source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/Cyclops64 | Cyclops64 (formerly known as Blue Gene/C) is a cellular architecture in development by IBM. The Cyclops64 project aims to create the first "supercomputer on a chip".
History
Cyclops64 is part of the Blue Gene effort, to produce the next several generations of supercomputers. The projects were started in response to the announced construction of the Earth Simulator.
Cyclops64 is a cooperative project between the United States Department of Energy (which is partially funding the project), the U.S. Department of Defense, industry (IBM in particular), and academia.
The architecture was conceived by Seymour Cray Award winner Monty Denneau, who is currently leading the project.
Architecture overview
Each 64-bit Cyclops64 chip (processor) will run at 500 megahertz and contain 80 processors. Each processor will have two thread units and a floating point unit. A thread unit is an in-order 64-bit RISC core with 32 kB scratch pad memory, using a 60-instruction subset of the Power ISA instruction set. Five processors share a 32 kB instruction cache.
The processors will be connected with a 96 port, 7 stage non-internally blocking crossbar switch. They will communicate with each other via global interleaved memory (memory that can be written to and read by all threads) in the SRAM.
The theoretical peak performance of a Cyclops64 chip is 80 gigaflops (this assumes a continuous stream of multiply–accumulate instructions, each of which are counted as two floating-point operations). A full system (consisting of 2 thread units per processor, 80 processors per chip, 1 chip per board, 48 boards per midplane, 3 midplanes per rack, and 96 (12 x 8) racks per system) would contain 13,824 C64 chips, consisting of 1,105,920 processors capable of running 2,211,840 concurrent threads.
Software
Cyclops64 exposes much of the underlying hardware to the programmer, allowing the programmer to write very high performance, finely tuned software. One negative consequence is that efficiently programming Cyclops64 is difficult.
The system is expected to support TiNy-Threads (a threading library developed at the University of Delaware) and POSIX Threads.
Design and fabrication
Verification testing and system software development is being done at the University of Delaware.
External links
Technical description of the Cyclops64 architecture and system software (Gzipped PostScript file)
Overviev of the architecture
A Detailed Analysis of the Architecture
IBM microprocessors |
https://en.wikipedia.org/wiki/Cyberia%20%28book%29 | Cyberia is a book by Douglas Rushkoff, published in 1994. The book discusses many different ideas revolving around technology, drugs and subcultures. Rushkoff takes a Tom Wolfe Electric Kool-Aid Acid Test style (or roman à clef), as he actively becomes a part of the people and culture that he is writing about. The book goes with Rushkoff as he discusses topics ranging from online culture, the concept of a global brain as put forth in Gaia theory, and Neoshamanism.
In the preface of the 1994 edition, Rushkoff describes his book as "about a very special moment in our recent history – a moment when anything seemed possible. When an entire subculture – like a kid at a rave trying virtual reality for the first time – saw the wild potentials of marrying the latest computer technologies with the most intimately held dreams and the most ancient spiritual truths. It is a moment that predates America Online, twenty million Internet subscribers, Wired magazine, Bill Clinton, and the information superhighway. But it is a moment that foresaw a whole lot more".
The book, with its introduction titled "Surfing the Learning Curve of Sisyphus," captures a pivotal moment in history when endless possibilities emerged. It delves into the lives and experiences of individuals who recognized the impending cultural shift into uncharted territory. People mentioned include: Craig Neidorf, Ralph Abraham, John Barlow, Dan Kottke, David Gans, Jaron Lanier, Bruce Eisner, Fraser Clark, Mitch Kapor, Phiber Optik, Howard Rheingold, R. U. Sirius, Terence McKenna, John Draper, Neysa "Earth Girl" Griffith, Genesis P-Orridge and Timothy Leary.
Rather than offering a comprehensive analysis of the entire cyber landscape, the book provides a guided exploration of select areas within this nascent culture, to which the author gained privileged access. The work is organized into five sections: "Computers: Revenge of the Nerds," "Drugs: The Substances of Designer Reality," "Technoshamanism: The Transition Team," "Cut and Paste: Artists in Cyberia," and "Warfare in Cyberia: Ways and Memes."
Rushkoff's first book was originally penned in 1992 but was not published until 1994 due to publisher concerns that electronic mail and the Internet were still obscure topics unlikely to gain traction. In Cyberia, Rushkoff emphasizes a "cyberian counterculture" out to redefine reality, where people begin to comprehend the systemic, cultural, and spiritual implications afforded by building a technological civilization. Armed with new technologies, familiar with cyberspace, and daring enough to explore unmapped realms of consciousness, his efforts in Cyberia represent the Promethean spirit intrinsic to countercultures throughout the ages.
References
External links
The full text of Cyberia used to be freely available on Rushkoff's website.
Non-fiction Cyberpunk media
1994 non-fiction books
1990s in Internet culture |
https://en.wikipedia.org/wiki/National%20Strategy%20to%20Secure%20Cyberspace | In the United States government, the National Strategy to Secure Cyberspace, is a component of the larger National Strategy for Homeland Security. The National Strategy to Secure Cyberspace was drafted by the Department of Homeland Security in reaction to the September 11, 2001 terrorist attacks. Released on February 14, 2003, it offers suggestions, not mandates, to business, academic, and individual users of cyberspace to secure computer systems and networks. It was prepared after a year of research by businesses, universities, and government, and after five months of public comment. The plan advises a number of security practices as well as promotion of cyber security education.
The National Strategy to Secure Cyberspace identifies three strategic objectives: (1) Prevent cyber attacks against America's critical infrastructures; (2) Reduce national vulnerability to cyber attacks; and (3) Minimize damage and recovery time from cyber attacks that do occur. To meet these objectives, the National Strategy outlines five national priorities: The first priority, the creation of a National Cyberspace Security Response System, focuses on improving the government's response to cyberspace security incidents and reducing the potential damage from such events. The second, third, and fourth priorities (the development of a National Cyberspace Security Threat and Vulnerability Reduction Program, the creation of a National Cyberspace Security Awareness and Training Program, the necessity of Securing Governments' Cyberspace) aim to reduce threats from, and vulnerabilities to, cyber attacks. The fifth priority, the establishment of a system of National Security and International Cyberspace Security Cooperation, intends to prevent cyber attacks that could impact national security assets and to improve the international management of and response to such attacks.
Ultimately, the National Strategy encourages companies to regularly review their technology security plans, and individuals who use the Internet to add firewalls and anti-virus software to their systems. It calls for a single federal center to help detect, monitor and analyze attacks, and for expanded cyber security research and improved government-industry cooperation.
Strategies formulated in cybersecurity discourse should be responsive and multi-pronged. The former focuses on flexible plans of actions that are developed and adapted in response to the changes and dynamics existing in the socio-technical systems. The latter focuses on the strategies that are developed by thoughtfully considering the interconnected elements, methods, and actors in these systems from several points of view or directions.
See also
Cyber-security regulation
National Security Directive
Notes
External links
National Strategy to Secure Cyberspace by the DHS
Statement by the Press Secretary on Conclusion of the Cyberspace Review, The White House, Press Office, April 17, 2009
NATO Cooperative Cyber Defence Centre of Exce |
https://en.wikipedia.org/wiki/R%2B%20tree | An R+ tree is a method for looking up data using a location, often (x, y) coordinates, and often for locations on the surface of the Earth. Searching on one number is a solved problem; searching on two or more, and asking for locations that are nearby in both x and y directions, requires craftier algorithms.
Fundamentally, an R+ tree is a tree data structure, a variant of the R tree, used for indexing spatial information.
Difference between R+ trees and R trees
R+ trees are a compromise between R-trees and kd-trees: they avoid overlapping of internal nodes by inserting an object into multiple leaves if necessary. Coverage is the entire area to cover all related rectangles. Overlap is the entire area which is contained in two or more nodes. Minimal coverage reduces the amount of "dead space" (empty area) which is covered by the nodes of the R-tree. Minimal overlap reduces the set of search paths to the leaves (even more critical for the access time than minimal coverage). Efficient search requires minimal coverage and overlap.
R+ trees differ from R trees in that: nodes are not guaranteed to be at least half filled, the entries of any internal node do not overlap, and an object ID may be stored in more than one leaf node.
Advantages
Because nodes are not overlapped with each other, point query performance benefits since all spatial regions are covered by at most one node. A single path is followed and fewer nodes are visited than with the R-tree.
Disadvantages
Since rectangles are duplicated, an R+ tree can be larger than an R tree built on same data set. Construction and maintenance of R+ trees is more complex than the construction and maintenance of R trees and other variants of the R tree.
Notes
References
T. Sellis, N. Roussopoulos, and C. Faloutsos. The R+-Tree: A dynamic index for multi-dimensional objects. In VLDB, 1987.
R-tree
Database index techniques
de:R-Baum |
https://en.wikipedia.org/wiki/R%2A-tree | In data processing R*-trees are a variant of R-trees used for indexing spatial information. R*-trees have slightly higher construction cost than standard R-trees, as the data may need to be reinserted; but the resulting tree will usually have a better query performance. Like the standard R-tree, it can store both point and spatial data. It was proposed by Norbert Beckmann, Hans-Peter Kriegel, Ralf Schneider, and Bernhard Seeger in 1990.
Difference between R*-trees and R-trees
Minimization of both coverage and overlap is crucial to the performance of R-trees. Overlap means that, on data query or insertion, more than one branch of the tree needs to be expanded (due to the way data is being split in regions which may overlap). A minimized coverage improves pruning performance, allowing exclusion of whole pages from search more often, in particular for negative range queries. The R*-tree attempts to reduce both, using a combination of a revised node split algorithm and the concept of forced reinsertion at node overflow. This is based on the observation that R-tree structures are highly susceptible
to the order in which their entries are inserted, so an insertion-built (rather than bulk-loaded) structure
is likely to be sub-optimal. Deletion and reinsertion of entries allows them to "find" a place in the tree
that may be more appropriate than their original location.
When a node overflows, a portion of its entries are removed from the node and reinserted into the tree. (In order to avoid an indefinite cascade of reinsertions caused by subsequent node overflow, the reinsertion
routine may be called only once in each level of the tree when inserting any one new entry.) This has the
effect of producing more well-clustered groups of entries in nodes, reducing node coverage. Furthermore,
actual node splits are often postponed, causing average node occupancy to rise. Re-insertion can be seen as a method of incremental tree optimization triggered on node overflow.
Performance
Improved split heuristic produces pages that are more rectangular and thus better for many applications.
Reinsertion method optimizes the existing tree but increases complexity.
Efficiently supports point and spatial data at the same time.
Algorithm and complexity
The R*-tree uses the same algorithm as the regular R-tree for query and delete operations.
When inserting, the R*-tree uses a combined strategy. For leaf nodes, overlap is minimized, while for inner nodes, enlargement and area are minimized.
When splitting, the R*-tree uses a topological split that chooses a split axis based on perimeter, then minimizes overlap.
In addition to an improved split strategy, the R*-tree also tries to avoid splits by reinserting objects and subtrees into the tree, inspired by the concept of balancing a B-tree.
Worst case query and delete complexity are thus identical to the R-Tree. The insertion strategy to the R*-tree is with more complex than the linear split strategy () of the R |
https://en.wikipedia.org/wiki/Francis%20Y.%20L.%20Chin | Francis Yuk Lun Chin ) is an emeritus professor at the University of Hong Kong after having retired as professor of computer science and Taikoo Professor of Engineering at the University of Hong Kong. Chin served as head of the Computer Science Department from its start until 1999. In 2018, he and his wife founded a start-up named DeepTranslate Limited currently based in the Hong Kong Science and Technology Parks. DeepTranslate provides AI-assisted machine translation services, mainly for financial documents.
Academic career
Chin graduated from the University of Toronto in 1972 and received a doctorate from Princeton University in 1976. Before his appointment in Hong Kong, he held a variety of teaching positions in a number of universities in the US and Canada.
Chin was recruited to head the Computer Science Department at the University of Hong Kong. He is also the Managing Editor of the International Journal of the Foundations of Computer Science and is also a member of the editorial boards of a number of other journals.
In 1996, he was named a fellow of the IEEE.
Government service
Chin was the project leader for a study commissioned by a Select Committee of the Legislative Council of Hong Kong into the cause of delays to the start of operation of the new Hong Kong International Airport at Chep La Kok. In 2001, he was seconded to act as the interim CEO of the Hong Kong Domain Name Registration Company.
He has also served on a range of Hong Kong government committees including:
the Innovation and Technology Fund Vetting Committee;
a variety of committees on research grants and university funding committees ;
the Information Infrastructure Advisory Committee of the information Technology and Broadcasting Committee; and
the Promotion and Monitoring Sub-committee of the Quality Education Fund.
Research interests
Chin's interests include Bioinformatics, Computer Vision, the Design and Analysis of Algorithms
Motif-finding software packages
Security
Publications
Henry Leung and Francis Chin, "Finding Exact Optimal Motif in Matrix Representation by Partitioning", Proceedings of the 4th European Conference on Computational Biology (ECCB05), (Oct /Nov 2005) (accepted) also to be appeared in Bioinformatics
Henry Leung and Francis Y.L. Chin, "Generalized Planted (l,d)-Motif Problem with Negative Set", Proceedings of the 5th Workshop on Algorithms in Bioinformatics (WABI 2005), (October 2005) (accepted)
Francis Y.L. Chin and Henry C.M. Leung, "Voting Algorithms for Discovering Long Motifs", Proceedings of the Third Asia-Pacific Bioinformatics Conference (APBC2005), 261-271 (January 2005)
Francis Y.L. Chin, Qiangfeng Zhang and Hong Shen, "k-Recombination Haplotype Inference in Pedigrees", Proceedings of the 2005 International Workshop on Bioinformatics Research and Applications (in ICCS 2005), 985-993,(May 22–25, 2005)
Qiangfeng Zhang, Francis Y.L. Chin and Hong Shen, "Minimum Parent-Offspring Recombination Haplotype Inference in Pedigrees", LNCS |
https://en.wikipedia.org/wiki/Integrity%20%28operating%20system%29 | INTEGRITY and INTEGRITY-178B are real-time operating systems (RTOSes) produced and marketed by Green Hills Software.
INTEGRITY
INTEGRITY is POSIX-certified and intended for use in embedded systems of 32-bits or 64-bits. Supported computer architectures include variants of: ARM, Blackfin, ColdFire, MIPS, PowerPC, XScale, and x86. INTEGRITY is supported by popular SSL/TLS libraries such as wolfSSL.
INTEGRITY-178B
INTEGRITY-178B is the DO-178B–compliant version of INTEGRITY. It is used in several military jets such as the B-2, F-16, F-22, and F-35, and the commercial aircraft Airbus A380. Its kernel design guarantees bounded computing times by eliminating features such as dynamic memory allocation.
The auditing and security engineering abilities have allowed it to obtain the Evaluation Assurance Level (EAL) 6 rating by the National Security Agency (NSA). The Target of Evaluation (TOE) Architecture in the Security Target for the evaluation excludes components such as those for file system and networking, from the definition of the TOE, focusing almost solely on the core kernel. Other operating systems, such as Windows, macOS or Linux, though evaluated at lower levels of assurance, generally include these abilities within their TOE.
Supported processor architectures
The INTEGRITY Architecture Support Package (ASP) provides support for many processor families:
PowerPC/Power ISA
AMD and Intel: x86
ARM Holdings: ARM
MIPS
References
External links
INTEGRITY-178B
ARM operating systems
Embedded operating systems
Microkernel-based operating systems
Microkernels
MIPS operating systems
PowerPC operating systems
Proprietary operating systems
Real-time operating systems |
https://en.wikipedia.org/wiki/R%C3%B3bert%20Szelepcs%C3%A9nyi | Róbert Szelepcsényi (; born 19 August 1966, Žilina) is a Slovak computer scientist of Hungarian descent and a member of the Faculty of Mathematics, Physics and Informatics of Comenius University in Bratislava.
His results on the closure of non-deterministic space under complement, independently obtained in 1987 also by Neil Immerman (the result known as the Immerman–Szelepcsényi theorem), brought the Gödel Prize of ACM and EATCS to both of them in 1995.
Scientific articles
Róbert Szelepcsényi: The Method of Forced Enumeration for Nondeterministic Automata. Acta Informatica 26(3): 279-284 (1988)
References
Slovak computer scientists
Hungarian computer scientists
20th-century Hungarian mathematicians
21st-century Hungarian mathematicians
Theoretical computer scientists
Comenius University alumni
Gödel Prize laureates
Hungarians in Slovakia
Slovak people of Hungarian descent
Living people
1966 births |
https://en.wikipedia.org/wiki/KDE%20on%20Cygwin | KDE on Cygwin is the port of K Desktop Environment 1, 2, and 3 and the corresponding versions of the Qt toolkit to the Windows Operating System by using Cygwin, a POSIX emulation layer.
KDE on Cygwin helps Windows computers to run applications originally created for Qt and KDE, by providing the applications with the necessary dependencies in a transparent manner.
The project is no longer being developed as since 2009 there exists a natively-compiled version of KDE SC 4 for Windows.
History
The project was started by Ralf Habacker in May 2001. Its goal was to ensure compatibility of major programs that were originally only available by using a Linux distribution.
After cessation of active development of KDE on Cygwin, the efforts to provide the KDE environment on Windows continue with the KDE Windows Initiative.
Ported Software
As with many emulation examples, not all the common KDE programs are guaranteed to work unmodified on KDE on Cygwin due to the complex interaction of all the libraries needed. The open-source nature of KDE and several of the programs running on it, allows some of these shortcomings to be found and circumvented.
The project has ported various Qt and KDE versions, and are considered of beta quality.
Qt
1.45
2.3.1
3.0.4
3.1.1
3.2.3
K Desktop Environment
1.45
2.2.2
3.1.1
3.1.4
References
External links
KDE on Cygwin homepage
Cygwin official homepage
KDE homepage
KDE |
https://en.wikipedia.org/wiki/Neil%20Immerman | Neil Immerman (born 24 November 1953, Manhasset, New York) is an American theoretical computer scientist, a professor of computer science at the University of Massachusetts Amherst. He is one of the key developers of descriptive complexity, an approach he is currently applying to research in model checking, database theory, and computational complexity theory.
Professor Immerman is an editor of the SIAM Journal on Computing and of Logical Methods in Computer Science. He received B.S. and M.S. degrees from Yale University in 1974 and his Ph.D. from Cornell University in 1980 under the supervision of Juris Hartmanis, a Turing Award winner at Cornell. His book Descriptive Complexity appeared in 1999.
Immerman is the winner, jointly with Róbert Szelepcsényi, of the 1995 Gödel Prize in theoretical computer science for proof of what is known as the Immerman–Szelepcsényi theorem, the result that nondeterministic space complexity classes are closed under complementation. Immerman is an ACM Fellow and a Guggenheim Fellow.
References
External links
Immerman's home page at U. Mass. Amherst
American computer scientists
Cornell University alumni
Fellows of the Association for Computing Machinery
Gödel Prize laureates
University of Massachusetts Amherst faculty
Living people
Theoretical computer scientists
People from Manhasset, New York
Scientists from New York (state)
1953 births |
https://en.wikipedia.org/wiki/Hellenic%20Quest | Hellenic Quest is a 2008 urban legend claiming that engineers were developing supercomputers that would use Ancient Greek as their programming interface, due to its logical superiority over all other languages.
History
The hoax circulated around Greek website and was widely reproduced without verification by many reputable sources from newspapers to the then Minister for National Education and Religious Affairs. The hoax was presented as a fake CNN article reporting that Apple was developing a software product for teaching the Ancient Greek language to foreigners and scientists, in the light of the upcoming development of supercomputers that will use Ancient Greek as their programming interface, due to this language's superior logical structure. The urban legend often attributes this quote to Bill Gates. A prototype computer that was allegedly under development as part of this project was called "Ibycus".
The text contains a number of factual errors, unproved assertions and exaggerations. The origin of this hoax is not clear. The author probably uses CNN and Apple Computer as a means to give more credibility to the story. The story is sometimes enhanced with linguistic-sounding arguments. It also has several obscure references to the Thesaurus Linguae Graecae project, a project undertaken by the University of California, Irvine for the purpose of digitizing all ancient and medieval Greek texts. The computer prototype "Ibycus", is the operating system implemented by David W. Packard in the early 1980s to search and browse TLG texts represented in beta code. There is no connection between Ibycus and the so-called "Hellenic Quest."
The Ancient Greek language (or any other language) has nothing to do with the binary logic that forms the basis of computers' function. Even advanced concepts in computation, such as fuzzy logic, knowledge-based systems and quantum computation have absolutely no use whatsoever for the extreme expressiveness of any of the world's languages anyway, "rich and powerful" as they may be characterized; the notions understood by computers are very basic.
Urban legend spread
The hoax was reproduced by many reputable sources like the newspaper Imerisia, the Embassy of Greece in Washington, and the Hellenic Physical Society. On January 27, 2008, the Minister for National Education and Religious Affairs of Greece, Evripidis Stylianidis, reproduced the hoax in his opening speech for the finals of the annual student debate competition, in an attempt to praise the Greek language superiority. The event took place at the old Greek parliament and it was subject to criticism by the press.
Notes
External links
Museum of Hoaxes
TLG
Technical note on beta code
Κείμενο για το Hellenic Quest
Συλλογή αστικών μύθων για την ελληνική γλώσσα (Tumblr collection of online urban myths about Greek, in Greek)
Greek language
Internet hoaxes |
https://en.wikipedia.org/wiki/Big%20Hero%206%20%28comics%29 | Big Hero 6 is a superhero team appearing in American comic books published by Marvel Comics and created by Man of Action.
In 2014, Walt Disney Animation Studios produced the computer-animated film Big Hero 6, inspired by the characters. In 2017, a television series based on the film, titled Big Hero 6: The Series, premiered. The characters also appeared in the video game Kingdom Hearts III in the San Fransokyo world.
Publication history
Created by Steven T. Seagle and Duncan Rouleau, Big Hero 6 was first intended to appear in Alpha Flight #17 (Dec. 1998). Instead, the team appeared in their own self-titled, three-issue miniseries by writer Scott Lobdell and artist Gus Vasquez. However, due to scheduling complications, the miniseries was published prior to Alpha Flight #17.
The team appears in Alpha Flight #9 (Jan. 2005).
The team also appears in a subsequent five-issue miniseries, which was launched by Marvel Comics in September 2008.
The characters were licensed to IDW Publishing for Big Hero 6: The Series in 2019.
Fictional team biography
In the original comics, the Japanese government needed a team of state-sanctioned superheroes, so they consulted the "Giri", a top-secret consortium of politicians and business entities. The Giri was formed to recruit and train potential individuals for "Big Hero 6", a team of superhuman operatives. Despite reservations by some members of the Giri, Silver Samurai, a freelance ronin and former bodyguard of the terrorist Viper, was appointed as the team's field commander. Secret agent Honey Lemon, inventor of the nanotechnology-based Power Purse from which she can access any object, also agreed to join the team. The tough-talking GoGo Tomago, able to transubstantiate her body into a fiery force blast by uttering her code name, was released from prison on the condition that she serve on the team. Finally, the Machiavellian bureaucrat known only as Mr. Oshima is appointed as the Giri's spokesperson and coordinates the team's activities.
Government scientists then identified 13-year-old boy genius Hiro Takachiho as a potential operative. Unimpressed with the Silver Samurai, Hiro declines joining the team until his mother is kidnapped by the Everwraith, the astral embodiment of all those killed in the 1945 nuclear attacks on Hiroshima and Nagasaki. Hiro creates Baymax, a synthetic bodyguard capable of transforming into a dragon, using the brain engrams of his dead father. With Baymax, Hiro reluctantly joins forces with the Big Hero 6 to prevent the Everwraith from slaughtering millions in downtown Tokyo. During the battle, Big Hero 6 is joined by Sunfire, Japan's premier superhero, who is a mutant with the ability to heat matter into plasma. Sunfire becomes instrumental in the Everwraith's defeat.
Soon afterwards, Big Hero 6 moves their headquarters from the Giri office building to Japan's Cool World Amusement Park. Here they are attacked by X the Unknowable, a monster born from a child's drawings who is ca |
https://en.wikipedia.org/wiki/Black%20screen%20of%20death | The black screen of death is a fatal system error displayed by some versions of the Microsoft Windows operating system after encountering a critical system error.
Windows 3.x
In Windows 3.x the black screen of death is the behavior that occurred when a DOS-based application failed to execute properly. It was often known to occur in connection with attempting certain operations while networking drivers were resident in memory. (Commonly, but not exclusively, it was seen while the Novell NetWare client for DOS, NETX, was loaded.).
The issue was fixed in most instances by adding an additional section in the SYSTEM.INI of affected clients with the text TimerCriticalSection = 10000. The following files were also updated, vtdapi.386re.386 and vipx.38id-1991 by Ed Brown, a technician with the Coca-Cola Company's IT department in Atlanta, GA. He reports that the company was rolling out Windows 3.0 within the Global Marketing group and when the users would attempt to run WordPerfect, they would receive a black screen. This is also just a black screen.
