exercising an option to the mount command.
NetBSD supported soft updates until the 6.0 release (2012) at which time it was deprecated in favor of WAPBL journaling.
Comparison to journaling file systems
Neither journaling nor soft updates guarantees that no data will be lost, but they do make sure that the filesystem remains consistent.
An advantage of a file system with soft updates is that it can be mounted immediately after a crash, since there is no log replay.
Notes
External links
Ma |
https://en.wikipedia.org/wiki/Mark%20Trueblood | Mark Trueblood is an American engineer and astronomer. He pioneered the development of robotic telescopes, as the author of several articles and two books, including Microcomputer Control of Telescopes and Telescope Control, co-authored with Russell M. Genet. Trueblood worked on the Gemini Observatory. He is the owner and operator of Winer Observatory in Sonoita, Arizona, which is the site of several professional research projects. The asteroid 15522 Trueblood is named in his honor.
Biography
Trueblood was born in 1948 in Cincinnati, Ohio, and spent most of his childhood there, where his parents encouraged his interest in astronomy. At the age of 12, he read Jean Texereau's book "How to Make a Telescope" and ordered a mirror-grinding kit from what was then the Edmund Scientific Company. He completed a 6-inch f/8 mirror and the telescope when he was 14, the same year his father's company transferred the family to Geneva, Switzerland for two years. Mark attended the International School of Geneva during the years 1962–1964, returning to Cincinnati the summer of 1964. He graduated from Finneytown High School in June, 1966 as the Salutatorian of his class. He went on to Brown University that autumn, where he graduated in May 1971 with the degrees AB-ScB (Honors) in Physics. He attended the Ph.D. program at Wesleyan University for one year, then moved to the Washington, D.C., area in the autumn of 1972. There he worked for the Smithsonian Institution for two years, then a succession of "Beltway Bandit" software government contractors, primarily on contracts with NASA's Goddard Space Flight Center. During his 18 years in the Washington, D.C., area, he spent his final nine years with the Ford Aerospace Corporation, rising to the position of Program Manager. Among his assignments at Ford, he headed the development of the Hubble Space Telescope control center at GSFC. While in the DC area, Trueblood attended the University of Maryland and earned his master's degree in Astronomy in 1983. Michael F. A'Hearn, the Deep Impact Principal Investigator, supervised his thesis on "Small Telescope Automation."
In 1990, Trueblood moved to Tucson, Arizona, to assume a position with the National Optical Astronomy Observatory (NOAO, which serves as the US national observatory) at the National Solar Observatory. There he worked for almost four years on the Global Oscillation Network Group (GONG) program as a software engineer. He began work in December 1994 in what is now the NOAO Gemini Science Center, assisting the NGSC Director in overseeing the development of instruments in the US for the Gemini 8-meter telescopes. In 2012, Trueblood left NOAO to join the OSIRIS-ReX project at the University of Arizona. He retired in 2013, but still tracks Near Earth Objects (asteroids and comets with the potential of striking Earth) using regional 2-meter class telescopes.
References
External links
Biography at the Winer Observatory
1948 births
Living people
Wesleyan Universi |
https://en.wikipedia.org/wiki/Tpoint | TPoint is computer software that implements a mathematical model of conditions leading to errors in telescope pointing and tracking. The model can then be used in a telescope control system to correct the pointing and tracking. Such errors are typically caused by mechanical or structural defects. For example, TPoint can analyze and compensate for systematic errors such as polar misalignment, mechanical and optical non-orthogonality, lack of roundness in telescope mounting drive gears, as well as for flexure of the mounting caused by gravity.
TPoint is in use on the majority of professional telescopes worldwide, including the Anglo-Australian Observatory, Keck Observatory, Gemini Observatory, and many others. It has significantly improved the performance and efficiency of telescope operation and has had an especially strong impact on the development of automated and robotic telescopes.
TPoint is also widely used by amateur astronomers. Software Bisque distributes TPoint for Mac OS and Windows as an add-on to TheSkyX Serious Astronomer Edition and TheSkyX Professional; this version is used to improve the pointing on amateur telescopes.
History
TPoint was invented and developed by Patrick Wallace. It grew out of work he and John Straede performed
at the Anglo-Australian Telescope (AAT) between 1974 and 1980
using Interdata 70 computers. In the early 1980s, it was ported to the Digital Equipment Corporation VAX running under
the VMS operating system and between 1990 and 1992 was also ported to run on the PC/MS-DOS platform as well
as various UNIX platforms. A TPoint add-on is available for TheSkyX Serious Astronomer Edition and TheSkyX Professional Edition from Software Bisque, and it runs under both Macintosh OS and Microsoft Windows.
External links
TPoint official webpage
Software Bisque TPoint Page
References
Telescopes
Numerical software |
https://en.wikipedia.org/wiki/Fuzzy%20Control%20Language | Fuzzy Control Language, or FCL, is a language for implementing fuzzy logic, especially fuzzy control. It was standardized by IEC 61131-7. It is a domain-specific programming language: it has no features unrelated to fuzzy logic, so it is impossible to even print "Hello, world!". Therefore, one does not write a program in FCL, but one may write part of it in FCL.
Example
RULE 0: IF (temperature IS cold) THEN (output IS low)
RULE 1: IF (temperature IS very cold) THEN (output IS high)
Limitations
FCL is not an entirely complete fuzzy language, for instance, it does not support "hedges", which are adverbs that modify the set. For instance, the programmer cannot write:
RULE 0: If (Temperature is VERY COLD) then (Output is VERY HIGH)
However, the programmer can simply define new sets for "very cold" and "very high". FCL also lacks support for higher-order fuzzy sets, subsets, and so on. None of these features are essential to fuzzy control, although they may be nice to have.
External links
fuzzyTECH, a commercial fuzzy logic development system containing the specification document for IEC1131-7 (select Fuzzy Application Library)
IEC 1131-7 CD1 IEC 1131-7 CD1 PDF
fuzzylite, A fuzzy logic controller library written in C++.
Free Fuzzy Logic Library (FFLL), an implementation library written in C++.
JFuzzyLogic, open source FCL + Fuzzy Logic Package (sourceforge, java)
AwiFuzz, open source implementation written in C++ covering all three levels of IEC 61131-7 Fuzzy Controller Language
Domain-specific programming languages IEC 1131-7 CD1
pyfuzzy, open source implementation written in python.
Fuzzy logic |
https://en.wikipedia.org/wiki/FCL | FCL may refer to:
Computing
Flow chart language
Framework Class Library, a .NET library
Free Component Library, a Pascal library
Fuzzy Control Language
Sport
1. FC Lichtenfels, a German football club
FC Lorient, a French football club
FC Luzern, a Swiss football club
FC Lootos Põlva (women) or FCL Lootos, an Estonian football club
Florida Complex League, a US-based rookie league in professional baseball
Transport
Ferrocarril de Langreo, a defunct Spanish railway
Florida Coastal Airlines, a defunct American airline
Flying Colours Airlines, a defunct British airline
Full container load
Other uses
Christopher Columbus Foundation or Fondazione Cristoforo Colombo per le Libertà, a political party in Italy
Faculdade Cásper Líbero, a Brazilian journalism school
Fault current limiter
Federated Co-operatives, a Canadian retail co-operative
First Colony Life Insurance Company, a defunct American insurer
FishCenter Live, an American television series
Foundation Coal Holdings, an American coal mining company
Free convective layer
Fundação Cásper Líbero, Brazilian media company
See also
JAR-FCL (Pilot License), Joint Aviation Requirements Flight Crew License |
https://en.wikipedia.org/wiki/The%20Den%20%28TV%20programme%29 | The Den was a long-running children's television strand of Ireland's public broadcaster Raidió Teilifís Éireann. First broadcast on 29 September 1986 on RTÉ1, it moved to Network 2 two years later. Initially a continuity strand for weekday afternoon programmes, The Den later expanded during the late 1990s and the 2000s until it became synonymous with RTÉ's children's output. At various times during its run, it was known as Dempsey's Den, Den TV and Den2.
In mid-2010, RTÉ Television announced an overhaul of its children's output, with the launch of RTÉjr and TRTÉ. The Den aired for the last time on 19 September 2010. It returned for six weeks from November 2020.
Overview
The Den is considered to have pushed the boundaries of what was considered acceptable viewing for children and young people, often employing irreverent and occasionally satirical humour within its continuity links. It also introduced anthropomorphic puppet characters to Irish culture, including Zig and Zag, Podge and Rodge, Soky the Sock Monster, and Dustin the Turkey. Zig and Zag later transferred to Channel 4, Podge and Rodge moved onto adult comedy programming on RTÉ (including their own talk show), and Dustin represented Ireland in the Eurovision Song Contest.
In later years, The Den took up much of Network 2's schedule, airing for over 11 hours each weekday and on weekend mornings. It also acquired a reputation for airing new episodes of imported shows before other television networks in Europe. There were no commercial breaks during shows on The Den, although there were commercial breaks between shows.
Broadcast history
Following on from the success of a Children's BBC strand in the UK, RTÉ launched its own strand for children's programming, Dempsey's Den, on 29 September 1986. Initially it was a two-hour strand each weekday afternoon on RTÉ 1 featuring nearly all of the broadcaster's youth output (the main exceptions being Bosco and Jo Maxi).
