source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/Derived%20type
In computer science, derived type can mean: a composite data type, one built out of other types a subtype a derived class
https://en.wikipedia.org/wiki/ATM%20Adaptation%20Layer%205
ATM Adaptation Layer 5 (AAL5) is an ATM adaptation layer used to send variable-length packets up to 65,535 octets in size across an Asynchronous Transfer Mode (ATM) network. Unlike most network frames, which place control information in the header, AAL5 places control information in an 8-octet trailer at the end of the packet. The AAL5 trailer contains a 16-bit length field, a 32-bit cyclic redundancy check (CRC) and two 8-bit fields labeled UU and CPI that are currently unused. Each AAL5 packet is divided into an integral number of ATM cells and reassembled into a packet before delivery to the receiving host. This process is known as Segmentation and Reassembly (see below). The last cell contains padding to ensure that the entire packet is a multiple of 48 octets long. The final cell contains up to 40 octets of data, followed by padding bytes and the 8-octet trailer. In other words, AAL5 places the trailer in the last 8 octets of the final cell where it can be found without knowing the length of the packet; the final cell is identified by a bit in the ATM header (see below), and the trailer is always in the last 8 octets of that cell. Convergence, segmentation, and reassembly When an application sends data over an ATM connection using AAL5, the host delivers a block of data to the AAL5 interface. AAL5 generates a trailer, divides the information into 48-octet pieces, and transfers each piece across the ATM network in a single cell. On the receiving end of the connection, AAL5 reassembles incoming cells into a packet, checks the CRC to ensure that all pieces arrived correctly, and passes the resulting block of data to the host software. The process of dividing a block of data into cells and regrouping them is known as ATM segmentation and reassembly (SAR). By separating the functions of segmentation and reassembly from cell transport, AAL5 follows the layering principle. The ATM cell transfer layer is classified as "machine-to-machine" because the layering principle applies from one machine to the next (e.g., between a host and a switch or between two switches). The AAL5 layer is classified as "end-to-end" because the layering principle applies from the source to the destination - AAL5 presents the receiving software with data in exactly the same size blocks as the application passed to the AAL5 on the sending end. The AAL5 on the receiving side knows how many cells comprise a packet because the sending AAL5 uses the low-order bit of the "PAYLOAD TYPE" field of the ATM cell header to mark the final cell in a packet. This final cell header can be thought of as an "end-to-end bit". Thus, the receiving AAL5 collects incoming cells until it finds one with an end-of-packet bit set. ATM standards use the term "convergence" to describe mechanisms that recognize the end of a packet. Although AAL5 uses a single bit in the cell header for convergence, other ATM adaptation layer protocols are free to use other convergence mechanisms. Packet type and
https://en.wikipedia.org/wiki/Computer-integrated%20manufacturing
Computer-integrated manufacturing (CIM) is the manufacturing approach of using computers to control the entire production process. This integration allows individual processes to exchange information with each part. Manufacturing can be faster and less error-prone by the integration of computers. Typically CIM relies on closed-loop control processes based on real-time input from sensors. It is also known as flexible design and manufacturing. Overview Computer-integrated manufacturing is used in automotive, aviation, space, and ship building industries. The term "computer-integrated manufacturing" is both a method of manufacturing and the name of a computer-automated system in which individual engineering, production, marketing, and support functions of a manufacturing enterprise are organized. In a CIM system functional areas such as design, analysis, planning, purchasing, cost accounting, inventory control, and distribution are linked through the computer with factory floor functions such as materials handling and management, providing direct control and monitoring of all the operation. CIM is an example of the implementation of information and communication technologies (ICTs) in manufacturing. CIM implies that there are at least two computers exchanging information, e.g. the controller of an arm robot and a micro-controller. CIM is most useful where a high level of ICT is used in the company or facility, such as CAD/CAM systems, and the availability of process planning and its data. History The idea of "digital manufacturing" became prominent in the early 1970s, with the release of Dr. Joseph Harrington's book, Computer Integrated Manufacturing. However, it was not until 1984 when computer-integrated manufacturing began to be developed and promoted by machine tool manufacturers and the Computer and Automated Systems Association and Society of Manufacturing Engineers (CASA/SME). "CIM is the integration of total manufacturing enterprise by using integrated systems and data communication coupled with new managerial philosophies that improve organizational and personnel efficiency." ERHUM In a literature research was shown that 37 different concepts of CIM were published, most of them from Germany and USA. In a timeline of the 37 publications it is possible to see how the CIM concept developed over time. Also it is quite markable how different the concepts of all publications are. Topics Key challenges There are three major challenges to development of a smoothly operating computer-integrated manufacturing system: Integration of components from different suppliers: When different machines, such as CNC, conveyors and robots, are using different communications protocols (In the case of AGVs, even differing lengths of time for charging the batteries) may cause problems. Data integrity: The higher the degree of automation, the more critical is the integrity of the data used to control the machines. While the CIM system saves on lab
https://en.wikipedia.org/wiki/Matlock%20Bath%20railway%20station
Matlock Bath railway station is a Grade II listed railway station owned by Network Rail and managed by East Midlands Railway. It is located in the village of Matlock Bath in Derbyshire, England. The station is unmanned by rail staff and is located on the Derwent Valley Line, north of Derby towards Matlock. History Opened by the Manchester, Buxton, Matlock and Midland Junction Railway on 4 June 1849, the station closed on 6 March 1967, and reopened on 27 May 1972. In recent times the usage of the station has increased; for example in the year 1 April 2009 to 31 March 2010 journeys increased by 62%. The station buildings have an unusual 'chalet' style, inspired by the romantic notion at the time that the resort was England's Little Switzerland. The Heights of Abraham cable car runs from near the station up to the Heights of Abraham visitor attraction. The station buildings have been occupied by Derbyshire Wildlife Trust since the 1980s and were restored in period-style and opened as a cafe/visitor centre in 2019 after a grant from the National Lottery Heritage Fund, with additional support from Derbyshire Dales and Derbyshire County councils, and other donations. Stationmasters David Ritchie ca. 1849 ca. 1853 Robert Skirrow ca. 1857 - 1860 W. Jordan 1860 - 1861 William Rich 1861 - ca. 1864 Charles Ward ca. 1870 - 1885 William Richardson 1885 - 1898 (afterwards station master at Buxton) Albert C. Bilham 1898 - 1907 (formerly station master at Bakewell) Frank Porter 1907 - ???? (formerly station master at Bakewell) Henry Lovatt ca. 1911 - 1914 John Allen 1914 - 1923 William Edward Parsons 1923 - 1931 (formerly station master at Duffield) George White 1931 - 1947 William Rosling 1947 - 1968 Services All services at Matlock Bath are operated by East Midlands Railway. On weekdays the station is served by one train per hour in each direction between and , with around half the services originating or ending in . Saturdays also have an hourly service but all the trains originate or end in Derby. On Sundays, there is a two-hourly service between Matlock and Nottingham in the morning, with services increasing to hourly from mid-afternoon onwards. Services are formed using diesel multiple units of Classes 156, 158 or 170, Public safety issues In October 2015 Network Rail released CCTV footage showing members of the public taking selfie photographs on the main crossing over the tracks at the station. Network Rail issued a safety warning asserting the railways were not for taking photographs on and that trains can appear without warning. Network Rail said it was releasing the footage to highlight the dangerous practices, particularly involving children on the railway line. The crossing has since been closed to the public. See also Listed buildings in Matlock Bath References External links National Railway Museum - Matlock Bath station, 1903 Derwent Valley Line Community Rail Partnership Derwent Valley Line East Midlands Trains Community
https://en.wikipedia.org/wiki/Matlock%20railway%20station
Matlock railway station is owned by Network Rail and managed by East Midlands Railway; it serves the Derbyshire Dales town of Matlock, Derbyshire, England. The station is the terminus of both the Derwent Valley Line from and Peak Rail who operate heritage services to . Both lines are formed from portions of the Midland Railway's former main line to . Through running is technically possible but is not done in normal service. History Originally called Matlock Bridge, it was opened by the Manchester, Buxton, Matlock and Midland Junction Railway. The station saw its first passengers on 4 June 1849, when the line between Ambergate and Rowsley opened. The station buildings, designed by Sir Joseph Paxton, opened in 1850. The station master's house is now grade 2 listed. Leaving , the line immediately passes into the series of High Tor tunnels, , and long on the east side of the river, cut into the cliff side. Crossing the river and the main A6 road, the line passes through Holt Lane Tunnel () before entering Matlock station. Being cut through limestone, these tunnels have required a deal of maintenance over the years. A double-track railway line used to continue from Matlock via Bakewell and , with a branch to , and on through Peak Forest to Chinley and ultimately Manchester. This section of the former Midland Railway's main line to was closed to passengers in 1968, as a consequence of the Beeching cuts and the electrification of the West Coast route from London Euston to Manchester. The last day of operation beyond Matlock was Saturday 29 June 1968, two months before regular mainline steam was fully abolished. Stationmasters Benjamin Broadhurst 1849- 1869 J.H. Thacker Henry George Towle ???? - 1876 John Ashton 1876 - 1903 (formerly station master at Codnor Park and Ironville) Joseph Henry Clarke 1903 - 1911 (formerly station master at Millers Dale) Harry l’Anson 1911 - 1922 (formerly station master at Bakewell) John Thomas Austin 1922 - 1928 (formerly station master at Lancaster) Ernest Shadwell 1928 - 1936 George Washington 1936 - 1942 (afterwards station master at East Ham) P.B. Crowther 1942 - ???? (formerly station master at Cheadle Heath) Recent history Part of the route north of Matlock is now preserved as a heritage railway by the railway preservation group Peak Rail. At present, the heritage line operates for a distance of a little under from through and nearby and terminates at Matlock station in the former down platform, interchanging there with rail services on the Derwent Valley Line. Before 2004, former train operating company Midland Mainline ran through services into London St Pancras, whilst Central Trains ran some trains to/from . A period of through running to/from via began in late 2008 and, from May 2015, most weekday trains ran to/from via Derby and Nottingham. Weekend services continued to start/end at Nottingham for another year but, from May 2016, most Saturday services were extended to Newark Castle, lea
https://en.wikipedia.org/wiki/Oracle%20Application%20Development%20Framework
In computing, Oracle Application Development Framework, usually called Oracle ADF, provides a Java framework for building enterprise applications. It provides visual and declarative approaches to Java EE development. It supports rapid application development based on ready-to-use design patterns, metadata-driven and visual tools. Supported technologies Based on the MVC architecture. Oracle ADF can support any combination of the following: Model Web Services - both SOAP and REST TopLink - and EclipseLink JavaBeans POJO - simple Java classes (Plain Old Java Objects) ADF Business components(entity object, view object) Portlets CSV and XML files SQL Queries Controller JavaServer Faces (JSF) ADF Task Flows - extension of the JSF controller layer that adds complete process flow and reusability aspects. Struts Jspx (JavaServer Pages, XML compliant variation of the JSP standard) View Swing JavaServer Pages (JSP) JavaServer Faces (JSF) ADF Faces - an Oracle implementation of JavaServer Faces Facelets ADF Mobile browser - based on Apache Trinidad Excel through ADF desktop integration The Oracle JDeveloper free Integrated Development Environment provides a graphical interface for creating data-management applications using ADF. Oracle also offers Eclipse based tooling for ADF in Oracle Enterprise Pack For Eclipse. Implementers can deploy Oracle ADF applications on Java EE-compliant containers. Oracle WebLogic and IBM WebSphere are officially supported. Users of the free ADF Essentials edition can buy support for these applications on GlassFish. History Oracle Corporation has marketed parts of Oracle ADF since 1999 — specifically ADF Business Components — then known as "JBO" and later as "BC4J" ("Business Components for Java"). The ADF architecture with the generic model/binding layer was introduced with JDeveloper 9.0.5. In June 2006 Oracle Corporation donated the ADF Faces component library to Apache Trinidad. (ADF Faces, Oracle's JSF implementation, includes over 100 components.) In September 2012 Oracle introduced a free version of the core Oracle ADF technologies under the name "Oracle ADF Essentials". For more information, see http://www.oracle.com/technetwork/developer-tools/adf/overview/components-1844931.html. Licensing Oracle ADF Essentials is a free to develop and deploy packaging of the key core technologies of Oracle ADF. See the license terms for Oracle ADF Essentials: http://www.oracle.com/technetwork/licenses/adf-essentials-license-1837221.html For the "full" Oracle ADF: The Oracle Application Server licence includes a component for a license fee for Oracle ADF. This means that all users who have purchased an Oracle Application Server licence may use Oracle ADF for free. Users who want to deploy ADF to a third-party application-server can purchase an ADF runtime license at their local Oracle sales office. Users can develop and test Oracle ADF applications free of charge exclusively within Oracle JDeveloper
https://en.wikipedia.org/wiki/Future-Drama
"Future-Drama" is the fifteenth episode of the sixteenth season of the American animated television series The Simpsons. The 350th episode overall, it originally aired on the Fox network in the United States on April 17, 2005. In the episode, Bart and Lisa stumble into Professor Frink's basement, and he gives them a look into their future as teenagers getting ready for their high school graduation. Matt Selman wrote the episode, and Mike B. Anderson served as director. Amy Poehler and John DiMaggio guest-starred as the characters of Jenda and Bender, respectively. Plot In the midst of one of their arguments, Bart and Lisa fall into Professor Frink's basement. Frink uses an astrology-based machine to show the kids their future as teenagers. Eight years in the future (2013), Bart and Lisa are getting ready for their high school graduation and Homer and Marge have separated after Homer blew the family savings on an undersea home. Lisa is graduating two years early and has a scholarship to Yale University, while dating a muscular Milhouse and Bart dates a skateboarder named Jenda. He also shows them a picture of Lisa at age 12 (2009) after she was saved by Milhouse from a fire, which she later learns that he started. After the prom, Jenda wants to have sex with Bart, but Bart has no plans for the future and wants Jenda to marry him and live an aimless life, so she breaks up with him. Bart unsuccessfully seeks advice from Homer on dating. He then shows Lisa a hologram of the prom, and tells her love can be painful; she agrees, noting she broke up with Milhouse and he had an Incredible Hulk-style meltdown. Lisa suggests that to get Jenda back, he must show her he can provide for her. Bart decides to take Lisa's advice and gets a job at the Kwik-E-Mart. While delivering groceries to Mr. Burns, he rescues him from a robbery by Snake Jailbird. As a reward, Burns gives Lisa's scholarship to Bart. He accepts it, seeing it as a way to get Jenda back. He then tells Lisa about the scholarship causing present and future Lisa to both get angry at Bart. Bart reconciles with Jenda, and now has a good future. That night, Jenda again wants to have sex with Bart, but then he goes into Professor Frink's basement and sees Lisa's bleak future with Milhouse on Frink's machine. Jenda is furious at Bart (she notes she never had any problems sparking romance with Todd Flanders), and gives him an ultimatum: leave and they are finished. Bart does head out and saves Lisa from accepting Milhouse's dismal proposal, then tells his sister he is giving her scholarship back and will find a woman who loves him for himself. Professor Frink then tells present Bart he will get one at age 83, then die one minute later, and his brain would be buried in a pauper's grave. Meanwhile, Marge has dumped Krusty and reunites with Homer in the underwater home. During the credits, Bart is shown to find the sequence boring, and instead watches Cletus Spuckler's future as the Vice President of t
https://en.wikipedia.org/wiki/TippingPoint
TippingPoint Technologies was an American computer hardware and software company active between 1999 and 2015. Its focus was on network security products, particularly intrusion prevention systems for networks. In 2015, it was acquired by Trend Micro. History The company was founded in January 1999 under the name Shbang! in Texas. Its co-founders were John F. McHale, Kent A. Savage (first chief executive), and Kenneth A. Kalinoski. Its business was to develop and sell Internet appliances. In May 1999, the company changed its name to Netpliance and in November they released the i-Opener, a low-cost computer intended for browsing the World Wide Web. The hardware was sold at a loss, and costs were recouped through a subscription service plan. When the device was found to be easily modded to avoid the service plan, Netpliance changed the terms of sale to charge a termination fee. In 2001, the Federal Trade Commission fined the company $100,000 for inaccurate advertising and unfair billing of customers. In 2002, the company discontinued operations of its internet appliance business and renamed itself TippingPoint. CEO Savage was replaced by chairman of the board McHale. McHale stepped down in 2004, but remained chairman of the board. The position was filled by Kip McClanahan, former CEO of BroadJump. In January 2005, TippingPoint was acquired by the network equipment company 3Com for $442 million, operating as a division of 3Com led by James Hamilton (TippingPoint President), later replaced by Alan Kessler. 3Com itself was subsequently acquired by computer manufacturer Hewlett-Packard in April 2010 for approximately $2.7 billion. On Oct 21, 2015, TippingPoint was acquired by Trend Micro for approximately $300 million. Technology The TippingPoint NGIPS is a network Intrusion Prevention System (IPS) deals with IT threat protection. It combines application-level security with user awareness and inbound/outbound messaging inspection capabilities, to protect the user's applications, network, and data from threats. In September 2013, HP announced that it entered the next-generation firewall market with a new line of TippingPoint firewalls. The line extends TippingPoint's existing IPS appliances with traditional stateful packet filtering and application control. References Notes http://www.crn.com/news/security/300078537/trend-micro-to-acquire-hp-tippingpoint-for-300m.htm External links TippingPoint Website SEC search on netpliance American companies established in 1999 American companies disestablished in 2015 Companies based in Austin, Texas Database security Hewlett-Packard acquisitions HP software Static program analysis tools Defunct computer companies based in California Defunct software companies of the United States Software companies established in 1999 Software companies disestablished in 2015 2015 mergers and acquisitions Defunct computer companies of the United States
https://en.wikipedia.org/wiki/David%20Bader%20%28computer%20scientist%29
David A. Bader (born May 4, 1969) is a Distinguished Professor and Director of the Institute for Data Science at the New Jersey Institute of Technology. Previously, he served as the Chair of the Georgia Institute of Technology School of Computational Science & Engineering, where he was also a founding professor, and the executive director of High-Performance Computing at the Georgia Tech College of Computing. In 2007, he was named the first director of the Sony Toshiba IBM Center of Competence for the Cell Processor at Georgia Tech. Bader has served on the Computing Research Association's board of directors, the National Science Foundation's advisory committee on cyberinfrastructure, and on IEEE Computer Society's board of governors. He is an expert in the design and analysis of parallel and multicore algorithms for real-world applications such as those in cybersecurity and computational biology. His main areas of research are at the intersection of high-performance computing and real-world applications, including cybersecurity, massive-scale analytics, and computational genomics. Bader built the first Linux supercomputer using commodity processors and a high-speed interconnection network. Bader is an IEEE Fellow, an AAAS Fellow, SIAM Fellow, and an ACM Fellow. He has won awards from IBM, Microsoft Research, Nvidia, Facebook, Intel, Accenture, and Sony. He has served on numerous conference program committees related to parallel processing and has edited numerous journals. In 2018, Bader was recognized as one of the most impactful authors in the history of the IEEE International Conference on High-Performance Computing, Data, and Analytics (HiPC). Early life and education Bader is the son of chemistry professor Morris Bader and his wife Karen. He is an Eagle Scout in the Boy Scouts of America, earning the rank in 1985. Bader graduated from Liberty High School in Bethlehem, Pennsylvania in 1987. He received a B.S. in computer engineering in 1990 and an M.S. in electrical engineering in 1991 from Lehigh University in Bethlehem, Pennsylvania. He then received a Ph.D. in electrical engineering in 1996 from the University of Maryland, College Park. While at UMD in 1992, Bader was awarded a NASA Graduate Student Researchers Fellowship by Gerald Soffen, project scientist for the Viking missions to Mars, at Goddard Space Flight Center. Career Bader was hired as an assistant professor and Regents' Lecturer in the electrical and computer engineering department at the University of New Mexico (UNM) in 1998. In 2003, he was elected chair of the IEEE Computer Society's technical committee on parallel processing. Bader remained at UNM until 2005, when he accepted a position with the College of Computing at Georgia Tech. Shortly after arriving at Georgia Tech, Bader began working, along with several other faculty members, to establish a School of Computational Science and Engineering at Georgia Tech. Two years later, in 2007, these efforts resulted in
https://en.wikipedia.org/wiki/List%20of%20African%20countries%20by%20population
This is a list of the current 55 African countries sorted by population, which is sorted by normalized demographic projections from the most recently available census or demographic data. Africa is the fastest growing continent, currently increasing by 2.35% per year as of 2021. Africa is also the youngest continent, as 60% of Africa is 24 years of age or younger. This list also includes the partially recognized country Sahrawi Arab Democratic Republic, commonly known as Western Sahara, which is a member of the African Union. Table See also Demographics of Africa List of African countries by area List of African countries by life expectancy Notes References African Countries, population Demographics of Africa Population Lists of countries by continent
https://en.wikipedia.org/wiki/Object-based%20language
The term object-based language may be used in a technical sense to describe any programming language that uses the idea of encapsulating state and operations inside objects. Object-based languages need not support inheritance or subtyping, but those that do are also termed object-oriented. Object-based languages that do not support inheritance or subtyping are usually not considered to be true object-oriented languages. Examples of object-oriented languages, in rough chronological order, include Simula, Smalltalk, C++ (which object model is based on Simula's), Objective-C (which object model is based on Smalltalk's), Eiffel, Xojo (formerly REALbasic), Python, Ruby, Java, Visual Basic .NET, C#, and Fortran 2003. Examples of a language that is object-based, but not object-oriented are early versions of Ada, Visual Basic (VB), and Fortran 90. These languages all support the definition of an object as a data structure, but lack polymorphism and inheritance. In practice, the term object-based is usually applied to those object-based languages that are not also object-oriented, although all object-oriented languages are also object-based, by definition. Instead, the terms object-based and object-oriented are normally used as mutually exclusive alternatives, rather than as categories that overlap. Sometimes, the term object-based is applied to prototype-based programming languages, true object-oriented languages that lack classes, but in which objects instead inherit their code and data directly from other template objects. An example of a commonly used prototype-based scripting language is JavaScript. Both object-based and object-oriented languages (whether class-based or prototype-based) may be statically type-checked. Statically checking prototype-based languages can be difficult, because these languages often allow objects to be dynamically extended with new behavior, and even to have their parent object (from which they inherit) changed, at runtime. References Programming paradigms
https://en.wikipedia.org/wiki/Super%20SmartJoy
The Super SmartJoy is a device that allows Super NES controllers to be used with a computer. The device was announced on April 20, 2004. This device has a USB port for connecting to both Windows PCs and Macs. SmartJoy is the manufacturer of this peripheral. Multiple devices can be used on one computer for multiplayer gaming. References External links SmartJoy company website Super RetroPort (Competing product) Unlicensed Nintendo hardware Super Nintendo Entertainment System accessories
https://en.wikipedia.org/wiki/CTV
CTV may refer to: Television Connected TV, or Smart TV, a TV set with integrated internet North America and South America CTV Television Network, a Canadian television network owned by Bell Media CTV 2, a secondary Canadian television network owned by Bell Media CTV Atlantic, a system of four television stations in the Canadian Maritime provinces CTV Comedy Channel CTV Drama Channel CTVglobemedia, now owned by Canadian telecom giant Bell Canada as Bell Media CTV Life Channel CTV News CTV News Channel (Canadian TV channel) CTV Sci-Fi Channel C TV, a Trinidad and Tobago broadcast television station Citizens Television, an American public access network in Connecticut CTV: The Comedy Network, former name of Comedy Central, an American television channel Asia China Television, a Taiwanese television company, established 1968 CTV Main Channel CTV News Channel (Taiwan) CTV Classic CTV (Japan) or Chūkyō Television Broadcasting, a television station in Nagoya, Japan Commercial Television (Hong Kong TV station), a defunct television station in Hong Kong CTV Banten, a television station in Indonesia Europe ITV Channel Television, an ITV region for the Channel Islands CTV (Bath), the University of Bath's student television station, "Campus TV" CTV (pay television), a defunct analogue satellite television platform in Scandinavia Vatican Television Center (Centro Televisivo Vaticano), the Vatican's TV channel ČTV, a former channel of Česká televize, Czech Republic Africa CTV (Egyptian TV channel), the official Coptic Orthodox TV station broadcasting in Arabic Cape Town TV, a South African television station Australasia Canterbury Television, a New Zealand television station CTV Building, a building that collapsed during the 2011 Christchurch earthquake CTV 41 Bendigo, a former Australian community television station in Bendigo Other uses Citrus tristeza virus, a viral species that causes disease in citrus plants Combat Tactical Vehicle (Technology Demonstrator) Confederación de Trabajadores de Venezuela, a federation of labor unions in Venezuela Corpo Truppe Volontarie, the Italian expeditionary force in the Spanish Civil War Gorgon (missile family), CTV-4 and CTV-₰6 See also CCTV (disambiguation) CTV Building (disambiguation) Color television ITV Central (previously Central Independent Television), an ITV region for the English West Midlands
