source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/Ernesto%20Cortes | Ernesto Cortés Jr. is the Industrial Areas Foundation (IAF) co-chair and executive director of the West / Southwest IAF regional network.
The IAF provides leadership training and civics education to poor and moderate-income people across the US and UK. Cortés has been instrumental in the building of over 30 grassroots organizations known for developing and training community leaders.
Career
After attending an IAF training in Chicago and organizing in Wisconsin and Indiana in the early 1970s, Cortés returned to his hometown of San Antonio in 1974 to found Communities Organized for Public Service (COPS), the nationally recognized church-based grassroots organization of San Antonio's west and south side communities. This work has since expanded to include broad-based organizing projects across ten Southwestern states including Texas, California, Nevada, Arizona, Louisiana, Nebraska, New Mexico, Iowa, Oklahoma, and Mississippi. These organizations' diverse faith institutions are joined by schools, labor and professional associations, and non-profits. These organizations leveraged billions of dollars for poorer communities including $700 million in infrastructure improvements in the colonias (areas of Texas which lacked basic drainage systems) during the late 1980s and early 1990s, $2.8 billion in increased public funding to equalize school funding in Texas in the mid-1980s, and $10 million in state funding for workforce development projects equipping underemployed adults with job training options. Millions more have been invested (and saved) in community-level infrastructure, healthcare reform and housing.
Cortés envisioned and launched the Alliance Schools strategy - a lauded initiative to engage communities of adults in public education. Identifying and training parent and community leaders to change the culture of their schools, the Alliance Schools have built a broad base of support for public education, both locally and statewide. Alliance Schools have been successful in raising test scores by building a culture of collaboration, as recently documented by the Annenberg Institute for School Reform.
Assisted by Cortés, the West / Southwest IAF established ten independently operating Labor Market Intermediaries by building the capacity of constituents to create the requisite political will. The graduation rates of these projects consistently outpace those of the community colleges with which they partner, helping over 12,000 low wage employees become higher-paid knowledge workers equipped with the needed skills in high demand fields. These projects have additionally been shown to provide a positive Return On Investment for public entities that invest in them. He also assisted in several living wage campaigns in Texas which raised the wages of over 10,000 workers in the Rio Grande Valley, in addition to those in Austin and San Antonio. A study of Cortes's work with IAF in Texas, Cold Anger, was written by Mary Beth Rogers. Dozens of oth |
https://en.wikipedia.org/wiki/How%20to%20Survive%20a%20Marriage | How to Survive a Marriage is an American soap opera which aired on the NBC television network from January 7, 1974 to April 18, 1975. The serial was created by Anne Howard Bailey, with much input from then-NBC Vice President Lin Bolen. The show's working title was From This Moment and was an in-house NBC production.
A total of 332 episodes were produced (255 in its first season, and 77 in its final season).
Synopsis
Larry and his wife Christine (nicknamed "Chris," played by Jennifer Harmon) soon divorced and while battling for custody of their daughter Lori, Chris entered the workforce. On Valentine's Day 1975, Chris and Larry remarried, and she then battled alcoholism.
Initially, the show featured veteran soap actress Rosemary Prinz in the role of Dr. Julie Franklin, a staunch feminist who counseled her friends on the joys of being an independent woman, only to decide that her life was truly complete by marrying a man. Prinz only agreed to stay on the show for a short time (as she had with All My Children several years earlier), and earned top billing, a three-day work week, and supposedly $1,000 an episode, which was a big salary for a soap actress to earn in the 1970s. After six months Julie left town to marry Dr. Tony DeAngelo.
Another major story centered on Fran Bachman (Fran Brill) coping with sudden widowhood. Brill received over a thousand letters of condolence from viewers.
Ratings and cancellation
The show did not profit from the large lead-in that the high-rated Another World provided, mostly due to its many attempts to be socially relevant, which usually took the place of traditional storytelling to which American soap viewers at the time were acclimated. How to Survive a Marriage ran a distant third in the 3:30 p.m. timeslot, behind Match Game on CBS (then daytime TV's highest-rated program) and One Life to Live on ABC; a move to 1:30 p.m. on January 6, 1975 after the cancellation of the original version of the famed game Jeopardy! (it was done to enable Another World to expand to an hour) only brought worse ratings, as it faced two longtime favorites on the competing networks, CBS' As the World Turns which was expanded to an hour (11 months later) and ABC's Let's Make a Deal. Despite NBC's high hopes for How to Survive a Marriage it would only last on the air for sixteen months, ending on a Thursday (the 1:30–3:00 p.m. block on NBC was preempted the following day for a 90-minute special, First Ladies' Diaries: Rachel Jackson). The Monday after, Days of Our Lives expanded to an hour and assumed the vacant half hour left in NBC's daytime schedule.
How to Survive a Marriage thus holds a rather dubious distinction as not only the first soap opera to become a victim of the first daytime serial, its sister NBC soap Another World, expanding to a full hour, but the second one as well, Days of Our Lives. Numerous other existing serials on ABC and CBS would expand to 60 minutes daily over the next five years or so, cutting down on the |
https://en.wikipedia.org/wiki/Variable%20Data%20Intelligent%20Postscript%20Printware | Variable Data Intelligent Postscript Printware is an open language from Xerox that enables highest-performance output of variable-data PostScript documents. It is used by the FreeFlow VI Suite (VIPP) front end.
Origins
VIPP was originally called XGF and it is simply groups of PostScript dictionaries which provide macros that simplify writing of complex PostScript commands. PostScript is powerful language which allows variable data printing and personalization of the data stream with the right commands. To implement some of these features a programmer has to write a few, or sometimes many, lines of code. Xerox developed macro procedures in PostScript language dictionaries to make page control easier.
For example, to merge a graphic form with the data stream requires an understanding of PostScript commands according to the Adobe PostScript Language Reference Manual (PLRM, otherwise known as the "Red book"). Xerox gives you this feature through this simple command "(formname) SETFORM", where formname is the name of the form accessible from the Xerox printer controller (DocuSP or FreeFlow Print Server). Several VIPP commands are identical to PostScript commands.
VIPP was originally written by couple of Xerox systems Analysts in Switzerland to enable the highest speed Postscript printers, at that time 50 pages per minute, to have the features of Xerox's proprietary production printing languages PDL and FDL which provide simple variable data printing. Xerox Corporation adopted the idea and developed their work by putting these procedures on Sun Microsystems hosts where the Adobe interpreter also resides. Together, these modules give complete control over the printing engine and data stream.
Operation
VIPP can be used in four different modes: Database mode, Line mode, XML mode and Native mode. In Database mode, the programmer can quickly implement a printing solution, for example a billing application, for a delimited database file. In Line mode, an existing print application can be enhanced with form overlays, font selection, color and other features offered by modern laser printers. In XML mode, an XML file can be turned into a readable document. In all modes, VIPP offers conditional logic manipulation of the data.
For example, a multi-page bill could be printed in duplex (two-sided) mode with the first page selected from a paper tray loaded with a perforated sheet for remittance return, and the back side printed with disclosures and instructions, while subsequent pages of billing detail are printed on plain paper. The VIPP programmer might even insert an OCR or MICR line for remittance processing, complete with a check digit.
Xerox markets an Interactive Development Environment for VIPP called FreeFlow VI Designer. and FreeFlow VIPP Pro Publisher. These help a programmer code applications rapidly in VIPP. FreeFlow VIPP Pro Publisher is a plugin to the popular Adobe InDesign product enabling WYSIWYG VIPP development.
Licensing
VIPP is license |
https://en.wikipedia.org/wiki/Covering%20problems | In combinatorics and computer science, covering problems are computational problems that ask whether a certain combinatorial structure 'covers' another, or how large the structure has to be to do that. Covering problems are minimization problems and usually integer linear programs, whose dual problems are called packing problems.
The most prominent examples of covering problems are the set cover problem, which is equivalent to the hitting set problem, and its special cases, the vertex cover problem and the edge cover problem.
Covering Problems allows the covering primitives to overlap, If you want to cover something with primitives that don't overlap is called Decomposition_(disambiguation)
General linear programming formulation
In the context of linear programming, one can think of any minimization linear program as a covering problem if the coefficients in the constraint matrix, the objective function, and right-hand side are nonnegative. More precisely, consider the following general integer linear program:
Such an integer linear program is called a covering problem if for all and .
Intuition: Assume having types of object and each object of type has an associated cost of . The number indicates how many objects of type we buy. If the constraints are satisfied, it is said that is a covering (the structures that are covered depend on the combinatorial context). Finally, an optimal solution to the above integer linear program is a covering of minimal cost.
Kinds of covering problems
There are various kinds of covering problems in graph theory, computational geometry and more; see :Category:Covering problems. Other stochastic related versions of the problem can be found.
Covering in Petri nets
For Petri nets, the covering problem is defined as the question if for a given marking, there exists a run of the net, such that some larger (or equal) marking can be reached. Larger means here that all components are at least as large as the ones of the given marking and at least one is properly larger.
Rainbow covering
In some covering problems, the covering should satisfy some additional requirements. In particular, in the rainbow covering problem, each of the original objects has a "color", and it is required that the covering contains exactly one (or at most one) object of each color. Rainbow covering was studied e.g. for covering points by intervals:
There is a set J of n colored intervals on the real line, and a set P of points on the real line.
A subset Q of J is called a rainbow set if it contains at most a single interval of each color.
A set of intervals J is called a covering of P if each point in P is contained in at least one interval of Q.
The Rainbow covering problem is the problem of finding a rainbow set Q that is a covering of P.
The problem is NP-hard (by reduction from linear SAT).
Conflict-free covering
A more general notion is conflict-free covering. In this problem:
There is a set O of m objects, and a conf |
https://en.wikipedia.org/wiki/DFP | DFP may stand for:
Dominica Freedom Party
Data Facility Product, an IBM program product for MVS, and later a component of Data Facility Storage Management Subsystem for MVS
Davidon-Fletcher-Powell formula in mathematical optimization
Decimal floating point
Defensive fighting position, a military term
Department of Finance and Personnel
VESA Digital Flat Panel
Diisopropylfluorophosphate
Doriot, Flandrin & Parant, a French car manufacturer.
Downstream-facing port, sends data downstream
Dysfunctional Family Picnic, a series of US rock concerts
DoubleClick for Publishers, merged into Google Ad Manager |
https://en.wikipedia.org/wiki/EI | EI or Ei may refer to:
Arts and media
"E.I." (song), a single by Nelly
E/I, a type of children's television programming shown in the United States
Ei (album), an album by Maija Vilkkumaa
"Ei" (song), its first single
Eerie, Indiana, an American television series
Enrique Iglesias, Spanish pop music singer-songwriter
Exposure index, the film speed rating of photographic film as exposed
Businesses and organizations
Aer Lingus (IATA code EI), the flag airline of Ireland
The Earth Institute, a collection of research centers at Columbia University
Education International, a global union federation of teachers' trade unions
Elektronska Industrija Niš, electronics enterprise based in Niš, Serbia
Energy Institute, the main professional organization for the energy industry within the UK
Engineers Ireland, the professional body for engineers and engineering in Ireland
Enterprise Ireland, is the Irish government organisation responsible for the development and growth of Irish enterprises in world markets.
Expeditors International, the global logistics and freight forwarding company based out of Seattle, Washington
The Electronic Intifada, an online publication covering the Israeli-Palestinian conflict from a Palestinian perspective
Linguistics
⟨ei⟩, a digraph found in some Latin alphabets
The original name of the Greek letter Epsilon
ɛɪ in the International Phonetic Alphabet (IPA)
Places
Ei, Kagoshima, a town located in Ibusuki District, Kagoshima, Japan
Emerald Isle, North Carolina, a town in Carteret County, North Carolina, United States
Science, technology, and mathematics
Ei (prefix symbol), the prefix abbreviation of the binary unit prefix "exbi"
Earth Interactions, a scientific journal published by the American Meteorological Society, American Geophysical Union, and Association of American Geographers
Ei Compendex, an engineering bibliographic database
Electron ionization, an ionization method in which energetic electrons interact with gas phase atoms or molecules to produce ions
Electronic ignition, a variety of modern ignition system
Engineering Index, an article index for engineering journals
Engineer intern, an intermediary step to becoming a Professional Engineer
Environmental illness (multiple chemical sensitivity), a chronic medical condition characterized by symptoms that the affected person attributes to exposure to low levels of chemicals
Ionization energy (EI), the energy required to remove one electron from one atom to another
Equine influenza, the disease caused by strains of Influenza A that are enzootic in horse species
Exponential integral, a special function defined on the complex plane given the symbol Ei
Other uses
Education Index, a United Nations measure of the level of educational development in a country
Emotional intelligence, the ability to identify, assess, and control emotions
Employment insurance, the unemployment benefits system of Canada
Encyclopaedia of Islam, an encyclopaedia of |
https://en.wikipedia.org/wiki/Sabrina%20Sabrok | Lorena Fabiana Colotta (born March 4, 1970), known professionally as Sabrina Sabrok, is an Argentine television host, cyberpunk rock singer, adult model, pornographic actress, and producer.
Discography
Deal with the devil (2016)
Dangerous love (2016)
Antisocial EP (2009)
Jugando Con Sangre (2008)
Sabrina EP (2006)
Sodomizado Estas (2002)
Primeras IV (2001)
Primeras III (1999)
Primeras II (1998)
Primeras (1997)
Television appearances
Sabrok has appeared in several television shows such as La hora pico (as a model), and the Mexican edition of the reality show Big Brother VIP. She hosted her own television show on TeleHit, called Sabrina, El Sexo en su Máxima Expresión or more commonly known simply as Sabrina. In 2015, Sabrok took part in the TV segment 'Te lo hundo y te mojas', alongside Andrea Rincon.
Personal life
Since 2016, Sabrok has been married to Alexandro Hernandez, a musician fifteen years her junior. Sabrok has two daughters, Dulcinea, from a previous relationship with Roberto Dubaz, and Metztli (who is deaf and is autistic), from her relationship with to Erick Farjeat. Both children live with their fathers. In 2020, she alleged that professional wrestler Cibernético was the biological father of her daughter, and not Farjeat.
References
External links
"Sabrina Sabrok", Sabrina's Cyberpunk Band
Sabrina's Television Show, retrieved Sept 19, 2008 at the Internet Archive
1970 births
Argentine expatriates in Mexico
Argentine female models
Argentine film actresses
Argentine people of Italian descent
Argentine rock musicians
Argentine television personalities
Women television personalities
Big Brother (franchise) contestants
Cyberpunk music
Argentine LGBT rights activists
Nu metal singers
People from Buenos Aires
Living people |
https://en.wikipedia.org/wiki/Canonicalization | In computer science, canonicalization (sometimes standardization or normalization) is a process for converting data that has more than one possible representation into a "standard", "normal", or canonical form. This can be done to compare different representations for equivalence, to count the number of distinct data structures, to improve the efficiency of various algorithms by eliminating repeated calculations, or to make it possible to impose a meaningful sorting order.
Usage cases
Filenames
Files in file systems may in most cases be accessed through multiple filenames. For instance in Unix-like systems, the string "/./" can be replaced by "/". In the C standard library, the function realpath() performs this task. Other operations performed by this function to canonicalize filenames are the handling of /.. components referring to parent directories, simplification of sequences of multiple slashes, removal of trailing slashes, and the resolution of symbolic links.
Canonicalization of filenames is important for computer security. For example, a web server may have a restriction that only files under the cgi directory C:\inetpub\wwwroot\cgi-bin may be executed. This rule is enforced by checking that the path starts with C:\inetpub\wwwroot\cgi-bin\ and only then executing it. While the file C:\inetpub\wwwroot\cgi-bin\..\..\..\Windows\System32\cmd.exe initially appears to be in the cgi directory, it exploits the .. path specifier to traverse back up the directory hierarchy in an attempt to execute a file outside of cgi-bin. Permitting cmd.exe to execute would be an error caused by a failure to canonicalize the filename to the simplest representation, C:\Windows\System32\cmd.exe, and is called a directory traversal vulnerability. With the path canonicalized, it is clear the file should not be executed.
Unicode
In Unicode, many accented letters can be represented in more than one way. For example, é can be represented in Unicode as the Unicode character U+0065 (LATIN SMALL LETTER E) followed by the character U+0301 (COMBINING ACUTE ACCENT), but it can also be represented as the precomposed character U+00E9 (LATIN SMALL LETTER E WITH ACUTE). This makes string comparison more complicated, since every possible representation of a string containing such glyphs must be considered. To deal with this, Unicode provides the mechanism of canonical equivalence. In this context, canonicalization is Unicode normalization.
Variable-width encodings in the Unicode standard, in particular UTF-8, may cause an additional need for canonicalization in some situations. Namely, by the standard, in UTF-8 there is only one valid byte sequence for any Unicode character, but some byte sequences are invalid, i. e. cannot be obtained by encoding any string of Unicode characters into UTF-8. Some sloppy decoder implementations may accept invalid byte sequences as input and produce a valid Unicode character as output for such a sequence. If one uses such a decoder, some |
https://en.wikipedia.org/wiki/Amit%20Yoran | Amit Yoran is chairman and chief executive officer of Tenable, a position held since January 3, 2017. Previously, Yoran was president of computer and network security company RSA.
Yoran joined RSA during his tenure as CEO of NetWitness Corp., which was acquired by RSA's parent company, EMC, in April 2011. Prior to his time at NetWitness, Yoran was the National Cyber Security Division director within the United States Department of Homeland Security. He took up the post in September 2003 and served as the initial director of the US-CERT. He resigned in October 2004.
Earlier in his career, Yoran was a co-founder and CEO of Riptech, which was acquired by Symantec in August 2002. He has also served on the board of directors of Cyota (acquired by RSA), Guardium (acquired by IBM), Guidance Software (GUID), and other internet security technology companies.
Yoran is a graduate of the United States Military Academy and served as one of the founding members of the US Department of Defense's Computer Emergency Response Team. He has a master's degree in computer science..
References
United States Department of Homeland Security officials
Living people
George W. Bush administration personnel
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/WBAI | WBAI (99.5 FM) is a non-commercial, listener-supported radio station licensed to New York, New York. Its programming is a mixture of political news, talk and opinion from a left-leaning, liberal or progressive viewpoint, and eclectic music. The station is owned by the Pacifica Foundation with studios located in Brooklyn and transmitter located at 4 Times Square.
History
Origins
The station began as WABF, which first went on the air in 1941 as W75NY, of Metropolitan Television, Inc. (W75NY indicating an eastern station at 47.5 MHz in New York), and moved to the 99.5 frequency in 1947. In 1955, after two years off the air, it was reborn as WBAI (after then-owners Broadcast Associates, Inc.).
1960s
WBAI was purchased by philanthropist Louis Schweitzer, who donated it to the Pacifica Foundation in 1960. The station, which had been a commercial enterprise, became non-commercial and listener-supported under Pacifica ownership.
The history of WBAI during this period is iconoclastic and contentious. Referred to in a New York Times Magazine piece as "an anarchist's circus," one station manager was jailed in protest. The staff, in protest at sweeping proposed changes of another station manager, seized the studio facilities, then located in a deconsecrated church, as well as the transmitter, located at the Empire State Building. During the 1960s, the station hosted innumerable anti-establishment causes, including anti-Vietnam war activists, feminists (and live coverage of purported bra-burning demonstrations), kids lib, early Firesign Theater comedy, and complete-album music overnight. It refused to stop playing Janis Ian's song about interracial relationships "Society's Child". Extensive daily coverage of the Vietnam war included the ongoing body count and innumerable anti-war protests.
WBAI played a major role in the evolution and development of the counterculture of the 1960s and early 1970s. Arlo Guthrie's "Alice's Restaurant" was first broadcast on Radio Unnameable, Bob Fass' freeform radio program on WBAI, a program which itself in many ways created, explored, and defined the possibilities of the form. The station covered the 1968 seizure of the Columbia University campus live and uninterrupted. With its signal reaching nearly 70 miles beyond New York City, its reach and influence, both direct and indirect, were significant. Among the station's weekly commentators in the 1960s were author Ayn Rand, British politician/playwright Sir Stephen King-Hall, and author Dennis Wholey. The 1964 Political conventions were "covered" satirically on WBAI by Severn Darden, Elaine May, Burns and Schreiber, David Amram, Julie Harris, Taylor Mead, and members of The Second City improvisational group. The station, under Music Directors John Corigliano, Ann McMillan and, later Eric Salzman, aired an annual 23-hour nonstop presentation of Richard Wagner's Ring Cycle, as recorded at the Bayreuth Festival the year before, and produced live studio performances of emer |
https://en.wikipedia.org/wiki/Technorati | Technorati was a search engine and a publisher advertising platform that served as an advertising solution for the thousands of websites in its network. Technorati launched its ad network in 2008, and at one time was one of the largest ad networks reaching more than 100 million unique visitors per month. The name Technorati was a portmanteau of the words technology and literati, which evokes the notion of technological intelligence or intellectualism.
In 2016, Synacor acquired Technorati for $3 million.
The company's core product was previously an Internet search engine for searching blogs. The website stopped indexing blogs and assigning authority scores in May 2014 with the launch of its new website, which is focused on online publishing and advertising. Technorati was founded by Dave Sifry, with its headquarters in San Francisco, California, USA. Kevin Marks was the site's Principal Engineer. Tantek Çelik was the site's Chief Technologist.
The site won the SXSW 2006 awards for Best Technical Achievement and Best of Show. It was nominated for a 2006 Webby Award for
Best Practices, but lost to Flickr and Google Maps.
Reception
In February 2006, Debi Jones pointed out that Technorati's "State of the Blogosphere" postings, which then claimed to track 27.7 million blogs, did not take into account MySpace blogs, of which she said that there were 56 million. As a result, she said that the utility of Technorati as a gauge of blog popularity was questionable. However, by March 2006, Aaron Brazell pointed out that Technorati had started tracking MySpace blogs.
In May 2006, Technorati teamed up with the PR agency Edelman. The deal earned a lot of criticism, both on principle and as a result of Edelman's 2006 fake blog scandals. Edelman and Technorati officially ended the deal in December 2006. That month, Oliver Reichenstein pointed out that the so-called "State of the Blogosphere" was more of a PR-tool and money maker for Edelman and Technorati than a reliable source, explaining in particular: a) why Technorati/Edelman's claim that "31% of the blogs are written in Japanese" was "bogus", and b) where the financial profit for the involved parties was in this.
In May 2007, Andrew Orlowski, writing for the tech tabloid The Register, criticized Technorati's May 2007 redesign. He suggested that Technorati had decided to focus more on returning image thumbnails rather than blog results. He also claimed that Technorati never quite worked correctly in the past and that the alleged refocus was "a tacit admission that it's given up on its original mission".
In August 2008, Technorati acquired the online magazine, Blogcritics, for an undisclosed sum of money. As a result, Blogcritic's founders – publisher Eric Olsen and technical director Phillip Winn – became full-time Technorati employees. One of the first collaborative ventures of the two entities was for Blogcritics writers to begin writing descriptions of Technorati tags.
In October 2008, Technorati |
https://en.wikipedia.org/wiki/Native%20Command%20Queuing | In computing, Native Command Queuing (NCQ) is an extension of the Serial ATA protocol allowing hard disk drives to internally optimize the order in which received read and write commands are executed. This can reduce the amount of unnecessary drive head movement, resulting in increased performance (and slightly decreased wear of the drive) for workloads where multiple simultaneous read/write requests are outstanding, most often occurring in server-type applications.
History
Native Command Queuing was preceded by Parallel ATA's version of Tagged Command Queuing (TCQ). ATA's attempt at integrating TCQ was constrained by the requirement that ATA host bus adapters use ISA bus device protocols to interact with the operating system. The resulting high CPU overhead and negligible performance gain contributed to a lack of market acceptance for TCQ.
NCQ differs from TCQ in that, with NCQ, each command is of equal importance, but NCQ's host bus adapter also programs its own first party DMA engine with CPU-given DMA parameters during its command sequence whereas TCQ interrupts the CPU during command queries and requires it to modulate the ATA host bus adapter's third party DMA engine. NCQ's implementation is preferable because the drive has more accurate knowledge of its performance characteristics and is able to account for its rotational position. Both NCQ and TCQ have a maximum queue length of 32 outstanding commands.
For NCQ to be enabled, it must be supported and enabled in the SATA host bus adapter and in the hard drive itself. The appropriate driver must be loaded into the operating system to enable NCQ on the host bus adapter.
Many newer chipsets support the Advanced Host Controller Interface (AHCI), which allows operating systems to universally control them and enable NCQ. DragonFly BSD has supported AHCI with NCQ since 2.3 in 2009. Linux kernels support AHCI natively since version 2.6.19, and FreeBSD fully supports AHCI since version 8.0. Windows Vista and Windows 7 also natively support AHCI, but their AHCI support (via the msahci service) must be manually enabled via registry editing if controller support was not present during their initial install. Windows 7's AHCI enables not only NCQ but also TRIM support on SSD drives (with their supporting firmware). Older operating systems such as Windows XP require the installation of a vendor-specific driver (similar to installing a RAID or SCSI controller) even if AHCI is present on the host bus adapter, which makes initial setup more tedious and conversions of existing installations relatively difficult as most controllers cannot operate their ports in mixed AHCI–SATA/IDE/legacy mode.
