source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/OpenServer | Xinuos OpenServer, previously SCO UNIX and SCO Open Desktop (SCO ODT), is a closed source computer operating system developed by Santa Cruz Operation (SCO), later acquired by SCO Group, and now owned by Xinuos. Early versions of OpenServer were based on UNIX System V, while the later OpenServer 10 is based on FreeBSD 10. However, OpenServer 10 has not received any updates since 2018 and is no longer marketed on Xinuos's website, while OpenServer 5 Definitive and 6 Definitive are still supported.
History
SCO UNIX/SCO Open Desktop
SCO UNIX was the successor to the Santa Cruz Operation's variant of Microsoft Xenix, derived from UNIX System V Release 3.2 with an infusion of Xenix device drivers and utilities. SCO UNIX System V/386 Release 3.2.0 was released in 1989, as the commercial successor to SCO Xenix. The base operating system did not include TCP/IP networking or X Window System graphics; these were available as optional extra-cost add-on packages. Shortly after the release of this bare OS, SCO shipped an integrated product under the name of SCO Open Desktop, or ODT. 1994 saw the release of SCO MPX, an add-on SMP package.
At the same time, AT&T completed its merge of Xenix, BSD, SunOS, and UNIX System V Release 3 features into UNIX System V Release 4. SCO UNIX remained based on System V Release 3, but eventually added home-grown versions of most of the features of Release 4.
The 1992 releases of SCO UNIX 3.2v4.0 and Open Desktop 2.0 added support for long file names and symbolic links. The next major version, OpenServer Release 5.0.0, released in 1995, added support for ELF executables and dynamically linked shared objects, and made many kernel structures dynamic.
SCO OpenServer
SCO OpenServer 5, released in 1995, would become SCO's primary product and serve as the basis for products like PizzaNet (the first Internet-based food delivery system done in partnership with Pizza Hut) and SCO Global Access, an Internet gateway server based on Open Desktop Lite. Due to its large installed base, SCO OpenServer 5 continues to be actively maintained by SCO with major updates having occurred as recently as September 2018.
SCO OpenServer 6, based on the merging of AT&T UNIX System V Release 4.2MP and UnixWare 7, was initially released by The SCO Group in 2005. It includes support for large files, increased memory, and multi-threaded kernel (light-weight processes). This merged codebase is referred to as UNIX System V Release 5 (SVR5) and was used only by SCO for OpenServer 6; SVR5 is not used by any other major developer or reseller. SCO OpenServer 6 contains the UnixWare 7's SVR5 kernel integrated with SCO OpenServer 5 application and binary compatibility, OpenServer 5 system administration, and OpenServer 5 user environments.
SCO OpenServer has primarily been sold into the small and medium business (SMB) market. It is widely used in small offices, point of sale (POS) systems, replicated sites, and backoffice database server deployments. Promine |
https://en.wikipedia.org/wiki/Grandmother%20hypothesis | The grandmother hypothesis is a hypothesis to explain the existence of menopause in human life history by identifying the adaptive value of extended kin networking. It builds on the previously postulated "mother hypothesis" which states that as mothers age, the costs of reproducing become greater, and energy devoted to those activities would be better spent helping her offspring in their reproductive efforts. It suggests that by redirecting their energy onto those of their offspring, grandmothers can better ensure the survival of their genes through younger generations. By providing sustenance and support to their kin, grandmothers not only ensure that their genetic interests are met, but they also enhance their social networks which could translate into better immediate resource acquisition. This effect could extend past kin into larger community networks and benefit wider group fitness.
Background
One explanation to this was presented by G.C. Williams who was the first to posit that menopause might be an adaptation. Williams suggested that at some point it became more advantageous for women to redirect reproductive efforts into increased support of existing offspring. Since a female's dependent offspring would die as soon as she did, he argued, older mothers should stop producing new offspring and focus on those existing. In so doing, they would avoid the age-related risks associated with reproduction and thereby eliminate a potential threat to the continued survival of current offspring. The evolutionary reasoning behind this is driven by related theories.
Kin selection
Kin selection provides the framework for an adaptive strategy by which altruistic behavior is bestowed on closely related individuals because easily identifiable markers exist to indicate them as likely to reciprocate. Kin selection is implicit in theories regarding the successful propagation of genetic material through reproduction, as helping an individual more likely to share one's genetic material would better ensure the survival of at least a portion of it. Hamilton's rule suggests that individuals preferentially help those more related to them when costs to themselves are minimal. This is modeled mathematically as . Grandmothers would, therefore, be expected to forgo their own reproduction once the benefits of helping those individuals (b) multiplied by the relatedness to that individual (r) outweighed the costs of the grandmother not reproducing (c).
Evidence of kin selection emerged as correlated with climate-driven changes, around 1.8 –1.7 million years ago, in female foraging and food sharing practices. These adjustments increased juvenile dependency, forcing mothers to opt for a low-ranked, common food source (tubers) that required adult skill to harvest and process. Such demands constrained female IBIs (Inter Birth Intervals) thus providing an opportunity for selection to favor the grandmother hypothesis.
Parental investment
Parental investment, originally |
https://en.wikipedia.org/wiki/CompStat | CompStat—or COMPSTAT, short for Computer Statistics—is a computerization and quantification program used by police departments. It was originally set up by the New York City Police Department in the 1990s. Variations of the program have since been used in police departments across the world. According to a 2022 podcast by Peter Moskos with John Yohe and Billy Gorta, the name CompStat was suggested by detective Richard Mahere for the computer file name of the original program to comply with 8.3 filename conventions, short for "Comparative Statistics" and "Computer Statistics.".
Origins
CompStat was started under the direction of Jack Maple when he was a transit police officer in New York City. The system was called Charts of the Future and was simple: it tracked crime through pins stuck in maps. Charts of the Future is credited with cutting subway crime by 27 percent.
The original commanding officer of the Transit Police Crime Analysis Unit was Lieutenant Richard Vasconi. Chief of New York City Transit Police William J. Bratton was later appointed police commissioner by Rudolph Giuliani, and he brought Maple's Charts of the Future with him. Maple eventually made the NYPD adopt it after it was rebranded as CompStat, and it was credited with helping to bring down crime by around 60%. There was a CompStat meeting every month, and it was mandatory for police officials to attend. The year after CompStat was adopted, 1995, murders dropped to 1,181. By 2012, there were 417 murders—the lowest number since records start in 1964.
Operations
Weekly crime reports
On a weekly basis, personnel from each of the NYPD's 77 precincts, nine police service areas and 12 transit districts compile a statistical summary of the week's crime complaints, arrests and summons activity, as well as a written report of significant cases, crime patterns and police activities. This data, with specific crime and enforcement locations and times, is forwarded to the chief of the department's CompStat Unit, where information is collated and loaded into a citywide database.
The unit runs computer analysis on the data and generates a weekly CompStat report. The report captures crime complaints and arrest activity at the precinct, patrol borough and citywide levels, presenting a summary of these and other important performance indicators.
The data is presented on a week-to-date, prior 28 days and year-to-date basis, with comparisons to previous years' activity. Precinct commanders and members of the department's senior officers can easily discern emerging and established crime trends, as well as deviations and anomalies. With the report, department leadership can easily make comparisons between commands. Each precinct is also ranked in each complaint and arrest category.
Accountability
The CompStat program involves weekly crime control strategy meetings. These gatherings increase information flow between the agency's executives and the commanders of operational units, with particu |
https://en.wikipedia.org/wiki/Reentrant%20mutex | In computer science, the reentrant mutex (recursive mutex, recursive lock) is a particular type of mutual exclusion (mutex) device that may be locked multiple times by the same process/thread, without causing a deadlock.
While any attempt to perform the "lock" operation on an ordinary mutex (lock) would either fail or block when the mutex is already locked, on a recursive mutex this operation will succeed if and only if the locking thread is the one that already holds the lock. Typically, a recursive mutex tracks the number of times it has been locked, and requires equally many unlock operations to be performed before other threads may lock it.
Motivation
Recursive mutexes solve the problem of non-reentrancy with regular mutexes: if a function that takes a lock and executes a callback is itself called by the callback, deadlock ensues. In pseudocode, that is the following situation:
var m : Mutex // A non-recursive mutex, initially unlocked.
function lock_and_call(i : Integer)
m.lock()
callback(i)
m.unlock()
function callback(i : Integer)
if i > 0
lock_and_call(i - 1)
lock_and_call(1) // Invoking the function
Given these definitions, the function call will cause the following sequence of events:
— mutex locked
— because
— deadlock, because is already locked, so the executing thread will block, waiting for itself.
Replacing the mutex with a recursive one solves the problem, because the final will succeed without blocking.
Practical use
W. Richard Stevens notes that recursive locks are "tricky" to use correctly, and recommends their use for adapting single-threaded code without changing APIs, but "only when no other solution is possible".
The Java language's native synchronization mechanism, monitor, uses recursive locks. Syntactically, a lock is a block of code with the 'synchronized' keyword preceding it and any Object reference in parentheses that will be used as the mutex. Inside the synchronized block, the given object can be used as a condition variable by doing a wait(), notify(), or notifyAll() on it. Thus all Objects are both recursive mutexes and condition variables.
Example
Thread A calls function F which acquires a reentrant lock for itself before proceeding
Thread B calls function F which attempts to acquire a reentrant lock for itself but cannot due to one already outstanding, resulting in either a block (it waits), or a timeout if requested
Thread A's F calls itself recursively. It already owns the lock, so it will not block itself (no deadlock). This is the central idea of a reentrant mutex, and is what makes it different from a regular lock.
Thread B's F is still waiting, or has caught the timeout and worked around it
Thread A's F finishes and releases its lock(s)
Thread B's F can now acquire a reentrant lock and proceed if it was still waiting
Software emulation
Software emulation can be accomplished using the following structure:
A "control" condition using a |
https://en.wikipedia.org/wiki/North%E2%80%93South%20Expressway%20%28Malaysia%29 | The North–South Expressway is a network of tolled controlled-access highways running through the west coast of Peninsular Malaysia. The expressway network consists of the northern route and southern route, having a total length of . Running through seven states and connecting the Thailand and Singapore borders, the North–South Expressway is an important thoroughfare for local, interstate and international traffic. The expressway is part of route AH2, a designation of the Asian Highway Network.
The expressways were first conceived in 1977 due to increasing congestion on federal route 1, which was the main north–south thoroughfare at the time. However, economic uncertainties and the large cost meant that construction did not begin until 1981. The expressway began opening in stages from 1982, but the economic downturn at the time meant that construction had stalled and the work had to be fully privatised. The expressways were finally completed in 1994, with the tolls collected from the opened sections funding the remainder of the construction work.
Overview
The North–South Expressway is divided into 2 main routes – the northern route (route E1) and the southern route (route E2). Both routes run in parallel to the federal route 1 from Johor Bahru to Bukit Kayu Hitam. Each component expressway begins at the furthest end of the expressway from Kuala Lumpur. While the E2 terminates at the Selangor–Kuala Lumpur border, the E1 ends at Bukit Lanjan before proceeding to the city via the New Klang Valley Expressway, which is also gazetted as route E1. The E1 and E2 expressways are linked together via the North–South Expressway Central Link, E6.
While most of the expressway was construct according to JKR R6 design standards being defined in the Arahan Teknik 8/86: A Guide on Geometric Design of Roads (controlled-access expressway with design speed limit of 120 km/h and lane width of 3.5 m), the Jitra–Bukit Kayu Hitam section does not adhere to the JKR R6 standards and was grandfathered as part of the E1 expressway, as the section was constructed before the Arahan Teknik 8/86 was published by the Malaysian Public Works Department in 1986.
History
The North–South Expressway was constructed due to the congestion along the federal route 1 as a result of increasing traffic. In 1977, the government proposed to build a new north–south divided highway as an alternative to the federal route 1. The proposal to build the new highway was mooted as a result of the severe congestion along the Federal Route 1. Because of the large cost of the project, the highway was planned to be privatised and tolled, but none of the constructors being invited by the government were willing to do the job due to economic uncertainties at that time and the plan could not be materialised. It was only after Mahathir Mohamad became the Prime Minister that the North–South Expressway project was revived. The project was launched in 1981.
The Malaysian Highway Authority was established on |
https://en.wikipedia.org/wiki/Source%20control%20%28disambiguation%29 | Source control may refer to:
Version control in computing
Source control (respiratory disease), techniques to reduce spread of respiratory diseases such as COVID-19
A treatment for sepsis involving physical intervention at the source of an infection
Source control action, a procedure used for Superfund sites |
https://en.wikipedia.org/wiki/Unics | Unics or UnICS may refer to:
Unix, originally Unics, computer operating system software
BC UNICS, a Russian basketball club |
https://en.wikipedia.org/wiki/Christian%20Medical%20College%20Vellore | Christian Medical College, Vellore, widely known as CMC, Vellore, is a private, Christian community-run medical school, hospital and research institute. This Institute includes a network of primary, secondary and tertiary care hospitals in and around Vellore, Tamil Nadu, India.
The institute, constituent college is affiliated with the Tamil Nadu Dr. M.G.R. Medical University. Founded in 1900 by an American missionary, Dr Ida S. Scudder, CMC Vellore has brought many significant achievements to India, including starting the first College of Nursing in 1946, performing the first reconstructive surgery for leprosy in the world (1948), performing the first successful open heart surgery in India (1961), performing the first kidney transplant in India (1971), performing first bone marrow transplantation (1986) in India and performing the first successful ABO incompatible kidney transplant in India (2009).
History
The hospital was founded by Dr. Ida Sophia Scudder in 1900. Ida Scudder was the daughter of second-generation medical missionaries from the Dutch Reformed Church in the United States of America (US) who served in India. She was born in 1870 in Tindivanam, which is approximately 60 miles from Madras (known as Chennai today). As a young girl she witnessed famine, poverty and death, and vowed that she would never follow in her parents' footsteps and become a missionary. The Scudder family returned to the US on furlough in 1878 and Ida began her education. Her parents returned to India, but Ida Scudder stayed in the US attending the Northfield Seminary for Young Ladies (now Northfield Mount Herman). In 1891, she was called back to India to care for her ailing mother.
It was at this time that Ida became acutely aware of the lack of medical services available to women and children in India, primarily due to cultural and religious norms that did not allow male practitioners to treat females. This awareness became the driving force of her life one evening in her parents' bungalow, when a young Indian man came to the door requesting Ida's help for his wife who was struggling in childbirth. He rejected Ida's father, Dr John Scudder's care and left. Two more men came that very night with similar requests, seeking medical help for their wives in labor, but again turning down John Scudder's care. The three women and their babies died that night. The incident shook 24-year-old Ida Scudder to the core.
After prayer and deep thought Ida Scudder changed the course of her life, deciding to become a doctor in the US so that she could return to India to treat Indian female patients, and train Indian women to become doctors and nurses to serve their own. She returned to the US and in 1895, enrolled in the Woman's Medical College of Pennsylvania. She completed her studies in New York where she was in the first class of doctors at Cornell Medical College that included women (1899). Within three months she set sail for India with a "fiery passion to change things |
https://en.wikipedia.org/wiki/ILOVEYOU | ILOVEYOU, sometimes referred to as Love Bug or Love Letter for you, was a computer worm that infected over ten million Windows personal computers on and after 5 May 2000. It started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.TXT.vbs." At the time, Windows computers often hid the latter file extension ("VBS," a type of interpreted file) by default because it is an extension for a file type that Windows knows, leading unwitting users to think it was a normal text file. Opening the attachment activates the Visual Basic script. First, the worm inflicts damage on the local machine, overwriting random files (including Office files and image files; however, it hides MP3 files instead of deleting them), then, it copies itself to all addresses in the Windows Address Book used by Microsoft Outlook, allowing it to spread much faster than any other previous email worm.
Onel de Guzman, a then-24-year-old resident of Manila, Philippines, created the malware. Because there were no laws in the Philippines against making malware at the time of its creation, the Philippine Congress enacted Republic Act No. 8792, otherwise known as the E-Commerce Law, in July 2000 to discourage future iterations of such activity. However, the Constitution of the Philippines bans ex post facto laws, and as such de Guzman could not be prosecuted.
Creation
De Guzman, who was poor and struggling to pay for Internet access at the time, created the computer worm intending to steal other users' passwords, which he could use to log in to their Internet accounts without needing to pay for the service. He justified his actions on his belief that Internet access is a human right and that he was not actually stealing.
The worm used the same principles that de Guzman had described in his undergraduate thesis at AMA Computer College. He stated that the worm was very easy to create, thanks to a bug in Windows 95 that would run code in email attachments when the user clicked on them. Originally designing the worm to only work in Manila, he removed this geographic restriction out of curiosity, which allowed the worm to spread worldwide. De Guzman did not expect this worldwide spread.
Description
On the machine system level, ILOVEYOU relied on the scripting engine system setting (which runs scripting language files such as .vbs files) being enabled and took advantage of a feature in Windows that hid file extensions by default, which malware authors would use as an exploit. Windows would parse file names from right to left, stopping at the first period character, showing only those elements to the left of this. The attachment, which had two periods, could thus display the inner fake "TXT" file extension. True text files are considered to be innocuous as they are incapable of running arbitrary code. The worm used social engineering to entice users to open the attachment (out of actual desire to connect or simple curiosity) to ensure co |
https://en.wikipedia.org/wiki/Sue%20Thomas%3A%20F.B.Eye | Sue Thomas: F.B.Eye is a Canadian/American television series that premiered in 2002 on the PAX Network. The show ended in May 2005 due to PAX's decision to halt the production of original programming. It was one of the two highest rated shows on the network, along with Doc.
Premise
Sue Thomas: F.B.Eye is loosely based on the real life experience of Sue Thomas, a deaf woman whose lip-reading expertise landed her a job with an elite surveillance team at the FBI.
Production
The series was created by Dave Alan Johnson and Gary R. Johnson for Pebblehut Productions. They also created Doc starring Billy Ray Cyrus for PAX. Yuri Yakubiw was the cinematographer and Bill Layton was the art director. Though set in Washington D.C., except for some exterior scenery shots, all the episodes were shot in and around Toronto, Ontario, Canada, and more than half of the cast and production crew were Canadian.
The series was once known as Lip Service. The show's theme song is "Who I Am", which is sung by Jessica Andrews and was written by Brett James and Troy Verges.
Cancellation
The abrupt ending to the show was due to PAX's decision to no longer produce original programming, rather than poor ratings. The last episode of the series ended with a title slate saying, "The End... for now."
Characters
Main
Sue Thomas
Sue Thomas (played by Deanne Bray) is a young deaf woman who is able to communicate in both English and American Sign Language. She applies, and is accepted, for a position with the FBI in Washington, D.C. She leaves her home in Ohio and drives to Washington, picking up her first hearing dog, Levi, en route.
Thomas' parents are concerned that she will not be able to cope with life so far from everything she has known, despite the fact that they have strongly encouraged her in living in both a hearing and deaf environment. Her mother fought for her daughter to have every opportunity to live life to the fullest, which has made Sue a very independent young woman. She speaks, signs, reads lips, plays the piano and ice skates (Although she has not done this professionally since her teens after her best friend died on a bus taking her to an ice skating championship; Sue was the better skater but couldn't match the music to the performance she was meant to be giving). Sue has a college degree from Springfield College in Springfield, Massachusetts.
Thomas arrives at her job only to find she has been assigned to "Special Projects", with the mundane task of analyzing fingerprints. However, she has no intention of wasting her life examining fingerprints and marches into the supposed personnel office to tell them exactly what she thinks. Having done this, she discovers the office has been relocated (but not on the directory board) and the man she was telling off is not personnel, but a Special Agent, Jack Hudson. Impressed by her ambition, Hudson meets her at lunch, where he tests her skills by having her lip-read Myles who is seated some distance away outside. |
https://en.wikipedia.org/wiki/File%20synchronization | File synchronization (or syncing) in computing is the process of ensuring that computer files in two or more locations are updated via certain rules.
In one-way file synchronization, also called mirroring, updated files are copied from a source location to one or more target locations, but no files are copied back to the source location. In two-way file synchronization, updated files are copied in both directions, usually with the purpose of keeping the two locations identical to each other. In this article, the term synchronization refers exclusively to two-way file synchronization.
File synchronization is commonly used for home backups on external hard drives or updating for transport on USB flash drives. BitTorrent Sync, Dropbox, SKYSITE, Nextcloud, OneDrive, Google Drive and iCloud are prominent products. Some backup software also support real-time file sync. The automatic process prevents copying already identical files and thus can be faster and save much time versus a manual copy, and is less error prone. However this suffers from the limit that the synchronized files must physically fit in the portable storage device. Synchronization software that only keeps a list of files and the changed files eliminates this problem (e.g. the "snapshot" feature in Beyond Compare or the "package" feature in Synchronize It!). It is especially useful for mobile workers, or others that work on multiple computers.
It is possible to synchronize multiple locations by synchronizing them one pair at a time. The Unison Manual describes how to do this:
If you need to do this, the most reliable way to set things up is to organize the machines into a "star topology," with one machine designated as the "hub" and the rest as "spokes," and with each spoke machine synchronizing only with the hub. The big advantage of the star topology is that it eliminates the possibility of confusing "spurious conflicts" arising from the fact that a separate archive is maintained by Unison for every pair of hosts that it synchronizes.
Common features
Common features of file synchronization systems include:
Encryption for security, especially when synchronizing across the Internet.
Compressing any data sent across a network.
Conflict detection where a file has been modified on both sources, as opposed to where it has only been modified on one. Undetected conflicts can lead to overwriting copies of the file with the most recent version, causing data loss. For conflict detection, the synchronization software needs to keep a database of the synchronized files. Distributed conflict detection can be achieved by version vectors.
Open Files Support ensures data integrity when copying data or application files that are in-use or database files that are exclusively locked.
Specific support for using an intermediate storage device, such as a removable flash disc, to synchronize two machines. Most synchronizing programs can be used in this way, but providing specific support for this c |
https://en.wikipedia.org/wiki/Quentin%20Stafford-Fraser | James Quentin Stafford-Fraser is a computer scientist and entrepreneur based in Cambridge, England. He was one of the team that created the first webcam, the Trojan room coffee pot. Quentin pointed a camera at the coffee pot and wrote the XCoffee client program which allowed the image of the pot to be displayed on a workstation screen. When web browsers gained the ability to display images, the system was modified to make the coffee pot images available over HTTP and thus became the first webcam.
Quentin wrote the original VNC client (viewer) and server for the Windows operating system, while at the Olivetti Research Laboratory.
He is a regular public speaker and his work has attracted significant media coverage.
Quentin is also a part-time Senior Research Associate at the University of Cambridge Computer Lab. In 2013 he was a member of the winning team on Christmas University Challenge, representing Gonville & Caius College, Cambridge.
Companies founded
Quentin has founded or co-founded various companies and other organisations including:
Newnham Research (now DisplayLink)
Exbiblio
The Ndiyo project
Telemarq Ltd (of which he is currently CEO)
Earlier history
Quentin was educated at Haileybury before studying Computer Science at the University of Cambridge and in 1989 became the first Cambridge college Computer Officer, at his old college, Gonville and Caius College, before joining the Systems Research Group in the university's Computer Lab. Quentin is credited with operating the first web-server in the University of Cambridge, in 1992.
He created the Brightboard Interactive whiteboard project at Xerox EuroPARC in Cambridge, as part of his Ph.D. thesis.
References
External links
Personal website
Computer programmers
Quentin Stafford-Fraser
Alumni of Gonville and Caius College, Cambridge
People educated at Haileybury and Imperial Service College
Living people
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Neopets%3A%20The%20Darkest%20Faerie | Neopets: The Darkest Faerie is an action-adventure game developed by Idol Minds and published by Sony Computer Entertainment for the PlayStation 2 in 2005.
Plot
Neopets: The Darkest Faerie is set in "Neopia", the land of the Neopets universe, which is inhabited by anthropomorphic versions of various Neopets species. The adventure is based on a story written by Neopets founder Adam Powell.