https://en.wikipedia.org/wiki/CYCLADES
The CYCLADES computer network () was a French research network created in the early 1970s. It was one of the pioneering networks experimenting with the concept of packet switching and, unlike the ARPANET, was explicitly designed to facilitate internetworking. The CYCLADES network was the first to make the hosts responsible for the reliable delivery of data, rather than this being a centralized service of the network itself. Datagrams were exchanged on the network using transport protocols that do not guarantee reliable delivery, but only attempt best-effort. To empower the network leaves the hosts to perform error-correction, the network ensured end-to-end protocol transparency, a concept later to be known as the end-to-end principle. This simplified network design, reduced network latency, and reduced the opportunities for single point failures. The experience with these concepts led to the design of key features of the Internet Protocol in the ARPANET project. The network was sponsored by the French government, through the Institut de Recherche en lnformatique et en Automatique (IRIA), the national research laboratory for computer science in France, now known as Inria, which served as the co-ordinating agency. Several French computer manufacturers, research institutes and universities contributed to the effort. CYCLADES was designed and directed by Louis Pouzin. Conception and deployment Planning for the project began in 1971. Design and staffing started in 1972, and November 1973 saw the first demonstration, using three hosts and one packet switch. Pouzin coined the term catenet in 1973, in a note circulated to the International Networking Working Group, to describe a system of packet-switched communication networks interconnected via gateways. He later published these ideas in a 1974 paper "A Proposal for Interconnecting Packet Switching Networks". Deployment of the network continued in 1974, with three packet switches installed by February, although at that point the network was only operational for three hours each day. By June the network was up to seven switches, and was available throughout the day for experimental use. A terminal concentrator was also developed that year, since time-sharing was still a prevalent mode of computer use. In 1975, the network shrank slightly due to budgetary constraints, but the setback was only temporary. At that point, the network provided remote login, remote batch and file transfer user application services. By 1976 the network was in full deployment, eventually numbering 20 nodes with connections to NPL in London, ESA in Rome, and to the European Informatics Network (EIN). Technical details CYCLADES used a layered architecture, which was adopted in the Internet. The basic packet transmission like function, named CIGALE, was novel; it provided an unreliable datagram service (the word was coined by Louis Pouzin by combining data and telegram). Since the packet switches no longer had to ensure corr
https://en.wikipedia.org/wiki/FOP
Fop is a pejorative term for a foolish man. FOP or fop may also refer to: Science and technology Feature-oriented positioning, in scanning microscopy Feature-oriented programming, in computer science, software product lines Fibrodysplasia ossificans progressiva, a connective tissue disease which can result in muscles fusing into bone Formatting Objects Processor, a Java application fop herbicides, the aryloxyphenoxypropionate subtype of ACCase inhibitors Other uses The Fairly OddParents, an American television series Fellowship of Presbyterians, now The Fellowship Community, a Christian movement in the United States Festival of Praise, a music festival in Singapore Flowery orange pekoe, a grade of tea leaf Fop Smit (1777–1866), Dutch naval architect and shipbuilder Fraternal Order of Police, an American police organization Fred. Olsen Production, a Norwegian gas and oil company Freedom of panorama, a concept in copyright law Morris Army Airfield, in Georgia, United States FOP grade tea Federation of Planets, from Star Trek
https://en.wikipedia.org/wiki/FX%20Movie%20Channel
FX Movie Channel (FXM) is an American pay television channel owned by FX Networks, LLC, a subsidiary of the Disney Entertainment business segment and division of The Walt Disney Company. It is the sister channel of FX and FXX. The channel's programming consists largely of movies, primarily those from the 20th Century Studios, Twentieth Century Pictures, and Fox Film Corporation library. Since 2013, FXM has separated its film content into two distinct blocks. Its main programming focuses more on recent films and its early-morning and daytime schedule (branded as "FXM Retro") focuses on classic films. As of September 2018, FXM is available to approximately 57,802,000 pay television households (45.2% of households with television) in the United States. History fXM: Movies from Fox (1994–2000) Originally intended to be titled "Fox Movie Studio" during the planning stages, the channel first launched at midnight on October 31, 1994 as fXM: Movies from Fox, a name derived from its sister cable channel FX, which debuted five months earlier on June 1. The first movie to air on fXM was the 1975 cult classic The Rocky Horror Picture Show. Its original format focused solely on classic movies from the 20th Century Fox film library, which were presented commercial-free and (in regard to films originally released in black-and-white) uncolorized, and were generally shown without editing for content and time; the films that were broadcast were mainly releases from the 1920s to the 1980s. On February 7, 1997, FXM aired its first film production commissions of six under 12-minute films in a showcase hosted by producer-director Michael Apted. Two, Better Late (directed by Jessica Yu) and 78 (helmed by Noah Edelson), would initially premiere at the Sundance Film Festival. Fox Movie Channel (2000–2014) The channel officially changed its name to Fox Movie Channel on March 1, 2000. On January 1, 2012, Fox Movie Channel's programming was divided into two 12-hour blocks: its main programming schedule, from 3:00 a.m. to 3:00 p.m. Eastern Time, was a commercial-free block retaining the older movies from the 20th Century Fox library. Another block, called FX Movie Channel, the other 12 hours consisted of an expanded slate of more recent feature films from Fox and some other film studios, including Columbia Pictures and Universal Pictures. The channel, which ran only promos for its programming as well as interstitials relating to its films, also began running traditional advertisements during the 12-hour block, which runs from the late afternoon to the early overnight hours (from 3:00 p.m. to 3:00 a.m. Eastern Time). As a result, films broadcast on the FXM block are edited to allow for commercial time, and for content. Fox Movie Channel still retained uncut and commercial-free broadcasts of its films. FXM: FX Movie Channel (2014–present) On June 9, 2014, Fox Movie Channel changed its name back to FXM. On January 1, 2015, FXM broke format for its first and only time,
https://en.wikipedia.org/wiki/Data%20stream%20mining
Data Stream Mining (also known as stream learning) is the process of extracting knowledge structures from continuous, rapid data records. A data stream is an ordered sequence of instances that in many applications of data stream mining can be read only once or a small number of times using limited computing and storage capabilities. In many data stream mining applications, the goal is to predict the class or value of new instances in the data stream given some knowledge about the class membership or values of previous instances in the data stream. Machine learning techniques can be used to learn this prediction task from labeled examples in an automated fashion. Often, concepts from the field of incremental learning are applied to cope with structural changes, on-line learning and real-time demands. In many applications, especially operating within non-stationary environments, the distribution underlying the instances or the rules underlying their labeling may change over time, i.e. the goal of the prediction, the class to be predicted or the target value to be predicted, may change over time. This problem is referred to as concept drift. Detecting concept drift is a central issue to data stream mining. Other challenges that arise when applying machine learning to streaming data include: partially and delayed labeled data, recovery from concept drifts, and temporal dependencies. Examples of data streams include computer network traffic, phone conversations, ATM transactions, web searches, and sensor data. Data stream mining can be considered a subfield of data mining, machine learning, and knowledge discovery. Software for data stream mining MOA (Massive Online Analysis): free open-source software specific for mining data streams with concept drift developed in Java. It has several machine learning algorithms (classification, regression, clustering, outlier detection and recommender systems). Also, it contains a prequential evaluation method, the EDDM concept drift methods, a reader of ARFF real datasets, and artificial stream generators as SEA concepts, STAGGER, rotating hyperplane, random tree, and random radius based functions. MOA supports bi-directional interaction with Weka (machine learning). scikit-multiflow: A machine learning framework for multi-output/multi-label and stream data implemented in Python. scikit-multiflow contains stream generators, stream learning methods for single-target and multi-target, concept drift detectors, evaluation and visualisation methods. (This software is discontinued) StreamDM: StreamDM is an open source framework for big data stream mining that uses the Spark Streaming extension of the core Spark API. One advantage of StreamDM in comparison to existing frameworks is that it directly benefits from the Spark Streaming API, which handles much of the complex problems of the underlying data sources, such as out of order data and recovery from failures. RapidMiner: commercial software for knowledge discov
https://en.wikipedia.org/wiki/Joint%20Functional%20Component%20Command%20%E2%80%93%20Network%20Warfare
The Joint Functional Component Command – Network Warfare (JFCC-NW) at Fort Meade, Maryland was a subordinate component command of United States Strategic Command (USSTRATCOM) active from 2005 to 2010. It was responsible for coordinating offensive computer network operations for the United States Department of Defense (DoD). JFCC-NW was created in 2005. It was merged into United States Cyber Command in October 2010. The Commander, JFCC-NW (currently Admiral Michael S. Rogers) is dual-hatted as the Director, National Security Agency. This coordinated approach to information operations involves two other supporting commands. The Director, Defense Information Systems Agency also heads the Joint Task Force-Global Network Operations. This organization is responsible for operating and defending U.S. worldwide information networks, a function closely aligned with the efforts of JFCC-NW. Mission JFCC-NW facilitates/facilitated cooperative engagement with other national entities in computer network defense and offensive information warfare as part of the global information operations mission. The command was responsible for the highly classified, evolving mission of Computer Network Attack (CNA). See also Joint Task Force-Global Network Operations References United States Strategic Command Net-centric Command and control in the United States Department of Defense Command and control systems of the United States military
https://en.wikipedia.org/wiki/Red%27s%20Dream
Red's Dream is a 1987 American computer-animated short film written and directed by John Lasseter and produced by Pixar. The short film, which runs four minutes, stars Red, a unicycle. Propped up in the corner of a bicycle store on a rainy night, Red dreams of a fantasy where it becomes the star of a circus. Red's Dream was Pixar's second computer-animated short following Luxo Jr. in 1986, also directed by Lasseter. Red's Dream is more strongly character driven than Luxo Jr., Pixar's previous short film. The short was designed to demonstrate new technical innovations in imagery. The short was created by employing the company's own Pixar Image Computer, but the computer's memory limitations led the animation group to abandon it for further projects. Space was growing tight at the company, and as a result, Lasseter and his team worked out of a hallway during production, where Lasseter sometimes slept for days on end. The short film premiered at the annual SIGGRAPH conference in Anaheim on July 10, 1987, and received general enthusiasm from its attendants. Red's Dream was never attached to any later Pixar feature, unlike many other early Pixar short films. The short was later released in theaters with Home on the Range in 2004. It also saw release for home video as part of Tiny Toy Stories in 1996 and Pixar Short Films Collection, Volume 1 in 2007. Plot On a rainy night in an unnamed, deserted city where no one can be seen, a red unicycle named Red is lying in the clearance corner of a bicycle shop called "Eben's Bikes". Red dreams of being the center of a circus act, which is represented within a dream sequence in which it is ridden by a circus clown named Lumpy. After cycling onstage to little fanfare, Lumpy begins a juggling act with three colored balls, which he continually drops by accident, prompting the unicycle to roll out from underneath him and catch them. Eventually, Lumpy accidentally launches one of the balls out of the ring, prompting Red to go out and retrieve it without his notice. After realizing that his unicycle is out from beneath his feet, Lumpy falls and disappears from the dream, after which Red catches the other two balls and juggles them to an uproarious applause; however, the dream ends, and Red awakens after bowing to the audience, realizing that it is still in the bike shop. Depressed, it returns to the corner where it was previously resting and becomes inanimate again. Production Red's Dream was the second short film produced by computer animation studio Pixar, following Luxo Jr., the studio's previous short film. For their next short film, which was to be presented at the 1987 SIGGRAPH convention, Ed Catmull wanted the Pixar staff to make a film that made use the Pixar Image Computer and the rendering software Chapreyes. Lasseter began to develop a story about a circus clown who is upstaged by his own unicycle, while William Reeves and Eben Ostby were simultaneously working on their own ideas; Ostby had wanted to an
https://en.wikipedia.org/wiki/Ambergate%20railway%20station
Ambergate railway station is a railway station owned by Network Rail and managed by East Midlands Railway. It serves the village of Ambergate in Derbyshire, England. The station is located on the Derwent Valley Line from Derby to Matlock, which diverges from the Midland Main Line just south of the station at Ambergate Junction. History It has a complicated history. The original station was built for the North Midland Railway in 1840, between Derby and Leeds. It was an ornate building, by Francis Thompson, which would have graced a Lord of the Manor. From Belper the line ran along the Derwent Valley, along a stretch called Broadholme, with four bridges across the river, through Longlands Tunnel, across the River Derwent and Derby road with a magnificent five-arch viaduct. It then entered Hag Wood Tunnel as turned towards the Amber Valley. The station building was just north of this tunnel. Shortly afterwards a proposal was made for an Ambergate, Nottingham, Boston and Eastern Junction Railway which however never materialised, apart from a stretch between Colwick and Grantham. From Ambergate, towards Chesterfield, the next difficulty for the North Midland Railway was the intersection with the Cromford Canal, where the line intersected with the Bullbridge Aqueduct, before it carried on through a station at Wingfield to Stretton. However, in 1849, the branch from Ambergate to Rowsley was built by the proposed Manchester, Buxton, Matlock and Midland Junction Railway, with a west to north connection between the lines at the original Ambergate Junction. When a south to west connection was made, for trains from Derby to Rowsley, in 1863 the station building was rebuilt adjacent to the new Ambergate South junction. The original bridge was also widened at its northern end to accommodate the new junction. In 1867 the Rowsley line had reached New Mills, which meant that the Midland Railway could operate from London to Manchester and Liverpool. In 1875 Ambergate to Pye Bridge Line was opened from Crich Junction near Bullbridge which ran through Butterley to Pye Bridge, near Ironville on the Erewash Valley Line. Much of its business was coal traffic from Nottinghamshire to Manchester and Liverpool, avoiding Derby. The triangular station In 1876 a loop was built passing the west side of Hag Wood Tunnel, as a diversion from the original line to a third platform, which allowed for Derby to Sheffield stopping trains. The station was completely rebuilt, with the old building remaining in use a plans store. This third and final station was the famous triangular one, reputed to be one of only three in the country. On Monday 20 March 1899 a fire broke out on the down platform for the North which destroyed 30 yards of platform, together with the booking hall, stationmaster’s office and waiting rooms. The fire brigade from Belper were summoned as well as the Midland Railway company brigade from Derby. Throughout the late 19th and early 20th centuries, Amberga
https://en.wikipedia.org/wiki/Mobile%20Homer
"Mobile Homer" is the thirteenth episode of the sixteenth season of the American animated television series The Simpsons. It was first broadcast on the Fox network in the United States on March 20, 2005. In the episode, Marge saves money for life insurance, worried about Homer after a near-fatal incident and his bad medical history. Angered by his wife's new measures to cut back financially, Homer spends the savings on a motor home, in which he spends most of his time, causing a rift between them. The episode was written by Tim Long, and was the first to be directed by Raymond S. Persi. Plot While Marge takes the children on a leisurely Sunday afternoon drive (that the kids don't enjoy), Homer is forced to clean the garage at home. He accidentally gets spiders in his throat, and his neck is almost crushed by the garage door. When his family gets home, a suffocated Homer is saved by CPR by Lisa and Bart (via wrestling). After the incident, Marge insists that the family buy life insurance, but Homer is deemed impossible to insure because of his poor medical history; even boasting that he smokes to impress the consultant, a lie that fails to convince her. After watching a melodramatic "inspired by real-life" made-for-TV film, Marge decides to save money in a very paranoid way by buying imitation brands of cereal and coffee, and convinces Maggie to conserve her pacifier. Homer, however, becomes upset with Marge's petty attitude (especially when she will not let him spend even false money to buy a single beer) and tries to argue with Marge, remarking that he has the right to use at least a part of the money since he brings it home, but she denies his request, retorting that he does nothing in his job. Homer, now angry about Marge's new measures, takes the money she has saved and makes a down payment on a new motor home. After he buys his motor home, Marge tells Homer to enjoy it because she is not speaking to him. Homer starts living in the RV, and he and Marge compete for the loyalty of Bart and Lisa. Homer's childish ways give him an advantage. Homer discovers a convoy of RVs at a gas station, and he invites them to stay in his backyard. Marge, annoyed with their behavior, cuts off their electricity, causing Homer's newfound friends to ditch him. Homer and Marge proceed to get into an all night argument, to the point of Homer calling Marge's bed "a loveless slab of bossiness", and fearing that his parents could split up, Bart decides that he and Lisa should return the RV to the dealership for a full refund, and Lisa agrees. Discovering that the children and RV are gone, Homer and Marge give chase in the car. Bart and Lisa accidentally get on the freeway and force their parents to kiss before they will pull over. But after they kiss, Bart asks Homer to raise his allowance, which angers Homer, who in turn strangles Bart. Lisa starts to lose control of the RV, which plunges off an uncompleted runaway truck ramp onto a Turkish container ship. The sh
https://en.wikipedia.org/wiki/The%20Seven-Beer%20Snitch
"The Seven-Beer Snitch" is the fourteenth episode of the sixteenth season of the American animated television series The Simpsons. It first aired on the Fox network in the United States on April 3, 2005. Plot The Simpsons go to Shelbyville to see a musical, which paints Springfielders as hicks and morons. An angry Marge goes to Springfield's Cultural Advisory Board to brainstorm a plan to make Springfield more sophisticated and gets the idea to hire architect Frank Gehry to build a concert hall. Opening night proves to be a bust, and the concert hall falls into shambles from disuse. Mr. Burns buys the hall and turns it into a state prison. Homer applies for a job as a guard, but is rejected after Otto switches his drug-laded urine sample with Homer's. Mr. Burns forces Chief Wiggum to reinstate old and forgotten laws to fill his prison with convicts and make more money. Homer is convicted after getting caught kicking a can five times down the street (which constitutes "illegally transporting litter"). Bart and Lisa notice that Snowball II has been gaining weight. Lisa follows her and discovers she has been visiting and eating food from another family, who believe she is theirs and named her "Smokey". Snowball prefers her second family to the Simpsons, to Lisa's dismay. Bart goes in to set the record straight, but instead the family fills him up with food and teaches him the same trick they taught Snowball. Homer is sent to work in the prison kitchen and becomes a prison snitch after unwittingly alerting the guards of Snake's escape attempt. Homer is rewarded with food, special treatment, and a new plasma TV. The other prisoners learn he is a snitch after Marge shouts it out in the visitation room. After using a fake claim of a prison break to lure out all the guards, the prisoners attack Homer. Using the key to the concert hall given to her as head of the Springfield Cultural Activities Board, Marge finds Homer in the kitchen with the other prisoners on his tail. They take refuge in the gas chamber, where Marge scolds Homer about being an informant. The guards come in with tear gas and riot gear. As they are released, Homer tells Governor Mary Bailey about the prison's deplorable conditions and food. Bailey tells the prisoners that since there is no room left in the prisons they were transferred from, they will be put on a garbage barge and bare-knuckle box until someone emerges as their king, a plan the convicts applaud. Homer is released, which pleases Marge, and heads out to Moe's after she falls asleep. He bumps into Snowball, who is overweight and also approaching the bar. He promises not to tell on her if she does not tell on him. Homer runs into the concert hall, claiming the building is a death trap, in response to a dream he had after watching The Towering Inferno. Production Frank Gehry guest starred in the episode of himself, becoming the first architect to appear on The Simpsons. According to Matt Chaban of The New York Observ
https://en.wikipedia.org/wiki/DCA
DCA may refer to: Computers Document Content Architecture, an IBM document standard Dynamic Channel Allocation/Assignment, in wireless networks DTS Coherent Acoustics in DTS (sound system) Military Defence Cyber Agency, a tri-service command of the Indian Armed Forces Defense Communications Agency, former name of US Defense Information Systems Agency Defensive counter air (Défense contre les aéronefs), French term for air defense Deputy Commandant for Aviation, principal advisor on all aviation matters in the United States Marine Corps Dual-capable aircraft, used in nuclear sharing Organizations California Department of Consumer Affairs Department for Constitutional Affairs of the UK government, 2003-2007 DCA Design Department of Civil Aviation (Australia) Department of Civil Aviation (Thailand) Digital Communications Associates, US company Diyanet Center of America, Lanham, Maryland Drum Corps Associates, a governing body of drum corps in North America Dundee Contemporary Arts, Scotland Namibia Directorate of Civil Aviation Christian Democracy for Autonomies, a former political party in Italy Science and technology Detrended correspondence analysis, a statistical technique Dichloroacetic acid / dichloroacetate, an organic acid Dichloroethanes, organic solvents Digitally-controlled amplifier Direct coupling analysis, a method for analyzing sequence data in computational biology Directional component analysis, a multivariate statistical technique used in the atmospheric sciences Drone congregation area, a location where bees gather to mate Television, film, and music Distributors Corporation of America, American film distribution company (1952-1959) Transportation Ronald Reagan Washington National Airport, Arlington County, Virginia, US, IATA code Dutch Caribbean Airlines, former Netherlands Antilles airline Other uses Direct corporate access, part of UK Faster Payments Service Dollar cost averaging, an investment strategy Disney California Adventure, Anaheim, California, US Debt Collection Agency, companies specialized in pursuing payments of debts
https://en.wikipedia.org/wiki/On%20a%20Clear%20Day%20I%20Can%27t%20See%20My%20Sister
"On a Clear Day I Can't See My Sister" is the eleventh episode of the sixteenth season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on March 6, 2005. A repeat of this episode also replaced the episode "The Father, the Son, and the Holy Guest Star", which was supposed to air on April 10, 2005, due to the death of Pope John Paul II 8 days earlier. Plot The students of Springfield Elementary go on a field trip to the almost completely melted Springfield Glacier. Bart repeatedly bullies Lisa because she is enjoying the trip, and as revenge, Lisa obtains a restraining order against Bart that prevents him from coming within 20 feet (6 m) of her. Lisa uses the restraining order - and a 20-foot (6 m) pole made by Homer to enforce it - to continually torment Bart, making him ride behind the school bus in a shopping cart and eat his school lunch outside in the rain, and later forcing him into the "Gay Interest" section of the library in order to humiliate him. Marge decides to get an appeal for lifting the restraining order, but Bart repeatedly insults Judge Harm during the hearing, leading Judge Harm to expand the order to 200 feet (61 m), forcing Bart to live in the Simpsons' backyard. He soon realizes that he can live the natural way, taking off his clothes, urinating anywhere he wants and playing with wild dogs. Seeing Bart's feral behavior, Marge suggests to Lisa that she may have gone too far. Lisa responds that Bart has not done any nice things for her recently, but when Marge points out two examples to the contrary, she promises to destroy the order when she thinks of a third thing. She later sees Bart building a statue of her, and is impressed, but when she finds out that it was going to be burned, and Bart lies about why, Lisa says how she misses Bart's lies. She burns the restraining order and the pole, while the family reunites and plays Tijuana Taxi. In the subplot, Homer is hired as a greeter for Sprawl-Mart, a job he likes because there is no pressure to advance. The manager creates a fake Mexican ID card for him, in order to force him to work overtime without a pay bonus under threat of being deported, and Homer and his co-workers are later locked in the superstore late at night, with a chip implanted in the back of Homer's neck. He removes it and joins his co-workers in stealing from the store by using a forklift to move several plasma televisions. Censorship Following the 2011 Tōhoku earthquake and tsunami and the associated nuclear emergency, the episode was pulled from ProSieben due to jokes about nuclear meltdowns. It was also pulled from Network 10 in Australia for a similar reason. References External links The Simpsons (season 16) episodes 2005 American television episodes