Hard disk drives
Performance
A 2004 test with the first-generation NCQ drive (Seagate 7200.7 NCQ) found that while NCQ increased IOMeter performance, desktop application performance decreased. One review in 2010 found improvements on the order of 9% (on average) with NCQ enabled in a series of Windows multitas |
https://en.wikipedia.org/wiki/Boot%20image | A boot image is a type of disk image (a computer file containing the complete contents and structure of a storage medium). When it is transferred onto a boot device it allows the associated hardware to boot.
The boot image usually includes the operating system, utilities and diagnostics, as well as boot and data recovery information. It also includes those "applications" used organization-wide. A specialized image for a particular type of user or department is called typically a departmental boot image. Building such an image can take days or weeks, and involve complex decisions about licensing and permissions - including which passwords to store in the boot image and which to require users to type in - and requires experts in software integration to do.
However, once built, the boot image can be simply copied onto devices, patched within reasonable limits, and remains disposable in case of any problems (viruses in particular). This is possible because unlike other hard drive images (which may contain any data, et al.), pure boot images contain no mission-critical data. By definition a pure boot image contains no data that cannot be reproduced from configurations or off-the-shelf executables. In particular end-user data is not part of a boot image, although some operating systems require that a copy of user preferences or configuration files be kept within the boot image itself, e.g. Microsoft Windows registry. Utilities like Norton Ghost keep a backup copy of the boot image, for quick re-imaging (often called re-installation) in the event of a problem, thus avoiding the need to diagnose a specific problem with a specific machine.
As virtual machine
Some virtual machine infrastructure can directly import and export a boot image for direct installation to "bare metal", i.e. a disk. This is the standard technique for OEMs to install identical copies of an operating system on many identical machines: The boot image is created as a virtual machine and then exported, or created on one disk and then copied via a boot image control infrastructure that also makes virtual machine copies. The VMware vCenter Converter for instance lets users "convert physical machines to virtual machines - for free" as part of that company's suite of products to make images easier to back up and manage. Equivalents exist for Xen and other VM systems.
Goals
By keeping the boot image entirely separate and disposable, and mandating boot image control, organizations seek to keep their total cost of operations (including its total cost of ownership component) low. Often such organizations look at uptime as a service.
One goal of boot image control is to minimize the number of boot images used by an organization to reduce support costs. It includes at least:
Specifying the machine hardware to minimize unneeded machine diversity and minimize the resultant number of boot images.
Upgrading new machine specifications at low additional cost ensures that they will re |
https://en.wikipedia.org/wiki/Amstrad%20NC100 | The Amstrad NC100 Notepad was an A4-size, portable Z80-based computer, released by Amstrad in 1992. It featured 64 KB of RAM, the Protext word processor, various organiser-like facilities (diary, address book and time manager), a simple calculator, and a version of the BBC BASIC interpreter.
Its screen was 80 character columns by eight rows, and not backlit, but this let the NC100 run for up to 20 hours on four standard AA cell batteries. There was an RS-232 serial port, a parallel port for connecting a printer, and a PC card socket, by means of which the computer's memory could be expanded up to 1 MB.
Design
The NC100 was designed to be a portable computer which was simple to use. That was the brief given by Sir Alan Sugar (then chairman of Amstrad) to his design staff. The NC100 project was internally referred to as Alan's "Baby" and Alan Sugar himself tested the machine for usability during the design phase. The specifications for the computer were not considered important - as long as it could serve its purpose.
The user-friendly features of the NC100 come from the software which is included in the firmware. Protext and the other applications were designed with a computer novice in mind - although experienced users can find and use a large array of more complicated features.
Alan Sugar actually wrote the first chapter of the NC100's user manual in order to show that even he could use it.
The design also included terminal emulation and XMODEM file transfer software which enabled the NC100 to communicate through dial-up analogue modems. UK tech journalist Sue Schofield used one to upload a review of the NC100 directly into the online filing computer of the Independent newspaper in 1993. The review was written on the machine, and transferred from it over a battery-powered 300 baud modem.
Upgrades
An upgraded variant, the NC200 Notebook, appeared in late 1993. This came in a clamshell-type form factor with a flip-up screen featuring a backlit 80 x 16 character text screen and double the vertical pixel resolution as the NC100. The NC200 had a 720 KB 3.5" floppy disk drive able to read/write MS-DOS-formatted disks, 128 KB RAM, and some extra software - notably three Tetris-like games and a capable spreadsheet with rudimentary database capability. However, these changes required much greater power use, requiring 5 C cell batteries. The disk drive could only be used at near full-charge, which meant that it could only be used a few hours after putting in new batteries. The laptop could function for considerably longer without using the disk drive. The backlight can be manually toggled off to save power by pressing the Control and Caps Lock keys at the same time.
An intermediate version, the NC150 Notepad, was also produced, but was available only in Italy and France; its case had the same design as the NC100, but it included the games later seen on the NC200.
Variants
Both the NC100 and NC200 were licensed to a company called NTS Computer Sy |
https://en.wikipedia.org/wiki/PC%20Zone | PC Zone, founded in 1993, was the first magazine dedicated to games for IBM-compatible personal computers to be published in the United Kingdom. Earlier PC magazines such as PC Leisure, PC Format and PC Plus had covered games but only as part of a wider remit. The precursor to PC Zone was the award-winning multiformat title Zero.
The magazine was published by Dennis Publishing Ltd. until 2004, when it was acquired by Future plc along with Computer And Video Games for £2.5m.
In July 2010, it was announced by Future plc that PC Zone was to close. The last issue of PC Zone went on sale 2 September 2010.
First issue
PC Zone was first published by Dennis Publishing in April 1993 and cost £3.95. Billed as the first UK magazine dedicated exclusively to PC games, it was sold with two accompanying floppy disks carrying game demonstrations. The first editor was Paul Lakin.
The magazine was split into four sections: Reviews, Blueprints, Features, and Regulars. Among the first titles to be reviewed were Dune II, Lemmings 2, and Stunt Island. The Blueprints section involved previews of new games and Features consisted of an article written about a specific area of gaming interest, such as gaming audio.
Regulars included a news bulletin, competitions and a Buyer's Guide which featured recommended games.
Evolution
In its original incarnation, PC Zone recognised that its audience consisted largely of males in their late twenties and older, and adopted a tone suited to that audience. This was in contrast to contemporary multiformat and console magazines aimed at children and teenagers. During this period, the PC was not yet widely recognised as a games platform in the UK, an attitude PC Zone arguably helped to change by championing a succession of notable games such as Star Control II, Star Wars: X-Wing, Ultima Underworld and Doom.
By 1995, under the initial editorship of John Davison and then later Jeremy Wells (promoted from deputy editor with Davison moving on as publisher for the title), the magazine adopted a tone which heavily referenced lad culture, which had been made fashionable by magazines such as FHM, Loaded and Dennis Publishing stablemate Maxim. This period was marked by several moderately controversial episodes, including the accidental inclusion of a pornographic Doom modification on a cover-mounted CD-ROM, an article about the infamously bug-ridden Frontier 2: First Encounters illustrated with a large photograph of a piece of excrement wrapped with a bow, a joystick group test which featured a model dressed as a nun (testing each joystick for “phallusicity”), and a one-page comic by regular contributor Charlie Brooker, graphically depicting animal cruelty (originally intended as a comment on the violence against animals frequently portrayed in the Tomb Raider games) which resulted in the offending issue being withdrawn from W H Smith newsagents.
Towards the end of the decade, during the editorship of long time contributor Chris Anderson, |
https://en.wikipedia.org/wiki/Recursive%20definition | In mathematics and computer science, a recursive definition, or inductive definition, is used to define the elements in a set in terms of other elements in the set (Aczel 1977:740ff). Some examples of recursively-definable objects include factorials, natural numbers, Fibonacci numbers, and the Cantor ternary set.
A recursive definition of a function defines values of the function for some inputs in terms of the values of the same function for other (usually smaller) inputs. For example, the factorial function is defined by the rules
This definition is valid for each natural number , because the recursion eventually reaches the base case of 0. The definition may also be thought of as giving a procedure for computing the value of the function , starting from and proceeding onwards with etc.
The recursion theorem states that such a definition indeed defines a function that is unique. The proof uses mathematical induction.
An inductive definition of a set describes the elements in a set in terms of other elements in the set. For example, one definition of the set of natural numbers is:
1 is in
If an element n is in then is in
is the intersection of all sets satisfying (1) and (2).
There are many sets that satisfy (1) and (2) – for example, the set satisfies the definition. However, condition (3) specifies the set of natural numbers by removing the sets with extraneous members. Note that this definition assumes that is contained in a larger set (such as the set of real numbers) — in which the operation + is defined.
Properties of recursively defined functions and sets can often be proved by an induction principle that follows the recursive definition. For example, the definition of the natural numbers presented here directly implies the principle of mathematical induction for natural numbers: if a property holds of the natural number 0 (or 1), and the property holds of whenever it holds of , then the property holds of all natural numbers (Aczel 1977:742).
Form of recursive definitions
Most recursive definitions have two foundations: a base case (basis) and an inductive clause.
The difference between a circular definition and a recursive definition is that a recursive definition must always have base cases, cases that satisfy the definition without being defined in terms of the definition itself, and that all other instances in the inductive clauses must be "smaller" in some sense (i.e., closer to those base cases that terminate the recursion) — a rule also known as "recur only with a simpler case".
In contrast, a circular definition may have no base case, and even may define the value of a function in terms of that value itself — rather than on other values of the function. Such a situation would lead to an infinite regress.
That recursive definitions are valid – meaning that a recursive definition identifies a unique function – is a theorem of set theory known as the recursion theorem, the proof of which is non-trivial. Where th |
https://en.wikipedia.org/wiki/Bastion%20host | A bastion host is a special-purpose computer on a network specifically designed and configured to withstand attacks, so named by analogy to the bastion, a military fortification. The computer generally hosts a single application or process, for example, a proxy server or load balancer, and all other services are removed or limited to reduce the threat to the computer. It is hardened in this manner primarily due to its location and purpose, which is either on the outside of a firewall or inside of a demilitarized zone (DMZ) and usually involves access from untrusted networks or computers. These computers are also equipped with special networking interfaces to withstand high-bandwidth attacks through the internet.
Definitions
The term is generally attributed to a 1990 article discussing firewalls by Marcus J. Ranum, who defined a bastion host as "a system identified by the firewall administrator as a critical strong point in the network security. Generally, bastion hosts will have some degree of extra attention paid to their security, may undergo regular audits, and may have modified software".
It has also been described as "any computer that is fully exposed to attack by being on the public side of the DMZ, unprotected by a firewall or filtering router. Firewalls and routers, anything that provides perimeter access control security can be considered bastion hosts. Other types of bastion hosts can include web, mail, DNS, and FTP servers. Due to their exposure, a great deal of effort must be put into designing and configuring bastion hosts to minimize the chances of penetration".
Placement
There are two common network configurations that include bastion hosts and their placement. The first requires two firewalls, with bastion hosts sitting between the first "outside world" firewall, and an inside firewall, in a DMZ. Often, smaller networks do not have multiple firewalls, so if only one firewall exists in a network, bastion hosts are commonly placed outside the firewall.
Use Cases
Though securing remote access is the main use case of a bastion server, there are a few more use cases of a bastion host such as:
Secure Remote Access
Authentication Gateway
VPN Alternative
Alternative to Internal Admin Tools
Alternative to File Transfers
Alternative way to Share Resource Credentials
Intrusion Detection
Software Inventory Management
Examples
These are several examples of bastion host systems/services:
DNS (Domain Name System) server
Email server
FTP (File Transfer Protocol) server
Honeypot
Proxy server
VPN (Virtual Private Network) server
Web server
See also
Jump server
References
Internet Protocol based network software
Computer network security |
https://en.wikipedia.org/wiki/Mark%20Lucovsky | Mark Lucovsky is an American software developer who was previously employed by Google as an Operating System Engineering Director. He also served as the General Manager of Operating Systems at Facebook. Prior to this, he worked at Microsoft and VMware. He is noted for being a part of the team that designed and built the Windows NT operating system, which, starting with Windows XP, became the basis of all current Windows releases.
Lucovsky earned his bachelor's degree in computer science in 1983 from California Polytechnic State University, San Luis Obispo. He worked at Digital Equipment Corporation, where he came to the attention of Dave Cutler and Lou Perazzoli. When Cutler and Perazzoli moved to Microsoft to work on their next generation operating system after the cancellation of the PRISM and MICA projects at Digital, they asked him to join them.
Among his contributions to Windows NT was an eighty-page manual that he wrote with Steve R. Wood defining the Windows application programming interfaces for software developers working on the Windows NT platform. He also managed check-ins to the Windows NT source code, tracking each check-in and discussing it with the developer before allowing it to be committed. Lucovsky was instrumental in moving the Windows team from the homegrown SLM revision control system to a custom version of Perforce (SourceDepot).
Lucovsky has stated that Steve Ballmer, on being informed that Lucovsky was about to leave Microsoft for Google, picked up a chair and threw it across his office, hitting a table. Lucovsky also described Ballmer as saying: "Fucking Eric Schmidt is a fucking pussy. I'm going to fucking bury that guy, I have done it before, and I will do it again. I'm going to fucking kill Google," then resumed trying to persuade Lucovsky to stay at Microsoft. Ballmer has described this as a "gross exaggeration of what actually took place."
Lucovsky worked on the Microsoft .NET My Services product (codenamed Hailstorm) prior to moving to Google. At Google, he served as a Technical Director for the Ajax Search API. He joined VMware in July 2009.
References
External links
Man Survives Steve Ballmer's Flying Chair To Build '21st Century Linux' - Wired article (November, 2011)
Markl's Thoughts - Mark's weblog on Blogger
Windows, A Software Engineering Odyssey - a talk Mark gave at the 4th Usenix Windows Systems Symposium (August, 2000)
Microsoft employees
American bloggers
Living people
Microsoft Windows people
Google employees
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/What%20a%20Cartoon%21 | What a Cartoon! (later known as The What a Cartoon! Show and The Cartoon Cartoon Show) is an American animated anthology series created by Fred Seibert for Cartoon Network. The shorts were produced by Hanna-Barbera Productions; by the end of the run, a Cartoon Network Studios production tag was added to some shorts to signal they were original to the network. The project consisted of 48 cartoons, intended to return creative power to animators and artists, by recreating the atmospheres that spawned the iconic cartoon characters of the mid-20th century. Each of the shorts mirrored the structure of a theatrical cartoon, with each film being based on an original storyboard drawn and written by its artist or creator. Three of the cartoons were paired together into a half-hour episode.
What a Cartoon! premiered under the World Premiere Toons title on February 20, 1995. The premiere aired alongside a special episode of Cartoon Network's Space Ghost Coast to Coast called "World Premiere Toon-In", which features interviews with animators Craig McCracken, Pat Ventura, Van Partible, Eugene Mattos, Genndy Tartakovsky, and Dian Parkinson. During the original run of the shorts, the series was retitled to The What a Cartoon! Show and later to The Cartoon Cartoon Show until the final shorts aired on August 23, 2002.
The series is influential for helping to revive television animation in the 1990s and serving as a launching point for the Cartoon Network animated television series Dexter's Laboratory, Johnny Bravo, Courage the Cowardly Dog, Cow and Chicken, I Am Weasel, and The Powerpuff Girls. Once it had several original shorts, those became the first Cartoon Cartoons. Following Fred Seibert's departure in 1997, Sam Register took control of the show in 1998, and by 2000, rebranded it into The Cartoon Cartoon Show, with more Cartoon Network originals being spawned from the showcase, including Sheep in the Big City, Grim & Evil (consisting of The Grim Adventures of Billy & Mandy and Evil Con Carne), Whatever Happened to... Robot Jones?, Codename: Kids Next Door, and Megas XLR. From 2005 to 2008, The Cartoon Cartoon Show was revived as a block for reruns of older Cartoon Cartoons that had been phased out by the network.
History
Origins and production
Fred Seibert became president of Hanna-Barbera Cartoons in 1992 and helped guide the struggling animation studio into its greatest output in years with shows like 2 Stupid Dogs and SWAT Kats: The Radical Squadron. Seibert wanted the studio to produce short cartoons, in the vein of the Golden age of American animation. Although a project consisting of 48 shorts would cost twice as much as a normal series, Seibert's pitch to Cartoon Network involved promising 48 chances to "succeed or fail", opened up possibilities for new original programming, and offered several new shorts to the thousands already present in the Turner Entertainment library. According to Seibert, quality did not matter much to the cable operators |
https://en.wikipedia.org/wiki/Vasa%20vasorum | Vasa vasorum are small blood vessels that comprise a vascular network supplying the walls of large blood vessels, such as elastic arteries (e.g., the aorta) and large veins (e.g., the venae cavae).
The name derives . Occasionally two different singular forms are seen: vasa vasis () and vas vasis ().
Structure
Studies conducted with 3D micro-CT on pig and human arteries from different vascular beds have shown that there are three different types of vasa vasorum:
Vasa vasorum internae, that originate directly from the main lumen of the artery and then branch into the vessel wall.
Vasa vasorum externae, that originate from branches of the main artery and then dive back into the vessel wall of the main artery.
Venous vasa vasorae, that originate within the vessel wall of the artery but then drain into the main lumen or branches of concomitant vein.
Depending on the type of vasa vasorum, it penetrates the vessel wall starting at the intimal layer (vasa vasorum interna) or the adventitial layer (vasa vasorum externa). Due to higher radial and circumferential pressures within the vessel wall layers closer to the main lumen of the artery, vasa vasorum externa cannot perfuse these regions of the vessel wall (occlusive pressure).
The structure of the vasa vasorum varies with the size, function and location of the vessels. Cells need to be within a few cell-widths of a capillary to stay alive. In the largest vessels, the vasa vasorum penetrates the outer (tunica adventitia) layer and middle (tunica media) layer almost to the inner (tunica intima) layer. In smaller vessels it penetrates only the outer layer. In the smallest vessels, the vessels' own circulation nourishes the walls directly and they have no vasa vasorum at all.
Vasa vasorum are more frequent in veins than arteries. Some authorities hypothesize that the vasa vasorum would be more abundant in large veins, as partial oxygen pressure and osmotic pressure is lower in veins. This would lead to more vasa vasorum needed to supply the vessels sufficiently. The converse argument is that generally artery walls are thicker and more muscular than veins as the blood passing through is of a higher pressure. This means that it would take longer for any oxygen to diffuse through to the cells in the tunica adventitia and the tunica media, causing them to need a more extensive vasa vasorum.
A later method of scanning is optical coherence tomography that also gives 3D imaging.
Function
The vasa vasorum are found in large veins and arteries such as the aorta and its branches. These small vessels serve to provide blood supply and nourishment for tunica adventitia and outer parts of tunica media of large vessels.
Clinical significance
In the human descending aorta, vasa vasorum cease to supply the arterial tunica media with oxygenated blood at the level of the renal arteries. Thus, below this point, the aorta is dependent on diffusion for its metabolic needs, and is necessarily markedly thinner. Th |
https://en.wikipedia.org/wiki/ROOT | ROOT is an object-oriented computer program and library developed by CERN. It was originally designed for particle physics data analysis and contains several features specific to the field, but it is also used in other applications such as astronomy and data mining. The latest minor release is 6.28, as of 2023-02-03.
Description
CERN maintained the CERN Program Library written in FORTRAN for many years. Its development and maintenance were discontinued in 2003 in favour of ROOT, which is written in the C++ programming language.
ROOT development was initiated by René Brun and Fons Rademakers in 1994. Some parts are published under the GNU Lesser General Public License (LGPL) and others are based on GNU General Public License (GPL) software, and are thus also published under the terms of the GPL. It provides platform independent access to a computer's graphics subsystem and operating system using abstract layers. Parts of the abstract platform are: a graphical user interface and a GUI builder, container classes, reflection, a C++ script and command line interpreter (CINT in version 5, cling in version 6), object serialization and persistence.
The packages provided by ROOT include those for
Histogramming and graphing to view and analyze distributions and functions,
curve fitting (regression analysis) and minimization of functionals,
statistics tools used for data analysis,
matrix algebra,
four-vector computations, as used in high energy physics,
standard mathematical functions,
multivariate data analysis, e.g. using neural networks,
image manipulation, used, for instance, to analyze astronomical pictures,
access to distributed data (in the context of the Grid),
distributed computing, to parallelize data analyses,
persistence and serialization of objects, which can cope with changes in class definitions of persistent data,
access to databases,
3D visualizations (geometry),
creating files in various graphics formats, like PDF, PostScript, PNG, SVG, LaTeX, etc.
interfacing Python code in both directions,
interfacing Monte Carlo event generators.
A key feature of ROOT is a data container called tree, with its substructures branches and leaves. A tree can be seen as a sliding window to the raw data, as stored in a file. Data from the next entry in the file can be retrieved by advancing the index in the tree. This avoids memory allocation problems associated with object creation, and allows the tree to act as a lightweight container while handling buffering invisibly.
ROOT is designed for high computing efficiency, as it is required to process data from the Large Hadron Collider's experiments estimated at several petabytes per year. ROOT is mainly used in data analysis and data acquisition in particle physics (high energy physics) experiments, and most experimental plots and results in those subfields are obtained using ROOT.
The inclusion of a C++ interpreter (CINT until version 5.34, Cling from version 6.00) makes this package v |
https://en.wikipedia.org/wiki/Transport%20in%20Milan | Milan has an extensive internal transport network and is also an important transportation node in Italy, being one of the country's biggest hubs for air, rail and road networks.
Internal public transport network includes the Metro, the Suburban Railway, the tram and bus network, as well as taxi, car and bike sharing services.
History
Early public transport service in Milan dates back to 1801, operated with horse-drawn carriages. After the relocation of the capital of the Italian Kingdom to Milan in 1805, national and international transport services were inaugurated, all operated with carriages, to Vienna, Marseille and several Italian cities.
Transport via the Navigli canals was also an important transport mode in that period.
The first bus line was opened in 1827, connecting Milan to Lodi. The first railway, to Monza, was inaugurated in 1840. It is currently part of the Milan-Chiasso international railway.
Public transportation
Metro
The Milan Metro is a rapid transit system, running mainly underground, serving Milan and other surrounding cities. The network consists of 5 lines, identified by different colors and numbers:
Milan Metro has a total length of , serving 113 stations, making it the longest metro network in Italy. The system carries about 1.15 million passengers per day.
Suburban rail
The suburban railway service consists of 12 lines connecting Milan to the greater metropolitan area:
The system was brought together from existing lines and the construction of the new Passante, an underground railway line passing through the city. The service began operation in 2004 and now comprises 124 stations. Several extensions are planned.
Trams
The Tram network comprises 17 urban lines. The system is more than 170 km long and is the biggest network in Italy.
The Milan tram network dates back to 1876, when the first horse driven tram line began operation. In 1878 the first steam powered tram was launched and by 1901 all the lines were electric powered. In 1910 line numbers were first introduced. At that time the network was already consisting of 30 lines. Until 1917 the tram system was operated by several different companies, however, since that year the municipality took control over the whole network.
In the 1920s the famous Class 1500 streetcars were introduced. Many of them, restored, are still in use today.
Beginning from the late 1950s and until the end of the 1970s the tram network was reduced, being replaced in some areas by the new Metro lines or by bus lines.
Buses
There are 67 bus and 4 trolleybus lines in Milan. Most of the routes do not run during the night, however, bus services on demand are available in the weekend at night.
New night bus lines during weekends have been introduced since 24 September 2011, running from 2 am to 6 am on Fridays and Saturdays. The new network was considered a success, with more than 8,000 people using the lines every weekend.
Public transport statistics
The average amount of time |
https://en.wikipedia.org/wiki/YellowTAB | yellowTAB was a German software firm that produced an operating system called "yellowTAB ZETA". While the operating system was based on BeOS 5.1.0, the company never publicly confirmed that it has the BeOS source code or what their licensing agreement with BeOS's owners PalmSource was. The company went insolvent and ceased trading in 2006. Later, David Schlesinger, directory of Open Source technologies at ACCESS, Inc., which had meanwhile become the owner of the BeOS source code, stated that there had never been a license agreement covering yellowTAB's use of the source code and that ZETA was therefore an infringed copy.
The company's offices were in Mannheim, and its corporate motto was Assume The Power. Following their closure, the OS was taken over by magnussoft, who started selling it as "magnussoft ZETA".
yellowTAB has come under some criticism from the BeOS userbase, who claim that the company did not give back what it took from the Haiku project and other open source BeOS projects. In many cases, open source programmers have recreated yellowTAB's extensions to BeOS, most notably their SVG graphics extensions to OpenTracker. However, yellowTAB's actions to date have not violated the BSD/MIT licences under which most open source BeOS projects exist.