Long ago, a dark faerie was imprisoned at the bottom of the Maraquan sea as punishment for attempting to take over the realm, her name having been erased from history and the faerie remembered only as 'the Darkest Faerie'. However, after a thousand years, the spell imprisoning the Darkest Faerie has become weak and breaks, and the faerie escapes, returning to the surface intent on taking over the realm of Neopia and exacting revenge upon the Faerie queen Fyora who imprisoned her.
The game begins with Tormund Ellis (nicknamed "Tor"), a young Lupe farm boy who has long dreamed of being a knight in the city of Meridell. After being accepted into the ranks and training under the discipline of the castle's master-at-arms, Torak, Tormund is knighted after saving the village of Cogham from The Ixi Raiders. But when answering a plea to defend the nearby forest glade of Illusen, the earth faerie, from an invading tribe of Werelupes, the mission fails, and Tormund returns to Meridell to discover both it and its inhabitants under a cloud of dark magic and the control of the Darkest Faerie. Though unaffected himself, he is driven out of the castle and city by the faerie's minions.
The neighboring kingdom of Brightvale notices the dark clouds, and sends a diplomatic envoy to the city of Faerieland, home to the Faerie queen Fyora, to investigate. A young Acara, Roberta, the niece of Brightvale King Hagan, is among the diplomats. The Darkest Faerie attacks Faerieland that night, capturing and binding the Faerie queen and covering the castle in a dark aura. Roberta is able to escape the castle but is pursued and falls to the countryside of Neopia below.
Roberta and Tormund meet each other and then proceed to warn the king of Brightvale about the Faerie. It is revealed that both were given amulets to protect against the Darkest Faerie's power, and upon research discover that the Darkest Faerie was once sealed away by the power of Fyora's magical rod, now lying deep underneath the city of Meridell. After freeing the neighboring regions from control of dark magic, they are able to infiltrate the castle of Meridell and find a way deep underground, recovering Fyora's ancient rod. With its power they are able to drive the darkness out of the city, and then return to Faerieland to stop the Darkest Faerie. It is a trap, however, as the Darkest Faerie seizes the rod and a fight between the two Faeries ensues. Fyora is able to teleport Tormund and Roberta to safety before being captured and imprisoned again.
When Tor and Roberta awaken, they find themselves in the lost Kingdom of |
https://en.wikipedia.org/wiki/Kubuntu | Kubuntu ( ) is an official flavor of the Ubuntu operating system that uses the KDE Plasma Desktop instead of the GNOME desktop environment. As part of the Ubuntu project, Kubuntu uses the same underlying systems. Kubuntu shares the same repositories as Ubuntu and is released regularly on the same schedule as Ubuntu.
Kubuntu was sponsored by Canonical Ltd. until 2012, and then directly by Blue Systems. Now, employees of Blue Systems contribute upstream to KDE and Debian, and Kubuntu development is led by community contributors. During the changeover, Kubuntu retained the use of Ubuntu project servers and existing developers.
Name
"Kubuntu" is a registered trademark held by Canonical. It is derived from the name Ubuntu, prefixing a K to represent the KDE platform that Kubuntu is built upon (following a widespread naming convention of prefixing K to the name of any software released for use on KDE platforms), as well as the KDE community.
is a Bantu term translating roughly to 'humanity'. Since Bantu grammar involves prefixes to form noun classes, and the prefix has the meaning 'toward' in Bemba, is therefore also a meaningful Bemba word or phrase translating to 'toward humanity'.
Reportedly, the same word, by coincidence, also takes the meaning of 'free' (in the sense of 'without payment') in Kirundi.
Comparison with Ubuntu
Kubuntu typically differs from Ubuntu in graphical applications and tools:
History
Development started back in December 2004 at the Ubuntu Mataró Conference in Mataró, Spain when a Canonical employee Andreas Mueller, from Gnoppix, had the idea to make an Ubuntu KDE variant and got the approval from Mark Shuttleworth to start the first Ubuntu variant, called Kubuntu. On the same evening Chris Halls from the OpenOffice.org project and Jonathan Riddell from KDE started volunteering on the newborn project.
Shortly after Ubuntu was started, Mark Shuttleworth stated in an interview that he recognized the need for KDE-based distribution in order to maintain diversity in Linux distributions, which in his belief aligns with Ubuntu project's overall purpose of increasing the adoption of free software.
K Desktop Environment 3 was used as default interface until Kubuntu 8.04. That version included KDE Plasma Desktop as unsupported option which became default in the subsequent release, 8.10.
On , Canonical employee Jonathan Riddell announced the end of Canonical's Kubuntu sponsorship. On , Blue Systems was announced on the Kubuntu website as the new sponsor. As a result, both developers employed by Canonical to work on Kubuntu–Jonathan Riddell and Aurélien Gâteau–transferred to Blue Systems.
Releases
Kubuntu follows the same naming/versioning system as Ubuntu, with each release having a code name and a version number (based on the year and month of release). Canonical provides support and security updates for Kubuntu components that are shared with Ubuntu for 18 months – five years in case of long-term support (LTS) versions – af |
https://en.wikipedia.org/wiki/PEAP | PEAP might be an acronym or abbreviation for:
Protected Extensible Authentication Protocol, a security protocol in computer security
Personal Egress Air Packs
Proactive Employee Assistance Program |
https://en.wikipedia.org/wiki/Data%20access | Data access is a generic term referring to a process which has both an IT-specific meaning and other connotations involving access rights in a broader legal and/or political sense. In the former it typically refers to software and activities related to storing, retrieving, or acting on data housed in a database or other repository.
Details
Two fundamental types of data access exist:
sequential access (as in magnetic tape, for example)
random access (as in indexed media)
Data access crucially involves authorization to access different data repositories. Data access can help distinguish the abilities of administrators and users. For example, administrators may have the ability to remove, edit and add data, while general users may not even have "read" rights if they lack access to particular information.
Historically, each repository (including each different database, file system, etc.), might require the use of different methods and languages, and many of these repositories stored their content in different and incompatible formats.
Over the years standardized languages, methods, and formats, have developed to serve as interfaces between the often proprietary, and always idiosyncratic, specific languages and methods. Such standards include SQL (1974- ), ODBC (ca 1990- ), JDBC, XQJ, ADO.NET, XML, XQuery, XPath (1999- ), and Web Services.
Some of these standards enable translation of data from unstructured (such as HTML or free-text files) to structured (such as XML or SQL).
Structures such as connection strings and DBURLs
can attempt to standardise methods of connecting to databases.
See also
Right of access to personal data
Data access object
Data access layer
References
Data management
Data analysis |
https://en.wikipedia.org/wiki/IFC%20Films | IFC Films is an American film production and distribution company based in New York. It is an offshoot of IFC owned by AMC Networks. It distributes mainly independent films under its own name, select foreign films and documentaries under its Sundance Selects label and genre films under its IFC Midnight label. It operates the IFC Center.
History
The IFC Films division has a predecessor film label, Next Wave Films, designed to release movies, which was in operation from 1997 to 2002, when it was shut down and folded into IFC themselves. IFC also launched a film company, IFC Productions, which set up operation in March 1997 to produce their own feature film projects. On January 18, 1999, IFC launched a film label Agenda 2000, which set up their own film projects, which have their world premiere on IFC.
On September 26, 2000, IFC launched its own feature film unit, branded IFC Films, to be headed by Bob Berney, who went on to have jobs at Newmarket Films, and later founder of Picturehouse.
IFC has several ventures in video on demand (VOD), available through cable television pay-per-view, Apple iTunes, and formerly Blockbuster's Movielink. In 2002, IFC Films struck a deal with MGM Home Entertainment to release its theatrical films to home video, until they along with IFC's original TV shows moved to Genius Products in 2006 as part of a deal signed by Rainbow Media.
In 2006, IFC launched IFC First Take, combining a limited theatrical release with video on demand being available the same day. The films included would be shown at IFC owned IFC Center, as well as other theaters; Landmark Theatres were the first outside theaters announced. That same year, In 2006, IFC Films began distributing some films to Apple iTunes. The first batch were thirteen films with nominations in the Film Independent Spirit Awards. In a March 2008 panel discussion, IFC Film's Arianna Bocco stated that all its films would be released through First Take. That same year, IFC launched IFC Festival Direct, a platform for video on demand distribution, for films without a slated theatrical release in the United States. in 2010, it was announced that IFC Films would be launching a division titled IFC Midnight, the division would focus on releasing horror, sci-fi, thrillers, erotic arthouse, and action.
In 2009, IFC signed home video deals with MPI Media Group and the Criterion Collection.
In February 2015, Shout! Factory's Scream Factory made a deal with IFC Films to release their titles on their IFC Midnight label. This included the Blu-ray and DVD releases of The Babadook and Backcountry, among others.
On May 27, 2015, IFC Films struck another home video distribution deal with Paramount Home Media Distribution.
On July 30, 2018, AMC Networks reached a definitive agreement to acquire RLJ Entertainment where AMC would pay $59 million for the remaining RLJE shares not owned by AMC or Robert L. Johnson. The transaction was approved by RLJ Entertainment's stockholders on Octobe |
https://en.wikipedia.org/wiki/Comparison%20of%20platform%20virtualization%20software | Platform virtualization software, specifically emulators and hypervisors, are software packages that emulate the whole physical computer machine, often providing multiple virtual machines on one physical platform. The table below compares basic information about platform virtualization hypervisors.
General
Features
Providing any virtual environment usually requires some overhead of some type or another. Native usually means that the virtualization technique does not do any CPU level virtualization (like Bochs), which executes code more slowly than when it is directly executed by a CPU. Some other products such as VMware and Virtual PC use similar approaches to Bochs and QEMU, however they use a number of advanced techniques to shortcut most of the calls directly to the CPU (similar to the process that JIT compiler uses) to bring the speed to near native in most cases. However, some products such as coLinux, Xen, z/VM (in real mode) do not suffer the cost of CPU-level slowdowns as the CPU-level instructions are not proxied or executing against an emulated architecture since the guest OS or hardware is providing the environment for the applications to run under. However access to many of the other resources on the system, such as devices and memory may be proxied or emulated in order to broker those shared services out to all the guests, which may cause some slow downs as compared to running outside of virtualization.
OS-level virtualization is described as "native" speed, however some groups have found overhead as high as 3% for some operations, but generally figures come under 1%, so long as secondary effects do not appear.
See for a paper comparing performance of paravirtualization approaches (e.g. Xen) with OS-level virtualization
Requires patches/recompiling.
Exceptional for lightweight, paravirtualized, single-user VM/CMS interactive shell: largest customers run several thousand users on even single prior models. For multiprogramming OSes like Linux on IBM Z and z/OS that make heavy use of native supervisor state instructions, performance will vary depending on nature of workload but is near native. Hundreds into the low thousands of Linux guests are possible on a single machine for certain workloads.
Image type compatibility
Other features
Windows Server 2008 R2 SP1 and Windows 7 SP1 have limited support for redirecting the USB protocol over RDP using RemoteFX.
Windows Server 2008 R2 SP1 adds accelerated graphics support for certain editions of Windows Server 2008 R2 SP1 and Windows 7 SP1 using RemoteFX.
Restrictions
This table is meant to outline restrictions in the software dictated by licensing or capabilities.
Note: No limit means no enforced limit. For example, a VM with 1 TB of memory cannot fit in a host with only 8 GB memory and no memory swap disk, so it will have a limit of 8 GB physically.
See also
List of computer system emulators
Comparison of application virtualization software
Comparison of OS emu |
https://en.wikipedia.org/wiki/SimpleXML | SimpleXML is a PHP extension that allows users to easily manipulate/use XML data. It was introduced in PHP 5 as an object oriented approach to the XML DOM providing an object that can be processed with normal property selectors and array iterators. It represents an easy way of getting an element's attributes and textual content if you know the XML document's structure or layout.
Compared to DOM or the Expat parser, SimpleXML takes a fewer lines of code to read text data from an element.
Functions
addAttribute()
addChild()
asXML()
attributes()
children()
__construct()
getDocNamespaces()
getName()
getNamespaces()
registerXPathNamespace()
xpath()
simplexml_import_dom
simplexml_load_file
simplexml_load_string
Error handling
It is possible to suppress all XML errors when loading the document and then iterate over the errors.
References
External links
PHP.net's SimpleXML manual
AIP Conf. Proc. 1497, pp. 395-401; Speed up of XML parsers with PHP language implementation
devshed SimpleXML Tutorial
PHP software
XML parsers |
https://en.wikipedia.org/wiki/Ostrich%20algorithm | In computer science, the ostrich algorithm is a strategy of ignoring potential problems on the basis that they may be exceedingly rare. It is named after the ostrich effect which is defined as "to stick one's head in the sand and pretend there is no problem". It is used when it is more cost-effective to allow the problem to occur than to attempt its prevention.
Use with deadlocks
This approach may be used in dealing with deadlocks in concurrent programming if they are believed to be very rare and the cost of detection or prevention is high. A set of processes is deadlocked if each process in the set is waiting for an event that only another process in the set can cause.
The ostrich algorithm pretends there is no problem and is reasonable to use if deadlocks occur very rarely and the cost of their prevention would be high. The UNIX and Windows operating systems take this approach.
Although using the ostrich algorithm is one of the methods of dealing with deadlocks, other effective methods exist such as dynamic avoidance, banker's algorithm, detection and recovery, and prevention.
See also
Crash-only software
End-to-end principle
References
External links
Ostrich algorithm
Non-Hard Locking Read-Write Locker
Deadlock Basics + Modelling + Ostrich Algorithm
Concurrent algorithms |
https://en.wikipedia.org/wiki/Advanced%20Dungeons%20%26%20Dragons%3A%20Heroes%20of%20the%20Lance | Advanced Dungeons & Dragons: Heroes of the Lance is a video game released in 1988 for various home computer systems and consoles. The game is based on the first Dragonlance campaign module for the Dungeons & Dragons fantasy role-playing game, Dragons of Despair, and the first Dragonlance novel Dragons of Autumn Twilight. Heroes of the Lance focuses on the journey of eight heroes through the ruined city of Xak Tsaroth, where they must face the ancient dragon Khisanth and retrieve the relic, the Disks of Mishakal.
Gameplay
Heroes of the Lance is a side-scrolling action game. Even if it is a faithful representation of a portion of the novel Dragons of Autumn Twilight, it was a departure from the role-playing game module Dragons of Despair the book itself is based on.
The eight heroes from the Dragonlance series are assembled for the quest, but only one is visible on the screen at a time; when the on-screen hero dies, the next in line appears. Heroes of the Lance uses Dungeons & Dragons game statistics, with character statistics taken exactly from the rule books. Three characters have special abilities (healing magic, wizard magic, and trap removal), but the other five merely act as "lives" for the player as in traditional action-platforming games.
Plot
Characters
The eight heroes that make up the party are:
Goldmoon, a princess who brandishes the Blue Crystal Staff, an artifact whose powers she seeks to fully understand.
Sturm Brightblade, a powerful and solemn knight.
Caramon Majere, A warrior who makes up for his lack of intelligence with pure strength and fighting prowess.
Raistlin Majere, Caramon's twin brother; a sly and brilliant, but frail, mage.
Tanis Half-Elven, the 'natural leader' of the heroes, and good with a bow.
Tasslehoff Burrfoot, a kender pickpocket. He fights with a sling weapon known as a .
Riverwind, Goldmoon's betrothed. He is a noble and wise warrior.
Flint Fireforge, a grizzled dwarven warrior.
Development
Heroes of the Lance was based on the original Dragonlance novels written by Margaret Weis and Tracy Hickman. Heroes of the Lance was not part of the Gold Box series; the nickname for these other D&D titles were "Silver Box" games. The NES version was developed by Natsume Co., Ltd..
Reception
Heroes of the Lance was very successful for SSI, with 88,808 copies sold for computers in North America. After reviewing a pre-production copy of the DOS version of Heroes of the Lance, the magazine G.M. praised its graphics and "excellent" audio and said that "it would undoubtedly go straight to the top of the computer games charts and stay there for several months. Its THAT good." Computer Gaming World gave the DOS version of the game a similarly positive review. Electronic Gaming Monthly columnist Seanbaby listed the NES version as the 2nd worst NES game, and as the 11th worst video game. Levi Buchanan, in a classic Dungeons & Dragons videogame retrospective for IGN, wrote that "If you don't plan well, you can lose a lot of h |
https://en.wikipedia.org/wiki/Pocket%20Tanks | Pocket Tanks, often abbreviated as PTanks or simply as PT, is a 1-2 player computer game and mobile game developed by Michael P. Welch from Blitwise Productions. It was originally released for Windows and Mac OS X in 2001 and was later released for iOS in 2009 and Android in 2012. It is available as shareware as well as a premium version known as Pocket Tanks Deluxe, which includes the content from all 30 expansion packs.
Gameplay
Pocket Tanks was adapted from Welch's earlier Amiga game Scorched Tanks. Pocket Tanks features modified physics and additional weapons ranging from simple explosive shells to homing missiles. The game also allows players to move the tank.
The goal of Pocket Tanks is to use various weapons to attack the other player's tank. Each hit scores a certain number of points, which varies based on the weapon and the proximity of the target. At the end of 10 volleys, the player with the highest score wins.
Pocket Tanks features a fully destructible environment, which allows the player to create and put themselves on pedestals or in bunkers, allowing for more strategic gameplay. Pocket Tanks also supports weapon expansion packs where each player can have up to 325 different weapons in total.
Network play was made available in the version 1.3 release.
Expansion packs
The game features extra game content in the form of expansion "weapon packs" which give the player more weapon choices during gameplay, available to those who own Pocket Tanks Deluxe. In the PC version, there are 30 Expansion Packs available to download. All packs that include 5 weapons are available for free, and 15 weapons that have to be paid for (mobile versions only). There are 325 weapons in total: 30 from the original game and 295 from the Deluxe Version.
Development history
Michael P. Welch from Blitwise Productions created Amiga games before he started developing PC games such as Super DX-Ball and Neon Wars. Welch developed Pocket Tanks as remake/sequel of the Amiga game Scorched Tanks and extended the gameplay with modified physics, dozens of new weapons (hundreds with a paid expansion), and the ability to move the tank. The game's soundtrack was created by Eliran Ben Ishai as Impulse Tracker Module file. The first version of Pocket Tanks was released in 2001.
On October 26, 2001, the first version of Pocket Tanks was released after a beta. This version continued to be updated, adding features such as network support and more weapons.
Version 1.3 was released in November 2007. It contained bug fixes as well as LAN and IP support.
A Collector's Edition of Pocket Tanks was released on November 16, 2007. It contained the first 14 expansion packs and the Deluxe version of Pocket Tanks.
On June 1, 2008, Pocket Tanks became available for Mac OS X.
On April 15, 2009, Pocket Tanks was released on iOS. This version included a new touch interface and 35 weapons to enjoy for free. The iOS version continues to be updated along with other mobile versions th |
https://en.wikipedia.org/wiki/Extensible%20Authentication%20Protocol | Extensible Authentication Protocol (EAP) is an authentication framework frequently used in network and internet connections. It is defined in , which made obsolete, and is updated by .
EAP is an authentication framework for providing the transport and usage of material and parameters generated by EAP methods. There are many methods defined by RFCs, and a number of vendor-specific methods and new proposals exist. EAP is not a wire protocol; instead it only defines the information from the interface and the formats. Each protocol that uses EAP defines a way to encapsulate by the user EAP messages within that protocol's messages.
EAP is in wide use. For example, in IEEE 802.11 (WiFi) the WPA and WPA2 standards have adopted IEEE 802.1X (with various EAP types) as the canonical authentication mechanism.
Methods
EAP is an authentication framework, not a specific authentication mechanism. It provides some common functions and negotiation of authentication methods called EAP methods. There are currently about 40 different methods defined. Methods defined in IETF RFCs include EAP-MD5, EAP-POTP, EAP-GTC, EAP-TLS, EAP-IKEv2, EAP-SIM, EAP-AKA, and EAP-AKA'. Additionally, a number of vendor-specific methods and new proposals exist. Commonly used modern methods capable of operating in wireless networks include EAP-TLS, EAP-SIM, EAP-AKA, LEAP and EAP-TTLS. Requirements for EAP methods used in wireless LAN authentication are described in . The list of type and packets codes used in EAP is available from the IANA EAP Registry.
The standard also describes the conditions under which the AAA key management requirements described in can be satisfied.
Lightweight Extensible Authentication Protocol (LEAP)
The Lightweight Extensible Authentication Protocol (LEAP) method was developed by Cisco Systems prior to the IEEE ratification of the 802.11i security standard. Cisco distributed the protocol through the CCX (Cisco Certified Extensions) as part of getting 802.1X and dynamic WEP adoption into the industry in the absence of a standard. There is no native support for LEAP in any Windows operating system, but it is widely supported by third-party client software most commonly included with WLAN (wireless LAN) devices. LEAP support for Microsoft Windows 7 and Microsoft Windows Vista can be added by downloading a client add in from Cisco that provides support for both LEAP and EAP-FAST. Due to the wide adoption of LEAP in the networking industry many other WLAN vendors claim support for LEAP.
LEAP uses a modified version of MS-CHAP, an authentication protocol in which user credentials are not strongly protected and easily compromised; an exploit tool called ASLEAP was released in early 2004 by Joshua Wright. Cisco recommends that customers who absolutely must use LEAP do so only with sufficiently complex passwords, though complex passwords are difficult to administer and enforce. Cisco's current recommendation is to use newer and stronger EAP protocols such as EAP-F |
https://en.wikipedia.org/wiki/Lycos%20Europe | Lycos Europe was a pan-European network of websites, offering services including communication tools, online communities, web search, e-commerce, web hosting, homepage building and Internet access. It was an independent corporation, sharing no corporate structure with Lycos, Inc. (USA) other than the licensed use of their name in Europe, but Lycos Europe was formed as a joint-venture between Bertelsmann and Telefonica, who owned Lycos Inc. through Terra Lycos. On 26 November 2008, Lycos Europe announced that it was to shut down and sell its remaining assets.
The Winding up of Lycos Europe
In November 2008, Lycos Europe announced that shareholders had called for its liquidation. Over the following months, it sold as many of its assets as possible and liquidated. Sold assets included the sale of the Danish portal Jubii, the Lycos Chat (which at the time was both the Lycos & Yahoo Chat in Europe) was transferred to a new operator on March 9, 2009, and for a short while rebranded as the Noesis Chat. The Lycos Chat now forms part of Lycos, Inc. (USA) collection of sites, Love@Lycos was sold to a Swedish company. Lycos Europe sold further businesses: the news search Paperball was taken over by Paperball GmbH, Munich. The search engine Fireball now belongs to Ambrosia AG, Zug (Switzerland). Trademark and domains of the French Email-Service Caramail were taken over by United Internet AG, Montabaur. Conversis hosting GmbH continues the free hosting service MultiMania. Since liquidation, Lycos Inc withdrew the right for Lycos Europe to use their name and therefore, Lycos Europe are still partially trading under the name Jubii Europe.
Make Love Not Spam
In November 2004, Lycos Europe introduced a Microsoft Windows and Mac OS screensaver program called Make Love Not Spam. It was introduced as both marketing for the then-new Lycos email service Spray Mail, and as a way for users to fight spam in a collective manner.
The program worked using users' computers to perform a DDOS attack on the web servers of known spammers. The computers worked in the same way as a botnet except the users were aware of the software and were able to decide if they wished to be involved in the scheme.
On the December 21, 2004 Lycos Europe stopped distributing the program whilst simultaneously 'turning off' the programs on computers that had downloaded it. The decision was made under heavy criticism from Internet and security experts. It is also believed Lycos was subject to large scale counterattacks believed to be from spammers in retaliation. The distribution website was replaced with the words "Stay Tuned".