Later versions of Windows
MS-DOS, Windows 95, Windows 98, Windows 2000, Windows Me, Windows XP, Windows Vista, Windows 7, and Windows 8 also display a Black Screen of Death when the operating system cannot boot. There are many different causes for this problem to occur, and each one requires a different solution. At least two of these causes and solutions are in the public domain.
For instance, the failure is sometimes caused by a missing file. This also occurs when the user enables file compression on all the files and the operating system compresses. Rarely an experienced user must reinstall Windows. In the case of a missing file, the boot screen will most likely inform the user the name of the missing file. In the case of operating system compression, the computer will not be able to boot, even into safe mode. However, booting from another device and uncompressing the files will usually solve this particular case of problem.
In late 2009, several new reports of the Black Screen of Death in Windows XP, Windows Vista, and Windows 7 emerged. At first, several claims pointed at Windows Update. This was later recanted by Prevx as an erroneous report. Microsoft reported that no security update was causing the issue, and may be tied to malware. In other cases, the black screen was replaced with a blue screen of death. A Black Screen of Death may also be caused by certain components of the computer overheating, in place of the traditional blue screen, that appeared to indicate a Stop error. This black screen was simplified compared to the previous blue screen, omitting instructions that the user is recommended to take.
Windows 10 also displays a black screen of death due to an unfinished update in addition to the aforementioned causes above; in the former case, the system restarts after the update and the user is presented with the login screen, however after logging in the user is stuck with another blac |
https://en.wikipedia.org/wiki/NIPRNet | The Non-classified Internet Protocol (IP) Router Network (NIPRNet) is an IP network used to exchange unclassified information, including information subject to controls on distribution, among the private network's users. The NIPRNet also provides its users access to the Internet.
It is one of the United States Department of Defense's three main networks. The others include SIPRNet and JWICS.
History
NIPRNet is composed of Internet Protocol routers owned by the United States Department of Defense (DOD). It was created in the 1980s and managed by the Defense Information Systems Agency (DISA) to supersede the earlier MILNET.
Security improvements
In the year leading up to 2010 NIPRNet has grown faster than the U.S. Department of Defense can monitor. DoD spent $10 million in 2010 to map out the current state of the NIPRNet, in an effort to analyze its expansion, and identify unauthorized users, who are suspected to have quietly joined the network. The NIPRNet survey, which uses IPSonar software developed by Lumeta Corporation, also looked for weakness in security caused by network configuration. The Department of Defense has made a major effort in the year leading up to 2010, to improve network security. The Pentagon announced it was requesting $2.3 billion in the 2012 budget to bolster network security within the Defense Department and to strengthen ties with its counterparts at the Department of Homeland Security.
Alternative names
SIPRNet and NIPRNet are referred to colloquially as SIPPERnet and NIPPERnet (or simply sipper and nipper), respectively.
See also
Classified website
SIPRNet
RIPR
Joint Worldwide Intelligence Communications System (JWICS)
Intellipedia
Protective distribution system
NATO CRONOS
References
External links
DISA
Army and Defense Knowledge Online
Wide area networks
Cryptography |
https://en.wikipedia.org/wiki/Carl%20Herbert%20Smith | Carl Herbert Smith (1950–2004) was an American computer scientist. He was a pioneer in computational complexity theory and computational learning theory.
Smith was program manager of the National Science Foundation's theoretical computer science program, and editor of the International Journal of the Foundations of Computer Science, Theoretical Computer Science, and Fundamenta Informaticae. He held professorships at Purdue University and the University of Maryland, College Park. He organized the first conferences on computational learning in the U.S. in the 1980s. He earned a PhD from the State University at Buffalo in 1979, and received Habilitation degree from the University of Latvia in 1993. He was a member of the Latvian Academy of Sciences.
He was the author of the popular textbooks Theory of Computation: A Gentle Introduction and A Recursive Introduction to the Theory of Computation.
American computer scientists
1950 births
2004 deaths
University of Latvia alumni
University at Buffalo alumni |
https://en.wikipedia.org/wiki/Transportation%20in%20Salt%20Lake%20City | Transportation in Salt Lake City consists of a wide network of roads, an extensive bus system, a light rail system, and a commuter rail line. Although Salt Lake City, Utah, is a traditionally car-oriented city (as are most other cities in the western United States), the rapidly growing public transit system has a high number of riders for a city of its size, and public transit is widely supported by its residents and businesses.
Nearly all public transit in the city is operated by the Utah Transit Authority. In addition to operating the bus system, it also operates the TRAX light rail system, which contains three lines, the first of which runs from downtown south to Draper, the second runs from University of Utah southwest to South Jordan, and the third from the Salt Lake City International Airport east through downtown and then southwest to West Valley City. A commuter rail line, called the FrontRunner, runs north through Davis County to Ogden in central Weber County and south to Provo in central Utah County. UTA also operates a streetcar line that connects the Sugar House neighborhood with the TRAX system in South Salt Lake. The road system is also extensive, with three interstate highways, two additional state freeways, a limited-access highway, and a third state freeway under development/construction. However, the geographic constrictions of the Salt Lake Valley, as well as its rapid population growth, have led to severe congestion problems.
Roads
Two major interstate highways, Interstate 15 and Interstate 80, intersect just west of downtown. I-15 comes in from the north end of the state, through Davis County, and heads straight south through the Salt Lake Valley and on through Utah County to leave the state on its southwest corner. I-80 comes in from the west side of the state, through Tooele County and passes the Salt Lake City International Airport before merging with I-15 west of downtown. The merge continues south for about before I-80 continues east. It passes through largely residential areas through northern South Salt Lake and the Sugar House neighborhood of Salt Lake City before ascending Parley's Canyon, passing through Summit County, and leaving the state on its northeast corner.
Interstate 215, known as the "Belt Route", forms a 270° loop around Salt Lake City and its first-ring suburbs. It enters the Rose Park neighborhood in northwestern Salt Lake City from Davis County (where it recently split from I-15) and continues south, intersecting I-80 and State Route 201 before turning east in Taylorsville, intersecting I-15 in Murray, and turning north in Holladay. From there it parallels the Wasatch Range through the affluent residential eastern suburbs before ending at I-80 at the mouth of Parley's Canyon. This belt route largely serves as a commuter route for the suburbs.
The 2002 Winter Olympics prompted an urgent acceleration of the already planned massive overhaul of I-15, from 600 North in Salt Lake City to 10600 South in |
https://en.wikipedia.org/wiki/Malton%20GO%20Station | Malton GO Station is a train and bus station in the GO Transit network, located near Toronto Pearson International Airport, in the community of Malton in Mississauga, Ontario, Canada. It is a stop on the Kitchener line, and is a flag stop for Via Rail trains operating between Toronto, London and Sarnia.
History
The original site of Malton railway station was approximately west of the current GO Transit facility, where Scarboro Street crosses the tracks. The first station was a wood-frame structure built in 1856 by the Grand Trunk Railway (GTR), which was superseded by a second frame building in 1912. Ownership of the station was transferred to Canadian National Railway in 1920 when they acquired the GTR and they demolished that station in 1973.
GO Transit constructed a completely new building and platforms, south of Derry Road and east of Airport Road, for the introduction of GO Train service in 1974.
The International Limited was operated jointly by Via Rail and Amtrak between Chicago and Toronto. The service operated from 1982–2004.
Metrolinx, the parent of GO Transit, purchased the Weston Subdivision from Canadian National Railway in 2009, including this section of track. CN will continue to serve its freight customers in the area and VIA will operate trains on the line.
Recent station renovations included improvements such as new walkways and a tunnel for pedestrian access to new platforms which have canopies rather than shelters, and expansion of the parking lot. The previous basic brick building has also been replaced by a new structure which offers improved facilities. The addition of elevators has now made the station fully accessible.
Bus connections
31 Guelph - Georgetown - Brampton - Toronto GO Bus intermediate stops between Guelph Central Station, Georgetown GO Station, Brampton GO Station and Union Station Bus Terminal
38 Bolton GO Bus to Bolton
30 Rexdale (MiWay)
505 Züm Bovaird (Züm)
The local MiWay bus routes do not enter the station bus loop and can be boarded a short distance away at Derry Road, which consists of Routes 18 and 42.
The local Brampton Transit bus routes do not enter the station bus loop and can be boarded a short distance away at Derry Road, which consists of Route 14/A.
References
External links
VIA Rail Canada, Malton train station page
GO Transit railway stations
Railway stations in Mississauga
Railway stations in Canada opened in 1974
1974 establishments in Ontario
Former Amtrak stations in Canada |
https://en.wikipedia.org/wiki/Shenzhen%20Metro | The Shenzhen Metro () is the rapid transit system for the city of Shenzhen in Guangdong province, China. Extensions opened on 28 December 2022 put the network at of trackage, operating on 16 lines with 369 stations.
Shenzhen Metro is the 4th longest metro system in China and 4th longest in the world as of that date despite having only opened on 28 December 2004. By 2035 the network is planned to comprise 8 express and 24 non-express lines totaling of trackage.
Current system
Currently the network has of route, operating on 16 lines with 369 stations. Line 1, Line 4 and Line 10 run to the border crossings between the Shenzhen Special Economic Zone and the Hong Kong Special Administrative Region at Luohu/Lo Wu and Futian Checkpoint/Lok Ma Chau, where riders can transfer to Hong Kong's MTR East Rail line for travel onwards to Hong Kong.
Line 1
Line 1, formerly known as Luobao line, runs westward from Luohu to Airport East. Trains operate every 2 minutes during peak hours and every 4 minutes at other times. The line is operated by SZMC (Shenzhen Metro Group). Line 1's color is green.
28 December 2004: Luohu – Window of the World
28 September 2009: Window of the World – Shenzhen University
15 June 2011: Shenzhen University – Airport East
Line 2
Line 2, formerly known as Shekou line, runs from Chiwan to Liantang. Line 2 is connected with Line 8 at Liantang station. The line is operated by SZMC (Shenzhen Metro Group). Line 2's color is orange, the same as Line 8.
28 December 2010: Chiwan – Window of the World
28 June 2011: Window of the World – Xinxiu
28 October 2020: Xinxiu – Liantang
Line 3
Line 3, formerly known as Longgang line, runs from Futian Bonded Area to Shuanlong in Longgang, in the north-east part of the city. Construction began on 26 December 2005. The line is operated by Shenzhen Metro Line 3 Operations, which has been a subsidiary of SZMC (Shenzhen Metro Group) since 11 April 2011 when an 80% stake was transferred to SZMC. Line 3's color is sky blue.
28 December 2010: Caopu – Shuanglong
28 June 2011: Yitian – Caopu
28 October 2020: Futian Bonded Area – Yitian
Line 4
Line 4, formerly known as Longhua line, runs northward from Futian Checkpoint to Niuhu. Trains operate every 2.5 minutes at peak hours and every 6 minutes during off-peak hours. Stations from Futian Checkpoint to Shangmeilin Station are underground. The line has been operated by MTR Corporation (Shenzhen), a subsidiary of MTR Corporation, since 1 July 2010. Line 4's color is red.
28 December 2004: Fumin – Children's Palace
28 June 2007: Futian Checkpoint – Fumin
16 June 2011: Children's Palace – Qinghu
28 October 2020: Qinghu – Niuhu
Line 5
Line 5, formerly known as Huanzhong line, runs from Chiwan in the west to Huangbeiling in the east. Construction began in May 2009 and the line opened on 22 June 2011. Line 5 required a total investment of 20.6 billion RMB. The line is operated by SZMC (Shenzhen Metro Group). Line 5's color is purple.
22 J |
https://en.wikipedia.org/wiki/WCBS-TV | WCBS-TV (channel 2) is a television station in New York City, serving as the flagship of the CBS network. It is owned and operated by the network's CBS News and Stations division alongside Riverhead, New York–licensed independent station WLNY-TV (channel 55). Both stations share studios within the CBS Broadcast Center on West 57th Street in Midtown Manhattan, while WCBS-TV's transmitter is located at One World Trade Center.
History
Early years (1931–1951)
WCBS-TV's history dates back to CBS' opening of experimental station W2XAB on July 21, 1931, using the mechanical television system that had been more-or-less perfected in the late 1920s. Its first broadcast featured New York Mayor Jimmy Walker, Kate Smith, and George Gershwin. The station had the first regular seven-day broadcasting schedule in American television, broadcasting 28 hours a week. Among its early programming were Harriet Lee (1931), The Television Ghost (1931–1933), Helen Haynes (1931–1932), and Piano Lessons (1931–1932). Because W2XAB was broadcasting its video on 2750 kc and audio separately on W2XE at 6120 kc in the shortwave band in 1931, the experimental station's signal could be received in nearby states beyond the New York metropolitan area, as far away as Boston and Baltimore. In Allentown, Pennsylvania, some distant, the local newspaper even listed W2XAB's daily program schedules, for example, as did the Ithaca Journal in upstate New York, northwest.
Announcer-director Bill Schudt was the station's only paid employee; all other staff were volunteers. W2XAB pioneered program development including small-scale dramatic acts, monologues, pantomime, and the use of projection slides to simulate sets. Engineer Bill Lodge devised the first synchronized sound wave for a television station in 1932, enabling W2XAB to broadcast picture and sound on a single shortwave channel instead of the two previously needed. On November 8, 1932, W2XAB broadcast the first television coverage of presidential election returns. The station suspended operations on February 20, 1933, as monochrome television transmission standards were in flux, and in the process of changing from the limited mechanical operation to an all-electronic system. W2XAB returned with an all-electronic system in 1939 from a new studio complex in Grand Central Station and a transmitter located at the Chrysler Building broadcasting on channel 2. W2XAB transmitted the first color broadcast in the United States on August 28, 1940, although it was not black and white compatible.
On June 24, 1941, W2XAB received a commercial construction permit and program authorization as WCBW. The station went on the air at 2:30 p.m. on July 1, one hour after rival WNBT (channel 1, formerly W2XBS), making it the second authorized fully commercial television station in the United States. The Federal Communications Commission (FCC) issued permits to CBS and NBC at the same time and intended WNBT and WCBW to sign on simultaneously on July 1, s |
https://en.wikipedia.org/wiki/Puppets%20Who%20Kill | Puppets Who Kill is a Canadian television comedy series produced by PWK Productions and originally broadcast on The Comedy Network. It premiered in Canada in 2002, and in Australia on The Comedy Channel in 2004. It has also been broadcast in India, South Korea and Germany. The series was on the digital network Hulu and is currently on CON TV and Tubi in the United States.
PWK began as a one-man live theatre show written and performed by comedian/puppeteer John Pattison at the Toronto Fringe Festival in 1995. It later morphed into the series, using the same dark topics and featuring some of the same puppet characters. In 1999, a pilot for Puppets Who Kill was produced for the Comedy Network and broadcast in January 2000. The network ordered the first season of 13 episodes which was produced in the fall of 2001, and held back by the network for one year - finally being broadcast in the fall of 2002. For the next 3 years a new season of the series was produced every fall.
In Puppets Who Kill, Rocko the Dog, Cuddles the Comfort Doll, Buttons the Bear, and Bill the Ventriloquist Dummy are four puppets with anthropomorphic qualities including individual histories of delinquency and recidivism. Canadian courts sent each of them to a halfway house for puppets, operated by a hapless and somewhat incompetent social worker named Dan Barlow, played by Dan Redican.
Characters
Rocko the Dog
Rocko (puppeteer Bruce Hunter), is a foul-mouthed, chain-smoking Miniature Schnauzer who formerly worked on a children's television programme. The job required him to control his language and behaviour, but eventually a berserk outburst on set ended his career. He takes medication to temper his violent mood swings.
Cuddles the Comfort Doll
Cuddles (puppeteer Bob Martin) is a comfort doll designed to help people cope with their problems. However, as the introductory voice-over to each episode informs the viewer, it is Cuddles who is now the problem. The chronic subordination of his own needs to those of others caused him to explode one day, grab a rifle, and start shooting. Despite this eruption, Cuddles is generally the best behaved of the group, although his naivete often gets him and his fellow residents at the halfway house into trouble. He cannot handle pressure well, lacks self-assertiveness, and shows signs of a passive-aggressive personality disorder.
Buttons the Bear
Buttons (puppeteer James Rankin) is a teddy bear with eyes consisting of two buttons. Unlike the others, Buttons is not so much a killer as a lover. In fact, he is a womanizer with no sense of sexual propriety who is remarkably successful in attracting eager human females. Buttons lives by the hedonistic motto "if it feels good, do it". He once had a lucrative corporate sponsorship deal with the Happy Elf Peanut Butter Company, but the sponsor exercised the "moral turpitude" clause in his contract once details of his promiscuous behaviour leaked to the press.
Bill the ventriloquist Dummy
Bill ( |
https://en.wikipedia.org/wiki/Compaq%20Portable | The Compaq Portable is an early portable computer which was one of the first IBM PC compatible systems. It was Compaq Computer Corporation's first product, to be followed by others in the Compaq Portable series and later Compaq Deskpro series. It was not simply an 8088-CPU computer that ran a Microsoft DOS as a PC "work-alike", but contained a reverse-engineered BIOS, and a version of MS-DOS that was so similar to IBM's PC DOS that it ran nearly all its application software. The computer was also an early variation on the idea of an "all-in-one".
It became available two years after the similar, but CP/M-based, Osborne 1 and Kaypro II. Columbia Data Products' MPC 1600 "Multi Personal Computer" had come out in June 1982. Other "work-alikes" included the MS-DOS and 8088-based, but not entirely IBM PC software compatible, Dynalogic Hyperion, Eagle Computer's Eagle 1600 series, including the Eagle Spirit portable, and the Corona personal computer. The latter two companies were threatened by IBM for BIOS copyright infringement, and settled out of court, agreeing to re-implement their BIOS. There was also the Seequa Chameleon, which had both 8088 and Z80 CPUs to alternately run MS-DOS or CP/M. Unlike Compaq, many of these companies had previously released computers based on Zilog's Z80 and Digital Research's CP/M operating system. Like Compaq, they recognized the replicability of the IBM PC's off-the-shelf parts, and saw that Microsoft retained the right to license MS-DOS to other companies. Only Compaq was able to fully capitalize on this, by aiming for complete IBM PC and PC DOS software compatibility, while reverse-engineering the BIOS to head off copyright legal claims.
Other contemporary systems include the portable Commodore SX-64, also known as the Executive 64, or VIP-64 in Europe, a briefcase/suitcase-size "luggable" version of the popular Commodore 64 home computer built with an 8-bit MOS 6510 (6502-based) CPU microprocessor, and the first full-color portable computer. Like the Z80 and "work-alike" portables, its sales fell into insignificance in the face of the Compaq Portable series.
Production and sales
The Compaq Portable was announced in November 1982 and first shipped in March 1983, priced at with a single half-height " diskette drive or US$3,590 for dual, full-height diskette drives. The Compaq Portable folded up into a luggable case the size of a portable sewing machine.
IBM responded to the Compaq Portable with the IBM Portable PC, developed because its sales force needed a comparable computer to sell against Compaq.
Compaq sold 53,000 units in the first year with a total of in revenue, an American Business record. In the second year revenue hit setting an industry record. Third year revenue was at , another US business record.
Design
The Compaq Portable has basically the same hardware as an IBM PC, transplanted into a luggable case (specifically designed to fit as carry-on luggage on an airplane), with Compaq's BIOS in |
https://en.wikipedia.org/wiki/Bosh | Bosh or BOSH may refer to:
BOSH (protocol), a transport protocol in computer networking
Bosh (band), a Christian rock band from Bournemouth, United Kingdom
Bosh (rapper), French rapper
BOSH (software), a project for release engineering, deployment, and lifecycle management
BOSH!, a vegan cookery duo
BOSH, also known as Boshghab is a word in Persian which translates to Plate.
People with the name
Chris Bosh (born 1984), American professional basketball player
Chris Bosh (wrestler), American professional wrestler
Bosh Pritchard (1919–1996), American football player
See also
Bausch & Lomb
Boche (disambiguation)
Bosc (disambiguation)
Bosch (disambiguation)
Bosh Berlin, an American rock band from St. Louis
Boshe |
https://en.wikipedia.org/wiki/Upstream | Upstream may refer to:
Upstream (hydrology)
Upstream (bioprocess)
Upstream (film), a 1927 film by John Ford
Upstream (networking)
Upstream (newspaper), a newspaper covering the oil and gas industry
Upstream (petroleum industry)
Upstream (software development)
Upstream (streaming service), a Philippine digital over-the-top streaming service
Upstream and downstream (DNA), determining relative positions on DNA
Upstream and downstream (transduction), determining temporal and mechanistic order of cellular and molecular events of signal transduction
Upstream collection, a set of NSA internet surveillance programs
See also
Upstream server
Downstream (disambiguation) |
https://en.wikipedia.org/wiki/Downstream | Downstream may refer to:
Downstream (hydrology)
Downstream (bioprocess)
Downstream (manufacturing)
Downstream (networking)
Downstream (software development)
Downstream (petroleum industry)
Upstream and downstream (DNA), determining relative positions on DNA
Upstream and downstream (transduction), determining temporal and mechanistic order of cellular and molecular events of signal transduction
In entertainment
Downstream (novella), a novella by Joris-Karl Huysmans
Downstream (1929 film), a British film by Giuseppe Guarino
Downstream (2010 film), an action science fiction film
"Downstream" (Land of the Lost), an episode of the 1974 series '"Land of the lost"
Downstream (album), an album by New Monsoon
"Downstream", a song by Supertramp from Even in the Quietest Moments
"Downstream", a song by American Head Charge from The Feeding
"Downstream", a track written by Shira Kammen that was part of the Braid soundtrack
See also
Upstream (disambiguation) |
https://en.wikipedia.org/wiki/TM%20Network | TM Network is a Japanese rock/new wave/pop musical band, made up by Tetsuya Komuro (keyboardist), Takashi Utsunomiya (vocalist) and Naoto Kine (guitarist). They became popular in Japan as the "futuristic pop songs with synthesizer" after the release of their 1987 single "Get Wild"
Tetsuya Komuro became a famous producer of dance-oriented J-pop singers in 1990s, and as such they are considered a prototype of the J-pop genre. However, their 2000 album Major Turn-Round was influenced by progressive rock.
History
Vocalist Takashi Utsunomiya and guitarist and songwriter Naoto Kine were originally in a band together called Speedway during their school days. Keyboardist and songwriter Tetsuya Komuro would join for a few months before leaving to pursue solo activities. When he sent a demo tape he made to some friends he was encouraged to make new versions of the songs with a full band. In 1983 He contacted Utsunomiya and Kine about working together, and Speedway was abandoned in favor of this new group. They settled on the name TM Network. The name is commonly thought to stand for "Time Machine Network", supported by a statement by Tetsuya Komuro on a 1984 appearance on the show LiveG. However, on September 6, 2006, an episode of Trivia no Izumi claimed that TM actually stands for Tama, the district from Tokyo they all came from.
On August 22, 1983, TM Network took part in the "Fresh Sounds Contest" (フレッシュサウンズコンテスト) which was sponsored by Coca-Cola. They performed the song "1974", and the event was aired on TBS. This was their first step towards a record deal.
They made their record debut with single "Kin'yōbi no Lion (Take It to the Lucky)" ( "Friday's lion") and album Rainbow Rainbow on April 21, 1984.
They first became famous in Hokkaido. They later found success with the songs "Self Control", "Get Wild", "Beyond the Time", and others, becoming one of the most popular rock bands in Japan. In particular, in the anime world, "Get Wild", used as the first ending song of City Hunter, sold a combined 525,010 single in Japan. "Get Wild" has received a number of covers by many J-pop bands and singers, as well as Vocaloids. "Beyond the Time" was used as the ending theme the 1988 anime film Mobile Suit Gundam: Char's Counterattack.
Several musicians have supported them at their live shows as backing bands such as Tak Matsumoto (B'z), Daisuke Asakura (Access), and more.
They changed their name to TMN in 1990, and broke up in 1994. In 1996 Komuro and Utsunomiya got Kine to play on a song they did together and included it on a new compilation album. They fully reunited under their original name in 1999 and released three singles. Afterwards they signed with an independent label, Rojam Entertainment, which released the band's ninth album, Major Turn-Round in 2000. In 2004 the band would release their tenth album Easy Listening, which showed Komuro's interest in trance music. Once Komuro had finished touring extensively with globe he got Kine and Utsunomiya |
https://en.wikipedia.org/wiki/Charlotte%20Froese%20Fischer | Charlotte Froese Fischer (born 1929) is a Canadian-American applied mathematician and computer scientist noted for the development and implementation of the Multi-Configurational Hartree–Fock (MCHF) approach to atomic-structure calculations and its application to the description of atomic structure and spectra.
The experimental discovery of the negative ion of calcium
was motivated by her theoretical prediction of its existence.
This was the first known anion of a Group 2 element.
Its discovery was cited in Froese Fischer's election to Fellow of the American Physical Society.
Early life
Charlotte Froese was born on September 21, 1929, in the village of Stara Mykolaivka (formerly Pravdivka, and Nikolayevka), in the Donetsk region, in the present-day Ukraine, to parents of Mennonite descent. Her parents immigrated to Germany in 1929 on the last train allowed to cross the border before its closure by Soviet authorities. After a few months in a refugee camp, her family was allowed to immigrate to Canada, where they eventually established themselves in Chilliwack, British Columbia.