Taking a cue from CBBC's Broom Cupboard format, Dempsey's Den was broadcast live from a tiny, single-camera presentation studio at RTÉ Television Centre, used mostly for in-vision continuity. Upon its move to Network 2 in September 1988, Dempsey's Den gained an extra hour of airtime each weekday.
Ian Dempsey fronted the strand until the summer of 1990, although he continued to present the music feature Pop Goes the Den for a number of years. Ray D'Arcy took over The Den from 1990 to 1998, followed by Damien McCaul (1998-2003), Francis Boylan Jr (2003-2005) and Kathryn McKiernan (2005-2008).
1986–1998
The Den launched as Dempsey's Den in 1986, with Ian Dempsey as presenter. He was joined by Zig and Zag in 1987. They were joined by Dustin the turkey in December 1989, after Zag won Dustin in a golf tournament.
The Den format changed little over its first decade on air. It generally consisted of several cartoons and music videos, at least one RTÉ production, a daily birthday slot, and on certain days of the week, a viewers' quiz. |
https://en.wikipedia.org/wiki/Celebrity%20Poker%20Showdown | Celebrity Poker Showdown is an American celebrity game show that aired on the cable network Bravo from 2003 to 2006. It was a limited-run series in which celebrities played poker, with eight tournaments during its five-season run.
In each show, five celebrities played a no limit Texas hold 'em tournament for charity. The winners of each qualifying game won a silver commemorative poker chip and advanced to the championship game. The winner of the championship game won the grand prize for his or her charity as well as a gold commemorative poker chip. Each tournament featured 25 celebrities and consisted of six episodes, five qualifying games and one championship game.
In an interview with TV Guide, host Dave Foley said that a ninth tournament is not being produced, as Bravo did not order any new episodes.
Setup, logistics, and personalities
The first seven tournaments were taped at the Palms Casino in Paradise, Nevada in front of a live studio audience. With the eighth tournament, Harrah's Entertainment became the "official casino of Celebrity Poker Showdown."
When a player was eliminated, he or she moved to the "Loser's Lounge" to watch the rest of the game. With the move to New Orleans for the eighth tournament, the Lounge was renamed for sponsor Southern Comfort as the "SoCo Lime Lounge".
The first series was hosted by actor/comedian Kevin Pollak; the episodes of that run were an hour in length, except for the Championship telecast, which was two hours in length. In 2004, the show expanded all episodes to two hours in length and Dave Foley took over hosting duties. Most episodes of his run were two hours in length, and only one episode (the Championship telecast of the fifth tournament) was an hour in length. Professional poker player Phil Gordon provided the color commentary for the first seven tournaments. Phil Hellmuth took over the commentary spot in the eighth tournament.
All the games were officiated by Tournament Director Robert Thompson. Thompson used the catchphrase "Shuffle up and deal!"
Several celebrities appeared in multiple tournaments, and five won games in separate tournaments. David Cross won in the first and third tournaments; Dulé Hill won in the second and seventh; Kevin Nealon won in the fourth and seventh; Jason Alexander won in the fifth and eighth; and Michael Ian Black won in the second and eighth tourneys. No celebrity won more than one championship game.
The series was produced by Andrew Hill Newman and Joshua Malina.
Tournament winnings
The first six tournaments were played for a total of $250,000 in prize money as follows:
The four players eliminated in each of the first 5 games: $5,000 each
Fifth Place in the Championship: $7,500
Fourth Place in the Championship: $10,000
Third Place in the Championship: $12,500
Second Place in the Championship: $20,000
First Place in the Championship: $100,000
Starting with the Seventh Tournament, the "prize pool" was increased to $1,000,000 and divided as follows:
|
https://en.wikipedia.org/wiki/Hell%3A%20A%20Cyberpunk%20Thriller | Hell: A Cyberpunk Thriller is a point-and-click adventure game released in 1994, developed by Take-Two Interactive Software and published by GameTek for the DOS. It was ported to 3DO, Macintosh and Microsoft Windows. The game was notable for being one of the first CD-ROM-only games to use speech with hi-res graphics, and was designed by the same team as BloodNet, the story of which is referenced to during one of Hell's subplots. Dennis Hopper, Grace Jones, Stephanie Seymour, and Geoffrey Holder are among the actors in the game. Seymour and Holder appear in live action footage, while the rest of the cast, including Hopper and Jones, lend their voices to computer-animated representations.
The story is told through a variety of partial screen full-motion video (FMV) movies in the PC version; the 3DO version uses the same movies, but runs entirely in full screen. The game is set in a dystopian 2095, and the United States of America is under the control of a fascist theocracy called the "Hand of God". Unlike theocracies of the past, this government can send criminals and insurgents to hell, and has even brought a few of them back to tell their tale. In this third-person perspective, dystopian environment, players control Gideon Eshanti and Rachel Braque, two loyal agents (and lovers) of a new law enforcement agency created by the theocracy: Artificial Reality Containment, or ARC, a Cultural Revolution-like organization that enforces a ban on cybernetic technology in general and virtual reality in particular.
Hell was commercially successful, with sales of 300,000 units within six months of its release. Hell is the first of the three Take-Two developed FMV adventure games, the other two being Ripper and Black Dahlia.
Gameplay
Hell: A Cyberpunk Thriller generally follows the conventional gameplay rules of point-and-click adventures, though with a particular focus on solving codes. Players can choose to have either Gideon Eshanti or Rachel Braque as their lead character, but this has no effect on the puzzles, only changing some story sequences near the end of the game. The player must also acquire several supporting party members throughout the game, each of whom comes with their own small inventory of items. Party size is limited, and if the player ejects one party member for a new one, the ejected party member will take all his items with him, even if they have been placed in someone else's inventory slots. However, party members can be re-recruited simply by visiting the spot where they were originally recruited.
Unlike most point-and-click adventure games, approaching some of the puzzles in Hell incorrectly results in a game over, with a brief cutscene in which Braque and Eshanti's deaths are reported to Solene Solux.
Puzzle errors
Due to several script oversights and programming errors that appear in both the PC and 3DO versions, some of the game's puzzles cannot be solved by following the clues provided. For one, the demon Abonides shouts out |
https://en.wikipedia.org/wiki/KMFM%20%28radio%20network%29 | KMFM is a network of radio stations that was formed from the merger of seven Independent Local Radio stations and one digital station (on the Kent Digital Multiplex) owned by the KM Group, broadcasting to the county of Kent in the United Kingdom. Whilst the station broadcasts as one countywide station, it is officially eight separate licenses.
KMFM offers its listeners local news and music. KMFM plays a mix of music, mainly covering the current Top 40 hits after adopting a contemporary hit radio format in 2012. The previous KMFM format had been aimed at an older audience.
As of June 2023, the network broadcasts to a combined audience of 191,000, according to RAJAR.
Original stations
When the original stations were rebranded, KMFM operated each of the seven stations locally on FM throughout Kent, with one county-wide station on DAB on the NOW Kent multiplex. Apart from KMFM Ashford, each station was previously independent before being bought by the KM Group and rebranded.
Programming
All KMFM stations adopted a common programming in March 2012. The previous local breakfast DJs had been made redundant following the close of their breakfast shows the previous Friday, and all other shows presented by them were also removed from the network.
KMFM Extra, until then a separate station with a unique schedule, was closed down in June 2012 and replaced on DAB with the regular KMFM service. Each area however still offers local advertisements and sponsorships (in the case of the DAB and online services, countywide adverts are heard).
Originally each station produced its own programming during daytime. Apart from Medway, from 2007 each station grouped with its neighbour (West Kent and Maidstone; Canterbury and Thanet; Ashford and Shepway and White Cliffs Country) to network programmes between 11am and 7pm. The programmes were merged in April 2009 to create two groups with their own networked programming – West (Maidstone, Medway and West Kent) and East (Ashford, Canterbury, Shepway and White Cliffs Country and Thanet). At other times (evenings and weekends) programming was broadcast across all seven stations.
In September 2009, KMFM was given permission to network all its programmes apart from Monday to Saturday breakfast, and Sunday afternoons. Saturday breakfast and Sunday afternoons were networked in 2010. Breakfast shows for KMFM Maidstone and KMFM West Kent were merged in January 2011.
Studios
Originally all seven stations broadcast from studios within their transmission area. KMFM Canterbury moved to the Ashford studio in 2008, and KMFM Shepway and White Cliffs Country joined it in April 2009. KMFM Thanet broadcast from Cliftonville near Margate (having been relocated from Margate harbour). All three stations in the west network broadcast from Medway. Each station has however retained its sales teams within the transmission area.