References
External links
Lycos UK
Lycos, Inc. (USA)
Lycos Chat (UK)
Joint ventures
Companies based in the London Borough of Merton
fi:Makelovenotspam.com |
https://en.wikipedia.org/wiki/Smart%20Battery%20System | Smart Battery System (SBS) is a specification for managing a smart battery, usually for a portable computer. It allows operating systems to perform power management operations via a smart battery charger based on remaining estimated run times by determining accurate state of charge readings. Through this communication, the system also controls the battery charge rate. Communication is carried over an SMBus two-wire communication bus. The specification originated with the Duracell and Intel companies in 1994, but was later adopted by several battery and semiconductor makers.
The Smart Battery System defines the SMBus connection, the data that can be sent over the connection (Smart Battery Data or SBD), the Smart Battery Charger, and a computer BIOS interface for control. In principle, any battery operated product can use SBS.
A special integrated circuit in the battery pack (called a fuel gauge or battery management system) monitors the battery and reports information to the SMBus. This information might include battery type, model number, manufacturer, characteristics, charge/discharge rate, predicted remaining capacity, an almost-discharged alarm so that the PC or other device can shut down gracefully, and temperature and voltage to provide safe fast-charging.
See also
List of battery types
Power Management Bus (PMBus)
References
External links
SBS-IF Smart Battery System Implementers Forum
Battery Firmware Hacking Inside the innards of a Smart Battery
Rechargeable batteries
Battery charging |
https://en.wikipedia.org/wiki/Samuel%20S.%20Wagstaff%20Jr. | Samuel Standfield Wagstaff Jr. (born 21 February 1945) is an American mathematician and computer scientist, whose research interests are in the areas of cryptography, parallel computation, and analysis of algorithms, especially number theoretic algorithms. He is currently a professor of computer science and mathematics at Purdue University who coordinates the Cunningham project, a project to factor numbers of the form bn ± 1, since 1983. He has authored/coauthored over 50 research papers and four books. He has an Erdős number of 1.
Wagstaff received his Bachelor of Science in 1966 from Massachusetts Institute of Technology. His doctoral dissertation was titled, On Infinite Matroids, PhD in 1970 from Cornell University.
Wagstaff was one of the founding faculty of Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue, and its precursor, the Computer Operations, Audit, and Security Technology (COAST) Laboratory.
Selected publications
with John Brillhart, D. H. Lehmer, John L. Selfridge, Bryant Tuckerman: Factorization of bn ± 1, b = 2,3,5,6,7,10,11,12 up to high powers, American Mathematical Society, 1983, 3rd edition 2002 as electronic book, Online text
Cryptanalysis of number theoretic ciphers, CRC Press 2002
with Carlos J. Moreno: Sums of Squares of Integers, CRC Press 2005
The Joy of Factoring, Student Mathematical Library (American Mathematical Society) 2013
Wagstaff The Cunningham Project, Fields Institute, pdf file
=
References
External links
Cunningham project website
CERIAS WWW site
Archival COAST WWW site
Number theorists
Cornell University alumni
20th-century American mathematicians
21st-century American mathematicians
Living people
1945 births
Massachusetts Institute of Technology alumni |
https://en.wikipedia.org/wiki/Double%20hashing | Double hashing is a computer programming technique used in conjunction with open addressing in hash tables to resolve hash collisions, by using a secondary hash of the key as an offset when a collision occurs. Double hashing with open addressing is a classical data structure on a table .
The double hashing technique uses one hash value as an index into the table and then repeatedly steps forward an interval until the desired value is located, an empty location is reached, or the entire table has been searched; but this interval is set by a second, independent hash function. Unlike the alternative collision-resolution methods of linear probing and quadratic probing, the interval depends on the data, so that values mapping to the same location have different bucket sequences; this minimizes repeated collisions and the effects of clustering.
Given two random, uniform, and independent hash functions and , the th location in the bucket sequence for value in a hash table of buckets is:
Generally, and are selected from a set of universal hash functions; is selected to have a range of and to have a range of . Double hashing approximates a random distribution; more precisely, pair-wise independent hash functions yield a probability of that any pair of keys will follow the same bucket sequence.
Selection of h2(k)
The secondary hash function should have several characteristics:
it should never yield an index of zero
it should cycle through the whole table
it should be very fast to compute
it should be pair-wise independent of
The distribution characteristics of are irrelevant. It is analogous to a random-number generator.
All be relatively prime to |T|.
In practice:
If division hashing is used for both functions, the divisors are chosen as primes.
If the T is a power of 2, the first and last requirements are usually satisfied by making always return an odd number. This has the side effect of doubling the chance of collision due to one wasted bit.
Analysis
Let be the number of elements stored in , then 's load factor is . That is, start by randomly, uniformly and independently selecting two universal hash functions and to build a double hashing table . All elements are put in by double hashing using and .
Given a key , the -st hash location is computed by:
Let have fixed load factor .
Bradford and Katehakis
showed the expected number of probes for an unsuccessful search in , still using these initially chosen hash functions, is regardless of the distribution of the inputs. Pair-wise independence of the hash functions suffices.
Like all other forms of open addressing, double hashing becomes linear as the hash table approaches maximum capacity. The usual heuristic is to limit the table loading to 75% of capacity. Eventually, rehashing to a larger size will be necessary, as with all other open addressing schemes.
Variants
Peter Dillinger's PhD thesis points out that double hashing produces unwanted equivalent hash function |
https://en.wikipedia.org/wiki/Smart%20Common%20Input%20Method | The Smart Common Input Method (SCIM) is a platform for inputting more than thirty languages on computers, including Chinese-Japanese-Korean style character languages (CJK), and many European languages. It is used for POSIX-style operating systems including Linux and BSD. Its purposes are to provide a simple and powerful common interface for users from any country, and to provide a clear architecture for programming, so as to reduce time required to develop individual input methods.
Goals
The main goals of the SCIM project include:
To act as a unified frontend for current available input method libraries. Bindings to uim and m17n library are available (as of August 2007).
To act as a language engine of IIIMF (an input method framework).
To support as many input method protocols/interfaces as existing and in common use.
To support multiple operating systems. (Currently, only POSIX-style operating systems are available.)
Architecture
SCIM was originally written in the C++ language but has moved to pure C since 1.4.14. It abstracts the input method interface to several classes and attempts to simplify the classes and make them more independent from each other. With the simpler and more independent interfaces, developers can write their own input methods in fewer lines of code.
SCIM is a modularized IM platform, and as such, components can be implemented as dynamically loadable modules, thus can be loaded during runtime at will. For example, input methods written for SCIM could be IMEngine modules, and users can use such IMEngine modules combined with different interface modules (FrontEnd) in different environments without rewrite or recompile of the IMEngine modules, reducing the compile time or development time of the project.
SCIM is a high-level library, similar to XIM or IIIMF; however, SCIM claims to be simpler than either of those IM platforms. SCIM also claims that it can be used alongside XIM or IIIMF. SCIM can also be used to extend the input method interface of existing application toolkits, such as GTK+, Qt and Clutter via IMmodules.
Related projects
SKIM is a separate project aimed at integrating SCIM more tightly into the K Desktop Environment, by providing a GUI panel (named scim-panel-kde as an alternative to scim-panel-gtk), a KConfig config module and setup dialogs for itself and the SCIM module libscim. It also has its own plugin system which supports on-demand loadable actions.
t-latn-pre and t-latn-post are two input methods that provide an easy way for composing accented characters, either by preceding regular characters with diacritic marks (in the case of t-latn-pre), or by adding the marks subsequently (in the case of t-latn-post). Their main advantage is the large number of composed characters from different languages that can be entered this way, rendering it unnecessary to install, for example, separate keyboard layouts. These input methods are available for SCIM through the M17n library.
See also
Input me |
https://en.wikipedia.org/wiki/PNY%20Technologies | PNY Technologies, Inc., doing business as PNY, is an American manufacturer of flash memory cards, USB flash drives, solid state drives, memory upgrade modules, portable battery chargers, computer locks, cables, chargers, adapters, and consumer and professional graphics cards. The company is headquartered in Parsippany-Troy Hills, New Jersey.
PNY stands for "Paris, New York", as they used to trade memory modules between Paris and New York.
History
PNY Electronics, Inc. originated out of Brooklyn, New York in 1985 as a company that bought and sold memory chips.
In 1996, the company was headquartered in Moonachie, New Jersey, and had a manufacturing production plant there, an additional plant in Santa Clara, California, and served Europe from a third facility in Bordeaux, France.
To emphasize its expansion into manufacturing new forms of memory and complementary products, the company changed its name in 1997 to PNY Technologies, Inc. The company now has main offices in Parsippany, New Jersey; Santa Clara, California; Miami, Florida; Bordeaux, France, and Taiwan.
In 2009, the New Jersey Nets sold the naming rights of their practice jerseys to PNY. In 2010, New Jersey Governor Chris Christie spoke to PNY CEO Gadi Cohen about staying in New Jersey after Cohen was reportedly considering a move to Pennsylvania. In 2011, PNY moved their global headquarters and main manufacturing facility to a 40+ acre location on Jefferson Road in Parsippany, NJ. Lt. Governor Kim Guadagno toured the company and called it "a real good business news story for New Jersey."
Products
PNY is a memory and graphics technology company and manufacturer of computer peripherals, including the following products:
Flash memory cards
USB flash drives
Solid state drives
Memory upgrades
NVIDIA GeForce and Quadro graphics cards
HDMI cables
DRAM modules
Portable battery chargers
HP Pendrive & MicroSD Cards
Legacy products:
CD-R discs
PNY has introduced water-cooled video cards and themed USB flash drives that include full films.
References
External links
Companies based in Morris County, New Jersey
American companies established in 1985
Computer companies established in 1985
1985 establishments in New York City
Computer companies of the United States
Computer memory companies
Graphics hardware companies
Manufacturing companies based in New Jersey
Parsippany-Troy Hills, New Jersey
Privately held companies based in New Jersey |
https://en.wikipedia.org/wiki/The%20Steve%20Earle%20Show | The Steve Earle Show (formerly known as The Revolution Starts Now) was a weekly radio show on the Air America Radio network hosted by singer/songwriter Steve Earle. It highlighted some of Earle's favorite artists, blending in-studio performances with liberal political talk and commentary.
The show aired Sundays on some Air America affiliates from 10 to 11 PM ET.
The show last aired on June 10, 2007, and that was a rebroadcast of a past episode. Earle subsequently started DJing on a show on Sirius Satellite Radio called Hardcore Troubadour.
References
External links
Official show site
Air America (radio network)
American music radio programs |
https://en.wikipedia.org/wiki/WCIV | WCIV (channel 36) is a television station in Charleston, South Carolina, United States, affiliated with MyNetworkTV and ABC. The station is owned by Sinclair Broadcast Group, and maintains studios on Allbritton Boulevard along US 17/701 (Johnnie Dodds Boulevard) in Mount Pleasant and a transmitter in Awendaw, South Carolina.
In September 2014, due to complications arising from Sinclair's acquisition of the original WCIV (channel 4) from its previous owner, Allbritton Communications, WCIV's programming and ABC affiliation was moved onto the second digital subchannel of Sinclair's existing station in the market, MyNetworkTV affiliate WMMP. WCIV's license was sold to Howard Stirk Holdings in order to form a new station using its existing facilities. In preparation for the sale, the WCIV and WMMP intellectual units swapped signals on September 30, 2014, with WCIV moving to WMMP's channel 36 signal and WMMP moving to WCIV's channel 34 signal respectively. WMMP then began carrying programming from ZUUS Country, and has since changed its calls to WGWG.
History
The current WCIV first began operations on December 1, 1992, as WCTP, an independent station. It began after a nine-month delay in operations with test programs. It joined The WB as a charter affiliate on January 11, 1995. On November 20, it changed its calls to WBNU. On January 6, 1997, Max Media Properties (a company partially related to the present-day Max Media) bought the station, changed its calls to WMMP, and switched its affiliation to UPN. Only a year later, Max Media sold WMMP to Sinclair, giving the station its third owner in as many years. Later that year, Sinclair bought out Sullivan Broadcasting, owners of Fox affiliate WTAT-TV (channel 24), and all licensee assets were given to Glencairn Ltd, with Sinclair continuing to own through a LMA.
When Sinclair tried to acquire Sullivan's stations outright in 2001, it could not legally keep both WMMP and WTAT because Charleston has only six full-power stations (too few to legally permit a duopoly). Although WTAT was longer-established, Sinclair opted to keep WMMP and sold WTAT to Glencairn, Ltd. That company was owned by Edwin Edwards, a former Sinclair executive, and appeared to be a minority-owned company. However, nearly all of Glencairn's stock was controlled by the Smith family founders of Sinclair. In effect, the company now had a duopoly in the Charleston market which was a violation of Federal Communications Commission (FCC) regulations. Glencairn and Sinclair further circumvented the rules by crafting a local marketing agreement between the two stations, with WMMP as senior partner–one of the few known instances in which a Big Four affiliate was the junior partner to a WB or UPN affiliate.
In 2001, the FCC fined Sinclair $40,000 for illegally controlling Glencairn. Later that year, it was renamed Cunningham Broadcasting. However, nearly all of Cunningham's stock is still controlled by trusts in the names of the children of the |
https://en.wikipedia.org/wiki/Bloodaxe | Bloodaxe can refer to:
Eric Bloodaxe (c. 885 – 954), a Viking king
Erik Bloodaxe (hacker), an alias of American computer hacker Chris Goggans
Bloodaxe Books, a British publishing house specializing in poetry
Bloodaxe (comics), a Marvel Comics anti-hero
Brian Bloodaxe, a British platform game
B'hrian Bloodaxe, a Discworld character
Bloodaxe, a nickname of Danish cricketer Ole Mortensen (born 1958) |
https://en.wikipedia.org/wiki/William%20Craig%20%28broadcaster%29 | William (Bill) Craig is a Canadian broadcaster.
Craig began his career as a researcher for the Canadian Broadcasting Corporation's This Hour Has Seven Days. He subsequently joined the programming departments at the CBC, TVOntario and Rogers Cable. He was also a policy analyst for the Canadian Radio-television and Telecommunications Commission in the 1970s.
In the 1990s, Craig launched four regional sports networks in the United States. In 1999, he launched iCraveTV, a controversial website which offered streaming broadcasts of television stations. He shut down the website the following year after a copyright infringement lawsuit from the American broadcasters whose signals were available on the service.
He acquired PrideVision, Canada's LGBT television network, in 2004, and announced plans to improve the channel's cable distribution by separating its adult entertainment and general interest programming onto two distinct channels.
In 2005, the CRTC approved Craig's licence for an adult entertainment channel, and relaunched PrideVision as OUTtv and carried the PrideVision name to the adult channel named HARD on PrideVision, later renamed HARDtv. In 2006, Craig sold his interest in OUTtv and HARDtv to Shavick Entertainment and Pink Triangle Press.
In 2011, Craig became the CEO of Citywest, a municipally-owned communications company in Northwest BC.
References
Canadian mass media owners
Canadian LGBT businesspeople
Living people
Year of birth missing (living people)
20th-century Canadian LGBT people
21st-century Canadian LGBT people
Canadian gay men |
https://en.wikipedia.org/wiki/Suikoden%20III | is a role-playing video game developed by Konami Computer Entertainment Tokyo and published by Konami for the PlayStation 2 video game console, and the third installment in the Suikoden video game series. It was released in 2002 in Japan and North America, with a manga adaption published in 2004.
Mechanics
Like other games in the series, Suikoden III features an intricate, detailed setting. The game's story is presented through the "Trinity Sight System"; rather than having only one "hero", the plot is explored through three different viewpoints, allowing events to be seen from multiple sides. There are three struggling factions in Suikoden III, each with their own divisions and politics, and there is no unambiguous "right" side. Hugo of the Karaya Clan is a Grasslander, Chris Lightfellow is a Knight of the merchant nation of Zexen, and Geddoe is a member of the Harmonian Southern Frontier Defense Force, keeping watch for the huge nation of Harmonia on the Grasslands area.
The named "hero" chosen by the player at the beginning of the game is actually the Flame Champion, the Grassland leader who upheld the independence of the Grasslands against a Harmonian incursion decades ago. Unlike other Suikoden games, which generally feature a silent protagonist, the Flame Champion and the other main characters all have personalities and dialog.
Gameplay
Suikoden III shares many elements with other role-playing video games. The player controls the current protagonist and travels with them around the world map, advancing the plot by completing tasks and talking with other characters. In towns, they can gather information, sharpen their weaponry, learn new skills, and buy equipment; wilderness areas generally feature random encounters with monsters. Aside from the main plot, after a certain point in each main character's chapters, they may recruit new characters to go to Budehuc castle. Recruiting a character often requires a short sidequest or other mission. Unlike Suikoden II and Suikoden V, Suikoden III has no "time limits" for character recruitment; assuming certain plot decisions are made "correctly," it is always possible to recruit all 108 Stars of Destiny.
As in other RPGS, characters in Suikoden III possess a variety of statistics that determine in-game combat ability. However, characters can also learn specific skills; for instance, the "Parry" skill allows a character to defend against attacks more often, while other skills may increase damage output or hasten the casting of spells. Different characters have affinities for different skills, and their own maximum limit on the number of skills they can learn. Parties may consist of up to 6 characters who participate in combat and one "support" character who adds a special skill to the party, such as minor healing after battle. If all 6 characters lose all their hit points (and are thus incapacitated), it is game over and the player must restart. Exceptions exist for certain plot battles in which w |
https://en.wikipedia.org/wiki/EphPod | ephPod (pronounced eef-Pod) was a freeware program for Microsoft Windows that managed the interaction between Apple Computer's iPod digital audio player and the computer. It is no longer actively developed.
The EphPod Web site does not recommend EphPod software for iPhone, iPod and iPad models released after 2006. The download page is kept up-to-date and has iPad, iPod Touch and iPhone tools to transfer iPhone music to iTunes and to copy music from PC to iPhone, even for the latest iTunes and iOS versions.
See also
Comparison of iPod Managers
External links
EphPod official site
IGN
Secrets of the iPod
Do it-yourself iPod projects
How to do everything with your iPod & iPod mini
MP3: Musik finden, laden, hören, brennen
IPod software |
https://en.wikipedia.org/wiki/CBQT-FM | CBQT-FM is a Canadian radio station. It is the CBC Radio One station in Thunder Bay, Ontario, broadcasting at 88.3 FM, and serves all of Northwestern Ontario through a network of relay transmitters.
History
The station was launched in 1973 as CBQ on 800 AM. The 800 frequency had been vacated earlier that year by the defunct CJLX. CBQ Radio's inaugural morning broadcast in December 1973 made it the second city in Ontario to get a regional broadcast centre. The call sign CBQ was a last minute choice by station managers since CBL (for Lakehead) or CBT (for Thunder Bay) were already taken by the CBC stations in Toronto and Grand Falls-Windsor, Newfoundland and Labrabor, respectively. Instead the letter Q was chosen for Quetico Provincial Park near Atikokan, which is west of Thunder Bay.
Prior to CBQ's launch, CBC Radio programming aired on private affiliate CFPA.
CBQ moved to FM as CBQT-FM in 1990. The CBQ-FM callsign was already in use by the CBC Stereo sister station on 101.7 FM. Some of the relay transmitters for CBQT previously rebroadcast CBL in Toronto.
Local programming
The station's local program is Superior Morning, hosted by Lisa Laco. The station formerly also produced Voyage North, hosted by Gerald Graham in the afternoon, although that program was replaced in August 2014 by Up North, hosted by Jessica Pope from the studios of CBCS-FM in Sudbury. The move faced some protest in the city, with Thunder Bay City Council passing a unanimous resolution requesting that the federal government rescind its 2012 funding cuts to the CBC.
CBQT's rebroadcast transmitters in the Central time zone also simulcast the 5 p.m. hour of local programming from CBW in Winnipeg so that the network's World at Six airs at 6 p.m. local time.
The CBC Radio studio in Thunder Bay also produces the hourly weekend weather reports for all of Ontario after the hourly news break.
Repeaters
CFTL-FM, a radio station in Big Trout Lake owned by the Ayamowin Communications Society, rebroadcasts CBQT-FM part-time, with additional programming originating from CKWT-FM Sioux Lookout. It is currently unknown if this station is still broadcasting.
AM to FM
Some of CBQT-FM's repeaters currently operate on the AM dial. Future plans are possible to convert the remaining repeaters to the FM dial.
On December 21, 2012, the CBC filed an application to the CRTC to convert the following AM transmitters to the FM dial.
CBOL 1450 to 91.3 with 50 watts
CBLH 1010 to 92.3 with 50 watts
The CRTC approved the applications for both transmitters on May 8, 2013.
On January 21, 2013, the CBC filed an application to the CRTC to convert CBLS 1240 to 95.3 FM with 500 watts (average & maximum ERP). Antenna height will be 182 metres (EHAAT) and the radiation pattern will be non-directional. As well this new FM transmitter will serve the nearby town of Hudson and Hudson's transmitter (CBQW 1340) was deleted as well. The conversion was approved by the CRTC on April 17, 2013.
On May 14, 2015, th |
https://en.wikipedia.org/wiki/CBO-FM | CBO-FM is a Canadian radio station. It is the CBC Radio One station in Ottawa, Ontario, airing at 91.5 FM, and serves much of Eastern Ontario through a network of relay transmitters. CBO's Ottawa-area transmitter is located in Camp Fortune, Quebec, while its studios are located in the CBC Ottawa Broadcast Centre on Queen Street (across from the Confederation Line light rail station) in Downtown Ottawa.
History
CNRO was launched on February 27, 1924 as CKCH a Canadian National Railway radio network station, and adopted the CNRO call sign on July 16, 1924, in order to indicate its network affiliation. The station was the first to broadcast the time signal from the Dominion Observatory in Ottawa, doing so daily at 9 p.m. It operated on 690 AM and later switched to 600. In 1933, the station was taken over by the CBC's predecessor, the Canadian Radio Broadcasting Commission and became CRCO on 880 kHz. The call sign changed to CBO in 1937 when ownership was transferred to the CBC. Later frequency changes to 910 in 1941 and to 920 in 1977 (the latter accompanied by a power boost to 50,000 watts) were followed by a move to 91.5 FM in 1991. The call sign of the existing CBO-FM facility (103.3, part of the CBC Stereo network) was then changed to CBOQ-FM. From 1924, the station's studios were located on the sixth floor of the Château Laurier Hotel in downtown Ottawa, a legacy of its origins with the Canadian National Railway which had also owned the hotel. In 2004, the station left the Château Laurier, closing the oldest operating radio studios in Canada, and moved to the new CBC Ottawa Broadcast Centre on Sparks Street as part of a consolidation of various Ottawa CBC facilities.
Local programming
The station's local programs are Ottawa Morning, hosted by Robyn Bresnahan and All in a Day (hosted by Alan Neal) in the afternoon. However, most of the relay transmitters air the Toronto-originated Ontario Morning in place of Ottawa Morning. Unlike most Radio One stations, which air provincewide morning programs on Saturdays and Sundays, the station also produces its own Saturday morning show, In Town and Out, although it airs Fresh Air, the provincewide weekend morning program for the rest of Ontario, on Sundays.
In addition, CBO-FM produces the regional noon news and talk program Ontario Today, which airs on all CBC Radio One stations in Ontario including Toronto, and the national network program, The House. It also formerly produced Bandwidth, a music show which aired on all Radio One stations in Ontario outside of Toronto until 2014.
Transmitters
On November 9, 1989, CHEZ-FM Inc. was denied a license to add a new FM transmitter at Carleton Place on 92.3 MHz to rebroadcast the programming of the CBC's English-language AM network CBO.
On July 5, 2010, the CBC applied to change Brockville's CBOB-FM frequency from 106.5 to 91.9 MHz which received CRTC approval on November 10, 2010.
On June 2, 2014, the CBC submitted an application to convert CBLI 1110 to |
https://en.wikipedia.org/wiki/Kazuhiko%20Nishi | is a Japanese businessman and personal computer pioneer.