Education and research
She obtained both a B.A. degree, with honors, in Mathematics and Chemistry and an M.A. degree in Applied Mathematics from the University of British Columbia in 1952 and 1954, respectively. She then obtained her Ph.D. in Applied Mathematics and Computing at Cambridge University in 1957, pursuing coursework in quantum theory with Paul Dirac. She worked under the supervision of Douglas Hartree, whom she assisted in programming the Electronic Delay Storage Automatic Calculator (EDSAC) for atomic-structure calculations.
She served on the mathematics faculty of the University of British Columbia from 1957 till 1968, where she introduced numerical analysis and computer courses into the curriculum and was instrumental in the formation of the Computer Science Department.Froese Fischer spent 1963-64 at the Harvard College Observatory, where she extended her research on atomic-structure calculations. While at Harvard, she was the first woman scientist to be awarded an Alfred P. Sloan Fellowship. In 1991 she became a Fellow of the American Physical Society, in part for her contribution to the discovery of negative calcium. In 1995 she was elected a member of the Royal Physiographic Society in Lund, in 2004 a foreign member of the Lithuanian Academy of Sciences, and in 2015 she was awarded an Honorary Doctorate in Technology from Malmö University, Sweden.
Contributions
Froese Fischer is the author of over 300 research articles on computational atomic theory, many of which have had far-reaching impact in the area of atomic-structure calculations. The early version of the MCHF program, published in the first volume of Computer Physics Communications received two Citation Classics Awards in 1987. She authored an influential monograph on Hartree-Fock approaches to the first-principles calculation of atomic structure,
and coauthored a substantial successor w |
https://en.wikipedia.org/wiki/Gordon%20Lyon | Gordon Lyon (also known by his pseudonym Fyodor Vaskovich) is an American network security expert, creator of Nmap and writer of books, websites, and technical papers about network security. He is a founding member of the Honeynet Project and was Vice President of Computer Professionals for Social Responsibility.
Personal life
Lyon has been active in the network security community since the mid-1990s. His handle, "Fyodor", was taken from Russian author Fyodor Dostoyevsky. Most of his programming is done in the C, C++, and Perl programming languages.
Opposition to grayware
In December 2011, Lyon published his strong dislike of the way Download.com started bundling grayware with their installation managers and concerns over the bundled software, causing many people to spread the post on social networks, and a few dozen media reports. The main problem is the confusion between Download.com-offered content and software offered by original authors; the accusations included deception as well as copyright and trademark violation.
Lyon lost control of the Nmap SourceForge page in 2015, with Sourceforge taking over the project's page and offering adware wrapped download bundles. The original SourceForge page no longer contains any files and the Sourceforge "mirror" page used to hijack the Nmap account redirects to the official https://nmap.org/.
Websites
Lyon maintains several network security web sites:
Nmap.Org – Host of the Nmap security scanner and its documentation
SecTools.Org – The top 100 network security tools (ranked by thousands of Nmap users)
SecLists.Org – Archive of the most common security mailing lists
Insecure.Org – His main site, offering security news/updates, exploit world archive, and other misc. security resources
Published books
Lyon has written and co-authored several books:
Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community, co-authored with other members of the Honeynet Project. A 2nd edition is now available, as are sample chapters.
Stealing the Network: How to Own a Continent. Hacker fiction, but tries to stay realistic. Co-authored with Kevin Mitnick and other hackers. Gordon's chapter is freely available online.
Nmap Network Scanning
Interviews
Public interviews with Lyon/Vaskovich have been posted by SecurityFocus, Slashdot, Zone-H, TuxJournal, Safemode, and Google. Many of these provide more personal details than his official bio page does.
Conferences
Lyon attends and speaks at many security conferences. He has presented at DEFCON, CanSecWest, FOSDEM, IT Security World, Security Masters' Dojo, ShmooCon, IT-Defense, SFOBug, and others.
See also
W00w00
References
External links
Home page
Living people
Writers about computer security
American computer programmers
Free software programmers
American technology writers
Writers from California
1977 births |
https://en.wikipedia.org/wiki/Joint%20Inter-Domain%20Management | Joint Inter-Domain Management (JIDM) task force, jointly sponsored by X/Open and the Network Management Forum, has defined a mapping between SNMP, CMIP and CORBA. The JIDM specification was adopted as a standard by the Open Group in 2000.
The mapping specification is in two parts: the Specification Translation and the Interactive Translation. The Specification Translation spells out translation of the object oriented object models among the network management protocols that allow for data transfer across protocols. The Interactive Translation concerns the dynamic translation of objects in use that allows for the construction of network management software that operates across protocols.
The JIDM specification was considered the most significant work to use the CORBA framework in network management mapping. The JIDM specification led to CORBA's further use in specifications in the telecommunications industry, such as the ITU-T GDMO specifications. But the object framework led to performance problems, such as requiring a remote method invocation for each object attribute and scalability problems coming from large numbers of objects generated from all the network connections. This led to network management data mapping approaches where sets of attributes and lists of connections were transferred instead of individual objects.
References
Network management |
https://en.wikipedia.org/wiki/Web-Based%20Enterprise%20Management | In computing, Web-Based Enterprise Management (WBEM) comprises a set of systems-management technologies developed to unify the management of distributed computing environments. The WBEM initiative, initially sponsored in 1996 by BMC Software, Cisco Systems, Compaq Computer, Intel, and Microsoft, is now widely adopted. WBEM is based on Internet standards and Distributed Management Task Force (DMTF) open standards:
Common Information Model (CIM) infrastructure and schema
CIM-XML
CIM operations over HTTP
WS-Management for web services
CIM Operations over RESTful Services
Although the name labels WBEM as "web-based", it is not necessarily dependent on any particular user interface (see below). Other systems-management approaches include remote shells, proprietary solutions and IETF standardized network-management architectures like the SNMP and Netconf.
Features
WBEM allows the management of any element in a standard and inter-operable manner.
WBEM provides the technology underlying different management initiatives in information technology:
Desktop management (DASH)
Network management (NetMan)
There is a DMTF page that shows a number of DSP pdfs that are the published profiles of the NetMan Initiative
Storage management (SMI)
Systems management (SMASH)
Virtualization management (VMAN)
There is a DMTF page that shows a number of DSP pdfs that are the published profiles of the VMAN Initiative
Architecture
To understand the WBEM architecture, consider the components which lie between the operator trying to manage a device (configure it, turn it off and on, collect alarms, etc.) and the actual hardware and software of the device:
The operator will invoke some form of graphical user interface (GUI), Browser User Interface (BUI), or command-line interface (CLI). The WBEM standard has nothing to say about this interface (although the definition of a CLI for specific applications has started): WBEM operates independently of the human interface, since human interfaces can change without the rest of the system needing to note such changes.
The GUI, BUI or CLI will interface with a WBEM client through a small set of application programming interfaces (APIs). This client will find the WBEM server for the managed device (typically on the device itself) and construct an XML message containing the request.
The client will use the HTTP (or HTTPS) protocol to pass the request, encoding it in CIM-XML, to the WBEM server.
The WBEM server will decode the incoming request, perform the necessary authentication and authorization checks and then consult the previously defined model of the managed device to see how to handle the request. This model provides the power of the architecture: it represents the pivot point of the transaction, with the client simply interacting with the model and the model interacting with the real hardware or software. The model uses the Common Information Model standard; the DMTF has published many models for commonly mana |
https://en.wikipedia.org/wiki/SDXF | SDXF (Structured Data eXchange Format) is a data serialization format defined by RFC 3072. It allows arbitrary structured data of different types to be assembled in one file for exchanging between arbitrary computers.
The ability to arbitrarily serialize data into a self-describing format is reminiscent of XML, but SDXF is not a text format (as XML) — SDXF is not compatible with text editors. The maximal length of a datum (composite as well as elementary) encoded using SDXF is 16777215 bytes (one less than 16 MB).
Technical structure format
SDXF data can express arbitrary levels of structural depth. Data elements are self-documenting, meaning that the metadata (numeric, character string or structure) are encoded into the data elements. The design of this format is simple and transparent: computer programs access SDXF data with the help of well-defined functions, exempting programmers from learning the precise data layout.
The word "exchange" in the name reflects another kind of transparency: the SDXF functions provide a computer architecture independent conversion of the data. Serializations can be exchanged among computers (via direct network, file transfer or CD) without further measures. The SDXF functions on the receiving side handle architectural adaptation.
Structured data is data with patterns predictable more complex than strings of text.
Example
A commercial example: two companies want to exchange digital invoices. The invoices have the following hierarchical nested structure:
INVOICE
│
├─ INVOICE_NO
├─ DATE
├─ ADDRESS_SENDER
│ ├─ NAME
│ ├─ NAME
│ ├─ STREET
│ ├─ ZIP
│ ├─ CITY
│ └─ COUNTRY
├─ ADDRESS_RECIPIENT
│ ├─ NAME
│ ├─ NAME
│ ├─ STREET
│ ├─ ZIP
│ ├─ CITY
│ └─ COUNTRY
├─ INVOICE_SUM
├─ SINGLE_ITEMS
│ ├─ SINGLE_ITEM
│ │ ├─ QUANTITY
│ │ ├─ ITEM_NUMBER
│ │ ├─ ITEM_TEXT
│ │ ├─ CHARGE
│ │ └─ SUM
│ └─ ...
├─ CONDITIONS
...
Structure
The basic element is a chunk. An SDXF serialization is itself a chunk. A chunk can consist of a set of smaller chunks.
Chunks are composed of a header prefix of six bytes, followed by data. The header contains a chunk identifier as a 2-byte binary number (Chunk_ID), the chunk length and type. It may contain additional information about compression, encryption and more.
The chunk type indicates whether the data consists of text (a string of characters), a binary number (integer or floating point) or if the chunk a composite of other chunks.
Structured chunks enable the programmer to pack hierarchical constructions such as the INVOICE above into an SDXF structure as follow:
Every named term (INVOICE, INVOICE_NO, DATE, ADDRESS_SENDER, etc.) is given a unique number out in the range 1 to 65535 (2 byte unsigned binary integer without sign). The top/outermost chunk is constructed with the ID INVOICE (that means with the associated numerical chunk_ID) as a structured chunk on level 1. This INVOIC |
https://en.wikipedia.org/wiki/Strong%20Medicine | Strong Medicine is an American medical drama with a focus on feminist politics, health issues and class conflict that aired on the Lifetime network from 2000 to 2006. It was created and produced in part by Whoopi Goldberg, who made cameos on the series, and by Tammy Ader. It starred Rosa Blasi, Janine Turner, and Patricia Richardson. It was the highest-rated original drama on basic cable in 2001.
Overview
Strong Medicine brings together the worlds of two completely different doctors, Dr. Luisa "Lu" Delgado, and Dr. Dana Stowe. Lu is a single mother running a free clinic in the inner-city. Dana is a Harvard graduate and top female health specialist. The two come together when Dr. Lydia Emerson wants to combine Rittenhouse Hospital's practice with Lu's financially failing clinic to provide the best care for the patients of both doctors.
The staff and its visitors tend to be racially, politically, and economically diverse. A core class/political duality in the episodes' storylines tend to be driven by comparisons and contrasts (and often cooperation) between liberal Delgado, and her fellow women's health practitioner across the lobby, who sees paying patients and generally has more conservative values. When Dr. Dana Stowe leaves, Lu's partners include Dr. Andy Campbell and Dr. Dylan West. The show often places the characters in ironic, soul-searching situations in which they are forced to question the solidity of their personal beliefs or else cause them to fight for what they believe in.
Episodes
Cast and characters
Main
Rosa Blasi as Dr. Luisa "Lu" Magdalena Delgado, born November 18, 1970. Delgado runs the free clinic (first the South Philly Health Clinic and, since the pilot, the Rittenhouse Health Center), and hosts a support group. Both as a friend and a doctor to many lower-class patients, Lu regularly comes face-to-face with bitterly ironic situations involving the difficulties of the lower class with government, debt, drug abuse, and exploitation. Her character exhibits a perennial cleverness which allows her to wheedle or persuade positive outcomes from seemingly hopeless cases of victimization. After her mother died of breast cancer when she was ten years-old, she was raised by her grandmother, Isabel Santana, who now lives in Puerto Rico. Lu has a son, Marc, who she had when she was 16 and raised alone. Until recently, Delgado has had no luck with a relationship. Her first boyfriend, Jack (Jeffrey D. Sams) a construction worker, dumped her, because he wasn't ready to get involved in a fatherly (or even father figure) relationship with Lu's son Marc. Lu's next boyfriend, radio show host Harry Burr (Don Michael Paul) had to leave her because his ex-wife was using their relationship to gain custody of his daughter Erin, who was also her son Marc's girlfriend. Soon after, she survived being raped by the Rittenhouse's new Head of Surgery, Dr. Randolf Kilner. She lost her first serious boyfriend, fireman Miguel "Mickey" Arenas (Julien A |
https://en.wikipedia.org/wiki/Automatic%20identification%20and%20data%20capture | Automatic identification and data capture (AIDC) refers to the methods of automatically identifying objects, collecting data about them, and entering them directly into computer systems, without human involvement. Technologies typically considered as part of AIDC include QR codes, bar codes, radio frequency identification (RFID), biometrics (like iris and facial recognition system), magnetic stripes, optical character recognition (OCR), smart cards, and voice recognition. AIDC is also commonly referred to as "Automatic Identification", "Auto-ID" and "Automatic Data Capture".
AIDC is the process or means of obtaining external data, particularly through the analysis of images, sounds, or videos. To capture data, a transducer is employed which converts the actual image or a sound into a digital file. The file is then stored and at a later time, it can be analyzed by a computer, or compared with other files in a database to verify identity or to provide authorization to enter a secured system. Capturing data can be done in various ways; the best method depends on application.
In biometric security systems, capture is the acquisition of or the process of acquiring and identifying characteristics such as finger image, palm image, facial image, iris print, or voiceprint which involves audio data, and the rest all involve video data.
Radio-frequency identification is relatively a new AIDC technology, which was first developed in the 1980s. The technology acts as a base in automated data collection, identification, and analysis systems worldwide. RFID has found its importance in a wide range of markets, including livestock identification and Automated Vehicle Identification (AVI) systems because of its capability to track moving objects. These automated wireless AIDC systems are effective in manufacturing environments where barcode labels could not survive.
Overview of automatic identification methods
Nearly all the automatic identification technologies consist of three principal components, which also comprise the sequential steps in AIDC:
Data encoder. A code is a set of symbols or signals that usually represent alphanumeric characters. When data are encoded, the characters are translated into machine-readable code. A label or tag containing the encoded data is attached to the item that is to be identified.
Machine reader or scanner. This device reads the encoded data, converting them to an alternative form, typically an electrical analog signal.
Data decoder. This component transforms the electrical signal into digital data and finally back into the original alphanumeric characters.
Capturing data from printed documents
One of the most useful application tasks of data capture is collecting information from paper documents and saving it into databases (CMS, ECM, and other systems). There are several types of basic technologies used for data capture according to the data type:
OCR – for printed text recognition
ICR – for hand-printed text rec |
https://en.wikipedia.org/wiki/Tapeworm%20%28disambiguation%29 | A tapeworm is a member of a class of parasitic worms.
Tapeworm may also refer to:
Tapeworm infection, caused by the above worms
Computer worms, originally called tapeworms
Tapeworm (band), an American band, a defunct Nine Inch Nails side project
Tapeworm (film), a 2019 Canadian feature film, directed by Milos Mitrovic and Fabian Velasco
Tapeworm (game), a 2021 tabletop card game, designed by Edmund McMillen |
https://en.wikipedia.org/wiki/Rocky%20%28disambiguation%29 | Rocky is a 1976 film starring Sylvester Stallone.
Rocky may also refer to:
Computing
Rocky Linux, a Linux distribution
Films
Rocky (franchise), an American film franchise that debuted with the film Rocky in 1976
Rocky Balboa (film), the sixth film in the series from 2006
Rocky (1948 film), an American film starring Roddy McDowall
Rocky (1981 film), an Indian Bollywood film starring Sanjay Dutt
Rocky (2006 Hindi film), an Indian Bollywood action film
Rocky (2008 film), an Indian Kannada-language film
Rocky (2013 film), an Indian Bengali-language film
Rocky (2021 film), an Indian Tamil-language film
People
ASAP Rocky, American rapper
Rocky (nickname)
Rocky (singer), South Korean singer, rapper and member of boy group Astro
Rocky Dellesara, Canadian professional wrestler from NWA: All-Star Wrestling
Rocky Elsom, Australian rugby player
Rocky Fielding, British former professional boxer
Rocky Kramer, Norwegian rock guitarist and singer
Rocky Graziano, American boxing middleweight champion
Rocky Marciano, American boxing heavyweight champion
Rocky Marshall, English actor
Rocky Maivia, a former ring name of Dwayne Johnson, American actor and professional wrestler
Rocky Votolato, American musician
Characters
In film
Rocky Balboa, in the Rocky Franchise
Rocky Sullivan, in Angels with Dirty Faces
Rocky and Mugsy, in various Looney Tunes and Merrie Melodies media
Rocky the Rooster, in Chicken Run
Rocky, in Don't Breathe
Rocky, in The Rocky Horror Picture Show
Rocky Gibraltar, a character in Toy Story
Rocky, a gangster in Fat Pizza
Rocky, in 3 Ninjas
Rocky, in Rocky Aur Rani Ki Premi Kahani
Raja Krishnappa Bairya "Rocky" in K.G.F Franchise
Kabir Ahlawat "Rocky", in Rocky Handsome
"Rocky" Hiranandani, in Deewane Huye Paagal
In television
Rocky DeSantos, in Mighty Morphin Power Rangers and Power Rangers: Zeo
Rocky the Flying Squirrel, in The Rocky and Bullwinkle Show
Rocky Robinson, a character in The Amazing World of Gumball
Rocky, in the Canadian animated series PAW Patrol
Joseph "Rocky" Rockford, in The Rockford Files
Rocky Blue, a character in Shake It Up
In other media
Rocky Rodent, the titular rodent character in the 1993 video game Rocky Rodent
Rocky, an anthropomorphic dog in the 1998 Swedish comic strip Rocky
Rocky Rickaby, the main feline protagonist in the 2006 webcomic Lackadaisy
Rocky, a Simon Kidgits dog character developed by Simon Brand Ventures
Video games
Rocky (1987 video game), for the Sega Master System
Rocky (2002 video game), for the Nintendo GameCube, PlayStation 2, Xbox, and Game Boy Advance
Music
Rocky (soundtrack), a soundtrack album from the 1976 film
"Rocky" (song), a song from the Dickey Lee album Rocky (1975)
"Rocky", a song from the Eric Burdon album Survivor (1977)
"Rocky", a song from the Mike Oldfield album Light + Shade (2005)
"Rocky", a song from The Lonely Island album Turtleneck & Chain (2011)
"Rocky", a painted Fender Stratocaster guitar used by George Har |
https://en.wikipedia.org/wiki/VisionTV | VisionTV is a Canadian English language Category A specialty channel that broadcasts multi-faith, multicultural, and general entertainment programming aimed at the 45 and over demographic.
VisionTV is currently owned by ZoomerMedia, a company controlled by Moses Znaimer. VisionTV's funding comes from cable subscription fees, viewer donations, advertising revenues and the sale of airtime to faith groups.
History and viewership
Licensed in December 1987 by the Canadian Radio-television and Telecommunications Commission (CRTC), the channel was launched on September 1, 1988 under the ownership of a nonprofit organization that eventually evolved into S-VOX. It was initially one of Canada's more popular cable channels. However, with the proliferation of new cable channels, it has been moved up the dial by carriers and become less available to audiences, causing a drop in its viewership. VisionTV lacked clout with cable carriers as it was then a one-channel operation owned by a not-for-profit organization rather than a large commercial entity operating many channels.
Notably, Rogers Cable was criticized in 1997 for moving Vision to Channel 59 on its Toronto system, rendering it inaccessible to many apartment residents because 59 is the channel most commonly overridden by the lobby camera service in apartment buildings. After Vision protested, Rogers offered to put Vision on channel 78 as well, but Vision turned that down because many of its viewers' sets can't reach that far.
Network vice-president Rita Deverell, who hosted interstitial segments between programs, was the network's most prominent on-air personality from its launch until she left in 2002 to work for APTN.
In June 2009, S-VOX announced it would sell its broadcasting assets to ZoomerMedia, a company controlled by Moses Znaimer. The sale was approved by the CRTC on March 30, 2010. ZoomerMedia assumed control of S-VOX's broadcasting assets on June 30, 2010.
In December 2010, ZoomerMedia introduced a new logo and on-air identity for the channel with the tagline, "Zoomer Television" (Zoomer being a word coined by Znaimer meaning "boomers with zip"), emphasizing its focus on more general entertainment programming for the 45 and older demographic.
In August 2013, the Canadian Radio-television Telecommunications Commission (CRTC) denied Vision's application to continue mandatory carriage which had required all Canadian cable systems to carry the channel.
International Expansion
In the spring of 2021, a similarly branded and programmed channel, Zoomer TV, launched in the United States on the online streaming service, Distro TV. The channel broadcasts programming aimed at the 45 and over demographic.
Programming
VisionTV's programming consists of two programming streams; Mosaic and Cornerstone.
Mosaic
Its Mosaic block consists of faith related programming representing 75 faith groups within various religious denominations, including Catholics, Protestants, Muslims, Sikhs and Hindus. |
https://en.wikipedia.org/wiki/Vector%20clock | A vector clock is a data structure used for determining the partial ordering of events in a distributed system and detecting causality violations. Just as in Lamport timestamps, inter-process messages contain the state of the sending process's logical clock. A vector clock of a system of N processes is an array/vector of N logical clocks, one clock per process; a local "largest possible values" copy of the global clock-array is kept in each process.
Denote as the vector clock maintained by process , the clock updates proceed as follows:
Initially all clocks are zero.
Each time a process experiences an internal event, it increments its own logical clock in the vector by one. For instance, upon an event at process , it updates .
Each time a process sends a message, it increments its own logical clock in the vector by one (as in the bullet above, but not twice for the same event) then it pairs the message with a copy of its own vector and finally sends the pair.
Each time a process receives a message-vector clock pair, it increments its own logical clock in the vector by one and updates each element in its vector by taking the maximum of the value in its own vector clock and the value in the vector in the received pair (for every element). For example, if process receives a message from , it first increments its own logical clock in the vector by one and then updates its entire vector by setting .
History
Lamport originated the idea of logical Lamport clocks in 1978. However, the logical clocks in that paper were scalars, not vectors. The generalization to vector time was developed several times, apparently independently, by different authors in the early 1980's. At least 6 papers contain the concept.
The papers canonically cited in reference to vector clocks are Colin Fidge’s and Friedemann Mattern’s 1988 works,
as they (independently) established the name "vector clock" and the mathematical properties of vector clocks.
Partial ordering property
Vector clocks allow for the partial causal ordering of events. Defining the following:
denotes the vector clock of event , and denotes the component of that clock for process .
In English: is less than , if and only if is less than or equal to for all process indices , and at least one of those relationships is strictly smaller (that is, ).
denotes that event happened before event . It is defined as: if , then
Properties:
Antisymmetry: if , then ¬
Transitivity: if and , then ; or, if and , then
Relation with other orders:
Let be the real time when event occurs. If , then
Let be the Lamport timestamp of event . If , then
Other mechanisms
In 1999, Torres-Rojas and Ahamad developed Plausible Clocks, a mechanism that takes less space than vector clocks but that, in some cases, will totally order events that are causally concurrent.
In 2005, Agarwal and Garg created Chain Clocks, a system that tracks dependencies using vectors with size smaller than the number of |
https://en.wikipedia.org/wiki/Hans%20Zassenhaus | Hans Julius Zassenhaus (28 May 1912 – 21 November 1991) was a German mathematician, known for work in many parts of abstract algebra, and as a pioneer of computer algebra.
Biography
He was born in Koblenz in 1912.
His father was a historian and advocate for Reverence for Life as expressed by Albert Schweitzer. Hans had two brothers, Guenther and Wilfred, and sister Hiltgunt, who wrote an autobiography in 1974. According to her, their father lost his position as school principal due to his philosophy. She wrote:
Hans, my eldest brother, studied mathematics. My brothers Guenther and Wilfred were in medical school. ... only students who participated in Nazi activities would get scholarships. That left us out. Together we made an all-out effort. ... soon our house became a beehive. Day in and day out for the next four years a small army of children of all ages would arrive to be tutored.
At the University of Hamburg Zassenhaus came under the influence of Emil Artin. As he wrote later:
His introductory course in analysis that I attended at the age of 17 converted me from a theoretical physicist to a mathematician.
When just 21, Zassenhaus was studying composition series in group theory. He proved his butterfly lemma that provides a refinement of two normal chains to isomorphic central chains. Inspired by Artin, Zassenhaus wrote a textbook Lehrbuch der Gruppentheorie that was later translated as Theory of Groups.
His thesis was on doubly transitive permutation groups with Frobenius groups as stabilizers. These groups are now called Zassenhaus groups. They have had a deep impact on the classification of finite simple groups.
