source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/ChorusOS
ChorusOS is a microkernel real-time operating system designed as a message passing computing model. ChorusOS began as the Chorus distributed real-time operating system research project at the French Institute for Research in Computer Science and Automation (INRIA) in 1979. During the 1980s, Chorus was one of two earliest microkernels (the other being Mach) and was developed commercially by startup company Chorus Systèmes SA. Over time, development effort shifted away from distribution aspects to real-time for embedded systems. In 1997, Sun Microsystems acquired Chorus Systèmes for its microkernel technology, which went toward the new JavaOS. Sun (and henceforth Oracle) no longer supports ChorusOS. The founders of Chorus Systèmes started a new company called Jaluna in August 2002. Jaluna then became VirtualLogix, which was then acquired by Red Bend in September 2010. VirtualLogix designed embedded systems using Linux and ChorusOS (which they named VirtualLogix C5). C5 was described by them as a carrier grade operating system, and was actively maintained by them. The latest source tree of ChorusOS, an evolution of version 5.0, was released as open-source software by Sun and is available at the Sun Download Center. The Jaluna project has completed these sources and published it online. Jaluna-1 is described there as a real-time Portable Operating System Interface (RT-POSIX) layer based on FreeBSD 4.1, and the CDE cross-platform software development environment. ChorusOS is supported by popular Secure Socket Layer and Transport Layer Security (SSL/TLS) libraries such as wolfSSL. See also JavaOS References Distributed operating systems French inventions Microkernel-based operating systems Microkernels Real-time operating systems Sun Microsystems software
https://en.wikipedia.org/wiki/Quiver%20%28video%20game%29
Quiver is a first-person shooter developed by ADvertainment Software and published by ESD games in 1997. It was written for MS-DOS compatible operating systems and runs in up to 800×600 resolution. Quiver was primarily designed and created by Mike Taylor with music composed by David B. Schultz (also composed for Nitemare 3D). The game is similar to Doom, But with aliens. Gameplay The game is divided into three episodes consisting of about 8 normal levels and one boss level each. The story is simple: aliens have stolen some orbs that allow them to transport to the past, and your mission is to infiltrate their bases and recover the orbs. The levels are a mix of industrial and medieval design, each level has three orbs in total, after you get the orbs the blue exit panel on the floor will become active. After all three episodes are complete the game will tell you of an upcoming sequel. Upon exiting the full version of the game, a cheat menu will show in the dos screen. External links A review posted on usenet 1997 video games DOS games DOS-only games First-person shooters Video games with 2.5D graphics Video games developed in the United States Sprite-based first-person shooters
https://en.wikipedia.org/wiki/Robert%20Drost
Robert Drost is an American computer scientist. He was born in 1970 in New York City. Life Drost joined Sun Microsystems in 1993 after obtaining a B.S. and M.S. in Electrical Engineering from Stanford University. In 2001 he earned a Ph.D. in Electrical Engineering and a Ph.D. minor in Computer Science from Stanford. As of 2011 he is a holder of over 95 patents in microelectronics. Until 2010, Drost was Distinguished Engineer and Senior Director of Advanced Hardware at Sun Microsystems, helping to pioneer wireless connections between computer chips called proximity communication. Since 2010, Drost has had various roles, including CEO, COO, and CFO, at Pluribus Networks, Inc., a Palo Alto-based startup that he co-founded with Sunay Tripathi and Chih-Kong Ken Yang. Distinctions Awarded Best Paper at Supercomputing 2008, the International Conference for High Performance Computing, Networking, Storage, and Analysis. Named to the MIT Technology Review TR100 as one of the top 100 innovators in the world under the age of 35. Wall Street Journal Gold Medal for Innovation in Computing Systems. Judge for the Wall Street Journal's Technology Innovation Awards since 2005. References External links New York Times Article on Proximity Communication VLSI Research group publications, Oracle (previously Sun Microsystems) Labs American computer scientists Living people 21st-century American businesspeople Stanford University alumni 1970 births
https://en.wikipedia.org/wiki/Shortest%20seek%20first
Shortest seek first (or shortest seek time first) is a secondary storage scheduling algorithm to determine the motion of the disk read-and-write head in servicing read and write requests. Description This is an alternative to the first-come first-served (FCFS) algorithm. The drive maintains an incoming buffer of requests, and tied with each request is a cylinder number of the request. Lower cylinder numbers indicate that the cylinder is closer to the spindle, while higher numbers indicate the cylinder is farther away. The shortest seek first algorithm determines which request is closest to the current position of the head, and then services that request next. Analysis The shortest seek first algorithm has the benefit of simplicity, in that overall arm movement is reduced, resulting in a lower average response time. However, since the buffer is always getting new requests, these can skew the service time of requests that may be farthest away from the disk head's current location, if the new requests are all close to the current location; in fact, starvation may result, with the faraway requests never being able to make progress. The elevator algorithm is one alternative for reducing arm movement and response time, and ensuring consistent servicing of requests. References Disk scheduling algorithms
https://en.wikipedia.org/wiki/Elevator%20algorithm
The elevator algorithm, or SCAN, is a disk-scheduling algorithm to determine the motion of the disk's arm and head in servicing read and write requests. This algorithm is named after the behavior of a building elevator, where the elevator continues to travel in its current direction (up or down) until empty, stopping only to let individuals off or to pick up new individuals heading in the same direction. From an implementation perspective, the drive maintains a buffer of pending read/write requests, along with the associated cylinder number of the request, in which lower cylinder numbers generally indicate that the cylinder is closer to the spindle, and higher numbers indicate the cylinder is farther away. Description When a new request arrives while the drive is idle, the initial arm/head movement will be in the direction of the cylinder where the data is stored, either in or out. As additional requests arrive, requests are serviced only in the current direction of arm movement until the arm reaches the edge of the disk. When this happens, the direction of the arm reverses, and the requests that were remaining in the opposite direction are serviced, and so on. Variations One variation of this method ensures all requests are serviced in only one direction, that is, once the head has arrived at the outer edge of the disk, it returns to the beginning and services the new requests in this one direction only (or vice versa). This is known as the "Circular Elevator Algorithm" or C-SCAN. Although the time of the return seek is wasted, this results in more equal performance for all head positions, as the expected distance from the head is always half the maximum distance, unlike in the standard elevator algorithm where cylinders in the middle will be serviced as much as twice as often as the innermost or outermost cylinders. Other variations include: FSCAN LOOK C-LOOK N-Step-SCAN Example The following is an example of how to calculate average disk seek times for both the SCAN and C-SCAN algorithms. Example list of pending disk requests (listed by track number): 100, 50, 10, 20, 75. The starting track number for the examples will be 35. The list will need to be sorted in ascending order: 10, 20, 50, 75, 100. Both SCAN and C-SCAN behave in the same manner until they reach the last track queued. For the sake of this example let us assume that the SCAN algorithm is currently going from a lower track number to a higher track number (like the C-SCAN is doing). For both methods, one takes the difference in magnitude (i.e. absolute value) between the next track request and the current track. Seek 1: 50 − 35 = 15 Seek 2: 75 − 50 = 25 Seek 3: 100 − 75 = 25 At this point both have reached the highest (end) track request. SCAN will just reverse direction and service the next closest disk request (in this example, 20) and C-SCAN will always go back to track 0 and start going to higher track requests. Seek 4 (SCAN): 20 − 100 = 80 Se
https://en.wikipedia.org/wiki/Freeform
Freeform or free-form may refer to: Electron-beam freeform fabrication, an additive manufacturing process that builds near-net-shape parts Free-form radio, a radio station programming format in which the disc jockey is given total control over what music to play Freeform (Apple), a digital whiteboarding application developed by Apple Freeform (TV channel), an American basic cable channel owned and operated by ABC Family Worldwide Freeform crochet and knitting, a seemingly random combination of crochet, knitting and in some cases other fibre arts Freeform Five, an English electronic group Freeform role-playing game, a type of role-playing game which employ informal or simplified rule sets Freeform surface modelling, a technique for engineering freeform surfaces with a CAD or CAID system KFFP-LP (also Freeform Portland), a low-power listener supported community radio station in Portland, Oregon See also Free form (disambiguation)
https://en.wikipedia.org/wiki/Zeller%27s%20congruence
Zeller's congruence is an algorithm devised by Christian Zeller in the 19th century to calculate the day of the week for any Julian or Gregorian calendar date. It can be considered to be based on the conversion between Julian day and the calendar date. Formula For the Gregorian calendar, Zeller's congruence is for the Julian calendar it is where h is the day of the week (0 = Saturday, 1 = Sunday, 2 = Monday, ..., 6 = Friday) q is the day of the month m is the month (3 = March, 4 = April, 5 = May, ..., 14 = February) K the year of the century (). J is the zero-based century (actually ) For example, the zero-based centuries for 1995 and 2000 are 19 and 20 respectively (not to be confused with the common ordinal century enumeration which indicates 20th for both cases). is the floor function or integer part mod is the modulo operation or remainder after division In this algorithm January and February are counted as months 13 and 14 of the previous year. E.g. if it is 2 February 2010, the algorithm counts the date as the second day of the fourteenth month of 2009 (02/14/2009 in DD/MM/YYYY format) For an ISO week date Day-of-Week d (1 = Monday to 7 = Sunday), use Analysis These formulas are based on the observation that the day of the week progresses in a predictable manner based upon each subpart of that date. Each term within the formula is used to calculate the offset needed to obtain the correct day of the week. For the Gregorian calendar, the various parts of this formula can therefore be understood as follows: represents the progression of the day of the week based on the day of the month, since each successive day results in an additional offset of 1 in the day of the week. represents the progression of the day of the week based on the year. Assuming that each year is 365 days long, the same date on each succeeding year will be offset by a value of . Since there are 366 days in each leap year, this needs to be accounted for by adding another day to the day of the week offset value. This is accomplished by adding to the offset. This term is calculated as an integer result. Any remainder is discarded. Using similar logic, the progression of the day of the week for each century may be calculated by observing that there are 36,524 days in a normal century and 36,525 days in each century divisible by 400. Since and , the term accounts for this. The term adjusts for the variation in the days of the month. Starting from January, the days in a month are {31, 28/29, 31, 30, 31, 30, 31, 31, 30, 31, 30, 31}. February's 28 or 29 days is a problem, so the formula rolls January and February around to the end so February's short count will not cause a problem. The formula is interested in days of the week, so the numbers in the sequence can be taken modulo 7. Then the number of days in a month modulo 7 (still starting with January) would be {3, 0/1, 3, 2, 3, 2, 3, 3, 2, 3, 2, 3}. Starting in March, the sequence basically
https://en.wikipedia.org/wiki/World%20War%20III%20%28miniseries%29
World War III is a miniseries that aired on the NBC television network on January 31, 1982. Plot The miniseries begins in 1987. At the critical point of the Cold War, two US Air Force airmen monitor their radar screens at a quiet and remote NORAD facility in Alaska. Suddenly, one of the radar operators notices an unidentified aircraft sneaking in on the leading edge of a weather front. He alerts his partner about the threat and begins to contact Elmendorf AFB. The other Airman retrieves a silenced MAC-10 from his desk and kills him. He then proceeds to shoot the remaining station personnel while they are sleeping in their bunks. Lighting a cigarette, the traitor notifies Elmendorf that the station will be out of commission for the next hour to repair a malfunctioning generator. It is learned later that the traitor was a deep cover KGB operative who had been in the Air Force for 15 years. The necessary blind spot has been created in the radar for the plane to continue undetected into Alaska. Out of the plane, the Soviets launch a secret incursion into Alaska. The Soviets have inserted a cold weather Spetsnaz assault force of approximately 35 to 40 KGB desant ski troops led by Soviet Colonel Alexander Vorashin (Jeroen Krabbé) into northern Alaska with a track-driven armored vehicle. Vorashin's orders are to seize control of a strategically-located pumping station along the Trans-Alaska Pipeline to threaten the placement of floating explosive devices in the stream of oil and to destroy substantial portions of the pipeline. The operation is being conducted in response to the US grain embargo of the Soviet Union, just as the 1980 grain embargo was in response to the 1979 Soviet Invasion of Afghanistan. The governments of Canada, Australia, and Argentina have joined the US in the embargo, which has caused severe food shortages and domestic unrest inside the Soviet Union. A squad of 18 lightly-armed soldiers of the Alaska Army National Guard and Alaskan Scouts, which is on a training exercise, is discovered, ambushed, and killed by the Soviet invaders. At Fort Wainwright, Colonel Jake Caffey (David Soul), a combat veteran of the Vietnam War, is sent by his commanding officer to locate the soldiers, who are 24 hours late in reporting back from the training exercise. Caffey flies to the National Guard temporary patrol base to meet with the other half of the Guard company. Caffey goes out on a search mission and discovers one of the Alaskan Scouts still alive and learns of the Soviet incursion. Caffey then shadows the Soviet troops after notifying the Fort Wainwright commander, General Roberts. The general flies to the scene only to be seen by the Soviets. Caffey takes command of the Guardsmen when his senior officer General Roberts, who did not believe the news of the invading Soviet troops, is killed in Caffey's first firefight with the Soviets. Caffey notifies the Pentagon by radio of the situation. Upon learning of the situation, US President Thom
https://en.wikipedia.org/wiki/Scale-invariant%20feature%20transform
The scale-invariant feature transform (SIFT) is a computer vision algorithm to detect, describe, and match local features in images, invented by David Lowe in 1999. Applications include object recognition, robotic mapping and navigation, image stitching, 3D modeling, gesture recognition, video tracking, individual identification of wildlife and match moving. SIFT keypoints of objects are first extracted from a set of reference images and stored in a database. An object is recognized in a new image by individually comparing each feature from the new image to this database and finding candidate matching features based on Euclidean distance of their feature vectors. From the full set of matches, subsets of keypoints that agree on the object and its location, scale, and orientation in the new image are identified to filter out good matches. The determination of consistent clusters is performed rapidly by using an efficient hash table implementation of the generalised Hough transform. Each cluster of 3 or more features that agree on an object and its pose is then subject to further detailed model verification and subsequently outliers are discarded. Finally the probability that a particular set of features indicates the presence of an object is computed, given the accuracy of fit and number of probable false matches. Object matches that pass all these tests can be identified as correct with high confidence. Although the SIFT algorithm was previously protected by a patent, its patent expired in 2020. Overview For any object in an image, interesting points on the object can be extracted to provide a "feature description" of the object. This description, extracted from a training image, can then be used to identify the object when attempting to locate the object in a test image containing many other objects. To perform reliable recognition, it is important that the features extracted from the training image be detectable even under changes in image scale, noise and illumination. Such points usually lie on high-contrast regions of the image, such as object edges. Another important characteristic of these features is that the relative positions between them in the original scene shouldn't change from one image to another. For example, if only the four corners of a door were used as features, they would work regardless of the door's position; but if points in the frame were also used, the recognition would fail if the door is opened or closed. Similarly, features located in articulated or flexible objects would typically not work if any change in their internal geometry happens between two images in the set being processed. However, in practice SIFT detects and uses a much larger number of features from the images, which reduces the contribution of the errors caused by these local variations in the average error of all feature matching errors. SIFT can robustly identify objects even among clutter and under partial occlusion, because the SIFT feature
https://en.wikipedia.org/wiki/Sift%20%28disambiguation%29
Sift refers to the straining action of a sifter or sieve. Sift or SIFT may also refer to: Scale-invariant feature transform, an algorithm in computer vision to detect and describe local features in images Selected-ion flow tube, a technique used for mass spectrometry Shanghai Institute of Foreign Trade, a public university in Shanghai, China Summary of Information on Film and Television, a database of the British Film Institute National Library Summer Institute for Future Teachers, a residential summer program at Eastern Connecticut State University SIFT (software), a digital forensics appliance See also Sieve (disambiguation), for the word "sift" Sifted (formerly VeriShip), an American logistics company
https://en.wikipedia.org/wiki/Meridian%20%28Chinese%20medicine%29
The meridian system (, also called channel network) is a traditional Chinese medicine (TCM) concept that alleges meridians are paths through which the life-energy known as "qi" (ch'i) flows. Meridians are not real anatomical structures: scientists have found no evidence that supports their existence. One historian of medicine in China says that the term is "completely unsuitable and misguided, but nonetheless it has become a standard translation." Major proponents of their existence have not come to any consensus as to how they might work or be tested in a scientific context. History The concept of meridians are first attested in two works recovered from the Mawangdui and Zhangjiashan tombs of the Han-era Changsha Kingdom, the Cauterization Canon of the Eleven Foot and Arm Channels Zúbì Shíyī Mài Jiǔjīng) and the Cauterization Canon of the Eleven Yin and Yang Channels Yīnyáng Shíyī Mài Jiǔjīng). In the texts, the meridians are referenced as mài () rather than jīngmài. Main concepts The meridian network is typically divided into two categories, the jingmai () or meridian channels and the luomai () or associated vessels (sometimes called "collaterals"). The jingmai contain the 12 tendinomuscular meridians, the 12 divergent meridians, the 12 principal meridians, the eight extraordinary vessels as well as the Huato channel, a set of bilateral points on the lower back whose discovery is attributed to the ancient physician Hua Tuo. The collaterals contain 15 major arteries that connect the 12 principal meridians in various ways, in addition to the interaction with their associated internal Zung Fu (臟腑) organs and other related internal structures. The collateral system also incorporates a branching expanse of capillary-like vessels which spread throughout the body, namely in the 12 cutaneous regions as well as emanating from each point on the principal meridians. If one counts the number of unique points on each meridian, the total comes to 361, which matches the number of days in a year, in the moon calendar system. Note that this method ignores the fact that the bulk of acupoints are bilateral, making the actual total 670. There are about 400 acupuncture points (not counting bilateral points twice) most of which are situated along the major 20 pathways (i.e. 12 primary and eight extraordinary channels). However, by the second Century AD, 649 acupuncture points were recognized in China (reckoned by counting bilateral points twice). There are "12 Principal Meridians" where each meridian corresponds to either a hollow or solid organ; interacting with it and extending along a particular extremity (i.e. arm or leg). There are also "Eight Extraordinary Channels", two of which have their own sets of points, and the remaining ones connecting points on other channels. 12 standard meridians The 12 standard meridians, also called Principal Meridians, are divided into Yin and Yang groups. The Yin meridians of the arm are the Lung, Heart, and Pericardiu
https://en.wikipedia.org/wiki/Variational%20Bayesian%20methods
Variational Bayesian methods are a family of techniques for approximating intractable integrals arising in Bayesian inference and machine learning. They are typically used in complex statistical models consisting of observed variables (usually termed "data") as well as unknown parameters and latent variables, with various sorts of relationships among the three types of random variables, as might be described by a graphical model. As typical in Bayesian inference, the parameters and latent variables are grouped together as "unobserved variables". Variational Bayesian methods are primarily used for two purposes: To provide an analytical approximation to the posterior probability of the unobserved variables, in order to do statistical inference over these variables. To derive a lower bound for the marginal likelihood (sometimes called the evidence) of the observed data (i.e. the marginal probability of the data given the model, with marginalization performed over unobserved variables). This is typically used for performing model selection, the general idea being that a higher marginal likelihood for a given model indicates a better fit of the data by that model and hence a greater probability that the model in question was the one that generated the data. (See also the Bayes factor article.) In the former purpose (that of approximating a posterior probability), variational Bayes is an alternative to Monte Carlo sampling methods—particularly, Markov chain Monte Carlo methods such as Gibbs sampling—for taking a fully Bayesian approach to statistical inference over complex distributions that are difficult to evaluate directly or sample. In particular, whereas Monte Carlo techniques provide a numerical approximation to the exact posterior using a set of samples, variational Bayes provides a locally-optimal, exact analytical solution to an approximation of the posterior. Variational Bayes can be seen as an extension of the expectation-maximization (EM) algorithm from maximum a posteriori estimation (MAP estimation) of the single most probable value of each parameter to fully Bayesian estimation which computes (an approximation to) the entire posterior distribution of the parameters and latent variables. As in EM, it finds a set of optimal parameter values, and it has the same alternating structure as does EM, based on a set of interlocked (mutually dependent) equations that cannot be solved analytically. For many applications, variational Bayes produces solutions of comparable accuracy to Gibbs sampling at greater speed. However, deriving the set of equations used to update the parameters iteratively often requires a large amount of work compared with deriving the comparable Gibbs sampling equations. This is the case even for many models that are conceptually quite simple, as is demonstrated below in the case of a basic non-hierarchical model with only two parameters and no latent variables. Mathematical derivation Problem In variational inf
https://en.wikipedia.org/wiki/Dell%20XPS
Dell XPS ("eXtreme Performance System") is a line of consumer-oriented high-end laptop and desktop computers manufactured by Dell since 1993. The XPS line's main competitors include Acer's Aspire, HP's Pavilion, Envy and Spectre, Lenovo's ThinkPad X1, Samsung's Notebook, Apple's MacBook Pro and Asus's ZenBook. History The XPS name was first used in 1990. At this time, Dell primarily aimed its products at businesses rather than consumers. At the same time, Gateway (then known as Gateway 2000) led the high-end consumer market in the United States. In early 1993, Dell staff met to address how to pursue this emerging market, and it was decided to launch a new high-end product line to compete with Gateway. At this time, Dell's annual revenue was less than $500 million, and founder Michael Dell was still directly involved in most decisions. Vernon Weiss was assigned as product manager to lead the project and manage the product marketing, working with Brian Zucker, who led on architecture and engineering. In September 1993, the first two products in the XPS line were announced, initially as part of the Dell Dimension series. The first generation of the XPS system was available as either a desktop or a tower case. The earliest known XPS PC, the Dell Dimension XPS 466V, was released in 1994. The new product line was featured on the cover of the October 1993 issue of PC/Computing due to its superiority over competitors of the time. For the next three years, with Weiss and Zucker continuing to evolve the product line, XPS systems beat the competition in over 100 magazine reviews and covers, being the first to adopt the latest PC technology available and bring it to the consumers at an attractive price. As Dell grew into a large corporation from 1997 to 2001, the XPS line lost its leading position in the high-end market as it now had to compete with other manufacturers who at this time had begun to produce computers with high-performance components. In 2005, Dell revamped the XPS line to compete with Alienware (then a separate company, now owned by Dell) and Falcon Northwest. Dell had considered buying Alienware since 2002 but finally did so only on March 22, 2006. Alienware maintained its autonomy in terms of design and marketing, but access to Dell's supply chain management, purchasing power, and economies of scale lowered its operating costs. The new XPS line initially had the same specifications as those offered by the Alienware division. Also in 2005, Dell separated its home desktop systems into two lines: Dell Dimension and XPS. Consumer notebooks were also separated into two lines: Dell Inspiron and XPS. In 2008, Dell introduced the "Studio XPS" line, which it marketed as a performance computer line, while Alienware was advertised for gaming. On June 2, 2009, the M17x gaming laptop was introduced as the first Alienware/Dell joint branded system. Desktops XPS Tower 8000 series XPS Tower (8960) The 2023 Dell XPS 8960 features Intel's 13th-ge