Nishi's father ran a private school. Nishi attended Waseda University but dropped out to help found the first Japanese computer magazine, I/O. Shortly thereafter he launched ASCII magazine (a Japanese equivalent of Byte or Creative Computing) and, in 1978, ASCII Corporation, which began by making a rough translation from English to Japanese of the game Wizardry. He wanted to lead the personal computer market, but ASCII Corporation didn't have enough capital to develop personal computers. He knew Microsoft BASIC was becoming the industry standard in North America, and conceived selling it to Japanese companies. At 1978 National Computer Conference, he met and got along with Microsoft founder Bill Gates.
In Japan, Nishi worked with NEC on developing the PC-8001, an early consumer-ready personal computer not requiring assembly, which became a standard in Japan, and was involved in the design of the Kyotronic 85 which, sold to Radio Shack, became the TRS-80 Model 100, an early laptop computer.
Nishi's relationship with Bill Gates helped ASCII Corporation to grow. MSX, a new personal computer format, was jointly developed by Microsoft and ASCII Corporation for the Japanese market. But Nishi and Gates fell out, the partnership was dissolved in 1986, and Microsoft set up its own Japanese software subsidiary. But ASCII Corporation continued to thrive.
Under Nishi's direction, ASCII Corporation invested heavily in American startups in the electronics industry. By 1992 ASCII Corporation was heavily in debt and its stock price collapsed. At the direction of the Ministry of International Trade and Industry, the Industrial Bank of Japan and other banks bailed out the company, which rebounded.
ASCII Corporation became a subsidiary of Kadokawa Group Holdings in 2004, and merged with another Kadokawa subsidiary MediaWorks on April 1, 2008, and became ASCII Media Works.
After 1986, Nishi wrote for newspapers and authored a number of books. He sat in several committees on behalf of the Ministry of Posts and Telecommunications and of the Ministry of International Trade and Industry, and he is a member of the Committee for World Economy in the 21st Century. Nishi is the president of MSX Association, a private organization originating from an assembly of people with affinity with the MSX standard, and the president of Digital do MaiN, audio engineering company.
Nishi has been the principal of a combined junior and senior high school, Suma Gakuen, in Kobe, since 2002.
As with many other schools in Japan, the principal has little to do with the day to day running of the school. In reality, the school is run by his sister , in the role of vice-principal. the school has a long connection to the Nishi family.
In 2005, Nishi ran unsuccessfully for president of a small university in rural Japan.
References
1956 births
Living people
Japanese businesspeople
People from Kobe |
https://en.wikipedia.org/wiki/CBL-FM | CBL-FM (94.1 MHz) is the flagship station of the CBC Music network. It is a non-commercial station, licensed to Toronto, Ontario, and is owned by the Canadian Broadcasting Corporation.
CBL-FM's studios and offices are located at the Canadian Broadcasting Centre, on Front Street West, while its transmitter is located atop the CN Tower.
History
CBL-FM was launched on October 7, 1946, with the callsign VE9EV, as an FM simulcast for 740 CBL. It was the corporation's second FM station behind VE9CB in Montreal (now CBFX-FM). In 1947, its callsign was changed to CBC-FM. The station originally broadcast at 99.1 MHz, but moved to 94.1 in 1966. (The 99.1 frequency was vacant until 1977, when it was assigned to the CKO all-news radio network. CKO ceased operations in 1989, and the frequency was again vacant until it was assigned to CBLA-FM, co-owned with CBL-FM.)
As part of an 18-month trial for a nationwide FM network, CBC-FM began airing separate programming in 1960, playing mostly classical music along with the corporation's other English-language FM stations (CBM-FM Montreal and CBO-FM Ottawa). CBC-FM returned to simulcasting CBL in 1962, but resumed separate programming again in 1964. The station was renamed CBL-FM in 1968. The FM network was rebranded CBC Stereo on November 3, 1975, CBC Radio Two in 1997 and CBC Music in 2018, as it shifted away from mostly classical music, to a mix of adult album alternative, classical, jazz and other genres.
Rebroadcasters
On February 15, 1979, the CRTC approved the CBC's application to operate a new FM transmitter in Belleville on 94.3 MHz (CBBB-FM) and on May 7, 1979, the CRTC also approved the CBC's application to operate a new FM transmitter in Brockville on 104.9 MHz (CBBA-FM), to rebroadcast the programming originating from CBL-FM Toronto. Neither of these transmitters in Belleville and Brockville were implemented and the frequencies were awarded to other broadcasters.
In 1979, CBBK-FM began broadcasting at 92.9 MHz in Kingston.
In 1983, a rebroadcaster was added at Peterborough operating at 103.9 MHz as CBBP-FM.
On June 28, 2005, the CRTC approved the CBC's application to change the frequency of its transmitter CBL-FM-1 104.7 to 106.9 MHz. This change of frequency was to eliminate significant interference with a local radio station CFBK-FM operating at 105.5 MHz in Huntsville.
References
External links
CBC Toronto
BL
BL
Radio stations established in 1946
1946 establishments in Ontario |
https://en.wikipedia.org/wiki/Trans-Siberian%20Highway | The Trans-Siberian Highway is the unofficial name for a network of federal highways that span the width of Russia from the Baltic Sea of the Atlantic Ocean to the Sea of Japan. In the Asian Highway Network, the route is known as AH6. It stretches over from St. Petersburg to Vladivostok. The road disputes the title of the longest national highway in the world with Australia's Highway 1.
The highway became fully paved on 12 August 2015.
Route
The route coincides in places with European route E30 over a distance of about . One of its segments (Chelyabinsk-Novosibirsk) can be passed by the R402 highway via Ishim inside the Russian territory or by the R254 highway through the neighboring country of Kazakhstan. The route consists of seven federal highways:
M10 Russia Highway: St. Petersburg-Moscow,
M5 Ural Highway: Moscow-Chelyabinsk,
Baikal Highway:
R254: Chelyabinsk-Novosibirsk, or with R402 bypass highway inside the Russian territory.
R255: Novosibirsk-Irkutsk,
R258 Baikal Highway: Irkutsk-Chita,
R297 Amur Highway: Chita-Khabarovsk,
A360 Lena Highway: Major branch leading to Yakutsk and northeast Siberia,
R504 Kolyma Highway: Extension of A360 to Magadan,
A370 Ussuri Highway: Khabarovsk-Vladivostok,
Amur Highway
Until 2010 the most problematic stretch of the highway was between Chita and Khabarovsk. The first section of this route, linking Belogorsk to Blagoveshchensk (124 km in length), was constructed by gulag inmates as early as 1949. Extended and updated between 1998 and 2001, this road forms part of the Asian route AH31 connecting Belogorsk to Dalian in China.
The Chita-Khabarovsk road remained largely unfinished up until early 2004, when Russian President Vladimir Putin symbolically opened the Amur Highway, with great swaths of forest separating major portions from one another. Jim Oliver and Dennis O'Neil rode motorbikes across Russia, along the Trans-Siberian Highway, during the last week of May and the first three weeks of June in 2004: back then, as described in Jim Oliver's book, Lucille and The XXX Road, the section between Chita and Khabarovsk was an extremely challenging undertaking among marsh, gravel, rock, mud (vulnerable to the rasputitsa seasons), sand, washboard, potholes, stream fording and detours of the elusive highway with a noticeable absence of pavement which leads into cases of probable surface tension which can cause the highway to collapse. In the following years the road, in some places was a modern paved highway with painted reflective lane-lines, while in others a single lane meandering, pockmarked, loose-gravel trail following the route of the early 20th century Amur Cart Road. Completion of a 7-metre-wide highway between Chita and Khabarovsk was slated for 2010: now the road is in very good condition, completely upgraded and enlarged and with a smooth surface. The Amur Highway was fully reconstructed and paved in September 2010.
Old history
The road from St. Peterburg to Irkutsk existe |
https://en.wikipedia.org/wiki/RL%20circuit | A resistor–inductor circuit (RL circuit), or RL filter or RL network, is an electric circuit composed of resistors and inductors driven by a voltage or current source. A first-order RL circuit is composed of one resistor and one inductor, either in series driven by a voltage source or in parallel driven by a current source. It is one of the simplest analogue infinite impulse response electronic filters.
Introduction
The fundamental passive linear circuit elements are the resistor (R), capacitor (C) and inductor (L). These circuit elements can be combined to form an electrical circuit in four distinct ways: the RC circuit, the RL circuit, the LC circuit and the RLC circuit, with the abbreviations indicating which components are used. These circuits exhibit important types of behaviour that are fundamental to analogue electronics. In particular, they are able to act as passive filters.
In practice, however, capacitors (and RC circuits) are usually preferred to inductors since they can be more easily manufactured and are generally physically smaller, particularly for higher values of components.
Both RC and RL circuits form a single-pole filter. Depending on whether the reactive element (C or L) is in series with the load, or parallel with the load will dictate whether the filter is low-pass or high-pass.
Frequently RL circuits are used as DC power supplies for RF amplifiers, where the inductor is used to pass DC bias current and block the RF getting back into the power supply.
Complex impedance
The complex impedance (in ohms) of an inductor with inductance (in henrys) is
The complex frequency is a complex number,
where
represents the imaginary unit: ,
is the exponential decay constant (in radians per second), and
is the angular frequency (in radians per second).
Eigenfunctions
The complex-valued eigenfunctions of any linear time-invariant (LTI) system are of the following forms:
From Euler's formula, the real-part of these eigenfunctions are exponentially-decaying sinusoids:
Sinusoidal steady state
Sinusoidal steady state is a special case in which the input voltage consists of a pure sinusoid (with no exponential decay). As a result,
and the evaluation of becomes
Series circuit
By viewing the circuit as a voltage divider, we see that the voltage across the inductor is:
and the voltage across the resistor is:
Current
The current in the circuit is the same everywhere since the circuit is in series:
Transfer functions
The transfer function to the inductor voltage is
Similarly, the transfer function to the resistor voltage is
The transfer function, to the current, is
Poles and zeros
The transfer functions have a single pole located at
In addition, the transfer function for the inductor has a zero located at the origin.
Gain and phase angle
The gains across the two components are found by taking the magnitudes of the above expressions:
and
and the phase angles are:
and
Phasor notation
These expressions together ma |
https://en.wikipedia.org/wiki/Traffic%20contract | If a network service (or application) wishes to use a broadband network (an ATM network in particular) to transport a particular kind of traffic, it must first inform the network about what kind of traffic is to be transported, and the performance requirements of that traffic. The application presents this information to the network in the form of a traffic contract.
The Traffic descriptor
When a connection is requested by an application, the application indicates to the network:
The Type of Service required.
The Traffic Parameters of each data flow in both directions.
The quality of service (QoS) Parameters requested in each direction.
These parameters form the traffic descriptor for the connection.
Type of Service
Currently, five ATM Forum-defined service categories exist (see Table 1). The basic differences among these service categories are described in the following sub-sections. These service categories provide a method to relate traffic characteristics and QoS requirements to network behaviour. The service categories are characterised as being real-time or non-real-time. CBR and rt-VBR are the real-time service categories. The remaining three service categories (nrt-VBR, UBR and ABR) are considered non-real-time service categories.
Constant Bit Rate (CBR)
The CBR service category is used for connections that transport traffic at a constant bit rate, where there is an inherent reliance on time synchronisation between the traffic source and destination. CBR is tailored for any type of data for which the end-systems require predictable response time and a static amount of bandwidth continuously available for the life-time of the connection. The amount of bandwidth is characterized by a Peak Cell Rate (PCR). These applications include services such as video conferencing, telephony (voice services) or any type of on-demand service, such as interactive voice and audio. For telephony and native voice applications CBR provides low-latency traffic with predictable delivery characteristics, and is therefore typically used for circuit emulation.
Real-Time Variable Bit Rate (rt-VBR)
The rt-VBR service category is used for connections that transport traffic at variable rates — traffic that relies on accurate timing between the traffic source and destination. An example of traffic that requires this type of service category are variable rate, compressed video streams. Sources that use rt-VBR connections are expected to transmit at a rate that varies with time (for example, traffic that can be considered bursty). Real-time VBR connections can be characterized by a Peak Cell Rate (PCR), Sustained Cell Rate (SCR), and Maximum Burst Size (MBS). Cells delayed beyond the value specified by the maximum CTD (Cell Transfer Delay) are assumed to be of significantly reduced value to the application.
Non-Real-Time Variable Bit Rate (nrt-VBR)
The nrt-VBR service category is used for connections that transport variable bit rate traffic for which ther |
https://en.wikipedia.org/wiki/Traffic%20policing%20%28communications%29 | In communications, traffic policing is the process of monitoring network traffic for compliance with a traffic contract and taking steps to enforce that contract. Traffic sources which are aware of a traffic contract may apply traffic shaping to ensure their output stays within the contract and is thus not discarded. Traffic exceeding a traffic contract may be discarded immediately, marked as non-compliant, or left as-is, depending on administrative policy and the characteristics of the excess traffic.
Effects
The recipient of traffic that has been policed will observe packet loss distributed throughout periods when incoming traffic exceeded the contract. If the source does not limit its sending rate (for example, through a feedback mechanism), this will continue, and may appear to the recipient as if link errors or some other disruption is causing random packet loss. The received traffic, which has experienced policing en route, will typically comply with the contract, although jitter may be introduced by elements in the network downstream of the policer.
With reliable protocols, such as TCP as opposed to UDP, the dropped packets will not be acknowledged by the receiver, and therefore will be resent by the emitter, thus generating more traffic.
Impact on congestion-controlled sources
Sources with feedback-based congestion control mechanisms (for example TCP) typically adapt rapidly to static policing, converging on a rate just below the policed sustained rate.
Co-operative policing mechanisms, such as packet-based discard facilitate more rapid convergence, higher stability and more efficient resource sharing. As a result, it may be hard for endpoints to distinguish TCP traffic that has been merely policed from TCP traffic that has been shaped.
Impact in the case of ATM
Where cell-level dropping is enforced (as opposed to that achieved through packet-based policing) the impact is particularly severe on longer packets. Since cells are typically much shorter than the maximum packet size, conventional policers discard cells which do not respect packet boundaries, and hence the total amount of traffic dropped will typically be distributed throughout a number of packets. Almost all known packet reassembly mechanisms will respond to a missing cell by dropping the packet entirely, and consequently a very large number of packet losses can result from moderately exceeding the policed contract.
Process
RFC 2475 describes traffic policing elements like a meter and a dropper. They may also optionally include a marker. The meter measures the traffic and determines whether or not it exceeds the contract (for example by GCRA). Where it exceeds the contract, some policy determines if any given PDU is dropped, or if marking is implemented, if and how it is to be marked. Marking can comprise setting a congestion flag (such as ECN flag of TCP or CLP bit of ATM) or setting a traffic aggregate indication (such as Differentiated Services Code Point of IP). |
https://en.wikipedia.org/wiki/Metabolic%20engineering | Metabolic engineering is the practice of optimizing genetic and regulatory processes within cells to increase the cell's production of a certain substance. These processes are chemical networks that use a series of biochemical reactions and enzymes that allow cells to convert raw materials into molecules necessary for the cell's survival. Metabolic engineering specifically seeks to mathematically model these networks, calculate a yield of useful products, and pin point parts of the network that constrain the production of these products. Genetic engineering techniques can then be used to modify the network in order to relieve these constraints. Once again this modified network can be modeled to calculate the new product yield.
The ultimate goal of metabolic engineering is to be able to use these organisms to produce valuable substances on an industrial scale in a cost-effective manner. Current examples include producing beer, wine, cheese, pharmaceuticals, and other biotechnology products. Some of the common strategies used for metabolic engineering are (1) overexpressing the gene encoding the rate-limiting enzyme of the biosynthetic pathway, (2) blocking the competing metabolic pathways, (3) heterologous gene expression, and (4) enzyme engineering.
Since cells use these metabolic networks for their survival, changes can have drastic effects on the cells' viability. Therefore, trade-offs in metabolic engineering arise between the cells ability to produce the desired substance and its natural survival needs. Therefore, instead of directly deleting and/or overexpressing the genes that encode for metabolic enzymes, the current focus is to target the regulatory networks in a cell to efficiently engineer the metabolism.
History and applications
In the past, to increase the productivity of a desired metabolite, a microorganism was genetically modified by chemically induced mutation, and the mutant strain that overexpressed the desired metabolite was then chosen. However, one of the main problems with this technique was that the metabolic pathway for the production of that metabolite was not analyzed, and as a result, the constraints to production and relevant pathway enzymes to be modified were unknown.
In 1990s, a new technique called metabolic engineering emerged. This technique analyzes the metabolic pathway of a microorganism, and determines the constraints and their effects on the production of desired compounds. It then uses genetic engineering to relieve these constraints. Some examples of successful metabolic engineering are the following: (i) Identification of constraints to lysine production in Corynebacterium glutamicum and insertion of new genes to relieve these constraints to improve production (ii) Engineering of a new fatty acid biosynthesis pathway, called reversed beta oxidation pathway, that is more efficient than the native pathway in producing fatty acids and alcohols which can potentially be catalytically converted to chemi |
https://en.wikipedia.org/wiki/Matt%20Vasgersian | Matt Vasgersian ( ; born 1967) is an American sportscaster and television host. Vasgersian is a play-by-play announcer for the Los Angeles Angels, as well as a studio host for MLB Network and FOX Sports. In the past, he has served as an announcer for Fox Sports' National Football League and Major League Baseball coverage, ESPN's coverage of Major League Baseball, NBC Sports' coverage of the Olympic Games, and NBC Sports' coverage of the original XFL. He formerly called play-by-play for the Milwaukee Brewers and the San Diego Padres.
Early life
Vasgersian was born in Berkeley, California, and raised in nearby Moraga. He is of Armenian descent. He started his media career as a child actor, becoming a member of the Screen Actors Guild at age seven. He appeared in an episode of The Streets of San Francisco and the movie The Candidate starring Robert Redford, which was filmed mostly in Berkeley, California. Vasgersian graduated from Campolindo High School in Moraga and the University of Southern California in Los Angeles. While a student at USC, he appeared on The New Dating Game, winning a trip to Telluride, Colorado. He also appeared as a contestant on Supermarket Sweep, where Vasgersian and his partner won the Big Sweep but not the $5,000 grand prize.
Career
Initial baseball work
Vasgersian has worked in baseball since 1991, starting with a six-year stint in the Minor Leagues as a play-by-play announcer. He began his career as a sportscaster with the Chicago Cubs Rookie league affiliate in Huntington, West Virginia on radio station WKEE-AM 800 and was the voice of the High Desert Mavericks (San Diego Padres affiliate) on radio station KAPL. He moved up the minor league baseball ranks over the next several years, working for various clubs in a number of different organizations, including the Syracuse Chiefs in 1995, and ending with the AAA Tucson Toros in 1996.
Vasgersian was 29 years old when he became the play-by-play voice for the Milwaukee Brewers where he worked from 1997 through 2001. He later worked in the same role for the San Diego Padres from 2002 through 2008. Vasgersian was with the Padres for seven seasons when it was announced he would be joining MLB Network.
On November 1, 2008, during a broadcast of the San Diego CIF High School Football Game of the Week, Channel 4 announced that Vasgersian would not be returning as Padres announcer for the 2009 season, having chosen to pursue other opportunities. Later that week, it was reported that Vasgersian had signed a deal with MLB Network to become the network's first studio host.
Fox Sports
Vasgersian joined Fox Sports in 2006. From 2006 through 2008, Vasgersian worked on Fox NFL telecasts, teaming with J. C. Pearson on the network's #6 broadcast team. In previous years, he had done select games for the network. Vasgersian's Fox football resume included calling BCS games for the network, working the Orange Bowl in 2007 and the Fiesta Bowl 2008 and 2009. Starting in 2007, he also wor |
https://en.wikipedia.org/wiki/CPC%20Attack%21 | CPC Attack! was a short-lived magazine dedicated to Amstrad CPC gaming. The magazine was a successor to Amstrad Computer User magazine. It was characterised by a strong comic-like graphical style featuring a recurring mascot - a Tank Girl-like character called Amy Strad. Funnily enough this same character featured in C+VG magazine under the name Sadie. Originally, Amstrad Computer User had been a much more serious magazine than its main rival Amstrad Action. The radical redesign to CPC Attack! was probably an attempt to appeal to Amstrad Action readers.
The magazine only ran for six issues between June and November 1992. This may have been because it did not have a cover-mounted tape (like Amstrad Action) and was devoted entirely to gaming leaving little room for other computer uses, but was probably also due to the waning popularity of the Amstrad 8-bit computer systems. The magazine did give away a number of free gifts with its early issues, although their relevance to readers was questionable. Issue 1 came with a pair of 3D glasses and a poster.
The magazine also drew criticism for running features that promoted the new wave of 16-bit consoles such as the Mega Drive and SNES. CPC Attack! also openly dismissed its rival Amstrad Action within its pages on several occasions, which many readers thought was unnecessary and immature.
External links
CPC Attack! archived at Internet Archive
Amstrad CPC
Amstrad magazines
Video game magazines published in the United Kingdom
Defunct computer magazines published in the United Kingdom
Magazines established in 1992
Magazines disestablished in 1992
Magazines published in London |
https://en.wikipedia.org/wiki/2Phat | 2Phat was an Irish television programme that was shown twice weekly on Network 2 from 1998 to 2000. It reunited Ray D'Arcy and Zig and Zag, who had previously appeared together on The Den. Following the demise of this show, all three would not appear together again until 14 November 2008, when D'Arcy hosted a Den Reunion Reunited special on his Today FM programme The Ray D'Arcy Show.
Format
The theme music for the opening of the TV show was a version of "On Her Majesty's Secret Service" by Propellerheads. Other music was provided by DJ Lee.
The show typically consisted of 15 audience members, and would involve a series of short sketches which led to a question. The person who buzzed in first got a chance to answer the question. At the end of the show, one person would be selected at random (from the people who answered a question correctly) to play the final round. The final prize was a motor scooter.
Recurring segments included several involving "Velcro Girl", a model (Tracy Sheridan) dressed in a velcro-covered catsuit. Items stuck to the suit provided hints to an artist's identity, which the audience would guess.
References
1990s game shows
1998 Irish television series debuts
2000 Irish television series endings
1990s Irish television series
Irish game shows
Irish quiz shows
Irish television shows featuring puppetry
RTÉ original programming |
https://en.wikipedia.org/wiki/Mordechai%20Ben-Ari | Mordechai (Moti) Ben-Ari () is a professor emeritus of computer science education at the Weizmann Institute of Science.
Ben-Ari has published numerous textbooks in computer science, developed software tools for teaching computer science, and written influential papers in computer science education. His primary focus has been on books and tools for learning theoretical concepts in computer science and mathematics, such as concurrency and mathematical logic.
In collaboration with the University of Joensuu (now part of the University of Eastern Finland) his group developed the Jeliot program animation system for teaching elementary computer science and programming.
He has collaborated with the École Polytechnique Fédérale de Lausanne on educational robotics using the Thymio robot.
Ben-Ari has published two books under the Springer Open Access program:
Elements of Robotics with Francesco Mondada.
Mathematical Surprises.
Ben-Ari received ACM SIGCSE Award for Outstanding Contributions for Computer Science Education in 2004, was named an ACM Distinguished Educator in 2009 and received the ACM Karl V. Karlstrom Award in 2019.
References
External links
Jeliot Program Animation System.
Repositories of pedagogical software and learning materials on GitHub.
Programming language researchers
Israeli computer scientists
Living people
Year of birth missing (living people)
Computer science educators |
https://en.wikipedia.org/wiki/Insurance%20Institute%20for%20Highway%20Safety | The Insurance Institute for Highway Safety and Highway Loss Data Institute (IIHS-HLDI) is an American nonprofit organization. It was established in 1959, and it is noted for its safety reviews of vehicles in various simulated traffic situations, including the effectiveness of a vehicle's structural integrity and safety systems during a collision, in addition to examining improvement on such elements.
