source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/Brian%20Randell | Brian Randell DSc FBCS FLSW (born 1936) is a British computer scientist, and emeritus professor at the School of Computing, Newcastle University, United Kingdom. He specialises in research into software fault tolerance and dependability, and is a noted authority on the early pre-1950 history of computing hardware.
Biography
Randell was employed at English Electric from 1957 to 1964 where he was working on compilers. His work on ALGOL 60 is particularly well known, including the development of the Whetstone compiler for the English Electric KDF9, an early stack machine. In 1964, he joined IBM, where he worked at the Thomas J. Watson Research Center on high performance computer architectures and also on operating system design methodology. In May 1969, he became a professor of computing science at the then named University of Newcastle upon Tyne, where he has worked since then in the area of software fault tolerance and dependability.
He is a member of the Special Interest Group on Computers, Information and Society (SIGCIS) of the Society for the History of Technology CIS, and a founding member of the Editorial Board of the IEEE Annals of the History of Computing journal. He is a Fellow of the Association for Computing Machinery (2008). He was elected a Fellow of the Learned Society of Wales in 2011.
He was, until 1969, a member of the International Federation for Information Processing (IFIP) IFIP Working Group 2.1 (WG2.1) on Algorithmic Languages and Calculi, which specified, maintains, and supports the programming languages ALGOL 60 and ALGOL 68. He is also a founding member of IFIP WG2.3 on Programming Methodology, and of IFIP WG10.4 on Dependability and Fault Tolerance.
He is married (to Liz, a teacher of French) and has four children.
Work
Brian Randell's main research interests are in the field of computer science, specifically on system dependability and fault tolerance. His interest in the history of computing was started by coming across the then almost unknown work of Percy Ludgate. This was over thirty years ago, when he was preparing an inaugural lecture, and led to his producing the book: "The Origins of Computers". This triggered his further investigation of the Colossus wartime code-breaking machines.
Bletchley Park
In 1972, Randell wrote to Prime Minister Ted Heath regarding the wartime status of Bletchley Park, and obtained the first-ever admission of the existence of the wartime organisation, let alone its impact. Subsequently, the role of Bletchley Park and its main outstation at Eastcote, in reducing the length of World War II, has been widely acknowledged, as is the pioneering role of the Colossus computer in the history of the development of computing.
Randell was researching the history of computer science in Britain for a conference on the history of computing held at the Los Alamos National Laboratory, New Mexico on 10-15 June 1976, and got permission to present a paper on wartime development of the COLOSSI at the |
https://en.wikipedia.org/wiki/Ascii85 | Ascii85, also called Base85, is a form of binary-to-text encoding developed by Paul E. Rutter for the btoa utility. By using five ASCII characters to represent four bytes of binary data (making the encoded size larger than the original, assuming eight bits per ASCII character), it is more efficient than uuencode or Base64, which use four characters to represent three bytes of data ( increase, assuming eight bits per ASCII character).
Its main modern uses are in Adobe's PostScript and Portable Document Format file formats, as well as in the patch encoding for binary files used by Git.
Overview
The basic need for a binary-to-text encoding comes from a need to communicate arbitrary binary data over preexisting communications protocols that were designed to carry only English language human-readable text. Those communication protocols may only be 7-bit safe (and within that avoid certain ASCII control codes), and may require line breaks at certain maximum intervals, and may not maintain whitespace. Thus, only the 94 printable ASCII characters are "safe" to use to convey data.
Eighty-five is the minimum integral value of n such that ; so any sequence of 4 bytes can be encoded as 5 symbols, as long as at least 85 distinct symbols are available. (Five radix-85 digits can represent the integers from 0 to 4 437 053 124 inclusive, which suffice to represent all 4 294 967 296 possible 4-byte sequences.)
Encoding
When encoding, each group of 4 bytes is taken as a 32-bit binary number, most significant byte first (Ascii85 uses a big-endian convention). This is converted, by repeatedly dividing by 85 and taking the remainder, into 5 radix-85 digits. Then each digit (again, most significant first) is encoded as an ASCII printable character by adding 33 to it, giving the ASCII characters 33 (!) through 117 (u).
Because all-zero data is quite common, an exception is made for the sake of data compression, and an all-zero group is encoded as a single character z instead of !!!!!.
Groups of characters that decode to a value greater than (encoded as s8W-!) will cause a decoding error, as will z characters in the middle of a group. White space between the characters is ignored and may occur anywhere to accommodate line-length limitations.
Limitations
The original specification only allows a stream that is a multiple of 4 bytes to be encoded.
Encoded data may contain characters that have special meaning in many programming languages and in some text-based protocols, such as left-angle-bracket <, backslash \, and the single and double quotes ' & ". Other base-85 encodings like Z85 and are designed to be safe in source code.
History
btoa version
The original btoa program always encoded full groups (padding the source as necessary), with a prefix line of "xbtoa Begin", and suffix line of "xbtoa End", followed by the original file length (in decimal and hexadecimal) and three 32-bit checksums. The decoder needs to use the file length to see how much of the gro |
https://en.wikipedia.org/wiki/ContactPoint | ContactPoint was a government database in England that provided a way for those working with children and young people to find out who else is working with the same child or young person, making it easier to deliver more coordinated support. It was created in response to the abuse and death of eight-year-old Victoria Climbié in 2000 in England. Various agencies involved in her care had failed to prevent her death, in particular by individually never realising other agencies had been in contact with Victoria.
ContactPoint aimed to improve child protection by improving the way information about children was shared between services. It was designed by Capgemini and previously had the working titles of Information Sharing Index (or IS Index or ISI) and the Children's Index. The database, created under the Children Act 2004, cost £224m to set up and £41m a year to run. It operated in 150 local authorities, and was accessible to at least 330,000 users.
The database was heavily criticised by a wide range of groups, mainly for privacy, security and child protection reasons. On 12 May 2010 the new UK Coalition Government announced plans to scrap ContactPoint and on 6 August 2010 the database was shut down. From that date the Children Act 2004 Information Database (England) Regulations 2007, as amended in 2010, no longer applies.
Motivation
In April 1999, Victoria Climbié (born 2 November 1991 in Abobo, Côte d'Ivoire, died 25 February 2000 at St. Mary's Hospital, London) and her great aunt Marie-Thérèse Kouao arrived in London, sent by her parents for a chance of an education. A few months later, Kouao met Carl Manning on a bus which he was driving, and she and Victoria moved into his flat. It was here that she was abused, including being beaten with hammers, bike chains, and wires; being forced to sleep in a bin liner in the bath; and being tied up for periods of over 24 hours. In the period leading up to her death, the police, the social services of many local authorities, the NHS, the NSPCC, and local churches all had contact with her, and noted the signs of abuse. However, in what the judge in the trial following Victoria's death described as "blinding incompetence", all failed to properly investigate the abuse and little action was taken. On 24 February 2000, Victoria was admitted into an accident-and-emergency department, semi-unconscious and suffering from hypothermia, multiple organ failure and malnutrition. She died the next day, aged eight. On 20 November 2000, her guardians, Marie Thérèse Kouao and Carl Manning, were charged with child cruelty and murder; on 12 January 2001, both were found guilty, and sentenced to life imprisonment.
Victoria's death led to a public inquiry, launched on 31 May 2001 and chaired by Herbert Laming, which investigated the role of the agencies involved in her care. The report, published on 28 January 2003, found that the agencies involved in her care failed to protect her and that on at least 12 occasions, worke |
https://en.wikipedia.org/wiki/AES | AES may refer to:
Businesses and organizations
Companies
AES Corporation, an American electricity company
AES Data, former owner of Daisy Systems Holland
AES Eletropaulo, a former Brazilian electricity company
AES Andes, formerly AES Gener, a Chilean electricity company
AES Hawaii, an American electricity company
American Education Services, part of the Pennsylvania Higher Education Assistance Agency
Asian Educational Services, an Indian publisher
Schools
Academy of Environmental Science, in Crystal River, Florida, U.S.
AES Algiers, in Algeria
American Embassy School, in New Delhi, India
Ascension Episcopal School, in Louisiana, U.S.
Assumption English School, in Bukit Panjang, Singapore
Other organizations
AES Group, now AES+F, a Russian artist collective
Amateur Entomologists' Society, a British organisation
American Elasmobranch Society, a professional society
American Epilepsy Society, an American professional society for epilepsy
Audio Engineering Society, an American professional society
Science and technology
Acoustic echo suppression, in telephony
Advanced electronic signature, an EU-compliant electronic signature system (alternatively AdES)
Advanced Encryption Standard, or Rijndael, a specification for the encryption of electronic data
Agricultural experiment station, a scientific research center
Algebraic entry system, a calculator input method
Alkaline earth silicate, a mineral wool
Application Environment Services, a component of GEM (desktop environment)
Atomic emission spectroscopy, a method of chemical analysis
Auger electron spectroscopy, in surface chemistry and materials science
Automated Enforcement System, a road safety enforcement system in Malaysia
Automated essay scoring, the use of computers to assign grades
Automated Export System, an American exports information system
AES (Advanced Entertainment System), a version of the Neo Geo
Automatic Extinguishing System Automatic fire suppression
Other uses
"Aes", a 1999 song by Skepticism
AES Railcar, a Chilean railcar
Ålesund Airport, Vigra, Norway, IATA airport code AES
Alsea language, ISO 639-3 code aes
Alternative Economic Strategy, an economic strategy proposed in the 1970s by British politician Tony Benn
Actually existing socialism, a catchphrase coined by Leonid Brezhnev to refer to Soviet-style economic planning
See also |
https://en.wikipedia.org/wiki/Selmer%20Bringsjord | Selmer Bringsjord (born November 24, 1958) is the chair of the Department of Cognitive Science at Rensselaer Polytechnic Institute and a professor of Computer Science and Cognitive Science. He also holds an appointment in the Lally School of Management & Technology and teaches artificial Intelligence (AI), formal logic, human and machine reasoning, and philosophy of AI.
Bringsjord's education includes a B.A. in Philosophy from the University of Pennsylvania and a Ph.D. in Philosophy from Brown University. He conducts research in AI as the director of the Rensselaer AI & Reasoning Laboratory (RAIR). He specializes in the logico-mathematical and philosophical foundations of AI and cognitive science, and in collaboratively building AI systems on the basis of computational logic.
Bringsjord believes that "the human mind will forever be superior to AI", and that "much of what many humans do for a living will be better done by indefatigable machines who require not a cent in pay". Bringsjord has stated that the "ultimate growth industry will be building smarter and smarter such machines on the one hand, and philosophizing about whether they are truly conscious and free on the other".
Bringsjord has an argument for P = NP using digital physics. Other research includes developing a new computational-logic framework allowing the formalization of deliberative multi-agent "mindreading" as applied to the realm of nuclear strategy, with the goal of creating a model and simulation to enable reliable prediction. He has published an opinion piece advocating for counter-terrorism security ensured by pervasive, all-seeing sensors; automated reasoners; and autonomous, lethal robots.
Prof. Selmer Bringsjord received a National Science Foundation award to research Social Robotics and the Covey Award for the advancement of philosophy of computing awarded by the International Association for Computing And Philosophy, among several others prizes.
Books authored
with Yang, Y. Mental Metalogic: A New, Unifying Theory of Human and Machine Reasoning (Mahwah, NJ: Lawrence Erlbaum).(2007)
with Zenzen, M. Superminds: People Harness Hypercomputation, and More (Dordrecht, The Netherlands: Kluwer). (2003)
with Ferrucci, D. Artificial Intelligence and Literary Creativity: Inside the Mind of Brutus, A Storytelling Machine (Mahwah, NJ: Lawrence Erlbaum).(2000)
Abortion: A Dialogue (Indianapolis, IN: Hackett).(1997)
What Robots Can and Can’t Be (Dordrecht, The Netherlands: Kluwer).(1992)
Soft Wars (New York, NY: Penguin USA). A novel.(1991)
Footnotes
External links
Department of Cognitive Science at Rensselaer Polytechnic Institute
Rensselaer AI & Reasoning Lab
Selmer Bringsjord Personal web site at Rensselaer Polytechnic Institute
1958 births
Living people
American computer scientists
Artificial intelligence researchers
Human–computer interaction researchers
American technology writers
Machine learning researchers
Rensselaer Polytechnic Institute faculty
University of Penns |
https://en.wikipedia.org/wiki/Dancin%27%20Homer | "Dancin' Homer" is the fifth episode of the second season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on November 8, 1990. In the episode, Homer becomes the Springfield Isotopes' new mascot after firing up the crowd at a baseball game. When the Isotopes start a winning streak, Homer becomes the mascot for the Capital City Capitals. The Simpsons move there but return home after Homer fails to enthrall the big-city crowd.
The episode was written by Ken Levine and David Isaacs and directed by Mark Kirkland. It was Kirkland's first directing role, and he has since directed many episodes. Singer Tony Bennett guest starred as himself and actor Tom Poston guest starred as the Capital City Capitals' mascot, the Capital City Goofball.
Since airing, the episode has received mostly positive reviews from television critics. It acquired a Nielsen rating of 14.9, and was the highest-rated show on the Fox network the week it aired.
Plot
One night while drinking beer at Moe's Tavern, Homer tells the story of his big break. The Simpsons attend a home game of the Springfield Isotopes, the town's minor league baseball team, as part of an outing sponsored by the Springfield Nuclear Power Plant. Homer fears that his chance to have any fun at the game are ruined when his boss, Mr. Burns sits next to him; to his surprise, though, Burns buys him several beers and the two men enjoy taunting the Isotopes. When a drunk Homer does an impromptu dance to the tune of "Baby Elephant Walk," the crowd responds with enthusiasm and the Isotopes go on to win the game, breaking the longest losing streak in professional baseball.
Homer is hired as the Isotopes' mascot, spurring the team to a winning streak. Their next loss causes Homer to worry that he will be fired, but he is instead offered a chance to perform during the major-league games played in Capital City by its team, the Capitals. He is to fill in for their mascot, the Capital City Goofball, during portions of each game. The Simpsons pack their belongings, say goodbye to their friends, and move to Capital City. However, Homer's first performance fails to impress the crowd; he is fired immediately afterward, and the family moves back to Springfield.
As Homer finishes his story, he finds Moe and all the customers enthralled and asking to hear it again. He wonders why tales of misfortune are so popular.
Production
The episode was written by Ken Levine and David Isaacs, and directed by Mark Kirkland. It was the first episode of The Simpsons Kirkland directed. He has since directed over 50 episodes. Levine, a former minor league baseball announcer, pitched the idea of using that sport as a background, and once he came up with Homer as a dancing mascot, producer Sam Simon was initially resistant given Bart had been the biggest draw of the series, only for the writers to reply they found Homer a more fun character to write. Executive producer James L. B |
https://en.wikipedia.org/wiki/Star%20Wars%20%281991%20video%20game%29 | Star Wars is an action game based on the film Star Wars. It was released by Victor Musical Industries for the Family Computer in Japan on November 15, 1991 and by JVC Musical Industries for the Nintendo Entertainment System in North America in November 1991 and in Europe on March 26, 1992. An official mail order "Hint Book" was available for the game upon its release.
Two versions for handheld game consoles were released. The Game Boy port was developed by NMS Software and published by Capcom and released shortly less than a year later in 1992. The Game Gear port was developed by Tiertex Design Studios and published by U.S. Gold and released in 1993. A Master System version was also released.
The game was followed by a sequel, Star Wars: The Empire Strikes Back, but an NES game adaptation of Return of the Jedi was never realized. A counterpart of the game for the Super NES, Super Star Wars, was released as well. On June 28, 2019, the NES and Game Boy versions were officially re-released in both standard and Collector's Edition sets with Disney and Lucasfilm's approval in limited quantities on unlicensed replica game cartridges by Limited Run Games.
Gameplay
The game follows a sequence of events close to the storyline of Star Wars, where Luke Skywalker has to pilot a landspeeder around Tatooine, collect R2-D2 from the Sandcrawler, Obi-Wan Kenobi from a cave, and Han Solo from the Mos Eisley bar, while fighting stormtroopers, sand people, and many other different enemy characters from the movies. After assembling all the characters, the player navigates the Millennium Falcon in a first-person perspective through an asteroid field to the Death Star (shields for the Millennium Falcon to withstand the asteroid field must also be collected in the Tatooine levels). Once arriving at the Death Star, the player is required to destroy the tractor beam generator, rescue Princess Leia from the detention block, then proceed to destroy the Death Star with the rebel fighters.
The Game Gear version has a few exclusive levels. The first level has Leia delivering the stolen plans to R2-D2. The speeder overworld is replaced with three side-scrolling levels through the desert where Luke has to travel on foot.
Each character has different attributes. Han Solo and Leia can also be used to replace Luke in gameplay, but unlike Luke who has numerous lives, Han and Leia only have one life each. Obi-Wan Kenobi can resurrect Han Solo or Princess Leia five times (in the Game Gear and Master System versions, the player is even required to kill and resurrect them in order to earn the last 10% completion points and see the ending), R2-D2 can display a map of the Death Star hallways, and C-3PO can provide information on the current part of the game. Darth Vader makes his only appearance on the Game Over screen.
Chewbacca appears at the end of the Game Boy version, and is mentioned in passing a few times. It is noted in the instruction manual that Chewie flies the Millenniu |
https://en.wikipedia.org/wiki/Computational%20intelligence | The expression computational intelligence (CI) usually refers to the ability of a computer to learn a specific task from data or experimental observation. Even though it is commonly considered a synonym of soft computing, there is still no commonly accepted definition of computational intelligence.
Generally, computational intelligence is a set of nature-inspired computational methodologies and approaches to address complex real-world problems to which mathematical or traditional modelling can be useless for a few reasons: the processes might be too complex for mathematical reasoning, it might contain some uncertainties during the process, or the process might simply be stochastic in nature. Indeed, many real-life problems cannot be translated into binary language (unique values of 0 and 1) for computers to process it. Computational Intelligence therefore provides solutions for such problems.
The methods used are close to the human's way of reasoning, i.e. it uses inexact and incomplete knowledge, and it is able to produce control actions in an adaptive way. CI therefore uses a combination of five main complementary techniques. The fuzzy logic which enables the computer to understand natural language, artificial neural networks which permits the system to learn experiential data by operating like the biological one, evolutionary computing, which is based on the process of natural selection, learning theory, and probabilistic methods which helps dealing with uncertainty imprecision.
Except those main principles, currently popular approaches include biologically inspired algorithms such as swarm intelligence and artificial immune systems, which can be seen as a part of evolutionary computation, image processing, data mining, natural language processing, and artificial intelligence, which tends to be confused with Computational Intelligence. But although both Computational Intelligence (CI) and Artificial Intelligence (AI) seek similar goals, there's a clear distinction between them.
Computational Intelligence is thus a way of performing like human beings. Indeed, the characteristic of "intelligence" is usually attributed to humans. More recently, many products and items also claim to be "intelligent", an attribute which is directly linked to the reasoning and decision making.
History
Source:
The notion of Computational Intelligence was first used by the IEEE Neural Networks Council in 1990. This Council was founded in the 1980s by a group of researchers interested in the development of biological and artificial neural networks. On November 21, 2001, the IEEE Neural Networks Council became the IEEE Neural Networks Society, to become the IEEE Computational Intelligence Society two years later by including new areas of interest such as fuzzy systems and evolutionary computation, which they related to Computational Intelligence in 2011 (Dote and Ovaska).
But the first clear definition of Computational Intelligence was introduced by Bezdek in 199 |
https://en.wikipedia.org/wiki/MiG-29%3A%20Soviet%20Fighter | MiG-29: Soviet Fighter is a shoot 'em up game developed by Codemasters in 1989 and released for several contemporary home computers. An unlicensed version was also released for the Nintendo Entertainment System by Camerica.
Gameplay
The player plays the role of a Soviet MiG-29 fighter pilot. The object of the game is to defeat the World Terrorist Army. It is similar in style to After Burner. MiG-29 cartridges have a small switch in the back to make the game compatible with U.S. and European systems.
Development
The original version of the game was written for the ZX Spectrum by Richard Chaney while he was a pupil at Wolfreton School, Hull, UK. Updated graphics and sound were later added by Codemasters. The ten names on the high score table are pupils in Richard's form at the school, giving away the game's home-grown origins.
References
External links
1989 video games
Amiga games
Amstrad CPC games
Atari ST games
Codemasters games
Commodore 64 games
Unauthorized video games
Nintendo Entertainment System games
Single-player video games
Video games scored by Allister Brimble
ZX Spectrum games
Video games developed in the United Kingdom
Camerica games |
https://en.wikipedia.org/wiki/Cyberball | is a video game released in arcades in 1988 by Atari Games. The game is a 7-man American football using robotic avatars of different speeds, sizes, and skill sets set in the year 2022. Originally released for arcades, Cyberball was ported to several home consoles and computers.
In 1988, Atari released the original Cyberball arcade game as a large cabinet with two monitors, each with two sets of controls for one or two players. Players on each side could play against computer opponents or head-to-head on opposing monitors for a maximum of four players. In 1989, Atari Games released a sequel to the original Cyberball in both the same large dual-monitor cabinet titled Tournament Cyberball 2072 as well as a stand-alone two-player cabinet titled Cyberball 2072. The sequel included improved game play, which included refined player movements and many more offensive plays and defensive formations, and changed its setting to 2072. Also shipped in 1989 were several conversion kits to modify existing cabinets to Tournament Cyberball 2072 or the 2-player-only Cyberball 2072.
Gameplay
The game replaces the standard downs system with an explosive ball that progresses from "cool" to "warm", "hot", and "critical" status as it is used. Players can only defuse the ball, resetting it from its current state back to "cool" by crossing the 50 yard line or by change of possession, whether through touchdown, interception, or fumble. A robot holding a critical ball while being tackled is destroyed along with the ball. The robots also possess finite durability. As offensive units are tackled, they wear down, finally issuing smoke and then flames after a number of hits. A flaming robot will explode when hit, thereby fumbling the ball. Players can use the money bonuses they earn while playing to upgrade their robots with faster and more durable units. Players select from run, pass, or option plays on offense, after which the computer presents four individual plays from which to choose. On defense, a player can select short, medium, or long defenses, and then select a specific defensive scheme.
The standard configuration allows single player, two player cooperative, two player head-to-head or four player head-to-head play. Playing with two teams of two people opened up a new dimension of gameplay. Computer-controlled avatars run offensive patterns in very specific ways before reaching their assigned passing spots. Human players, however, could exploit the fact that a number of offensive plays started with identical formations. By choosing one play, but moving their avatars in imitation of a similar but different play, the offensive team could disguise their intentions before suddenly breaking for their assigned pass locations. This offensive flexibility forced defending players to quickly recognize plays and move to break them up by rushing to what they guessed was the intended passing spot. Most often, the timely use of the defender's turbo, a short-term speed boost usa |
https://en.wikipedia.org/wiki/Adobe%20Type%20Manager | Adobe Type Manager (ATM) was the name of a family of computer programs created and marketed by Adobe Systems for use with their PostScript Type 1 fonts. The last release was Adobe ATM Light 4.1.2, per Adobe's FTP (at the time).
Modern operating systems such as Windows and MacOS have built-in support for PostScript fonts, eliminating the need for Adobe's 3rd party utility.
Apple Macintosh
The original ATM was created for the Apple Macintosh computer platform to scale PostScript Type 1 fonts for the computer monitor, and for printing to non-PostScript printers. Mac Type 1 fonts come with screen fonts set to display at certain point sizes only. In Macintosh operating systems prior to Mac OS X, Type 1 fonts set at other sizes would appear jagged on the monitor. ATM allowed Type 1 fonts to appear smooth at any point size, and to print well to non-PostScript devices.
Around 1996, Adobe expanded ATM into a font-management program called ATM Deluxe; the original ATM was renamed ATM Light. ATM Deluxe performed the same font-smoothing function as ATM Light, but performed a variety of other functions: activation and deactivation of fonts; creating sets of fonts that could be activated or deactivated simultaneously; viewing and printing font samples; and scanning for duplicate fonts, font format conflicts, and PostScript fonts missing screen or printer files.
Around 2001, with Apple's Mac OS X, support for Type 1 fonts was built into the operating system using ATM Light code contributed by Adobe. ATM for Mac was then no longer necessary for font imaging or printing.
Adobe discontinued development of ATM Deluxe for Macintosh after Apple moved to Mac OS X. Adobe ceased selling ATM Deluxe in 2005. ATM Deluxe does not work reliably under OS X (even under Classic), however, ATM Light is still helpful to Type 1 font users under Classic.
Microsoft Windows
Adobe ported these products to the Microsoft Windows operating system platform, where they managed font display by patching into Windows (3.0, 3.1x, 95, 98, Me) at a very low level. The design of Windows NT made this kind of patching unviable, and Microsoft initially responded by allowing Type 1 fonts to be converted to TrueType on install, but in Windows NT 4.0, Microsoft added "font driver" support to allow ATM to provide Type 1 support (and in theory other font drivers for other types).
As with ATM Light for Macintosh, Adobe licensed to Microsoft the core code, which was integrated into Windows 2000 and Windows XP, making ATM Light for Windows obsolete, except for the special case of support for "multiple master" fonts, which Microsoft did not include in Windows, and for which ATM Lite still acts as a font driver.
ATM Light is still available for Windows users, but ATM Deluxe is no longer developed or sold.
Users of ATM 4.0 (Light or Deluxe) on Windows 95/98/ME who upgrade to Windows 2000/XP may encounter problems, and it is vital not to install version 4.0 into Windows 2000 or later; affected users a |
https://en.wikipedia.org/wiki/Telesur | Telesur (stylized as teleSUR) is a Latin American terrestrial and satellite news television network headquartered in Caracas, Venezuela and sponsored by the governments of Venezuela, Bolivia, Cuba and Nicaragua.
First proposed in 2005 and subsidized by Venezuela, Telesur was launched under the government of Hugo Chávez, and promoted as "a Latin socialist answer to CNN". It has been described as a network showcasing the diversity of Latin America and a propaganda outlet for state views under chavismo.
In Latin America, teleSUR can be seen in Argentina, Colombia, Chile, Ecuador, Peru, Uruguay and other territories as Aruba, Trinidad and Tobago, Barbados and Curaçao in DirecTV's package (channels 292 and 722). In 2020, Uruguay removed its sponsorship.