https://en.wikipedia.org/wiki/EXist
eXist-db (or eXist for short) is an open source software project for NoSQL databases built on XML technology. It is classified as both a NoSQL document-oriented database system and a native XML database (and it provides support for XML, JSON, HTML and Binary documents). Unlike most relational database management systems (RDBMS) and NoSQL databases, eXist-db provides XQuery and XSLT as its query and application programming languages. eXist-db is released under version 2.1 of the GNU LGPL. Features eXist-db allows software developers to persist XML/JSON/Binary documents without writing extensive middleware. eXist-db follows and extends many W3C XML standards such as XQuery. eXist-db also supports REST interfaces for interfacing with AJAX-type web forms. Applications such as XForms may save their data by using just a few lines of code. The WebDAV interface to eXist-db allows users to "drag and drop" XML files directly into the eXist-db database. eXist-db automatically indexes documents using a keyword indexing system. History eXist-db was created in 2000 by Wolfgang Meier. eXist-db was awarded the best XML database of the year by InfoWorld in 2006. The companies eXist Solutions GmbH in Germany, and Evolved Binary in the UK, promote and provide support for the software. There is an O'Reilly book for eXist-db which is co-authored by Adam Retter and Erik Siegel. Supported standards and technologies eXist-db has support for the following standards and technologies: XPath - XML Path language XQuery - XML Query language XSLT - Extensible Stylesheet Language Transformations XSL-FO - XSL Formatting Objects WebDAV - Web distributed authoring and versioning REST - Representational state transfer (URL encoding) RESTXQ - RESTful annotations for XQuery XInclude - server-side include file processing (limited support) XML-RPC - a remote procedure call protocol XProc - a XML Pipeline processing language XQuery API for Java See also BaseX - another Open Source Native XML Database CouchDB - a document-oriented database based on JSON References External links Free database management systems XML databases Software using the LGPL license Database-related software for Linux Free software programmed in Java (programming language)
https://en.wikipedia.org/wiki/Stratus%20VOS
Stratus VOS (Virtual Operating System) is a proprietary operating system running on Stratus Technologies fault-tolerant computer systems. VOS is available on Stratus's ftServer and Continuum platforms. VOS customers use it to support high-volume transaction processing applications which require continuous availability. VOS is notable for being one of the few operating systems which run on fully lockstepped hardware. During the 1980s, an IBM version of Stratus VOS existed and was called the System/88 Operating System. History VOS was designed from its inception as a high-security transaction-processing environment tailored to fault-tolerant hardware. It incorporates much of the design experience that came out of the MIT/Bell-Laboratories/General-Electric (later Honeywell) Multics project. In 1984, Stratus added a UNIX System V implementation called Unix System Facilities (USF) to VOS, integrating Unix and VOS at the kernel level. In recent years, Stratus has added POSIX-compliance, and many open source packages can run on VOS. Like competing proprietary operating systems, VOS has seen its market share shrink steadily in the 1990s and early 2000s. Development Programming for VOS VOS provides compilers for PL/I, COBOL, Pascal, FORTRAN, C (with the VOS C and GCC compilers), and C++ (also GCC). Each of these programming languages can make VOS system calls (e.g. s$seq_read to read a record from a file), and has extensions to support varying-length strings in PL/I style. Developers typically code in their favourite VOS text editor, or offline, before compiling on the system; there are no VOS IDE applications. In its history, Stratus has offered hardware platforms based on the Motorola 68000 microprocessor family ("FT" and "XA" series), the Intel i860 microprocessor family ("XA/R" series), the HP PA-RISC processor family ("Continuum" series), and the Intel Xeon x86 processor family ("V Series"). All versions of VOS offer compilers targeted at the native instruction set, and some versions of VOS offer cross-compilers. Stratus added support for the POSIX API in VOS Release 14.3 (on Continuum), and added support for the GNU C/C++ compiler, GNU gdb debugger, and many POSIX commands in VOS Release 14.4. Each additional release of VOS has added more POSIX.1 capabilities, to the point where many user-mode open-source packages can now be successfully built. For this reason, beginning with Release 17.0, Stratus renamed VOS to OpenVOS. Stratus offers supported ports of Samba, OpenSSL, OpenSSH, GNU Privacy Guard, OpenLDAP, Berkeley DB, MySQL Community Server, Apache, IBM WebSphere MQ, and the community edition of Java. Numeric values in VOS are always big endian, regardless of the endianness of the underlying hardware platform. On little endian servers with x86 processors, the compilers do a byte swap before reading or writing values to memory to transform the data to or from the native little endian format. Command Macro Language VOS has a fairly
https://en.wikipedia.org/wiki/Shannon%27s%20source%20coding%20theorem
In information theory, Shannon's source coding theorem (or noiseless coding theorem) establishes the statistical limits to possible data compression for data whose source is an independent identically-distributed random variable, and the operational meaning of the Shannon entropy. Named after Claude Shannon, the source coding theorem shows that, in the limit, as the length of a stream of independent and identically-distributed random variable (i.i.d.) data tends to infinity, it is impossible to compress such data such that the code rate (average number of bits per symbol) is less than the Shannon entropy of the source, without it being virtually certain that information will be lost. However it is possible to get the code rate arbitrarily close to the Shannon entropy, with negligible probability of loss. The source coding theorem for symbol codes places an upper and a lower bound on the minimal possible expected length of codewords as a function of the entropy of the input word (which is viewed as a random variable) and of the size of the target alphabet. Note that, for data that exhibits more dependencies (whose source is not an i.i.d. random variable), the Kolmogorov complexity, which quantifies the minimal description length of an object, is more suitable to describe the limits of data compression. Shannon entropy takes into account only frequency regularities while Kolmogorov complexity takes into account all algorithmic regularities, so in general the latter is smaller. On the other hand, if an object is generated by a random process in such a way that it has only frequency regularities, entropy is close to complexity with high probability (Shen et al. 2017). Statements Source coding is a mapping from (a sequence of) symbols from an information source to a sequence of alphabet symbols (usually bits) such that the source symbols can be exactly recovered from the binary bits (lossless source coding) or recovered within some distortion (lossy source coding). This is one approach to data compression. Source coding theorem In information theory, the source coding theorem (Shannon 1948) informally states that (MacKay 2003, pg. 81, Cover 2006, Chapter 5): i.i.d. random variables each with entropy can be compressed into more than bits with negligible risk of information loss, as ; but conversely, if they are compressed into fewer than bits it is virtually certain that information will be lost.The coded sequence represents the compressed message in a biunivocal way, under the assumption that the decoder knows the source. From a practical point of view, this hypothesis is not always true. Consequently, when the entropy encoding is applied the transmitted message is . Usually, the information that characterizes the source is inserted at the beginning of the transmitted message. Source coding theorem for symbol codes Let denote two finite alphabets and let and denote the set of all finite words from those alphabets (respectively). Su
https://en.wikipedia.org/wiki/List%20of%20Linux%20audio%20software
The following is an incomplete list of Linux audio software. Audio players GStreamer-based Amarok is a free music player for Linux and other Unix-like operating systems. Multiple backends are supported (xine, helix and NMM). Banshee is a free audio player for Linux which uses the GStreamer multimedia platforms to play, encode, and decode Ogg Vorbis, MP3, and other formats. Banshee supports playing and importing audio CDs and playing and synchronizing music with iPods. Audioscrobbler API support. Clementine is a cross-platform, open-source, Qt based audio player, written in C++. It can play Internet radio streams; managing some media devices, playlists; supports visualizations, Audioscrobbler API. It was made as a spin-off of Amarok 1.4 and is a rougher version of said program. Exaile is a free software audio player for Unix-like operating systems that aims to be functionally similar to KDE’s Amarok. Unlike Amarok, Exaile is a Python program and uses the GTK toolkit. Guayadeque Music Player is a free and open-source audio player written in C++ using the wxWidgets toolkit. Muine is an audio player for the GNOME desktop environment. Muine is written in C# using Mono and Gtk#. The default backend is GStreamer framework but Muine can also use xine libraries. Quod Libet is a GTK based audio player, written in Python, using GStreamer or Xine as back ends. Its distinguishing features are a rigorous approach to tagging (making it especially popular with classical music fans) and a flexible approach to music library management. It supports regular expression and Boolean algebra-based searches, and is stated to perform efficiently with music libraries of tens of thousands of tracks. Rhythmbox is an audio player inspired by Apple iTunes. Songbird is a cross-platform, open-source media player and web browser. It is built using code from the Firefox web browser. The graphical user interface (GUI) is very similar to Apple iTunes, and it can sync with Apple iPods. Like Firefox, Songbird is extensible via downloadable add-ons. It's able to display lyrics retrieved from the net, and also the ones embedded through metadata (ID3v2 tag) after adding the LyricMaster plug-in. Linux official support for Songbird was discontinued in April, 2010. But in December, 2011 a group of programmers forked it openly as Nightingale. Music Player Daemon based Cantata is a Qt-based front-end for Music Player Daemon. Ario is a light GTK2 client to MPD Other aTunes is a free, cross-platform audio player for operating systems supporting the programming language Java (Unix-like: Linux, BSD, Macintosh), and Windows. aTunes can also play Internet radio streams and automatically display associated artist information, song videos, and song lyrics. Audacious is a free media player for Linux or Linux-based systems. It can be expanded via plug-ins, including support for all popular codecs. On most systems a useful set of plug-ins is installed by default, supporting MP3, Ogg
https://en.wikipedia.org/wiki/WNT
WNT or Wnt may refer to: Windows NT WNT (Women's National Team) Wnt signaling pathway, a complex protein network The Weymouth New Testament (1902), translation by Richard Francis Weymouth ABC World News Tonight, ABC News' flagship evening news program Woordenboek der Nederlandsche Taal, a Dutch dictionary, the most extensive in the world Washington Naval Treaty, a 1922 naval arms limitation treaty Wandsworth Town railway station, London; National Rail station code Scientific-Technical Publishers, Wydawnictwa Naukowo-Techniczne in Poland
https://en.wikipedia.org/wiki/RMX%20%28operating%20system%29
Real-time Multitasking eXecutive (iRMX) is a real-time operating system designed for use with the Intel 8080 and 8086 family of processors. Overview Intel developed iRMX in the 1970s and originally released RMX/80 in 1976 and RMX/86 in 1980 to support and create demand for their processors and Multibus system platforms. The functional specification for RMX/86 was authored by Bruce Schafer and Miles Lewitt and was completed in the summer of 1978 soon after Intel relocated the entire Multibus business from Santa Clara, California to Aloha, Oregon. Schafer and Lewitt went on to each manage one of the two teams that developed the RMX/86 product for release on schedule in 1980. Effective 2000 iRMX is supported, maintained, and licensed worldwide by TenAsys Corporation, under an exclusive licensing arrangement with Intel. iRMX is a layered design: containing a kernel, nucleus, basic i/o system, extended i/o system and human interface. An installation need include only the components required: intertask synchronization, communication subsystems, a filesystem, extended memory management, command shell, etc. The native filesystem is specific to iRMX, but has many similarities to the original Unix (V6) filesystem, such as 14 character path name components, file nodes, sector lists, application readable directories, etc. iRMX supports multiple processes (known as jobs in RMX parlance) and multiple threads are supported within each process (task). In addition, interrupt handlers and threads exist to run in response to hardware interrupts. Thus, iRMX is a multi-processing, multi-threaded, pre-emptive, real-time operating system (RTOS). Commands The following list of commands are supported by iRMX 86. ATTACHDEVICE ATTACHFILE BACKUP COPY CREATEDIR DATE DEBUG DELETE DETACHDEVICE DETACHFILE DIR DISKVERIFY DOWNCOPY FORMAT INITSTATUS JOBDELETE LOCDATA LOCK LOGICALNAMES MEMORY PATH PERMIT RENAME RESTORE SUBMIT SUPER TIME UPCOPY VERSION WHOAMI Historical uses iRMX III on Intel Multibus hardware is used in the majority core systems on CLSCS the London Underground Central line signals control system was supplied by Westinghouse (now Invensys) and commissioned in the late 1990s. The Central line is an automatic train operation line. Automatic train protection is by trackside and train borne equipment that does not use iRMX. It is the automatic train supervision elements that use a mix of iRMX on Multibus, and Solaris on SPARC computers. 16 iRMX local site computers are distributed along the Central line together with 6 central iRMX computers at the control centre. All 22 iRMX computers are dual redundant. iRMX CLSCS continues in full operation. Oslo Metro uses a similar, although less complex, Westinghouse-supplied iRMX control system through the central Common Tunnel tracks. This was expected to be decommissioned in 2011. Variants Several variations of iRMX have been developed since its original introduction on the Intel 8080: i
https://en.wikipedia.org/wiki/Code%20monkey
Code monkey may refer to: Code Monkeys, an animated television series "Code Monkey" (song), by Jonathan Coulton CodeMonkey (software), an educational computer environment See also Cowboy coder
https://en.wikipedia.org/wiki/DVK
DVK (, Interactive Computing Complex) is a Soviet PDP-11-compatible personal computer. Overview The design is also known as Elektronika MS-0501 and Elektronika MS-0502. Early models of the DVK series are based on K1801VM1 or K1801VM2 microprocessors with a 16 bit address bus. Later models use the KM1801VM3 microprocessor with a 22 bit extended address bus. Models DVK-1 DVK-1M DVK-2 DVK-2M DVK-3 DVK-3M2 Kvant 4C (aka DVK-4) DVK-4M See also Elektronika BK-0010 SM EVM UKNC External links Articles about the USSR Computers history Images of the DVK computers Archive software and documentation for Soviet computers UK-NC, DVK and BK0010. Microcomputers Ministry of the Electronics Industry (Soviet Union) computers PDP-11
https://en.wikipedia.org/wiki/Intermediate%20representation
An intermediate representation (IR) is the data structure or code used internally by a compiler or virtual machine to represent source code. An IR is designed to be conducive to further processing, such as optimization and translation. A "good" IR must be accurate – capable of representing the source code without loss of information – and independent of any particular source or target language. An IR may take one of several forms: an in-memory data structure, or a special tuple- or stack-based code readable by the program. In the latter case it is also called an intermediate language. A canonical example is found in most modern compilers. For example, the CPython interpreter transforms the linear human-readable text representing a program into an intermediate graph structure that allows flow analysis and re-arrangement before execution. Use of an intermediate representation such as this allows compiler systems like the GNU Compiler Collection and LLVM to be used by many different source languages to generate code for many different target architectures. Intermediate language An intermediate language is the language of an abstract machine designed to aid in the analysis of computer programs. The term comes from their use in compilers, where the source code of a program is translated into a form more suitable for code-improving transformations before being used to generate object or machine code for a target machine. The design of an intermediate language typically differs from that of a practical machine language in three fundamental ways: Each instruction represents exactly one fundamental operation; e.g. "shift-add" addressing modes common in microprocessors are not present. Control flow information may not be included in the instruction set. The number of processor registers available may be large, even limitless. A popular format for intermediate languages is three-address code. The term is also used to refer to languages used as intermediates by some high-level programming languages which do not output object or machine code themselves, but output the intermediate language only. This intermediate language is submitted to a compiler for such language, which then outputs finished object or machine code. This is usually done to ease the process of optimization or to increase portability by using an intermediate language that has compilers for many processors and operating systems, such as C. Languages used for this fall in complexity between high-level languages and low-level languages, such as assembly languages. Languages Though not explicitly designed as an intermediate language, C's nature as an abstraction of assembly and its ubiquity as the de facto system language in Unix-like and other operating systems has made it a popular intermediate language: Eiffel, Sather, Esterel, some dialects of Lisp (Lush, Gambit), Squeak's Smalltalk-subset Slang, Nim, Cython, Seed7, SystemTap, Vala, V, and others make use of C as an intermediate la
https://en.wikipedia.org/wiki/MRV%20Communications
MRV Communications is a communications equipment and services company based in Chatsworth, California. Through its business units, the company is a provider of optical communications network infrastructure equipment and services to a broad range of telecom concerns, including multi-national telecommunications operators, local municipalities, MSOs, corporate and consumer high-speed G-Internet service providers, and data storage and cloud computing providers. MRV Communications was acquired by ADVA Optical Networking on August 14, 2017. History MRV was founded in 1988 by Prof. Shlomo Margalit and Dr. Zeev Rav-Noy as a maker of Metro and Access optoelectronic components. MRV’s Metro and Access transceivers enable network equipment to be deployed across large campuses or in municipal and regional networks. To expand its leadership, MRV established LuminentOIC, an independent subsidiary. LuminentOIC makes fiber-to-the-premises (FTTP) components, an activity that was initiated by Rob Goldman, who founded the FTTx business unit in Luminant in 2001. In the 1990s, MRV produced Ethernet switching and Optical Transport for Metro and campus environments. MRV began building switches and routers used by carriers implementing Metro Ethernet networks that provide Ethernet services to enterprise customers and multi-dwelling residential buildings. Significant Milestones – Acquisitions, Product Development: 1992 – Created NBASE Communications through Galcom and Ace acquisitions. Acquisitions created a networking company with a focus on technology for the Token Ring LAN, IBM Connectivity, and Multi-Platform Network Management for the IBM NetView and HP OpenView platforms. Following the acquisitions, the Company consolidated these operations in Israel with its networking operations in the U.S. 1996 – Acquired Fibronics from Elbit Ltd. Enhanced the development of Fast Ethernet and Gigabit Ethernet functions through the acquisitions of the Fibronics GigaHub family of products – Served as the foundation for the OptiSwitch series and other modular optical products. Added valuable product development capability, expanded the range of networking products, and added new marketing and distribution channels and sales in the United States, Israel, and Europe. 1997 – Acquired Interdata, a French-based system integrator specializing in optical networks, architecture, and network security for operators, enterprises, and large jurisdictions. 1997-1999 – Very significant OEM activity for Gigabit. 1998 – Acquired Xyplex - Acquisition enhanced the development of remote management and IP routing functionality for WAN services and added distribution channels in the United States and Europe. 1998 – 1st WDM deployment in Metro network in Europe – German city carrier network based on Ethernet switching and WDM technologies 1998 – Invested in Tecnonet SpA, an Italian-based system integrator. 1999 – Awarded as the prime vendor to deploy the world’s 1st Metro Ethernet national ne
https://en.wikipedia.org/wiki/Eight-to-fourteen%20modulation
Eight-to-fourteen modulation (EFM) is a data encoding technique – formally, a line code – used by compact discs (CD), laserdiscs (LD) and pre-Hi-MD MiniDiscs. EFMPlus is a related code, used in DVDs and Super Audio CDs (SACDs). EFM and EFMPlus were both invented by Kees A. Schouhamer Immink. According to European Patent Office former President Benoît Battistelli, "Immink's invention of EFM made a decisive contribution to the digital revolution." Technological classification EFM belongs to the class of DC-free run-length limited (RLL) codes; these have the following two properties: the spectrum (power density function) of the encoded sequence vanishes at the low-frequency end, and both the minimum and maximum number of consecutive bits of the same kind are within specified bounds. In optical recording systems, servo mechanisms accurately follow the track in three dimensions: radial, focus, and rotational speed. Everyday handling damage, such as dust, fingerprints, and tiny scratches, not only affects retrieved data, but also disrupts the servo functions. In some cases, the servos may skip tracks or get stuck. Specific sequences of pits and lands are particularly susceptible to disc defects, and disc playability can be improved if such sequences are barred from recording. The use of EFM produces a disc that is highly resilient to handling and solves the engineering challenge in a very efficient manner. How it works Under EFM rules, the data to be stored is first broken into eight-bit blocks (bytes). Each eight-bit block is translated into a corresponding fourteen-bit codeword using a lookup table. The 14-bit words are chosen such that binary ones are always separated by a minimum of two and a maximum of ten binary zeroes. This is because bits are encoded with NRZI encoding, or modulo-2 integration, so that a binary one is stored on the disc as a change from a land to a pit or a pit to a land, while a binary zero is indicated by no change. A sequence 0011 would be changed into 1101 or its inverse 0010 depending on the previous pit written. If there are two consecutive zeroes between two ones, then the written sequence will have three consecutive zeros (or ones), for example, 010010 will translate into 100011 (or 011100). The EFM sequence 000100010010000100 will translate into 111000011100000111 (or its inverse). Because EFM ensures there are at least two zeroes between every two ones, it is guaranteed that every pit and land is at least three bit-clock cycles long. This property is very useful since it reduces the demands on the optical pickup used in the playback mechanism. The ten consecutive-zero maximum ensures worst-case clock recovery in the player. EFM requires three merging bits between adjacent fourteen-bit codewords. Although they are not needed for decoding, they ensure that consecutive codewords can be concatenated without violating the specified minimum and maximum runlength constraint. They are also selected to maintain DC
https://en.wikipedia.org/wiki/Greenspun%27s%20tenth%20rule