History
The IIHS was founded in 1959 by three separate insurance groups as a supporting entity to other academic and research organizations involving highway safety. Russell Brown served as the inaugural president of the IIHS until 1968, when its board of governors changed the IIHS to an independent scientific organization. The following year, Physician William Haddon Jr. assumed the position of IIHS president after the change, and the IIHS began conducting crash tests starting with the low-speed bumper test.
In 1972, the Highway Loss Data Institute (HLDI) was founded as a supporting organization to the IIHS, as was the latter's original purpose for other organizations. The HLDI compiles and publishes insurance loss statistics due to incidents such as traffic collisions and consequential damages depending on the vehicle type.
The IIHS and HLDI are interchangeably referred to as one entity (IIHS-HLDI) or separate entities by the organization itself.
Frontal crash tests
The IIHS evaluates six individual categories, assigning each a "Good", "Acceptable", "Marginal", or "Poor" rating before determining the vehicle's overall frontal impact rating.
Moderate overlap frontal test
The moderate overlap test (formerly frontal offset test), introduced in January 1995, differs from that of the U.S. government's National Highway Traffic Safety Administration (NHTSA) New Car Assessment Program (NCAP) in that its tests are offset. The NHTSA standards require vehicles to provide no injuries to occupants after a head-on impact into a fixed barrier at , not at an angle. The IIHS test exposes 40% of the front of the vehicle to an impact with a deformable barrier at approximately . This offset test represents approximately 0.04% of all car crashes and "is the equivalent of running a vehicle into a parked car at .
As with the NHTSA's frontal impact test, vehicles across different weight categories may not be directly compared. This is because the heavier vehicle is generally considered to have an advantage if it encounters a lighter vehicle or is involved in a single-vehicle crash. The IIHS demonstrated this by crashing three midsize sedans with three smaller "Good" rated minicars. The three minicars were rated "Poor" in these special offset head-on car-to-car tests in 2009, while the midsize cars rated "Good" or "Acceptable".
In December 2022 the IIHS updated the moderate overlap test to include a second crash test dummy seated behind the driver. The IIHS said that the advanced seat belt protections found in the front passenger seats, including crash tension |
https://en.wikipedia.org/wiki/Radio%20One%20%28India%29 | 94.3 Radio One is a commercial radio network in India owned by HT Media. It has stations in Mumbai, Delhi, Bangalore, Ahmedabad, Chennai, Kolkata and Pune.
History
The newspaper Mid-Day founded the station as Radio Midday in Mumbai, which was re-launched in 2002 as Go 92.5, an English-language (later also Hindi) radio station, by operating on the 92.5 MHz brand before relaunching itself as Radio One with a new frequency in 2006.
The network is one of the few broadcasting in English (called "international format") in all of India's three biggest cities: Mumbai, Delhi and Bangalore. Targeting an upscale sophisticated audience. All stations broadcast at 94.3 MHz except the one in Ahmedabad which is at 95.0 MHz.
94.3 Radio One was ranked as India's most attractive radio brand 2017 (out of two radio brands listed), and at place 531 among all brands, in the annual publication India's Most Attractive Brands.
The network is owned by Next Radio Ltd., a subsidiary of Next MediaWorks. The former Managing Director and CEO of Next Radio was Vineet Singh Hukmani. He was also a shareholder director in the company.
Next MediaWorks, the owner of Radio One, was bought by HT Media in 2019, thus expanding Hindustan Times FM service with three brands. (Fever 104 FM , Radio Nasha and Radio One).
94.3 Radio One Delhi, Mumbai and Bangalore also stream live on ONLINE at http://1cast.in (World Wide Web URL) AND the company has also launched India's first online audio business channel - Business ONE, in January 2018 (the business channel operates 9am-4pm mon-fri).
94.3 Radio One celebrated its 11th anniversary in September 2018 by launching a pioneering 'audience tracker' , the first by any media company in India, that tracks the consumption habits of its upscale audience across brands and categories
94.3 Radio One is the first media brand in India to win the famed PHILIP KOTLER award for excellence in Marketing Differentiation
About
Radio One runs India's largest International format Radio Network in Delhi, Mumbai and Bangalore. Radio One appeals to intelligent and evolved listeners – which the brand calls "International Indians”. The international Indians live in India, geographically, but are at par on psychographics, with their global counterparts - in terms of awareness, sensibilities and motivations. They cherish uniqueness - unique taste in music is symbolic of the unique trail of their lives. They prefer international music - it maybe something they have grown up listening to or it simply sets them apart as listeners – in any case, it showcases their evolved taste. They are determinedly individualistic in the way they obtain and use information, make choices and create opinions. Their ears are open to music, talks, and shows, etc. which are peppered with a dose of uniqueness. It’s this strong sense of self and individual identity which makes them want to be distinctive and discerning in their lifestyle choices, which also manifests in their choice of cont |
https://en.wikipedia.org/wiki/Red%20FM%20%28India%29 | Red FM (Often stylized as Superhits 93.5 RED FM) is an Indian FM radio network headquartered in Chennai and owned by Chennai-based Sun Group. The network broadcasts content in various Indian languages including Hindi, Urdu, Bengali, Telugu, Kannada and Malayalam. On 14 August 2009, Suryan FM 93.5 was rebranded to RED FM in 64 cities across India. Thus, Sun Group's FM service came to be known with brand name RED FM across India except Tamil Nadu.
Radio jockeys and their shows and Achievements
Locations served
- It serves as Suryan FM in 10 Cities across Tamilnadu.
- It serves as Magic FM in Hyderabad and Mumbai (sister channels to Red FM).
- It serves as Red FM in more than 57 cities across the country listed below.
Agartala, TR (broadcast on 95.0 MHz)
Ahmedabad, GJ
Aizawl, MZ
Amritsar, PB
Asansol, WB
Ayodhya, UP
Aurangabad, MH
Bengaluru, KA
Bhopal, MP
Bhubaneswar-Cuttack, OD
Chandigarh Tricity
Delhi NCR
Dehradun, UK
Dhule, MH
Gangtok, SK
Gulbarga, KA
Guwahati, AS
Hubli-Dharwad, KA
Hyderabad, TS
Indore, MP
Jabalpur, MP
Jaipur, RJ
Jammu, JK (broadcast on 91.9 MHz)
Jamshedpur, JH
Jhansi, UP (broadcast on 106.4 MHz)
Jodhpur, RJ
Kannur, KL
Kanpur, UP
Kochi, KL
Kolkata, WB
Kozhikode, KL
Leh, LA
Lucknow, UP
Mangalore, KA
Mumbai, MH
Muzaffarpur, BR
Mysuru, KA
Nagpur, MH
Nanded, MH
Nashik, MH
Nellore, AP
Patna, BR
Prayagraj, UP
Pune, MH
Rajahmundry, AP
Rajkot, GJ
Shillong, ML
Siliguri, WB
Srinagar, JK
Surat, GJ (broadcast on 95.0 MHz)
Thrissur, KL (broadcast on 95.0 Mhz)
Tirupati, AP
Thiruvananthapuram, KL
Udaipur, RJ
Vadodara, GJ
Varanasi, UP
Vijayawada, AP
Visakhapatnam, AP
Warangal, TS
References
Radio stations in Kolkata
External links
Red FM Delhi
Red FM Mumbai
Red FM Bengaluru
Suryan FM 93.5
Radio stations in Kerala
Telugu-language radio stations
Radio stations in Hyderabad
Radio stations in Indore
Radio stations in Bhopal
Radio stations in Ujjain
Radio stations established in 2002
2002 establishments in Tamil Nadu
Sun Group
Radio stations in Gujarat
Radio stations in Patna
Radio stations in Muzaffarpur
Radio stations in Assam
Radio stations in Vijayawada |
https://en.wikipedia.org/wiki/Radio%20City%20%28Indian%20radio%20station%29 | Radio City is India's first private FM radio station and was started on 3 July 2001 by Rupert Murdoch's Star TV Network. It broadcasts on 91.1 (earlier 91.0 in most cities) megahertz from Bengaluru (started first in 2001), Mumbai (where it was started in 2003), Lucknow and New Delhi (since 2003). It plays Hindi, English and regional songs. It was launched in Hyderabad in March 2006, in Chennai on 7 July 2006 and in Visakhapatnam October 2007. Radio City recently forayed into New Media in May 2008 with the launch of a music portal - PlanetRadiocity.com now radiocity.in that offers entertainment related news, videos, songs, podcasts and other music-related features. The Radio station currently plays a mix of music from various languages. In 2010, Radio City has launched its first internet radio station Radio City Fun Ka Antenna and now they have 18 online radio stations. Radio City & Mid-day Conquer Season 4 of the Hitlist OTT Awards with 67.5mn votes
Frequencies
Radio City operates in the following cities:
Agra, UP (broadcast on 91.9 MHz)
Ahmedabad, GJ
Ahmednagar, MH
Ajmer, RJ (broadcast on 104.8 MHz)
Akola, MH
Bangalore, KA
Bareilly, UP (broadcast on 91.9 MHz)
Bikaner, RJ
Chennai, TN
Coimbatore, TN
Delhi
Gorakhpur, UP (broadcast on 91.9 MHz)
Hisar, HR (broadcast on 91.9 MHz)
Hyderabad, TS
Jaipur, RJ
Jalandhar, PB (broadcast on 91.9 MHz)
Jalgaon, MH
Jamshedpur, JH
Karnal, HR (broadcast on 91.9 MHz)
Kanpur, UP (broadcast on 104.8 MHz)
Kota, RJ
Kolhapur, MH (broadcast on 95 MHz)
Lucknow, UP
Madurai, TN (broadcast on 91.9 MHz)
Mumbai, MH
Nagpur, MH
Nanded, MH
Nashik, MH (broadcast on 95 MHz)
Patna, BR
Patiala, PB
Pune, MH
Ranchi, JH (broadcast on 91.9 MHz)
Sangli, MH
Solapur, MH
Surat, GJ
Udaipur, RJ (broadcast on 91.9 MHz)
Varanasi, UP (broadcast on 91.9 MHz)
Vadodara, GJ
Vijayawada, AP
Visakhapatnam, AP
Unless specified otherwise, all stations broadcast on 91.1 MHz.
Radio City Super Singer
Radio City Super Singer is a singing talent hunt by Radio City to discover the singing talent among its listeners. It was launched in 2011 in 14 cities - Mumbai, Bengaluru, Chennai, Delhi, Hyderabad, Jaipur, Lucknow, Nagpur, Surat, Vadodara, Ahmedabad, Visakhapatnam, Coimbatore and Pune.
Radio City School of Broadcasting
Radio City School of Broadcasting (RCSB) is an autonomous educational unit, instituted by Music Broadcast Limited (MBL) which owns and operates Radio City 91.1FM. It was launched on 3 February 2009. They offer a 6-month Certificate Course in Radio Jockeying and Radio Production.
Recognitions
Acquisition by Jagran Group
On 16 December 2014, media group Jagran Prakashan Limited (JPL) announced acquisition of Music Broadcast Ltd, which operates the Radio City FM stations from Indian Private Equity firm True North (Formerly known as India Value Fund Advisor). Music Broadcast Ltd publicly listed its shares on 17 March 2017. The shares listed at a 26% premium above its issue price of Rs. 333/-.
Radio City Freedom Awards
Radio City Freedom A |
https://en.wikipedia.org/wiki/Virtual%20private%20database | A virtual private database or VPD masks data in a larger database so that only a subset of the data appears to exist, without actually segregating data into different tables, schemas or databases. A typical application is constraining sites, departments, individuals, etc. to operate only on their own records and at the same time allowing more privileged users and operations (e.g. reports, data warehousing, etc.) to access on the whole table.
The term is typical of the Oracle DBMS, where the implementation is very general: tables can be associated to SQL functions, which return a predicate as a SQL expression. Whenever a query is executed, the relevant predicates for the involved tables are transparently collected and used to filter rows. SELECT, INSERT, UPDATE and DELETE can have different rules.
External links
Using Virtual Private Database to Implement Application Security Policies
http://www.oracle-base.com/articles/8i/VirtualPrivateDatabases.php
Data security
Types of databases |
https://en.wikipedia.org/wiki/Z1%20%28computer%29 | The Z1 was a motor-driven mechanical computer designed by Konrad Zuse from 1936 to 1937, which he built in his parents' home from 1936 to 1938. It was a binary electrically driven mechanical calculator with limited programmability, reading instructions from punched celluloid film.
The “Z1” was the first freely programmable computer in the world that used Boolean logic and binary floating-point numbers, however, it was unreliable in operation. It was completed in 1938 and financed completely by private funds. This computer was destroyed in the bombardment of Berlin in December 1943, during World War II, together with all construction plans.
The Z1 was the first in a series of computers that Zuse designed. Its original name was "V1" for Versuchsmodell 1 (meaning Experimental Model 1). After WW2, it was renamed "Z1" to differentiate it from the flying bombs designed by Robert Lusser. The Z2 and Z3 were follow-ups based on many of the same ideas as the Z1.
Design
The Z1 contained almost all the parts of a modern computer, i.e. control unit, memory, micro sequences, floating-point logic, and input-output devices. The Z1 was freely programmable via punched tape and a punched tape reader. There was a clear separation between the punched tape reader, the control unit for supervising the whole machine and the execution of the instructions, the arithmetic unit, and the input and output devices.
The input tape unit read perforations in 35-millimeter film.
The Z1 was a 22-bit floating-point value adder and subtractor, with some control logic to make it capable of more complex operations such as multiplication (by repeated additions) and division (by repeated subtractions). The Z1's instruction set had eight instructions and it took between one and twenty-one cycles per instruction.
The Z1 had a 16-word floating point memory, where each word of memory could be read from – and written to – the control unit. The mechanical memory units were unique in their design and were patented by Konrad Zuse in 1936. The machine was only capable of executing instructions while reading from the punched tape reader, so the program itself was not loaded in its entirety into internal memory in advance.
The input and output were in decimal numbers, with a decimal exponent and the units had special machinery for converting these to and from binary numbers. The input and output instructions would be read or written as floating-point numbers. The program tape was a 35 mm film with the instructions encoded in punched holes.
Construction
"Z1 was a machine weighing about 1 tonne in weight, which consisted of some 20,000 parts. It was a programmable computer, based on binary floating-point numbers and a binary switching system. It consisted completely of thin metal sheets, which Zuse and his friends produced using a jigsaw." "The [data] input device was a keyboard...The Z1's programs (Zuse called them Rechenpläne, computing plans) were stored on punch tapes using an 8-bit co |
https://en.wikipedia.org/wiki/Ian%20Inaba | Ian Inaba (born 1971) is an American film and music video director, producer, and journalist for the Guerrilla News Network.
Music videos
Inaba directed the music videos for "Mosh" by Eminem and "Time and Time Again" by Chronic Future. He also directed the original music video for the Nine Inch Nails song "The Hand that Feeds." It was never released, however, because the band found the subject matter, which depicted Religious Right extremism, including threats to abortion clinic patients and abuses by religious authorities, too controversial for their tastes. The job then went to Rob Sheridan.
Books and documentaries
Inaba contributed to GNN's book about black box voting, True Lies. He has recently completed a feature-length documentary film about voting irregularities in the 2000 and 2004 U.S. elections entitled American Blackout. The film, released August 2006, received a Special Jury Prize at the 2006 Sundance Film Festival. He was also one of the creators of Video the Vote in 2006.
References
External links
Ian Inaba's GNN Profile
Interview with Ian Inaba
Guerrilla News Network
American male journalists
American music video directors
1971 births
Living people
21st-century American journalists |
https://en.wikipedia.org/wiki/Al%20Fasoldt | Al Fasoldt is an American columnist for the Syracuse Post-Standard. He wrote the "Technofile" column, reviewing and commenting on computer technology. His column has a question/answer format where his alter ego, "Doctor Gizmo", addresses computers, digital technology, and photography. For several years Fasoldt, along with Gene Wolf, had a Sunday call-in radio show, "Random Access", on WSYR am radio in Syracuse, New York and Central New York. Fasoldt and Wolf answered questions on computers, operating systems, and other technological subjects.
Fasoldt has been a reporter, writer and editor since 1963, when he was a Saigon Bureau Chief for Stars and Stripes during the Vietnam War. His work has appeared in Fanfare Magazine, Esquire, and many online publications.
References
External links
Technofile by Al Fasoldt
American male journalists
Living people
Writers from Syracuse, New York
Journalists from New York (state)
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Michelle%20Kwan%20Figure%20Skating | Michelle Kwan Figure Skating is a computer game released in 1999, starring American figure skater Michelle Kwan.
The player can create the skater, dress her, choose music and create a routine to it, and then compete in different skating competitions.
While it does not follow the strict rules of international skating, there are logical reasons behind creating a program.
External links
Game's Description
Download demo-1 (not working)
Download demo - 2 (not working)
Download demo - 3
Download demo - 4
1999 video games
Figure skating video games
Video games developed in the United States
Video games featuring female protagonists
Windows games
Windows-only games
Kwan
Kwan
Video games based on real people |
https://en.wikipedia.org/wiki/Nick%20Didkovsky | Nick Didkovsky (born 22 November 1958) is a composer, guitarist, computer music programmer, and leader of the band Doctor Nerve. He is a former student of Christian Wolff, Pauline Oliveros and Gerald Shapiro.
Career
Didkovsky formed Doctor Nerve in 1984. He received a Masters in Computer Music from New York University in 1987 and went on to develop a Java music API called JMSL (Java Music Specification Language). JMSL is a toolbox for algorithmic composition and performance. JMSL includes JScore, an extensible staff notation editor. JMSL can output music using either JavaSound or JSyn. He has presented papers on his work at several conferences.
Ensemble activities include founding the blackened grindcore band Vomit Fist in 2013. He was a composing member of the Fred Frith Guitar Quartet for the ten years of the band's tenure, and has also played in John Zorn's band. His Punos Music record label is a harbor for his more extreme musical projects such as "split", a guitar collaboration with Dylan DiLella of the technical death metal band Pyrrhon.
His debut solo album was released in 1997 and featured contributions from Frith. His second album, Body Parts, came out of a collaboration with Guigou Chenevier.
Didkovsky has composed for or performed on a number of CDs including:
1987, Doctor Nerve Armed Observation, Label: Cuneiform, produced by Fred Frith
1988, Rascal Reporters Happy Accidents
1995, Doctor Nerve SKIN, Label: Cuneiform
1997
Every Screaming Ear, Label: Cuneiform (January 21, 1997)
Ayaya Moses, with the Fred Frith Guitar Quartet
Binky Boy
1999, Upbeat, with the Fred Frith Guitar Quartet
2000, Ereia, with Doctor Nerve and the Sirius String Quartet
2003, Bone - uses wrist grab, with Hugh Hopper and John Roulat
2015, Vomit Fist Forgive but Avenge
2017 Alice Cooper Paranormal
2019, Vomit Fist Omnicide
Didkovsky's music has also been arranged by the experimental music group Electric Kompany. He is a co-owner of the "$100 Guitar", a guitar which was circulated amongst many musicians (including Alex Skolnick, Fred Frith, and Nels Cline) for the recording of a concept album about the guitar.
Solo discography
Now I Do This (1982), Punos Music
Binky Boy (1997), Punos
Body Parts (2000), Vand'Oeuvre
The Bright Lights The Big Time (2005), FMR
Tube Mouth Bow String (2006), Pogus
The $100 Guitar Project (2013), Bridge
Phantom Words (2017), Punos
Notes
Sources
Couture, François "Body Parts Review", Allmusic. Retrieved August 16, 2014
Dickenson, J. Andrew: "Electric Counterpoint", Urban Guitar, July 2006
Dorsch, Jim "Nick Didkovsky Biography", Allmusic. Retrieved August 16, 2014
Jurek, Thom "Binky Boy Review", Allmusic. Retrieved August 16, 2014
Ross Feller, Ice Cream Time: The Raunchy and the Rigorous
Rose, Joe, A $100 Guitar Makes A 30,000-Mile Odyssey, , National Public Radio, 4 December 2012
External links
Doctor Nerve Home Page
JMSL Home Page
Interview with New Sounds
Hundred-dollar Guitar Project
21st-century classical |
https://en.wikipedia.org/wiki/SNDCP | SNDCP, Sub Network Dependent Convergence Protocol, is part of layer 3 of a GPRS protocol specification. SNDCP interfaces to the Internet Protocol at the top, and to the GPRS-specific Logical Link Control (LLC) protocol at the bottom.
In the spirit of the GPRS specifications, there can be many implementations of SNDCP, supporting protocols such as X.25. However, in reality, IP (Internet Protocol) is such an overwhelming standard that X.25 has become irrelevant for modern applications, so all implementations of SNDCP for GPRS only support IP as the payload type.
The SNDCP layer is relevant to the protocol stack of the mobile station and that of the SGSN, and works when a PDP Context is established and the quality of service has been negotiated.
Services offered by SNDCP
The SNDCP layer primarily converts, encapsulates and segments external network formats (like Internet Protocol Datagrams) into sub-network formats (called SNPDUs). It also performs compression of NPDUs to make for efficient Data transmission. It performs the multiple PDP Context PDU transfers and it also ensures that NPDUs from each PDP Context are transmitted to the LLC layer in sufficient time to maintain the QoS. SNDCP provides services to the higher layers which may include connectionless and connection-oriented mode, compression, multiplexing and segmentation.
References
3GPP TS 44.065 "Mobile Station (MS) - Serving GPRS Support Node (SGSN); Subnetwork Dependent Convergence Protocol (SNDCP)"
Network protocols |
https://en.wikipedia.org/wiki/Applesoft | Applesoft is a name used by Apple Inc. for:
Applesoft BASIC, a programming language interpreter built into the Apple II computers
the division responsible for developing the classic Mac OS from 1993 until about 1997 |
https://en.wikipedia.org/wiki/Inversion%20of%20control | In software engineering, inversion of control (IoC) is a design pattern in which custom-written portions of a computer program receive the flow of control from a generic framework. The term "inversion" is historical: a software architecture with this design "inverts" control as compared to procedural programming. In procedural programming, a program's custom code calls reusable libraries to take care of generic tasks, but with inversion of control, it is the framework that calls the custom code.
Inversion of control has been widely used by application development frameworks since the rise of GUI environments and continues to be used both in GUI environments and in web server application frameworks. Inversion of control makes the framework extensible by the methods defined by the application programmer.
Event-driven programming is often implemented using IoC so that the custom code need only be concerned with the handling of events, while the event loop and dispatch of events/messages is handled by the framework or the runtime environment. In web server application frameworks, dispatch is usually called routing, and handlers may be called endpoints.
The phrase "inversion of control" has separately also come to be used in the community of Java programmers to refer specifically to the patterns of injecting objects' dependencies that occur with "IoC containers" in Java frameworks such as the Spring framework. In this different sense, "inversion of control" refers to granting the framework control over the implementations of dependencies that are used by application objects rather than to the original meaning of granting the framework control flow (control over the time of execution of application code e.g. callbacks).
Overview
As an example, with traditional programming, the main function of an application might make function calls into a menu library to display a list of available commands and query the user to select one. The library thus would return the chosen option as the value of the function call, and the main function uses this value to execute the associated command. This style was common in text based interfaces. For example, an email client may show a screen with commands to load new mail, answer the current mail, create new mail, etc., and the program execution would block until the user presses a key to select a command.
With inversion of control, on the other hand, the program would be written using a software framework that knows common behavioral and graphical elements, such as windowing systems, menus, controlling the mouse, and so on. The custom code "fills in the blanks" for the framework, such as supplying a table of menu items and registering a code subroutine for each item, but it is the framework that monitors the user's actions and invokes the subroutine when a menu item is selected. In the mail client example, the framework could follow both the keyboard and mouse inputs and call the command invoked by the user by eit |
https://en.wikipedia.org/wiki/Canale%205 | Canale 5 () is an Italian free-to-air television channel of Mediaset, owned by MFE - MediaForEurope. It was the first private television network to have a national coverage in Italy in 1980.