History
The proposed alternative Latin American television network that would become Telesur took shape on 24 January 2005, as part of the projects approved in a council of ministers of the Venezuelan government. According to The Boston Globe, the Venezuelan government provided broadcasting facilities and 70% of Telesur's funds, with other leftist governments supporting the network as well. Telesur was advertised "as a Latin socialist answer to CNN." Telesur began broadcasting on a limited, four-hour schedule on 24 July 2005, on the 222nd birthday of Latin American leader Simón Bolívar. The network began full-time broadcasts on 31 October 2005.
In 2009, Venezuela subsidized the launch of the communications satellite Venesat-1, in part to amplify Telesur's programming by enabling it to avoid geo-blocking efforts by DirectTV, an American company.
The founder of Telesur was Aram Aharonian, a journalist and scholar, who left Uruguay after the 1973 coup d'état. Aharonian stated that the idea of Telesur was "to see ourselves as we truly were", stating that he sought more diversity in the media. After Aharonian resigned from his position as the network's director in 2013, he commented in a 2014 interview that Telesur "did not achieve latinamericanization and continued to be Venezuelan".
Sponsor countries
La Nueva Televisora del Sur, C.A. is a public company which has various Latin American governments as its sponsors. Its primary sponsor is the Government of Venezuela; Cuba, Nicaragua, Uruguay, and Bolivia have contributed as well. Argentina was its second main sponsor, but after the victory of big tent center-right coalition Cambiemos in the elections of 2015, the new government decided in 2016 to pull out allegedly because of a "lack of 'pluralism'." In June 2016, the Argentine government announced that it would no longer support Telesur broadcasting. Argentina became the first founding member of Telesur to discontinue participation.
Uruguay
On 3 March 2005 Venezuelan president Hugo Chávez signed several agreements with then-recently elected Uruguayan president Tabaré Vázquez regarding the energetic and communicational integration of both countries, one of them being the joint creation and financi |
https://en.wikipedia.org/wiki/Digital%20Audio%20Access%20Protocol | The Digital Audio Access Protocol (DAAP) is the proprietary protocol introduced by Apple in its iTunes software to share media across a local network.
DAAP addresses the same problems for Apple as the UPnP AV standards address for members of the Digital Living Network Alliance (DLNA).
Description
The DAAP protocol was originally introduced in iTunes version 4.0. Initially, Apple did not officially release a protocol description, but it has been reverse-engineered to a sufficient degree that reimplementations of the protocol for non-iTunes platforms have been possible.
A DAAP server is a specialized HTTP server, which performs two functions. It sends a list of songs and it streams requested songs to clients. There are also provisions to notify the client of changes to the server. Requests are sent to the server by the client in form of URLs and are responded to with data in mime-type, which can be converted to XML by the client. iTunes uses the zeroconf (also known as Bonjour) service to announce and discover DAAP shares on a local subnet. The DAAP service uses TCP port 3689 by default.
DAAP is one of two media sharing schemes that Apple has currently released. The other, Digital Photo Access Protocol (DPAP), is used by iPhoto for sharing images. They both rely on an underlying protocol, Digital Media Access Protocol (DMAP).
Early versions of iTunes allowed users to connect to shares across the Internet, however, in recent versions only computers on the same subnet can share music (workarounds such as port tunneling are possible). The Register speculates that Apple made this move in response to pressure from the record labels. More recent versions of iTunes also limit the number of clients to 5 unique IP addresses within a 24-hour period.
DAAP has also been implemented in other non-iTunes media applications such as Banshee, Amarok, Exaile (with a plugin), Songbird (with a plugin), Rhythmbox, and WiFiTunes.
DAAP authentication
Beginning with iTunes 4.2, Apple introduced authentication to DAAP sharing, meaning that the only clients that could connect to iTunes servers were other instances of iTunes. This was further modified in iTunes 4.5 to use a custom hashing algorithm, rather than the standard MD5 function used previously. Both authentication methods were successfully reverse engineered within months of release.
With iTunes 7.0, a new 'Client-DAAP-Validation' header hash is needed when connecting to an iTunes 7.0 server. This does not affect third-party DAAP servers, and all DAAP clients without support for this feature, including iTunes itself before version 7.0, will fail to connect to an iTunes 7.0 server, receiving a '403 Forbidden' HTTP error. The iTunes 7.0 authentication traffic analysis seem to indicate that a certificate exchange is performed to calculate the hash sent in the 'Client-DAAP-Validation' header.
DAAP clients
DAAP servers
See also
Digital Audio Control Protocol
Remote Audio Output Protocol
Notes and referenc |
https://en.wikipedia.org/wiki/Real-time%20computer%20graphics | Real-time computer graphics or real-time rendering is the sub-field of computer graphics focused on producing and analyzing images in real time. The term can refer to anything from rendering an application's graphical user interface (GUI) to real-time image analysis, but is most often used in reference to interactive 3D computer graphics, typically using a graphics processing unit (GPU). One example of this concept is a video game that rapidly renders changing 3D environments to produce an illusion of motion.
Computers have been capable of generating 2D images such as simple lines, images and polygons in real time since their invention. However, quickly rendering detailed 3D objects is a daunting task for traditional Von Neumann architecture-based systems. An early workaround to this problem was the use of sprites, 2D images that could imitate 3D graphics.
Different techniques for rendering now exist, such as ray-tracing and rasterization. Using these techniques and advanced hardware, computers can now render images quickly enough to create the illusion of motion while simultaneously accepting user input. This means that the user can respond to rendered images in real time, producing an interactive experience.
Principles of real-time 3D computer graphics
The goal of computer graphics is to generate computer-generated images, or frames, using certain desired metrics. One such metric is the number of frames generated in a given second. Real-time computer graphics systems differ from traditional (i.e., non-real-time) rendering systems in that non-real-time graphics typically rely on ray tracing. In this process, millions or billions of rays are traced from the camera to the world for detailed rendering—this expensive operation can take hours or days to render a single frame.
Real-time graphics systems must render each image in less than 1/30th of a second. Ray tracing is far too slow for these systems; instead, they employ the technique of z-buffer triangle rasterization. In this technique, every object is decomposed into individual primitives, usually triangles. Each triangle gets positioned, rotated and scaled on the screen, and rasterizer hardware (or a software emulator) generates pixels inside each triangle. These triangles are then decomposed into atomic units called fragments that are suitable for displaying on a display screen. The fragments are drawn on the screen using a color that is computed in several steps. For example, a texture can be used to "paint" a triangle based on a stored image, and then shadow mapping can alter that triangle's colors based on line-of-sight to light sources.
Video game graphics
Real-time graphics optimizes image quality subject to time and hardware constraints. GPUs and other advances increased the image quality that real-time graphics can produce. GPUs are capable of handling millions of triangles per frame, and current DirectX 11/OpenGL 4.x class hardware is capable of generating complex effects, such |
https://en.wikipedia.org/wiki/Heavy%20Barrel | is a 1987 overhead run and gun arcade game by Data East.
Gameplay
Terrorists have seized the underground control complex of a nuclear missile site, and it is up to the player to infiltrate the base and kill the enemy leader. Players begin armed with a gun with unlimited ammunition and a limited supply of grenades. Improved weapons and grenade powerups are made available within the game, either in plain sight or within crates that must be unlocked using keys. Additionally, crates may contain orbs or one of the six pieces of the Heavy Barrel superweapon. Like SNK's Ikari Warriors, the original arcade version featured 8-way rotary joysticks.
The name of the game is from an in-game weapon. The Heavy Barrel is found in six pieces and is an energy cannon capable of destroying any enemy in the game with a single shot (except the final enemy, and possibly one other boss that may have required two shots). The weapon has a wide arc of fire and can be fired as fast as the player's trigger finger permits, but after thirty seconds its use is exhausted, at which point the bearer reverts to his previous weaponry. The Heavy Barrel is best used to get past tough bosses, and the game only contains enough pieces to allow the weapon to be built three times in a single game. In a two-player game, whoever collects the sixth piece is equipped with the Heavy Barrel.
Ports
Heavy Barrel was ported by Quicksilver Software to the Apple II and DOS in 1989. The NES port was developed by Data East and released in North America and Japan in 1990. All versions of Heavy Barrel were published by Data East.
In 1989, Heavy Barrel was contracted to be ported to the Commodore 64 by F.A.C.S. (Financial Accounting and Computing Software), a West Bloomfield Township, Michigan company. The graphics engine and much of the game-play was in place, but the development company folded before the project could be finished.
In February 2010, Majesco Entertainment released a port of Heavy Barrel for the Wii (as part of the Data East Arcade Classics disc) and for the Zeebo.
Reception
In Japan, Game Machine listed Heavy Barrel on their January 15, 1988 issue as being the sixth most-successful table arcade unit of the month. Both Computer and Video Gamess Clare Edgeley and ACEs Andy Smith gave an overall positive outlook to the arcade original.
Notes
References
External links
Heavy Barrel at GameFAQs
Heavy Barrel at Giant Bomb
Heavy Barrel at Killer List of Videogames
Heavy Barrel at MobyGames
1987 video games
Apple II games
Arcade video games
Cooperative video games
Data East arcade games
Data East video games
DOS games
Multiplayer and single-player video games
Nintendo Entertainment System games
Quicksilver Software games
Run and gun games
Video games developed in Japan
Tiger Electronics handheld games |
https://en.wikipedia.org/wiki/Cramer%E2%80%93Shoup%20cryptosystem | The Cramer–Shoup system is an asymmetric key encryption algorithm, and was the first efficient scheme proven to be secure against adaptive chosen ciphertext attack using standard cryptographic assumptions. Its security is based on the computational intractability (widely assumed, but not proved) of the decisional Diffie–Hellman assumption. Developed by Ronald Cramer and Victor Shoup in 1998, it is an extension of the ElGamal cryptosystem. In contrast to ElGamal, which is extremely malleable, Cramer–Shoup adds other elements to ensure non-malleability even against a resourceful attacker. This non-malleability is achieved through the use of a universal one-way hash function and additional computations, resulting in a ciphertext which is twice as large as in ElGamal.
Adaptive chosen ciphertext attacks
The definition of security achieved by Cramer–Shoup is formally termed "indistinguishability under adaptive chosen ciphertext attack" (IND-CCA2). This security definition is currently the strongest definition known for a public key cryptosystem: it assumes that the attacker has access to a decryption oracle which will decrypt any ciphertext using the scheme's secret decryption key. The "adaptive" component of the security definition means that the attacker has access to this decryption oracle both before and after he observes a specific target ciphertext to attack (though he is prohibited from using the oracle to simply decrypt this target ciphertext). The weaker notion of security against non-adaptive chosen ciphertext attacks (IND-CCA1) only allows the attacker to access the decryption oracle before observing the target ciphertext.
Though it was well known that many widely used cryptosystems were insecure against such an attacker, for many years system designers considered the attack to be impractical and of largely theoretical interest. This began to change during the late 1990s, particularly when Daniel Bleichenbacher demonstrated a practical adaptive chosen ciphertext attack against SSL servers using a form of RSA encryption.
Cramer–Shoup was not the first encryption scheme to provide security against adaptive chosen ciphertext attack. Naor–Yung, Rackoff–Simon, and Dolev–Dwork–Naor proposed provably secure conversions from standard (IND-CPA) schemes into IND-CCA1 and IND-CCA2 schemes. These techniques are secure under a standard set of cryptographic assumptions (without random oracles), however they rely on complex zero-knowledge proof techniques, and are inefficient in terms of computational cost and ciphertext size. A variety of other approaches, including Bellare/Rogaway's OAEP and Fujisaki–Okamoto achieve efficient constructions using a mathematical abstraction known as a random oracle. Unfortunately, to implement these schemes in practice requires the substitution of some practical function (e.g., a cryptographic hash function) in place of the random oracle. A growing body of evidence suggests the insecurity of this approach, a |
https://en.wikipedia.org/wiki/Dr.%20Chaos | Dr. Chaos, officially known as in Japan, is an action-adventure game originally released in Japan for the Family Computer Disk System in 1987 by Pony Inc. An English localization was produced for the Nintendo Entertainment System that was released in North America by FCI in 1988.
Plot
The story revolves around Dr. Ginn Chaos, a mad scientist who has retreated from society in order to conduct secret experiments in his extensive mansion. His latest invention is an Interdimensional Warpgate, which grants access to another world. When his younger brother Michael arrives at the mansion for a visit, he finds Ginn missing. To make matters worse, the mansion's architecture is damaged and overrun with strange, hostile creatures. Michael must now survive their attacks while negotiating the mansion's many corridors in a desperate attempt to find his brother. Dr. Chaos is similar to The Goonies II.
Gameplay
The player of this 2D side-scrolling adventure assumes the role of Michael Chaos, who is armed with only a Knife in the beginning. However, as Michael moves through the house, he can pick up Handgun Bullets, Machine Gun Bullets, Grenades and life-replenishing Yellow Vitamins and Red Vitamins. There is a menu which has four options, open, get, go, and hit. There are 11 Warp Zones in all. At the end of each of the first 10 Warp Zones, Michael must fight a large monster that carries a piece of the Laser and guards a valuable piece of equipment, the latter consisting of the Ultra Space Sensor, four Life Bottles, the Air Helmet, the Jump Boots, two Blue Vitamins and the Shield Suit. Once Michael fully assembles the Laser, he'll be able to challenge the final boss, Canbarian. On top of the normal side-scrolling gameplay,there are also many point and click sections.
References
External links
1987 video games
Famicom Disk System games
Nintendo Entertainment System games
Platform games
Pony Canyon games
Video games developed in Japan
Single-player video games |
https://en.wikipedia.org/wiki/Tiny%20Planets | Tiny Planets is a computer-animated children's television series co-produced by Sesame Workshop and Pepper's Ghost Productions. The concept was created by the late Nina Elias-Bamberger at Sesame Workshop with character designs by Ed Taylor. The television series consists of 65 five-minute, dialogue-free (and later narrated by Kim Goody, the singer of the theme song) episodes featuring two white-furred extraterrestrials travelling their universe and solving a specific problem each episode.
Plot
Deep in the heart of the Tiny Universe lies the North Planet where the main characters, Bing and Bong, make their home. These two explorers are catapulted to the surrounding worlds in their solar system on a flying white couch where they explore, learn about the inhabitants, develop friendships and have fun.
Characters
Bing (voiced by Dashisell Tate) is older and much larger than Bong. His enormous appetite for exploring is dwarfed only by the endless supply of useful gadgets in an ever-present pouch. Wise and determined, he often takes the lead in adventures. Patient and thoughtful, he loves nothing more than a problem to be solved or a job to be done. He likes to help others and has an optimistic approach to life and its problems. He does not speak, but communicates with body language, expressive eyebrows, and humming sounds.
Bong, (voiced by Kim Goody, the singer of the theme song) the younger and smaller one, is Bing's appealing, coy, impulsive, and a bundle lover of energy. Impish, playful, gregarious and incredibly compassionate sidekick and a spider-dog like pet, he is especially miserable when on bad terms with Bing. He loves to join in games and be the centre of attention. He does not speak but has an expressive face and a body, a high-pitched sound (which is cross between a grunt and a squeak), and a multi-decibel cry of joy.
Halley (also voiced by Kim Goody, the singer of the theme song) is a small wide-eyed insect who is named after the comet who provides a running commentary from her flying saucer and "films" the action with a remote camera to provide a summary at the end of the episode. Halley was not featured in some versions of the show, but she was featured in the Australian version on ABC Kids, and the U.S. version that aired on the Noggin channel.
Flockers live on each of the Tiny Planets, each with its own distinctive population. More often than not, it is these social creatures that Bing & Bong are helping out of a jam. Whether it is cleaning out-of-reach windows or fortifying a house to withstand wind, Flockers are a perpetual source of problems begging to be solved. They do not speak, but communicate with body language and call sounds. Their design varies depending on the planet; they have either one or two heads and either one or two legs. Only a few have arms.
Locals are smaller inhabitants of the planets and can appear in greater numbers than the Flockers but are just as dim. They are mostly globular in shape with blinking |
https://en.wikipedia.org/wiki/SUnit | SUnit is a unit testing framework for the programming language Smalltalk. It is the original source of the xUnit design, originally written by one of the creators of Extreme Programming, Kent Beck. SUnit allows writing tests and checking results in Smalltalk.
History
SUnit was originally described by Beck in "Simple Smalltalk Testing: With Patterns" (1989), then published as chapter 30 "Simple Smalltalk Testing", in the book Kent Beck's Guide to Better Smalltalk by Kent Beck, Donald G. Firesmith (Editor) (Publisher: Cambridge University Press, Pub. Date: December 1998, , 408pp)
External links
@ Camp Smalltalk
SUnit @ Ward Cunningham's Wiki
Extreme programming
Unit testing frameworks
Unit testing |
https://en.wikipedia.org/wiki/Mommie%20Beerest | "Mommie Beerest" is the seventh episode of the sixteenth season of the American animated television series The Simpsons. It first aired on the Fox network in the United States on January 30, 2005. The episode was directed by Mark Kirland and written by Michael Price.
Plot
The Simpsons celebrate brunch at a fancy restaurant to celebrate Homer finally paying off the mortgage. After Bart and Lisa get in a food fight, Homer goes to Moe's, where the health inspector has come for his regular visit. Since the inspector is a friend of Moe's, he gives the bar a clean bill of health, regardless of numerous violations, but he dies upon consuming one of the expired pickled eggs. The new inspector immediately declares Moe's Tavern to be closed down until the violations are cleared up and the weekly garbage pickup disposes of his predecessor's corpse.
Later, while the regulars hold an Irish wake on the sidewalk, Homer is guilty about Moe's Tavern being closed down because of him, but decides to help Moe reopen the bar by getting a new mortgage for his home, forging with Marge, who becomes the new co-owner. Homer visits a cleaned-up Moe's with Marge running it to protect their investment, and she suggests Homer just concentrate on the kids. Marge also suggests that Moe's should become an English pub and to rename it The Nag & Weasel to improve its image. The Nag & Weasel is a success, and Bart and Lisa observe that Marge now spends more time at the establishment than Homer has ever done, leaving Homer worried.
Homer and Marge go to a movie together, only to be joined by Moe, and Homer learns from Lenny and Carl that Marge and Moe are having what is called an "emotional affair". Homer is also scared when Marge reminds him for the 11th time they are planning to attend a bartender convention in Aruba. Homer rushes to the airport, escorted by Chief Wiggum, and gets to the plane as it is about to become airborne. Meanwhile, Moe finally confesses his true feelings for his partner that he has hidden in the dark for so long, spurred on by the alarming display he witnesses from the window seat. He tells Marge he loves her, and in a rush, asks her to marry him. Marge is shocked, but before she can answer, a soaking-wet Homer bursts out of the toilet seat in the bathroom and glares at Moe to leave his wife alone. Moe shouts back that Homer does not deserve Marge at all since he knows nothing about her: her favorite dish, for example. Homer does admit that he does not know much about his own wife, but despite his faults, Marge reassures him that he really is her true love, not the bartender.
The three arrive in Aruba, where the miserable Moe attempts to drown himself because of his loss, only to be stopped by Marge and Homer. Marge explains to him that he is sweet enough a man to be loved by someone else, if only he is willing to make a few, minor changes. Moe seems to listen, but nevertheless reverts to his original scheme of sharing a hotel room with Marge (he has ch |
https://en.wikipedia.org/wiki/International%20Material%20Data%20System | The International Material Data System (IMDS) is a global data repository that contains information on materials used by the automotive industry. Several leading auto manufacturers use the IMDS to maintain data for various reporting requirements.
In the IMDS, all materials present in finished automobile manufacturing are collected, maintained, analysed and archived. IMDS facilitates meeting the obligations placed on automobile manufacturers, and thus on their suppliers, by national and international standards, laws and regulations.
Introduction
The IMDS was originally a collaboration of Audi, BMW, Daimler, EDS (now part of DXC Technology, the system administrator), Ford, Opel, Porsche, VW and Volvo. Since inception the list of participating vehicle manufacturers and suppliers has grown greatly.
Usage
Because it is a computer-based system, IMDS highlights hazardous and controlled substances by comparing entered data with regulatory-originated lists of prohibited substances (GADSL, REACH, ELV, etc...). Hence OEMs can trace hazardous substances back to the individual part and work with suppliers to reduce, control, or eliminate the hazard.
All substances must be declared in the material data sheet (MDS) of the IMDS to a resolution of 1 gram or better – not just declarable and prohibited substances (e.g. Cr VI / Hg / Pb / Cd). Substances and materials of products must be known in detail so that it may be delivered by the OEMs to dismantler companies in order to achieve the goals of the ELV Directive.
The basic workflow model of the system is for each supplier to submit data about the parts they sell to their direct customer. When each link in the supply chain submits data per this method, it mimics actual supply chain part flow, preserving customer-to-supplier relations. Data entry in IMDS is frequently a contractual requirement of PPAP which is one part of standard automotive quality systems.
Access and costs
The IMDS is easily accessed through the internet. The basic web browser version of the system is supported by the OEM sponsor's group and provided free of charge to suppliers in the automotive supply chain.
There are several vendors that provide systems allowing compatible IMDS interaction with product lifecycle management, download and upload, data format translation, and other reporting systems.
Changes in 2013 and 2014
2013 – IMDS NT for Design Changes
2014 – IMDS 2020 for New Functions
References
External links
Training Homepage for new IMDS NT Design
GADSL Homepage
End of Life Vehicles Directive 2000/53/EC
REACh
IMDS at AIAG
IMDS Suppliers Group at CLEPA, European Automotive Suppliers' Association
US American Automotive Suppliers' Associations
About IMDS (Brazil)
Automotive standards
Material handling
Automotive industry
European Union directives
Vehicle recycling |
https://en.wikipedia.org/wiki/Marin%20Computer%20Center | Opened in 1977 in Marin County, California, the Marin Computer Center was the world's first public access microcomputer center. The non-profit company was co-created by David Fox (later to become one of Lucasfilm Games' founding members) and Annie Fox an author.
MCC (as it was known) initially featured the Atari 2600, an Equinox 100, 9 Processor Technology Sol 20 computers (S-100 bus systems), the Radio Shack Model I and the Commodore PET. In addition to providing computer access to the public it had classes on the programming language BASIC. Later, it added Apple II and Atari 8-bit computers, for a total of about 40 systems.
The Foxes left MCC in 1981, turning it over to new management, and later to the teens and young adults who helped run it.
See also
Public computer
External links
Marin Computer Center in People's Computers, Nov-Dec 1978
You Want to Open a What? - Article from Creative Computing, November 1984
Electric Eggplant
Scan of 1981 advertisement for Marin Computer Center
Buildings and structures in Marin County, California
History of computing |
https://en.wikipedia.org/wiki/King%20of%20Kings%20%281988%20video%20game%29 | is a turn-based strategy video game with wargaming elements for the Family Computer, released only in Japan. Kazuma Kaneko helped to design the characters for this video game; which became the inspiration for the characters in the video game Megami Tensei.
It is one of the few games for the Family Computer to use the Namco 163 wavetable sound chip, and is also one of the games that enables all eight sound channels provided by the chip, the other being Erika to Satoru no Yume Bōken.
Summary
This video game features 22 different types of playable units (categorized into people, fairies, dragons and other kinds of units). Human units tend to have a weak overall defense, fairy units are often the least expensive to produce, all dragons except the lizardmen are very expensive to build, and the other units combine the strengths and weaknesses of the other three kinds of units. There is a campaign mode where the player does battle against a computer team led by Lucifer across four maps. There is a multiplayer mode where up to four teams can battle on eight additional maps. A bonus map based on Japan's greatest swordsmith Masamune is present as an easter egg in this video game.
Game system
The players king's unit is the axis of the game while the opponent's king can easily defeat the player's chance for victory. Players must do operations such as occupation and city funding. Kings can produce other units to conduct aggressive behavior. They are several types of units including fighters and goblins. Each unit's attack and defensive powers are different. In multiplayer mode, the unnamed "alliance" exists among allies battle but an allied victory is not achievable. Only defeating the opposing king(s) will result in a victory for the player. If the player is playing against more than one human opponent, it is possible for teams to enjoy the game alliance system.
Production system
Players create production systems by putting a King unit inside the castle to summon other units. The production unit is a system that consumes funds and also creates a certain amount of revenue each time a player's turn comes up. Players can increase revenue by occupying the town and castle. The King unit can move to the castle immediately after producing a unit. He can also advance to the attack; he is considered to be outside the castle and is unable to produce.
Unit
The possible fighter units in the game are goblins, elves and dragons. These characters are central to fantasy games and appear in the game. Each unit has set level; which is increased by killing enemy units. Levels range from 1 to 9 (with the ninth level character wearing a crown). It is very important to have a higher attack rating than the opponent. On the other hand, having a higher defense rating also helps to win battles and to create a balanced game system. Some units can use "magic" that turns directly attack enemy units with various special effects. The campaign mode is limited to the type of units t |
https://en.wikipedia.org/wiki/Super%20Pitfall | is a 1986 side-scrolling platform game for the Nintendo Entertainment System, PC-8800 series, and TRS-80 Color Computer 3 published under Activision's license. Despite the title screen stating that it was reprogrammed by Pony Inc, the actual development of the NES version was handled by Micronics, with the PC-8801 version being developed by Pony Inc. while the CoCo version is credited as being "Programmed by Steve Bjork of SRB Software". The PC-8801 version released in November 1986, two months after the original release in September 1986, although this variant of the game was limited to single-screen platforming rather than side-scrolling.
In addition to being a new entry in Activision's Pitfall series, Super Pitfall was the first game that Activision published as a third-party developer for the NES. A localized version of Sunsoft's Famicom title Atlantis no Nazo was planned for release as Super Pitfall II, but was cancelled.
Gameplay
Super Pitfall is a loose remake of Pitfall II: Lost Caverns, in that the object is to move Harry through the mazes to find the Raj diamond, and rescue his niece Rhonda and sidekick Quickclaw, both of whom have become lost in the caverns. However, Pitfall Harry's quest becomes tougher when he sees that the faithful Quickclaw is imprisoned in a cage and a key must be found – at which point Pitfall Harry finds that Rhonda has been turned to stone; it is here where he must locate a magic potion that will turn her back into a normal girl.