Greenspun's tenth rule of programming is an aphorism in computer programming and especially programming language circles that states: Overview The rule expresses the opinion that the argued flexibility and extensibility designed into the programming language Lisp includes all functionality that is theoretically needed to write any complex computer program, and that the features required to develop and manage such complexity in other programming languages are equivalent to some subset of the methods used in Lisp. Other programming languages, while claiming to be simpler, require programmers to reinvent in a haphazard way a significant amount of needed functionality that is present in Lisp as a standard, time-proven base. It can also be interpreted as a satiric critique of systems that include complex, highly configurable sub-systems. Rather than including a custom interpreter for some domain-specific language, Greenspun's rule suggests using a widely accepted, fully featured language like Lisp. Paul Graham also highlights the satiric nature of the concept, albeit based on real issues: The rule was written sometime around 1993 by Philip Greenspun. Although it is known as his tenth rule, this is a misnomer. There are in fact no preceding rules, only the tenth. The reason for this according to Greenspun: Hacker Robert Morris later declared a corollary, which clarifies the set of "sufficiently complicated" programs to which the rule applies: This corollary jokingly refers to the fact that many Common Lisp implementations (especially those available in the early 1990s) depend upon a low-level core of compiled C, which sidesteps the issue of bootstrapping but may itself be somewhat variable in quality, at least compared to a cleanly self-hosting Common Lisp. See also Inner-platform effect Software Peter principle Turing tarpit Zawinski's law of software envelopment References Computer architecture statements Lisp (programming language) 1993 neologisms Programming language folklore Computer programming folklore Software engineering folklore C (programming language) software Fortran software
https://en.wikipedia.org/wiki/BBC%20Radio%20Cymru
BBC Radio Cymru is a Welsh language radio network owned and operated by BBC Cymru Wales, a division of the BBC. It broadcasts on two stations across Wales on FM, DAB, digital TV and online. The main network broadcasts for hours a day from 5:30am to midnight with overnight programming simulcast from the BBC World Service after closedown. A second station, Radio Cymru 2, providing separate music and sports programming, broadcasts on digital and online platforms. Radio Cymru's managing editor is Dafydd Meredydd, a former presenter and producer for both stations. Overview BBC Radio Cymru began broadcasting on the morning of Monday 3 January 1977 – its first programme was an extended news bulletin presented at 6:45am by Gwyn Llewellyn and Geraint Jones. This was followed at 7am by the first edition of the breakfast magazine show , presented by Hywel Gwynfryn with contributions from a network of local reporters in studios across Wales. The first record played on Radio Cymru was Plas-y-Bryniau by Hergest. The station was the first broadcasting outlet dedicated wholly to programmes in Welsh, allowing much more airtime for such output than had previously been available on the old Radio 4 Wales (or its predecessors the Welsh Home Service and, before that, the BBC Welsh Regional Programme). Initially, the service was part-time and restricted to breakfast shows, extended news bulletins at breakfast, lunchtime & early evening and a number of off-peak opt-outs from a sustaining Radio 4 Wales feed. In November 1979, Radio Cymru's programming was expanded to 65 hours a week, introducing mid-morning output on weekdays, along with a growing line-up of dramas, light entertainment and documentaries. The network continued to expand over the next two decades before achieving a continuous service of up to 20 hours a day. Later developments in the 21st century saw Radio Cymru introducing a nightly youth strand, C2, and regional opt-outs for South West Wales, which were axed in 2008 but later reintroduced to provide live commentary of Swansea City A.F.C. matches. The station has also been streaming online since January 2005. Radio Cymru is similar in format to many "general" radio stations, with news programmes at breakfast (, 'First Post'), lunchtime ( – a debate-centred programme), and drive-time (, 'Afternoon Post'); together with presenter-driven sequences mixing music with guests, calls from listeners and competitions. Radio Cymru also produces drama, features, current affairs and sports programming. Over the years, it has done much to promote the language, with its sports commentators coining new terms which later became accepted by Welsh linguists. One of its more unusualand longest-runningprogrammes is , a poetry competition in which teams must come up with poetry in specific styles on specific topics. Listening figures According to RAJAR, the station has a weekly audience of 110,000 listeners and a listening share of 2.6%, as of June 2023. The avera
https://en.wikipedia.org/wiki/BBC%20Radio%20Scotland
BBC Radio Scotland is a Scottish national radio network owned and operated by BBC Scotland, a division of the BBC. It broadcasts a wide variety of programmes. It replaced the Scottish BBC Radio 4 opt-out service of the same name from 23 November 1978. Radio Scotland is broadcast in English, whilst sister station Radio nan Gàidheal broadcasts in Scottish Gaelic. According to RAJAR, the station broadcasts to a weekly audience of 827,000 and has a listening share of 6.8% as of September 2023. History The first BBC Radio Scotland broadcast was on 17 December 1973, two weeks earlier than planned. BBC Radio Scotland was founded as a full-time radio network on 23 November 1978. Previously it was possible only to opt out of BBC Radio 4, and the service was known as Radio 4 Scotland or, formally on air, as "BBC Scotland Radio 4". The establishment of a separate network was made possible when Radio 4 became a fully UK-wide network when it moved from medium wave to long wave and new VHF (FM) transmitters were brought into service so that Radio 4 and Radio Scotland no longer had to share on FM. However it was not until the early 1990s that Radio 4 was available on FM across all of Scotland so for its first decade on air, the station only broadcast during the day so that Radio 4 could be heard on Radio Scotland's transmitters in the evening to compensate for poorer AM reception after dark. Kirsty Wark launched her career on BBC Radio Scotland, first as a researcher and then as a producer. Programmes Radio Scotland broadcasts a wide range of programming, including news, debate, music, drama, comedy and sports. It is broadcast from the BBC Scotland headquarters in the Pacific Quay in Glasgow. Overnight, the station simulcasts BBC Radio 5 Live during its downtime. Local opt-outs BBC Radio Orkney and BBC Radio Shetland opt out of BBC Radio Scotland for 30 minutes each weekday to broadcast a local news programme and during the winter months this is supplemented for both areas by an additional hour-long programme. Local news and weather bulletins are also broadcast as opt-outs from news studios in Selkirk, Dumfries, Aberdeen and Inverness on weekdays. Notable presenters Kaye Adams (news) John Beattie (sport) Bryan Burnett (music) Stuart Cosgrove (sport) Tam Cowan (sport) Archie Fisher (music) Vic Galloway (music) Jim Gellatly (music) Richard Gordon (sport) Gary Innes (music) Mary Ann Kennedy (lifestyle, features and documentaries) Fred MacAulay (lifestyle, features and documentaries) Cathy MacDonald (music) Bruce MacGregor (music) Sally Magnusson (lifestyle, features and documentaries) Tom Morton (music) Shereen Nanjiani (news) Natasha Raskin Sharp (music) Ricky Ross (music) Graham Stewart (news) Grant Stott (music) Gary West (music) Past presenters Dougie Anderson Colin Bell Ken Bruce Jackie Brambles Andy Cameron Armando Iannucci Jimmie Macgregor Anne MacKenzie Jimmy Mack Eddie Mair Sheena McDonald Brian Morton Charles Nove Iain Purdon Robbie Shephe
https://en.wikipedia.org/wiki/BBC%20Radio%20Wales
BBC Radio Wales is an English language Welsh national radio network owned and operated by BBC Cymru Wales, a division of the BBC. It began broadcasting on 13 November 1978, replacing the Welsh opt-out service of BBC Radio 4. As of August 2022, the station's managing editor is Carolyn Hitt, who is also editor of BBC Wales Sport. Radio Wales is broadcast in English, whilst sister network Radio Cymru broadcasts in Welsh. According to RAJAR, BBC Radio Wales has a weekly audience of 321,000 listeners and a listening share of 5.3%, as of September 2023. History In November 1978, BBC Radio Wales was launched as a distinct station on the former Radio 4 opt-out frequency of 882 kHz. Initially the station broadcast for only twenty hours per week, and relayed output from Radio 2 and Radio 4 at other times. However, the groundwork had been laid for the station to gradually become a full-time service and now Radio Wales broadcasts for up to twenty hours a day. BBC Radio Wales was preceded in the autumn of 1978 by four experimental local radio stations broadcasting for a single week: Radio Wrexham, Radio Deeside, Radio Merthyr and Radio Rhondda. They were broadcast using an RTÉ Outside Broadcast transmitter. The first editor of BBC Radio Wales was Teleri Bevan, a former producer for Radio 4 Wales. Radio Wales commenced broadcasting at 6.30am on Monday 13 November 1978 with the first edition of AM, a breakfast magazine show presented by Anita Morgan, which replaced the news-driven predecessor Good Morning Wales. Chris Stuart later took over AM, presenting the programme for almost a decade, before it was replaced by a revival of Good Morning Wales, which was again axed in May 2019. The other main presenters for the first decade on air included Mike Flynn, who hosted a show each weekday until 1989, Vincent Kane, Noreen Bray and Alun Williams. By 1985, Roy Noble was also a regular daily voice, presenting weekday magazine shows for the station for 27 years. Old Radio 4 type continuity studios were modified to become "self-operated" by the early 1980s. Outside broadcasts from different towns in Wales were also introduced, with Mike Flynn and Alun Williams hosting a weekly three-hour live show on Friday mornings. BBC Radio Wales also began to use publicity similar to the type used by commercial radio stations in the UK. Other early presenters included Wyn Calvin, Maureen Staffer, Sylvia Horn, G. V. Wynne Jones (Geevers), Claire Vincent, Piet Brinton, Jackie Emlyn and Princess Anne's biographer Brian Hoey. Radio Gwent and Radio Clwyd opt-outs Following BBC Wales' experiments with community radio in 1978, two permanent opt-out services were developed in the north-east and the south-east. Radio Deeside was relaunched in February 1980 in response to the closure of the Shotton steelworks. Its coverage area was expanded to the rest of Clwyd in October 1981 and the station was subsequently renamed BBC Radio Clwyd, broadcasting extended local news bulletins, a mid
https://en.wikipedia.org/wiki/Operation%20Fastlink
Operation Fastlink is a coordination of four separate, simultaneous undercover investigations by the Federal Bureau of Investigation (FBI) Cyber Division, the Department of Justice, the Computer Crimes and Intellectual Property Section (CCIPS) of the Criminal Division and Interpol. The four different investigations have not been publicly enumerated, but the U.S. Department of Justice has said in at least one press release that "Operation Higher Education" is the largest component, with participation from twelve nations. Mention has also been made of an investigation into pre-release music groups led by FBI agents from the Washington Field Office. As of March 6, 2009, the FBI states that Operation Fastlink has yielded 60 convictions. The raids occurred in similar fashion to those from Operation Buccaneer and Operation Site Down. Other somewhat-related law enforcement actions include Operation Gridlock and Operation D-Elite. The operation led to the successful busts of nearly 100 individuals involved in illegal copying of copyrighted software, and alterations thereof, worldwide. There were around 120 total searches executed in 27 American states and in 10 foreign countries. Foreign searches were conducted in Belgium, Denmark, France, Germany, Hungary, Israel, the Netherlands, Singapore, Sweden, as well as the United Kingdom. Among the prolific warez release groups targeted by Fastlink were Fairlight, Kalisto, Echelon, Class, and DEViANCE—all of which specialized in spreading unlicensed copies of computer and console video games. Recent convictions have included members of music release groups Apocalypse Production Crew and Chromance. Cases Jathan Desir (known as "jd333"), a University of Iowa student of Iowa City, Iowa, pleaded guilty on December 22, 2004 to charges related to his role and was sentenced to one year's probation, $5,000 fine, and $300 CVF assessment, which was completed in 2010. The case was 4:04-cr-00336 from the U.S. District Court for the Southern District of Iowa. Abell (known as "joebob") pleaded guilty to conspiracy to commit copyright infringement on February 28, 2005. He was sentenced to 15 months in prison, 400 hours of community service and two years' probation. The case is 5:04-cr-00681 from the U.S. District Court for the Western District of Texas. Lai (known as "doplgnger") pleaded guilty to one count of conspiracy to commit criminal copyright infringement on January 6, 2006 related to his administering several warez FTP sites. He was sentenced on June 18, 2007 to three years of probation, the first six months of which he must serve confined to his home. He was also ordered to pay a fine in the amount of $7,200 and to perform 120 hours of community service. The case is 3:06-cr-00004 from the U.S. District Court for the District of Connecticut. Kleinberg (known as "basilisk") pleaded guilty on March 8, 2005 and faces a maximum sentence of 10 years in prison. Sentencing was originally scheduled for July 1, 2005, bu
https://en.wikipedia.org/wiki/List%20of%20highways%20in%20the%20Northern%20Territory
The Northern Territory is the most sparsely populated state or territory in Australia. Despite its sparse population, it has a network of sealed roads which connect Darwin and Alice Springs, the major population centres, the neighboring states, and some other centres such as Uluru (Ayers Rock), Kakadu and Litchfield National Parks. Some of the sealed roads are single lane bitumen. Many unsealed (dirt) roads connect the remoter settlements. Major roads are classified into three categories: National Highway, Arterial Roads, and Secondary Roads. National Highways There are three National Highways in the Northern Territory: Arterial Roads The following roads are classified as Arterial Roads: Secondary Roads The following roads are classified as Secondary Roads: Barkly Stock Route Buchanan Highway Calvert Road Cox Peninsula Road Daly River Road Darwin River Road Dorat Road Ernest Giles Road Gun Point Road Jim Jim Road Larapinta Drive Litchfield Road Luritja Road Mt Denison Road Nathan River Road Ranken Road Roper Highway Ross Highway Sandover Highway Savannah Way Tjukaruru Road See also Highways in Australia for highways in other states and territories List of highways in Australia for roads named as highways, but not necessarily classified as highways List of road routes in the Northern Territory References Northern Territory Highways Highways
https://en.wikipedia.org/wiki/Nicole-Reine%20Lepaute
Nicole-Reine Lepaute (; , 5 January 1723 – 6 December 1788), also erroneously known as Hortense Lepaute, was a French astronomer and human computer. Lepaute along with Alexis Clairaut and Jérôme Lalande calculated the date of the return of Halley's Comet. Her other astronomical feats include calculating the 1764 solar eclipse and producing almanacs from 1759 to 1783. She was also a member of the Scientific . The asteroid 7720 Lepaute is named in her honour, as is the lunar crater Lepaute. Early life Nicole-Reine Lepaute was born on 5 January 1723 in the Luxembourg Palace in Paris as the daughter of Jean Étable, valet in the service of Louise Élisabeth d'Orléans. Her father had worked for the royal family for a long time, both in the service of the duchess de Berry and her sister Louise. Louise Elizabeth of Orleans is a widow of Louis of Spain. When her husband died, she returned to Paris and was given part of Luxembourg to live in and to house her staff members.^ She was the sixth of nine children. As a child she was described as precocious and intelligent, being mostly self-taught. She stayed up all night "devouring" books and read every book in the library, with Jérôme Lalande saying of her that even as a child "she had too much spirit not to be curious". Lepaute’s interest in astronomy had begun at a young age when she most likely witnessed a comet in the sky. She became eager to learn about it and started her curiosity journey when she started studying about comets. This led to one of the biggest discoveries of her time.^ In August 1748, she married Jean-André Lepaute, a royal clockmaker in the Luxembourg Palace. Career Mathematics of clockmaking Her marriage gave her the freedom to exercise her scientific skill. At the same time as she kept the household's accounts, she studied astronomy, mathematics, and "she observed, she calculated, and she described the inventions of her husband". She met Jérôme Lalande, with whom she would work for thirty years, in 1753 when he was called as a representative of the Académie des Sciences to inspect her husband's work on a pendulum of a new type. The three of them worked together on a book titled Traité d'horlogerie (Treatise of Clockmaking) that was published in 1755 under her husband's name. Although she did not receive authorship, Lalande sang her praises later, saying, "Madame Lepaute computed for this book a table of numbers of oscillations for pendulums of different lengths, or the lengths for each given number of vibrations, from that of 18 lignes, that does 18000 vibrations per hour, up to that of 3000 leagues". Lalande was a leader at heart and helped lead Nicole-Reine Lepaute and her husband through the hard work calculating and creating different astronomical designs for predicting Halley's comet and creating new inventions of the clock. For instance, her husband had made a horizontal clock for the palace of Luxembourg and was granted permission to live there for the remainder of their
https://en.wikipedia.org/wiki/Defense%20Courier%20Service
The Defense Courier Service (DCS) is established under the United States Transportation Command (USTRANSCOM), and is a global courier network for the expeditious, cost-effective, and secure distribution of highly classified and sensitive material. Operational control of global courier activities is exercised through USTRANSCOM's Defense Courier Division (TCJ3-C). The division oversees and synchronizes activity of 18 courier stations worldwide to service over six thousand accounts. Major accounts include the White House, the Department of Defense, the State Department, other federal agencies, authorized government contractors, and allied nations. The DCS directly supports the President, Unified and Specified COCOMs, joint military operations, the Joint Chiefs of Staff, National Security Agency, Central Intelligence Agency, U.S. allies, State Department, and other federal agencies. The DCS was formerly the Armed Forces Courier Service (ARFCOS) but was reorganized and renamed in 1985 after the Walker spy case. History Before the establishment of the courier service, American ship captains and selected American travellers were used to carry sealed packages of mail. Later these individuals, called "Bearers of Dispatches," were augmented by a small group of Foreign Service Officers. With few modifications, this method of moving classified mail abroad continued until 1918 when the War Department established the Military Postal Express Service, consisting of 70 officers and enlisted soldiers, divided into an Overseas Service and a European Service. This continued until the early days of World War II when the War Department activated the Army Courier Service to move classified material between the War Department and various theatres of operation. Meanwhile, the Navy created the Officer Messenger Service and the Army Air Corps operated an Air Courier Service to move cryptographic materials. Frequently, couriers from all three services flew together on the routes. In November 1946, the War Department discontinued the Army Courier Service and established a "Security Courier Service," which operated until 1949. At this time, certain courier stations were transferred to the newly created U.S. Air Force Security Courier Service. Then in 1952, the Joint Chiefs of Staff directed a review of courier operations which resulted in the establishment of an organization consisting of Army, Navy, and Air Force courier elements. The Armed Forces Courier Service (ARFCOS) was officially established on January 7, 1953. The military courier services were now consolidated. The ARFCOS charter was updated seven times over the next 30 years to reflect changes in the armed forces, military doctrine, and operational procedures. In the aftermath of the Walker-Whitworth espionage case (1985), the Secretary of Defense established a Security Commission—often referred to as the Stillwell Commission—to review DoD security policies and practices. As part of its findings, the comm
https://en.wikipedia.org/wiki/Geri%27s%20Game
Geri's Game is a 1997 American computer-animated short film produced by Pixar and written and directed by Jan Pinkava. The short, which shows an elderly man named Geri who competes with himself in a game of chess, was Pixar's first film to feature a human being as its main character; Geri later made a cameo appearance in Toy Story 2 as "The Cleaner", here voiced by Jonathan Harris instead of Bob Peterson. Geri's Game was released eight years after Knick Knack, the last short by Pixar to that point, made as part of an effort to reignite the studio's short film series, which had been put on standby in order to focus on the creation of television commercials as well as the studio's first feature film, which would become the first-ever full-length computer-animated film, Toy Story. A dedicated research and development team worked alongside the filmmakers to devise ways to get around the burdens of animating a human character, leading to an in-house computer simulation to mimic the natural movement of clothing on a character. Subdivision surface modeling, a technique partly pioneered by Edwin Catmull in 1978 but mostly ignored in favor of NURBS surfaces, was used to bestow natural movement and realistic skin textures on the human character himself. Geri's Game premiered on November 24, 1997, winning an Academy Award for Best Animated Short Film the following year. It was later shown with the theatrical release of Pixar's second feature film, A Bug's Life, the following year, and therefore became part of a Pixar tradition of pairing shorts with feature films. Plot In an empty urban park, the title character, Geri, blows the leaves off a table and sets up a chessboard. He proceeds to play a chess game against himself, playing the parts of both participants by moving to opposite sides of the board and either removing or replacing his glasses. The "player" without the glasses, and playing as black, is aggressive and confident, while the "player" with the glasses who plays white is timid and makes several mistakes. The camera work eventually makes it look like two people are actually playing the game, even showing “black” Geri’s hand and “white” Geri’s body in the same frame. The confident player soon captures all the timid player's pieces except the King - the timid player fakes a heart attack and falls to the ground, startling the other, who quickly starts to take his own pulse. The timid player surreptitiously turns the board around, so the confident player has only the King left, and he has nearly all his pieces. He then gets up and reveals to the confident player he is all right and takes his turn. The confident player, confused and upset, knocks down his king and concedes defeat and gives the timid player the prize: his false teeth. The camera zooms out to remind the audience only one person was playing the game the entire time. Development Geri's Game was Pixar's first original short film since 1989, when Knick Knack was released. It was directe
https://en.wikipedia.org/wiki/Bryant%20Tuckerman
Louis Bryant Tuckerman, III (November 28, 1915 – May 19, 2002) was an American mathematician, born in Lincoln, Nebraska. He was a member of the team that developed the Data Encryption Standard (DES). He studied topology at Princeton, where he invented the Tuckerman traverse method for revealing all the faces of a flexagon. On March 4, 1971, he discovered the 24th Mersenne prime, a titanic prime, with a value of . References External links Tuckerman Obituary 20th-century American mathematicians 21st-century American mathematicians 1915 births 2002 deaths IBM employees People from Briarcliff Manor, New York Mathematicians from New York (state)
https://en.wikipedia.org/wiki/GEOS%20%2816-bit%20operating%20system%29
GEOS (later renamed GeoWorks Ensemble, NewDeal Office, and Breadbox Ensemble) is a computer operating environment, graphical user interface (GUI), and suite of application software. Originally released as PC/GEOS, it runs on DOS-based, IBM PC compatible computers. Versions for some handheld platforms were also released and licensed to some companies. PC/GEOS was first created by Berkeley Softworks, which later became GeoWorks Corporation. Version 4.0 was developed in 2001 by Breadbox Computer Company, limited liability company (LLC), and was renamed Breadbox Ensemble. In 2015, Frank Fischer, the CEO of Breadbox, died and efforts on the operating system stopped until later in 2017 when it was bought by blueway.Softworks. PC/GEOS should not be confused with the 8-bit GEOS product from the same company, which runs on the Commodore 64 and Apple II. PC/GEOS GeoWorks Ensemble In 1990, GeoWorks (formerly Berkeley Softworks) released PC/GEOS for IBM PC compatible systems. Commonly referred to as GeoWorks Ensemble, it was incompatible with the earlier 8-bit versions of GEOS for Commodore and Apple II computers, but provided numerous enhancements, including scalable fonts and multitasking on IBM PC XT- and AT-class PC clones. GeoWorks saw a market opportunity to provide a graphical user interface for the 16 million older model PCs that were unable to run Microsoft Windows 2.x. GEOS was packaged with a suite of productivity applications. Each had a name prefixed by "Geo": GeoWrite, GeoDraw; GeoManager; GeoPlanner; GeoDex, and GeoComm. It was also bundled with many PCs at the time, but like other GUI environments for the PC platform, such as Graphics Environment Manager (GEM), it ultimately proved less successful in the marketplace than Windows. Former CEO of GeoWorks claims that GEOS faded away "because Microsoft threatened to withdraw supply of MS-DOS to hardware manufacturers who bundled Geoworks with their machines". In December 1992, NEC and Sony bundled an original equipment manufacturer (OEM) version of GeoWorks named the CD Manager with their respective CD-ROM players that sold as retail box add-on peripherals for consumers. The NEC Bundle retailed for around $500.00 with a 1x external CD-ROM, Small Computer System Interface (SCSI) interface controller, Labtec CD-150 amplified stereo speakers and 10 software titles. A scaled-down version of GeoWorks was used by America Online for their DOS-based AOL client software from the time of introduction on IBM compatible PCs until the late 1990s when America Online dropped development for graphical DOS in favor of Microsoft Windows. During that time, the popular single 3.5" self-booting disk that AOL was distributing could be hacked to boot the GeoWorks environment. IBM released the PC/GEOS-based EduQuest SchoolView network management tool for K-12 schools in 1994. Negotiations to make PC/GEOS an integral part of PC DOS 7.0 failed. GeoWorks attempted to get third-party developers but was unable to