He obtained his doctorate in June 1934, and took the teachers’ exam the next May. He became a scientific assistant at University of Rostock. In 1936 he became assistant to Artin back in Hamburg, but Artin departed for the USA the following year. Zassenhaus gave his Habilitation in 1938.
According to his sister Hiltgunt, Hans was "called up as a research scientist at a weather station" for his part in the German war effort.
Zassenhaus married Lieselotte Lohmann in 1942. The couple raised three children: Michael (born 1943), Angela (born 1947), and Peter (born 1949). In 1943 Zassenhaus became extraordinary professor. He became managing director of the Hamburg Mathematical Seminar.
After the war, and as a fellow of the British Council, Zassenhaus visited the University of Glasgow in 1948. There he was given an honorary Master of Arts degree. The following year he joined the faculty of McGill University where the endowments of Peter Redpath financed a professorship. He was at McGill for a decade with leaves of absence to the Institute for Advanced Study (1955/6) and California Institute of Technology (1958/9). There he was using computers to advance number theory. In 1959 Zassenhaus began teaching at University of Notre Dame and became director of its computing center in 1964.
Zassenhaus was a Mershon visiting professor at Ohio |
https://en.wikipedia.org/wiki/Logical%20clock | A logical clock is a mechanism for capturing chronological and causal relationships in a distributed system. Often, distributed systems may have no physically synchronous global clock. In many applications (such as distributed GNU make), if two processes never interact, the lack of synchronization is unobservable and in these applications it is enough for the processes to agree on the event ordering (i.e., logical clock) rather than the wall-clock time. The first logical clock implementation, the Lamport timestamps, was proposed by Leslie Lamport in 1978 (Turing Award in 2013).
Local vs global time
In logical clock systems each process has two data structures: logical local time and logical global time. Logical local time is used by the process to mark its own events, and logical global time is the local information about global time. A special protocol is used to update logical local time after each local event, and logical global time when processes exchange data.
Applications
Logical clocks are useful in computation analysis, distributed algorithm design, individual event tracking, and exploring computational progress.
Algorithms
Some noteworthy logical clock algorithms are:
Lamport timestamps, which are monotonically increasing software counters.
Vector clocks, that allow for partial ordering of events in a distributed system.
Version vectors, order replicas, according to updates, in an optimistic replicated system.
Matrix clocks, an extension of vector clocks that also contains information about other processes' views of the system.
References
External links
Distributed System Logical Time // Roberto Baldoni, Silvia Bonomi. MIDLAB, Sapienza University of Rome
Chapter 3: Logical Time // Ajay Kshemkalyani and Mukesh Singhal, Distributed Computing: Principles, Algorithms, and Systems, Cambridge University Press, 2008
Distributed Systems 06. Logical Clocks // Paul Krzyzanowski, Rutgers University, Fall 2014
Causality
Distributed algorithms |
https://en.wikipedia.org/wiki/E%20%28programming%20language%29 | E is an object-oriented programming language for secure distributed computing, created by Mark S. Miller, Dan Bornstein, Douglas Crockford, Chip Morningstar and others at Electric Communities in 1997. E is mainly descended from the concurrent language Joule and from Original-E, a set of extensions to Java for secure distributed programming. E combines message-based computation with Java-like syntax. A concurrency model based on event loops and promises ensures that deadlock can never occur.
Philosophy
The E language is designed for computer security and secure computing. This is performed mainly by strict adherence to the object-oriented computing model, which in its pure form, has properties that support secure computing. The E language and its standard library employ a capability-based design philosophy throughout in order to help programmers build secure software and to enable software components to co-operate even if they don't fully trust each other. In E, object references serve as capabilities, hence capabilities add no computational or conceptual overhead costs. The language syntax is designed to be easy for people to audit for security flaws. For example, lexical scoping limits the amount of code that must be examined for its effects on a given variable. As another example, the language uses the == operator for comparison and the := operator for assignment; to avoid the possibility of confusion, there is no = operator.
Computational model
In E, all values are objects and computation is performed by sending messages to objects. Each object belongs to a vat (analogous to a process). Each vat has a single thread of execution, a stack frame, and an event queue. Distributed programming is just a matter of sending messages to remote objects (objects in other vats). All communication with remote parties is encrypted by the E runtime. Arriving messages are placed into the vat's event queue; the vat's event loop processes the incoming messages one by one in order of arrival.
E has two ways to send messages: an immediate call and an eventual send. An immediate call is just like a typical function or method call in a non-concurrent language: a sender waits until a receiver finishes and returns a value. An eventual send sends a message while producing a placeholder for a result called a promise. A sender proceeds immediately with the promise. Later, when a receiver finishes and yields a result, the promise resolves to a result. Since only eventual sends are allowed when communicating with remote objects, deadlocks cannot happen. In distributed systems, the promise mechanism also minimizes delays caused by network latency.
Syntax and examples
E's syntax is most similar to Java, though it also bears some resemblance to Python and Pascal. Variables are dynamically typed and lexically scoped. Unlike Java or Python, however, E is composed entirely of expressions. Here is an extremely simple E program:
println("Hello, world!")
Here is a recursive f |
https://en.wikipedia.org/wiki/Fann | Fann, or FANN, may refer to:
Fast Artificial Neural Network
Fann Wong |
https://en.wikipedia.org/wiki/Scapegoat%20tree | In computer science, a scapegoat tree is a self-balancing binary search tree, invented by Arne Andersson in 1989 and again by Igal Galperin and Ronald L. Rivest in 1993. It provides worst-case lookup time (with as the number of entries) and amortized insertion and deletion time.
Unlike most other self-balancing binary search trees which also provide worst case lookup time, scapegoat trees have no additional per-node memory overhead compared to a regular binary search tree: besides key and value, a node stores only two pointers to the child nodes. This makes scapegoat trees easier to implement and, due to data structure alignment, can reduce node overhead by up to one-third.
Instead of the small incremental rebalancing operations used by most balanced tree algorithms, scapegoat trees rarely but expensively choose a "scapegoat" and completely rebuild the subtree rooted at the scapegoat into a complete binary tree. Thus, scapegoat trees have worst-case update performance.
Theory
A binary search tree is said to be weight-balanced if half the nodes are on the left of the root, and half on the right.
An α-weight-balanced node is defined as meeting a relaxed weight balance criterion:
size(left) ≤ α*size(node)
size(right) ≤ α*size(node)
Where size can be defined recursively as:
function size(node) is
if node = nil then
return 0
else
return size(node->left) + size(node->right) + 1
end if
end function
Even a degenerate tree (linked list) satisfies this condition if α=1, whereas an α=0.5 would only match almost complete binary trees.
A binary search tree that is α-weight-balanced must also be α-height-balanced, that is
height(tree) ≤ floor(log1/α(size(tree)))
By contraposition, a tree that is not α-height-balanced is not α-weight-balanced.
Scapegoat trees are not guaranteed to keep α-weight-balance at all times, but are always loosely α-height-balanced in that
height(scapegoat tree) ≤ floor(log1/α(size(tree))) + 1.
Violations of this height balance condition can be detected at insertion time, and imply that a violation of the weight balance condition must exist.
This makes scapegoat trees similar to red–black trees in that they both have restrictions on their height. They differ greatly though in their implementations of determining where the rotations (or in the case of scapegoat trees, rebalances) take place. Whereas red–black trees store additional 'color' information in each node to determine the location, scapegoat trees find a scapegoat which isn't α-weight-balanced to perform the rebalance operation on. This is loosely similar to AVL trees, in that the actual rotations depend on 'balances' of nodes, but the means of determining the balance differs greatly. Since AVL trees check the balance value on every insertion/deletion, it is typically stored in each node; scapegoat trees are able to calculate it only as needed, which is only when a scapegoat needs to be found.
Unlike most other self-balan |
https://en.wikipedia.org/wiki/TSI | TSI may refer to:
Science, technology and engineering
Technology Schools Initiative
Thyroid stimulating immunoglobulin
Time-Slot Interchange, communications network switches
Total solar irradiance received at top of atmosphere
Triple sugar iron test or TSI slant, of a microorganism's ability to ferment sugars
Trophic state index of plant nutrients in waterbodies
Turbo fuel stratified injection, a VW engine trademark TSI or TFSI
Standards, and standards organisations
Technical Specifications for Interoperability within European railways
Trading Standards Institute, a British professional association
Trustworthy Software Initiative, UK
Turkish Standards Institution, a public standards organization in Turkey
Companies
TekSavvy Solutions Inc., Canadian telecommunications company
Telesensory Systems Inc., maker of products for the blind
Town Sports International, an operator of fitness facilities
Organisations
The Seasteading Institute, for creating dwellings on seaborne platforms in international waters
Three Seas Initiative, European intergovernmental group
Media and entertainment
Televisione svizzera di lingua italiana, Swiss Italian-language TV
Other uses
Texas Success Initiative, a guide for developmental education to ensure college readiness in the state of Texas
Time in Turkey, generally abbreviated with its usage in Turkish, ''Türkiye Saati İle ()
Tissue saturation index in medical near-infrared spectroscopy
True strength index of financial markets
Trauma symptom inventory, a psychological assessment instrument |
https://en.wikipedia.org/wiki/Knowledge-based%20systems | A knowledge-based system (KBS) is a computer program that reasons and uses a knowledge base to solve complex problems. The term is broad and refers to many different kinds of systems. The one common theme that unites all knowledge based systems is an attempt to represent knowledge explicitly and a reasoning system that allows it to derive new knowledge. Thus, a knowledge-based system has two distinguishing features: a knowledge base and an inference engine.
The first part, the knowledge base, represents facts about the world, often in some form of subsumption ontology (rather than implicitly embedded in procedural code, in the way a conventional computer program does). Other common approaches in addition to a subsumption ontology include frames, conceptual graphs, and logical assertions.
The second part, the inference engine, allows new knowledge to be inferred. Most commonly, it can take the form of IF-THEN rules coupled with forward chaining or backward chaining approaches. Other approaches include the use of automated theorem provers, logic programming, blackboard systems, and term rewriting systems such as CHR (Constraint Handling Rules). These more formal approaches are covered in detail in the Wikipedia article on knowledge representation and reasoning.
Overview
Knowledge-based systems were first developed by artificial intelligence researchers. These early knowledge-based systems were primarily expert systems – in fact, the term is often used interchangeably with expert systems, although there is a difference. The difference is in the view taken to describe the system:
"expert system" refers to the type of task the system is trying to assist with – to replace or aid a human expert in a complex task typically viewed as requiring expert knowledge
"knowledge-based system" refers to the architecture of the system – that it represents knowledge explicitly, rather than as procedural code.
While the earliest knowledge-based systems were almost all expert systems, the same tools and architectures can and have since been used for a whole host of other types of systems. Virtually all expert systems are knowledge-based systems, but many knowledge-based systems are not expert systems.
The first knowledge-based systems were rule based expert systems. One of the most famous was Mycin, a program for medical diagnosis. These early expert systems represented facts about the world as simple assertions in a flat database, and used rules to reason about (and as a result add to) these assertions. Representing knowledge explicitly via rules had several advantages:
Acquisition and maintenance. Using rules meant that domain experts could often define and maintain the rules themselves rather than via a programmer.
Explanation. Representing knowledge explicitly allowed systems to reason about how they came to a conclusion and use this information to explain results to users. For example, to follow the chain of inferences that led to a diagnosis and use t |
https://en.wikipedia.org/wiki/Multi-Vendor%20Integration%20Protocol | The Multi-Vendor Integration Protocol (MVIP) is a hardware bus for computer telephony integration (Audiotex) equipment, a PCM data highway for interconnecting expansion boards inside a PC. It was invented and brought to market by Natural Microsystems Inc (now BPQ Communicationser).
Used to build call center equipment using regular PCs, MVIP provides a second communications bus within the computer that can multiplex up to 256 full-duplex voice channels from one voice card to another. Digital voice, fax and video is bussed over a ribbon cable connected at the top of each ISA or PCI card. MVIP products make a PC perform like a small-scale PBX. The protocol accommodated for a variety of expansion boards, including trunk interfaces (usually T1 or ISDN), voice processing boards equipment speech recognition or fax processing. Each board could optionally provide a switch that could interconnect voice channels on the bus, allowing for a flexible routing of calls within the MVIP bus.
The MVIP bus was promoted as an alternative to the then-dominant PEB bus by Dialogic Corporation which had much less capacity and was not an open standard.
References
External links
http://www.mvip.org/
http://www.mvip.org/Overview.htm
Computer buses
Computer telephony integration |
https://en.wikipedia.org/wiki/Association%20of%20Autonomous%20Astronauts | The Association of Autonomous Astronauts is a worldwide network of community-based groups dedicated to building their own spaceships. The AAA was founded 23 April 1995. Although many of their activities were reported as serious participation in conferences or protests against the militarization of space, some were also considered art pranks, media pranks, or elaborate spoof. The AAA had numerous local chapters which operated independently of one another, with the AAA effectively operating as a collective pseudonym along the lines of Luther Blissett (nom de plume).
The Association's ostensible five-year mission, a reference to Star Trek, was to "establish a planetary network to end the monopoly of corporations, governments and the military over travel in space". Artists who became involved were often connected to the zine scene or mail art movements. The five-year mission's completion was marked at the 2000 Fortean Times conference. Some chapters have continued activities to the present day. Several AAAers have experienced zero-gravity training flights.
The writer Tom Hodgkinson described participants as "a loose bunch of Marxists, futurists, and revolutionaries on the dole", going on to explicate their mission as "reclaim[ing] the idea of space travel for the common man". To the AAA, he said, "space travel represented an ideal of freedom". Annick Bureaud of Leonardo/OLATS viewed their work as "space art" that "combine[d] freely space, cyberspace, raves, esoteric things, techno-music, etc.", calling attention to "how they recycle ... key images (the MIR Space Station, the astronauts on the Moon, etc.) ... mixed with science-fiction (and specially Star Trek) buzz-words or images" and then subjected these "sacred icons" to "iconoclastic treatments".
In his book Unleashing the Collective Phantoms, the theorist Brian Holmes said of the AAA: "The ideas sound fantastic, but the stakes are real: imagining a political subject within the virtual class, and therefore, within the economy of cultural production and intellectual property that had paralyzed the poetics of resistance."
The London chapter participated in the J18 Carnival Against Capitalism protests during that year's G8 summit, with a contingent of AAA members dressed in space suits delivering a petition against the militarisation of space to the headquarters of Lockheed. The group was particularly concerned about the Cassini-Huygens spacecraft and its RTG power source performing an earth fly-by to boost its speed toward the outer Solar System.
Timeline
23 April 1995: Launch of the Association of Autonomous Astronauts in the grounds of Windsor Castle, UK.
23 April 1996: Publication of 1st Annual Report: "Here Comes Everybody!"
23 April 1997: Publication of 2nd Annual Report: "Dreamtime Is Upon Us!"
21–22 June 1997: 1st Intergalactic Conference – Public Netbase, Vienna, Austria
23 April 1998: Publication of 3rd Annual Report: "Moving in Several Directions At Once!"
18–19 April 1998: Intergal |
https://en.wikipedia.org/wiki/MSE | MSE may refer to:
Education
Master of Science in Engineering, a university degree
Master of Science in Software Engineering, a college degree in software engineering
Master of Software Engineering, a university degree; for example at the Information and Communications University
Science, technology and engineering
Manned Spaceflight Engineer, an astronaut in the United States Air Force's Manned Spaceflight Engineer Program
Mars Surface Exploration
Materials Science and Engineering
Maunakea Spectroscopic Explorer, a planned renovation of the Canada–France–Hawaii Telescope
Maximum spacing estimation, in statistics
Mean squared error, in statistics
Mechanically stabilized earth
Mental status examination, used by clinicians to assess aspects of a patient's mental state
Mercury Surface Element, the lander portion of BepiColombo space mission
MSE (centrifuges), Measuring and Scientific Equipment, manufacturer of laboratory centrifuges
Selenomethionine, a naturally occurring amino acid
Computing
Message Stream Encryption, a BitTorrent protocol encryption
Media Source Extensions, a W3C standard for Javascript media streaming
Metasearch engine, a search engine that consolidates results from other search engines
Microsoft Security Essentials, a free antivirus software
Mobile Subscriber Equipment, a tactical communications system formerly used by units such as the 17th Signal Battalion (United States)
Stock exchanges
Macedonian Stock Exchange
Madras Stock Exchange
Madrid Stock Exchange
Malawi Stock Exchange
Malta Stock Exchange
Mongolian Stock Exchange
Montenegro Stock Exchange
Montreal Stock Exchange
Other
Kent International Airport, by IATA airport code
Mississippi Export Railroad, common freight carrier in Mississippi, by reporting mark
Martha Stewart Everyday, a mass-market brand of Martha Stewart Living Omnimedia sold through Kmart
Medical Science Educator, academic journal
Melbourne String Ensemble
Micro and Small Enterprises
Ministry of Sustainability and the Environment, in Singapore
MoneySavingExpert.com, a British consumer finance information website
Monumental Sports & Entertainment, company owned by American businessman Ted Leonsis |
https://en.wikipedia.org/wiki/Taggart | Taggart is a Scottish detective fiction television programme created by Glenn Chandler, who wrote many of the episodes, and made by STV Studios for the ITV network. It originally ran as the miniseries "Killer" from 6 until 20 September 1983, before a full series was commissioned that ran from 2 July 1985 until 7 November 2010. The series revolved around a group of detectives initially in the Maryhill CID of Strathclyde Police, though various storylines were set in other parts of Greater Glasgow and in other areas of Scotland. The team operated out of the fictional John Street police station. Mark McManus, who played the title character Jim Taggart, died in 1994. However, the series continued under the same name. Taggart is one of the UK's longest-running television dramas.
History
The Scottish BAFTA-winning pilot episode "Killer", directed by Laurence Moody and broadcast in 1983, introduced the character Detective Chief Inspector Jim Taggart (played by Mark McManus until his death in 1994), a tough and experienced detective who had worked his way up through the ranks. His original sidekick was Detective Sergeant Peter Livingstone (Neil Duncan). Livingstone represented the new breed of young graduates entering the police force and frequently had a difficult relationship with Taggart as a result. Taggart's boss in the pilot was Superintendent Robert Murray (Tom Watson), and his boss after the second episode, "Dead Ringer", was Superintendent Jack McVitie (Iain Anders). Another important character was Taggart's wife Jean (Harriet Buchan), whose physical disability did not prevent her from pursuing a number of interests in life, while her cynical husband stuck mainly to his job. Throughout the McManus era, there was nearly always a sub-plot in every episode which involved the domestic life of the Taggarts, which on occasion became intertwined with the case being investigated. The most memorable of these was the Taggarts' ongoing care of Jean's senile Aunt Hettie (Sheila Donald), whom Jim despises and begrudges staying in his house. This sub-plot ran through 1990–91 until the Hettie character was killed off in the 1991 season finale, "Violent Delights", in which her funeral is carried out by a corrupt firm of undertakers who are also the subject of Taggart's investigation.
In 1987 the character of Michael Jardine (James MacPherson) was introduced. Neil Duncan left the series in 1987 and in 1990 a new female sidekick Jackie Reid (Blythe Duff) was introduced.
McManus died in 1994 during the filming of an episode. Taggart's absence in the broadcast story was explained by his being in meetings with the Chief Constable throughout. In 1995 the episode "Black Orchid" opened with Taggart's funeral. Despite the death of the title character the series continued. Jardine was promoted to Detective Inspector and DC Stuart Fraser (Colin McCredie) was introduced, becoming the long-suffering sidekick to Jardine, former long-suffering sidekick to Taggart. Fraser wa |
https://en.wikipedia.org/wiki/Non-photorealistic%20rendering | Non-photorealistic rendering (NPR) is an area of computer graphics that focuses on enabling a wide variety of expressive styles for digital art, in contrast to traditional computer graphics, which focuses on photorealism. NPR is inspired by other artistic modes such as painting, drawing, technical illustration, and animated cartoons. NPR has appeared in movies and video games in the form of cel-shaded animation (also known as "toon" shading) as well as in scientific visualization, architectural illustration and experimental animation.
History and criticism of the term
The term non-photorealistic rendering is believed to have been coined by the SIGGRAPH 1990 papers committee, who held a session entitled "Non Photo Realistic Rendering".
The term has received some criticism:
The term "photorealism" has different meanings for graphics researchers (see "photorealistic rendering") and artists. For artists—who are the target consumers of NPR techniques—it refers to a school of painting that focuses on reproducing the effect of a camera lens, with all the distortion and hyper-reflections that it creates. For graphics researchers, however, it refers to an image that is visually indistinguishable from reality. In fact, graphics researchers lump the kinds of visual distortions that are used by photorealist painters into "non-photorealism".
Describing something by what it is not is problematic. Equivalent (made-up) comparisons might be "non-elephant biology" or "non-geometric mathematics". NPR researchers have stated that they expect the term will disappear eventually and be replaced by the now more general term "computer graphics", with "photorealistic graphics" being the term used to describe "traditional" computer graphics.
Many techniques that are used to create 'non-photorealistic' images are not rendering techniques. They are modelling techniques, or post-processing techniques. While the latter are coming to be known as 'image-based rendering', sketch-based modelling techniques, cannot technically be included under this heading, which is very inconvenient for conference organisers.
The first conference on non-photorealistic animation and rendering included a discussion of possible alternative names. Among those suggested were "expressive graphics", "artistic rendering", "non-realistic graphics", "art-based rendering", and "psychographics". All of these terms have been used in various research papers on the topic, but the "non-photorealistic" term seems to have nonetheless taken hold.
The first technical meeting dedicated to NPR was the ACM-sponsored Symposium on Non-Photorealistic Rendering and Animation (NPAR) in 2000. NPAR is traditionally co-located with the Annecy Animated Film Festival, running on even numbered years. From 2007 onward, NPAR began to also run on odd-numbered years, co-located with ACM SIGGRAPH.
3D
Three-dimensional NPR is the style that is most commonly seen in video games and movies. The output from this technique i |
https://en.wikipedia.org/wiki/Geekcorps | Geekcorps is a non-profit organization that sends people with technical skills to developing countries to assist in computer infrastructure development.
The non-profit was created in 2000 by Ethan Zuckerman and Elisa Korentayer in North Adams, Massachusetts. In 2001 Geekcorps became a division of the International Executive Service Corps located in Washington, D.C.
Creation
After a visit to a Ghana library by Zuckerman in 1993, the lack of up-to-date resources available prompted him to create Geekcorps years later. Humanitarian and banker Elisa Korentayer became co-founder of Geekcorps due to the organization's need of financial wisdom. In effort to increase access to current information and bridge the digital divide in developing nations Zuckerman, and associates from his now bought out internet company tripod, funded most of the $350,000 budget for Geekcorps' first year.
Major projects
Ghana
Starting September 2000, with 6 volunteers selected from over 200 applicants, Geekcorps first mission was in Accra, Ghana. Co-founder Zuckerman was already familiar with the infrastructure of Ghana. Zuckerman stated, "The government has relatively liberal telecommunications and investment policies, making it possible for IT businesses to be built there." Geekcorps initial focus in Ghana was assisting companies in the capital city Accra with its IT expertise. Geekcorps had an understanding with local businesses, after receiving help, the businesses involved were to help the locals with their newfound resources. Initial challenges for Geekcorps were communication and teaching skills needed by volunteers, and reliance on outdated programming languages for local businesses. Geekcorps involvement led to innovations such as a new java based payment system for local businesses in Ghana. Geekcorps was also instrumental in the creation of Ghana's internet exchange point in 2005.
Mali
Initial assistance in Mali came from the CMRT (Community Mobilization through Radio Technology) program sponsored by USAID. Under CMRT, Geekcorps installed 5 radio stations to enable local communication through the area. Later under another program Radio for Peace Building, Geekcorps installed another 11 stations, and renovations were done to older existing stations.
Geekcorps set up ICT stations in less populated areas of Mali in 2006. These stations were updated by a memory stick delivered from a computer center with internet access in Ouelessebougou. Although this allowed many rural locations access to specific web resources, such as web pages and digital media, due to lack of interest the program was modified after a year. Yearly updates to more desired information such as Moulin, a French version of Wikipedia, became the focus.
Intel partnership and OLPC astroturf controversy
In 2007 Geekcorps Director Wayan Vota was accused of disparaging the OLPC project through a "OLPC News" website without disclosing Geekcorps' promotion of Intel's rival laptop, the Classmate PC and |
https://en.wikipedia.org/wiki/NX%20technology | NX technology, commonly known as NX or NoMachine, is a remote access and remote control computer software, allowing remote desktop access and maintenance of computers. It is developed by the Luxembourg-based company NoMachine S.à r.l.. NoMachine is proprietary software and is free-of-charge for non-commercial use.
History
NX's design was derived from the Differential X Protocol Compressor project (DXPC). In 2003, the compression and transport protocol NX was created to improve the performance of the native X display protocol so it could be used over slow connections such as dial-up modems. It wrapped remote connections in SSH sessions for encryption. The core compression technology was released under the GNU GPL2 license (NX 1) for Linux servers on February 14, 2003, whilst other components such as the NX Server and NX Client programs remained proprietary. The last update to this open-source version was released in 2012.