Since the merger of all stations, all programmes are produced and broadcast from the Medway studios. The Ashford a |
https://en.wikipedia.org/wiki/BGS | BGS may stand for:
Art and entertainment
Bee Gees, a rock and disco group
Beautiful Game Studios, a computer game developer
Bethesda Game Studios, a video game developer
Brasil Game Show, yearly Brazilian video game convention
Bunny Girl Senpai, Japanese light novel series
Science and technology
Below ground surface, in scientific reports; see Australian Aboriginal prehistoric sites
Baller–Gerold syndrome
Berkeley gas-filled separator, an instrument that uses a magnetic deflection system filled with gas at low pressure; see Isotopes of flerovium
Braunstein-Ghosh-Severini Entropy, of a network
British Geological Survey, an organisation in the United Kingdom
British Geriatrics Society, the professional body of specialists involved with health care of the elderly in the United Kingdom
Schools
Bandon Grammar School, an independent, fee-paying school in Bandon, County Cork
Bangor Grammar School, a voluntary school in Bangor, County Down
Bankstown Grammar School, in Australia
Bedford Girls' School, an independent grammar school in Bedford, England
Beverley Grammar School, a state grammar school in Beverley, England
Bexley Grammar School, a co-educational grammar school in Bexley, England
Boston Grammar School, in Boston, England
Bourne Grammar School, in Bourne, England
Bradford Grammar School, an independent grammar school in Bradford, England
Brisbane Grammar School, one of the oldest high schools in Queensland, Australia
Brighton Grammar School, in Melbourne, Australia
Bristol Grammar School, an independent grammar school in Bristol, England
Burnham Grammar School, a co-educational grammar school in Burnham, Buckinghamshire
Bury Grammar School, an independent grammar school in Greater Manchester, England
Transport
Begusarai railway station, Bihar, India, Indian Railways station code
Bugis MRT station, Singapore, MRT station abbreviation
Other uses
Bachelor of General Studies, an interdisciplinary undergraduate-level academic degree
BackGround Sound, such as in video games and anime
Beta Gamma Sigma, a business honor society
Bouquet, Garcin & Schivre, a French electric car manufactured between 1899 and 1906
Brigadier General Staff, the chief staff officer in a British army Corps
Bundesgrenzschutz, the German Federal Border Guard, now called the German Federal Police |
https://en.wikipedia.org/wiki/IBM%20Future%20Systems%20project | The Future Systems project (FS) was a research and development project undertaken in IBM in the early 1970s, aiming to develop a revolutionary line of computer products, including new software models which would simplify software development by exploiting modern powerful hardware.
History
Background
Until the end of the 1960s, IBM had been making most of its profit on hardware, bundling support software and services along with its systems to make them more attractive. Only hardware carried a price tag, but those prices included an allocation for software and services.
Other manufacturers had started to market compatible hardware, mainly peripherals such as tape and disk drives, at a price significantly lower than IBM, thus shrinking the possible base for recovering the cost of software and services. This changed more dramatically when Gene Amdahl left IBM and set up a company making System/370 compatible systems that were both faster and less expensive than IBM's offerings. In early 1971, an internal IBM task force, Project Counterpoint, concluded that the compatible mainframe business was indeed a viable business and that the basis for charging for software and services as part of the hardware price would quickly vanish.
Another strategic issue was that the cost of computing was steadily going down while the costs of programming and operations, being made of personnel costs, were steadily going up. Therefore, the part of the customer's IT budget available for hardware vendors would be significantly reduced in the coming years, and with it the base for IBM revenue. It was imperative that IBM, by addressing the cost of application development and operations in its future products, would at the same time reduce the total cost of IT to the customers and capture a larger portion of that cost.
At the same time, IBM was under legal attack for its dominant position and its policy of bundling software and services in the hardware price, so that any attempt at "re-bundling" part of its offerings had to be firmly justified on a purely technical basis, so as to withstand any legal challenge.
Future Systems
In May–June 1971, an international task force convened in Armonk under John Opel, then a vice-president of IBM. Its assignment was to investigate the feasibility of a new line of computers which would take advantage of IBM's technological advantages in order to render obsolete all previous computers - compatible offerings but also IBM's own products. The task force concluded that the project was worth pursuing, but that the key to acceptance in the marketplace was an order of magnitude reduction in the costs of developing, operating and maintaining application software.
The major objectives of the FS project were consequently stated as follows:
make obsolete all existing computing equipment, including IBM's, by fully exploiting the newest technologies,
diminish greatly the costs and efforts involved in application development and operations,
provid |
https://en.wikipedia.org/wiki/Mix%20Megapol | Mix Megapol is a private Swedish radio network controlled by Bauer Media Group. It launched in 1993 under the name Skärgårdsradion (Archipelago Radio). Later that year the name was changed to Radio Megapol when the broadcasting permissions were auctioned out. In 1997 the word "Mix" was added and their slogan became "The best mix of hits and oldies". Mix Megapol is on air in 24 cities from Kiruna in the north to Malmö in the south. They have over two million listeners per week. Their target group is people aged between 25 and 45.
Affiliates
External links
Mix Megapol
Radio stations in Sweden
Bauer Media Group |
https://en.wikipedia.org/wiki/Nelonen%20%28TV%20channel%29 | is a Finnish commercial television channel. It started out as Helsinki's local television channel PTV in 1990 on the HTV cable network (now part of DNA Welho), and changed its name first to PTV4. On June 1, 1997, the channel expanded to national coverage and changed its name to Nelonen, the Finnish name of the number four. Nelonen is mostly owned by Sanoma Corporation, which owns the Helsingin Sanomat and Ilta-Sanomat newspapers. Its largest owner was Aatos Erkko. Much of its programming is imported Australian, American, British, and European programs with Finnish captions. Its main market is the 25-44 demographic.
Programming
Finnish series and shows
Amazing Race Suomi
Big Brother
Extreme Duudsonit
Haluatko miljonääriksi?
Koskinen
Mysteerilaulajat
Reikä seinässä
Selviytyjät Suomi
Talent Suomi
The Voice of Finland
Vain elämää
Imported series, telenovelas and animated shows
90210
Accidentally on Purpose
Alias
All in the Family
American Chopper
America's Got Talent
America's Next Top Model
Avatar: The Last Airbender
Bad Girls
Battlestar Galactica
Big Brother Australia (series 12 onwards)
Big City Greens
Big Love
BoBoiBoy
Bob the Builder
Brainiac: Science Abuse
Breaking Bad
Britain's Next Top Model
Brotherhood
Californication
Canada's Next Top Model
Cashmere Mafia
Castle
Camp Lazlo (2006-2009)
Charmed
Commander in Chief
Criminal Minds
Dawson's Creek
Days of Our Lives
Damages
Deadwood
Desperate Housewives
Detroit 1-8-7
Dexter
Digimon
Dirt
Dirty Sexy Money
Dr. Phil
Drop Dead Diva
DuckTales
Early Edition
Everybody Hates Chris
Everybody Loves Raymond
Extreme Makeover
Fear Factor
Felicity
FlashForward
Footballer's Wives
Frasier
FashionTelevision
Ghost Whisperer
Greek
Gravity Falls
Grey's Anatomy
Harper's Island
How to Get Away with Murder
Inspector Rex
Jericho
Jerseylicious
Judging Amy
Kung Faux
Kyle XY
La Usurpadora
Las Vegas
LazyTown
Less than Perfect
Life as We Know It
Lost
Mad Men
Married... with Children
MasterChef Australia
Medical Investigation
Medium
Men Behaving Badly
My Little Pony: Friendship Is Magic
My Little Pony: Pony Life
MythBusters
Newlyweds: Nick and Jessica
NCIS
NCIS: Los Angeles
Nurse Jackie
Oggy and the Cockroaches
Oz
Phineas and Ferb
Pimp My Ride
Pretty Little Liars
Punk'd
Quantico
Queer as Folk
Rescue Me
Rome
RSPCA Animal Rescue
Robson Arms
Samantha Who?
Santa Barbara
Scrubs
Secret Diary of a Call Girl
Seinfeld
Sex and the City
South Park
Star vs. the Forces of Evil
So You Think You Can Dance
So You Think You Can Dance Canada
Space: Above and Beyond
Special Agent Oso
Sunset Beach
That '70s Show
The 4400
The Bachelor
The Cleaner
The Comeback
The Cut
The Emperor's New School
The Game
The Good Wife
The King of Queens
The Nanny
The Oprah Winfrey Show
The Shield
The Sopranos
The Voice
The West Wing
Threshold
Total Wipeout
Total Wipeout USA
Wander Over Yonder
Trailer Park Boys
Ugly Betty
Weeds
What About Brian
Wife Swap
Wildfire
Wizards of Waverly Place
Logos and identities
Criticism
Nelonen was launched quickly and in an unprepar |
https://en.wikipedia.org/wiki/Formatted%20text | In computing, formatted text, styled text, or rich text, as opposed to plain text, is digital text which has styling information beyond the minimum of semantic elements: colours, styles (boldface, italic), sizes, and special features in HTML (such as hyperlinks).
Terminology
Formatted text cannot rightly be identified with binary files or be distinct from ASCII text. This is because formatted text is not necessarily binary, it may be text-only, such as HTML, RTF or enriched text files, and it may be ASCII-only. Conversely, a plain text file may be non-ASCII (in an encoding such as Unicode UTF-8). Text-only formatted text is achieved by markup which too is textual, while some editors of formatted text like Microsoft Word save in a binary format.