https://en.wikipedia.org/wiki/VisiCorp
VisiCorp was an early personal computer software publisher. Its most famous products were Microchess, Visi On and VisiCalc. It was founded in 1976 by Dan Fylstra as the software publisher Personal Software. In 1978, it merged with Peter R. Jennings's Toronto-based software publisher Micro-Ware, with the two taking a 50% ownership each in the resulting company and Personal Software becoming the name of the combined company. It continued to publish the software from its original constituents, including Jennings' Microchess program for the MOS Technology KIM-1 computer, and later Commodore PET, Apple II, TRS-80 and Atari 8-bit. In 1979 it released VisiCalc, which would be so successful that in 1982 the company was renamed VisiCorp Personal Software, Inc.. VisiCalc was the first electronic spreadsheet for personal computers, developed by Software Arts and published by VisiCorp. Visi On was the first GUI for the IBM PC. Bill Gates came to see Visi On at a trade show, and this seems what inspired him to create a windowed GUI for Microsoft. VisiCorp was larger than Microsoft at the time, and the two companies entered negotiations to merge, but could not agree on who would sit on the board of directors. Microsoft Windows when it was released included a wide range of drivers, so it could run on many different PC's, while Visi On cost more, and had stricter system requirements. Lotus released Lotus 1-2-3 in 1983. Microsoft eventually released its own spreadsheet Microsoft Excel. Early alumni of this company included Ed Esber who would later run Ashton-Tate, Bill Coleman who would found BEA Systems, Mitch Kapor founder of Lotus Software and the Electronic Frontier Foundation, Rich Melmon who would co-found Electronic Arts, Bruce Wallace author of Asteroids in Space, and Brad Templeton who would found early dot-com company ClariNet and was the director of the Electronic Frontier Foundation from 2000 to 2010. VisiCorp agreed in 1979 to pay 36-50% of VisiCalc revenue to Software Arts, compared to typical software royalties of 8-12%. It composed 70% of VisiCorp revenue in 1982 and 58% in 1983. By 1984 InfoWorld stated that although VisiCorp's $43 million in 1983 sales made it the world's fifth-largest microcomputer-software company, it was "a company under siege" with "rapidly declining" VisiCalc sales and mediocre Visi On sales. The magazine wrote that "VisiCorp's auspicious climb and subsequent backslide will no doubt become a How Not To primer for software companies of the future, much like Osborne Computer's story has become the How Not To for the hardware industry." VisiCorp was sold to Paladin Software after a legal feud between Software Arts and VisiCorp. References Defunct computer companies based in Massachusetts Software companies disestablished in 1984 Software companies established in 1976 Defunct software companies of the United States
https://en.wikipedia.org/wiki/Diomidis%20Spinellis
Diomidis D. Spinellis (; 2 February 1967, Athens) is a Greek computer science academic and author of the books Code Reading, Code Quality, Beautiful Architecture (co-author) and Effective Debugging. Education Spinellis holds a Master of Engineering degree in Software Engineering and a Ph.D. in Computer Science both from Imperial College London. His PhD was supervised by Susan Eisenbach and Sophia Drossopoulou. Career and research He is a professor at the Department of Management Science and Technology at the Athens University of Economics and Business, and a member of the IEEE Software editorial board, contributing the Tools of the Trade column. Since 2014, he is also editor-in-chief of IEEE Software. Spinellis is a four-time winner of the International Obfuscated C Code Contest in 1988, 1990, 1991 and 1995. He is also a committer in the FreeBSD project, and author of a number of popular free or open-source systems: the UMLGraph declarative UML diagram generator, the bib2xhtml BibTeX to XHTML converter, the outwit Microsoft Windows data with command line programs integration tool suite, the CScout source code analyzer and refactoring browser, the socketpipe fast inter-process communication plumbing utility and directed graph shell the directed graph Unix shell for big data and stream processing pipelines. In 2008, together with a collaborator, Spinellis claimed that "red links" (a Wikipedia slang for wikilinks that lead to non-existing pages) is what drives Wikipedia growth. On 5 November 2009 he was appointed the General Secretary of Information Systems at the Greek Ministry of Finance. In October 2011, he resigned citing personal reasons. On 20 March 2015 he was elected President of Open Technologies Alliance (GFOSS). GFOSS is a non-profit organization founded in 2008, 36 Universities and Research Centers are shareholders of GFOSS. The main goal of GFOSS is to promote Openness through the use and the development of Open Standards and Open Technologies in Education, Public Administration and Business in Greece. Spinellis uses open-source software to teach software engineering to his students. References 1967 births Alumni of the Department of Computing, Imperial College London Greek computer programmers Computer systems researchers Greek computer scientists Living people Software engineers Greek technology writers Academic staff of the Athens University of Economics and Business Scientists from Athens
https://en.wikipedia.org/wiki/MNN
MNN may refer to: Madrid Nuevo Norte, an urban redevelopment programme Manhattan Neighborhood Network Medical News Network Mission Network News Menston railway station in the United Kingdom Minnesota Northern Railroad Mother Nature Network, a website Multifocal motor neuropathy, medical condition Maritime News Network, a radio news network owned by MBS Peace is Our Nation, a political coalition of Montenegro
https://en.wikipedia.org/wiki/MEC
MEC may refer to: Medicine Mucoepidermoid carcinoma Businesses MEC (media agency), a media agency network based in London and New York Mediterranean Exploration Company, a restaurant in Portland, Oregon Mongolia Energy Corporation, a mining company Morgan Electro Ceramics, a ceramics manufacturing company Mountain Equipment Co-op, a defunct Canadian outdoors gear & clothing retail co-operative MEC Canada, its successor Myanmar Economic Corporation, a Burmese military-owned corporation Education Manufacturing Engineering Centre, Cardiff University, United Kingdom Master of Economics (M.Ec.), a postgraduate degree Midland Empire Conference, a high school activity conference in Missouri, USA Model Engineering College, Cochin, Kerala, India Politics Member of the Executive Council, a member of the South African provincial government Ministry of Education (Brazil), the Brazilian education ministry Ministry of Education and Culture (Uruguay) Religion Methodist Episcopal Church, the progenitor of present-day Methodist denominations in the Americas Metropolitan Evangelistic Church, a Methodist denomination in the holiness movement Transport Eloy Alfaro International Airport (IATA airport code), Manta, Ecuador Maine Central Railroad (reporting mark), a former railroad in Maine, U.S. Meols Cop railway station (National Rail code), Merseyside, England Technology Media Expansion Card, a type of PCIe computer expansion card Microbial electrolysis cell, a type of bioelectrochemical system Multi-access edge computing, a network architecture concept Other Marginal efficiency of capital, an economics theory Measured environmental concentration of a substance in an environmental sample MEC (basketball), Maison d'Enfants Club, a professional basketball club in Casablanca, Morocco Mec, Poland Mountain East Conference, a U.S. college athletic conference Munitions and explosives of concern, unexploded ordnance Motor Enthusiasts Club, motor club in the Republic of Ireland
https://en.wikipedia.org/wiki/ADP%20%28company%29
Automatic Data Processing, Inc. (ADP) is an American provider of human resources management software and services, headquartered in Roseland, New Jersey. History In 1949, Henry Taub founded Automatic Payrolls, Inc. as a manual payroll processing business with his brother Joe Taub. Frank Lautenberg joined the brothers in the company's infancy. In 1957, Lautenberg, after successfully serving in sales and marketing, became a full-fledged partner with the two brothers. In 1961, the company changed its name to Automatic Data Processing, Inc. (ADP), and began using punched card machines, check printing machines, and mainframe computers. ADP went public in 1961 with 300 clients, 125 employees, and revenues of approximately $400,000 USD. The company established a subsidiary in the United Kingdom in 1965. In 1970, Lautenberg was noted as being the president of the company. Also in 1970, the company's stock transitioned from trading on American Stock Exchange to trading on the New York Stock Exchange. It acquired the pioneering online computer services company Time Sharing Limited (TSL) in 1974 and Cyphernetics in 1975. Lautenberg continued in his roles as Chairman and CEO until elected to the United States Senate from New Jersey in 1982. From 1985 onward, ADP’s annual revenues exceeded the $1 billion mark, with paychecks processed for about 20% of the U.S. workforce. In the 1990s, ADP began acting as a professional employer organization (PEO). Around this time, the company acquired Autonom, a German company, and the payroll and human resource services company, GSI, headquartered in Paris. In September 1998, ADP acquired UK-based Chessington Computer Centre that supplied administration services to the UK Government. Kerridge Computer Co. Ltd., a dealer management systems (DMS) provider to auto dealers, primarily in the UK, was acquired in 2006. In 2007, the ADP Brokerage Service Group was spun off to form Broadridge Financial Solutions, Inc. In January 2017, ADP acquired The Marcus Buckingham Company (TMBC). In October 2017, ADP acquired Global Cash Card, a digital payments facilitator. In January 2018, ADP acquired WorkMarket, a New York City-based software platform company that helps businesses manage freelancers, contractors, and consultants. Later that same year, the company announced the acquisition of Celergo, a global payroll management service company. In 2020, ADP was ranked 227 on the Fortune 500 list of the largest United States corporations by revenue. ADP has also been included on Fortune Magazine's "World's Most Admired Companies" List for 14 consecutive years and has earned recognition from DiversityInc as one of the top companies for diversity and inclusion in the United States for 11 consecutive years. In 2023, ADP announced a further acquisition, for the company called Honu HR, Inc. DBA Sora (referred to as Sora). ADP currently has about 63,000 employees worldwide and its fiscal year 2023 revenues were $18 billion. Divisions an
https://en.wikipedia.org/wiki/ACBL
ACBL may refer to: Actor-Based Concurrent Language, a family of programming languages Adarsh Co-operative Bank, in India American Contract Bridge League, a bridge membership organization in North America Atlantic Collegiate Baseball League, located in the US Mid-Atlantic region See also ABCL (disambiguation)
https://en.wikipedia.org/wiki/Greatest%20Hits%20Radio%20Manchester%20%26%20The%20North%20West
Greatest Hits Radio Manchester & The North West is an Independent Local Radio station based in Manchester, England, owned and operated by Bauer as part of the Greatest Hits Radio Network. It broadcasts to Greater Manchester and North West England. History Early years The station began broadcasting at 5am on Tuesday 2 April 1974 as Piccadilly Radio on 261 m (1151 kHz then) AM/MW and on 97.0 MHz FM (from the same transmitter in Saddleworth that is now used by Hits Radio Manchester). The mediumwave frequency moved to 1152 kHz on 23 November 1978 with the implementation of the Geneva 1975 plan. The station was named after Piccadilly Gardens in Manchester, and Piccadilly Plaza was home to the station's first studios until 1996, when it relocated to the Castlefield area of Manchester. Piccadilly's founding managing director was Philip Birch, who previously ran the highly influential pirate station Radio London until it closed down ahead of the Marine, &c., Broadcasting (Offences) Act 1967 in August 1967. The first presenter on air was Roger Day – himself an ex-pirate radio presenter – and the first song played on air was "Good Vibrations" by The Beach Boys. Many of Britain's best-known broadcasters started their careers at Piccadilly, including Chris Evans, Mike Sweeney, Steve Penk, James H. Reeve, Andy Peebles, Gary Davies, Tim Grundy, Timmy Mallett, Pete Mitchell, Geoff Lloyd, Mark Radcliffe, James Stannage, Stu Allan, Nick Robinson and Karl Pilkington. Journalist Paul Lockitt joined Piccadilly in 1979 and became the station's longest serving on-air employee, working as a producer, presenter and newscaster until his departure in 2017. FM/MW split Piccadilly Radio split into two services in 1988, with Key 103 broadcast on FM with a contemporary music format, while Piccadilly continued on AM, initially under its full service format, gradually adopting a 'golden oldies' music playlist as Piccadilly Gold. In the mid-1990s, Piccadilly Gold became Piccadilly 1152 as the playlist moved away from "golden oldies" to a mix of classic and current easy-listening music. The late-night phone-in with James Stannage became the most popular radio talk show outside London, whilst the Dave Ward and Umberto breakfast show helped the station to become one of the biggest AM stations. In 1994, a rival station, Fortune 1458 (later renamed 1458 Lite AM, today broadcasting as 1458 Capital Gold) commenced on BBC GMR's former AM frequency. Despite heavy marketing, and many ex-Piccadilly presenters on the new station, Piccadilly 1152 remained Manchester's most popular station, other than sister station Key 103, until the late 1990s when smaller, localised FM stations in Oldham, Warrington and Bury began to erode away Piccadilly's audience base. Magic 1152 In 1994, Piccadilly (Key 103/Piccadilly 1152) were part of the Transworld Radio Group, which was bought by present owners Bauer Radio (then EMAP). In 1999/2000, parent company EMAP re-branded the station as Magic 1
https://en.wikipedia.org/wiki/Michael%20Kay%20%28sports%20broadcaster%29
Michael Kay (born February 2, 1961) is an American sports broadcaster who is the television play-by-play broadcaster of the New York Yankees and host of CenterStage on the YES Network, and the host of The Michael Kay Show heard on WEPN-FM in New York City and simulcast on ESPN Xtra on XM Satellite Radio. Kay also works on the MLB on ESPN. Early life and education Kay was born and raised in the New York City borough of the Bronx. His father was Jewish and his mother was of Italian descent. Always a Yankee fan, Kay wore number 1 in Little League for his favorite player, Bobby Murcer. Wanting to be the Yankees announcer when he grew up, he wrote as many of his school assignments as he could about the Yankees, so he could learn all about them. Kay began his reporting career at the Bronx High School of Science and continued reporting at Fordham University for their radio station WFUV. He earned a Bachelor of Arts in communications from Fordham. Broadcasting career Kay started his professional career with the New York Post in 1982 as a general assignment writer, with sports-specific assignments to college basketball, the National Basketball Association and the New Jersey Nets happening over time. He received the writing assignment covering the Yankees in 1987. In 1989, Kay left the Post for the Daily News, still primarily covering the Yankees. Kay also served as the Madison Square Garden Network Yankee reporter starting in 1989. In 1992–99, he was MSG's locker room reporter for the New York Knicks. He had previously worked for the network as a contributor on the news-format sports show MSG SportsDesk. Kay left the Daily News to host a sports talk show on WABC in 1992, briefly returning to write "Kay's Korner" for the Daily News in 1993, before taking a job doing radio broadcasts of New York Yankees games with John Sterling. Kay also worked as a reporter for Fox Sports Net in the late 1990s. Announcer for the New York Yankees (1992–present) Kay spent a decade partnered with Sterling as the radio announcers of the team on WABC from 1992 to 2001. Kay and Sterling also paired together in 1998 for Sports Talk with John Sterling and Michael Kay, a nightly radio show which aired on WABC. During the baseball season, the duo hosted Yankee Talk, a weekend pre-game radio show. From 1992 to 1993 Kay hosted his own show on WABC. Kay continued during that time as a spot reporter on ABC Radio, doing off-season shows with Sterling and as a fill-in sports reporter on WABC-TV. When ESPN Radio began leasing (and later purchasing) WEVD radio in 2001, Kay was chosen to host a daily radio show on the newly rechristened "1050 ESPN Radio". When WCBS acquired the radio rights to the Yankees broadcasts in 2002, Kay moved to the debuting YES Network on television and Sterling remained on the radio. Kay has been the Yankees' lead television play-by-play announcer ever since. Kay has worked with a series of partners on YES, often with three or four different partners i
https://en.wikipedia.org/wiki/Bagi%2C%20the%20Monster%20of%20Mighty%20Nature
is a Japanese anime film that premiered on the Nippon Television network on August 19, 1984. It was written by Osamu Tezuka as a critique of the Japanese government's approval of recombinant DNA research that year. The film was streamed by Anime Sols as part of a crowdfunding campaign in 2013, and by RetroCrush in 2020. Synopsis Deep in the South American jungle, a 20-year-old Japanese hunter named Ryosuke (“Ryo” for short), and a local boy named Chico, stalk a monster that has been terrorizing the local countryside. Ryosuke, however, is quite familiar with this beast, and the story flashes back to his childhood. 5 years ago, 15-year-old Ryosuke Ishigami, the delinquent son of a crime reporter and a geneticist, is out with a motorcycle gang when they encounter a mysterious woman. Some of the rougher members of the gang accost her, and she turns out to be anything but normal, landing the gang with serious injuries. The gang leader returns to the woman's hideout for revenge, but the gang members are torn apart, except for Ryosuke. The woman, named Bagi, turns out to be a "cat-woman" – a cross between a human and a mountain lion. She recognizes Ryosuke as the boy who had rescued her and raised her as a kitten when he was 6 years old. As Bagi grew and people became suspicious of the precocious "cat", who was able to walk on her hind legs and even learned to write her own name and speak, she escaped and grew to adulthood on her own for the next 9 years. Upon their reunion, Ryosuke and Bagi join forces to find out the truth of her origins. Ryosuke's own mother is found responsible for Bagi's creation — Bagi is a product of recombinant DNA research between human and mountain lion cells. They then follow Ryosuke's mother to South America to confront her about the reason for Bagi's existence, but find a far greater peril. The officials in charge of the laboratories there are creating a strain of rice that has the potential to destroy humanity. Ryosuke's mother sacrifices her life to have Bagi destroy the "Rice Ball" and Ryosuke mistakenly pins the blame on Bagi, vowing revenge. Meanwhile, Bagi is quickly losing her human traits and becomes extremely feral, attacking any humans that come near. Ryosuke catches up to her and stabs her when she attacks, but then finds a hand-written note held in a locket around her neck. He reads his mother's last words, expressing remorse for being both a bad scientist and a bad mother, and Ryosuke realizes his mistake and is filled with regret. He returns to the site the next morning to find Bagi's body gone, a set of footprints leading off to the distant mountains, meaning that Bagi has survived the stabbing and run off. He prays for Bagi to live on in solitude, far away from mankind. In the final shot, the silhouette of Bagi is seen running for parts unknown. Characters Ryo / Ryosuke Ishigami A young Japanese man. His father is a crime reporter, and his mother, Prof. Ishigami, works in a laboratory witho
https://en.wikipedia.org/wiki/TRS-80%20Model%20100
The TRS-80 Model 100 is a portable computer introduced in April 1983. It is one of the first notebook-style computers, featuring a keyboard and liquid-crystal display, in a battery-powered package roughly the size and shape of a notepad or large book. It was made by Kyocera, and originally sold in Japan as the Kyotronic 85. Although a slow seller for Kyocera, the rights to the machine were purchased by Tandy Corporation. The computer was sold through Radio Shack stores in the United States and Canada and affiliated dealers in other countries. It became one of the company's most popular models, with over 6 million units sold worldwide. The Olivetti M-10 and the NEC PC-8201 and PC-8300 were also built on the same Kyocera platform, with some design and hardware differences. It was originally marketed as a Micro Executive Work Station (MEWS), although the term did not catch on and was eventually dropped. Specifications Processor: 8-bit Oki 80C85, CMOS, Memory: 32 KB ROM; 8, 16, 24, or 32 KB static RAM. Machines with less than 32 KB can be expanded in 8 KB increments of plug-in static RAM modules. An additional 32 KB Option ROM can be installed, for a total of 64 KB of ROM (bank-switched in a 32 KB aperture), and the Standard ROM is socket-mounted (not soldered-in) so is readily replaceable. Display: 8 lines, 40 characters LCD, twisted nematic (gray) monochrome, with 240 by 64 pixel addressable graphics. The screen is reflective, not backlit. The screen was made by Sharp Electronics. The LCD controllers are by Hitachi: (10) HD44102CH column controller ICs and (2) HD44103CH row driver ICs; the HD44102CH's provide the programmable hardware interface to software. The refresh rate is about (coarsely regulated by an RC oscillator, not a crystal). Keyboard: 56 keys, QWERTY layout with full standard spacing, 8 programmable function keys, 4 dedicated command keys, and 4 cursor control keys. These last 16 are tactile "button"-style keys. Almost all keys other than the 16 "button" keys are capable of key rollover (without phantom keys appearing depressed), so multi-key combinations can be used. Peripherals: The basic unit includes: Built-in 300 baud telephone (POTS) modem (North American versions), Centronics-compatible parallel printer port, RS-232 serial communication port (sharing serial I/O chip with internal modem), barcode reader input, cassette audio tape I/O, real-time clock. Expansion: System bus interface DIP socket (under a cover on the bottom of the machine). Dimensions: , weight about with batteries Power supply: Four penlight (AA) cells, or external power adapter 6V (>180 mA, tip negative configuration) The 8K and 24K versions sold for and respectively. The Model 100 was promoted as being able to run up to 20 hours and maintain memory up to 30 days on a set of four alkaline AA batteries. It could not run from the rechargeable nickel-cadmium batteries available at the time, but a hardware modification was available that made t
https://en.wikipedia.org/wiki/Japan%20Radio%20Network
Japan Radio Network (JRN; ) is a Japanese commercial radio network run by TBS Radio in Tokyo, owned by TBS Holdings (which is a part of the major conglomerate Mitsui Group). Established on 2 May 1965, JRN is made up of 34 regional affiliates, including four full-time affiliates and 30 stations that are dual-affiliated with the rival National Radio Network (NRN). List of affiliates Stations are listed mostly in Japanese order of prefectures which is mirrored in ISO 3166-2:JP. External links JRN at TBS Radio Tokyo Broadcasting System Radio in Japan Japanese radio networks Radio stations established in 1965
https://en.wikipedia.org/wiki/National%20Radio%20Network
National Radio Network may refer to: National Radio Network (United States) in the United States National Radio Network (Japan) in Japan National Radio Network (UK) in the United Kingdom See also NRN (disambiguation)
https://en.wikipedia.org/wiki/JRN
JRN may refer to: Japan Radio Network Jhalar railway station, in Pakistan Jiran, Madhya Pradesh, India Jones Radio Networks Juruena Airport, in Brazil
https://en.wikipedia.org/wiki/NRN
NRN is a television station originating in Coffs Harbour, Australia. The station is owned by WIN Corporation as part of the WIN Network. As a Network 10 program affiliate, it relays 10 content into the northern New South Wales broadcast market. The station was formally a partnership between NRN-11 Coffs Harbour (launched 23 January 1965) and RTN-8 Lismore (launched 12 May 1962). History Origins NRN11 Coffs Harbour had merged with ECN8 Taree to form Northern Rivers Television, but later demerged in 1969. Around 1971, RTN8 Lismore and NRN11 merged, also forming Northern Rivers Television (NRTV), but was known on-air originally as 11-8 Television. The merged stations served the Mid North Coast and Northern Rivers areas of Northern New South Wales. During the mid-1970s, the station was concurrently known as Great Eastland Television, when the partnership shared programming and advertising with NEN-9 Tamworth and DDQ-10 Toowoomba/SDQ-4 Warwick, but they soon reverted to the NRTV brand. In 1983, NRTV was relayed into the Gold Coast after a lobbying campaign from residents, although they could also watch the commercial television stations from Brisbane. NRTV's Gold Coast studios and offices were constructed in Ashmore on Southport Nerang Road. The Gold Coast facilities didn't contain a newsroom, although relayed local news from the Coffs Harbour studios. News crews from Lismore travelled to the Gold Coast for stories of importance. NRTV produced a considerable amount of local activity (approximately five each week). Local content included local news, three hours of live women's variety "Round About", 5 half-hours of live children's variety "Get Set", "Birthdays", and "Razzamataz, with on-air presenter Rhonda Logan" weekly, holiday specials "Summerthon", and a half-hour daily exercise program "Jazzacize". Live sports specials included the annual Grafton Cup Racing Carnival and the Grafton to Inverell Cycling Classic. Live programs mainly originated from the Coffs Harbour Studios with programs being recorded at both the networks other studios located at Lismore and Gold Coast. Some of the memorable names from that era were: Ron Lawrence – Ron died in 2008. He was the driving force behind the network's local production. He began his career as booth announcer at the Lismore Radio and TV Studios of Northern Star Holdings (RTN 8) and (Radio 2LM) after graduating from Jim Illife's AIR-TV College in Brisbane. He moved to Coffs Harbour TV studios in the early 70s after the merge between NRN11 and RTN 8 and became the station announcer–news reader. Later in his career he became Program Manager then later Station Manager and finally General Manager before retiring in the 90s Wayne Magee, also a diploma graduate from the Brisbane College AIR-TV (formally with Radio 4GY Gympie, BCV TV Victoria and National Nine News Adelaide) started with the network in 1976. During his time with the network he hosted Get Set, network specials and telethons and read local TV