On 4 December 2012, Mediaset launched Canale 5 HD, a simulcast of Canale 5 in high-definition. The channel is aimed at a primarily adult audience, offering, mainly, entertainment, movies and TV series. Since January 2013, Canale 5 has been directed by Giancarlo Scheri.
History
1970s
In 1974 in Milano 2, a satellite city built by Silvio Berlusconi, Giacomo Properzj and Alceo Moretti, the private cable television station Telemilanocavo was founded, whose transmissions began on 24 September. The channel broadcast via cable thanks to the sentence of the Constitutional Court in July, which liberalizes this type of television broadcasting. Approximately 5,000 households are connected to the cable system, which corresponded to 20,000 viewers.
Then, following the liberalization of terrestrial local broadcasting, many other television stations were born and competition, causing a drop in revenues, led the owners to sell the television in 1976 for the symbolic price of one lira to a company of the Berlusconi group, based in a basement of an apartment building near the Palazzo dei Cigni, also condoning the unpaid rent.
With the transition from cable to terreatrial, Telemilanocavo moved its studios to the Palazzo dei Cigni and became Telemilano 58, from the name of the UHF channel frequency used and taken over by the local broadcaster TVI Television International of Milan, with a system in Hotel Michelangelo. At the same time technical investments were made with the alliance of an entrepreneur specialized in the production of equipment for the reception of television signals, Adriano Galliani, who assumed an important role in the production of the broadcaster's television equipment. Success came in the 1979-1980 season with several broadcasts conducted, among others, by Mike Bongiorno, Claudio Lippi, Claudio Cecchetto and I Gatti di Vicolo Miracoli.
On February 23, 1979, the trademark "Canale 5" was registered in Milan. A few months later, on 12 November, the trademark "Canale 5 Music Srl" was also registered in the same city. The name was chosen by Berlusconi with Adriano Galliani "for a matter of euphony" but also because a local name like that of Telemilano was starting to feel tight for a broadcaster that aspired to become a major national television network. In this period Berlusconi buys several local private broadcasters scattered throughout Italy: the idea of the "pizzone" (the shipment of pre-recorded videotapes from one broadcaster to another) emerges after Berlusconi bought Tele Torino International from FIAT.
1980s
On January 10, 1980 Silvio Berlusconi and Mike Bongiorno held a press conference in the Telemilano studios. With a view to create a national network, Berlusconi agrees with about 50 private broadcasters (even those not owned by him) scattered |
https://en.wikipedia.org/wiki/Rete%204 | Rete 4 (in English Network 4) is an Italian free-to-air television channel operated by Mediaset Italia and owned by MFE - MediaForEurope. Presently the director is Sebastiano Lombardi.
Programs
TV Programmes (currently)
Rete 4's strength is information: a lot of programs are of this genre.
Quarta Repubblica (Political and chronical news), on Monday's prime-time with Nicola Porro.
Fuori dal coro (Political and chronical news), on Tuesday's prime-time with Mario Giordano.
Zona bianca (Political and chronical news), on Wednesday's prime-time Giuseppe Brindisi.
Dritto e rovescio (Political and chronical news), on Thursday's prime-time with Paolo Del Debbio.
Quarto grado (Crime news), on Friday's prime-time with Gianluigi Nuzzi and Alessandra Viero.
Stasera Italia (Political news). Every day at 8.30 PM, with Barbara Palombelli (Monday-Friday) and Veronica Gentili (Weekends and summer)
Lo sportello di Forum (Culture and judicial), enlivened by Barbara Palombelli, from Monday to Friday at 14.00 (Saturday there is a replica)
Dalla parte degli animali, Monday at 3.30 PM, with Michela Vittoria Brambilla. Are told real stories about adopted animals. In every episode there are presented animals in search of family.
TG4 (newscast)
TgCom24 (short one-minute news during the commercial break in a movie)
TV series
24 (first four seasons - afterward, the series was relocated to Italia 1)
Agatha Christie's Poirot
A Nero Wolfe Mystery
The A-Team
Bones
Casa Vianello
Columbo
Distretto di Polizia
Degrassi: The Next Generation (it: Degrassi: La Generazione Seguente)
Detective Monk
Diagnosis: Murder
Downton Abbey
Early Edition
Hunter
Kojak
Judging Amy
Magnum, P.I.
Miami Vice
Murder, she wrote (Previously aired on Rai 1 and Rai 2)
Nash Bridges
Notruf Hafenkante
Quincy, M.E.
R.I.S. – Delitti imperfetti
Renegade
Robotech
Siska
The Mentalist
The West Wing
T. J. Hooker
Walker, Texas Ranger
Culture
Appuntamento con la Storia (ENG: "Date with History")
La macchina del tempo (ENG: "The Time Machine")
La settima porta (ENG: "The seventh door")
Sai xChè? (ENG: "Do you know why?")
Solaris
Soap operas
Guiding Light (it: "Sentieri")
Storm of Love (it: "Tempesta D'Amore")
The Young and the Restless (it: "Febbre d'Amore")
TelenovelasCuore Selvaggio ("Corazón salvaje")
El secreto de Puente Viejo (it: "Il Segreto", replicas)
Acacias 38 (it: "Una Vita")Terra Nostra''
The programming is completed with various genres of films.
Logos
Audience
Share 24h* Rete 4
Below, average monthly listening data in the total day received by the issuer.
References
External links
Official site
COURT OF JUSTICE OF THE EUROPEAN COMMUNITIES
Mediaset television channels
Television channels and stations established in 1982
Italian-language television stations |
https://en.wikipedia.org/wiki/Superstar%20Chef%20Challenge | The Superstar Chef Challenge is a reality/competition special produced for the Food Network Canada. Filmed at the Compass Group Canada Culinary Arts Demonstration Theatre and Kitchen Laboratory in Humber College's North Campus, it served as a pilot for a potential series.
Description
Hosted by Kevin Brauch (The Thirsty Traveler), the chefs were selected from a participants who sent in a five-minute tape of themselves cooking their signature dish. The winner for the first season was Dana McIntyre and as part of the prize she got a co-starring role in the Food Network Canada show Just One Bite. The show's supervising producer was Jenna Keane. The special was filmed during Humber College's March 2005 Reading Week.
See also
MasterChef Canada, series of cooking elimination competition TV shows
External links
Food Network Superstar Chef Challenge
Humber College
Food Network original programming
2005 Canadian television series debuts
2000s Canadian reality television series |
https://en.wikipedia.org/wiki/Keith%20Uncapher | Keith Uncapher (1922–2002) was an American computer engineer and manager.
At the RAND Corporation Uncapher worked on several pioneering computer projects. He founded the Information Sciences Institute (ISI) at the University of Southern California, Viterbi School of Engineering. There, he assembled teams of engineers who helped to grow the early Internet.
Biography
Keith Uncapher was born in Denver, Colorado April 1, 1922. He attended Glendale Community College and graduated from California Polytechnic State University in San Luis Obispo, California.
Computer pioneer
Uncapher joined RAND Corporation in Santa Monica in 1950.
As director of the computer science division at RAND, Uncapher pioneered work on the technology of packet switching, in which digital messages are broken into small packets, sent over a network and reassembled at their destination. Due to this methods inherent reliability and robustness it attracted a great deal of interest at the Department of Defense Advanced Projects Research Agency. He helped officials see the technology's vast potential for facilitating a revolution in computer communications. Uncapher also designed the first time-sharing computer system for mathematicians. He also led the RAND Tablet Project, a computer system for recognizing hand printed characters using a tablet and stylus. Packet switching research and development led first to the military's ARPANET, and then to the Internet itself.
Institute founder
Uncapher persuaded both the US government and USC Engineering Dean, Zohrab Kaprielian, to form a university-based research agency and ISI opened the offices it still occupies in Marina del Rey, California. With the Vietnam war winding down it was also an ideal time for ISI to help rebuild the gap between the Department of Defense and academia. During the 1980s, along with his colleagues, Uncapher helped to create the MOSIS system that made VLSI design more practical and cost effective for researchers, and as a result, architectural innovation more plentiful.
After co-founding the Corporation for National Research Initiatives in 1986 with Robert E. Kahn, Uncapher worked to advance new areas of information technology. His main focus was on fostering the development of micro-electro-mechanical systems (MEMS) and in particular, MEMS technology and infrastructure.
Uncapher was elected a member of the National Academy of Engineering in 1998 for contributions to information technology at the national level. He also received the "Decoration for Exceptional Civilian Service" from the Department of the United States Air Force as well as the Centennial Medal of the IEEE Computer Society . His service included participating on the United States Air Force Scientific Advisory Board, Defense Information Systems Agency's Scientific Advisory Group, and the Institute for Defense Analyses Computer Science Advisory Group.
He was an active participant in the National Research Council, Board of Telecommunications. |
https://en.wikipedia.org/wiki/Artificial%20immune%20system | In artificial intelligence, artificial immune systems (AIS) are a class of computationally intelligent, rule-based machine learning systems inspired by the principles and processes of the vertebrate immune system. The algorithms are typically modeled after the immune system's characteristics of learning and memory for use in problem-solving.
Definition
The field of artificial immune systems (AIS) is concerned with abstracting the structure and function of the immune system to computational systems, and investigating the application of these systems towards solving computational problems from mathematics, engineering, and information technology. AIS is a sub-field of biologically inspired computing, and natural computation, with interests in machine learning and belonging to the broader field of artificial intelligence.
AIS is distinct from computational immunology and theoretical biology that are concerned with simulating immunology using computational and mathematical models towards better understanding the immune system, although such models initiated the field of AIS and continue to provide a fertile ground for inspiration. Finally, the field of AIS is not concerned with the investigation of the immune system as a substrate for computation, unlike other fields such as DNA computing.
History
AIS emerged in the mid-1980s with articles authored by Farmer, Packard and Perelson (1986) and Bersini and Varela (1990) on immune networks. However, it was only in the mid-1990s that AIS became a field in its own right. Forrest et al. (on negative selection) and Kephart et al. published their first papers on AIS in 1994, and Dasgupta conducted extensive studies on Negative Selection Algorithms. Hunt and Cooke started the works on Immune Network models in 1995; Timmis and Neal continued this work and made some improvements. De Castro & Von Zuben's and Nicosia & Cutello's work (on clonal selection) became notable in 2002. The first book on Artificial Immune Systems was edited by Dasgupta in 1999.
Currently, new ideas along AIS lines, such as danger theory and algorithms inspired by the innate immune system, are also being explored. Although some believe that these new ideas do not yet offer any truly 'new' abstract, over and above existing AIS algorithms. This, however, is hotly debated, and the debate provides one of the main driving forces for AIS development at the moment. Other recent developments involve the exploration of degeneracy in AIS models, which is motivated by its hypothesized role in open ended learning and evolution.
Originally AIS set out to find efficient abstractions of processes found in the immune system but, more recently, it is becoming interested in modelling the biological processes and in applying immune algorithms to bioinformatics problems.
In 2008, Dasgupta and Nino published a textbook on immunological computation which presents a compendium of up-to-date work related to immunity-based techniques and describes a wide va |
https://en.wikipedia.org/wiki/List%20of%20TRS-80%20clones | The following is a list of clones of Tandy's TRS-80 model I and III home computers:
Aster CT-80 by Aster b.v.
DGT-100 and DGT-1000 by Digitus
D8000, D8001 and D8002 by Dismac
Komtek I by Komtek Technologies
Le Guépard by HBN Electronic Sa
LNW-80 by LNW Research
Max-80 by Lobo Systems
Meritum by Mera-Elzab
MTI Mod III Plus by Microcomputer Technology Inc.
CP-300 and CP-500 by Prológica
Pentasonic PROF 80
R1001 by Radionic
Sysdata Jr by Sysdata Eletrônica Ltda
Video Genie (also known as the "Dick Smith System-80" or the "PMC-80") by EACA
Misedo 85 by Montex
HT-1080Z School Computer (Híradástechnikai Szövetkezet, Hungary)
SpotLight I (스포트라이트I) by Hanguk Sangyeok (한국상역)
Stolový Počítač SP830 by ZVT
References
TRS-80 clones
TRS-80
TRS-80 clones |
https://en.wikipedia.org/wiki/Apple%20II%20clones | The Apple II home computer series was frequently cloned, both in the United States and abroad, in a similar way to the IBM PC. According to some sources (see below), more than 190 different models of Apple II clones were manufactured. Most could not be legally imported into the United States. Apple sued and sought criminal charges against clone makers in more than a dozen countries.
Background
Without explicitly stating that they were Apple II clones, many had fruit-related names. An example was Pineapple who Apple successfully forced to change its name to "Pinecom".
Agat was a series of Apple II compatible computers produced in the Soviet Union between 1984 and 1993, widely used in schools in the 80's. The first mass-produced models, the Agat 4 and Agat 7, had different memory layouts and video modes from Apple II, which made them only partially compatible with Apple II software.
Agats were not direct clones of Apple II, but rather uniquely designed computers based on 6502 CPU and emulated Apple II architecture. That helped developers to port Apple II software titles to Agat. A later model, the Agat 9, had an Apple II compatibility mode out of the box. Soviet engineers and enthusiasts developed thousands of software titles for Agat, including system software, business applications and educational software.
Bulgarian Pravetz series 8 was an Apple II clone with Cyrillic support.
Basis, a German company, created the Basis 108, a clone for the Apple II that included both a 6502 processor and the Zilog Z80, allowing it to run the CP/M operating system as well as most Apple II software. This machine was unusual in that it was housed in a heavy cast aluminum chassis. The Basis 108 was equipped with built-in Centronics (parallel) and RS232c (serial) ports, as well as the standard six Apple II compatible slots. Unlike the Apple II it came with a detached full-stroke keyboard (AZERTY/QWERTY) of 100 keys plus 15 functions keys and separate numeric and editing keypads.
Another European Apple II clone was the Pearcom Pear II, which was larger than the original as it sported not eight but fourteen expansion slots. It also had a numerical keypad. Pearcom initially used a pear shaped rainbow logo, but stopped after Apple threatened to take legal action.
A Bosnian company named IRIS Computers (subsidiary of an electric company in Bosnia and Herzegovina and Yugoslavia’s ENERGOINVEST) produced Apple II clones starting in the early 1980s. Their official brand name was IRIS 8. They were very expensive and hard to obtain and were produced primarily for use in early computerized digital telephone systems and for education. Their use in offices of state companies, R&D labs and in the Yugoslav army was also reported. IRIS 8 machines looked like early IBM PCs, with a separate central unit accompanied by a cooling system and two 5.25-inch disks, monitor, and keyboard. Compatibility with the original Apple II was complete. Elite high schools in Yugoslavia and especi |
https://en.wikipedia.org/wiki/Modelling%20of%20General%20Systems | MGS (a General Model of Simulation) is a domain-specific language used for specification and simulation of dynamical systems with dynamical structure, developed at IBISC (Computer Science, Integrative Biology and Complex Systems) at Université d'Évry Val-d'Essonne (University of Évry). MGS is particularly aimed at modelling biological systems.
The MGS computational model is a generalisation of cellular automata, Lindenmayer systems, Paun systems and other computational formalisms inspired by chemistry and biology. It manipulates collections - sets of positions, filled with some values, in a lattice with a user-defined topology.
External links
Project home page
Simulation programming languages |
https://en.wikipedia.org/wiki/Intergalactic%20Computer%20Network | Intergalactic Computer Network or Galactic Network (IGCN) was a computer networking concept similar to today's Internet.
J.C.R. Licklider, the first director of the Information Processing Techniques Office (IPTO) at The Pentagon's ARPA, used the term in the early 1960s to refer to a networking system he "imagined as an electronic commons open to all, ‘the main and essential medium of informational interaction for governments, institutions, corporations, and individuals.'" An office memorandum he sent to his colleagues in 1963 was addressed to "Members and Affiliates of the Intergalactic Computer Network". As head of IPTO from 1962 to 1964, "Licklider initiated three of the most important developments in information technology: the creation of computer science departments at several major universities, time-sharing, and networking."
Licklider first learned about time-sharing from Christopher Strachey at the inaugural UNESCO Information Processing Conference in Paris in 1959.
By the late 1960s, his promotion of the concept had inspired a primitive version of his vision called ARPANET. ARPANET expanded into a network of networks in the 1970s that became the Internet.
See also
History of the Internet
References
Further reading
Wide area networks
Texts related to the history of the Internet |
https://en.wikipedia.org/wiki/Syslog | In computing, syslog is a standard for message logging. It allows separation of the software that generates messages, the system that stores them, and the software that reports and analyzes them. Each message is labeled with a facility code, indicating the type of system generating the message, and is assigned a severity level.
Computer system designers may use syslog for system management and security auditing as well as general informational, analysis, and debugging messages. A wide variety of devices, such as printers, routers, and message receivers across many platforms use the syslog standard. This permits the consolidation of logging data from different types of systems in a central repository. Implementations of syslog exist for many operating systems.
When operating over a network, syslog uses a client-server architecture where a syslog server listens for and logs messages coming from clients.
History
Syslog was developed in the 1980s by Eric Allman as part of the Sendmail project. It was readily adopted by other applications and has since become the standard logging solution on Unix-like systems. A variety of implementations also exist on other operating systems and it is commonly found in network devices, such as routers.
Syslog originally functioned as a de facto standard, without any authoritative published specification, and many implementations existed, some of which were incompatible. The Internet Engineering Task Force documented the status quo in RFC 3164 in August of 2001. It was standardized by RFC 5424 in March of 2009.
Various companies have attempted to claim patents for specific aspects of syslog implementations. This has had little effect on the use and standardization of the protocol.
Message components
The information provided by the originator of a syslog message includes the facility code and the severity level. The syslog software adds information to the information header before passing the entry to the syslog receiver. Such components include an originator process ID, a timestamp, and the hostname or IP address of the device.
Facility
A facility code is used to specify the type of system that is logging the message. Messages with different facilities may be handled differently. The list of facilities available is described by the standard:
The mapping between facility code and keyword is not uniform in different operating systems and syslog implementations.
Severity level
The list of severities is also described by the standard:
The meaning of severity levels other than Emergency and Debug are relative to the application. For example, if the purpose of the system is to process transactions to update customer account balance information, an error in the final step should be assigned Alert level. However, an error occurring in an attempt to display the ZIP code of the customer may be assigned Error or even Warning level.
The server process which handles display of messages usually includes all lower (more |
https://en.wikipedia.org/wiki/Statistical%20genetics | Statistical genetics is a scientific field concerned with the development and application of statistical methods for drawing inferences from genetic data. The term is most commonly used in the context of human genetics. Research in statistical genetics generally involves developing theory or methodology to support research in one of three related areas:
population genetics - Study of evolutionary processes affecting genetic variation between organisms
genetic epidemiology - Studying effects of genes on diseases
quantitative genetics - Studying the effects of genes on 'normal' phenotypes
Statistical geneticists tend to collaborate closely with geneticists, molecular biologists, clinicians and bioinformaticians. Statistical genetics is a type of computational biology.
References
External links |
https://en.wikipedia.org/wiki/Michael%20Scott | Michael Scott, Michael Scot, or Mike Scott may refer to:
Academics
Michael Scot (1175–c. 1232), mathematician and astrologer
Michael L. Scott (born 1959), American academic and computer scientist
Mike Scott, British linguist and designer of WordSmith Tools
Michael Scott (academic) (fl. c. 2000), British academic at the North East Wales Institute of Higher Education
J. Michael Scott (born 1941), American scientist, environmentalist and author
Michael Scott (English author) (born 1981), English author, classicist, associate professor and television presenter
Sportspeople
Michael Scott (golfer) (1878–1959), English amateur golfer
Michael Scott (footballer) (born 1993), Scottish footballer
Mick Scott (born 1954), rugby league footballer of the 1980s and 1990s for Wigan, and Halifax RLFC
Michael Scott (rugby league) (died 1968), rugby league footballer of the 1940s, 1950s and 1960s for England, and Hull F.C.
Mickey Scott (1947–2011), professional baseball player
Mike Scott (baseball) (born 1955), American pitcher
Mike Scott (basketball) (born 1988), American basketball player
Michael Scott (basketball) (born 1986), American basketball player
Michael Scott (sports administrator) (born 1956), Australian sports administrator
Michael Scott (cricketer) (born 1933), English cricketer
Authors
Michael Scott (Scottish author) (1789–1835), Scottish author
Michael Scott (Irish author) (born 1959), Irish author
Michael Scott Rohan (1951–2018), Scottish fantasy and science fiction author
Entertainment
Michael Scott (The Office), fictional character in the American TV series The Office, played by Steve Carell
Michael Scott (musician) (born 1971), American musician
Mike Scott (Scottish musician) (born 1958), Scottish musician/songwriter, founder of The Waterboys
Mike Scott (broadcaster) (1932–2008), British TV presenter
Mike Scott (English musician), hardcore/punk songwriter, Vocalist of Lay It on the Line, ex-Phinius Gage
Michael T. Scott (born 1977), American comedy writer and animation director
Michael Scott, early stage name for British actor Michael Caine (born 1933)
Michael James Scott (born 1981), American actor and singer
Michael J. F. Scott, Canadian film and television producer and director
Michael Scott (artistic director) (c. 1935–2019), founder of the London Opera Society
Michael Scott (film director) (born 1955), American film director, producer and documentary filmmaker
Politicians
Michael Scott (British Army officer) (born 1941), former U.K. Military Secretary
Mike Scott (politician) (born 1954), Canadian parliamentarian
Michael Scott Jr. (born 1975), Chicago alderman
Other people
Michael Dishington Scott, chief justice of Tonga
Michael Scott (Apple) (born 1943), first CEO of Apple Computer
Michael Scott (architect) (1905–1989), Irish architect
Michael Scott (priest) (1907–1983), opponent of apartheid and advocate of nuclear disarmament
Michael Scott (diplomat) (1923–2004), British diplomat and colonial adm |
https://en.wikipedia.org/wiki/Fresh%20Air%20%28airline%29 | Fresh Air was a cargo airline based in Ikeja, Lagos, Nigeria. It operated cargo charter services mainly within West Africa. Its main base was Murtala Mohammed International Airport, Lagos.
Code data
ICAO Code: FRR
Callsign: FRESH AIR geel
History
Fleet
As of March 2007 the Fresh Air fleet included:
1 Antonov An-12
1 Boeing 737-200
1 McDonnell Douglas DC-9-30
Popular culture
Fresh Air was the name of the fictional passenger airline in the 2005 Wes Craven film Red Eye starring Rachel McAdams.
References
Defunct airlines of Nigeria
Airlines disestablished in 2007
Defunct companies based in Lagos
2007 disestablishments in Nigeria |
https://en.wikipedia.org/wiki/Hey%20Dad..%21 | Hey Dad..! is an Australian sitcom produced by Gary Reilly Productions, originally airing from 1987 to 1994 on the Seven Network.
Synopsis
Architect Martin Kelly singlehandedly raises his children: Simon, Debbie, and Jenny. His wife, Margaret, had died three years before the series' start.
Martin runs his own architectural business from the family home in the Sydney suburb of Chatswood. He employs his wife's cousin Betty Wilson, a good-natured ditz from the New South Wales country town of Walgett, as his secretary.
Many episodes deal with the daily stresses Martin faces as the family patriarch, such as settling arguments amongst his children. He frequently endures Betty's elaborate excuses for tardiness and is constantly frustrated with her delayed productivity at work. Simon's best friend is Gerald "Nudge" Noritas, a neighbour who constantly helps himself to whatever food he can find in the Kellys' kitchen.
In early episodes, the show briefly examines how the characters are struggling to deal with the absence of Margaret from their lives. Martin also breaks the fourth wall several times to deliver sarcastic one-liners to camera, although this is discontinued after the first 12 episodes.
