source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/Structured%20program%20theorem
The structured program theorem, also called the Böhm–Jacopini theorem, is a result in programming language theory. It states that a class of control-flow graphs (historically called flowcharts in this context) can compute any computable function if it combines subprograms in only three specific ways (control structures). These are Executing one subprogram, and then another subprogram (sequence) Executing one of two subprograms according to the value of a boolean expression (selection) Repeatedly executing a subprogram as long as a boolean expression is true (iteration) The structured chart subject to these constraints, particularly the loop constraint implying a single exit (as described later in this article), may however use additional variables in the form of bits (stored in an extra integer variable in the original proof) in order to keep track of information that the original program represents by the program location. The construction was based on Böhm's programming language P′′. The theorem forms the basis of structured programming, a programming paradigm which eschews goto commands and exclusively uses subroutines, sequences, selection and iteration. Origin and variants The theorem is typically credited to a 1966 paper by Corrado Böhm and Giuseppe Jacopini. David Harel wrote in 1980 that the Böhm–Jacopini paper enjoyed "universal popularity", particularly with proponents of structured programming. Harel also noted that "due to its rather technical style [the 1966 Böhm–Jacopini paper] is apparently more often cited than read in detail" and, after reviewing a large number of papers published up to 1980, Harel argued that the contents of the Böhm–Jacopini proof were usually misrepresented as a folk theorem that essentially contains a simpler result, a result which itself can be traced to the inception of modern computing theory in the papers of von Neumann and Kleene. Harel also writes that the more generic name was proposed by H.D. Mills as "The Structure Theorem" in the early 1970s. Single-while-loop, folk version of the theorem This version of the theorem replaces all the original program's control flow with a single global while loop that simulates a program counter going over all possible labels (flowchart boxes) in the original non-structured program. Harel traced the origin of this folk theorem to two papers marking the beginning of computing. One is the 1946 description of the von Neumann architecture, which explains how a program counter operates in terms of a while loop. Harel notes that the single loop used by the folk version of the structured programming theorem basically just provides operational semantics for the execution of a flowchart on a von Neumann computer. Another, even older source that Harel traced the folk version of the theorem is Stephen Kleene's normal form theorem from 1936. Donald Knuth criticized this form of the proof, which results in pseudocode like the one below, by pointing out that the structure
https://en.wikipedia.org/wiki/CyberCash
CyberCash, Inc. was an internet payment service for electronic commerce, headquartered in Reston, Virginia. It was founded in August 1994 by Daniel C. Lynch (who served as chairman), William N. Melton (who served as president and CEO, and later chairman), Steve Crocker (Chief Technology Officer), and Bruce G. Wilson. The company initially provided an online wallet software to consumers and provided software to merchants to accept credit card payments. Later, they additionally offered "CyberCoin," a micropayment system modeled after the NetBill research project at Carnegie Mellon University, which they later licensed. At the time, the U.S. government had a short-lived restriction on the export of cryptography, making it illegal to provide encryption technology outside the United States. CyberCash obtained an exemption from the Department of State, which concluded that it would be easier to create encryption technology from scratch than to extract it out of Cyber-Cash's software. In 1995, the company proposed RFC 1898, CyberCash Credit Card Protocol Version 0.8. The company went public on February 19, 1996, with the symbol "CYCH" and its shares rose 79% on the first day of trading. In 1998, CyberCash bought ICVerify, makers of computer-based credit card processing software, and in 1999 added another software company to their lineup, purchasing Tellan Software. In January 2000, a teenage Russian hacker nicknamed "Maxus" announced that he had cracked CyberCash's ICVerify application; the company denied this, stating that ICVerify was not even in use by the purportedly hacked organization. On January 1, 2000, many users of CyberCash's ICVerify application fell victim to the Y2K Bug, causing double recording of credit card payments through their system. Although CyberCash had already released a Y2K-compliant update to the software, many users had not installed it. Bankruptcy The company filed for Chapter 11 bankruptcy on March 11, 2001. VeriSign acquired the Cybercash assets (except for ICVerify) and name a couple of months later. On November 21, 2005 PayPal (already an eBay company) acquired VeriSign's payment services, including Cybercash. See also Digital currency SwissBorg References External links CyberCash opens Net to small change Cleever - Payment Method For E-commerce Cybercash Disputes Hacker's Claim CyberCash moves to thin wallet Payment systems Mobile payments Online payments Payment service providers Electronic funds transfer Financial technology companies American companies established in 1994 Financial services companies established in 1994 1994 establishments in Virginia Companies that filed for Chapter 11 bankruptcy in 2001
https://en.wikipedia.org/wiki/CalDAV
Calendaring Extensions to WebDAV, or CalDAV, is an Internet standard allowing a client to access and manage calendar data along with the ability to schedule meetings with users on the same or on remote servers. It lets multiple users in different locations share, search and synchronize calendar data. It extends the WebDAV (HTTP-based protocol for data manipulation) specification and uses the iCalendar format for the calendar data. The access protocol is defined by . Extensions to CalDAV for scheduling are standardized as . The protocol is used by many important open-source applications. History The CalDAV specification was first published in 2003 as an Internet Draft submitted to the Internet Engineering Task Force (IETF) by Lisa Dusseault. In March 2007, the CalDAV specification was finished and published by the IETF as RFC 4791, authored by Cyrus Daboo (Apple), Bernard Desruissaux (Oracle), and Lisa Dusseault (CommerceNet). CalDAV is designed for implementation by any collaborative software, client or server, that needs to maintain, access or share collections of events. It is developed as an open standard to foster interoperability between software from different vendors. Specification The architecture of CalDAV (partially inherited from the underlying specifications) organizes the data (events, tasks, free-busy info, notes) in directories (collections), where multiple items (resources) reside. The resources and collections can be accessed by one or more users, using standard HTTP and DAV semantics to detect conflicting changes, or to provide locking. For access control the concept of ACLs are used, so each operation (view, edit, delete etc.) can be denied or granted per user. Therefore, the specification requires that CalDAV servers must support "WebDAV Access Control Protocol" (RFC 3744). The calendar resources must use iCalendar format, which allows the server to understand and process the data. Parsing the iCalendar items is necessary, because the server has to support a number of calendaring-specific operations such as doing free-busy time reports and expansion of recurring events. With this functionality, a user may synchronize their own calendar to a CalDAV server, and share it among multiple devices or with other users. The protocol also supports non-personal calendars, such as calendars for sites or organizations. See also Exchange ActiveSync Comparison of CalDAV and CardDAV implementations Calendar CardDAV GroupDAV, an effort to create a simplified, straightforward protocol for calendars as well as contacts. iCalendar Scheduling OSID defines a software interface abstraction for calendaring protocols. SyncML vCalendar WebDAV References External links CalDAV Resource Site CalConnect, The Calendaring and Scheduling Consortium WebDAV Resources Open Calendar Sharing and Scheduling with CalDAV L. Dusseault, J. Whitehead, IEEE Internet Computing 9(2) Application layer protocols Calendaring standards
https://en.wikipedia.org/wiki/Amanda%20Randolph
Amanda E. Randolph (September 2, 1896 – August 24, 1967) was an American actress and singer. She was the first African-American performer to star in a regularly scheduled network television show, appearing in DuMont's The Laytons. Early life Born in Louisville, Kentucky, Randolph was the daughter of a Methodist minister and a teacher. She had a younger sister, Lillian who also became an actress. Career Music The Randolph family moved frequently. At the age of 14, Randolph began earning extra money playing the piano and organ in Cleveland, Ohio. Around 1919, she moved to Cincinnati, Ohio, where she recorded several piano rolls of hot jazz and blues music for the Vocalstyle company of Cincinnati while working as a musician in Ohio's Lyric Theatre. These are the only known rolls recorded by a black female pianist. Randolph did her work for the company under the name Mandy Randolph. She is shown as the performer of "The Yellow Dog Blues", by W. C. Handy in 1919, Vocalstyle roll # 11562. Randolph also wrote music she recorded for the Vocalstyle company; she is shown as both the performer and composer of "I'm Gonna Jazz My Way Right Straight Thru Paradise", and as the co-author of "Cryin' Blues" with H. C. Washington. Randolph also cut audio recordings, accompanied by Sammie Lewis. A record album was produced in 1996 by Document Records called, Blues & Jazz Obscurities (1923-1931), containing the six duets the pair produced. Still working under the name Mandy Randolph, she recorded "Cootie Crawl" (G11425) on April 30, 1923, and "I Got Another Lovin' Daddy" for Gennett Records. She was invited to join the Sissle and Blake musical, Shuffle Along, in New York in 1924 and went on to do Lucky Sambo as one of the Three Dixie Songbirds (sharing the bill with its star, Tim Moore, whom she later appeared with on The Amos 'n' Andy Show from 1951 to 1953). in 1925, she was part of Sissle and Blake's The Chocolate Dandies. Randolph then worked in musicals at New York's Alhambra Theater until 1930, following that with work in Europe and England for a year. Randolph worked on the vaudeville and burlesque circuits as a comedian and as a singer, noting that Abbott and Costello also got their start the same way. Randolph took a four-year hiatus from show business in 1932; she married and helped her husband run their restaurant in New York called The Clam House, which was a favorite of those in the entertainment industry. She then returned to performing, playing piano at a Greenwich Village club called The Black Cat. She continued recording for Bluebird Records, a label created in 1932 and owned by RCA Victor Records. She did the vocals with her own band, billed as Amanda Randolph and her Orchestra. The records were made in New York City on October 8, 1936. On that date, Amanda cut: "Please Don't Talk About My Man" (Bluebird 6615), "Doin' The Suzie-Q" (Bluebird 6615), "Honey, Please Don't Turn Your Back On Me" (Bluebird 6616), "For Sentimental Reasons" (Bluebir
https://en.wikipedia.org/wiki/JRiver%20Media%20Center
JRiver Media Center is a multimedia application that allows the user to play and organize various types of media on a computer running Windows, macOS, or Linux operating systems. Developed by JRiver, Inc., it is offered as shareware. JRiver Media Center is a "jukebox"-style media player, like iTunes, which usually uses most of the screen to display a potentially very large library of files. Features include the ability to rip and burn CDs, static and dynamic playlists, and plugins such as Audioscrobbler and G-Force visualization. Regular (usually daily beta) builds are posted on the Media Center Interact forum implementing requested features and fixing reported bugs. The forum has an active member community, with more than 56,000 members as of 2021. History JRiver Media Center was created by J. River, Inc., a Minneapolis-based company founded in 1982 by James "Jim" Hillegass that developed networking and internet software for Windows, DOS and Unix. Originally the software was known as Media Jukebox and had both free and premium versions. The company announced in 2001 that it planned to launch a subscription service for Media Jukebox to compete with Napster. The software was rebranded to JRiver Media Center for version 9 in 2003. In November 2007, J. River released Media Jukebox 12, a stripped-down version of JRiver Media Center 12, which is available to download for free, compared to JRiver Media Center's price of $49.98. JRiver Media Jukebox includes most of the audio features of Media Center; the image and video functions are removed. The last version of JRiver Media Jukebox was version 14.0.166. However, the version 14 removed several features previously available for free (specifically CD and cover art lookup) and now only available in the Media Center product. As such many still use the older free version of JRiver Media Jukebox 12.0.534 Library system JRiver Media Center organizes files using Media Libraries; these are effective databases. Media Center can support multiple libraries. Information relating to media is imported into the library, including meta data for media files and the path to the media files. The media files themselves are not contained in the database, but cataloged within the libraries. Version 12 of JRiver Media Center added support for auto-importing of media, whereby JRiver Media Center continually watches designated directories for changes in media. If a new file is dropped into the directory, JRiver Media Center will add the file to its library. Each library can contain any type of media, video, audio, images etc. View schemes View Schemes are the main way to browse through files in Media Center. Views can be created which help users see different parts of their library; these are effectively the same as database views. They are based on using metadata as criterion for creating a filtered list of files. The view system is very powerful and fully customizable. For example, a view could be made which sho
https://en.wikipedia.org/wiki/SSD%20%28disambiguation%29
A solid-state drive is a type of data storage device which uses semiconductor memory rather than magnetic media. SSD may also refer to: Science and technology Saturated-surface-dry, aggregate or porous solid condition Biology and medicine Schizophrenia spectrum disorders Signal-sensing domain, in molecular biology Sterol-sensing domain, a protein domain Speech sound disorder Sexual size dimorphism Single-sided deafness Somatic symptom disorder A brand name for Silver sulfadiazine antibacterial Computing Server-side decoration of windows, an alternative to client-side decoration Single-shot multibox detection, computer vision object detection System sequence diagram in software engineering Mathematics Schwartz sequential dropping, an electoral system Other uses Sardar Sarovar Dam, Gujarat, India Scalextric Sport Digital, toy cars Singapore School for the Deaf South Sudan (ISO 3166-1 alpha-3 code: SSD) SSD (band), Boston, US, 1981–1985 Siroi language (ISO code: ssd), of Papua New Guinea Special School District of St. Louis County Stansted Airport railway station (National Rail code: SSD) Social Security Disability Insurance (SSD or SSDI), US State Security Department, North Korean secret police United States–Russia Strategic Stability Dialogue, meetings to reduce the risk of US–Russia nuclear war
https://en.wikipedia.org/wiki/Nick%20in%20the%20Afternoon
Nick in the Afternoon was a programming block on Nickelodeon that aired from 1994 to 1998 on weekday afternoons during the summer, hosted by Stick Stickly, a Mr. Bill-like popsicle stick puppeteered by Rick Lyon and voiced by New Yorker Paul Christie (who would later voice Noggin mascot, Moose A. Moose until 2012). The 1998 stint ran from July until August. Henry and June's Summer replaced this Nickelodeon summer block a year later. Stick Stickly was later revived for the TeenNick 1990s' block The '90s Are All That. Regular segments During its first summer, the programming consisted of normal Nickelodeon shows that would have aired regardless, but come its second summer, Nick in the Afternoon made some key changes. Instead, it showed preselected Nicktoons with added segments such as "U-Pick" (viewers pick what show and episode they want to see) and U-Dip (viewers pick which substance Stick Stickly is dipped in or any substance at all using their bare feet). Viewers occasionally chose a program that had not been aired on Nick in many years, for example You Can't Do That on Television, or from time to time would select a Nick at Nite program such as I Love Lucy, The Munsters, or The Brady Bunch. The preselected segments were indicated by a dial using Stickly as the spinner, so as to keep the cartoons a surprise. Stick Stickly's address When giving viewers the address at which they could write him, Stick Stickly would sing a little (and easily memorized) jingle: "Write to me/Stick Stickly/PO Box 963/New York City/New York State/10108." After the Internet became mainstream, a note stating "...or e-mail me at nick.com" was added to the end. Stick Stickly on The '90s Are All That Stick Stickly segments from the block have been used in promotions for The '90s Are All That, and on September 6, 2011, during The '90s Are All That block, a commercial announced that Stick Stickly would be returning to television on Friday October 7, 2011 at midnight. The character has been updated for modern times, with a vocabulary that not only makes frequent reference to modern amenities such as Facebook, flat screen TVs and Jersey Shore, but also has been updated with a more adult sense of humor to reflect the older late-night audience. Stickly hosts "U-Pick with Stick" each Friday, where users on The '90s Are All That website can request up to four shows to be seen. The winning "pick," which is decided by an online vote (another sign of modern times), is announced by Stick Stickly. Stickly is also taking questions by use of a Twitter hash tag, #POBox963, a reference to his old 1990s era jingle from Nick in the Afternoon. It was later announced in December 2011 that U-Dip would also make a return, joining a long list of objects dropped on New Year's Eve at midnight. Stick Stickly made an on-air appearance on The '90s Are All That from August 5–8, 2013, in which he hosted the "'90s Game Show Week" on the block, and returned to doing U-Picks in June 2015 as part of "
https://en.wikipedia.org/wiki/Host%20Identity%20Protocol
The Host Identity Protocol (HIP) is a host identification technology for use on Internet Protocol (IP) networks, such as the Internet. The Internet has two main name spaces, IP addresses and the Domain Name System. HIP separates the end-point identifier and locator roles of IP addresses. It introduces a Host Identity (HI) name space, based on a public key security infrastructure. The Host Identity Protocol provides secure methods for IP multihoming and mobile computing. In networks that implement the Host Identity Protocol, all occurrences of IP addresses in applications are eliminated and replaced with cryptographic host identifiers. The cryptographic keys are typically, but not necessarily, self-generated. The effect of eliminating IP addresses in application and transport layers is a decoupling of the transport layer from the internetworking layer (Internet Layer) in TCP/IP. HIP was specified in the IETF HIP working group. An Internet Research Task Force (IRTF) HIP research group looks at the broader impacts of HIP. The working group is chartered to produce Requests for Comments on the "Experimental" track, but it is understood that their quality and security properties should match the standards track requirements. The main purpose for producing Experimental documents instead of standards track ones are the unknown effects that the mechanisms may have on applications and on the Internet in the large. RFC references - Host Identity Protocol (HIP) Architecture (early "informational" snapshot) - Host Identity Protocol base (Obsoleted by RFC 7401) - Using the Encapsulating Security Payload (ESP) Transport Format with the Host Identity Protocol (HIP) (Obsoleted by RFC 7402) - Host Identity Protocol (HIP) Registration Extension (obsoleted by RFC 8003) - Host Identity Protocol (HIP) Rendezvous Extension (obsoleted by RFC 8004) - Host Identity Protocol (HIP) Domain Name System (DNS) Extension (obsoleted by RFC 8005) - End-Host Mobility and Multihoming with the Host Identity Protocol - NAT and Firewall Traversal Issues of Host Identity Protocol (HIP) Communication - Basic Requirements for IPv6 Customer Edge Routers - Host identity protocol version 2 (HIPv2) (updated by RFC 8002) - Using the Encapsulating Security Payload (ESP) transport format with the Host Identity Protocol (HIP) - Host Identity Protocol Certificates - Host Identity Protocol (HIP) Registration Extension - Host Identity Protocol (HIP) Rendezvous Extension - Host Identity Protocol (HIP) Domain Name System (DNS) Extension - Host Mobility with the Host Identity Protocol - Host Multihoming with the Host Identity Protocol - Native NAT Traversal Mode for the Host Identity Protocol See also Identifier/Locator Network Protocol (ILNP) IPsec Locator/Identifier Separation Protocol (LISP) Mobile IP (MIP) Proxy Mobile IPv6 (PMIPv6) References External links IETF HIP working group IRTF HIP research group OpenHIP Wiki How HIP works - from InfraHIP si
https://en.wikipedia.org/wiki/Tara%20Nelson
Tara Nelson is a Canadian television journalist and news anchor, and most recently was the European bureau chief for Global Television Network's news division. In 2010, Nelson assumed the role as the anchor of the News at 6 at CTV Calgary, replacing Barb Higgins, who left the position after joining the mayoral race in Calgary. Nelson previously worked as a reporter and anchor for CITV-DT in Edmonton, CHEK-DT in Victoria and CHAN-DT in Vancouver before joining Global National as a reporter. From 2005 to 2008, she served as the program's weekend anchor and primary weekday substitute anchor. References External links Global Television biography of Tara Nelson Canadian television news anchors Year of birth missing (living people) Living people Place of birth missing (living people) Canadian television reporters and correspondents Canadian women television journalists Global Television Network people 20th-century Canadian journalists 21st-century Canadian journalists 20th-century Canadian women
https://en.wikipedia.org/wiki/Sofia%20Metro
The Sofia Metro (, also colloquially called ) is the rapid transit network servicing the Bulgarian capital city Sofia. It is the only metro in Bulgaria. It began operation on 28 January 1998. , the Sofia Metro consists of four interconnected lines, serving 47 stations, with a total route length of and also being among the top 20 of the most extensive European metro systems, ranking 14th as of 2023. The Metro links the densely populated districts of Lyulin – Mladost (M1 line – Red) and Nadezhda – Lozenets (M2 line – Blue), and serves the Sofia Airport. History Planned since the 1960s, construction of the metro started in the 80s with the demolition of a significant number of buildings. At the beginning of the 90s, construction stopped due to a lack of funds and the complexity of the construction work. Being one of the oldest cities in Europe, Sofia contains many historical layers underneath its central areas. Evidence of antiquity can be clearly seen at the Serdika Station, which exhibits a wealth of unearthed Thracian and Roman ruins. During the construction of the enormous complex of the National Palace of Culture, two stations forming part of the M2 line and their connecting tunnels were built. The construction of the system began from the route that sees the highest volume of passenger traffic, reaching 38,000 at rush hour. Lines Due to an increased population, there are a large number of passengers heading toward the city center during weekday mornings, and away from the city centre in the weekday evenings. The necessity of efficient public transport in the direction of the largest passenger flows, transport, and Sofia's environmental problems precipitated the start of the construction of the Sofia Metro. Following the ratification of a technical and economic report on the metro by the Council of Ministers of Bulgaria, and the subsequently approved General City Plan, the general scheme for the development of the lines should consist of three diameters with extensions in the periphery, with a total length of , 63 metro stations, and a 1.1 million daily passenger capacity at the final stage of implementation. M1 line (Red) The first long section of M1 line consisting of five stations linking Slivnitsa Boulevard through Lyulin and K. Velichkov Boulevard was inaugurated on 28 January 1998. Opalchenska station entered into service on 17 September 1999 and Serdika station situated on St Nedelya Square followed on 31 October 2000, extending the total system length to . The operational section of the line was further extended with a long section, reaching Obelya housing estate in April 2003. The extension of M1 line continued in 2005 with the start of the construction of of tunnels and three stations linking St Nedelya Square and the Interped World Trade Center in Izgrev (station Frédéric Joliot-Curie). 2006 saw the start of the construction of another section of the same line (consisting of of tunnels and three stations) linking Izgrev a
https://en.wikipedia.org/wiki/Knuth%20reward%20check
Knuth reward checks are checks or check-like certificates awarded by computer scientist Donald Knuth for finding technical, typographical, or historical errors, or making substantial suggestions for his publications. The MIT Technology Review describes the checks as "among computerdom's most prized trophies". History Initially, Knuth sent real, negotiable checks to recipients. He stopped doing so in October 2008 because of problems with check fraud. As a replacement, he started his own "Bank of San Serriffe", in the fictional nation of San Serriffe, which keeps an account for everyone who found an error since 2006. Knuth now sends out "hexadecimal certificates" instead of negotiable checks. , Knuth reported having written more than 2,000 checks, with an average value exceeding $8 per check. , the total value of the checks signed by Knuth was over $20,000. Very few of these checks were actually cashed, even the largest ones. More often they have been framed and kept as "bragging rights". Amount In the preface of each of his books and on his website, Knuth offers a reward of $2.56 (USD) to the first person to find each error in his published books, whether it be technical, typographical, or historical. Knuth explains that $2.56, or 256 cents, corresponds to one hexadecimal dollar. "Valuable suggestions" are worth 32 cents, or the value of an error (0.2 hexadecimal dollars or 20 hexadecimal cents). In his earlier books a smaller reward was offered. For example, the 2nd edition of The Art of Computer Programming, Volume 1, offered $2.00. The reward for coding errors found in Knuth's TeX and Metafont programs (as distinguished from errors in Knuth's books) followed an audacious scheme inspired by the wheat and chessboard problem. It started at $2.56, and doubled every year until it reached $327.68. Recipients of this "sweepstakes" reward include Chris Thompson (Cambridge) and Bogusław L. Jackowski (Gdańsk), and also Peter Breitenlohner on 20 March 1995. Each check's memo field identifies the book and page number. 1.23 indicates an error on page 23 of Volume 1. (1.23) indicates a valuable suggestion on that page. The symbol Θ denotes the book Things a Computer Scientist Rarely Talks About, KLR denotes the book Mathematical Writing (by Knuth, Larrabee, and Roberts), GKP and CM denote the book Concrete Mathematics (by Graham, Knuth, and Patashnik), f1 denotes fascicle 1, CMT denotes the book Computer Modern Typefaces, DT denotes the book Digital Typography, SN denotes Surreal Numbers, CWEB denotes the book The CWEB System of Structured Documentation, DA denotes the book Selected Papers on Design of Algorithms, FG denotes the book Selected Papers on Fun and Games, and MM denotes the book MMIXware - A RISC Computer for the Third Millennium. Delays Knuth is often unable to answer immediately when a reader finds a mistake in one of his books or programs. In some cases, the delay has been several years. For example, on 1 July 1996, Knuth sent out more