The difference in Super Pitfall, however, is that Harry must also return to his starting point after accomplishing these objectives. Like the original Pitfall, but unlike Pitfall II: Lost Caverns, Harry has a limited number of lives. This time, Harry is also equipped with a gun with which he can shoot the various deadly creatures that inhabit the caverns, but he has limited ammunition and must find additional bullets scattered throughout the game. Arguably the most difficult enemies to beat are the three cavemen – which require more than one bullet to eliminate. Gathering gold bars results in extra points, which grants extra lives. Completion of this game requires the memorization (or mapping) of numerous hidden keys and warp zones to progress – the likes of which can only be reached by jumping at secret hidden spots in the game's levels. Extra lives, ammo, and other helpful items can also be found by jumping in specific zones.
Reception
The NES version was negatively received. A review in Computer Gaming World derided the game as "a [Super Mario Bros.] rehash that most NES users will be able to play in their sleep. Certainly, there is nothing in the game itself to keep them awake." Further complaints were directed at the lack of any credit given to David Crane, the original designer of Pitfall. Brett Alan Weiss of the game database Allgame gave the game a rating of one star out of five, stating that "Pitfall is one of the best Atari 2600 games; Super Pitfall is one of the worst N |
https://en.wikipedia.org/wiki/Wireless%20network%20interface%20controller | A wireless network interface controller (WNIC) is a network interface controller which connects to a wireless network, such as Wi-Fi or Bluetooth, rather than a wired network, such as a Token Ring or Ethernet. A WNIC, just like other NICs, works on the layers 1 and 2 of the OSI model and uses an antenna to communicate via radio waves.
A wireless network interface controller may be implemented as an expansion card and connected using PCI bus or PCIe bus, or connected via USB, PC Card, ExpressCard, Mini PCIe or M.2.
The low cost and ubiquity of the Wi-Fi standard means that many newer mobile computers have a wireless network interface built into the motherboard.
The term is usually applied to IEEE 802.11 adapters; it may also apply to a NIC using protocols other than 802.11, such as one implementing Bluetooth connections.
Modes of operation
An 802.11 WNIC can operate in two modes known as infrastructure mode and ad hoc mode:
Infrastructure mode
In an infrastructure mode network the WNIC needs a wireless access point: all data is transferred using the access point as the central hub. All wireless nodes in an infrastructure mode network connect to an access point. All nodes connecting to the access point must have the same service set identifier (SSID) as the access point, and if a kind of wireless security is enabled on the access point (such as WEP or WPA), they must share the same keys or other authentication parameters.
Ad hoc mode
In an ad hoc mode network the WNIC does not require an access point, but rather can interface with all other wireless nodes directly. All the nodes in an ad hoc network must have the same channel and SSID.
Specifications
The IEEE 802.11 standard sets out low-level specifications for how all 802.11 wireless networks operate. Earlier 802.11 interface controllers are usually only compatible with earlier variants of the standard, while newer cards support both current and old standards.
Specifications commonly used in marketing materials for WNICs include:
Wireless data transfer rates (measured in Mbit/s); these range from 2 Mbit/s to 54 Mbit/s.
Wireless transmit power (measured in dBm)
Wireless network standards (may include standards such as 802.11b, 802.11g, 802.11n, etc.) 802.11g offers data transfer speeds equivalent to 802.11a – up to 54 Mbit/s – and the wider range of 802.11b, and is backward compatible with 802.11b.
Most Bluetooth cards do not implement any form of the 802.11 standard.
Range
Wireless range may be substantially affected by objects in the way of the signal and by the quality of the antenna. Large electrical appliances, such as refrigerators, fuse boxes, metal plumbing, and air conditioning units can impede a wireless network signal. The theoretical maximum range of IEEE 802.11 is only reached under ideal circumstances and true effective range is typically about half of the theoretical range. Specifically, the maximum throughput speed is only achieved at extremely close range (less |
https://en.wikipedia.org/wiki/Pixelation | In computer graphics, pixelation (or pixellation in British English) is caused by displaying a bitmap or a section of a bitmap at such a large size that individual pixels, small single-colored square display elements that comprise the bitmap, are visible. Such an image is said to be pixelated (pixellated in the UK).
Early graphical applications such as video games ran at very low resolutions with a small number of colors, resulting in easily visible pixels. The resulting sharp edges gave curved objects and diagonal lines an unnatural appearance. However, when the number of available colors increased to 256, it was possible to gainfully employ anti-aliasing to smooth the appearance of low-resolution objects, not eliminating pixelation but making it less jarring to the eye. Higher resolutions would soon make this type of pixelation all but invisible on the screen, but pixelation is still visible if a low-resolution image is printed on paper.
In the realm of real-time 3D computer graphics, pixelation can be a problem. Here, bitmaps are applied to polygons as textures. As a camera approaches a textured polygon, simplistic nearest neighbor texture filtering would simply zoom in on the bitmap, creating drastic pixelation. The most common solution is a technique called pixel interpolation that smoothly blends or interpolates the color of one pixel into the color of the next adjacent pixel at high levels of zoom. This creates a more organic, but also much blurrier image. There are a number of ways of doing this; see texture filtering for details.
Pixelation is a problem unique to bitmaps. Alternatives such as vector graphics or purely geometric polygon models can scale to any level of detail. This is one reason vector graphics are popular for printing most modern computer monitors have a resolution of about 100 dots per inch, and at 300 dots per inch printed documents have about nine times as many pixels per unit of area as a screen. Another solution sometimes used is procedural textures, textures such as fractals that can be generated on-the-fly at arbitrary levels of detail.
Deliberate pixelation
In some cases, the resolution of an image or a portion of an image is lowered to introduce pixelation deliberately. This effect is commonly used on television news shows to obscure a person's face or to censor nudity or vulgar gestures, and is also used for artistic effect. This effect is called pixelization. Making pixels easily visible is also a main feature in pixel art which is where the graphics are made in low resolutions for effect.
Depixelization
Depixelization removes pixelization from images, attempting to reconstruct the appearance of the original (unpixelated) image.
See also
Colour banding
Macroblocking
Posterization
Pixel art
Perception of pixelated images
References
External links
Zooming Without Pixelation, digital camera advice by Mark Coffman
Pixelization of a Font by Stephen Wolfram, The Wolfram Demonstrations Project.
Com |
https://en.wikipedia.org/wiki/Radio%20City | Radio City may refer to:
Radio stations
Radio City (Liverpool), an Independent radio station in Liverpool forming part of the Hits Radio Network
Greatest Hits Radio Liverpool & The North West a secondary station to the Liverpool-based Radio City, formerly Radio City 2
Radio City 3, a defunct sister station to Radio City, carrying a localised output from The Hits
Radio City Talk, a defunct speech-led sister station to Radio City.
Radio City Tower, a radio and observation tower in Liverpool
Radio City (pirate radio station), British
Radio City (Bulgaria), Bulgarian CHR network station
Radio City (Indian radio station), India
Radio City, Maribor, Slovenia
Radio City 1386AM, a hospital radio station in Swansea, Wales
Other
Radio City Music Hall, a theater that is known for hosting the Rockettes
NBC Radio City Studios, the broadcast complex that gave its name to the Music Hall
Radio City (album), 1974 album by Big Star
Radio City Cinema (Tehran), a luxuries Cinema in Tehran in the 1970s
nl:Radio City |
https://en.wikipedia.org/wiki/Jean%20Ichbiah | Jean David Ichbiah (25 March 1940 – 26 January 2007) was a French computer scientist and the initial chief designer (1977–1983) of Ada, a general-purpose, strongly typed programming language with certified validated compilers.
Early life
Ichbiah was a descendant of Greek and Turkish Jews from Thessaloniki who emigrated to France.
Career
From 1972 to 1974, he worked on designing an experimental system implementation language called LIS, based on Pascal and Simula. (He had been chairman of the Simula User's Group.) He was also one of the founding members of IFIP WG 2.4 on Systems Implementation Languages.
He then joined CII Honeywell Bull (CII-HB) in Louveciennes, France, becoming a member of the Programming Research division. Among other projects he worked on the rewrite of the Siris 7 operating system into Siris 8.
Ichbiah's team submitted a language design labelled "Green" to a competition to choose the United States Department of Defense's embedded programming language. When Green was selected in 1978, he continued as chief designer of the language, now named "Ada". In 1980, Ichbiah left CII-HB and founded the Alsys corporation in La Celle-Saint-Cloud, which continued language definition to standardize Ada 83, and later went into the Ada compiler business, also supplying special validated compiler systems to NASA, the US Army, and others. He later moved to the Waltham, Massachusetts subsidiary of Alsys.
In the 1990s, Ichbiah designed the keyboard layout FITALY, which is specifically optimized for stylus or touch-based input. Subsequently, he started the Textware Solutions company, which sells text entry software for PDAs and tablet PCs, as well as text-entry software for medical transcription on PCs.
Awards and honors
In 1979, Jean Ichbiah was designated a chevalier (knight) of the French Legion of Honour and a correspondent of the French Academy of Sciences. He received a Certificate of Distinguished Service from the United States Department of Defense for his work on Ada.
Death
Jean Ichbiah died from complications of a brain tumor on January 26, 2007.
References
Further reading
External links
Jean Ichbiah (1940-2007), press release by the Ada Resource Association
"Programming pioneer dies — A tribute to Ada's Jean Ichbiah", by Phil Manchester (2007-02-02)
Obituary by Bertrand Meyer, as published in SIGSOFT Software Engineering Notes
Jean Ichbiah, 66; designed landmark computer language (Boston Globe)
Ada inventor Jean Ichbiah dies (Computerworld)
Member of the French Academy of Sciences
Ada 83 designer Jean Ichbiah dies, Ada User's Journal, Ada-Europe 2007
Ada (programming language)
American computer scientists
Knights of the Legion of Honour
Neurological disease deaths in Massachusetts
Deaths from cancer in Massachusetts
Deaths from brain cancer in the United States
French computer scientists
20th-century French Sephardi Jews
Members of the French Academy of Sciences
Programming language designers
Programming language researchers |
https://en.wikipedia.org/wiki/Estimation%20theory | Estimation theory is a branch of statistics that deals with estimating the values of parameters based on measured empirical data that has a random component. The parameters describe an underlying physical setting in such a way that their value affects the distribution of the measured data. An estimator attempts to approximate the unknown parameters using the measurements.
In estimation theory, two approaches are generally considered:
The probabilistic approach (described in this article) assumes that the measured data is random with probability distribution dependent on the parameters of interest
The set-membership approach assumes that the measured data vector belongs to a set which depends on the parameter vector.
Examples
For example, it is desired to estimate the proportion of a population of voters who will vote for a particular candidate. That proportion is the parameter sought; the estimate is based on a small random sample of voters. Alternatively, it is desired to estimate the probability of a voter voting for a particular candidate, based on some demographic features, such as age.
Or, for example, in radar the aim is to find the range of objects (airplanes, boats, etc.) by analyzing the two-way transit timing of received echoes of transmitted pulses. Since the reflected pulses are unavoidably embedded in electrical noise, their measured values are randomly distributed, so that the transit time must be estimated.
As another example, in electrical communication theory, the measurements which contain information regarding the parameters of interest are often associated with a noisy signal.
Basics
For a given model, several statistical "ingredients" are needed so the estimator can be implemented. The first is a statistical sample – a set of data points taken from a random vector (RV) of size N. Put into a vector,
Secondly, there are M parameters
whose values are to be estimated. Third, the continuous probability density function (pdf) or its discrete counterpart, the probability mass function (pmf), of the underlying distribution that generated the data must be stated conditional on the values of the parameters:
It is also possible for the parameters themselves to have a probability distribution (e.g., Bayesian statistics). It is then necessary to define the Bayesian probability
After the model is formed, the goal is to estimate the parameters, with the estimates commonly denoted , where the "hat" indicates the estimate.
One common estimator is the minimum mean squared error (MMSE) estimator, which utilizes the error between the estimated parameters and the actual value of the parameters
as the basis for optimality. This error term is then squared and the expected value of this squared value is minimized for the MMSE estimator.
Estimators
Commonly used estimators (estimation methods) and topics related to them include:
Maximum likelihood estimators
Bayes estimators
Method of moments estimators
Cramér–Rao b |
https://en.wikipedia.org/wiki/Tele2 | Tele2 AB is a provider of mobile and fixed connectivity, telephony, data network services, TV, streaming and global Internet of Things services, amongst others, to consumers and enterprises. It is headquartered in Kista Science City, Stockholm, Sweden. It is a major mobile network operator in Sweden, Russia, Estonia, Latvia and Lithuania.
Tele2 started as a telecommunications company in Sweden in 1993 by the company Investment AB Kinnevik. It previously operated in many other markets, but the company has since divested its licenses, sold to other operators or to management buy-outs in those markets.
History
Tele2 started in 1981 as a mobile phone provider called Comvik as an alternative mobile phone operator to the state-owned company Televerket (today known as Telia Company). The cable television provider Kabelvision AB started in 1986. Comvik later changed its name to become Comviq when the company got a GSM license in 1988 and started operating in 1992.
In 1991, Sweden's first commercial ISP was started with the Swedish IP Network (Swipnet (sv), AS1257) by Investment AB Kinnevik, later renamed as Tele2, and in 1993 with telephone liberalization in Sweden, Tele2 started to offer international calls.
The three companies Comviq, Kabelvision, and Tele2 came together as the Tele2 brand on fixed-line services and Comviq on mobile services in Sweden in 1997. The Swipnet branding was phased out in 2014. International growth came in the form of acquisitions in Estonia, Lithuania, Latvia, Russia, and France.
In June 2016 Tele2 acquired the B2B services provider TDC Sweden AB from Danish TDC Group.
In November 2018, Tele2 was merged with telecom operator Com Hem, which delivered, among other things, TV, broadband and telephony. At the beginning of 2020, the streaming service Comhem Play+ was launched available to those who are not a customer at Com Hem and changed name to Tele2 Play in January 2022. The same week, the new digital operator Penny was also launched.
Divestments
Tele2's operates in Sweden and the Baltic countries Estonia, Latvia, and Lithuania only. Focusing on own infrastructure-based operations which provide higher growth options and possibly better margins for the future. One area of notable success has been the growth of the mobile Internet broadband connectivity.
Tele2 has terminated operations, activities, and holdings in the following countries: Austria, Belgium, Croatia, Finland, France, Germany, Italy, Kazakhstan, Liechtenstein, Luxembourg, Netherlands, Norway, Portugal, Poland, Russia, Switzerland, and the United Kingdom.
In 2007 the company sold its holdings in Belgium to Dutch operator KPN, in France to SFR and activities in Spain and Italy to Vodafone Italy, in Portugal to Clix and in Switzerland to TDC Sunrise. In March 2008 Tele2 divested its Austrian MVNO operations to Telekom Austria, although retaining its fixed line and internet services until the latter two services were sold to Hutchison 3 in 2017. In June 2008 |
https://en.wikipedia.org/wiki/Babyz | Babyz is a computer game in which one can play with and take care of a group of babies who live in a virtual house on the computer. The game was released in 1999 by The Learning Company and developed by PF Magic.
Gameplay
Babyz runs on top of the Petz 3 game engine, adding additional AI and voice recognition. Players can teach their Babyz how to talk, how to play with objects, and how to walk. Babyz can form relationships with other babyz that can result in sibling rivalries or friendships. At release, there were 15 babyz you could adopt and care for, as well as various toys that babyz could interact with. There are different rooms to explore and numerous clothing items. Babyz reused some of the Petz toyz and had a similar home setting for its play scenes.
Third-party content
A Babyz Community launched on the official site, which has since been shut down. The website offered adoptions and discussions. It was discovered that one could hex edit the babyz to introduce new features, called "hexies" or "hexed babyz". These were available on fan websites alongside other custom content.
Babyz was originally made for the Windows 95/98 Platform, however with the creation of a patch by Nicholas Sherlock, the game can be played on modern Windows. Sherlock's patch, called "Petz A" as it was intended for both Petz and Babyz, made the game run much smoother, with the ability to control many aspects of the game that users originally could not.
Related titles
Petz
Oddballz
References
External links
===Papers===
Creating Emotional Relationships with Virtual Characters
Virtual Babyz: Believable Agents with Narrative Intelligence
New York Times discussion
1999 video games
Virtual baby video games
Ubisoft games
PF Magic games
Video games developed in the United States
Windows games
Windows-only games
Single-player video games
Mindscape games |
https://en.wikipedia.org/wiki/Violent%20and%20Sex%20Offender%20Register | In the United Kingdom, the Violent and Sex Offender Register (ViSOR) is a database of records of those required to register with the police under the Sexual Offences Act 2003 (the 2003 Act), those jailed for more than 12 months for violent offences, and those thought to be at risk of offending. In response to a Freedom of Information request in 2009, for example, Greater Manchester Police reported that of 16 people in their area placed on ViSOR since 2007 on their initiative and not as a result of a relevant conviction, four (25%) had clean criminal records.
The Register can be accessed by the police, National Probation Service, and HM Prison Service personnel. Private companies running prisons are also granted access. It used to be managed by the National Policing Improvement Agency of the Home Office, but this was replaced by the National Crime Agency on 7 October 2013, as a feature of the Crime and Courts Act 2013, which also formally abolished the NPIA.
In April 2021, amendments were proposed to the Domestic Abuse bill to add serial domestic abusers and stalkers to the register, to give family court judges training on dealing with sexual abuse and to provide greater protection for migrant domestic violence victims. Despite the government suggesting support following the killing of Sarah Everard, all but two Conservative MPs voted down these amendments to the bill.
Notification period
Notification periods for offenders sentenced under the 2003 Act are as follows:
Imprisonment for a fixed period of 30 months or more, imprisonment for an indefinite period, imprisonment for public protection (abolished in 2012), admission to hospital under restriction order, or subject to an Order for Lifelong Restriction: Indefinitely
Imprisonment for more than 6 months but less than 30 months: 10 years
Imprisonment for 6 months or less, or admission to hospital without restriction order: 7 years
Caution: 2 years
Conditional discharge or (in Scotland) a probation order: Period of discharge or probation
Any other: 5 years
Finite notification periods are halved if the person is under 18 when convicted or cautioned.
In April 2010 the United Kingdom Supreme Court ruled that indefinite notification requirements contained in section 82(1) of the 2003 Act were a breach of individual human rights as they were disproportionate. As a result of this, appeals against indefinite inclusion within the register were introduced. Appeals can be made to the local police force by an offender after inclusion on the register for 15 years. If the local police force declines to remove the offender from the register, they may appeal to a magistrates' court.
Information held on ViSOR
Upon initial registration, offenders must provide the police with the following information:
Full name
Home address
Date of birth
National Insurance number
Bank details
Passport details (if held)
Additionally, when visited by MAPPA officers, they will be invited to, but need not, provide |
https://en.wikipedia.org/wiki/NOV%20%28computers%29 | NOV, or News Overview, is a widely deployed indexing method for Usenet articles, also found in some Internet email implementations. Written in 1992 by Geoff Collyer, NOV replaced a variety of incompatible indexing schemes used in different client programs, each typically requiring custom modifications to each news server before they could be used. In modern NNTP implementations, NOV is exposed as the and related commands.
Operation
In its original implementation, the header lines of each incoming message are examined, and a single line of text is appended to the overview files, with one overview file present for each newsgroup. Tab (ASCII code 9) characters and line breaks within the headers are converted to spaces (ASCII code 32), and the header fields within each overview line are then delimited by tab characters.
The first seven fields in a NOV line are fixed and unlabeled:
Subject: header contents
From: header contents
Date: header contents
Message-ID: header contents
References: header contents
Size of the article in octets
Lines: header contents
The header lines are those defined in either RFC 2822 or RFC 1036. If data for any of these fields is missing, a tab alone is put in its place. The value of the size field is approximate, as servers may count line endings as one or two characters. Additionally, the lines value may be calculated by the server, supplied by the message sender, or omitted altogether.
An arbitrary number of additional fields may be added to any NOV line. The eighth and later fields must be labeled in the form "Header-Name: contents", again delimited by tabs. The order and presence of additional fields are allowed to vary from line to line, and from server to server. Some server provide a schema of what is recorded to new overview lines in the form of an NNTP command, but this cannot be relied upon to be accurate for older entries.
In practice, most servers supply only one optional field, the contents of the Xref: header, to allow crosspost management.
Variations
While virtually all modern news server and newsreader software employs NOV, it has also found its way into other applications such as email clients. One prominent example is Gnus, which can take advantage of overview files for faster access to large mail folders.
Many newer news servers store NOV data in a variety of formats. A specialized database is frequently used in favor of the original flat file arrangement.
External links
Original NOV software distribution (mirror at Funet, formerly hosted at ftp.std.com)
describes the command.
Usenet |
https://en.wikipedia.org/wiki/Treehouse%20of%20Horror%20VII | "Treehouse of Horror VII" is the first episode of the eighth season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on October 27, 1996. In the seventh annual Treehouse of Horror episode, Bart discovers his long-lost twin, Lisa grows a colony of small beings, and Kang and Kodos impersonate Bill Clinton and Bob Dole in order to win the 1996 presidential election. It was written by Ken Keeler, Dan Greaney, and David X. Cohen, and directed by Mike B. Anderson. Phil Hartman provided the voice of Bill Clinton. This is the first Treehouse of Horror episode to be a season premiere.
Plot
Opening
In the kitchen, Homer Simpson lights a jack-o'-lantern but ends up lighting his arm on fire. He runs off screaming while the title, "The Simpsons Halloween Special VII" is shown on screen.
"The Thing and I"
Bart Simpson and Lisa Simpson hear strange noises coming from the attic. They investigate and discover that there is a monster. Homer Simpson and Marge Simpson realize that the creature has escaped, prompting Marge to call Dr. Hibbert. He explains that Bart has an evil twin named Hugo. The two were originally conjoined but were separated at birth. Hugo was deemed too evil to live in society, so they chained him in the attic, where they feed him fish-heads. Bart stays behind as the others leave to search for Hugo, but Bart realizes that Hugo never left the house. Hugo takes Bart to the attic and ties him up, so that he can reattach himself, but Hibbert returns and knocks out Hugo. He then realizes that Hugo's scar is on the wrong side, therefore Bart is technically the evil twin. To make amends for their error, Hibbert and the Simpson family sit down to a turkey dinner with Hugo, leaving Bart locked in the attic with only Hugo's fish-heads to eat.
"The Genesis Tub"
In preparation for the school science fair, Lisa performs an experiment in a petri dish to see if cola will dissolve her baby tooth. Bart gives Lisa a static electric shock, claiming it is part of his project to prove that "nerds conduct electricity". The electric charge is then passed on to the tooth when Lisa tries to touch it, causing it to undergo an unusual reaction which creates a race of miniature beings. Lisa discovers this when inspecting the contents of the tub with a microscope, noting that their rate of evolution is accelerated. Bart destroys some of the ecosystem in Lisa's tub universe with his finger, and the tub people retaliate by sending a squadron of spaceships to attack him. The inhabitants of the tub then shrink Lisa to their size with a miniaturization ray and beam her down into the tub, where they explain that they regard her as God, and Bart as the Devil. She says she can protect them from Bart if they return her to normal size, but they lack the necessary technology. Suddenly, Bart takes the tub to the science fair to the tub people's horror and submits the tiny universe as his own project, and now Lisa i |
https://en.wikipedia.org/wiki/Treehouse%20of%20Horror%20VIII | "Treehouse of Horror VIII" is the fifth episode of the ninth season of the American animated television series The Simpsons. It first aired on the Fox network in the United States on October 26, 1997. In the eighth annual Treehouse of Horror episode, Homer Simpson is the last Springfieldian left alive when a neutron bomb destroys Springfield until a gang of mutants come after him, Homer buys a transporter that Bart uses to switch bodies with a housefly, and Marge is accused of witchcraft in a Puritan rendition of Springfield in 1649. It was written by Mike Scully, David X. Cohen and Ned Goldreyer, and was directed by Mark Kirkland.
Plot
Opening
A censor for the Fox network named Fox Censor is sitting at his desk going through the show's script, censoring some things and explaining to the audience that the episode is rated TV-G with no violence or anything explicit. As he continues talking, a hand reaches with a sword from the rating and stabs him many times with the rating changing from TV-G to TV-PG, TV-14, TV-MA to the fictional ratings TV-21 and TV-666. He falls on his desk dead and his blood spells the title, "The Simpsons Halloween Special VIII". In this episode, the couch gag features the family sitting on the couch with metal shackles and caps attached to their bodies while electrocuting them.
The HΩmega Man
After Mayor Quimby makes an offensive joke about France, the French president launches a neutron bomb directly into Springfield, apparently killing everyone except Homer, who had been inspecting a bomb shelter he was considering buying from Herman. Homer emerges and seems to be the only person in Springfield left alive. Initially grieving for his loved ones, Homer perks up, realizing that being the last person allows him to do everything he always wanted to. While dancing naked in church, he is confronted by a band of hostile Springfield citizens who have become mutants from the blast. Homer flees back home where he discovers that his family survived as their house was protected by its many layers of lead paint. Marge and the children kill the mutants with shotguns and then the family head off to steal some Ferraris.
Fly vs. Fly
Homer buys a matter transporter from Professor Frink. Bart sees the family pets inadvertently go through the transporter together, resulting in a DNA mismatch. This gives him the idea to enter the teleporter with a fly, thinking that he will become a mutant superhero. However, the machine simply switches their heads around. Bart appeals to Lisa for help, but she is chased by the fly and cornered in the kitchen. Bart tries to stop the fighting, but is eaten by the fly. Lisa then pushes the fly into the teleporter. Bart comes out the other end, fully restored. Homer furiously chases Bart with an axe for messing with the device.
Easy-Bake Coven
In 1649, the town is witness to many witch burnings. In the church, the townspeople try to figure out whom to condemn next. People begin accusing others and soon they |
https://en.wikipedia.org/wiki/Team%20%28disambiguation%29 | A Team is a group of people or other animals linked in a common purpose.
Team or variants may also refer to:
Film, radio and television
The Team (radio network), a Canadian sports radio network
The Team (TV series), a television series in a number of African and Asian countries
The Team (2015 TV series), a 2015 European crime serial television series
The Team (reality show), a reality show broadcast by Channel One Russia
"The Team" (Agents of S.H.I.E.L.D.), an episode of the television series Agents of S.H.I.E.L.D.