In March 2006, yellowTAB donated their "Intel Extreme" driver to one of the Haiku developers for integration into the Haiku source tree where further development was to take place. Both yellowTAB and Haiku developers were to collaborate on Intel Extreme Graphics driver development, but to date this code has not yet been committed to the repository.
In April 2006, insolvency protection proceedings were filed for the company, although employees denied that it was actually filed by the company, suggesting potential malicious intent. However, the firm has transferred development and support of ZETA to a third-party, magnussoft.
References
External links
yellowTAB - official site
Software companies of Germany
BeOS
Companies based in Mannheim |
https://en.wikipedia.org/wiki/Magnussoft%20ZETA | magnussoft ZETA, earlier yellowTAB ZETA, was an operating system formerly developed by yellowTAB of Germany based on the Be Operating System developed by Be Inc.; because of yellowTAB's insolvency, ZETA was later being developed by an independent team of which little was known, and distributed by magnussoft. As of February 28, 2007 the current version of ZETA is 1.5. On March 28, 2007, magnussoft announced that it has discontinued funding the development of ZETA by March 16, because the sales figures had fallen far short of the company's expectations, so that the project was no longer economically viable. A few days later, the company also stopped the distribution of ZETA in reaction to allegations that ZETA constituted an illegal unlicensed derivative of the BeOS source code and binaries.
Development
ZETA was an effort to bring BeOS up to date, adding support for newer hardware, and features that had been introduced in other operating systems in the years since Be Incorporated ceased development in 2001. Among the new features were USB 2.0 support, SATA support, samba support, a new media player, and enhanced localization of system components. Unlike Haiku and other open source efforts to recreate some or all of BeOS's functionality from scratch, ZETA was based on the actual BeOS code base, and it is closed source.
ZETA contributed to an increase in activity in the BeOS commercial software market, with a number of new products for both ZETA and the earlier BeOS being released.
However, some critics point to a list of goals for the first release that do not appear to have been met (including Java 1.4.2 and ODBC support). Other reviewers point to bugs that still exist from BeOS, and question whether yellowTAB has the complete access to the source code they would need to make significant updates.
Some changes that were made could break compilation of code, and in some cases (most notably Mozilla), break the actual application if any code optimizations are applied, resulting in much slower builds.
YellowTAB promoted ZETA mainly in the German market, where it used to be sold through infomercials and on RTL Shop, and in Japan still being a beta version. Prior to Magnussoft stopping the distribution of ZETA, it was mainly distributed directly by magnussoft.
Versions
Criticism
ZETA and yellowTAB have been surrounded by controversy. Critics of yellowTAB questioned for a long time the legality of ZETA, and whether yellowTAB had legal access to the sources of BeOS; it is now known that yellowTAB could not have developed ZETA to the extent that they did without access to the source code, but doubts remain as to whether yellowTAB actually had legal access to the code or not.
Furthermore, critics did not see ZETA as real advancement of BeOS, but rather as an unfinished and buggy operating system loaded with third party applications that were either obsolete, unsupported, or non-functional. This was particularly true in the initial releases of ZETA, |
https://en.wikipedia.org/wiki/Logic%20family | In computer engineering, a logic family is one of two related concepts:
A logic family of monolithic digital integrated circuit devices is a group of electronic logic gates constructed using one of several different designs, usually with compatible logic levels and power supply characteristics within a family. Many logic families were produced as individual components, each containing one or a few related basic logical functions, which could be used as "building-blocks" to create systems or as so-called "glue" to interconnect more complex integrated circuits.
A logic family may also be a set of techniques used to implement logic within VLSI integrated circuits such as central processors, memories, or other complex functions. Some such logic families use static techniques to minimize design complexity. Other such logic families, such as domino logic, use clocked dynamic techniques to minimize size, power consumption and delay.
Before the widespread use of integrated circuits, various solid-state and vacuum-tube logic systems were used but these were never as standardized and interoperable as the integrated-circuit devices. The most common logic family in modern semiconductor devices is metal–oxide–semiconductor (MOS) logic, due to low power consumption, small transistor sizes, and high transistor density.
Technologies
The list of packaged building-block logic families can be divided into categories, listed here in roughly chronological order of introduction, along with their usual abbreviations:
Resistor–transistor logic (RTL)
Direct-coupled transistor logic (DCTL)
Direct-coupled unipolar transistor logic (DCUTL)
Resistor–capacitor–transistor logic (RCTL)
Emitter-coupled logic (ECL)
Positive emitter-coupled logic (PECL)
Low-voltage PECL (LVPECL)
Complementary transistor micrologic (CTuL)
Diode–transistor logic (DTL)
Complemented transistor diode logic (CTDL)
High-threshold logic (HTL)
Transistor–transistor logic (TTL)
Metal–oxide–semiconductor (MOS) logic
P-type MOS (PMOS) logic
N-type MOS (NMOS) logic
Depletion-load NMOS logic
High-density NMOS (HMOS)
Complementary MOS (CMOS) logic
Bipolar MOS (BiMOS) logic
Bipolar CMOS (BiCMOS)
Integrated injection logic (I2L)
Gunning transceiver logic (GTL)
The families (RTL, DTL, and ECL) were derived from the logic circuits used in early computers, originally implemented using discrete components. One example is the Philips NORBIT family of logic building blocks.
The PMOS and I2L logic families were used for relatively short periods, mostly in special purpose custom large-scale integration circuits devices and are generally considered obsolete. For example, early digital clocks or electronic calculators may have used one or more PMOS devices to provide most of the logic for the finished product. The F14 CADC, Intel 4004, Intel 4040, and Intel 8008 microprocessors and their support chips were PMOS.
Of these families, only ECL, TTL, NMOS, CMOS, and BiCMOS are currently still in w |
https://en.wikipedia.org/wiki/Cray%20XD1 | The Cray XD1 was an entry-level supercomputer range, made by Cray Inc.
The XD1 uses AMD Opteron 64-bit CPUs, and utilizes the Direct Connect Architecture over HyperTransport to remove the bottleneck at the PCI and contention at the memory. The MPI latency is ¼ that of Infiniband, and 1/30 that of Gigabit Ethernet.
The XD1 was originally designed by OctigaBay Systems Corp. of Vancouver, British Columbia, Canada as the OctigaBay 12K system. The company was acquired by Cray Inc. in February 2004.
Announced on 4 October 2004, the Cray XD1 range incorporate Xilinx Virtex-II Pro FPGAs for application acceleration. With 12 CPUs in a chassis, and up to 12 chassis installable in a rack, XD1 systems may hold several 144-CPU multiples in multirack configurations. The operating system used on the XD1 is a customized version of Linux, and the machine's load balancing / resource management system is an enhanced version of Sun Microsystems' Sun Grid Engine.
External links
Cray Legacy Products
Xd1
X86 supercomputers |
https://en.wikipedia.org/wiki/Evolutionary%20robotics | Evolutionary robotics is an embodied approach to Artificial Intelligence (AI) in which robots are automatically designed using Darwinian principles of natural selection. The design of a robot, or a subsystem of a robot such as a neural controller, is optimized against a behavioral goal (e.g. run as fast as possible). Usually, designs are evaluated in simulations as fabricating thousands or millions of designs and testing them in the real world is prohibitively expensive in terms of time, money, and safety.
An evolutionary robotics experiment starts with a population of randomly generated robot designs. The worst performing designs are discarded and replaced with mutations and/or combinations of the better designs. This evolutionary algorithm continues until a prespecified amount of time elapses or some target performance metric is surpassed.
Evolutionary robotics methods are particularly useful for engineering machines that must operate in environments in which humans have limited intuition (nanoscale, space, etc.). Evolved simulated robots can also be used as scientific tools to generate new hypotheses in biology and cognitive science, and to test old hypothesis that require experiments that have proven difficult or impossible to carry out in reality.
History
In the early 1990s, two separate European groups demonstrated different approaches to the evolution of robot control systems. Dario Floreano and Francesco Mondada at EPFL evolved controllers for the Khepera robot. Adrian Thompson, Nick Jakobi, Dave Cliff, Inman Harvey, and Phil Husbands evolved controllers for a Gantry robot at the University of Sussex.
However the body of these robots was presupposed before evolution.
The first simulations of evolved robots were reported by Karl Sims and Jeffrey Ventrella of the MIT Media Lab, also in the early 1990s. However these so-called virtual creatures never left their simulated worlds. The first evolved robots to be built in reality were 3D-printed by Hod Lipson and Jordan Pollack at Brandeis University at the turn of the 21st century.
See also
Bio-inspired robotics
Evolutionary computation
References
Evolutionary computation
Robotics |
https://en.wikipedia.org/wiki/Sharp%20PC-1211 | The Sharp PC-1211 is a pocket computer marketed by Sharp Corporation in the 1980s. The computer was powered by two 4-bit CPUs laid out in power-saving CMOS circuitry. One acted as the main CPU, the other dealt with the input/output and display interface. Users could write computer programs in BASIC.
A badge-engineered version of the PC-1211 was marketed by Radio Shack as the first iteration of the TRS-80 Pocket Computer with just a marginally different look (outer plastic parts in black, not brown, gray display frame)
Technical specifications
24 digit dot matrix LCD
Full QWERTY-style keyboard
Integrated beeper
Connector for printer and tape drive
Programmable in BASIC
Uses four MR44 Mercury button cells
Battery life in excess of 200 hours
1424 program steps, 26 permanent variable locations (- or -) and 178 variables shared with program steps
Built out of off-the-shelf CMOS components, including SC43177/SC43178 processors at and three TC5514P RAM modules
Accessories
CE-121 Cassette Interface
CE-122 Printer
TRS-80 Pocket Computer ("PC-1")
A badge-engineered version of the Sharp PC-1211 was marketed by Radio Shack as the original TRS-80 Pocket Computer. (This was later referred to as the "PC-1" to differentiate it from subsequent entries (PC-2 onwards) in the TRS-80 Pocket Computer line.)
Introduced in July 1980, the "PC-1" measured 175 × 70 × 15 mm and weighed 170 g, and had a one-line, 24-character alphanumeric LCD.
The TRS-80 Pocket Computer was programmable in BASIC, with a capacity of 1424 "program steps". This memory was shared with variable storage of up to 178 locations, in addition to the 26 fixed locations named A through Z. The implementation was based on Palo Alto Tiny BASIC.
Programs and data could be stored on a Compact Cassette through an optional external cassette tape interface unit. A printer/cassette interface was available, which used an ink ribbon on plain paper.
See also
Sharp pocket computer character sets
References
External links
Sharp PC-1211 on MyCalcDB (database about 1970s and 1980s pocket calculators)
www.promsoft.com/calcs Sharp Pocket Computers
Daves Old Computers - TRS-80 Pocket Computer
The TRS-80 Pocket Computer
PC-1211
PC-1211
Computer-related introductions in 1980 |
https://en.wikipedia.org/wiki/White%20box | White box may refer to:
White-box testing, a specification conformance test
White box (computer hardware), a personal computer assembled from off-the-shelf parts
White box (software engineering), a subsystem whose internals can be viewed
White-box cryptography, a cryptographic system designed to be secure even when its internals are viewed
Whitebox GAT, an advanced open-source and cross-platform GIS & remote sensing software package
WHITEbox, an album set by Sunn O)))
"White Box", the title of a special Christmas episode in Series 5 of Absolutely Fabulous
White box system, a bilge water monitoring and control system for ships
The "white box" release of the original Dungeons & Dragons rules
White box, Eucalyptus albens, a tree species from Australia
Shirobako (lit. White Box), an anime television series produced by P.A.Works
WhiteBox (art center), an arts center in New York City, United States
See also
Black box (disambiguation)
Grey box (disambiguation)
White cube gallery
White goods |
https://en.wikipedia.org/wiki/Doom%20modding | Doom WAD is the default format of package files for the video game Doom and its sequel Doom II: Hell on Earth, that contain sprites, levels, and game data. WAD stands for Where's All the Data? Immediately after its release in 1993, Doom attracted a sizeable following of players who created their own mods for WAD files—packages containing new levels or graphics—and played a vital part in spawning the mod-making culture which is now commonplace for first-person shooter games. Thousands of WADs have been created for Doom, ranging from single custom levels to full original games; most of these can be freely downloaded over the Internet. Several WADs have also been released commercially, and for some people the WAD-making hobby became a gateway to a professional career as a level designer.
There are two types of WADs: IWADs (internal WADs) and PWADs (patch WADs). IWADs contain the data necessary to load the game, while PWADs contain additional data, such as new character sprites, as necessary for custom levels.
History of WADs
Development of Doom
When developing Doom, id Software was aware that many players had tried to create custom levels and other modifications for their previous game, Wolfenstein 3D. However, the procedures involved in creating and loading modifications for that game were cumbersome.
John Carmack, lead programmer at id Software, designed the Doom internals from the ground up to allow players to extend the game. For that reason, game data such as levels, graphics, sound effects, and music are stored separately from the game engine, in "WAD" files, allowing for third parties to make new games without making any modifications to the engine. Tom Hall is responsible for coming up with the name WAD.
The idea of making Doom easily modifiable was primarily backed by Carmack, a well-known supporter of copyleft and the hacker ideal of people sharing and building upon each other's work, and by John Romero, who had hacked games in his youth and wanted to allow other gamers to do the same. However, some, including Jay Wilbur and Kevin Cloud, objected due to legal concerns and the belief that it would not be of any benefit to the company's business.
Utilities and WADs
Immediately after the initial shareware release of Doom on December 10, 1993, players began working on various tools to modify the game. On January 26, 1994, Brendon Wyber released the first public domain version of the Doom Editing Utility (DEU) program on the Internet, a program created by Doom fans which made it possible to create entirely new levels. DEU continued development until May 21 of the same year. It was made possible by Matt Fell's release of the Unofficial Doom specifications. Shortly thereafter, Doom players became involved with further enhancing DEU. Raphaël Quinet spearheaded the program development efforts and overall project release, while Steve Bareman lead the documentation effort and creation of the DEU Tutorial. More than 30 other people also helped w |
https://en.wikipedia.org/wiki/Online%20game | An online game is a video game that is either partially or primarily played through the Internet or any other computer network available. Online games are ubiquitous on modern gaming platforms, including PCs, consoles and mobile devices, and span many genres, including first-person shooters, strategy games, and massively multiplayer online role-playing games (MMORPG). In 2019, revenue in the online games segment reached $16.9 billion, with $4.2 billion generated by China and $3.5 billion in the United States. Since the 2010s, a common trend among online games has been to operate them as games as a service, using monetization schemes such as loot boxes and battle passes as purchasable items atop freely-offered games. Unlike purchased retail games, online games have the problem of not being permanently playable, as they require special servers in order to function.
The design of online games can range from simple text-based environments to the incorporation of complex graphics and virtual worlds. The existence of online components within a game can range from being minor features, such as an online leaderboard, to being part of core gameplay, such as directly playing against other players. Many online games create their own online communities, while other games, especially social games, integrate the players' existing real-life communities. Some online games can receive a massive influx of popularity due to many well-known Twitch streamers and YouTubers playing them.
Online gaming has drastically increased the scope and size of video game culture. Online games have attracted players of a variety of ages, nationalities, and occupations. The online game content is now being studied in the scientific field, especially gamers' interactions within virtual societies in relation to the behavior and social phenomena of everyday life. As in other cultures, the community has developed a gamut of slang words or phrases that can be used for communication in or outside of games. Due to their growing online nature, modern video game slang overlaps heavily with internet slang, as well as leetspeak, with many words such as "pwn" and "noob". Another term that was popularized by the video game community is the abbreviation "AFK" to refer to people who are not at the computer or paying attention. Other common abbreviations include "GL HF" which stands for "good luck, have fun," which is often said at the beginning of a match to show good sportsmanship. Likewise, at the end of a game, "GG" or "GG WP" may be said to congratulate the opponent, win or lose, on a "good game, well played". Many video games have also inspired internet memes and achieved a very large following online.
The culture of online gaming sometimes faces criticism for an environment that can promote cyberbullying, violence, and xenophobia. Some are also concerned about gaming addiction or social stigma. However, it has been argued that, since the players of an online game are strangers to each oth |
https://en.wikipedia.org/wiki/VICE | The software program VICE, standing for VersatIle Commodore Emulator, is a free and cross platform emulator for Commodore's 8-bit computers. It runs on Linux, Amiga, Unix, MS-DOS, Win32, Mac OS X, OS/2, RISC OS, QNX, GP2X, Pandora (console), Dingoo A320, Syllable, and BeOS host machines. VICE is free software, released under the GNU General Public License since 2004.
VICE for Microsoft Windows (Win32) prior to v3.3 were known as WinVICE, the OS/2 variant is called Vice/2, and the emulator running on BeOS is called BeVICE.
History
The development of VICE began in 1993 by a Finnish programmer Jarkko Sonninen, who was the founder of the project. Sonninen retired from the project in 1994.
VICE 2.1, released on December 19, 2008, emulates the Commodore 64, Commodore 128, Commodore VIC-20, Commodore Plus/4, C64 Direct-to-TV (with its additional video modes) and all the Commodore PET models including the CBM-II but excluding the 'non-standard' features of the SuperPET 9000. WinVICE supports digital joysticks via a parallel port driver, and, with a CatWeasel PCI card, is planned to perform hardware SID playback (requires optional SID chip installed in socket).
VICE was one of the most widely used emulators of the Commodore 8-bit personal computers. It is also one of the few usable Commodore emulators to exist on free Unix-based platforms, including most Linux and BSD distributions.
VICE 3.4 drops support for Syllable Desktop, SCO, QNX, SGI, AIX, OPENSTEP/NeXTSTEP/Rhapsody, and Solaris/OpenIndiana, as well as remaining traces of support for Minix, SkyOS, UNIXWARE, and Sortix, due to lack of staff.
VICE 3.5 drops explicit support for OS/2 and AmigaOS, due to the transition to GTK3 UI.
On December 2022, the VICE emulator was used as an inspiration for an Apple Macintosh emulator powered by a Raspberry Pi.
See also
Commodore 64
GEOS (8-bit operating system)
CCS64
MAME
List of computer system emulators
References
Further reading
External links
, with Online manual (HTML)
VICE.js JavaScript port of VICE
AmigaOS 4 software
AROS software
BeOS software
Commodore 64 emulators
VIC-20
Amiga emulation software
DOS emulation software
GP2X emulation software
MacOS emulation software
MorphOS emulation software
Linux emulation software
Windows emulation software
RISC OS emulation software
Free emulation software
Unix emulation software
Free and open-source Android software |
https://en.wikipedia.org/wiki/Probabilistic%20encryption | Probabilistic encryption is the use of randomness in an encryption algorithm, so that when encrypting the same message several times it will, in general, yield different ciphertexts. The term "probabilistic encryption" is typically used in reference to public key encryption algorithms; however various symmetric key encryption algorithms achieve a similar property (e.g., block ciphers when used in a chaining mode such as CBC), and stream ciphers such as Freestyle which are inherently random. To be semantically secure, that is, to hide even partial information about the plaintext, an encryption algorithm must be probabilistic.
History
The first provably-secure probabilistic public-key encryption scheme was proposed by Shafi Goldwasser and Silvio Micali, based on the hardness of the quadratic residuosity problem and had a message expansion factor equal to the public key size. More efficient probabilistic encryption algorithms include Elgamal, Paillier, and various constructions under the random oracle model, including OAEP.
Security
Probabilistic encryption is particularly important when using public key cryptography. Suppose that the adversary observes a ciphertext, and suspects that the plaintext is either "YES" or "NO", or has a hunch that the plaintext might be "ATTACK AT CALAIS". When a deterministic encryption algorithm is used, the adversary can simply try encrypting each of his guesses under the recipient's public key, and compare each result to the target ciphertext. To combat this attack, public key encryption schemes must incorporate an element of randomness, ensuring that each plaintext maps into one of a large number of possible ciphertexts.
An intuitive approach to converting a deterministic encryption scheme into a probabilistic one is to simply pad the plaintext with a random string before encrypting with the deterministic algorithm. Conversely, decryption involves applying a deterministic algorithm and ignoring the random padding. However, early schemes which applied this naive approach were broken due to limitations in some deterministic encryption schemes. Techniques such as Optimal Asymmetric Encryption Padding (OAEP) integrate random padding in a manner that is secure using any trapdoor permutation.
Examples
Example of probabilistic encryption using any trapdoor permutation:
x - single bit plaintext
f - trapdoor permutation (deterministic encryption algorithm)
b - hard core predicate of f
r - random string
This is inefficient because only a single bit is encrypted. In other words, the message expansion factor is equal to the public key size.
Example of probabilistic encryption in the random oracle model:
x - plaintext
f - trapdoor permutation (deterministic encryption algorithm)
h - random oracle (typically implemented using a publicly specified hash function)
r - random string
See also
Deterministic encryption
Efficient Probabilistic Public-Key Encryption Scheme
Strong secrecy
References
Exte |
https://en.wikipedia.org/wiki/CityNews | CityNews (corporately styled CityNews) is the title of news and current affairs programming on Rogers Sports & Media's Citytv network in Canada. The newscast division was founded on September 28, 1975 as CityPulse as a standalone local newscast on the network's Toronto station owned by CHUM Limited. Through the acquisitions of the Edmonton, Winnipeg and Calgary A-Channel stations in 2004, it was relaunched under the CityNews brand on August 2, 2005 and later expanded to Montreal in 2012. The remaining Citytv stations airs the news headlines segments during each station's Breakfast Television morning show.
Before the 2017–2018 relaunch of CityNews nationally, Citytv stations outside Toronto had their midday and evening news programs cancelled in 2006, and the remaining news programming on these stations (such as the nationally-broadcast CityNews International) was cancelled in early 2010.
After a soft launch in 2020 via CIWW/CJET-FM Ottawa, in June 2021 Rogers extended the CityNews branding to its news radio stations.
CityNews Toronto
History
The newscast was broadcast in Toronto as CityPulse as a pilot episode on September 28, 1975, and as a second pilot episode on September 12, 1976. The first regular episode of CityPulse aired on September 12, 1977. On August 1, 2005, the final CityPulse titled newscast aired and it was renamed CityNews the next day. While the station claims that it was the first news show to abandon the traditional anchor desk, CBS News in the United States had done this as early as the 1950s under Edward R. Murrow. Its main innovation in television news was to have its reporters play a more participatory role in their stories. Elements of it were also taken from then-sister station ATV in the Maritimes, whose Live at 5 newscast, launched in 1982, had lead anchor Dave Wright roaming around the ATV newsroom and talking with the reporters.
By the mid-1980s, the newscast's style, pioneered by Moses Znaimer, was promoted as a "format" for local news shows to copy around North America. The show has been duplicated by other television stations owned by CHUM Limited and its format has been licensed to several television stations around the world, such as Citytv Barcelona and Citytv Bogotá. Other attempts to clone the format with regional changes have also been attempted; notably, two American attempts at a CityPulse-style newscast debuted within months of each other in 1993: KCOP-TV in Los Angeles with 13 Real News, and KIRO-TV in Seattle with what was dubbed "News Outside the Box" (the latter station attempted to leverage its then-sister radio stations as well). Both attempts failed and by 1994 both stations had reverted to "traditional" newscasts.
Until 1987, the anchors on CityPulse sat behind an anchor desk in a dark studio with two orange-red-black striped beams and a television set between the two anchors. CityPulse at Six was anchored by Gord Martineau and Dini Petty for most of the years from 1980 to 1987. Weather pre |
https://en.wikipedia.org/wiki/Rail%20transport%20in%20New%20South%20Wales | The Australian state of New South Wales has an extensive network of railways, which were integral to the growth and development of the state. The vast majority of railway lines were government built and operated, but there were also several private railways, some of which operate to this day.
Organisation
During the 20th century, the railways have always been run by a state-owned entity, which has undergone a number of different minor name changes, including the New South Wales Railways, New South Wales Government Railways, Department of Railways. From 1972, it was part of the Public Transport Commission and from 1980, the State Rail Authority. In 1989, the SRA was split into CityRail, CountryLink and FreightCorp, the latter business being sold in 2001 to Pacific National.
Three government entities currently have responsibility for the New South Wales railways. They are:
Transport Asset Holding Entity – asset owner
Sydney Trains – infrastructure operator, maintainer, and operator of suburban train services, and
NSW TrainLink – operator of regional and intercity train service
Since 2003, the NSW interstate, Sydney metropolitan freight, Hunter Valley coal, and country branch line networks have been run by private operators. Until January 2012, these networks were all operated by the Australian Rail Track Corporation, however control of the Country Regional (branch line) Network moved to John Holland in January 2012. In January 2022, UGL commenced a 10 year contract to operate the Country Regional Network.