https://en.wikipedia.org/wiki/KVVU-TV
KVVU-TV (channel 5) is a television station licensed to Henderson, Nevada, United States, serving the Las Vegas area as an affiliate of the Fox network. Owned by Gray Television, the station maintains studios at the Broadcast Center on West Sunset Road in Henderson (using the 25 TV 5 Drive street address), while its transmitter is located on Black Mountain, just southeast of the city. History KVVU signed on the air on September 10, 1967, as Nevada's first independent station, under the call sign KHBV-TV. The station originally operated from a converted Flying A gas station along Boulder Highway near Sunset Road, while its offices were housed in a modern office building on Flamingo Road. The station was on the air originally from 11 a.m. to midnight and ran a schedule of movies from the '30s through the '50s, some cartoons, westerns, and a few sitcoms. Owned first by Charles Vanda, Levin-Townsend Enterprises acquired the station in 1969. In 1971, the station assumed its KVVU-TV call letters after being purchased by the Nevada Independent Broadcasting Corporation. By 1975, the station was on the air by 7 a.m. and ran a large number of movies, cartoons, more off-network sitcoms, drama shows, and some westerns. Las Vegas was still considered a small market then; in 1975, it was the 140th-largest out of 207 areas of dominant influence. Las Vegas was the smallest market to have four commercial television stations; there were still larger markets that only had two commercial stations and lacked programming from either ABC, NBC, or CBS as a result. In 1978, the station was sold to Carson Broadcasting, a company owned by talk show host and entertainer Johnny Carson, who visited the station fairly often. Under Carson's ownership, the station often ran R-rated theatrical films uncut during the late-night and early morning hours. While the afternoon (1:00 p.m.) and evening (9:00 p.m.) movies would always be different, the same film would be run uncut in the evening and aired in its censored form in the afternoon, but not on the same day. The evening movie generally reran at 1 a.m. almost every day. Films with questionable content were sometimes prefaced by a pre-recorded warning from Carson. The station's announcer from 1973 to 2001, Ralph Menard, would stretch the hourly station identification out to emphasize the market's larger city, intoning "Henderson..." neutrally, then leading into an elongated and smooth segue to "...and Laaassss Vegas!"; Menard died in 2003. Meredith Corporation bought the station from Carson Broadcasting in 1985. Upon Meredith taking control of the station, KVVU adopted a stylized "TV 5" logo borrowed from its new sister stations, KPHO-TV in Phoenix; WNEM-TV in Bay City, Michigan; KCTV in Kansas City, Missouri; and WTVH in Syracuse, New York. Channel 5 remained an independent station until October 9, 1986, when it became one of the charter affiliates of the newly launched Fox network (it was one of a very few handful of stati
https://en.wikipedia.org/wiki/MTropolis
mTropolis (pronounced "metropolis") was an open-architecture multimedia programming application aimed at enabling rapid development of multimedia titles. It was developed by mFactory (pronounced "em-factory") and introduced in 1995. It introduced object-oriented concepts such as reusable objects, modifiers and behaviors into the multimedia authoring space dominated by Macromedia's Director software. mTropolis was bought in 1997 by Quark, which moved development from Burlingame, California to Denver and then cancelled the product one year later. Despite efforts by its fervent users to attempt to save their investment and beloved tool, negotiations and even a possible purchase offer never came to fruition. History mTropolis competed in the interactive multimedia product space dominated in the 1990s by Macromedia Director. The software's maker, mFactory, founded in 1992, variously positioned mTropolis as an alternative and as an adjunct to Director. mTropolis was bought by Quark in 1997. The use of behaviors in mTropolis spurred Macromedia on to introduce behaviors in Director 6.0. I was there when Seery, Shepherd, meself and probably Greggy went over to the Mtrop user meetings. We straight out stole [behaviors] from them. - Alex Zavatone (ex Macromedia) on the Direct-L Mailing List, Tue, 9 Sep 2008 While multimedia CD-ROM authoring has largely been rendered irrelevant by online content distribution, mTropolis remains an interesting study in application design, and held a loyal following for many years. Paradigm The development environment was very different from the other tools around at the time - Apple Computer's HyperCard, Pitango Clickworks and others had a card based metaphor, and Macromedia Director had a film metaphor (the content area is called The Stage, the time line The Score, an assets library named The Cast, etc.). In mTropolis there were sections, subsections, and scenes. Assets would be placed onto the scene, and then combinations of behaviors and modifiers would be dragged onto the assets. Powerful interaction and animation could be created by making different modifiers send messages to each other, allowing a user to create something impressive fairly quickly, without any typing. There was a simple programming language, accessed via a Miniscript modifier, but most of the programming was achieved by attaching standard behaviors and modifiers, and making selections within the modifier pop-up menus. Technical Issues According to Starship Titanic author Douglas Adams, his team had originally selected mTropolis 1.0 for its development platform but it had to be abandoned for unspecified technical insufficiencies in favor of an in-house tool. Miniscript Limitations One criticism of the tool was that the integrated programming language, Miniscript, was lacking key features necessary for common tasks. Because mTropolis was conceived around a visual programming metaphor, mFactory engineers intentionally omitted control constru
https://en.wikipedia.org/wiki/Linux-powered%20device
Linux-based devices or Linux devices are computer appliances that are powered by the Linux kernel and possibly parts of the GNU operating system. Device manufacturers' reasons to use Linux may be various: low cost, security, stability, scalability or customizability. Many original equipment manufacturers use free and open source software to brand their products. Community maintained Linux devices are also available. Community maintained devices These devices were not intended to run Linux at the time of their production, but a community effort made possible either full or partial Linux support. Because of the open source philosophy that free and open source software brings to the software world, many people have ported the Linux kernel to run on devices other than a typical desktop, laptop or server computer. Some ports are performed by committed individuals or groups to provide alternative software on their favorite hardware. Examples include iPods, PlayStations, Xbox, TiVo, and WRT54G. The original hardware vendors are in some cases supportive of these efforts (Linksys with the WRT54G) or at the least tolerate the use of such software by end users (see TiVo hacking). Others go to great lengths to try to stop these alternative implementations. Android Android is a Linux-based operating system optimised for mobile touchscreen environments—smartphones, tablets, e-Books, and the like. Developed, published, and maintained by Google's Android Open Source Project (in consultation with the Open Handset Alliance), Android relieves smartphone manufacturers of the costs of developing- or licensing proprietary handset operating systems. First unveiled in 2007, Android became the world's most widely deployed smartphone platform in Q4 2010. By September 2012, 500 million Android devices had been activated, with a further 1.3 million devices being activated per day. Google Nexus developer phones are the flagship brand of Android handsets, with features and capabilities that represent the state of the art at the time of launch (typically every eleven months). License violations In most of these cases the OEMs are open about their use of such software and fulfil the requirements of their Free software licenses, such as the GNU General Public License (GPL), but in a small number of cases this use is masked, either deliberately or through professed ignorance or misunderstanding. Violators are usually found through public records, where they may be forced to declare their implementations, or through their own advertising, for example "Embedded Software Engineers with Mandatory Linux Experience Required" on their careers pages, and yet their site or product documentation offers no source download or offer to supply the software source as required by the license GPL. Organizations such as gpl-violations.org, the Free Software Foundation (FSF) and the Software Freedom Law Center (SFLC) are now more organized at pursuing such violators and obtaining compliance.
https://en.wikipedia.org/wiki/Wirehog
Wirehog was a friend-to-friend file sharing program that was linked to Facebook and allowed people to transfer files directly between computers. History Wirehog was created by Andrew McCollum, Mark Zuckerberg, Adam D'Angelo, and Sean Parker during their development of the Facebook social networking website in Palo Alto in the summer and fall of 2004. The only way to join Wirehog was through an invitation from a member and although it was originally planned as an integrated feature of Facebook, it could also be used by friends who were not registered on Facebook. Wirehog was launched in October 2004, and taken down in January 2006. Its target audience at the time was the same as the campus-only file-sharing service i2hub that had launched earlier that year. i2hub was gaining a lot of traction and growing rapidly. In an interview with The Harvard Crimson, Zuckerberg said, "I think Wirehog will probably spread in the same way that thefacebook did." The software was described by its creators as "an HTTP file transfer system using dynamic DNS and NAT traversal to make your personal computer addressable, routable and easily accessible". The client allowed users to both access data stored on their home computer from a remote location and let friends exchange files between each other's computers. In ways, Wirehog was a project comparable to Alex Pankratov's Hamachi VPN, the open-source OneSwarm private network, or the darknet RetroShare software. Until at least July 2005, Facebook officially endorsed the p2p client, saying on their website: "Wirehog is a social application that lets friends exchange files of any type with each other over the web. Facebook and Wirehog are integrated so that Wirehog knows who your friends are in order to make sure that only people in your network can see your files. Facebook certifies that it is okay to enter your facebook email address and password into Wirehog for the purposes of this integration." The Wirehog software was written in Python and was available for Microsoft Windows and Mac OS X only. A Linux version had been promised on the service's website. The service ran a custom-written HTTP server, and file downloading and photo viewing was through the web browser, with requested authentication by Wirehog's central servers to allow users to set up custom privacy settings. See also Friend-to-friend Private P2P Virtual private network References External links Wirehog defunct Wirehog P2P Melds Social Networks and File-Sharing - TechNewsWorld article History of Wirehog - Harvard Crimson File sharing networks Meta Platforms applications Computer-related introductions in 2004
https://en.wikipedia.org/wiki/FDS
FDS may refer to: Business Sarajevo Tobacco Factory (Bosnian: ), a Bosnian tobacco company FactSet, an American financial data company Federated Department Stores, now Macy's, an American retailer Ferrovie della Sardegna, an Italian railway company Computing Famicom Disk System (Family Computer Disk System), a video game console add-on Functional Design Specification, a type of requirements document Fire Dynamics Simulator, modelling software Politics Democratic Social Front (Portuguese: ), a political party in Guinea-Bissau Federation of the Left (Italian: ), a political coalition in Italy Force of the South (Italian: ), a defunct political party in Italy Salvadoran Democratic Front (Spanish: ), a political organization active during the Salvadoran Civil War Sankarist Democratic Front (French: ), a political party in Burkina Faso Other Formerly Used Defense Sites, properties that were under the jurisdiction of the United States Secretary of Defense FDS Intimate + Body, a feminine deodorant spray r/FemaleDatingStrategy, a Reddit community See also FD (disambiguation)
https://en.wikipedia.org/wiki/Gmod
Gmod or GMOD may refer to: Generic Model Organism Database (GMOD), a software project for model organism databases .GMOD, file extension for Golgotha 3D models; See List of filename extensions (F–L) Gamma-ray MODule (GMOD), an instrument on the satellite EIRSAT-1 G-module (G-Mod), in mathematics Garry's Mod (GMod), a sandbox game based on a modification of the first-person shooter video game Half-Life 2
https://en.wikipedia.org/wiki/Animex%20International%20Festival%20of%20Animation%20and%20Computer%20Games
The Animex International Festival of Animation, VFX and Computer Games takes place every year in Middlesbrough, North Yorkshire, England. The festival has its roots firmly planted in the creative side of the animation, visual effects and computer games industries and acts to provide animators, vfx artists, compositors, directors, students, artists, designers, writers and educators with a forum in which they can share their knowledge and skills and promote the art of animation and computer games development. History Animex was founded by university lecturers Chris Williams and Siobhan Fenton. It began as a two-day series of lectures by animators and industry professionals at the University of Teesside in February 2000, and has grown to a week-long festival incorporating the two-day event that began it all, Animex Talk. Animex Game was founded by Gabrielle Kent in 2004, creating another two days of presentations, this time by games professionals. Chris Williams remained director until leaving the university in 2012, at which point Gabrielle took over until 2018. Animex today The main venue for the festival is The University of Teesside. The festival also runs an exhibition of animation and games art, an international student awards scheme, screenings, workshops and Animexperience, a programme of school and community events giving people the chance to try their hand at animation and meet industry luminaries. Guest speakers in the past have included such industry professionals as stop motion legend Ray Harryhausen Pixar animator Mark Walsh, Bob the Builder designer Curtis Jobling, Phil Tippett, Nancy Cartwright, the voice of Bart Simpson, Blitz Games, Ernest W. Adams, Chris Crawford, Professor Stuart Sumida and representatives from games and animation studios around the world. Animex was in part the inspiration for the Red Stick International Animation Festival in Baton Rouge, Louisiana. Animex is run by a team of people, including animation and computer games lecturers within the University of Teesside as well as support staff. Animex AVFX Coordinator - Chris Wyatt Animex Game Coordinator - Matty MacGrory Animex Exhibition - Stephen Murray Animex Screen & Awards - Animex Project Manager - Tim Brunton Festival Founders - Chris Williams & Siobhan Fenton References External links Animex official site University of Teesside Multigenre conventions Animation film festivals in the United Kingdom Film festivals in England Festivals in North Yorkshire Middlesbrough fr:Animex
https://en.wikipedia.org/wiki/Zee%20Studio
Zee Studio was an Indian English-language television channel featuring Hollywood films. It was part of the wider Zee Network. History The channel was launched on 15 March 2000 as Zee Movies. In October 2000, Zee entered into a joint venture with MGM and the channel was rebranded as Zee MGM. After MGM was bought by Sony, the channel name was changed to Zee Movie Zone (ZMZ) on 1 October 2004. On 28 March 2005, as part of Zee Network's revamp, it was renamed Zee Studio. Anurag Bedi is the business head of Zee studio along with other niche channels part of the Zee bouquet. Its HD counterpart was launched on 15 August 2011. The Zee Studio brand was discontinued on 31 May 2018, with &flix being the new English movie channel. References External links Official website Zee Network Television stations in Mumbai Television channels and stations established in 2000 Zee Entertainment Enterprises Defunct television channels in India
https://en.wikipedia.org/wiki/Solidum%20Systems
Solidum Systems was a fabless semiconductor company founded by Feliks Welfeld and Misha Nossik in Ottawa, Ontario Canada in 1997. The company developed a series of rule-based network classification semiconductor devices. Some of their devices could be found in systems which supported 10 Gbit/s interfaces. Solidum was acquired in October 2002 by Integrated Device Technology. IDT closed the Ottawa offices supporting the product in March 2009. Misha Nossik was also the second chairman of the Network Processing Forum. The NPF also released the Look-Aside Interface which is an important specification for Network Search Elements such as Solidum's devices. Products Solidum produced a set of Traffic Classification devices called the PAX.port 1100, PAX.port 1200, and PAX.port 2500 The classifier chips were used in Network Switches and Load Balancers. External links Packet Description Language introduced Archived 1999 Packet Processing introduction Archived 2001 2nd round financing 2002 NPF names Misha Nossik Chairman Companies established in 1997 Defunct networking companies Fabless semiconductor companies Companies based in Ottawa Semiconductor companies of Canada Defunct computer companies of Canada
https://en.wikipedia.org/wiki/Helter%20Shelter%20%28The%20Simpsons%29
"Helter Shelter" is the fifth episode of the fourteenth season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on December 1, 2002. In the episode, the Simpson family has to find temporary residence while their house is fumigated for termites. When they run out of options, they decide to become contestants on a reality show where families live in the manner that people did in 1895. The family is initially miserable, but slowly adapt to their new life, which causes the show to lose ratings. The producers decide to try to boost viewers by dumping the house in a river and forcing the family to survive in the wilderness. However, the Simpsons find a bunch of rejects from other reality shows and they attack the producers. Plot After Homer is hit by a falling girder at work and suffers a mild head injury, Mr. Burns gives him luxury skybox tickets to a hockey game in order to keep him from suing the power plant. Homer, Marge and Bart ignore the game in favor of enjoying the amenities, while Lisa leaves the box in order to watch the game from rink-side. One of the players gives her his stick in gratitude for her useful advice, and Homer mounts it on the wall above her bed that night. In so doing, though, he releases a swarm of termites that cause severe damage to the house overnight. The Simpsons are forced to move out for six months so the house can be fumigated. Finding themselves without any suitable lodgings, they learn from Barney and Carl about The 1895 Challenge, a reality show in which a family must inhabit a Victorian era house and adopt a lifestyle consistent with the title year. Homer is reluctant at first, but takes the family to audition for the show. The producers select the Simpsons after watching Homer's overreactions to trivial things. The family has trouble adjusting to the drastic changes in daily life at first, leading to high ratings among viewers who enjoy watching their misery. However, Homer soon rallies their spirits and their attitudes improve as they begin to adapt to 1895 life. When the ratings begin to fall as a result, the producers introduce Squiggy from Laverne & Shirley into the show, even allowing him to use a Taser as a means of disrupting the peaceful situation. After this ploy fails to boost the ratings, the producers secretly airlift the house off its foundations and drop it in a river while the Simpsons are sleeping. The crew films the house's plunge over a waterfall and its collapse after running aground. Squiggy is killed in the crash, but the Simpsons emerge unhurt from the wreckage and must forage for food and shelter in the wilderness, since the crew refuses to give them lunch. They soon encounter a group of savage-looking people who turn out to be a tribe of contestants from another reality show, left to fend for themselves after they lost their final challenge. They team up with the Simpsons to overpower the crew and return to civilizatio
https://en.wikipedia.org/wiki/Norman%20Ault
Thomas Norman Ault (December 17, 1880 – February 6, 1950) was a book illustrator and writer, now best known as a compiler of anthologies. He wrote children's literature with his wife (He)Lena, who died in 1904. He later was noted as a scholar of English poetry of the seventeenth century, and Alexander Pope. Works The Rhyme Book (1906) with Lena Ault The Podgy Book of Tales with Lena Ault Dreamland Shores (1920) Life In Ancient Britain 1920 The Poet's Life Of Christ (1923) editor Elizabethan Lyrics: From The Original Texts (1925) anthology Seventeenth Century Lyrics: From The Original Texts (1928) anthology Pope's Own Miscellany (Nonesuch Press, 1935) The Prose Works of Alexander Pope: The Earlier Works, 1711-1720 (1936) A Treasury of Unfamiliar Lyrics (1938) anthology A New Light on Pope (1949) Alexander Pope Minor Poems (1954) editor, completed by John Butt Bibliography The Imaginative Book Illustration Society at has a bibliography by Robin Greer in Studies in Illustration no.2 1996 References External links 1880 births 1950 deaths British children's writers British illustrators
https://en.wikipedia.org/wiki/Sherlock%3A%20The%20Riddle%20of%20the%20Crown%20Jewels
Sherlock: The Riddle of the Crown Jewels is an interactive fiction computer game designed by Bob Bates and published by Infocom in 1987. Like most titles Infocom produced, the use of ZIL made it possible to release the game simultaneously for many popular computer platforms, including the Apple II, DOS and Commodore 64. Sherlock is based on the legendary fictional detective Sherlock Holmes, created by Sir Arthur Conan Doyle. It is Infocom's thirty-first game and is the first of two Infocom games developed by Challenge, Inc. using Infocom's development tools. Plot The year is 1887, and all of England is gearing up for the celebration of Queen Victoria's golden jubilee, marking her 50th year as monarch. London, naturally, is especially frenzied. Reading the paper one morning, Sherlock Holmes seizes upon one seemingly unimportant notice: The Tower of London has been closed for "reasons of security". The great detective is unsurprised when, moments later, he is asked to investigate the theft of the Crown Jewels. The clues left behind, however, positively reek of a carefully laid trap; Sherlock decides that he must step aside and allow Dr. Watson to pursue the thief instead. If the jewels are not replaced within 48 hours, the British government will be forced to admit that their most prized possessions were stolen and suffer worldwide humiliation. The player fills the role of Watson, travelling around London in Hansom cabs while attempting to recover the Crown Jewels while encountering many characters from Doyle's stories such as Mrs. Hudson, Mycroft Holmes, and Wiggins of the Baker Street Irregulars. A series of riddles and clues lead Watson on a hunt for inscribed jewels hidden at several famous sites across the city, including Westminster Abbey, Madame Tussauds Wax Museum, London Bridge, and Big Ben. Eventually, the villain is revealed as Professor Moriarty, who captures both Watson and Holmes. With quick thinking and the help of some humble medical supplies, however, Watson manages to subdue Moriarty and return the Jewels to the Tower in time. Production Sherlock: The Riddle of the Crown Jewels was the first Infocom game to be developed by another company, Challenge Inc, published by Infocom in their "Immortal Legends" genre. The only other game published in this line was Arthur: The Quest for Excalibur, also written by Bates. References External links Scans of the Sherlock package, documentation and feelies Infocom-if.org's entry for Sherlock 1980s interactive fiction 1987 video games Amiga games Apple II games Classic Mac OS games Commodore 64 games Detective video games DOS games Infocom games Interactive fiction based on works Riddle of the Crown Jewels, The Video games developed in the United States Video games set in London Video games set in the 19th century Single-player video games
https://en.wikipedia.org/wiki/Tommy%20Rettig
Thomas Noel Rettig (December 10, 1941 – February 15, 1996) was an American child actor, computer software engineer, and author. He portrayed the character "Jeff Miller" in the first three seasons of CBS's Lassie television series, from 1954 to 1957, later seen in syndicated re-runs with the title Jeff's Collie. He also co-starred with another former child actor, Tony Dow, in the mid-1960s television teen soap opera Never Too Young and recorded the song by that title with the group, The TR-4. Early life and acting career Rettig was born to a Jewish father, Elias Rettig, and a Christian Italian–American mother, Rosemary Nibali, in Jackson Heights in the Queens borough of New York City. He started his career at the age of six, on tour with Mary Martin in the play Annie Get Your Gun, in which he played Little Jake. Rettig was selected from among 500 boys for the role of Jeff Miller, to star in the first Lassie television series, between 1954 and 1957. His character was a young farm boy who lived with his widowed mother, Ellen (Jan Clayton), grandfather (George Cleveland), and his beloved collie, Lassie. In addition to his famous role as Jeff Miller in the Lassie television series on the CBS network, Rettig also appeared in 17 feature films, including So Big, The 5,000 Fingers of Dr. T., written by Dr. Seuss, and River of No Return with Marilyn Monroe and Robert Mitchum. It was his work with a dog in The 5000 Fingers Of Dr. T. that led animal trainer Rudd Weatherwax to urge him to audition for the Lassie role, for which Weatherwax supplied the collie. Rettig later told interviewers that he longed for a life as a normal teenager, and after four seasons, he was able to get out of his contract. He was also critical of the treatment and compensation of child actors of his day. He reportedly received no residual payments from his work in the Lassie series, even though it was later very popular in syndication, widely shown under the title Jeff's Collie. Rettig graduated in 1959 from University High School in Los Angeles. In the same year at the age of 18, he was cast as Pierre in the episode "The Ghost of Lafitte", set in New Orleans, of the ABC western series The Man from Blackhawk, starring Robert Rockwell as a roving insurance investigator. Actress Amanda Randolph was cast in the same episode, as Auntie Cotton. As a 19-year-old, Rettig had a prominent guest-starring role in the January 1961 Wagon Train episode "Weight of Command". Then in its fourth season on NBC, Wagon Train was the second highest-rated series that year on American network television. The Rettig played the part of a 16-year-old boy, Billy, who is traveling with his family on the wagon train. Although his father reluctantly allows his son to go on a buffalo hunt with assistant trailmaster Bill Hawks (Terry Wilson), Billy frets that his father doesn't think of him as being a man yet. When the hunters are attacked by a band of renegade Indians, they take refuge in an empty house.