https://en.wikipedia.org/wiki/Dependency%20injection
In software engineering, dependency injection is a programming technique in which an object or function receives other objects or functions that it requires, as opposed to creating them internally. Dependency injection aims to separate the concerns of constructing objects and using them, leading to loosely coupled programs. The pattern ensures that an object or function which wants to use a given service should not have to know how to construct those services. Instead, the receiving 'client' (object or function) is provided with its dependencies by external code (an 'injector'), which it is not aware of. Dependency injection makes implicit dependencies explicit and helps solve the following problems: How can a class be independent from the creation of the objects it depends on? How can an application, and the objects it uses support different configurations? How can the behavior of a piece of code be changed without editing it directly? Dependency injection is often used to keep code in-line with the dependency inversion principle. In statically-typed languages using dependency injection means a client only needs to declare the interfaces of the services it uses, rather than their concrete implementations, making it easier to change which services are used at runtime without recompiling. Application frameworks often combine dependency injection with Inversion of Control. Under inversion of control, the framework first constructs an object (such as a controller), then passes control flow to it. With dependency injection, the framework also instantiates the dependencies declared by the application object (often in the constructor method's parameters), and passes the dependencies into the object. Dependency injection implements the idea of "inverting control over the implementations of dependencies", which is why certain Java frameworks generically name the concept "inversion of control" (not to be confused with inversion of control flow). Roles Dependency injection involves four roles: services, clients, interfaces and injectors. Services and clients A service is any class which contains useful functionality. In turn, a client is any class which uses services. The services that a client requires are the client's dependencies. Any object can be a service or a client; the names relate only to the role the objects play in an injection. The same object may even be both a client (it uses injected services) and a service (it is injected into other objects). Upon injection, the service is made part of the client's state, available for use. Interfaces Clients should not know how their dependencies are implemented, only their names and API. A service which retrieves emails, for instance, may use the IMAP or POP3 protocols behind the scenes, but this detail is likely irrelevant to calling code that merely wants an email retrieved. By ignoring implementation details, clients do not need to change when their dependencies do. Injectors The injec
https://en.wikipedia.org/wiki/Baseline%20%28surveying%29
In surveying, a baseline is generally a line between two points on the earth's surface and the direction and distance between them. In a triangulation network, at least one baseline between two stations needs to be measured to calculate the size of the triangles by trigonometry. In the United States Public Land Survey System, a baseline is specifically the principal east-west line (i.e., a parallel) upon which all rectangular surveys in a defined area are based. The baseline meets its corresponding principal meridian (north-south line) at the point of origin, or initial point, for the land survey. For example, the baseline for Nebraska and Kansas is shared as the border for both states, at the 40th parallel north. More specifically a baseline may be the line that divides a survey township between north and south. "Baseline Road" in the United States Many communities in the United States have roads that run along survey baselines, many of which are named to reflect that fact. Some examples: In Little Rock, Arkansas, Baseline Road follows the baseline used by surveyors of the Louisiana Purchase. In Colorado, Baseline Road in Boulder marks the 40th parallel, or the western extension of the Kansas-Nebraska boundary, which is also the boundary between Adams and Weld counties. In Arizona, the baseline near the Phoenix metro area is marked by Baseline Road. In Southern California, from Highland to San Dimas, the baseline is marked by Baseline Road. In Michigan, the baseline for the Michigan Survey forms the boundary between the second and third tiers of counties and in many portions, discontinuous segments of road along the baseline are known as "Baseline Road." 8 Mile Road in the Detroit area runs along the Michigan Baseline and was formerly known as "Baseline Road." Baseline Road in Hillsboro, Oregon, generally follows the Willamette Baseline which intersects the Willamette Meridian at the Willamette Stone State Park. Canada In Canadian land surveying, a base line is one of the many principal east-west lines that correspond to four tiers of townships (two tiers north and two south). The base lines are about apart, with the first base line at the 49th parallel, the western Canada–US border. It is, therefore equivalent to the standard parallel in the US system. Ontario In Ontario, a baseline forms a straight line parallel a geographical feature (mostly a lake, especially Lake Ontario or Lake Erie) that serves as a reference line for surveying a grid of property lots. The result of this surveying is the concession road and sideline system in use today. Many prominent Ontario baselines lie on the surveyed boundaries of land treaties signed with First Nations peoples. For example, several baselines in Waterloo Region and Brant County (including Wilmot Line, Brant-Oxford Road, and Indian Line) follow the borders of the Haldimant Tract land grant to the Six Nations confederacy, leading to the patchwork road and lot network, surveyed pa
https://en.wikipedia.org/wiki/Air%20Andaman
Air Andaman was a Thai regional airline based in Bangkok, Thailand. It was a regional carrier operating a small network of domestic and international services, as well as charter flights. The airline ceased all operations in 2004. History The airline was established in 2000 and started operations on 29 October 2000. It was one of several new carriers formed to take advantage of the deregulation of the air transport industry in Thailand and the Thai government's "Open Skies" policy, which came into effect on 1 September 2000. Air Andaman's services included a domestic route between Bangkok and Phuket and flights to Singapore. In 2003-04 it had an extensive network with 13 regional destinations served from Bangkok and Chiang Mai. But by the end of 2004, the airline was defunct. In March 2006, Thailand's Civil Aviation Department said it was withdrawing the airline's license. The airline's major shareholders were Atichart Athakravi and Prathip Boonprasom, who in March 2006 was planning a comeback with German investor Hubert Joseph Trunser and Swiss investor Bernan Luthee in a joint venture called Asian Aerospace Service. The new airline aimed to run chartered flights from Bangkok with two Jetstream aircraft. Fleet Air Andaman had operated the following aircraft (at 2003-04): 3 Fokker 50 based in Bangkok 2 BAe Jetstream 31 based in Chiang Mai References Sritama, Suchat (March 7, 2006) "Phuket Air angles for new name, license , The Nation. External links Air Andaman Air Andaman fleet history at Thai-Aviation.net Defunct airlines of Thailand Airlines established in 2000 Airlines disestablished in 2004 2004 disestablishments in Thailand Companies based in Bangkok Thai companies established in 2000
https://en.wikipedia.org/wiki/Lucid%20%28programming%20language%29
Lucid is a dataflow programming language designed to experiment with non-von Neumann programming models. It was designed by Bill Wadge and Ed Ashcroft and described in the 1985 book Lucid, the Dataflow Programming Language. pLucid was the first interpreter for Lucid. Model Lucid uses a demand-driven model for data computation. Each statement can be understood as an equation defining a network of processors and communication lines between them through which data flows. Each variable is an infinite stream of values and every function is a filter or a transformer. Iteration is simulated by 'current' values and 'fby' (read as 'followed by') operator allowing composition of streams. Lucid is based on an algebra of histories, a history being an infinite sequence of data items. Operationally, a history can be thought of as a record of the changing values of a variable, history operations such as first and next can be understood in ways suggested by their names. Lucid was originally conceived as a disciplined, mathematically pure, single-assignment language, in which verification would be simplified. However, the dataflow interpretation has been an important influence on the direction in which Lucid has evolved. Details In Lucid (and other dataflow languages) an expression that contains a variable that has not yet been bound waits until the variable has been bound, before proceeding. An expression like x + y will wait until both x and y are bound before returning with the output of the expression. An important consequence of this is that explicit logic for updating related values is avoided, which results in substantial code reduction, compared to mainstream languages. Each variable in Lucid is a stream of values. An expression n = 1 fby n + 1 defines a stream using the operator 'fby' (a mnemonic for "followed by"). fby defines what comes after the previous expression. (In this instance the stream produces 1,2,3,...). The values in a stream can be addressed by these operators (assuming x is the variable being used): 'first x' - fetches the first value in the stream x, 'x' - the current value of the stream, 'next x' - fetches the next value in the stream. 'asa' - an operator that does some thing 'as soon as' the condition given becomes true. 'x upon p' - upon is an operator that repeats the old value of the stream x, and updates to the new values only when the stream p makes a true value available. (It serves to slow down the stream x) i.e.: x upon p is the stream x with new values appearing upon the truth of p. The computation is carried out by defining filters or transformation functions that act on these time-varying streams of data. Examples Factorial fac where n = 0 fby (n + 1); fac = 1 fby ( fac * (n + 1) ); end Fibonacci sequence fib where fib = 0 fby ( 1 fby fib + next fib ); end Total of a Sequence total where total = 0 fby total + x end; Running Average running_avg where
https://en.wikipedia.org/wiki/Perfect%20Strangers%20%28TV%20series%29
Perfect Strangers is an American sitcom that ran for eight seasons, from March 25, 1986, to August 6, 1993, on the ABC television network. Created by Dale McRaven, the series chronicles the rocky coexistence of midwestern American Larry Appleton (Mark Linn-Baker) and his distant cousin from eastern Mediterranean Europe, Balki Bartokomous (Bronson Pinchot). Originally airing on Tuesdays for the short six-episode first season in the spring of 1986, it moved to Wednesdays in prime time in the fall of 1986. It remained on Wednesdays until March 1988, when it was moved to Fridays. The show found its niche there as the anchor for ABC's original TGIF Friday-night lineup, though it aired on Saturdays for a short time in 1992. Premise The series chronicles the relationship of Larry Appleton (Mark Linn-Baker) and his distant cousin Balki Bartokomous (Bronson Pinchot). Larry, a Wisconsin native from a large family, has just moved into his first apartment in Chicago, and is savoring his first taste of privacy when Balki, a hitherto-unknown cousin from a Mediterranean island, "Mypos", arrives intending to move in with him. Balki, who was a shepherd on Mypos, interprets what little he knows about the United States by relying on his own (often out-of-context) recollections of American pop culture ("America: Land of my dreams and home of the Whopper"). Balki's signature is his "Dance of Joy", a cross between the dosado and the hokey pokey that he performs (with Larry) to celebrate good fortune. After initially gently rebuffing his cousin's request to stay at his apartment, aspiring photographer Larry decides to take Balki under his wing and teach him about American life; as time goes on, the disparities between the two create many misadventures and growth opportunities. Initially working at a discount store and living in a small apartment, they eventually develop rising careers working for a respectable newspaper, move into larger residences, date two best-friend flight attendants, and expand their lifestyle through their various experiences; all while learning to balance Balki's wide-eyed enthusiasm and Myposian ways with Larry's real-world ambitions and American pragmatism. Neurotic Larry is frequently as inept as Balki, if not more so, and often gets the pair into situations that only Balki can set right. Major influences on the show include "buddy sitcoms" such as Laverne & Shirley and Mork & Mindy, both of which were produced by the Perfect Strangers team. Synopsis Development The series was the brainchild of Dale McRaven (co-creator of Mork & Mindy) and producers Tom Miller and Robert Boyett. Miller claimed that the series' inspiration came in the wake of the 1984 Summer Olympics in Los Angeles, when America experienced a wave of renewed patriotic sentiment. Their idea for a comedy about an immigrant in America was initially rejected by all three major commercial television networks operating in the U.S. at the time (ABC, CBS, and NBC). In December
https://en.wikipedia.org/wiki/Conan%3A%20Hall%20of%20Volta
Conan: Hall of Volta (or simply Conan on the box cover and title screen) is a platform game from American developers Eric Robinson and Eric Parker and published by Datasoft in 1984. It is based on the character Conan created by Robert E. Howard. This game was originally written for the Apple II and ported to the Commodore 64 and Atari 8-bit family. Released in 1984, the game's launch coincided with the debut of the film Conan the Destroyer. The box shows a painting of Arnold Schwarzenegger as the muscle-bound warrior with his new costume for Destroyer. Despite this attempted tie-in, the game has little to do with the movie other than the Cimmerian in the title role, having originally been designed as boomerang-throwing game titled Visigoth. One of the screenshots on the back of the box is from a prototype version and shows a boomerang instead of a sword. Gameplay The player controls Conan as he attacks the evil Volta in his castle fortress. Conan is armed with 10 boomerang swords. From time to time, Conan may be aided by an "Avian Ally" as he attempts to defeat Volta's sinister hordes, which included bats, scorpions, giant ants, fire-breathing dragons and floating eyeballs. The game includes seven diverse levels requiring the player to navigate lava pits, geysers, spike pits, and floating platforms. Along the way the player often needs to collect magic gems or keys in order to progress. In the game, Conan does not jump, he somersaults. If he falls, he launches into a dive. One original feature of the game's time was a close-up picture that would be shown upon the player's last death. For example, dying in the first level might show a close-up picture of a bat with the caption "bats in your belfry". Deaths in other levels would yield a picture of a hazard unique to that level: Bats in your belfry Only a cleric can help you now Quest terminated (spike pit) There is no glory for you here To be continued A watery barrier You shuffle off defeated for now Reception Localizations In Bulgaria, where Conan the Barbarian was generally unknown, the Apple II version was translated into Bulgarian and distributed by ZMD Pazarjik under the name "Добрия рицар" (The Good Knight). References 1984 video games Apple II games Atari 8-bit family games Commodore 64 games Datasoft games FM-7 games NEC PC-8801 games Sharp X1 games Cancelled ZX Spectrum games U.S. Gold games Video games based on Conan the Barbarian Video games developed in the United States Single-player video games
https://en.wikipedia.org/wiki/XTF
XTF may refer to: eXtensible Tag Framework, a framework for implementing new XML elements for Mozilla eXtended Triton Format, a file format for recording hydrographic survey data Extensible Text Framework, an XML framework used to present finding aids for archival collections
https://en.wikipedia.org/wiki/Citadel%20%28video%20game%29
Citadel is a computer game developed by Michael Jakobsen for the BBC Micro, and released by Superior Software in 1985. It was also ported to the Acorn Electron. Centred around a castle, this platform game with some puzzle-solving elements requires players to find five hidden crystals and return them to their rightful place. It also features some outside areas external to the castle (including a wasteland, a pyramid, a sea and an island). Upon returning the crystals, the player must teleport to a separate set of locations to complete the game. Once the game is completed, the player is left free to roam the castle in order to achieve the maximum possible score if they have not done so already. The only way to see the final congratulatory message is to reach 99 points. Citadel was unusual at the time for playing synthesized speech before loading the main game (in part to advertise Superior Software's "Speech!" programme package), as well as having other special effects advanced for the time, such as splashing water sounds. Many BBC Micro gamers regard Citadel as a seminal game and it has spawned social media appreciation pages. Gameplay Citadel has a number of distinctive features. Unlike many other platform games, the player is not automatically killed if they come into contact with fireballs, snakes or other hazards; instead the player is allocated a set amount of energy, measured by a number, which is depleted through contact, which can be replenished by collecting objects shaped like bottles. If the player continuously loses too much energy in a room, the screen turns red and the player is transported back to where they entered the room. This prevents players from passing through a room simply by walking through enemies and taking the damage. The game also allows the player to choose the sex of their character and uses a different sprite accordingly - quite unusual in the days when in-game memory was at a premium (although the chosen gender of the sprite does not affect gameplay). The player sprite is not superimposed over objects that it walks "in front" of; rather, the colour of the pixels of the character sprite is overlaid, using an XOR bitwise operation, with the colour of the superimposed object, resulting in a completely different colour. For instance, the male player sprite normally has pink hair and yellow skin, but has yellow hair and pink skin when placed in front of the cyan stones of the Stonehenge screen. This effect is quite distinctive (it was also used in the two "sequels"). Most enemies cannot be destroyed, only avoided. The exceptions to this are the 'monks' which can be destroyed by jumping and firing a projectile-like 'spell' into their face. Each spell expends one unit of energy, which is restored if the player is successful in killing the monk. If a player returns to a room where they had previously destroyed a monk, the monk reappears and must be killed again, often employing a different technique if the room
https://en.wikipedia.org/wiki/Find%20%28Unix%29
In Unix-like and some other operating systems, find is a command-line utility that locates files based on some user-specified criteria and either prints the pathname of each matched object or, if another action is requested, performs that action on each matched object. It initiates a search from a desired starting location and then recursively traverses the nodes (directories) of a hierarchical structure (typically a tree). find can traverse and search through different file systems of partitions belonging to one or more storage devices mounted under the starting directory. The possible search criteria include a pattern to match against the filename or a time range to match against the modification time or access time of the file. By default, find returns a list of all files below the current working directory, although users can limit the search to any desired maximum number of levels under the starting directory. The related locate programs use a database of indexed files obtained through find (updated at regular intervals, typically by cron job) to provide a faster method of searching the entire file system for files by name. History find appeared in Version 5 Unix as part of the Programmer's Workbench project, and was written by Dick Haight alongside cpio, which were designed to be used together. The GNU find implementation was originally written by Eric Decker. It was later enhanced by David MacKenzie, Jay Plett, and Tim Wood. The command has also been ported to the IBM i operating system. Find syntax $ find [-H|-L] path... [operand_expression...] The two options control how the find command should treat symbolic links. The default behaviour is never to follow symbolic links. The flag will cause the find command to follow symbolic links. The flag will only follow symbolic links while processing the command line arguments. These flags are specified in the POSIX standard for find. A common extension is the flag, for explicitly disabling symlink following. At least one path must precede the expression. find is capable of interpreting wildcards internally and commands must be quoted carefully in order to control shell globbing. Expression elements are separated by the command-line argument boundary, usually represented as whitespace in shell syntax. They are evaluated from left to right. They can contain logical elements such as AND ( or ) and OR ( or ) as well as predicates (filters and actions). GNU find has a large number of additional features not specified by POSIX. Predicates Commonly-used primaries include: -name pattern: tests whether the file name matches the shell-glob pattern given. -type type: tests whether the file is a given type. Unix file types accepted include: b: block device (buffered); c: character device (unbuffered); d: directory; f: regular file; l: symbolic link; p: named pipe; s: socket; D: door. -print: always returns true; prints the name of the current file plus a newline to the stdout. -
https://en.wikipedia.org/wiki/Beijing%20Radio%20and%20Television%20Station
Beijing Radio and Television Station (BRTV), formerly Beijing Media Network (BMN), is a government-owned television network in China. It broadcasts from Beijing. The channel is available only in Chinese. Broadcasts in Beijing are on AM, FM, cable FM, digital radio, digital TV and online. Beijing Media Network was founded on 16 May 1979. It covers China, Asia and North America. China Central Television was called Beijing Television from 1958 to 1978. In October 2022, BRTV took a minority ownership stake in Kuaishou. History Radio Beijing Corporation (RBC; , literally Beijing People's Broadcasting Station), was a family of municipal radio stations that also include news, music, and sports in Beijing. On 1 June 2020, Radio Beijing Corporation, together with Beijing Television and Beiguang Media, merged into Beijing Media Network. List of Beijing Radio channels , all of these radio channels are also available via Internet. Former radio channels Beijing Jingji Radio - internet streaming only channel focus on financial, stopped on 1 January 2022 Beijing Qingmeng Radio - internet streaming only channel focus on Blue Network Broadcast, stopped on 1 January 2022 Beijing Tongsu Radio - FM 97.0 and internet streaming focus on Popular Music (Mandopop), stopped on 1 January 2022 Beijing Shenghuo Radio - internet streaming only channel focus on Beijing City Life Broadcast, stopped on 1 January 2022 Beijing Qingyinyue Radio - internet streaming only channel focus on Light Music Broadcast, stopped on 1 January 2022 Beijing DAB Radio - internet streaming only channel focus on DAB Broadcast, stopped on 1 January 2022 Beijing Story Radio - AM 603 kHz & FM 89.1 MHz focus on stories, stopped on 1 January 2023 Radio Beijing International - AM 774 kHz & FM 92.3 MHz for foreign broadcasting, stopped on 1 January 2023 Beijing Youth Radio - AM 927 kHz & FM 98.2 MHz for Youths, stopped on 1 January 2023 References External links Beijing Renmin Guangbo Diantai Television networks in China Television channels and stations established in 1979 Mass media in Beijing State media
https://en.wikipedia.org/wiki/BTV
BTV may refer to: Television channels, stations and networks Bangladesh Bangladesh Television, a state-owned TV broadcaster in Bangladesh and country's oldest television network Botswana Botswana Television, national broadcaster in Botswana Botswana TV 1, targeted for adults. Normally airs government issues like National Development Plans (NDPs), economics, etc. Botswana TV 3 focuses on tourism, cultural shows etc. Bulgaria bTV (Bulgaria), a major national television channel in Bulgaria bTV Lady, a Bulgarian television channel targeted at a female audience bTV Action, a Bulgarian action show television channel bTV Cinema, a Bulgarian television channel, showing movies and serials bTV Comedy, a Bulgarian television channel featuring comedy programs United States Bloomberg Television (BTV), a business news channel Binghamton Television, the student television station of Binghamton University, Vestal, New York Other television networks/channels/stations, by country BTV, the former callsign of VTV a TV station in Ballarat in Victoria, which is a state of Australia BTV, the former callsign of Betevé a local television channel in Barcelona. Beijing Television, a series of channels in China Bloomsbury Television, the student television channel of University College London, England BTV (Indonesia), a television network in Indonesia BTV (Lithuanian TV channel), a television station in Lithuania BTV, a television station in Mongolia BTV, known as Birgunj Television Channel, Nepal Bergens Tidende TV, a local television station in Norway Basketball TV, a Philippine all-basketball channel Benfica TV, the television channel of sports club S.L. Benfica in Portugal Other uses Basic Transportation Vehicle, or Basic Utility Vehicle (BUV), a low-cost vehicle intended for developing countries Bluetongue virus, that causes the Bluetongue disease BlogTV, a now defunct live broadcasting website Brake to Vacate, an aircraft landing device introduced by Airbus BTV Cup, Binh Duong Television Cup, an international friendly football cup held in Vietnam Burlington International Airport in Vermont, United States (IATA code)
https://en.wikipedia.org/wiki/Orthodox%20Union
The Orthodox Union (abbreviated OU) is one of the largest Orthodox Jewish organizations in the United States. Founded in 1898, the OU supports a network of synagogues, youth programs, Jewish and Religious Zionist advocacy programs, programs for the disabled, localized religious study programs, and international units with locations in Israel and formerly in Ukraine. The OU maintains a kosher certification service, whose circled-U hechsher symbol, , is found on the labels of many kosher commercial and consumer food products. Its synagogues and their rabbis typically identify themselves with Modern Orthodox Judaism. History Foundation The Union of Orthodox Jewish Congregations of America was founded as a lay synagogue federation in 1898 by Rabbi Henry Pereira Mendes. Its founding members were predominately modern, Western-educated Orthodox rabbis and lay leaders, of whom several were affiliated with the Jewish Theological Seminary (JTS), which originated as an Orthodox institution to combat the hegemony of the Reform movement. Cracks between the OU and JTS first formed in 1913, when Solomon Schechter decided all alumni of the institution will be allowed to apply for managerial positions in the newly created United Synagogue of America (then a non-denominational communal organization), though his close ally Rabbi Frederick de Sola Mendes advocated that only strictly pious ones should be so approved. Only at that time did Mendes begin to distinguish between "Conservative" and "Modern Orthodox" Judaism in his diary, though he could not articulate the difference. The OU, JTS and RIETS were closely connected, with an alumnus of the latter two serving in the former's communities, until the postwar era. Only around 1950 did Conservative and Modern Orthodox Judaism fully coalesce as opposing movements. Development During the early decades of its existence, the Orthodox Union was closely associated with and was a supporter of the development of Yeshiva University into a major Jewish educational institution producing English-speaking, university-trained American rabbis for the pulpits of OU synagogues. Some Orthodox rabbis viewed the nascent OU and the rabbis of its synagogues as too "modern" in outlook, and thus did not participate in it, instead setting up their own more stringent rabbinical organizations. Nevertheless, the idea for a national Orthodox congregational body took hold. The OU was soon acknowledged within the American Jewish establishment as the main, but not exclusive mouthpiece for the American Orthodox community. Representatives of 150 Orthodox congregations, with an estimated membership of 50,000, participated in the OU's 1919 national convention. The OU became more active in broader American Jewish policy issues after 1924, when Rabbi Herbert S. Goldstein, the innovative spiritual leader of the West Side Institutional Synagogue of Manhattan became the president of the OU. Under Goldstein, the OU and its Rabbinical Council, became a