https://en.wikipedia.org/wiki/OUS
OUS may refer to: Ohio University Southern Campus Okayama University of Science Open University of Sudan Operation United Shield Oregon University System Organizational unit (computing) Ourinhos Airport Oxford Union Society See also Ous (name)
https://en.wikipedia.org/wiki/Master%20control
Master control is the technical hub of a broadcast operation common among most over-the-air television stations and television networks. It is distinct from a production control room (PCR) in television studios where the activities such as switching from camera to camera are coordinated. A transmission control room (TCR) is usually smaller in size and is a scaled down version of centralcasting. Master control is the final point before a signal is transmitted over-the-air for terrestrial television or cablecast, satellite provider for broadcast, or sent on to a cable television operator. Television master control rooms include banks of video monitors, satellite receivers, videotape machines, video servers, transmission equipment, and, more recently, computer broadcast automation equipment for recording and playback of television programming. Master control is generally staffed with one or two master control operators around-the-clock to ensure continuous operation. Master control operators are responsible for monitoring the quality and accuracy of the on-air product, ensuring the transmission meets government regulations, troubleshooting equipment malfunctions, and preparing programming for playout. Regulations include both technical ones (such as those against over-modulation and dead air), as well as content ones (such as indecency and station ID). Many television networks and radio networks or station groups have consolidated facilities and now operate multiple stations from one regional master control or centralcasting center. An example of this centralized broadcast programming system on a large scale is NBC's "hub-spoke project" that enables a single "hub" to have control of dozens of stations' automation systems and to monitor their air signals, thus reducing or eliminating some responsibilities of local employees at their owned-and-operated (O&O) stations. Outside the United States, the Canadian Broadcasting Corporation (CBC) manages four radio networks, two broadcast television networks, and several more cable/satellite radio and television services out of just two master control points (English language services at the Canadian Broadcasting Centre in Toronto and French language services at Maison Radio-Canada in Montreal). Many other public and private broadcasters in Canada have taken a similar approach. Gallery See also Network operations center Central apparatus room Broadcast engineering Broadcasting Television terminology Rooms
https://en.wikipedia.org/wiki/Freedom%20%28application%29
Freedom (often referred to as the Freedom app) is a computer program designed to keep a computer user away from the Internet for up to eight hours at a time. It is described as a way to "free you from distractions, allowing you time to write, analyze, code, or create." The program was written by Fred Stutzman, a Ph.D student at the University of North Carolina at Chapel Hill. References External links Freedom app website: https://freedom.to/ Internet Protocol based network software
https://en.wikipedia.org/wiki/Naukowa%20i%20Akademicka%20Sie%C4%87%20Komputerowa
The Naukowa i Akademicka Sieć Komputerowa () or NASK is a Polish research and development organization and data networks operator. .pl registry NASK is the ccTLD registry. While launching in 2003 a domain automatic registration system by means of EPP (Extensible Provisioning Protocol), NASK introduced the Partner Programme within the scope of registration and service of domain names. The NASK Partner Programme is a solution operating in accordance with the world recognised “Registry-Registrar” model. NASK (Registry) provides its Partners (Registrars) with the functionality of independent registering and servicing domain names in the .pl domain registry. Each entrepreneur, meeting the technical and formal requirements specified by NASK, may become a NASK's Partner. The Partner Programme gives subscribers an opportunity to choose the most attractive offer from a number of Polish and foreign providers rendering domain name related services. Currently, over 99.9 percent of all domain name registrations are effected by NASK's Partners. In 2003, NASK, as one of the first registries in the world, introduced the maintenance of domain names with diacritic signs (Internationalized Domain Names). Also in 2003, on the NASK's initiative, the Court of Conciliation for Internet Domains organized at the Polish Chamber of Information Technology and Telecommunications was established. Besides domain registration, NASK offers through its Partners such services as Waiting List Service (WLS) – the so-called “option” enabling the purchase of the 3-year period of priority for registration of a domain name in case it has been deleted, or Domain Name Tasting (DNT) – a service consisting in registration of a domain name for the period of 14 days for the purpose of testing its attractiveness. Since the end of September 2009, NASK has been cooperating with the Partners on the basis of a prepaid model, where the fee for registration is collected automatically from the Partner's account. In order to increase the .pl domain security, since 20 December 2011 NASK has begun to implement DNSSEC (Domain Name System Security Extensions) in the production environment, and since 4 June 2012 subscribers have been allowed to forward to the .pl registry the DS records of secured domain names. Since 1 July 2013, in accordance with the agreement concluded with IPPT PAN (Institute of Fundamental Technological Research Polish Academy of Sciences), NASK has been providing the maintenance of .gov.pl domain names. NASK is the official representative of Poland in organizations such as FIRST, CENTR and ICANN, which in turn authorizes NASK to indirectly influence the operation of DNS. CERT Polska The CERT Polska team operates within the structures of NASK. CERT Polska is the first Polish computer emergency response team. Active since 1996 in the response teams community, it has become a recognized and experienced entity in the field of computer security. Since its launch, the core of the
https://en.wikipedia.org/wiki/NASK
NASK may refer to: Naukowa i Akademicka Sieć Komputerowa, or Research and Academic Computer Network, a Polish research and development organization Nord-Amerika Somera Kursaro, or North American Summer Esperanto Institute, an Esperanto immersion course ik ben een domme geit
https://en.wikipedia.org/wiki/HOI
HOI or Hoi may refer to: Hearts of Iron, a 2002 computer game Home insurance or homeowners insurance Hypoiodous acid, chemical formula HOI Hoi District, Aichi, a former district of Japan Hoxnian geological stage, HOI is sub-stage I Carsten Høi (born 1957), Danish chess Grandmaster Hao Airport IATA code Hoi (video game), a 1992 video game for the Amiga Hearts on Ice, a 2023 Philippine television series See also Hoe (food), various Korean raw fish dishes Hoi polloi Oi (interjection)
https://en.wikipedia.org/wiki/University%20residence%20hall%20network
A residence hall network, or ResNet (also Resnet or ResNET, or other variations), is a local area network (LAN) or a metropolitan area network (MAN) provided by a university that serves the personal computers of students in their residence halls or dormitory buildings. ResNet may also refer to the department that administers such a network or the services provided via the network. A ResNet usually allows students to connect to a university's intranet with (possibly limited) access to the public Internet. ResNet is essentially the ISP for students residing in campus-managed housing. Administration The department, organization, or group responsible for maintenance of and support for the residential computer network is often also known as ResNet. This group may be an independent department in the central Information Technology division, the Housing department, or some other division or department. ResNet responsibilities may also lie not with a group dedicated to ResNet but may be one of many responsibilities such as those commonly held by help desks. Services The functions of such a department vary greatly between campuses. Most, at least, provide assistance in connecting to the school's network. Other services may include the removal of viruses, adware, spyware, greyware, and malware, as well as services ranging from operating system or software and hardware advice to data recovery. ResNet is slowly evolving into a full-blown computer Help Desk on many campuses, and in some cases has merged into a single support group for staff, faculty, and students. Some ResNet organizations have branched from computer only support to alternate devices such as smartphones, PDAs, and gaming devices. The ResNet organization Conceived in 1992, ResNet is an international organization providing a forum for discussion, collaboration, and development for IT professionals in higher education. Students, faculty, staff, and vendors participate in ResNet both through the ResNet Listserv and by attending the annual Student Technology Conference. The ResNet organization is dedicated to the research and advancement of student technologies and services and their use in higher education. The organization oversees the annual Student Technology Conference (and a related Professional Development Seminar), hosted by a member school. The ResNet organization has evolved from its simple roots during an informal discussion at Educom, into an internationally recognized professional organization engaging in dialogue, collaboration with vendors and other professional organizations, and professional development. Via its research entity, the ResNet Applied Research Group (RARG), ResNet has contributed to the international higher education community by conducting and publishing original research on networking technologies, music and entertainment, security, and technology support. The annual Student Technology Conference is held on the campus of a selected host institution.
https://en.wikipedia.org/wiki/Siel
Societa Industrie Elettroniche (SIEL) was an Italian company that made electronic organs and synthesizers in the 1980s. Timeline of major products 1979 - Orchestra (Divide down oscillator network for full poly. Brass/string/key/organ. ARP relabelled it the "Quartet" in the US as they were folding.) 1980 - Mono (A fairly nice sounding simple 1 DCO, 1 VCF monosynth) 1981 - Cruise (Combination of “Mono“ and “Orchestra“ in one Synthesizer 1982 - OR400 / Orchestra 2 (Improvement of Orchestra above. More parameter sliders. This was also marketed by Sequential Circuits as the Prelude.) 1984 - Opera 6 (2 DCO divide down from HFO ssm2031 chips, with all analog signal/EG) 1984 - DK600 (Opera 6 with different artwork. The last EPROM supports MIDI channels/Omni off) 1984 - Expander (opera 6/DK600 in a table top module. Only dco B tune, Volume, master tune.) 1985 - DK80 (splittable/layerable dual 6 voice synth with one M112B1 tone and one SSM2045 VCF per half.) 1985 - Expander 80 (DK80 module) 1985 - DK70 (One half of DK80 utilizing 8DCO in either single or 2DCO/4 voice.) This was also marketed by Giannini as GS 7010 1985 - CMK 49 (Commodore 64 keyboard) 1986 - DK700 (Enhanced DK600 with digital editing instead of knobs.) See also List of Italian Companies External links Siel Synthesizers Website Information and photos of synthesizers Musical instrument manufacturing companies of Italy Electronic organ manufacturing companies Synthesizer manufacturing companies of Italy Electronics companies established in 1976 Italian companies established in 1976 Italian brands Companies based in le Marche Electronics companies disestablished in 1986 1986 disestablishments in Italy
https://en.wikipedia.org/wiki/Data%20room
Data rooms are spaces used for housing data, usually of a secure or privileged nature. They can be physical data rooms, virtual data rooms, or data centers. They are used for a variety of purposes, including data storage, document exchange, file sharing, financial transactions, legal transactions, and more. In mergers and acquisitions, the traditional data room will genuinely be a physically secured and continually monitored room, normally in the vendor’s offices (or those of their lawyers), which the bidders and their advisers will visit in order to inspect and report on the various documents and other data made available. Often only one bidder at a time will be allowed to enter and if new documents or new versions of documents are required these will have to be brought in by courier as hardcopy. Teams involved in large due diligence processes will typically have to be flown in from many regions or countries and remain available throughout the process. Such teams often comprise a number of experts in different fields and so the overall cost of keeping such groups on call near to the data room is often extremely high. Combating the significant cost of physical data rooms is the virtual data room, which provides for the secure, online dissemination of confidential information. A virtual data room (VDR) is essentially a website with limited controlled access (using a secure log-on supplied by the vendor/authority which can be disabled at any time by the vendor/authority if a bidder withdraws) to which the bidders and their advisers are given access. Much of the information released will be confidential and restrictions should be applied to the viewers' ability to release this to third parties by forwarding, copying or printing. Digital rights management is sometimes applied to control information. With annual growth of about 16% for last seven years virtual data room market forecast is $1.6 Billion. Detailed auditing must be provided for legal reasons so that a record is kept of who has seen which version of each document. Data rooms are commonly used by legal, accounting, investment banking and private equity companies performing mergers and acquisitions, fundraising, insolvency, corporate restructuring, and joint ventures including biotechnology and tender processes. References Data management Rooms
https://en.wikipedia.org/wiki/Agent%20%28The%20Matrix%29
Agents are a group of characters in the fictional universe of The Matrix franchise. They are guardians within the computer-generated world of the Matrix, protecting it from anyone or anything (most often Redpills) that could reveal it as a false reality or threaten it in any other way. Agents also hunt down and terminate any rogue programs, such as The Keymaker, which no longer serve a purpose to the overall Machine objective. They are sentient computer programs disguised as human government agents, physically appearing as human but with a tendency to speak and act in highly precise and mechanical ways. A notable individual Agent is Agent Smith, played by Hugo Weaving. He is introduced alongside his colleagues Agents Jones (Robert Taylor) and Brown (Paul Goddard) in the first The Matrix film in 1999. Other Agent characters have appeared in various media adaptations of the Matrix franchise. Physical aspects Agents appear in the guise of human government agents, wearing black-green business suits lined with a gold fabric, white dress shirts, black dress shoes, dark green neckties with a silver bar clip, square sunglasses, and a communication earpiece. These features are copied from the attire for plainclothes agents of the United States Secret Service, as well as those of the Men in Black conspiracy or the stereotypical G-Man/FBI official. All known individual Agents within The Matrix universe appear as Caucasian males. In The Matrix Reloaded, six months after the facts of The Matrix, the Source deployed the upgraded Agents Jackson, Johnson, and Thompson (portrayed by Daniel Bernhardt, David A. Kilde and Matt McColm), designed specifically by the Machines to defeat The One. Unlike the original Agents, they had a change of appearance: their suit jackets were lighter and had more of a grayish-green tone, they were bulkier, wider and taller in appearance. The Upgraded Agents also spoke with a slight, almost unnoticeable reverb effect to their voices, which made them sound intimidating even while discussing mundane matters; unlike the regular Agents who sounded perfectly normal. Agents are, in fact, highly advanced artificial intelligence entities, programmed with a number of superhuman abilities. As Agents do not exist in their own bodies as other programs do, being "killed" is a temporary inconvenience. Rather, they take over the virtualized body of a Bluepill—a human directly connected to the Matrix—which transforms into the Agent's form until the Agent leaves the body. Analysis William Irwin said that the agents "are impersonal, generic and interchangeable" in contrast to the main characters who "are complex, different, and complementary". Lisa Nakamura said of Morpheus's initiative, "A black man leads the resistance or slave revolt against the machines, who are visible to us as Anglo-Saxon 'agents' wearing suits. They all look the same, as one would expect machines to do, but most importantly they all look white and middle class in a way tha
https://en.wikipedia.org/wiki/Stranvaesia
Stranvaesia is a genus of flowering plants in the family Rosaceae. Its morphology is so similar to Photinia that it has sometimes been included within that genus, but recent molecular data indicate that the two genera are not related. Species Stranvaesia amphidoxa (syn. Photinia amphidoxa) Stranvaesia davidiana (syn. Photinia davidiana) Stranvaesia nussia (syn. Photinia nussia) Stranvaesia oblanceolata Stranvaesia tomentosa (syn. Photinia tomentosa) References Rosaceae genera
https://en.wikipedia.org/wiki/Greatest%20Hits%20Radio%20North%20East
Greatest Hits Radio North East is an Independent Local Radio station serving North East England, as part of Bauer’s Greatest Hits Radio network. History Great North Radio (also known as G.N.R) was formed in March 1989 using the AM frequencies of Metro Radio and Radio Tees. This happened after the Metro Radio Group decided to split the FM and AM frequencies up. GNR's output consisted of mellow music from the 1950s through to the 1980s, including current hits that fitted the format. There were also specialist programmes each evening, including Country Music, Jazz, and Classical. In 1996, Emap bought Metro Radio and at the start of 1997, Emap decided to scrap Great North Radio and replaced it with local stations under the brand name of Magic, with a new format of Hot Adult Contemporary music. Magic 1152 launched on 19 February 1998. In December 2001, Emap decided that it was more economical for the Magic network to share off-peak programmes and in line with the other Magic AM stations began networking between 10am-2pm, and 7pm-6am. During these hours it was simply known as Magic, although there were local commercial breaks, and local news on the hour. In January 2003, after a sharp decline in listening, the station ceased networking with the London station, Magic 105.4, and a regional northern network was created with Manchester's Magic 1152 at the hub at the weekend and the Newcastle station as the hub during the week. This arrangement remained until 2006, when all network programmes were broadcast from Newcastle. During networked hours, local adverts are aired, as well as a local news summary on the hour during the day. IRN is taken in the evening and overnight. From July 2006, more networking was introduced across the Northern Magic AM network leaving just the legal minimum of 4 hours a day of programming - the breakfast show - presented from the local studios. All other programming was networked from Newcastle however some is also produced in Manchester and now London. Shows are recorded also on Saturdays from 1-6pm. On 4 March 2013, the one remaining local show - weekday breakfast - became a syndicated regional programme as on this day the programme, presented by Anna Foster, started broadcasting on Teesside sister station Magic 1170. The regional breakfast show was axed in December 2014 ahead of the launch of Metro 2 and all programming is networked with the other Bauer AM stations in the North although local news, weather and travel continue to be broadcast as opt-outs during the day. On 7 January 2019, Metro 2 rebranded as Greatest Hits Radio North East. Programming The station carries primarily a schedule of networked programming, produced and broadcast from Bauer's Manchester, Liverpool, Birmingham and Glasgow studios, and from Bauer's Golden Square headquarters in Soho. Regional programming consisted of Night Owls with Alan Robson, which was produced and broadcast from Bauer's Newcastle studios, airing each Sunday 10pm-2am, unt
https://en.wikipedia.org/wiki/Alan%20Turing%20Memorial
The Alan Turing Memorial, situated in Sackville Gardens in Manchester, England, is a sculpture in memory of Alan Turing, a pioneer of modern computing. Turing is believed to have taken his own life in 1954, two years after being convicted of gross indecency (i.e. homosexual acts). As such, he is as much a gay icon as an icon of computing, and the memorial is situated near to Canal Street, Manchester's gay village. Turing is depicted sitting on a bench situated in a central position in the park, holding an apple. On Turing's left is the University of Manchester and on his right is Canal Street. Sculptor Glyn Hughes said the park was chosen as the location for the statue because "It's got the university science buildings...on one side and it's got all the gay bars on the other side, where apparently he spent most of his evenings." The statue was unveiled on 23 June, Turing's birthday, in 2001. It was conceived by Richard Humphry, a barrister from Stockport, who set up the Alan Turing Memorial Fund in order to raise the necessary funds. Humphry had come up with the idea of a statue after seeing Hugh Whitemore's play Breaking the Code, starring Derek Jacobi. Jacobi became the patron of the fund. Glyn Hughes, an industrial sculptor from Adlington near Westhoughton, was commissioned to sculpt the statue. Roy Jackson (who had previously raised funds for HIV/AIDS and Gay Awareness in Manchester) was asked to assist in the funding raising to make the memorial happen. Within 12 months, through donations and a "village lottery", £15,000 was raised. It would have cost £50,000 to cast the statue at a British foundry, and so it was instead cast by the Tianjin Focus Company in China. The inscription in relief on the cast bronze bench reads "Alan Mathison Turing 1912–1954" and "IEKYF ROMSI ADXUO KVKZC GUBJ". The latter is described by Glyn Hughes as "a motto as encoded by the German 'Enigma'". The original message is often given as "Founder of Computer Science", however this is unlikely as the Enigma ciphering system does not allow a letter to be enciphered to itself, while the fourteenth letter of that message (the "U" in "Computer") is the same as the fourteenth letter of the encoded inscription. A plaque at the statue's feet reads "Father of Computer Science, Mathematician, Logician, Wartime Codebreaker, Victim of Prejudice", followed by the Bertrand Russell quotation "Mathematics, rightly viewed, possesses not only truth but supreme beauty, a beauty cold and austere like that of sculpture." Glyn Hughes buried his own old Amstrad computer beneath the statue, in tribute to Turing. Gallery See also 2001 in art Statue of Alan Turing, Bletchley Park (2007) Alan Turing sculpture (1988), Eugene, Oregon List of LGBT monuments and memorials References 2001 sculptures 2001 establishments in England Cultural depictions of Alan Turing Bronze sculptures in England LGBT history in the United Kingdom LGBT monuments and memorials in Europe Monuments and m
https://en.wikipedia.org/wiki/Cray%20%28disambiguation%29
Cray is a supercomputer manufacturer based in Seattle, Washington, US. Cray may also refer to: Crayfish Places United Kingdom River Cray, London, England North Cray, a village on the outskirts of London, England Cray, North Yorkshire, a village in England Cray, Perth and Kinross, a location in Scotland Cray, Powys, a community in Wales Cray Reservoir, a reservoir on the Afon Crai in the Brecon Beacons, Wales Elsewhere Cray (crater), on Mars Fiction Cray (Bas-Lag), a fictional race in China Miéville's fiction Cray, a character from the Breath of Fire IV role-playing game Damian Cray, a character in the Alex Rider series Other uses Cray (surname), a list of people Cray Wanderers F.C., a football club based in Bromley, England See also Crays Pond Kray (disambiguation)
https://en.wikipedia.org/wiki/SCSI%20initiator%20and%20target
In computer data storage, a SCSI initiator is the endpoint that initiates a SCSI session, that is, sends a SCSI command. The initiator usually does not provide any Logical Unit Numbers (LUNs). On the other hand, a SCSI target is the endpoint that does not initiate sessions, but instead waits for initiators' commands and provides required input/output data transfers. The target usually provides to the initiators one or more LUNs, because otherwise no read or write command would be possible. Detailed information Typically, a computer is an initiator and a data storage device is a target. As in a client–server architecture, an initiator is analogous to the client, and a target is analogous to the server. Each SCSI address (each identifier on a SCSI bus) displays behavior of initiator, target, or (rarely) both at the same time. There is nothing in the SCSI protocol that prevents an initiator from acting as a target or vice versa. SCSI initiators are sometimes wrongly called controllers. Other protocols Initiator and target terms are applicable not only to traditional parallel SCSI, but also to Fibre Channel Protocol (FCP), iSCSI (see iSCSI target), HyperSCSI, (in some sense) SATA, ATA over Ethernet (AoE), InfiniBand, DSSI and many other storage networking protocols. Address versus port In most of these protocols, an address (whether it is initiator or target) is roughly equivalent to physical device's port. Situations where a single physical port hosts multiple addresses, or where a single address is accessible from one device's multiple ports are not very common, . Even when using multipath I/O to achieve fault tolerance, the device driver switches between different targets or initiators statically bound on physical ports, instead of sharing a static address between physical ports. See also Master/slave (technology) SCSI architectural model iSCSI target SCSI Computer storage devices
https://en.wikipedia.org/wiki/The%20List%20%28magazine%29