https://en.wikipedia.org/wiki/The%20Way%20We%20Weren%27t
"The Way We Weren't" is the twentieth episode of the fifteenth season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on May 9, 2004. Plot Bart and Milhouse steal and empty a bottle of Homer's Duff Beer to play spin the bottle with neighborhood girls. Homer interrupts the game and is accidentally kissed by Milhouse. The Simpson family holds a mock trial to determine Bart's guilt, with Lisa presiding as judge. Bart doubts that Homer had never kissed a girl as a 10-year-old, but Marge proudly states that Homer's first kiss was with her in high school. Homer confesses that it was not his first kiss, but that he met a girl at summer camp. Homer recalls that when he was Bart's age, he went to a camp for underprivileged boys, Camp See-A-Tree, where he met Lenny, Carl, and Moe. The campers were forced to work in the kitchen of the neighboring girls' camp, Camp Land-A-Man. Homer found a retainer left behind on one of the trays and returned it to its owner using the dumbwaiter. Through the wall, the girl asked Homer to see her later that night, but before he could make it, he accidentally stabbed himself in the eye with a switchblade knife, and had to wear an eyepatch to the date. Marge surprises the family by revealing that the girl in question was actually her, and if she had known, she would never have married Homer. Marge gives her side of the story. She attended Camp Land-A-Man alongside her sisters Patty and Selma, Helen Lovejoy, Luann Van Houten and Cookie Kwan. She fell for the boy who returned her retainer, but, embarrassed by his real name, Homer gave the false name "Elvis Jagger Abdul-Jabbar". While ironing her hair for the date, Marge accidentally burned it, and became a "brunette" for the evening. She and Homer met and shared a passionate kiss. They parted ways after Homer gave Marge a heart-shaped rock, agreeing to meet again the following night. However, "Elvis" never showed up for the planned second date, and as a result, Marge was unable to trust another boy for years. Homer explains why he did not show up. Right after the date, he was so dazed with bliss that he accidentally fell off a cliff into the lake and drifted to a fat camp, Camp Flab-Away, which counted a younger Mayor Quimby, Chief Wiggum and Comic Book Guy as its campers. He was caught by the Camp Instructor, who mistook him for a camper. Meanwhile, a devastated Marge decided to leave the camp and threw the rock that he had given her away, breaking it in two. Homer managed to escape the fat camp and make his way to Marge's camp, but she had already left. Despite knowing the truth, Marge is unable to let the heartache go after nursing it for so long. However, Homer proves that he really did care about her for years after the date by showing her a piece of the broken rock that he had found. Pleasantly surprised, Marge reveals that she had kept the other piece (albeit for the very different reason of remindi
https://en.wikipedia.org/wiki/Data%20cube
In computer programming contexts, a data cube (or datacube) is a multi-dimensional ("n-D") array of values. Typically, the term data cube is applied in contexts where these arrays are massively larger than the hosting computer's main memory; examples include multi-terabyte/petabyte data warehouses and time series of image data. The data cube is used to represent data (sometimes called facts) along some dimensions of interest. For example, in online analytical processing (OLAP) such dimensions could be the subsidiaries a company has, the products the company offers, and time; in this setup, a fact would be a sales event where a particular product has been sold in a particular subsidiary at a particular time. In satellite image timeseries dimensions would be latitude and longitude coordinates and time; a fact (sometimes called measure) would be a pixel at a given space and time as taken by the satellite (following some processing that is not of concern here). Even though it is called a cube (and the examples provided above happen to be 3-dimensional for brevity), a data cube generally is a multi-dimensional concept which can be 1-dimensional, 2-dimensional, 3-dimensional, or higher-dimensional. In any case, every dimension divides data into groups of cells whereas each cell in the cube represents a single measure of interest. Sometimes cubes hold only few values with the rest being empty, i.e. undefined, sometimes most or all cube coordinates hold a cell value. In the first case such data are called sparse, in the second case they are called dense, although there is no hard delineation between both. History Multi-dimensional arrays have long been familiar in programming languages. Fortran offers arbitrarily-indexed 1-D arrays and arrays of arrays, which allows the construction of higher-dimensional arrays, up to 15 dimensions. APL supports n-D arrays with a rich set of operations. All these have in common that arrays must fit into the main memory and are available only while the particular program maintaining them (such as image processing software) is running. A series of data exchange formats support storage and transmission of data cube-like data, often tailored towards particular application domains. Examples include MDX for statistical (in particular, business) data, Hierarchical Data Format for general scientific data, and TIFF for imagery. In 1992, Peter Baumann introduced management of massive data cubes with high-level user functionality combined with an efficient software architecture. Datacube operations include subset extraction, processing, fusion, and in general queries in the spirit of data manipulation languages like SQL. Some years after, the data cube concept was applied to describe time-varying business data as data cubes by Jim Gray, et al., and by Venky Harinarayan, Anand Rajaraman and Jeff Ullman which rank among the top 500 most cited computer science articles over a 25-year period. Around that time, a working group on
https://en.wikipedia.org/wiki/The%20Bart%20Wants%20What%20It%20Wants
"The Bart Wants What it Wants" is the eleventh episode of the thirteenth season of the American animated television series The Simpsons. It first aired on the Fox network in the United States on February 17, 2002. In the episode, Bart befriends Rainier Wolfcastle's daughter, Greta. While Greta falls in love with him, Bart only accompanies her because she owns a lot of entertaining things. "The Bart Wants What it Wants" was written by John Frink and Don Payne while Mike Frank Polcino served as director. Although the episode's first draft was written by Frink and Payne, the idea for the episode was pitched by staff writer Matt Selman. Because the Simpsons visit Toronto in the episode, the Fox network wanted to promote it by having the city of Toronto declare February 17 "The Simpsons day", and award the Simpsons family a key to the city. Because the city does not allow for-profit companies to receive a key, the request was turned down. "The Bart Wants What it Wants" also features guest stars Reese Witherspoon as Greta and Wolfgang Puck as himself. It also features references to Scrabble, Seinfeld and Whassup?, an advertisement campaign for Budweiser beer. In its original broadcast, the episode was seen by approximately 6.4 million viewers, finishing in 27th place in the ratings the week it aired. Following its broadcast, the episode received mixed reviews from critics. Plot After Homer steals the Olympic torch because the television broadcast of the sporting event preempted his favorite shows for the last time, the Olympic administrators chase the Simpson family in a helicopter as they flee in their car. When Marge returns the torch, the sight of its flame causes the helicopter to crash. The administrators survive the crash, but the Olympic flame is extinguished. On their way home, the family go to a private school-held fair, where Bart meets Greta, Rainier Wolfcastle's daughter. Greta develops a crush on the oblivious Bart and the family enjoys the royal treatment Rainier provides them. However, Lisa discovers Bart not taking Greta seriously after he skipped her school dance to watch Principal Skinner bomb at an open mic comedy night. Upon Lisa's advice, Bart breaks up with Greta, who does not take it well. After losing her, Bart discovers he actually wanted to be with Greta and goes to her house to ask her to come back to him. To his surprise, Greta has started a new relationship with Milhouse. Greta goes to Canada with Milhouse during her father's movie shooting, and Bart follows them with his family. At the set, Bart confronts Milhouse and they fight, ruining everything. They end up in front of Greta and demand for her to choose between them. Greta turns both boys down due to a loss of interest in the two. The boys reconcile and join Canada's basketball team. Production "The Bart Wants What It Wants" was directed by Mike Frank Polcino and written by John Frink and Don Payne. It originally aired on the Fox network in the United States o
https://en.wikipedia.org/wiki/I%20Married%20a%20Princess
I Married a Princess is a 2005 reality show on the Lifetime TV network that starred Catherine Oxenberg and her husband Casper Van Dien. The show's slogan is "under the tiara and behind the shades - a real life look at a fairy-tale family." The show's core conceit is technically false: although Oxenberg is descended from Serbian royalty and she is technically in the line of succession to several extant titles, she holds no royal or noble rank herself and is not considered a princess by any government. Characters Catherine Oxenberg Casper Van Dien India Oxenberg, Catherine's daughter Cappy Van Dien, Casper's son Grace Van Dien, Casper's daughter Maya Van Dien, daughter of Catherine and Casper Celeste Alma Van Dien, daughter of Catherine and Casper External links American dating and relationship reality television series Lifetime (TV network) original programming 2000s American reality television series 2005 American television series debuts 2005 American television series endings
https://en.wikipedia.org/wiki/Sideshow%20Bob%27s%20Last%20Gleaming
"Sideshow Bob's Last Gleaming" is the ninth episode of the seventh season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on November 26, 1995. In this episode, Sideshow Bob attempts to rid Springfield of television by threatening to detonate an atomic bomb. When that backfires, he attempts to kill Bart once again, but this time along with Krusty the Clown. The episode was written by freelance writer Spike Feresten, and features the fifth major appearance of Sideshow Bob. Although Feresten received credit for the episode, the writing staff completely rewrote the episode and very little of Feresten's original script was left in the finished version. It was the first episode of The Simpsons to be directed by Dominic Polcino, who described it as being very difficult to direct. R. Lee Ermey, known for his role in Full Metal Jacket, guest stars as Col. Leslie "Hap" Hapablap while Kelsey Grammer reprises his role as Sideshow Bob. The episode is a parody of "'60s-era nuclear war movies" and contains several references to Cold War films, including Twilight's Last Gleaming, Dr. Strangelove, and Fail-Safe. In its original broadcast, the episode finished 49th in ratings for the week of November 20–26, 1995, with a Nielsen rating of 8.7 and a 13 share of the audience. The episode received generally positive reviews by critics. Plot At Springfield Minimum Security Prison, Sideshow Bob is disturbed when he hears the other inmates laughing at the inane antics of Krusty the Clown's television show. Believing that television is a fountain of "mindless drivel" and wanting to rid the world of it, Bob escapes while on work duty at a local Air Force Base. By mimicking one of the base's colonels he gains access to a restricted area of the hangar, where he steals a 10-megaton nuclear weapon. As the Simpsons and other residents of Springfield are attending an air show held at the base, the signal on the big screen is interrupted by Bob, who threatens to detonate the bomb unless Springfield disables all of its television broadcasts. Upon hearing the announcement, everyone flees the airfield in panic, except for Bart and Lisa. Unable to locate Bob, Mayor Quimby decides to give in to Bob's ultimatum. Krusty, refusing to submit to Bob's demands, takes refuge in a civil defense shack in the desert, which he uses to transmit a heavily improvised show. Lisa deduces that the unusually high-pitched voice of Bob in his broadcast was due to inhaling helium, and locates him in the envelope of the Duff blimp. Bob, having lost his patience thanks to Krusty, tries to detonate the bomb, which turns out to be a dud, because it had passed the expiration date of November 1959. Lisa alerts the police to Bob's location using the blimp's variable-message sign, but Bob deflates the blimp and kidnaps Bart, before stealing the original Wright Brothers aircraft, which had been an exhibit at the air show. Holding a knife
https://en.wikipedia.org/wiki/Southern%20Pacific%20%28narrow%20gauge%29
The Southern Pacific narrow gauge system was a network of narrow gauge railroad lines operated by the Southern Pacific Railroad (SP) in the western United States. It consisted of two lines acquired in the early 20th century, running from western Nevada into eastern California and southern Oregon. The first, the former Carson and Colorado Railway, comprised 300 miles of single track running south from the Southern Pacific main line between Mound House, Nevada (outside Carson City) and Keeler, California. The line was originally built by the Virginia and Truckee Railroad, and was purchased by the Southern Pacific in 1900, when the line made enough profit to repay the purchase price within one month. In later years the line was not as profitable, although it was enough to justify dieselizing the line, one of the few such cases in the United States. The narrow gauge service ended in 1960. The second line was organized in 1882, as the Nevada and Oregon (later the Nevada–California–Oregon Railway (NCO)) and was acquired by the Southern Pacific in 1925. It comprised 200 miles of single track running north from Reno, Nevada to Lakeview, Oregon. Plans to continue the line into points in Oregon were never realized. The line was converted to standard gauge in 1928, and its gauge equipment was sold, though several locomotives subsequently ran on the southern limb of the network, the former Carson and Colorado line. Notes References 3 ft gauge railways in the United States Narrow gauge railroads in California Narrow gauge railroads in Nevada Southern Pacific Railroad
https://en.wikipedia.org/wiki/Harold%20Stone
Harold Stone may refer to: Harold J. Stone, American actor Harold S. Stone, American computer scientist
https://en.wikipedia.org/wiki/Option%20ROM
An Option ROM for the PC platform (i.e. the IBM PC and derived successor computer systems) is a piece of firmware that resides in ROM on an expansion card (or stored along with the main system BIOS), which gets executed to initialize the device and (optionally) add support for the device to the BIOS. In its usual use, it is essentially a driver that interfaces between the BIOS API and hardware. Technically, an option ROM is firmware that is executed by the BIOS after POST (the testing and initialization of basic system hardware) and before the BIOS boot process, gaining complete control of the system and being generally unrestricted in what it can do. The BIOS relies on each option ROM to return control to the BIOS so that it can either call the next option ROM or commence the boot process. For this reason, it is possible (but not usual) for an option ROM to keep control and preempt the BIOS boot process. The BIOS (at least as originally designed by IBM) generally scans for and initializes (by executing) option ROMs in ascending address order at 2 KB address intervals within two different address ranges above address C0000h in the conventional (20-bit) memory address space; later systems may also scan additional address ranges in the 24-bit or 32-bit extended address space. Option ROMs are necessary to enable non-Plug and Play peripheral devices to boot and to extend the BIOS to provide support for any non-Plug and Play peripheral device in the same way that standard and motherboard-integrated peripherals are supported. Option ROMs are also used to extend the BIOS or to add other firmware services to the BIOS. In principle, an option ROM could provide any sort of firmware extension, such as a library of video graphics subroutines, or a set of PCM audio processing services, and cause it to be installed into the system RAM and optionally the CPU interrupt system before boot time. A common option ROM is the video BIOS which gets loaded very early on in the boot process and hooks INT 10h so that output from the power-on self-test (POST) can be displayed. The video BIOS is almost always located in the memory segment beginning at C0000h, the start of the memory area reserved for option ROMs; this is because when the motherboard has a built-in VGA controller, the option ROM will reside in the BIOS – the BIOS knows where it is and shadows it into RAM at a fixed time. Other ROMs can be located from segments C8000h all the way up to F4000h in early PCs. The final search address was limited to segment DFFFFh or EFFFFh in modern products. The BIOS Boot Specification requires that option ROMs be aligned to 2 kB boundaries (e.g. segments C8000h, C8800h, C9000h, C9800h, etc.). The first two bytes of the ROM must be 55 AA. The third byte indicates the ROM size, and the fourth byte is where the BIOS begins execution of the option ROM to initialize it before the system boots. Often this initialization is done by a 3 byte jump instruction starting with hexade
https://en.wikipedia.org/wiki/Tennis%20the%20Menace
"Tennis the Menace" is the twelfth episode of the twelfth season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on February 11, 2001. In the episode, the Simpsons build a tennis court in their backyard and are ridiculed by the entire town because of Homer's inferior tennis ability. Homer therefore tries to please Marge by entering the two into a tournament, but they quickly turn into rivals when Marge replaces Homer with Bart as her partner. The episode features guest appearances from tennis professionals Andre Agassi, Pete Sampras, and the Williams sisters as themselves. "Tennis the Menace" was directed by Jen Kamerman and written by Ian Maxtone-Graham, who also directed the Williams sisters' performance. The episodes title is a parody of Dennis the Menace. The animators of The Simpsons experimented with digital ink and paint on "Tennis the Menace", making it the first episode of the series to be animated using the process since season 7's "Radioactive Man". "Tennis the Menace" has received generally positive reviews from critics with particular praise for its guest stars. Around eight million American homes tuned in to watch "Tennis the Menace" during its original airing, and in 2009 it was released on DVD along with the rest of the episodes of the twelfth season. Plot The Springfield Retirement Castle holds a talent show, which the Simpson family attends. Grampa wins the show after performing his version of the song "What's New, Pussycat?". He wins a free autopsy, so the Simpsons visit a funeral salesman to claim the prize. While there, Homer decides to buy a casket and a tombstone for Grampa, who is then offered an expensive funeral plan that Homer cannot afford. The salesman tells Homer that the tombstone is produced from the same amount of cement as a tennis court, and this gives him the idea to build a tennis court in the family's backyard (although he initially regrets this, having confused tennis and foxy boxing). The court is very popular with Springfield's residents, but they mock Homer and Marge for losing all the time, especially thanks to Homer's poor play. Marge pleads with Homer to take the game seriously, but he is too oblivious to how poorly he plays tennis. Instead, he tries to please Marge by entering the pair in Krusty's celebrity tennis tournament, the "Krusty Kharity Klassic". Marge, tired of being laughed at, ditches Homer and enters with Bart as her new partner. Homer is outraged that he was abandoned for a ten-year-old boy, and tries to get revenge by entering the tournament with Lisa as his partner, despite Lisa's disapproval. The change in partners leads the Simpson family to begin arguing and aggressively competing against one another. The tournament takes place, and in the stands are leading tennis professionals Andre Agassi, Pete Sampras, Venus Williams, and Serena Williams. At the tournament, Homer ditches Lisa for Venus. In response, Marge
https://en.wikipedia.org/wiki/Pokey%20Mom
"Pokey Mom" is the tenth episode of the twelfth season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on January 14, 2001. In the episode, Marge befriends Jack Crowley, a convict who she believes has some artistic potential. With Marge's help, Jack is granted parole and finds a mural-painting job at Springfield Elementary School. Meanwhile, Homer suffers from a back injury after being kicked by a bull at the prison rodeo and goes to see a chiropractor. Despite this, his pain remains and it is not until he accidentally falls backwards onto a garbage can that his back injury disappears. Homer makes a successful business out of this injury-healing garbage can, much to the dismay of chiropractors in town. The episode was written by Tom Martin and directed by Bob Anderson, and it features guest appearances from Michael Keaton as Jack, Charles Napier as a prison warden, Robert Schimmel as a prisoner, and Bruce Vilanch as himself. The title "Pokey Mom" is a pun on the video game franchise "Pokémon" and the term "pokey", a nickname given to prisons, though it was noted that the episode name was chosen to attempt to cash in on the success of the Pokémon series. "Pokey Mom" has been met with generally negative reviews from critics, being described as bland and drawn out. The staff members of the series received complaints from chiropractors after it aired, and some chiropractors have characterized the portrayal of the profession in the episode as stereotypical. Around 8.79 million American homes tuned in to watch the episode during its original airing, and in 2009 it was released on DVD along with the rest of the episodes of the twelfth season. Plot The Simpson family attends a prison rodeo where Marge meets Jack Crowley, a convict whom she believes to have great artistic potential after becoming impressed with his work. She later teaches a class on being an artist to the prisoners and befriends Jack. With Marge's help, Jack is granted parole under her custody. Marge soon finds a mural-painting job at Springfield Elementary School for him. Jack paints a powerful mural symbolizing school spirit with a warrior woman riding a puma, which the whole school likes, but Principal Skinner demands he tone it down using his idea of a cartoonish puma walking with two children under a rainbow in a fantasy land. Jack reluctantly gives in to his wishes; however, upon its unveiling, the new mural is panned by everyone in town. Refusing to admit that he forced Jack to create it in the first place, Skinner instead blames Jack and fires him. Sometime later, the mural is set on fire by a mystery arsonist, and everyone manages to get a look at the real one. Everyone in the school assumes Jack did it to get back at Skinner. While the police are out searching for Jack, Marge finds him hiding in the school playground. He swears to her that he did not start the fire. Marge believes him and distracts Skinner
https://en.wikipedia.org/wiki/Remote%20Automated%20Weather%20Station
The Remote Automatic Weather Stations (RAWS) system is a network of automated weather stations run by the U.S. Forest Service (USFS) and Bureau of Land Management (BLM) and monitored by the National Interagency Fire Center (NIFC), mainly to observe potential wildfire conditions. Unlike the automated airport weather stations which are located at significant airports, RAWS stations are often located in remote areas, particularly in national forests. Because of this, they usually are not connected to the electrical grid, but rather have their own solar panels, and a battery to store power for overnight reporting. Some instead run on a generator. In both cases, data important to operating the station itself, such as battery voltage or fuel level, is often included in the hourly reports. Also because of the remote locations, most communicate with a modem via telephone, or via a VSAT connection to a GOES satellite. In this regard, they are similar to mesonets and may be mesonets if the distance between stations (spatial resolution) is sufficiently dense. They often lack the consistently high-quality data needed for use in numerical weather prediction and climatology, however. Road Weather Information System (RWIS) may likewise be self-powered and located in remote areas. Portable RAWS There are times when a portable weather station is required, such as planned ignitions, wildfires, and other projects where there is a need to collect and share weather information. Portable stations may also be referred to as "quick deploy" or QD, and this should be indicated within the name of the station to allow proper interpretation of the collected data. External links National Interagency Remote Automatic Weather Stations (RAWS) Homepage Meteorological stations Wildfire prevention Wildfire suppression equipment
https://en.wikipedia.org/wiki/Winsorizing
Winsorizing or winsorization is the transformation of statistics by limiting extreme values in the statistical data to reduce the effect of possibly spurious outliers. It is named after the engineer-turned-biostatistician Charles P. Winsor (1895–1951). The effect is the same as clipping in signal processing. The distribution of many statistics can be heavily influenced by outliers. A typical strategy is to set all outliers to a specified percentile of the data; for example, a 90% winsorization would see all data below the 5th percentile set to the 5th percentile, and data above the 95th percentile set to the 95th percentile. Winsorized estimators are usually more robust to outliers than their more standard forms, although there are alternatives, such as trimming, that will achieve a similar effect. Example Consider the data set consisting of: {92, 19, 101, 58, 1053, 91, 26, 78, 10, 13, −40, 101, 86, 85, 15, 89, 89, 28, −5, 41} (N = 20, mean = 101.5) The data below the 5th percentile lies between −40 and −5, while the data above the 95th percentile lies between 101 and 1053 (pertinent values shown in bold); accordingly, a 90% winsorization would result in the following: {92, 19, 101, 58, 101, 91, 26, 78, 10, 13, −5, 101, 86, 85, 15, 89, 89, 28, −5, 41} (N = 20, mean = 55.65) After winsorization the mean has dropped to nearly half its previous value, and is consequently more in line with the data it represents. Python can winsorize data using SciPy library : from scipy.stats.mstats import winsorize winsorize([92, 19, 101, 58, 1053, 91, 26, 78, 10, 13, -40, 101, 86, 85, 15, 89, 89, 28, -5, 41], limits=[0.05, 0.05]) R can winsorize data using the DescTools package: library(DescTools) a<-c(92, 19, 101, 58, 1053, 91, 26, 78, 10, 13, -40, 101, 86, 85, 15, 89, 89, 28, -5, 41) DescTools::Winsorize(a, probs = c(0.05, 0.95)) Distinction from trimming Note that winsorizing is not equivalent to simply excluding data, which is a simpler procedure, called trimming or truncation, but is a method of censoring data. In a trimmed estimator, the extreme values are discarded; in a winsorized estimator, the extreme values are instead replaced by certain percentiles (the trimmed minimum and maximum). Thus a winsorized mean is not the same as a truncated mean. For instance, the 10% trimmed mean is the average of the 5th to 95th percentile of the data, while the 90% winsorized mean sets the bottom 5% to the 5th percentile, the top 5% to the 95th percentile, and then averages the data. In the previous example the trimmed mean would be obtained from the smaller set: {92, 19, 101, 58, 91, 26, 78, 10, 13, 101, 86, 85, 15, 89, 89, 28, −5, 41} (N = 18, mean = 56.5) In this case, the winsorized mean can equivalently be expressed as a weighted average of the truncated mean and the 5th and 95th percentiles (for the 10% winsorized mean, 0.05 times the 5th percentile, 0.9 times the 10% trimmed mean, and 0.05 times the 95th percentile) though in general winsorized