Music
Bands
Team (American band), an American indie rock band
Team (Slovak band), a Slovak pop/rock music band
The Team (group), an American hip hop group
Songs
"Team" (Iggy Azalea song), 2016
"Team" (Lorde song), 2013
Politics
The European Alliance of EU-critical Movements, a Eurosceptic alliance
The Electors' Action Movement, a municipal political party in Vancouver, British Columbia
The Emigration Action Movement, a political group that ran in the 1960 Cork Corporation election
Other uses
Team (horse), a racehorse
River Team, a tributary of the River Tyne in Gateshead, England
Confederation of Thai Electrical Appliances, Electronic Automobile & Metalworkers, a trade union federation in Thailand
European Health Insurance Card ()
The Evangelical Alliance Mission, a Christian missionary organization
TEAM Linhas Aéreas, a Brazilian airline
Transmission Electron Aberration-Corrected Microscope, a research project
See also
Teem a lemon-lime-flavored soft drink
TEAMS (disambiguation) |
https://en.wikipedia.org/wiki/Millipede%20%28disambiguation%29 | A millipede is a myriapod with two pairs of legs on most segments.
Millipede may also refer to:
Millipede (video game), a 1982 arcade game sequel to Centipede
Millipede memory, non-volatile computer memory
See also
Centipede (disambiguation)
de:Millipede |
https://en.wikipedia.org/wiki/Double%20Talk | Double Talk is an American game show that aired on the ABC network from August 18 to December 19, 1986. The show was a Bob Stewart-produced word game which borrowed elements from Stewart's previous show Shoot for the Stars and his then-current editions of Pyramid.
Double Talk was hosted by actor and frequent Pyramid panelist Henry Polic II. Bob Hilton announced for the first two weeks, with Johnny Gilbert replacing him for the remaining sixteen.
Near the end of its run, the show was retitled Celebrity Double Talk. However, no format changes took place with the change in the show's title.
Gameplay
Main game
Two teams, each consisting of a contestant and celebrity competed. The object was for the team to work together and decipher puzzles that are written "in other words" style. For example, "Twice / Speak" translated to "Double Talk", the show's title. The slash represented a break in the puzzle, and each partner had to solve half of the puzzle to score. As noted above, this game play mechanic was borrowed from Shoot For the Stars but slightly modified for Double Talk.
The game board had four hidden puzzles on it, each worth ten points if correctly solved by the team in control. The controlling team could continue to solve puzzles until they solved all four puzzles on the board or made a mistake. If either partner could not solve their half, control passed to the other team, who could score five points and end the round by providing the correct response to the puzzle missed by their opponents. If the second team provided an incorrect response in their attempt to steal, play continued with the original team and any remaining unrevealed puzzles.
Round One ended after both teams played one board. In Round Two, each team again attempted four puzzles on their own board, with correct responses worth twenty points, but still only five points for a steal.
The team with the higher score at the end of Round Two won the game and played the bonus round for $10,000. If both teams were tied at the end of Round Two, the scores were reset to zero and teams attempted to solve a best-of-three puzzles by buzzing-in and responding in the same manner as before. Each puzzle solved correctly was worth ten points; otherwise, those points were awarded to the other team upon buzzing in incorrectly. Whoever scored twenty points first won the game and played the bonus round.
Jackpot puzzle
If a team was able to solve all four puzzles on the board, they were shown a fifth, harder puzzle. If the team solved the puzzle, the contestant won a jackpot that started at $1,000 and increased by that amount each day until won.
Format changes
Later, teams were only required to solve three of the four puzzles in order to obtain a chance at the Jackpot Puzzle. Additionally, after stealing a puzzle and winning five points, play continued with the original team until they had played three of the four puzzles on that board. However, missing a puzzle forfeited the chance at the Jack |
https://en.wikipedia.org/wiki/Cram%20%28game%20show%29 | Cram is an American game show which aired on Game Show Network in 2003. The show featured two teams, each composed of two contestants. For 24 hours before taping, the contestants were sequestered, sleep deprived at a storefront (located at the then named Kodak Theatre on Hollywood Boulevard, which is now called the Dolby Theatre). Contestants were then escorted to Sony Pictures Studios, in Culver City, California, where the actual gameplay would commence; with the intent of the contestants staying awake, and "cramming" various material such as trivia questions and jokes, which they would then answer on the show while attempting physical stunts in an attempt to stay awake. Graham Elwood was the show's host, with assistance from Berglind Icey, Arturo Gil, and Andrea Hutchman.
Format
The Rant
Two teams, each with two members each, forming a pre-existing relationship, are introduced to the audience. To start, both teams were given a default consolation of 100 points. Round one consisted of The Rant. Each team was required to talk about one of three articles, (two in the second season) they had been assigned to read, while exercising inside a giant hamster wheel.
The team who won a "3 a.m. coin toss", that was done before the show, selected one of the article topics to Rant about, while the other team picked from the remaining choice(s). (Which season two featured only two articles, and the other team automatically, were tasked with the other article topic). Each team had to talk continuously for 40 seconds, (which each team member respectively talking for 20 seconds) basically trying their best to memorize verbatim, and word for word, the article they have chosen, that they were indubitably presented with, and hopefully read to study before, with the main goal of having the contestant incidentally say a preselected highlighted key word from a list which the producers have previously chosen. (This list is shown to home viewers, but not the contestants.)
If a contestant stopped talking, was stalling, was being mute for more than a second, stuttered or stammered with their speech, or if they were going off-topic at any point, the team was penalized five points per violation.
If a team said one of the eight hidden key words or phrases related to the article, ten points were added to their score. Which if teams are able to concoct more words from the list, points are added. Which also in turn, penalties were strictly immediately enforced, complimented, and followed by a loud buzzer, intending to further disrupt a player from ranting. After the first team Ranted, the second team attempted their Rant. However, both teams had to continually walk inside the wheels during both Rants.
In many cases, due to the haphazardness of this round, after a team rants, Elwood would enact and explain technicalities the judges gave, either negatively (if a team said a key word incompletely, or slightly mispronounced a key word, misspoke a key word, or said a version o |
https://en.wikipedia.org/wiki/Strictfp | strictfp is an obsolete and redundant reserved word in the Java programming language. Previously, this keyword was used as a modifier that restricted floating-point calculations to IEEE 754 semantics in order to ensure portability. The strictfp keyword was introduced into Java with the Java virtual machine (JVM) version 1.2 and its functionality was removed in JVM version 17. As of Java 17, IEEE 754 semantics is required, thus using this keyword has no effect.
Basis
The IEEE standard IEEE 754 specifies a standard method for both floating-point calculations and storage of floating-point values in various formats,
including single (32-bit, used in Java's float) or double (64-bit, used in Java's double) precision.
Some hardware also provides extended precision formats that provide higher precision and/or a larger exponent range. On such architectures it may be more efficient to compute intermediate results using such extended formats. This may avoid round-off errors, overflows and underflows that would otherwise occur, but can cause programs to produce different output on such architectures. It was particularly expensive to avoid the use of extended precision on x86 machines with the traditional x87 floating-point architecture. Although it was easy to control calculation precision, limiting the exponent range for intermediate results required additional costly instructions.
Prior to JVM 1.2, floating-point calculations were required to be strict; that is, all intermediate floating-point results were required to behave as if represented using IEEE single or double precisions. This made it expensive on common x87-based hardware to ensure that overflows would occur where required.
Starting with JVM 1.2, intermediate computations were, by default, allowed to exceed the standard exponent ranges associated with IEEE 32 bit and 64 bit formats. They were permitted to instead be represented as a member of the "extended-exponent" value set. On platforms like x87, overflows and underflows might not occur where expected, producing possibly more meaningful, but less repeatable, results instead.
Since x87 floating point is no longer necessary on x86 processors supporting SSE2, Java 17 again made all floating-point operations strict, effectively restoring the pre-1.2 semantics.
How it works
In the absence of overflow or underflow, there is no difference in results with or without strictfp. If repeatability is essential, the strictfp modifier can be used to ensure that overflow and underflow occurs in the same places on all platforms. Without the strictfp modifier, intermediate results may use a larger exponent range.
The strictfp modifier accomplishes this by representing all intermediate values as IEEE single precision and double precision values, as occurred in earlier versions of the JVM.
Usage
Programmers can use the modifier strictfp to ensure that calculations are performed as in the earlier versions; that is, only with IEEE single and double prec |
https://en.wikipedia.org/wiki/Font%20management%20software | Font management software is a kind of utility software that computer users use to browse and preview fonts and typically to install and uninstall fonts. Some font management software may be able to also:
activate and deactivate fonts (users can do this manually; sometimes programs will do this in conjunction with specific software)
protect fonts that are required by the system by preventing them from being uninstalled
organize fonts by groups and libraries
find and uninstall corrupt fonts
rename font files
view fonts that are not currently installed
print font samples or font books illustrating some or all of the fonts on the system
sort fonts according to different criteria
search for fonts meeting specific criteria
Objectives
Font management software generally possesses more font management capabilities than most operating systems.
Finding and Evaluating Fonts
Font management software allows its users to catalogue and inspect fonts on their system. Font management software allows its users to view a font in multiple ways.
Users can inspect the font in more detail, such as looking at the fonts glyphs, or comparing another font.
Font management software may also provide detail on the glyph count of a font, if the font can be embedded (such as in a PDF), or the creator of the font.
System Stability
Font management software may be able to activate or deactivate fonts depending on when they are needed. This reduces the load on the system to keep many font active at the same time.
Some font management programs can activate fonts or a specific group of fonts when a program or document launched. When the program or document is closed, the font management software can deactivate the same fonts. This method of activating fonts can activate fonts on the fly (such as during a specific project), reducing the load on the system.
Linux-based operating systems generally do not pre-load fonts on a system-wide basis. Instead, each application loads them as it needs them. Current Linux desktop environments (such as KDE and Gnome) manage fonts for applications using their internal framework library calls for font display, allowing management of fonts via the GUI.
List of font management software
Note: Information on supported fonts is not readily available from many manufacturers. However, most of the major commercial programs support OpenType and TrueType fonts.
Discontinued font management software
Note: Information on supported fonts is not readily available from many manufacturers. However, most of the major commercial programs support OpenType and TrueType fonts.
References
Further reading
Management software |
https://en.wikipedia.org/wiki/Wembley%20Stadium%20railway%20station | Wembley Stadium railway station is a Network Rail station in Wembley, Greater London, on the Chiltern Main Line. It is the nearest station to Wembley Stadium, and is located a quarter of a mile (400 m) south west of the sports venue.
History
First Wembley Stadium station
The first station to bear the name Wembley Stadium, at (), about east-north-east of the present station, was opened by the LNER on 28 April 1923 as The Exhibition Station (Wembley). It had one platform, and was situated on a loop which forked off the Chiltern Main Line between Neasden Junction and Wembley Hill station (now Wembley Stadium station, see below). It then curved round in a clockwise direction to regain the Chiltern Main Line at a point slightly closer to Neasden Junction. The connections faced London to allow an intensive service with no reversing. The station was renamed several times, becoming Wembley Stadium station in 1928. The station was last used on 18 May 1968 for the 1968 FA Cup final between Everton v West Bromwich Albion, and was officially closed on 1 September 1969.
Traces of the line can be seen on maps and in aerial photographs. It was normally used only for passenger services for events at the stadium or the Empire Pool within the estate, built for the 1924-25 British Empire Exhibition. Temporary sidings led into the "Palace of Engineering" exhibition hall where both the Great Western Railway's locomotive Caerphilly Castle and the London and North Eastern Railway's Flying Scotsman were displayed, with each claimed by its owners to be the most powerful passenger locomotive in Britain.
Present station
On 20 November 1905 the Great Central Railway opened a new route for freight trains between Neasden Junction and Northolt Junction. Passenger services from Marylebone began on 1 March 1906, when three new stations were opened: Wembley Hill, and South Harrow. On 2 April 1906 these services were extended to Northolt Junction.
Wembley Hill station was renamed Wembley Complex on 8 May 1978 in order to indicate its proximity to the nearby sports facilities, as well as to a recently opened conference centre, before getting its present name Wembley Stadium on 11 May 1987. There were originally four tracks with the two platforms on passing loops outside the inner non-stop running lines; the current two-track layout dates from the 1960s. The 4 tracks were closed for a week by a landslide in a cutting near the station from 18 February 1918.
Services
Train services are operated by Chiltern Railways and run from London Marylebone towards High Wycombe and Oxford.
The typical off-peak service is:
2 trains per hour to London Marylebone
1 train per hour to High Wycombe
1 train per hour to Oxford
The service to central London is quicker than from other stations in the area. Trains can reach London Marylebone non-stop in ten minutes.
During busier periods (usually due to an event at the stadium) a seven carriage shuttle operates between Marylebone and Wembley St |
https://en.wikipedia.org/wiki/International%20Federation%20for%20Information%20Processing | The International Federation for Information Processing (IFIP) is a global organisation for researchers and professionals working in the field of computing to conduct research, develop standards and promote information sharing.
Established in 1960 under the auspices of UNESCO, IFIP is recognised by the United Nations and links some 50 national and international societies and academies of science with a total membership of over half a million professionals. IFIP is based in Laxenburg, Austria and is an international, non-governmental organisation that operates on a non-profit basis.
Overview
IFIP activities are coordinated by 13 Technical Committees (TCs) which are organised into more than 100 Working Groups (WGs), bringing together over 3,500 ICT professionals and researchers from around the world to conduct research, develop standards and promote information sharing. Each TC covers a particular aspect of computing and related disciplines, as detailed below.
IFIP actively promotes the principle of open access and proceedings for which IFIP holds the copyright are made available electronically via IFIP's Open Access Digital Library. Downloading articles from IFIP's Open Access Digital Library is free of charge.
Conference and workshop organizers who prefer publication with the IFIP publisher can take advantage of the agreement between IFIP and Springer and publish their proceedings as part of IFIP's Advances in Information and Communication Technology (AICT) series, the Lecture Notes in Computer Science (LNCS) series or the Lecture Notes in Business Information Processing (LNBIP) series. IFIP Proceedings published by Springer in IFIP's AICT, LNCS, and LNBIP series are accessible within IFIP's Open Access Digital Library after an embargo period of three years.
An important activity of the IFIP Technical Committees is to organise and sponsor high quality conferences and workshops in the field of ICT. Sponsoring is generally in the form of Best Paper Awards (BPA) and/or Student Travel Grants (STG). To assist conference and workshop organisers, IFIP has facilities to host conference websites and supports conference management systems such as JEMS, which include export functions that seamlessly integrate with IFIP's Open DL.
History
IFIP was established in 1960 under the auspices of UNESCO, originally under the name of the International Federation of Information Processing Societies (IFIPS). In preparation, UNESCO had organised the first International Conference on Information Processing, which took place in June 1959 in Paris, and is now considered the first IFIP Congress. Christopher Strachey gave a paper "Time Sharing in Large Fast Computers" at the conference where he envisaged a programmer debugging a program at a console (like a teletype) connected to the computer, while another program was running in the computer at the same time. At the conference, he passed the concept on to J. C. R. Licklider.
The name was changed to IFIP in 1961. T |
https://en.wikipedia.org/wiki/List%20of%20relational%20database%20management%20systems | This is a list of relational database management systems.
List of software
4th Dimension
Access Database Engine (formerly known as Jet Database Engine)
Actian Zen (PSQL) (formerly known as Pervasive PSQL)
Adabas D
Airtable
Apache Derby
Apache Ignite
Aster Data
Amazon Aurora
Altibase
CA Datacom
CA IDMS
Clarion
ClickHouse
Clustrix
CockroachDB
CSQL
CUBRID
DataEase
DataFlex
Database Management Library
Dataphor
dBase
Derby (aka Java DB)
Empress Embedded Database
Exasol
Extensible Storage Engine
EnterpriseDB
eXtremeDB
FileMaker Pro
Firebird
FoundationDB
FrontBase
Greenplum
GroveSite
H2
Helix
HSQLDB
IBM Db2
IBM Lotus Approach
Infobright
Informix
Ingres
InterBase
InterSystems Caché
InterSystems IRIS Data Platform
Linter
MariaDB
MaxDB
Microsoft SQL Server
Microsoft SQL Server Express
SQL Azure (Cloud SQL Server)
Microsoft Visual FoxPro
Mimer SQL
MonetDB
mSQL
MySQL
Netezza
NexusDB
NonStop SQL
NuoDB
Omnis Studio
OpenLink Virtuoso (Open Source Edition)
OpenLink Virtuoso Universal Server
Oracle
Oracle Rdb for OpenVMS
Panorama
Paradox
Percona Server for MySQL
Percona XtraDB Cluster
Polyhedra
PostgreSQL
Postgres Plus Advanced Server
Progress Software
R:Base
RethinkDB
SAND CDBMS
SAP HANA
SAP Adaptive Server Enterprise
SAP IQ (formerly known as Sybase IQ)
SingleStore
Snowflake Cloud Data Warehouse
solidDB
SQL Anywhere (formerly known as Sybase Adaptive Server Anywhere and Watcom SQL)
SQLBase
SQLite
SQream DB
SAP Advantage Database Server (formerly known as Sybase Advantage Database Server)
Teradata
TiDB
TimesTen
Trafodion
Transbase
Unisys RDMS 2200
UniData
UniVerse
Vectorwise
Vertica
VoltDB
YugabyteDB
Front-end User interfaces Only
Apache OpenOffice Base
HSQLDB
LibreOffice Base
Firebird
HSQLDB
Microsoft Access
Access Database Engine
Discontinued
Britton Lee IDMs
Cornerstone
DM/BasisPlus
Google Fusion Tables
IBM Business System 12
IBM System R
MICRO Relational Database Management System
Pick
PRTV
QBE
IBM SQL/DS
Sybase SQL Server
Front-end User interfaces Only
OpenOffice.org Base
HSQLDB
StarBase
Adabas D
Relational by the Date–Darwen–Pascal Model
Current
Alphora Dataphor (a proprietary virtual, federated DBMS and RAD MS .Net IDE).
Rel (free Java implementation).
Obsolete
IBM Business System 12
IBM IS1
IBM PRTV (ISBL)
Multics Relational Data Store
See also
Comparison of object–relational database management systems
Comparison of relational database management systems
Comparison of database administration tools
Relational Database Management Systems
Relational database management systems |
https://en.wikipedia.org/wiki/Comparison%20of%20relational%20database%20management%20systems | The following tables compare general and technical information for a number of relational database management systems. Please see the individual products' articles for further information. Unless otherwise specified in footnotes, comparisons are based on the stable versions without any add-ons, extensions or external programs.
General information
Operating system support
The operating systems that the RDBMSes can run on.
Fundamental features
Information about what fundamental RDBMS features are implemented natively.
Note (1): Currently only supports read uncommited transaction isolation. Version 1.9 adds serializable isolation and version 2.0 will be fully ACID compliant.
Note (2): MariaDB and MySQL provide ACID compliance through the default InnoDB storage engine.
Note (3): "For other than InnoDB storage engines, MySQL Server parses and ignores the and syntax in statements. The clause is parsed but ignored by all storage engines."
Note (4): Support for Unicode is new in version 10.0.
Note (5): MySQL provides GUI interface through MySQL Workbench.
Note (6): OpenEdge SQL database engine uses Referential Integrity, OpenEdge ABL Database engine does not and is handled via database triggers.
Limits
Information about data size limits.
Note (1): Firebird 2.x maximum database size is effectively unlimited with the largest known database size >980 GB. Firebird 1.5.x maximum database size: 32 TB.
Note (2): Limit is 1038 using DECIMAL datatype.
Note (3): InnoDB is limited to 8,000 bytes (excluding VARBINARY, VARCHAR, BLOB, or TEXT columns).
Note (4): InnoDB is limited to 1,017 columns.
Note (6): Using VARCHAR (MAX) in SQL 2005 and later.
Note (7): When using a page size of 32 KB, and when BLOB/CLOB data is stored in the database file.
Note (8): Java array size limit of 2,147,483,648 (231) objects per array applies. This limit applies to number of characters in names, rows per table, columns per table, and characters per CHAR/VARCHAR.
Note (9): Despite the lack of a date datatype, SQLite does include date and time functions, which work for timestamps between 24 November 4714 B.C. and 1 November 5352.
Note (10): Informix DATETIME type has adjustable range from YEAR only through 1/10000th second. DATETIME date range is 0001-01-01 00:00:00.00000 through 9999-12-31 23:59:59.99999.
Note (11): Since version 12c. Earlier versions support up to .
Note (12): The limit refers to the storage limit of a single Informix server instance. Informix v12.10 and later versions support using sharding techniques to distribute a table across multiple server instances. A distributed Informix database has no upper limit on table or database size.
Note (13): Informix DECIMAL type supports up to 32 decimal digits of precision with a range of to . Fixed and variable precision are supported.
Tables and views
Information about what tables and views (other than basic ones) are supported natively.
Note (1): Server provides tempdb, which can be used for |
https://en.wikipedia.org/wiki/Cable%20telephony | Cable telephony is a form of digital telephony over cable TV networks. A telephone interface installed at the customer's premises converts analog signals from the customer's in-home wiring to a digital signal, which is then sent over the cable connection to the company's switching center. The signal is then sent on to the public switched telephone network (PSTN). Cable telephone provides another revenue stream for cable television system operators and gives the consumer the convenience of a single bill for combined television, internet and telephone services.
Emergency calls
The biggest obstacle to cable telephone service is the need for nearly 100% reliable service for emergency calls. PacketCable, one of the emerging standards being developed for digital cable telephony, seems to be the most promising and able to work with the quality of service demands of traditional analog telephone service.
Advantage
The biggest advantage to digital cable telephone service is similar to the advantage of digital cable television, namely that data can be compressed, resulting in much less bandwidth used than a dedicated analog circuit-switched service. Other advantages include better voice quality and perhaps future integration to a VoIP network providing cheap or unlimited nationwide and international calling. In most cases, digital cable telephone service is separate from broadband Internet access service being offered by many cable companies and does not rely on IP traffic or the Internet.
Disadvantage
One possible disadvantage to digital cable telephone service is similar to a disadvantage of cable Internet access, namely that the medium is shared, which could result in occasional delays and drops when high volumes of bandwidth are used or in some cases shared with entire neighborhoods. These delays could be experienced during the "prime time" parts of the day, when heavy Internet usage and Internet streaming devices can make telephone calls on this system difficult. However, by utilizing Cable Lab's Packet Cable interface specifications, cable operators are able to diminish the effects of heavy internet usage on call quality. This is done by way of QoS provisions present in the Packet Cable specifications.
The second disadvantage it that this service requires power at the subscriber's end. In an emergency, if mains power is lost and without the battery backup unit provided at an additional cost by the cable provider, this telephone service ceases to function. Traditional landline service from phone companies supply phantom power over the communication wires and therefore keep attached devices operational.
References
Telephony
Cable television technology |
https://en.wikipedia.org/wiki/STRINGCOMP | STRINGCOMP was a programming language developed at Bolt, Beranek and Newman (BBN).
It was one of the three variants of JOSS II (along with TELCOMP and FILECOMP) that were developed by BBN. It had extended string handling capabilities to augment JOSS's mathematical focus. It was a strong influence in the development of the programming language MUMPS.
JOSS programming language family |
https://en.wikipedia.org/wiki/Strongtalk | In computing, Strongtalk is a Smalltalk environment with optional static typing support. Strongtalk can make some compile time checks, and offer stronger type safety guarantees; this is the source of its name. It is non-commercial, though it was originally a commercial project developed by a small startup company named LongView Technologies (trading as Animorphic Systems).
History
David Griswold wanted to use Smalltalk more extensively, but then-extant implementations were insufficient for his needs. He wanted to improve the performance, add type-checking, and use native graphical user interface (GUI) widgets. His efforts resulted in the 1993 paper he co-authored with Gilad Bracha. This version was based on adding type-checking to the ParcPlace Systems implementation of Smalltalk. However, an implementation begun from scratch could gain a better typing system.
He became interested in the improvements that the team for the language Self had achieved, and envisioned the same methods used to improve Smalltalk. Urs Hölzle, who worked on the powerful Self compiler, spoke with Griswold about implementing the same type feedback in a Smalltalk compiler. Griswold, Hölzle, Lars Bak, and others formed a small company (LongView Technologies, doing business as Animorphic Systems) to re-implement Strongtalk. Work began in 1994 and they completed an implementation in 1996. The firm was bought by Sun Microsystems in 1997, and the team got focused on Java, releasing the HotSpot virtual machine, and work on Strongtalk stalled.
Sun released the 1997 re-implementation of Strongtalk as open-source software under a revised BSD license, including the Strongtalk system image in 2002, and the virtual machine in 2006. Strongtalk is touted as the fastest implementation of Smalltalk. Strongtalk is available for Windows XP (other ports are in the works) and includes a basic development environment.
See also
JavaScript
HotSpot (Java virtual machine)
References
External links
Strong Smalltalk at smalltalk.org
Strongtalk at Google Code
Class-based programming languages
Dynamically typed programming languages
Smalltalk programming language family |
https://en.wikipedia.org/wiki/Leo%20Irakliotis | Leo Irakliotis is a computer engineer. His early work was on optical information processing. With Leo Kadanoff he founded the Center for Presentation of Science at the University of Chicago, where he taught computer science from 1997 until 2009.
Irakliotis earned a master's degree in theoretical physics from Miami University (Ohio) and a Ph.D. degree in Electrical and Computer Engineering from Colorado State University. In 2005, Irakliotis worked with Jef Raskin to design a new curriculum on humane interfaces and computer enterprises. The project was never completed due to Raskin's death in the same year.
References
Greek academics
Living people
Year of birth missing (living people)
University of Chicago faculty |
https://en.wikipedia.org/wiki/Entry%20point | In computer programming, an entry point is the place in a program where the execution of a program begins, and where the program has access to command line arguments.
To start a program's execution, the loader or operating system passes control to its entry point. (During booting, the operating system itself is the program). This marks the transition from load time (and dynamic link time, if present) to run time.
For some operating systems and programming languages, the entry point is in a runtime library, a set of support functions for the language. The library code initializes the program and then passes control to the program proper. In other cases, the program may initialize the runtime library itself.
In simple systems, execution begins at the first statement, which is common in interpreted languages, simple executable formats, and boot loaders. In other cases, the entry point is at some other known memory address which can be an absolute address or relative address (offset).
Alternatively, execution of a program can begin at a named point, either with a conventional name defined by the programming language or operating system or at a caller-specified name. In many C-family languages, this is a function called main; as a result, the entry point is often known as the main function.