Character replacements
As the series progressed, the original characters left one by one. Replacement characters were introduced to maintain the balance of the show's cast. The roles of two of Martin Kelly's children—Simon and Jenny—were recast during the show's run after the original actors left the series.
Early in season 5, Debbie Kelly moves to Dunk Island to work as a waitress. She is replaced by new character Sam Kelly, Martin's niece from Hong Kong who moves in. Nudge departs after the conclusion of season 5. No explanation is given in the show's story to explain his disappearance. From season 6, schoolboy Arthur MacArthur is the new neighbour who regularly visits. At the end of season 6, Simon moves out, leaving his friend Ben to move into Simon's room. At the end of season 12, Martin leaves for a $300,000-per-year contract to design and build a deep water port and mini-city in Saudi Arabia. He leaves the house and the business in the care of friend Greg Russell. Sam moves to Adelaide soon after, opening the door for Greg's daughter Tracy to move in.
At the end of the series, Betty and Jenny are the only remaining original characters. Jenny is portrayed by a different actress by this stage. Betty's portrayer Julie McGregor is the only original cast member to remain through the entire series.
Final episode
In the series finale, the regular characters are held hostage in the house by a fugitive bank robber. The robber places a bomb in the family's VCR, as leverage with the police. After the hostage drama has been resolved and the robber arrested the family remembers there is a bomb in the VCR, but they do not know how to re-program it. Betty observes that "this is just like E Street... at the end, where they all got blown up", but Greg responds that |
https://en.wikipedia.org/wiki/Java%20Cryptography%20Architecture | In computing, the Java Cryptography Architecture (JCA) is a framework for working with cryptography using the Java programming language. It forms part of the Java security API, and was first introduced in JDK 1.1 in the package.
The JCA uses a "provider"-based architecture and contains a set of APIs for various purposes, such as encryption, key generation and management, secure random-number generation, certificate validation, etc. These APIs provide an easy way for developers to integrate security into application code.
See also
Java Cryptography Extension
Bouncy Castle (cryptography)
External links
Official JCA guides: JavaSE6, JavaSE7, JavaSE8, JavaSE9, JavaSE10, JavaSE11
Java platform
Cryptographic software |
https://en.wikipedia.org/wiki/KGO-TV | KGO-TV (channel 7) is a television station licensed to San Francisco, California, United States, serving as the San Francisco Bay Area's ABC network outlet. Owned and operated by the network's ABC Owned Television Stations division, KGO-TV maintains studios at the ABC Broadcast Center immediately west of The Embarcadero north of the city's Financial District, and its transmitter is located atop Sutro Tower. In addition, KGO-TV leases part of its building to CW outlet KRON-TV (channel 4, owned by The CW's majority owner, Nexstar Media Group), but with completely separate operations.
History
KGO-TV first signed on the air on May 5, 1949, as the San Francisco Bay Area's second-oldest television station, signing on five months after KPIX (channel 5) and the 50th in the United States. In fact, KPIX had a hand in getting KGO-TV on the air, as the CBS-affiliated station produced informational programming on how to receive and view ABC's channel 7. KGO-TV's original studios were located in the renovated Sutro Mansion near Mount Sutro in San Francisco, next to the transmitter tower it shared with KPIX.
Channel 7 was the fourth of ABC's five original owned-and-operated stations to sign-on, after WABC-TV in New York City, WLS-TV in Chicago and WXYZ-TV in Detroit, and before KABC-TV in Los Angeles. The call letters were inherited from KGO radio (810 AM). In addition to airing ABC programming, KGO-TV also aired syndicated programs from the Paramount Television Network; among the Paramount programs aired were Time For Beany, Hollywood Reel, Sandy Dreams, Hollywood Wrestling, and Cowboy G-Men.
Channel 7 had a limited broadcasting schedule during its first year on the air. It was not until September 1950 that the station announced, in the San Francisco Chronicle, that it would broadcast on all seven days of the week. For much of the 1950s, the station signed on late in the morning or early afternoon, especially on the weekends, because the ABC network did not offer many daytime programs then. For many years, Saturday programming began with King Norman's Kingdom of Toys, a popular children's program hosted by the owner of a San Francisco toy store, Norman Rosenberg, from 1954 until 1961. He died in December 2016 at the age of 98.
In 1954, KGO-TV moved to one of the most modern broadcasting facilities on the West Coast at the time at 277 Golden Gate Avenue, formerly known as the Eagle Building. The building was demolished between 2010 and 2011 to make way for apartments. As an ABC-owned station, KGO-TV originated a few network daytime shows, including programs hosted by fitness expert Jack La Lanne, singer Tennessee Ernie Ford, and entertainer Gypsy Rose Lee. Syndicated game shows Oh My Word and The Anniversary Game were produced at KGO-TV by Circle Seven Productions. In the mid-1950s, KGO-TV telecast live weeknight variety shows hosted by Don Sherwood, a disc jockey for KSFO, until Sherwood was fired for making a political comment in defiance of a warning fro |
https://en.wikipedia.org/wiki/XView | XView is a widget toolkit from Sun Microsystems introduced in 1988. It provides an OPEN LOOK user interface for X Window System applications, with an object-oriented application programming interface (API) for the C programming language. Its interface, controls, and layouts are very close to that of the earlier SunView window system, making it easy to convert existing applications from SunView to X. Sun also produced the User Interface Toolkit (UIT), a C++ API to XView.
The XView source code has been freely available since the early 1990s, making it the "first open-source professional-quality X Window System toolkit". XView was later abandoned by Sun in favor of Motif (the basis of CDE), and more recently GTK+ (the basis of GNOME).
XView was reputedly the first system to use right-button context menus, which are now ubiquitous among computer user interfaces.
See also
OLIT
MoOLIT
OpenWindows
References
Further reading
Ian Darwin, et al, X Window System User's Guide, OPEN LOOK Edition (O'Reilly & Associates, unpublished) Volume 3OL
Dan Heller, XView Programming Manual (O'Reilly & Associates, 1991) Volume 7
Thomas Van Raalte, ed. XView Reference Manual (O'Reilly & Associates, 1991) Volume 7b
Widget toolkits
Sun Microsystems software
X-based libraries |
https://en.wikipedia.org/wiki/Matt%20Gallant | Matthew James Gallant (born June 25, 1964) is an American television host. He was the host of The Planet's Funniest Animals on Animal Planet, as well as shows on MTV, ESPN2, G4, NFL Network, Fine Living, ABC and DirecTV. Gallant hosted Simon Cowell's American Inventor in 2007, and currently co-hosts "The List" on the Scripps Network. TheListtv.com
Early career
Born on June 25, 1964, in Syracuse, New York, and raised in Westport, Connecticut. Gallant studied communications at the University of Rhode Island where Gallant worked in the sports information department and broadcast university basketball and football games. He held an internship covering sports news at Channel 6 in Providence, Rhode Island.
After graduating, Gallant moved to New York where he became a page at NBC and filled audiences for shows such as Late Night with David Letterman. He then hired an agent who managed to find him minor roles in television adverts and soaps. He then moved on to Los Angeles where he auditioned for some small roles. Eventually, Gallant hosted shows including X-Treme Energy, The Planet's Funniest Animals, and American Inventor.
In 2004 Gallant gave the Commencement speech at the University of Rhode Island, and received an Honorary Doctorate of Arts for his career achievements and fundraising & volunteer work with the Make a Wish Foundation that helps children with life-threatening illnesses.
References
External links
The Planet's Luckiest Host
1964 births
Living people
Participants in American reality television series
Television personalities from Syracuse, New York
People from Westport, Connecticut |
https://en.wikipedia.org/wiki/M.A.N.T.I.S. | M.A.N.T.I.S. is an American superhero television series that aired for one season on the Fox Network between August 26, 1994, and March 3, 1995, with its final two episodes airing on SyFy on September 7 and 14, 1997.
The original two-hour TV movie pilot was produced by Sam Raimi and developed by Sam Hamm.
Plot
Wealthy, outspoken scientist Dr. Miles Hawkins is shot in the spine by a police sniper during a riot while trying to rescue a child, leaving him paralyzed from the waist down and using a wheelchair.
After losing a lawsuit against the police department and discovering evidence of a vast conspiracy against the black community, he angrily undergoes a change in political philosophy and uses his company's resources to invent a formfitting combination powered exoskeleton and bulletproof black body armor that not only enables him to walk while wearing it but in the process also endows him with superhuman strength, speed and agility, plus the ability to fire nonlethal paralysis darts from his wrists.
Using a vast array of technology, including a secret underwater lab called the Seapod deep beneath his secluded seaside mansion and a flying car/submarine called the Chrysalis to travel around the city at night, he secretly assumes the persona of the metal-masked vigilante known as the "M.A.N.T.I.S." ("Mechanically Augmented Neuro Transmitter Interception System", changed to "Mechanically Augmented NeuroTransmitter Interactive System" for the series) to find justice for himself and others.
The pilot featured strong roles for a variety of African-American actors, including Gina Torres as dedicated pathologist Dr. Amy Ellis, Bobby Hosea as ambitious reporter Yuri Barnes, Wendy Raquel Robinson and Christopher M. Brown as African students of Hawkins who act as his secret support staff in his fight against crime, and Steve James as handsome inner city youth club manager Antoine Pike.
The series that followed recast all the characters, save for the hero, to include British scientist and exoskeleton co-inventor John Stonebrake (Roger Rees) and smart-mouthed, streetwise young bicycle courier Taylor Savage/Savidge (Christopher Gartin), with police detective Lt. Leora Maxwell (Galyn Görg) being the only other person of color as a regular on the show, and the plot was completely rebooted and simplified from that of the pilot.
Initially, the series depicted the M.A.N.T.I.S. operating as an often-reluctant vigilante who only got involved in criminal situations when there was some sort of personal connection to him and his friends. While the costumed crimefighter was still pursued by police, the aforementioned conspiracy was now reduced down to the Machiavellian machinations of one man, evil industrialist and Miles' former business partner Solomon Box (Brion James / Andrew J. Robinson).
However, poor ratings led to an extensive retooling of the concept. Midway through the show's run, minor recurring characters like Miles' clichéd sassy black housekeeper Lyn |
https://en.wikipedia.org/wiki/Treemapping | In information visualization and computing, treemapping is a method for displaying hierarchical data using nested figures, usually rectangles.
Treemaps display hierarchical (tree-structured) data as a set of nested rectangles. Each branch of the tree is given a rectangle, which is then tiled with smaller rectangles representing sub-branches. A leaf node's rectangle has an area proportional to a specified dimension of the data. Often the leaf nodes are colored to show a separate dimension of the data.
When the color and size dimensions are correlated in some way with the tree structure, one can often easily see patterns that would be difficult to spot in other ways, such as whether a certain color is particularly relevant. A second advantage of treemaps is that, by construction, they make efficient use of space. As a result, they can legibly display thousands of items on the screen simultaneously.
Tiling algorithms
To create a treemap, one must define a tiling algorithm, that is, a way to divide a region into sub-regions of specified areas. Ideally, a treemap algorithm would create regions that satisfy the following criteria:
A small aspect ratio—ideally close to one. Regions with a small aspect ratio (i.e., fat objects) are easier to perceive.
Preserve some sense of the ordering in the input data (ordered).
Change to reflect changes in the underlying data (high stability).
Unfortunately, these properties have an inverse relationship. As the aspect ratio is optimized, the order of placement becomes less predictable. As the order becomes more stable, the aspect ratio is degraded.
Rectangular treemaps
To date, fifteen primary rectangular treemap algorithms have been developed:
Convex treemaps
Rectangular treemaps have the disadvantage that their aspect ratio might be arbitrarily high in the worst case. As a simple example, if the tree root has only two children, one with weight and one with weight , then the aspect ratio of the smaller child will be , which can be arbitrarily high.
To cope with this problem, several algorithms have been proposed that use regions that are general convex polygons, not necessarily rectangular.
Convex treemaps were developed in several steps, each step improved the upper bound on the aspect ratio. The bounds are given as a function of - the total number of nodes in the tree, and - the total depth of the tree.
Onak and Sidiropoulos proved an upper bound of .
De-Berg and Onak and Sidiropoulos improve the upper bound to , and prove a lower bound of .
De-Berg and Speckmann and van-der-Weele improve the upper bound to , matching the theoretical lower bound. (For the special case where the depth is 1, they present an algorithm that uses only four classes of 45-degree-polygons (rectangles, right-angled triangles, right-angled trapezoids and 45-degree pentagons), and guarantees an aspect ratio of at most 34/7.)
The latter two algorithms operate in two steps (greatly simplified for clarity):
The original tre |
https://en.wikipedia.org/wiki/Millipede%20memory | Millipede memory is a form of non-volatile computer memory. It promised a data density of more than 1 terabit per square inch (1 gigabit per square millimeter), which is about the limit of the perpendicular recording hard drives. Millipede storage technology was pursued as a potential replacement for magnetic recording in hard drives and a means of reducing the physical size of the technology to that of flash media.
IBM demonstrated a prototype millipede storage device at CeBIT 2005, and was trying to make the technology commercially available by the end of 2007. However, because of concurrent advances in competing storage technologies, no commercial product has been made available since then.
Technology
Basic concept
The main memory of modern computers is constructed from one of a number of DRAM-related devices. DRAM basically consists of a series of capacitors, which store data in terms of the presence or absence of electrical charge. Each capacitor and its associated control circuitry, referred to as a cell, holds one bit, and multiple bits can be read or written in large blocks at the same time. DRAM is volatile — data is lost when power is removed.
In contrast, hard drives store data on a disk that is covered with a magnetic material; data is represented by this material being locally magnetized. Reading and writing are accomplished by a single head, which waits for the requested memory location to pass under the head while the disk spins. As a result, a hard drive's performance is limited by the mechanical speed of the motor, and it is generally hundreds of thousands of times slower than DRAM. However, since the "cells" in a hard drive are much smaller, the storage density for hard drives is much higher than DRAM. Hard drives are non-volatile — data is retained even after power is removed.
Millipede storage attempts to combine features of both. Like a hard drive, millipede both stores data in a medium and accesses the data by moving the medium under the head. Also similar to hard drives, millipede's physical medium stores a bit in a small area, leading to high storage densities. However, millipede uses many nanoscopic heads that can read and write in parallel, thereby increasing the amount of data read at a given time.
Mechanically, millipede uses numerous atomic force probes, each of which is responsible for reading and writing a large number of bits associated with it. These bits are stored as a pit, or the absence of one, in the surface of a thermo-active polymer, which is deposited as a thin film on a carrier known as the sled. Any one probe can only read or write a fairly small area of the sled available to it, known as a storage field. Normally the sled is moved so that the selected bits are positioned under the probe using electromechanical actuators. These actuators are similar to those that position the read/write head in a typical hard drive, however, the actual distance moved is tiny in comparison. The sled is moved in |
https://en.wikipedia.org/wiki/Sharp%20NEC%20Display%20Solutions | Sharp NEC Display Solutions (Sharp/NEC; formerly NEC Display Solutions or NDS and NEC-Mitsubishi Electric Visual Systems or NEC-Mitsubishi or NM Visual) is a manufacturer of computer monitors and large-screen public-information displays, and has sold and marketed products under the NEC brand globally for more than twenty years. The company sells display products to the consumer, business, professional (e.g. financial, graphic design, CAD/CAM), digital signage and medical markets.
The company again became a joint venture of Sharp and NEC Corporation when NEC sold 66% to Sharp on March 25, 2020. Prior to that date, it was a wholly owned subsidiary of Japan-based NEC Corporation since March 31, 2005. Originally, the company was known as NEC-Mitsubishi, a 50/50 joint venture between NEC Corporation and Mitsubishi Electric that began in 2000, and sold display products under both the NEC and Mitsubishi brands. The company is no longer affiliated with Mitsubishi.
Brands
NEC MultiSync - line of LCD and CRT monitors and large format public displays designed for business applications, lifestyle and gaming.
NEC AccuSync - line of LCD and CRT monitors designed for home and office applications.
NEC SpectraView - line of LCD monitors designed for color sensitive graphics applications.
NEC SpectraView Reference - a line of LCD monitors designed for color critical professional applications
NEC MD Series - line of LCD monitors designed for medical diagnostic imaging applications.
NEC MULTEOS - line of LCD monitors designed for public demonstrations.
See also
Cromaclear
Diamondtron
References
External links
Global
Sharp NEC Display Solutions of America
Sharp NEC Display Solutions Europe
Sharp NEC Display Solutions Asia
Sharp NEC Display Solutions Japan
NEC subsidiaries
Display technology companies |
https://en.wikipedia.org/wiki/List%20of%20Usenet%20newsreaders | Usenet is a worldwide, distributed discussion system that uses the Network News Transfer Protocol (NNTP). Programs called newsreaders are used to read and post messages (called articles or posts, and collectively termed news) to one or more newsgroups. Users must have access to a news server to use a newsreader. This is a list of such newsreaders.
Types of clients
Text newsreader – designed primarily for reading/posting text posts; unable to download binary attachments
Traditional newsreader – a newsreader with text support that can also handle binary attachments, though less efficiently than more specialized clients
Binary grabber/plucker – designed specifically for easy and efficient downloading of multi-part binary post attachments; limited or nonexistent reading/posting ability. These generally offer multi-server and multi-connection support. Most now support NZBs, and several either support or plan to support automatic Par2 processing. Some additionally support video and audio streaming.
NZB downloader – binary grabber client without header support – cannot browse groups or read/post text messages; can only load 3rd-party NZBs to download binary post attachments. Some incorporate an interface for accessing selected NZB search websites.
Binary posting client – designed specifically and exclusively for posting multi-part binary files
Combination client – Jack-of-all-trades supporting text reading/posting, as well as multi-segment binary downloading and automatic Par2 processing
Web-Based Client - Client designed for access through a web browser and does not require any additional software to access Usenet.
Active
Commercial software
BinTube
Forté Agent
NewsBin
NewsLeecher
Novell GroupWise
Postbox
Turnpike
Usenet Explorer
Freeware
GrabIt
Opera Mail
Xnews – MS Windows
Free/Open-source software
Claws Mail is a GTK+-based email and news client for Linux, BSD, Solaris, and Windows.
GNOME Evolution
Gnus, is an email and news client, and feed reader for GNU Emacs.
Mozilla Thunderbird is a free and open-source cross-platform email client, news client, RSS and chat client developed by the Mozilla Foundation.
Pan a full-featured text and binary NNTP and Usenet client for Linux, FreeBSD, NetBSD, OpenBSD, OpenSolaris, and Windows.
SeaMonkey Mail & Newsgroups
Sylpheed
X Python Newsreader
Text-based
Alpine
Gnus (Emacs based)
Line Mode Browser
Lynx (has limited Usenet support)
Mutt (3rd party patches)
rn
Slrn
tin
Web-based
Easynews
Google Groups
Discontinued
Commercial software
Lotus Notes
Netscape Communicator (superseded by Mozilla)
Windows Mail – replaced Outlook Express for Windows Vista – terminated by Windows 7
Windows Live Mail – replaced Outlook Express for Windows XP; optional for Windows XP, Windows Vista, and Windows 7
Freeware
MT NewsWatcher – Mac OS X Universal Binary
Free/Open Source
Arachne (with aranews.apm package)
Arena
Argo (discontinued)
Beonex Communicator
KNode (may be embed |
https://en.wikipedia.org/wiki/Velocity%20%28disambiguation%29 | Velocity is a quantity in physics that is related to speed.
Velocity may also refer to:
Computing and technology
Apache Velocity, a Java template engine
Velocity (JavaScript library)
Velocity (memory cache), from Microsoft
Velocity (software development), a measure of productivity
Arts, entertainment, and media
Velocity (album), by The Vels
Velocity (character), a comic book character
Velocity (film), a re-edited version of the 1960 film The Wild Ride, with new footage
Velocity (newspaper), in Louisville, Kentucky
Velocity (novel), by Dean Koontz
Velocity (TV network), a Discovery Communications channel
Velocity (video game), a 2012 shoot 'em up video game
WWE Velocity, a wrestling television show
Other uses
Velocity SE, an entry-level homebuilt aircraft
Velocity XL, a high-performance homebuilt aircraft
USS Velocity, several U.S. Navy warships
Velocity of money, a monetary economics concept
Velocity Tower, a tower in Sheffield
Velo-city, a series of cycle planning conferences
Velocity Frequent Flyer, frequent-flyer program of Virgin Australia whose airline call sign is "Velocity" |
https://en.wikipedia.org/wiki/Comparison%20of%20object%E2%80%93relational%20database%20management%20systems | This is a comparison of object–relational database management systems (ORDBMSs). Each system has at least some features of an object–relational database; they vary widely in their completeness and the approaches taken.
The following tables compare general and technical information; please see the individual products' articles for further information. Unless otherwise specified in footnotes, comparisons are based on the stable versions without any add-ons, extensions or external programs.
Basic data
Object features
Information about what fundamental ORDBMSes features are implemented natively.
Data types
Information about what data types are implemented natively.
See also
Comparison of database administration tools
Comparison of object database management systems
Comparison of relational database management systems
List of relational database management systems
Notes
External links
Arvin.dk, comparison of different SQL implementations
object-relational databases |
https://en.wikipedia.org/wiki/THEOS | THEOS, which translates from Greek as "God", is an operating system which started out as OASIS, a microcomputer operating system for small computers that use the Z80 processor. When the operating system was launched for the IBM Personal Computer/AT in 1982, the decision was taken to change the name from OASIS to THEOS, short for THE Operating System.
History
OASIS
The OASIS operating system was originally developed and distributed in 1977 by Phase One Systems of Oakland, California (President Howard Sidorsky). OASIS was developed for the Z80 processor and was the first multi-user operating system for 8-bit microprocessor based computers (Z-80 from Zilog). "OASIS" was a backronym for "Online Application System Interactive Software".
OASIS consisted of a multi-user operating system, a powerful Business Basic/Interpreter, C compiler and a powerful text editor. Timothy Williams developed OASIS and was employed at Phase One. The market asked for 16-bit systems but there was no real 16-bit multi-user OS for 16-bit systems. Every month Phase One announced OASIS-16 but it did not come. One day Timothy Williams claimed that he owned OASIS and started a court case against Phase One and claimed several million U.S. dollars. Sidorsky had no choice and claimed Chapter 11. The court case took two years and finally the ruling was that Timothy Williams was allowed to develop the 16-bit version of OASIS but he was not allowed to use the OASIS name anymore.
David Shirley presented an alternative history at the Computer Information Centre, an OASIS distributor for the UK in the early 1980s. He said Timothy Williams developed the OASIS operating system and contracted with Phase One Systems to market and sell the product. Development of the 16-bit product was underway, but the product was prematurely announced by POS. This led to pressure to release OASIS early, when it was still not properly debugged or optimised. (OASIS 8-bit was quite well optimised by that point, with many parts hand-coded in Z80 assembler, but that meant then-new 16-bit systems performed nowhere near as well as their 8-bit counterparts). This situation led to Williams becoming dissatisfied with the Phase One company at the time, and forming his own company to market and support the 16-bit OASIS. The company was initially called Oasis Technologies, until Phase One took action to protect the name. Rather than fight a long and expensive court battle, the company and product was renamed "THEOS".
Williams created a new company and product name: "THEOS" meaning "the OS" in the sense of "the one" ("Theos" is Greek for "God").
While Williams and Sidorsky where fighting in the court the manufacturers had no 16-bit multi-user OS. That led to the agreement between Microsoft and Santa Cruz Operation to make a new operating system based on Version 7 Unix from Bell Labs. Microsoft purchased a license for Version 7 UNIX from AT&T in 1978, and announced on August 25, 1980, that it would make it available |
https://en.wikipedia.org/wiki/Atomic%20radii%20of%20the%20elements%20%28data%20page%29 | The atomic radius of a chemical element is the distance from the center of the nucleus to the outermost shell of an electron. Since the boundary is not a well-defined physical entity, there are various non-equivalent definitions of atomic radius. Depending on the definition, the term may apply only to isolated atoms, or also to atoms in condensed matter, covalently bound in molecules, or in ionized and excited states; and its value may be obtained through experimental measurements, or computed from theoretical models. Under some definitions, the value of the radius may depend on the atom's state and context.