History
New South Wales' railways date from 10 December 1831 when the Australian Agricultural Company officially opened Australia's first railway, located at the intersection of Brown and Church Streets, Newcastle. Privately owned and operated to service the A Pit coal mine, it was a cast-iron fishbelly rail on an inclined plane as a gravitational railway.
Many proposals for routing the proposed lines were put forth, researched, surveyed and reported on. Three main routes for the Main Southern line were reported on by Mr Woore. There were three main routes researched for crossing the Blue Mountains requiring much effort just for the surveys.
The first public line was built from Sydney to Parramatta Junction (actually in Granville) and opened in 1855. The first six stations were; Sydney, Newtown, Ashfield, Burwood, Homebush, and Parramatta. The first common-carrier railway to operate in Australia, however, was the Melbourne & Hobson's Bay Railway Company, in Victoria, which opened on 12 September 1854, over a year before the Sydney–Parramatta Railway in NSW, which opened on 26 September 1855.
After two decisions to change the rail gauge, problems in raising capital and difficulties in construction, the line was opened in 1854, and lines have been built to standard gauge ever since. The Main Southern line was built in stages from Parramatta Junction to the Victorian border at Albury between 1855 and 1881 and connected to the Victorian Railw |
https://en.wikipedia.org/wiki/CLN | CLN may refer to:
Computing and technology
Class Library for Numbers, a free software project
Computer Learning Network, a technical school (college) in Mechanicsburg, Pennsylvania; see YTI Career Institute
Politics and government
Certificate of Loss of Nationality, an American form
National Liberation Committee (), the underground political entity of Italian Partisans during the German occupation of Italy
Other
Catamount Library Network, a library consortium in Vermont
Chapeltown railway station, in South Yorkshire
Credit-linked note, a security issued by a special purpose company or trust
Sri Lanka (Ceylon), ITU country code
See also
Genes related to neuronal ceroid lipofuscinosis: CLN3, CLN5, CLN6, CLN8 |
https://en.wikipedia.org/wiki/Bernard%20Chazelle | Bernard Chazelle (born November 5, 1955) is a French-born computer scientist. He is currently the Eugene Higgins Professor of Computer Science at Princeton University. Much of his work is in computational geometry, where he is known for his study of algorithms, such as linear-time triangulation of a simple polygon, as well as major complexity results, such as lower bound techniques based on discrepancy theory. He is also known for his invention of the soft heap data structure and the most asymptotically efficient known deterministic algorithm for finding minimum spanning trees.
Early life
Chazelle was born in Clamart, France, the son of Marie-Claire (née Blanc) and Jean Chazelle. He grew up in Paris, France, where he received his bachelor's degree and master's degree in applied mathematics at the École des mines de Paris in 1977. Then, at the age of 21, he attended Yale University in the United States, where he received his PhD in computer science in 1980 under the supervision of David P. Dobkin.
Career
Chazelle accepted professional appointments at institutions such as Brown, NEC, Xerox PARC, the Institute for Advanced Study, and the Paris institutions École normale supérieure, École polytechnique, Inria, and Collège de France. He is a fellow of the ACM, the American Academy of Arts and Sciences, the John Simon Guggenheim Memorial Foundation, and NEC, as well as a member of the European Academy of Sciences. He has also written essays about music and politics.
Personal life
Chazelle is married to Celia Chazelle. He is the father of director Damien Chazelle, the youngest person in history to win an Academy Award for Best Director, and Anna Chazelle, an entertainer.
Works
References
External links
Bernard Chazelle at Princeton University
1955 births
Living people
French computer scientists
American computer scientists
Researchers in geometric algorithms
Fellows of the Association for Computing Machinery
Yale Graduate School of Arts and Sciences alumni
Princeton University faculty
People from Clamart
French emigrants to the United States
Carnegie Mellon University faculty |
https://en.wikipedia.org/wiki/Fusion%20tree | In computer science, a fusion tree is a type of tree data structure that implements an associative array on -bit integers on a finite universe, where each of the input integers has size less than 2w and is non-negative. When operating on a collection of key–value pairs, it uses space and performs searches in time, which is asymptotically faster than a traditional self-balancing binary search tree, and also better than the van Emde Boas tree for large values of . It achieves this speed by using certain constant-time operations that can be done on a machine word. Fusion trees were invented in 1990 by Michael Fredman and Dan Willard.
Several advances have been made since Fredman and Willard's original 1990 paper. In 1999 it was shown how to implement fusion trees under a model of computation in which all of the underlying operations of the algorithm belong to AC0, a model of circuit complexity that allows addition and bitwise Boolean operations but does not allow the multiplication operations used in the original fusion tree algorithm. A dynamic version of fusion trees using hash tables was proposed in 1996 which matched the original structure's runtime in expectation. Another dynamic version using exponential tree was proposed in 2007 which yields worst-case runtimes of per operation. Finally, it was shown that dynamic fusion trees can perform each operation in time deterministically.
This data structure implements add key, remove key, search key, and predecessor (next smaller value) and successor (next larger value) search operations for a given key. The partial result of most significant bit locator in constant time has also helped further research. Fusion trees utilize word-level parallelism to be efficient, performing computation on several small integers, stored in a single machine word, simultaneously to reduce the number of total operations.
How it works
A fusion tree is essentially a B-tree with branching factor of (any small exponent is also possible as it will not have a great impact on the height of the tree), which gives it a height of . To achieve the desired runtimes for updates and queries, the fusion tree must be able to search a node containing up to keys in constant time. This is done by compressing ("sketching") the keys so that all can fit into one machine word, which in turn allows comparisons to be done in parallel. So, a series of computations involving sketching, parallel comparison and most significant bit index locator, help reach the required solution.
Sketching
Sketching is the method by which each -bit key at a node containing keys is compressed into only bits. Each key may be thought of as a path in the full binary tree of height starting at the root and ending at the leaf corresponding to . This path can be processed by recursively searching the left child of i if the ith bit is 0, and the right child if it is 1, generally, until all bits are scanned. To distinguish two paths, it suffices to look at t |
https://en.wikipedia.org/wiki/Craig%20McCracken | Craig Douglas McCracken (born March 31, 1971) is an American cartoonist, animator, director, writer, and producer known for creating the Cartoon Network's The Powerpuff Girls and Foster's Home for Imaginary Friends, Disney Channel and Disney XD's Wander Over Yonder and Netflix's Kid Cosmic.
Regarded as "one of the most successful creators of episodic comedy cartoons", his style was "at the forefront of a second wave of innovative, creator-driven television animation" in the 1990s, along with that of other animators such as Genndy Tartakovsky, and has been credited as "a staple of American modern animated television".
Early life and education
McCracken was born March 31, 1971, in Charleroi, Pennsylvania. He began drawing at an early age. He attended California High School in Whittier, California and the California Institute of the Arts (CalArts), where he met his friend and future collaborator, Genndy Tartakovsky. During his first year, he created a series of short cartoons featuring a character named No Neck Joe, which were picked up by Spike and Mike's Sick and Twisted Festival of Animation. While at CalArts, he also created a short entitled Whoopass Stew!, which would later become the basis for The Powerpuff Girls. McCracken married animator Lauren Faust on March 13, 2004. Faust took maternity leave in mid-2016 to take care of their newborn daughter, Quinn.
Career
In 1993, McCracken was hired by Hanna-Barbera Cartoons as an art director on the Turner Broadcasting System series 2 Stupid Dogs, alongside Tartakovsky. As his first job in the animation industry, he was "never really happy with how that [show] worked". While McCracken was at Hanna-Barbera, studio president Fred Seibert began a new project: an animation incubator consisting of 48 new cartoons running approximately seven minutes each. Dubbed What a Cartoon!, it motivated McCracken to further develop his Whoopass Girls! creation. He recalled that the network could not market a show with the word "ass" in it, so two friends of his came up with The Powerpuff Girls as a replacement for the original title. His new pilot, "The Powerpuff Girls in: Meat Fuzzy Lumkins", premiered on February 20, 1995, on Cartoon Network's World Premiere Toons-In, and a second short, "Crime 101", followed on January 28, 1996. The first short to be picked up by the network was Tartakovsky's Dexter's Laboratory, which McCracken would contribute to in early seasons. McCracken's Powerpuff was the fourth cartoon to be greenlit a full series, which premiered on November 18, 1998, with the final episode airing on March 25, 2005. The show has won Emmy and Annie awards. In 2002, McCracken directed The Powerpuff Girls Movie, a prequel to his series. The film received generally positive reviews but was a box office failure.
McCracken left The Powerpuff Girls after four seasons, focusing on his next project, Foster's Home for Imaginary Friends. It premiered with the 90-minute television special "House of Bloo's" on Augu |
https://en.wikipedia.org/wiki/Human%20action%20cycle | The human action cycle is a psychological model which describes the steps humans take when they interact with computer systems. The model was proposed by Donald A. Norman, a scholar in the discipline of human–computer interaction. The model can be used to help evaluate the efficiency of a user interface (UI). Understanding the cycle requires an understanding of the user interface design principles of affordance, feedback, visibility and tolerance.
The human action cycle describes how humans may form goals and then develop a series of steps required to achieve that goal, using the computer system. The user then executes the steps, thus the model includes both cognitive activities and physical activities.
The three stages of the human action cycle
The model is divided into three stages of seven steps in total, and is (approximately) as follows:
Goal formation stage
1. Goal formation.
Execution stage
2. Translation of goals into a set of unordered tasks required to achieve goals.
3. Sequencing the tasks to create the action sequence.
4. Executing the action sequence.
Evaluation stage
5. Perceiving the results after having executed the action sequence.
6. Interpreting the actual outcomes based on the expected outcomes.
7. Comparing what happened with what the user wished to happen.
Use in evaluation of user interfaces
Typically, an evaluator of the user interface will pose a series of questions for each of the cycle's steps, an evaluation of the answer provides useful information about where the user interface may be inadequate or unsuitable. These questions might be:
Step 1, Forming a goal:
Do the users have sufficient domain and task knowledge and sufficient understanding of their work to form goals?
Does the UI help the users form these goals?
Step 2, Translating the goal into a task or a set of tasks:
Do the users have sufficient domain and task knowledge and sufficient understanding of their work to formulate the tasks?
Does the UI help the users formulate these tasks?
Step 3, Planning an action sequence:
Do the users have sufficient domain and task knowledge and sufficient understanding of their work to formulate the action sequence?
Does the UI help the users formulate the action sequence?
Step 4, Executing the action sequence:
Can typical users easily learn and use the UI?
Do the actions provided by the system match those required by the users?
Are the affordance and visibility of the actions good?
Do the users have an accurate mental model of the system?
Does the system support the development of an accurate mental model?
Step 5, Perceiving what happened:
Can the users perceive the system’s state?
Does the UI provide the users with sufficient feedback about the effects of their actions?
Step 6, Interpreting the outcome according to the users’ expectations:
Are the users able to make sense of the feedback?
Does the UI provide enough feedback for this interpretation?
Step 7, Evaluating what happened |
https://en.wikipedia.org/wiki/Brickell%20station | Brickell station is a Metrorail rapid transit station in Miami, Florida, serving the system's Green and Orange Lines. One of the core stations of Miami's public transport network, it serves the financial district of Brickell. Combined, the Metrorail and Metromover station complex at Brickell sees roughly 8,430 boardings each weekday, making it the system's second-busiest station.
Location
The Brickell station is located in the median of SW 1st Avenue at its intersection with SW 11th Street in the central Miami neighborhood of Brickell. Excluding nearby Metromover stations, it is the closest rail stop to attractions such as Brickell Key, Mary Brickell Village, Brickell Avenue and Simpson Park.
Transit-oriented development
Like other rail stations in Miami's central business district, Brickell has been the focal point for significant transit-oriented development (TOD), particularly in the real estate boom of the 2000s and 2010s. New developments such as Axis at Brickell Village, Infinity at Brickell and Plaza on Brickell are all within a short distance of the station, as are numerous other residential and commercial projects. Once considered a failed example of TOD, and referred to as only "transit-adjacent development", over the past few years Brickell (Metromover) ridership has risen from approximately fifth place to as high as second place for some months in 2015 and 2016. Metrorail ridership growth at this station also outpaced most other stations, and by June 2016, it was the second highest ridership station on the Metrorail as well amid heavy losses at some stations, namely Dadeland South and Dadeland North.
History
One of the original Metrorail stations, Brickell opened along with the initial stretch of the system from Dadeland South to Historic Overtown/Lyric Theatre, then called "Overtown." The Metromover station opened ten years later on May 26, 1994.
It featured as a level in the videogame Hotline Miami.
Station layout
The Metrorail station and Metromover station are located next to each other and are connected by an overhang. The Metrorail station can hold up to six cars and has a canopy covering most of the platform. The Metromover platform can hold up to two Metromover cars and is completely covered.
Gallery
References
External links
MDT – Metrorail Stations
MDT – Metromover Stations
Metromover Station from Google Maps Street View
Metrorail entrance from Google Maps Street View
Brickell Loop
Green Line (Metrorail)
Orange Line (Metrorail)
Metromover stations
Metrorail (Miami-Dade County) stations in Miami
Railway stations in the United States opened in 1984
1984 establishments in Florida |
https://en.wikipedia.org/wiki/Newton%20OS | Newton OS is a discontinued operating system for the Apple Newton PDAs produced by Apple Computer, Inc. between 1993 and 1997. It was written entirely in C++ and trimmed to be low power consuming and use the available memory efficiently. Many applications were pre-installed in the ROM of the Newton (making for quick start-up) to save on RAM and flash memory storage for user applications.
Features
Newton OS features many interface elements that the Macintosh system software didn't have at the time, such as drawers and the "poof" animation. An animation similar to this is found in Mac OS X, and parts of the Newton's handwriting recognition system have been implemented as Inkwell in Mac OS X.
Sound responsive — Clicking menus and icons makes a sound; this feature was later introduced in Mac OS 8.
Icons - Similar to the Macintosh Desktop metaphor, Newton OS uses icons to open applications.
Tabbed documents — Similar to tabbed browsing in today's browsers and Apple's At Ease interface, documents titles appear in a small tab at the top right hand of the screen.
Screen rotation — In Newton 2.0, the screen can be rotated to be used for drawing or word processing.
File documents — Notes and Drawings can be categorized. E.g. Fun, Business, Personal, etc.
Print documents — Documents on the Newton can be printed.
Send documents — Documents can be sent to another Newton via Infrared technology or sent using the Internet by E-Mail, or faxed.
Menus — Similar to menus seen in Mac OS, but menu titles are instead presented at the bottom of the screen in small rectangles, making them similar to buttons with attached "pop-up" menus.
Many features of the Newton are best appreciated in the context of the history of Pen computing.
Software
Shortly after the Newton PDA's release in 1993, developers were not paying much attention to the new Newton OS API and were still more interested in developing for the Macintosh and Windows platforms. It was not until two years later that developers saw a potential market available to them in creating software for Newton OS. Several programs were made by third-party developers, including software to enhance the disappointing hand writing recognition technology of Newton OS 1.x.
The basic software that came with Newton OS:
Works — A program for drawing and word processing, with typical capabilities such as: rulers, margins, page breaks, formatting, printing, spell checking and find & replace tools.
Notes — Used for checklists, as well as both drawing and writing in the same program either with a newton keyboard or a stylus pen.
Dates — Calendar program where you can schedule appointments and other special events.
Names — Program for storing extensive contacts information in a flexible format.
Formulas — Program that offers metric conversions, currency conversions, loan and mortgage calculators, etc.
Calculator — A basic calculator with square root, percentage, MR, M+ and M- functions additional to the basic functions found on a |
https://en.wikipedia.org/wiki/File%20copying | In digital file management, copying is a file operation that creates a new file which has the same content as an existing file. Computer operating systems include file copying methods to users; operating systems with graphical user interfaces (GUIs) often providing copy-and-paste or drag-and-drop methods of file copying. Operating systems may have specialized file-copying APIs are usually able to tell the server to perform the copying locally, without sending file contents over the network, thus greatly improving performance.
Description
File copying is the creation of a new copy file which has the same content as an existing file.
Shadow
There are several different technologies that use the term shadowing, but the intent of shadowing within these technologies is to provide an exact copy (or mirror of a set) of data. For shadowing to be effective, the shadow needs to exist in a separate physical location than the original data. Depending on the reasons behind the shadow operation, this location may be as close as the BIOS chip to the RAM modules, a second harddrive in the same chassis, or as far away as the other side of the globe.
Use
All computer operating systems include file copying provisions in the user interface, like the command, "cp" in Unix and "COPY" in DOS; operating systems with a graphical user interface, or GUI, usually provide copy-and-paste or drag-and-drop methods of file copying. File manager applications, too, provide an easy way of copying files.
Implementation
Internally, however, while some systems have specialized application programming interfaces (APIs) for copying files (like CopyFile and CopyFileEx in Windows API), others (like Unix and DOS) fall back to simply reading the contents of the old file and writing it to the new file.
This makes little difference with local files (those on the computer's hard drive), but provides an interesting situation when both the source and target files are located on a remote file server. Operating systems with specialized file copying APIs are usually able to tell the server to perform the copying locally, without sending file contents over the network, thus greatly improving performance. Those systems that have no comparable APIs, however, have to read the file contents over the network, and then send them back again, over the network. Sometimes, remote file copying is performed with a specialized command, like "NCOPY" in DOS clients for Novell NetWare. The COPY command in some versions of DR-DOS since 1992, has built-in support for this.
An even more complicated situation arises when one needs to copy files between two remote servers. The simple way is to read data from one server, and then to write the data to the second server.
See also
Core dump
Soft copy
Hard copy
List of file copying software
ln (Unix)
NTFS junction point
Zero copy
References
Further reading
N-level file shadowing and recovery in a shared file system, United States Patent 5043876
Metho |
https://en.wikipedia.org/wiki/The%20Fight%20Network%20%28UK%20%26%20Ireland%29 | The Fight Network (formerly The Wrestling Channel, TWC and TWC Fight!) was a free-to-air digital satellite television sports channel in the United Kingdom and Ireland, devoted to airing programming related to boxing, mixed martial arts, pro-wrestling and other combat sports.
History
Pre-launch
The Fight Network UK began its run as The Wrestling Channel. The service was planned to launch as a full channel in March 2004, but began test-transmissions on 1 December 2003, as a temporary programming block on the now-defunct channel Friendly TV. This block aired from 7:00 to 8:00 in the daytime and evening on weekdays with repeats on weekend mornings from 9 to 11:00 am, and 6:00 pm. The block featured Wrestling promotions such as Classic Wrestling, Pro Wrestling Noah, Ring of Honor and Total Nonstop Action Wrestling, which would be the first time these promotions would ever air on a UK channel. The block was supposed to only last a month, but was extended in 2004 due to positive response from viewers.
Launch
On 15 March 2004, the channel fully launched on Sky Channel 427. The Wrestling Channel was the first channel of its kind in the world to strictly focus its programming on professional wrestling. Alongside shows that aired on the block on Friendly TV, shows from promotions such as New Japan Pro-Wrestling, Pro-Pain-Pro Wrestling and World of Sport. To promote the launch, the channel's parent company partnered up with game publisher Acclaim Entertainment and their then-upcoming game Showdown: Legends of Wrestling for a competition. In July 2004, The Wrestling Channel also became the first channel to air a news/talk show dedicated to pro-wrestling - titled The Bagpipe Report.
TWC Reloaded
On 25 October 2004, a sister channel called TWC Reloaded was launched next to The Wrestling Channel on Sky channel 428. The channel featured action from the existing TWC library and also experimented with new shows and formats. There were plans for Reloaded to air MMA programmes but this never came to fruition.
On 24 January 2005, The Wrestling Channel's parent company announced that the TWC Reloaded slot had been approached by a number of potential partners seeking to re-programme and develop the slot. Future output had been reduced to the minimum level of three hours per day, starting at 3:00 am, whilst a decision was taken over the content for the slot. From 1 March, a movie aired nightly on the channel and 2 days later, the channel effectively ceased as there was no longer any sporting content being transmitted. By 21 March, TWC Reloaded moved to the movie section of the Sky EPG at channel number 333 and was temporarily renamed as Movies 333 in the process, where it would fully launch as True Movies.
Losses and revamp
By the end of 2004, The Wrestling Channel's parent company announced that they were running at a loss due to lower-than-expected viewing figures generating less revenue than it was costing to run the operation. They added that most promotions ha |
https://en.wikipedia.org/wiki/Miniaturization | Miniaturization (Br.Eng.: miniaturisation) is the trend to manufacture ever smaller mechanical, optical and electronic products and devices. Examples include miniaturization of mobile phones, computers and vehicle engine downsizing. In electronics, the exponential scaling and miniaturization of silicon MOSFETs (MOS transistors) leads to the number of transistors on an integrated circuit chip doubling every two years, an observation known as Moore's law. This leads to MOS integrated circuits such as microprocessors and memory chips being built with increasing transistor density, faster performance, and lower power consumption, enabling the miniaturization of electronic devices.
History
The history of miniaturization is associated with the history of information technology based on the succession of switching devices, each smaller, faster, cheaper than its predecessor. During the period referred to as the Second Industrial Revolution, miniaturization was confined to two-dimensional electronic circuits used for the manipulation of information. This orientation is demonstrated in the use of vacuum tubes in the first general-purpose computers. The technology gave way to the development of transistors in the 1950s and then the integrated circuit (IC) approach developed afterward.
The MOSFET (metal–oxide–semiconductor field-effect transistor, or MOS transistor) was invented by Mohamed M. Atalla and Dawon Kahng at Bell Labs in 1959, and demonstrated in 1960. It was the first truly compact transistor that could be miniaturized and mass-produced for a wide range of uses, due to its high scalability and low power consumption, leading to increasing transistor density. This made it possible to build high-density IC chips, enabling what would later be known as Moore's law.
In the early 1960s, Gordon E. Moore, who later founded Intel, recognized that the ideal electrical and scaling characteristics of MOSFET devices would lead to rapidly increasing integration levels and unparalleled growth in electronic applications. Moore's law, which was described by Gordon Moore in 1965 and later named after him, predicted that the number of transistors on an integrated circuit for minimum component cost doubles every 18 months.
In 1974, Robert H. Dennard at IBM recognized the rapid MOSFET scaling technology and formulated the related Dennard scaling rule. MOSFET scaling and miniaturization has since been the key driving force behind Moore's law. This enables integrated circuits such as microprocessors and memory chips to be built in smaller sizes and with greater transistor density.
Moore described the development of miniaturization in 1975 during the International Electron Devices Meeting, where he confirmed his earlier prediction that silicon integrated circuit would dominate electronics, underscoring that during the period such circuits were already high-performance devices and starting to become cheaper. This was made possible by a reliable manufacturing pro |
https://en.wikipedia.org/wiki/Meta%20Content%20Framework | Meta Content Framework (MCF) is a specification of a content format for structuring metadata about web sites and other data.
History
MCF was developed by Ramanathan V. Guha at Apple Computer's Advanced Technology Group between 1995 and 1997. Rooted in knowledge-representation systems such as CycL, KRL, and KIF, it sought to describe objects, their attributes, and the relationships between them.
One application of MCF was HotSauce, also developed by Guha while at Apple. It generated a 3D visualization of a web site's table of contents, based on MCF descriptions. By late 1996, a few hundred sites were creating MCF files and Apple HotSauce allowed users to browse these MCF representations in 3D.
When the research project was discontinued, Guha left Apple for Netscape, where, in collaboration with Tim Bray, he adapted MCF to use XML and created the first version of the Resource Description Framework (RDF).
MCF format
An MCF file consists of one or more blocks, each corresponding to an entity. A block looks like this:Node: <identifier>
<property>: <value>, <value>The identifier is a unique identifier for that entity (more on the scope of the identifier below) and is used to refer to that entity. The following lines each specify a property and one or more values, separated by commas. Each value can be a reference to another entity (via its identifier), a string (enclosed by double quotes) or a number. For example:Node: Test1
typeOf: TestNode
child: Test2, Test3
name: "I am a test node"
itemCode: 42
Node: Test2
typeOf: TestNode
sibling: Test3
name: "I am another test node in a test world"
Node: Test3
typeOf: TestNode
sibling: Test2
name: "Just another test node in a test world"NOTE:
The identifier must not include a comma (,) and must not be enclosed within double quotes.
A common parsing failure is due to odd number of unescaped double quotes in text. For instance, "foo bar" baz" needs to be "foo bar\" baz".
Commas within double quotes are not considered as value separators.
Every entity has at least one property: typeOf.
References
External links
MCF Tutorial (using XML syntax)
Guha MCF site
The metacontent concept
Knowledge representation
Apple Inc. software |
https://en.wikipedia.org/wiki/Wireless%20Application%20Protocol%20Bitmap%20Format | Wireless Application Protocol Bitmap Format (shortened to Wireless Bitmap and with file extension .wbmp) is a monochrome graphics file format optimized for mobile computing devices.