In JVM languages such as Java the entry point is a static method called main; in CLI languages such as C# the entry point is a static method named Main.
Usage
Entry points apply both to source code and to executable files. However, in day-to-day software development, programmers specify the entry points only in source code, which makes them much better known. Entry points in executable files depend on the application binary interface (ABI) of the actual operating system, and are generated by the compiler or linker (if not fixed by the ABI). Other linked object files may also have entry points, which are used later by the linker when generating entry points of an executable file.
Entry points are capable of passing on command arguments, variables, or other information as a local variable used by the Main() method. This way, specific options may be set upon execution of the program, and then interpreted by the program. Many programs use this as an alternative way to configure different settings, or perform a set variety of actions using a single program.
Contemporary
In most of today's popular programming languages and operating systems, a computer program usually only has a single entry point.
In C, C++, D, Zig, Rust and Kotlin programs this is a function named main; in Java it is a static method named main (although the class must be specified at the invocation time), and in C# it is a static method named Main.
In many major operating systems, the standard executable format has a single entry point. In the Executable and Linkable Format (ELF), used in Unix and Unix-like systems such as Linux, the entry point is specified in the e_entry field of the ELF |
https://en.wikipedia.org/wiki/Next%20Step | Next Step or Nextstep may refer to:
NeXTSTEP, a UNIX-based computer operating system developed by NeXT in the 1980s and 1990s
OpenStep, an open platform version of NeXTSTEP originated by Sun Microsystems and NeXT
Rhapsody (operating system), the Apple Macintosh NeXTSTEP/classic Mac OS hybrid predecessor to macOS
Darwin (operating system), the open source version of macOS
GNUstep, an open source version of NeXTSTEP originated by the GNU Organization
Next Space Technologies for Exploration Partnerships (NextSTEP), a NASA program
Next Step Tour, a 1999 tour by the British pop group Steps
Nextstep (magazine), an American magazine for high school students
Nextstep, the initial name of Sense of Purpose, a hardcore punk band from Melbourne
See also
The Next Step (disambiguation)
NeXstep, a brand of Coca-Cola Co.
NexStep, a polyurethane product from Interface, Inc.
Next (disambiguation)
Step (disambiguation) |
https://en.wikipedia.org/wiki/Beenleigh%20railway%20line | The Beenleigh railway line is a suburban railway line extending 40.1 km from Park Road railway station to Beenleigh railway station. It is part of the Queensland Rail Citytrain network.
History
Originally known as the Logan railway line, the line opened to Loganlea in April 1885 being the first section of the South Coast line which was opened beyond Beenleigh to Southport in 1889.
The original city terminus of the line was Stanley St, South Brisbane until a dual track line was constructed from Dutton Park to South Brisbane opposite the Victoria Bridge opening in 1891.
The railway originally approximately paralleled Fairfield Road between Dutton Park and Yeronga. Following the 1893 Brisbane flood, the Fairfield Deviation realigned the route above the flood level onto the current alignment. The line from Dutton Park to Yeerongpilly was duplicated at the same time.
The standard gauge line from Sydney, NSW which opened in 1930 was built parallel to the line from Salisbury to South Brisbane.
The section from Yeerongpilly to Kuraby was duplicated between 1950 and 1952.
With increasing popularity of the motor car, the South Coast line was closed beyond Beenleigh in 1964.
The opening of the Merivale Bridge in 1978 connected the Beenleigh (and Cleveland) line to the Brisbane CBD, and the line was electrified in 1982. The Merivale Bridge was converted to dual gauge in 1986 and standard gauge passenger trains now terminate at Roma St.
The Gold Coast line was progressively rebuilt on a new alignment south of Beenleigh from 1996. The section from Kuraby to Beenleigh was duplicated in association with the re-establishment of the Gold Coast line in 1995. The standard gauge line was converted to dual gauge and electrified at the same time, creating a third track as far as Salisbury. The third track was later extended from Salisbury to Kuraby in 2008.
Line guide and services
Most services stop at all stations to Roma Street railway station. The typical travel time between Beenleigh and Brisbane City is approximately 59 minutes (to Central). From 2025 the line will utilize Cross River Rail and stop at the three new stations in the inner city.
Beenleigh line services typically continue as Ferny Grove line services.
Passengers for/from the Gold Coast line change at either South Bank, Altandi, Loganlea or Beenleigh; Cleveland line change at Park Road; Ipswich and Rosewood lines at Roma Street; and all other lines at Central.
Gallery
References
External links
Queensland Rail
Brisbane railway lines
Public transport in Brisbane
Railway lines opened in 1885
3 ft 6 in gauge railways in Australia |
https://en.wikipedia.org/wiki/Pharming | Pharming is a cyberattack intended to redirect a website's traffic to another, fake site by installing a malicious program on the computer. Pharming can be conducted either by changing the hosts file on a victim's computer or by exploitation of a vulnerability in DNS server software. DNS servers are computers responsible for resolving Internet names into their real IP addresses. Compromised DNS servers are sometimes referred to as "poisoned". Pharming requires unprotected access to target a computer, such as altering a customer's home computer, rather than a corporate business server.
The term "pharming" is a neologism based on the words "farming" and "phishing". Phishing is a type of social-engineering attack to obtain access credentials, such as user names and passwords. In recent years, both pharming and phishing have been used to gain information for online identity theft. Pharming has become of major concern to businesses hosting ecommerce and online banking websites. Sophisticated measures known as anti-pharming are required to protect against this serious threat. Antivirus software and spyware removal software cannot protect against pharming.
Pharming vulnerability at home and work
While malicious domain-name resolution can result from compromises in the large numbers of trusted nodes from a name lookup, the most vulnerable points of compromise are near the leaves of the Internet. For instance, incorrect entries in a desktop computer's hosts file, which circumvents name lookup with its own local name to IP address mapping, is a popular target for malware. Once rewritten, a legitimate request for a sensitive website can direct the user to a fraudulent copy. Personal computers such as desktops and laptops are often better targets for pharming because they receive poorer administration than most Internet servers.
More worrisome than host-file attacks is the compromise of a local network router. Since most routers specify a trusted DNS to clients as they join the network, misinformation here will spoil lookups for the entire LAN. Unlike host-file rewrites, local-router compromise is difficult to detect. Routers can pass bad DNS information in two ways: misconfiguration of existing settings or wholesale rewrite of embedded software (aka firmware). Many routers allow the administrator to specify a particular, trusted DNS in place of the one suggested by an upstream node (e.g., the ISP). An attacker could specify a DNS server under his control instead of a legitimate one. All subsequent resolutions would go through the bad server.
Alternatively, many routers have the ability to replace their firmware (i.e. the internal software that executes the device's more complex services). Like malware on desktop systems, a firmware replacement can be very difficult to detect. A stealthy implementation will appear to behave the same as the manufacturer's firmware; the administration page will look the same, settings will appear correct, etc. This appro |
https://en.wikipedia.org/wiki/HSI | HSI may refer to:
Science and technology
Hardware Security Integration
HSI color space, used in computer vision applications
Heterosubtypic immunity
High Speed Interconnect, a Nvidia computer chip
Horizontal shaft impactor, a type of rock crusher
Horizontal situation indicator, an aircraft instrument
Hurricane Severity Index
Hyperspectral imaging
Other uses
(surname), various Chinese surnames, romanized in Pinyin
HSI (track team)
Croatian Syrmian Initiative (), an ethnic-Croat political party in Serbia
Croatian World Games (), multi-sport international event
Hang Seng Index, a stock market index
Hastings Municipal Airport, in Hastings, Nebraska, United States
Hispanic-serving institution, an American college designation
Homeland Security Investigations, U.S. federal law enforcement agency
Horizon Services, an American rehabilitation clinic
Humane Society International, nonprofit organization for animal welfare
Icelandic Handball Association (, )
Horizontal situation indicator, (aircraft avionics)
See also
HS1 (disambiguation) ('HS' and the digit '1')
Xi (disambiguation) — and are different transliterations of the same sound in Chinese |
https://en.wikipedia.org/wiki/New%20England%20road%20marking%20system | [
{
"type": "ExternalData",
"service": "page",
"title": "New England Road Marking System/New Hampshire Interstate Routes.map"
},
{
"type": "ExternalData",
"service": "page",
"title": "New England Road Marking System/Connecticut Interstate Routes.map"
},
{
"type": "ExternalData",
"service": "page",
"title": "New England Road Marking System/Massachusetts Interstate Routes.map"
},
{
"type": "ExternalData",
"service": "page",
"title": "New England Road Marking System/Rhode Island Interstate Routes.map"
},
{
"type": "ExternalData",
"service": "page",
"title": "New England Road Marking System/Vermont Interstate Routes.map"
},
{
"type": "ExternalData",
"service": "page",
"title": "New England Road Marking System/Maine Interstate Routes.map"
}
]
The New England road marking system was a regional system of marked numbered routes in the six-state region of New England in the United States. The routes were marked by a yellow rectangular sign with black numbers and border. Many signs were painted on telephone poles. The routes were approved by the highway departments of the six New England states in April 1922.
Prior to the New England road marking system, through routes were mainly marked with colored bands on telephone poles. These were assigned by direction (red for east–west, blue for north–south and yellow for intermediate or diagonal routes). The Massachusetts Highway Commission convinced the rest of southern New England and New York to use this system in 1915 (New Hampshire and Vermont already had their own schemes, and Maine also opted out), and it was the main system until 1922.
The New England road marking system, while limited to New England, was designed for expansion to the whole country. One- and two-digit numbers were assigned to major interstate routes, with three-digit routes for state routes (marked in a rectangle, with the state abbreviation below the number). In general, odd numbers ran east–west and even numbers ran north–south. The main exception was Route 1, which was to run along the Atlantic coast from Florida to Calais, Maine. A few of the major auto trails were not to be assigned numbers, instead being marked with letters—for instance, L for the Lincoln Highway and R for the Roosevelt International Highway.
In 1926, several of the routes were supplanted by the national United States Numbered Highway System. Except for Route 1, which became U.S. Route 1, the old numbers were not used, since the U.S. Highway System uses odd numbers for north–south routes and even numbers for east–west routes. While some of the routes that did not become U.S. Routes were disbanded in the 1930s, many of these routes were transferred to state highway systems, often retaining their original route numbers.
Background
Before 1915, there was no uniform method to mark major throughways in New England or New York. Vermont and New Hampshire had existing pole marking sche |
https://en.wikipedia.org/wiki/Burroughs%20Medium%20Systems | The Burroughs B2500 through Burroughs B4900 was a series of mainframe computers developed and manufactured by Burroughs Corporation in Pasadena, California, United States, from 1966 to 1991. They were aimed at the business world with an instruction set optimized for the COBOL programming language. They were also known as Burroughs Medium Systems, by contrast with the Burroughs Large Systems and Burroughs Small Systems.
History and architecture
First generation
The B2500 and B3500 computers were announced in 1966.
They operated directly on COBOL-68's primary decimal data types: strings of up to 100 digits, with one EBCDIC or ASCII digit character or two 4-bit binary-coded decimal BCD digits per byte. Portable COBOL programs did not use binary integers at all, so the B2500 did not either, not even for memory addresses. Memory was addressed down to the 4-bit digit in big-endian style, using 5-digit decimal addresses. Floating point numbers also used base 10 rather than some binary base, and had up to 100 mantissa digits. A typical COBOL statement 'ADD A, B GIVING C' may use operands of different lengths, different digit representations, and different sign representations. This statement compiled into a single 12-byte instruction with 3 memory operands.
Complex formatting for printing was accomplished by executing a single EDIT instruction with detailed format descriptors. Other high level instructions implemented "translate this buffer through this (e.g. EBCDIC to ASCII) conversion table into that buffer" and "sort this table using these sort requirements into that table". In extreme cases, single instructions could run for several hundredths of a second. MCP could terminate over-long instructions but could not interrupt and resume partially completed instructions. (Resumption is a prerequisite for doing page style virtual memory when operands cross page boundaries.)
The machine matched COBOL so closely that the COBOL compiler was simple and fast, and COBOL programmers found it easy to do assembly programming as well.
In the original instruction set, all operations were memory-to-memory only, with no visible data registers. Arithmetic was done serially, one digit at a time, beginning with most-significant digits then working rightwards to least-significant digits. This is backwards from manual right-to-left methods and more complicated, but it allowed all result writing to be suppressed in overflow cases. Serial arithmetic worked very well for COBOL. But for languages like FORTRAN or BPL, it was much less efficient than standard word-oriented computers.
Three reserved memory locations were used as address indexing 'registers'. The third index register was dedicated to pointing at the current procedure's stack frame on the call/return stack. Other reserved memory locations controlled operand sizes when that size was not constant.
The B3500 was similar to the B2500 but with a faster cycle time and more expansion choices. The B25 |
https://en.wikipedia.org/wiki/Dutton%20Park%20railway%20station | Dutton Park railway station is located on the Beenleigh line in Queensland, Australia. It serves the Brisbane suburb of Dutton Park. The station is one of the oldest on the network.
To the west of the station lies the NSW North Coast dual gauge line primarily used by Gold Coast, NSW TrainLink XPT and freight services.
History
Dutton Park station opened in 1884 as Boggo Junction. It was the junction of the Wooloongabba line from 1884 until 1989. The Boggo Junction station is shown on the 1911 estate map for the Dutton Park Estate. The station was renamed Dutton Park three years later in 1914.
In September 1930, the standard gauge New South Wales North Coast line opened to the west of the station. In 1995, as part of the construction of the Gold Coast line, the standard gauge line was converted to dual gauge.
In early 2014, it was announced that Dutton Park would be closed if the Bus & Train Tunnel proceeded, because it would reduce the overall cost of the project, principally by ensuring that no surface-level private residential property acquisition would be required.
In June 2014, it was announced that by slightly increasing the gradient of the line, the project could proceed without the need to demolish Dutton Park station. The project was cancelled in March 2015.
Cross River Rail
The station is being relocated and receiving a major upgrade as part of Cross River Rail. The new station design has easier access for people using wheelchairs or walking frames, and parents with prams. New entry points to station will be built from Noble Street, Kent Street and Annerley Road. By 1 May 2023 the old Dutton Park station had been completely demolished.
Services
Dutton Park station is served by all stops Beenleigh line services from Beenleigh, Kuraby and Coopers Plains to Bowen Hills and Ferny Grove.
Until June 2011, Dutton Park was also served by services to Corinda via the Yeerongpilly-Corinda line.
Services by platform
References
External links
Dutton Park station Queensland Rail
Dutton Park station Queensland's Railways on the Internet
Dutton Park, Queensland
Railway stations in Brisbane
Railway stations in Australia opened in 1884 |
https://en.wikipedia.org/wiki/Tennyson%20railway%20station | Tennyson Station is a closed railway station on the Corinda–Yeerongpilly line in Tennyson, Brisbane, Queensland, Australia. It was part of the Queensland Rail City network.
History
Prior to the opening of the Merivale Bridge in 1978, through trains ran from South Brisbane to Darra and Ipswich via Tennyson plus a local shuttle service between Yeerongpilly and Corinda calling at Tennyson. After 1978 the line lost its importance and the majority of through trains were withdrawn. The shuttle was suspended briefly from 1 June 1998, but reinstated shortly afterwards, with the occasional morning & afternoon through service from Corinda to Bowen Hills railway station. The shuttle continued until 25 May 2001 when it was replaced by buses, after which the only services to the station ran from Corinda to Bowen Hills via South Brisbane in peak-hours. The last service was a 6-car Suburban Multiple Unit 220 Series from Bowen Hills to Corinda via South Brisbane, with the station closing afterwards.
The station remains completely fenced off to the public, and part of platform 2 has been demolished, leaving only a single usable platform. All go card readers, emergency phones, pay phones, CCTV cameras, and all shelters were removed from the station when it closed in 2011.
Description
Tennyson has a short platform and could only accommodate three cars at a time. Tennyson is now served only by buses.
See also
List of South East Queensland railway stations
References
External links
TransLink
Queensland Rail
Tennyson Station at QROTI
Disused railway stations in Brisbane |
https://en.wikipedia.org/wiki/History%20of%20the%20Nintendo%20Entertainment%20System | The history of the Nintendo Entertainment System (NES) spans the 1982 development of the Family Computer, to the 1985 launch of the NES, to Nintendo's rise to global dominance based upon this platform throughout the late 1980s. The or was developed in 1982 and launched in 1983 in Japan. Following the North American video game crash of 1983, the Famicom was adapted into the NES which was brazenly launched in North America in 1985. Transitioning the company from its arcade game history into this combined global 8-bit home video game console platform, the Famicom and NES continued to aggressively compete with the next-generation 16-bit consoles including the 1988 Sega Genesis. The platform was succeeded by the Super Famicom in 1990 and the Super Nintendo Entertainment System in 1991, but its support and production continued until 1995. Interest in the NES has been renewed by collectors and emulators, including Nintendo's own Virtual Console platform.
Origins (1981–1984)
Development (1981–1983)
The video game industry experienced a period of rapid growth and unprecedented popularity during the late 1970s to early 1980s, with the golden age of arcade video games and the second generation of video game consoles: Space Invaders (1978) and its shoot 'em up clones had become a phenomenal success across arcades worldwide, game consoles such as the Atari 2600 and the Intellivision became popular in North American homes, and the Epoch Cassette Vision became the best-selling console in Japan. Many companies arose in their wake to exploit the growing industry; one such company was Nintendo.
The basis for the Famicom hardware was arcade video game hardware. A major influence was Namco's Galaxian (1979), which had replaced the more intensive bitmap rendering system of Space Invaders with a hardware sprite rendering system that animated sprites over a scrolling background, allowing more detailed graphics, faster gameplay and a scrolling animated starfield background. This provided the basis for Nintendo's Radar Scope (1980) arcade hardware, which they co-developed with Ikegami Tsushinki, improving on Galaxian with technology such as high-speed emitter-coupled logic (ECL) integrated circuit (IC) chips and memory on a 50 MHz printed circuit board. Following the commercial failure of Radar Scope, the game's arcade hardware was converted for use with Donkey Kong (1981), which became a major arcade hit. Home systems at the time were not powerful enough to handle an accurate port of Donkey Kong, so Nintendo wanted to create a system that allowed a fully accurate conversion of Donkey Kong to be played in homes.
Led by Masayuki Uemura, Nintendo's R&D2 team began work on a home system in 1982, ambitiously targeted to be less expensive than its competitors, yet with performance that could not be surpassed by its competitors for at least a year. The console began development under the codename Project GAMECOM. Uemura analyzed the innards of rival consoles, including t |
https://en.wikipedia.org/wiki/Multi-frequency%20network | Data networks, such as wireless communication networks, have to trade off between services customized for a single terminal and services provided to a large number of terminals. For example, the distribution of multimedia content to a large number of resource limited portable devices (subscribers) is a complicated problem. Therefore, it is important for network operators, content retailers, and service providers to have a way to distribute content and/or other network services in a fast and efficient manner and in such a way as to increase bandwidth utilization and power efficiency.
Description
A multi-frequency network (MFN) is a network in which multiple radio frequencies (RFs) (or RF channels) are used to transmit media content. One type of MFN is a horizontal multi-frequency network (HMFN) where a distribution waveform is transmitted over different RF channels in different local areas. The same or different content may be transmitted as part of distribution waveforms carried over different RF channels in such local areas. Another type of MFN is a vertical multi-frequency network (VMFN) in which multiple radio frequency (RF) channels are used in a given local area to transmit independent distribution waveforms with an aim to increase the capacity of the network (in terms of the ability to deliver more content to a device/end user). An MFN deployment may also consist of VMFN in certain areas and HMFN in certain other areas.
In a typical VMFN, a local operations infrastructure (LOI) comprises transmitting sites that operate to transmit multiple distribution waveforms over multiple RF channels in a selected geographic area. Each distribution waveform may comprise one or more content flows that can be selected at a receiving device for rendering. Adjacent LOIs may utilize the same or different RF channels.
During operation, a receiving device may perform an RF channel switch as a result of a user request or an application request to acquire content on another RF channel. The device may also perform an RF channel switch if content acquisition failure happens for desired content e.g. due to device mobility. The device mobility is defined as the device moving from the coverage area of the current LOI to the coverage area of other neighboring LOIs. The content acquisition failure can also happen due to varying channel conditions without involving device mobility. Typically, the device may switch to any available RF channel that carries the desired content flow. In the case of content acquisition failure due to device mobility, the coverage areas of two or more LOIs may overlap so that multiple RF channels may be available that carry the desired content. These available RF channels belong to different LOIs, and each LOI may comprise a wide variety of additional content carried on other RF channels. If the device randomly selects an RF channel that carries the desired content from the available RF channels, the LOI associated with the selected RF ch |
https://en.wikipedia.org/wiki/Condensation%20algorithm | The condensation algorithm (Conditional Density Propagation) is a computer vision algorithm. The principal application is to detect and track the contour of objects moving in a cluttered environment. Object tracking is one of the more basic and difficult aspects of computer vision and is generally a prerequisite to object recognition. Being able to identify which pixels in an image make up the contour of an object is a non-trivial problem. Condensation is a probabilistic algorithm that attempts to solve this problem.
The algorithm itself is described in detail by Isard and Blake in a publication in the International Journal of Computer Vision in 1998. One of the most interesting facets of the algorithm is that it does not compute on every pixel of the image. Rather, pixels to process are chosen at random, and only a subset of the pixels end up being processed. Multiple hypotheses about what is moving are supported naturally by the probabilistic nature of the approach. The evaluation functions come largely from previous work in the area and include many standard statistical approaches. The original part of this work is the application of particle filter estimation techniques.
The algorithm’s creation was inspired by the inability of Kalman filtering to perform object tracking well in the presence of significant background clutter. The presence of clutter tends to produce probability distributions for the object state which are multi-modal and therefore poorly modeled by the Kalman filter. The condensation algorithm in its most general form requires no assumptions about the probability distributions of the object or measurements.
Algorithm overview
The condensation algorithm seeks to solve the problem of estimating the conformation of an object described by a vector at time , given observations of the detected features in the images up to and including the current time. The algorithm outputs an estimate to the state
conditional probability density by applying a nonlinear filter based on factored sampling and can be thought of as a development of a Monte-Carlo method. is a representation of the probability of possible conformations for the objects based on previous conformations and measurements. The condensation algorithm is a generative model since it models the joint distribution of the object and the observer.
The conditional density of the object at the current time is estimated as a weighted, time-indexed sample set with weights . N is a parameter determining the number of sample sets chosen. A realization of is obtained by sampling with replacement from the set with probability equal to the corresponding element of .
The assumptions that object dynamics form a temporal Markov chain and that observations are
independent of each other and the dynamics facilitate the implementation of the condensation algorithm. The first assumption allows the dynamics of the object to be entirely determined by the conditional density . |
https://en.wikipedia.org/wiki/Social%20support | Social support is the perception and actuality that one is cared for, has assistance available from other people, and most popularly, that one is part of a supportive social network. These supportive resources can be emotional (e.g., nurturance), informational (e.g., advice), or companionship (e.g., sense of belonging); tangible (e.g., financial assistance) or intangible (e.g., personal advice). Social support can be measured as the perception that one has assistance available, the actual received assistance, or the degree to which a person is integrated in a social network. Support can come from many sources, such as family, friends, pets, neighbors, coworkers, organizations, etc.
Government-provided social support may be referred to as public aid in some nations.
Social support is studied across a wide range of disciplines including psychology, communications, medicine, sociology, nursing, public health, education, rehabilitation, and social work. Social support has been linked to many benefits for both physical and mental health, but "social support" (e.g., gossiping about friends) is not always beneficial.
Social support theories and models were prevalent as intensive academic studies in the 1980s and 1990s, and are linked to the development of caregiver and payment models, and community delivery systems in the US and around the world. Two main models have been proposed to describe the link between social support and health: the buffering hypothesis and the direct effects hypothesis. Gender and cultural differences in social support have been found in fields such as education "which may not control for age, disability, income and social status, ethnic and racial, or other significant factors".
Categories and definitions
Distinctions in measurement
Social support can be categorized and measured in several different ways.
There are four common functions of social support:
Emotional support is the offering of empathy, concern, affection, love, trust, acceptance, intimacy, encouragement, or caring. It is the warmth and nurturance provided by sources of social support. Providing emotional support can let the individual know that he or she is valued.
Tangible support is the provision of financial assistance, material goods, or services. Also called instrumental support, this form of social support encompasses the concrete, direct ways people assist others.
Informational support is the provision of advice, guidance, suggestions, or useful information to someone. This type of information has the potential to help others problem-solve.
Companionship support is the type of support that gives someone a sense of social belonging (and is also called belonging). This can be seen as the presence of companions to engage in shared social activities. Formerly, it was also referred to as "esteem support" or "appraisal support", but these have since developed into alternative forms of support under the name "appraisal support" along with normative an |
https://en.wikipedia.org/wiki/Treehouse%20of%20Horror%20IX | "Treehouse of Horror IX" is the fourth episode of the tenth season of the American animated television series The Simpsons. It first aired on the Fox network in the United States on October 25, 1998. This is the ninth Treehouse of Horror episode, and, like the other "Treehouse of Horror" episodes, contains three self-contained segments: In "Hell Toupée", Homer gets a hair transplant and is possessed by the spirit of an executed criminal; in "Terror of Tiny Toon", Bart and Lisa are trapped in a special, extremely violent episode of The Itchy & Scratchy Show; and in "Starship Poopers", Marge reveals that Maggie is the product of a one-night stand with the alien Kang.
"Treehouse of Horror IX" was written by Donick Cary, Larry Doyle and David X. Cohen, and directed by Steven Dean Moore. "Terror of Tiny Toon" includes a live-action segment starring Regis Philbin and Kathie Lee Gifford. Jerry Springer and Ed McMahon also appear in the episode, voicing themselves, while Robert Englund vocally reprising the role of Freddy Krueger from the Nightmare on Elm Street film series. The episode also features Jason Voorhees from the Friday the 13th series while various characters visit the talk shows Live with Regis and Kathie Lee and The Jerry Springer Show.
In its original airing on the Fox Network, the episode had an 8.6 Nielsen rating. In 1999, composer Alf Clausen was nominated for a Primetime Emmy Award for Outstanding Music Composition for a Series for his work on the episode.