Atomic radii vary in a predictable and explicable manner across the periodic table. For instance, the radii generally decrease rightward along each period (row) of the table, from the alkali metals to the noble gases; and increase down each group (column). The radius increases sharply between the noble gas at the end of each period and the alkali metal at the beginning of the next period. These trends of the atomic radii (and of various other chemical and physical properties of the elements) can be explained by the electron shell theory of the atom; they provided important evidence for the development and confirmation of quantum theory.
Atomic radius
Note: All measurements given are in picometers (pm). For more recent data on covalent radii see Covalent radius. Just as atomic units are given in terms of the atomic mass unit (approximately the proton mass), the physically appropriate unit of length here is the Bohr radius, which is the radius of a hydrogen atom. The Bohr radius is consequently known as the "atomic unit of length". It is often denoted by a0 and is approximately 53 pm. Hence, the values of atomic radii given here in picometers can be converted to atomic units by dividing by 53, to the level of accuracy of the data given in this table.
See also
Atomic radius
Covalent radius (Single-, double- and triple-bond radii, up to the superheavy elements.)
Ionic radius
Notes
Difference between empirical and experimental data: Empirical data basically means, "originating in or based on observation or experience" or "relying on experience or observation alone often without due regard for system and theory data". It basically means that you measured it through physical observation, and a lot of experiments generating the same results. Although, note that the values are not calculated by a formula. However, often the empirical results then become an equation of estimation. Experimental data on the other hand are only based on theories. Such theoretical predictions are useful when there are no ways of measuring radii experimentally, if you want to predict the radius of an element that hasn't been discovered yet, or it has too short of a half-life.
The radius of an atom is not a uniquely defined property and depends on the definition. Data derived from other sources with different assumptions cannot be compared.
† to an accuracy o |
https://en.wikipedia.org/wiki/Win32%20Thread%20Information%20Block | In computing, the Win32 Thread Information Block (TIB) is a data structure in Win32 on x86 that stores information about the currently running thread. It is also known as the Thread Environment Block (TEB) for Win32. It descended from, and is backward-compatible on 32-bit systems with, a similar structure in OS/2.
The TIB is officially undocumented for Windows 9x. The Windows NT series DDK (as well as the MinGW/ReactOS implementation) includes a struct NT_TIB in winnt.h that documents the subsystem independent part. Even before TIB was effectively documented, many applications have already started using its fields that they are effectively a part of the API. The first field containing the SEH frame, in particular, is directly referenced by the code produced by Microsoft's own compiler. The Win32 subsystem-specific part of the TEB is undocumented, but Wine includes a TEB definition in winternl.h.
The TIB can be used to get a lot of information on the process without calling Win32 API. Examples include emulating GetLastError(), GetVersion(). Through the pointer to the PEB one can obtain access to the import tables (IAT), process startup arguments, image name, etc. It is accessed from the FS segment register on 32-bit Windows and GS on 64-bit Windows.
Contents of the TIB on Windows
This table is based on Wine's work on Microsoft Windows internals.
FS (for 32-bit) or GS (for 64-bit) maps to a TIB which is embedded in a data block known as the TDB (thread data base). The TIB contains the thread-specific exception handling chain and pointer to the TLS (thread local storage.) The thread local storage is not the same as C local storage.
Stack information stored in the TIB
A process should be free to move the stack of its threads as long as it updates the information stored in the TIB accordingly. A few fields are key to this matter: stack base, stack limit, deallocation stack, and guaranteed stack bytes, respectively stored at offsets 0x8, 0x10, 0x1478 and 0x1748 in 64 bits. Different Windows kernel functions read and write these values, specially to distinguish stack overflows from other read/write page faults (a read or write to a page guarded among the stack limits in guaranteed stack bytes will generate a stack-overflow exception instead of an access violation). The deallocation stack is important because Windows API allows to change the amount of guarded pages: the function SetThreadStackGuarantee allows both read the current space and to grow it. In order to read it, it reads the GuaranteedStackBytes field, and to grow it, it uses has to uncommit stack pages. Setting stack limits without setting DeallocationStack will probably cause odd behavior in SetThreadStackGuarantee. For example, it will overwrite the stack limits to wrong values. Different libraries call SetThreadStackGuarantee, for example the .NET CLR uses it for setting up the stack of their threads.
Accessing the TIB
The TIB of the current thread can be accessed as an offset of |
https://en.wikipedia.org/wiki/Arrow%20keys | Arrow keys or cursor movement keys are keys on a computer keyboard that are either programmed or designated to move the cursor in a specified direction.
The term "cursor movement key" is distinct from "arrow key" in that the former term may refer to any of various keys on a computer keyboard designated for cursor movement, whereas "arrow keys" generally refers to one of four specific keys, typically marked with arrows.
Arrow keys are typically located at the bottom of the keyboard to the left side of the numeric keypad, usually arranged in an inverted-T layout but also found in diamond shapes and linear shapes. Arrow keys are commonly used for navigating around documents and for playing games.
The inverted-T layout was popularized by the Digital Equipment Corporation LK201 keyboard from 1982.
Historical development
Before the computer mouse was widespread, arrow keys were the primary way of moving a cursor on screen. Mouse keys is a feature that allows controlling a mouse cursor with arrow keys instead. A feature echoed in the Amiga whereby holding the Amiga key would allow a person to move the pointer with the arrow keys in the Workbench (operating system), but most games require a mouse or joystick. The use of arrow keys in games has come back into fashion from the late 1980s and early 1990s when joysticks were a must, and were usually used in preference to arrow keys with some games not supporting any keys. It can be used instead of WASD keys, to play games using those keys.
The inverted-T layout was popularized by the Digital Equipment Corporation LK201 keyboard from 1982.
Some Commodore 8-bit computers used two keys instead of four, with directions selected using the shift key.
The original Macintosh had no arrow keys at the insistence of Steve Jobs, who felt that people should use the mouse instead. They were deliberately excluded from the Macintosh launch design as a forcing device, acclimating users to the new mouse input device and inducing software developers to conform to mouse-driven design rather than easily porting previous terminal-based software to the new platform. Arrow keys were included in later Apple keyboards. Early models with arrow keys but no middle section (Home, End, etc.) placed them in one line below the right-hand Shift key in an HJKL-like fashion; later versions had a standard inverted-T layout, either in the middle block or as half-height keys at the bottom right of the main keyboard.
Common uses
The arrow keys are used in many applications to do different things such as:
Moving text cursor to the right, left, previous line and next line
Moving player's character in video games
Scrolling down and up in different documents and web pages
Changing the current selected item in a list or selecting file icon near to the current selected file in a file explorer
Moving selected object in a drawing software
Moving forward and backward while playing multimedia files
Alternative keys
Although the "arrow keys" |
https://en.wikipedia.org/wiki/Harbinger%20Corporation | Harbinger Corporation was a leader in e-commerce software and network services. Founded in December 1983 by C. Tycho Howle and David Leach as Computer Technologies for the Home in Atlanta, Georgia, it went public in August 1995. It was purchased by Peregrine Systems on 16 June 2000. Originally located at 1800 Century Place, the company relocated to 1055 Lenox Park Blvd. in the early 1990s.
At its peak, Harbinger had 1,100 employees, 40,000 active customers, and annual revenues exceeding $155 million.
After Peregrine went into bankruptcy following 2002 accounting scandals, certain lines of business purchased from Harbinger and Extricity were sold off to Golden Gate Capital and Cerberus Capital Management and ultimately renamed Inovis. For a while, Inovis' European operations used the name Harbinger Commerce.
The Harbinger brand became part of Inovis in 2002, which was then acquired by GXS in 2010.
References
External links
A list of alumni who the Harbinger Alumni Group would like to locate
Inovis web site
Inovis blog
American companies established in 1983
American companies disestablished in 2000
Software companies established in 1983
Software companies disestablished in 2000
Defunct software companies of the United States |
https://en.wikipedia.org/wiki/Roberto%20Ierusalimschy | Roberto Ierusalimschy (; born 21 May 1960) is a Brazilian computer scientist, known for creating the Lua programming language. He holds a PhD in Computer Science from the Pontifical Catholic University of Rio de Janeiro where he has an appointment as a full professor of informatics. He did a post-doc at University of Waterloo in 1992 and was visiting professor at Stanford University in 2012. He is the leading architect and the author of Programming in Lua. He also created LPeg, a Lua library for implementing parsing expression grammars.
In 2021, Roberto created Building a Programming Language, a project-based learning program where students learn how to build a programming language from scratch.
References
External links
1960 births
Brazilian computer scientists
Brazilian Jews
Living people
People from Rio de Janeiro (city)
Pontifical Catholic University of Rio de Janeiro alumni
Academic staff of the Pontifical Catholic University of Rio de Janeiro
Programming language designers |
https://en.wikipedia.org/wiki/Constellation%20Airlines | Constellation International Airlines was a Belgian airline that operated during the 1990s.
Code data
IATA Code: CQ
ICAO Code: CIN
Callsign: CONSTELLATION
History
Constellation International Airlines S.A., was established on 27 May 1978 as Unijet, rebranded as BFS International on 28 October 1981 and renamed to the last name on 7 February 1995. Started operations, with Boeing 727-200 aircraft from Brussels Airport on 23 June 1995, which were replaced by brand new Airbus A320 aircraft, leased from International Lease Finance Corporation. Constellation International Airlines was the first company in the Benelux to operate the Airbus A320 family series aircraft. Its markets were holiday flights and subservices for other companies, when the need arose. Constellation International Airlines ceased operations due to financial troubles on 3 December 1999, and was declared bankrupt on 15 December 1999.
Fleet
The Constellation Airlines historical fleet consisted of the following aircraft:
2 Airbus A320-232 (registrations: OO-COF and OO-COH)
1 Airbus A320-231 (registration: OO-COL)
1 Airbus A321-231 (registration: G-MIDA)
2 Boeing 727-2X3 (registrations: OO-LLS and OO-CAH)
2 Boeing 737-3H9 (registrations: YU-ANI and YU-ANK)
References
External links
Code and fleet data
In Memoriam
Defunct airlines of Belgium
Airlines established in 1995
Airlines disestablished in 1999
Belgian companies established in 1995
1999 disestablishments in Belgium |
https://en.wikipedia.org/wiki/Reiser | Reiser may refer to:
People
Charles Reiser, safecracker also known as "The Ox"
Glenda Reiser, Canadian middle distance runner
Hans Reiser, computer programmer and convicted murderer
Hans Reiser (actor), German actor (The Great Escape)
Jean-Marc Reiser, French comics artist
John Reiser, race car driver and businessman from Wisconsin
Kateryna Skarzhynska (née von Reiser), (1852-1932) Russian philanthropist
Martin Reiser, attributed as originator of Wirth's law
Niki Reiser (born 1958), German composer of film music
Othmar Reiser, ornithologist
Paul Reiser, actor who starred in the sitcom Mad About You
Pete Reiser, baseball player also known as "Pistol Pete"
Rio Reiser, musician in the band Ton Steine Scherben
Robert A. Reiser, American academic
Computers
ReiserFS, a filesystem developed by Hans Reiser
Reiser4, a newer filesystem developed by Hans Reiser
See also
Reser, a surname |
https://en.wikipedia.org/wiki/Network%20administrator | A network administrator is a person designated in an organization whose responsibility includes maintaining computer infrastructures with emphasis on local area networks (LANs) up to wide area networks (WANs). Responsibilities may vary between organizations, but installing new hardware, on-site servers, enforcing licensing agreements, software-network interactions as well as network integrity and resilience are some of the key areas of focus.
Duties
The role of the network administrator can vary significantly depending on an organization's size, location, and socioeconomic considerations. Some organizations work on a user-to-technical support ratio,
Network administrators are often involved in proactive work. This type of work will often include:
network monitoring.
testing the network for weakness.
keeping an eye out for needed updates.
installing and implementing security programs.
in many cases, E-mail and Internet filters.
evaluating implementing network.
Network administrators are responsible for making sure that computer hardware and network infrastructure related to an organization's data network are effectively maintained. In smaller organizations, they are typically involved in the procurement of new hardware, the rollout of new software, maintaining disk images for new computer installs, making sure that licenses are paid for and up to date for software that needs it, maintaining the standards for server installations and applications, monitoring the performance of the network, checking for security breaches, and poor data management practices. A common question for the small-medium business (SMB) network administrator is, how much bandwidth do I need to run my business? Typically, within a larger organization, these roles are split into multiple roles or functions across various divisions and are not actioned by the one individual. In other organizations, some of these roles mentioned are carried out by system administrators.
As with many technical roles, network administrator positions require a breadth of technical knowledge and the ability to learn the intricacies of new networking and server software packages quickly. Within smaller organizations, the more senior role of network engineer is sometimes attached to the responsibilities of the network administrator. It is common for smaller organizations to outsource this function.
See also
Network analyzer (disambiguation)
Network architecture
Network management system
System administrator
Technical support
References
Computer occupations
Management by type |
https://en.wikipedia.org/wiki/VLM | VLM can refer to:
Veículo Lançador de Microssatélites, a Brazilian launcher of satellites
Very large memory computers
Vic Lee Motorsport, a British motor racing team
Virgin London Marathon
Virginia Lee Montgomery, American artist
Virtual Light Machine
Virtual Loadable Module, modular drivers of Novell's 16-bit NetWare client for DOS/Windows
Visceral larva migrans (human toxocarosis), a parasitary human disease due by Toxocara cati or Toxocara canis
Visible light microscope, a type of microscope to magnify images by means of visible light
VLM Airlines Slovenia, a sister airline to the Belgian VLM Airlines
VLM Airlines, a defunct Belgian regional airline
vorarlberg museum the former Vorarlberger Landesmuseum in Bregez, Austria
Vortex lattice method, a numerical method used in computational fluid dynamics |
https://en.wikipedia.org/wiki/The%20Supernaturalist | The Supernaturalist is a science fiction cyberpunk novel by Irish author Eoin Colfer. The book was influenced by film noir and other predecessors of the cyberpunk science fiction movement. Colfer has outlined plans for a sequel, The Supernaturalist 2.
Plot
The Supernaturalist takes place in Satellite City, a large city in an unspecified location in the Northern Hemisphere, in the third millennium. Much of Satellite City is controlled by the Satellite, owned by Myishi Corporation. By the time of the novel, however, the Satellite is losing links to the surface, causing disasters that range from mild to catastrophic.
The book opens with an introduction to Cosmo Hill, an orphan at the Clarissa Frayne Institute for Parentally Challenged Boys. At the Institute, the boys are used as human guinea pigs for various products. However, on a trip back from a record company, the truck transporting them crashes. Cosmo and a friend, Francis (aka "Ziplock") manage to escape the wreckage, but are pursued by a warden from the Institute. The chase takes them to the rooftops, where Cosmo and Ziplock fall into a wrecked generator. Ziplock is electrocuted but Cosmo survives, albeit with multiple critical injuries, including several broken bones and a heart which begins to shut down. He begins seeing small blue creatures around him. When one lands on his chest and begins sucking his life out, three figures appear out of nowhere and kill the creature. Although the teens want to leave him, Cosmo begs them to take him with them, pleading to not be left to be eaten by the strange blue beings. The group labels him a "Spotter" and, after some argument, take him with them before he passes out.
Cosmo wakes up in a warehouse to find his injuries being mended, including a cast on his leg and a steel plate in his head to heal his fractured skull. One of the group, teenager and ex-mechanic Mona Vasquez, introduces herself, and tells Cosmo about the other two: Stefan Bashkir, another teen, who used to be a cop before an accident killed his mother and almost killed him; and Lucien Bonn, nicknamed Ditto due to his habit of repeating what people say. Bonn had gene-splicing experiments performed on him as a baby to produce a "super-human"; however, these experiments did nothing except stunt his growth, making Ditto appear six in spite of his true age of twenty-eight. Mona reveals that the creatures, called Parasites, can only be seen after near-death experiences or severe trauma; Stefan can see them from his accident as a policeman, Mona can see them from a car crash in which Stefan saved her after her gang left her for dead, and Ditto can see them as a result of the gene-splicing experiments. Their group, the eponymous Supernaturalists, attempts to save people from the life-sucking Parasites by destroying as many of the blue creatures as possible. Cosmo is left to recover and is eventually included in their group after proving his worth by saving Mona.
One night, the Supernatural |
https://en.wikipedia.org/wiki/DOS%20extender | A DOS extender is a computer software program running under DOS that enables software to run in a protected mode environment even though the host operating system is only capable of operating in real mode.
DOS extenders were initially developed in the 1980s following the introduction of the Intel 80286 processor (and later expanded upon with the Intel 80386), to cope with the memory limitations of DOS.
DOS extender operation
A DOS extender is a program that "extends" DOS so that programs running in protected mode can transparently interface with the underlying DOS API. This was necessary because many of the functions provided by DOS require 16-bit segment and offset addresses pointing to memory locations within the first 640 kilobytes of memory. Protected mode, however, uses an incompatible addressing method where the segment registers (now called selectors) are used to point to an entry in the Global Descriptor Table which describes the characteristics of the segment. The two methods of addressing are mutually exclusive, with the processor having to make costly switches to real (or V86) mode to service non-protected mode requests.
In addition to setting up the environment and loading the actual program to be executed, the DOS extender also provides (amongst other things) a translation layer that maintains buffers allocated below the 1 MB real mode memory barrier. These buffers are used to transfer data between the underlying real mode operating system and the protected mode program. Since switching between real/V86 mode and protected mode is a relatively time consuming operation, the extender attempts to minimize the number of switches by duplicating the functionality of many real mode operations within its own protected mode environment. As DOS uses interrupts extensively for communication between the operating system and user level software, DOS extenders intercept many of the common hardware (e.g. the real-time clock and keyboard controller) and software (e.g. DOS itself and the mouse API) interrupts. Some extenders also handle other common interrupt functions, such as video BIOS routines.
Essentially, a DOS extender is like a miniature operating system, handling much of the functionality of the underlying operating system itself.
Development history
The DOS extender was arguably invented by Phar Lap, but it was Tenberry Software's (formerly Rational Systems) 386 extender DOS/4GW that brought protected mode DOS programs to a mass market. Included with Watcom's C, C++, and Fortran compilers for 386 class processors, it soon became a ubiquitous mainstay of PC applications and games such as id Software's successful Doom.
While initially it was the memory-hungry business applications that drove the development of DOS extenders, it would be PC games that truly brought them into the spotlight. As a result of the development of DOS extenders, two new software interfaces were created to take care of the many potential conflicts that could a |
https://en.wikipedia.org/wiki/Apricot%20Computers | Apricot Computers was a British electronic company that produced desktop personal computers in the mid-1980s.
Overview
Apricot Computers was a British manufacturer of business personal computers, founded in 1965 as "Applied Computer Techniques" (ACT), later changing its name to Apricot Computers, Ltd. It was a wholly owned UK company, until it was acquired in the early 1990s by the Mitsubishi Electric Corporation. It was hoped that this acquisition would help them compete against Japanese PC manufacturers, in particular NEC, which commanded over 50% of the Japanese market at the time. Mitsubishi eventually shut down the Apricot brand, with a management buyout that resulted in a new company Network Si UK Ltd being formed. In 2008, a new, independent Apricot company was launched in the UK.
Apricot was an innovative computer hardware company, whose Birmingham R&D centre had the capacity to build every aspect of a personal computer except for the integrated circuits (chips) themselves; from custom BIOS and system-level programming to the silk-screen of motherboards and metal-bending for internal chassis all the way to radio-frequency testing of a finished system.
This manufacturing capability, coupled with a smart and aggressive engineering team, allowed Apricot to be the first company in the world with several technical innovations that includes the first commercial shipment of an all-in-one system with a 3.5-inch floppy drive (ahead of Apple). In the early 1990's, they also manufactured one of the world's most secure x86-based PCs, which was sold exclusively to the UK government.
Their technical innovation led them down some paths which were technically advanced but proved to be highly disadvantageous in the marketplace. For example, when IBM abandoned their ill-fated but technically superior Micro Channel Architecture (MCA), Apricot was the only other OEM using it, in their Apricot Qi and VX FT ranges of PCs. This left the company at a technical dead-end without the financial or market power which helped IBM survive the failure of MCA.
Apricot continued to experiment with unusual form-factors in a market dominated by standardised 'beige boxes'. They produced a range of high-availability servers (the VX and Shogun ranges) with integrated uninterruptible power supply (UPS), low-profile 'LANStation', PCs specifically designed for use on office networks and diskless workstations booted over the network.
This long-running pattern of tenaciously investing in technical innovation and complete end-to-end system design and manufacture created technically excellent computers, but meant that Apricot was slow to adapt as the global market grew and changed.
By the mid-1990s major PC OEMs such as Compaq and Hewlett-Packard were outsourcing their own complete end-to-end system design and manufacture to Original Design Manufacturers (ODMs) based in Taiwan, and were moving at least some of their manufacturing to cheaper locations overseas.
Apricot was ver |
https://en.wikipedia.org/wiki/Phar%20Lap%20Software | Phar Lap Software, Inc., was a software company specializing in software development tools for DOS operating systems. The company was named after the champion New Zealand racehorse Phar Lap. They were most noted for their software allowing developers to access memory beyond the 640 KiB limit of DOS (DOS extenders) and were an author of the VCPI standard.
Phar Lap Software, Inc. was founded in April 1986 by Richard M. Smith, Robert Moote, and John M. Benfatto. Their first major success, 386|DOS-Extender, a 32-bit protected mode development tool, was released in November 1986.
Phar Lap’s product line was expanded to include 386|VMM, a virtual memory add-in driver, LinkLoc, a linker-locator for embedded development; cross tools for embedded development; and 286|DOS-Extender, a DOS extender that emulated an OS/2 environment, complete with the OS/2 API and protected mode, in contrast with Microsoft's OS/2 API emulation, which ran OS/2 applications in real mode and only supported a subset of the OS/2 API, called the Family API. Therefore, it was often bound with existing OS/2 applications, replacing Microsoft's OS/2 API emulation for those applications that needed access to extended memory in DOS. Later on the TNT DOS extender was created, which was a version of 386|DOS-Extender that emulated the Win32 environment, complete with flat address space and threading. Again this DOS extender was often bound to existing Win32 applications. MASM 6.1 and the 16-bit version of the Visual C++ 1.0 compiler were Win32 applications written for a beta version of Windows NT that was bound with the TNT DOS Extender. The Win32 executables referenced functions such as RtlExAllocateHeap in ntdll.dll, which did not exist in the final ntdll.dll, so if Windows even allowed you to run it (with a MajorSubsystemVersion of 3 it doesn't allow it in modern Windows), you would get an error about that function not being found. But a utility called Beta2Fix.exe could be run, which replaced the referenced to ntdll.dll to beta2.dll, then if you put the (provided) beta2.dll in your path, it would implement those old functions as calls to the new somewhat-equivalent new functions such as RtlAllocateHeap. This was fixed in MASM 6.11 and Visual C++ 1.5.
Phar Lap developed the Virtual Control Program Interface (VCPI) specification in cooperation with Quarterdeck Office Systems, who produced the DESQview task-switching software. Phar Lap was also a member of the 12-firm committee that designed the DOS Protected Mode Interface (DPMI). VCPI and DPMI are industry standards allowing DOS extenders to co-exist with expanded memory (EMS) emulators and multi-tasking environments.
Phar Lap received several major PC industry awards for VCPI, 386|DOS-Extender, and 286|DOS-Extender.
32-bit Windows applications could directly address all the memory the personal computer hardware would support, so memory extenders were no longer needed.
Phar Lap is now part of IntervalZero, formerly Ardence, which p |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.