Beginnings of formatted text
Formatted text has its genesis in the pre-computer use of underscoring to embolden passages in typewritten manuscripts. In the first interactive systems of early computer technology, underlining was not possible, and users made up for this lack (and the lack of formatting in ASCII) by using certain symbols as substitutes. Emphasis, for example, could be achieved in ASCII in a number of ways:
Capitalization:
Surrounding with underscores:
Surrounding with asterisks:
Spacing:
Surrounding by underscores was also used for book titles:
Markup languages
Formatting can be marked by tags distinguished from the body text by special characters, such as angle brackets in HTML. For example, this text:
The dog is classified as Canis familiaris in taxonomy.
is marked up in HTML thus:
<p>The dog is classified as <i>Canis familiaris</i> in taxonomy.</p>
The italicised text is enclosed by an opening and a closing italics tag. In LaTeX, the text would be marked up like this:
The dog is classified as \textit{Canis familiaris} in taxonomy.
Most markup languages can be edited with any text editor, needing no special software. Many markup languages can also be edited with specialized software designed to automate some functions or present the output as WYSIWYG.
Formatted document files
Since the invention of MacWrite, the first WYSIWYG word processor, in which the typist codes the formatting visually rather than by inserting textual markup, word processors have tended to save to binary files. Opening such files with a text editor reveals them embedded with various binary characters, either around the formatted text (e.g. in WordPerfect) or separate from it, at the beginning or end of the file (e.g. in Microsoft Word).
Formatted text documents in binary files have, however, the disadvantages of formatting scope and secrecy. Whereas the extent of formatting is accurately marked in markup languages, WYSIWYG formatting is based on memory, that is, keeping for example your pressing of the boldface button until cancelled. This can lead to formatting mistakes and maintenance troubles. As for secrecy, formatted text document file formats tend to be proprietary and undocumented, leading to d |
https://en.wikipedia.org/wiki/Security%20Assertion%20Markup%20Language | Security Assertion Markup Language (SAML, pronounced SAM-el, ) is an open standard for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider. SAML is an XML-based markup language for security assertions (statements that service providers use to make access-control decisions). SAML is also:
A set of XML-based protocol messages
A set of protocol message bindings
A set of profiles (utilizing all of the above)
An important use case that SAML addresses is web-browser single sign-on (SSO). Single sign-on is relatively easy to accomplish within a security domain (using cookies, for example) but extending SSO across security domains is more difficult and resulted in the proliferation of non-interoperable proprietary technologies. The SAML Web Browser SSO profile was specified and standardized to promote interoperability.
Overview
The SAML specification defines three roles: the principal (typically a human user), the identity provider (IdP) and the service provider (SP). In the primary use case addressed by SAML, the principal requests a service from the service provider. The service provider requests and obtains an authentication assertion from the identity provider. On the basis of this assertion, the service provider can make an access control decision, that is, it can decide whether to perform the service for the connected principal.
At the heart of the SAML assertion is a subject (a principal within the context of a particular security domain) about which something is being asserted. The subject is usually (but not necessarily) a human. As in the SAML 2.0 Technical Overview, the terms subject and principal are used interchangeably in this document.
Before delivering the subject-based assertion from IdP to the SP, the IdP may request some information from the principal—such as a user name and password—in order to authenticate the principal. SAML specifies the content of the assertion that is passed from the IdP to the SP. In SAML, one identity provider may provide SAML assertions to many service providers. Similarly, one SP may rely on and trust assertions from many independent IdPs.
SAML does not specify the method of authentication at the identity provider. The IdP may use a username and password, or some other form of authentication, including multi-factor authentication. A directory service such as RADIUS, LDAP or Active Directory that allows users to log in with a user name and password is a typical source of authentication tokens at an identity provider. The popular Internet social networking services also provide identity services that in theory could be used to support SAML exchanges.
History
The Organization for the Advancement of Structured Information Standards (OASIS) Security Services Technical Committee (SSTC), which met for the first time in January 2001, was chartered "to define an XML framework for exchanging authentication and authorization |
https://en.wikipedia.org/wiki/New%20Faces | New Faces is a British television talent show that aired in the 1970s and 1980s. It has been hosted by Leslie Crowther, Derek Hobson and Marti Caine. It was produced for the ITV network by ATV, and later by Central.
Original series: 1973–1978
The show first aired as a pilot on the ATV network on 31 May 1973 with host Leslie Crowther and a judging panel consisting of Noele Gordon, Tony Hatch, Clive James and John Smith assessing performances from ten acts looking for a break in show business. Welsh singer Jennifer Jones won the show that also featured a man who blew up a hot water bottle until it burst followed by a few choruses of "Spanish Eyes".
A further pilot aired on 7 July 1973 with new host Derek Hobson and a full series followed from 29 September 1973 to 2 April 1978. It was recorded at the ATV Centre in Birmingham. The show's theme tune, "You're a Star!", was performed by singer Carl Wayne, formerly of The Move and it was eventually released, becoming a minor hit.
Winners went on to have careers in television entertainment, such as Lenny Henry. Many top entertainers began their careers with a performance on this programme. The acts were evaluated by a panel of experts, including Tony Hatch, Mickie Most, Clifford Davis, Arthur Askey, Ted Ray, Ed Stewart, Jack Parnell, Alan A. Freeman, Muriel Young, Lonnie Donegan, Lionel Blair, Ingrid Pitt, Shaw Taylor, Terry Wogan and Noel Edmonds.
Four judges would make up the panel each week. Contestants received marks out of ten from the four judges in three categories such as "presentation", "content" and "star quality" – The "star quality" category was later replaced by "entertainment value". The highest score any act could attain was thus 120 points. Patti Boulaye was the only act who ever attained the maximum mark, doing so in the programme's final season. Les Dennis received 119 points, with only Tony Hatch giving him less than a perfect '10' for Presentation. Arthur Askey was on the same panel and started singing "Tony is a spoilsport" when Hatch awarded Dennis 9 as his final score.
Series 1–6 Winners
Series One Final (1973)
Series Two Final (1974)
Series Three Final (1975)
Series Five Final (1977)
Series Six Final (1978)
Revived version
The series was revived by Central for three series between 1986 and 1988, presented by past winner, Marti Caine. Her catchphrase was bellowed at the voting studio audience: "Press your buttons... NOW!". The show also featured a panel of experts including the journalist Nina Myskow, who often made critical comments. In this incarnation, the home audience decided who won by sending in postcards (phone voting was soon introduced by BBC rival Bob Says Opportunity Knocks), though, the audience did vote for its favourite act using a gigantic lightboard known as Spaghetti Junction lighting up to a varying degree as they pushed their buttons.
1986 final
Note: The James Stone who appeared in this final is the same one who appeared in the Britain's Got Talent |
https://en.wikipedia.org/wiki/TickIT | TickIT is a certification program for companies in the software development and computer industries, supported primarily by the United Kingdom and Swedish industries through UKAS and SWEDAC respectively. Its general objective is to improve software quality.
History
In the 1980s, the UK government's CCTA organisation promoted the use of IT standards in the UK public sector, with work on BS5750 (Quality Management) leading to the publishing of the Quality Management Library and the inception of the TickIT assessment scheme with DTI, MoD and participation of software development companies.
The TickIT Guide
TickIT also includes a guide. This provides guidance in understanding and applying ISO 9001 in the IT industry. It gives a background to the TickIT scheme, including its origins and objectives. Furthermore, it provides detailed information on how to implement a Quality System and the expected structure and content relevant to software activities. The TickIT guide also assists in defining appropriate measures and/or metrics. Various TickIT Guides have been issued, including "Guide to Software Quality Management and Certification using EN29001".
References
Bamford, Robert; Deibler, William (2003). ISO 9001: 2000 for Software and Systems Providers: An Engineering Approach (1st ed.). CRC-Press.
External links
TickITplus
Information assurance standards
Information technology governance
Information technology organisations based in the United Kingdom
Software quality |
https://en.wikipedia.org/wiki/Echo%20Island | Echo Island is an Irish television programme for children and young adults, shown on RTÉ Network 2. It was shown at 17:00 during The Den, after which programmes like The Legend of the Hidden City would air. The show effectively took over from Jo Maxi, which had been aimed at the teenaged youth of Ireland.
Birth
Echo Island began broadcasting in 1994 with two episodes a week. This was extended to four episodes the following year with two of these being Irish language editions. The series ran for six seasons; in later years it proved a useful showcase for some of the best young rock bands in Ireland. Many of the presenters were chosen for their bilingualism, including Dara Ó Briain.
A similar format show called Stream replaced it, splitting up each day with a different topic such as Gaming, Sports and other types of activities and did away with Echo Island'''s "Make and Do" and "Pet" sections. Stream did not air as in Irish, because by that stage TG4 was providing an Irish-language children's service.
Presenters
Many current presenters either began, or spent part of, their early careers on Echo Island, including Derek Mooney and Bláthnaid Ní Chofaigh, Carrie Crowley, Mary Kingston, Dara Ó Briain and Peter O'Meara, Danann Breathnach, Sinéad Chaomhánach, Christine Ní Chearraláin, Tom O'Brannigan and Pádraic Ó Neachtain.