https://en.wikipedia.org/wiki/The%20Great%20Money%20Caper
"The Great Money Caper" is the seventh episode of the twelfth season of the American animated television series The Simpsons. It first aired on the Fox network in the United States on December 10, 2000. In the episode, Homer, along with his son Bart, con people out of their money in order to pay for Homer's broken car. However, after having paid for the repairs, the two decide to continue grifting, which leads to some troublesome situations. The episode was written by Carolyn Omine and directed by Mike Frank Polcino. The episode's title is a parody on The Great Muppet Caper. The episode features American actor Edward Norton as con artist Devon Bradley. In its original American broadcast, the episode received a 9.7 rating, according to Nielsen Media Research. Plot The family goes to a magic-themed restaurant. While there, Marge gets drunk on Long Island Iced Teas and Bart becomes so fascinated with magic that he buys a magician's kit from the gift shop. On the way home, a sturgeon falls from the sky (implicitly from the Russian space station Mir) onto the family car's hood, which is severely damaged. At the squidport, Homer and Bart start their magic show as a way to make money, but the act becomes a failure as nobody gives money, and Homer leaves Bart to do the rest of the act on his own. Bart is left out on the street, and people begin giving him money so he can get home on public transportation. As Homer drives home, he sees Bart in a taxi, and when he gets home he sees him eating a steak dinner. They decide they can make money grifting; however, Marge and Lisa begin suspecting them after they "worked" without Bart's kit, which they both left behind at home. Homer and Bart continue to grift after they have fixed the car, and Grampa volunteers to help them grift, since he was a con-artist during the Great Depression. Grampa, Homer, and Bart grift the residents at the Springfield Retirement Castle. While performing the grift, they are arrested by an FBI agent; however, Grampa evades arrest by stealing a motorised wheelchair and escaping. When Homer and Bart put themselves in a police station cell, they realize that the FBI agent himself is a con man, and has conned them out of their money and the car. Homer and Bart say the car was stolen in the church parking lot. The next morning they are surprised however to learn that Groundskeeper Willie was arrested for stealing the car, as he matched the description they gave of the carjacker as a "foreign loner with wild, bushy hair". Not wanting to admit they were conned, Homer and Bart go along with Marge's theory. At the trial, the Blue Haired Lawyer leads Homer to say that it was Willie who stole the car. After Willie is proven guilty, he snatches Wiggum's gun and shoots Principal Skinner. At this point, Homer finally confesses that he got conned, but Marge and the townspeople themselves tell Homer and Bart that they set up the trial and the carjacking to teach them a lesson on conning people, re
https://en.wikipedia.org/wiki/Electronegativities%20of%20the%20elements%20%28data%20page%29
Electronegativity (Pauling scale) Notes Separate values for each source are only given where one or more sources differ. Electronegativity is not a uniquely defined property and may depend on the definition. The suggested values are all taken from WebElements as a consistent set. Many of the highly radioactive elements have values that must be predictions or extrapolations, but are unfortunately not marked as such. This is especially problematic for francium, which by relativistic calculations can be shown to be less electronegative than caesium, but for which the only value (0.7) in the literature predates these calculations. Electronegativity (Allen scale) References WEL As quoted at http://www.webelements.com/ from these sources: A.L. Allred, J. Inorg. Nucl. Chem., 1961, 17, 215. J.E. Huheey, E.A. Keiter, and R.L. Keiter in Inorganic Chemistry : Principles of Structure and Reactivity, 4th edition, HarperCollins, New York, USA, 1993. CRC As quoted from these sources in an online version of: David R. Lide (ed), CRC Handbook of Chemistry and Physics, 84th Edition. CRC Press. Boca Raton, Florida, 2003; Section 9, Molecular Structure and Spectroscopy; Electronegativity Pauling, L., The Nature of the Chemical Bond, Third Edition, Cornell University Press, Ithaca, New York, 1960. Allen, L.C., J. Am. Chem. Soc., 111, 9003, 1989. LNG As quoted from these sources in: J.A. Dean (ed), Lange's Handbook of Chemistry (15th Edition), McGraw-Hill, 1999; Section 4; Table 4.5, Electronegativities of the Elements. L. Pauling, The Chemical Bond, Cornell University Press, Ithaca, New York, 1967. L. C. Allen, J. Am. Chem. Soc. 111:9003 (1989). A. L. Allred J. Inorg. Nucl. Chem. 17:215 (1961). Allen Electronegativities Three references are required to cover the values quoted in the table. L. C. Allen, J. Am. Chem. Soc. 111:9003 (1989). J. B. Mann, T. L. Meek and L. C. Allen, J. Am. Chem. Soc. 122:2780 (2000). J. B. Mann, T. L. Meek, E. T. Knight, J. F. Capitani and L. C. Allen, J. Am. Chem. Soc. 122:5132 (2000). Chemical properties Chemical element data pages
https://en.wikipedia.org/wiki/Hardnesses%20of%20the%20elements%20%28data%20page%29
Notes References See also Mohs scale of mineral hardness Mohs hardness of materials (data page) Vickers hardness test Brinell scale Properties of chemical elements Chemical element data pages
https://en.wikipedia.org/wiki/Elastic%20properties%20of%20the%20elements%20%28data%20page%29
Elastic properties describe the reversible deformation (elastic response) of a material to an applied stress. They are a subset of the material properties that provide a quantitative description of the characteristics of a material, like its strength. Material properties are most often characterized by a set of numerical parameters called moduli. The elastic properties can be well-characterized by the Young's modulus, Poisson's ratio, Bulk modulus, and Shear modulus or they may be described by the Lamé parameters. Young's modulus Poisson's ratio Bulk modulus Shear modulus References See also Chemical properties Chemical element data pages
https://en.wikipedia.org/wiki/Cheshunt%20railway%20station
Cheshunt is a National Rail and London Overground station in Cheshunt, Hertfordshire, England. On the National Rail network it is on the West Anglia Main Line, from London Liverpool Street and situated between and . On the London Overground network it is one of three northern termini of the Lea Valley lines. History Cheshunt's first railway A railway existed in Cheshunt before the station and the main line from London were originally opened in the 1840s. The horse-drawn Cheshunt Railway was opened on 26 June 1825. Based on a design by Henry Robinson Palmer, this line ran for from the town's high street to the River Lea, near where Cheshunt station is today. This long-defunct railway is of interest as it was the world's first passenger-carrying monorail and the first railway line to open in Hertfordshire. Early years (1840-1862) The line from to Broxbourne was opened by the Northern & Eastern Railway on 15 September 1840. Initially a temporary station was opened on Cadmore Lane to the north of the current station but that only lasted for a couple of months between April and 1 June 1842. The existing station was opened by the Eastern Counties Railway who had leased the N&ER from 1 January 1844,on 31 May 1846 and was located near the level crossing on Windmill Lane. The two platformed station was of timber construction with a two-storey station building and platforms either side of the level crossing. In November 1861 gas lighting was provided. By the 1860s the railways in East Anglia were in financial trouble, and most were leased to the ECR; they wished to amalgamate formally, but could not obtain government agreement for this until 1862, when the Great Eastern Railway was formed by amalgamation. Thus Cheshunt became a GER station in 1862. Great Eastern Railway (1862-1922) In 1881 a footbridge was provided. With the development of horticulture in the Lea Valley during the early 1880s a small goods yard was provided. A new line from Bury Street Junction, north of Lower Edmonton High Level railway station, to Cheshunt was opened by the Great Eastern Railway on 1 October 1891 and known as the Churchbury Loop. Around this time the station was rebuilt with both platforms located south of the level crossing and additional bay platforms being provided on the up and down side of the station. Brick and tile station buildings were provided and a new signal box was provided. In 1905 the platforms were extended and the station was repainted the following year. In 1907 a short siding on the up side south of the station to a ballast pit operated by Boyer & Son was opened. Expansion of the horticultural industry saw the goods yard extended in 1909. Inwards traffic was manure and coal for the horticultural industry. Falling passenger numbers saw the Churchbury Loop passenger services withdrawn on 1 October 1909 and the then President of the Board of Trade, Winston Churchill, had to answer a question on the subject in the House of Commons as a railw
https://en.wikipedia.org/wiki/Sun%20TV%20%28India%29
Sun TV is an Indian Tamil-language general entertainment pay television channel owned by Sun TV Network. It was launched on 14 April 1993. It is the flagship channel of the Chennai-based media conglomerate Sun Group's Sun TV Network. It was founded and is owned by Kalanithi Maran. It was started airing on open network (Antenna) on 14 July 2002 at the time of "Majunu" Tamil movie premiering. Then it was removed from this open network on 2005. It was also removed from free on 9 November 2007. Sun TV launched its HD version on 11 December 2011. Since its inception, the channel consistently remains the top rated Tamil channel and one of the top rated Indian television channel. History Sun TV is the flagship channel of Sun TV Network which started on the Tamil New Year, 14 April 1993. It started off with a four and a half hour programming per day on a time sharing agreement with ATN. However, in January 1997 it became 24 hours programming channel. Sun TV was listed on the Bombay Stock Exchange on 24 April 2006 upon raising $133 million. It is the most viewed Tamil television channel in the world with syndicated broadcasts in several countries such as the United States, United Arab Emirates, Singapore, Malaysia, Sri Lanka, Australia, Canada, South Africa, Qatar, Hong Kong, Europe (United Kingdom, France, Germany, Italy, Denmark, Austria, Switzerland, Netherlands and Ireland) and other countries. Programming Scandal On 8 December 2013, the Little India Riot broke out at Singapore. On 9 December 2013, Sun TV made a false news report on the riot saying that the deceased was pushed out of the bus by the driver, as well as attacked by locals. Lim Thuan Kuan, Singapore's High Commissioner to India, protest against the false report. As a result, Sun TV issued a correction the following day and apologized for the error. Awards Sun TV also hosts numerous film-industry–related events in Tamil Nadu and the Sun Kudumbam Awards ceremony biannually. Sister Channels KTV KTV is an Indian movie pay television channel owned by Sun TV Network broadcasting Tamil-language films. It was launched on 22 October 2001. Sun Music Sun Music is India's first 24-hour music pay television channel led by the well-known Sun TV Network of India. It was launched on 5 September 2004. Its HD counterpart was launched on 11 December 2011. Chutti TV Chutti TV is a 24-hour Tamil kids pay television channel from the Sun TV Network in India. The target audience are children aged between 3 and 17. It was launched on 29 April 2007, making it Sun TV Network's first ever television channel for kids. Adithya TV Adithya TV is a 24-hour Tamil comedy pay television channel from the Sun TV Network in India. It was launched on 8 February 2009. Sun News Sun News is a 24-hour Tamil news satellite pay television channel headquartered at Chennai, Tamil Nadu. It was launched on 7 May 2000. Sun Life Sun Life is a 24-hour Tamil classic satellite pay television channel which broadcasts cla
https://en.wikipedia.org/wiki/Insane%20Clown%20Poppy
"Insane Clown Poppy" is the third episode of the twelfth season of the American television series The Simpsons. It originally aired on the Fox network in the United States on November 12, 2000. In the episode, during an outdoor book fair, Krusty finds out he has a daughter (from a one-night stand with a soldier during the Gulf War), but loses her trust after gambling away her violin to Fat Tony, prompting Homer and Krusty to retrieve it. The episode was written by John Frink and Don Payne as their second produced episode and their first written episode. Although originally produced for season 11 the episode was held over for season 12. The episode features guest stars Jay Mohr as Christopher Walken, Stephen King as himself, Amy Tan as herself, John Updike as himself and Joe Mantegna as recurring character Fat Tony. Drew Barrymore also guest-starred as Sophie, Krusty the Clown's daughter in the episode. The episode features references to Bob Hope's famous USO shows. The episode has also received negative reviews from critics. Plot Homer and Bart use fireworks to accomplish things Marge has told them to do: fix a stuck drawer, demolishing Santa's Little Helper's doghouse (while promising him another one would be built by January 2007), and attempting to fix Lisa's VCR, but end up destroying her room with fireworks instead. To make it up to her, the family spends a day at the Springfield Festival of Books for her birthday. There, they encounter famous authors such as Stephen King, Tom Wolfe, John Updike, and Amy Tan. While waiting in line for an autograph from Krusty, Bart strikes up a conversation with a girl named Sophie. When she gets to the front of the line, she reveals to Krusty that she is his daughter. Sophie tells Krusty that he met her mother when she served as a soldier in the Gulf War, spending the night with her after a USO show; however, she dumped (and almost killed) Krusty the next day after he ruined her attempted assassination of Saddam Hussein to protect his comedy routine based on him and has hated Krusty and clowns ever since. Krusty proves a distant and unemotional father, and on a trip to the beach, he sees Homer playing with the kids and asks him for advice on how to be a good parent. Krusty and his daughter begin to bond, and Sophie shows Krusty her prized violin and plays a song for him. That night, Krusty plays in a poker game with Fat Tony, where he is dealt four aces with a king kicker, but is forced to bet Sophie's violin after running out of money and betting his Rolex watch, and loses the hand to Fat Tony, who had a straight flush (2-3-4-5-6 of diamonds). Sophie loses her trust in Krusty upon hearing the news, and Krusty turns to Homer for help; the two attempt to break into Fat Tony's mansion while a mafia summit is being held. They find a room filled with violin cases, but most of them are filled with weapons. They attempt to sneak out with the cases, but they fall to the ground and a mob shootout erupts around
https://en.wikipedia.org/wiki/Whifflet%20Line
The Whifflet Line is one of the lines within the Strathclyde suburban rail network in Scotland. History The line was built between 1863 and 1865 as the Rutherglen and Coatbridge Railway, part of the Caledonian Railway. It opened to goods traffic (mainly coal and iron) in September 1865 and to passengers in August 1866. It has been in continuous operation ever since. Stations in the first service on the line were at , (now ), , and (until 1964). Passenger services ceased in November 1966 following the Beeching Axe (latterly running to ). Between 1972 and 1974 scheduled passenger trains between Glasgow Central and Perth used the route. For the following twenty years, the route was only used for freight and diverted passenger services. However the line was reopened by British Rail to scheduled passenger services with intermediate stations on 4 October 1993, running to the newly built station at rather than Coatbridge Central as previously. Line description The modern line currently serves seven stations. It connects parts of south east Glasgow, Bargeddie and Coatbridge to Glasgow city centre. Between and Rutherglen, the line shares the same track as the West Coast Main Line (and is hence electrified) before branching off in a north easterly direction towards Coatbridge (this section is now electrified). Services The route is operated by ScotRail. 1993 to 2002 Following re-opening as a passenger line, service was provided by a mix of 1980s Class 156 and 1950s Class 101 DMUs. During their final years, the last of BR ScotRail's power-twin Class 101 2-car DMUs, reduced from 3-car by having the centre trailer removed, operated the Whifflet and Paisley Canal lines almost exclusively, based at Corkerhill Depot. In 2002 the remaining 101s were sent South to Manchester and more modern units took over the services. 2009 service pattern Trains operated at a half-hour frequency. All services were scheduled to run as two car trains only, although four carriage services were technically possible. Services were operated using Class 158 DMUs and the occasional Class 156 DMU. Three trains operated on this route during the day, usually remaining dedicated on this service throughout the day. From December 2014 In late 2014, the Whifflet Line electrification was commissioned and from 14 December 2014 the service was incorporated into the Argyle Line, operated by EMUs. At the same time an all year round Sunday service commenced. Current Sunday Service is hourly from Balloch to Motherwell via Whifflet Line Developments In 2006, Network Rail announced tentative proposals to electrify the Rutherglen - Whifflet section, as part of a £1.4bn upgrade to Scotland's railways. The main benefits of this scheme were to provide an enhanced frequency for the Whifflet to central Glasgow routes and to provide an electric diversionary path for long distance WCML services. The new timetable came into operation on 14 December 2014, the Whifflet Line has been added to t
https://en.wikipedia.org/wiki/Homer%20vs.%20Dignity
"Homer vs. Dignity" is the fifth episode of the twelfth season of the American animated television series The Simpsons. It first aired on the Fox network in the United States on November 26, 2000. In the episode, Mr. Burns hires a cash-strapped Homer as his "prank monkey", paying him to play pranks on others and humiliate himself in public. The episode was written by Rob LaZebnik in his last writing credit for over eight years, until season 20's "Father Knows Worst". The episode features cultural references to The Magic Christian and The Birds. Plot The Simpsons go out to dinner to celebrate Bart getting his first test "A" grade; however, Homer's credit card is rejected and, after a failed escape attempt, the family are made to sing for customers to work off their bill. After Homer reveals that he sold the back seats of his car for gasoline money (which he spent on a novelty car horn), he and Marge seek advice from financial planner Lindsay Naegle, who informs them that, due to poor money management by Homer, the family have multiple mortgages and will need to declare bankruptcy several times. Meanwhile, Mr. Burns is looking to amuse him while his assistant, Smithers, is in New Mexico performing in a Malibu Stacy musical that he wrote. When Homer asks if he can have a raise, Burns offers him cash in exchange for throwing pudding at Lenny. He does so, amusing Burns, who makes Homer his "prank monkey". Burns pays Homer to perform embarrassing and cruel tasks, such as pretending to be a baby who "made a boom boom" at the sports stadium restroom, and eating a mint condition Spiderman #1 in front of Comic Book Guy, eventually having Homer masquerade as the Springfield Zoo's new female panda, Sim-Sim, and is electrocuted by animal handlers before being raped by the zoo's male panda, Ping-Ping. Lisa discovers what Homer has been doing and convinces him his dignity is more important than money. She suggests donating the money he has earned to needy children, so he spends it on toys at Costington's Department Store. Mr. Costington, impressed by this show of generosity, suggests that Homer play Santa Claus in the Thanksgiving Day parade. During the parade, Burns offers Homer a million dollars to throw buckets of fish guts to the crowd; rebuked, Burns performs the prank himself while Homer thanks Lisa for giving him dignity, whilst the townspeople are attacked by seagulls. Production The episode was written by Rob LaZebnik and directed by Neil Affleck, the last episode that he directed. It is LaZebnik's first full written script with the first script being "G-G-Ghost D-D-Dad" from "Treehouse of Horror XI" and draws its plot from the British film The Magic Christian, itself an adaptation of Terry Southern's novel of the same name. There was originally a sub-plot with Smithers' musical. LaZebnik brought some friends and his wife to the table read and during the third act was repeatedly ended and went badly making Larry Doyle laugh hysterically. There w
https://en.wikipedia.org/wiki/Hawaiian%20Eye
Hawaiian Eye is an American detective television series that ran from October 1959 to April 1963 on the ABC television network. Premise Private investigator Tracy Steele (Anthony Eisley) and his half-Hawaiian partner, Tom Lopaka (Robert Conrad), own Hawaiian Eye, a combination detective agency and private security firm, located in Honolulu, Hawaii. Their principal client is the Hawaiian Village Hotel, which in exchange for security services, provides the agency with a luxurious private compound on the hotel grounds. The partners investigate mysteries and protect clients with the sometime help of photographer Cricket Blake (Connie Stevens), who also sings at the hotel's Shell Bar, and a ukulele-playing cab driver Kim Quisado (Poncie Ponce), who has connections throughout the islands. Engineer turned detective Greg McKenzie (Grant Williams), joins the agency later on as a full partner, while hotel social director Philip Barton (Troy Donahue) lends a hand after Tracy Steele departs. Background and run Hawaiian Eye was one of several ABC/Warner Bros. Television detective series of the era situated in different exotic locales. Others included Hollywood-based 77 Sunset Strip; Bourbon Street Beat, set in New Orleans; and Miami's Surfside 6. In reality, all were shot on the Warner Bros. backlot in Burbank, Calif. making it easy for characters—and sometimes whole scripts—to cross over. Although the shows are not spin-offs in the traditional sense, Sunset was the first in this chain of "exotic location detective series". In this regard, Hawaiian Eye was the most viable of the Sunset look-alikes, lasting four seasons. The show's debut coincided with several real-world developments that helped contribute to its longevity. These were the granting of statehood to Hawaii, the advent of mass tourism to the new state brought about by the introduction of jetliners for commercial passenger flights, and the promotional efforts of Henry J. Kaiser, whose real-estate projects in Honolulu included building the hotel complex originally known as Kaiser's Hawaiian Village (later the Hilton Hawaiian Village Hotel). Cast The series regulars, who were shown during the opening credits, are listed below in the order in which they debuted during the show's four-year run. Recurring characters Lt. Danny Quon, played by Mel Prestidge, was the Hawaiian Eye's main contact with the Honolulu Police Department. Moke, played by Douglas Mossman, was the chief uniformed security officer for Hawaiian Eye. He went by several variant names in the first season before the writers finally settled on one. Paul, played by Andre Philippe, was the master of ceremonies at the Shell Bar in the Hawaiian Village Hotel. Bert, played by Sam Rawlins, was the doorman at the Hawaiian Village Hotel. Teo, played by several actors including Ralph Hanalei and Keone, was a uniformed security guard for the Hawaiian Eye agency. Roy Hondine, played by Rush Williams, was a columnist for a major Hon
https://en.wikipedia.org/wiki/ASL%20Airlines%20Ireland
ASL Airlines Ireland (ASLI), formerly Air Contractors, is a cargo airline with an extensive operations network. It operates scheduled freight services throughout Europe on behalf of major parcel integrators such as Amazon, FedEx Feeder and DHL Express; and some wet lease services for scheduled airlines. ASL Aviation Holdings DAC, the parent company of ASL Airlines Ireland, is headquartered in Swords, County Dublin, Ireland. History The airline was established and started operations in 1972, as Air Bridge Carriers at East Midlands Airport. In September 1992 the name Hunting Cargo Airlines was adopted and in 1997 the transfer of all airline operations to Ireland was completed. In June 1998 the Hunting Group sold its aviation arm to a joint consortium of CMB Compagnie Maritime Belge and Safair (part of the Imperial Group) and the airline was rebranded Air Contractors. The Imperial Group transferred its 49% shareholding in the company to 3P Air Freighters/Petercam S.A. in 2007. Air Contractors acquired French carrier Europe Airpost on 14 March 2008. Following the acquisition of EAP into the ACL group of companies, the group was rebranded ASL Aviation Group, representing the three core activities of the group; Airlines, Support and Leasing. In 2010 Air Contractors entered a new era with the start of passenger flying on a Boeing 737-300 aircraft in conjunction with its Group partner, Europe Airpost. On 4 June 2015, ASL Aviation Group announced that Air Contractors would be rebranded as ASL Airlines Ireland, Europe Airpost as ASL Airlines France, Farnair Hungary as ASL Airlines Hungary and Farnair Switzerland as ASL Airlines Switzerland. The company announced on 5 February 2016 that it had agreed to buy TNT Airways and PAN Air, on the condition that FedEx's purchase of TNT goes ahead. The sale went through in May 2016. TNT Airways became ASL Airlines Belgium and Pan Air became ASL Airlines Spain. In early 2017, ASL Aviation Group rebranded as ASL Aviation Holdings. Subsidiary ASL Airlines Switzerland ceased all operations on 1 February 2018, while ASL Airlines Spain ceased all operations in August of that same year. In April 2023 ASL Aviation Holdings acquired Pionair Australia. Destinations ASLI maintains crew bases in 10 European countries and has its own maintenance hangar in Shannon, Ireland. The airline's operations span a network of more than 50 regular destinations across Europe, North America and the Middle East under its own brand name and on behalf of customers such as DHL, Amazon and FedEx. Fleet The ASL Airlines Ireland fleet consists of the following aircraft as of June 2022; In June 2021, ASL Aviation Holdings announced an order with Boeing for up to 20 737-800 Boeing Converted Freighter (BCF) aircraft - 10 firm orders and 10 options at the Paris Air Show. This was extended to an additional 20 737-800 Boeing Converted Freighters (BCF) in March 2022. ASL's order, including options brings the number of 737-800BCF to 40 aircraft
https://en.wikipedia.org/wiki/Mensch%20Computer
The Mensch Computer is a personal computer system produced by the Western Design Center (WDC). It is based on the WDC 65C265 microcontroller, which implements the instruction sets of two microprocessors: the 16-bit W65C816/65816, and the 8-bit 6502. The computer is named after Bill Mensch, designer of the 6502 and subsequent series of microprocessor. The system is designed for hobbyists and people who enjoy computer programming, especially at the assembly language level, and includes a basic set of peripherals which can be expanded by the owner. Much software originally written for other computer systems which use the 65816 or 6502 instruction sets (such as the Nintendo Entertainment System, Super Nintendo, or Apple IIGS, among others) can be run on the Mensch Computer (either directly as binary object code or through reassembling the software source code), to the extent that such software does not rely on hardware configurations which differ from the Mensch Computer. The Mensch Computer includes a read-only memory (ROM) machine code monitor (a type of firmware), and many software routines are available to programmers by calling subroutines in the ROM. Typically, the system runs Mensch Works, a software suite also named after Bill Mensch. References External links Microcomputers