https://en.wikipedia.org/wiki/43%20Things
43 Things was a social networking service established as an online goal setting community. It was built on the principles of tagging, rather than creating explicit interpersonal links (as seen in Friendster and Orkut). Users created accounts and then listed a number of goals or hopes; these goals were parsed by a lexer and connected to other people's goals that were constructed with similar words or ideas. This concept is also known as folksonomy. Users could set up to 43 goals, and were encouraged to explore the lists of other users and "cheer" them on towards achieving their goals. In 2005, 43 Things won the Webby Award for the best social networking service. The 43 Things website went offline on New Years Day, 2015. History 43 Things was launched on January 1, 2005, by the Robot Co-op, a small company based in Seattle founded by blogger and developer Buster Benson (né Erik Benson), Maktub keyboardist Daniel Spils, and former Amazon.com and Microsoft executive Josh Petersen. 43things.com became read-only on August 15, 2014, and shut down January 1, 2015. Critique According to "43 Things: A Community Study," 43 Things had two shortcomings: (1) it failed to have a central area containing documentation about the website and (2) it relied heavily upon RSS, which is unfamiliar to a large portion of users. Regardless, it received solid reviews in regards to responsiveness and user suggestion integration. Awards In 2005, 43 Things won the Webby Award for the best social networking service. References External links 43 Things Amazon (company) Defunct social networking services American social networking websites Companies based in Seattle Internet properties established in 2005 Defunct American websites
https://en.wikipedia.org/wiki/TI%20InterActive%21
TI InterActive! is a Texas Instruments computer program which combines the functionality of all of the TI graphing calculators with extra features into a text editor which allows you to save equations, graphs, tables, spreadsheets, and text onto a document. TI InterActive! also includes a web browser, but it is just an embedded version of Internet Explorer. It also works with TI Connect to share data with the TI Graphing Calculators. References Computer algebra systems
https://en.wikipedia.org/wiki/Human-centered%20computing
Human-centered computing (HCC) studies the design, development, and deployment of mixed-initiative human-computer systems. It is emerged from the convergence of multiple disciplines that are concerned both with understanding human beings and with the design of computational artifacts. Human-centered computing is closely related to human-computer interaction and information science. Human-centered computing is usually concerned with systems and practices of technology use while human-computer interaction is more focused on ergonomics and the usability of computing artifacts and information science is focused on practices surrounding the collection, manipulation, and use of information. Human-centered computing researchers and practitioners usually come from one or more of disciplines such as computer science, human factors, sociology, psychology, cognitive science, anthropology, communication studies, graphic design and industrial design. Some researchers focus on understanding humans, both as individuals and in social groups, by focusing on the ways that human beings adopt and organize their lives around computational technologies. Others focus on designing and developing new computational artifacts. Overview Scope HCC aims at bridging the existing gaps between the various disciplines involved with the design and implementation of computing systems that support human's activities. Meanwhile, it is a set of methodologies that apply to any field that uses computers in applications in which people directly interact with devices or systems that use computer technologies. HCC facilitates the design of effective computer systems that take into account personal, social, and cultural aspects and addresses issues such as information design, human information interaction, human-computer interaction, human-human interaction, and the relationships between computing technology and art, social, and cultural issues. HCC topics The National Science Foundation (NSF) defines the trends of HCC research as "a three dimensional space comprising human, computer, and environment." According to the NSF, the human dimension ranges from research that supports individual needs, through teams as goal-oriented groups, to society as an unstructured collection of connected people. The computer dimension ranges from fixed computing devices, through mobile devices, to computational systems of visual/audio devices that are embedded in the surrounding physical environment. The environment dimension ranges from discrete physical computational devices, through mixed reality systems, to immersive virtual environments. Some examples of topics in the field are listed below. List of topics in HCC field Problem-solving in distributed environments, ranging across Internet-based information systems, grids, sensor-based information networks, and mobile and wearable information appliances. Multimedia and multi-modal interfaces in which combinations of speech, text, graphics,
https://en.wikipedia.org/wiki/PBS%20Distribution
PBS Distribution (PBSd), formerly known as PBS Ventures, PBS Home Video, and Public Media Distribution, is the home distribution unit of American television network PBS. The company manages streaming channels, video on demand releases, and sells home videos of PBS series and movies and PBS Kids series in various formats, as well as programming from other public television distributors such as American Public Television and the National Educational Telecommunications Association. It is jointly owned by the Public Broadcasting Service and the WGBH Educational Foundation. PBSd manages the PBS Masterpiece channel on Amazon's Prime Video Channels. It is currently distributing PBS programs and movies on DVD, Blu-ray, digital downloads, and streaming media and PBS Kids programs on DVD and digital downloads. In 2017 independent films produced by PBSd were added for theatrical distribution and home video releases. History Established in 1977, the PBS Home Video, Inc. company originally distributed and sold VHS and Betamax tapes simply on their own. Starting in 1989, PBS secured a deal with Pacific Arts to distribute PBS Home Video's products. In 1994, PBS moved to distribution through Turner Home Entertainment. In 1996, when Turner Home Entertainment's parent company merged with Time Warner, distribution was through Warner Home Video until 2004, when distribution moved to Paramount Home Entertainment. PBS Home Video became independent again in 2011, and was renamed PBS Distribution—PBSd in 2009. It is jointly owned by PBS and the WGBH Educational Foundation. It is currently distributing PBS programs and movies on DVD, Blu-ray, digital downloads, and video on demand and PBS Kids programs on DVD and digital downloads. In 2017 independent films produced by PBSd were added for cinema and home video releases. PBS International offers factual content for broadcast, cable, and satellite services internationally. On November 1, 2011, PBS UK was launched on BSkyB. Canadian-born entrepreneur David Lyons and PBS Distribution formed a joint venture to run the channel. Independent films After a backlash from filmmakers over WNET's attempts to move independent documentary series to its secondary station, PBS took feedback from the documentary community and developed an indie film strategy. Through Independent Lens, PBS acquired Stanley Nelson’s documentary film The Black Panthers: Vanguard of the Revolution. The history of The Black Panthers was especially timely due to the contemporary Black Lives Matter movement's growth. The film was first released in theaters in late 2015, then had a special nationwide public television premiere in late 2016. PBSd expanded its operation to included theatrical distribution of documentary films by hiring Erin Owens as PBS Distribution's Head of Theatrical Distribution; and Emily Rothschild as Director of Theatrical Acquisitions and Marketing. Owens and Rothschild had just worked with PBS on Stanley Nelson's The Black Panth
https://en.wikipedia.org/wiki/Pocket%20computer
A pocket computer was a 1980s-era user programmable calculator-sized computer that had fewer screen lines, and often fewer characters per line, than the Pocket-sized computers introduced beginning in 1989. Manufacturers included Casio, Hewlett-Packard, Sharp, Tandy/Radio Shack (selling Casio and Sharp models under their own TRS line) and many more. The last Sharp pocket computer, the PC-G850V (2001) is programmable in C, BASIC, and Assembler. An important feature of pocket computers was that all programming languages were available for the device itself, not downloaded from a cross-compiler on a larger computer. The programming language was usually BASIC. See also Formula calculator Mobile device Programmable calculator Smartbook Tandy Pocket Computer References External links Pocket Computer Museum Soviet Calculators Collection (English) www.calculators.de – Museum of Pocket Calculating Devices List of pocket computers manufacturers http://www.angelfire.com/planet/geraldk/Gdkpc4.htm http://oldcomputers.net/
https://en.wikipedia.org/wiki/Polyphonic%20HMI
Polyphonic HMI is a music analysis company jointly founded in Barcelona, Spain by Mike McCready and an artificial intelligence firm called Grupo AIA. Its principal product is called "Hit Song Science" (HSS) which uses various statistical and signal processing techniques to help record companies predict whether a particular song will have commercial success. Polyphonic HMI and HSS have caused some controversy in the music industry because of fears (denied by Polyphonic HMI) that it removes the "magic" from music production. Several stars are suspected to have used the system to improve their chances of having a hit, including: Norah Jones Anastacia Maroon 5 The software correctly predicted the success of Norah Jones' debut album Come Away with Me months before it topped the charts, contradicting skeptical studio executives. In December 2005, amidst disagreements with Polyphonic's parent company, the senior management team, including co-founder Mike McCready and the advisory board made up of music industry veterans, left the company and formed Platinum Blue Music Intelligence, a competing company based in New York City. References External links Article in Le Monde about Polyphonic HMI Hit Song Science Is Not Yet a Science - a study that appeared in ISMIR 2008. Music companies of Spain Mass media companies of Spain Mass media in Barcelona
https://en.wikipedia.org/wiki/Castlevania%20Chronicles
Castlevania Chronicles is a video game compilation developed by Konami Computer Entertainment Tokyo for the PlayStation. It consists of two game modes: Original Mode, which is a port of the 1993 platform video game for the Sharp X68000 home computer, and Arrange Mode, a modernized remake featuring a new introductory cinematic, new sprites, and re-balanced gameplay among other adjustments. The Sharp X68000 version of Akumajō Dracula is, itself, an updated remake of the original Castlevania for the NES, where the vampire hunter Simon Belmont must defeat Dracula and save Transylvania. The compilation was later released for the American and Japanese PlayStation Network as a PSone Classic in December 2008. Gameplay Akumajō Dracula was designed to take advantage of the Sharp X68000 hardware with an updated, more complex game engine than the original Castlevania. This allowed for stages to be redesigned to accommodate intricate, dynamic obstacles, as well as the creation of new stages exclusive to this version of the game. One feature is the ability to diagonally attack enemies and obstacles from below. It also retains all special items and sub-weapons from the original, as well as introducing the new rare item known as the herb, which can refill player health in exchange for hearts. Hidden items worth points and 1-ups appear throughout the game should the player duck or stand in particular locations. Additionally, the game retains Castlevania's "looping" feature, where the game will keep track of how many stages a player has cleared on consecutive playthroughs before reaching a Game Over. However, unlike the original Castlevania's single higher difficulty setting activated at the start of a second playthrough, the Sharp X68000 Akumajō Dracula allows for six consecutive playthroughs of increasing difficulty before reaching its difficulty cap. Due to Sharp X68000 Akumajō Dracula's reputation for being extremely difficult, Castlevania Chronicles features an Arrange Mode that adjusts game balance for a more accessible experience. Completing "Arrange Mode" unlocks special features including an art gallery as well as a "Time Attack Mode". Exclusive to the U.S. and European versions of Chronicles, the art gallery features artwork by Ayami Kojima for Chronicles and Castlevania: Symphony of the Night, as well as an interview with Koji Igarashi (IGA). The "Time Attack Mode" allows the player to race through any stage, complete with a time meter, to beat their best time. Audio The music for the X68000 game contains a variety of new arrangements of familiar tunes from the series as well as brand new compositions altogether. Before each game, the player is given a choice between three different sound modules: the X68000's FM Synthesizer, MIDI Roland LA (MT-32, CM-32L, CM-64) and MIDI Roland GS (SC-55, SC-33, SC-155, CM-300, CM-500). There is also a hidden General MIDI sound module option that is missing in Castlevania Chronicles. While the soundtrack will rema
https://en.wikipedia.org/wiki/Opti
Opti may refer to OPTi Inc., a manufacturer of computer components Daihatsu Opti, a car OPTI Canada, an oil company Optimist (dinghy), a type of boat OptiRTC, a software company
https://en.wikipedia.org/wiki/Logic%20error
In computer programming, a logic error is a bug in a program that causes it to operate incorrectly, but not to terminate abnormally (or crash). A logic error produces unintended or undesired output or other behaviour, although it may not immediately be recognized as such. Logic errors occur in both compiled and interpreted languages. Unlike a program with a syntax error, a program with a logic error is a valid program in the language, though it does not behave as intended. Often the only clue to the existence of logic errors is the production of wrong solutions, though static analysis may sometimes spot them. Debugging logic errors One of the ways to find this type of error is to put out the program's variables to a file or on the screen in order to determine the error's location in code. Although this will not work in all cases, for example when calling the wrong subroutine, it is the easiest way to find the problem if the program uses the incorrect results of a bad mathematical calculation. Examples This example function in C to calculate the average of two numbers contains a logic error. It is missing parentheses in the calculation, so it compiles and runs but does not give the expected answer due to operator precedence (division is evaluated before addition). float average(float a, float b) { return a + b / 2; // should be (a + b) / 2 } See also Syntax error Off-by-one error Computer errors Programming language theory bg:Логическа грешка de:Logischer Fehler
https://en.wikipedia.org/wiki/Warzone%202100
Warzone 2100 is an open-source real-time strategy and real-time tactics hybrid computer game, originally developed by Pumpkin Studios and published by Eidos Interactive. It was originally released in 1999 for Microsoft Windows and PlayStation, and is now also available for macOS, FreeBSD, AmigaOS 4, AROS, MorphOS, Linux, NetBSD and OpenBSD. While was developed and released as a proprietary commercial video game, on December 6, 2004, the source code and most of its data was released under the GNU GPL-2.0-or-later; the rest of the data followed on June 10, 2008. Synopsis Setting In the late 21st century, the world's civilizations are wiped out by a series of nuclear strikes, seemingly caused by a massive malfunction of the new NASDA (North American Strategic Defense Agency) strategic defense system. While most of the survivors form scavenger bands to survive, the player is a member of a group named "The Project", that is more organised and seeks to rebuild civilization using pre-war technology. Plot The game begins with The Project sending three teams (Alpha, Beta, and Gamma) to gather technology that would help with reconstruction; the player assumes command of Team Alpha in Arizona. While gathering pre-war "artifacts", the Project fends off attacks from an organization called the New Paradigm, another major survivalist organisation, which is more advanced than the player's forces. Later however, it is discovered that a self-aware computer virus named 'Nexus' is actually controlling the New Paradigm. After the player defeats the New Paradigm, they are assigned to Team Beta, which is based in Chicago and under attack by a faction called 'The Collective'. Again, the player starts out less advanced than 'The Collective' and it is discovered that Nexus is controlling this faction too. At the end of the campaign, Nexus launches nuclear missiles at Alpha and Beta bases, prompting the player to abandon the facility and move to the Gamma base. Upon arriving at Gamma base, the player is immediately ambushed by the Gamma forces, which have already been taken over by Nexus. After the player survives the ambush and develops countermeasures to 'Nexus' infection, Nexus takes control of the remaining NASDA satellites and attempts to destroy the player. However, before he can succeed, the Project captures a NASDA missile site, and shoots down the orbiting laser weapons. It is learned that the scientist Dr. Reed, who was bankrupted by the US military, transformed himself into the Nexus virus and was responsible for the nuclear holocaust by infiltrating the 'NASDA' systems. At this point, the survivors of the Alpha and Beta bases arrive, and the three Project teams launch a full-scale assault on Nexus. The Project destroys Nexus and can begin rebuilding civilization. Gameplay The game is fully 3D, based on the iViS 3D graphics engine developed by Sam Kerbeck of Eidos Interactive. The game world is mapped by a grid; vehicles tilt to meet hilly terrain, a
https://en.wikipedia.org/wiki/Nero%20AG
Nero AG (known as Ahead Software AG until 2005) is a German computer software company that is especially well known for its CD/DVD/BD burning suite, Nero Burning ROM. The company's main product is Nero 2019, a piece of software that comprises burning, file conversion, media management, and video editing functions and was updated on an annual basis, though new releases have not occurred for several years. History Richard Lesser founded the company as Ahead Software GmbH in 1995. The company changed its name (and legal form) to Ahead Software AG in 2001, and again to Nero AG in 2005. The Nero Group includes foreign subsidiaries in Glendale, California, United States (Nero Inc., founded in 2001), in Yokohama, Japan (Nero K.K., founded in 2004), and Hangzhou, China (Nero Ltd., founded in 2007). The USA and Japan operations are sales offices, while the Chinese subsidiary operates exclusively to provide internal development services for the company. In May 2007, it was announced that the Luxembourg-based firm Agrippina International SàrL owned more than 25% of Nero AG shares. In 2009, the company established two additional subsidiaries in Germany: Nero Development and Services GmbH and Nero EMEA Sales GmbH. In 2014, the company moved the operations and headquarters of Nero AG, as well as of the two group companies Nero Development and Services GmbH and Nero EMEA Sales GmbH, to Karlsruhe. Products From its beginnings selling a single software application for burning, the company says it has become a "leader in digital media technologies" that now sells a wide range of products. Nero sells its products directly as well as via hardware manufacturers that bundle them on PCs, hard disks, camcorders and other devices. Other companies also use Nero multimedia codecs, SDKs and programming interfaces. In 2008, Nero expanded its product range for the first time beyond the well-known burning software. With Nero Move it, users were able to transfer photos, videos, and music from one device to another or to online communities like YouTube, Myspace, and the company's own multimedia community My Nero. With the Nero 9 multimedia suite, they could create, rip, burn, edit, save, and upload their music, video, and photo files. In June 2009, the company launched its Nero BackitUp & Burn product, which saved, burned, and restored data and helped protect users' digital content. The company extended the product with additional functions in the years following its launch and gave the user navigation around the various program elements a more unified look and feel. As a product, Nero evolved from a pure burning program (Nero Burning ROM) to a multimedia software package. The software includes programs: for burning and packet writing (Nero Burning ROM) for ripping and converting multimedia content (Nero Recode) for displaying, managing, and streaming photos and multimedia content (Nero MediaHome) and for creating, editing, and transcoding video content and for burn
https://en.wikipedia.org/wiki/Page%20zooming
In computing, page zooming is the ability to zoom in and out a document or image at page level. It is usually found in applications related to document layout and publishing, e.g. word processing and spreadsheet programs, but it can also be found in web browsers as it improves accessibility for people with visual impairment and people using mobile devices, such as PDAs and mobiles which have a relatively small screen. Different modes There are two notably different modes of page zooming: text resizing that resizes the text by increasing or decreasing the font size, with wrapping to avoid horizontal scrolling, leaving the size of the images the same. real page zooming mode that resizes also images, other multimedia objects, and viewports. When zooming in, a horizontal scroll bar will appear when the screen is not wide enough to hold the page content. Early web browsers had only the ability to resize the text on a page, but in the meantime all major browsers have the ability to resize the full content. The quality differs between the web browsers since they use different algorithms. Some web browsers now have Zoom Text Only, for text resizing. It should alter all sizes given in em, ex, rem and ch, whatever they may refer to. If the page is carefully written, that can make the main text more readable without sending so much of the less important material outside the window. This concept has also been extended to home entertainment devices. Most media players of recent generations such as DVD and Blu-ray include (via buttons on a remote) the ability to "zoom" in and out, and to change the focus of the zoom in any direction in two dimensions. References See also Resolution independence, in which elements on a computer screen are rendered at sizes independent from the pixel grid Zooming user interface User interface techniques
https://en.wikipedia.org/wiki/Airtel%20%28FBI%29
Airtel is an outdated data communication process used internally within the FBI in addition to Teletype and facsimile. It indicates a letter that must be typed and mailed on the same day. The FBI official abbreviation for airtel is A/T. Airtels are indexed automatically by a ZyIndex searchable database, which stores and retrieves full text documents. Airtels are marked by precedence: immediate, priority, or routine. They are also marked by classification: top secret, secret, confidential, unclassified EFTO (Encrypted For Transmission Only), and unclassified. The inefficiencies inherent in the FBI's use of airtels led to an investigation conducted by the Office of the Inspector General of the FBI that culminated in the 2002 report entitled "An Investigation of the Belated Production of Documents in the Oklahoma City Bombing Case." Notes References Federal Bureau of Investigation History of telecommunications in the United States
https://en.wikipedia.org/wiki/Pitr
PITR may refer to: Point-in-time recovery, a computing term referring to the recovery of data from a state in past Pitr, a character in the webcomic User Friendly Pitrs or Pitr, spirits of departed ancestors in Hindu culture
https://en.wikipedia.org/wiki/H.248
The Gateway Control Protocol (Megaco, H.248) is an implementation of the media gateway control protocol architecture for providing telecommunication services across a converged internetwork consisting of the traditional public switched telephone network (PSTN) and modern packet networks, such as the Internet. H.248 is the designation of the recommendations developed by the ITU Telecommunication Standardization Sector (ITU-T) and Megaco is a contraction of media gateway control protocol used by the earliest specifications by the Internet Engineering Task Force (IETF). The standard published in March 2013 by ITU-T is entitled H.248.1: Gateway control protocol: Version 3. Megaco/H.248 follows the guidelines published in RFC 2805 in April 2000, entitled Media Gateway Control Protocol Architecture and Requirements. The protocol performs the same functions as the Media Gateway Control Protocol (MGCP), is however a formal standard while MGCP has only informational status. Using different syntax and symbolic representation, the two protocols are not directly interoperable. They are both complementary to H.323 and the Session Initiation Protocol (SIP) protocols. H.248 was the result of collaboration of the MEGACO working group of the Internet Engineering Task Force (IETF) and the International Telecommunication Union Telecommunication Study Group 16. The IETF originally published the standard as RFC 3015, which was superseded by RFC 3525. The term Megaco is the IETF designation. Megaco combines concepts from MGCP and the Media Device Control Protocol (MDCP). MGCP originated from a combination of the Simple Gateway Control Protocol (SGCP) with the Internet Protocol Device Control (IPDC). After the ITU took responsibility of the protocol maintenance, the IETF reclassified its publications as historic in RFC 5125. The ITU has published three versions of H.248, the most recent in September 2005. H.248 encompasses not only the base protocol specification in H.248.1, but many extensions defined throughout the H.248 sub-series. Protocol overview H.248/Megaco due to its master-slave nature does not describe the establishment of calls across domains or across media gateway controllers. H.248/Megaco is used for communication downward, to the media gateways and does not constitute a complete system. The architecture requires other protocols for communication between multiple MGCs. The device that handles the call control function is referred to as an intelligent media gateway controller and the device that handles the media is referred to as a relatively unintelligent media gateway. H.248 defines the protocol for media gateway controllers to control media gateways for the support of multimedia streams across IP networks and the public switched telephone network (PSTN). It is typically used for providing Voice over Internet Protocol (VoIP) services like voice and fax between IP networks and the PSTN), or entirely within IP networks. Because of the types of de
https://en.wikipedia.org/wiki/Index%20locking