In 2010, the company announced they would be releasing the technology under a proprietary license. In 2013, NX became closed-source with the release of version 4.0 . It was in 2013 that NX software became NoMachine software.
Features
NoMachine is available for most desktop computers with common operating systems, including Microsoft Windows and Windows Server, as well as Apple's macOS. There are also packages for several Linux distributions and derivatives, for example, Debian, Ubuntu, Red Hat, CentOS and Fedora Linux. There is also a version which can run on distribution variants for Linux ARM devices, including Raspberry Pi OS. An app is available which allows users to connect from smartphones and tablets running Android or Apple's iOS/iPadOS operating system.
NoMachine Terminal Server Family for Linux also offers the ability to run multiple virtual Linux desktops on a Linux server which are remotely accessed over a network connection. Images rendered on the server are compressed and encoded and then sent to the client for decryption and decompression. NX utilizes uses a combination of video and image encoding based on standard codecs and a number of techniques developed by NoMachine as well as VirtualGL to access high-end OpenGL-based X11 applications and 3D CAD programs.
NX 4 and later versions
NX 4 introduced optimal image compression and caching with the latest video-encoding techniques. When connecting hosts across the network, the NX protocol works as a generic tunnel, with additional framing and flow control information, and dynamically adapts compression and bandwidth according to network speed and capacity. For compatibility, multiplexing is based on version 3.
Client applications can connect using the SSH protocol, with the same authentication mechanisms as version 3, by a new SSH system login, or by the new SSL-enabled NX daemon. Once a secure connection is established, clients negotiate a desktop session using a text protocol compatible with that used in version 3. Clients can also use one of the various N |
https://en.wikipedia.org/wiki/IEEE%20802.1Q | IEEE 802.1Q, often referred to as Dot1q, is the networking standard that supports virtual local area networking (VLANs) on an IEEE 802.3 Ethernet network. The standard defines a system of VLAN tagging for Ethernet frames and the accompanying procedures to be used by bridges and switches in handling such frames. The standard also contains provisions for a quality-of-service prioritization scheme commonly known as IEEE 802.1p and defines the Generic Attribute Registration Protocol.
Portions of the network which are VLAN-aware (i.e., IEEE 802.1Q conformant) can include VLAN tags. When a frame enters the VLAN-aware portion of the network, a tag is added to represent the VLAN membership. Each frame must be distinguishable as being within exactly one VLAN. A frame in the VLAN-aware portion of the network that does not contain a VLAN tag is assumed to be flowing on the native VLAN.
The standard was developed by IEEE 802.1, a working group of the IEEE 802 standards committee, and continues to be actively revised with notable amendments including IEEE 802.1ad, IEEE 802.1ak and IEEE 802.1s. The 802.1Q-2014 revision incorporated the IEEE 802.1D-2004 standard.
Frame format
802.1Q adds a 32-bit field between the source MAC address and the EtherType fields of the original frame. Under 802.1Q, the maximum frame size is extended from 1,518 bytes to 1,522 bytes. The minimum frame size remains 64 bytes, but a bridge may extend the minimum size frame from 64 to 68 bytes on transmission. This allows a tag to be popped without needing additional padding. Two bytes are used for the tag protocol identifier (TPID), the other two bytes for tag control information (TCI). The TCI field is further divided into PCP, DEI, and VID.
Tag protocol identifier (TPID)
A 16-bit field set to a value of 0x8100 in order to identify the frame as an IEEE 802.1Q-tagged frame. This field is located at the same position as the EtherType field in untagged frames, and is thus used to distinguish the frame from untagged frames.
Tag control information (TCI)
A 16-bit field containing the following sub-fields:
Priority code point (PCP)
A 3-bit field which refers to the IEEE 802.1p class of service (CoS) and maps to the frame priority level. Different PCP values can be used to prioritize different classes of traffic.
Drop eligible indicator (DEI)
A 1-bit field. (formerly CFI) May be used separately or in conjunction with PCP to indicate frames eligible to be dropped in the presence of congestion.
VLAN identifier (VID)
A 12-bit field specifying the VLAN to which the frame belongs. The values of 0 and 4095 (0x000 and 0xFFF in hexadecimal) are reserved. All other values may be used as VLAN identifiers, allowing up to 4,094 VLANs. The reserved value 0x000 indicates that the frame does not carry a VLAN ID; in this case, the 802.1Q tag specifies only a priority (in PCP and DEI fields) and is referred to as a priority tag. On bridges, VID 0x001 (the default VLAN ID) is often reserved for a ne |
https://en.wikipedia.org/wiki/International%20Psychopharmacology%20Algorithm%20Project | The International Psychopharmacology Algorithm Project (IPAP) is a non-profit corporation whose purpose is to "enable, enhance, and propagate" use of algorithms for the treatment of some Axis I psychiatric disorders.
Kenneth O Jobson founded the Project. The Dean Foundation provides funding.
IPAP has organized and supported several international conferences on psychopharmacology algorithms. It has also supported the creation of several algorithms based on expert opinion. It is now in the process of creating "evidence-based algorithms," that is algorithms created by experts and annotated with the evidence that leads to these algorithms. A schizophrenia algorithm has been created and one on Post Traumatic Stress Disorder (PTSD) was released in July 2005. A general anxiety disorder (GAD) algorithm was released in 2006. Periodic updates of the algorithms are released as the basis of evidence changes. In addition, the algorithms are being translated into various non-English languages (Chinese, Japanese, Spanish, and Thai) as the availability of translators permits.
References
External links
Psychiatry organizations
Biostatistics |
https://en.wikipedia.org/wiki/DB9 | DB9 or DB-9 may refer to:
Aston Martin DB9, a British sports car
Atari joystick port, DB9 classic video game controller port made popular for game consoles and home computers mainly through the 1980s and ‘90s
Darren Bent, English football forward who wears the number 9 shirt for Aston Villa F.C.
DB9 (yacht), a superyacht built by Palmer Johnson in 2010
DE-9 connector, a common type of D-subminiature electrical connector.
Dimitar Berbatov, Bulgarian footballer who plays as a forward for Fulham F.C. wearing a number 9 shirt |
https://en.wikipedia.org/wiki/Sirius%20Joyport | The Sirius Joyport is a game controller adapter for the Apple II computer designed by Keithen Hayenga and Steve Woita (who were employed by Apple at the time) and then licensed for manufacture and distribution in 1981 by Sirius Software.
The device was meant to address a limitation in the built-in game control offered by the Apple II, by allowing either four Apple-compatible paddles or two Atari-style joysticks (but not both types at once) to be read by the computer simultaneously. The built-in game port on the Apple II, II+, IIe, and IIgs supports four analog paddles or two analog sticks, but only 3 buttons.
With the Joyport, a game can support twice as many players as with a standard Apple game port, but game designers had to specifically modify their code to take input from the Atari side of the Joyport. Many of them did so, and this modification is what is often seen listed in Apple II game configuration screens as the "Atari Joyport" option.
The recommended Atari joysticks are switch-driven (i.e. digital), instead of the usual smoother-action analog sticks available for the Apple II. Since the Apple II hardware makes no distinction between two paddles or a single analog joystick plugged into the same jack, it is also been possible to connect and read two fully analog joysticks with the Joyport via the paddle jacks, but few (if any) two-joystick games supports this, and Sirius did not suggest it. Why not is unclear, but there may be a noticeable speed advantage when driving two digital rather than analog joysticks on the limited hardware of the time.
Physical characteristics and packaging
The Joyport is a white plastic brick about the size of a paperback novel that connects to the standard internal Apple II gameport and breaks it out into two Atari joystick ports and two Apple ports. A switch in the center controls whether to activate the paddles or the joysticks. Another switch optionally disables either the left- or right-side jacks.
Bundled with the Joyport is Computer Foosball, which was written specifically by Hayenga for up to four players at once on the Apple II. Also included are BASIC and Pascal source code listings of sample programs making use of the Joyport, indicating the hobbyist influence in the market at the time it was released.
Story of its invention
The impetus for the invention of the Joyport came from well-known game designer Bill Budge, who Woita met at Apple and who had been thinking about a way to port games that required manipulation of two joysticks to the Apple II (Crazy Climber was mentioned specifically.). Woita agreed to work on a solution involving Atari controllers, and since at the time Hayenga was already working at Apple on a way to connect four paddles at once, the two hardware engineers began to cooperate on a single device, which was later christened the "Joyport".
Both Woita and Hayenga were hired by Atari, where Woita designed the games Quadrun (1983), Asterix (1984), and TAZ (1984), for the At |
https://en.wikipedia.org/wiki/Jason%27s%20Gem | Jason's Gem is a computer game for the ZX Spectrum. It was published in 1985 by Mastertronic and written by Simon White. The hero Jason must make his way through a series of caves in search of the legendary gem of the title.
The game begins with Jason docking his spaceship on a moving platform. He then descends through rocky caverns blasting away the rocks as he goes. Upon reaching the bottom of the caves he must negotiate a series of platform screens before reaching his goal and attaining glory.
External links
GameFAQs
1985 video games
Europe-exclusive video games
Mastertronic games
ZX Spectrum games
ZX Spectrum-only games
Video games developed in the United Kingdom |
https://en.wikipedia.org/wiki/New%20Jersey%20Network | The New Jersey Network (NJN) was a network of public television and radio stations serving the U.S. state of New Jersey. NJN was a member of the Public Broadcasting Service (PBS) for television and the National Public Radio (NPR) for radio, broadcasting their programming as well as producing and broadcasting their own programming, mostly relating to issues in New Jersey. With studios in both Trenton and Newark, NJN's television network covered all of New Jersey, plus parts of Pennsylvania, New York, Connecticut and Delaware. The radio network primarily served several areas of New Jersey that were not covered by Philadelphia and New York City public radio stations.
New Jersey Network ended operations on June 30, 2011. The television network was succeeded by NJTV (now branded as "NJ PBS"), and the radio stations were split through two separate sales to NPR-member stations in Philadelphia and New York.
Early history
The system was founded in 1968 by an act of the New Jersey Legislature establishing the New Jersey Public Broadcasting Authority (NJPBA). New Jersey already had a public television station licensed within the state, WNET (channel 13), licensed to Newark. However, while WNET had offices and studios in Newark, for all practical purposes it was a New York City station, effectively leaving New Jersey without a public station of its own.
With state funding and four UHF licenses assigned years earlier by the Federal Communications Commission, the NJPBA went to work building the state's public television stations. The first station, WNJT (channel 52) in Trenton, went on the air on April 5, 1971, with the other three stations signing on over the next two years. The system was known on-air as New Jersey Public Television (NJPTV) until 1981, when it adopted the New Jersey Network identity.
Due to New Jersey being split between the New York City and Philadelphia television markets, NJN's television network reached one of the largest potential audiences in the country. At the time of its closure, it potentially reached over 25 million people in parts of five states. However, it also forced NJN to compete directly against three of the highest-rated PBS stations in the nation–WNET, secondary New York City member station WLIW, and Wilmington, Delaware-licensed WHYY-TV, in the Philadelphia market. Two other PBS member stations based in Pennsylvania, WLVT-TV in Allentown and WVIA-TV in Scranton, were also viewable in portions of NJN's coverage area.
NJN spent most of its existence trying to carve out a niche of its own. One of its solutions had been to air some of the more popular PBS shows on a delayed basis, after the nearby stations had carried the national PBS feed. Programs that might be seen on WNET and WHYY-TV would air on NJN a week or two later. Another solution was to focus on its news operation. The latter worked very well, as NJN and its reporters won many awards for their journalistic efforts. In the 1980s, NJN was the first media |
https://en.wikipedia.org/wiki/NJN | NJN may refer to the following:
New Jersey Network, the former statewide public television and radio network in New Jersey, a member of PBS and NPR
New Jersey Nets, a former American professional basketball team in the National Basketball Association (NBA) |
https://en.wikipedia.org/wiki/Maryland%20Public%20Television | Maryland Public Television (MPT) is the Public Broadcasting Service (PBS) member state network for the U.S. state of Maryland. It operates under the auspices of the Maryland Public Broadcasting Commission, an agency of the Maryland state government that holds the licenses for all PBS member stations licensed in the state.
Studios are located in the unincorporated community of Owings Mills in northwestern Baltimore County. MPT operates six full-power transmitters that cover nearly all of the state, plus Washington, D.C., and parts of Virginia, West Virginia, Delaware, and Pennsylvania.
History
WMPB (licensed to Baltimore) first signed on in 1969 as the first station of the Maryland Center for Public Broadcasting; it gained satellite stations in Salisbury, Hagerstown, and Annapolis between 1971 and 1975, resulting in a formation of a statewide public television network. The network adopted its current name in 1984. Maryland Instructional Television (Maryland ITV), a division of the State Department of Education, was also housed at the network until 1991. On July 4, 1987, WFPT (licensed to Frederick) signed on to fill coverage gaps in the outer Washington market, while WGPT in Oakland began operations to cover the extreme west of the state, much of which previously had no local television service at all.
About 1999, the network launched an afternoon Britcom programming block, Afternoon Tea, replacing children's programming. By 2009, MPT was airing kids' programming during the day on its MPT Select channel.
In September 2015, as part of budget cuts, MPT outsourced its master control operations to Public Media Management—a joint venture of Boston PBS member WGBH and Sony Corporation.
Productions
Current regional productions
MPT Salutes Vietnam Veterans: Maryland Public Television salutes the men and women who served in the Vietnam era
Chesapeake Collectibles: weekly series featuring people and their collectibles
Maryland Farm & Harvest: weekly series helping Marylanders learn more about agriculture
Chesapeake Bay Week: week long series of programs in April dedicated to the Chesapeake Bay
Direct Connection: public affairs call-in show focusing on discussion and analysis of politics and the news
Outdoors Maryland: outdoors show highlighting the Mid-Atlantic region's diversity and beauty
State Circle: news and analysis program detailing Maryland's General Assembly proceedings
Ways to Pay for College: annual special on finding money for higher education
Your Money & Business: consumer-oriented business magazine
Artworks: regional arts updates and specials highlighting Maryland's culture and history
Our Town: a collection of documentaries showcasing different towns across Maryland
Nationally distributed productions
The McLaughlin Group: (2019–2020) a weekly political affairs round table
Steven Raichlen's Project Smoke & Project Fire: (2015–2019) outdoor cooking series with Steven Raichlen.
MotorWeek: (1981–present) automotive magazine featuring n |
https://en.wikipedia.org/wiki/Data%20loss | Data loss is an error condition in information systems in which information is destroyed by failures (like failed spindle motors or head crashes on hard drives) or neglect (like mishandling, careless handling or storage under unsuitable conditions) in storage, transmission, or processing. Information systems implement backup and disaster recovery equipment and processes to prevent data loss or restore lost data. Data loss can also occur if the physical medium containing the data is lost or stolen.
Data loss is distinguished from data unavailability, which may arise from a network outage. Although the two have substantially similar consequences for users, data unavailability is temporary, while data loss may be permanent. Data loss is also distinct from data breach, an incident where data falls into the wrong hands, although the term data loss has been used in those incidents.
Types
Procedural
Intentional action
Intentional deletion of a file or program
Unintentional action
Accidental deletion of a file or program
Misplacement of physical storage media
Administration errors
Inability to read unknown file format
Failure
Power failure, resulting in data in volatile memory not being saved to permanent memory.
Hardware failure, such as a head crash in a hard disk.
A software crash or freeze, resulting in data not being saved.
Software bugs or poor usability, such as not confirming a file delete command.
Business failure (vendor bankruptcy), where data is stored with a software vendor using Software-as-a-service and SaaS data escrow has not been provisioned.
Data corruption, such as file system corruption or database corruption.
Disaster
Natural disaster, earthquake, flood, tornado, etc.
Fire
Crime
Theft, hacking, SQL injection, sabotage, etc.
A malicious act, such as a worm, virus, Ransomware, hacking or theft of physical media.
Studies show hardware failure and human error are the two most common causes of data loss, accounting for roughly three quarters of all incidents. Another cause of data loss is a natural disaster, which is a greater risk dependent on where the hardware is located. While the probability of data loss due to natural disaster is small, the only way to prepare for such an event is to store backup data in a separate physical location. As such, the best backup plans always include at least one copy being stored off-site.
Cost
The cost of a data loss event is directly related to the value of the data and the length of time that it is unavailable yet needed. For an enterprise in particular, the definition of cost extends beyond the financial and can also include time.
Consider:
The cost of continuing without the data
The cost of recreating the data
The cost of notifying users in the event of a compromise
Prevention
The frequency of data loss and the impact can be greatly mitigated by taking proper precautions, those of which necessary can vary depending on the type of data loss. For example, multiple power |
https://en.wikipedia.org/wiki/Computacenter | Computacenter plc is a British multinational that provides computer services to public- and private-sector customers. It is a UK company based in Hatfield, Hertfordshire. The company is listed on the London Stock Exchange and is a constituent of the FTSE 250 Index.
History
Computacenter was founded in the UK in 1981 by Philip Hulme and Peter Ogden. In 1990, it opened Europe's largest PC outlet; in 1991, it was listed by The Independent newspaper as one of the fastest growing independent companies in the UK and, by 1994, it had grown to become the largest privately owned IT company in the UK. Computacenter was floated on the London Stock Exchange in 1998. In 2006 the company extended its service facilities to include a new International Service Centre in Barcelona, Spain, and a customer help desk and remote management facility in Cape Town, South Africa.
Operations
The company is engaged in the supply, implementation, support and management of information technology systems. Computacenter operates subsidiaries and brands that address specific market segments. The following companies were acquired by Computacenter and are now integrated within their business:
Digica, which provides outsourcing and managed IT services to the corporate mid-market and the public sector.
Allnet, which specialises in network integration and structured cabling services
Sponsorships
Computacenter was a sponsor of the Renault Sport F1 Team.
Social responsibility
Computacenter has committed itself to the 10 core principles of United Nations Global Compact. The company also works with its customers to help them meet their 'sustainable IT' objectives. In November 2007 Computacenter won BT’s inaugural Supplier Innovation Award for its work on virtualising and consolidating a number of their UK datacentres, helping BT reduce the carbon footprint. Computacenter says its cost-neutral service to Marks & Spencer has also helped M&S meet its WEEE requirements and its 'Plan A' environmental objectives, sending zero IT waste from M&S head office to landfill in 2008. The German branch of Computacenter is partner of the White IT, an alliance against Internet child pornography.
References
External links
Computer companies of the United Kingdom
Companies based in Welwyn Hatfield
Computer companies established in 1981
Companies listed on the London Stock Exchange |
https://en.wikipedia.org/wiki/Cache%20coloring | In computer science, cache coloring (also known as page coloring) is the process of attempting to allocate free pages that are contiguous from the CPU cache's point of view, in order to maximize the total number of pages cached by the processor. Cache coloring is typically employed by low-level dynamic memory allocation code in the operating system, when mapping virtual memory to physical memory. A virtual memory subsystem that lacks cache coloring is less deterministic with regards to cache performance, as differences in page allocation from one program run to the next can lead to large differences in program performance.
Details of operations
A physically indexed CPU cache is designed such that addresses in adjacent physical memory blocks take different positions ("cache lines") in the cache, but this is not the case when it comes to virtual memory; when virtually adjacent but not physically adjacent memory blocks are allocated, they could potentially both take the same position in the cache. Coloring is a technique implemented in memory management software, which solves this problem by selecting pages that do not contend with neighbor pages.
Physical memory pages are "colored" so that pages with different "colors" have different positions in CPU cache memory. When allocating sequential pages in virtual memory for processes, the kernel collects pages with different "colors" and maps them to the virtual memory. In this way, sequential pages in virtual memory do not contend for the same cache line.
Implementations
This code adds a significant amount of complexity to the virtual memory allocation subsystem, but the result is well worth the effort. Page coloring makes virtual memory as deterministic as physical memory with regard to cache performance. Page coloring is employed in operating systems such as Solaris, FreeBSD, NetBSD, and Windows NT.
References
External links
"Page Placement Algorithms for Large Real-Indexed Caches," by R. E. Kessler, Mark D. Hill, University of Wisconsin, 1992.
"Colorable Memory," by Jochen Liedtke, IBM T. J. Watson Center, Nov. 1996.
"缓存着色技术," by Maray, CSDN Technological Blog, 2008.
Cache (computing) |
https://en.wikipedia.org/wiki/IEEE%20802.22 | IEEE 802.22, is a standard for wireless regional area network (WRAN) using white spaces in the television (TV) frequency spectrum.
The development of the IEEE 802.22 WRAN standard is aimed at using cognitive radio (CR) techniques to allow sharing of geographically unused spectrum allocated to the television broadcast service, on a non-interfering basis, to bring broadband access to hard-to-reach, low population density areas, typical of rural environments, and is therefore timely and has the potential for a wide applicability worldwide. It is the first worldwide effort to define a standardized air interface based on CR techniques for the opportunistic use of TV bands on a non-interfering basis.
IEEE 802.22 WRANs are designed to operate in the TV broadcast bands while assuring that no harmful interference is caused to the incumbent operation: digital TV and analog TV broadcasting, and low power licensed devices such as wireless microphones.
The standard was expected to be finalized in Q1 2010, but was finally published in July 2011.
IEEE P802.22.1 is a related standard being developed to enhance harmful interference protection for low power licensed devices operating in TV Broadcast Bands..
IEEE P802.22.2 is a recommended practice for the installation and deployment of IEEE 802.22 Systems.
IEEE 802.22 WG is a working group of IEEE 802 LAN/MAN standards committee which was chartered to write the 802.22 standard. The two 802.22 task groups (TG1 and TG2) are writing 802.22.1 and 802.22.2 respectively.
Technology
In response to a notice of proposed rulemaking (NPRM) issued by the U.S. Federal Communications Commission (FCC) in May 2004, the IEEE 802.22 working group on Wireless Regional Area Networks was formed in October 2004.
Its project, formally called as Standard for Wireless Regional Area Networks (WRAN) - Specific requirements - Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and procedures for operation in the TV Bands focused on constructing a consistent, national fixed point-to-multipoint WRAN that will use UHF/VHF TV bands between 54 and 862 MHz. Specific TV channels as well as the guard bands of these channels are planned to be used for communication in IEEE 802.22.
The Institute of Electrical and Electronics Engineers (IEEE), together with the FCC, pursued a centralized approach for available spectrum discovery. Specifically each base station (BS) would be armed with a GPS receiver which would allow its position to be reported. This information would be sent back to centralized servers (in the USA these would be managed by the FCC), which would respond with the information about available free TV channels and guard bands in the area of the BS. Other proposals would allow local spectrum sensing only, where the BS would decide by itself which channels are available for communication. A combination of these two approaches is also envisioned. Devices which would operate in |
https://en.wikipedia.org/wiki/Line%20drawing | Line drawing may mean:
Line art, a style of two-dimensional art featuring only two, unshaded, contrasting colors
Line drawing algorithm, in computer graphics
See also
Box-drawing character, also known as a line-drawing character |
https://en.wikipedia.org/wiki/Benjamin%20C.%20Pierce | Benjamin Crawford Pierce is the Henry Salvatori Professor of computer science at the University of Pennsylvania. Pierce joined Penn in 1998 from Indiana University and held research positions at the University of Cambridge and the University of Edinburgh. He received his Ph.D. from Carnegie Mellon University in 1991. His research includes work on programming languages, static type systems, distributed programming, mobile agents, process calculi, and differential privacy.
As part of his research, Pierce has led development on several open-source software projects, including the Unison file synchronization utility.
In 2012 Pierce became an ACM Fellow for "contributions to the theory and practice of programming languages and their type systems". In 2015 Pierce and co-authors received the award for the most influential Principles of Programming Languages paper, which was described as "instrumental in bringing the view-update problem to the attention of the programming languages community and demonstrating the broad relevance of the problem beyond databases. [...] More broadly, the paper sparked a great deal of follow-on work in the area of BX (“bidirectional transformations”), leading to a fruitful collaboration between the worlds of databases, programming languages, and software engineering."
Books
He is the author of one book on type systems, Types and Programming Languages . He has also edited a collection of articles to create a second volume Advanced Topics in Types and Programming Languages . Based on the notes he collected while learning category theory during his PhD, he also published an introductory book on this topic—Basic Category Theory for Computer Scientists, . He is one of the authors of the freely available book Software Foundations.
See also
POPLmark challenge
References
External links
Prof. Pierce's Homepage
American computer scientists
Living people
Programming language researchers
Year of birth missing (living people)
University of Pennsylvania faculty |
https://en.wikipedia.org/wiki/Ecasound | Ecasound is a hard-disk recording and audio processing tool for Unix-like computer operating systems including Linux, Mac OS X, and FreeBSD.
Ecasound allows flexible interconnection of audio inputs, files, outputs, and effects algorithms, realtime-controllable by builtin oscillators, MIDI, or interprocess communication via GUI front-end. Ecasound supports JACK and LADSPA effects plug-ins.
The team leader is Kai Vehmanen, with dozens of contributors. Kai joined the project in 1995, when it was called wavstat, a simple DSP utility running under OS/2. Available under the GNU General Public License, Ecasound is free software.