The List is a digital guide to arts and entertainment in the United Kingdom. The company's activities include content syndication and running a network of websites carrying listings and editorial, covering film, eating and drinking, music, theatre, visual art, dance, kids and family, clubs and the Edinburgh Festivals. Originally launched in 1985 as a fortnightly arts and entertainment magazine covering Edinburgh and Glasgow, The List magazine switched in 2014 to publishing every two months throughout the year, and weekly during the Edinburgh Festivals in August. History The List was founded as an independent limited company in October 1985 by Robin Hodge (publisher) and Nigel Billen (founding editor). The first editors were Nigel Billen and Sarah Hemming. In 2007 the company launched its listings website. In June 2016, The Sunday Times Scotland launched a fortnightly events guide pullout section, produced in collaboration with The List. Acquisition by Assembly In 2022, The List brand was transferred to a new company, List Publishing Ltd, a subsidiary of Assembly Wings Ltd - Assembly Festival's holding company - co-owned by William Burdett-Coutts and Director of the Free Speech Union, Luke Johnson. Brudett-Coutts serves as a director of List Publishing Ltd. The List moved their offices to Assembly Festival’s Edinburgh headquarters in Assembly Roxy and are listed as Assembly Festival’s sole media partner. The original company, The List Ltd, changed name to Phylum Forge Ltd, and trades under the name Data Thistle. Data Thistle continues the events data services that formed part of The List’s original business, with List Publishing Ltd sourcing event data from Data Thistle. Activities The List is a member of the group of organisations who developed an International Venue and Event Standard (IVES). A now dormant project. The List is a member of the Creative Industries Federation. Publications The List publishes several printed guides throughout the year. These include the Edinburgh Festival Guide, the Eating & Drinking Guide, which includes reviews of over 900 restaurants, cafes and bars in Glasgow and Edinburgh, and the annual Guide to Scotland's Festivals. The List also publishes a series of guides under the Larder imprint. Since 2009, it has published two national editions and more than twenty regional editions. The Larder provides comprehensive information and articles about producers and sources for local food and drink across Scotland. Online activity As the print magazine came under increasing competition in the early 2000s, listings were increasingly moved to its website. The network of sites includes minisites dedicated to Film, Food & Drink and Edinburgh Festivals. An archive (1985-2020) is available at http://archive.list.co.uk. Awards Best Online Presence, PPA Scotland Awards 2003, 2008, 2009, 2013, 2015 Best Digital Strategy, PPA Scotland Awards 2011 Allen Wright Award, Fringe Society 2011, 2012, 2016 Notable regula
https://en.wikipedia.org/wiki/Tomboy%20%28software%29
Tomboy is a free and open-source desktop notetaking app written for Windows, macOS, Linux, and BSD operating systems. Tomboy is part of the GNOME desktop environment. As Ubuntu changed over time and its cloud synchronization software Ubuntu One came and went, Tomboy inspired various forks and clones. Its interface is a word processor with a wiki-like linking system to connect notes together. Words in the note body that match existing note titles become hyperlinks automatically, making it simple to construct a personal wiki. For example, repeated references to favorite artists would be automatically highlighted in notes containing their names. As of version 1.6 (2010), it supports text entries and hyperlinks to the World Wide Web, but not graphic image linking or embedding. Development of the original Tomboy software ceased in 2017. Starting in 2017 the development team rewrote the software from scratch, for ease of maintenance and installation, renaming it tomboy-ng. Tomboy-ng is written in Free Pascal. Features Some of the editing features supported: Text highlighting Inline spell checking using GtkSpell Automatic hyperlinking of Web and email addresses Undo/redo Font styling and sizing Bulleted lists Note synchronization over SSH, WebDAV, Ubuntu One, or the Tomboy REST API that is implemented by several server applications Plugins Tomboy supports several plugins, including: Evolution mail links Galago/Pidgin presence Note of the day (disabled by default) Fixed width text HTML export LaTeX math (in the package , not installed by default) Print Ports Conboy: a Tomboy port to the Maemo platform written in the C language Gnote: a conversion of the Tomboy code to the C++ language, but is not cross-platform libktomgirl: a platform-independent library that reads and writes the Tomboy File Format Tomdroid: an effort to produce a Tomboy-compatbile notetaking app for the Android operating system. See also Comparison of notetaking software References External links Software that uses Mono (software) Free note-taking software Cross-platform free software Free software programmed in C Sharp GNOME Applications Note-taking software that uses GTK Personal wikis
https://en.wikipedia.org/wiki/Linear%20genetic%20programming
"Linear genetic programming" is unrelated to "linear programming". Linear genetic programming (LGP) is a particular method of genetic programming wherein computer programs in a population are represented as a sequence of instructions from an imperative programming language or machine language. The adjective "linear" stems from the fact that the sequence of instructions is normally executed in a linear fashion. Like in other programs, the data flow in LGP can be modeled as a graph that will visualize the potential multiple usage of register contents and the existence of structurally noneffective code (introns) which are two main differences of this genetic representation from the more common tree-based genetic programming (TGP) variant. Like other Genetic Programming methods, Linear genetic programming requires the input of data to run the program population on. Then, the output of the program (its behaviour) is judged against some target behaviour, using a fitness function. However, LGP is generally more efficient than tree genetic programming due to its two main differences mentioned above: Intermediate results (stored in registers) can be reused and a simple intron removal algorithm exists that can be executed to remove all non-effective code prior to programs being run on the intended data. These two differences often result in compact solutions and substantial computational savings compared to the highly constrained data flow in trees and the common method of executing all tree nodes in TGP. Linear genetic programming has been applied in many domains, including system modeling and system control with considerable success. Linear genetic programming should not be confused with linear tree programs in tree genetic programming, program composed of a variable number of unary functions and a single terminal. Note that linear tree GP differs from bit string genetic algorithms since a population may contain programs of different lengths and there may be more than two types of functions or more than two types of terminals. Examples of LGP programs Because LGP programs are basically represented by a linear sequence of instructions, they are simpler to read and to operate on than their tree-based counterparts. For example, a simple program written to solve a Boolean function problem with 3 inputs (in R1, R2, R3) and one output (in R0), could read like this: R4 = R2 AND R3 R0 = R1 OR R4 R0 = R3 AND R0 R4 = R2 AND R4 # This is a non-effective instruction R0 = R0 OR R2 R1, R2, R3 have to be declared as input (read-only) registers, while R0 and R4 are declared as calculation (read-write) registers. This program is very simple, having just 5 instructions. But mutation and crossover operators could work to increase the length of the program, as well as the content of each of its instructions. Note that one instruction is non-effective or an intron (marked), since it does not impact the output register R0. Recognition of those instructions is the ba
https://en.wikipedia.org/wiki/Misuse%20of%20statistics
Statistics, when used in a misleading fashion, can trick the casual observer into believing something other than what the data shows. That is, a misuse of statistics occurs when a statistical argument asserts a falsehood. In some cases, the misuse may be accidental. In others, it is purposeful and for the gain of the perpetrator. When the statistical reason involved is false or misapplied, this constitutes a statistical fallacy. The false statistics trap can be quite damaging for the quest for knowledge. For example, in medical science, correcting a falsehood may take decades and cost lives. Misuses can be easy to fall into. Professional scientists, even mathematicians and professional statisticians, can be fooled by even some simple methods, even if they are careful to check everything. Scientists have been known to fool themselves with statistics due to lack of knowledge of probability theory and lack of standardization of their tests. Definition, limitations and context One usable definition is: "Misuse of Statistics: Using numbers in such a manner that – either by intent or through ignorance or carelessness – the conclusions are unjustified or incorrect." The "numbers" include misleading graphics discussed in other sources. The term is not commonly encountered in statistics texts and there is no single authoritative definition. It is a generalization of lying with statistics which was richly described by examples from statisticians 60 years ago. The definition confronts some problems (some are addressed by the source): Statistics usually produces probabilities; conclusions are provisional The provisional conclusions have errors and error rates. Commonly 5% of the provisional conclusions of significance testing are wrong Statisticians are not in complete agreement on ideal methods Statistical methods are based on assumptions which are seldom fully met Data gathering is usually limited by ethical, practical and financial constraints. How to Lie with Statistics acknowledges that statistics can legitimately take many forms. Whether the statistics show that a product is "light and economical" or "flimsy and cheap" can be debated whatever the numbers. Some object to the substitution of statistical correctness for moral leadership (for example) as an objective. Assigning blame for misuses is often difficult because scientists, pollsters, statisticians and reporters are often employees or consultants. An insidious misuse of statistics is completed by the listener, observer, audience, or juror. The supplier provides the "statistics" as numbers or graphics (or before/after photographs), allowing the consumer to draw conclusions that may be unjustified or incorrect. the poor state of public statistical literacy and the non-statistical nature of human intuition make it possible to mislead without explicitly producing faulty conclusion. The definition is weak on the responsibility of the consumer of statistics. A historian listed ove
https://en.wikipedia.org/wiki/ODC
ODC may refer to: ODC/Dance, a San Francisco-based dance company Open Data Charter, concerning governmental open data Open Data Commons, a set of legal tools for open data Ordinary Decent Criminal (slang), used by Irish police force Ornithine decarboxylase, an enzyme Orthogonal Defect Classification Organic Disease Control, in aeroponics Office of Defense Cooperation
https://en.wikipedia.org/wiki/ACM%20SIGGRAPH
ACM SIGGRAPH is the international Association for Computing Machinery's Special Interest Group on Computer Graphics and Interactive Techniques based in New York. It was founded in 1969 by Andy van Dam (its direct predecessor, ACM SICGRAPH was founded two years earlier in 1967). ACM SIGGRAPH convenes the annual SIGGRAPH conference, attended by tens of thousands of computer professionals. The organization also sponsors other conferences around the world, and regular events are held by its professional and student chapters in several countries. Committees Professional and Student Chapters Committee The Professional and Student Chapters Committee (PSCC) is the leadership group that oversees the activities of ACM SIGGRAPH Chapters around the world. Details about Local Chapters can be found below. International Resources Committee The International Resources Committee (IRC) facilitates throughout the year worldwide collaboration in the ACM SIGGRAPH community, provides an English review service to help submitters whose first language is not English, and encourages participation in all SIGGRAPH conference venues, activities, and events. Awards ACM SIGGRAPH presents six awards to recognize achievement in computer graphics. The awards are presented at the annual SIGGRAPH conference. Steven A. Coons Award The Steven Anson Coons Award for Outstanding Creative Contributions to Computer Graphics is considered the highest award in computer graphics, and is presented each odd-numbered year to individuals who have made a lifetime contribution to computer graphics. It is named for Steven Anson Coons, an early pioneer in interactive computer graphics. Recipients: Computer Graphics Achievement Award The Computer Graphics Achievement award is given each year to recognize individuals for an outstanding achievement in computer graphics and interactive techniques that provided a significant advance in the state of the art of computer graphics and is still significant and apparent. Recipients: Significant New Researcher Award The Significant New Researcher Award is given annually to a researcher with a recent significant contribution to computer graphics. Recipients: Distinguished Artist Award The Distinguished Artist Award is presented annually to an artist who has created a significant body of digital art work that has advanced the aesthetic content of the medium. Recipients: Professional and Student Chapters Within their local areas, Chapters continue the work of ACM SIGGRAPH on a year-round basis via their meetings and other activities. Each ACM SIGGRAPH Professional and Student Chapter consists of individuals involved in education, research & development, the arts, industry and entertainment. ACM SIGGRAPH Chapter members are interested in the advancement of computer graphics and interactive techniques, its related technologies and applications. For the annual conference, some of the Chapters produce a "Fast Forward" overview of activities. Listed
https://en.wikipedia.org/wiki/Bristol%20Harbour%20Railway
The Bristol Harbour Railway (known originally as the Harbour Railway) was a standard-gauge industrial railway that served the wharves and docks of Bristol, England. The line, which had a network of approximately of track, connected the Floating Harbour to the GWR mainline at Bristol Temple Meads. Freight could be transported directly by waggons to Paddington Station in London. The railway officially closed in 1964. In 1978, a heritage railway named the Bristol Harbour Railway was opened and operated by Bristol Industrial Museum. It uses approximately of the preserved line that runs adjacent to the River Avon. The line is a very popular visitor attraction in the city. Industrial line The Harbour Railway was a joint venture by the GWR and sister company the Bristol and Exeter Railway. The first part of the network opened in 1872 between Temple Meads and the Floating Harbour. The route required a tunnel under St Mary Redcliffe church and a steam-powered bascule bridge across the entrance locks at Bathurst Basin. In 1876 the line was extended by to Wapping Wharf. In 1897 a Private Act of Parliament gave the GWR the authorisation to make a westwards connection between the Harbour Railway and the Portishead Railway. This created the West Loop at which permitted southerly travel towards and . The connection also permitted the double the rail capacity to the Great Western Main Line. In 1906 another authorised extension created new branches from the south via the Ashton Swing Bridge to Canons Marsh on the north side of the Floating Harbour and to Wapping via a line alongside the New Cut. In 1964, the Harbour railway connection to Temple Meads was closed and the track lifted. The steam engine from the link's bascule bridge is now preserved at Bristol Museum. The following year, the Canons Marsh line closed. The branch from the Portishead line and Wapping marshalling yard to the Western Fuel Company continued remained open for commercial coal traffic for another 20 years. It was officially closed in 1987. Heritage railway In 1978, the Bristol Industrial Museum reopened part of the line as preserved railway using locomotives built in Bristol and formerly used at Avonmouth Docks. At first, it connected the museum with the SS Great Britain, but when commercial rail traffic ceased in 1987 on the remaining branch line, the museum railway expanded to use the branch alongside the New Cut. However, when the Portishead Railway was relaid, this severed the connection to Ashton Junction. The line starts at M shed, following the south side of the harbour and crossing Spike Island, the narrow strip of land between the harbour and the River Avon. The former route east over the Swing Bridge is now the Pill Pathway rail trail and cycleway. The railway operates on selected weekends on standard gauge track over . The railway runs along the south side of Bristol Harbour, starting at M Shed (the former Bristol Industrial Museum ), stopping at the , and ending at
https://en.wikipedia.org/wiki/Filesystem%20in%20Userspace
Filesystem in Userspace (FUSE) is a software interface for Unix and Unix-like computer operating systems that lets non-privileged users create their own file systems without editing kernel code. This is achieved by running file system code in user space while the FUSE module provides only a bridge to the actual kernel interfaces. FUSE is available for Linux, FreeBSD, OpenBSD, NetBSD (as puffs), OpenSolaris, Minix 3, macOS, and Windows. FUSE is free software originally released under the terms of the GNU General Public License and the GNU Lesser General Public License. History The FUSE system was originally part of AVFS (A Virtual Filesystem), a filesystem implementation heavily influenced by the translator concept of the GNU Hurd. It superseded Linux Userland Filesystem, and provided a translational interface using in libfuse1. FUSE was originally released under the terms of the GNU General Public License and the GNU Lesser General Public License, later also reimplemented as part of the FreeBSD base system and released under the terms of Simplified BSD license. An ISC-licensed re-implementation by Sylvestre Gallon was released in March 2013, and incorporated into OpenBSD in June 2013. FUSE was merged into the mainstream Linux kernel tree in kernel version 2.6.14. The userspace side of FUSE, the library, generally followed the pace of Linux kernel development while maintaining "best effort" compatibility with BSD descendants. This is possible because the kernel FUSE reports its own "feature levels", or versions. The exception is the FUSE fork for macOS, OSXFUSE, which has too many differences for sharing a library. A break in libfuse history is libfuse3, which includes some incompatible improvements in the interface and performance, compared to the older libfuse2 now under maintenance mode. As the kernel-userspace protocol of FUSE is versioned and public, a programmer can choose to use a different piece of code in place of and still communicate with the kernel's FUSE facilities. On the other hand, and its many ports provide a portable high-level interface that may be implemented on a system without a "FUSE" facility. Operation and usage To implement a new file system, a handler program linked to the supplied libfuse library needs to be written. The main purpose of this program is to specify how the file system is to respond to read/write/stat requests. The program is also used to mount the new file system. At the time the file system is mounted, the handler is registered with the kernel. If a user now issues read/write/stat requests for this newly mounted file system, the kernel forwards these IO-requests to the handler and then sends the handler's response back to the user. FUSE is particularly useful for writing virtual file systems. Unlike traditional file systems that essentially work with data on mass storage, virtual filesystems don't actually store data themselves. They act as a view or translation of an existing file system
https://en.wikipedia.org/wiki/9%3A%20The%20Last%20Resort
9: The Last Resort is a 1996 adventure computer game developed by Tribeca Interactive. The game was produced by Robert De Niro and Jane Rosenthal, and sported a cast of voice-artists including Cher, James Belushi, Christopher Reeve, Tress MacNeille and Steven Tyler & Joe Perry of Aerosmith. It also includes the visual style and artwork of Mark Ryden. It was developed for the Windows and the Mac OS platforms. Plot The player character has just inherited a hotel, The Last Resort, belonging to their deceased uncle, Thurston Last. The hotel is inhabited by nine muses. As the player character enters the hotel, it becomes clear that it is no longer a hospitable place. Its wacky inhabitants live in fear of a pair of squatters known as the Toxic Twins. Only the aeroplane-man Salty is brave enough to wander around and talk to the player character. The player's goal is to reconstruct "The Muse Machine" and banish the Toxic Twins. Gameplay Most of the puzzles in 9 relate to the musical theme, provided mainly by Aerosmith. Many of the puzzles are based in a specific musical instrument, such as the drums, guitar, and organ; however, no musical knowledge of these instruments is required. The gameplay centers on an organ upon which the player can play musical codes. On each "floor" of the resort, the player finds a code sheet containing instructions for playing a short musical piece on the organ. However, each sheet extends the code making it more difficult to interpret. This culminates in the final puzzle in which the player must be thoroughly familiar with the code. Reception GameSpot gave the game a 7.3 out of 10. It received a "B" from PC Games. References External links EPK (Electronic Press Kit) for the game with in-game footage, interviews and more. Perfectly playable DOSBox emulator for playing the game in its entirety - allowing you to call up the menu (CTRL+M) save, load and exit games via the other keyboard shortcuts shown in the game's documentation. at retrogames.onl 1996 video games Adventure games Classic Mac OS games Video games based on musicians Video games developed in the United States Video games set in hotels Windows games GT Interactive games
https://en.wikipedia.org/wiki/Classic%20Gold
Classic Gold was a network of three "Gold" music formatted stations which broadcast on AM in Bradford, Hull and Sheffield. They were the sister stations of Pennine Radio, Viking Radio and Radio Hallam respectively and they were part of the Yorkshire Radio Network. History On 31 October 1988, Viking Radio split its frequencies and turned its medium wave service into "Viking Gold", thereby becoming Yorkshire Radio Network's first oldies station. Pennine and Hallam soon followed and Classic Gold launched on 1 May 1989. For most of its life, Classic Gold was produced with a presenter in Hull, and local 'tech-ops' in Bradford and Sheffield. In Bradford two sets of adverts would be played out - one for Bradford and one for the Halifax/Huddersfield transmitter. Tech-ops included Paul Bromley, Rol Hirst, Melanie Robinson, Richard Hizzard, James Cridland, Colin Bates and Peter Carter. Part of the tech-op's duties would also be to drive the desk for the news readers - the first three minutes of which were taken by the FM station, while Classic Gold listeners got a full five minutes of news. Tech-ops were instructed by talk-back from the presenter studio in Hull what the 'out-cue' was going to be. Breaks were balanced by the tech-op, not by the scheduling department. A tale about Keith Skues was that he would give an out-cue of "time-check", and would then announce "the time is three little ducks". This was followed by a long pause, causing the local tech-ops to fire off the ad-break once they'd realised it was 2:22pm. The talkback was some kind of radio link, and occasionally was interfered with by Hull taxis. A stand-by CD was in satellite studios in case of line failure; in Bradford, the dulcet tones of Nina Simone's "My baby just cares for me" meant the line had gone dead. In the early 1990s GWR Group which had just bought 2CR and 210 took YRN's Classic Gold from midnight till 6am, which then became Brunel, 2CR Classic Gold etc. The name was used in Yorkshire by YRN some 12 months before the GWR Group. After being taken over by the Metro Radio Group in the early 90s, Classic Gold was relaunched as "Great Yorkshire Radio", and in 1993 as "Great Yorkshire Gold". The station continued in all three areas, even after the sale of the Bradford-based station (along with its FM sister station The Pulse of West Yorkshire) to the Radio Partnership in 1996. This had occurred because Radio Authority rules at the time prevented Emap from owning stations in Leeds and Bradford which had significant overlap. In 1997 promotional trailers began running across all three Great Yorkshire Gold stations saying that they would be soon changing to become Magic, despite the fact that this would not be the case in West Yorkshire, where negotiations were underway to take GWR plc's Classic Gold service. Unhappy with the confusion being caused to listeners, bosses in Bradford decided to create an emergency local service whilst the talks continued with GWR plc and 1278 and 15
https://en.wikipedia.org/wiki/Lightmap
A lightmap is a data structure used in lightmapping, a form of surface caching in which the brightness of surfaces in a virtual scene is pre-calculated and stored in texture maps for later use. Lightmaps are most commonly applied to static objects in applications that use real-time 3D computer graphics, such as video games, in order to provide lighting effects such as global illumination at a relatively low computational cost. History John Carmack's Quake was the first computer game to use lightmaps to augment rendering. Before lightmaps were invented, realtime applications relied purely on Gouraud shading to interpolate vertex lighting for surfaces. This only allowed low frequency lighting information, and could create clipping artifacts close to the camera without perspective-correct interpolation. Discontinuity meshing was sometimes used especially with radiosity solutions to adaptively improve the resolution of vertex lighting information, however the additional cost in primitive setup for realtime rasterization was generally prohibitive. Quake's software rasterizer used surface caching to apply lighting calculations in texture space once when polygons initially appear within the viewing frustum (effectively creating temporary 'lit' versions of the currently visible textures as the viewer negotiated the scene). As consumer 3d graphics hardware capable of multitexturing, light-mapping became more popular, and engines began to combine light-maps in real time as a secondary multiply-blend texture layer. Limitations Lightmaps are composed of lumels (lumination elements), analogous to texels in texture mapping. Smaller lumels yield a higher resolution lightmap, providing finer lighting detail at the price of reduced performance and increased memory usage. For example, a lightmap scale of 4 lumels per world unit would give a lower quality than a scale of 16 lumels per world unit. Thus, in using the technique, level designers and 3d artists often have to make a compromise between performance and quality; if high resolution lightmaps are used too frequently then the application may consume excessive system resources, negatively affecting performance. Lightmap resolution and scaling may also be limited by the amount of disk storage space, bandwidth/download time, or texture memory available to the application. Some implementations attempt to pack multiple lightmaps together in a process known as atlasing to help circumvent these limitations. Lightmap resolution and scale are two different things. The resolution is the area, in pixels, available for storing one or more surface's lightmaps. The number of individual surfaces that can fit on a lightmap is determined by the scale. Lower scale values mean higher quality and more space taken on a lightmap. Higher scale values mean lower quality and less space taken. A surface can have a lightmap that has the same area, so a 1:1 ratio, or smaller, so the lightmap is stretched to fit. Lightmaps in games