In databases an index is a data structure, part of the database, used by a database system to efficiently navigate access to user data. Index data are system data distinct from user data, and consist primarily of pointers. Changes in a database (by insert, delete, or modify operations), may require indexes to be updated to maintain accurate user data accesses. Index locking is a technique used to maintain index integrity. A portion of an index is locked during a database transaction when this portion is being accessed by the transaction as a result of attempt to access related user data. Additionally, special database system transactions (not user-invoked transactions) may be invoked to maintain and modify an index, as part of a system's self-maintenance activities. When a portion of an index is locked by a transaction, other transactions may be blocked from accessing this index portion (blocked from modifying, and even from reading it, depending on lock type and needed operation). Index Locking Protocol guarantees that phantom read phenomenon won't occur. Index locking protocol states: Every relation must have at least one index. A transaction can access tuples only after finding them through one or more indices on the relation A transaction Ti that performs a lookup must lock all the index leaf nodes that it accesses, in S-mode, even if the leaf node does not contain any tuple satisfying the index lookup (e.g. for a range query, no tuple in a leaf is in the range) A transaction Ti that inserts, updates or deletes a tuple ti in a relation must update all indices to and it must obtain exclusive locks on all index leaf nodes affected by the insert/update/delete The rules of the two-phase locking protocol must be observed. Specialized concurrency control techniques exist for accessing indexes. These techniques depend on the index type, and take advantage of its structure. They are typically much more effective than applying to indexes common concurrency control methods applied to user data. Notable and widely researched are specialized techniques for B-trees (B-Tree concurrency control) which are regularly used as database indexes. Index locks are used to coordinate threads accessing indexes concurrently, and typically shorter-lived than the common transaction locks on user data. In professional literature, they are often called latches. See also Database index Concurrency control Lock (database) B-Tree concurrency control References Databases Transaction processing Concurrency control
https://en.wikipedia.org/wiki/Link%2016
Link 16 is a military tactical data link network used by NATO and nations allowed by the MIDS International Program Office (IPO). Its specification is part of the family of Tactical Data Links. With Link 16, military aircraft as well as ships and ground forces may exchange their tactical picture in near-real time. Link 16 also supports the exchange of text messages, imagery data and provides two channels of digital voice (2.4 kbit/s or 16 kbit/s in any combination). Link 16 is defined as one of the digital services of the JTIDS / MIDS in NATO's Standardization Agreement STANAG 5516. MIL-STD-6016 is the related United States Department of Defense Link 16 MIL-STD. Technical characteristics Link 16 is a TDMA-based secure, jam-resistant, high-speed digital data link which operates in the radio frequency band 960–1,215 MHz, allocated in line with the International Telecommunication Union (ITU) Radio regulations to the aeronautical radionavigation service and to the radionavigation satellite service. This frequency range limits the exchange of information to users within line-of-sight of one another, although with satellite capabilities and ad hoc protocols, it is nowadays possible to pass Link 16 data over long-haul protocols such as TCP/IP using MIL-STD 3011 (JREAP) or STANAG 5602 (SIMPLE). It uses the transmission characteristics and protocols, conventions, and fixed-length or variable length message formats defined by MIL-STD 6016 and STANAG 5516 (formerly the JTIDS technical interface design plan). Information is typically passed at one of three data rates: 31.6, 57.6, or 115.2 kilobits per second (kbits/s), although the radios and frequency-hopping spread spectrum (FHSS) waveform itself can support throughput values well over 1 Mbit/s. Link 16 information is primarily coded in J-series messages which are binary data words with well-defined meanings. These data words are grouped in functional areas, and allocated to network participation groups (NPG) (virtual networks), most importantly: PPLI, or Precise Participant Location and Identification (network participation groups 5 and 6), Surveillance (network participation group 7), Command (Mission Management/Weapons Coordination) (network participation group 8), (Aircraft) Control (network participation group 9), Electronic Warfare & Coordination (network participation group 10). Development Link 16 is intended to advance Tactical Data Links (TDLs) as the NATO standard for data link information exchange. Link 16 equipment is located in ground, airborne, and sea-based air defense platforms and selected fighter aircraft. The U.S. industry is now developing a new Link 16 SCA compliant radio MIDS-JTRS which currently is projected to implement nine various tactical waveforms, including Link 16. The MIDS program, which manage the development of the communication component for Link 16, is managed by the International Program Office located in San Diego, California. In the United States, the l
https://en.wikipedia.org/wiki/Session%20border%20controller
A session border controller (SBC) is a network element deployed to protect SIP based voice over Internet Protocol (VoIP) networks. Early deployments of SBCs were focused on the borders between two service provider networks in a peering environment. This role has now expanded to include significant deployments between a service provider's access network and a backbone network to provide service to residential and/or enterprise customers. The term "session" refers to a communication between two or more parties – in the context of telephony, this would be a call. Each call consists of one or more call signaling message exchanges that control the call, and one or more call media streams which carry the call's audio, video, or other data along with information of call statistics and quality. Together, these streams make up a session. It is the job of a session border controller to exert influence over the data flows of sessions. The term "border" refers to a point of demarcation between one part of a network and another. As a simple example, at the edge of a corporate network, a firewall demarcates the local network (inside the corporation) from the rest of the Internet (outside the corporation). A more complex example is that of a large corporation where different departments have security needs for each location and perhaps for each kind of data. In this case, filtering routers or other network elements are used to control the flow of data streams. It is the job of a session border controller to assist policy administrators in managing the flow of session data across these borders. The term "controller" refers to the influence that session border controllers have on the data streams that comprise sessions, as they traverse borders between one part of a network and another. Additionally, session border controllers often provide measurement, access control, and data conversion facilities for the calls they control. Functions SBCs commonly maintain full session state and offer the following functions: Security – protect the network and other devices from: Malicious attacks such as a denial-of-service attack (DoS) or distributed DoS Toll fraud via rogue media streams Malformed packet protection Encryption of signaling (via TLS and IPSec) and media (SRTP) Connectivity – allow different parts of the network to communicate through the use of a variety of techniques such as: NAT traversal SIP normalization via SIP message and header manipulation IPv4 to IPv6 interworking VPN connectivity Protocol translations between SIP, SIP-I, H.323 Quality of service – the QoS policy of a network and prioritization of flows is usually implemented by the SBC. It can include such functions as: Traffic policing Resource allocation Rate limiting Call admission control ToS/DSCP bit setting Regulatory – many times the SBC is expected to provide support for regulatory requirements such as: emergency calls prioritization and lawful interception Media
https://en.wikipedia.org/wiki/Rm%20%28Unix%29
rm (short for remove) is a basic command on Unix and Unix-like operating systems used to remove objects such as computer files, directories and symbolic links from file systems and also special files such as device nodes, pipes and sockets, similar to the del command in MS-DOS, OS/2, and Microsoft Windows. The command is also available in the EFI shell. Overview The rm command removes references to objects from the filesystem using the unlink system call, where those objects might have had multiple references (for example, a file with two different names), and the objects themselves are discarded only when all references have been removed and no programs still have open handles to the objects. This allows for scenarios where a program can open a file, immediately remove it from the filesystem, and then use it for temporary space, knowing that the file's space will be reclaimed after the program exits, even if it exits by crashing. The command generally does not destroy file data, since its purpose is really merely to unlink references, and the filesystem space freed may still contain leftover data from the removed file. This can be a security concern in some cases, and hardened versions sometimes provide for wiping out the data as the last link is being cut, and programs such as shred and srm are available which specifically provide data wiping capability. rm is generally only seen on UNIX-derived operating systems, which typically do not provide for recovery of deleted files through a mechanism like the recycle bin, hence the tendency for users to enclose rm in some kind of wrapper to limit accidental file deletion. There are undelete utilities that will attempt to reconstruct the index and can bring the file back if the parts were not reused. History On some old versions of Unix, the rm command would delete directories if they were empty. This behaviour can still be obtained in some versions of rm with the -d flag, e.g., the BSDs (such as FreeBSD, NetBSD, OpenBSD and macOS) derived from 4.4BSD-Lite2. The version of rm bundled in GNU coreutils was written by Paul Rubin, David MacKenzie, Richard Stallman, and Jim Meyering. This version also provides -d option, to help with compatibility. The same functionality is provided by the standard rmdir command. The -i option in Version 7 replaced dsw, or "delete from switches", which debuted in Version 1. Doug McIlroy wrote that dsw "was a desperation tool designed to clean up files with unutterable names". The command is available as a separate package for Microsoft Windows as part of the UnxUtils collection of native Win32 ports of common GNU Unix-like utilities. KolibriOS includes an implementation of the command. The command has also been ported to the IBM i operating system. Syntax rm deletes the file specified after options are added. Users can use a full path or a relative file path to specify the files to delete. rm doesn't delete a directory by default.rm foo deletes the file "f
https://en.wikipedia.org/wiki/Sigil%20%28computer%20programming%29
In computer programming, a sigil () is a symbol affixed to a variable name, showing the variable's datatype or scope, usually a prefix, as in $foo, where $ is the sigil. Sigil, from the Latin sigillum, meaning a "little sign", means a sign or image supposedly having magical power. Sigils can be used to separate and demarcate namespaces that possess different properties or behaviors. Historical context The use of sigils was popularized by the BASIC programming language. The best known example of a sigil in BASIC is the dollar sign ("$") appended to the names of all strings. Consequently, programmers outside America tend to pronounce $ as "string" instead of "dollar". Many BASIC dialects use other sigils (like "%") to denote integers and floating-point numbers and their precision, and sometimes other types as well. Larry Wall adopted shell scripting's use of sigils for his Perl programming language. In Perl, the sigils do not specify fine-grained data types like strings and integers, but the more general categories of scalars (using a prefixed "$"), arrays (using "@"), hashes (using "%"), and subroutines (using "&"). Raku also uses secondary sigils, or twigils, to indicate the scope of variables. Prominent examples of twigils in Raku include "^" (caret), used with self-declared formal parameters ("placeholder variables"), and ".", used with object attribute accessors (i.e., instance variables). Sigil use in some languages In CLIPS, scalar variables are prefixed with a "?" sigil, while multifield (e.g., a 1-level list) variables are prefixed with "$?". In Common Lisp, special variables (with dynamic scope) are typically surrounded with * in what is called the "earmuff convention". While this is only convention, and not enforced, the language itself adopts the practice (e.g., *standard-output*). Similarly, some programmers surround constants with +. In CycL, variables are prefixed with a "?" sigil. Similarly, constant names are prefixed with "#$" (pronounced "hash-dollar"). In Elixir, sigils are provided via the "~" symbol, followed by a letter to denote the type of sigil, and then delimiters. For example, ~r(foo) is a regular expression of "foo". Other sigils include ~s for strings and ~D for dates. Programmers can also create their own sigils. In the esoteric INTERCAL, variables are a 16-bit integer identifier prefixed with either "." (called "spot") for 16-bit values, ":" (called "twospot") for 32-bit values, "," ("tail") for arrays of 16-bit values and ";" ("hybrid") for arrays of 32-bit values. The later CLC-Intercal added "@" ("whirlpool") for a variable that can contain no value (used for classes) and "_" used to store a modified compiler. In MAPPER (aka BIS), named variables are prefixed with "<" and suffixed with ">" because strings or character values do not require quotes. In mIRC script, identifiers have a "$" sigil, while all variables have a "%" prefixed (regardless of local or global variables or data type). Binary variable
https://en.wikipedia.org/wiki/HSLS
HSLS refer to: Hazy Sighted Link State Routing Protocol, a wireless network routing algorithm Slovak People's Party (Slovak: ) Croatian Social Liberal Party (Croatian: ) See also HSL (disambiguation)
https://en.wikipedia.org/wiki/Watching%20%28TV%20series%29
Watching is a British television sitcom, produced by Granada Television for the ITV network and broadcast for seven series and four Christmas specials between 1987 and 1993. The series was written by Jim Hitchmough and starred Paul Bown and Emma Wray as mismatched couple Malcolm Stoneway and Brenda Wilson. Plot Watching was set in Merseyside, with Brenda from Liverpool and Malcolm from Meols on the Wirral, the "posh" part of Merseyside on the other side of the River Mersey. The title refers to Brenda and her sister Pamela's hobby of "people watching", and to Malcolm's hobby of birdwatching, which initially Brenda endures rather than enjoys, but later comes to appreciate. Following the idea, the episode titles are verbs in the ‘-ing’ form. Quiet biker Malcolm, who lived with his domineering mother (played by Patsy Byrne), was accompanied on his birdwatching trips by loud scouser Brenda, who was forced to ride in the sidecar of his Norton motorbike and had a habit of rubbing his mother up the wrong way. Other key characters in the series were Brenda's sister Pamela (Liza Tarbuck), her boyfriend (later husband) David (John Bowler – Series 2 onwards) and Brenda and Pam's mother Joyce (played by Noreen Kershaw) in the last few series. The series followed Malcolm and Brenda's on/off relationship, during which Malcolm married another woman called Lucinda (played by Elizabeth Morton). However, Brenda and Malcolm finally married each other in the final episode, "Knotting", which was broadcast on 4 April 1993. The series ran for 54 30-minute episodes over 7 series, plus two 60-minute special extended episodes. Watching was later repeated on Granada Plus during the early 2000s and on BFBS' Forces TV from March 2022 until the channel ceased broadcasting four months later. It was also broadcast in Australia in the early 90s on the ABC and in New Zealand on TV One. Series overview Episodes Series 1 (1987) Christmas Special (1987) Series 2 (1988) Christmas Special (1988) Series 3 (1989) Series 4 (1989–90) Series 5 (1990–91) Christmas Special (1991) Series 6 (1992) New Year Special (1993) Series 7 (1993) Cast Emma Wray as Brenda Wilson Paul Bown as Malcolm Stoneway Liza Tarbuck as Pamela Wilson/Lynch Patsy Byrne as Mrs. Marjorie Stoneway Perry Fenwick as Terry Milton (series 1–3, 7) Philip Fox as Sidney Clough (series 1) John Bowler as David Lynch (series 2 onwards) Elizabeth Spriggs as Aunt Peggy (series 2, 4–5) Liz Crowther as Susan Roberts (series 2–3) Ann Rye as Mrs. Riley (series 3–5) Russell Boulter as Chris Cameron (series 4) Ken Jones as Uncle Bernard (series 5) Noreen Kershaw as Joyce Wilson (series 5 onwards) Andrew Hilton as Gerald Wilson (series 5 onwards) Elizabeth Morton as Lucinda Davis/Stoneway (series 5–7) Richard Good as Jonathan MacMillan (series 6) Ally Vuli as Roz (series 7) Jonathan Hackett as Julian (series 7) Al T. Kossy as Harold Dave Dutton as Oswald Parkins (series 1–5) Bill Moores as "Cedric", regular at the Grapes
https://en.wikipedia.org/wiki/Macintosh%20clone
A Macintosh clone is a computer running the Mac OS operating system that was not produced by Apple Inc. The earliest Mac clones were based on emulators and reverse-engineered Macintosh ROMs. During Apple's short lived Mac OS 7 licensing program, authorized Mac clone makers were able to either purchase 100% compatible motherboards or build their own hardware using licensed Mac reference designs. Since Apple's switch to the Intel platform, many non-Apple Wintel/PC computers are technologically so similar to Mac computers that they are able to boot the Mac operating system using a varying combination of community-developed patches and hacks. Such a Wintel/PC computer running macOS is more commonly referred to as a Hackintosh. Background The Apple II and IBM PC computer lines were "cloned" by other manufacturers who had reverse-engineered the minimal amount of firmware in the computers' ROM chips and subsequently legally produced computers that could run the same software. These clones were seen by Apple as a threat, as Apple II sales had presumably suffered from the competition provided by Franklin Computer Corporation and other clone manufacturers, both legal and illegal. At IBM, the threat proved to be real: most of the market eventually went to clone-makers, including Compaq, Leading Edge, Tandy, Kaypro, Packard Bell, Amstrad in Europe, and dozens of smaller companies, and in short order IBM found it had lost control over its own platform. Apple eventually licensed the Apple II ROMs to other companies, primarily to educational toy manufacturer Tiger Electronics in order to produce an inexpensive laptop with educational games and the AppleWorks software suite: the Tiger Learning Computer (TLC). The TLC lacked a built-in display. Its lid acted as a holster for the cartridges that stored the bundled software, as it had no floppy drive. Emulators Long before true clones were available, the Atari ST could emulate a Mac by adding the third-party Magic Sac emulator, released in 1985, and, later, the Spectre, Spectre GCR, and Aladin emulators. The first three of those emulators required that the user purchase a set of Mac ROMs sold as system upgrades to Macintosh users. Later, multiple emulators were released for the Amiga. Starting with the sales of PowerPC Macs, a CPU emulator to run 68000 applications was built into the Mac OS. By the time 68060 processors were available, PowerPC Macs became so powerful that they ran 68000 applications faster than any 68000-based computer, including any Amiga, Atari ST or Sharp X68000. This means even a 68060-upgraded Atari ST clone or Amiga, which avoid CPU emulation, were always slower, on top of causing some programs not to work thanks to imperfect virtualization of the Mac system and remaining machine components. Connectix also released another 68k emulator for Macs, replacing the original, called Speed Doubler, supposedly reported to be even faster than Apple's. As the years went by, the emulator wasn't
https://en.wikipedia.org/wiki/Object%20identity
Object identity may refer to: Identity (object-oriented programming) Equality (objects)
https://en.wikipedia.org/wiki/Language-oriented%20programming
Language-oriented programming (LOP) is a software-development paradigm where "language" is a software building block with the same status as objects, modules and components, and rather than solving problems in general-purpose programming languages, the programmer creates one or more domain-specific languages (DSLs) for the problem first, and solves the problem in those languages. Language-oriented programming was first described in detail in Martin Ward's 1994 paper Language Oriented Programming, published in Software - Concepts and Tools, Vol.15, No.4, pp 147–161, 1994. Concept The concept of language-oriented programming takes the approach to capture requirements in the user's terms, and then to try to create an implementation language as isomorphic as possible to the user's descriptions, so that the mapping between requirements and implementation is as direct as possible. A measure of the closeness of this isomorphism is the "redundancy" of the language, defined as the number of editing operations needed to implement a stand-alone change in requirements. It is not assumed a-priori what is the best language for implementing the new language. Rather, the developer can choose among options created by analysis of the information flows — what information is acquired, what its structure is, when it is acquired, from whom, and what is done with it. Development The Racket programming language and RascalMPL were designed to support language-oriented programming from the ground up. Other language workbench tools such as JetBrains MPS, Kermeta, or Xtext provide the tools to design and implement DSLs and language-oriented programming. See also Grammar-oriented programming Dialecting Domain-specific language Extensible programming Intentional programming Homoiconicity References External links Language Oriented Programming: The Next Programming Paradigm Sergey Dmitriev's paper that further explored the topic. The State of the Art in Language Workbenches. Conclusions from the Language Workbench Challenge. In: Proceedings of the 6th International Conference on Software Language Engineering (SLE'13). 2013. Language Oriented Programming in MetaLisp Gyuri Lajos's thesis 1992 University of Leeds The system used the very same Top Down Parsing Language algorithm that powered Tree-Meta Programming paradigms
https://en.wikipedia.org/wiki/Mob%20%28video%20games%29
A mob, short for mobile or mobile object, is a computer-controlled non-player character (NPC) in a video game such as an MMORPG or MUD. Depending on context, every and any such character in a game may be considered to be a "mob", or usage of the term may be limited to hostile NPCs and/or NPCs vulnerable to attack. In most modern graphical games, "mob" may be used to specifically refer to generic monstrous NPCs that the player is expected to hunt and kill, excluding NPCs that engage in dialog, sell items, or NPCs which cannot be attacked. "Named mobs" are distinguished by having a proper name rather than being referred to by a general type ("a goblin", "a citizen", etc.). Most mobs are those capable of no complex behaviors beyond generic programming of attacking or moving around. Purpose of mobs Defeating mobs may be required to gather experience points, money, items, or to complete quests. Combat between player characters (PCs) and mobs is called player versus environment (PvE). PCs may also attack mobs because they aggressively attack PCs. Monster versus monster (MvM) battles also take place in some games. A game world might contain hundreds of different kinds of mobs, but if players spend a certain amount of time playing, they might become well aware of the characteristics presented by each kind and its related hazard. This knowledge might dull the game to some extent. Etymology The term "mobile object" was used by Richard Bartle for objects that were self-mobile in MUD1. Later source code in DikuMUD used the term "mobile" to refer to a generic NPC, shortened further to "mob" in identifiers. DikuMUD was a heavy influence on EverQuest, and the term as it exists in MMORPGs is derived from the MUD usage.. The term is properly an abbreviation rather than an acronym. References Massively multiplayer online role-playing games MUD terminology Video game terminology
https://en.wikipedia.org/wiki/Fire-control%20system
A fire-control system (FCS) is a number of components working together, usually a gun data computer, a director and radar, which is designed to assist a ranged weapon system to target, track, and hit a target. It performs the same task as a human gunner firing a weapon, but attempts to do so faster and more accurately. Naval based fire control Origins The original fire-control systems were developed for ships. The early history of naval fire control was dominated by the engagement of targets within visual range (also referred to as direct fire). In fact, most naval engagements before 1800 were conducted at ranges of . Even during the American Civil War, the famous engagement between and was often conducted at less than range. Rapid technical improvements in the late 19th century greatly increased the range at which gunfire was possible. Rifled guns of much larger size firing explosive shells of lighter relative weight (compared to all-metal balls) so greatly increased the range of the guns that the main problem became aiming them while the ship was moving on the waves. This problem was solved with the introduction of the gyroscope, which corrected this motion and provided sub-degree accuracies. Guns were now free to grow to any size, and quickly surpassed calibre by the 1890s. These guns were capable of such great range that the primary limitation was seeing the target, leading to the use of high masts on ships. Another technical improvement was the introduction of the steam turbine which greatly increased the performance of the ships. Earlier screw-powered capital ships were capable of perhaps 16 knots, but the first large turbine ships were capable of over 20 knots. Combined with the long range of the guns, this meant that the target ship could move a considerable distance, several ship lengths, between the time the shells were fired and landed. One could no longer eyeball the aim with any hope of accuracy. Moreover, in naval engagements it is also necessary to control the firing of several guns at once. Naval gun fire control potentially involves three levels of complexity. Local control originated with primitive gun installations aimed by the individual gun crews. Director control aims all guns on the ship at a single target. Coordinated gunfire from a formation of ships at a single target was a focus of battleship fleet operations. Corrections are made for surface wind velocity, firing ship roll and pitch, powder magazine temperature, drift of rifled projectiles, individual gun bore diameter adjusted for shot-to-shot enlargement, and rate of change of range with additional modifications to the firing solution based upon the observation of preceding shots. The resulting directions, known as a firing solution, would then be fed back out to the turrets for laying. If the rounds missed, an observer could work out how far they missed by and in which direction, and this information could be fed back into the computer along with any chan
https://en.wikipedia.org/wiki/International%20Nucleotide%20Sequence%20Database%20Collaboration
The International Nucleotide Sequence Database Collaboration (INSDC) consists of a joint effort to collect and disseminate databases containing DNA and RNA sequences. It involves the following computerized databases: NIG's DNA Data Bank of Japan (Japan), NCBI's GenBank (USA) and the EMBL-EBI's European Nucleotide Archive (UK). New and updated data on nucleotide sequences contributed by research teams to each of the three databases are synchronized on a daily basis through continuous interaction between the staff at each the collaborating organizations. All of the data in INSDC is available for free and unrestricted access, for any purpose, with no restrictions on analysis, redistribution, or re-publication of the data. This policy has been a foundational principle of the INSDC since its inception. The official policy statement can be found at http://www.insdc.org/. Since the 1990s, most of the world's major scientific journals have required that sequence data be deposited in an INSDC database as a pre-condition for publication. The DDBJ/EMBL/GenBank synchronization is maintained according to a number of guidelines which are produced and published by an International Advisory Board. The guidelines consist of a common definition of the feature tables for the databases, which regulate the content and syntax of the database entries, in the form of a common DTD (Document Type Definition). The syntax is called INSDSeq and its core consists of the letter sequence of the gene expression (amino acid sequence) and the letter sequence for nucleotide bases in the gene or decoded segment. In a DBFetch operation shows a typical INSD entry at the EBI database; the same entry at NCBI. See also Bioinformatics Biological database List of biological databases National Center for Biotechnology Information Sequence database References External links Official site External links EMBL INSDC site EMBL Nucleotide Database DNA Data Bank of Japan GenBank Nucleotide Search Bioinformatics organizations Biology organisations based in the United Kingdom Databases in the United Kingdom Genetics in the United Kingdom Molecular biology Nucleic acids South Cambridgeshire District