https://en.wikipedia.org/wiki/Networked%20narrative
A networked narrative, also known as a network narrative or distributed narrative, is a language partitioned across a network of interconnected authors, access points, and/or discrete threads. It is not driven by the specificity of details; rather, details emerge through a co-construction of the ultimate story by the various participants or elements. It does help the user to study a topic better. Networked narratives as decentralized stories Networked narratives can be seen as being defined by their rejection of narrative unity. As a consequence, such narratives escape the constraints of centralized authorship, distribution, and storytelling. One of the most visible forms of networked narrative has been the alternate reality game, an interactive scenario that is experienced through multiple channels and adapts to player behavior. Additionally, networked narratives have been represented in films such as Crash and Syriana through highly decentralized, threaded plots. Networked narratives as social movements Marco Deseriis breaks down networked narratives in three central functions: denotative, performing, and pragmatic. He claims that socially-created networked narratives: 1. Represent an initially unsolved conflict, dilemma, or other situation. 2. Invite viewers to perform a role in the story. 3. Are oriented around a system of beliefs or ethics that resonates with participants and allows them to create new stories. Internet activism, hacktivism, and the free software movement are principal examples of such narratives in practice. While adherents to these movements tend to share a common ethos, there is no central authority - the direction of the narrative hinges on its participants. Notes Interactive films
https://en.wikipedia.org/wiki/Rematerialization
In computer science, rematerialization or remat is a compiler optimization which saves time by recomputing a value instead of loading it from memory. It is typically tightly integrated with register allocation, where it is used as an alternative to spilling registers to memory. It was conceived by Gregory Chaitin, Marc Auslander, Ashok Chandra, John Cocke, Martin Hopkins and Peter Markstein and implemented in the Pl.8 compiler for the 801 Minicomputer in the late 1970s. Later improvements were made by Preston Briggs, Keith D. Cooper, and Linda Torczon in 1992. Traditional optimizations such as common subexpression elimination and loop invariant hoisting often focus on eliminating redundant computation. Since computation requires CPU cycles, this is usually a good thing, but it has the potentially devastating side effect that it can increase the live ranges of variables and create many new variables, resulting in spills during register allocation. Rematerialization is nearly the opposite: it decreases register pressure by increasing the amount of CPU computation. To avoid adding more computation time than necessary, rematerialization is done only when the compiler can be confident that it will be of benefit — that is, when a register spill to memory would otherwise occur. Rematerialization works by keeping track of the expression used to compute each variable, using the concept of available expressions. Sometimes the variables used to compute a value are modified, and so can no longer be used to rematerialize that value. The expression is then said to no longer be available. Other criteria must also be fulfilled, for example a maximum complexity on the expression used to rematerialize the value; it would do no good to rematerialize a value using a complex computation that takes more time than a load. Usually the expression must also have no side effects. External links Chaitin, Gregory, Marc Auslander, Ashok Chandra, John Cocke, Martin Hopkins, and Peter Markstein. "Register Allocation Via Coloring, Computer Languages, Vol. 6, No. 1, 1981, pp. 47-57" P. Briggs, K. D. Cooper, and L. Torczon. Rematerialization. Proceedings of the SIGPLAN 92 Conference on Programming Language Design and Implementation, SIGPLAN Notices 27(7), p.311-321. July 1992. Mukta Punjabi. Register Rematerialization in GCC. Discusses gcc's implementation of rematerialization. Compiler optimizations
https://en.wikipedia.org/wiki/Emergency%20Broadcast%20Network
Emergency Broadcast Network is a multimedia performance group formed in 1991 that took its name from the Emergency Broadcast System. The founders were Rhode Island School of Design graduates Joshua Pearson, Gardner Post, and Brian Kane (author of the Vujak VJ software). Kane left EBN in 1992. The EBN Live Team included DJ Ron O'Donnell; video artist-technologist Greg Deocampo, founder of Company of Science and Art (CoSA); founding CTO of IFilm.com), artist-designer Tracy Brown; and programmer-technologist Mark Marinello. History The first EBN video project was a musical remix of the Gulf War, created in 1991 as the war was still ongoing. Pearson cited their interest in how the media turned information about the war into entertainment as an inspiration for the band. The VHS tape of the remix project, which contained the George H. W. Bush "We Will Rock You" cover, became a viral underground hit, and was distributed widely by fans as bootleg copies. In the summer of 1991, EBN traveled with the first Lollapalooza tour, distributing tapes and showing their videos on a modified station wagon with TVs on the roof. The group also became well known for their media sculptures and stage props which were created by Gardner Post. Bono of U2 took notice of their work and hired them to provide visuals for their Zoo TV Tour. EBN's video work featured prominently into the show, and their "We Will Rock You" cover was played at the beginning of each show. EBN also produced visuals for The Edge's performance of "Numb" on the 1993 MTV Video Music Awards. In addition to the visuals, audio from those clips were featured in the live performance to create rhythmic effects. In 1997, EBN collaborated with U2 for an MTV miniseries, ZooTV: The Television Program, which featured satirical videos and remixes. In 1998, EBN returned to the MTV Video Music Awards fold by designing the respective montage videos for the 1998 nominees announced in their signature "video scratching" style. In 1996, the group contributed to the AIDS benefit album Offbeat: A Red Hot Soundtrip produced by the Red Hot Organization. In 2011, EBN collaborated with Nico for the 10th Year anniversary of the EJ Midi Turntable at First Avenue. Commercial Entertainment Product Commercial Entertainment Product was released in 1992 on TVT Records. Spin called it "dizzyingly hypnotic, politically subversive sound-and-vision barrage that renders superfluous its repeated exhortation to 'try psychoactive drugs!'". Videos included a cover of "We Will Rock You" by Queen, with a vocal track made up of remixed clips of George H. W. Bush, who made announcements about the Gulf War. Track Listing Psychoactive Drugs Get Down, Get Down Station Identification Don't Back Down I Will Teach You Behavior Modification / We Will Rock You I Am A Man Lawrence Welk Is Dead Watch Television Syncopated Ordinance Demonstration #1 Operational Report Telecommunication Breakdown The album Telecommunication Breakdow
https://en.wikipedia.org/wiki/Global%20Oscillations%20Network%20Group
The Global Oscillation Network Group (GONG) is a worldwide network of six identical telescopes, designed to have 24/7 observations of the Sun. The network serves multiple purposes, including the provision of operation data for use in space weather prediction, and the study of solar internal structure and dynamics using helioseismology. Deployed in 1995, GONG is a set of six observing systems geographically distributed around the Earth so that the Sun can be observed as continuously as possible. The six observatories are the Teide Observatory (Canary Islands), the Learmonth Solar Observatory (Western Australia), the Big Bear Solar Observatory (California), the Mauna Loa Observatory (Hawaii), the Udaipur Solar Observatory (India) and the Cerro Tololo Inter-American Observatory (Chile). With these sites, GONG typically can observe the Sun 91% of the time, 24/7. GONG was constructed to provide observations for helioseismology, which aims to understand the solar interior by analyzing the sound waves that are trapped in it. In 2001, the original GONG detectors were upgraded to 1000 x 1000 pixels and continuous magnetograms were implemented, and the new system is known as GONG++. While GONG still provides helioseismology data, it now also provides full-disk solar magnetic field maps (magnetograms) every minute and full-disk images of the Sun in the wavelength of the Hydrogen–α (Hα) spectral line every 20 seconds. These data products are used for research into the solar magnetic field and chromosphere but are also essential inputs into forecasts of space weather. The NOAA Space Weather Prediction Center (SWPC), the US Airforce 557th Weather Wing, and the NASA Community Coordinated Modeling Center (CCMC) all use GONG data to predict space weather conditions. The GONG Project is managed by the National Solar Observatory's Integrated Synoptic Program (NISP), which is operated by AURA, Inc. under a cooperative agreement with the National Science Foundation. GONG has been in operation since 1995 and is aging rapidly. To replace it, NSO is proposing to design and build a next-generation Ground-based solar Observing Network, provisionally named ngGONG. GONG Gallery External links GONG info at the National Solar Observatory site Solar observatories
https://en.wikipedia.org/wiki/Container%20format
A container format (informally, sometimes called a wrapper) or metafile is a file format that allows multiple data streams to be embedded into a single file, usually along with metadata for identifying and further detailing those streams. Notable examples of container formats include archive files (such as the ZIP format) and formats used for multimedia playback (such as Matroska, MP4, and AVI). Among the earliest cross-platform container formats were Distinguished Encoding Rules and the 1985 Interchange File Format. Design Although containers may identify how data or metadata is encoded, they do not actually provide instructions about how to decode that data. A program that can open a container must also use an appropriate codec to decode its contents. If the program doesn't have the required algorithm, it can't use the contained data. In these cases, programs usually emit an error message that complains of a missing codec, which users may be able to acquire. Container formats can be made to wrap any kind of data. Though there are some examples of such file formats (e.g. Microsoft Windows's DLL files), most container formats are specialized for specific data requirements. For example, since audio and video streams can be coded and decoded with many different algorithms, a container format may be used to provide the appearance of a single file format to users of multimedia playback software. Considerations The differences between various container formats arise from five main issues: Popularity; how widely supported a container is. Overhead. This is the difference in file-size between two files with the same content in a different container. Support for advanced codec functionality. Older formats such as AVI do not support new codec features like B-frames, VBR audio or VFR video natively. The format may be "hacked" to add support, but this creates compatibility problems. Support for advanced content, such as chapters, subtitles, meta-tags, user-data. Support of streaming media. Single coding formats In addition to pure container formats, which specify only the wrapper but not the coding, a number of file formats specify both a storage layer and the coding, as part of modular design and forward compatibility. Examples include JPEG File Interchange Format (JFIF) for containing JPEG data, and Portable Network Graphics (PNG). In principle, coding can be changed while the storage layer is retained; for example, Multiple-image Network Graphics (MNG) uses the PNG container format but provides animation, while JPEG Network Graphics (JNG) puts JPEG encoded data in a PNG container; in both cases however, the different formats have different magic numbers – the format specifies the coding, though a MNG can contain both PNG-encoded images and JPEG-encoded images. Multimedia container formats The container file is used to identify and interleave different data types. Simpler container formats can contain different types of audio formats, whi
https://en.wikipedia.org/wiki/Thottbot
Thottbot was a website originally launched in 2001 as a news aggregator for various online role-playing games. In August 2004, the site was re-written into a searchable database exclusively for the MMORPG World of Warcraft, as well as a plug-in that could be used in the game itself to gather additional data. The website was discontinued on November 30, 2010 when its parent company, ZAM Network (now Fanbyte), merged it with its similar database website Wowhead. Since the launch of World of Warcraft Classic, Thottbot is now redirected to the Classic version of Wowhead, with a "Thottbot theme" available. History The original Thottbot was a news aggregator created by Bill "Aftathott" Dyess, founder of the EverQuest guild "Afterlife", in March 2001. Its purpose was to comb various video game websites for news and information on a number of MMORPGs with a focus on EverQuest, and later grew to include other games such as PlanetSide, Meridian 59, Dark Age of Camelot, and World of Warcraft. In August 2004, Thottbot was re-written to become a searchable database that focused exclusively on World of Warcraft three months prior to the game's retail release. Thottbot would also become affiliated with Cosmos, a popular collection of user-interface modifications. The associated World of Warcraft plug-in, which is programmed in the Lua programming language, collected information while a person is playing the game. Users could then upload the information to the website's database. The information on the website only came from players using the plug-in and who took the time to upload the data. Information contained on Thottbot included descriptions of items, weapons and armor pieces which web users could browse and search. Users could also create a profile, so others could search and view different players. This required the user to run the plug-in, and since not every player had the plug-in, not every player was represented on the database. In June 2007, Thottbot's parent company ZAM Network acquired the World of Warcraft website Wowhead for $1 million. Thottbot continued to run alongside Wowhead for over 3 years before it was discontinued on November 30, 2010; the website's URL now redirecting to Wowhead itself. While some pages of Thottbot were still accessible through Wowhead, these were completely removed on November 16, 2016 with all Thottbot URLs forwarding to their equivalent Wowhead pages. With the launch of World of Warcraft Classic in 2019, Thottbot.com now redirects to Wowhead's Classic version with an optional Thottbot visual theme. Popularity and reputation Simon Carless of Gamasutra described Thottbot as a "major item listing site". As of March 9, 2008, web traffic company Alexa reported that Thottbot.com was the 250th most visited site on the internet. During the 2006 Austin Game Conference, World of Warcraft lead designer Rob Pardo spoke of the hardcore market and casual market for World of Warcraft, saying "The people that don't go to Thot
https://en.wikipedia.org/wiki/Millersville%2C%20Maryland
Millersville is an unincorporated community in Anne Arundel County, Maryland, United States. Population was 20,965 in 2015 based on American Community Survey (U.S. Census Bureau) data. Geography Millersville is located at (39.0596, -76.6480). History Millersville, named for the first Postmaster, George Miller, was the first Post Office to be established, on July 24, 1841, along the Annapolis & Elkridge Railroad (the A & E). Completed in 1840, the A & E was one of the earliest rail lines in the U.S., connecting Annapolis with the Washington Branch of the Baltimore and Ohio Railroad. Today, Millersville is largely suburban, but the core of the historic village remains. The Childs Residence, listed on the National Register of Historic Places in 1986, is a focal point of the new bike trail that passes through the historic core. Education Secondary schools Elvaton Christian Academy Old Mill High School Rockbridge Academy Olde Mill Christian Academy Old Mill Middle North Old Mill Middle South Severna Park Middle School (serves Millersville students residing in Shipley’s Choice and Brittingham) Severna Park High School (serves Millersville students residing in Shipley’s Choice and Brittingham) Colleges and universities Anne Arundel Community College 288-acre park Parks and recreation Baltimore & Annapolis Trail Kinder Farm Park Southgate/Old Mill Park References Unincorporated communities in Anne Arundel County, Maryland Unincorporated communities in Maryland
https://en.wikipedia.org/wiki/Aviaexpress
Aviaexpress was an airline based in Hungary. Code data IATA Code: RX ICAO Code: AEH (no longer allocated) Callsign: Avex (no longer allocated) Fleet As of August 2006 the Aviaexpress fleet included: 2 Let L-410 UVP References External links Defunct airlines of Hungary Airlines established in 1988 Airlines disestablished in 2003 Hungarian companies established in 1988 2003 disestablishments in Hungary
https://en.wikipedia.org/wiki/Freedom%20of%20Information%20Act
Freedom of Information Act may refer to the following legislations in different jurisdictions which mandate the national government to disclose certain data to the general public upon request: Freedom of Information Act (United States) of 1966 Freedom of Information Act 1982, the Australian act Freedom of Information Act 2000, the UK act Freedom of Information (Scotland) Act 2002 Freedom of Information Act in Pakistan Freedom of Information Act (Illinois) See also Freedom of information laws by country
https://en.wikipedia.org/wiki/Nebraska%20Statewide%20Arboretum
The Nebraska Statewide Arboretum is a network of nearly 100 arboreta, botanical gardens, parks, and other public landscapes in 56 communities across Nebraska, and supported by the arboretum office at the University of Nebraska in Lincoln, Nebraska. The arboretum was founded in 1978 as a partnership with the University of Nebraska-Lincoln Institute of Agriculture and Natural Resources and is an affiliate of the Center for Plant Conservation. The Nebraska Statewide Arboretum promotes and sells native plants as part of a goal to create environmentally-sustainable landscapes across the state. Some of its larger collections include sites at Omaha's Metropolitan Community College at Fort Omaha, Joslyn Castle, Swanson Science Park, the Blair Community Arboretum (Steyer Park, Black Elk Park, and the Dana College campus), Gilman Park Arboretum in Pierce, and Clemmons Park Arboretum in Fremont. See also List of botanical gardens in the United States References External links Nebraska Statewide Arboretum Nebraska Forest Service Arboreta in Nebraska Botanical gardens in Nebraska 1978 establishments in Nebraska
https://en.wikipedia.org/wiki/Kroton%20%28Cyberman%29
Kroton is a fictional character who appeared in the Doctor Who Magazine comic strip based on the long-running British science fiction television series Doctor Who. He was a companion of the Eighth Doctor. The character is separate from the Krotons, the villains of the 1968 serial The Krotons. Kroton is a Cyberman, a member of the cybernetically augmented race that is one of the most persistent enemies of the Doctor. However, unlike other Cybermen, Kroton still retains human feelings despite undergoing cyber-conversion. Kroton first appeared in the comic strip Throwback — The Soul of a Cyberman, published in Doctor Who Weekly #5-#7 (as it then was), written by Steve Moore and drawn by Steve Dillon. Character history In Throwback, the Cybermen invade the planet Mondaran but continue to encounter heavy human resistance. Among the reinforcements from the Cyberman colony world Telos is Junior Cyberleader Kroton, who discovers that he sympathizes with the rebels. He helps the surviving rebels escape the planet, even to the point of killing his fellow Cybermen to defend the rebels. However, uncertain about the meaning of his own existence, he does not stay with the humans, but pilots his ship alone into space, planning to let his power supplies run down. In his battles with the doctors, he gained many battle wounds but fell to a glorious death. However, Kroton survives, encountering a pleasure cruiser that is caught in a time warp (Ship of Fools, DWW #23-#24). Despite the passengers' lack of concern, he manages to access the robot pilot of the ship and free it from its endless looping through time. Unfortunately, the ship has been trapped in the time warp for 628 years, and when time catches up with the passengers, they all instantly age and die, leaving Kroton alone with only the robot pilot for the company. Kroton did not reappear until nearly 19 years later, in Unnatural Born Killers (DWM #277), where he fights off a Sontaran raid on a primitive human village; in the time since his last appearances, he has become more proactive and physical as well as speaking more colloquially. The story set up his appearance less than a year later in The Company of Thieves (DWM #284-#286) where he meets the Eighth Doctor and his companion Izzy on a freighter that has been captured by space pirates. After initially mistaking him for a typical Cyberman and trying to kill him, the Doctor realizes that Kroton is different. Together, they deal with the pirates who are attempting to capture an intelligent super-weapon. At the conclusion of that story, the Doctor welcomes Kroton aboard the TARDIS. The TARDIS next takes the Doctor, Izzy, and Kroton to the museum planet Paradost, where memories can be accessed and enhanced by means of mnemonic crystals. However, Kroton refuses to use them, believing that remembering his life before cyber-conversion would be too painful. The travelers' visit coincides with the launch of a jihad by the planet Dhakan's Church of the Glo
https://en.wikipedia.org/wiki/Signetics%202650
The Signetics 2650 was an 8-bit microprocessor introduced in July 1975. According to Adam Osborne's book An Introduction to Microprocessors Vol 2: Some Real Products, it was "the most minicomputer-like" of the microprocessors available at the time. A combination of missing features and odd memory access limited its appeal, and the system saw little use in the market. Development In 1972, Signetics' Jack Curtis hired John Kessler of IBM to lead the design of a new single-chip CPU intended to compete with minicomputer systems. Kessler selected the IBM 1130 as the model for the new design. The 1130, released in 1965, was a 16-bit minicomputer that shared many design features with other minis of the era. While Kessler designed the architecture, Kent Andreas laid out the CPU using a recently developed ion implantation NMOS process. In contrast to the far more common PMOS process of the era, NMOS used less power and dissipated less heat. This allowed the chip to be run at higher speeds than PMOS CPU designs, and the first 2650's ran at the same 1.25 MHz speed as the contemporary models of the 1130. When it was designed in 1972, the 2650 was among the most advanced designs on the market, easily outperforming and out-featuring the Intel 4004 and 8008 of the same era. In spite of this, the design was not released to production. At the time, Signetics was heavily involved with Dolby Laboratories, developing integrated circuits that implemented Dolby's suite of noise-reduction systems. Production of the 2650 was pushed back, and the CPU was not formally introduced until July 1975. By 1975, several new CPUs had been introduced, designed from the start to be 8-bit machines rather than mimicking an older design, and the 2650's advantages were no longer as compelling. In 1975, Philips purchased Signetics, and from that point versions of the 2650 can be found with both Signetics or Philips branding. In March 1976, Signetics reached a second-source agreement with Advanced Memory Systems (AMS). At that time, most CPU firms were very small and no one would buy a design from a company that might go bankrupt. Second-sourcing was an important guarantee that the design would remain available in this eventuality. AMS was already acting as a second-source for the RCA 1802, an advanced CMOS design, and the NMOS 2650 was seen as a useful adjunct that would not directly compete with the 1802. Unfortunately, in November AMS was purchased by Intersil, who had their own Intersil 6100, a single-chip version of the PDP-8 mini. Intersil dropped production of the 2650. Signetics tried again with National Semiconductor in 1977, who planned to introduce versions in the last quarter of the year. For unknown reasons, this appears to have never happened, and only a single example of an NS version, from France, has ever been found. Signetics continued the development of the 2650, introducing two new models in 1977. The 2650A was a reworked version of the original layout intende
https://en.wikipedia.org/wiki/Git
Git () is a distributed version control system that tracks changes in any set of computer files, usually used for coordinating work among programmers who are collaboratively developing source code during software development. Its goals include speed, data integrity, and support for distributed, non-linear workflows (thousands of parallel branches running on different computers). Git was originally authored by Linus Torvalds in 2005 for development of the Linux kernel, with other kernel developers contributing to its initial development. Since 2005, Junio Hamano has been the core maintainer. As with most other distributed version control systems, and unlike most client–server systems, every Git directory on every computer is a full-fledged repository with complete history and full version-tracking abilities, independent of network access or a central server. Git is free and open-source software shared under the GPL-2.0-only license. Since its creation, Git has become the most popular distributed version control system, with nearly 95% of developers reporting it as their primary version control system as of 2022. There are many popular offerings of Git repository services, including GitHub, SourceForge, Bitbucket and GitLab. History Git development was started by Torvalds in April 2005 when the proprietary source-control management (SCM) system used for Linux kernel development since 2002, BitKeeper, revoked its free license for Linux development. The copyright holder of BitKeeper, Larry McVoy, claimed that Andrew Tridgell had created SourcePuller by reverse engineering the BitKeeper protocols. The same incident also spurred the creation of another version-control system, Mercurial. Torvalds wanted a distributed system that he could use like BitKeeper, but none of the available free systems met his needs. He cited an example of a source-control management system needing 30 seconds to apply a patch and update all associated metadata, and noted that this would not scale to the needs of Linux kernel development, where synchronizing with fellow maintainers could require 250 such actions at once. For his design criterion, he specified that patching should take no more than three seconds, and added three more goals: Take the Concurrent Versions System (CVS) as an example of what not to do; if in doubt, make the exact opposite decision. Support a distributed, BitKeeper-like workflow. Include very strong safeguards against corruption, either accidental or malicious. These criteria eliminated every version-control system in use at the time, so immediately after the 2.6.12-rc2 Linux kernel development release, Torvalds set out to write his own. The development of Git began on 3 April 2005. Torvalds announced the project on 6 April and became self-hosting the next day. The first merge of multiple branches took place on 18 April. Torvalds achieved his performance goals; on 29 April, the nascent Git was benchmarked recording patches to the Linux kernel