Plot
Opening sequence
The opening sequence is exactly the same as normal, but with a dark twist, as Bart does the chalkboard lines in red paint, and then the entire family is killed one by one as they arrive home (Bart falls off his skateboard when he lands on the car, Lisa is catapulted into the garage wall when she strikes Bart in the driveway, and Homer is crushed by Marge and Maggie, who presumably also die in the crash). On the couch, Freddy Krueger and Jason Voorhees are waiting for them and wonder where they are.
Hell Toupée
In a parody of the Amazing Stories episode "Hell Toupee", Snake is arrested for smoking inside the Kwik-E-Mart. Chief Wiggum explains that this is Snake's third strike, so he will be executed in accordance with the three strikes law. Before hauling Snake away, Chief Wiggum points out that Apu, Moe, and Bart are all witnesses; Snake vows to kill them all.
After the execution, which happens on live TV, Homer visits Dr. Nick, who transplants Snake's hair onto Homer's head. When Homer goes to sleep the following night, it plants its roots in Homer's brain. With the hair controlling his mind, Homer murders Apu and Moe. Bart realizes that the other two witnesses have been killed, and Homer vows to protect him. Homer locks himself and Bart in a room, but Snake's hair takes control of him. Homer tries to kill Bart with a sledgehammer. Bart begs Homer to fight the hair. After a struggle, Homer rips the hair off his head. However, the scalp comes to life, atte |
https://en.wikipedia.org/wiki/Theme%20%28computing%29 | In computing, a theme is a preset package containing graphical appearance and functionality details. A theme usually comprises a set of shapes and colors for the graphical control elements, the window decoration and the window. Themes are used to customize the look and feel of a piece of computer software or of an operating system.
Also known as a skin (or visual style in Windows XP) it is a custom graphical appearance preset package achieved by the use of a graphical user interface (GUI) that can be applied to specific computer software, operating system, and websites to suit the purpose, topic, or tastes of different users. As such, a skin can completely change the look and feel and navigation interface of a piece of application software or operating system.
Software that is capable of having a skin applied is referred to as being skinnable, and the process of writing or applying such a skin is known as skinning. Applying a skin changes a piece of software's look and feel—some skins merely make the program more aesthetically pleasing, but others can rearrange elements of the interface, potentially making the program easier to use.
Use
Themes are often used to change the look and feel of a wide range of things at once, which makes them much less granular than allowing the user to set each option individually. For example, users might want the window-borders from a particular theme, but installing it would also alter the desktop background.
One method for dealing with this is to allow the user to select which parts of the theme they want to load; for example in Windows 98, users could load the background and screensaver from a theme, but leave the icons and sounds untouched.
Video gaming
In video games, the term "skin" is similarly used to refer to an in-game character or cosmetic options for a player's character and other in-game items, which can range from different color schemes, to more elaborate designs and costumes. Skins are often awarded as unlockable content for completing specific in-game goals or milestones. Skins can sometimes include historical incarnations of the player character (such as Insomniac Games' Spider-Man, which includes unlockable skins based on Spider-Man's past comic book and film appearances), as well as crossovers with other video games (such as Final Fantasy XIII-2 offering a costume based on Ezio Auditore from the Assassin's Creed franchise, and Super Smash Bros. Ultimate offering costume items based on other video game characters for its customizable Mii Fighter characters). Fortnite Battle Royale has similarly featured extensive uses of licensed properties as the basis for skins, also including non-gaming properties such as comic book characters, the National Football League, and musicians.
Skins are sometimes distributed as part of downloadable content, and as pre-order incentives for newly-released games. In the 2010s, skins were increasingly deemed a virtual good as part of monetization strategies, espe |
https://en.wikipedia.org/wiki/Channel%208 | Channel 8 or TV 8 may refer to
Television networks, channels and stations
Channel 8 (Israel), a television channel in Israel; see List of television channels in Israel
Channel 8 (Singaporean TV channel), a Chinese-language television channel in Singapore
Channel 8 (Thai TV channel), a television channel in Thailand
TV8 (Estonia), a television channel in Estonia
TV8 (Italian TV channel), a television channel in Italy
TV8 (Lithuanian TV channel), a terrestrial, satellite and cable television channel
TV8 (Moldovan TV channel), a television channel in Moldova
TV8 (Mongolian TV channel), a television channel in Mongolia
TV8 (Swedish TV channel), a Swedish news channel
TV8 (Turkish TV channel), a Turkish television channel
8TV (Malaysian TV network), a Chinese-language television network in Malaysia
Canal 8 de Tucumán, a television station in San Miguel de Tucumán, Argentina
CBC TV 8 (Barbados), the national broadcaster of Barbados
NewsChannel 8 (cable channel), a regional cable television network in Washington, District of Columbia
TVB8, a commercial television station in Hong Kong
Canal 8 UCV TV, a Chilean television channel, 1974–2002
Ágape TV (Canal 8), a Salvadoran television channel
Fuji Television, a Japanese television station
Trojan Vision, the student-run television station at the University of Southern California
Unicanal a Paraguayan pay televisión channel exclusive in TigoStar vía Channel 8 in Asunción.
TV8 (Norway), a television channel in Norway replaced by Fox Crime (Norway)
Canal 8 Sport, a former television channel in Denmark
Television Nacional, a defunct network in Guatemala
Other uses
TV8 (magazine), a French language weekly magazine about television programming, published by Ringier in Switzerland
Channel Ocho, a fictitious Spanish-language station on The Simpsons
"Channel 8", a fictional competing broadcaster to "U-62 in UHF (film)
See also
8tv (disambiguation)
Channel 8 branded TV stations in the United States
Channel 8 virtual TV stations in Canada
Channel 8 virtual TV stations in Mexico
Channel 8 virtual TV stations in the United States
For VHF frequencies covering 180–186 MHz:
Channel 8 TV stations in Canada
Channel 8 TV stations in Mexico
Channel 8 digital TV stations in the United States
Channel 8 low-power TV stations in the United States
08 |
https://en.wikipedia.org/wiki/BioHome | BioHome was a small facility created by NASA in the late 1980s that could support one person in a fully functional habitat. One of the influences on the project was the results from data obtained on the 1973 Skylab 3 (SL-3), where a total of 107 VOCs were offgassed by synthetic materials that composed the SL-3. However, the study of indoor air quality was not the only focus of the project, as it was a part of research into closed ecological life support systems.
The facility was still in use as of March 5, 2005, and has paved inroads into creating self-supporting life support systems.
Construction
Construction of the BioHome concluded in 1989 and construction materials included synthetics which gave off the aforementioned VOCs. The BioHome itself resembles a mobile home in size where it contained a living area and treatment facilities for human waste and air.
While not completely air-tight, such as the Biosphere 2 structure, the structure was engineered for maximum air and energy confinement. This was unsurprising, given that the interior walls were composed of molded plastic panels with 30 cm of fiberglass insulation.
The BioHome had living facilities that could support one person and foliage plants were placed throughout the structure, aiding in air purification. In addition to the plants, a prototype fan-assisted plant filter was installed; the filter had the removal capacity of 15 standard potted plants.
The BioHome was equipped with monitoring ports for the detection of VOCs, which were measured using mass spectrometer / gas chromatograph equipment.
In experiments regarding wastewater treatment, the facility was outfitted with PVC piping and ultraviolet equipment.
Usage
The BioHome was used for a variety of experiments into, and including:
Wastewater treatment
In its nascence, the BioHome focused on alternative, non-chemical sewage treatment methods utilizing non-edible plants of aquatic disposition. The aquatic and semi-aquatic plants were chosen based on their previously known abilities for waste treatment. Another usage for the plants used in the wastewater treatment included its implementation as compost, which was feasible as the plants grew as more sewage was introduced.
Means
All waste material, such as feces and urine, were routed through PVC pipes, punctured so that the root systems of aquatic / semi-aquatic plants could be inserted. At different points of the flow, the water was studied (although those specific results are unavailable at this writing).
Ensuring total eradication of microorganisms, the processed water was subjected to ultraviolet radiation.
The processed water is subsequently used as toilet and plant water, though not directly for human consumption.
Plants used
Plants, or more accurately, the root systems of aquatic plants found to have a filtering effect include bulrush, reed, soft rush and water iris. As explained by Wolverton:When sewage is slowly filtered through an aquatic plant root fi |
https://en.wikipedia.org/wiki/Quattor | Quattor is a generic open-source tool-kit used to install, configure, and manage computers. Quattor was originally developed in the framework of European Data Grid project (2001-2004). Since its first release in 2003, Quattor has been maintained and extended by a volunteer community of users and developers, primarily from the community of grid system administrators.
The Quattor tool-kit, like other configuration management systems, reduces the staff required to maintain a cluster and facilitates reliable change management. However, three unique features make it particularly attractive for managing grid resources:
Federated Management: The open, modular nature of the tool-kit permits system administrators at different institutes to share the management of their distributed resources.
Shared Configuration and Management Efficiency: Quattor encourages the re-use of configuration information in such a way that it can be distributed and used with little or no modification at different sites, facilitating the distribution of best practices without the need for each site to implement configuration changes.
Coherent Site Model: Quattor allows an administrator to develop a site model that, once constructed, can be used to manage a range of different resources, such as real machines, virtual machines and cloud resources.
These features are also attractive beyond the grid context. This has been confirmed by the growing adoption of Quattor, by both large commercial organisations and academic institutions, most of them using the tool-kit to manage consistently their grid and non-grid systems.
Principles
The challenge of structuring and sharing components in a collaborative system is not new; over
the years programming language designers have attacked this problem from many angles. While
trends change, the basic principles are well understood. Features such as encapsulation, abstraction,
modularity, and typing produce clear benefits. We believe that similar principles apply when sharing
configuration information across administrative domains.
The Quattor configuration tool-kit derives its architecture from LCFG, improving it in several
aspects. At the core of Quattor is Pan, a high-level, typed language with flexible include mechanisms,
a range of data structures, and validation features familiar to modern programmers. Pan
allows collaborative administrators to build up a complex set of configuration templates describing
service types, hardware components, configuration parameters, users etc. The use of a high-level
language facilitates code reuse in a way that goes beyond cut-and-paste of configuration snippets.
The principles embodied in Quattor are in line with those established within the system administration
community. In particular, all managed nodes retrieve their configurations from
a configuration server backed by a source-control system (or systems in the case of devolved management).
This allows individual nodes to be recreated in the ca |
https://en.wikipedia.org/wiki/Ian%20Bell%20%28programmer%29 | Ian Colin Graham Bell (born 31 October 1962 in Hatfield, Hertfordshire) programmed, designed and developed the computer game Elite (1984) with David Braben, which met with much acclaim.
Education
Bell attended the independent St Albans School. He studied at Jesus College, Cambridge, graduating with a degree (1st) in Mathematics in 1985, and a Cambridge Diploma in Computer Science in 1986.
Career
Worked as a Senior Software Engineer for Autodesk. Bell was a speaker at the 2009 GameCity game festival. Bell mentioned in his speech about the impact of games:You're reaching into the minds and the imaginary spaces of children, and you're to an extent shaping their characters and their life stories. I'm glad [Elite] isn't Doom because I'm glad that even though we didn't really think in these terms, I think its effect on players and on people's lives is good, both in the sense of giving them good memories but also in making people think in different ways and awakening interest.
Game development
His work on Elite (1984), included programming in machine code using assembly. The game was based on an open-ended non-linear game model, and included revolutionary 3D graphics, at the time. Prior to Elite, he developed Free Fall, a game set inside a coriolis space station with the player controlling an alien punching astronaut, described by Bell as "the first ever Beat 'em up". Free Fall, also a game for the BBC Micro, was published by Acornsoft in 1983. Bell put later Free Fall and Elite with the associated source code for free download on his website.
References
External links
The Guardian article Masters of Their Universe (2003)
Gameplay video of Free Fall (1983)
1962 births
Living people
British video game programmers
British computer programmers
Alumni of Jesus College, Cambridge
People from Hatfield, Hertfordshire
British video game designers
Video game producers |
https://en.wikipedia.org/wiki/ICL%20Direct%20Machine%20Environment | Direct Machine Environment, abbreviated DME, was a mainframe environment for the ICL 2900 Series of computing systems from International Computers Limited that was developed in the 1970s. DME was more-or-less an ICL 1900 order code processor in microcode, which permitted the ICL 1900 series executive, operating systems and program libraries to operate on the ICL 2900 series.
Reason for Development
At this time most companies that had computers had large teams of programmers to write their applications. DME was developed so that customers could buy the new hardware and run their 1900 or System 4 applications whilst they developed their replacement VME applications. This led to some users running DME and VME alternately on the same machine for some years. Unfortunately this led to situations where development teams were waiting around for time to run their new applications. This, and the fact that some users were not moving to the new system, led ICL to develop a system called Concurrent Machine Environment (CME) under which VME ran DME as a subsystem, enabling 1900 and System 4 applications to be run on a 2900 or Series 39 machine alongside VME applications.
References
Direct Machine Environment |
https://en.wikipedia.org/wiki/Karma%20Police | "Karma Police" is a song by the English alternative rock band Radiohead, released on 25 August 1997, as the second single from their third studio album, OK Computer (1997). It reached number one in Iceland and number eight on the UK Singles Chart. In the US, it reached number 14 on the US Alternative Songs chart. It was included on Radiohead: The Best Of (2008).
The music video, directed by Jonathan Glazer, sees the singer, Thom Yorke, in the back of a car pursuing a man. In 2021, Rolling Stone placed "Karma Police" number 279 on its list of the 500 greatest songs of all time.
Composition
"Karma Police" is in a time signature and played in standard tuning. The song is in the key of G major. Acoustic guitar and piano are the most prominent instruments.
The song progresses from the intro into a mid-tempo section which alternates between a verse and a chorus. The verse begins with the line "Karma police", and the chorus begins with the line "This is what you'll get". After this section cycles through twice, the song switches into a second section which is based around the line "For a minute there, I lost myself". Yorke's voice is put through a reverb effect and a sliding melodic figure serves as a counterpoint to his vocals. In the final minute, Ed O'Brien distorts his guitar by driving a delay effect to self-oscillation, then lowering the delay rate, creating a "melting" effect.
After Yorke told the producer, Nigel Godrich, that he was not happy with the ending, the pair reconstructed it with loops and samples, a technique they developed on later Radiohead albums. Godrich said: "It was the first time we did anything like that. Just us in the studio, and a forerunner of a lot of things to come, good and bad."
Lyrics
The title lyric originates from an inside joke; the members of Radiohead would threaten to call the "karma police" if someone did something bad. Yorke explained that the song was about stress and "having people looking at you in that certain [malicious] way". He said: "It's for someone who has to work for a large company. This is a song against bosses. Fuck the middle management!"
Yorke and Jonny Greenwood emphasised in interviews that the song was humorous and "not entirely serious". The line "He buzzes like a fridge / He's like a detuned radio" refers to distracting, metaphorical background noise that Yorke calls "fridge buzz", one of the themes of OK Computer. "Karma Police" also shares themes of insanity and dissatisfaction with capitalism.
The song has the closing refrain "Phew, for a minute there I lost myself". Yorke cited it as an example of his practice of using everyday phrases in his lyrics, and said he probably heard the phrase on television. According to the Financial Times, "When sung in his trembling high voice, this unexceptional phrase becomes charged with power." Yorke said: "It's so ironic that for years people would write about the way I wrote lyrics as if it's like some deep heartfelt thing. It's fucking not |
https://en.wikipedia.org/wiki/TST | TST may stand for:
Science and technology
Ternary search tree, in computer science
Transition state theory, of chemical reaction rates
TST (gene)
Tuberculin skin test
Tectonic strain theory
Total sleep time
Total station theodolite
Typed set theory, in mathematical logic
Transgressive systems tract, in sequence stratigraphy
Tail suspension test
Places
Tsim Sha Tsui, an urbanized area in Hong Kong
Tsim Sha Tsui station, a railway station there
Trang Airport in Thailand (IATA airport code)
Organisations and groups
Telesta Therapeutics, Toronto Stock Exchange symbol
TheStreet.com, NASDAQ trading symbol
Toronto School of Theology, Canada
TST-CF Express, Canadian LTL freight carrier formerly known as TST Overland Express
Tribunal Superior do Trabalho, (Superior Labor Court), Brazil federal courts
The Satanic Temple, nontheistic religious and human rights organization
Other
.TST, ExamView file extension
Tolley, Scott & Tolley, Australian winemakers
Top Secret (TST), a South Korean band
The Soccer Tournament, a sports tournament
Taiwan Standard Time, the standard time zone used in Taiwan (UTC+8). |
https://en.wikipedia.org/wiki/JSON | JSON (JavaScript Object Notation, pronounced ; also ) is an open standard file format and data interchange format that uses human-readable text to store and transmit data objects consisting of attribute–value pairs and arrays (or other serializable values). It is a common data format with diverse uses in electronic data interchange, including that of web applications with servers.
JSON is a language-independent data format. It was derived from JavaScript, but many modern programming languages include code to generate and parse JSON-format data. JSON filenames use the extension .json.
Douglas Crockford originally specified the JSON format in the early 2000s. He and Chip Morningstar sent the first JSON message in April 2001.
Naming and pronunciation
The 2017 international standard (ECMA-404 and ISO/IEC 21778:2017) specifies that "JSON" is "pronounced , as in 'Jason and The Argonauts. The first (2013) edition of ECMA-404 did not address the pronunciation. The UNIX and Linux System Administration Handbook states that "Douglas Crockford, who named and promoted the JSON format, says it's pronounced like the name Jason. But somehow, “JAY-sawn” seems to have become more common in the technical community." Crockford said in 2011, "There's a lot of argument about how you pronounce that, but I strictly don't care."
Standards
After had been available as its "informational" specification since 2006, JSON was first standardized in 2013, as ECMA-404. , published in 2017, is the current version of the Internet Standard STD 90, and it remains consistent with ECMA-404. That same year, JSON was also standardized as ISO/IEC 21778:2017. The ECMA and ISO/IEC standards describe only the allowed syntax, whereas the RFC covers some security and interoperability considerations.
History
JSON grew out of a need for a real-time server-to-browser session communication protocol without using browser plugins such as Flash or Java applets, the dominant methods used in the early 2000s.
Crockford first specified and popularized the JSON format. The acronym originated at State Software, a company co-founded by Crockford and others in March 2001. The co-founders agreed to build a system that used standard browser capabilities and provided an abstraction layer for Web developers to create stateful Web applications that had a persistent duplex connection to a Web server by holding two Hypertext Transfer Protocol (HTTP) connections open and recycling them before standard browser time-outs if no further data were exchanged. The co-founders had a round-table discussion and voted whether to call the data format JSML (JavaScript Markup Language) or JSON (JavaScript Object Notation), as well as under what license type to make it available. The JSON.org website was launched in 2001. In December 2005, Yahoo! began offering some of its Web services in JSON.
A precursor to the JSON libraries was used in a children's digital asset trading game project named Cartoon Orbit at Communiti |
https://en.wikipedia.org/wiki/Style%20sheet%20language | A style sheet language, or style language, is a computer language that expresses the presentation of structured documents. One attractive feature of structured documents is that the content can be reused in many contexts and presented in various ways. Different style sheets can be attached to the logical structure to produce different presentations.
One modern style sheet language with widespread use is Cascading Style Sheets (CSS), which is used to style documents written in HTML, XHTML, SVG, XUL, and other markup languages.
For content in structured documents to be presented, a set of stylistic rules – describing, for example, colors, fonts and layout – must be applied. A collection of stylistic rules is called a style sheet. Style sheets in the form of written documents have a long history of use by editors and typographers to ensure consistency of presentation, spelling and punctuation. In electronic publishing, style sheet languages are mostly used in the context of visual presentation rather than spelling and punctuation.
Components
All style sheet languages offer functionality in these areas:
SyntaxA style sheet language needs a syntax in order to be expressed in a machine-readable manner. For example, here is a simple style sheet written in the CSS syntax:h1 { font-size: 1.5em }This says that headings on level 1 should be displayed in a font size of 1.5 times the font size of the surrounding text.
Selectors Selectors specify which elements are to be influenced by the style rule. As such, selectors are the glue between the structure of the document and the stylistic rules in the style sheets. In the example above, the "h1" selector selects all h1 elements. More complex selectors can select elements based on, e.g., their context, attributes and content.
Properties All style sheet languages have some concept of properties that can be given values to change one aspect of rendering an element. The "font-size" property of CSS is used in the above example. Common style sheet languages typically have around 50 properties to describe the presentation of documents.
Values and units Properties change the rendering of an element by being assigned a certain value. The value can be a string, a keyword, a number, or a number with a unit identifier. Also, values can be lists or expressions involving several of the aforementioned values. A typical value in a visual style sheet is a length; for example, "1.5em" which consists of a number (1.5) and a unit (em). The "em" value in CSS refers to the font size of the surrounding text. Common style sheet languages have around ten different units.
Value propagation mechanism To avoid having to specify explicitly all values for all properties on all elements, style sheet languages have mechanisms to propagate values automatically. The main benefit of value propagation is less-verbose style sheets. In the example above, only the font size is specified; other values will be found through value propagation m |
https://en.wikipedia.org/wiki/The%20Littl%27%20Bits | is a Japanese anime television series with 26 episodes, produced in 1980 by Tatsunoko Productions in Japan in cooperation with TV Tokyo (then an independent station; what became the TV Tokyo network was not organised until 1982, thus the show in its first run aired on affiliates of other networks in other cities, such as Fuji TV-affiliated Kansai TV in Osaka). The series' Saban-produced English translation was featured on the children's television station Nick Jr. from 1991 to 1995 alongside other children's anime series such as Adventures of the Little Koala, Maya the Bee, Noozles, and Grimm's Fairy Tale Classics. In the interim, the series also enjoyed popularity across Europe, the Middle East and the Spanish-speaking world.
Due to their similar size and naming scheme (a creation of the English dub; no such naming scheme existed in the original version), the Littl' Bits has been compared to Smurfs.
Synopsis
The series describes the adventures of a race of tiny people who live in a simple village in Foothill Forest. It focuses in particular on a group of children: Lillabit, Willibit, Snagglebit, Chip, and Browniebit. Snagglebit, the spoiled son of the mayor, is enamored of the beautiful Lillabit, but she's best friends with Willibit, the moral role model and main protagonist. Thus, even though they generally get along well, Willibit and Snagglebit often butt heads, especially over Lillabit. Snagglebit usually pals around with the short-in-stature Browniebit, who is something of a coward (and is often teased by Snagglebit for this), and Chip, who idolizes Lillabit's uncle, Dr. Snoozabit, and wants to be a doctor like him.
Another frequently recurring child character is Teenybit (Willibit's younger sister), who befriends Scarybit, an ill-tempered, superstitious old woman assumed to be a witch and shunned by most of the other villagers. Teenybit can see that, under Scarybit's tough exterior, she's just a lonely old lady who needs a friend.
The children are watched over by, and often scolded by, the older Littl' Bits including the doctor Dr. Snoozabit, the wood-cutter Chopabit, the baker Bakeabit, Willibit's father Grumpabit, Helpabit, the elder Elderbit, Mayor Bossabit (Snagglebit's father), and others. Snoozabit has a tendency to drink too much, forcing his young niece, Lillabit, to watch out for him and do her best to keep him on the right track (In the American version, Snoozabit's drunkenness was rewritten as being constantly sleepy and needing a nap, hence his English name).
Dr. Snoozabit has raised Lillabit since her infancy, and has always told her that her birth parents died shortly after she was born. Not having a mother and father around occasionally depressed Lillabit, especially when she observed her friends having fun with their parents. However, in the second-to-last episode of the series, it was revealed that Lillabit's parents were in fact alive and were "Wanderbits" (descendants of the "Builderbit" race who were exiled from Fo |
https://en.wikipedia.org/wiki/CBCS-FM | CBCS-FM is a Canadian radio station. It is the CBC Radio One station in Sudbury, Ontario, broadcasting at 99.9 FM, and serves all of Northeastern Ontario through its network of relay transmitters. The station's studio is located at the CBC/Radio-Canada facilities at 43 Elm Street in Sudbury.
History
On July 28, 1975, the Canadian Broadcasting Corporation received approval from the CRTC to operate a new english-language FM station at Sudbury, Ontario. The proposed frequency was 97.1 MHz (later read 99.9 MHz when launched).
The station was launched on May 5, 1978 on 99.9 MHz. Prior to its launch, CBC Radio programming aired on private affiliates CKSO and CKSO-FM.
The CRTC decision authorizing the launch of CBCS in fact encouraged, but did not direct, the CBC to retain an AM frequency for CBC Radio, and to reserve CBCS for its CBC Stereo network. However, the station launched in 1978 as an affiliate of the talk network after the CBC was unable to negotiate an agreement with Cambrian Broadcasting to directly acquire CKSO.
The CBC later applied for a second license for its Stereo network, which was granted in 1984. However, that station remain unlaunched throughout the 1980s, and the CBC was forced in 1991 to surrender all of its non-operating licenses. Consequently, CBC Radio 2 service was not available in the city until the launch of CBBS-FM in 2001.
In the CBC's service reductions announced in March 2009, CBCS was slated to lose half of its existing staff. Several hundred people attended a rally at the city's Tom Davies Square on April 5 to protest the cutbacks, with participants including federal MPs Glenn Thibeault, Claude Gravelle and Charlie Angus, and musicians Kevin Closs and Stéphane Paquette.
In September 2014, the station announced that it would move in late 2015 from 15 Mackenzie Street, where it had been located since its launch in 1978, to a new leased studio and office space on Elm Street. The move was completed in December 2015. The CBC had an open house in September 2016. The former studio on Mackenzie Street was then rented out to Siena Films as the police station in the 2017 drama series Cardinal.
Local programming
The station's local programs are Morning North, hosted by Markus Schwabe, and Up North, hosted by Jonathan Pinto, in the afternoon. In May 2009, Morning North won the Radio and Television News Directors Association's Peter Gzowski Award for Best Information Radio Program in Central Canada, and in June 2009, the program won the award for all of Canada.
The CBC announced in August 2014 that Up North, which premiered on August 11, would replace the former afternoon program Points North. The new program extends its coverage to all of Northern Ontario, also replacing Voyage North on CBQT-FM in Thunder Bay.
Former Points North host Dan Lessard retired from the program in June 2010. He was replaced by Jason Turnbull, who served as host of Points North, and then of Up North, until leaving the station in 2018 to take a |
https://en.wikipedia.org/wiki/African%20Institute%20for%20Mathematical%20Sciences | The African Institute for Mathematical Sciences (AIMS) is a tertiary education and research institute in Muizenberg, South Africa, established in September 2003, and an associated network of linked institutes in Senegal, Ghana, Cameroon and Rwanda.