https://en.wikipedia.org/wiki/TV%20Chile
TV Chile is a Chilean pay television network that airs from Santiago, Chile. It is the international feed of the National Television of Chile. History The first national satellite broadcasts of TVN began in 1986, reaching also some parts of Latin America. TV Chile, as an independent signal from TVN, began officially in 1989. Things would change radically for the network during the 2000s, when it made a contract with DirecTV, which allowed TV Chile to reach over 140 countries worldwide, which roughly constitutes 66 percent of the world's countries. The channel's current programming consists basically of variety and music shows, as well as programs dedicated to tourism, comedy and news. In the year 2000, TV Chile was able to reach Australia for the first time after signing a television contract with TARBS. The service has been intermittently operating, as once TARBS shut down operations in 2004, UBI World TV began carrying it. The channel is currently being distributed in the region via Luso Vision. References External links Official site Televisión Nacional de Chile Television stations in Chile International broadcasters Spanish-language television stations Television channels and stations established in 1989 Companies based in Santiago 1989 establishments in Chile
https://en.wikipedia.org/wiki/British%20Red%20Cross
The British Red Cross Society is the United Kingdom body of the worldwide neutral and impartial humanitarian network the International Red Cross and Red Crescent Movement. The society was formed in 1870, and is a registered charity with more than 17,200 volunteers and 3,400 staff. At the heart of their work is providing help to people in crisis, both in the UK and overseas. The Red Cross is committed to helping people without discrimination, regardless of their ethnic origin, nationality, political beliefs or religion. Queen Elizabeth II was the patron of the society until her death on 8 September 2022. In the year ending December 2022, the charity's income was £439 million, which included £37M from government contracts and £44M from government grants. It spent £367M (82%) of its income delivering its charitable activities. Guiding ethos The mission of the British Red Cross is to mobilise the power of humanity so that individuals and communities can prepare for, deal with and recover from a crisis, summed up by the strapline 'refusing to ignore people in crisis'. In fulfilling this mission, all volunteers and staff must abide by the seven fundamental principles of the International Red Cross and Red Crescent Movement, which are: The British Red Cross also has four values, which guide the way they work. These are: History Formation The British Red Cross was formed in 1870, just seven years after the formation of the international movement in Switzerland. This followed the outbreak of the Franco-Prussian War (1870–1871), and a move across Europe to form similar societies. The society was founded as the British National Society for Aid to the Sick and Wounded in War at a public meeting chaired by Robert Loyd-Lindsay in London on 4 August 1870. It assisted in providing aid to both warring armies in the Franco-Prussian War and subsequent 19th-century conflicts, under the protection of the Red Cross Emblem. The society was one of several British volunteer medical organisations to serve in the war. In 1905, 35 years after its formation, the society was reconstituted as the British Red Cross Society, and was granted its first royal charter in 1908 by King Edward VII. His consort, Queen Alexandra, became its president. First World War Following the start of the Great War in 1914, the British Red Cross joined forces with the Order of St John Ambulance to form the Joint War committee and Joint War Organisation. They pooled resources and formed Voluntary Aid Detachments (or VADs) with members trained in First Aid, Nursing, Cookery, Hygiene and Sanitation. These detachments all worked under the protection of the Red Cross, working in hospitals, rest stations, work parties and supply centres. The Joint War Organisation also aided assistance at the front line, supplying the first motorised ambulances to the battlefields, which were significantly more efficient than the horse-drawn ambulances they replaced. It was active in setting up centres for rec
https://en.wikipedia.org/wiki/3Dc
3Dc (FourCC : ATI2), also known as DXN, BC5, or Block Compression 5 is a lossy data compression algorithm for normal maps invented and first implemented by ATI. It builds upon the earlier DXT5 algorithm and is an open standard. 3Dc is now implemented by both ATI and Nvidia. Target application The target application, normal mapping, is an extension of bump mapping that simulates lighting on geometric surfaces by reading surface normals from a rectilinear grid analogous to a texture map - giving simple models the impression of increased complexity. This additional channel however increases the load on the graphics system's memory bandwidth. Pre-existing lossy compression algorithms implemented on consumer 3D hardware lacked the precision necessary for reproducing normal maps without excessive visible artefacts, justifying the development of 3Dc. Algorithm Surface normals are three-dimensional vectors of unit length. Because of the length constraint only two elements of any normal need to be stored. The input is therefore an array of two-dimensional values. Compression is performed in 4×4 blocks. In each block the two components of each value are compressed separately. For each block, each of the two components have a palette of 8 values to choose from. The palettes are generated from two values representing the start and end of a line and the other six values being generated as linear combinations of the start and end values. Compression is natively achieved by finding the lowest and highest values of the 16 pixels to be compressed and storing each of those as an 8-bit quantity. Individual elements within the 4×4 block are then stored with 3-bits each, representing their position on an 8 step linear scale from the lowest value to the highest. Each pixel's 3-bit value (the palette index) would be chosen by choosing the palette entry with the minimum distance from the original values. Total storage is 128 bits per 4x4 block once both source components are factored in. In an uncompressed scheme with similar 8-bit precision, the source data is 32 8-bit values for the same area, occupying 256 bits. The algorithm therefore produces a 2:1 compression ratio. The compression ratio is sometimes stated as being "up to 4:1" as it is common to use 16-bit precision for input data rather than 8-bit. This produces compressed output that is literally 1/4 the size of the input but it is not of comparable precision. 3Dc+ 3Dc+ (FourCC: ATI1) (also known as BC4 or Block Compression 4) can compress textures, i.e. light maps, shadow maps, HDR textures and material properties. 3Dc+ provides 2:1 compression ratio with single component (DXT5 alpha) 8-bit integer textures and 4:1 compression ratio with normal maps and textures consisting of two 8-bit integer components References Microsoft Developer Network article on Block Compression in Direct3D 10 What is a Normal Map? CREATING AND USING NORMAL MAPS Creating Normal Maps 3Dc - higher quality textures
https://en.wikipedia.org/wiki/Gary%20Scavone
Gary Paul Scavone is a computer music researcher and musician. Scavone is currently an associate professor of music technology at McGill University. Previously, Scavone directed the Center for Computer Research in Music and Acoustics at Stanford University. He, along with Perry Cook, authored the Synthesis Toolkit (STK). After conducting extensive research into the digital modeling of woodwind instruments (the subject of his doctoral dissertation), Scavone turned to the electronic synthesis of such instruments. Scavone plays saxophone. He studied classical saxophone at the Conservatoire National de Région de Bordeaux, France, with Jean-Marie Londeix in 1989, sponsored by a Fulbright scholarship. In the summers of 1987, 1988 and 1990 he played as a street musician in almost every major European capital together with Dan Gordon. References External links Gary P. Scavone's Home Page Canadian musicologists Year of birth missing (living people) Living people Stanford University Department of Music faculty Canadian music academics Academic staff of McGill University
https://en.wikipedia.org/wiki/ATI%20TruForm
ATI TruForm was a brand by ATI (now AMD) for a SIP block capable of doing a graphics procedure called tessellation in computer hardware. ATI TruForm was included into Radeon 8500 (available from August 2001 on) and newer products. The successor of the SIP block branded "ATI TruForm" was included into Radeon HD 2000 series (available from June 2007 on) and newer products: hardware tessellation with TeraScale. Support for hardware tessellation only became mandatory in Direct3D 11 and OpenGL 4. Tessellation as defined in those APIs is only supported by newer TeraScale 2 (VLIW5) products introduced in September 2009 and GCN-based products (available from January 2012 on). The GCN SIP block carrying out the tessellation is the "Geometric processor". Overview Before the adoption of pixel shader-enhanced bump mapping methods such as normal and parallax mapping that simulate higher mesh detail, curved 3D shapes in games were created with large numbers of triangles. The more triangles are used, the more detailed and thus less polygonal the surface appears. TruForm creates a curved surface using the existing triangles, and tessellates this surface to make a new, more detailed polygonal model. It is designed to increase visual quality, without significantly impacting frame rates, by utilizing hardware processing of geometry. TruForm was not significantly accepted by game developers because it ideally required the models to be designed with TruForm in mind. To enable the feature without causing visual problems, such as ballooned-up weapons, the models had to have flags identifying which areas were to be tessellated. The lack of industry-wide support of the technique from the competition caused developers to ignore the technology. In later version of Catalyst drivers, the TruForm feature is removed. Beginning with Radeon X1000 series, TruForm was no longer advertised as a hardware feature. However, Radeon 9500 and higher (as well as hardware supporting Shader Model 3.0) include Render to Vertex Buffer feature, which can be used for tessellation applications. In the case of Radeon X1000 series, it supports binding up to 5 R2VB buffers simultaneously. Tessellation as dedicated hardware has returned in Xenos and Radeon R600 GPUs. Games with TruForm support Counter-Strike (ati_subdiv "2.0", ati_npatch "1.0") Tom Clancy's Rainbow Six Soldier of Fortune Soldier of Fortune II: Double Helix Quake (TruQuake Patch) Quake 2 (TruQuake2 Patch) Hexen II (TruHexen2 Patch, edit of the TruQuake2 Patch) (developed by RaVeN ) Unreal Tournament (TruUT Patch) The Elder Scrolls III: Morrowind (unofficially, with the FPS Optimizer) Madden NFL 2004 Bugdom Return to Castle Wolfenstein Serious Sam Unreal Tournament 2003 and 2004 (must edit the game's ".ini" file and set "UseNPatches=True") Wolfenstein: Enemy Territory Command & Conquer: Renegade Neverwinter Nights (must edit the game's ".ini" file and set "Enable Truform=1") FTEQW (QuakeWorld, Net Quake, Quake II, Quake, Qua
https://en.wikipedia.org/wiki/Dan%20Gookin
Dan Gookin is a computer book author who wrote the first ...For Dummies books including DOS for Dummies and PCs for Dummies, establishing the design and voice of the long-running series that followed, incorporating humor and jokes into a format for beginners on any subject. He also is a member of the Coeur d'Alene City Council. Gookin has written over 150 computer books. His website provides computer help sections and a blog which is updated several times a week. He was editor of ComputorEdge Magazine, a local San Diego computer periodical, from 1987 to 1989. Gookin lives in Coeur d'Alene, Idaho, where he has been active in community theater and became the artistic director of Lake City Playhouse in 1997. He was elected to a seat in the Coeur d'Alene City Council in November 2011. He was a nominee for the Idaho Senate and the 2007 Libertarian nominee for the Coeur d'Alene city council He is a graduate of the University of California, San Diego with a Bachelor of Arts in communications/visual arts. He appeared as himself on the series To Tell the Truth as the panel tried to figure out if he or someone else wrote the first ...For Dummies book. Bibliography C Programming For Dummies (For Dummies, 2020) Android For Dummies (For Dummies, 2020) Dan Gookin's Guide to Curl Programming (Kindle, 2019) Running For Local Office For Dummies (For Dummies, 2019) Android Tablets For Dummies (For Dummies, 2014) Android Phones For Dummies (For Dummies, 2014) Samsung Galaxy Tabs For Dummies (For Dummies, 2013) Beginning Programming with C For Dummies (For Dummies, 2013) Word 2013 For Dummies (For Dummies, 2013) PCs For Dummies (For Dummies, 2013) Laptops For Dummies (For Dummies, 2012) More DOS For Dummies (For Dummies, 1994) DOS For Dummies (For Dummies, 1991) References External links Dan Gookin's Homepage Living people American humorists American libertarians American technology writers Year of birth missing (living people)
https://en.wikipedia.org/wiki/Korg%20OASYS
The Korg OASYS is a workstation synthesizer released in early 2005, 1 year after the successful Korg Triton Extreme. Unlike the Triton series, the OASYS uses a custom Linux operating system that was designed to be arbitrarily expandable via software updates, with its functionality limited only by the PC-like hardware. OASYS was a software implementation of the research project that ultimately resulted in the OASYS PCI, a DSP card which offered multiple synthesis engines. The original OASYS keyboard concept had to be scrapped because of excessive production costs and limitations of then-current technology. Production of the OASYS was officially discontinued in April 2009. Korg sold just over 3000 units worldwide. The final software update was released on November 24, 2009. In 2011, Korg Kronos, a successor of Korg OASYS, was introduced at that year's NAMM Show. Features The standard Oasys comes with hardware similar to many personal computers: 2.8 GHz Pentium 4 CPU 40GB hard disk drive 1GB DDR RAM, user-expandable to 2GB 10.4" LCD touch screen It features Korg's OASYS (acronym for Open Architecture SYnthesis Studio) technology, which allows multiple synthesis engines to be used simultaneously. The OASYS also includes second-generation KARMA technology (with the first generation having first appeared in the Korg KARMA). It has either a 76 key synth-action, or 88 key hammer-action keyboard. Options EXB-DI (Digital interface board) The optional EXB-DI adds 8 channels of ADAT Optical format 24-bit 48 kHz digital output, as well as a word clock input. The EXB-DI was first made available for the Korg Triton Studio keyboard and Triton Rack module - on these units only 6 outputs are available via ADAT. Bar a few early models of the Oasys, the EXB-DI is user installable. Synthesis engines As of November 24, 2009 the latest version of the OASYS OS is 1.3.3a, featuring the following synthesis engines: HD-1: A PCM synthesizer, with 628 MB of preloaded samples and Wave Sequencing. EXs: A sample library that works by itself or with other engines. EXs-1 is a set of instruments and EXs-2 is a grand piano. AL-1: A 96-note polyphonic virtual analog synthesizer (84 notes in previous versions of the OS) CX-3: A modeled tonewheel organ based on the current CX-3 STR-1: A plucked string physical model LAC-1: Optional bundle (originally $249.00, but now available for free) including two virtual analog synthesizers, the PolysixEX and MS-20EX, which are updated models of the vintage Korg Polysix and Korg MS20. The LAC-1 is available as a free upgrade, but has to be requested by the current owner of the OASYS from Korg. MOD-7: Optional (originally $249.00, but now available for free) that Combines Variable Phase Modulation (VPM), waveshaping, ring modulation, PCM sample playback, and subtractive synthesis in a patchable, semi-modular synthesizer. The MOD-7 is available as a free upgrade, but has to be requested by the current owner of the OASYS from
https://en.wikipedia.org/wiki/X-13ARIMA-SEATS
X-13ARIMA-SEATS, successor to X-12-ARIMA and X-11, is a set of statistical methods for seasonal adjustment and other descriptive analysis of time series data that are implemented in the U.S. Census Bureau's software package. These methods are or have been used by Statistics Canada, Australian Bureau of Statistics, and the statistical offices of many other countries. X-12-ARIMA can be used together with many statistical packages, such as SAS in its econometric and time series (ETS) package, R in its (seasonal) package, Gretl or EViews which provides a graphical user interface for X-12-ARIMA, and NumXL which avails X-12-ARIMA functionality in Microsoft Excel. There is also a version for Matlab. Notable statistical agencies presently using X-12-ARIMA for seasonal adjustment include Statistics Canada, the U.S. Bureau of Labor Statistics and Census and Statistics Department (Hong Kong). The Brazilian Institute of Geography and Statistics uses X-13-ARIMA. X-12-ARIMA was the successor to X-11-ARIMA; the current version is X-13ARIMA-SEATS. X-13-ARIMA-SEATS's source code can be found on the Census Bureau's website. Methods The default method for seasonal adjustment is based on the X-11 algorithm. It is assumed that the observations in a time series, , can be decomposed additively, or multiplicatively, In this decomposition, is the trend (or the "trend cycle" because it also includes cyclical movements such as business cycles) component, is the seasonal component, and is the irregular (or random) component. The goal is to estimate each of the three components and then remove the seasonal component from the time series, producing a seasonally adjusted time series. The decomposition is accomplished through the iterative application of centered moving averages. For an additive decomposition of a monthly time series, for example, the algorithm follows the following pattern: An initial estimate of the trend is obtained by calculating centered moving averages for 13 observations (from to ). Subtract the initial estimate of the trend series from the original series, leaving the seasonal and irregular components (SI). Calculate an initial estimate of the seasonal component using a centered moving average of the SI series at seasonal frequencies, such as Calculate an initial seasonally adjusted series by subtracting the initial seasonal component from the original series. Calculate another estimate of the trend using a different set of weights (known as "Henderson weights"). Remove the trend again and calculate another estimate of the seasonal factor. Seasonally adjust the series again with the new seasonal factors. Calculate the final trend and irregular components from the seasonally adjusted series. The method also includes a number of tests, diagnostics and other statistics for evaluating the quality of the seasonal adjustments. Copyright and conditions The software is US government work, and those are in the public domain (in the US); f
https://en.wikipedia.org/wiki/Kaprekar%27s%20routine
In number theory, Kaprekar's routine is an iterative algorithm named after its inventor, Indian mathematician D. R. Kaprekar. Each iteration starts with a number, sorts the digits into descending and ascending order, and calculates the difference between the two new numbers. As an example, starting with the number 8991 in base 10: 6174, known as Kaprekar's constant, is a fixed point of this algorithm. Any four-digit number (in base 10) with at least two distinct digits will reach 6174 within seven iterations. The algorithm runs on any natural number in any given number base. Definition and properties The algorithm is as follows: Choose any natural number in a given number base . This is the first number of the sequence. Create a new number by sorting the digits of in descending order, and another number by sorting the digits of in ascending order. These numbers may have leading zeros, which can be ignored. Subtract to produce the next number of the sequence. Repeat step 2. The sequence is called a Kaprekar sequence and the function is the Kaprekar mapping. Some numbers map to themselves; these are the fixed points of the Kaprekar mapping, and are called Kaprekar's constants. Zero is a Kaprekar's constant for all bases , and so is called a trivial Kaprekar's constant. All other Kaprekar's constant are nontrivial Kaprekar's constants. For example, in base 10, starting with 3524, with 6174 as a Kaprekar's constant. All Kaprekar sequences will either reach one of these fixed points or will result in a repeating cycle. Either way, the end result is reached in a fairly small number of steps. Note that the numbers and have the same digit sum and hence the same remainder modulo . Therefore, each number in a Kaprekar sequence of base numbers (other than possibly the first) is a multiple of . When leading zeroes are retained, only repdigits lead to the trivial Kaprekar's constant. Families of Kaprekar's constants In base 4, it can easily be shown that all numbers of the form 3021, 310221, 31102221, 3...111...02...222...1 (where the length of the "1" sequence and the length of the "2" sequence are the same) are fixed points of the Kaprekar mapping. In base 10, it can easily be shown that all numbers of the form 6174, 631764, 63317664, 6...333...17...666...4 (where the length of the "3" sequence and the length of the "6" sequence are the same) are fixed points of the Kaprekar mapping. b = 2k It can be shown that all natural numbers are fixed points of the Kaprekar mapping in even base for all natural numbers . Kaprekar's constants and cycles of the Kaprekar mapping for specific base b All numbers are expressed in base , using A−Z to represent digit values 10 to 35. Kaprekar's constants in base 10 Numbers of length four digits In 1949 D. R. Kaprekar discovered that if the above process is applied to four-digit numbers in base 10, the sequence converges to 6174 within seven iterations or, more rarely, converges to
https://en.wikipedia.org/wiki/The%20Palace%20%28computer%20program%29
The Palace is a computer program to access graphical chat room servers, called palaces, in which users may interact with one another using graphical avatars overlaid on a graphical backdrop. The software concept was originally created by Jim Bumgardner and produced by Time Warner in 1994, and was first opened to the public in November 1995. While there is no longer any official support for the original program, a new client has been developed and is actively maintained by Jameson Heesen. Many chat servers are still operating and can be found on the Palace Portal Live Directory. Palace clients and servers are available for Mac OS 9, Mac OS X, Linux, and Microsoft Windows. Concept and design Palaces Each room in a palace is represented by a large image that serves as a backdrop for users. By clicking on certain areas in a room called "doors", users can travel either to different rooms in the same palace, another palace server, or an address leading to a different service, such as websites and email. In some rooms, users are allowed to paint on the backdrop using a simple suite of drawing tools. User messages appear as chat bubbles above their avatar, similar to those in comic books, and stored in a chat log. Avatars The Palace has an avatar system that allows users to combine small, partially transparent images. Once a member has created an avatar, the member can pick up various pieces of clothing or other accessories. By default, users are represented by spherical smiley face emoticons, but can also wear up to nine separate bitmap images known as "props." In Q3 1997, several users began using doll-inspired images as avatars with a customizable appearance. The avatars were known as "Little People" before later collectively named Dollz. A fanzine credited the creation of Dollz to Rainman, who based his "Sk8er" doll on his comic strip. Other sources claimed that Melicia Greenwood created the first Dollz, basing her avatar on Barbie while catering to counter-culture audiences of preps, goths, and skaters. Other popular Dollz used on The Palace were Wonderkins, Silents, and Divas (based on Diva Starz). Dollz became popular with the users on The Palace, particularly teenagers, with several rooms dedicated to unofficial Dollz editing contests. Teenagers also used Dollz as avatars as a sign of rebellion against The Palace's older users. The popularity of Dollz has inspired several personal websites dedicated to creating and customizing Dollz, outside of The Palace community. The majority of Dollz creators were female. History The Palace was originally created by Jim Bumgardner and produced by Time Warner Interactive in 1994, with its official website launching to the public in November 1995. Bumgardner incorporated many features of Idaho, an in-house authoring tool he had previously developed for making multimedia CD-ROMs. One of the features of Idaho was IPTSCRAE, a Forth-like programming language. The name is a play on the word "script" in Pig
https://en.wikipedia.org/wiki/Consistent%20estimator
In statistics, a consistent estimator or asymptotically consistent estimator is an estimator—a rule for computing estimates of a parameter θ0—having the property that as the number of data points used increases indefinitely, the resulting sequence of estimates converges in probability to θ0. This means that the distributions of the estimates become more and more concentrated near the true value of the parameter being estimated, so that the probability of the estimator being arbitrarily close to θ0 converges to one. In practice one constructs an estimator as a function of an available sample of size n, and then imagines being able to keep collecting data and expanding the sample ad infinitum. In this way one would obtain a sequence of estimates indexed by n, and consistency is a property of what occurs as the sample size “grows to infinity”. If the sequence of estimates can be mathematically shown to converge in probability to the true value θ0, it is called a consistent estimator; otherwise the estimator is said to be inconsistent. Consistency as defined here is sometimes referred to as weak consistency. When we replace convergence in probability with almost sure convergence, then the estimator is said to be strongly consistent. Consistency is related to bias; see bias versus consistency. Definition Formally speaking, an estimator Tn of parameter θ is said to be weakly consistent, if it converges in probability to the true value of the parameter: i.e. if, for all ε > 0 An estimator Tn of parameter θ is said to be strongly consistent, if it converges almost surely to the true value of the parameter: A more rigorous definition takes into account the fact that θ is actually unknown, and thus, the convergence in probability must take place for every possible value of this parameter. Suppose } is a family of distributions (the parametric model), and } is an infinite sample from the distribution pθ. Let { Tn(Xθ) } be a sequence of estimators for some parameter g(θ). Usually, Tn will be based on the first n observations of a sample. Then this sequence {Tn} is said to be (weakly) consistent if This definition uses g(θ) instead of simply θ, because often one is interested in estimating a certain function or a sub-vector of the underlying parameter. In the next example, we estimate the location parameter of the model, but not the scale: Examples Sample mean of a normal random variable Suppose one has a sequence of statistically independent observations {X1, X2, ...} from a normal N(μ, σ2) distribution. To estimate μ based on the first n observations, one can use the sample mean: Tn = (X1 + ... + Xn)/n. This defines a sequence of estimators, indexed by the sample size n. From the properties of the normal distribution, we know the sampling distribution of this statistic: Tn is itself normally distributed, with mean μ and variance σ2/n. Equivalently, has a standard normal distribution: as n tends to infinity, for any fixed . Therefore