User Interface
Ecasound is a command-line tool: it does not include a native graphical interface. Major tasks (recording, mixdown) can be easily performed directly from the command line interface, or by scripts. Several GUI front-ends have been written for it:
EcaEnveloptor – Creates envelopes for ecasound objects, requires PyGTK & pyecasound. Non-realtime. By Arto Hamara (13/06/2001)
Nama – multi-track recorder, mixer and mastering application. Tk and ReadLine interfaces. By Joel Roth (13/01/2010)
EMi (Ecasound Mastering interface) – virtual rack-mount effect. Python-based. By Felix Le Blanc (27/04/2006)
GAS (Graphical Audio Sequencer) – multi-track recording and mixing. GTK based. by Luke Tindall. (2001) (?-site down)
TkEca – Controls almost all features: multi-track recorder/mixer. Tcl/Tk interface. By Luis Gasparotto (29/01/2004)
Visecas – Preserves Ecasound semantics: edits chains & audio objects, not tracks/regions. GTK+-based. By Jan Weil (22/01/2004)
See also
List of free software for audio
List of Linux audio software
References
External links
Audio recording software
Free music software
Free audio editors
Audio editing software that uses GTK
Audio software with JACK support
Audio editing software for Linux |
https://en.wikipedia.org/wiki/M%C3%B6ckernbr%C3%BCcke%20%28Berlin%20U-Bahn%29 | Möckernbrücke is a station of the Berlin U-Bahn network in the western Kreuzberg district, in the vicinity of Potsdamer Platz, named after a nearby bridge crossing the Landwehrkanal. It is served by lines U1, U3, and U7.
Overview
The station, located on a viaduct at the northern shore of the Landwehrkanal, is part of the first Stammstrecke route of the U-Bahn, opened on 15 February 1902. As the station also served the nearby Anhalter Bahnhof, the original building soon got too small to cope with the rising number of passengers. It therefore was demolished and replaced by the current station, opened on 25 March 1937. Severely damaged by air raids, it was closed on 30 January 1944 and not reopened until 16 June 1947.
In the course of the extension of the U7 from Mehringdamm to the west, a twin underground station was built at the southern shore of the Landwehrkanal. The U7 platform opened on 28 February 1966 (architect Rümmler)
Möckernbrücke became the line's western terminus until the second continuation to Fehrbelliner Platz on 29 January 1971. The U1/U3 and U7 platforms are connected by a glazed bridge over the Landwehrkanal.
References
External links
U1 (Berlin U-Bahn) stations
U3 (Berlin U-Bahn) stations
U7 (Berlin U-Bahn) stations
Buildings and structures in Friedrichshain-Kreuzberg
Railway stations in Germany opened in 1902 |
https://en.wikipedia.org/wiki/XMS | XMS may refer to:
Cray XMS, a vector processor minisupercomputer
eBuddy XMS, instant-messaging service
ISO 639:xms, Moroccan Sign Language
Macas Airport (IATA: XMS), Ecuador
XMS Capital Partners, a global financial services firm
eXtended Memory Specification, an application programming interface for storing data in extended memory on IBM PC systems
XMS, an API offered by IBM WebSphere MQ
See also
XM 5 (disambiguation)
XM (disambiguation) |
https://en.wikipedia.org/wiki/Button%20Moon | Button Moon is a British children's television programme broadcast in the United Kingdom in the 1980s on the ITV network. Thames Television produced each episode, which lasted ten minutes and featured the adventures of Mr. Spoon who, in each episode, travels to Button Moon in his homemade rocket ship. All the characters are based on kitchen utensils, as are many of the props.
Once on Button Moon, which hangs in "blanket sky", they have an adventure, and look through Mr. Spoon's telescope at someone else such as The Tortoise and the Hare, before heading back to their home on 'Junk Planet'. Episodes also include Mr. Spoon's wife Mrs. Spoon, their daughter, Tina Tea-Spoon and her friend Eggbert. The series ended in 1988 after 91 episodes.
Production
Button Moon was originally conceived by Ian Allen as a stage show for Playboard Puppets in 1978. Two years later, Allen was approached by the producers of popular Thames Television children's series Rainbow, who were looking to introduce new recurring story features for the programme – a search that also resulted in Cockleshell Bay stories also being incorporated into episodes before being spun off into its own series – and were interested in incorporating stories revolving around the Button Moon premise as a recurring feature in the series. However, through these initial meetings, it was quickly felt that there was enough potential for Button Moon to instead be launched as its own TV series for Thames. Following a successful pilot – which would go on to be broadcast as the first regular episode – the first series of thirteen programmes was transmitted in 1980. A further six series of thirteen programmes followed, making a total of ninety-one different Button Moon adventures. The series was repeated on a yearly basis for Thames TV up until 1988. All 91 episodes have been shown on satellite channel UK Gold since spring 1993. Every episode was at least 10 minutes.
Narration was by Robin Parkinson. Puppeteers included Ian Allen, John Thirtle, Francis Wright, Alistair Fullarton, Robin Stevens, Sue Dacre, Chris Leith, Judith Bucklow, Ian Brown, Rhiann West, Tony Holtham and others. The incidental music for the series was written by Peter Goslin. The show's theme tune was composed and performed by Peter Davison and Sandra Dickinson, who were married at the time.
A live stage show toured England in the late 1980s and throughout 1990s.
Litigation
The creator of the show successfully sued the manufacturer of lookalike memorabilia Mr Robert Redshaw of Kapow gifts, in 2013.
This case was featured on an episode of The Sheriffs Are Coming on BBC One.
Episode list
Series 1 (1980-1981)
Series 2 (1981-1982)
Series 3 (1983)
Series 4 (1985)
Series 5 (1986)
Series 6 (1987)
Series 7 (1988)
VHS and DVD releases
DVD
Button Moon – Boat Race was released on 6 July 2009 in the UK. It comprised 10 episodes.
Button Moon – Talent Show was released in 2010 in the UK. It Comprised 3 episodes which are: Button Moon T |
https://en.wikipedia.org/wiki/Passenger%20name%20record | A passenger name record (PNR) is a record in the database of a computer reservation system (CRS) that contains the itinerary for a passenger or a group of passengers travelling together. The concept of a PNR was first introduced by airlines that needed to exchange reservation information in case passengers required flights of multiple airlines to reach their destination ("interlining"). For this purpose, IATA and ATA have defined standards for interline messaging of PNR and other data through the "ATA/IATA Reservations Interline Message Procedures - Passenger" (AIRIMP). There is no general industry standard for the layout and content of a PNR. In practice, each CRS or hosting system has its own proprietary standards, although common industry needs, including the need to map PNR data easily to AIRIMP messages, has resulted in many general similarities in data content and format between all of the major systems.
When a passenger books an itinerary, the travel agent or travel website user will create a PNR in the computer reservation system it uses. This is typically one of the large global distribution systems, such as Amadeus, Sabre, or Travelport (Apollo, Galileo, and Worldspan) but if the booking is made directly with an airline the PNR can also be in the database of the airline's CRS. This PNR is called the Master PNR for the passenger and the associated itinerary. The PNR is identified in the particular database by a record locator.
When portions of the travel are not provided by the holder of the master PNR, then copies of the PNR information are sent to the CRSs of the airlines that will be providing transportation. These CRSs will open copies of the original PNR in their own database to manage the portion of the itinerary for which they are responsible. Many airlines have their CRS hosted by one of the GDSs, which allows sharing of the PNR.
The record locators of the copied PNRs are communicated back to the CRS that owns the Master PNR, so all records remain tied together. This allows exchanging updates of the PNR when the status of trip changes in any of the CRSs.
Although PNRs were originally introduced for air travel, airlines systems can now also be used for bookings of hotels, car rental, airport transfers, and train trips.
Parts
From a technical point of view, there are five parts of a PNR required before the booking can be completed. They are:
The name of the passenger
Contact details for the travel agent or airline office.
Ticketing details, either a ticket number or a ticketing time limit.
Itinerary of at least one segment, which must be the same for all passengers listed.
Name of the person providing the information or making the booking.
Other information, such as a timestamp and the agency's pseudo-city code, will go into the booking automatically. All entered information will be retained in the "history" of the booking.
Once the booking has been completed to this level, the CRS will issue a unique all alpha or alpha-num |
https://en.wikipedia.org/wiki/KnightCap | KnightCap is an open source computer chess engine. Its primary author is Andrew Tridgell and it was created circa 1996. Major contributions have also been made by Jon Baxter and probably minor contributions by a few others. KnightCap is free software released under the GNU GPL.
In most ways, KnightCap is a fairly typical modern program. It uses bitboard data structures that are slightly different from those that were well known in 1996, but obvious enough and probably well known now. There is backward pruning using MTD(f) (a method approximately equivalent to Alpha-beta pruning but slightly more efficient in some settings). There is Null-move heuristic. There is a fairly complex end-node evaluation process that considers similar features to other programs.
In addition, KnightCap has support for multi-processor computers, in particular the now obsolete Fujitsu CAP computer
research machines.
The most original feature of KnightCap, introduced in the late 1990s, was an experiment in temporal difference learning as applied to chess. This technique allowed KnightCap to automatically tune the weights applied to the various features in its evaluation function based on the games it played.
For a while in the 1990s, KnightCap was quite active on chess servers on the Internet, but it is now semi-retired and rarely seen. Its strength is below that of the strongest programs, but still quite good.
External links
KnightCap's home page
KnightCap: A Chess program that learns by combining TD(λ) with minimax search
Chess engines
Free chess software |
https://en.wikipedia.org/wiki/Database%20trigger | A database trigger is procedural code that is automatically executed in response to certain events on a particular table or view in a database. The trigger is mostly used for maintaining the integrity of the information on the database. For example, when a new record (representing a new worker) is added to the employees table, new records should also be created in the tables of the taxes, vacations and salaries. Triggers can also be used to log historical data, for example to keep track of employees' previous salaries.
Triggers in DBMS
Below follows a series of descriptions of how some popular DBMS support triggers.
Oracle
In addition to triggers that fire (and execute PL/SQL code) when data is modified, Oracle 10g supports triggers that fire when schema-level objects (that is, tables) are modified and when user logon or logoff events occur.
Schema-level triggers
After Creation
Before Alter
After Alter
Before Drop
After Drop
Before Insert
The four main types of triggers are:
Row-level trigger: This gets executed before or after any column value of a row changes
Column-level trigger: This gets executed before or after the specified column changes
For each row type: This trigger gets executed once for each row of the result set affected by an insert/update/delete
For each statement type: This trigger gets executed only once for the entire result set, but also fires each time the statement is executed.
System-level triggers
From Oracle 8i, database events - logons, logoffs, startups - can fire Oracle triggers.
Microsoft SQL Server
A list of all available firing events in Microsoft SQL Server for DDL triggers is available on Microsoft Docs.
Performing conditional actions in triggers (or testing data following modification) is done through accessing the temporary Inserted and Deleted tables.
PostgreSQL
Introduced support for triggers in 1997. The following functionality in SQL:2003 was previously not implemented in PostgreSQL:
SQL allows triggers to fire on updates to specific columns; As of version 9.0 of PostgreSQL this feature is also implemented in PostgreSQL.
The standard allows the execution of a number of SQL statements other than SELECT, INSERT, UPDATE, such as CREATE TABLE as the triggered action. This can be done through creating a stored procedure or function to call CREATE TABLE.
Synopsis:
CREATE TRIGGER name { BEFORE | AFTER } { event [ OR ... ] }
ON TABLE [ FOR [ EACH ] { ROW | STATEMENT } ]
EXECUTE PROCEDURE funcname ( arguments )
Firebird
Firebird supports multiple row-level, BEFORE or AFTER, INSERT, UPDATE, DELETE (or any combination of thereof) triggers per table, where they are always "in addition to" the default table changes, and the order of the triggers relative to each other can be specified where it would otherwise be ambiguous (POSITION clause.) Triggers may also exist on views, where they are always "instead of" triggers, replacing the default updatable view logic. (Before version 2.1, |
https://en.wikipedia.org/wiki/Liverpool%20Central%20railway%20station | Liverpool Central railway station in Liverpool, England, forms a central hub of the Merseyrail network, being on both the Northern Line and the Wirral Line. The station is located underground on two levels, below the site of a former mainline terminus. It is the busiest station in Liverpool, though considerably smaller than Lime Street station, the mainline terminus, and the busiest station to operate solely on the Merseyrail network. The station is the busiest underground station outside London serving 40,000 people daily. The station in passengers per platform is the busiest underground railway station in the United Kingdom at 5,217,547 per platform per annum and laying third in all stations, underground or overground.
Liverpool Central is one of nine stations on the Merseyrail network to incorporate automatic ticket gates. The main concourse is part of a shopping centre, and includes a closed subway link to the former Lewis's department store.
History
High Level terminal station
The original station, which was a large, above-ground terminal station, opened on 2 March 1874, at the end of the Cheshire Lines Committee (CLC) line to Manchester Central. It replaced Brunswick station as the CLC's Liverpool terminus, becoming the headquarters of the committee. The three-storey building fronted Ranelagh Street in the city centre, with a high, arched iron and glass train shed behind.
There were six platforms within the station, offering journeys to Manchester Central (in 45 minutes, making the route the quickest and most direct between Liverpool and Manchester), London St. Pancras, Hull, Harwich, , and an alternative London route to that of the Midland Railway, terminating at London Marylebone.
Until the nationalisation of Britain's railways, the station was always busy, but as with many other stations in the UK, it was closed under the Beeching Axe, as the routes served could be taken from nearby . In 1966, most services on the CLC route were diverted to Lime Street via the Hunts Cross chord, leaving only a dozen urban commuter trains per day to and from . These final services were withdrawn on 17 April 1972, with a promise to reinstate the Gateacre route when the Merseyrail network was completed in 1978.
The High Level station was demolished in 1973, having served a short time as a car park, although some former station buildings remained while work was in progress on rebuilding the underground station in the mid-1970s. The area of the train shed now forms the centre of the stalled Central Village development.
Underground urban station
Liverpool Central Low Level underground terminal station opened on 11 January 1892, at the end of the Mersey Railway's route, via the Mersey Railway Tunnel from Birkenhead, when the route was extended from James Street station. The Mersey Railway platforms were underground, accessed from stairs within the High Level station and situated in roughly the same position as the escalators accessing the Northern L |
https://en.wikipedia.org/wiki/Silvio%20Micali | Silvio Micali (born October 13, 1954) is an Italian computer scientist, professor at the Massachusetts Institute of Technology and the founder of Algorand, a proof-of-stake blockchain cryptocurrency protocol. Micali's research at the MIT Computer Science and Artificial Intelligence Laboratory centers on cryptography and information security.
In 2012, he received the Turing Award for his work in cryptography.
Personal life
Micali graduated in mathematics at La Sapienza University of Rome in 1978 and earned a PhD degree in computer science from the University of California, Berkeley in 1982; for research supervised by Manuel Blum. Micali has been on the faculty at MIT, Electrical Engineering and Computer Science Department, since 1983. He's also served on the faculty of the University of Pennsylvania, University of Toronto, and Tsinghua University. His research interests are cryptography, zero knowledge, pseudorandom generation, secure protocols, and mechanism design.
Career
Micali is best known for some of his fundamental early work on public-key cryptosystems, pseudorandom functions, digital signatures, oblivious transfer, secure multiparty computation, and is one of the co-inventors of zero-knowledge proofs. His former doctoral students include Mihir Bellare, Bonnie Berger, Shai Halevi, Rafail Ostrovsky, Jing Chen, Rafael Pass, Chris Peikert, and Phillip Rogaway.
In 2001 Micali co-founded CoreStreet Ltd, a software company originally based in Cambridge, Massachusetts which implemented Micali's patents involving checking the status of digital certificates (mainly applicable to large enterprise and government-sized digital and physical identity projects). Micali served as Chief Scientist at CoreStreet. CoreStreet was bought by ActivIdentity in 2009.
In the early 2000s Micali also founded Peppercoin, a micro-payments system which was acquired in 2007.
In 2017, Micali founded Algorand.
Awards and honors
Micali won the Gödel Prize in 1993. He received the RSA Award for Excellence in Mathematics in 2004. In 2007, he was selected to be a member of the National Academy of Sciences and a Fellow of the International Association for Cryptologic Research (IACR). He is also a member of the National Academy of Engineering and the American Academy of Arts and Sciences. He received the Turing Award for the year 2012 along with Shafi Goldwasser for their work in the field of cryptography.
In 2015 the University of Salerno acknowledged his studies by giving him an honoris causa degree in Computer Science.
He was elected as an ACM Fellow in 2017.
References
1954 births
Living people
Theoretical computer scientists
Italian computer scientists
American computer scientists
American people of Italian descent
Modern cryptographers
Gödel Prize laureates
MIT School of Engineering faculty
UC Berkeley College of Engineering alumni
Members of the United States National Academy of Engineering
Members of the United States National Academy of Sciences
Fellows of the A |
https://en.wikipedia.org/wiki/Incremental%20search | In computing, incremental search, hot search, incremental find or real-time suggestions is a user interface interaction method to progressively search for and filter through text. As the user types text, one or more possible matches for the text are found and immediately presented to the user. This immediate feedback often allows the user to stop short of typing the entire word or phrase they were looking for. The user may also choose a closely related option from the presented list.
The method of incremental search is sometimes distinguished from user interfaces that employ a modal window, such as a dialog box, to enter searches. For some applications, a separate user interface mode may be used instead of a dialog box.
History
The first documented use of incremental search was in EMACS on ITS in the late 1970s. This was one of the many essential Emacs features Richard Stallman included in his reimplementation, GNU Emacs. Other noteworthy programs containing this functionality in the 1980s include bash and Canon Cat. These early implementations offered single line feedback, not lists of suggestions.
The first mainstream appearance may have been in the Speller for WordPerfect 5.2 for Windows, released 30 November 1992. As programmer Robert John Stevens, now CEO of WriteExpress, watched users at the WordPerfect Usability Lab in Orem, Utah use the 5.1 Speller that he and Steven M. Cannon ported to Windows, he noticed that when a word was not found in the dictionary and no alternative words were presented, users seemed lost, moved the mouse cursor around the page and even exited the Speller. Dumbstruck by the anomaly, he went home, sat on the couch and discussed his observations with his wife. Stevens coded the solution: as a user typed in the edit box, Speller would suggest words beginning with the letters entered.
Stevens' Spell Check program was also used in Novell GroupWise.
Variants
This feature, or variations thereof, has also been referred to as Autocomplete, search as you type, filter/find as you type (FAYT), incremental search, typeahead search, inline search, instant search, word wheeling, and other names as well.
Some common keyboard shortcuts for incremental find are Ctrl/Cmd-F (like for traditional find), the GNU-style / (also applicable to Vim), or Emacs-style C-s.
Searches for files and media
This user interface method is also employed in varying contexts. For example, a user may encounter this feature while searching for files whose names match a string in an operating system's file explorer shell. The feature may also be used during searches for songs whose name or artist match a string in a media player.
Searches for user interface elements
Another variation is to filter through long lists of options or menu items that may appear within the user interface itself. Examples of this variation can be found in the about:config interface section of Mozilla Firefox version 2.0.0.14 and later versions; and in the bundle edit |
https://en.wikipedia.org/wiki/NBA%20TV | NBA TV is an American sports-oriented pay television network owned by the National Basketball Association (NBA) and operated by Warner Bros. Discovery through its sports unit. Dedicated to basketball, the network features exhibition, regular season and playoff game broadcasts from the NBA and related professional basketball leagues, as well as NBA-related content including analysis programs, specials and documentaries. The network is headquartered in Atlanta, Georgia. The network also serves as the national broadcaster of the NBA G League and WNBA games. NBA TV is the oldest subscription network in North America to be owned or controlled by a professional sports league, having launched on November 2, 1999.
History
The network launched on November 2, 1999 as nba.com TV; the channel, which was renamed NBA TV on February 11, 2003, originally operated from studio facilities housed at NBA Entertainment in Secaucus, New Jersey. The network signed a multi-year carriage agreement with three of the U.S.'s five largest cable providers, Cox Communications, Cablevision and Time Warner Cable, on June 28, 2003; this expanded the network's reach to 45 million pay television households in the U.S., in addition to distribution in 30 countries worldwide. After Time Warner shut down the sports news network CNN/SI in 2002, many cable providers replaced that network with NBA TV.
The network mainly launched with two purposes; to serve as a barker channel for the league's out-of-market sports package NBA League Pass, along with featuring statistical and scoring information which was more easily accessible in the pre-broadband age, and it featured mainly archival content from the NBA Entertainment archives in its upper pane to fill programming time. As time went on, the network added more programming, including international basketball leagues and programming from FIBA usually unseen in the American market. The programming mix and channel format changed around the same time of the CNN/SI shutdown.
On October 8, 2007, it was reported that the National Basketball Association would transfer the channel's operations to Time Warner's Turner Sports division (operated by the company's Turner Broadcasting System subsidiary).
Turner took over the channel's operations on October 28, 2008, and began using the same announcers and analysts used on TNT's NBA telecasts. Analysis and news programming also received an upgrade, with production of the programs being relocated to Studio B at Turner Studios in Atlanta, Georgia, located adjacent to Studio J, where TNT's post-game program Inside the NBA is broadcast. The repeats of NBA games on TBS and TNT began in 2009, as NBA Classics.
Carriage agreements
On April 16, 2009, DirecTV announced that it had reached a carriage agreement with the NBA to continue carrying NBA TV, moving it (and out-of-market sports package NBA League Pass) from the satellite provider's Sports Pack add-on tier to its lower-priced Choice Xtra base package on O |
https://en.wikipedia.org/wiki/The%20Joy%20of%20Sect | "The Joy of Sect" is the thirteenth episode of the ninth season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on February 8, 1998. In the episode, a cult takes over Springfield, and the Simpson family become members.
David Mirkin conceived the initial idea for the episode, Steve O'Donnell was the lead writer, and Steven Dean Moore directed. The writers drew on many groups to develop the Movementarians, but were principally influenced by Scientology, Heaven's Gate, the Unification Church ("Moonies"), the Rajneesh movement, and Peoples Temple. The show contains many references to popular culture, including the title reference to The Joy of Sex and a gag involving Rover from the television program The Prisoner.
"The Joy of Sect" was later analyzed from religious, philosophical, and psychological perspectives; books on The Simpsons compared the Movementarians to many of the same groups from which the writers had drawn influence.
Both USA Today and The A.V. Club featured "The Joy of Sect" in lists of important episodes of The Simpsons.
Plot
While at the airport, Bart and Homer meet recruiters for the Movementarians, a new religious movement, who invite Homer and many other Springfield residents to a free weekend at their compound. There, an orientation film tells that a mysterious man known as "The Leader" will guide Movementarians aboard a spaceship to the planet Blisstonia, with audience members being pressured to sit back down and continue watching by having a spotlight shone on them. The lengthy film brainwashes the attendees into worshipping The Leader, except for Homer, who was not paying attention. After failing to brainwash Homer through humiliation and starvation, the recruiters succeed with a chant to the tune of the Batman theme song.
Almost all the townspeople join the cult, including Homer, who moves his family to the Movementarian compound. At the same time, Mr. Burns makes an unsuccessful attempt to start a religion of his own in order to achieve tax-exemption. Though defiant at first, all the Simpson children are converted to Movementarianism. Marge is the only family member to resist, and escapes from the heavily guarded compound. Outside, she finds Reverend Lovejoy, Ned Flanders, and Groundskeeper Willie, who have all resisted the Movementarians, and with their help, she tricks her family into leaving the compound with her.
At the Flanders' home, Marge deprograms her kids by baiting them with fake hoverbikes and then works on Homer with a glass of beer. However, as a drop of beer lands on his tongue, he is recaptured by the Movementarians' lawyers. Back at the compound, Homer reveals to the other Movementarians that he is no longer brainwashed and attempts to expose the cult as a fraud, but upon opening the doors of the compound's "Forbidden Barn" he and the crowd are surprised to find an actual spaceship. However, the crude spaceship disintegrates as it tak |
https://en.wikipedia.org/wiki/Minho%20Campus%20Party | Minho Campus Party (also known as MCP) was Portugal's first and largest recurring LAN party. It took place in the Minho Province region.
History
LAN parties, which are local area network gaming events where participants bring their computers together to play multiplayer games, did indeed originate in Northern Europe. The concept gained popularity in the late 1990s and early 2000s, primarily in countries like Sweden, Denmark, and Finland. It provided a unique platform for young people to connect and engage in social gaming experiences.
LAN parties have since expanded globally, attracting young people from different parts of the world who share a common interest in computers and computing. These events have become a manifestation of the new opportunities and avenues for youth culture in the digital age. By fostering communities centered around gaming and technology, LAN parties have created spaces for like-minded individuals to connect, collaborate, and celebrate their shared passion.
MCP 2005 Cancelled
Despite its increasing popularity over the previous 4 editions, the 2005 event (expected to be held between 27 and 31 July), was cancelled due to a lack of sponsors.
Professor Altamiro Machado
The idea of introducing an event of this nature to Portugal, specifically in the Minho area, originated from Professor Altamiro Machado. Professor Machado, known for his pioneering work in computer science education during the 1970s, served as a professor and director of the Department of Information Systems (DSI - Departamento de Sistemas e Informação) at Minho University.