WBMP images are monochrome (black & white) so that the image size is kept to a minimum. A black pixel is denoted by 0 and a white pixel is denoted by 1.
Format of Wireless Bitmap Files
Notes
External links
WAP WAE Specification
Open Mobile Alliance
Open Mobile Alliance standards
Graphics file formats |
https://en.wikipedia.org/wiki/Statistical%20learning%20theory | Statistical learning theory is a framework for machine learning drawing from the fields of statistics and functional analysis. Statistical learning theory deals with the statistical inference problem of finding a predictive function based on data. Statistical learning theory has led to successful applications in fields such as computer vision, speech recognition, and bioinformatics.
Introduction
The goals of learning are understanding and prediction. Learning falls into many categories, including supervised learning, unsupervised learning, online learning, and reinforcement learning. From the perspective of statistical learning theory, supervised learning is best understood. Supervised learning involves learning from a training set of data. Every point in the training is an input–output pair, where the input maps to an output. The learning problem consists of inferring the function that maps between the input and the output, such that the learned function can be used to predict the output from future input.
Depending on the type of output, supervised learning problems are either problems of regression or problems of classification. If the output takes a continuous range of values, it is a regression problem. Using Ohm's law as an example, a regression could be performed with voltage as input and current as an output. The regression would find the functional relationship between voltage and current to be , such that
Classification problems are those for which the output will be an element from a discrete set of labels. Classification is very common for machine learning applications. In facial recognition, for instance, a picture of a person's face would be the input, and the output label would be that person's name. The input would be represented by a large multidimensional vector whose elements represent pixels in the picture.
After learning a function based on the training set data, that function is validated on a test set of data, data that did not appear in the training set.
Formal description
Take to be the vector space of all possible inputs, and to be the vector space of all possible outputs. Statistical learning theory takes the perspective that there is some unknown probability distribution over the product space , i.e. there exists some unknown . The training set is made up of samples from this probability distribution, and is notated
Every is an input vector from the training data, and is the output that corresponds to it.
In this formalism, the inference problem consists of finding a function such that . Let be a space of functions called the hypothesis space. The hypothesis space is the space of functions the algorithm will search through. Let be the loss function, a metric for the difference between the predicted value and the actual value . The expected risk is defined to be
The target function, the best possible function that can be chosen, is given by the that satisfies
Because the probability distribution is |
https://en.wikipedia.org/wiki/GraphicsMagick | GraphicsMagick is a fork of ImageMagick, emphasizing stability of both programming API and command-line options. It was branched off ImageMagick's version 5.5.2 in 2002 after irreconcilable differences emerged in the developers' group.
In addition to the programming language APIs available with ImageMagick, GraphicsMagick also includes a Tcl API, called TclMagick.
GraphicsMagick is used by several websites to process large numbers of uploaded photographs. As of 2023, GraphicsMagick had 4 active code contributors while ImageMagick had 27 active contributors.
References
External links
Slides from Web2.0 Expo 2009. (and somethin else interestin’)
Batch Processing Millions and Millions of Images
Command-line software
Free graphics software
Free raster graphics editors
Graphics libraries
Graphics software
Software forks |
https://en.wikipedia.org/wiki/HotSauce | HotSauce (code-named Project X) was experimental software developed by Apple Computer as a sample application of its Meta Content Framework. HotSauce generated a 3D visualization of the contents of an MCF file, for example, a website sitemap. It could also be used to navigate the contents of the user's hard drive.
Apple offered beta versions of HotSauce as a web browser plug-in for the classic Mac OS and Microsoft Windows and a stand-alone application.
HotSauce was never released in a final version and while MCF was adopted by thousands of websites, including Yahoo!, most users saw no point in navigating them in a 3D space. The project was discontinued along with MCF shortly after Steve Jobs' return to the company in 1997.
References
External links
The Meta-Content Format/Framework – HotSauce and MCF nostalgia site, with articles and the original HotSauce software available for download.
A Brief History of Data Syndication and Podcasting
Apple Inc. software
Data visualization software |
https://en.wikipedia.org/wiki/TypeParameter | In computer programming languages, TypeParameter is a generic label used in generic programming to reference an unknown data type, data structure, or class. TypeParameter is most frequently used in C++ templates and Java generics . TypeParameter is similar to a metasyntactic variable (e.g., foo and bar), but distinct. It is not the name of a generic type variable, but the name of a generic type of variable.
The capitalisation varies according to programming language and programmer preference. TypeParameter, Typeparameter, TYPEPARAMETER, typeparameter, and type_parameter are all possible. Alternate labels are also used, especially in complex templates where more than one type parameter is necessary. X, Y, Foo, Bar, Item, Thing are typical alternate labels. Many programming languages are case-sensitive, making a consistent choice of labels important. The CamelCase TypeParameter is one of the most commonly used.
See also
Metasyntactic variable
Generic programming
External links
How to Think Like a Computer Scientist, Chapter 17: Templates
Programming constructs |
https://en.wikipedia.org/wiki/Functional%20genomics | Functional genomics is a field of molecular biology that attempts to describe gene (and protein) functions and interactions. Functional genomics make use of the vast data generated by genomic and transcriptomic projects (such as genome sequencing projects and RNA sequencing). Functional genomics focuses on the dynamic aspects such as gene transcription, translation, regulation of gene expression and protein–protein interactions, as opposed to the static aspects of the genomic information such as DNA sequence or structures. A key characteristic of functional genomics studies is their genome-wide approach to these questions, generally involving high-throughput methods rather than a more traditional "candidate-gene" approach.
Definition and goals of functional genomics
In order to understand functional genomics it is important to first define function. In their paper Graur et al. define function in two possible ways. These are "selected effect" and "causal role". The "selected effect" function refers to the function for which a trait (DNA, RNA, protein etc.) is selected for. The "causal role" function refers to the function that a trait is sufficient and necessary for. Functional genomics usually tests the "causal role" definition of function.
The goal of functional genomics is to understand the function of genes or proteins, eventually all components of a genome. The term functional genomics is often used to refer to the many technical approaches to study an organism's genes and proteins, including the "biochemical, cellular, and/or physiological properties of each and every gene product" while some authors include the study of nongenic elements in their definition. Functional genomics may also include studies of natural genetic variation over time (such as an organism's development) or space (such as its body regions), as well as functional disruptions such as mutations.
The promise of functional genomics is to generate and synthesize genomic and proteomic knowledge into an understanding of the dynamic properties of an organism. This could potentially provide a more complete picture of how the genome specifies function compared to studies of single genes. Integration of functional genomics data is often a part of systems biology approaches.
Techniques and applications
Functional genomics includes function-related aspects of the genome itself such as mutation and polymorphism (such as single nucleotide polymorphism (SNP) analysis), as well as the measurement of molecular activities. The latter comprise a number of "-omics" such as transcriptomics (gene expression), proteomics (protein production), and metabolomics. Functional genomics uses mostly multiplex techniques to measure the abundance of many or all gene products such as mRNAs or proteins within a biological sample. A more focused functional genomics approach might test the function of all variants of one gene and quantify the effects of mutants by using sequencing as a readout of acti |
https://en.wikipedia.org/wiki/List%20of%20radio%20stations%20in%20South%20Carolina | The following is a list of FCC-licensed radio stations in the U.S. state of South Carolina, which can be sorted by their call signs, frequencies, cities of license, licensees, and programming formats.
List of radio stations
Defunct
WAGL
WAGS
WBAW (AM)
WBAW-FM
WBSC
WCSE (AM)
WDAB
WDKD
WDOG
WFIS (AM)
WHSC
WJDJ
WJES
WKMG
WKSC
WLCM
WLMA
WNMI-LP
WPCO
WSCM-LP
WWPZ-LP
WYLA-LP
WYLI-LP
WZKQ-LP
See also
South Carolina media
List of newspapers in South Carolina
List of television stations in South Carolina
Media of locales in South Carolina: Charleston, Columbia, Greenville
References
Bibliography
External links
(Directory ceased in 2017)
South Carolina Broadcasters Association
Carolinas Chapter of the Antique Wireless Association
Images
South Carolina
Radio |
https://en.wikipedia.org/wiki/Growl%20%28software%29 | Growl is a deprecated global notification system and pop-up notification implementation for the Mac OS X and Windows operating systems. Applications can use Growl to display small notifications about events which may be important to the user. This software allows users to fully control their notifications, while allowing application developers to spend less time creating notifications and Growl developers to concentrate on the usability of notifications. Growl can be used in conjunction with Apple's Notification Center that is included in Mac OS X 10.8 (Mountain Lion) and higher.
Details
Growl is installed as a preference pane added to the Mac OS X System Preferences. This pane may be used to enable and disable Growl's notifications for specific applications or specific notifications for each application. Each notification provides some information, such as "Download Finished" or the name of the current iTunes track. The software comes with multiple display plugins, providing the user with different style options for presenting the notifications. Display plugins include visual styles as well as the ability to send notifications via email, SMS, or push notifications. Additional third-party plugins or scripts exist to add Growl notifications to iChat, Mail, Thunderbird, Safari, and iTunes.
Application developers may make use of the Growl API to send notifications to their users. Growl includes bindings for developers who use the Objective-C, C, Perl, Python, Tcl, AppleScript, Java, and Ruby programming languages.
Adobe installation
The Growl website listed applications that install Growl without the user's permission, including Adobe Creative Suite 5. Adobe published a blog post apologizing for installing Growl on users' systems without permission, and says that they are "actively working to mitigate the problem". Adobe added an article to their knowledge base explaining what notifications CS5 sends and how to remove Growl.
See also
Apple Notification Center
Snarl (software)
References
External links
Growl homepage
https://code.google.com/p/growl/
Chris Forsythe and Growl, CocoaRadio, 5 June 2006
Interview with Chris Forsythe of Adium and Growl, OSNews, 9 August 2006
Mumbles Project – a Growl-inspired notification-application for Linux
Free system software
MacOS Internet software
Windows Internet software |
https://en.wikipedia.org/wiki/David%20Turner%20%28computer%20scientist%29 | David A. Turner (26 January 1946 – 19 October 2023) was a British computer scientist. He is best known for designing and implementing three programming languages, including the first for functional programming based on lazy evaluation, combinator graph reduction, and polymorphic types: SASL (1972), Kent Recursive Calculator (KRC) (1981), and the commercially supported Miranda (1985). Miranda had a strong influence on the later Haskell.
He had a Doctor of Philosophy (D.Phil.) from the University of Oxford. He held professorships at Queen Mary College, London, University of Texas at Austin and the University of Kent at Canterbury, where he spent most of his career and retained the title of Emeritus Professor of Computation.
He was involved with developing international standards in programming and informatics, as a member of the International Federation for Information Processing (IFIP) IFIP Working Group 2.1 on Algorithmic Languages and Calculi, which specified, maintains, and supports the programming languages ALGOL 60 and ALGOL 68.
He was an Emeritus Professor at Middlesex University, England.
Publications
Turner, David A. SASL language manual. Tech. rept. CS/75/1. Department of Computational Science, University of St. Andrews 1975.
Another Algorithm for Bracket Abstraction, D. A. Turner, Journal of Symbolic Logic, 44(2):267–270, 1979.
Functional Programming and its Applications, D. A. Turner, Cambridge University Press 1982.
A Parser Generator for use with Miranda, ACM Symposium on Applied Computing, pages 401–407, Philadelphia, USA, Feb 1996.
Elementary Strong Functional Programming, D. A. Turner, in R. Plasmeijer, P. Hartel, eds, "First International Symposium on Functional Programming Languages in Education", Lecture Notes in Computer Science, volume 1022, pages 1–13, Springer-Verlag, 1996.
Ensuring Streams Flow, Alastair Telford and David Turner, in Johnson, ed., "Algebraic Methodology and Software Technology", 6th International Conference, AMAST '97, Sydney Australia, December 1997, Lecture Notes in Computer Science, volume 1349, pages 509–523. AMAST, Springer-Verlag, December 1997.
Ensuring the Productivity of Infinite Structures, A.J.Telford, D.A.Turner, "Technical Report TR 14-97", 37 pages, Computing Laboratory, University of Kent, March 1998. Under submission to "Journal of Functional Programming".
Ensuring Termination in ESFP, A. J. Telford and D. A. Turner, in "15th British Colloquium in Theoretical Computer Science", page 14, Keele, April 1999. To appear in "Journal of Universal Computer Science".
A Hierarchy of Elementary Languages with Strong Normalisation Properties, A.J.Telford, D.A.Turner, "Technical Report TR 2-00", 66 pages, University of Kent Computing Laboratory, January 2000.
Total Functional Programming, Keynote address, pp 1–15, SBLP 2004, Rio de Janeiro, May 2004.
Church's Thesis and Functional Programming, in A. Olszewski ed., "Church's Thesis after 70 years'", pages 518-544, Ontos Verlag, 2006.
Refe |
https://en.wikipedia.org/wiki/Card%20deck | A card deck is a stack of cards, sometimes an ordered stack.
These cards may be either:
Card deck (gaming), playing cards in gaming
Card deck (computing), punched cards in computing |
https://en.wikipedia.org/wiki/RML | RML may refer to:
RML Group, a motorsports and high performance engineering company
RML 380Z, an 8-bit computer built in Britain
Ratmalana Airport (IATA: RML), near Colombo, Sri Lanka
Reuters Market Light, a phone service to provide Indian farmers with timely information
Revised Marriage Law, a 1980 revision of the New Marriage Law in China
Riemann Musiklexikon, a music encyclopedia
Rifled muzzle loader, a type of gun common in the 19th century
AEC Routemaster, a type of double-decker bus
Rocket Madsen Space Lab (RML Spacelab), Copenhagen, Denmark
Rocky Mountain Laboratories, a research institute in Montana, United States
Roddenbery Memorial Library, in Cairo, Georgia, United States
Royal Mail Lines, once a major shipping company, the successor to the Royal Mail Steam Packet Company
See also |
https://en.wikipedia.org/wiki/Blocker | Blocker may also refer to:
Computing
Ad blocker, software for removing or altering online advertising
Microphone blocker, a connector used to trick feature phones to disconnect the microphone
Medicine
Antiandrogens, also known as testosterone blockers, a class of drugs that suppress the actions of androgens
Receptor antagonist, sometimes called a blocker, in medicine a type of receptor ligand or drug that blocks or dampens a biological response
Sports
Blocker (cricket), slang for a defensive-minded batsman in cricket
Blocker (ice hockey)
Blocker, a position in roller derby
Blocker, a position in volleyball
Blocker (beach volleyball), a position in beach volleyball
Steve Roach (rugby league) (born 1962), Australian rugby league footballer nicknamed "Blocker"
Fiction
Blocker (G.I. Joe), a fictional character in the G.I. Joe universe
Blockers (film), a 2018 film
Other uses
Blocker (surname)
Blocker, Oklahoma, an unincorporated community
Blocker corporation, a type of C Corporation in the US
See also
Block (disambiguation) |
https://en.wikipedia.org/wiki/Basilisk%20II | Basilisk II is an emulator which emulates Apple Macintosh computers based on the Motorola 68000 series. The software is cross-platform and can be used on a variety of operating systems.
Christian Bauer (developer of a Mac 68k emulator ShapeShifter for Amiga) released the first version of Basilisk II in March 1999. The emulator was expected to be highly portable across several computing platforms and provided some improvements in comparison to ShapeShifter - e.g. no limit for number of emulated disks, improved CD-ROM support and support for the host file system. However, early reviews highlighted several issues like difficult configuration and limited compatibility with recommendation of ShapeShifter as a better choice for Amiga users. Newer releases mitigated these problems, 2005 review of the MorphOS version noted only slow CPU emulation (in comparison to built-in 68k CPU emulation for Amiga applications in MorphOS) as a major issue.
The latest version of Classic Mac OS that can be run within Basilisk II is Mac OS 8.1, the last 680x0-compatible version, released in January 1998. Mac OS 8.5, which came out nine months later, was PowerPC-only and marked the end of Apple's 680x0 support.
Ports of Basilisk II exist for multiple computing platforms, including AmigaOS 4, BeOS, Linux, Amiga, Windows NT, Mac OS X, MorphOS and mobile devices such as the PlayStation Portable.
Released under the terms of the GNU General Public License, Basilisk II is free software, and its source code of is available on GitHub.
See also
vMac
SheepShaver
PearPC
References
External links
E-Maculation page on BasiliskII
Macintosh platform emulators
68k emulators
Free emulation software
Linux emulation software
MacOS emulation software
MorphOS emulation software
Windows emulation software
Amiga emulation software
AmigaOS 4 software
Amiga software |
https://en.wikipedia.org/wiki/ACD | ACD may refer to:
Brands and enterprises
ACD (telecommunications company), carrier and Internet Service Provider, headquartered in Lansing, Michigan
ACD Systems, a computer software manufacturer
Advanced Chemistry Development (ACD/Labs), a chemistry software company
Organizations
ACD San Marcial, a Spanish football team based in Lardero, La Rioja
Adelaide College of Divinity, an Australian theological college
Arbeitsgemeinschaft der Christengemeinden in Deutschland (Association of Christian Churches in Germany)
Asia Cooperation Dialogue, an international organization
Centre Right Alliance (Romania) (), a political alliance
Australasian College of Dermatologists, a medical specialist college
People
Arthur Conan Doyle, creator of Sherlock Holmes
Science and healthcare
ACD (gene), protein encoded by the ACD gene
α-Cyclodextrin, a glucose polymer
Alveolar capillary dysplasia, disorder of the lung
Anemia of chronic disease, form of anemia
Aragonite compensation depth, a property of oceans
Allergic contact dermatitis, form of contact dermatitis
Technology
Activity-centered design, design based on how humans interact with technology
Anti-collision device, on Indian railways
Apple Cinema Display, a line of monitors
Automatic call distributor, device that directs incoming phone calls
Average call duration, average length of telephone calls
Other uses
ACD (album), a 1989 album by Half Man Half Biscuit
Adjournment in contemplation of dismissal, court ruling to defer the disposition of a defendant's case
Antecedent-contained deletion in grammar
Activity cycle diagram, a systems modelling paradigm
Autoregressive conditional duration, a class of models used in financial econometrics
Kyode language (ISO 639-3 code), a Guang language of Ghana
Australian Cattle Dog, a breed of herding dog
Alcides Fernández Airport, an airport in Acandí, Colombia |
https://en.wikipedia.org/wiki/AT%20%28form%20factor%29 | In the era of IBM compatible personal computers, the AT form factor comprises the dimensions and layout (form factor) of the motherboard for the IBM AT. Baby AT motherboards are a little smaller, measuring 8.5" by 13". Like the IBM PC and IBM XT models before it, many third-party manufacturers produced motherboards compatible with the IBM AT form factor, allowing end users to upgrade their computers for faster processors. The IBM AT became a widely copied design in the booming home computer market of the 1980s. IBM clones made at the time began using AT compatible designs, contributing to its popularity. In the 1990s many computers still used AT and its variants. Since 1997, the AT form factor has been largely supplanted by ATX.
Design
The original AT motherboard, later known as "Full AT", is , which means it will not fit in "mini desktop" or "minitower cases". The board's size also means that it takes up space behind the drive bays, making installation of new drives more difficult. (In IBM's original heavy-gauge steel case, the two " full-height drive bays overhang the front of the motherboard. More precisely, the left bay overhangs the motherboard, while the right bay is subdivided into two half-height bays and additionally extends downward toward the bottom of the chassis, allowing a second full-height fixed disk to be installed below a single half-height drive.)
The power connectors for AT motherboards are two nearly identical 6-pin plugs and sockets. As designed by IBM, the connectors are mechanically keyed so that each can only be inserted in its correct position, but some clone manufacturers cut costs and used unkeyed (interchangeable) connectors. Unfortunately, the two power connectors it requires are not easily distinguishable, leading many people to damage their boards when they were improperly connected; when plugged in, the two black wires on each connector must be adjacent to each other, making a row of four consecutive black wires (out of the total 12). Technicians developed mnemonic devices to help assure proper installation, including "black wires together in the middle" and "red and red and you are dead".
Variants
In 1987, the Baby AT form factor was introduced, based on the motherboard found in the IBM PC/XT 286 (5162) and soon after all computer makers abandoned AT for the cheaper and smaller Baby AT form factor, using it for computers that spanned several generations, from those that used 286 processors to the P5 Pentium and a limited number of Pentium II systems. These motherboards have similar mounting hole positions and the same eight card slot locations as those with the AT form factor, but are wide and marginally shorter than full-size AT boards, with a maximum length of . However, Baby AT boards were mostly shorter than this, typically . The size and flexibility of this kind of motherboard were the key to success of this format. The development of bigger CPU coolers—and the fact that they blocked full-length PCI an |
https://en.wikipedia.org/wiki/Railnews | Railnews is a national monthly newspaper and news website for the British railway network.
Content
Railnews concentrates on issues important to employees of the railway industry, such as investment, careers, changes to industry structure, and political developments, as well as industrial relations and other trade union matters. It also maintains a focus on the people of the rail industry, rather than the companies alone. As a trade title covering the modern industry, it is not designed for railway enthusiasts or the heritage railway market.
The ethos of Railnews is to be "dispassionate, objective and accurate". Following this, Railnews never carries unmarked advertorials, although much of its advertising revenue does come from major railway suppliers and operators.
History
Railnews, in the early days spelt 'Rail News', was originally the house newspaper of British Railways, published by the British Railways Board. It first appeared in 1963 under the editorship of Keith Horrox with a price of 6d, replacing the former magazines which had been produced for each railway Region, although Regional 'slip' pages continued for many years. From 1978 to October 1996 it was issued free to all employees of British Rail. An attempt to sell it as a result of the privatisation of British Rail was unsuccessful and production ceased in October 1996. In February 1997 the title was revived by some former BR managers, with Sir William McAlpine as Chairman and Cyril Bleasdale as Managing Director. Both maintained these positions until their deaths. The managing director is now David Longstaff. Only four months went by between the ending of the BR version and the launch in March 1997 of its independent successor.
Today
Railnews is no longer a house journal with a particular stance to maintain and, although fully supportive of the industry it serves, it carries objective, balanced reports. Distributed to both individual subscribers and large railway companies (who have corporate subscriptions) it penetrates the entire industry from trackside to boardroom.
The newspaper and website were both fully redesigned in February 2012, bringing a new, cleaner, more modern look to the title. Since September 2009 the Managing Editor has been former BBC journalist Sim Harris. He succeeded Paul Whiting, who has retired.
References
External links
Official website
British Rail
Monthly magazines published in the United Kingdom
Magazines established in 1963
Rail transport magazines published in the United Kingdom
1963 establishments in the United Kingdom |
https://en.wikipedia.org/wiki/List%20of%20radio%20stations%20in%20Indiana | The following is a list of FCC-licensed radio stations in the U.S. state of Indiana, which can be sorted by their call signs, frequencies, cities of license, licensees, and programming formats.
List of radio stations
Defunct
References
Indiana
Radio |
https://en.wikipedia.org/wiki/Comedy%20Inc.%20%28Australian%20TV%20series%29 | Comedy Inc. was an Australian sketch comedy television series, which ran on the Nine Network from 19 February 2003 to 26 December 2007. The series was produced by Crackerjack Productions. It first premiered in February 2003 in the new wave of Australian sketch comedy shows being launched across the free-to-air channels along with Big Bite and skitHOUSE. Since the end of the series episodes have been repeated on the Foxtel cable channel, The Comedy Channel and during 2009, reruns were shown on Nine HD before the channel's closure.
Cast
Paul McCarthy — Seasons 1–5 (2003–2007)
Jim Russell — Seasons 1–5 (2003–2007)
Emily Taheny — Seasons 1–5 (2003–2007)
Mandy McElhinney — Seasons 1-4 (2003–2006)
Genevieve Morris — Seasons 1–4 (2003–2006)
Katrina Retallick — Seasons 1–4 (2003–2006)
Gabriel Andrews — Seasons 1–3 (2003–2005)
Ben Oxenbould — Seasons 1–3 (2003–2005)
Scott Brennan — Seasons 4–5 (2005–2007)
Simon Mallory — Seasons 4–5 (2005–2007)
Rebecca De Unamuno — Season 5 (2007)
Fiona Harris — Season 5 (2007)
Janis McGavin — Season 5 (2007)
Timeline
Overview
When the series debuted, it rapidly gained the highest ratings of the three sketch comedies at that period of Australian television. It subsequently gained numerous nominations for major Australian and international film and television awards. The show has also proved to be more commercially successful in Australia than its rivals and was the first to release a VHS/DVD of content from the series.
The show had many different formats. For example, a more risqué variation of the series was broadcast in 2005, entitled Comedy Inc: The Late Shift. The episodes were aired at a later time, because of the content. The Late Shift aired from 2005 until the end of the series in 2007.