History
Founder
The first African Institute for Mathematical Sciences was founded in Muizenberg near Cape Town by Neil Turok in 2003, while he was Chair of Mathematical Physics at Cambridge University. Neil Turok is the son of Ben Turok, an ANC MP. In 2008 Turok became Executive Director of the Perimeter Institute for Theoretical Physics, and was replaced by Dr Robert Myers in 2019.
AIMS South Africa was formed as a partnership between the following universities: University of Stellenbosch, University of Cambridge, University of Cape Town, University of Oxford, University of Paris-Sud, and University of the Western Cape.
AIMS Next Einstein Initiative
AIMS was the subject of a talk by Neil Turok after he received the TED Prize in 2008. Neil Turok's TED wish was that, within his lifetime, an African Einstein would be celebrated.
The AIMS Next Einstein Initiative is a plan to create 15 more AIMS centres across Africa. These centres intend to create institutions that are equipped with educational and scientific resources equivalent to the more developed continents, in order to fulfil Neil Turok's TED wish.
The first three centres created after that in South Africa are in Senegal, Ghana and Cameroon. AIMS Senegal became operational in September, 2011 in Mbour, near Dakar, and AIMS Ghana opened its doors in 2012 in the small coastal city of Biriwa. An earlier centre based at the African University of Science and Technology (AUST) in Nigeria was known as AIMS Abuja for a while. AIMS Ghana was set up in 2012, AIMS Cameroon in 2013 and AIMS Tanzania in 2014. There is a sixth centre in Rwanda.
The AIMS Next Einstein Initiative is a continuation of the work of the African Mathematical Institutes Network (AMI-Net).
After AIMS South Africa won the TED Prize in 2008, Neil Turok and his partners developed the AIMS Next Einstein Initiative, the goal of which is to build 15 centres of excellence across Africa by 2023. The Government of Canada made a US$20 million investment in the Next Einstein Initiative in 2010, through its International Development Research Centre, and numerous governments in Africa and Europe have followed suit. In October 2015, a forum took place in Dakar under the auspices of UNESCO's International Basic Sciences Programme to take the project for a vast network of centres to the next stage.
Mission
Teaching and research
The AIMS institutes teach both basic and applied mathematics, covering a large range of mathematical applications in physics (including astrophysics and cosmology), quantitative biology, bioinformatics, scientific computing, finance, agriculture modelling and so on. That in Senegal proposes courses in both French and English. In addition to its academic programmes, |
https://en.wikipedia.org/wiki/Voltaire%20Network | The Voltaire Network () is an international non-profit advocacy and alternative media organisation founded and led by French journalist Thierry Meyssan. It specialices in international relations and has become known for advocating conspiracy theories, notably relating to the 9/11 terrorist attacks and those in support of Russia, the Syrian (Bashar al-Assad) and Iranian governments.
The organisation was initially founded in 1994 as a left-wing think tank in support of free speech and secularism in France. It split in 2003 and was disbanded in 2007. It was re-founded as the International Voltaire Network (Réseau Voltaire International) in Lebanon by Thierry after he had become known for his 9/11 conspiracy theory book, 9/11: The Big Lie.
The Voltaire Network currently publishes a free website available in 17 languages (Arabic, English, French, German, Italian, Portuguese, Russian, Spanish, Turkish, and others) and two online databases and syndicates news from various agencies.
Origins
The Voltaire Network was founded in the context of a campaign in favour of freedom of speech, which the founders thought was put into jeopardy by new laws enshrined in the French penal code. After the campaign the association lived on, specialising in the study of far-right movements and religions. It was vocal notably in preventing the French government from funding the religious part of the Pope's visit to France, and in initiating an investigation of the French Parliament regarding the French far-right militia group Department of Protection-Security. Since 1999, the Réseau Voltaire has dealt with international issues, including daily news about the bombings of Serbia by NATO.
Internal dissensions
Several senior members of the Réseau have complained about a lack of control of the administration council over actions of the president and general secretary. They alleged that the president fostered an environment that suppressed criticism and failed to focus impartially on the board's general goals. Furthermore, they also cited what they believed to be an excessive critique of American foreign policy that was not balanced by reporting on the lack of political freedoms in the Middle East, where most network members tended to operate. The group also suggested that politically illiberal organizations or political figures believed to sponsor anti-Semitic views were treated uncritically. One example was Entretien avec le Hezbollah (Meeting with the Hezbollah) which presented the group, which is closely allied to Iran, as a "social group of Muslim inspiration, comparable to the Liberation theology in South America". Chairman Messyan was said to have visited Tehran to discuss his alternative theories positing that the United States conducted the 9/11 attacks as a false flag operation to justify intervention in Muslim affairs.
Three members of the administration council (Michel Sitbon, Gilles Alfonsi and Jean-Luc Guilhem) resigned in February 2005, over what they consi |
https://en.wikipedia.org/wiki/WBNX-TV | WBNX-TV (channel 55) is an independent television station licensed to Akron, Ohio, United States, serving the Cleveland area. The station is owned by the Winston Broadcasting Network subsidiary of locally based Ernest Angley Ministries, operating as a for-profit arm of the company. WBNX-TV's studios are located on State Road in suburban Cuyahoga Falls, in a building which also houses Winston Broadcasting's television production facilities. The station's transmitter is located in Parma, Ohio.
WBNX is one of a few for-profit U.S. television stations owned by a religious institution (most U.S. TV stations owned by religious institutions are affiliated with non-profit religious broadcasting networks).
History
Early days
WBNX-TV first signed on the air on December 1, 1985, as a secular for-profit independent station. The WBNX call letters were previously used by a radio station in New York City on 1380 AM (now WKDM) until 1984. Before WBNX signed on, its owner Ernest Angley purchased fellow televangelist Rex Humbard's television production facilities in Cuyahoga Falls to start the new station, and later purchased Humbard's Cathedral of Tomorrow complex (the current Grace Cathedral). The unfinished concrete tower which still stands behind Grace Cathedral was originally intended to hold the transmission tower of WCOT, for which Humbard had previously held a construction permit on the channel 55 frequency (the station never made it to air, and its authorization was deleted by the Federal Communications Commission (FCC) in 1976). The concrete tower was never purchased or used by WBNX, but is owned by Krieger Communications and used for cellular phone transmissions.
The station, then branded as "WBNX TV55", carried a general entertainment format with classic dramas, westerns, low-budget films, syndicated game shows, and a twice daily airing of station owner Angley's religious talk/variety show The 90 and 9 Club. During this time, WBNX aimed its programming at family audiences (with the slogan "We are family and we show it!") and imposed censoring standards that were similar to that used by The Family Channel, Nick at Nite and other kids and teens' oriented cable channels. In November 1986 when cross-town WCLQ 61 was sold to the Home Shopping Network, WBNX picked up the cartoons and classic sitcoms previously on WCLQ. By 1988, WBNX gradually began running infomercials much of the broadcast day. By 1990, WBNX was running paid programming half the broadcast day, low budget syndicated programming about 1/4 of the day and religious shows a few hours a day.
WBNX's original transmitter was located on Snowville Road in Brecksville, Ohio, which was originally used by WKYC-TV (channel 3) in its earlier days. The old technology for the transmitter forced WBNX to broadcast its audio feed in monaural rather than in stereo. In 2000, WBNX built a new transmitter and tower in Parma, becoming the tallest television broadcast tower in the Cleveland market.
Fox Kids
W |
https://en.wikipedia.org/wiki/Black%20Autonomy%20Network%20Community%20Organization | The Black Autonomy Network Community Organization (BANCO) is a political and social justice coalition working in Benton Harbor, Michigan, US. It was founded by Edward Pinkney to protest the June 16, 2003 death of a 28-year-old African-American, Terrance Shurn, while being pursued by Benton Township police. A riot followed the death, as accounts differed as to whether Shurn had lost control of his motorcycle or had been forced off the road by police.
BANCO organized rallies in the days following Shurn's death and the resulting disturbance. It has since broadened its scope to support candidates for local office. BANCO retains its focus on monitoring police activities.
In September 2004, BANCO announced it had purchased facilities to open a textile plant in Benton Harbor. The cloth-cutting operation was intended to alleviate poverty by offering local employment opportunities. The plant has yet to open as of January 2015.
BANCO reportedly attempts to continue the work of the American civil rights movement.
Founder Edward Pinkney
In February 2005, BANCO founder Edward Pinkney organized a recall election of city commissioner Glenn Yarborough. Pinkney, a resident of neighboring Benton Township (not of the city of Benton Harbor) and therefore unable to vote in the election himself, was charged with voter fraud, allegedly paying Benton Harbor residents to vote to oust Yarborough. Charges involved illegal possession and distribution of absentee ballots, illegal voter registration of people not living in the city, and payment for votes. In a second recall election in August 2005, city voters retained Yarborough as at-large city commissioner.
On March 27, 2006, a Berrien County jury was unable to come to a consensus verdict in Pinkney's felony election fraud case. A mistrial was declared. County officials decided to retry Pinkney on March 29, 2006.
On March 22, 2007, a Berrien County jury convicted Pinkney of five counts. He was sentenced to probation, but was jailed for violating probation in 2008.
In 2009, Pinkney co-founded the National Association for the Advancement of Colored People (NAACP)'s Benton Harbor, Michigan chapter and was elected its president.
In November 2014, Pinkney was convicted of felony forgery charges in Michigan. In December 2014, Edward Pinkney was sentenced to 2½ to 10 years in prison. Pinkney maintains his innocence.
References
Further reading
Pinkney, Edward. Whirlpool has sucked the life out of Benton Harbor. Retrieved August 12, 2005.
External links
BANCO The Black Autonomy Network Community Organization
Black Autonomy Network Community Organization |
https://en.wikipedia.org/wiki/Variadic%20function | In mathematics and in computer programming, a variadic function is a function of indefinite arity, i.e., one which accepts a variable number of arguments. Support for variadic functions differs widely among programming languages.
The term variadic is a neologism, dating back to 1936–1937. The term was not widely used until the 1970s.
Overview
There are many mathematical and logical operations that come across naturally as variadic functions. For instance, the summing of numbers or the concatenation of strings or other sequences are operations that can be thought of as applicable to any number of operands (even though formally in these cases the associative property is applied).
Another operation that has been implemented as a variadic function in many languages is output formatting. The C function and the Common Lisp function are two such examples. Both take one argument that specifies the formatting of the output, and any number of arguments that provide the values to be formatted.
Variadic functions can expose type-safety problems in some languages. For instance, C's , if used incautiously, can give rise to a class of security holes known as format string attacks. The attack is possible because the language support for variadic functions is not type-safe: it permits the function to attempt to pop more arguments off the stack than were placed there, corrupting the stack and leading to unexpected behavior. As a consequence of this, the CERT Coordination Center considers variadic functions in C to be a high-severity security risk.
In functional languages variadics can be considered complementary to the apply function, which takes a function and a list/sequence/array as arguments, and calls the function with the arguments supplied in that list, thus passing a variable number of arguments to the function. In the functional language Haskell, variadic functions can be implemented by returning a value of a type class ; if instances of are a final return value and a function , this allows for any number of additional arguments .
A related subject in term rewriting research is called hedges, or hedge variables. Unlike variadics, which are functions with arguments, hedges are sequences of arguments themselves. They also can have constraints ('take no more than 4 arguments', for example) to the point where they are not variable-length (such as 'take exactly 4 arguments') - thus calling them variadics can be misleading. However they are referring to the same phenomenon, and sometimes the phrasing is mixed, resulting in names such as variadic variable (synonymous to hedge). Note the double meaning of the word variable and the difference between arguments and variables in functional programming and term rewriting. For example, a term (function) can have three variables, one of them a hedge, thus allowing the term to take three or more arguments (or two or more if the hedge is allowed to be empty).
Examples
In C
To portably implement variadic func |
https://en.wikipedia.org/wiki/NotesPeek | NotesPeek is a utility written by Ned Batchelder that allows navigation and display of the complete contents of Lotus Notes database files.
NotesPeek displays database components in a tree structure while also providing access to both low level and high level database components. It can show data and settings that otherwise cannot accessed.
References
External links
www.lotus.com NotesPeek
NotesPeek 1.53 tool for viewing Notes databases on Notes 6.x and higher
Lotus Software software |
https://en.wikipedia.org/wiki/Frontier%20Gentleman | Frontier Gentleman is a short-lived radio Western series originally broadcast on the Columbia Broadcasting System (CBS) radio network from February 2 to November 16, 1958, initially heard Sunday afternoons at 2:30 p.m. (Eastern Time) through March when it moved to 7 p.m.
Format
Frontier Gentleman was one of several "adult westerns," along with Gunsmoke (1952–1961), Luke Slaughter of Tombstone and others, that appeared on radio and television in the early 1950s. The genre was described as "grittier, more realistic, and clearly intended for an older audience. Adult westerns were less the descendants of their juvenile predecessors than they were cousins of western feature films such as Shane (1953), with Alan Ladd and High Noon (1952), starring Gary Cooper"
The program was set in the post-Civil War United States.
Opening
The program opened with a trumpet theme by Jerry Goldsmith and this introduction:
Herewith, an Englishman's account of life and death in The West. As a reporter for The Times of London, he writes his colorful and unusual accounts. But as a man with a gun, he lives and becomes a part of the violent years in the new territories. Now, starring John Dehner, this is the story of J. B. Kendall, Frontier Gentleman...
Main character
The character's full name is Jeremy Brian Kendall. This was revealed in the episode "The Lost Mine." Kendall was described as an "elegant and icily effective ... veteran of the British Army in India."
Personnel
Written, produced and directed by Antony Ellis, it followed the adventures of journalist Kendall as he roamed the Western United States in search of stories for the Times. Along the way, he encountered various fictional drifters and outlaws in addition to well-known historical figures, such as Jesse James, Calamity Jane and Wild Bill Hickok.
Music for the series was by Wilbur Hatch and Jerry Goldsmith, who also supplied the opening trumpet theme. The announcers were Dan Cubberly, Johnny Jacobs, Bud Sewell and John Wald.
Supporting cast: Harry Bartell, Lawrence Dobkin, Virginia Gregg, Stacy Harris, Johnny Jacobs, Joseph Kearns, Jack Kruschen, Jack Moyles, Jeanette Nolan (later also on television), Vic Perrin and Barney Phillips.
References
Listen
All episodes of *Frontier Gentleman* for free download at the Internet Archive
Further reading
Ohmart, Ben. It's That Time Again. (2002) (Albany: BearManor Media)
External links
Frontier Gentleman Series Log by B.J. George
Jerry Haendiges Vintage Radio Logs: Frontier Gentleman
American radio dramas
Western (genre) radio series
1958 radio programme debuts
1958 radio programme endings
1950s American radio programs
CBS Radio programs |
https://en.wikipedia.org/wiki/Network%20termination | A network termination (NT) (also NTE for network termination equipment) is a device that connects the customer's data or telephone equipment to a carrier's line that comes into a building or an office. The NT device provides a connection for terminal equipment (TE) and terminal adapter (TA) equipment to the local loop.
The network termination used in the specific case of an ISDN Basic Rate Interface is called an NT1.
See also
Demarcation point
Network interface device
User–network interface
Telecommunications equipment
Local loop |
https://en.wikipedia.org/wiki/Appleseed%20Foundation | The Appleseed Foundation is a nonprofit organization that serves as the administrative hub for the Appleseed Network, a social justice network of centers in the United States and Mexico. Appleseed has received support from organizations including DLA Piper and the NFL.
History
Appleseed was founded in 1993 by members of Harvard Law School's class of 1958 at their 35th reunion.
From the outset Appleseed was framed around what was then a singular approach to pro bono law. Its strategy was to address issues that lent themselves to system-wide reform rather than the traditional model of providing legal services to individuals with legal problems. While litigation is one tool used by some of the Appleseed Centers, the organization tends to focus on achieving structural changes through market-based reforms, policy analysis and research, legislation, and rule making.
Structure
Appleseed's 17 Centers function as independent organizations linked to each other and with the national organization. Appleseed's network office is based in Washington, D.C. Appleseed helps promote Center work, serves as a clearinghouse of projects, and provides training and technical assistance, particularly in communications, development, project management and board development, as well as in the areas of education, immigration, financial access, health care and disaster recovery.
Work
Appleseed has achieved enduring accomplishment in areas ranging from children's welfare, education reform, criminal justice reform, juvenile justice, electoral reform, judicial independence, access to health care, immigrant justice, housing development, government accountability, and the integration of environmentalism and community development. Appleseed currently has Centers in Alabama, Chicago Appleseed, Connecticut, the District of Columbia, Georgia, Hawai`i, Kansas, Louisiana, Massachusetts, Missouri, Nebraska, New Jersey, New Mexico, New York, South Carolina, Texas, and Mexico.
Some of Appleseed's work has included research on child protection at the Mexico-United States border, the HIV epidemic, youth homelessness in Texas, and broadband internet access in Kansas.
In 2017 and 2020, Appleseed published reports on discrimination against black students in New York and Massachusetts respectively. The research by Appleseed received congressional attention from Representatives Ayanna Pressley and Katherine Clark, who called on government agencies to rectify the situation. Appleseed did additional research on child protective services in 2021.
References
External links
Appleseed Foundation's official website
Ralph Nader
Criminal justice reform in the United States
1993 establishments in Washington, D.C.
Non-profit organizations based in Washington, D.C.
Organizations established in 1993
Legal advocacy organizations in the United States |
https://en.wikipedia.org/wiki/FSE | FSE may refer to:
Organizations
Federation of European Scouting (disambiguation) (French: )
Ferrovie del Sud Est, an Italian railway company
Football Supporters Europe, a football fan network
Fung Seng Enterprises, a Hong Kong conglomerate
Franciscan Sisters of the Eucharist, a Roman Catholic religious congregation
Computing
Fast Software Encryption, cryptography conference
Finite-state entropy, entropy coding scheme
Finance
Frankfurt Stock Exchange, Germany's largest stock exchange
Fukuoka Stock Exchange, a stock exchange in Japan
Human and veterinary medicine
Feline spongiform encephalopathy
Fetal scalp electrode
Science and technology
Fast Spin Echo, a type of magnetic resonance imaging sequence
Free surface effect, liquids in slack tanks
Other
Finnish Sign Language (fse), the ISO languagecode for the Finnish sign language
Fremont Street Experience, a pedestrian mall
Field service engineer |
https://en.wikipedia.org/wiki/ESPN%20Radio | ESPN Radio, which is alternatively branded platform-agnostically as ESPN Audio, is an American sports radio network and extension of the ESPN television network. It was launched on January 1, 1992, under the banner "SportsRadio ESPN". The network is based at the ESPN campus in Bristol, Connecticut, with multiple studio facilities nationwide, along with home studios. The network airs a regular schedule of daily and weekly programming as well as live radio play-by-play of sporting events.
ESPN Radio is broadcast to hundreds of affiliate stations, along with national and Canadian carriage on Sirius XM. The network's content is also available online through its affiliates via Audacy, iHeartRadio and TuneIn, and the network also makes its programming available via podcast feeds and providers, with some additional content audio and video available through an ESPN+ subscription. Several of its programs are also featured as fully live or "best-of" video simulcasts on the ESPN family of television networks.
History
ESPN Radio Network was formed in September 1991 by ESPN Inc. and Capital Cities/ABC, Inc.'s ABC Radio Networks. Twenty-five stations had already signed on as affiliates at its September 5, 1991 announcement, with an expected total of 200 at the January launch. Shelby Whitfield, executive producer of ABC Radio Sports, and John A. Walsh, executive editor of ESPN, were placed in charge of the venture. The network launched as Sports Radio ESPN on January 1, 1992. At first, ESPN Radio broadcast only on weekends. The network debuted with 16 hours running on 147 affiliates in 43 states. Its initial programming consisted of news shows, update segments, and occasional features.
By 1996, ESPN Radio had expanded to weekdays with a show hosted by The Fabulous Sports Babe, Nancy Donnean. One hour of that show was simulcast on ESPN2 (1-2 p.m. Eastern time). Two years later, Tony Bruno and Mike Golic were brought together for a new morning show, the Bruno & Golic Morning Show which aired until Bruno left the network in 2000. Mike Greenberg was named as Bruno's replacement, and the morning show became Mike & Mike, which aired until 2017 (and was also simulcast on ESPN2). In January 2010, Mike & Mike celebrated their 10-year anniversary on ESPN Radio. Dan Patrick was a mainstay in the afternoons until his departure from ESPN in 2007.
Gradually, ESPN added more dayparts and became a 24-hour service. In 1995, ESPN Radio gained national radio rights to the NBA. In 1997, it gained the national radio rights to MLB. Disney purchased WEVD from the Forward Association in September 2002 to become WEPN, ESPN Radio's flagship station. On June 12, 2007, Disney spun off and merged its ABC Radio Networks with Citadel Broadcasting into Citadel Communications while retaining its ESPN Radio and Radio Disney networks and stations.
ESPN Radio is streamed over 215 stations and is ranked first nationally as a sports broadcasting program. The parent company ESPN focused on rad |
https://en.wikipedia.org/wiki/Mike%20%26%20Mike | Mike & Mike (formerly Mike & Mike in the Morning) was an American sports-talk radio show that was hosted by Mike Greenberg and Mike Golic on ESPN networks from 2000–2017. The show aired on ESPN Radio, and was simulcast on television, first on ESPNews starting in 2004, and later moving to ESPN2 in 2006.
The show primarily focused on the day's biggest sports topics and the humorous banter between the Mikes. It acted as the morning show for both the radio and television sides of the production. Outside of a few radio stations that are able to move or decline carriage of the show for their own local morning productions (or for daytime-only operations, may not be able to carry), Mike & Mike was effectively a compulsory element of the ESPN Radio schedule, which all affiliates of the network were required to carry.
On May 7, 2007, the show moved from its longtime radio studio home to the television studio used for Sunday NFL Countdown and Baseball Tonight, and began broadcasting in high-definition in 2007 as well.
A daily "best-of" show aired daily on ESPN2 and a weekly radio recap aired Saturday mornings at 6:00 a.m. to 7:00 a.m. and then moved to 5 a.m. ET before being discontinued in October 2009. The radio version of "best-of" returned in February 2010 in the 5am timeslot. In addition, there was a "best-of" podcast distributed every weekday as well. The show reaired on ESPNEWS immediately after the live simulcast.
On March 6, 2015, the duo celebrated 15 years of doing the show together. Mike & Mike were inducted into the NAB Broadcasting Hall of Fame on April 19, 2016.
On May 16, 2017, and after reports of acrimony between the hosts, it was announced that the show would be replaced by a new morning drive show hosted by Golic and Trey Wingo, with Greenberg moving to the main ESPN channel, where he hosts a morning show called Get Up!, which premiered on April 2, 2018. Greenberg's final day as co-host was November 17, 2017. On November 27, 2017, Mike & Mikes successor show, Golic and Wingo launched, with Trey Wingo becoming Golic's new co-host and Golic's son Mike Golic Jr. joining the show with his father.
Design
The show centered on an "Odd Couple" relationship between its hosts, and how it related to their views on sports. The show's motto in its early years for all commercials on radio and television was: "What makes them different makes them great."
Mike Greenberg was portrayed as a stereotypical nerd and with a man-crush on whoever the starting quarterback was for his favorite team (the New York Jets), for whom he is openly partisan. Meanwhile, former Notre Dame and NFL lineman Mike Golic was set up in the role of the tough and boisterous "man's man," a former pro athlete who liked nothing more than to eat stereotypically unhealthy foods and "tell it like it is."
Regular guest hosts and contributors
Even if either Greenberg or Golic (or even both) were absent from the show, the show still used the Mike and Mike title. On those days, gues |
https://en.wikipedia.org/wiki/Traffic%20measurement%20%28telecommunications%29 | Measurement of traffic within a network allows network managers and analysts to both make day-to-day decisions about operations and to plan for long-term developments.<ref name=kennedy>Kennedy I., Why Traffic Measurement? School of Electrical and Information Engineering, University of the Witwatersrand, 2003</ref> Traffic Measurements are used in many fundamental activities such as:
Identification of traffic patterns and trends
Calculating the traffic intensity in a specific circuit or group
Monitoring the service
Dimensioning and managing the network
Calculating tariffs
Performing forecasting
Dimensioning and managing the SS7 network
Checking the performance of the common channel signalling network
The following sections will answer some fundamental questions about Traffic Measurement, such as: What should be measured; when should it be measured; what assumptions are made; and what errors can occur?
When should traffic be measured?
Traffic Measurements are conducted on a continuous basis and the results compiled into reports for management which are used in management decisions on various time scales. Measurements that are taken every few minutes are used for network management and temporary routing, measurements every few hours, days and weeks are used for maintenance purposes and measurements that are taken over months or even years are used for long-term network deployment, upgrading and extensions.
To determine normal reference traffic for a network, the ITU recommends that a network traffic analyst must take measurements for the busiest hour of each day for a whole year. The busiest hour is defined as that four consecutive quarter hours whose traffic intensity is the greatest. Measurements taken outside the busy hour can be discarded. The reference intensity of traffic is then calculated by taking the average traffic intensity of the top thirty days in the year. Measurements taken on individual days can be discarded. This will give the normal high traffic intensity in the network, allowing network managers to make long-term strategic decisions.
Assumptions made when calculating circuits required
To perform calculations in circuit-switched networks several assumptions are made:
Calls arrivals follow a Poisson distribution
Holding times follow a Negative Exponential distribution
Blocked calls are lost or overflow
There is statistical equilibrium
It is useful to remember that the measurements are averages, and this process deliberately ignores very short term variations in the traffic, but still allows for a small but finite loss. The above assumptions are accurate if applied to circuit switched networks; however they fail when planning for data traffic, small exchanges and sudden sharp peaks in traffic such as that caused by TV and radio phone-in competitions.
Traffic measurement errors
Measurement errors are caused by faults in equipment or constraints on equipment design. The following five errors are examples of some types of er |
https://en.wikipedia.org/wiki/Network%20planning%20and%20design | Network planning and design is an iterative process, encompassing
topological design, network-synthesis, and network-realization, and is aimed at ensuring that a new telecommunications network or service meets the needs of the subscriber and operator.