Format
Similar in format to the BBC's Blue Peter (but with a desert island setting and design), Echo Island featured a resident Moluccan Cockatoo called Rocco, who provided the series with a constant stream of noisy background chatter. Each episode was based around an interview in "The Shack" with an adult guest, who was asked to bring along some items of significance from their childhood. U.S. ambassador Jean Kennedy Smith, for instance, appeared on the 15 November 1994 episode to promote a Christmas card competition. President Mary McAleese appeared on the programme on the 19 December 1997 episode, while the Australian didgeridoo player Rolf Harris was a guest on the 13 October 1998 episode.
Competitions, items on art and cookery, fundraising campaigns, the "Echovision Song Contest" for young performers and the "Pet Clinic" where TV Vet, Pete Wedderburn, answered viewers calls about their pets were some of the features. Each Friday edition featured young "stringers" who reported from all around Ireland on events happening in their locality. This item contained an apparently live two-way video link between the presenter in studio and the children on location and was an advanced production technique in its day.
Since
Dara Ó Briain appeared on a number of other RTÉ programmes including The Panel, Don't Feed The Gondolas and It's A Family Affair. He has since become one of the best known Irish comedians in the United Kingdom, having appeared on many of the BBC's top programmes such as Mock The Week and Three Men in a Boat.
Derek Mooney has since become one of Ireland's best known TV and radio presenters. He currently has his we |
https://en.wikipedia.org/wiki/McHale%27s%20Navy | McHale's Navy is an American sitcom starring Ernest Borgnine that aired 138 half-hour episodes over four seasons, from October 11, 1962, to April 12, 1966, on the ABC television network. The series was filmed in black and white and originated from a one-hour drama titled "Seven Against the Sea", broadcast on April 3, 1962 as part of the Alcoa Premiere anthology series. The ABC series spawned three feature films: McHale's Navy (1964); a sequel, McHale's Navy Joins the Air Force (1965); and a 1997 sequel-remake of the original series.
"Seven Against the Sea" (1962)
Academy Award–winning dramatic actor Ernest Borgnine first appeared as Quinton McHale in an hour-long one-shot drama called "Seven Against the Sea", which aired as an episode of Alcoa Premiere in 1962, an ABC dramatic anthology also known as Fred Astaire's Premiere Theatre and hosted by Fred Astaire, who introduced television audiences to the Quinton McHale character. It is considered the pilot show for the series although it is an hour-long drama instead of a half-hour situation comedy and is starkly different in tone.
Plot
During World War II, Lieutenant Commander Quinton McHale (Borgnine) is the commanding officer of the U.S. Navy PT boat PT-73, stationed at the Pacific island base of Taratupa. In the late spring of 1942, the Japanese heavily bomb the island, destroying the base. Only 18 of 150 naval aviators and Marines on the base survive. With Japanese patrols in the region too heavy for a Navy rescue mission, McHale and his men survive by hiding on the island. Assisted by the native tribes whom they befriend, the sailors live a pleasant island existence. After months of leisurely life, strait-laced, by-the-book Annapolis graduate Lieutenant Durham (Ron Foster) parachutes onto the island. His job is to assume duties as McHale's executive officer and help him get the base on Taratupa back into action.
Durham faces an uphill battle: The men have gone native. One man has started a native laundry service, and McHale operates a still, making moonshine for the men and the natives. In addition, McHale is friendly with the native chief and even bathes with him. When Durham informs McHale of his orders, McHale refuses to follow them. It is clear that while McHale is as loyal as any American, following the devastation caused by the Japanese on the island, he is reluctant to risk losing more men. His concern now is for their survival until they can be rescued, which creates friction between Durham and McHale.
When they get word that a Marine battalion is pinned on a beach and an enemy cruiser is planning to attack the beachhead in the morning, McHale's attitude changes. McHale is ordered to use all his boats to protect the beachhead and the Marines, but he has no boats, since the Japanese sank them all. However, McHale manages to capture a Japanese PT boat patrolling the island. Surprising the men and Durham, McHale does not plan to use the boat to evacuate his men or the Marine battalio |
https://en.wikipedia.org/wiki/Digital%20on-screen%20graphic | A digital on-screen graphic, digitally originated graphic (DOG, bug, network bug, or screenbug) is a watermark-like station logo that most television broadcasters overlay over a portion of the screen area of their programs to identify the channel. They are thus a form of permanent visual station identification, increasing brand recognition and asserting ownership of the video signal.
The graphic identifies the source of programming, even if it has been time-shifted—that is, recorded to videotape, DVD, or a digital personal video recorder such as TiVo. Many of these technologies allow viewers to skip or omit traditional between-programming station identification; thus the use of a DOG enables the station or network to enforce brand identification even when standard commercials are skipped.
DOG watermarking helps to reduce off-the-air copyright infringement—for example, the distribution of a current series' episodes on DVD: the watermarked content is easily differentiated from "official" DVD releases, and can help identify not only the station from which the broadcast was captured, but usually the actual date of the broadcast as well.
Graphics may be used to identify if the correct subscription is being used for a type of venue. For example, showing Sky Sports within a pub requires a more expensive subscription; a channel authorized under this subscription adds a pint glass graphic to the bottom of the screen for inspectors to see. The graphic changes at certain times, making it harder to counterfeit.
On the other hand, watermarks pollute the picture, distract viewers' attention and may cover an important piece of information presented in the television program. Extremely bright watermarks may cause screen burn-in on some types of TV sets.
Usage of visually perceptible embedded watermarks requires the program author to have a separate clean copy for archival purposes, but this practice was not common decades ago when watermarking became popular among broadcasters. Watermarks present an issue when archival videos are used for a documentary that strives to create a coherent story. In some cases, watermarks are blurred or digitally removed if possible to clean up the picture. In the absence of visually perceptible watermarks content control can be ensured with visually imperceptible digital watermarks.
In some cases, the graphic also shows the name of the current program. Some television networks may place additional logos or text alongside their DOG to advertise significant upcoming programs. For example, broadcasters of the Olympic Games often add the Olympic rings to their DOG for a period of time leading up to—and during—the Games.
Usage
Many news broadcasters, as well as a few television networks in such cases, also place a clock alongside their bug. In the United States, Canada, Australia, and New Zealand, DOGs may also include the show's parental guideline rating. In Australia, this is known as a Program Return Graphic (PRG). It has bec |
https://en.wikipedia.org/wiki/Jerry%20Saltzer | Jerome Howard "Jerry" Saltzer (born October 9, 1939) is an American computer scientist.
Career
Jerry Saltzer received an ScD in Electrical Engineering from MIT in 1966. His dissertation 'Traffic Control in a Multiplexed System' was advised by Fernando Corbató. In 1966, he joined the faculty of the Department of Electrical Engineering and Computer Science at MIT.
One of Saltzer's earliest involvements with computers was with MIT's Compatible Time-Sharing System in the early 1960s. In the later 1960s and early 1970s, he was one of the team leaders of the Multics operating system project. Multics, though not particularly commercially successful in itself, has had a major impact on all subsequent operating systems; in particular, it was an inspiration for Ken Thompson to develop Unix. Saltzer's contributions to Multics included the now-standard kernel stack switching method of process switching, as well as oft-cited work on the security architecture for shared information systems.
Saltzer led the Computer Systems Research group of MIT's Laboratory for Computer Science. In the late 1970s and early 1980s, the Computer Systems Research group was one of the key players in the development of the Internet and ring network technology for local area networks. During this time, Saltzer patented the Proteon ProNet ring network. Another contribution in that area was the end-to-end principle in systems design (Saltzer and Schroeder's design principles), which is one of the important underlying principles that governs the operation of the Internet.
From 1984 to 1988 Saltzer served as Technical Director of MIT's Project Athena. "Saltzer@mit.edu" is one of the few Athena usernames with a capital letter, and legend has it that several special case hacks were required to support this functionality. In September 1995 Saltzer retired from his full-time faculty position, but continued writing and teaching part-time at MIT.
Family
Saltzer is known to all (colleagues, students, friends and family) as "Jerry". In 1961 he married Marlys Anne Hughes. They have two children: Rebecca (born 1962) and Sarah (born 1963). He has two grandchildren: Hannah (born 1997), and Caroline (born 1999).
Other interests
Saltzer is also very interested in 19th century landscape art of the western United States; he has prepared the catalogue raisonné of the paintings of the painter Frederick Ferdinand Schafer (de).
Software
Saltzer has been the programmer, a designer, or the inspiration, for a number of important pieces of systems software, which are either still in use or have descendants still being used today:
RUNOFF, a very early text-formatting program which was the basis for roff and nroff
TYPSET, the "Project MAC editor", was the first interactive text editor, developed to write documentation
PCIP, the first TCP/IP stack for the IBM PC, which became the basis for a company called FTP Software
Kerberos, an authentication protocol, part of Project Athena, still widely used to |
https://en.wikipedia.org/wiki/Jack%20Dennis | Jack Bonnell Dennis (born October 13, 1931) is a computer scientist and Emeritus Professor of Computer Science and Engineering at Massachusetts Institute of Technology.