https://en.wikipedia.org/wiki/Paintbox
Paintbox may refer to: Paintbox (software), a graphics utility for the ZX Spectrum, released in 1983 Quantel Paintbox, a computer graphics workstation for television video and graphics, released in 1981 "Paint Box" (song), by Pink Floyd, 1967 PaintBox, a program operated by the Boston Art Commission, Massachusetts, US
https://en.wikipedia.org/wiki/Data%20URI%20scheme
The data URI scheme is a uniform resource identifier (URI) scheme that provides a way to include data in-line in Web pages as if they were external resources. It is a form of file literal or here document. This technique allows normally separate elements such as images and style sheets to be fetched in a single Hypertext Transfer Protocol (HTTP) request, which may be more efficient than multiple HTTP requests, and used by several browser extensions to package images as well as other multimedia contents in a single HTML file for page saving. , data URIs are fully supported by most major browsers, and partially supported in Internet Explorer. Syntax The syntax of data URIs is defined in Request for Comments (RFC) 2397, published in August 1998, and follows the URI scheme syntax. A data URI consists of: data:content/type;base64, The scheme, data. It is followed by a colon (:). An optional media type. The media type part may include one or more parameters, in the format attribute=value, separated by semicolons (;) . A common media type parameter is charset, specifying the character set of the media type, where the value is from the IANA list of character set names. If one is not specified, the media type of the data URI is assumed to be text/plain;charset=US-ASCII. An optional base64 extension base64, separated from the preceding part by a semicolon. When present, this indicates that the data content of the URI is binary data, encoded in ASCII format using the Base64 scheme for binary-to-text encoding. The base64 extension is distinguished from any media type parameters by virtue of not having a =value component and by coming after any media type parameters. Since Base64 encoded data is approximately 33% larger than original data, it is recommended to use Base64 data URIs only if the server supports HTTP compression or embedded files are smaller than 1KB. The data, separated from the preceding part by a comma (,). The data is a sequence of zero or more octets represented as characters. The comma is required in a data URI, even when the data part has zero length. The characters permitted within the data part include ASCII upper and lowercase letters, digits, and many ASCII punctuation and special characters. Note that this may include characters, such as colon, semicolon, and comma which are delimiters in the URI components preceding the data part. Other octets must be percent-encoded. If the data is Base64-encoded, then the data part may contain only valid Base64 characters. Note that Base64-encoded data: URIs use the standard Base64 character set (with '+' and '/' as characters 62 and 63) rather than the so-called "URL-safe Base64" character set. Examples of data URIs showing most of the features are: data:text/vnd-example+xyz;foo=bar;base64,R0lGODdh data:text/plain;charset=UTF-8;page=21,the%20data:1234,5678 (outputs: "the data:1234,5678") data:image/jpeg;base64,/9j/4AAQSkZJRgABAgAAZABkAAD The minimal data URI is data:,, consisting of th
https://en.wikipedia.org/wiki/Sylvania%20Electric%20Products
Sylvania Electric Products Inc. was an American manufacturer of diverse electrical equipment, including at various times radio transceivers, vacuum tubes, semiconductors, and mainframe computers such as MOBIDIC. They were one of the companies involved in the development of the COBOL programming language. History The Hygrade Sylvania Corporation was formed when NILCO, Sylvania and Hygrade Lamp Company merged into one company in 1931. In 1939, Hygrade Sylvania started preliminary research on fluorescent technology, and later that year, demonstrated the first linear, or tubular, fluorescent lamp. It was featured at the 1939 New York World's Fair. Sylvania was also a manufacturer of both vacuum tubes and transistors. In 1942, the company changed its name to Sylvania Electric Products Inc. During World War II, Sylvania was chosen from among several competing companies to manufacture the miniature vacuum tubes used in proximity fuze shells due to its quality standards and mass production capabilities. In 1959, Sylvania Electronics merged with General Telephone to form General Telephone and Electronics (GTE). Sylvania developed the earliest flash cubes for still cameras, later selling the technology to Eastman Kodak Company, and later a 10-flash unit called FlipFlash, as well as a line of household electric light bulbs, which continued during GTE's ownership, later sold off to the German manufacturer Osram, and is today marketed as Osram Sylvania. In June 1964, Sylvania unveiled a color TV picture tube in which europium-bearing phosphor was used for a much brighter, truer red than was possible before. Through merger and acquisitions, the company became a significant, but never dominating supplier of electrical distribution equipment, including transformers and switchgear, residential and commercial load centers and breakers, pushbuttons, indicator lights, and other hard-wired devices. All were manufactured and distributed under the brand name GTE Sylvania, with the name Challenger used for its light commercial and residential product lines. GTE Sylvania contributed to the technological advancement of electrical distribution products in the late 1970s with several interesting product features. At the time, they were the leading supplier of vacuum cast coil transformers, manufactured in their Hampton, Virginia plant. Their transformers featured aluminum primary winding and were cast using relatively inexpensive molds, allowing them to produce cast coil transformers in a variety of KVA capacities, primary and secondary voltages and physical coil sizes, including low profile coils for mining and other specialty applications. They also developed the first medium voltage 3 phase panel that could survive a dead short across two phases. Their patented design used bus bar encapsulated in a thin coating of epoxy and then bolted together across all three phases, using special non-conductive fittings. By 1981 GTE had made the decision to exit the electri
https://en.wikipedia.org/wiki/Interix
Interix was an optional, POSIX-conformant Unix subsystem for Windows NT operating systems. Interix was a component of Windows Services for UNIX, and a superset of the Microsoft POSIX subsystem. Like the POSIX subsystem, Interix was an environment subsystem for the NT kernel. It included numerous open source utility software programs and libraries. Interix was originally developed and sold as OpenNT until purchased by Microsoft in 1999. Interix versions 5.2 and 6.0 were respective components of Microsoft Windows Server 2003 R2, Windows Vista Enterprise, Windows Vista Ultimate, and Windows Server 2008 as Subsystem for Unix-based Applications (SUA). Version 6.1 was included in Windows 7 (Enterprise and Ultimate editions) but disabled by default, and in Windows Server 2008 R2 (all editions). It was available as a deprecated separate download for Windows 8 and Windows Server 2012, and is not available at all on Windows 10. Details The complete installation of Interix included (at version 3.5): Over 350 Unix utilities such as vi, ksh, csh, ls, cat, awk, grep, kill, etc. A complete set of manual pages for utilities and APIs GCC 3.3 compiler, includes and libraries A cc/c89-like wrapper for Microsoft Visual Studio command-line C/C++ compiler GNU Debugger X11 client applications and libraries (no X server included, though third party servers were available) Has Unix "root" capabilities (i.e. setuid files) Has pthreads, shared libraries, DSOs, job control, signals, sockets, shared memory The development environment included support for C, C++ and Fortran. Threading was supported using the Pthreads model. Additional languages could be obtained (Python, Ruby, Tcl, etc.). Unix-based software packaging and build tools were available for installing or creating pre-build software packages. Starting with release 5.2 (Server 2003/R2) the following capabilities were added: "Mixed mode" for linking Unix programs with Windows DLLs 64-bit CPU support (in addition to 32-bit) Large file system support on 64-bit systems System V R4 utilities can be optionally installed instead of the default BSD-based utilities MSVC debugging plug-in Database (OCI/ODBC) library connectivity With release 6.0 (Vista and Server 2008) the following new features were added: IPv6 support for socket APIs and daemons Updates to utilities for additional functionality MSVC debugging plug-in enhanced Interix release 6.0 for Vista was only available with the Ultimate and Enterprise editions. Interix release 6.1 was available for Windows Server 2008 R2 and Windows 7 for the Enterprise and Ultimate editions. Support Traditional support was provided by Microsoft for a fee or service contract, though released hotfixes can usually be obtained free of charge from Microsoft. Previously, free support could be found via the forums at the SUA Community site and with the FAQ, however this appears to have been withdrawn. Additions Additional pre-built applications and development libra
https://en.wikipedia.org/wiki/Unit%20in%20the%20last%20place
In computer science and numerical analysis, unit in the last place or unit of least precision (ulp) is the spacing between two consecutive floating-point numbers, i.e., the value the least significant digit (rightmost digit) represents if it is 1. It is used as a measure of accuracy in numeric calculations. Definition One definition is: In radix with precision , if , then Another definition, suggested by John Harrison, is slightly different: is the distance between the two closest straddling floating-point numbers and (i.e., those with and ), assuming that the exponent range is not upper-bounded. These definitions differ only at signed powers of the radix. The IEEE 754 specification—followed by all modern floating-point hardware—requires that the result of an elementary arithmetic operation (addition, subtraction, multiplication, division, and square root since 1985, and FMA since 2008) be correctly rounded, which implies that in rounding to nearest, the rounded result is within 0.5 ulp of the mathematically exact result, using John Harrison's definition; conversely, this property implies that the distance between the rounded result and the mathematically exact result is minimized (but for the halfway cases, it is satisfied by two consecutive floating-point numbers). Reputable numeric libraries compute the basic transcendental functions to between 0.5 and about 1 ulp. Only a few libraries compute them within 0.5 ulp, this problem being complex due to the Table-maker's dilemma. Examples Example 1 Let be a positive floating-point number and assume that the active rounding mode is round to nearest, ties to even, denoted . If , then . Otherwise, or , depending on the value of the least significant digit and the exponent of . This is demonstrated in the following Haskell code typed at an interactive prompt: > until (\x -> x == x+1) (+1) 0 :: Float 1.6777216e7 > it-1 1.6777215e7 > it+1 1.6777216e7 Here we start with 0 in single precision and repeatedly add 1 until the operation does not change the value. Since the significand for a single-precision number contains 24 bits, the first integer that is not exactly representable is 224+1, and this value rounds to 224 in round to nearest, ties to even. Thus the result is equal to 224. Example 2 The following example in Java approximates as a floating point value by finding the two double values bracketing : . // π with 20 decimal digits BigDecimal π = new BigDecimal("3.14159265358979323846"); // truncate to a double floating point double p0 = π.doubleValue(); // -> 3.141592653589793 (hex: 0x1.921fb54442d18p1) // p0 is smaller than π, so find next number representable as double double p1 = Math.nextUp(p0); // -> 3.1415926535897936 (hex: 0x1.921fb54442d19p1) Then is determined as . // ulp(π) is the difference between p1 and p0 BigDecimal ulp = new BigDecimal(p1).subtract(new BigDecimal(p0)); // -> 4.44089209850062616169452667236328125E-16 // (this is precisely 2**(-51)) // same result wh
https://en.wikipedia.org/wiki/Mesa%20%28computer%20graphics%29
Mesa, also called Mesa3D and The Mesa 3D Graphics Library, is an open source implementation of OpenGL, Vulkan, and other graphics API specifications. Mesa translates these specifications to vendor-specific graphics hardware drivers. Its most important users are two graphics drivers mostly developed and funded by Intel and AMD for their respective hardware (AMD promotes their Mesa drivers Radeon and RadeonSI over the deprecated AMD Catalyst, and Intel has only supported the Mesa driver). Proprietary graphics drivers (e.g., Nvidia GeForce driver and Catalyst) replace all of Mesa, providing their own implementation of a graphics API. An open-source effort to write a Mesa Nvidia driver called Nouveau is developed mostly by the community. Besides 3D applications such as games, modern display servers (X.org's Glamor or Wayland's Weston) use OpenGL/EGL; therefore all graphics typically go through Mesa. Mesa is hosted by freedesktop.org and was initiated in August 1993 by Brian Paul, who is still active in the project. Mesa was subsequently widely adopted and now contains numerous contributions from various individuals and corporations worldwide, including from the graphics hardware manufacturers of the Khronos Group that administer the OpenGL specification. For Linux, development has also been partially driven by crowdfunding. Overview Implementations of rendering APIs Mesa is known as housing implementations of graphic APIs. Historically the main API that Mesa has implemented is OpenGL, along with other Khronos Group related specifications (like OpenVG, OpenGL ES or recently EGL). But Mesa can implement other APIs and indeed it did with Glide (deprecated) and Direct3D 9 since July 2013. Mesa is also not specific to Unix-like operating systems: on Windows for example, Mesa provides an OpenGL API over DirectX. Mesa implements a translation layer between a graphics API such as OpenGL and the graphics hardware drivers in the operating system kernel. The supported version of the different graphic APIs depends on the driver, because each hardware driver has its own implementation (and therefore status). This is especially true for the "classic" drivers, while the Gallium3D drivers share common code that tend to homogenize the supported extensions and versions. Mesa maintains a support matrix with the status of the current OpenGL conformance visualized at . Mesa 10 complies with OpenGL 3.3 for Intel, AMD/ATI, and Nvidia GPU hardware. Mesa 11 was announced with some drivers being OpenGL 4.1 compliant. Mesa 12 contains OpenGL 4.2 and 4.3 and Intel Vulkan 1.0 support. Mesa 13 brought Intel support for OpenGL 4.4 and 4.5 (all Features supported for Intel Gen 8+, Radeon GCN, Nvidia (Fermi, Kepler), but no Khronos-Test for 4.5-Label) and experimental AMD Vulkan 1.0 support through the community driver RADV. OpenGL ES 3.2 is possible with Intel Skylake (Gen9). 1st stable version of 2017 is 17.0 (new year Counting). Ready features are certified OpenGL 4.5
https://en.wikipedia.org/wiki/Moorfields%20railway%20station
Moorfields railway station is an underground railway station in the city centre of Liverpool, England. The station is situated on both the Northern and Wirral Lines of the Merseyrail network. It is the third-busiest station on the Merseyrail network, and the largest underground station. It is also the only station on the network having services to all other Merseyrail stations. History The station was built in the 1970s, as a replacement for Liverpool Exchange railway station, opening on 2 May 1977. The station was opened by British Rail and is accessed via entrances at Moorfields and on the corner of Old Hall Street and Tithebarn Street. The Old Hall Street entrance is open from only 5:30 am until 7 pm on weekdays. Services from the north had previously terminated at nearby Liverpool Exchange terminus station. The newly created north–south crossrail Northern Line runs through Moorfields. Liverpool Exchange was closed and the line extended underground to the new Moorfields station. The line from the north continued through a new tunnel to Liverpool Central, continuing south to terminate at Garston. The line was later extended to Hunts Cross and opened in 1983. At the same time, another new tunnel was built, carrying the Wirral Line in a loop from James Street via Moorfields, Lime Street, and Liverpool Central before returning to James Street; the Wirral Line platform opened on 30 October 1977. There are three platforms (two for the Northern Line and one for the Wirral Line) in two levels of tunnel. The Wirral Line platform is at a much deeper level to pass under the Queensway road tunnel. Passengers must, curiously for an underground station, go up an escalator from the Moorfields entrance to reach the ticket office – the station was originally intended to connect with a pedestrian walkway system, designed to separate pedestrians from traffic. Only a small section of the system was constructed in the 1970s and the scheme eventually fell by the wayside. From the ticket office, another escalator leads down to the main pedestrian tunnel which links the Northern and Wirral Line platforms and the Old Hall Street entrance. The usage of the station Monday to Friday is much greater than the statistics show, since they credit "Liverpool" passengers to Lime Street station, and do not include day or season ticket holders. The station is however significantly quieter at weekends, since it is primarily used by people working in the business quarter and is less convenient for most of the city centre retail areas. The ashes of Roy Vivian Hughes, the civil engineer who played a major part in the development of the Merseyrail system, are interred behind in a plaque on the wall of the main corridor. Recent history The station underwent an extensive refurbishment in 2015/16 as part of a £40 million investment from Network Rail to allow improvement works to take place at Merseyrail's underground stations, with the refurbishment of Moorfields costing £8 m
https://en.wikipedia.org/wiki/MRIS
MRIS may refer to: Metropolitan Regional Information Systems, a realtors' Multiple Listing Service database in the Washington, DC metro area Menopausal Research and Info Service, a British website Marginal Rate of Intertemporal Substitution Macroeconomics
https://en.wikipedia.org/wiki/Business%20Continuity%20Institute
The Business Continuity Institute (BCI) was established in 1994 by Andrew Hiles and others, evolving from the Survive Group - a network of disaster recovery and business continuity experts. The Institute's initial vision was to enable individual members to obtain guidance and support from fellow business continuity practitioners. Activities The BCI's first AGM was held in 1995 in London, becoming an independent organisation in May 1997. It was initially led by John Marsh and then John Sharp. In 2004 the BCI expanded, moving to office space in Caversham under the leadership of new Executive Director, Lorraine Darke. Lorraine continued in this role until September 2016, when she stepped down - being replaced by David Thorp, the current BCI Executive Director. Currently, the BCI is based in Reading, UK, and has over 9,000 members in more than 120 countries. More details of the development of the BCI are available in a timeline listing on the Institute's website. References External links Official Website Business Networking Creative Business Names Business continuity Organizations established in 1994 Organisations based in Reading, Berkshire 1994 establishments in the United Kingdom Business organisations based in the United Kingdom
https://en.wikipedia.org/wiki/Taiwan%20Tongzhi%20Hotline%20Association
Taiwan Tongzhi Hotline Association (TTHA; ) is an organization that provides the LGBT community with peer counseling, support networks, and a community resource center. It is the first LGBT non-governmental organization (NGO) registered in Taiwan. TTHA was established in 1998 as a joint effort of four groups that focus on LGBT and gender issues, the Gay Counselors Association, Queer & Class, LGBT Civil Rights Alliance, and the Gay Teachers’ Alliance. The organization's current director-general is Yu Zhi-Yun (徐志雲). Services and activities TTHA's tasks focus on counseling, cultural events, and the protection of LGBT rights including: Counseling on gender identity Counseling for LGBT relationships Counseling on gay rights issues Providing LGBT-related resources Hosting counseling and support groups for parents of LGBT children Organizing and training volunteers Providing safe sex education and HIV-prevention education Hosting LGBT-inclusive workshops for teachers Organizing and assisting Taiwan Pride (2005) Promoting Gender Equity Education Act (2004) As part of its work, TTHA has been supporting the promotion of gender equity education in Taiwan, notably through the inclusion of gay rights and sexual orientation topics in the new mandatory curriculum for elementary and junior high school. By teaching youths about diversity in sexual orientation, TTHA and other like-minded organizations hope to enhance understanding and respect. TTHA also ties this to efforts to stem bullying in schools, which is often based on prejudices and stereotypes towards gender or sexual orientation. However, inclusion of sexual orientation-related topics in school curriculum has met with opposition, and TTHA and other gender and gay rights advocacy groups recently have had to file a slander suit against a group stating that gender equity curriculum would promote "sexual openness" and same-sex marriage. References External links Taiwan Tongzhi Hotline Association 1998 establishments in Taiwan LGBT organizations in Taiwan Organizations established in 1998
https://en.wikipedia.org/wiki/Dance%20Party%20USA
Dance Party USA is an American dance television show that aired daily on cable's USA Network from April 12, 1986, to June 27, 1992. It was originally a half-hour, but was expanded to an hour in 1987. The program was always shot at, and aired live from, various TV studios including WPHL-17 and WGBS in Philadelphia from 1986 – 1992. The production staff worked at the Nise's production offices and studios located in Camden, New Jersey. For the first few episodes, Dance Party USA's original name was Dancin' USA. Dance Party USA's was formated like its predecessor, the highly rated Dancin' On Air, a daily TV dance show broadcast from 1981–1986 on Philadelphia's WPHL-TV. In 1986, Dancin' On Air was syndicated by KDOC-TV in Los Angeles. The show doubled KDOC's ratings in its first week and was then picked up by the fledgling USA Network. Shortly thereafter, USA Network hired the Nises to produce Dance Party USA for the Network. Two years later, Michael Nise learned form USA Network that his production company was chosen over Dick Clark to produce Dance Party USA for the USA Network. During 1986 and 1987, the Dancin' On Air studio & set was the same one used for Dance Party USA. As a result during the 1986–87 season, audiences saw the same regulars, guest dancers, and celebrities on both shows on the same days. The programs also shared a weekly talk radio show, Talkin' On Air, hosted by Michael Nise. Hosts 1985–1986: Dave Raymond 1986–1989, 1992: Andy Gury, 1989–1991: Bobby Catalano, Heather "Princess" Day 1989–1990: Amy Brady, Alvin "Spicy" Ramirez, Cindy Stark, Romeo King, Tyrone "Mr. Mitch" Mitchell 1989: Christy Springfield 1990: Aubrey Ayala, Kelly Berridge, Chris Bustard, Pete Conicelli, Joanna Mistretta, Matt Robbins, Desiree Wynder Noteworthy regulars Kelly Ripa, actress and host of Live with Kelly and Ryan: Following a 3-year run as a dancer / segment host 1st on Dancin' On Air and thenDance Party USA's , in 1990 she landed what would be her most recognized acting role, Hayley Vaughn on All My Children. Jeffrey Glassman known as "Jazzy Jeff" went on to be a semi successful DJ in South Jersey. Bobby Catalano was the man with the shades who would only remove his trademark sunglasses once a year on the Valentine's Day show. He was a very popular dancer and host. Bruce Williams, who was known as "Beastie Bruce" because he wore a Volkswagen chain as did the Beastie Boys, had a rap collection that did well in the Philadelphia area. It was a break off of the Philadelphia rap group "Tuff Crew". Dealin LaValley was a dancer on the show and went on to do Law & Order and national TV commercials. He now works as a celebrity makeup artist. Heather Day was nicknamed "Princess" on the show because she was a fan of Prince and could be seen wearing dresses or other outfits like an eye-patch that reflected her devotion to the singer. She would meet the singer in 1994, two years after Dance Party USA ended its run. Today, Heather Day Slawek, a graduate
https://en.wikipedia.org/wiki/Leonard%20Bosack
Leonard X. Bosack (born 1952) is a co-founder of Cisco Systems, an American-based multinational corporation that designs and sells consumer electronics, networking and communications technology, and services. His net worth is approximately $200 million. He was awarded the Computer Entrepreneur Award in 2009 for co-founding Cisco Systems and pioneering and advancing the commercialization of routing technology and the profound changes this technology enabled in the computer industry. He is largely responsible for pioneering the widespread commercialization of local area network (LAN) technology to connect geographically disparate computers over a multiprotocol router system, which was an unheard-of technology at the time. In 1990, Cisco's management fired Cisco co-founder Sandy Lerner and Bosack resigned. , Bosack was the CEO of XKL LLC, a privately funded engineering company which explores and develops optical networks for data communications. Background Born in Pennsylvania in 1952 to Polish Catholic family, Bosack graduated from La Salle College High School in 1969. In 1973, Bosack graduated from the University of Pennsylvania School of Engineering and Applied Science, and joined the Digital Equipment Corporation (DEC) as a hardware engineer. In 1979, he was accepted into Stanford University, and began to study computer science. During his time at Stanford, he was credited for becoming a support engineer for a 1981 project to connect all of Stanford's mainframes, minis, LISP machines, and Altos. His contribution was to work on the network router that allowed the computer network under his management to share data from the Computer Science Lab with the Business School's network. He met his wife Sandra Lerner at Stanford, where she was the manager of the Business School lab, and the couple married in 1980. Together in 1984, they started Cisco in Menlo Park. Cisco In 1984, Bosack co-founded Cisco Systems with his then partner (and now ex-wife) Sandy Lerner. Their aim was to commercialize the Advanced Gateway Server. The Advanced Gateway Server was a revised version of the Stanford router built by William Yeager and Andy Bechtolsheim. Bosack and Lerner designed and built routers in their house, and experimented using Stanford's network. Initially, Bosack and Lerner went to Stanford with a proposition to start building and selling the routers, but the school refused. It was then that they founded their own company, and named it "Cisco," taken from the name of nearby San Francisco. It is widely reported that Lerner and Bosack designed the first router so that they could connect the incompatible computer systems of the Stanford offices they were working in so that they could send letters to each other. However, this is an untrue legend. Cisco's product was developed in their garage and was sold beginning in 1986 by word of mouth. In their first month alone, Cisco was able to land contracts worth more than $200,000. The company produced revolution
https://en.wikipedia.org/wiki/Thomas%20Binford