Skits and formula
Comedy Inc. features original skits, impersonations and irreverent parodies of other television programmes and films. For example, popular Australian series such as Big Brother Australia, Dancing with the Stars, Australia's Brainiest Kid, Who Wants to Be a Millionaire? Renovation Rescue, Hi-5, Bob the Builder (as Bodgy Builder) and Thomas and Friends (as Ernest the Engine and Others) are frequently subject to many spoofs, as are Australian news and current affair programmes, such as Today Tonight and 60 Minutes.
In addition, the series features original skits, such as "Selina: She Grows on You", a segment which features an eccentric gardener for a wealthy woman, and her zany and original ways of keeping her garden up to scratch.
A recurring sketch features Emily Taheny as an unnamed woman who approaches other women at inappropriate and private moments such as going to the toilet, showering at a gym or giving birth to a baby. "Matt and Bray" was a skit about family man Al (Russell) and his two odd neighbours (McCarthy and Oxenbould). The skit ended in at the end of season 3, as Ben Oxenbould had left the main cast.
Another recurring sketch features Katrina Retallick as a doctor w |
https://en.wikipedia.org/wiki/NEC%20SX-6 | The SX-6 is a NEC SX supercomputer built by NEC Corporation that debuted in 2001; the SX-6 was sold under license by Cray Inc. in the U.S. Each SX-6 single-node system contains up to eight vector processors, which share up to 64 GB of computer memory. The SX-6 processor is a single chip implementation containing a vector processor unit and a scalar processor fabricated in a 0.15 μm CMOS process with copper interconnects, whereas the SX-5 was a multi-chip implementation. The Earth Simulator is based on the SX-6 architecture.
The vector processor is made up of eight vector pipeline units each with seventy-two 256-word vector registers. The vector unit performs add/shift, multiply, divide and logical operations. The scalar unit is 64 bits wide and contains a 64 KB cache. The scalar unit can decode, issue and complete four instructions per clock cycle. Branch prediction and speculative execution is supported. A multi-node system is configured by interconnecting up to 128 single-node systems via a high-speed, low-latency IXS (Internode Crossbar Switch).
The peak performance of the SX-6 series vector processors is 8 GFLOPS. Thus a single-node system provides a peak performance of 64 GFLOPS, while a multi-node system provides up to 8 TFLOPS of peak floating-point performance.
The SX-6 uses SUPER-UX, a Unix-like operating system developed by NEC. A SAN-based global file system (NEC's GFS) is available for a multinode installation. The default batch processing system is NQSII, but open source batch systems such as Sun Grid Engine are also supported.
See also
SUPER-UX
NEC SX
Earth Simulator
NEC Corporation
References
External links
SX-6 Specifications
Scalable Vector Supercomputer - SX Series Downloads
Sx-6
Vector supercomputers |
https://en.wikipedia.org/wiki/Quartz%20%28graphics%20layer%29 | In Apple's macOS operating system, Quartz is the Quartz 2D and Quartz Compositor part of the Core Graphics framework. Quartz includes both a 2D renderer in Core Graphics and the composition engine that sends instructions to the graphics card. Because of this vertical nature, Quartz is often synonymous with Core Graphics.
In a general sense, Quartz or Quartz technologies can refer to almost every part of the graphics model from the rendering layer down to the compositor including Core Image and Core Video. Other Apple graphics technologies that use the "Quartz" prefix include these:
Quartz Extreme
QuartzGL (originally Quartz 2D Extreme)
QuartzCore
Quartz Display Services
Quartz Event Services
Quartz 2D and Quartz Compositor
Quartz 2D is the primary two-dimensional (2D) text and graphics rendering library: It directly supports Aqua by displaying two-dimensional graphics to create the user interface, including on-the-fly rendering and anti-aliasing. Quartz can render text with sub-pixel precision; graphics are limited to more traditional anti-aliasing, which is the default mode of operation but can be turned off. In Mac OS X 10.4 Tiger, Apple introduced Quartz 2D Extreme, enabling Quartz 2D to offload rendering to compatible GPUs. However, GPU rendering was not enabled by default due to potential video redraw issues or kernel panics.
In Mac OS X v10.5 Quartz 2D Extreme was renamed to QuartzGL. However, it still remains disabled by default, as there are some situations where it can degrade performance, or experience visual glitches; it is a per-application setting which can be turned on if the developer wishes.
The Quartz Compositor is the compositing engine used by macOS. In Mac OS X Jaguar and later, the Quartz Compositor can use the graphics accelerator (GPU) to vastly improve composition performance. This technology is known as Quartz Extreme and is enabled automatically on systems with supported graphics cards.
Use of PDF
It is widely stated that Quartz "uses PDF internally" (notably by Apple in their 2000 Macworld presentation and Quartz's early developer documentation), often by people making comparisons with the Display PostScript technology used in NeXTSTEP and OPENSTEP (of which is a descendant). Quartz's internal imaging model correlates well with the PDF object graph, making it easy to output PDF to multiple devices.
See also
Quartz Composer
References
External links
Quartz 2D Programming Guide at developer.apple.com
Core Graphics API Reference at developer.apple.com
Quartz in Tiger (from a review of 10.4 in Ars Technica)
Introduction to OS X graphics APIs
Cocoa Graphics with Quartz: Part 1
Cocoa Graphics with Quartz: Part 2
Graphics software
MacOS |
https://en.wikipedia.org/wiki/Oracle%20Grid%20Engine | Oracle Grid Engine, previously known as Sun Grid Engine (SGE), CODINE (Computing in Distributed Networked Environments) or GRD (Global Resource Director), was a grid computing computer cluster software system (otherwise known as a batch-queuing system), acquired as part of a purchase of Gridware, then improved and supported by Sun Microsystems and later Oracle. There have been open source versions and multiple commercial versions of this technology, initially from Sun, later from Oracle and then from Univa Corporation.
On October 22, 2013 Univa announced it acquired the intellectual property and trademarks for the Grid Engine technology and that Univa will take over support. Univa has since evolved the Grid Engine technology, e.g. improving scalability as demonstrated by a 1 million core cluster in Amazon Web Services (AWS) announced on June 24, 2018.
The original Grid Engine open-source project website closed in 2010, but versions of the technology are still available under its original Sun Industry Standards Source License (SISSL). Those projects were forked from the original project code and are known as Son of Grid Engine, Open Grid Scheduler and Univa Grid Engine.
Grid Engine is typically used on a computer farm or high-performance computing (HPC) cluster and is responsible for accepting, scheduling, dispatching, and managing the remote and distributed execution of large numbers of standalone, parallel or interactive user jobs. It also manages and schedules the allocation of distributed resources such as processors, memory, disk space, and software licenses.
Grid Engine used to be the foundation of the Sun Grid utility computing system, made available over the Internet in the United States in 2006, later becoming available in many other countries and having been an early version of a public cloud computing facility predating AWS, for instance.
History
In 2000, Sun acquired Gridware a privately owned commercial vendor of advanced computing resource management software with offices in San Jose, Calif., and Regensburg, Germany. Later that year, Sun offered a free version of Gridware for Solaris and Linux, and renamed the product Sun Grid Engine.
In 2001, Sun made the source code available, and adopted the open source development model. Ports for Mac OS X and *BSD were contributed by the non-Sun open source developers.
In 2010, after the purchase of Sun by Oracle, the Grid Engine 6.2 update 6 source code was not included with the binaries, and changes were not put back to the project's source repository. In response to this, the Grid Engine community started the Open Grid Scheduler project to continue to develop and maintain a free implementation of Grid Engine.
On January 18, 2011, it was announced that Univa had recruited several principal engineers from the former Sun Grid Engine team and that Univa would be developing their own forked version of Grid Engine. The newly announced Univa Grid Engine did include commercial support and |
https://en.wikipedia.org/wiki/ORION%20%28research%20and%20education%20network%29 | The Ontario Research and Innovation Optical Network (ORION) is a high-speed optical research and education network in Ontario, Canada. It connects virtually all of Ontario's research and education institutions including every university, most colleges, several teaching hospitals, public research facilities and several school boards to one another and to the global grid of R&E networks using optical fibre.
History
ORION was founded in 2001 (then as The Optical Regional Advanced Network of Ontario, or ORANO) with the support of the Ontario Government. ORION is a self-sustaining not-for-profit organization kickstarted by the Ontario Government under Premier Harris.
ORION is owned and operated by a not-for-profit corporation governed by a board of directors, which includes representatives from the fields of education, research and business. ORION was initially funded by the Government of Ontario with additional funding from CANARIE, as well as private and public sector organizations and institutions. ORION is a self-sustaining organization, generating revenue from its connected institutions through user access fees and over network-based services.
In April 2023, GTAnet merged with ORION.
Network
The network spans and connects 28 communities throughout Ontario. Almost 100 organizations and special projects connect to ORION directly, including 21 universities, 22 colleges, 34 school boards representing 2 million students, 13 teaching hospitals and medical research centres, and other research and educational and public library facilities.
ORION connects to research and education networks elsewhere in Canada and internationally through the national CANARIE network, which exchanges with ORION at the Toronto Internet Exchange.
References
External links
Academic computer network organizations
2002 establishments in Ontario
Organizations based in Toronto
Organizations established in 2002
Science and technology in Canada |
https://en.wikipedia.org/wiki/Leaky%20bucket | The leaky bucket is an algorithm based on an analogy of how a bucket with a constant leak will overflow if either the average rate at which water is poured in exceeds the rate at which the bucket leaks or if more water than the capacity of the bucket is poured in all at once. It can be used to determine whether some sequence of discrete events conforms to defined limits on their average and peak rates or frequencies, e.g. to limit the actions associated with these events to these rates or delay them until they do conform to the rates. It may also be used to check conformance or limit to an average rate alone, i.e. remove any variation from the average.
It is used in packet-switched computer networks and telecommunications networks in both the traffic policing, traffic shaping and scheduling of data transmissions, in the form of packets, to defined limits on bandwidth and burstiness (a measure of the variations in the traffic flow).
A version of the leaky bucket, the generic cell rate algorithm, is recommended for Asynchronous Transfer Mode (ATM) networks in Usage/Network Parameter Control at user–network interfaces or inter-network interfaces or network-to-network interfaces to protect a network from excessive traffic levels on connections routed through it. The generic cell rate algorithm, or an equivalent, may also be used to shape transmissions by a network interface card onto an ATM network.
At least some implementations of the leaky bucket are a mirror image of the token bucket algorithm and will, given equivalent parameters, determine exactly the same sequence of events to conform or not conform to the same limits.
Overview
Two different methods of applying this leaky bucket analogy are described in the literature. These give what appear to be two different algorithms, both of which are referred to as the leaky bucket algorithm and generally without reference to the other method. This has resulted in confusion about what the leaky bucket algorithm is and what its properties are.
In one version the bucket is a counter or variable separate from the flow of traffic or schedule of events. This counter is used only to check that the traffic or events conform to the limits: The counter is incremented as each packet arrives at the point where the check is being made or an event occurs, which is equivalent to the way water is added intermittently to the bucket. The counter is also decremented at a fixed rate, equivalent to the way the water leaks out of the bucket. As a result, the value in the counter represents the level of the water in the bucket. If the counter remains below a specified limit value when a packet arrives or an event occurs, i.e. the bucket does not overflow, that indicates its conformance to the bandwidth and burstiness limits or the average and peak rate event limits. This version is referred to here as the leaky bucket as a meter.
In the second version, the bucket is a queue in the flow of traffic. This queue is used |
https://en.wikipedia.org/wiki/Improved%20Mobile%20Telephone%20Service | The Improved Mobile Telephone Service (IMTS) was a pre-cellular VHF/UHF radio system which linked to the public telephone network. IMTS was the radiotelephone equivalent of land dial phone service. Introduced in 1964, it replaced Mobile Telephone Service (MTS) and improved on most MTS systems by offering direct-dial rather than connections through a live operator, and full-duplex operation so both parties could talk at the same time.
Technical Information
The original Bell System US and Canadian mobile telephone system includes three frequency bands, VHF Low (35-44 MHz, 9 channels), VHF High (152-158 MHz, 11 channels in the U.S., 13 channels in Canada), and UHF (454-460 MHz, 12 channels). Alternative names were "Low Band", "High band" and "UHF". In addition to the Bell system (wireline incumbent) channels, another 7 channels at VHF, and 12 channels at UHF were granted to non-wireline companies designated as "RCCs" (Radio Common Carriers). These RCC channels were adjacent to the Bell System frequencies.
RCCs were also allowed to offer paging services to "beepers" or "pagers" on a secondary basis on the same channels, but soon, with the growth of paging, RCC mobile phone services were given lower priority. Some RCCs utilized IMTS technology, but most adopted the "Secode-2805" system which allowed for simultaneous paging, so after a few years, the predominant provider of mobile telephone service was the Bell System companies.
A given provider might have offered service on one, two, or all three bands, although IMTS was never offered on low band (only MTS, but Whidbey Telephone in Washington State had a custom-designed direct-dial system.) These were prone to network congestion and interference since a radio closer to the terminal would sometimes take over the channel because of its stronger signal. Cellular networks remedied this problem by decreasing the area covered by one tower (a "cell") and increasing the number of cells. The disadvantage of this is more towers are required to cover a given area. Thus, IMTS and MTS systems still exist in some remote areas, as it may be the only feasible way to cover a large sparsely-populated area.
The basic operation of IMTS was very advanced for its time, considering that integrated circuits were not commonly available. The most common IMTS phone, the Motorola TLD-1100 series, used two circuit boards about 8 inches square, to perform the channel scanning and digit decoding process, and all logic was performed with discrete transistors. In a given city, one IMTS base station channel was "marked idle" by the transmission of a steady 2000 Hz "idle" tone. Mobiles would scan the available frequencies and lock on to the channel transmitting the idle tone. When a call was placed to a mobile, the idle tone would change to 1800 Hz "channel seize" tone (the idle tone would appear on another frequency, if available), and the 7 digit mobile number (three digits of the NPA and the last four digits of subscriber nu |
https://en.wikipedia.org/wiki/List%20of%20Milan%20Metro%20stations | The Milan Metro is the rapid transit/metro system serving Milan, Italy. The network comprises 5 lines, identified by different numbers and colors, with a total route length of and 113 stations.
The system has a daily ridership of over one million.
The metro network is connected to the Milan suburban railway service through several stations. Metro lines are identified by the letter "M", while suburban line numbers are preceded by the letter "S".
Stations
References
Metro
Milan
Milan
Metro |
https://en.wikipedia.org/wiki/James%20Rumbaugh | James E. Rumbaugh (born August 22, 1947) is an American computer scientist and object-oriented methodologist who is best known for his work in creating the Object Modeling Technique (OMT) and the Unified Modeling Language (UML).
Biography
Born in Bethlehem, Pennsylvania, Rumbaugh received a B.S. in physics from the Massachusetts Institute of Technology (MIT), an M.S. in astronomy from the California Institute of Technology (Caltech), and received a Ph.D. in computer science from MIT under Professor Jack Dennis.
Rumbaugh started his career in the 1960s at Digital Equipment Corporation (DEC) as a lead research scientist. From 1968 to 1994 he worked at the General Electric Research and Development Center developing technology, teaching, and consulting. At General Electric he also led the development of Object-modeling technique (OMT), an object modeling language for software modeling and designing.
In 1994, he joined Rational Software, where he worked with Ivar Jacobson and Grady Booch ("the Three Amigos") to develop Unified Modeling Language (UML). Later they merged their software development methologies, OMT, OOSE and Booch into the Rational Unified Process (RUP). In 2003 he moved to IBM, after its acquisition of Rational Software. He retired in 2006.
He has two grown up children and (in 2009) lived in Saratoga, California with his wife.
Work
Rumbaugh's main research interests are formal description languages, "semantics of computation, tools for programming productivity, and applications using complex algorithms and data structures".
In his graduate work at MIT, Rumbaugh contributed to the development of data flow computer architecture. His thesis described parallel programming language, parallel processor computer and a basis for a network architecture, which orients itself at data flow. Rumbaugh made further contributions to Object Modeling Technique, IDEF4, the Rational Unified Process and Unified Modeling Language.
Publications
Rumbaugh has written a number of books about UML and RUP together with Ivar Jacobson and Grady Booch. A selection includes:
1975. A Parallel Asynchronous Computer Architecture For Data Flow Programs. MIT thesis
1991. Object-Oriented Modeling and Design. With others. Prentice Hall, .
1996. OMT insights : perspectives on modeling from the Journal of Object-Oriented Programming. Foreword by James Coplien.
1999. Unified software development process
2005. Object-oriented modeling and design with UML
References
External links
James Rumbaugh – Biography on InformIT
1947 births
Living people
Massachusetts Institute of Technology School of Science alumni
California Institute of Technology alumni
American technology writers
American computer scientists
Digital Equipment Corporation people
General Electric people
IBM employees
American software engineers
Software engineering researchers
Computer science writers
Unified Modeling Language
People from Bethlehem, Pennsylvania
People from Saratoga, California
Mass |
https://en.wikipedia.org/wiki/Path%20%28Toronto%29 | Path (stylized as PATH) is a network of underground pedestrian tunnels, elevated walkways, and at-grade walkways connecting the office towers of Downtown Toronto, Ontario, Canada. It connects more than 70 buildings via of tunnels, walkways, and shopping areas. According to Guinness World Records, Path is the largest underground shopping complex in the world, with of retail space which includes over 1,200 retail fronts (2016). As of 2016, over 200,000 residents and workers use the Path system daily with the number of private dwellings within walking distance at 30,115.
The Path network's northern point is the Atrium on Bay at Dundas Street and Bay Street, including a now-closed tunnel to the former Toronto Coach Terminal, while its southern point is Waterpark Place on Queens Quay. Its main north–south axes of walkways generally parallel Yonge and Bay Streets, while its main east–west axis parallels King Street.
There is continuous expansion of the Path system around Union Station. Two towers being built as part of CIBC Square will be linked to the Path system, extending it to the east to cross over Yonge Street by a pedestrian bridge into the Backstage Condominium building (Esplanade and Yonge corner), giving closed access to Union Station, Scotiabank Arena, and other buildings in Toronto's Financial District.
History
Early pedestrian tunnels
In 1900, the Eaton's department store constructed a tunnel underneath James Street, allowing shoppers to walk between the Eaton's main store at Yonge and Queen streets and the Eaton's Annex located behind the (then) City Hall. It was the first underground pedestrian pathway in Toronto and is often credited as a historic precursor to the current Path network. The original Eaton's tunnel is still in use as part of the Path system, although today it connects Toronto Eaton Centre to the Bell Trinity Square office complex on the site of the former Annex building.
Another original underground linkage, built in 1927 to connect Union Station and the Royal York Hotel, remained an integral part of the Path network for many years until it was replaced by a newer connection between the Royal York Hotel and Royal Bank Plaza, which continues onward to Union Station.
Expansion
The network of underground walkways expanded under city planner Matthew Lawson in the 1960s. Toronto's downtown sidewalks were overcrowded, and new office towers were removing the much-needed small businesses from the streets. Lawson thus convinced several important developers to construct underground malls, pledging that they would eventually be linked. The designers of the Toronto-Dominion Centre, the first of Toronto's major urban developments in the 1960s (completed in 1967), were the first to include underground shopping in their complex, with the possibility of future expansion built in. The city originally helped fund the construction, but with the election of a reform city council, this practice ended. The reformers disliked the unde |
https://en.wikipedia.org/wiki/Programming%20game | A programming game is a video game that incorporates elements of computer programming, enabling the player to direct otherwise autonomous units within the game to follow commands in a domain-specific programming language, often represented as a visual language to simplify the programming metaphor. Programming games broadly fall into two areas: single-player games where the programming elements either make up part of or the whole of a puzzle game, and multiplayer games where the player's automated program is pitted against other players' programs.
As puzzle games
Early games in the genre include System 15000 and Hacker, released in 1984 and 1985 respectively.
Programming games have been used as part of puzzle games, challenging the player to achieve a specific result once the program starts operating. An example of such a game is SpaceChem, where the player must use its visual language to manipulate two waldos as to disassemble and reassemble chemical molecules. In such games, players are able to test and debug their program as often as necessary until they find a solution that works. Many of these games encourage the player to find the most efficient program, measured by the number of timesteps needed or number of commands required. Other similar games include Human Resource Machine, Infinifactory, and TIS-100. Zachtronics is a video game development company known for its programming-centric puzzle games.
Other games incorporate the elements of programming as portions of puzzles in the larger game. For example, Hack 'n' Slash include a metaphor of being able to access the internal programs and variables of objects represented in the game world, pausing the rest of the game as the player engages this programming interface, and modify the object's program as to progress further; this might be changing the state of an object from being indestructible to destructible. Other similar games with this type of programming approach include Transistor, else Heart.Break(), Glitchspace, and Pony Island.
Another approach used in some graphical games with programming elements is to present the player with a command line interface to issue orders via a domain-specific language to direct objects within the game, allowing the player to reissue commands as the situation changes rather than crafting a pre-made program. Games like Quadrilateral Cowboy and Duskers have the user command several small robotic creatures in tandem through the language of code to reach a certain goal. Hackmud presents the player with a simulated mainframe interface through which they issue commands to progress forward.
As competitive games
Many programming games involve controlling entities such as robots, tanks or bacteria which seek to destroy each other. Such games can be considered environments of digital organisms, related to artificial life simulations. Players are given tools to develop and test out their programs within the game's domain-specific language before submitting the |
https://en.wikipedia.org/wiki/Port%20triggering | Port triggering is a configuration option on a NAT-enabled router that controls communication between internal and external host machines in an IP network. It is similar to port forwarding in that it enables incoming traffic to be forwarded to a specific internal host machine, although the forwarded port is not open permanently and the target internal host machine is chosen dynamically.
Description
When two networks communicate through a NAT-router, the host machines on the internal network behave as if they have the IP address of the NAT-router from the perspective of the host machines on the external network. Without any traffic forwarding rules, it is impossible for a host machine on an external network (host B) to open a connection to a host machine in the internal network (host A). This is because the connection can only be targeted to the IP of the NAT-router, since the internal network is hidden behind NAT. With port triggering, when some host A opens a connection to a host B using a predefined port or ports, then all incoming traffic that the router receives on some predefined port or ports is forwarded to host A. This is the 'triggering' event for the forwarding rule. The forwarding rule is disabled after a period of inactivity.
Port triggering is useful for network applications where the client and server roles must be switched for certain tasks, such as authentication for IRC chat and file downloading for FTP file sharing.
Example
As an example of how port triggering operates, when connecting to IRC (Internet Relay Chat), it is common to authenticate a username with the Ident protocol via port 113.
When connecting to IRC, the client computer typically makes an outgoing connection on port 6667 (or any port in the range 6660–7000), causing the IRC server to attempt to verify the username given by making a new connection back to the client computer on port 113. When the computer is behind NAT, the NAT device silently drops this connection because it does not know to which computer behind the NAT it should send the request to connect. These two transport-level connections are necessary for the application-level connection to the IRC server to succeed (see Internet protocol suite). Since the second TCP/IP connection is not possible, the attempted connection to the IRC server will fail.
In the case of port triggering, the router is configured so that when an outbound connection is established on any port from 6660 to 7000, it should allow inbound connections to that particular computer on port 113. This gives it more flexibility than static port forwarding because it is not necessary to set it up for a specific address on your network, allowing multiple clients to connect to IRC servers through the NAT-router. Security is also gained, in the sense that the inbound port is not left open when not actively in use.
Disadvantages
Port triggering has the disadvantage that it binds the triggered port to a single client at a time. As lo |
https://en.wikipedia.org/wiki/Bridge%20router | A bridge router or brouter is a network device that works as a bridge and as a router. The brouter routes packets for known protocols and simply forwards all other packets as a bridge would.
Brouters operate at both the network layer for routable protocols and at the data link layer for non-routable protocols. As networks continue to become more complex, a mix of routable and non-routable protocols has led to the need for the combined features of bridges and routers. Brouters handle both routable and non-routable features by acting as routers for routable protocols and bridges for non-routable protocols. Bridged protocols might propagate throughout the network, but techniques such as filtering and learning might be used to reduce potential congestion. Brouters are used as connecting devices in the networking system, so they act as a bridge in a network and as a router in an internetwork.
See also
Multilayer switch
References
Networking hardware |
https://en.wikipedia.org/wiki/Unified%20Parallel%20C | Unified Parallel C (UPC) is an extension of the C programming language designed for high-performance computing on large-scale parallel machines, including those with a common global address space (SMP and NUMA) and those with distributed memory (e. g. clusters). The programmer is presented with a single partitioned global address space; where shared variables may be directly read and written by any processor, but each variable is physically associated with a single processor. UPC uses a single program, multiple data (SPMD) model of computation in which the amount of parallelism is fixed at program startup time, typically with a single thread of execution per processor.