The process can be tailored according to each new network or service.
A network planning methodology
A traditional network planning methodology in the context of business decisions involves five layers of planning, namely:
need assessment and resource assessment
short-term network planning
IT resource
long-term and medium-term network planning
operations and maintenance.
Each of these layers incorporates plans for different time horizons, i.e. the business planning layer determines the planning that the operator must perform to ensure that the network will perform as required for its intended life-span. The Operations and Maintenance layer, however, examines how the network will run on a day-to-day basis.
The network planning process begins with the acquisition of external information. This includes:
forecasts of how the new network/service will operate;
the economic information concerning costs, and
the technical details of the network’s capabilities.
Planning a new network/service involves implementing the new system across the first four layers of the OSI Reference Model. Choices must be made for the protocols and transmission technologies.
The network planning process involves three main steps:
Topological design: This stage involves determining where to place the components and how to connect them. The (topological) optimization methods that can be used in this stage come from an area of mathematics called graph theory. These methods involve determining the costs of transmission and the cost of switching, and thereby determining the optimum connection matrix and location of switches and concentrators.
Network-synthesis: This stage involves determining the size of the components used, subject to performance criteria such as the grade of service (GOS). The method used is known as "Nonlinear Optimisation", and involves determining the topology, required GoS, cost of transmission, etc., and using this information to calculate a routing plan, and the size of the components.
Network realization: This stage involves determining how to meet capacity requirements, and ensure reliability within the network. The method used is known as "Multicommodity Flow Optimisation", and involves determining all information relating to demand, costs, and reliability, and then using this information to calculate an actual physical circuit plan.
These steps are performed iteratively in parallel with one another.
The role of forecasting
During the process of Network Planning and Design, estimates are made of the expected traffic intensity and traffic load that the network must support. If a network of a similar nature already exists, traffic measurements of such a network can be used to calculat |
https://en.wikipedia.org/wiki/Free%20Radio%20Birmingham | Free Radio Birmingham is an Independent Local Radio station based in Birmingham, England, owned and operated by Bauer as part of the Hits Radio network. It broadcasts to Birmingham and the West Midlands.
As of September 2023, the station has a weekly audience of 190,000 listeners according to RAJAR.
History
The station was launched as BRMB on 19 February 1974, broadcasting on 261 metres medium wave, (1152kHz) and 94.8 MHz FM. BRMB was the fourth independent local commercial radio station to begin broadcasting in Britain after LBC, Capital London and Radio Clyde. Broadcasting a mix of popular music with local news, live football coverage, information and specialist output, the station became popular amongst residents in Birmingham and later changed its main FM frequency from 94.8 to 96.4 in 1987.
In 1988, as a response to government disapproval of the simulcasting of programming on both FM and mediumwave, a sister station was launched on the 1152 kHz frequency. Xtra AM became BRMB's 'gold' service, playing classic hits, while BRMB itself began to cater for a younger audience. At this stage, BRMB was part of Midlands Radio plc, which was bought out along with Radio Trent, Leicester Sound and Mercia Sound by Capital Radio in 1993. However, they sold the other stations to the GWR Group whilst Capital kept hold of BRMB and Xtra AM. Xtra was on the air for nine years until the majority of its programming was switched to London, where it was simulcast with Capital Gold.
On 8 August 2008, it was confirmed that due to competition 'conflict of interests' in the West Midlands (and in other areas), BRMB would be sold by Global, along with other West Midlands owned GCap/Global stations Mercia FM, Wyvern FM, Heart 106 and Beacon Radio. In July 2009, the station was sold officially to a company backed by Lloyds Development Capital and Phil Riley which was named Orion Media.
On 9 January 2012, Orion Media announced that BRMB would be rebranded as Free Radio Birmingham, along with its sister West Midlands stations Beacon, Mercia and Wyvern. The BRMB brand, together with neighbouring stations Mercia, Beacon and Wyvern, were phased out on Wednesday 21 March 2012 in preparation for the rebrand, which took place at 7pm on Monday 26 March 2012. Live football commentaries on Aston Villa and Birmingham City matches continued to be broadcast on Free Radio 80s on AM and DAB until the end of the 2014–15 season.
On 6 May 2016, the station's owners, Orion, announced they had been bought by Bauer for an undisclosed fee, reportedly between £40 and £50 million.
In February 2017, most of Free Radio's off-peak networked output from Birmingham was replaced by programmes originating from Bauer's Manchester studios.
In May 2019, following OFCOM's decision to relax local content obligations from commercial radio, Bauer announced Free Radio's Birmingham breakfast show would be shared with the sister station in Shropshire and the Black Country from 8 July 2019, presented by Da |
https://en.wikipedia.org/wiki/Network%20traffic%20simulation | Network traffic simulation is a process used in telecommunications engineering to measure the efficiency of a communications network.
Overview
Telecommunications systems are complex real-world systems, containing many different components which interact, in complex interrelationships. The analysis of such systems can become extremely difficult: modelling techniques tend to analyse each component rather than the relationships between components. Simulation is an approach which can be used to model large, complex stochastic systems for forecasting or performance measurement purposes. It is the most common quantitative modelling technique used.
The selection of simulation as a modelling tool is usually because it is less restrictive. Other modelling techniques may impose material mathematical restrictions on the process, and also require multiple intrinsic assumptions to be made.
Network traffic simulation usually follows the following four steps:
Modelling the system as a dynamic stochastic (i.e. random) process
Generation of the realizations of this stochastic process
Measurement of Simulation data
Analysis of output data
Simulation methods
There are generally two kinds of simulations used to model telecommunications networks, viz. discrete and continuous simulations. Discrete simulations are also known as discrete event simulations, and are event-based dynamic stochastic systems. In other words, the system contains a number of states, and is modelled using a set of variables. If the value of a variable changes, this represents an event, and is reflected in a change in the system’s state. As the system is dynamic, it is constantly changing, and because it is stochastic, there is an element of randomness in the system. Representation of discrete simulations is performed using state equations that contain all the variables influencing the system.
Continuous simulations also contain state variables; these however change continuously with time. Continuous simulations are usually modelled using differential equations that track the state of the system with reference to time.
Advantages of simulation
Normal analytical techniques make use of extensive mathematical models which require assumptions and restrictions to be placed on the model. This can result in an avoidable inaccuracy in the output data. Simulations avoid placing restrictions on the system and also take random processes into account; in fact in some cases simulation is the only practical modelling technique applicable;
Analysts can study the relationships between components in detail and can simulate the projected consequences of multiple design options before having to implement the outcome in the real-world.
It is possible to easily compare alternative designs so as to select the optimal system.
The actual process of developing the simulation can itself provide valuable insights into the inner workings of the network which can in turn be used at a later stage.
Disadvantages of |
https://en.wikipedia.org/wiki/Booker%20%28TV%20series%29 | Booker is an American crime drama series starring Richard Grieco that aired on the Fox Network from September 24, 1989, to May 6, 1990. The series is a spin-off of 21 Jump Street and the second installment of the Jump Street franchise. The character of Dennis Booker was originally a recurring character on that police drama during its third season.
Synopsis
Dennis Booker, who once worked for a large metropolitan police department, is now hired by the US office of a large Japanese company to investigate some suspicious insurance claims. Booker is portrayed as despising authority, and he is often openly disdainful of the orders he receives. He also occasionally undertakes non-work-related tasks in order to help friends and family. Katie Rich left the show in the middle of its run, and Lori Petty was added to the cast.
Fox scheduled Booker as its Sunday night leadoff program, airing in the 7/6 pm slot that was vacated by its parent series, 21 Jump Street; the latter moved to Monday nights. Booker was not the hit that its predecessor had been, with Fox eventually moving the show to 10:00 pm (during the period when the network was programming past that hour on Sundays) and later cancelling it following the season.
Cast
Main
Richard Grieco as Dennis Booker
Carmen Argenziano as Chick Sterling
Marcia Strassman as Alicia Rudd
Katie Rich as Elaine Grazzo
Lori Petty as Suzanne Dunne
Notable guest stars
Peter DeLuise as Officer Doug Penhall (from 21 Jump Street)
Holly Robinson Peete as Officer Judy Hoffs (from 21 Jump Street)
Steven Williams as Captain Adam Fuller (from 21 Jump Street)
Jason Priestley as Fred
Thomas Haden Church as Michael
Ben Vereen as Ben
Mariska Hargitay as Michelle
Don S. Davis in various roles
Maura Tierney as Donna Cofax
Marcia Cross
Don Cheadle
Vanity
Gedde Watanabe
Tawny Kitaen
James Hong
Heavy D
Jay O. Sanders as Gordon Rudd
Episodes
Home media
On September 17, 2008, Beyond Home Entertainment released Booker- The Complete Series on DVD in Australia (Region 4). The episode titled "Deals and Wheels pt.1" has been removed as it is part of a crossover with 21 Jump Street. Both episodes are included on the 4th season release of 21 Jump Street. The original Billy Idol "Hot in the City" main theme song is intact on the episodes. The episode "Someone Stole Lucille" is included in this set as well.
On August 25, 2009, Mill Creek Entertainment released Booker- Collector's Edition on DVD in Region 1. Music rights have kept the episode "Someone Stole Lucille" from appearing on the set, thus the reason why the title of the release was changed from 'complete series'. The theme song was also changed to a generic action piece (entitled "Hot Summer Night") as the rights to "Hot in the City" could not be negotiated.
References
External links
21 Jump Street
1989 American television series debuts
1990 American television series endings
1980s American crime drama television seri |
https://en.wikipedia.org/wiki/Decile | In descriptive statistics, a decile is any of the nine values that divide the sorted data into ten equal parts, so that each part represents 1/10 of the sample or population. A decile is one possible form of a quantile; others include the quartile and percentile. A decile rank arranges the data in order from lowest to highest and is done on a scale of one to ten where each successive number corresponds to an increase of 10 percentage points.
Special Usage: The decile mean
A moderately robust measure of central tendency - known as the decile mean - can be computed by making use of a sample's deciles to ( = 10th percentile, = 20th percentile and so on). It is calculated as follows:
Apart from serving as an alternative for the mean and the truncated mean, it also forms the basis for robust measures of skewness and kurtosis, and even a normality test.
See also
Summary statistics
Socio-economic decile (for New Zealand schools)
References
Summary statistics
de:Quantil#Dezil
ru:Квантиль#Дециль |
https://en.wikipedia.org/wiki/%C8%98tefan%20Odobleja | Ștefan Odobleja (; 13 October 1902 – 4 September 1978) was a Romanian physician and scientist, considered in Romania to be one of the precursors of cybernetics and artificial intelligence.
His major work, Psychologie consonantiste (first published in 1938 and 1939, in Paris) introduced the concept of feedback in psychology, ten years before Norbert Wiener published his groundbreaking book, Cybernetics: Or Control and Communication in the Animal and the Machine.
Biography
Odobleja was born into a family of peasants in 1902, in Valea Izvorului (now Ștefan Odobleja), Mehedinți County, Romania. He attended the Faculty of Medicine in Bucharest and became a physician. He practiced medicine as a military doctor in Bucharest, Dej, Drobeta Turnu-Severin, Lugoj, Târgoviște, and other Romanian cities. Endowed with an uncommon capacity of work and with an astonishing inventive spirit, Odobleja left an impressive work to the posterity. His completed works run to over 50,000 pages.
In 1936, Odobleja published "Phonoscopy and the clinical semiotics". In 1937, he participated in the IXth International Congress of Military Medicine with a paper entitled "Demonstration de phonoscopie", where he disseminated a prospectus in French, announcing the appearance of his future work, "The Consonantist Psychology".
The most important of his writings is Psychologie consonantiste, in which Odobleja lays the theoretical foundations of the generalized cybernetics. The book, published in Paris by (vol. I in 1938 and vol. II in 1939), contains almost 900 pages and includes 300 figures in the text. The author wrote at the time that "this book is... a table of contents, an index or a dictionary of psychology, [for] a ... great Treatise of Psychology that should contain 20–30 volumes".
Due to the beginning of World War II, the publication went unnoticed. The first Romanian edition of this work did not appear until 1982 (the first edition was published in French). The work was reprinted in 1983 as Cybernétique générale: psychologie consonantiste, science des sciences.
Odobleja retired from the army in 1946 and lived a modest life off his military pension. He died of cancer on September 4, 1978, leaving behind extensive manuscripts. He was buried at the Orthodox Cemetery in Drobeta-Turnu Severin.
Legacy
His paper, "Diversity and Unit in Cybernetics" was presented at the Fourth Congress of Cybernetics and Systems in Amsterdam, August in 1978, being reportedly received "with great acclaim".
As an appreciation for his work of mapping the unknown territory of the consonantist psychology, cybernetics, and general cybernetics, in 1990 Odobleja was elected posthumously an honorary member of the Romanian Academy.
In 1982 a group of scientists established in Lugoj the Cybernetics Academy "Ștefan Odobleja", an organization dedicated to promoting a better knowledge of general cybernetics; the organization is registered in Lugano, Switzerland, and is financed by the controversial Rom |
https://en.wikipedia.org/wiki/Bart%20vs.%20Thanksgiving | "Bart vs. Thanksgiving" is the seventh episode of the second season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on November 22, 1990. In the episode, Bart runs away from home after destroying a centerpiece that Lisa makes for the Thanksgiving dinner table.
The episode was written by George Meyer and directed by David Silverman. Voice actor Greg Berg guest starred as Rory, one of the homeless people at the soup kitchen. The episode features cultural references to Macy's Thanksgiving Day Parade, and the poets Allen Ginsberg, Jack Kerouac, and Edgar Allan Poe. Since airing, the episode has received mostly positive reviews from critics. It acquired a Nielsen rating of 11.9, and was the third highest-rated show on the Fox network the week it aired.
Plot
Lisa makes an elaborate decorative cornucopia for the Thanksgiving dinner table. Patty and Selma arrive, ignoring Marge's instructions to not bring their own food. Homer picks up Grampa from the retirement home. Marge, Patty, and Selma's mother Jacqueline Bouvier arrives and tells Marge she never does anything right.
Once they are assembled, the Simpsons sit down to Thanksgiving dinner. When Lisa places the cornucopia on the table, Bart removes it to make way for the turkey. In the ensuing scuffle, Bart throws the cornucopia into the fireplace and it burns to ashes. Lisa runs to her room sobbing, and a furious Homer and Marge punish Bart by sending him up to his room. Marge then tells him that he has ruined Thanksgiving and later informs him that he will not be allowed to eat dinner until he issues a sincere apology to Lisa. Bart stubbornly refuses and climbs out of his room.
After Homer expels Santa's Little Helper from the house for stealing a turkey drumstick, Bart and the dog run away from home. Bart tries to steal a pie cooling on a window sill at Mr. Burns' mansion, but Burns' hounds chase him away. While wandering the streets, Bart uses Homer's ID to sell his blood and — after passing out — is brought to a breadline serving Thanksgiving dinner to homeless people. Kent Brockman interviews Bart for a human interest story. The family sees the TV report and call the police, hoping they can help find Bart and bring him home. When the police fail to locate Bart, Homer and Marge regret saying severe things that drove him away.
Bart later returns home feeling remorseful after seeing the meager lives of the homeless men at the breadline. He climbs onto the roof to ponder his choices. When he hears Lisa crying because she misses him, Bart invites her to join him on the roof. He finally realizes what he did was wrong and apologizes as Homer and Marge watch proudly. Bart and Lisa later rejoin the family to enjoy a meal of Thanksgiving leftovers.
Production
The episode was written by George Meyer and directed by David Silverman. It was the first script Meyer wrote on the show, and he thought he made "quite a few mistakes, but it |
https://en.wikipedia.org/wiki/Collegiate%20Network | The Collegiate Network (CN) is a program that provides financial and technical assistance to student editors and writers of roughly 100 independent, conservative and libertarian publications at colleges and universities around the United States. Member publications have a combined annual distribution of more than two million. Since 1995, the CN has been administered by the Intercollegiate Studies Institute (ISI), a nonprofit educational organization that promotes conservative thought on college campuses, headquartered in Wilmington, Delaware.
Mission
According to its web site, CN supports college publications which "serve to focus public awareness on the politicization of American college and university classrooms, curricula, student life, and the resulting decline of educational standards." Newspapers and journals in the CN regularly call attention to what they interpret as corruption and hypocrisy in campus administrations' and student groups' policies, argue in favor of free speech in liberal education, encourage discussion and debate, and train students in the principles and practices of journalism.
History
In 1979, the Institute For Educational Affairs (IEA) responded to the request of two University of Chicago students for start-up funding for a new conservative newspaper, Counterpoint. By 1980, the grant program had been expanded and named the Collegiate Network, and by 1983, under the continuing administration of the IEA, had added both internships and persistent operating grants for conservative campus newspapers. In 1990, the Madison Center for Educational Affairs merged with the IEA to maintain funding for what had expanded to 57 conservative student publications. The Intercollegiate Studies Institute took over operations in 1995 and has since administered the CN from Wilmington, Delaware.
Member publications
CN member publications include:
The Brown Spectator, Brown University
Binghamton Review, Binghamton University
California Patriot, University of California, Berkeley
Carolina Review, University of North Carolina at Chapel Hill
The Capitol Collegian, Florida State University
The Centurion, Rutgers University
The Clock Tower Courier, Saint Louis University
The Conntrarian, Connecticut College
The Cornell Review, Cornell University
The Dartmouth Review, Dartmouth College
The Harvard Ichthus, Harvard University
The Harvard Salient, Harvard University
The Kenyon Observer, Kenyon College
The Michigan Review, University of Michigan
The Minnesota Republic, University of Minnesota
The UPenn Statesman, University of Pennsylvania
The Prince Arthur Herald, McGill University
Princeton Tory, Princeton University
The Stanford Review, Stanford University
Texas Review of Law and Politics, University of Texas at Austin
The Villanova Times, Villanova University
The Virginia Informer, College of William & Mary
The Tower, Trinity University
The Irish Rover, University of Notre Dame
The Collegiate Commons, Indiana University |
https://en.wikipedia.org/wiki/Julian%20Seward | Julian Seward is a British compiler writer and Free Software contributor who lives in Stuttgart. He is commonly known for creating the bzip2 compression tool in 1996, as well as the valgrind memory debugging toolset founded in 2000. In 2006, he won a second O'Reilly Open Source Award for his work on Valgrind.
Julian currently works at Mozilla.
Contributions
bzip2 (1996), a data compressor
cacheprof (1999), a tool for locating the sources of D-cache misses
Valgrind, a memory debugger
Awards
July 2006 – Julian Seward won a Google-O'Reilly Open Source Award for "Best Toolmaker" for his work on Valgrind
References
External links
Interview with Valgrind Author Julian Seward on techrepublic.com, January 2004.
Interview with Valgrind Author Julian Seward on kde.org, February 2006.
English computer programmers
Living people
Free software programmers
Open source people
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Business%20analyst | A business analyst (BA) is a person who processes, interprets and documents business processes, products, services and software through analysis of data. The role of a business analyst is to ensure business efficiency increases through their knowledge of both IT and business function.
Some tasks of a business analyst include creating detailed business analysis, budgeting and forecasting, business strategising, planning and monitoring, variance analysis, pricing, reporting and defining business requirements for stakeholders. The business analyst role is applicable to four key areas/levels of business functions – operational, project, enterprise and competitive focuses. Each of these areas of business analysis have a significant impact on business performance, and assist in enhancing profitability and efficiency in all stages of the business process, and across all business functions.
Role
Business analysis has been defined as "a disciplined approach for introducing change to organization" through management, processing, and interpretation of data in order to "identify and define the solution that will maximize the value delivered by an organization to its stakeholders".
A business analyst's job description tends to include "creating detailed business analysis, outlining problems, opportunities and solutions for a business, budgeting and forecasting, planning and monitoring, variance and analysis, pricing, reporting, and defining business requirements and reporting back to stakeholders".
There are many business activities which the business analyst is involved in. Some areas in which business analysts can have an important role are in financial analysis, quality assurance, training, business policy and procedures, market analysis, organizational development and solution testing. More specifically, business analysts are required to use the data which is gathered for the purpose of analysis and interpret greater meaning for the business. This can then be used to improve business performance through identifying areas for potential growth, cost reduction, understanding customer behavior, and observing economic trends and forecasts, and then reacting appropriately.
Successful business analysts should influence the business environment by providing reliable guidance in decision making for the future through observing data which reflects the behaviour of the business in the past. Business analysts are essential at all levels of a business, as both tactical and strategic planning require analysts who help with "incremental improvements to products, business processes, and application".
Business analysts have an increasing need to provide a business with sustainable solutions. The Business Analyst "plays a key role in making sustainable choices, providing direction to business and influencing demand for specific technologies". Business analysis practices have the opportunity to use business data in a positive way, which can lead to the transition of |
https://en.wikipedia.org/wiki/Counterspy%20%28radio%20series%29 | Counterspy was an espionage drama radio series that aired on the NBC Blue Network (later ABC) and Mutual from May 18, 1942, to November 29, 1957.
David Harding (played by Don MacLaughlin) was the chief of the United States Counterspies, a unit engaged during World War II in counterintelligence against Japan's Black Dragon and Germany's Gestapo. United States Counterspies was a fictional government agency devised by the program's creator, Phillips H. Lord after Lord "had a certain amount of difficulty with J. Edgar Hoover over story content in Gang Busters." Mandel Kramer played Peters, Harding's assistant.
The program's plots progressed through three phases. During World War II they involved "threats from the Axis powers." After the war ended, Cold War threats took precedence. In the third phase, "they addressed all manner of illegal activities.
Scriptwriters for the series included Milton J. Kramer, Emile C. Tepperman and Stanley Niss.
Adaptations
The radio drama was adapted to film twice, as David Harding, Counterspy (July 1950) and as Counterspy Meets Scotland Yard (November 1950). Both Columbia Pictures productions starred Howard St. John in the title role.
An unsuccessful pilot for a television version of Counterspy was produced in England in 1958, with Don Megowan as David Harding. The trade publication Broadcasting also reported on plans of Bernard L. Schubert Inc. to produce 39 episodes of David Harding, Counterspy with Reed Hadley in the title role and Telestar Films' releasing of Counterspy for syndication.
A Spanish version of Counterspy was transmitted to South America via shortwave radio in 1942. An article in Broadcasting reported that commercial were deleted and that the effort was "in cooperation with the Office of the Coordinator of Inter-American Affairs."
References
External links
Logs
Jerry Haendiges Vintage Radio Logs: Counterspy
Episodic log of Counterspy from RadioGOLDINdex
Episodic logs of Counterspy (and more) from The Digital Deli Too
Audio
Times Past Old Radio: Counterspy
Script of "Case of the Framed Congressman" episode of Counterspy
Zoot Radio, free old time radio show downloads of "David Harding Counter Spy"
TV pilots
Pilot of TV version of David Harding, Counterspy, starring Reed Hadley
Pilot of TV version of Counterspy starring Don Megowan
Magazine article
Radio and Television Mirror article "by David Harding" with information from "actual cases from the Counterspy files."
American radio dramas
1940s American radio programs
1950s American radio programs
NBC Blue Network radio programs
ABC radio programs
Mutual Broadcasting System programs
1942 radio programme debuts
1957 radio programme endings
Radio programs adapted into films |
https://en.wikipedia.org/wiki/List%20of%20alumni%20of%20Jesuit%20educational%20institutions | Over the last 400 years, the Roman Catholic Jesuit order has established a worldwide network of schools and universities. This is an incomplete list of notable alumni of these institutions.
Note: Along with lay men and women, and non-Catholics, included in the list below are also a number of Jesuits.
A
Florencio Abad - Philippine lawyer and politician (Ateneo de Manila University)
Tony Abbott - Australian Prime Minister (St Ignatius' College, Riverview)
Monir Fakhry Abdelnour - Egyptian Minister of Tourism (College de la Sainte Famille)
Robert Abplanalp - inventor of the aerosol valve; founder of Precision Valve Corporation (Fordham Preparatory School)
Andy Ackerman - television director and producer, Seinfeld, Curb Your Enthusiasm, and Two and a Half Men (Santa Clara University)
Edward Fenech Adami - former President of Malta (St Aloysius' College)
Héctor Aguilar Camín - Mexican writer, journalist and historian (Universidad Iberoamericana)
José Antonio Aguirre - Basque president (University of Deusto)
Carlos Alazraki - President and CEO, Alazraki & Asociados Publicidad agency (Universidad Iberoamericana)
Alan Alda - American movie actor and TV star (Fordham University)
Iyad Allawi - Iraqi politician (Baghdad College)
Robert Altman - American film director (Rockhurst High School)
Don Ameche - American actor (Marquette University)
Viswanathan Anand - Indian chess grandmaster (Loyola College)
Ivo Andrić - Yugoslavian author and Nobel laureate (Jesuit gymnasium in Travnik, Bosnia)
APO Hiking Society - Filipino singing group (Ateneo de Manila High School)
Benigno Aquino Jr. - Philippine politician (Ateneo de Manila University)
Benigno Aquino III - Philippine politician and son of Benigno Aquino Jr. (Ateneo de Manila University)
A. P. J. Abdul Kalam - Former Indian President and Aerospace Scientist, St. Joseph's College, Tiruchirappalli
Guillermo Arriaga - Mexican screenwriter (Amores Perros), Universidad Iberoamericana
Mike Arroyo - husband of Gloria Macapagal Arroyo (Ateneo de Manila University)
Emilio Azcarraga Jean - President and owner, Televisa (Universidad Iberoamericana)
B
Claude Bachet - French mathematician (pupil of the Jesuit mathematician Jacques de Billy at the Jesuit College in Rheims)
Mohsen Badawi - Egyptian entrepreneur, political activist and writer (Collège de la Sainte Famille)
Fr. Eugene Balabin, SJ - Russian Catholic priest, collaborator with Martynov and Gagarin, developer of Jesuit "Slavic" Library at Meudon (attended seminary at Vals near Le-Puy-en-Velay)
Jakob Balde - German Latinist and poet (University of Ingolstadt)
Donald W. Banner - United States Commissioner of Patents and Trademarks (University of Detroit)
José Celso Barbosa - medical doctor, sociologist, and political leader (first racially mixed resident to attend Puerto Rico's Jesuit Seminary)
George Barna - American political pollster (Boston College)
Kevin Barry - martyr of the Irish War of Independence (Belvedere College)
John Barrymore - American Shakespea |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.