In his pursuit of realizing this concept, Professor Machado actively sought support and established contact with the team led by Charles Pinto, who was responsible for organizing a similar event in Spain. Thanks to Professor Machado's initiative, a group of approximately forty DSI students had the opportunity to participate in the Campus Party 2000 held in Valencia. Their participation aimed to gather experience and contribute to the future implementation of a similar event in Portugal.
Tragically, Professor Machado passed away at the end of March 2001. During the subsequent 2001 event, a dedicated session was organized to pay homage to the professor's invaluable contributions.
Network
Cisco Systems has been a steadfast supporter of the MCP (Minho Campus Party) since its inaugural edition and continued its partnership for the subsequent four years. Cisco Systems played a crucial role in building the network infrastructure and providing the necessary equipment, representing an investment of over two million dollars. Their support has been instrumental in ensuring the success of the event.
Following Cisco Systems' involvement, ProCurve Networking, a division of HP, took over the responsibility of supplying the network infrastructure and equipment for MCP. Additionally, Portugal Telecom has provided support in establishing the connection for the event, further contributing to its smoo |
https://en.wikipedia.org/wiki/IWork | iWork is an office suite of applications created by Apple for its macOS, iPadOS, and iOS operating systems, and also available cross-platform through the iCloud website.
iWork includes the presentation application Keynote, the word-processing and desktop-publishing application Pages, and the spreadsheet application Numbers. Apple's design goals in creating iWork have been to allow Mac users to easily create attractive documents and spreadsheets, making use of macOS's extensive font library, integrated spelling checker, sophisticated graphics APIs and its AppleScript automation framework.
The equivalent Microsoft Office applications to Pages, Numbers, and Keynote are Word, Excel, and PowerPoint, respectively. Although Microsoft Office applications cannot open iWork documents, iWork applications can open Office documents for editing, and export documents from iWork’s native formats (.pages, .numbers, .key) to Microsoft Office formats (.docx, .xlsx, .pptx, etc.) as well as to PDF files.
The oldest application in iWork is Keynote, first released as a standalone application in 2003 for use by Steve Jobs in his presentations. Steve Jobs announced Keynote saying "It's for when your presentation really matters".
Pages was released with the first iWork bundle in 2005; Numbers was added in 2007 with the release of iWork '08. The next release, iWork '09, also included beta access to iWork.com, an online service that allowed users to upload and share documents on the web, now integrated into Apple's iCloud service. A version of iWork for iOS was released in 2010 with the first iPad, and the apps have been regularly updated since, including the addition of iPhone support. In 2013, Apple launched iWork web apps in iCloud; even years later, however, their functionality is somewhat limited compared to equivalents on the desktop.
iWork was initially sold as a suite for $79, then later at $19.99 per app on OS X and $9.99 per app on iOS. Apple announced in October 2013 that all iOS and OS X devices purchased onwards, whether new or refurbished, would be eligible for a free download of all three iWork apps: after device setup, the user can “claim” the apps on the App Store, after which they’re permanently linked to the user’s Apple ID. iWork for iCloud, which also incorporates a document hosting service, is free to all iCloud users. iWork was released for free on macOS and iOS (including older or resold devices) in April 2017.
In September 2016, Apple announced that the real-time collaboration feature would be available for all iWork apps.
History
The first version of iWork, iWork '05, was announced on January 11, 2005 at the Macworld Conference & Expo and made available on January 22 in the United States and worldwide on January 29. iWork '05 comprised two applications: Keynote 2, a presentation creation program, and Pages, a word processor. iWork '05 was sold for US$79. A 30-day trial was also made available for download on Apple's website. Originally IGG |
https://en.wikipedia.org/wiki/Tots%20TV | Tots TV is a British children's television programme, produced by Ragdoll Productions and Central. The series was first telecast in the UK on the ITV network (part of CITV) from 1993 to 1998.
Development
Tots TV was written by two of its puppeteers, Robin Stevens (Tom) and Andrew Davenport (Tiny).
The series was filmed on location in a small cottage in Stratford-upon-Avon, Warwickshire. Since production ended in 1998, the house became abandoned. It was discovered in 2017 YouTuber 'Lost with Lou', who was the first of many to visit the house. In 2021, the house was demolished by the landowners.
Characters
The programme focuses on three puppets: Tilly, a French girl, with red hair, freckles and pale skin, who speaks in basic French (changed to English in French and Spanish broadcasts, and changed to Spanish in the US version), Tom, a blue-haired boy with glasses and dark skin, who is smart, and Tiny, the youngest Tot, who is smaller than the others and has green hair and pale skin. It also includes their pet Donkey who lives in a stable next to the Tots' secret house and a mischievous little dog named Furryboo that the Tots do not know about.
Voices
Tilly (played by three actresses – initially Véronique Déroulède, then Claire Carre and later Alexandra Hogg; María Moscardó in the US version).
Tom (played by Robin Stevens; Mark Heenehan in the US version)
Tiny (played by Andrew Davenport; Kevin Clash in the US version)
Plots
Going out
Often (although not always), the Tots would go out to explore an everyday area in the real world. This often involved them helping out a young child, visiting Jane Pardoe at Whipsnade Wild Animal Park, and watching Jack the Gardener who was always placing surprise items in a field for children to play with.
This also sometimes involved them using their magic bag which they always took with them, Tiny always carried it and Tilly always operated it. When asked to help, it would always produce some items to help them in the situation.
Staying in
In many other episodes, the Tots would do something in their secret house, including playing games and making exciting discoveries. Because the full titles featured the Tots leaving the house they were altered for such episodes.
Often these episodes would feature one of the Tots reading the other two a story. These episodes always feature the reading Tot preparing to read using dolls of the characters in the story. Apparently, the other two were unaware they were preparing to read a story because they would always ring them up on their personal phone to ask if they wanted to listen to a story. This was despite the fact they all lived in the same house.
Other
If the episode was a full-length double-bill (regularly the first half with Jane Pardoe and the second half an adventure in the secret house) in the earlier episodes, they would be joined with a two-minute animation of a 'Noah's Ark' story (based on the toy "Noah's Ark in the Secret House") or an animation of a pict |
https://en.wikipedia.org/wiki/Pages%20%28word%20processor%29 | Pages is a word processor developed by Apple Inc. It is part of the iWork productivity suite and runs on the macOS, iPadOS and iOS operating systems. It is also available on iCloud on the web. The first version of Pages was released in February 2005. Pages is marketed by Apple as an easy-to-use application that allows users to quickly create documents on their devices. A number of Apple-designed templates comprising different themes (such as: letters, résumés, posters and outlines) are included with Pages.
History
On January 11, 2005, Apple announced the first version of Pages, as part of iWork '05. On January 6, 2009, Apple released the fourth version of Pages as a component of iWork '09. On January 27, 2010, Apple announced a new version of Pages for iPad with a touch interface. On May 31, 2011, Apple updated the iOS version of Pages to 1.4, bringing universal binaries, allowing the app to be run on iPad, iPhone and iPod Touch devices. On October 12, 2011, Apple updated the iOS app to version 1.5, adding the iCloud "Documents in the Cloud" feature. iOS Pages was updated to version 1.6 on March 7, 2012, and will only run on iOS 5.1 or later. Pages for OS X was updated to version 4.3 on December 4, 2012, to support Pages 1.7 for iOS, which was released on the same day. Pages for iOS 1.7.1 introduced better compatibility with Word and Pages for Mac and version 1.7.2, released on March 7, 2013, merely added stability improvements and bug fixes.
On October 23, 2013, Apple released a redesign with Pages 5.0 and made it free for anyone with an iOS device. In this release, many templates, as well as some advanced features that were available in version 4.3, were not included. Some of these missing features were put back over the next releases but the current version (12.1) still lacks features from version 4.3, including the ability to select non-contiguous regions of text, advanced find/replace functions, and more.
Features
Pages is a word processor and page layout application. When Pages is first opened, users are presented with a template chooser which allows them to start with a blank document or with a predesigned template — including a basic, report, letter, résumé, envelope, business card, flyers & posters, cards, miscellaneous and a newsletter section of templates — that contains placeholder text and images which can be replaced by dragging and dropping photos from the Media Browser. The Media Browser provides quick access to media from iTunes, iMovie and Photos. Users can drag and drop music, movies, and photos directly into Pages documents from the Media Browser window.
Each document window contains a toolbar, which gives one-click access to commonly used functions such as inserting objects (text boxes, shapes, tables, charts, and comments), uploading the document to iWork.com, and adding additional pages. In addition, the document window contains a contextual format bar that allows one-click formatting of text and adjustments to images. |
https://en.wikipedia.org/wiki/1944%20Atlantic%20hurricane%20season | The 1944 Atlantic hurricane season featured the first instance of upper-tropospheric observations from radiosonde – a telemetry device used to record weather data in the atmosphere – being incorporated into tropical cyclone track forecasting for a fully developed hurricane. The season officially began on June 15, 1944, and ended on November 15, 1944. These dates describe the period of each year when most tropical cyclones form in the Atlantic basin. The season's first cyclone developed on July 13, while the final system became an extratropical cyclone by November 13. The season was fairly active season, with 14 tropical storms, 8 hurricanes, and 3 major hurricanes. In real-time, forecasters at the Weather Bureau tracked eleven tropical storms, but later analysis uncovered evidence of three previously unclassified tropical storms.
The strongest storm of the season was the Great Atlantic hurricane, which struck Long Island and New England and later Atlantic Canada after becoming extratropical, causing about $100 million (1944 USD) in damage across the East Coast of the United States and Atlantic Canada, as well as at least 391 deaths, most of which occurred at sea. The Jamaica hurricane and Cuba–Florida hurricane were also powerful and left major impacts. The former inflicted "several millions of dollars" in damage in Jamaica, while 116 deaths were recorded throughout its path. The Cuba–Florida hurricane devastated both regions, resulting in at least 318 fatalities and damage exceeding $100 million. A hurricane which struck Mexico in late September caused between 200 and 300 deaths in the Isthmus of Tehuantepec due to flooding. Collectively, the tropical cyclones during the 1944 season caused about $202 million in damage and at least 1,025 fatalities.
Seasonal summary
The Atlantic hurricane season officially began on June 15 and ended on November 15. A total of 21 tropical cyclones developed. Fourteen of those cyclone intensified into tropical storms, the most since 1936, while eight of those reached hurricane status, the highest number since 1933. Three of those hurricanes intensified into major hurricanes. The season included the first instance of upper-atmosphere data via radiosonde being successfully incorporated into tropical cyclone track forecasting for a fully developed hurricane, which occurred as the Cuba–Florida hurricane approached Cuba. Collectively, the tropical cyclones of the 1944 Atlantic hurricane season caused approximately $202 million in damage and at least 1,025 fatalities.
Tropical cyclogenesis is believed to have begun with Hurricane One on July 13. Two other tropical cyclones formed in July. Four systems developed in August, two tropical depressions, a tropical storm, and a hurricane – the Jamaica hurricane. The month of September featured the most activity, which included a tropical depression, three tropical storms, and three hurricanes. One of the hurricanes, the Great Atlantic hurricane, became the most intense trop |
https://en.wikipedia.org/wiki/StarText | StarText was an online ASCII-based computer service run by the Fort Worth Star-Telegram and the Tandy Corporation and marketed in the Dallas-Fort Worth Metroplex newspaper circulation area from May 3, 1982 until March 3, 1997. Its name was derived from Star (representing the newspaper which would provide the content) and Text (representing the computer company which would provide the technology).
StarText was an "information on demand" online computer service created by Joe Donth, offered for the first time in 1982 by the Fort Worth Star-Telegram to subscribers in the Dallas-Fort Worth Metroplex. On May 3, 1982, StarText officially started providing its news and all-text content online, updated from 5am to midnight. There were no graphics, pictures or colors. Subscribers were called StarTexans. The content within StarText was written by subscribers of the service as well as employees of the newspaper.
Initially, the service charged $5.00 a month to subscribers who received updated news each day from 5am until midnight daily. At first subscribers had to call StarText using a 300 baud modem and enter four requests out of a choice of 50. StarText then delivered the information without further interactivity. To receive more information the subscriber had to repeat the same process. The first StarText system was provided by a Tandy Model II.
The subsequent multi-user version of StarText, developed by Serge Stein, was written in DIBOL and ran on Digital Equipment VAX 11/750s connected to banks of 1200 & 2400 baud modems. This version provided a menu of content including the Star-Telegram's news and classified advertising, and provided messaging between subscribers (early email), Grolier's encyclopedia, American Airlines Sabre flight schedules and home banking to a group of over four thousand dedicated computer users. Users could define their screen size to the system which would then deliver only as much text as would fit on the screen giving the user the opportunity to read the content before 'paging' on to the next screen of text. At one point billing for this service was based on the number of words sent to the user.
In May 1996 an additional Internet service, StarText Net, was introduced, and the earlier service was rebranded as StarText Classic. The original service finally closed down on March 3, 1997, and in June 1998, StarText Net changed into Star-Telegram Online Services, which eventually became a conventional online Internet service of the Knight-Ridder group.
Subscription history
Six months following start-up, the service only had 50 customers because many computers then on the market could not connect to StarText. Some of the early subscribers accessed the service using the Timex 1000 with its 16k RAM and 300 baud modem. At its height the service attracted about 2,000 subscribers.
StarTexans
StarText benefitted from a loyal group of columnists who acted as unpaid content producers who were also subscribers. Their columns were in text |
https://en.wikipedia.org/wiki/Argos%20%28satellite%20system%29 | Argos is a global satellite-based system that collects, processes, and disseminates (spreads, distributes) environmental data from fixed and mobile platforms around the world. The worldwide tracking and environmental monitoring system is the results from Franco-American cooperation. In addition to satellite data collection, the main feature of the Argos system is its to ability to geographically locate the data source from any location on Earth using the Doppler effect; which refers to the apparent change in the wavelength due to relative motion between its source and observer. Argos is operated by CLS/Argos, based in Toulouse, France, and its United States subsidiary, CLS America.
History and utilization
Argos was established in 1978 and has provided data to environmental research and protection groups. It is a component of many global research programs including the Tropical Ocean-Global Atmosphere program (TOGA), Tagging of Pacific Pelagics (TOPP), World Ocean Circulation Experiment (WOCE) and, Argo. There are 22,000 active transmitters (8,000 of which are used in animal tracking) in over 100 countries.
Since the late 1980s, Argos transmitters have been deployed on a large number of marine mammals and sea turtles, and it is used for tracking long-distance movements of both coastal and oceanic species.
Argos was developed under a Memorandum of Understanding (MOU) between the Centre National d'Études Spatiales (CNES, France), the National Aeronautics and Space Administration (NASA, United States) and the National Oceanic and Atmospheric Administration (NOAA, United States).
The system utilizes both ground and satellite-based resources to accomplish its mission. These include:
instruments carried aboard the NOAA Polar Operational Environmental Satellites (POES), the European Organisation for the Exploitation of Meteorological Satellites (EUMETSAT) MetOp satellites, and Indian Space Research Organisation (ISRO) satellites,
receiving stations around the world
major processing facilities in Toulouse in France and Lanham, Maryland in the United States.
Since June 2019, a new subsidiary named Kinéis has taken over operations and plans to launch a constellation of 16U CubeSats in 2022.
Operating agencies
The Argos satellite-based system was set up by:
The Centre National d'Études Spatiales (CNES).
The U.S. National Oceanic and Atmospheric Administration (NOAA).
The U.S. National Aeronautics and Space Administration (NASA).
Recent partners in this international cooperative venture are:
The European Organisation for the Exploitation of Meteorological Satellites (EUMETSAT).
The Indian Space Research Organisation (ISRO).
Frequencies and data transfer
Most use of the Argos System makes use of one-way data transmission on 401.65 MHz using Argos 2. Each Argos platform features a unique 28-bit ID and the ability to transmit a short 3 to 31 byte message for each transmission. Each platform is restricted to a specified interval, such as ever |
https://en.wikipedia.org/wiki/ArtWorks | ArtWorks is an advanced vector drawing package for RISC OS created by Computer Concepts (now Xara) in 1991. It has been developed by MW Software since 1996. Xara has continued to develop a Windows version called Xara Photo & Graphic Designer.
Release History
References
External links
Xara
RISC OS software |
https://en.wikipedia.org/wiki/Publish%20and%20Subscribe%20%28Mac%20OS%29 | Publish and Subscribe was a document linking model introduced by Apple Computer in System 7. Named the Edition Manager in developer documentation, it extended the existing cut and paste editing model with a notification system; "subscribers" could include parts of "published" documents within themselves, and changes to the original published document would be noticed and updated by the subscribers. To the user the system was very similar to cut and paste in concept; material would be selected from the source document and published, creating an edition file, then placed into the subscriber by selecting that clipping file and positioning it inside the document.
In general terms the concept was very similar to Microsoft's Object Linking and Embedding 1.0 system. Unlike OLE, the Edition Manager was comparatively complex from a programming standpoint. Suffering from second system effect, it included features intended to make it better than OLE, including support for non-rectangular areas, network notifications and an extensive user interface. A result of this complexity was poor uptake among developers, and applications providing Publish and Subscribe were few and far between. One of the few products to use it effectively was Claris's suite of software, including ClarisWorks which had already built a system somewhat similar in concept, but required extensive changes to make its own system work with OpenDoc.
At the time many in the industry felt that the Publish and Subscribe concept was the "next big thing". Apple and Microsoft were not the only two companies trying to introduce such a system; most major software vendors attempted to introduce similar systems, and NeXTSTEP included a version. However users did not find the system useful. Further it was sometimes confusing to use; if the document included live links it was no longer possible to simply copy it to a floppy disk (for instance), the clipping file had to be copied as well. In addition, opening their applications to new component developers who would compete to provide the best editors was not attractive to large corporations such as Microsoft and Adobe.
See also
References
External links
Internet Archive: Details: Macintosh System 7.0
Mac OS 7.0 upgrade kit ad
Inside Macintosh: Edition Manager
User interface techniques
Macintosh operating systems |
https://en.wikipedia.org/wiki/Crash-only%20software | Crash-only software refers to computer programs that handle failures by simply restarting, without attempting any sophisticated recovery. Correctly written components of crash-only software can microreboot to a known-good state without the help of a user. Since failure-handling and normal startup use the same methods, this can increase the chance that bugs in failure-handling code will be noticed, except when there are leftover artifacts, such as data corruption from a severe failure, that don't occur during normal startup.
Crash-only software also has benefits for end-users. All too often, applications do not save their data and settings while running, only at the end of their use. For example, word processors usually save settings when they are closed. A crash-only application is designed to save all changed user settings soon after they are changed, so that the persistent state matches that of the running machine. No matter how an application terminates (be it a clean close or the sudden failure of a laptop battery), the state will persist.
See also
Autosave
Microreboot
End-to-end principle
References
External links
https://web.archive.org/web/20060426230247/http://crash.stanford.edu/
Operating system technology |
https://en.wikipedia.org/wiki/Hang-On | is an arcade racing game released by Sega in 1985 and later ported to the Master System. In the game, the player controls a motorcycle against time and other computer-controlled bikes. It was one of the first arcade games to use 16-bit graphics and uses the Super Scaler arcade system board, created with design input from Yu Suzuki, as technology to simulate 3D effects. The deluxe cabinet version also introduced a motion-controlled arcade cabinet, where the player's body movement on a large motorbike-shaped cabinet corresponds with the player character's movements on screen.
Yu Suzuki began development of Hang-On after deciding to design a motorcycle racing game as a way to use a torsion bar in an arcade game. With market research suggesting GP 500 racing was popular, Suzuki took inspiration from world champion Freddie Spencer and his style of racing. The game's soundtrack was written by Hiroshi Kawaguchi, who used rock music that was uncommon in arcade games at the time.
Hang-On was very popular at launch and sold well for Sega, becoming the highest-grossing arcade video game of 1985 in the United States and then the highest-grossing arcade game of 1986 in both Japan and the United States. It received a positive critical reception for its realism, graphics, bike cabinet and physical controls, though there was some initial controversy in Japan over modesty concerns involving female players with the bike cabinet. The game started the trend of "taiken" motion simulator games in the late 1980s, which Sega followed with hits such as Space Harrier (1985), Out Run (1986), and After Burner (1987); this helped the arcade video game market recover during the late 1980s. Hang-On has been recognized as a well-remembered and influential arcade game. Several sequels were later made for arcades, as well as video game consoles.
Gameplay
Using a behind the motorcycle perspective, the player races a linear race track divided into several stages within a limited time. Players have to lean the motorcycle to turn, with tighter corners requiring a further lean. A throttle similar to a motorcycle has to be twisted to accelerate the bike. The game has one track, pieced together in segments. Reaching a checkpoint at the end of each segment extends the time limit, and remaining time is carried over into the next stage. Running off the track results in the motorcycle crashing and the rider is launched into the air. The game ends if the time runs out or all five stages are completed.
Development
Hang-On was the second game to be developed by Yu Suzuki, the first being 1984's Champion Boxing. Development of Hang-On began with a project brought to him by a colleague who asked him to implement a torsion bar into an arcade game design—although the bar proved too difficult to implement in the final game design and springs were used instead. Suzuki was given the freedom to decide what kind of game to design, and as a fan of cars and motorcycles, he chose to design a ga |
https://en.wikipedia.org/wiki/Basic%20Income%20Earth%20Network | The Basic Income Earth Network (BIEN; until 2004 Basic Income European Network) is a network of academics and activists interested in the idea of basic income. It serves as a link between individuals and groups committed to or interested in basic income, and fosters informed discussion on this topic throughout the world. BIEN's website defines a basic income as "a periodic cash payment unconditionally delivered to all on an individual basis, without means-test or work requirement."
History
Formed in 1986, BIEN held its first international conference in Louvain-la-Neuve in September of that year. It expanded its scope from Europe to the Earth in 2004. From 1988 BIEN published a paper newsletter three times per year; later replaced by an electronic NewsFlash , distributed first six and now twelve times per year. Since 2011, BIEN has sponsored a news website, called Basic Income News.
The main founders of BIEN are Yoland Bresson, Philippe Van Parijs, Karl Widerquist, Alexander de Roo, Guy Standing and David Casassas .
Every two years until 2014, and every year since 2016, BIEN has organised an international congress gathering academics and activists for basic income. The 2016 Congress took place in Seoul, South Korea; the 2017 Congress in Lisbon, Portugal; The 2018 congress took place in Tampere, Finland; The 2019 BIEN congress takes place at Hyderabad, India. For a full list of congresses, see BIEN's website. Papers given at the congresses can also be found on the organisation's website.
BIEN recognises a number of national and regional affiliated networks across the world.
BIEN's secretaries have been Walter Van Trier (1986–1994), Philippe Van Parijs (1994–2004), David Casassas (2004–2014), Anja Askeland (2014–2016), and Julio Aguirre (2016–). In May 2016, BIEN appointed Malcolm Torry as its General Manager.
Chairing of BIEN was a flexible matter during the early years: Those chairing were Peter Ashby, Claus Offe, Guy Standing (1986–88), Edwin Morley-Fletcher, Guy Standing (1988–1996), Edwin Morley-Fletcher, Ilona Ostner, Guy Standing (1996–1998), Ilona Ostner, Guy Standing (1998–2004). In 2004, a revision of the previously sketchy statutes established that there would be either a Chair and Vice chair, or two Co-chairs. Following 2004, posts were held as follows: Guy Standing, Eduardo Suplicy (co-chairs 2004–2008), Ingrid Van Niekerk and Karl Widerquist (co-chairs 2008–2014), Louise Haagh and Karl Widerquist (co-chairs 2014–2018). The new constitution of 2018 provided for a Chair and a Vice Chair: Postholders as follows: Louise Haagh (Chair, 2018–), Sarath Davala (Vice Chair, 2018–).
See also
Citizen's dividend
Universal basic income
Universal basic income around the world
References
External links
Basic Income Studies: An International Journal of Basic Income Research
Universal basic income
International economic organizations
Organizations established in 1986
1986 establishments in Belgium |
https://en.wikipedia.org/wiki/Iida | Iida or IIDA may refer to:
Iida, Nagano, Japan
Iida (surname)
International Interior Design Association, a professional networking and educational association committed to interior design |
https://en.wikipedia.org/wiki/Alterosa | Alterosa is a Brazilian municipality in the South of the state of Minas Gerais. According to latest data from IBGE (2020), its population is estimated to be 14,517. The inhabitants of the city usually travel to the nearest city, Alfenas, when they are in need of more sophisticated supplies.
Alterosa was founded on 17 December 1938.
History
It is said that Alterosa was one of the first populated places in the South of Minas Gerais. By the year of 1700, the residents took notice of the small river that became known as Ribeirão São Joaquim. José Rodrigues Moreira, a Portuguese man coming from Espírito Santo, marked the development of the city. In that occasion, the people living there called the city São Joaquim da Serra Negra, due to the existence of a hill in the surroundings.
On 28 June 1850, a very influent Baron (Barão Silva) turned Alterosa to a municipality, after the building of a Parish.
The name Alterosa means "High Majesty".