The work of Dennis in computer systems and computer languages is recognized to have played a key role in hacker culture. As a Massachusetts Institute of Technology faculty member he sponsored easier access to computer facilities at MIT during the early development of the subculture. Much of what would later become Unix came from his early collaboration with Dennis Ritchie and Ken Thompson. This collaborative and open philosophy lives on today.
Dennis was also a member of the historic Tech Model Railroad Club, which incubated much of the early slang and traditions of hacking.
Early life and education
Dennis graduated from the Massachusetts Institute of Technology (MIT) as Bachelor of Science (1953), Master of Science (1954), and Doctor of Science (1958). His doctoral thesis analyzed the relation between mathematical programming problems and electrical networks. After completing his doctorate, Dennis became part of the MIT's Department of Electrical Engineering and Computer Science's faculty, being promoted to full professor in 1969.
Career
As a professor at MIT, Dennis was influential in the work of student Alan Kotok and fellow professors Marvin Minsky and John McCarthy. He gave young programmers access to multi-million dollar computers and allowed them to see where their abilities could take them, inspiring a generation of MIT graduates who would shape the computer industry at DEC, Xerox Parc and ARPA.
Dennis was one of the founders of the Multics project. His most important contribution to the project was the concept of the single-level memory. Multics was not fully successful as a commercial project, but it was important because it influenced the design of many other computer operating systems, most importantly the direct inspiration for Ken Thompson (who also worked on the project) to design the first incarnation of Unix. In recognition of his work on the Multics project, Dennis was elected as IEEE Fellow.
Dennis' research at the MIT focused in Computer Theory and Computer Systems, specifically:
Theoretical Models for Computation
Computation Structures
Structure of Computer Systems
Semantic Theory for Computer Systems
Semantics of Parallel Computation
Computer System Architecture
Dennis has also worked as an independent consultant and research scientist on projects related with parallel computer hardware and software since his retirement from MIT in 1987. He has worked with the NASA Research Institute for Advanced Computer Science as visiting scientist, with the Architecture Group of Carlstedt Elektronik (Gothenburg, Sweden), and with Acorn Networks, Inc., as Chief Scientist.
A great part of Dennis' career has been devoted to non-von Neumann models of computation, architecture, and languages, where programs are not attached to a program counter. Along with his |
https://en.wikipedia.org/wiki/Peter%20J.%20Denning | Peter James Denning (born January 6, 1942) is an American computer scientist and writer. He is best known for pioneering work in virtual memory, especially for inventing the working-set model for program behavior, which addressed thrashing in operating systems and became the reference standard for all memory management policies. He is also known for his works on principles of operating systems, operational analysis of queueing network systems, design and implementation of CSNET, the ACM digital library, and codifying the great principles of computing. He has written numerous influential articles and books, including an overview of fundamental computer science principles, computational thinking, and his thoughts on innovation as a set of learnable practices.
Early life and education
Denning was born January 6, 1942, in Queens, New York, and raised in Darien, Connecticut. He took an early interest in science, pursuing astronomy, botany, radio, and electronics while in grade school. At Fairfield Prep, he submitted home-designed computers to the science fair in 1958, 1959, and 1960. His second computer, which solved linear equations using pinball machine parts, won the grand prize.
He attended Manhattan College for a Bachelor in EE (1964) and then MIT for a PhD (1968). At MIT he worked on Project MAC and contributed to the design of the pioneering Multics operating system. His PhD thesis, "Resource allocation in multiprocess computer systems", introduced seminal ideas in working sets, locality, thrashing, and system balance.
Career and research
At Princeton University from 1968 to 1972, Denning wrote his classic book, Operating Systems Theory (1973), with E G Coffman. He collaborated with Alfred Aho and Jeffrey Ullman on optimality proofs for paging algorithms, and on a simple proof that compilers based on precedence parsing do not need to backtrack. At Purdue University (1972–1983) he supervised numerous PhD theses validating locality-based theories of memory management and extending the new mathematics of operational analysis of queueing networks. He co-founded CSNET. He became department head in 1979 and completed another book on computational models, Machines, Languages, and Computation, with Jack Dennis and Joe Qualitz.
At NASA Ames from 1983 to 1991, he founded the Research Institute for Advanced Computer Science (RIACS) and turned it into one of the first centers for interdisciplinary research in computational and space science.
At George Mason University from 1991 to 2002 he headed the Computer Science Department, was an associate dean and vice provost, and founded the Center for the New Engineer. The Center was a pioneer in web-based learning. He created a design course for engineers, called Sense 21, which was the basis of his project to understand innovation as a skill. He created a course on Core of Information Technology, the basis of his Great Principles of Computing project.
At Naval Postgraduate School since 2002, he |
https://en.wikipedia.org/wiki/Robert%20M.%20Graham%20%28computer%20scientist%29 | Robert M. Graham (1929 in Michigan, US – January 2, 2020) was a cybersecurity researcher computer scientist and Professor Emeritus of Computer Science at the University of Massachusetts Amherst. He was born to a Scottish emigrant.
He received his undergraduate and graduate degrees from the University of Michigan. While working at the UofM's Computing Center he co-authored two compilers, GAT for the IBM 650 and MAD for the IBM 704/709/7090.
In 1963 he moved to MIT to participate in the development of Multics, one of the first virtual memory time-sharing computer operating systems. He had responsibility for protection, dynamic linking, and other key system kernel areas.
Later worked at University of California, Berkeley, City College of New York, and the University of Massachusetts Amherst. Officially retired in 1996, but continued to teach until the end of 2003.
In 1996 he was inducted as a Fellow of the Association for Computing Machinery.
He is the author of numerous books and professional articles.
References
External links
Robert M. Graham Home Page
1929 births
2020 deaths
American computer scientists
Fellows of the Association for Computing Machinery
Multics people
University of Michigan alumni |
https://en.wikipedia.org/wiki/Hallam%20FM | Hallam FM is an Independent Local Radio station based in Sheffield, England, owned and operated by Bauer as part of the Hits Radio network. It broadcasts to South Yorkshire.
As of September 2023, the station has a weekly audience of 280,000 listeners according to RAJAR.
History
The station started broadcasting on 1548 kHz/194m AM, 95.2 and 95.9 MHz FM under the name of Radio Hallam from its studios at Hartshead in Sheffield City Centre on 1 October 1974. The first presenter heard on air was ex-BBC Radio 1 DJ Johnny Moran - the first record he played was I've Got the Music in Me by Kiki Dee, which stuck after a minute and a half.
On 1 October 1985, Radio Hallam's broadcast area significantly increased when it began to broadcast to all of South Yorkshire. In 1987, Radio Hallam merged with neighbouring Yorkshire stations Pennine Radio in Bradford and Viking Radio in Hull to form the now-defunct Yorkshire Radio Network.
The frequencies were changed during the 1980s to 96.1 FM for Rotherham, 97.4 FM for Sheffield, 102.9 FM for Barnsley, and 103.4 for the remainder of South Yorkshire. After a take-over of the parent company YRN by the Metro Radio Group, the AM frequency became Great Yorkshire Gold. As part of Hallam's licence agreement, the Rotherham transmitter ceased to be used by the station in the 1990s. Hallam also moved its studio facilities to 900 Herries Road, close to Sheffield Wednesday's Hillsborough ground. The office space at Hartshead was formerly used by the Sheffield Star newspaper.
As the Metro Radio Group was bought by EMAP, Hallam FM also became part of the Big City Network in Northern England. In 2011, Bauer Media's Big City Network was replaced by the Place Portfolio, containing the group's local radio stations.
As of October 2019, Hallam FM's Sheffield studios are shared with sister Yorkshire station Viking FM, following the closure of Viking's studios in Hull.
Broadcasting
Hallam FM's main competitors are BBC Radio 1, Capital Yorkshire & Heart Yorkshire. Other local competing stations include BBC Radio Sheffield, Greatest Hits Radio North Derbyshire and Greatest Hits Radio Yorkshire.
The station broadcasts on analogue frequencies on 97.4 FM (Tapton Hill, Sheffield), 103.4 FM (Clifton, near the M18) and 102.9 FM (Ardsley) in Sheffield, Doncaster and Barnsley respectively. Almost the whole region is covered on 103.4 FM. The station also broadcasts via DAB on the Bauer Radio multiplex, and online and via their app.
Programming
Networked programming originates from Bauer's Manchester studios.
The station's flagship breakfast show, Big John @ Breakfast, is produced and broadcast from Bauer's Sheffield studios, weekdays from 6-10am.
News
Bauer's Sheffield newsroom broadcasts local news bulletins hourly from 6am-7pm on weekdays, and from 7am-1pm on Saturdays and Sundays. Headlines are broadcast on the half-hour during weekday breakfast and drivetime shows, alongside traffic bulletins.
National bulletins from Sky News Radio |
https://en.wikipedia.org/wiki/Kerrang%21%20Radio | Kerrang! Radio is a specialist digital rock music radio station related to Kerrang! magazine. It is owned and operated by Bauer and forms part of the Kiss Network.
As of September 2023, the station has a weekly audience of 364,000 listeners according to RAJAR.
Stations
History
Initial launch: 2002/2003
Launched as a digital station on Freeview in 2002, expanded to London from 2003. It was also known as Kerrang! 105.2 FM in the West Midlands from 2004 to 2013 when its studios in Lionel Street, Birmingham, 105.2 was turned over to Planet Rock (which was then replaced by Absolute Radio from 2015) in June 2013. It was London only until May 2018 to make way for Hits Radio.