https://en.wikipedia.org/wiki/Laurence%20Tisch
Laurence Alan Tisch (March 5, 1923 – November 15, 2003) was an American businessman, investor and billionaire. He was the CEO of CBS television network from 1986 to 1995. With his brother Bob Tisch, he was part owner of Loews Corporation. Early life Tisch was born March 5, 1923, in Brooklyn, New York, the son of Sadye (née Brenner) and Al Tisch. His father's parents had emigrated from Ukraine and his mother's parents from Poland. He was of Jewish descent. His father, a former All-American basketball player at the City University of New York, owned a garment factory as well as two summer camps which his wife helped him run. Education and early career He graduated from New York University when he was just 18 and received a Penn Wharton MBA in industrial management by 20. In 1946, he made his first investment, purchasing a 300-room winter resort in Lakewood, New Jersey with $125,000 in seed money (roughly equivalent to $1.5 million at 2012 prices) from his parents. Two years later, his brother Bob joined him in the business, launching a lifelong partnership between the pair with Larry handling financial matters and Bob the overall management. Their first hotel was very successful and over the next decade, the Tisch brothers bought a dozen hotels in Atlantic City and the Catskills. Loews In 1960, using the proceeds from their hotel empire, Tisch gained control of Loews Theaters, one of the largest movie house chains at the time, with Bob and Larry serving as co-chairmen of the company. They were attracted to Loews by its underlying real estate assets which they believed were undervalued. They were correct in this assumption and would later tear down many of the centrally located old theaters to build apartments and hotels reaping millions in profits. The pair soon diversified the business, successfully venturing into a variety of areas. In 1968, Loews acquired Lorillard, the 5th largest tobacco company in the United States at the time, which owned the popular brands Kent, Newport and True. In 1974, they purchased a controlling interest in the nearly bankrupt insurance company, CNA Financial Corporation. This too was very successful and several years later it held an A+ credit rating. They also purchased the Bulova Watch Company. Through acquisitions, Tisch built Loews' into a highly profitable conglomerate (with 14 hotels, 67 movie theaters, CNA Financial, Bulova, and Lorillard) with revenues increasing from $100 million in 1970 to more than $3 billion in 1980. In 2002, the year before Larry Tisch's death, the corporation had revenues of more than $17 billion and assets of more than $70 billion. CBS In 1986, CBS Inc. was the target of several hostile takeover attempts by the likes of Ted Turner, Marvin Davis, and Ivan Boesky. Tisch was invited by CBS to invest in the company so as to help stop the hostile advances. Tisch spent $750 million for a 24.9% stake in CBS and a seat on the board. Later, with the support of company patriarch William S
https://en.wikipedia.org/wiki/List%20of%20universities%20and%20colleges%20in%20Krak%C3%B3w
Higher Education in Kraków takes place in 10 university-level institutions with about 120,000 to over 170,000 students (based on years and different data providers) and 10,000 faculty, as well as in a number of non-public colleges. Public institutions of higher education Jagiellonian University AGH University of Science and Technology Cracow University of Technology Cracow University of Economics Academy of Music in Kraków Pedagogical University of Cracow Agricultural University of Kraków Academy of Fine Arts in Kraków Ludwik Solski Academy for the Dramatic Arts The University School of Physical Education in Krakow Pontifical University of John Paul II Non-public colleges Akademia Lospuma Training Institute Tischner European University Jesuit University of Philosophy and Education Ignatianum Andrzej Frycz Modrzewski Krakow University Krakowska Wyższa Szkoła Promocji Zdrowia Małopolska Wyższa Szkoła Zawodowa Wyższa Pedagogiczna Szkoła Zawodowa im. Św. Rodziny Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego "Apeiron" Wyższa Szkoła Ekonomii i Informatyki w Krakowie Wyższa Szkoła Handlowa w Krakowie (closing) Wyższa Szkoła Ochrony Środowiska, Turystyki i Rekreacji Wyższa Szkoła Ubezpieczeń Wyższa Szkoła Zarządzania i Bankowości w Krakowie See also Culture of Kraków VIII Prywatne Akademickie Liceum Ogólnokształcące w Krakowie Notes and references Krakow Kraków
https://en.wikipedia.org/wiki/Digital%20Signal%203
A Digital Signal 3 (DS3) is a digital signal level 3 T-carrier. It may also be referred to as a T3 line. The data rate for this type of signal is 44.736 Mbit/s (45 Mb). DS3 uses 75ohm coaxial cable and BNC connectors. This level of carrier can transport 28 DS1 level signals within its payload. This level of carrier can transport 672 DS0 level channels within its payload. Such circuits are the usual kind between telephony carriers, both wired and wireless, and typically by OC1 optical connections. Cabling DS3 interconnect cables must be made with true 75-ohm coaxial cable and connectors. Cables or connectors which are 50 ohms or which significantly deviate from 75 ohms will result in signal reflections which will lower the performance of the connection, possibly to the point of not working. GR-139-CORE, Generic Requirements for Central Office Coaxial Cable, defines type 734 and 735 cables for this application. Due to losses, there are differing distance limitations for each type of cable. Type 734 has a larger center conductor and insulator for lower losses for a given distance. The BNC connectors are also very important as are the crimping and cable stripping tools used to install them. Trompeter, Cannon, Amphenol, Kings, and Canare make some of the most reliable 75 ohm connectors known. RG-6 or even inexpensive RG-59 cable may work temporarily when properly terminated, though it does not meet telephony technical standards. Type 735 26 AWG is used for interconnects up to 225 feet, and Type 734 20 AWG is used for interconnects up to 450 feet. DS3 pricing DS3 service is provided to businesses in the United States through incumbent local exchange carrier and competitive local exchange carrier communication providers. The price, much like a T1 (or DS1) line, has two primary components: the loop (which is distance-sensitive) and the port (or the price the carrier charges to access the internet through their proprietary network). See also Central Office Multiplexing Digital Signal 0 Digital Signal 1 DS4/NA Transmux References External links Detailed/Technical DS3-T3 Definition The Fundamentals of DS3, Technical Note, Acterna, TB-FUNDS3-B-2/01 Telecommunications standards
https://en.wikipedia.org/wiki/Ray%20Larabie
Raymond Larabie (born 1970) is a Canadian designer of TrueType and OpenType computer fonts. He owns Typodermic Fonts, which distributes both commercially licensed and shareware/freeware fonts. Biography and career Larabie was born in Ottawa, Ontario, Canada. He graduated from Sheridan College with a degree in classical animation. He moved to Nagoya, Japan in 2008; he maintains Canadian citizenship. Beginning in 1996, Larabie distributed his designs over the internet as freeware, operating as his own independent type foundry LarabieFonts. He released much of his Larabie Fonts library into the public domain in 2020 after he determined the designs were no longer of any commercial value. Larabie was employed at Rockstar Canada and had contributed his designs to multiple video game titles, including the hit series' Grand Theft Auto and Max Payne, before he quit the company in 2002 to focus full-time on type design. Larabie primarily specializes in novelty typefaces that are intended for use in desktop publishing and graphic design. The logo for Grand Theft Auto, for instance, uses Larabie's Pricedown font, which is based on the logo for the international game show The Price Is Right, as well as for the Disney animated series Fillmore!. In addition to game shows, Larabie has also used 1960s and 1970s graphic logos, computer emulation, and other inspirations to design his fonts; most of his designs are display faces not meant for body text. He is particularly known for his “ubiquitous futuristic and sci-fi fonts”; Larabie specialized in that style early in his career because he felt that, other than a few examples such as Bank Gothic, Microgramma and Eurostile, the market for that style was underserved. Two of his typeface families, Marion and Superclarendon, are released with macOS. Larabie's "Canada 150" is an extended version of his previous font Mesmerize (in turn based on 1920s calligraphic German sans-serifs such as Semplicità and Kabel) with Cyrillic and First Nations alphabets included; it was commissioned by the Government of Canada to be the official typeface for the country's sesquicentennial. The government paid him nothing for the custom work, which he subsequently placed into the public domain. Larabie has drawn controversy for releasing fonts freely; other professional designers took particular umbrage at Canada 150, stating that the government should have paid for a professionally drawn type since, it was posited, a government has the money to do so. Larabie responded to the criticism by saying "You can’t just throw a couple hundred grand at a problem and that’s the solution for every problem." Typefaces Coolvetica—an eccentric neo-grotesque sans-serif based on Chalet and 1970s Helvetica, Larabie's most popular font Foo—used for Super Mario RPG: Legend of the Seven Stars Neuropol—a modified version of which was used in the wordmark for the 2006 Winter Olympics Pricedown Stereofidelic Mesmerize Kawashiro Gothic, Japanese gothic typ
https://en.wikipedia.org/wiki/MacWeb
MacWeb is an early, now discontinued classic Mac OS-only web browser for 68k and PowerPC Apple Macintosh computers, developed by TradeWave (formerly EINet) between 1994 and 1996. MacWeb's major attraction was its ability to run well on low-end hardware footprints as well as fast page display. This compactness led to MacWeb's inclusion on many "Internet starter kit" floppy disks and CD-ROMs that were popular at the time. TradeWave also developed a similar Microsoft Windows browser named WinWeb. However, they were eclipsed by more full-featured competitors such as Netscape Navigator, and development was eventually abandoned. Versions The first public release was 0.98-alpha on May 31, 1994, and the final official release was version 2.0 in 1996. An unofficial patch "2.0c" was released by Antoine Hébert in 1998 to correct a problem on old machines not supporting color QuickDraw. Although one author in 1995 called MacWeb the second web browser released for the Macintosh, this is not quite true. The text-only MacWWW browser became available in 1992, with the graphical Mosaic released for the Mac the next year. Features MacWeb was a basic browser that contained features common to most browsers such as: support for HTML forms bookmarks with import tool for Mosaic's bookmarks a HTML viewer MacWeb pioneered the "click and hold" gesture to display a popup contextual menu. This mouse gesture was commonly used on the Macintosh before the prevalence of two-button mice on the Mac platform. MacWeb's preferences dialog allowed users to customize display styles on a per-tag basis similar to Cascading style sheets System requirements MacWeb has the following system requirements: Operating System: Classic Mac OS RAM: less than 700 KB RAM HDD: 680 KB References Further reading External links MacWeb archive on evolt.org Classic Mac OS-only web browsers 1994 software Discontinued web browsers
https://en.wikipedia.org/wiki/Update%20%28SQL%29
An SQL UPDATE statement changes the data of one or more records in a table. Either all the rows can be updated, or a subset may be chosen using a condition. The UPDATE statement has the following form: UPDATE table_name SET column_name = value [, column_name = value ...] [WHERE condition] For the UPDATE to be successful, the user must have data manipulation privileges (UPDATE privilege) on the table or column and the updated value must not conflict with all the applicable constraints (such as primary keys, unique indexes, CHECK constraints, and NOT NULL constraints). In some databases, such as PostgreSQL, when a FROM clause is present, what essentially happens is that the target table is joined to the tables mentioned in the fromlist, and each output row of the join represents an update operation for the target table. When using FROM, one should ensure that the join produces at most one output row for each row to be modified. In other words, a target row shouldn't join to more than one row from the other table(s). If it does, then only one of the join rows will be used to update the target row, but which one will be used is not readily predictable. Because of this indeterminacy, referencing other tables only within sub-selects is safer, though often harder to read and slower than using a join. MySQL does not conform to ANSI standard. Examples Set the value of column C1 in table T to 1, only in those rows where the value of column C2 is "a". UPDATE T SET C1 = 1 WHERE C2 = 'a' In table T, set the value of column C1 to 9 and the value of C3 to 4 for all rows for which the value of column C2 is "a". UPDATE T SET C1 = 9, C3 = 4 WHERE C2 = 'a' Increase value of column C1 by 1 if the value in column C2 is "a". UPDATE T SET C1 = C1 + 1 WHERE C2 = 'a' Prepend the value in column C1 with the string "text" if the value in column C2 is "a". UPDATE T SET C1 = 'text' || C1 WHERE C2 = 'a' Set the value of column C1 in table T1 to 2, only if the value of column C2 is found in the sublist of values in column C3 in table T2 having the column C4 equal to 0. UPDATE T1 SET C1 = 2 WHERE C2 IN ( SELECT C3 FROM T2 WHERE C4 = 0) One may also update multiple columns in a single update statement: UPDATE T SET C1 = 1, C2 = 2 Complex conditions and JOINs are also possible: UPDATE T SET A = 1 WHERE C1 = 1 AND C2 = 2 Some databases allow the non-standard use of the FROM clause: UPDATE a SET a.[updated_column] = updatevalue FROM articles a JOIN classification c ON a.articleID = c.articleID WHERE c.classID = 1 Or on Oracle systems (assuming there is an index on classification.articleID): UPDATE ( SELECT * FROM articles JOIN classification ON articles.articleID = classification.articleID WHERE classification.classID = 1 ) SET [updated_column] = updatevalue With long name of table: UPDATE MyMainTable AS a SET a.LName = Smith WHERE a.PeopleID =
https://en.wikipedia.org/wiki/VT52
The VT50 was a CRT-based computer terminal introduced by Digital Equipment Corporation (DEC) in July 1974. It provided a display with 12 rows and 80 columns of upper-case text, and used an expanded set of control characters and forward-only scrolling based on the earlier VT05. DEC documentation of the era refers to the terminals as the DECscope, a name that was otherwise almost never seen. The VT50 was sold only for a short period before it was replaced by the VT52 in September 1975. The VT52 provided a screen of 24 rows and 80 columns of text and supported all 95 ASCII characters as well as 32 graphics characters, bi-directional scrolling, and an expanded control character system. DEC produced a series of upgraded VT52's with additional hardware for various uses. The VT52 family was followed by the much more sophisticated VT100 in 1978. Description The VT50 supported asynchronous communication at baud rates up to 9600 bits per second and did not require any fill characters. Like other early DEC terminals, the VT50 series were equipped with both an RS-232 port as well as a 20mA current loop, an older serial standard used with teletype machines that was more suitable for transmission over long runs of twisted-pair wiring. Data was read into a small buffer, which the display hardware periodically read to produce the display. Characters typed on the keyboard were likewise stored in a buffer and sent over the serial line as quickly as possible. To interpret the commands being sent in the serial data, it used a primitive central processing unit (CPU) built from small-scale-integration integrated circuits. It examined the data while the display hardware was inactive between raster scan lines, and then triggered the display hardware to take over at the appropriate time. The display system returned control to the CPU when it completed drawing the line. The CPU was so basic that addition and subtraction could only be done by repeatedly incrementing or decrementing two registers. Moreover, the time taken by such a loop had to be nearly constant, or text lower on the screen would be displayed in the wrong place during that refresh. One notable feature of the VT50 was the introduction of a separate function keypad with the "Gold Key", which was used for editing programs like WPS-8, KED, and EDT. Pressing the Gold Key and then typing one of the keys on the keyboard sent a command sequence back to the host computer. DEC also offered an optional hard-copy device called an electrolytic copier, which fit into the blank panel on the right side of the display. This device was able to print, scan-line by scan-line, an exact replica of the screen onto a damp roll of special paper. It did this by electroplating metal from an electrode into the paper. The paper ran between two electrodes. The electrode on one side was a thin straight bar oriented across the paper width. The electrode on the other side was a thin helical bar wrapped around a rotating drum. One
https://en.wikipedia.org/wiki/VT05
"VT-05" can also refer to . The VT05 is the first free-standing CRT computer terminal from Digital Equipment Corporation introduced in 1970. Famous for its futuristic styling, the VT05 presents the user with an upper-case-only ASCII character display of 72 columns by 20 rows. The VT05 was a smart terminal that provides cursor addressing using a series of control characters, one of which allows the cursor to be positioned at an absolute location on the screen. This basic system provided the basis of similar systems in the later and greatly improved VT50 and VT52 series. The terminal only supports forward scrolling and direct cursor addressing; no fancier editing functions are supported. No special character renditions (such as blinking, bolding, underlining, or reverse video) are supported. The VT05 supports asynchronous communication at baud rates up to 2400 bits per second (although fill characters are required above 300 bits per second). Internally, the VT05 implements four "quad-sized" DEC modules in a standard form-factor DEC backplane. The cards are mounted nearly horizontally over an off-the-shelf CRT monitor. The terminal is 19" wide and 30" deep (much deeper than a typical desk). The keyboard used advanced capacitive sensors, but this proved to be unreliable and later keyboards use a simple four-contact mechanical switch. The VT05's dynamic storage is a PMOS shift register; the delays associated with manipulating data in the shift register result in the VT05 requiring fill characters after each line feed (as compared to contemporaneous hard copy terminals which require fill characters after each carriage return). The VT05 also has the capability of acting as a black-and-white RS-170-standard video monitor for videotape recorders, cameras, and other sources. The VT05 is equipped with a video input, and can superimpose its text over the displayed video, making it suitable for interactive video systems. The VT05 was eventually superseded by the VT50 which itself was quickly superseded by the VT52. Commands The VT05 has a limited command set: The screen can be cleared by sending HOME and then EOS. References External links VT100 net DEC VT05, Terminals Wiki DEC computer terminals VT005 Computer-related introductions in 1970
https://en.wikipedia.org/wiki/Cybergoth
Cybergoth is a subculture that derives from elements of goth, raver, rivethead and cyberpunk fashion. Opinion differs as to whether cybergoth has the requisite complexity to constitute a subculture, with some commentators suggesting that it is no more than a small aesthetic variation on cyberpunk or raver fashion. History The term 'Cybergoth' was coined in 1988 by Games Workshop, for their roleplaying game Dark Future, the fashion style did not emerge until the following decade. Valerie Steele quotes Julia Borden, who defines cybergoth as combining elements of industrial aesthetics with a style associated with "Gravers" (Gothic ravers). Gravers hybridized "the British Raver look and the German ClubKid look with a 'freak show' spin." as well as a fusion between German and Austrian styles. Borden indicates that initially the hair extensions and bright fishnets did not mesh well with goth fashion, but that by 2002 "the rave elements of dress were replaced by Industrial-influenced accessories, such as goggles, reflective clothing, and mostly black clothing." Steele summarizes: Nancy Kilpatrick indicates that David Bowie's look in the 1970s is the initial inspiration for the style, and that Fritz Lang's Metropolis provided the prototype for cyber aesthetics. Fashion Cybergoth fashion combines rave, rivethead, cyberpunk and goth fashion, as well as drawing inspiration from other forms of science fiction. Androgyny is common. The style sometimes features one starkly contrasting bright or neon-reactive theme color, such as red, blue, neon green, chrome, or pink, set against a basic, black gothic outfit. Matte or glossy black materials such as rubber and shiny black PVC can be mixed and matched in an effort to create a more artificial look. The black-and-monochromatic juxtaposition can take a variety of forms, including brightly colored hair and make-up, cybernetic patterns such as live LED circuit boards, body modification, gas masks and goggles (especially aviator-style), typically worn on the forehead or around the neck rather than on the eyes. The most common use of a theme color is in the hair or eye make-up. Artificial, extended hair or "falls" are sometimes used to create this added effect. Falls can be made of various materials, ranging from yarn to fluorescent tubing to electrical wiring. Popular club gear for cybergoths includes tight black pants, tight black vests or shirts cut from ripped, solid or fishnet fabrics, fluffies, resembling costumes from 19th Century Gothic novels or early black and white horror films from the mid-20th century. Companies that specialize in the style include Cyberdog (UK), DANE (UK), Pen & Lolly Clubwear (UK), Lip Service (US), and Diabolik (CA). Hair Cybergoth style incorporates extravagant hair pieces and styles, including synthetic dreadlocks (known as cyberlox), hair extensions and so on. These hair pieces can be made of a variety of materials, from real hair to synthetic kanekelon hair, plastic tubing,
https://en.wikipedia.org/wiki/WPS-8
WPS-8 is a Word Processing System sold by Digital Equipment Corporation for use with their PDP-8 processors (including the VT78, VT278 DECmate, and PC238 DECmate II and PC24P DECmate III microcomputer systems). WPS-8 supports a variety of 24 row by 80 or 132 column terminals including the VT52 family as well as the VT100 family and all subsequent ANSI-compatible terminals. A series of hierarchical menus allow the user to command the system; the particular style of these menus became very-widely used by Digital, particularly within their "ALL-IN-1" office system. Once a document is opened for editing, near WYSIWYG editing is provided using a ruler to indicate the text alignment and tab stops for any given portion of the text. A typical editing session might look like this: Text conformed to the preceding ruler (now offscreen). ----L----T-----------------------------T---------------------------------------------R---- Text conformed to the ruler shown just above L -> Left margin R -> Ragged-right margin T -> Left-aligned tab ---------L----------------------------->---------------------.-----------------------J---- > -> Right-aligned tab . -> Decimal-aligned tab J -> Justified right margin (not justified on screen, only on printout) Aligned with the right tab Decimal-point aligned $5.99 1279.99 Using these various rulers, complex formatting can be achieved, even using a simple input device like a 24x80 character terminal. On ANSI terminals, character attributes such as bold and underline are shown on the screen. On the VT52 terminals (which can not display attributes), the operator can perform the same functions but only the printout will reveal the formatting. As text is typed, the system automatically word-wraps the text so that it conforms to the ruler currently in effect for that section of the document. Rulers can be added or modified and the text from that ruler forward to the next will automatically be adjusted to conform to the new ruler. Hyphenation can be semi-automatically performed (including "hidden" hyphens that will only be revealed if a line break exposed them). Specialized editing functions are provided using the terminal keypad. A few functions can be commanded simply by pressing a keypad key, but a far wider range of functions can be commanded by prefixing them with the "Gold Key" (the PF1 key on the keypad, colored gold on systems equipped with the WPS-8 custom keycaps). This style of "gold key" editing also became standard at Digital, later showing up in mainstream general-purpose text editors such as KED and EDT as well as the "ALL-IN-1" office system. The editing facilities include making a selection and then using cut and paste (much like today's word processors, but using keys marked for cut and paste, rather than a mouse). Printing is to any of s
https://en.wikipedia.org/wiki/Sose
Sose, SOSE or SoSE may refer to: Acronyms Service-oriented software engineering, a software engineering methodology System of systems engineering (SoSE), a methodology People Sose Mayrig (1868–1953), Armenian Sosé Onasakenrat (1845–1881), Mohawk chief Other uses Sose International Film Festival, held in Yerevan, Armenia, since 2014
https://en.wikipedia.org/wiki/GNI
GNI may stand for: Global Network Initiative, an Internet freedom and privacy organization Grand Isle Seaplane Base, in Louisiana, United States Greater Nagoya Initiative, a Japanese business model project Gross national income Guniyandi language Lyudao Airport, in Taiwan