https://en.wikipedia.org/wiki/List%20of%20Alabama%20locations%20by%20per%20capita%20income
Alabama has a per capita income of $28,934 (2020). Its median household income is $52,035 (2020), with 16.1% of Alabama residents living in poverty. Alabama counties ranked by per capita income Data is from the 2020 United States census. References Locations by per capita income United States locations by per capita income Income Income
https://en.wikipedia.org/wiki/List%20of%20Arkansas%20locations%20by%20per%20capita%20income
Arkansas is the 48th richest state in the United States of America, with a per capita income of $16,904 (2000). Arkansas Counties Ranked by Per Capita Income Note: Data is from the 2010 United States Census Data and the 2006-2010 American Community Survey 5-Year Estimates. References Arkansas Economy of Arkansas Income
https://en.wikipedia.org/wiki/List%20of%20Georgia%20%28U.S.%20state%29%20locations%20by%20per%20capita%20income
Georgia is the thirty-third-richest (33rd) state in the United States of America, with a median household income of US$46,007 (2011). Georgia counties ranked by per capita income Note: Data is from the 2015 United States Census Data and the 2006-2010 American Community Survey 5-Year Estimates. References United States locations by per capita income Economy of Georgia (U.S. state) Income
https://en.wikipedia.org/wiki/PBCore
The PBCore metadata standard (Public Broadcasting Metadata Dictionary) was created by the public broadcasting community in the United States of America for use by public broadcasters and related communities that manage audiovisual assets, including libraries, archives, independent producers, etc. PBCore is organized as a set of specified fields that can be used in database applications, and it can be used as a data model for media cataloging and asset management systems. As an XML schema, PBCore enables data exchange between media collections, systems and organizations. Background Initial development funding for PBCore was provided by the Corporation for Public Broadcasting starting in 2001. 1.0 – April 2005 PBCore Version 1.0 defined 48 metadata elements which combined to describe a media asset or resource's intellectual content, creation, creators, usage, permissions, constraints, use obligations, and its form or format in the physical or digital realm. 1.1 – January 2007 PBCore Version 1.1 enhanced the binding of related metadata elements (such as Title and TitleType) into new, hierarchically-organized "Element Containers." In that arrangement, each Element Container collects and houses associated "child" Elements that are thematically related. Basically, what was a "flat" arrangement of the 48 PBCore elements became a more "nested" structure of 53 elements, arranged in 15 containers and 3 sub-containers. 1.2.1 – December 2008 PBCore version 1.2.1 was published to better accommodate the possibility that a media asset may have multiple instantiations with various technical attributes. A new container called "pbcoreEssenceTrack" contains all other new elements to express different attributes associated with multiple instantiations. PBCore v1.2.1 used 61 elements organized into 15 containers and 4 sub-containers. 1.3 – August 2010 PBCore version 1.3 added a new top-level element, a new attribute of string values, and removed the previous requirement to describe one or more instantiations of any asset. Its new element, "pbcoreAssetType," could be used to explicitly declare the asset's broad business purpose, and its new attribute "source" could help clarify the text value of an element, much like the attribute "version" has done. PBCore v1.3 used 62 elements organized into 15 containers and 4 sub-containers. 2.0 - November 2011 PBCore version 2.0 was released at the annual conference of the Association of Moving Image Archivists in November 2011. This was a major revision of the schema, with the addition of two new top-level elements: The ""pbcoreCollection"" element allows for wrapping any number of pbcoreDescriptionDocuments in a collection or feed for exchanging any number of asset records between systems. The ""pbcoreInstantiationDocument" provides a metadata container for physical or digital instantiations for which no descriptive metadata exists, which was disallowed in previous versions of PBCore. Another significant change i
https://en.wikipedia.org/wiki/Jessica%20Fridrich
Jessica Fridrich (born Jiří Fridrich) is a professor at Binghamton University, who specializes in data hiding applications in digital imagery. She is also known for documenting and popularizing the CFOP method (sometimes referred to as the "Fridrich method"), one of the most commonly used methods for speedsolving the Rubik's Cube, also known as speedcubing. She is considered one of the pioneers of speedcubing, along with Lars Petrus. Nearly all of the fastest speedcubers have based their methods on Fridrich's, usually referred to as CFOP, that is, (Cross, First 2 Layers, Orientation of the Last Layer, Permutation of the Last Layer). The method describes solving the cube in a layer-by-layer fashion. First a "cross" is made on the first layer, consisting of the center piece and four edges (Cross). Next, the first layer's corners and edges of the second layer are put into their correct positions simultaneously in pairs (F2L). The last layer is solved by first orienting the yellow pieces (OLL) and then permuting the last layer of the cube using a few sets of algorithms (PLL). Speedcubing At the age of 16, in March 1981, Fridrich saw a Rubik's Cube for the first time. These cubes weren't immediately purchasable in the context of communist Czechoslovakia. However, Fridrich managed to obtain one in July when a French family visiting the area brought it along. Following the acquisition of the Cube, Fridrich delved into learning a Layer by Layer technique from a Czech publication. By the time September rolled around, she had reached an average solving time of roughly 1 minute. In May 1982, the national championship occurred, coinciding with Fridrich's average solve time hovering at approximately 25 seconds. Out of the participants, five cubers, including Mirek Goljan, advanced to the finals. In this arena, Fridrich clinched victory in both the initial and second rounds, whereas Goljan secured the triumph in the third and final round. The specific time of 23.55 seconds during the second round paved the way for Fridrich to secure the top spot. She competed in Rubik's Cube World Championship in Budapest in 1982 in which she finished 10th with the best time of 29.11 seconds Career Jessica Fridrich works as a professor at the Department of Electrical and Computer Engineering at Binghamton University and specializes in digital watermarking and forensics. She received her MS degree in applied mathematics from the Czech Technical University in Prague in 1987, and her PhD in systems science from Binghamton University in 1995. In 2018, Fridrich was elected a fellow of the National Academy of Inventors. References External links Jessica Fridrich's webpage Rubik's Cube World Championship in Budapest in 1982 Rubik's Cube competition rankings Jessica Fridich : page en français Living people Czech speedcubers Czech emigrants to the United States Binghamton University faculty State University of New York faculty American electrical engineers Czech women com
https://en.wikipedia.org/wiki/Model%20of%20computation
In computer science, and more specifically in computability theory and computational complexity theory, a model of computation is a model which describes how an output of a mathematical function is computed given an input. A model describes how units of computations, memories, and communications are organized. The computational complexity of an algorithm can be measured given a model of computation. Using a model allows studying the performance of algorithms independently of the variations that are specific to particular implementations and specific technology. Models Models of computation can be classified into three categories: sequential models, functional models, and concurrent models. Sequential models Sequential models include: Finite state machines Post machines (Post–Turing machines and tag machines). Pushdown automata Register machines Random-access machines Turing machines Decision tree model Functional models Functional models include: Abstract rewriting systems Combinatory logic General recursive functions Lambda calculus Concurrent models Concurrent models include: Actor model Cellular automaton Interaction nets Kahn process networks Logic gates and digital circuits Petri nets Synchronous Data Flow Some of these models have both deterministic and nondeterministic variants. Nondeterministic models are not useful for practical computation; they are used in the study of computational complexity of algorithms. Models differ in their expressive power; for example, each function that can be computed by a Finite state machine can also be computed by a Turing machine, but not vice versa. Uses In the field of runtime analysis of algorithms, it is common to specify a computational model in terms of primitive operations allowed which have unit cost, or simply unit-cost operations. A commonly used example is the random-access machine, which has unit cost for read and write access to all of its memory cells. In this respect, it differs from the above-mentioned Turing machine model. See also Stack machine (0-operand machine) Accumulator machine (1-operand machine) Register machine (2,3,... operand machine) Random-access machine Abstract machine Cell-probe model Robertson–Webb query model Chomsky hierarchy Turing completeness References Further reading Computational complexity theory Computability theory
https://en.wikipedia.org/wiki/Cache-oblivious%20algorithm
In computing, a cache-oblivious algorithm (or cache-transcendent algorithm) is an algorithm designed to take advantage of a processor cache without having the size of the cache (or the length of the cache lines, etc.) as an explicit parameter. An optimal cache-oblivious algorithm is a cache-oblivious algorithm that uses the cache optimally (in an asymptotic sense, ignoring constant factors). Thus, a cache-oblivious algorithm is designed to perform well, without modification, on multiple machines with different cache sizes, or for a memory hierarchy with different levels of cache having different sizes. Cache-oblivious algorithms are contrasted with explicit loop tiling, which explicitly breaks a problem into blocks that are optimally sized for a given cache. Optimal cache-oblivious algorithms are known for matrix multiplication, matrix transposition, sorting, and several other problems. Some more general algorithms, such as Cooley–Tukey FFT, are optimally cache-oblivious under certain choices of parameters. As these algorithms are only optimal in an asymptotic sense (ignoring constant factors), further machine-specific tuning may be required to obtain nearly optimal performance in an absolute sense. The goal of cache-oblivious algorithms is to reduce the amount of such tuning that is required. Typically, a cache-oblivious algorithm works by a recursive divide-and-conquer algorithm, where the problem is divided into smaller and smaller subproblems. Eventually, one reaches a subproblem size that fits into the cache, regardless of the cache size. For example, an optimal cache-oblivious matrix multiplication is obtained by recursively dividing each matrix into four sub-matrices to be multiplied, multiplying the submatrices in a depth-first fashion. In tuning for a specific machine, one may use a hybrid algorithm which uses loop tiling tuned for the specific cache sizes at the bottom level but otherwise uses the cache-oblivious algorithm. History The idea (and name) for cache-oblivious algorithms was conceived by Charles E. Leiserson as early as 1996 and first published by Harald Prokop in his master's thesis at the Massachusetts Institute of Technology in 1999. There were many predecessors, typically analyzing specific problems; these are discussed in detail in Frigo et al. 1999. Early examples cited include Singleton 1969 for a recursive Fast Fourier Transform, similar ideas in Aggarwal et al. 1987, Frigo 1996 for matrix multiplication and LU decomposition, and Todd Veldhuizen 1996 for matrix algorithms in the Blitz++ library. Idealized cache model In general, a program can be made more cache-conscious: Temporal locality, where the algorithm fetches the same pieces of memory multiple times; Spatial locality, where the subsequent memory accesses are adjacent or nearby memory addresses. Cache-oblivious algorithms are typically analyzed using an idealized model of the cache, sometimes called the cache-oblivious model. This model is much easie
https://en.wikipedia.org/wiki/Procfs
The proc filesystem (procfs) is a special filesystem in Unix-like operating systems that presents information about processes and other system information in a hierarchical file-like structure, providing a more convenient and standardized method for dynamically accessing process data held in the kernel than traditional tracing methods or direct access to kernel memory. Typically, it is mapped to a mount point named /proc at boot time. The proc file system acts as an interface to internal data structures about running processes in the kernel. In Linux, it can also be used to obtain information about the kernel and to change certain kernel parameters at runtime (sysctl). Many Unix-like operating systems support the proc filesystem, including Solaris, IRIX, Tru64 UNIX, BSD, Linux, IBM AIX, QNX, and Plan 9 from Bell Labs. OpenBSD dropped support in version 5.7, released in May 2015. It is absent from HP-UX and macOS. The Linux kernel extends it to non–process-related data. The proc filesystem provides a method of communication between kernel space and user space. For example, the GNU version of the process reporting utility ps uses the proc file system to obtain its data, without using any specialized system calls. History UNIX 8th Edition Tom J. Killian implemented the UNIX 8th Edition (V8) version of /proc: he presented a paper titled "Processes as Files" at USENIX in June 1984. The design of procfs aimed to replace the ptrace system call used for process tracing. Detailed documentation can be found in the proc(4) manual page. SVR4 Roger Faulkner and Ron Gomes ported V8 /proc to SVR4, and published a paper called "The Process File System and Process Model in UNIX System V" at USENIX in January 1991. This kind of procfs supported the creation of ps, but the files could only be accessed with functions read(), write(), and ioctl(). Between 1995 and 1996, Roger Faulkner created the procfs-2 interface for Solaris-2.6 that offers a structured /proc filesystem with sub-directories. Plan 9 Plan 9 implemented a process file system, but went further than V8. V8's process file system implemented a single file per process. Plan 9 created a hierarchy of separate files to provide those functions, and made /proc a real part of the file system. 4.4BSD 4.4BSD cloned its implementation of from Plan 9. , procfs is gradually becoming phased out in FreeBSD, and turned to use the sysctl instead for process-related information. It was removed from OpenBSD in version 5.7, which was released in May 2015, because it "always suffered from race conditions and is now unused". macOS didn't implement procfs and user space programs have to use sysctl interface for processes data. To provide binary compatibility with Linux user space programs, FreeBSD kernel also provides linprocfs that is similar to the Linux procfs. Solaris /proc in Solaris was available from the beginning. Solaris 2.6 in 1996 introduced procfs2 from Roger Faulkner. Linux Linux first added a
https://en.wikipedia.org/wiki/Campsa
Compañía Arrendataria del Monopolio del Petróleo, S.A. (Campsa) was the state-owned petroleum products company of Spain. Created in the 1920s during General Primo de Rivera's dictatorship, it was dissolved in 1992 owing to the demands of the European Union. Its assets were distributed to the largest private petroleum companies in the Spanish market at the time, which were mainly Repsol, Cepsa and BP. The rights to the Campsa brand were given to Repsol. The remaining assets of the company, primarily focused on logistics and pipeline services but also its historical archives, were incorporated under the name Compañía Logística de Hidrocaburos, S.A. (CLH). Following a 2008 agreement between CLH and the National Energy Commission the latter took over the archives. History The Compañía arrendataria del monopolio del petróleo (C.A.M.P.S.A.) was created on 24 June 1927 by a consortium of Spanish banks: Banco Urquijo, Banco Hispano-Americano, Banco Español de Crédito, Banco Herrero, Banco de Vizcaya, Banco de Bilbao, Banco de Cataluña, Banco Hispano Colonial and Banca Marsans. References Non-renewable resource companies established in 1927 Non-renewable resource companies disestablished in 1992 Companies based in the Community of Madrid Oil companies of Spain Defunct oil companies 1992 disestablishments in Spain Automotive fuel retailers Spanish companies established in 1927 Defunct energy companies of Spain
https://en.wikipedia.org/wiki/Gutmann%20method
The Gutmann method is an algorithm for securely erasing the contents of computer hard disk drives, such as files. Devised by Peter Gutmann and Colin Plumb and presented in the paper Secure Deletion of Data from Magnetic and Solid-State Memory in July 1996, it involved writing a series of 35 patterns over the region to be erased. The selection of patterns assumes that the user does not know the encoding mechanism used by the drive, so it includes patterns designed specifically for three types of drives. A user who knows which type of encoding the drive uses can choose only those patterns intended for their drive. A drive with a different encoding mechanism would need different patterns. Most of the patterns in the Gutmann method were designed for older MFM/RLL encoded disks. Gutmann himself has noted that more modern drives no longer use these older encoding techniques, making parts of the method irrelevant. He said "In the time since this paper was published, some people have treated the 35-pass overwrite technique described in it more as a kind of voodoo incantation to banish evil spirits than the result of a technical analysis of drive encoding techniques". Since about 2001, some ATA IDE and SATA hard drive manufacturer designs include support for the ATA Secure Erase standard, obviating the need to apply the Gutmann method when erasing an entire drive. The Gutmann method does not apply to USB sticks: an 2011 study reports that 71.7% of data remained available. On solid state drives it resulted in 0.8 - 4.3% recovery. Background The delete function in most operating systems simply marks the space occupied by the file as reusable (removes the pointer to the file) without immediately removing any of its contents. At this point the file can be fairly easily recovered by numerous recovery applications. However, once the space is overwritten with other data, there is no known way to use software to recover it. It cannot be done with software alone since the storage device only returns its current contents via its normal interface. Gutmann claims that intelligence agencies have sophisticated tools, including magnetic force microscopes, which together with image analysis, can detect the previous values of bits on the affected area of the media (for example hard disk). This claim however seems to be invalid based on following thesis - Data Reconstruction from a Hard Disk Drive using Magnetic Force Microscopy Method An overwrite session consists of a lead-in of four random write patterns, followed by patterns 5 to 31 (see rows of table below), executed in a random order, and a lead-out of four more random patterns. Each of patterns 5 to 31 was designed with a specific magnetic media encoding scheme in mind, which each pattern targets. The drive is written to for all the passes even though the table below only shows the bit patterns for the passes that are specifically targeted at each encoding scheme. The end result should obscure any data on th
https://en.wikipedia.org/wiki/Dhoby%20Ghaut
Dhoby Ghaut () is a place in Singapore that often refers to the Dhoby Ghaut MRT station, a major interchange station on Singapore's Mass Rapid Transit network connecting the North-South Line, North East Line, and the Circle Line. As a place, Dhoby Ghaut lies along the eastern end of Orchard Road. There is a shopping mall above the MRT station called Plaza Singapura. Etymology Dhoby Ghaut was influenced from Dhobi Ghat , which literally means washerman's place in Hindi, from dhobi, "washerman" or one that does laundry, and ghat, referring to a series of steps leading down to a body of water, as in the case of the Varanasi ghats by the Ganges. The Hindi term ghat passed into English usage during the British occupation of India, and was later anglicised to ghaut. Around this time, the British had also ruled Singapore, which influenced naming this area. Early history Until the early 1900s, the dhobis used water from a clear stream that flowed into Sungai Bras Basah, now Stamford Canal. This stream now exists as a large drain beside Handy Road. The ghats, or steps leading down to the stream, were demolished when Sungai Bras Basah was canalised. The dhobis would then dry the laundry at Dhoby Green, the open park bounded by Stamford Road, Handy Road, Bras Basah Road and Prinsep Street. See also Dhoby Ghaut, Penang, Malaysia Dhobi Ghat, Mumbai, India References External links Reference from National Library of Singapore Infopedia Website Places in Singapore Museum Planning Area Orchard Road
https://en.wikipedia.org/wiki/Continuous%20integration
In software engineering, continuous integration (CI) is the practice of merging all developers' working copies to a shared mainline several times a day. Nowadays it is typically implemented in such a way that it triggers an automated build with testing. Grady Booch first proposed the term CI in his 1991 method, although he did not advocate integrating several times a day. Extreme programming (XP) adopted the concept of CI and did advocate integrating more than once per day – perhaps as many as tens of times per day. Rationale When embarking on a change, a developer takes a copy of the current code base on which to work. As other developers submit changed code to the source code repository, this copy gradually ceases to reflect the repository code. Not only can the existing code base change, but new code can be added as well as new libraries, and other resources that create dependencies, and potential conflicts. The longer development continues on a branch without merging back to the mainline, the greater the risk of multiple integration conflicts and failures when the developer branch is eventually merged back. When developers submit code to the repository they must first update their code to reflect the changes in the repository since they took their copy. The more changes the repository contains, the more work developers must do before submitting their own changes. Eventually, the repository may become so different from the developers' baselines that they enter what is sometimes referred to as "merge hell", or "integration hell", where the time it takes to integrate exceeds the time it took to make their original changes. Workflows Run tests locally CI should be used in combination with automated unit tests written through the practices of test-driven development. All unit tests in the developer's local environment should be run and passed before committing to the mainline. This helps prevent one developer's work-in-progress from breaking another developer's copy. Where necessary, incomplete features can be disabled before committing, using feature toggles, for instance. Compile the mainline periodically; run tests of the mainline and/or use continuous quality control A build server compiles the code periodically. The build server may automatically run tests and/or implement other continuous quality control processes. Such processes aim to improve software quality and delivery time by periodically running additional static analyses, measuring performance, extracting documentation from the source code, and facilitating manual QA processes. Use CI as part of continuous delivery or continuous deployment CI is often intertwined with continuous delivery or continuous deployment in what is called a CI/CD pipeline. "Continuous delivery" ensures the software checked in on the mainline is always in a state that can be deployed to users, while "continuous deployment" fully automates the deployment process. History The earliest known wor
https://en.wikipedia.org/wiki/The%20StarPhoenix
The StarPhoenix is a daily newspaper that serves Saskatoon, Saskatchewan, Canada, and is a part of Postmedia Network. The StarPhoenix puts out six editions each week and publishes one weekly, Bridges. It is also part of the canada.com web portal. History The StarPhoenix was first published as The Saskatoon Phoenix on October 17, 1902 (following a short-lived attempt at a local newspaper, the Saskatoon Sentinel). In 1909, it became a daily paper and, in 1910, was renamed the Saskatoon Capital. The paper was sold and bought several times between its inception and the 1920s, at one point being owned by W. F. Herman, the future owner and publisher of the Windsor Star. By 1927, there were two daily papers in Saskatoon: the Saskatoon Daily Star and the Daily Phoenix. In January 1928, both papers were bought by the Sifton family of Winnipeg and amalgamated into the Saskatoon Star-Phoenix. In the early 1980s the spelling of the newspaper name was modified to StarPhoenix. Between the 1928 amalgamation and the launch of the Saskatoon edition of Metro in April 2016, the StarPhoenix was the city's only daily newspaper. In 1996, the StarPhoenix was bought by the Hollinger newspaper chain. It was subsequently sold to CanWest Global Communications in 2000 and became part of its Southam Newspapers division, later called the CanWest News Service. CanWest was acquired by Postmedia News, Inc., which is the current owner of The StarPhoenix. In 2015, the StarPhoenix press began printing the Regina Leader-Post, in addition to its own print edition, after the Leader-Post's own press was shut down. In 2023, Postmedia announced that the StarPhoenix press would be shut down and the building be put up for sale. Both the StarPhoenix and Leader-Post were to continue publication, but printed at facility in Estevan. The reporting staff, working from home since March 2020 at the beginning of the COVID-19 pandemic, were to continue doing so on a permanent basis. Circulation Like most Canadian daily newspapers, The StarPhoenix has seen a decline in circulation. Its total circulation dropped by percent to 39,008 copies daily from 2009 to 2015. Daily average See also List of newspapers in Canada References External links Newspapers published in Saskatoon Postmedia Network publications Daily newspapers published in Saskatchewan
https://en.wikipedia.org/wiki/Driver%20wrapper