In July 2002, ahead of the Radio Authority's advertisement for a new regional FM franchise for the West Midlands, Kerrang! magazine launched an FM radio station in Birmingham on a short-term Restricted Service Licence at a frequency of 87.7 FM. The station was broadcast from the grounds of Birmingham City Football Club and was initially on air for one month only.
Kerrang! Radio as a permanent service first launched in late 2002 as a largely automated rock music service delivered over the Freeview platform, as one of a suite of stations its parent company (then Emap) added to the then-new Freeview TV system, the others including fellow digital jukebox stations Smash Hits Radio, Q Radio and Heat Radio, and relays of London stations Kiss 100 and Magic 105.4 FM. This new Kerrang! Radio was also streamed online, and served as a sibling to Kerrang! TV which launched around the same time: these stations being connected with the Kerrang! print magazine in name, ownership and style.
This digital 'jukebox' version of Kerrang! was subsequently rolled out to DAB digital radio, beginning with transmission in London from 1 November 2003. The DAB service was extended to other areas from 2004, joining Emap-owned multiplexes in northern England (largely replacing The Hits Radio) and also made available on the regional multiplexes for the West Midlands and central Scotland.
FM radio station: 2004–2013
Kerrang! Radio first went on air in June 2004, following Kerrang!'s successful bid for the West Midlands regional FM franchise the previous October. The station was based at new dedicated studios located in Lionel Street, Birmingham, officially opened by Black Sabbath's guitarist Tony Iommi. Broadcasting on the new 105.2 FM Midlands frequency, Kerrang! Radio replaced the prior digital Kerrang! Radio on DAB, TV platforms and online. The new station's format mixed modern and classic rock with speech content targeted at a young adult rock audience. In the FM era the station ran a somewhat more mainstream, adult-rock tone of daytime output than the magazine, featuring more indie and alternative rock than the magazine, which traditionally focused on heavier rock genres. The night shows were conversely very much fuelled by the traditional Kerrang! Magazine sound, with a wider and less mainstream styl |
https://en.wikipedia.org/wiki/Victor%20A.%20Vyssotsky | Victor Alexander Vyssotsky (February 26, 1931 – December 24, 2012) was a mathematician and computer scientist. He was the technical head of the Multics project at Bell Labs and later executive director of Research in the Information Systems Division of AT&T Bell Labs. Multics, whilst not particularly commercially successful in itself, directly inspired Ken Thompson to develop Unix. Later, Vyssotsky was the founding director of Digital's Cambridge Research Lab.
In 1960, Vyssotsky co-created the BLODI Block Diagram Compiler at Bell Labs. In 1961, together with Robert Morris Sr. and Doug McIlroy, he devised the computer game Darwin (later known as Core War) on an IBM 7090 at Bell Labs.
References
External links
Core War at Virus Bulletin: Resources
Victor A. Vyssotsky hosts a UNIX documentary UNIX: Making Computers Easier To Use -- AT&T Archives film from 1982, Bell Laboratories
1931 births
2012 deaths
American people of Russian descent
American computer scientists
American mathematicians
American computer programmers
Scientists at Bell Labs
Multics people |
https://en.wikipedia.org/wiki/Smooth%20North%20West | Smooth North West is a regional radio station owned by Communicorp UK and operated by Global as part of the Smooth network. The station broadcasts to the North West of England from studios at Spinningfields in Manchester.
History
GMG Radio ownership
The station was launched by Radio Investments Ltd on 1 September 1994 as Jazz FM, but was also known as JFM in an attempt to appeal to listeners who could be put off by the use of the word "jazz". Jazz FM originally played a wide variety of jazz, pandering to more smooth jazz during the daytime in order to attract the 25- to 45-year-old target market which was required to make the station a success. However, the focus of the music later changed, and by the early 2000s, it was focusing more on soul and softer R&B alongside jazz.
100.4 Jazz FM broadcast its daytime shows from its Manchester station, but specialist shows such as Dinner Jazz and Legends of Jazz with Ramsey Lewis were networked from its London sister station 102.2 Jazz FM.
In 2003, the Guardian Media Group did extensive research into the type of music that listeners in the north-west wanted to hear. They concluded that many people were dissuaded by the name "jazz", and as a result, 100.4 Jazz FM closed on 13 February 2004 and relaunched as Smooth FM on 2 March 2004.
The station now began to play more modern music during the day, but continued a mostly jazz themed output at night. The arrangements for local and networked programming remained for a time, but from March 2005, only Mike Chadwick's The Saturday Night Experience was networked from 102.2 Smooth FM. All other programming was produced and aired in the North West.
The station was relaunched again as Smooth Radio 100.4 on 26 March 2007. The launch occurred at the same time as London based 102.2 Smooth FM, however Smooth Radio 100.4 continued with its own unique soul music based format. On 5 July 2007, GMG Radio announced that it was requesting a change of format from Ofcom, which would bring Smooth Radio 100.4 in line with the rest of the network. It proposed an easy listening music service mixed with speech for the over 50's, coupled with an improved local news service. Ofcom approved the changes on 11 October 2007.
In March 2008, GMG requested a format change to remove its jazz commitments it has in place for Smooth Radio 100.4. Part of the plans included a relaunch of Jazz FM from the jazzfm.com service broadcasting on DAB in Glasgow and online on the MXR North West multiplex. In a meeting on 22 April 2008 Ofcom denied GMG's request to drop its jazz commitments. GMG said that it would be relaunching Jazz FM despite the decision.
Local and networked programming originated from studios at Laser House in Salford Quays.
In 2010, GMG announced that it would be merging its five Smooth stations in England to create a nationwide Smooth Radio service based in Salford. The new station was launched on 4 October 2010 and could be heard both on DAB and on the locally on the FM frequ |
https://en.wikipedia.org/wiki/Monadic | Monadic may refer to:
Monadic, a relation or function having an arity of one in logic, mathematics, and computer science
Monadic, an adjunction if and only if it is equivalent to the adjunction given by the Eilenberg–Moore algebras of its associated monad, in category theory
Monadic, in computer programming, a feature, type, or function related to a monad (functional programming)
Monadic or univalent, a chemical valence
Monadic, in theology, a religion or philosophy possessing a concept of a divine Monad
See also
Monadic predicate calculus, in logic
Monad (disambiguation) |
https://en.wikipedia.org/wiki/LDR | LDR may refer to:
Science, medicine and technology
LDraw filename extension
Low-dynamic-range rendering (LDR rendering) in 3D computer graphics, vs. high-dynamic-range rendering
Light Dependent Resistor, or photoresistor
Lateral digit reduction in birds; see Origin of birds#Digit homology
A Local Democracy Reporter, working for the United Kingdom's Local Democracy Reporting Service
Other uses
European Liberal Democrat and Reform Party (European Parliament group)
Lana Del Rey, American singer-songwriter (born 1985)
Loan-deposit ratio
Long-distance relationship of a couple
Luxembourg Depositary Receipt |
https://en.wikipedia.org/wiki/Data%20manipulation%20language | A data manipulation language (DML) is a computer programming language used for adding (inserting), deleting, and modifying (updating) data in a database. A DML is often a sublanguage of a broader database language such as SQL, with the DML comprising some of the operators in the language. Read-only selecting of data is sometimes distinguished as being part of a separate data query language (DQL), but it is closely related and sometimes also considered a component of a DML; some operators may perform both selecting (reading) and writing.
A popular data manipulation language is that of Structured Query Language (SQL), which is used to retrieve and manipulate data in a relational database. Other forms of DML are those used by IMS/DLI, CODASYL databases, such as IDMS and others.
SQL
In SQL, the data manipulation language comprises the SQL-data change statements, which modify stored data but not the schema or database objects. Manipulation of persistent database objects, e.g., tables or stored procedures, via the SQL schema statements, rather than the data stored within them, is considered to be part of a separate data definition language (DDL). In SQL these two categories are similar in their detailed syntax, data types, expressions etc., but distinct in their overall function.
The SQL-data change statements are a subset of the SQL-data statements; this also contains the SELECT query statement, which strictly speaking is part of the DQL, not the DML. In common practice though, this distinction is not made and SELECT is widely considered to be part of DML, so the DML consists of all SQL-data statements, not only the SQL-data change statements. The SELECT ... INTO ... form combines both selection and manipulation, and thus is strictly considered to be DML because it manipulates (i.e. modifies) data.
Data manipulation languages have their functional capability organized by the initial word in a statement, which is almost always a verb. In the case of SQL, these verbs are:
SELECT ... FROM ... WHERE ... (strictly speaking DQL)
SELECT ... INTO ...
INSERT INTO ... VALUES ...
UPDATE ... SET ... WHERE ...
DELETE FROM ... WHERE ...
For example, the command to insert a row into table employees:
INSERT INTO employees (first_name, last_name, fname) VALUES ('John', 'Capita', 'xcapit00');
Variants
Most SQL database implementations extend their SQL capabilities by providing imperative, i.e. procedural languages. Examples of these are Oracle's PL/SQL and IBM Db2's SQL_PL.