https://en.wikipedia.org/wiki/Fernbank%20Museum%20of%20Natural%20History
Fernbank Museum of Natural History, in Atlanta, Georgia, is a museum that presents exhibitions and programming about natural history. Fernbank Museum has a number of permanent exhibitions and regularly hosts temporary exhibitions in its expansive facility, designed by Graham Gund Architects. Giants of the Mesozoic, on display in the atrium of Fernbank Museum, features a long Argentinosaurus, the largest dinosaur ever classified; as well as a Giganotosaurus. The permanent exhibition, A Walk Through Time in Georgia, tells the twofold story of Georgia's natural history and the development of the planet. Fernbank Museum has won several national and international awards for one of its newest permanent exhibitions, Fernbank NatureQuest, an immersive, interactive exhibition for children that was designed and produced by Thinkwell Group. The awards NatureQuest has won include the 2012 Thea Award for Outstanding Achievement for a Museum Exhibit and the 2011 Bronze Award for Best Museum Environment from Event Design. The nearby Fernbank Science Center is a separate organization operated by the DeKalb County Board of Education and is not affiliated with Fernbank Museum of Natural History (Fernbank, Inc.). History In the late 1800s, a nature-lover named Emily Harrison grew up in an area east of Atlanta which she called "Fernbank". Along with others, Harrison created a charter for Fernbank in 1938 and purchased the of woodland on which Fernbank Museum now stands. In 1964, the Fernbank trustees and the DeKalb County School System created Fernbank Science Center, which led to a desire to share Fernbank's resources with the general public. Following master planning and designs by the Cambridge, Massachusetts-based architectural firm, Graham Gund Architects, ground was broken in 1989, and on October 5, 1992, Fernbank Museum of Natural History opened to the public. The new building is carefully located behind a row of historic houses, and features a glass-enclosed atrium overlooking Fernbank Forest. Fernbank Museum now stands on of the largest old-growth urban Piedmont forest in the country. Exhibits Fernbank Museum offers a variety of exhibits exploring many different natural history topics. Exhibits include: Fernbank NatureQuest Dinosaur Plaza Giants of the Mesozoic A Walk Through Time in Georgia Reflections of Culture Conveyed in Clay: Stories from St. Catherines Island Our Favorite Things World of Shells Fantastic Forces Sky High Star Gallery STEAM Lab The museum also has an area where special exhibitions are cycled through. These exhibits tend to stay open to the public for 2–4 months each. Outdoor exhibits In 2016, the museum opened WildWoods, an accessible 10-acre area located directly behind the museum with trails and interactive exhibits. In 2016 Fernbank also opened access to the newly restored, 65-acre Fernbank Forest. Giant screen theatre Fernbank is home to the Rankin M. Smith, Sr. Giant Screen Theater. Formerly an IMAX theater,
https://en.wikipedia.org/wiki/Sturm%27s%20theorem
In mathematics, the Sturm sequence of a univariate polynomial is a sequence of polynomials associated with and its derivative by a variant of Euclid's algorithm for polynomials. Sturm's theorem expresses the number of distinct real roots of located in an interval in terms of the number of changes of signs of the values of the Sturm sequence at the bounds of the interval. Applied to the interval of all the real numbers, it gives the total number of real roots of . Whereas the fundamental theorem of algebra readily yields the overall number of complex roots, counted with multiplicity, it does not provide a procedure for calculating them. Sturm's theorem counts the number of distinct real roots and locates them in intervals. By subdividing the intervals containing some roots, it can isolate the roots into arbitrarily small intervals, each containing exactly one root. This yields the oldest real-root isolation algorithm, and arbitrary-precision root-finding algorithm for univariate polynomials. For computing over the reals, Sturm's theorem is less efficient than other methods based on Descartes' rule of signs. However, it works on every real closed field, and, therefore, remains fundamental for the theoretical study of the computational complexity of decidability and quantifier elimination in the first order theory of real numbers. The Sturm sequence and Sturm's theorem are named after Jacques Charles François Sturm, who discovered the theorem in 1829. The theorem The Sturm chain or Sturm sequence of a univariate polynomial with real coefficients is the sequence of polynomials such that for , where is the derivative of , and is the remainder of the Euclidean division of by The length of the Sturm sequence is at most the degree of . The number of sign variations at of the Sturm sequence of is the number of sign changes–ignoring zeros—in the sequence of real numbers This number of sign variations is denoted here . Sturm's theorem states that, if is a square-free polynomial, the number of distinct real roots of in the half-open interval is (here, and are real numbers such that ). The theorem extends to unbounded intervals by defining the sign at of a polynomial as the sign of its leading coefficient (that is, the coefficient of the term of highest degree). At the sign of a polynomial is the sign of its leading coefficient for a polynomial of even degree, and the opposite sign for a polynomial of odd degree. In the case of a non-square-free polynomial, if neither nor is a multiple root of , then is the number of distinct real roots of . The proof of the theorem is as follows: when the value of increases from to , it may pass through a zero of some (); when this occurs, the number of sign variations of does not change. When passes through a root of the number of sign variations of decreases from 1 to 0. These are the only values of where some sign may change. Example Suppose we wish to find the number of roots
https://en.wikipedia.org/wiki/C89
C89 may refer to: Science and technology C89 (C version) or ANSI C, a C programming-language revision NGC 6087 (Caldwell catalogue: C89), an open cluster in the constellation Norma Other uses Ruy Lopez (ECO code: C60–C99), a chess opening Night Work (Women) Convention (Revised), 1948, an ILO convention Sylvania Airport (FAA LID), Wisconsin, US See also HMNZS Royalist (C89), a 1942 New Zealand Royal navy cruiser KNHC, a radio station in Seattle, Washington known as C89.5
https://en.wikipedia.org/wiki/Decompression
Decompression has several meanings, some of which are covered by several articles: Data decompression, the action of reversing data compression Decompression (physics), the release of pressure and the opposition of physical compression Decompression (altitude). the reduction of pressure and the related physiological effects due to increase in altitude or other equivalent reduction of ambient pressure below normal atmospheric pressure Uncontrolled decompression, catastrophic reduction of pressure in accidents involving pressure vessels such as aircraft Decompression (diving), the reduction in pressure and the process of allowing dissolved inert gases to be eliminated from the tissues during ascent from a dive Decompression (comics), in comic book storytelling, is the stylistic choice to tell a story mainly by visuals, with few words. Decompression (novel), a 2012 novel by Juli Zeh Decompression (surgery), a procedure used to reduce pressure on a compressed structure, such as spinal decompression Herniated disc decompression, a form of treatment for Spinal disc herniation, employed by chiropractors "Decompression" (The Outer Limits), an episode of the American television fiction series The Outer Limits Nerve decompression, a procedure to relieve direct pressure on a nerve Decompression (novel), a 2012 novel by Juli Zeh
https://en.wikipedia.org/wiki/Lithuanian%20Railways
Lithuanian Railways (), abbreviated LTG, is the national state-owned railway company of Lithuania. It operates most of the railway network in the country. It has several subsidiary companies, but the main ones are: LTG Link which provides passenger services, LTG Cargo which provides freight service, and LTG Infra which is responsible for the maintenance and development of the infrastructure. During 2022, Lithuanian Railways transported 4.69 million passengers and 31.0 million tonnes of freight; the majority of freight conveyed comprised oil products and fertilizers. History and structure Lietuvos Geležinkeliai was established in 1991 to operate the railways following the independence restoration. It provides numerous rail-related services, typically through its numerous subsidiary companies. While LTG Link is the provider for passenger services, while LTG Cargo is responsible for freight operations. Furthermore, another subsidiary, LTG Infra undertakes the maintenance and development of the railway infrastructure. In 2008, in response to the Polish oil company PKN Orlen plans to reroute freight from its Lithuanian refinery at Mažeikiai to the Latvian port of Ventspils, the Lithuanian Railways unilaterally and intentionally dismantled the cross-border line to Latvia to prevent this. In 2017, the European Commission (EC) issued a €27.87 million fine to the Lithuanian Railways for breaching European Union (EU) competition law by the track's removal. In 2020, the cross-border line and the freight service was restored at a cost of €9.4m. In May 2017, Lithuanian Railways was one of several companies that facilitated the launch of a new international tank container train service between Europe and China. In September of that same year, the first electrified cross-border trains started between Lithuania and Belarus. On 29 May 2018, the railway companies of the three Baltic states signed an agreement to launch a new intermodal freight service called Amber Train, linking Tallinn and Riga to the Lithuanian-Polish border at Šeštokai where they can be transhipped to the standard gauge network. EU funding was used to support some of these initiatives. During the late 2010s, there was a noticeable uptick in the volume of freight traffic traversing the Lithuanian rail network, along with corresponding increases in revenue. Between 2018 and 2019, the company's Freight Transport, Passenger Transport and Railway Infrastructure Directorates were reorganized into separate companies, comprising LG CARGO, LG Keleiviams, and Lietuvos geležinkelių infrastruktura. The holding company LTG Group was also established, it remained a state owned enterprise; any excess profits not reinvested into the organisation is paid out to the Lithuanian government. A new group logo, mirroring the colours of the Lithuanian flag and symbolising movement, was also adopted at this time. During late 2020, the reorganisation was hailed for bolstering the competitiveness of Lithuania's r
https://en.wikipedia.org/wiki/Helmholtz%20machine
The Helmholtz machine (named after Hermann von Helmholtz and his concept of Helmholtz free energy) is a type of artificial neural network that can account for the hidden structure of a set of data by being trained to create a generative model of the original set of data. The hope is that by learning economical representations of the data, the underlying structure of the generative model should reasonably approximate the hidden structure of the data set. A Helmholtz machine contains two networks, a bottom-up recognition network that takes the data as input and produces a distribution over hidden variables, and a top-down "generative" network that generates values of the hidden variables and the data itself. At the time, Helmholtz machines were one of a handful of learning architectures that used feedback as well as feedforward to ensure quality of learned models. Helmholtz machines are usually trained using an unsupervised learning algorithm, such as the wake-sleep algorithm. They are a precursor to variational autoencoders, which are instead trained using backpropagation. Helmholtz machines may also be used in applications requiring a supervised learning algorithm (e.g. character recognition, or position-invariant recognition of an object within a field). See also Autoencoder Boltzmann machine Hopfield network Restricted Boltzmann machine References External links http://www.cs.utoronto.ca/~hinton/helmholtz.html — Hinton's papers on Helmholtz machines https://www.nku.edu/~kirby/docs/HelmholtzTutorialKoeln.pdf - A tutorial on Helmholtz machines Artificial neural networks Hermann von Helmholtz
https://en.wikipedia.org/wiki/British%20Rail%20Class%20424
The British Rail Class 424 "Networker Classic" was a prototype electric multiple unit (EMU) built in 1997 by Adtranz at Derby Litchurch Lane Works from a Class 421 driving trailer vehicle. Project The "Networker Classic" concept involved rebuilding Mark 1 design Southern Region EMUs of Classes 411, 421 and 423 to meet current crashworthiness standards and have electric sliding doors instead of slam doors. This involved building a new bodyshell on the existing chassis, but keeping the original electrical and motor equipment. Therefore, the aim was to produce a 'new' unit at one quarter the cost of manufacturing a train from scratch. The rebuilt units would have had a life of at least fifteen years, thus saving considerable amounts of money when replacing old stock. The unit is known for its similar looks with the British Rail Class 168 and the British Rail Class 357, albeit using pocket doors more similar to the class subsequent classes 376 and 378, and unlike said trains used pocket doors for the driver cab doors, like those of the 1972 design and earlier Mark 3-derived units. Prototype One vehicle, no. 76112 from 'Phase 1' 4Cig unit 1749 was rebuilt as a prototype in 1997. This saw the original Mark 1 bodyshell removed from the chassis at Doncaster Works, and replaced with a new one at Derby Litchurch Lane Works resembling a then brand new Turbostar train installed. The controls from the 4Cig unit were retained in the driving cab. It was displayed to the public at London Victoria, paired with unrebuilt DT 76747 from 4Big unit 2256 for comparison purposes. The converted vehicle had a total capacity of 77 passengers in Standard Class only; had the full 4-car unit undergone the same conversion, then it would have had capacity for up to 310 passengers. The prototype unit had not carried passengers throughout its life, as the electric controls were unsuitable for the Class 424. Although Connex South Central had at one stage proposed ordering some, the train companies turned to new-build rolling stock, which saw the introduction of the Electrostar, Desiro and Juniper families. As a result, the single Class 424 vehicle was stored at Derby Litchurch Lane Works until 2012, when it was removed for disposal. The unrebuilt 4Cig trailer (unit 1399), which paired with the vehicle, was scrapped from the East Kent Railway after attempts of restoration failed. Fleet Details References External links Experimental Class 424, "Adtranz Classic" - Southern Electric Group Photograph at Derby Litchurch Lane Works in August 2011 424 Abandoned trains of the United Kingdom Train-related introductions in 1997 750 V DC multiple units Non-passenger multiple units
https://en.wikipedia.org/wiki/Sguil
Sguil (pronounced sgweel or squeal) is a collection of free software components for Network Security Monitoring (NSM) and event driven analysis of IDS alerts. The sguil client is written in Tcl/Tk and can be run on any operating system that supports these. Sguil integrates alert data from Snort, session data from SANCP, and full content data from a second instance of Snort running in packet logger mode. Sguil is an implementation of a Network Security Monitoring system. NSM is defined as "collection, analysis, and escalation of indications and warnings to detect and respond to intrusions." Sguil is released under the GPL 3.0. Tools that make up Sguil See also Sagan Intrusion detection system (IDS) Intrusion prevention system (IPS) Network intrusion detection system (NIDS) Metasploit Project nmap Host-based intrusion detection system comparison References External links Sguil Homepage Computer network security Linux security software Free network management software Software that uses Tk (software)
https://en.wikipedia.org/wiki/Fhourstones
In computer science, Fhourstones is an integer benchmark that efficiently solves positions in the game of Connect-4. It was written by John Tromp in 1996-2008, and is incorporated into the Phoronix Test Suite. The measurements are reported as the number of game positions searched per second. Available in both ANSI-C and Java, it is quite portable and compact (under 500 lines of source), and uses 50Mb of memory. The benchmark involves (after warming up on three easier positions) solving the entire game, which takes about ten minutes on contemporary PCs, scoring between 1000 and 12,000 kpos/sec. It has been described as more realistic than some other benchmarks. Fhourstones was named as a pun on Dhrystone (itself a pun on Whetstone), as "dhry" sounds the same as "drei", German for "three": fhourstones is an increment on dhrystones. References External links Fhourstones homepage Benchmarks (computing)
https://en.wikipedia.org/wiki/Don%20Hopkins
Don Hopkins is an artist and programmer specializing in human computer interaction and computer graphics. He is an alumnus of the University of Maryland and a former member of the University of Maryland Human–Computer Interaction Lab. He inspired Richard Stallman, who described him as a "very imaginative fellow", to use the term copyleft. He coined Deep Crack as the name of the EFF DES cracker. He ported the SimCity computer game to several versions of Unix and developed a multi player version of SimCity for X11, did much of the core programming of The Sims, and developed robot control and personality simulation software for Will Wright's Stupid Fun Club. He developed and refined pie menus for many platforms and applications including window managers, Emacs, SimCity and The Sims, and published a frequently cited paper about pie menus at CHI'88 with John Raymond Callahan, Ben Shneiderman and Mark Weiser. He has published many free software and open source implementations of pie menus for X10, X11, NeWS, Tcl/tk, ScriptX, ActiveX, JavaScript, OpenLaszlo, Python and OLPC, and also proprietary implementations for The Sims and the Palm Pilot. Hopkins also wrote demonstrations and programming examples of the ScriptX multimedia scripting language created by the Apple/IBM research spinoff Kaleida Labs, developed various OpenLaszlo applications and components, and is a hacker artist known for his artistic cellular automata. He is also known for having written a chapter "The X-Windows Disaster" on X Window System in the book The UNIX-HATERS Handbook. Micropolis Hopkins, supported by John Gilmore, adapted SimCity for the OLPC XO-1 laptop. The current version includes pie menus and is explained in depth in a video released by Hopkins. Since its primary objective is education, the OLPC project is looking not just for games, but for tools that enable kids to program their own games. Hopkins programmed Micropolis to make it easy to extend in many interesting ways. He added functionality to let kids create new disasters and agents (like the monster, tornado, helicopter and train), and program them like in many of the other games on the XO. The goals of deeply integrating SimCity with OLPC's Sugar user interface are to focus on education and accessibility for younger kids, as well as motivating and enabling older kids to learn programming. The Sims The Sims is a simulation video game developed by Electronic Arts. The games are known for their very loose guidelines and no specific user goals. They allow the users to simply exist in the virtual world they create. Don Hopkins became involved in The Sims after he worked at Sun Microsystems. The Sims were a theme in his work since then and he has contributed to much of the design and conceptual development of the game. He was hired to port The Sims to Unix. He implemented the usage of pie menus to the game so that users could efficiently carry out actions in the game world. References External links Living
https://en.wikipedia.org/wiki/Abdul%20Sattar%20Edhi
Abdul Sattar Edhi (; 28 February 1928 – 8 July 2016) was a Pakistani humanitarian, philanthropist and ascetic who founded the Edhi Foundation, which runs the world's largest ambulance network, along with homeless shelters, animal shelters, rehabilitation centres, and orphanages across Pakistan. Edhi's charitable activities expanded greatly in 1957 when an Asian flu epidemic (originating in China) swept through Pakistan and the rest of the world. Donations allowed him to buy his first ambulance the same year. He later expanded his charity network with the help of his wife Bilquis Edhi. Following his death, his son Faisal Edhi took over as head of the Edhi Foundation. Over his lifetime, the Edhi Foundation expanded, backed entirely by private donations from Pakistani citizens across class, which included establishing a network of 1,800 ambulances. By the time of his death, Edhi was registered as a parent or guardian of nearly 20,000 adopted children. He is known amongst Pakistanis as the "Angel of Mercy" and is considered to be Pakistan's most respected and legendary figure. In 2013, The Huffington Post claimed that he might be "the world's greatest living humanitarian". Edhi maintained a hands-off management style and was often critical of the corruption commonly found within the religious organizations, clergy and politicians. He was a strong proponent of religious tolerance in Pakistan and extended his support to the victims of Hurricane Katrina and the 1985 famine in Ethiopia. He was nominated several times for the Nobel Peace Prize. Edhi received several awards including the Ahmadiyya Muslim Peace Prize and the UNESCO-Madanjeet Singh Prize. He died in July 2016 and was buried with full state honours. Early life Edhi was a Gujarati Muhajir born into a Memon Muslim family in Bantva, in Gujarat, India. He publicly expressed that he was not a "very religious person", and that he was "neither for religion or against it". On his faith, he stated that he was a "humanitarian", telling others that "empty words and long phrases do not impress God" and to "show Him your faith" through action. His mother had brought him up teaching love and care for humans. The Edhi Foundation and Bilquis Edhi Trust Edhi resolved to dedicate his life to aiding the poor, and over the next sixty years, he single-handedly changed the face of welfare in Pakistan. He subsequently founded the Edhi Foundation. Edhi was known for his ascetic lifestyle, owning only two pairs of clothes, never taking salary from his organization and living in one room with kitchenette at the Foundation's headquarters in the heart of Karachi. Additionally, his previously established welfare trust, named the Edhi Trust was restarted with an initial sum of Rs.5000, the trust was later renamed after his wife as the Bilquis Edhi Trust. Widely regarded and respected as a guardian and savior for the poor, Edhi began receiving numerous donations which allowed him to expand his services. As of
https://en.wikipedia.org/wiki/Chris%20Pirillo
Chris Pirillo is an American entrepreneur and former television personality. He is the founder and former CEO of LockerGnome, Inc., a now-defunct network of blogs, web forums, mailing lists, and online communities which are now closed. He is best known as the former host of Call for Help, a call-in tech support show which, at the time, aired on TechTV. He hosted the show from 2001 to 2003. Career LockerGnome began as a technology mailing list in 1996, offering tips and tricks for operating systems and applications, software suggestions (with an emphasis on public domain and shareware software), and web site recommendations. Several mailing lists are now provided, offering technology advice and tips and other content syndicated from LockerGnome's blogs for IT Professionals. A web forum for help with and discussions about technology was run from 2002 to 2015. Pirillo is the author of several books, including Poor Richard's E-mail Publishing, Online! The Book with John C. Dvorak and Wendy Taylor. In March 2015, Pirillo announced he was resuming Gnomedex, but providing more of a fair or festival experience than as a single-track conference. In 2019, Pirillo joined Intel as a community advocate. References External links Living people American bloggers TechTV people 21st-century American non-fiction writers YouTubers Year of birth missing (living people)
https://en.wikipedia.org/wiki/The%20Complete%20U2
The Complete U2 is a digital box set by Irish rock band U2. It was released on 23 November 2004 by Apple Computer on the iTunes Store. It is the first major release of a purely digital online set by any artist. It contained the complete set of U2 albums, singles, live, rare and previously unreleased material from 1978 to 2004, with a total of 446 songs. This was accompanied by a PDF containing album art, track listings, and band commentary. In the US it originally retailed for $149.99, but a $50 coupon was included with the U2 Special Edition iPods from the fourth-generation iPod. The video-capable U2 iPods included a code for a 33-minute video of live band performances and interviews. As of 20 December 2007, the set is no longer available for sale. Disc list Digital box set-exclusive albums The following albums are only officially available as part of this set: Early Demos Early Demos is an EP containing three demos, produced by Barry Devlin and recorded at Keystone Studios in November 1978. These songs are the band's second recorded studio work. "Street Mission" and "The Fool" have not been on any other album. "Shadows and Tall Trees" was the final track on their first studio album Boy, released in 1980. Live from Boston 1981 Live from Boston 1981 is a live album recorded during U2's Boy Tour at Boston's Paradise Rock Club on . Some of the tracks on this album have been originally released on other singles previous to the release of this album. Live from the Point Depot Live from the Point Depot is the first official release of the band's widely bootlegged New Year's Eve show at Dublin's Point Depot in 1989. Unreleased & Rare Unreleased & Rare is a compilation of unreleased and rare tracks. Most of the previously unreleased songs were from the band's All That You Can't Leave Behind and How to Dismantle an Atomic Bomb sessions. The album Medium, Rare & Remastered, released in 2009, contains similar tracks. See also U2 discography List of U2 songs References External links Complete track listing of all 446 songs, with a discussion of excluded and redundant tracks Albums produced by Brian Eno Albums produced by Chris Thomas (record producer) Albums produced by Daniel Lanois Albums produced by Jacknife Lee Albums produced by Jimmy Iovine Albums produced by Martin Hannett Albums produced by Steve Lillywhite ITunes-exclusive releases U2 compilation albums U2 live albums U2 EPs 2004 live albums 2004 compilation albums Albums produced by Bono Albums produced by the Edge