In order to express parallelism, UPC extends ISO C 99 with the following constructs:
An explicitly parallel execution model
A shared address space ( storage qualifier) with thread-local parts (normal variables)
Synchronization primitives and a memory consistency model
Explicit communication primitives, e. g. upc_memput
Memory management primitives
The UPC language evolved from experiences with three other earlier languages that proposed parallel extensions to ISO C 99: AC, Split-C, and Parallel C preprocessor (PCP). UPC is not a superset of these three languages, but rather an attempt to distill the best characteristics of each. UPC combines the programmability advantages of the shared memory programming paradigm and the control over data layout and performance of the message passing programming paradigm.
See also
Cilk
Coarray Fortran
Chapel
X10
High Performance Fortran
OpenMP
Partitioned global address space
Parallel programming model
Software transactional memory
External links
UPC at LBNL
UPC at GWU
GNU UPC
UPC Tutorial (2003)
Concurrent programming languages
Parallel computing
C programming language family |
https://en.wikipedia.org/wiki/IGES | The Initial Graphics Exchange Specification (IGES) is a vendor-neutral file format that allows the digital exchange of information among computer-aided design (CAD) systems. It's an ASCII-based textual format.
The official title of IGES is Digital Representation for Communication of Product Definition Data, first published in March, 1980 by the U.S. National Bureau of Standards as NBSIR 80-1978. Many documents (like early versions of the Defense Standards MIL-PRF-28000 and MIL-STD-1840) referred to it as ASME Y14.26M, the designation of the ANSI committee that approved IGES Version 1.0.
Using IGES, a CAD user can exchange product data models in the form of circuit diagrams, wireframe, freeform surface or solid modeling representations. Applications supported by IGES include traditional engineering drawings, models for analysis, and other manufacturing functions.
History
IGES was an initiative of the United States Air Force (USAF) Integrated Computer Aided Manufacturing (ICAM) project (1976-1984).
ICAM sought to develop procedures (IDEF) processes (Group Technology) and software (CAD/CAM) that would integrate all operations in Aerospace manufacturing and thus greatly reduce costs. Earlier the USAF Manufacturing Technology Program had funded the Automatically Programmed Tools (APT) language for programming Numerically Controlled (NC) machine tools. To close the data gap between parts design and manufacturing, one of the ICAM goals was to develop CAD software that would automatically generate numerical control programs for the very complex Computer Numerically Controlled (CNC) machine tools used throughout the Aerospace industry. A serious issue was the incompatibility of data produced by the many CAD systems in use at the time. USAF/ICAM called a meeting at the National Bureau of Standards (now known as National Institute of Standards and Technology or NIST) in 1978 to address this issue. Boeing offered to sell its CAD translation software to USAF for one United States dollar. USAF accepted this offer and contracted NIST to bring together a group of users and vendors, including Boeing, General Electric, Xerox, Computervision, Applicon and others to further develop and test this software. Though it was the practice to begin the name of ICAM developments with the word integrated (for example the IDEFs) believing that there would be rapid development of graphical exchange software, USAF decided that the IGES would be the Initial Graphics Exchange Specification not the Integrated Graphics Exchange Specification.
Since 1988, the DoD has required that all digital product and manufacturing information (PMI) for weapons systems contracts (the engineering drawings, circuit diagrams, etc.) be delivered in electronic form such as IGES format. As a consequence, CAx software vendors who want to market their products to DoD subcontractors and their partners needed to support the import (reading) and export (writing) of IGES format files.
An ANSI s |
https://en.wikipedia.org/wiki/Ralph%20Nelson%20Elliott | Ralph Nelson Elliott (28 July 1871 – 15 January 1948) was an American accountant and author whose study of stock market data led him to develop the Wave Principle, a description of the cyclical nature of trader psychology and a form of technical analysis. It identifies trends and reversals in financial markets. These cyclical patterns in price movements are known among practitioners of the method as Elliott waves.
Personal life and career
Elliott was born in Marysville, Kansas, and later moved to San Antonio, Texas. He entered the accounting field in the mid-1890s and worked primarily in executive positions for railroad companies in Central America and Mexico. In 1903, Elliott married Mary Elizabeth Fitzpatrick (1869–1941), who accompanied him during his extended time working as an expatriate in Mexico. Civil unrest there brought the couple back to the United States and eventually to a residence in New York City, where Elliott started a successful consulting business. In 1924, the United States Department of State appointed Elliott to the post of Chief Accountant for Nicaragua, which was under American control at the time. Not long afterward, Elliott wrote two books based on his professional experiences: Tea Room and Cafeteria Management
and The Future of Latin America.
Elliott Wave Principle
In the early 1930s, Elliott began a systematic study of seventy-five years of stock market data, including index charts with increments ranging from yearly to half-hourly prices. In August 1938, he detailed his results by publishing his third book in collaboration with Charles J. Collins, entitled The Wave Principle. Elliott stated that, while stock market prices may appear random and unpredictable, they actually follow predictable, natural laws, and can be measured and forecast using Fibonacci numbers. Soon after the publication of The Wave Principle, Financial World magazine commissioned Elliott to write twelve articles under the book title, describing his method of market forecasting.
In the early 1940s, Elliott expanded the theory to apply to all collective human behavior. His final major work was his most comprehensive: Nature's Law –The Secret of the Universe published in June, 1946, two years before he died.
In the years after Elliott's death, other practitioners, including Charles Collins, Hamilton Bolton, Richard Russell, and A.J. Frost continued to use the wave principle and provide forecasts to investors. Robert Prechter discovered Elliott's work as a market technician at Merrill Lynch, and used it as a basis for the book Elliott Wave Principle, coauthored with Frost in 1978. Prechter's prominence as a forecaster during the bull market of the 1980s helped bring the wave principle its greatest exposure up to that time.
See also
The Elliott Wave Theorist
Behavioral finance
Daniel Kahneman
References
1871 births
1948 deaths
People from Marysville, Kansas
American accountants
Technical analysts |
https://en.wikipedia.org/wiki/CompactRISC | CompactRISC is a family of instruction set architectures from National Semiconductor.
The architectures are designed according to reduced instruction set computing principles, and are mainly used in microcontrollers.
The subarchitectures of this family are the 16-bit CR16 and CR16C and the 32-bit CRX.
Architectures
Features of CR16 family: compact implementations (less than 1 mm2 with 250 nm), addressing of 2 MB (2), frequencies up to 66 MHz, hardware multiplier for 16-bit integers.
It has complex instructions such as bit manipulation, saving/restoring and push/pop of several registers with single command.
CR16 has 16 general purpose registers of 16 bits, and address registers of 21 bits wide. There are 8 special registers: program counter, interrupt stack pointer ISP, interrupt vector address register INTBASE, status register PSR, configuration register and 3 debug registers. Status register implements flags: C, T, L, F, Z, N, E, P, I.
Instructions are encoded in two-address form in several formats, usually they have 16-bit encoding, but there are two formats for medium immediate instructions with length of 32-bit. Typical opcode length is 4 bits (bits 9–12 of most encoding types. Basic encoding formats are:
Register-to-register,
Short 5-bit immediate value to register,
Medium immediate of 16-bit value to register (32-bit encoding),
Load/store relative with short 5-bit displacement (2-bit opcode),
Load/store relative with medium 18-bit displacement (32-bit encoding, 2-bit opcode).
CR16C comes with a different opcode encoding format, has 23–32-bit-wide address registers and provides two 32-bit general purpose registers.
CR16 implements traps and interrupts. Implementations of CR16 has three-stage pipeline: fetch, decode, execute.
CR16 products
CR16 was used in several National Semiconductor microcontrollers, and since 2001 integrated microcontrollers were available having built-in flash memory. Since 2007 CR16-based IP was available to licensing
References
External links
National Semiconductor Embedded Microcontrollers (CR16 and COP8)
CompactRISC Core Architecture page on National Semiconductor website (archived copy from 2007)
CR16B Programmer’s Reference Manual, National Semiconductor, 1997
GCC CR16 port
Microcontrollers |
https://en.wikipedia.org/wiki/Semigroup%20action | In algebra and theoretical computer science, an action or act of a semigroup on a set is a rule which associates to each element of the semigroup a transformation of the set in such a way that the product of two elements of the semigroup (using the semigroup operation) is associated with the composite of the two corresponding transformations. The terminology conveys the idea that the elements of the semigroup are acting as transformations of the set. From an algebraic perspective, a semigroup action is a generalization of the notion of a group action in group theory. From the computer science point of view, semigroup actions are closely related to automata: the set models the state of the automaton and the action models transformations of that state in response to inputs.
An important special case is a monoid action or act, in which the semigroup is a monoid and the identity element of the monoid acts as the identity transformation of a set. From a category theoretic point of view, a monoid is a category with one object, and an act is a functor from that category to the category of sets. This immediately provides a generalization to monoid acts on objects in categories other than the category of sets.
Another important special case is a transformation semigroup. This is a semigroup of transformations of a set, and hence it has a tautological action on that set. This concept is linked to the more general notion of a semigroup by an analogue of Cayley's theorem.
(A note on terminology: the terminology used in this area varies, sometimes significantly, from one author to another. See the article for details.)
Formal definitions
Let S be a semigroup. Then a (left) semigroup action (or act) of S is a set X together with an operation which is compatible with the semigroup operation ∗ as follows:
for all s, t in S and x in X, .
This is the analogue in semigroup theory of a (left) group action, and is equivalent to a semigroup homomorphism into the set of functions on X. Right semigroup actions are defined in a similar way using an operation satisfying .
If M is a monoid, then a (left) monoid action (or act) of M is a (left) semigroup action of M with the additional property that
for all x in X: e • x = x
where e is the identity element of M. This correspondingly gives a monoid homomorphism. Right monoid actions are defined in a similar way. A monoid M with an action on a set is also called an operator monoid.
A semigroup action of S on X can be made into monoid act by adjoining an identity to the semigroup and requiring that it acts as the identity transformation on X.
Terminology and notation
If S is a semigroup or monoid, then a set X on which S acts as above (on the left, say) is also known as a (left) S-act, S-set, S-action, S-operand, or left act over S. Some authors do not distinguish between semigroup and monoid actions, by regarding the identity axiom () as empty when there is no identity element, or by using the term unitary S-act |
https://en.wikipedia.org/wiki/Michael%20Perry%20%28software%20engineer%29 | Michael D. Perry, is a United States software engineer. He is the founder of InterCommerce Corporation.
Originally a programmer and software designer, he founded Progressive Computer Services, Inc., which published utility software for the IBM PC market. The company was best known for EZ-Menu, a utility that was declared PC Magazine "Editor's Choice", PC Home Journal "Best Product", and Personal Computing Magazine H "Publisher's Pick". Perry was the principal designer and architect of the prototype online yellow pages system for Bell Atlantic, an environmental database for the United Nations and an online hotel reservation system acquired by hotels.com.
Perry founded the e-commerce company InterCommerce Corporation, of which he is CEO. The company provides advanced e-commerce and Internet technology solutions through networks in the United States, England and the Isle of Man. it handles over US$2M in online transactions a month.
During the 1990s Perry developed many dot-com portal projects including Survey.net, an early online polling system, the Virtual Order Engine, one of the earliest online shopping cart systems available on the Internet. He also registered a number of common domain names such as folk.com, nerd.com, wisdom.com, humankind.com and others. In 2000, Perry sold wisdom.com for US$475,000. At the time this was the third-highest cash sale for any domain name.
Perry is currently involved in a number of projects including a new content management system and a wine-tasting portal LaWineclub.com.
He contributed a chapter to HTML & CGI Unleashed, and contributed to The PC User's Survival Guide.
He resides in New Orleans and was a survivor of Hurricane Katrina. He also runs a recording studio, Wisdom Studios.
References
Aspinwall, Jim & Burke, Rory & Todd, Mike. PC User's Survival Guide, (New York: M&T, 1989)
December, John & Ginsburg, Mark. HTML & CGI Unleashed, (Lebanon, Indiana, U.S.A.: Macmillan Computer, 1995)
External links
Mike Perry's home page
Mike Perry media - showcasing photography
Living people
Year of birth missing (living people)
Writers from New Orleans
Brother Martin High School alumni
American male writers |
https://en.wikipedia.org/wiki/Norwegian%20railway%20signaling | The signalling system used on the rail transport in Norway is regulated by the Regulations of December 4, 2001 no. 1336 about signals and signs on the state's railway network and connected private tracks.
The first signalling system on the Norwegian railway system was a mechanically operated semaphore system introduced at Drammen station in 1893. The first electrically operated light signal system was delivered by AEG in 1924. Today, only electrically operated light signals are used.
Train radio
Between 1993 and 1996, NSB rolled out the analog train radio system Scanet. Developed by Ascom Radiocom, it was only installed on the primary railway lines. The system allows radio communication between a train dispatcher, and train drivers and other users involved in railway operations. Scanet was also connected to the automatic train control system. However, several lines lack the system, including the Arendal Line, the Flåm Line, the Meråker Line, the Nordland Line, the Rauma Line, the Røros Line, the Inner Østfold Line, the northern part of the Gjøvik Line, and several tunnels along the Bergen Line and the Sørland Line. The Åsta accident in 2000 spurred the need to give all parts of the railway coverage with train radio. On these lines, the dispatcher and drivers had to communicate using the Nordic Mobile Telephone (NMT 450) standard, a system which the operator Telenor discontinued in 2002.
Scanet was replaced by Global System for Mobile Communication – Railway (GSM-R) between 2004 2007, with the systems first being installed on the lines without Scanet. The system, delivered by Nokia Siemens Networks, was on time and on budget, and made Norway one of the first countries to fully implement the system throughout Europe. After GSM-R was fully implemented on 1 November, Scanet was gradually closed. The new system has been characterized as simpler to use and giving better audio quality than Scanet. The implementation cost 1.8 billion Norwegian krone and covers the entire network.
Means of signalling
The following means of signalling are used:
Signal flags
Hand-held signal lamps
Signal whistle
Arm signals
Fixed light signals
Fixed sound signals
Signal signs
Orientation posts
Locomotive whistle
Locomotive and train signal lamps
The fundamental meaning of the signal colors
Red always indicates "stop".
Violet indicates that the associated level crossing signal is showing "Stop short of the level crossing".
Yellow indicates "caution".
Green indicates "permission to run".
White indicates "clear line".
Light signals
Light signals show one of the following aspects:
Main signals
Fail safe
If one of the green lights in signal 22 fails, the indication becomes the lower speed signal 21 – this is fail-safe. Other nearby countries reverse the role of the single green aspect and double green aspect.
Distant signals
Wrong-side failure
If the yellow light in signal 24 fails, the signal displays a higher speed indication, which would be a w |
https://en.wikipedia.org/wiki/Rollo%20Carpenter | Rollo Carpenter (born 1965) is the British-born creator of Jabberwacky and Cleverbot, learning Artificial Intelligence (AI) software. Carpenter worked as CTO of a business software startup in Silicon Valley.
Cleverbot
In 2011, Cleverbot, a learning Artificial Intelligence conversationalist, took part alongside humans in a formal Turing Test at the Techniche 2011 festival at IIT Guwahati, India on 3 September. The results from 1,334 votes were announced 4 September 2011. Cleverbot was judged to be 59.3% human, far exceeding expectations. The humans in the event achieved just 63.3%.
References
External links
cleverbot.com
jabberwacky.com
PopSci clip of Cleverbot
British computer scientists
Artificial intelligence researchers
Living people
1965 births |
https://en.wikipedia.org/wiki/Supportability | Supportability may refer to:
Supportability (engineering)
Supportability (computer science) |
https://en.wikipedia.org/wiki/National%20LambdaRail | National LambdaRail (NLR) was a , high-speed national computer network owned and operated by the U.S. research and education community. In November 2011, the control of NLR was purchased from its university membership by a billionaire Patrick Soon-Shiong. NLR ceased operations in March 2014.
Goals
The goals of the National LambdaRail project are:
To bridge the gap between leading-edge optical network research and state-of-the-art applications research;
To push beyond the technical and performance limitations of today’s Internet backbones;
To provide the growing set of major computationally intensive science (often termed e-Science) projects, initiatives and experiments with the dedicated bandwidth, deterministic performance characteristics, and/or other advanced network capabilities they need; and
To enable creative experimentation and innovation that characterized facilities-based network research during the early years of the Internet.
Description
NLR uses fiber-optic lines, and is the first transcontinental 10 Gigabit Ethernet network. Its high capacity (up to 1.6 Tbit/s aggregate), high bitrate (40 Gbit/s implemented; planning for 100 Gbit/s underway) and high availability (99.99% or more), enable National LambdaRail to support demanding research projects. Users include NASA, the National Oceanic and Atmospheric Administration, Oak Ridge National Laboratory, and over 280 research universities and other laboratories. In 2009 National LambdaRail was selected to provide wide-area networking for U.S. laboratories participating in research related to the Large Hadron Collider project, based near Geneva, Switzerland.
It is primarily oriented to aid terascale computing efforts and to be used as a network testbed for experimentation with large-scale networks. National LambdaRail is a university-based and -owned initiative, in contrast with the Abilene Network and Internet2, which are university-corporate sponsorships. National LambdaRail does not impose any acceptable use policies on its users, in contrast to commercial networks. This gives researchers more control to use the network for these research projects. National LambdaRail also supports a production layer on its infrastructure.
Links in the network use dense wavelength-division multiplexing (DWDM), which allows up to 64 individual optical wavelengths to be used (depending on hardware configuration at each end) separated by 100 GHz spacing. At present, individual wavelengths are used to carry traditional OC-X (OC3, OC12, OC48 or OC192) time-division multiplexing circuits or Ethernet signals for Gigabit Ethernet or 10 Gigabit Ethernet.
National LambdaRail was founded in 2003 and in 2004 its national, advanced fiber optic network was completed. In addition to being the first transcontinental, production 10 Gigabit Ethernet network, National LambdaRail was also the first intelligently managed, nationwide peering and transit program focused on research applications.
In 2008, a compa |
https://en.wikipedia.org/wiki/Robert%20Cailliau | Robert Cailliau (, born 26 January 1947) is a Belgian informatics engineer, computer scientist and author who proposed the first (pre-www) hypertext system for CERN in 1987 and collaborated with Tim Berners-Lee on the World Wide Web (jointly winning the ACM Software System Award) from before it got its name. He designed the historical logo of the WWW, organized the first International World Wide Web Conference at CERN in 1994 and helped transfer Web development from CERN to the global Web consortium in 1995. Together with James Gillies, Cailliau wrote How the Web Was Born, the first book-length account of the origins of the World Wide Web.
Biography
Cailliau was born in Tongeren, Belgium. In 1958 he moved with his parents to Antwerp. After secondary school he graduated from Ghent University in 1969 as civil engineer in electrical and mechanical engineering (Dutch: Burgerlijk Werktuigkundig en Elektrotechnisch ingenieur). He also has an MSc from the University of Michigan in Computer, Information and Control Engineering, 1971.
During his military service in the Belgian Army, he maintained Fortran programs to simulate troop movements and test video war games.
In December 1974 he started working at CERN as a Fellow in the Proton Synchrotron (PS) division, working on the control system of the accelerator. In April 1987 he left the PS division to become group leader of Office Computing Systems in the Data Handling division. In 1989, Tim Berners-Lee proposed a hypertext system for access to the many forms of documentation at and related to CERN. Berners-Lee created the system, calling it World Wide Web, between September and December 1990. During this time, Cailliau and he co-authored a proposal for funding for the project. Cailliau later became a key proponent of the project, running several projects to create and support browsers on different operating systems including various UNIX flavours and Classic Mac OS. With Nicola Pellow he helped develop the first web browser for the Classic Mac OS operating system called MacWWW.
In 1993, in collaboration with the Fraunhofer-Gesellschaft Cailliau started the European Commission's first web-based project for information dissemination in Europe (WISE). As a result of his work with CERN's Legal Service, CERN's director of Future Research Walter Hoogland signed the official document that released the web technology into the public domain on 30 April 1993.
In December 1993 Cailliau called for the first International WWW Conference which was held at CERN in May 1994. The oversubscribed conference brought together 380 web pioneers and was a milestone in the development of the web. The conference led to the forming of the International World Wide Web Conferences Steering Committee which has organized an annual conference since then. Cailliau was a member of the committee from 1994 until 2002.
In 1995 Cailliau started the "Web for Schools" project with the European Commission, introducing the web as a resource |
https://en.wikipedia.org/wiki/Secure%20Communications%20Interoperability%20Protocol | The Secure Communications Interoperability Protocol (SCIP) is a US standard for secure voice and data communication, for circuit-switched one-to-one connections, not packet-switched networks. SCIP derived from the US Government Future Narrowband Digital Terminal (FNBDT) project.
SCIP supports a number of different modes, including national and multinational modes which employ different cryptography. Many nations and industries develop SCIP devices to support the multinational and national modes of SCIP.
SCIP has to operate over the wide variety of communications systems, including commercial land line telephone, military radios, communication satellites, Voice over IP and the several different cellular telephone standards. Therefore, it was designed to make no assumptions about the underlying channel other than a minimum bandwidth of 2400 Hz. It is similar to a dial-up modem in that once a connection is made, two SCIP phones first negotiate the parameters they need and then communicate in the best way possible.
US SCIP or FNBDT systems were used since 2001, beginning with the CONDOR secure cell phone. The standard is designed to cover wideband as well as narrowband voice and data security.
SCIP was designed by the Department of Defense Digital Voice Processor Consortium (DDVPC) in cooperation with the U.S. National Security Agency and is intended to solve problems with earlier NSA encryption systems for voice, including STU-III and Secure Terminal Equipment (STE) which made assumptions about the underlying communication systems that prevented interoperability with more modern wireless systems. STE sets can be upgraded to work with SCIP, but STU-III cannot. This has led to some resistance since various government agencies already own over 350,000 STU-III telephones at a cost of several thousand dollars each.
There are several components to the SCIP standard: key management, voice compression, encryption and a signalling plan for voice, data and multimedia applications.
Key Management (120)
To set up a secure call, a new Traffic Encryption Key (TEK) must be negotiated. For Type 1 security (classified calls), the SCIP signalling plan uses an enhanced FIREFLY messaging system for key exchange. FIREFLY is an NSA key management system based on public key cryptography. At least one commercial grade implementation uses Diffie-Hellman key exchange.
STEs use security tokens to limit use of the secure voice capability to authorized users while other SCIP devices only require a PIN code, 7 digits for Type 1 security, 4 digits for unclassified.
Voice compression using Voice Coders (vocoders)
SCIP can work with a variety of vocoders. The standard requires, as a minimum, support for the mixed-excitation linear prediction (MELP) coder, an enhanced MELP algorithm known as MELPe, with additional preprocessing, analyzer and synthesizer capabilities for improved intelligibility and noise robustness. The old MELP and the new MELPe are interoperable and bot |
https://en.wikipedia.org/wiki/MicroDry | MicroDry is a computer printing system developed by the ALPS corporation of Japan. It is a wax/resin-transfer system using individual colored thermal ribbon cartridges, and can print in process color using cyan, magenta, yellow, and black cartridges, as well as spot-color cartridges as white, metallic silver, and metallic gold, on a wide variety of paper and transparency stock. Certain MicroDry printers can also operate in dye sublimation mode, using special cartridges and paper. ALPS licensed the technology to Citizen (Printiva series) and to Okidata (Oki DP series). Alps also produced the actual printer hardware and ink ribbon cartridges for those companies.
A typical MicroDry printer includes a moving carriage containing the print head, which is capable of picking up cartridges from a rack on the front cover of the machine, printing with them, and returning them to the rack, without human intervention. Printing is normally done one color at a time, printing the entire cyan portion of the page, then retracting the page to print the entire magenta portion, then yellow, then black (or yellow, magenta, cyan, and a protective overcoat, in dye sublimation mode). When multiple spot colors are used in addition to CMYK, the printer can be manually directed to retract the page at the end of the printing cycle, instead of ejecting it, thus assuring that the spot colors remain in registration.
Because ALPS had little name recognition among United States consumers, because it could not interest other major printer manufacturers in its system, and because it is considerably slower than most ink-jet systems, the MicroDry system never achieved wide acceptance despite its ability to produce clear, waterproof, fade-resistant hardcopy. It has found a niche market in certain types of large format printers used in the signage industry, as well as an extremely loyal following among those who understand its capabilities. ALPS does continued to produce mechanisms for use in plotters, as well as supplies, and had pledged to continue doing so for as long as there is a significant demand.
However, as of March 2007, ALPS ceased support of the MicroDry technology outside Japan. MicroDry printers and consumables were still manufactured and supported for the Japanese domestic market, however, and there still are suppliers of the printers and consumables sourcing stock from Japan for sale worldwide. As of May 2010, Alps discontinued sales of their latest MicroDry printer, the MD-5500. Alps will discontinue supplying the MicroDry consumables in May 2015.