Geography
Located in the margins of the Furnas Lake, the municipality of Alterosa belongs to the administrative region of Alfenas/Varginha.
It is situated in 21° 14’ 45’’ of the south latitude and 46º 08’ 30’’ of west longitude, in the South of the State of Minas Gerais.
Areado is in the south of Alterosa, Alfenas in the east; Carmo do Rio Claro in the northeast, Conceição da Aparecida in the north, Nova Resende in the west and Monte Belo in the southwest.
Temperatures range from 0° to 30º degrees Celsius. 75% of Alterosa's surface is undulated and 15% is mountainous.
Districts
The district of Cavacos is part of Alterosa.
Economy
Alterosa has 1.300 of rural properties, approximately 25 acres each. In general, Alterosa's activities include the production of milk, meat, coffee, corn, and most recently, potatoes.
Alterosa is one of the seventeen municipalities in Minas Gerais that has a Usina de Tratamento de Resíduos Urbanos, a company that takes care of the disposal of rubbish for the citizens.
Education
Schools
The Prefecture of Alterosa is responsible for the four Schools existing in the city, three of them being:
E. E. Bolivar Boanerges da Silveira
E. E. Deputado Jales Machado
E. E. Martins de Andrada
Events
February: Carnaval
June: Festa Junina
July: Festa do Peão
August: Motorcycle owners communion
December: City's birthday
Communication
Alterosa is home of two radio stations: Serra Negra FM 102, 7 and Boas Novas FM 87,9 (a Protestant radio station).
Financial Institutions
There are three banks in Alterosa: Banco do Brasil, Banco Bradesco and Cooperosa.
References
External links
Municipalities in Minas Gerais |
https://en.wikipedia.org/wiki/OCN | OCN is a three letter abbreviation that stands for:
OCLC Control Number, a bibliographic record identifier
In Oncology nursing, an Oncology Certified Nurse
Opaskwayak Cree Nation
Open College Network, a UK education organisation today known as NOCN
Open Computer Network, a major Internet Service Provider in Japan
Orange County Newschannel, a defunct cable television news network targeted toward Orange County, California
Original Camera Negative, the film stock used in a movie camera
Orion Cinema Network, a Korean cinema network by On-Media
Orthodox Christian Network
Originally called number, in telephony, the phone number of the originally called party, regardless of call redirection; look inside a Signalling System No. 7 (SS7) ISDN User Part (IUP) initial address message (IAM) for this optional parameter
Operating Company Number, in telephony, a code used in various iconectiv telephony products, a major subset of which equate to Company Codes assigned by the National Exchange Carrier Association (NECA) to telecommunications carriers (including landline, wireless carriers, and resellers of various types).
Order confirmation number, a method for recording purchase orders in many Enterprise resource planning (ERP) systems
OCN may also refer to:
The chemical formula for a cyanate ion
The NYSE Symbol for Ocwen Financial Corporation
The IATA airport code for Oceanside Municipal Airport |
https://en.wikipedia.org/wiki/Ian%20McDonald%20%28British%20author%29 | Ian McDonald (born 1960) is a British science fiction novelist, living in Belfast. His themes include nanotechnology, postcyberpunk settings, and the impact of rapid social and technological change on non-Western societies.
Early life
Ian McDonald was born in 1960, in Manchester, to a Scottish father and Irish mother. He moved to Belfast when he was five and has lived there ever since. He lived through the whole of the 'Troubles' (1968–1999), and his sensibility has been permanently shaped by coming to understand Northern Ireland as a post-colonial society imposed on an older culture.
Career
McDonald sold his first story to a local Belfast magazine when he was 22, and in 1987 became a full-time writer. He has also worked in TV consultancy within Northern Ireland, contributing scripts to the Northern Irish Sesame Workshop production of Sesame Tree.
McDonald's debut novel was Desolation Road (1988), which takes place on a far future Mars in a town that develops around an oasis in the terraformed Martian desert. He published a sequel, Ares Express, in 2001.
Published between 1995 and 2000, the novels Chaga (US title Evolution's Shore) and Kirinya, with the novella Tendeléo's Story, form the 'Chaga Saga', which chronicles the effects of an alien flora introduced to Earth, and also analyses the AIDS crisis in Africa. The protagonist is Ulster journalist Gaby McAslin, whose outsider's eye both observes the African landscape and sees what the "UN quarantine zone" is doing to Kenya and Kenyans. Gaby's story, with that of her daughter, continues in Kirinya. Tendeléo's Story is seen through the eyes of a young Kenyan girl who escapes to the UK, only to be deported back to Kenya as an unwanted alien.
McDonald's River of Gods (2004) is set in mid-21st-century India; it won the BSFA award, and was nominated for a Hugo Award and a Clarke Award. Brasyl (2007) is set in the 18th and 21st centuries in Lusophone South America; it won the BSFA award, and was nominated for a Hugo Award and the Warwick Prize for Writing. McDonald began his Everness series of young adult fiction novels in 2011 with Planesrunner. He said in a 2014 interview, "I didn't want to get stuck doing the same SF books over and over, successful though they may be. I didn't want to keep writing books about the developing economy of the year—India, Brazil. I could feel myself getting trapped in that." He has written two Everness sequels, Be My Enemy (2012), and Empress of the Sun (2014).
McDonald published Luna: New Moon, the first volume of a proposed science fiction duology, in 2015. It explores the dangerous intrigue that surrounds the five powerful families who control industry on the Moon. McDonald said of the novel in August 2014, "I’m still writing about developing economies, it’s just that this one happens to be on the Moon." Before critics called the novel "Game of Thrones in space", McDonald himself dubbed it "Game of Domes" and "Dallas in space". Luna was optioned for development |
https://en.wikipedia.org/wiki/DSI | DSI may refer to:
Abbreviations
DontStayIn, a social networking website
Airport
IATA airport code for Destin Executive Airport
Businesses
DSI is an initialism for the following companies:
Daiichi Sankyo, Incorporated
Data Sciences International, a company in Saint Paul, United States
Dave Smith Instruments, an American synthesizer company
Deep Space Industries, American-based asteroid mining startup
Deep Springs International
Delphi Schools, Inc.
Delphine Software International, a now bankrupt software company
Destination Software, Inc., a video game company
Distinctive Software Inc., a video game company
Diversified Specialty Institute Holdings, Inc., a US-based healthcare group
Drivetrain Systems International, an Australian automotive transmissions manufacturer
DYWIDAG Systems International, an international supplier of ground anchors and post-tensioning systems
State Hydraulic Works (Turkey) (Turkish: Devlet Su İşleri (DSİ)), a state agency in Turkey
Education
Decision Sciences Institute, a professional association focusing on the application of quantitative research and qualitative research to the decision problems of individuals, organizations, and society.
Deutsche Schule Istanbul, a private high school in Istanbul
Gaming
Dead Space Ignition, a video game in the Dead Space series
Nintendo DSi, Nintendo's third iteration of the Nintendo DS handheld game console
Music
Dope Stars Inc., an industrial metal band formed in 2002
Organizations and institutions
Special Intervention Detachment an Algerian Special Forces Unit of the National gendarmerie for counter-terrorism actions
Data Storage Institute, a Singaporean national research institute
Department of Special Investigation, a Thai government organization for special investigation
Dienst Speciale Interventies, a Dutch government organization for counter-terrorism actions
DSI Samson Group, a Sri Lankan conglomerate
Deutsches SOFIA Institut, an institute helping develop SOFIA
Science, mathematics and medicine
Depolarization-induced suppression of inhibition, a type of modulation of inhibitory neurotransmission
Diffused Surface Illumination, a multi-touch technique using a special acrylic Endlighten that disperses even light supplied by edge lighting the acrylic.
Digital sequence information, information from sequenced DNA and other large molecules such as RNA or proteins, which can be processed digitally.
The Stuttgart Database of Scientific Illustrators 1450–1950
Technology
Data storage interrupt, the name used for a segmentation fault on PowerPC-based processors
Data Stream Interface, computer network protocol to run Apple Filing Protocol over TCP
Delay slot instruction, a term from computer architecture
Digital Serial Interface, a protocol for controlling of lighting in buildings
Display Serial Interface, a serial protocol for mobile display devices
Diverterless supersonic inlet, a type of jet engine air intake |
https://en.wikipedia.org/wiki/The%20Freecycle%20Network | The Freecycle Network (TFN,) is a private, nonprofit organization registered in Arizona, US and is a charity in the United Kingdom. TFN coordinates a worldwide network of "gifting" groups to divert reusable goods from landfills. The network provides a worldwide online registry, organizing the creation of local groups and forums for individuals and nonprofits to offer (or request) free items for reuse or recycling and to promote a gift economy. In contrast, although flea markets and swap meets also contribute to the 3 Rs (reduce, reuse, recycle), they involve mainly buying and selling or bartering rather than gifting.
History
TFN first began when its founder, Deron Beal, collaborated with RISE, a small nonprofit corporation that offers recycling services in the downtown area of Tucson, Arizona, US. The team worked together to find local nonprofits that could potentially use their products, but it was not too successful. Hence, Beal created the first Freecycle email that enabled online users to interact with recycling. In February 2005, TFN accepted $130,000 from Waste Management to help build out the website and the network.
Over time, the concept has spread to over 110 countries, with thousands of local groups and millions of members.
The organization began as a collection of Yahoo! Groups linked from freecycle.org. It has become a web-community platform on freecycle.org for all groups, which are run by local volunteers. TFN encourages the formation of new groups, subject to approval by regional new-group approvers. Groups approved by TFN are listed on the website, can use the TFN name and logo, and are subject to rules which are enforced by a network of global and regional group outreach assistance. As of March 2009, all new groups had to join freecycle.org's new-group system, which provides Freecycle-specific tools for local volunteer moderators and gives TFN oversight of individual groups. As of 2015, all local groups are listed on freecycle.org.
Membership
Membership is completely free to all members, and everything posted on the website must be completely free, legal, and appropriate for everyone regardless of their age. Today, TFN is a global organization with over 4,000 local chapters. They passed two-million-member in February 2006. By February 2014, TFN had 6,880,991 members across 5,120 groups worldwide.
Controversies
Trademark issues
A notice of opposition was filed in federal court by FreecycleSunnyvale against the Freecycle Network in January 2006. An injunction was granted against Tim Oey in May 2006 for allegedly disparaging the TFN trademark. The injunction was stayed in July 2006 and dissolved by the United States Court of Appeals for the Ninth Circuit in September 2007. To defend its trademark in 2006, TFN pursued other free recycling groups who used the word "freecycle" or allegedly had "confusingly similar derivations thereof".
Free-speech advocates, including the Electronic Frontier Foundation and 38 law professors, f |
https://en.wikipedia.org/wiki/WBBM-TV | WBBM-TV (channel 2) is a television station in Chicago, Illinois, United States, serving as the market's CBS network outlet. Owned and operated by the network's CBS News and Stations division, the station maintains studios on West Washington Street in the Loop, and its transmitter is located atop the Willis Tower.
History
Early history (1940–1953)
WBBM-TV traces its history to 1940 when Balaban and Katz, a subsidiary of Paramount Pictures, signed on experimental station W9XBK, the first all-electronic television facility in Chicago. Balaban and Katz was already well known for owning several movie theaters in the Chicago area. In order to establish the station, the company hired television pioneer William C. "Bill" Eddy away from RCA's experimental station W2XBS in New York City. When World War II began, Eddy used the W9XBK facilities as a prototype school for training Navy electronics technicians. While operating the Navy school, Eddy continued to lead W9XBK and wrote a book that defined commercial television for many years.
On September 6, 1946, the station received a commercial license as WBKB (for Balaban and Katz Broadcasting) on VHF channel 4, becoming the first commercial station located outside the Eastern Time Zone; it was also the sixth commercial TV station in the United States behind WNBT (now WNBC), WCBW (now WCBS-TV), WABD (now WNYW) all in New York City; WRGB in Schenectady, New York; and WPTZ (now KYW-TV) in Philadelphia. WBKB aired some of the earliest CBS programs, including the 1947 debut of Junior Jamboree (later renamed Kukla, Fran and Ollie after it moved to NBC in 1948). Channel 4 originally operated as an independent station, since at the time it was not clear that it would be an affiliate of either CBS or the DuMont Television Network; eventually, KSD-TV (now KSDK) in St. Louis became the first television station west of the Eastern Time Zone to affiliate with a major network. One of the station's early highlights was its telecast of the National Football League's championship game between the Chicago Cardinals and the Philadelphia Eagles on December 28, 1947.
In December 1948, WBKB began sharing the market's CBS affiliation with WGN-TV (channel 9), after that station affiliated with the network. In 1949, Balaban and Katz became part of United Paramount Theatres, after Paramount Pictures was forced to divest its chain of movie theaters by order of the United States Supreme Court.
WBKB played an indirect role in DuMont's demise. At the time, Paramount Pictures owned a stake in DuMont. The Federal Communications Commission (FCC) ruled that Paramount's holdings were large enough that the studio effectively controlled DuMont. Paramount also owned KTLA in Los Angeles; since DuMont already owned WABD (now WNYW) in New York City, WTTG in Washington, D.C., and WDTV (now sister station KDKA-TV) in Pittsburgh, the FCC's decision meant neither Paramount nor DuMont could acquire any more television stations. Paramount even launch |
https://en.wikipedia.org/wiki/Iiyama%20%28company%29 | iiyama is a brand name of . It produces liquid crystal display (LCD) monitors and LED display panels. It was previously an independent Japanese computer electronics company called with its headquarters in Chiyoda-ku, Tokyo. Iiyama was founded in 1972 by Kazuro Katsuyama, named after the city of Iiyama in Nagano Prefecture, Japan. The company was bought in January 2006 by MCJ Corporation, which includes Mouse Computer Corporation. The headquarters of iiyama was moved to Europe in October 2008. The CEO since January 2006 has been Takeichi Shinji.
History
Founded in March 1972 as by 23-year-old bank employee Kazuro Katsuyama, it first started manufacturing television boards and substrates for Mitsubishi at a local plant in Nagano Prefecture. They started producing black and white TVs in 1976 and color TVs in 1979, followed by computer monitors under its own brand name in 1981 which then became its main product range.
The company expanded to the western market in 1987 and in the 1990s opened up offices in Philadelphia, Germany, Poland, France, UK, Sweden, the Czech Republic, Taiwan, and its international head office in the Netherlands, where it is registered as Iiyama Benelux B.V. By 1993 it was the leading monitor supplier in Japan with a 21% market share. The first LCDs were released by iiyama in 1997.
In 2001 it merged with e-yama to create , and its headquarters moved to Nagano City. In 2006 holding company bought Iiyama and renamed it to , moving its base to Chūō, Tokyo. In October 2008 iiyama Corporation became part of Mouse Computer Co., Ltd., one of MCJ's companies.
See also
Iiyama Vision Master Pro series
References
External links
Computer companies established in 1972
Electronics companies established in 1972
Display technology companies
Electronics companies of Japan
Computer companies of Japan
Manufacturing companies based in Tokyo
Japanese brands
Iiyama
Japanese companies established in 1972 |
https://en.wikipedia.org/wiki/Sai%20Ying%20Pun%20station | Sai Ying Pun is a station on the MTR network. The station is between HKU and Sheung Wan on the . It serves the neighbourhood of Sai Ying Pun and the western part of Mid-Levels in northwestern Hong Kong Island, Hong Kong. Sai Ying Pun station was opened on 29 March 2015, completing the West Island line extension of the Island line.
History
Plans for the station first appeared in Hong Kong Mass Transit: Further Studies in 1970. It was to be built as part of the Island line in the 1980s, but construction of the line did not commence westwards beyond Sheung Wan, due to inadequate forecast passenger numbers and technical difficulties identified by contractors.
Proposed locations
In Outline Zoning Plan No. S/H3/20, the Planning Department of the government indicated one possible location under Des Voeux Road West at Ko Shing Street as of December 2003. A ventilation shaft marked with MTR notices can be found at the intersection. A large void facing Des Voeux Road West, sealed, can also be found at a nearby medical centre, which some have speculated that it was reserved for a to-be-built exit. These findings suggest that this was original proposed location.
However, in proposals submitted to the government by the MTR in May 2002, the proposed station was shifted further west to the intersection of Des Voeux Road West and Water Street.
In March 2004, the MTR moved the station back east but south of the initial alignment under King George V Memorial Park. A source from the MTR Corporation (MTRC) revealed to the local newspaper Ming Pao that this location was chosen to avoid any nuisance during works under major roads. The location would also better suit the needs of Mid-Levels residents, the source said.
Design and construction
The MTR Corporation let out a tender for the construction of the Sai Ying Pun and HKU stations and of tunnel. In 2009 the design and architecture work was awarded to Aedas in a joint venture with AECOM. In March 2010, it was awarded to a joint venture of Gammon Construction and Nishimatsu Construction (西松建設) for HK$4.7 billion. Construction commenced in 2010 and was completed in 2015. The station opened later than the other two on the West Island line due to construction delays resulting from soft ground conditions. Exit B3 construction was delayed for the same reason. Other elements of the construction included demolition of the Centre Street cooked food centre, the Ki Ling Lane children's playground, and the Whitty Street public toilet.
The station is home to a work of art entitled "Street Scenes of Sai Ying Pun", a collage of monochrome photos by artist Tse Ming-chong and the Hong Kong Youth Arts Foundation. It is located between the concourse and Exit B1/B2.
The pedestrian passage between Exit A and the concourse is very long, and has drawn complaints from some residents.
Island line western extension opened on 28 December 2014, but Sai Ying Pun station did not open until 29 March 2015.
Station layout
Entrances and e |
https://en.wikipedia.org/wiki/Sheung%20Wan%20station | Sheung Wan is a station on the of the Hong Kong MTR network. The station serves the neighbourhood of Sheung Wan and the western part of Central District. The livery colour of this station is khaki.
The station was originally planned in 1970 as Western Market but its construction was discontinued after further planning for the new lines. Upon the construction of the Island line, the station was finally constructed and opened on 23 May 1986. From its opening until the line's extension to in 2014, Sheung Wan was the westbound terminus of the Island line.
History
The station was originally proposed under the name Western Market in the 1967 Hong Kong Mass Transport Study, and was to be the southbound terminus of Kwun Tong line as well as its interchange with the Island line. Due to economic and contractual difficulties, the Hong Kong Government decided not to proceed with the construction of the full system, and the Island line was put on hold.
The Hong Kong Government authorised the construction of the -long Island line between Sheung Wan and in December 1980. Works on the station commenced in June 1982 and the construction contract was awarded to a Nishimatsu–Aoki joint venture.
The station was originally planned to open along with the rest of the line, but works on the station were delayed by the reprovisioning of government offices in the Fire Brigade Building (where Hang Seng Bank Head Office now stands) and the fruit wholesale market on New Market Street, which had to be demolished for the setting up of vertical shaft and crossover box, respectively.
When Island line started operation on 31 May 1985, trains had to terminate at and the section between Admiralty and Sheung Wan was not operational. It was not until 23 May 1986 that Sheung Wan station was opened as the western terminus of the Island line. There is a plaque in the station concourse, unveiled by Financial Secretary John Henry Bremridge, commemorating the completion of the Island line.
Sheung Wan served as the western terminus of the Island line until the extension of the line to Kennedy Town in 2014.
Station layout
The platforms are built under Des Voeux Road Central from Cleverly Street to Rumsey Street. Although platforms 1 and 2 are parallel and directly opposite to each other, there is a wall separating the two tracks giving a false impression that both platforms are separated by a long distance from each other.
Rumsey Street platforms
The platforms of Rumsey station, originally planned as the southern terminus of the East Kowloon line, still remain in Sheung Wan station. They are located near Exit E, forming part of the passageways between the concourse and the open platforms, and they run perpendicular to the Island line platforms below. The platforms were never completed, and have a length of about three MTR EMUs (while normal trains have eight each), roughly 60 metres long; do not have tracks nor overhead power lines; and have all tunnel entrances sealed with |
https://en.wikipedia.org/wiki/Causeway%20Bay%20station | Causeway Bay () is a station on the MTR network on Hong Kong Island, Hong Kong. The station is between and stations on the . It serves the locality of East Point within Wan Chai District.
History
In 1967, Freeman Fox and Wilbur Smith Associates released the government-commissioned Mass Transport Study, which proposed a new underground railway. The plan included the between and stations. When the Mass Transport Provisional Authority was founded, minor alterations were made with the to Kennedy Town section cancelled. The government gave approval on the 95-million-dollar construction of the line on 23 December 1980 and work started in October 1982. In 1984, the station construction site was sold by MTR to Taisei Corporation for $380m, now the location of Sogo Hong Kong. The station opened with the first section of the Island line from to Chai Wan on 31 May 1985.
Services
The station is situated between and stations on the. The typical off-peak service is 17 trains per hour in both directions, which is a train every 3–6 minutes.
Station layout
The platforms of Causeway Bay station are constructed in a stacked arrangement, with platform 1 above platform 2.
Entrances/exits
Causeway Bay is a primary shopping district in Hong Kong with exits from the MTR leading directly into major outlets such as Sogo and Times Square, which can be accessed through a long, upward sloping pedestrian walkway at Exit A.
Unlike other MTR stations, there are three different concourses in Causeway Bay station. After exiting the paid areas through the turnstiles, the other two concourses are inaccessible underground. The west and east concourses were opened on 31 May 1985 with the opening of the station, while the south concourse and Exit A were opened in 1994 with the opening of Times Square.
South concourse
In the basement of Times Square:
A: Times Square
West concourse
In the basement of Causeway Bay Plaza (Phase 1):
B: Causeway Bay Plaza
C: Sino Plaza
East concourse
In the basement of Sogo Department Store:
D1/D2/D3/D4: Sogo Department Store
E: Victoria Park
F1: Jardine's Crescent
F2: Hysan Place
Transport connections
Bus routes
These are the bus routes found in the vicinity of Causeway Bay station that provide connections with other areas not served by the MTR including Aberdeen/Wah Kwai Estate, Braemar Hill, Happy Valley, Jardine's Lookout, Kennedy Town, Lai Tak Tsuen, Lei Tung Estate, Park Road, Sham Wan/Wong Chuk Hang, Nam Cheong station/Hoi Lai Estate, South Horizons, The Peak, Tin Wan, Tsing Yi/Cheung On, Wah Fu.
Hong Kong Tramways
Hong Kong Island's tramway system consists of an inner loop branching out at Causeway Bay towards Happy Valley. The nearest tram stop is located along Percival Street near the end of Matheson Street.
Plans to expand Causeway Bay station
In November 2006, MTR announced they would build an underground shopping mall and expand the current Causeway Bay station. The station will add 5 new exits:
E1: East Point Road
E2: Gr |
https://en.wikipedia.org/wiki/British%20Rail%20Class%20442 | The British Rail Class 442 (5-WES) Wessex Electrics were electric multiple unit passenger trains introduced in 1988 by Network SouthEast on the South West Main Line from London Waterloo to Weymouth to coincide with the electrification of the line from Bournemouth. Twenty-four five-car units were built by British Rail Engineering Limited's Derby Litchurch Lane Works.
Following the privatisation of British Rail, the fleet was sold to Angel Trains and operated by South West Trains up until February 2007, when they were replaced by Class 444 and Class 450s. After a period in storage, they were leased to Southern for use on Gatwick Express services from London Victoria to Gatwick Airport and Brighton. The units were withdrawn from Gatwick Express services in 2016 and from Southern peak-hour London Bridge to Brighton and Eastbourne services in March 2017. From 2019, eighteen were leased by South Western Railway and were refurbished for use on London Waterloo to Portsmouth Harbour services. However they were again withdrawn in March 2020 due to services being reduced as a result of the COVID-19 pandemic. In March 2021, South Western Railway purchased all 18 from Angel Trains, stripped the fleet of their recently refurbished equipment for parts and scrapped them.
The class holds the world speed record for a third-rail train, having attained on a test run prior to entering service.
Description
The Class 442 is based on the British Rail Mark 3 carriage bodyshell, and has a number of features which distinguish it from the slam-door units it replaced:
Vehicle length is , as opposed to .
All vehicles are air-conditioned, and have powered internal doors and external plug doors.
Units consist of five vehicles, and operate as 5 or 10-car trains, replacing 4-car units which operated as 4, 8 or 12-car trains.
Maximum permitted speed is .
As was common on the British Rail Southern Region, many electrical components – including traction motors and electrical control gear – were salvaged from the Class 432 units they replaced. For this reason, the older 4REP and 4TC units had to be withdrawn before their replacements were built.
The 442 units are unique among all of the various Mark 3-based multiple-unit classes in that they use the full-length 23-metre version of the Mark 3 bodyshell with sealed, non-opening windows - hence they bear a very close resemblance to the coaching stock used in both HST sets and loco-hauled expresses.
The Class 442 was one of the first types to make extensive use of plastics in construction hence the nickname "Plastic Pig".
Dot matrix destination signs were originally provided on the top of the nose end gangway. They were removed in the early 1990s, due to legibility issues, and reinstalled at a different position in 2008, in preparation for service on the Gatwick Express.
Operations
Network SouthEast
The first unit was handed over to Network SouthEast on 18 December 1987. Prior to entering service, one set a world speed record |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.