Thomas Oriel Binford has been a researcher in image analysis and computer vision since 1967. He developed a model-based approach to computer vision in which complex objects are represented as collections of generalized cylinders. His results are reflected in work in other areas of research, including the interpretation of complex scenes using invariants and quasi-invariants, inference rules and evidential reasoning in extended Bayes networks of symbolic geometric constraints, the SUCCESSOR system, a portable, intelligent vision system, stereo and visual robot navigation, segmentation and feature estimation in complex images, color image analysis, surface material analysis, and image compression. He has led the development of numerous computer vision systems, including systems successfully employed in brain surgery on humans, high-precision automated machining, and helicopter navigation. Binford received a Ph.D. in particle physics in 1965 from the University of Wisconsin–Madison, under the supervision of Myron L. Good; his thesis was entitled "Angular Distribution and Polarization of Neutral Hyperons Produced in Association with Neutral Kaons". He was a Fulbright Scholar at the Tata Institute of Fundamental Research in Mumbai, India from 1965 to 1966, and a research scientist at the MIT Artificial Intelligence Laboratory from 1966 to 1970. From 1970 to 2000 he was a professor of computer science at Stanford University; in 2000 he retired to become an emeritus professor. While at Stanford, Professor Binford supervised more than 40 PhD theses while leading research in computer vision, artificial intelligence, medical image processing, radar image understanding, robotics, industrial inspection, and manufacturing; notable students of Binford's include Rodney Brooks and Jitendra Malik. Since retiring from active research at Stanford, Binford has founded and is chairman and chief technology officer of Read-Ink Technologies Pvt. Ltd., a company in Bangalore, India specializing in online handwriting recognition software. In 1994 Thomas Binford was elected a Fellow of the Association for the Advancement of Artificial Intelligence "for his role as a founding father in the field of computer vision and model-based perception in robotics; and for his many contributions to the fields". References External links Read-Ink Technologies Living people Computer vision researchers University of Wisconsin–Madison alumni Stanford University School of Engineering faculty American chief technology officers Year of birth missing (living people)
https://en.wikipedia.org/wiki/Blitzen%20%28computer%29
The Blitzen was a miniaturized SIMD (single instruction, multiple data) computer system designed for NASA in the late 1980s by a team of researchers at Duke University, North Carolina State University and the Microelectronics Center of North Carolina. The Blitzen was composed of a control unit and a set of simple processors connected in a grid topology. The machine influenced, to some extent, the design of the MasPar MP-1 computer. Applications of the Blitzen machine include high-speed image processing, where each processor operates on a pixel of the input image and communicates with its grid neighbours to apply image processing filters on the image. References Classes of computers SIMD computing
https://en.wikipedia.org/wiki/Kallang%E2%80%93Paya%20Lebar%20Expressway
The Kallang–Paya Lebar Expressway (KPE) is the third newest of Singapore's network of expressways. The southern (Kallang) section of the expressway opened first, on 26 October 2007, with the remaining (Paya Lebar) section opened on 20 September 2008. Connecting East Coast Parkway (ECP) in the south and Tampines Expressway (TPE) in the north-east, the six-lane (2x3) expressway extends for twelve kilometres, with approximately of main cut and cover tunnels running some 10 kilometres underground when fully completed. Built at a cost of approximately S$1.8 billion (USD$1 billion), it is the longest subterranean road tunnel in Southeast Asia. The KPE is also believed to be the world's sixth longest underground road project at its time under construction. In all, the dual-carriageway expressway with three lanes in each direction will have eight interchanges, eleven on-ramps, and twelve off-ramps. The south end of the KPE also connects directly to the Marina Coastal Expressway which opened on 29 December 2013. The Land Transport Authority (LTA) has awarded a contract for the expansion of the KPE/TPE interchange at the north end of the expressway and construction of a new road connection to Punggol Central, providing a new and more direct link to and from the KPE and TPE, and alleviating the traffic congestion of the TPE between the current KPE ramps and Punggol ramps. The work would involves the design and construction of roads, three new vehicular bridges crossing Sungei Serangoon and Sungei Blukar, a new flyover across TPE and other associated ramps. Construction works commenced in the second quarter of 2015. History A 2.8 km-long Kallang Expressway (KLE) was envisioned as early as 1981, serving as a link between the Pan Island Expressway (PIE) and East Coast Parkway (ECP). It would have become the shortest expressway in Singapore if it was built. The modern Kallang–Paya Lebar Expressway (KPE) was first conceptualised in the preliminary plans of 1997, merging the KLE and the Paya Lebar Expressway (PLE) into a single expressway. Construction on KPE started in the year 2001, and was fully completed in 2008. On 23 June 2007, the northern end of the expressway between Tampines Road from the new Defu Flyover and the Tampines Expressway was opened to traffic, and was temporarily named Tampines Service Road. Tampines Road will therefore no longer connect with the Tampines Expressway at the Tampines Flyover. The Defu Flyover along Tampines Road, along with the traffic signals, were commissioned on the same day from 1000 hours. On 27 July 2007, the LTA announced the opening of the southern ECP-PIE section of the expressway (Phase 1) to traffic on 26 October that year. The entire expressway opened to traffic on 20 September 2008. Route The Kallang section of the expressway starts from eastern end of the Marina Coastal Expressway, where it also interchanges with the East Coast Parkway near the fourteen-kilometre mark of the ECP in a northward direction,
https://en.wikipedia.org/wiki/Seattle%20Computer%20Products
Seattle Computer Products (SCP) was a Tukwila, Washington, microcomputer hardware company which was one of the first manufacturers of computer systems based on the 16-bit Intel 8086 processor. Founded in 1978, SCP began shipping its first S-100 bus 8086 CPU boards to customers in November 1979, about 21 months before IBM introduced its Personal Computer which was based on the slower 8088 and introduced the 8-bit ISA bus. SCP shipped an operating system for that hardware about a year before the release of the PC, which was modified by Microsoft for the PC and renamed IBM PC DOS. SCP was staffed partly by high-school students from nearby communities who soldered and assembled the computers. Some of them would later work for Microsoft. Corporate history Twenty-two-year-old Tim Paterson was hired in June 1978 by SCP's owner Rodney Maurice Brock (26 August 1930 – 30 November 2018). At the time, SCP built memory boards for microcomputers, but after attending a local seminar on Intel's just-released 8086 in late summer 1978, Paterson convinced Brock that his company should design a CPU board for the new chip. Paterson had a prototype working by May 1979, and he took his "computer" over to Microsoft, who were working on an 8086 BASIC, which was working before the end of May. When the board began shipping in November, standalone Microsoft BASIC was offered as an option, but no operating system was available for it. Digital Research, whose 8-bit CP/M operating system was the industry standard, was working on an 8086-compatible version called CP/M-86, but the delay in its release was costing SCP sales. In order to fill this void, Paterson wrote QDOS (for Quick and Dirty Operating System) over a four-month period starting in April 1980. QDOS 0.11 was finished in August 1980, and SCP began shipping it in September 1980. The operating system was renamed to 86-DOS in December 1980. Microsoft, having worked with SCP before and seeking an operating system they could modify for the IBM PC, bought the rights to market the 86-DOS operating system to other manufacturers for that same month. On 27 July 1981, just prior to the launch of the IBM PC on the 12 August 1981, Microsoft bought the full rights to the operating system for an additional , giving SCP a perpetual royalty-free license to sell 86-DOS (including updated versions) with its computer hardware. Realizing that Microsoft was making significant profit on the 86-DOS operating system, SCP attempted to sell it along with a stand-alone inexpensive CPU (without any other circuitry). This was allowed as per SCP's license with Microsoft, which let SCP sell the operating system with their 8086-based computers; this operating system was marketed as "Seattle DOS", and a CPU was included in the box it shipped in. Thanks to the deal with Microsoft, additional capital allowed Seattle Computer to expand its memory business into providing additional memory for PC products. The company had its best year in 1982, reapi
https://en.wikipedia.org/wiki/K-line%20%28artificial%20intelligence%29
A K-line, or Knowledge-line, is a mental agent which represents an association of a group of other mental agents found active when a subject solves a certain problem or formulates a new idea. These were first described in Marvin Minsky's essay K-lines: A Theory of Memory, published in 1980 in the journal Cognitive Science: When you "get an idea," or "solve a problem" ... you create what we shall call a K-line. ... When that K-line is later "activated", it reactivates ... mental agencies, creating a partial mental state "resembling the original." "Whenever you 'get a good idea', solve a problem, or have a memorable experience, you activate a K-line to 'represent' it. A K-line is a wirelike structure that attaches itself to whichever mental agents are active when you solve a problem or have a good idea. When you activate that K-line later, the agents attached to it are aroused, putting you into a 'mental state' much like the one you were in when you solved that problem or got that idea. This should make it relatively easy for you to solve new, similar problems!" (1998, p. 82.) References Minsky, Marvin; The Society of Mind March 15, 1998. Minsky, Marvin; Papert, Seymour; Perceptrons: An Introduction to Computational Geometry December 28, 1987. Footnotes External links Minsky's "K-lines: A Theory of Memory" Why Programming is a Good Medium for Expressing Poorly Understood and Sloppily Formulated Ideas Artificial intelligence articles needing expert attention Artificial intelligence
https://en.wikipedia.org/wiki/Michael%20Shapiro
Michael Shapiro may refer to: Michael Shapiro (actor), American actor, voice actor and theatre director Mike Shapiro (programmer), American computer programmer Michael J. Shapiro (born 1940), American political scientist at the University of Hawai'i Michael Jeffrey Shapiro, American composer and music director of the Chappaqua Orchestra Mike Shapiro, bookmaker, see Sands Hotel and Casino See also Mikhail Chapiro (born 1938), Russian artist and painter, currently lives in Canada
https://en.wikipedia.org/wiki/WashAndGo
WashAndGo may refer to: A shampoo produced by Vidal Sassoon A computer program for Microsoft Windows by Abelssoft to remove garbage and unneeded files, see WashAndGo (software)
https://en.wikipedia.org/wiki/Database%20publishing
Database publishing is an area of automated media production in which specialized techniques are used to generate paginated documents from source data residing in traditional databases. Common examples are mail order catalogues, direct marketing, report generation, price lists and telephone directories. The database content can be in the form of text and pictures but can also contain metadata related to formatting and special rules that may apply to the document generation process. Database publishing can be incorporated into larger workflows as a component, where documents are created, approved, revised and released. The basic idea is using database contents like article and price information to fill out pre-formatted template documents. Templates are typically created in a normal desktop layout application where certain boxes or text are designated as placeholders. These placeholders are then targeted with new content which flows in from the database. This allows for quick generation of final output and, in case of changes to the database, quickly perform updates, with limited or no manual intervention. Another model of database publishing is found in many web-to-print sites where users browse templates from an online catalog (such as business cards or brochures), personalize the selected template by filling in a form and then view the rendered result. In this case the initial source of data is from user input, but it is captured in a database so that if the same user revisits the site later, they can resume editing where they left off. The form is then pre-filled from the database-stored variables the user entered before. The main layout applications for this workflow are: Datalogics Pager, Adobe FrameMaker / InDesign, QuarkXPress, Xyvision, Arbortext Advanced Print Publisher (formerly 3B2) and priint:suite. Generally, these layout applications have a corresponding server version, which receives commands via web interfaces rather than desktop interaction. QuarkXPress Server and Adobe InDesign Server both take full advantage of the design features available in their respective desktop versions. These applications make their broad spectrum of features available for extension and integration with vertical products, that can be developed either internally, through some form of scripting (e.g. JavaScript or AppleScript for InDesign), or externally, through some API and corresponding developer kits. Other variants of database publishing are the rendering of content for direct PDF output. This approach prevents manual intervention on the final output, since PDF is not (comfortably) editable. This may not be perceived as a limitation in situations like report generation where manual editability is not needed or not desired. See also Desktop publishing Dynamic publishing Variable data printing Web-to-print References Reporting software Direct marketing Publishing Workflow technology Databases
https://en.wikipedia.org/wiki/Scientific%20Linux
Scientific Linux (SL) is a discontinued Linux distribution produced by Fermilab, CERN, DESY and by ETH Zurich. It is a free and open-source operating system based on Red Hat Enterprise Linux. This product is derived from the free and open-source software made available by Red Hat, but is not produced, maintained or supported by them. In April 2019, it was announced that feature development for Scientific Linux would be discontinued, but that maintenance will continue to be provided for the 6.x and 7.x releases through the end of their life cycles. Fermilab and CERN will utilize CentOS Stream and AlmaLinux for their deployment of 8.x release instead. History Fermilab already had a Linux distribution known as Fermi Linux, a long-term support release based on Red Hat Enterprise Linux. CERN was creating their next version of CERN Linux, also based on RHEL. CERN contacted Fermilab about doing a collaborative release. Connie Sieh was the main developer and driver behind the first prototypes and initial release. The first official release of Scientific Linux was version 3.0.1, released on May 10, 2004. In 2015, CERN began migrating away from Scientific Linux to CentOS. Scientific Linux is now maintained by a cooperative of science labs and universities. Fermilab is its primary sponsor. Design philosophy The primary purpose of Scientific Linux is to produce a common Linux distribution for various labs and universities around the world, thus reducing duplicated effort. The main goals are to have everything compatible with Red Hat Enterprise Linux with only minor additions and changes, and to allow easy customization for a site, without disturbing the Linux base. Unlike other distributions such as Poseidon Linux, it does not contain a large collection of scientific software as its name may suggest. However, it provides good compatibility to install such software. Features Scientific Linux is derived from Red Hat Enterprise Linux without protected components such as Red Hat trademarks, thus making it freely available. New releases are typically produced about two months after each Red Hat release. As well as a full distribution equal to two DVDs, Scientific Linux is also available in LiveCD and LiveDVD versions. Scientific Linux offers wireless and Bluetooth out of the box, and it comes with a comprehensive range of software, such as multimedia codecs, Samba, and Compiz, as well as servers and clients, storage clients, networking, and system administration tools. It also contains a set of tools for making custom versions, thus allowing institutions and individuals to create their own variant. Release history Historical releases of Scientific Linux are the following. Each release is subjected to a period of public testing before it is considered 'released'. Support Security updates are provided for as long as Red Hat continues to release updates and patches for their versions. See also Fermi Linux, Fermilab's own custom version of Scientific Li
https://en.wikipedia.org/wiki/Dotted%20and%20dotless%20I%20in%20computing
The Latin-derived letters dotted İ i and dotless I ı, which are distinct letters in the alphabets of a number of Turkic languages, unlike in English and most languages using the Latin script, have caused some issues in computing. Difficulties Unicode does not encode the uppercase form of dotless I and lowercase form of dotted İ separately from their base letters, and instead merges them with the upper and lower case forms of the Latin letter I respectively. John Cowan proposed disunification of plain Ii as capital letter dotless I and small letter I with dot above to make the casing more consistent. The Unicode Technical Committee had previously rejected a similar proposal because it would corrupt mapping from character sets with dotted and dotless I and corrupt data in these languages. Most Unicode software uppercases ı to I, but, unless specifically configured for Turkish, it lowercases I to i. Thus uppercasing then lowercasing changes the letters. Likewise, most Unicode software uppercases i to I, changing the letter in the process. In the Microsoft Windows SDK, beginning with Windows Vista, several relevant functions have a NORM_LINGUISTIC_CASING flag, to indicate that for Turkish and Azerbaijani locales, I should map to ı. In the LaTeX typesetting language the dotless ı can be written with the backslash-i command: \i. Dotted İ and dotless ı are problematic in the Turkish locales of several software packages, including Oracle DBMS, PHP, Java (software platform), and Unixware 7, where implicit capitalization of names of keywords, variables, and tables has effects not foreseen by the application developers. The C or US English locales do not have these problems. The .NET Framework has special provisions to handle the 'Turkish i'''. Many cellphones available in Turkey (as of 2008) lacked a proper localization, which led to replacing ı by i in SMS, sometimes severely distorting the sense of a text. In one instance, a miscommunication played a role in the deaths of Emine and Ramazan Çalçoban in 2008. A common substitution is to use the character 1 for dotless ı. This is also common in Azerbaijan (see also translit), but the meaning of words is generally understood. In some Ectaco translators, the letter İ was also treated as I (e.g. TRAFIK , when it is normally TRAFİK''). See also African reference alphabet, where a similar situation occurs, albeit with the serifs rather than the tittles. References External links Tex Texin, Internationalization for Turkish: Dotted and Dotless Letter "I", accessed 15 Nov 2005 The Turkish İ Problem and Why You Should Care | You've Been Haacked Turkish language Software bugs
https://en.wikipedia.org/wiki/Jeroen%20Tel
Jeroen Godfried Tel (born 19 May 1972), also known as WAVE, is a Dutch composer. He is best known for numerous computer game tunes he wrote in the 1980s and early 1990s for the Commodore 64. His most popular compositions appear in the following Commodore 64 games: Combat Crazy, Cybernoid, Cybernoid II, Dan Dare 3, Eliminator, Hawkeye, Myth: History in the Making, Nighthunter, Robocop 3, Rubicon (title music), and Supremacy. Maniacs of Noise Alongside Charles Deenen, who Tel met at computer meetings in Venlo, Netherlands, Tel is a founding member of the computer music group Maniacs of Noise, a company devoted to composing music and designing sound effects for videogames since 1987. He worked for several years at Funcom in Norway. In addition to being a game musician, he has composed lots of modules in the context of demo scene. Tess & Tel In late 2014 Jeroen Tel joined forces with Swedish singer and songwriter Tess Fries and formed the Pixel Pop music group Tess & Tel. They first met at a Space Invaders concert in Odense, Denmark on October 4, 2013. Tess & Tel discography Tel Me More In the summer of 2015, Tel launched a crowdfunding campaign on Indiegogo in order to produce a remix album (called 'Tel Me More') of his best C64 music. Of the $38,911 (a nod to the amount of free memory bytes when starting up a Commodore 64) goal, $27,420 was reached by a total of 699 backers. On August 8, 2015, Tel gave an update on his Indiegogo page stating that this was sufficient to create the album and deliver all the promised perks. In posts on the campaign page, he claimed to still be working on completing the project as of February 2020. However, in the beginning of February, 2022, the project was marked as closed without any comment from Jeroen. Discography Soundtracks by Jeroen Tel References External links Tess & Tel on Youtube Maniacs of Noise Website. Jeroen Tel on Amiga Music Preservation GamesArt.de Interview. Artist profile at OverClocked ReMix Indiegogo 'Tel Me More' campaign by Jeroen Tel Jeroen Tel - Artist profile at Discogs Jeroen Tel - Artist profile at VGMdb Jeroen Tel - Biography at IMDb Jeroen Tel 1972 births Living people Dutch composers Video game composers Video game musicians Commodore 64 music Demosceners People from Helmond Dutch electronic musicians Chiptune musicians 8bitpeoples artists Renoise users
https://en.wikipedia.org/wiki/Datagram%20Transport%20Layer%20Security
Datagram Transport Layer Security (DTLS) is a communications protocol providing security to datagram-based applications by allowing them to communicate in a way designed to prevent eavesdropping, tampering, or message forgery. The DTLS protocol is based on the stream-oriented Transport Layer Security (TLS) protocol and is intended to provide similar security guarantees. The DTLS protocol datagram preserves the semantics of the underlying transport—the application does not suffer from the delays associated with stream protocols, but because it uses UDP or SCTP, the application has to deal with packet reordering, loss of datagram and data larger than the size of a datagram network packet. Because DTLS uses UDP or SCTP rather than TCP, it avoids the "TCP meltdown problem", when being used to create a VPN tunnel. Definition The following documents define DTLS: for use with User Datagram Protocol (UDP), for use with Datagram Congestion Control Protocol (DCCP), for use with Control And Provisioning of Wireless Access Points (CAPWAP), for use with Stream Control Transmission Protocol (SCTP) encapsulation, for use with Secure Real-time Transport Protocol (SRTP) subsequently called DTLS-SRTP in a draft with Secure Real-Time Transport Control Protocol (SRTCP). DTLS 1.0 is based on TLS 1.1, DTLS 1.2 is based on TLS 1.2, and DTLS 1.3 is based on TLS 1.3. There is no DTLS 1.1 because this version-number was skipped in order to harmonize version numbers with TLS. Like previous DTLS versions, DTLS 1.3 is intended to provide "equivalent security guarantees [to TLS 1.3] with the exception of order protection/non-replayability". Implementations Libraries Applications Cisco AnyConnect VPN Client uses TLS and invented DTLS based VPN. OpenConnect is an open source AnyConnect-compatible client and ocserv server that supports (D)TLS. Cisco InterCloud Fabric uses DTLS to form a tunnel between private and public/provider compute environments ZScaler tunnel 2.0 uses DTLS for tunneling F5 Networks Edge VPN Client uses TLS and DTLS Citrix Systems NetScaler uses DTLS to secure UDP Web browsers: Google Chrome, Opera and Firefox support DTLS-SRTP for WebRTC. Firefox 86 and onward does not support DTLS 1.0. Vulnerabilities In February 2013 two researchers from Royal Holloway, University of London discovered a timing attack which allowed them to recover (parts of the) plaintext from a DTLS connection using the OpenSSL or GnuTLS implementation of DTLS when Cipher Block Chaining mode encryption was used. See also ZRTP Reliable User Datagram Protocol QUIC WireGuard References External links Skip to 1:07:14. Robin Seggelmann's Sample Code: echo, character generator, and discard client/servers. The Illustrated DTLS Connection Cryptographic protocols Session layer protocols Transport Layer Security Virtual private networks
https://en.wikipedia.org/wiki/Advanced%20Perl%20Programming
Advanced Perl Programming is a 1997 book by Sriram Srinivasan which covers complex techniques needed in production level Perl. The second edition, by Simon Cozens and edited by Allison Randal, was published in 2005. It contains a different set of high-level programming techniques intended for practical use, and is described at www.oreilly.com. Related books include Programming Perl, Perl Cookbook, and Perl Hacks. Reception Charles Stross called Advanced Perl Programming sections on networking and object-oriented programming "well-nigh indispensable". Eric S. Raymond called Sriram Srinivasan's commentary on the Perl language "uniformly intelligent, incisive and tasteful". Donald Bryson of Network Computing magazine called the book "full of useful information, well written, beautifully set, and technically accurate". References External links Online Catalog: Advanced Perl Programming, 1st edition Chapter One as well as the complete set of code examples in the book. 1997 non-fiction books 2005 non-fiction books O'Reilly Media books Books about Perl
https://en.wikipedia.org/wiki/Virtual%20DOS%20machine
Virtual DOS machines (VDM) refer to a technology that allows running 16-bit/32-bit DOS and 16-bit Windows programs when there is already another operating system running and controlling the hardware. Overview Virtual DOS machines can operate either exclusively through typical software emulation methods (e.g. dynamic recompilation) or can rely on the virtual 8086 mode of the Intel 80386 processor, which allows real mode 8086 software to run in a controlled environment by catching all operations which involve accessing protected hardware and forwarding them to the normal operating system (as exceptions). The operating system can then perform an emulation and resume the execution of the DOS software. VDMs generally also implement support for running 16- and 32-bit protected mode software (DOS extenders), which has to conform to the DOS Protected Mode Interface (DPMI). When a DOS program running inside a VDM needs to access a peripheral, Windows will either allow this directly (rarely), or will present the DOS program with a virtual device driver (VDD) which emulates the hardware using operating system functions. A VDM will systematically have emulations for the Intel 8259A interrupt controllers, the 8254 timer chips, the 8237 DMA controller, etc. Concurrent DOS 8086 emulation mode In January 1985 Digital Research together with Intel previewed Concurrent DOS 286 1.0, a version of Concurrent DOS capable of running real mode DOS programs in the 80286's protected mode. The method devised on B-1 stepping processor chips, however, in May 1985 stopped working on the C-1 and subsequent processor steppings shortly before Digital Research was about to release the product. Although with the E-1 stepping Intel started to address the issues in August 1985, so that Digital Research's "8086 emulation mode" worked again utilizing the undocumented LOADALL processor instruction, it was too slow to be practical. Microcode changes for the E-2 stepping improved the speed again. This early implementation can be seen as a predecessor to actual virtual DOS machines. Eventually, Concurrent DOS 286 was reworked from a potential desktop operating system to become FlexOS 286 for industrial use in 1986. It was also licensed by IBM for their 4680 OS in 1986. When Intel's 80386 with its virtual 8086 mode became available (as samples since October 1985 and in quantities since June 1986), Digital Research switched to use this to run real mode DOS programs in virtual DOS machines in protected mode under Concurrent DOS 386 1.0 (February 1987) and FlexOS 386 1.0 (June 1987). However, the architecture of these multiuser multitasking protected mode operating systems was not DOS-based by themselves. Concurrent DOS 386 was later developed to become Multiuser DOS (since 1991) and REAL/32 (since 1995). FlexOS 386 later became 4690 OS in 1993. DOS-based VDMs In contrast to these protected mode operating systems, DOS, by default, is a real-mode operating system, switching to protecte