Data manipulation languages tend to have many different flavors and capabilities between database vendors. There have been a number of standards established for SQL by ANSI, but vendors still provide their own extensions to the standard while not implementing the entire standard.
Data manipulation languages are divided into two types, procedural programming and declarative programming.
Data manipulation languages were initially only used within computer programs, but with the adv |
https://en.wikipedia.org/wiki/Staging | Staging may refer to:
Computing
Staging (cloud computing), a process used to assemble, test, and review a new solution before it is moved into production and the existing solution is decommissioned
Staging (data), intermediately storing data between the sources of information and a data warehouse (DW)
Disk staging, using disks as an additional, temporary stage of backup process before finally storing backup
Staging site, a website used to assemble, test, and review its newer versions before it is moved into production
Other uses
Staging (cooking), a chef works briefly and without pay in another chef's kitchen to learn new techniques and cuisines
Staging (rocketry), the use of multiple engines and propellant to launch a rocket
Staging (stagecoaches), the business of running stagecoaches or the act of journeying in them
Staging (theatre), the process of selecting, designing, adapting to, or modifying the performance space for a play or film
Cancer staging, a description (usually numbers I to V) of how much the cancer has spread
Home staging, preparing a residence for sale in real estate
Staging area, a location used to prepare items for use, such as for a military operation
Staging, in bird migration, the practice of pausing at places along a migration route to rest and feed before proceeding
Staging or scaffolding, in construction, a temporary work platform
Staging, in drag racing, the process of aligning cars on the starting line drag racing |
https://en.wikipedia.org/wiki/Oracle%20Call%20Interface | In computing, the Oracle Call Interface (OCI) consists of a set of C-language software APIs which provide an interface to the Oracle database.
OCI offers a procedural API for not only performing certain database administration tasks (such as system startup and shutdown), but also for using PL/SQL or SQL to query, access, and manipulate data. The OCI library, based on Oracle's undocumented User Programmatic Interface (UPI), acts as an "interpreter" between applications and the low-level database network protocol.
History
Oracle Corporation first released OCI (under the name HLI, the Host Language Interface) with Oracle Database version 6 in 1988. As HLI (and subsequently OCI) operated as wrappers for UPI, their original naming conventions closely resembled those of the UPI calls they were based upon. For example, the rollback statement: the call upirol in UPI became orol in OCI.
Later, in Oracle8 (released in 1997), OCI calls acquired more descriptive names; orol became OCITransRollback. Subsequent improvements have been made in every version of OCI, including 11g (released in 2007). Oracle Corporation claims that OCI is "So reliable that every SQL statement in the Oracle Database executes with OCI".
Implementations
OCI is so popular that, in addition to Oracle, several other vendors have implemented their own libraries compatible with the OCI API. To date, OCI-compatible libraries exist for the ANTs Data Server (ADS), EnterpriseDB, and the Linter SQL RDBMS
OCI-based libraries
Several libraries are based on top of OCI, including:
Oracle's Type-II JDBC Driver (part-Java, part native)
Oracle's enhanced C++ library, Oracle C++ Call Interface (OCCI), which provides an object-oriented interface with the object-relational features of the Oracle database.
Oracle's OLE DB Driver
Oracle's ODBC Driver
Oracle's .NET Data Provider, ODP.NET
Microsoft's ODBC Driver for Oracle
Easysoft's ODBC-Oracle Driver
Trolltech's Qt C++ toolkit OCI driver (QOCI)
Due to the complexity of the OCI API, several easier-to-use OCI wrapper libraries also exist, such as:
the open-source libsqlora8 library (deprecated).
the open-source OCILIB library.
the Open BSD licensed Oracle Template Library OTL library.
References
External links
Oracle Call Interface FAQ
Public OCI Support Forum (OTN)
Oracle software |
https://en.wikipedia.org/wiki/Dream%20Job%20%28season%202%29 | The second season of Dream Job, the ESPN American reality television show that searches for new on-air talent for the network, began on Tuesday, September 14, 2004. Like the show's first season, this edition was also looking for a new anchor for SportsCenter. A talent search for the show had begun in late June, 2004. ESPN anchor Stuart Scott returned to host the new season.
Judges
The show's judging panel had changes. Gone were first season judges Tony Kornheiser and LaVar Arrington, who had begun play for the Washington Redskins in the 2004–2005 NFL season. Kornheiser and Arrington were replaced by Cold Pizza contributor and Around the Horn panelist Woody Paige, and ESPN NBA analyst Stephen A. Smith. Cold Pizza co-host Kit Hoover and ESPN Vice-president of Talent, Al Jaffe, returned for the second season.
Unlike the judging panel, the voting for season two did not change. The viewing public still had one vote (which was given to the contestant who had received the highest number of votes from online voting and text messaging) to cut a contestant with. In the first two episodes, the judges were given one vote apiece to vote for a contestant to be cut, with two given to them for the third episode only, making episodes 4-10 also one-cut-apiece shows.
Contestants
Like the first two episodes of season one, the contestants were introduced in 2 groups of six. In episode one, the competing contestants were Valerie Hawrylko, a 31-year-old management consultant from Oakton, Virginia; Brian Startare, a 33-year-old health care management worker from Glassboro, New Jersey; Anish Shroff, a 22-year-old radio anchor who has recently graduated from Syracuse University; Grant Thompson, a 28-year-old writer and actor from Los Angeles; Joe Voyticky, a 37-year-old attorney from Brooklyn, New York; and K.C. James, a 44-year-old account executive from Los Angeles. James had won the Wendy's Wild Card Contest to gain entry onto the show.
The next group of six was introduced in episode two, and, for the first time, featured a second Wendy's Wild Card winner. Episode two's competitors were Jason Ashworth, a 23-year-old assistant tour manager from New Freedom, Pennsylvania; Winston Bell, a 35-year-old banker from Cleveland; Jason Horowitz, a 21-year-old student at Syracuse University who originally hails from West Bloomfield, Michigan; Stephanie Rich, a 35-year-old travel coordinator from Arlington, Texas; Whitney Scott, a 24-year-old sports information assistant from Lockwood, Missouri; and David Holmes, the second Wendy's Wild Card winner, a 22-year-old student at Kent State University from Uniontown, Ohio.
Episodes
Episode One
Like the first season, the first two episodes of the second season began with the main game being "My SportsCenter", and like the series premiere on February 22, 2004, each of the six contestants competing in the first episode of season two read two SportsCenter highlights, most of them being from sporting events from the past weekend. Thom |
https://en.wikipedia.org/wiki/CKO | CKO was a Canadian radio news network which operated from 1977 to 1989. The CKO call sign was shared by twelve network-owned stations, as listed below.
The network was owned by Canada All-News Radio Ltd. AGRA Industries was originally a 45 percent partner in the network, but by 1988 it was the sole owner. David Ruskin was the network's founding president.
History
On July 12, 1976, the Canadian Radio-television and Telecommunications Commission (CRTC) approved a licence for CKO to Canada All News Radio Limited. Twelve transmitters were required to be in place across the country and ready for broadcast by the fall of 1979.
With a recorded message from Prime Minister Pierre Trudeau to launch it, the CKO radio network started broadcasting on July 1, 1977 with stations in Ottawa and Toronto. Power problems delayed the start of the Ottawa station by an hour. Stories included much American content, plus two features about prostitutes. One announcer mispronounced Arkansas several times in one newscast and was reportedly dismissed.
Later that year, stations were added in Montreal (by acquisition of AM station CFOX), London, Vancouver and Calgary. The Vancouver station began with a news staff of ten, including news director Cam Scott, Gerry Gifford, Richard Dettman, Stan Crossley, Bill Rodger, Norm Bright and Joanna Piros. Scott was replaced in 1978 by Peter Ray, who had been transferred from the Montreal station. After Ray's departure that year, Tom Spear was hired from CHWK Chilliwack in December 1978 until most local programming was curtailed in August 1980.
The news network began live broadcasts of the Canadian government's Question Period in late 1977; for nearly all Canadians, it was the first regular, live access to House proceedings as it would be well over two years before the CBC Parliamentary Television Network began regular nationwide video distribution to most cable systems.
In November 1977, the Calgary station was opened with Bob Quinn as its first news director. He expanded coverage in Alberta and was instrumental in the network's coverage of the Kosmos 954 satellite crash in the Northwest Territories in January 1978 and the crash of Pacific Western Airlines Flight 314 in Cranbrook, BC a few weeks later. Reporter Bill Pringle was the first journalist at the crash scene. Calgary coverage centered on local news and the booming Alberta energy sector. The Calgary and Edmonton reporters joined forces to broadcast the 1978 Commonwealth Games in Edmonton. The Calgary stationed featured numerous local features reflecting the skills on the staff and balanced network's national approach. Calgary and Edmonton produced a regional afternoon newscast, "Alberta Today". It was often co-anchored by Cliff Oginski in Edmonton and Calgary's Bill Pringle.
In 1978, a station was added in Edmonton under station manager/news director Garfield Chesson. He made CKO Edmonton a key supplier of national news reportage in the era of the Trudeau government's Na |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.