A driver wrapper is a subroutine in a software library that functions as an adapter between an operating system and a driver, such as a device driver, that was not designed for that operating system. It can enable the use of devices for which no drivers for the particular operating system are available. In particular, Microsoft Windows is the dominant family of operating systems for IBM PC compatible computers, and many devices are supplied with drivers for Windows but not other operating systems. Windows driver wrappers for Linux Several open source software projects allow using Microsoft Windows drivers under another operating system, such as Linux. Examples include network drivers for wireless cards (such as NDISwrapper for Linux or Project Evil for FreeBSD) and the NTFS file system (see Captive NTFS). The common thread among these examples is the use of wrapper technology, which allows execution of the drivers in a foreign environment. Limitations for driver wrappers include the lack of an ability to function at real time. An example of this limitation includes latency problems as those associated with attempts to make compatible with Linux the ZoomR16 audio DAW sound recorder and control surface. See also Wrapper library Compatibility layer References Subroutines Device drivers System software
https://en.wikipedia.org/wiki/Windows%20Server
Windows Server (formerly Windows NT Server) is a group of operating systems (OS) for servers that Microsoft has been developing since 1993. The first OS that was released for this platform is Windows NT 3.1 Advanced Server. With the release of Windows Server 2003, the brand name was changed to Windows Server. The latest release of Windows Server is Windows Server 2022, which was released in 2021. Microsoft's history of developing operating systems for servers goes back to Windows NT 3.1 Advanced Server. Windows 2000 Server is the first OS to include Active Directory, DNS Server, DHCP Server, and Group Policy. Members Main releases Main releases include: Windows NT 3.1 Advanced Server (July 1993) Windows NT Server 3.5 (September 1994) Windows NT Server 3.51 (May 1995) Windows NT 4.0 Server (July 1996) Windows 2000 Server (December 1999) Windows Server 2003 (April 2003) Windows Server 2003 R2 (December 2005) Windows Server 2008 (February 2008) Windows Server 2008 R2 (October 2009) Windows Server 2012 (September 2012) Windows Server 2012 R2 (October 2013) Windows Server 2016 (October 2016) Windows Server 2019 (October 2018) Windows Server 2022 (August 2021) Traditionally, Microsoft supports Windows Server for 10 years, with five years of mainstream support and an additional five years of extended support. These releases also offer a complete desktop experience. Starting with Windows Server 2008 R2, Server Core and Nano Server configurations were made available to reduce the OS footprint. Between 2015 and 2021, Microsoft referred to these releases as "long-term support" releases to set them apart from semi-annual releases (see below.) For sixteen years, Microsoft released a major version of Windows Server every four years, with one minor version released two years after a major release. The minor versions had an "R2" suffix in their names. In October 2018, Microsoft broke this tradition with the release of Windows Server 2019, which should have been "Windows Server 2016 R2". Windows Server 2022 is also a minor upgrade over its predecessor. Branded releases Certain editions of Windows Server have a customized name: Windows Storage Server (editions of Windows Server 2003 through 2016; editions of Windows Server IoT 2019 and its successors) Windows HPC Server 2008 Windows HPC Server 2008 R2 Windows Home Server (an edition of Windows Server 2003) Windows Home Server 2011 (an edition of Windows Server 2008 R2) Hyper-V Server (a discontinued, freeware edition of Windows Server 2008 through 2019) Windows MultiPoint Server Windows Server Essentials Windows Essential Business Server (discontinued) Azure Stack HCI (an edition of Windows Server 2019 and later) Semi-annual releases (discontinued) Following the release of Windows Server 2016, Microsoft attempted to mirror the lifecycle of Windows 10 in the Windows Server family, releasing new versions twice a year which were supported for 18 months. These semi-annual versions were only available as part o
https://en.wikipedia.org/wiki/Structurae
Structurae is an online database containing pictures and information about structural and civil engineering works, and their associated engineers, architects, and builders. Overview Structurae was founded in 1998 by Nicolas Janberg, who had studied civil engineering at Princeton University. In March 2012, Structurae was acquired by , a subsidiary of John Wiley & Sons, Inc., with Janberg joining the company as Structurae's editor-in-chief. At that time, the web site received more than one million pageviews per month, and was available in English, French and German. In 2015, Janberg bought the site back to operate it as a freelancer again. Buildings in the Structurae database References External links Architecture websites German websites Architecture databases Online databases Databases in Germany
https://en.wikipedia.org/wiki/List%20of%20BASIC%20dialects
This is an alphabetical list of BASIC dialects – interpreted and compiled variants of the BASIC programming language. Each dialect's platform(s), i.e., the computer models and operating systems, are given in parentheses along with any other significant information. Dialects 0–9 1771-DB BASIC Allen-Bradley PLC industrial controller BASIC module; Intel BASIC-52 extended with PLC-specific calls. 64K BASIC Cross-platform, interactive, open-source interpreter for microcomputer BASIC. A ABasiC (Amiga) Relatively limited. Initially provided with Amiga computers by MetaComCo. ABC BASIC designed for the ABC 80 and ABC 800 line of computers designed by Dataindustrier AB and manufactured by Luxor AB (including ABC 802, ABC 806 etc.). ACE (AmigaAGK Script,) A Compiler for Everyone – Freeware, AmigaBASIC compatible, has extra features, some of which exploit the Amiga's hardware and operating system. AGK Script The primary scripting language of the AppGameKit descended from DarkBASIC. Advan BASIC For the Atari home computer, disk based, containing BASIC, compiler, screen design and utilities. Released to public domain July, 2006 Advanced BASIC (a.k.a. BASIC Advanced, Advanced BASIC) (DOS on the PC) by Microsoft. Available in ROM on IBM PCs. Later disk based versions for IBM PC DOS. AlphaBasic Altair BASIC (a.k.a. MITS 4K BASIC, MITS 8K BASIC, Altair Disk Extended BASIC) (Altair 8800, S-100) – Microsoft's first product Altair Disk Extended BASIC See Altair BASIC Amiga BASIC (Amiga) Somewhat easier than ABasiC, see MS BASIC for Macintosh. AmiBlitz (Amiga) Open-source version of Blitz BASIC. AMOS BASIC (Amiga) For the Amiga, made for game programming. A descendant of STOS BASIC on the Atari ST. Later derivatives included AMOS Professional (a.k.a. AMOS Pro) and Easy AMOS. ANSI Standard for the programming language Minimal BASIC X3.60-1978, a 1978 standard for minimal features, and X3.113-1987, the full BASIC standard; rarely implemented fully. Apple BASIC (Apple I) See: Integer BASIC Apple Business BASIC (Apple III) Applesoft BASIC (Apple II series) Based on the same Microsoft code that Commodore BASIC was based on. Standard on the Apple II Plus/Apple II Europlus and all later models of the Apple II family. ARMbasic BASIC compiler for ARM processors, ported to a number of popular ARM development PCBs. APU BASIC version of SORD CBASIC for the M23 with arithmetic processor Aribas interactive interpreter for big integer arithmetic and multi-precision floating point arithmetic with a Pascal/Modula-like syntax. It has several builtin functions for algorithmic number theory like gcd, Jacobi symbol, Rabin probabilistic prime test, factorization algorithms (Pollard rho, elliptic curve, continued fraction, quadratic sieve), etc. ASIC (DOS on the PC) Assembler PICAXE chip language Atari 2600 Basic Programming (Atari 2600 video game console) SuperCharger Disk BASIC (Atari 2600 video game console) StarPath SuperCharger cartrid
https://en.wikipedia.org/wiki/Teenage%20Mutant%20Ninja%20Turtles%20III%3A%20The%20Manhattan%20Project
Teenage Mutant Ninja Turtles III: The Manhattan Project is a side-scrolling beat-'em-up released by Konami for the Family Computer (Famicom) in Japan in 1991 and for the Nintendo Entertainment System in North America in 1992. It is the third video game iteration of the Teenage Mutant Ninja Turtles for the NES. The game features play mechanics similar to the previous game, Teenage Mutant Ninja Turtles II: The Arcade Game, but it is an original title for the NES without any preceding arcade version. It is based on the 1987 Teenage Mutant Ninja Turtles animated series, being released after the show's 5th season. The game was re-released as part of Teenage Mutant Ninja Turtles: The Cowabunga Collection in 2022. Plot The game begins with the Turtles spending their vacation in Key West, Florida. While watching April O'Neil's latest news report, her broadcast is suddenly hijacked by the Turtles' nemesis, Shredder. Taking April as his hostage, Shredder reveals that he has also turned the entire borough of Manhattan into a floating island and challenges the Turtles to come to his lair to stop him. Gameplay Teenage Mutant Ninja Turtles III can be played by up to two players simultaneously, with each player controlling a different character. The player can choose between any of the four turtles: Leonardo, Raphael, Michelangelo and Donatello, each wielding their signature weapon. Two different 2-player modes are featured in the game, the first mode allows both players to hurt each other with their attacks, while the other mode disables this feature. The player has a limited number of lives that gets depleted every time the player's energy gauge runs out. If one player has run out of lives, they can use the remaining ones from the other player's remaining stock (this is possible to do in the one-player mode as well). The player is allowed to change their character every time they lose life. Up to three chances to continue are provided. The controls are mostly unchanged from the second NES game, with one attack button and one jump button. The turtles can now perform a toss attack against their enemies by holding the D-pad downwards while pressing B. Each turtle also has a different special attack that is performed by pressing B and A simultaneously. Every time the player performs this attack, a portion of their energy will be lost, unless they are on their last bar of life. The game is composed of a total of eight levels, spanning from the beaches of Florida to the floating island of Manhattan to the Technodrome, ultimately concluding with Shredder's lair and finally to Krang's Spaceship. The game's regular enemies include a variety of Foot Soldiers, as well as Giant Mousers and Stone Warriors. The game's bosses include villains from the cartoon series and toyline such as Dirtbag, Groundchuck, Slash, and Leatherhead, in addition to the return of Shredder and Krang, along with Bebop and Rocksteady. Tokka and Rahzar from the film Teenage Mutant Ninja Turtles
https://en.wikipedia.org/wiki/Trailer%20%28computing%29
In information technology, a trailer or footer refers to supplemental data (metadata) placed at the end of a block of data being stored or transmitted, which may contain information for the handling of the data block, or simply mark the block's end. In data transmission, the data following the end of the header and preceding the start of the trailer is called the payload or body. It is vital that trailer composition follow a clear and unambiguous specification or format, to allow for parsing. If a trailer is not removed properly, or part of the payload is removed thinking it is a trailer, it can cause confusion. The trailer contains information concerning the destination of a packet being sent over a network so for instance in the case of emails the destination of the email is contained in the trailer Examples In data transfer, the OSI model's data link layer adds a trailer at the end of frames of the data encapsulation. References Computer data
https://en.wikipedia.org/wiki/Bryan%20Bergeron
Bryan P. Bergeron is an author of numerous books in the fields of medicine, computers, biotechnology, and business. He teaches in the HST Division of Harvard Medical School and MIT and is president of Archetype Technologies, Inc. References External links archetypetech.com Massachusetts Institute of Technology faculty Harvard Medical School faculty Living people Year of birth missing (living people) Health informaticians
https://en.wikipedia.org/wiki/Reset%20vector
In computing, the reset vector is the default location a central processing unit will go to find the first instruction it will execute after a reset. The reset vector is a pointer or address, where the CPU should always begin as soon as it is able to execute instructions. The address is in a section of non-volatile memory initialized to contain instructions to start the operation of the CPU, as the first step in the process of booting the system containing the CPU. Examples Below is a list of typically used addresses by different microprocessors: x86 family (Intel) The reset vector for the Intel 8086 processor is at physical address FFFF0h (16 bytes below 1 MB). The value of the CS register at reset is FFFFh and the value of the IP register at reset is 0000h to form the segmented address FFFFh:0000h, which maps to physical address FFFF0h. The reset vector for the Intel 80286 processor is at physical address FFFFF0h (16 bytes below 16 MB). The value of the CS register at reset is F000h with the descriptor base set to FF0000h and the value of the IP register at reset is FFF0h to form the segmented address FF000h:FFF0h, which maps to physical address FFFFF0h in real mode. This was changed to allow sufficient space to switch to protected mode without modifying the CS register. The reset vector for the Intel 80386 and later x86 processors is physical address FFFFFFF0h (16 bytes below 4 GB). The value of the selector portion of the CS register at reset is F000h, the value of the base portion of the CS register is FFFF0000h, and the value of the IP register at reset is FFF0h to form the segmented address FFFF0000h:FFF0h, which maps to the physical address FFFFFFF0h in real mode. Others The reset vector for ARM processors is address 0x0 or 0xFFFF0000. During normal execution RAM is re-mapped to this location to improve performance, compared to the original ROM-based vector table. The reset vector for MIPS32 processors is at virtual address 0xBFC00000, which is located in the last 4 Mbytes of the KSEG1 non-cacheable region of memory. The core enters kernel mode both at reset and when an exception is recognized, hence able to map the virtual address to physical address. The reset vector for PowerPC/Power ISA processors is at an effective address of 0x00000100 for 32-bit processors and 0x0000000000000100 for 64-bit processors. The reset vector for SPARC version 8 processors is at an address of 0x00000000; the reset vector for SPARC version 9 processors is at an address of 0x20 for power-on reset, 0x40 for watchdog reset, 0x60 for externally initiated reset, and 0x80 for software-initiated reset. The reset vector for 68000 processor family is 0x00000000 for Initial Interrupt Stack Register (IISR; Not really a reset vector and is used to initialize the stack pointer after reset.) and 0x00000004 for initial program counter (reset). 8-bit processors The reset vector for 6502 processor family is a 16-bit address stored at 0xFFFC and 0xFFFD. Th
https://en.wikipedia.org/wiki/K-nearest%20neighbors%20algorithm
In statistics, the k-nearest neighbors algorithm (k-NN) is a non-parametric supervised learning method first developed by Evelyn Fix and Joseph Hodges in 1951, and later expanded by Thomas Cover. It is used for classification and regression. In both cases, the input consists of the k closest training examples in a data set. The output depends on whether k-NN is used for classification or regression: In k-NN classification, the output is a class membership. An object is classified by a plurality vote of its neighbors, with the object being assigned to the class most common among its k nearest neighbors (k is a positive integer, typically small). If k = 1, then the object is simply assigned to the class of that single nearest neighbor. In k-NN regression, the output is the property value for the object. This value is the average of the values of k nearest neighbors. If k = 1, then the output is simply assigned to the value of that single nearest neighbor. k-NN is a type of classification where the function is only approximated locally and all computation is deferred until function evaluation. Since this algorithm relies on distance for classification, if the features represent different physical units or come in vastly different scales then normalizing the training data can improve its accuracy dramatically. Both for classification and regression, a useful technique can be to assign weights to the contributions of the neighbors, so that the nearer neighbors contribute more to the average than the more distant ones. For example, a common weighting scheme consists in giving each neighbor a weight of 1/d, where d is the distance to the neighbor. The neighbors are taken from a set of objects for which the class (for k-NN classification) or the object property value (for k-NN regression) is known. This can be thought of as the training set for the algorithm, though no explicit training step is required. A peculiarity of the k-NN algorithm is that it is sensitive to the local structure of the data. Statistical setting Suppose we have pairs taking values in , where is the class label of , so that for (and probability distributions ). Given some norm on and a point , let be a reordering of the training data such that . Algorithm The training examples are vectors in a multidimensional feature space, each with a class label. The training phase of the algorithm consists only of storing the feature vectors and class labels of the training samples. In the classification phase, k is a user-defined constant, and an unlabeled vector (a query or test point) is classified by assigning the label which is most frequent among the k training samples nearest to that query point. A commonly used distance metric for continuous variables is Euclidean distance. For discrete variables, such as for text classification, another metric can be used, such as the overlap metric (or Hamming distance). In the context of gene expression microarray data, for example,
https://en.wikipedia.org/wiki/KernelTrap
KernelTrap was a computing news website which covered topics related to the development of free and open source operating system kernels, and especially, the Linux kernel. News stories usually consisted of a summary of a recent discussion from a development mailing list (Linux kernel mailing list) followed by the entire contents of several messages from the discussion. Each story had moderated threaded discussion attached to it. The site also included a forum for general discussion of computing topics. The site used the Drupal content management system. Kerneltrap was hosted by the Oregon State University Open Source Lab from May 2005. The site was operated by Jeremy Andrews. Current status The site has not been active since 12 April 2010, only 12 days after it became active again after a full year without any news items (except a note about upgrading the site engine, Drupal). Since May of 2021, the kerneltrap.org domain points to a lengthy KernelTrap-style interview with Linus Torvalds on Jeremy's consulting company website. Books KernelTrap has been referenced in several books. Linux Kernel Development by Robert Love Red Hat Linux 9 Bible by Christopher Negus SUSE Linux 10.0 Unleashed by Mike McCallister Measuring Information Systems Delivery Quality by Evan W. Duggan and Han Reichgelt See also LWN.net References Linux websites
https://en.wikipedia.org/wiki/Project%20Monterey
Project Monterey was an attempt to build a single Unix operating system that ran across a variety of 32-bit and 64-bit platforms, as well as supporting multi-processing. Announced in October 1998, several Unix vendors were involved; IBM provided POWER and PowerPC support from AIX, Santa Cruz Operation (SCO) provided IA-32 support, and Sequent added multi-processing (MP) support from their DYNIX/ptx system. Intel Corporation provided expertise and ISV development funding for porting to their upcoming IA-64 (Itanium Architecture) CPU platform, which was yet to be released at that time. The focus of the project was to create an enterprise-class UNIX for IA-64, which at the time was expected to eventually dominate the UNIX server market. By March 2001, however, "the explosion in popularity of Linux ... prompted IBM to quietly ditch" this; all involved attempted to find a niche in the rapidly developing Linux market and moved their focus away from Monterey. Sequent was acquired by IBM in 1999. In 2000, SCO's UNIX business was purchased by Caldera Systems, a Linux distributor, who later renamed themselves the SCO Group. In the same year, IBM eventually declared Monterey dead. Intel, IBM, Caldera Systems, and others had also been running a parallel effort to port Linux to IA-64, Project Trillian, which delivered workable code in February 2000. In late 2000, IBM announced a major effort to support Linux. In May 2001, the project announced the availability of a beta test version AIX-5L for IA-64, basically meeting its original primary goal. However, Intel had missed its delivery date for its first Itanium processor by two years, and the Monterey software had no market. With the exception of the IA-64 port and Dynix MP improvements, much of the Monterey effort was an attempt to standardize existing versions of Unix into a single compatible system. Such efforts had been undertaken in the past (e.g., 3DA) and had generally failed, as the companies involved were too reliant on vendor lock-in to fully support a standard that would allow their customers to leave for other products. With Monterey, two of the key partners already had a niche they expected to continue to serve in the future: POWER and IA-64 for IBM, IA-32 and IA-64 for SCO. The breakdown of Project Monterey was one of the factors leading to a lawsuit in 2003, where SCO Group sued IBM over their contributions to Linux. IBM sold only 32 Monterey licenses in 2001, and fewer in 2002. References External links Parallel computing Collaborative projects Unix variants Unix history Discontinued operating systems IBM operating systems Power ISA operating systems Computer-related introductions in 1998
https://en.wikipedia.org/wiki/Charles%20P.%20Thacker
Charles Patrick "Chuck" Thacker (February 26, 1943 – June 12, 2017) was an American pioneer computer designer. He designed the Xerox Alto, which is the first computer that used a mouse-driven graphical user interface (GUI). Biography Thacker was born in Pasadena, California, on February 26, 1943. His father was Ralph Scott Thacker, born 1906, an electrical engineer (Caltech class of 1928) in the aeronautical industry. His mother was the former (Mattie) Fern Cheek, born 1922 in Oklahoma, a cashier and secretary, who soon raised their two sons on her own. He received his B.S. in physics from the University of California, Berkeley in 1967. He then joined the university's "Project Genie" in 1968, which developed the pioneering Berkeley Timesharing System on the SDS 940. Butler Lampson, Thacker, and others then left to form the Berkeley Computer Corporation, where Thacker designed the processor and memory system. While BCC was not commercially successful, this group became the core technologists in the Computer Systems Laboratory at Xerox Palo Alto Research Center (PARC). Thacker worked in the 1970s and 1980s at the PARC, where he served as project leader of the Xerox Alto personal computer system, was co-inventor of the Ethernet LAN, and contributed to many other projects, including the first laser printer. In 1983, Thacker was a founder of the Systems Research Center (SRC) of Digital Equipment Corporation (DEC), and in 1997, he joined Microsoft Research to help establish Microsoft Research Cambridge in Cambridge, England. After returning to the United States, Thacker designed the hardware for Microsoft's Tablet PC, based on his experience with the "interim Dynabook" at PARC, and later the Lectrice, a pen-based hand-held computer at DEC SRC. From 2006–2010 Thacker was a research contributor to the Berkeley Research Accelerator for Multiple Processors (RAMP) based upon the Berkeley Emulation Engine FPGA platform, which sought to explore new processor designs through massive emulation. He advised and consulted on the follow-on BEE platforms, the BEE2 and BEE3, and in turn used the hardware for his own research explorations. Because the impetuous for the RISC-V development was the paucity of open-source processor designs for the RAMP project (both Asanovic and Patterson were PIs), it is fitting that Thacker played a role in this important future technology. Thacker died of complications from esophageal cancer on June 12, 2017, in Palo Alto, California, aged 74. Awards In 1994, he was inducted as a Fellow of the Association for Computing Machinery. In 1996, he was named a Distinguished Alumnus in Computer Science at U.C. Berkeley. In 2004, he won the Charles Stark Draper Prize together with Alan C. Kay, Butler W. Lampson, and Robert W. Taylor. In 2007, he won the IEEE John von Neumann Medal. In 2007, he was inducted as a Fellow of the Computer History Museum for "leading development of the Xerox PARC Alto, and for innovations in networke
https://en.wikipedia.org/wiki/Chris%20Rose
Christopher Rose (born January 27, 1971) is an American sportscaster for the NFL Network, and the interim radio play-by-play announcer for the Cleveland Browns of the National Football League (NFL). Outside of football, he is also a commentator for the Discovery Channel series BattleBots and podcast host for Jomboy Media. Early life and career Rose, who was born and raised in Shaker Heights, Ohio, an eastside Cleveland suburb, attended University School in Hunting Valley, Ohio during high school and spent his childhood summers at North Star Camp. Rose attended Miami University in Oxford, Ohio and graduated in 1993. He served as station manager at the student-run radio station, WMSR. He is a lifelong fan of all three of Cleveland's major sports franchises (Guardians, Cavaliers, and Browns - for which he provides play by play during locally televised preseason games on WEWS-TV 5). Rose currently resides in California with his wife Michelle and has two sons: Brady and Josh. Broadcasting career The Best Damn Sports Show Period Rose is known as one of the hosts of The Best Damn Sports Show Period, on Fox Sports Net. Except for a brief period in 2004 and 2005, Rose hosted the show from its inception in 2001. Rose has also hosted the poker show Million Dollar Challenge. Fox Sports In 2007, Rose became a play-by-play announcer for Fox's coverage of the NFL. In 2006, he did Gamebreaks for the NFL coverage while Joe Buck and Curt Menefee hosted the studio coverage from the game site. He was the studio host for Fox's BCS coverage. In 2007, he was the #7 play-by-play announcer for Fox's coverage of the NFL. A year later, he was demoted to #8 play-by-play but promoted again to #7 in 2009. Rose was again the #7 play-by-play announcer in 2010. On Sunday, November 8, 2009, Rose did Gamebreaks for the NFL on Fox while the Fox NFL Sunday crew did the pregame show from Bagram Airfield in Afghanistan. Trent Green and John Lynch were among the analysts who worked with Rose. In 2004, Rose was a fight announcer and narrator on the reality sports series The Next Great Champ. In addition, Rose was a ringside commentator for Golden Boy Boxing in 2012 airing on Fuel TV. Rose took over the revamped Fox Saturday Baseball pre game show in 2009. Rose was also the host for the World Series pre-game show. He presented the World Series trophies from 2009 to 2011. He called select games as well as field reporting for MLB on FOX. He also hosted Big Shots: Titans at the Tee. During the 2010 Major League Baseball season he hosted the inaugural season of The Cheap Seats. David Cone took over the show following the 2010 season. On March 21, 2012, it was announced Matt Vasgersian would become the new pre-game host and Rose would no longer be working with the network. Rose has been criticized for appearing to be too friendly with players he has interviewed during Fox's baseball coverage. For example, during the 2009 World Series, Rose referred to Derek Jeter of the New York Yan