https://en.wikipedia.org/wiki/SaGa%20Frontier
is a 1997 role-playing video game developed by Square for the PlayStation. The game was published by Sony Computer Entertainment (SCEA) in North America on March 25, 1998. It is the seventh game in the SaGa series, and the first to be released on the PlayStation. It is also the first in the series to be released under the SaGa brand outside Japan; previous overseas releases had used the Final Fantasy brand instead. A remastered version featuring additional characters, events and features was released on April 15, 2021 for Android, iOS, Nintendo Switch, PlayStation 4 and Windows. SaGa Frontier was developed by Square Production Team 2 with Akitoshi Kawazu as director and producer, Koichi Ishii as planning chief, Kenji Ito as composer, and Tomomi Kobayashi as illustrator. Square Production Team 2 included Kyoji Koizumi, Miwa Shoda, Kazuko Shibuya, and Minoru Akao. The musical score for SaGa Frontier was composed and arranged by Kenji Ito, who provided music for many previous entries in the SaGa franchise. When development began, the game's title was intended to be Romancing SaGa 4. The focus shifted from the traditional SaGa style and began to focus on several different characters on their own journeys. Nine stories were crafted, but one of them was dropped during early development because of it being too comedic. SaGa Frontier takes place in a science fantasy universe called "The Regions", a group of worlds with varying degrees of culture, unique races, technology, and magic. The game allows the player to follow the exploits of one of seven protagonists. The game's "Free Scenario System" offers a large amount of non-linear gameplay, allowing the player to freely travel between many of the Regions, interact with other characters, and take part in turn-based combat. SaGa Frontier enjoyed commercial success, having sold over one million copies. The game was generally well received in Japan and has been re-released under a few best-seller labels, as well as the PlayStation Store. However, it received largely mixed and average reviews in North America, mostly due to its ambitious Free Scenario System. Gameplay The basic concept of SaGa Frontier is based on its Free Scenario System, in which one can play as any of seven different protagonists, all of whom exist in the same setting, a solar system known as The Regions: a group of planets, each with its own culture, game-level of technology, and form of magic. The game is considered non-linear, in that from the beginning many of the characters are free to go almost anywhere and interact with almost anyone. Travel through most of the Regions is easy due to inter-regional ships traveling regularly between them. The player controls the protagonist on the field screen, a set of interconnecting pre-rendered backgrounds, and is able to speak with a slew of other characters in order to gather information, recruit party members, and initiate quests. Each character has a storyline and a main quest to fulfill,
https://en.wikipedia.org/wiki/Obliterator
Obliterator is a side-scrolling arcade adventure computer game published by Psygnosis in 1988. It was released for Amiga, Atari ST, ZX Spectrum, Amstrad CPC, and MS-DOS. The game was programmed by David H. Lawson and its graphics were made by Garvan Corbett and Jim Ray Bowers. The soundtrack was composed by David Whittaker and the cover art is by the artist Roger Dean. Plot The game begins when the main character Drak, the last of the elite genetically enhanced super soldiers known as "Obliterators", has been sent on a suicide mission to stop an invincible alien spaceship that is approaching the earth. The objective of the game is to destroy the spaceship by finding certain objects from the ship. When the self-destruction is active, Drak has to find an escape shuttle before the spaceship blows up in order to survive. Gameplay The gameplay mostly consists of Drak teleporting around the ship while searching for four symbols which are required to destroy the ship. Drak can jump, duck, and make diving rolls to avoid enemies and obstacles. Enemies start firing lasers once he enters their area. Enemies can respawn, and are mostly stationary. Drak has four weapons that are necessary to get past certain regions of the ship (Certain powerful enemies require use of Drak's more powerful weapons). Reception Obliterator was reviewed in Computer Gaming World as a fun, well-executed action game, albeit not a challenging one. The game was praised for using score not just as an arbitrary value, but also to determine the time left for the hero to escape. C-lehti (3/1988) gave five stars for Amiga version and also full ten points for its music, graphics, interest-factor and "atmosphere". The review says that the game shows that the Amiga computer is capable of delivering what users have been awaiting, using computer's capabilities in a way that makes gaming experience a visual enjoyment. The review notes that the game is relatively easy to finish but still leaves a feeling that the game was worthy of its price. A possibility to save a game state on a disk is seen as an improvement to the previous game, Barbarian, from the authors. References External links Obliterator at Atari Mania Obliterator at Lemon Amiga 1988 video games Action-adventure games Amiga games Amstrad CPC games Atari ST games DOS games Psygnosis games Run and gun games Video games scored by David Whittaker ZX Spectrum games Video games developed in the United Kingdom
https://en.wikipedia.org/wiki/Cyberdog%20%28shop%29
Cyberdog is a trance music and cyber clothing retail chain. Headquartered in Camden Market in London, it specialises in bright dance clothing, often featuring fluorescent colours and electronic components such as flashing lights. They also specialise in rave accessories such as glowsticks and other fluorescent items. About Cyberdog is a store in England that sells rave-wear and toys divided into four categories: Kawaii, Neon Clubwear, 2090s (or Futuristic), and Cybertronic. Products sold include clothing, jewelry, shoes and rave-toys. Cyberdog was founded by fashion designer Terry Davy and business manager Spiros Vlahos. They began with a small stall in Camden Market in 1994, mostly selling goa trance items and designer clothing created by Davy. The couple's pet chihuahua, "Chichi the Cyberdog", inspired the name of their store and was featured as part of its brand image. The business was successful and grew, relocating to an underground space in the Stables Market part of Camden Market. There are Cyberdog franchises in Ibiza Town, Spain, and Sharm el-Sheikh, Egypt. Stores were previously also located in Manchester (closed in February 2018), Brighton (closed in January 2019) and Basel, Switzerland (closed sometime between 2005 and 2020). In November 2012, Cyberdog announced the launch of a sister brand 'Futurelovers', selling sex toys and fetish clothing. References https://www.independent.co.uk/life-style/style-bright-things-1164572.html https://www.independent.co.uk/life-style/interiors-space-1999-1072104.html http://style.mtv.com/2013/02/04/venus-x-these-are-a-few-of-her-favorite-things/ External links Cyberdog on the Camden Town website Cyberdog on the Camden Guide Cyberdog on Instagram Cyberdog on Facebook Retail companies of the United Kingdom
https://en.wikipedia.org/wiki/C-Dance
C-Dance is a Belgian radio station broadcasting dance music. It has been operational since 1996. From 1998 to 2002, C-Dance claimed to have been the most popular dance radio network in Belgium. In more recent years, C-Dance's only remaining frequency was 105.6 FM (Antwerp region). When its FM broadcast license expired in 2017, the station went digital-only. References External links C-Dance Website Radio stations established in 1996 Internet radio stations Dutch-language radio stations in Belgium
https://en.wikipedia.org/wiki/PatternShare
PatternShare was a computer software design pattern web resource, hosted by Microsoft. Much of the work was led by Ward Cunningham, of Microsoft. In 2007 Pattern Share was taken offline. Its aim appeared to be to: bring together pattern summaries from many authors and provide a platform for discussion and further exploration of the interconnections between them. In 2007 Patternshare.org was taken offline. Reports indicate that the Patterns & Practices team at Microsoft felt that time was better spent integrating P&P principles into re-usable code libraries, as opposed to devoting resources to direct developer education. References External links Microsoft Patterns and Practices Developer Center Archive.org - Last known mirror entry Dec. 05 2006 Software design patterns
https://en.wikipedia.org/wiki/Rendering%20equation
In computer graphics, the rendering equation is an integral equation in which the equilibrium radiance leaving a point is given as the sum of emitted plus reflected radiance under a geometric optics approximation. It was simultaneously introduced into computer graphics by David Immel et al. and James Kajiya in 1986. The various realistic rendering techniques in computer graphics attempt to solve this equation. The physical basis for the rendering equation is the law of conservation of energy. Assuming that L denotes radiance, we have that at each particular position and direction, the outgoing light (Lo) is the sum of the emitted light (Le) and the reflected light (Lr). The reflected light itself is the sum from all directions of the incoming light (Li) multiplied by the surface reflection and cosine of the incident angle. Equation form The rendering equation may be written in the form where is the total spectral radiance of wavelength directed outward along direction at time , from a particular position is the location in space is the direction of the outgoing light is a particular wavelength of light is time is emitted spectral radiance is reflected spectral radiance is an integral over is the unit hemisphere centered around containing all possible values for where is the bidirectional reflectance distribution function, the proportion of light reflected from to at position , time , and at wavelength is the negative direction of the incoming light is spectral radiance of wavelength coming inward toward from direction at time is the surface normal at is the weakening factor of outward irradiance due to incident angle, as the light flux is smeared across a surface whose area is larger than the projected area perpendicular to the ray. This is often written as . Two noteworthy features are: its linearity—it is composed only of multiplications and additions, and its spatial homogeneity—it is the same in all positions and orientations. These mean a wide range of factorings and rearrangements of the equation are possible. It is a Fredholm integral equation of the second kind, similar to those that arise in quantum field theory. Note this equation's spectral and time dependence — may be sampled at or integrated over sections of the visible spectrum to obtain, for example, a trichromatic color sample. A pixel value for a single frame in an animation may be obtained by fixing motion blur can be produced by averaging over some given time interval (by integrating over the time interval and dividing by the length of the interval). Note that a solution to the rendering equation is the function . The function is related to via a ray-tracing operation: The incoming radiance from some direction at one point is the outgoing radiance at some other point in the opposite direction. Applications Solving the rendering equation for any given scene is the primary challenge in realistic rendering. One approach to solving the e
https://en.wikipedia.org/wiki/Home%20Computer%20Initiative
The Home Computing Initiative (HCI) was a UK Government program which allowed employers to provide personal computers, software and computer peripherals to their employees without the benefit being taxed as a salary. The HCI was introduced in 1999 to improve the IT literacy of the British workforce. It was also aimed at bridging Britain's digital divide - the increasing gap between those who have access to, and the skills to use, information technology, and those who do not. The program gained traction after four years, in 2003 after it was re-branded. The Trade Union Congress and the Department of Trade and Industry also made the initiative more user-friendly by publishing standard guideline that employers could easily adopt. The HCI program was a lease agreement between the employer and the employee. The agreement usually lasted for three years, costing a maximum of £500 a year. At the end of the lease period, the employee was given the option to purchase the computer at its market value, which was typically £10 at that time. The HCI scheme was very popular. More than 1250 firms, employing 4.5 million people, had adopted the scheme. Discontinuation On 23 March 2006, in his UK Budget, Chancellor Gordon Brown announced the removal of HCI tax exemption for employer-loaned computers. the HCI program was discontinued. The move was made without any consultation with the employers or employees' bodies, a stark contrast to the extensive consultation that preceded its creation. The Treasury of the United Kingdom made initial claims that the scheme's consumers were being dominated by higher-rate taxpayers. However, research by the HCI Alliance found that 75% of employees who purchased personal computers through the HCI were basic or starting rate taxpayers and 50% were "blue collar" workers. The HCI Alliance, created in 2003, was a group of industry leaders who worked together with the UK Government. Their aim was to increase access to personal computing in the UK. Another reason for the HCI being cancelled was that computers had become relatively more affordable. Most people in the workplace had access to computers and therefore, the purpose of the scheme had been achieved. In the days following the budget announcement, a significant lobbying campaign ensued, resulting in the treasury announcing that it would consider alternatives to HCI in its current format rather than disbanding it altogether. This led to the creation of the Educational Technology Allowance. Educational Technology Allowance In 2008, the Gordon Brown administration announced the £300 million Educational Technology Allowance incentive. The program granted up to £700 to low-income households with schooling children who had no internet access at home. The policy was aimed towards helping approximately 1.4 million children who did not have access to a broadband connection at home. The program was piloted in two local authority areas in 2010 and was completely rolled out across En
https://en.wikipedia.org/wiki/Electronic%20flight%20instrument%20system
In aviation, an electronic flight instrument system (EFIS) is a flight instrument display system in an aircraft cockpit that displays flight data electronically rather than electromechanically. An EFIS normally consists of a primary flight display (PFD), multi-function display (MFD), and an engine indicating and crew alerting system (EICAS) display. Early EFIS models used cathode ray tube (CRT) displays, but liquid crystal displays (LCD) are now more common. The complex electromechanical attitude director indicator (ADI) and horizontal situation indicator (HSI) were the first candidates for replacement by EFIS. Now, however, few flight deck instruments cannot be replaced by an electronic display. Display units Primary flight display (PFD) On the flight deck, the display units are the most obvious parts of an EFIS system, and are the features that lead to the term glass cockpit. The display unit that replaces the artificial horizon is called the primary flight display (PFD). If a separate display replaces the HSI, it is called the navigation display. The PFD displays all information critical to flight, including calibrated airspeed, altitude, heading, attitude, vertical speed and yaw. The PFD is designed to improve a pilot's situational awareness by integrating this information into a single display instead of six different analog instruments, reducing the amount of time necessary to monitor the instruments. PFDs also increase situational awareness by alerting the aircrew to unusual or potentially hazardous conditions — for example, low airspeed, high rate of descent — by changing the color or shape of the display or by providing audio alerts. The names Electronic Attitude Director Indicator and Electronic Horizontal Situation Indicator are used by some manufacturers. However, a simulated ADI is only the centerpiece of the PFD. Additional information is both superimposed on and arranged around this graphic. Multi-function displays can render a separate navigation display unnecessary. Another option is to use one large screen to show both the PFD and navigation display. The PFD and navigation display (and multi-function display, where fitted) are often physically identical. The information displayed is determined by the system interfaces where the display units are fitted. Thus, spares holding is simplified: the one display unit can be fitted in any position. LCD units generate less heat than CRTs; an advantage in a congested instrument panel. They are also lighter, and occupy a lower volume. Multi-function display (MFD) The MFD (multi-function display) displays navigational and weather information from multiple systems. MFDs are most frequently designed as "chart-centric", where the aircrew can overlay different information over a map or chart. Examples of MFD overlay information include the aircraft's current route plan, weather information from either on-board radar or lightning detection sensors or ground-based sensors, e.g., NEXRAD,
https://en.wikipedia.org/wiki/Cyberpunk%20derivatives
Since the advent of the cyberpunk genre, a number of cyberpunk derivatives have become recognized in their own right as distinct subgenres in speculative fiction, especially in science fiction. Rather than necessarily sharing the digitally and mechanically focused setting of cyberpunk, these derivatives can display other futuristic, or even retrofuturistic, qualities that are drawn from or analogous to cyberpunk: a world built on one particular technology that is extrapolated to a highly sophisticated level (this may even be a fantastical or anachronistic technology, akin to retrofuturism), a gritty transreal urban style, or a particular approach to social themes. Steampunk, one of the most well-known of these subgenres, has been defined as a "kind of technological fantasy;" others in this category sometimes also incorporate aspects of science fantasy and historical fantasy. Scholars have written of the stylistic place of these subgenres in postmodern literature, as well as their ambiguous interaction with the historical perspective of postcolonialism. Background American author Bruce Bethke coined the term cyberpunk in his 1983 short story of that name, using it as a label for a generation of "punk" teenagers inspired by the perceptions inherent to the Information Age. The term was quickly appropriated as a label applied to the works of William Gibson, Bruce Sterling, John Shirley, Rudy Rucker, Michael Swanwick, Pat Cadigan, Lewis Shiner, Richard Kadrey, and others. Science fiction author Lawrence Person, in defining postcyberpunk, summarized the characteristics of cyberpunk: Classic cyberpunk characters were marginalized, alienated loners who lived on the edge of society in generally dystopic futures where daily life was impacted by rapid technological change, an ubiquitous datasphere of computerized information, and invasive modification of the human body. The cyberpunk style describes the nihilistic and underground side of the digital society that developed from the last two decades of the 20th century. The cyberpunk world is dystopian, that is, it is the antithesis of utopian visions, very frequent in science fiction produced in the mid-twentieth century, typified by the world of Star Trek, although incorporating some of these utopias. It is sometimes generically defined as "cyberpunk-fantasy" or "cyberfantasy" a work of a fantasy genre that concerns the internet or cyberspace. Among the best known exponents are commonly indicated William Gibson, for his highly innovative and distinctive stories and novels from a stylistic and thematic point of view, and Bruce Sterling, for theoretical elaboration. Sterling later defined cyberpunk as “a new type of integration. The overlapping of worlds that were formally separated: the realm of high tech and modern underground culture. The relevance of cyberpunk as a genre to punk subculture is debatable and further hampered by the lack of a defined 'cyberpunk' subculture. Where the small 'cyber' movem
https://en.wikipedia.org/wiki/National%20Negro%20Network
The National Negro Network was a black-oriented radio programming service in the United States founded on January 20, 1954 by Chicago advertiser W. Leonard Evans, Jr. It was the first black-owned radio network in the country, and its programming was broadcast on up to 45 affiliates. An article in the trade publication Broadcasting said that the network was expected "to reach approximately 12 million of the 15 million Negroes in America." Evans was the network's president. Reggie Schuebel was vice president-treasurer, and John M. Wyatt was executive vice president. The network featured a variety of different programming, including a popular soap opera The Story of Ruby Valentine, which was based on CBS's We Love and Learn and As the Twig is Bent, and starred Juanita Hall, Ruby Dee and Terry Carter. The serial was sponsored by, among others, Philip Morris and Pet Milk. Other short-lived series included The Life of Anna Lewis with Hilda Simms, and It's A Mystery Man with Cab Calloway. Some shows were produced by Calloway and Ethel Waters. Other fare included broadcasts of symphony concerts from black colleges, and programs hosted by black DJs at affiliate stations. The network drew up plans for several more series, but—with the TV era exploding—fell apart within a year due to inadequate capital. Jason Chambers wrote in his book, Madison Avenue and the Color Line: African Americans in the Advertising Industry, that Evans felt that advertising agencies were hesitant to recommend NNN to clients. "Agencies are aware of our existence and watch our growth closely," Evans said, "but ... are still reluctant to come right out and make a recommendation [for using] Negro radio, preferring to keep campaigns at a 'test' level while watching to see what others do." Notes, References 1954 establishments in the United States African-American cultural history Defunct radio networks in the United States Defunct radio stations in the United States Radio stations established in 1954 1955 disestablishments in the United States Radio stations disestablished in 1955
https://en.wikipedia.org/wiki/L%27Arche
L'Arche ("The Ark") is an international federation of Non-profit organisations working to create networks of community where people with and without intellectual disabilities live and work together. Founded in 1964 by Jean Vanier, Raphaël Simi, and Philip Seux, L'Arche emerged as a reaction and community-based alternative to the ill-treatment and dismal living conditions in the psychiatric institutions of the 1960s. Initially formed in the French commune of Trosly-Breuil, it subsequently expanded to over 150 communities in 38 countries worldwide. L'Arche is a faith-based organization rooted in Christianity, but is open to people of any faith and people with no religious affiliation. History In 1964, through his friendship with Thomas Philippe, a Roman Catholic priest of the Dominican Order, Vanier became aware of the plight of thousands of people institutionalized with developmental disabilities. Vanier felt led by God to invite two men, Raphael Simi and Philippe Seux, to leave the institutions where they resided and share their lives with him in a household in Trosly-Breuil, France. He named their home "L'Arche", which is French for "The Ark", as in Noah's Ark. A collection of audiovisual material from L'Arche Trosly-Breuil is available at the University of St. Michael's College at the University of Toronto. The first community in Canada, L'Arche Daybreak, was founded in 1969 in Richmond Hill, Ontario, near Toronto. Sue Mosteller, who lived with the Daybreak community for 40 years, acted as L'Arche's first International Coordinator after Jean Vanier. Dutch priest and spiritual writer Henri Nouwen also lived with the Daybreak community for several years until his death in 1996. He wrote about his experiences with Jean Vanier, L'Arche and the Daybreak community in his books The Road to Daybreak: A Spiritual Journey and Adam: God's Beloved. The institutional and community archives of the Daybreak community are located at the St. Michael's College, Toronto. The first community in the UK was founded in 1973 in Barfrestone, Kent, through the efforts of Jean Vanier's sister, Thérèse Vanier. L'Arche Kent has since grown into a community of three traditional L'Arche houses, a gardening project called "The Glebe" and supported living apartments for twelve people with disabilities. Although L'Arche communities are found in many different cultures and reflect the ethnic and religious composition of the locales in which they exist, they share a common philosophy and approach. People with developmental disabilities and those who assist them live and work together to create homes. The L'Arche Charter says, "In a divided world, L'Arche wants to be a sign of hope. Its communities, founded on covenant relationships between people of differing intellectual capacity, social origin, religion and culture, seek to be signs of unity, faithfulness and reconciliation." The charter further outlines the objectives, the principles and the identity of L'Arche. All th
https://en.wikipedia.org/wiki/DeskStation%20Technology
DeskStation Technology was a manufacturer of RISC-based computer workstations intended to run Windows NT. DeskStation was based in Lenexa, Kansas. AMD Am29000-based systems DeskStation announced a range of motherboards for systems based on the AMD Am29000 processor in 1991. These ranged from the Model 162 with a 16 MHz processor achieving a claimed 9 MIPS and costing $2,495 to the Model 252 with a 25 MHz processor achieving 14 MIPS and costing $3,495. MIPS-based systems In late 1991, DeskStation announced a workstation based on the MIPS R3000A CPU, the IceStation 3000, that was to be the basis of a product compliant with the Advanced Computing Environment (ACE) specification, with this workstation already existing in prototype form and with early production models to be made available for beta-testing within a matter of weeks. However, at that time, none of the operating systems featured in the ACE specification were available: Windows NT being expected in early 1992 and the ACE-targeted SCO Unix product expected in late 1992. Consequently, DeskStation hoped to license Ultrix from Digital as an interim measure, aiming to provide binary compatibility with the eventual SCO product. The workstation featured a system architecture incorporating ISA and TURBOchannel buses, along with a "private peripheral bus" offering 32-bit data transfers. A range of ports were provided - serial, parallel, audio and mouse ports - along with floppy and hard drive controllers. SCSI ports and drives, a CD-ROM drive, modem ports, internally fitted modems, and an Ethernet port were to be offered as options. 8 MB of RAM was specified, upgradeable to 64 MB. Two configurations were to be offered: a lower-priced configuration and a standard configuration, respectively offering 25 MHz and 33 MHz R3000A CPUs, hard drives of 150 MB and 210 MB, being delivered with 14-inch and 17-inch colour monitors, and being priced at $4,995 and $7,995. Although the workstation's CPU could not be upgraded, a future product with an upgradeable CPU module and using the EISA bus was planned. Subsequently, in 1993 and with Windows NT in beta testing, DeskStation introduced a range of workstation models in the Evolution RISC PC line, such as the rPC/40 and rPC/44, based on the R4000 and R4400 CPUs respectively. Configured with 16 MB of RAM, 512 KB of secondary cache memory, floppy drive, and 200 MB hard drive, the systems were fitted with a video adapter from S3 Graphics and were bundled with 14-inch colour monitors. The rPC/40 was priced at $3,995 and the rPC/44 at $4,995, aiming to compete with similarly priced Intel 80486-based machines running Windows NT. The most highly-specified model upon review in 1993, the rPC 444e/100, came with 64 MB of RAM, a 21-inch monitor, 500 MB SCSI hard drive and CD-ROM drive, costing $9,995. These models conformed to the ARC computer specification (and implemented the associated firmware), but ARC was used by vendors like DeskStation "only as a starting point"