The feature yet unsurpassed on MicroDry technology is its ability to print unconventional inks; white, metallic colours and clear (matte or gloss) finish. This feature is especially sought after on modelmaking community for printing decals (which often involve white colour), and also for T-shirt customizing. Neither inkjet nor laser printers can print any other colours than CMYK, as they assume the media is always whit |
https://en.wikipedia.org/wiki/Ian%20Hanomansing | Ian Harvey Hanomansing is a Trinidadian-Canadian television journalist with the Canadian Broadcasting Corporation (CBC). He formerly hosted CBC News Network Vancouver on CBC News Network, and reports for CBC Television's nightly newscast, The National.
On August 1, 2017, he was named a co-anchor of The National, and currently anchors the show on Fridays and Sundays. He also served as interim host of CBC Radio One's weekly call-in show Cross Country Checkup from 2020 to 2022, while regular host Duncan McCue was on sabbatical, and was named permanent host of the program in 2022.
Early life
Hanomansing was born in Port of Spain, Trinidad and Tobago and grew up in Sackville, New Brunswick with parents Eunice and Harvey, along with his sister Ria. He got his first job coming out of high school in 1979 at a radio station in Amherst, Nova Scotia. He attended Mount Allison University for his undergraduate education and graduated in 1983 with a degree in political science and sociology. He studied law at Dalhousie Law School and graduated in 1986.
Broadcasting career
His broadcast media career began at CKDH in Amherst, Nova Scotia in the summer after his graduation, followed by work at CKCW in Moncton, New Brunswick and at CHNS in nearby Halifax, Nova Scotia. In 1986 he joined the Canadian Broadcasting Corporation. He worked for CBC bureaus in the Maritimes and Toronto, Ontario before moving to Vancouver, where he was a network reporter and hosted the now-defunct programs Pacific Rim Report, Foreign Assignment, and Times 7 (a joint venture with The New York Times) and also hosted a summer series on CBC Radio One, Feeling the Heat.
From 2000 to 2007, he was the anchor of the national segment of the defunct newscast Canada Now; following that program's cancellation, he was the co-anchor of CBC News: Vancouver, CBUT's supper hour newscast, from 2007 to 2010. He returned to his former role as network reporter for The National in 2010 and from 2012 to 2017 he hosted CBC News Now with Ian Hanomansing, which was broadcast live from CBC Vancouver on weeknights. On August 1, 2017, he was named as one of four new co-hosts of The National, CBC's flagship news broadcast alongside Adrienne Arsenault, Rosemary Barton and Andrew Chang. In 2020, he was named the Friday and Sunday anchor of the programme.
Hanomansing has developed and hosted a series of innovative live news specials including "Downtown Drugs", in November 1998, from Vancouver's Downtown Eastside during a public health emergency declared after a high number of fatal overdoses. In March 2005, "Crime on the Streets" was broadcast, in part, from Stoney Mountain Institution in Manitoba. It is believed to be the only live national news special from a Canadian federal penal institution. It won a national Justicia Award for Excellence in Legal Reporting, as well as a Jack Webster Award.
In 2006 Hanomansing also designed Big League Manager, an NHL-licensed board game. His game was voted a "Best Bet" by the |
https://en.wikipedia.org/wiki/Hugh%20Hewitt | Hugh Hewitt (born February 22, 1956) is an American radio talk show host with the Salem Radio Network and an attorney, academic, and author. He writes about law, society, politics, and media bias in the United States. Hewitt is a former official in the Reagan administration, the former president and CEO of the Richard Nixon Foundation, a law professor at Chapman University School of Law, a columnist for The Washington Post, and a regular political commentator on Fox News.
Early life
Hewitt was born on February 22, 1956, in Warren, Ohio. He is the son of Marguerite (née Rohl) and William Robert Hewitt. He describes himself as "a descendant of both Ulster and the Republic through a green-orange marriage of immigrants from County Down and County Clare". He attended John F. Kennedy Catholic High School in Warren, Ohio. He then graduated cum laude from Harvard University with a B.A. in government in 1978. After leaving Harvard, he worked as a ghostwriter for Richard Nixon in California and New York, before studying at the University of Michigan Law School, where he was inducted into the Order of the Coif. Hewitt received his J.D. degree in 1983, then moved to Washington, D.C., to clerk for Judges Roger Robb and George MacKinnon on the U.S. Court of Appeals for the District of Columbia Circuit in 1983–84.
Career
Hewitt worked in many posts in the Ronald Reagan administration, including deputy director and General Counsel of the Office of Personnel Management, General Counsel for the National Endowment for the Humanities, Assistant White House Counsel, and Special Assistant to the Attorney General.
In 1989, Hewitt became the executive director of the Richard Nixon Presidential Library and Museum. In 1990, he sparked controversy by proposing screening of researchers wishing to use the library resources. Hewitt suggested refusing admission to researchers deemed "unfriendly" – specifically Bob Woodward, whom he characterized as "not a responsible journalist." John Taylor, a spokesman for Nixon, overturned Hewitt's decision after two days. It became the subject of editorial rebuke in The New York Times.
Hewitt left the Nixon Library in 1990. He hosted a weekend radio talk show for the Los Angeles radio station KFI, where he broadcast until 1995. In the spring of 1992, he began co-hosting L.A. PBS member station KCET's program Life & Times, and remained with the program until the fall of 2001, when he began broadcasting his own radio show. Hewitt received three Emmys for his work on Life & Times on KCET, and also conceived and hosted the 1996 PBS series Searching for God in America.
He has worked as a weekly columnist for the Daily Standard (the online edition of The Weekly Standard) and World. He has appeared on programs such as The Dennis Miller Show, Hardball with Chris Matthews, Larry King Live, The O'Reilly Factor, The Today Show and The Colbert Report.
Hewitt also became a professor of law at Chapman University School of Law. Hewitt founded the |
https://en.wikipedia.org/wiki/TTA%20%28codec%29 | True Audio (TTA) is a lossless compressor for multichannel 8, 16 and 24 bits audio data.
.tta is the extension to filenames of audio files created by the True Audio codec.
Codec overview
True Audio compresses up to 30% of the original, broadly similar to FLAC and APE. It features a real-time encoding and decoding algorithm and hardware compression support. As with most other lossless codecs, plugins are available for most media players.
TTA performs lossless compression on multichannel 8, 16 and 24 bit data of uncompressed wav input files. The term "lossless" refers to the fact that such compression results in no data or quality loss; when decompressed, the audio file data are bit-identical to those of their originals. Compression ratios achieved by the TTA codec vary, depending on music type, but range from 30% to 70% of the original. The TTA lossless compressed audio format supports both ID3v1/ID3v2 information tags and APEv2.
The TTA lossless audio codec allows for the storage of up to 20 audio CDs worth of music on a single DVD-R, retaining the original CD quality audio, plus detailed information in the ID3 tag format.
All TTA source code and binaries are freely available and distributed under GPL Open Source licenses.
Software support
Listed below is software that has TTA format support:
Hardware support
Audio players that run Rockbox support TTA.
See also
Lossless data compression
Lossy data compression
Audio data compression
Comparison of audio coding formats
Meridian Lossless Packing
References
External links
Project @ Sourceforge.Net
Lossless audio codecs
Free audio codecs
Cross-platform software |
https://en.wikipedia.org/wiki/Parallel%20rendering | Parallel rendering (or distributed rendering) is the application of parallel programming to the computational domain of computer graphics. Rendering graphics can require massive computational resources for complex scenes that arise in scientific visualization, medical visualization, CAD applications, and virtual reality. Recent research has also suggested that parallel rendering can be applied to mobile gaming to decrease power consumption and increase graphical fidelity. Rendering is an embarrassingly parallel workload in multiple domains (e.g., pixels, objects, frames) and thus has been the subject of much research.
Workload distribution
There are two, often competing, reasons for using parallel rendering. Performance scaling allows frames to be rendered more quickly while data scaling allows larger data sets to be visualized. Different methods of distributing the workload tend to favor one type of scaling over the other. There can also be other advantages and disadvantages such as latency and load balancing issues. The three main options for primitives to distribute are entire frames, pixels, or objects (e.g. triangle meshes).
Frame distribution
Each processing unit can render an entire frame from a different point of view or moment in time. The frames rendered from different points of view can improve image quality with anti-aliasing or add effects like depth-of-field and three-dimensional display output. This approach allows for good performance scaling but no data scaling.
When rendering sequential frames in parallel there will be a lag for interactive sessions. The lag between user input and the action being displayed is proportional to the number of sequential frames being rendered in parallel.
Pixel distribution
Sets of pixels in the screen space can be distributed among processing units in what is often referred to as sort first rendering.
Distributing interlaced lines of pixels gives good load balancing but makes data scaling impossible. Distributing contiguous 2D tiles of pixels allows for data scaling by culling data with the view frustum. However, there is a data overhead from objects on frustum boundaries being replicated and data has to be loaded dynamically as the view point changes. Dynamic load balancing is also needed to maintain performance scaling.
Object distribution
Distributing objects among processing units is often referred to as sort last rendering. It provides good data scaling and can provide good performance scaling, but it requires the intermediate images from processing nodes to be alpha composited to create the final image. As the image resolution grows, the alpha compositing overhead also grows.
A load balancing scheme is also needed to maintain performance regardless of the viewing conditions. This can be achieved by over partitioning the object space and assigning multiple pieces to each processing unit in a random fashion, however this increases the number of alpha compositing stages required to |
https://en.wikipedia.org/wiki/Radio%20Sawa | Radio Sawa () is a U.S. government-funded radio station broadcasting in the Arab world. The station is a service of the Middle East Broadcasting Networks, Inc., which also operates Alhurra Television and is publicly funded by the U.S. Agency for Global Media and the U.S. Congress. The word "sawa" (, ) means "together" in many Arabic dialects.
Preexisting attitudes and concurrent reality of opinions towards the United States led to the creation of Radio Sawa. It seeks to effectively communicate with the youthful population of Arabic-speakers in the Middle East. The station's goal is to promote pro-American attitudes to youth in the Arab world. Radio Sawa's first broadcast was on March 23, 2002. Its newscasts are broadcast live on air from its studios in Washington, DC and Dubai, United Arab Emirates. Radio Sawa also has news bureaus and reporters throughout the Middle East.
History
Radio Sawa and its sister-network, Al Hurra TV, are part of a larger U.S. Public Diplomacy effort in the Middle East. Their stated mission is to "improve America's image in the Middle East and win the hearts and minds of the Arab people."
Radio Sawa was first launched on 23 March 2002, initially in Jordan, West Bank, Kuwait, UAE (Abu Dhabi), Qatar and Bahrain and eventually in the rest of the Arab World (see below for full list).
Radio Sawa replaced Voice of America's Arabic service, which had not been successful in attracting large audiences. The initiator of Radio Sawa is American media mogul Norman Pattiz. He found that more than 60% of the Arab population was under the age of 30, which is why he decided to develop programming that would target the younger generation. Pattiz believed that the best way to reach the young people was with music. This is why the majority of the radio's programming consists of American and Arab pop music.
Radio Sawa is controlled by the Broadcasting Board of Governors (BBG), the Federal agency responsible for all U.S. international civilian broadcasting. The BBG founded the Middle East Broadcasting Networks (MBN), a non-profit news and information organization, to run Radio Sawa and Al Hurra TV.
Funding
Radio Sawa is a United States Congress-funded public relations endeavor.
Programming
In contrast to the Voice of America radio broadcasts in the region which it replaced, Radio Sawa blends news with contemporary music, arts and lifestyle and other light programming. Radio Sawa's programming consists of roughly 20–25% news and 75–80% pop songs.
News
Apart from songs, most other content is presented in the rubric "The World Now," which includes news, interviews, sports, etc.
Songs
The station's playlist includes popular Arabic (Middle Eastern), English (mostly American hits) and Spanish (mostly Latin American) songs so as to attract the Arabic listener.
Special programming
There are also occasional specials.
Reception
Radio Sawa has been subject to criticism from various observers, who question its effectiveness in conveying Amer |
https://en.wikipedia.org/wiki/KCRA-TV | KCRA-TV (channel 3) is a television station in Sacramento, California, United States, affiliated with NBC. It is owned by Hearst Television alongside Stockton-licensed dual CW/MyNetworkTV affiliate KQCA (channel 58). Both stations share studios on Television Circle off D Street in downtown Sacramento, while KCRA-TV's transmitter is located in Walnut Grove, California.
History
The station first signed on the air on September 3, 1955. It was founded by the Central Valley Broadcasting Company, a partnership of the Kelly and Hansen families of Sacramento. Central Valley Broadcasting also owned KCRA radio (1320 AM, now KIFM, and 96.1 FM, now KYMX); the AM station's call letters were intended to be "KRCA", but the middle two letters were erroneously transposed by a typist at the Federal Communications Commission (FCC) when that station's original license was drafted in 1945 and was never corrected. By the time KCRA-TV went on the air, the KRCA call letters had already been taken the previous year by NBC's owned-and-operated station in Los Angeles (originally KNBH, now KNBC). The station's longtime original studios were located at 310 10th Street in Sacramento. KCRA-TV inherited the NBC affiliation from KCCC-TV (channel 40, channel now occupied by Fox affiliate KTXL), which became the Sacramento market's first television station when it signed on in September 1953, which had also carried affiliations with ABC, CBS and DuMont until other stations debuted in the market. However, it in turn also received the affiliation as a result of KCRA radio's decade-long affiliation with the NBC Radio Network. KCRA was the third of the Sacramento area's VHF stations to sign on exactly within a year behind KXTV (channel 10) and Stockton-licensed KOVR (channel 13)—all signing on in six-month increments.
In 1959, under the direction of then chief engineer, William Herbert Hartman, construction began on a new transmission tower near Walnut Grove to transmit the signals of KCRA-TV, KXTV and KOVR; the tower was completed in 1961. Upon the death of KCRA co-founder Ewing C. Kelly in 1960, son Bob Kelly (who was KCRA's station manager, commercial manager and film buyer) became president of KCRA, Inc., while son Jon Kelly (who served as its local sales manager) was named general manager.
In January 1962, KCRA-TV began transmitting its signal from the Walnut Grove tower, which became the tallest structure in the state. In April of that year, the FCC approved the sale of the Hansen brothers' 50% share of the KCRA stations to Bob, Jon and their mother Nina Kelly; the company then changed its name to Kelly Broadcasting Company. In September 1968, KCRA-FM's call letters were changed to KCTC. The radio stations were sold to the Tribune Company in September 1977, with the sale being finalized in July 1978; KCRA (AM) changed its calls to KGNR in August of that year.
In 1965, the station began using color film for use in its newscasts. A station press release at that time claimed t |
https://en.wikipedia.org/wiki/Starz | Starz (stylized as STARZ since 2016; pronounced "stars") is an American premium cable and satellite television network owned by Lionsgate, and is the flagship property of parent subsidiary Starz Inc. Programming on Starz consists of theatrically released motion pictures and first-run original television series. Launched in 1994 as a multiplex service of Starz Encore, Starz operates six 24-hour, linear multiplex channels; a traditional subscription video on demand service; and a namesake over-the-top streaming platform that both acts as a TV Everywhere offering for Starz's linear television subscribers and is sold directly to streaming-only consumers.
Starz is also sold independently of traditional and over-the-top multichannel video programming distributors a la carte through Apple TV Channels and Amazon Video Channels, which feature VOD library content and live feeds of Starz's linear television services (consisting of the primary channel's East and West Coast feeds and, for Amazon Video customers, the East Coast feeds of its five multiplex channels). Starz's programming has been licensed for use by a number of channels and platforms worldwide, and the brand name is licensed by Bell Media for a companion channel of the Canada-based company's Crave premium service.
Starz and its sister networks, Starz Encore and MoviePlex, are headquartered in Santa Monica, California, with satellite office facilities located at the Meridian International Business Center complex in Englewood, Colorado, and at a small office located on 5th Avenue in New York City. , Starz was available to approximately 28.517 million American households that had a subscription to a multichannel television provider (27.675 million of which receive Starz's primary channel at minimum).
History
Launch and early history
Starz (initially stylized as "STARZ!" with an exclamation point) was launched at 8:00 p.m. Eastern Time on February 1, 1994, primarily on cable systems operated by Tele-Communications Inc.; the first two movies aired on the network were dramas released in 1992: respectively, Scent of a Woman and The Crying Game. The network was operated as a joint venture between TCI and Liberty Media (both companies were controlled by John Malone), with TCI owning a 50.1% controlling interest in the channel.
Starz made its debut as the first phase of a seven-channel thematic multiplex that was launched by Starz (then Encore Media Group) over the course of the succeeding eight months, with the remaining six channels being launched between July and September 1994. The multiplex was intended to only include six channels, but on May 31, 1993, Encore acquired the pay cable rights to broadcast recent feature films from Universal Pictures released after that year; as a result, TCI/Liberty decided to create an additional premium pay-TV service to serve as a competitor to HBO and Showtime. The network carried the moniker "Encore 8" in its on-air branding as part of a numbering system that |
https://en.wikipedia.org/wiki/Xerox%20Development%20Environment | The Xerox Development Environment was one of the first Integrated development environments (IDEs). It was first implemented on the Xerox Alto in 1977.
See also
BCPL
Mesa (programming language)
External links
The Xerox Development Environment (XDE)
Paper on XDE
Integrated development environments
Development Environment |
https://en.wikipedia.org/wiki/Bitstream%20Cyberbit | Bitstream Cyberbit is a commercial serif Unicode font designed by Bitstream Inc. It is freeware for non-commercial uses. It was one of the first widely available fonts to support a large portion of the Unicode repertoire.
Cyberbit was developed by Bitstream to provide Unicode Consortium members with a large Unicode-encoded font to use for testing and development purposes. The font has 32,910 characters (29,934 glyphs) and 935 kerning pairs in v2.0 beta. The related Bitstream Cyberbase font includes a much smaller number of characters, with 1,249 glyphs and 935 kerning pairs in v1.0 beta.
Bitstream no longer offers Cyberbit as a free download or as a retail product.
TITUS Cyberbit
TITUS Cyberbit Basic is a typeface derived from the Bitstream Cyberbit family, designed by Bitstream Inc. and the TITUS project for Unicode 4.0. Jost Gippert and Carl-Martin Bunz were the principal developers. It can be obtained for free from TITUS and is freeware for non-commercial uses.
TITUS Cyberbit Basic supports part of the Medieval Unicode Font Initiative, and it includes 10,044 glyphs (9,341 characters) in version 3.0 (2000) (revision 4.0) from the following Unicode blocks:
Basic Latin (95)
Latin-1 Supplement (96)
Latin Extended-A (128)
Latin Extended-B (183)
IPA Extensions (96)
Spacing Modifier Letters (80)
Combining Diacritical Marks (106)
Greek (128)
Cyrillic (247)
Cyrillic Supplement (16)
Armenian (86)
Hebrew (83)
Arabic (185)
Syriac (76)
Thaana (50)
Devanagari (106)
Thai (87)
Georgian (83)
Ethiopic (364)
Ogham (32)
Runic (81)
Phonetic Extensions (108)
Latin Extended Additional (247)
Greek Extended (236)
General Punctuation (68)
Superscripts and Subscripts (29)
Currency Symbols (12)
Letterlike Symbols (13)
Number Forms (28)
Arrows (21)
Mathematical Operators (80)
Miscellaneous Technical (8)
Enclosed Alphanumerics (112)
Box Drawing (112)
Block Elements (10)
Geometric Shapes (53)
Miscellaneous Symbols (33)
Glagolitic (94)
Coptic (114)
Georgian Supplement (38)
CJK Symbols and Punctuation (31)
Hiragana (90)
Katakana (94)
Bopomofo (37)
Private Use Area (4,649)
CJK Compatibility Ideographs (1)
Alphabetic Presentation Forms (57)
Arabic Presentation Forms-A (205)
CJK Compatibility Forms (27)
Small Form Variants (29)
Arabic Presentation Forms-B (140)
Halfwidth and Fullwidth Forms (157)
An extended version of this font is TITUS Cyberbit Unicode, which includes 36,161 characters in v4.0.
See also
Bitstream Speedo Fonts
Bitstream Vera
List of typefaces
TITUS (project)
Unicode typefaces
External links
Bitstream Cyberbit Download & Documentation from a Netscape FTP server
The remnants of Bitstream's Cyberbit support page
TITUS Font description
TITUS Cyberbit Font download (freeware, requires registration)
TITUS Cyberbit Unicode download
Unicode typefaces |
https://en.wikipedia.org/wiki/Zlat%C3%A9%20Moravce | Zlaté Moravce (; 1776 Morawce, , ) is a town in south-western Slovakia.
Basic data
It is the capital and the biggest town of Zlaté Moravce District. It is approximately 120 km from the Slovak capital Bratislava and 32 km from Nitra.
History
The town is situated on the banks of the river Žitava, in the northern part of the Podunajská Heights. Nowadays, it also includes the area of formerly separate boroughs Chyzerovce and Prílepy. Thanks to its favourable location on the natural terrace of the river Žitava, the traces of the continuous settlement of this area go back to the Paleolithic Age. The rich archeological findings in the town area also prove intensive Great Moravian settlement in the 9th-10th century. A unique finding – a golden pectoral cross – is associated with this settlement.
The origin of the oldest name of the borough "Morowa" in the Charter of Zobor of 1113 is related to that time as well. This charter is the oldest written proof of the existence of Moravce as Zobor Monastery's property. The borough that was situated on the important route to Tekov was already in the 13th century dominated by a small Roman church surrounded by a cemetery, which was located on the site of today's square.
The first written mentions of the town are from 12th century A.D. (1113 Morowa, 1284 Marouth). "Moravce" [pronounced app. Moravtseh], a word in plural, was a frequent settlement name in Slovakia and means "settlement of (the tribe) Moravians". The attribute "zlaté", meaning "golden", was added only later in order to distinguish the settlement's name from all the other "Moravce"s. Ottomans plundered the city in 1530 and 1573. Rivers (Žitava, Zlatnanka) in the surrounding areas were known in the past for gold washing. Note the name of the second river. Across Slavic languages, Zlato means gold.
In late 1700s, the town was purchased by Cristoph Cardinal Migazzi, who completed renovations of local chateau for purposes of his private summer residence.
Demographics
According to the 2001 census, the town had 15,618 inhabitants. 97.09% of inhabitants were Slovaks, 0.60% Czechs and 0.29% Hungarians. The religious makeup was 82.52% Roman Catholics, 10.59% people with no religious affiliation and 1.48% Lutherans. An active Jewish community had existed here until the Holocaust. Zlaté Moravce has a town status from 1960.
Industry
The town is known for the production of kitchen technologies (well known as a brand CALEX which is actually not existing in the present) and building materials - bricks.
Historical monuments
WWI and WWII victims
Holocaust victims from Zlaté Moravce memorial
Notable people
Janko Kráľ, a poet of Slovak Romanticism
Ján Kocian, footballer, football trainer
Tono Stano, photographer
Imrich Chlamtac, President of EAI
Twin towns — sister cities
Zlaté Moravce is twinned with:
Bučovice, Czech Republic
Hulín, Czech Republic
Velké Přílepy, Czech Republic
Našice, Croatia
Sierpc, Poland
Szydłów, Poland
References
External link |
https://en.wikipedia.org/wiki/VH1%20MegaHits | VH1 MegaHits was a Latin American pay television music channel. It was owned by ViacomCBS Networks Brazil, subsidiary of ViacomCBS Networks Americas and aired music videos throughout its entire day.
VH1 MegaHits featured four different blocks of programming: In Motion, Nothing But Classics, VH1 Shuffle and Moods. It was somewhat equivalent to MTV Hits in its programming style, though the latter also featured artists interviews and album/music video recording featurettes, whereas VH1 MegaHits was completely dependent on music videos.
The network launched as MTV Hits in Brazil on 22 June 2005, and was re-branded as VH1 MegaHits on 29 January 2010 after a local re-configuration of Viacom's domestic properties in Brazil.
In Brazil, by decision of Viacom, the channel was manually replaced by MTV Live HD on 31 July 2020 in most TV providers that didn't have the channel yet.
VH1 MegaHits had its signal switched off on 31 August 2020, one day after the broadcast of the 2020 MTV VMAs. As well as MTV Hits US, the channel was directly replaced by NickMusic on August 31, 2020. The last music video played on the channel was "Bulletproof" by La Roux.
VH1 MegaHits in the United States
VH1 MegaHits in the United States was a fully automated music video channel which played mostly top 40 adult contemporary videos from throughout VH1's history, from the '80s to the early years of the 21st century. It shared the same eight-hour automated loop schedule that VH1 Classic and VH1 Country also had at the time. As with its sister networks, it was exclusive to digital cable and never had any satellite service carriage.
Due to low viewership and cable carriage, the channel was discontinued at the end of June 2005. The satellite space was used by corporate parent MTV Networks to launch Logo, a subscription network targeted at the gay community. Logo TV previously aired two music video-based programs, NewNowNext Music and The Click List: Top 10 Videos.
See also
VH1 Brasil
Logo, the successor of VH1 MegaHits in the United States
Music video networks in the United States
Television channels and stations established in 2001
Television channels and stations disestablished in 2020
Defunct television networks in the United States
VH1 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.