source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/KDFI | KDFI (channel 27), branded on-air as More 27, is a television station licensed to Dallas, Texas, United States, broadcasting MyNetworkTV to the Dallas–Fort Worth metroplex. It is owned and operated by Fox Television Stations alongside Fox outlet KDFW (channel 4, also licensed to Dallas). Both stations share studios on North Griffin Street in downtown Dallas, while KDFI's transmitter is located in Cedar Hill, Texas.
Channel 27 began broadcasting in January 1981 as KTWS-TV. It was built by Liberty STV, a subsidiary of Oregon-based Liberty Television, and was primarily created to serve as a conduit for over-the-air subscription television programming. It was the third such station to sign on within four months in the Metroplex. The station's subscription programs originally came from Preview, a division of American Television & Communications. The Dallas–Fort Worth market proved brutal for subscription TV, as three different companies competed for subscribers for a period lasting nearly two years. The market experienced a shake-out that began in September 1982, when VEU, a competing service owned by Golden West Broadcasters, acquired Preview's Metroplex operations. VEU then moved its programming from KNBN. By the end of April 1983, VEU was the last subscription system standing.
Liberty Television was purchased by Tele-Communications Inc. (TCI), a major owner of cable systems, in 1983. TCI determined that it could not keep Liberty's television stations, including KTWS-TV, because of rules that barred cross-ownership of broadcast stations and cable systems in the same areas. It sold KTWS-TV to a consortium known as Dallas Media Investors. With VEU continuing to lose subscribers, the station changed its call letters to KDFI-TV in August 1984 and became a full-time commercial independent on October 1 of that year. The station ran on a lean basis, avoiding the more expensive program purchases that characterized its competitors, but held its own against stations like KTXA and KDAF in the ratings. Dallas Media Investors reorganized in bankruptcy in the early 1990s to settle a lawsuit with Paramount Pictures and a dispute among stockholders. In 1994, Argyle Television, then-owner of KDFW-TV, took over KDFI-TV's programming under a local marketing agreement; KDFW and KDFI became co-owned in 1999 when the Federal Communications Commission permitted duopolies.
In the years following KDFW-TV's takeover of KDFI, channel 27 increased its profile with higher-quality entertainment programming and rights to telecast various Dallas-area sports teams, most notably the Texas Rangers and Dallas Stars. These teams moved their limited over-the-air schedules off of KDFI at the end of the 2000s.
History
Channel 27 was assigned to Dallas in a compromise between two applicants who sought channel 29 in 1965. That year, Maxwell Electronics Corporation applied for a new television station on channel 29 in Dallas, which placed it into comparative hearing with two other applic |
https://en.wikipedia.org/wiki/KFWD | KFWD (channel 52) is a television station licensed to Fort Worth, Texas, United States, serving the Dallas–Fort Worth metroplex. Owned by WRNN-TV Associates, it airs programming from ShopHQ. KFWD's offices are located in Coppell, and its transmitter is located in Cedar Hill, Texas.
History
As a Telemundo affiliate
The station first signed on the air on September 1, 1988; it first operated as the Dallas–Fort Worth market's original affiliate of the Spanish-language network Telemundo. The KFWD call letters were previously used by a local radio station on 102.1 FM (now KDGE). For much of its history with the network, KFWD signed off the air during the overnight hours each night; as a result, the station did not carry the entire Telemundo network schedule, whose overnight lineup (as is the case to this day) consisted of infomercials produced and dubbed in Spanish as well as feature films from countries with a predominant population of Spanish speakers such as Mexico. The station began broadcasting 24 hours a day in late 2000.
KFWD lost its affiliation with the network when NBC, which had recently acquired Telemundo, bought independent station KXTX-TV (channel 39) from the Christian Broadcasting Network in 2001. During KFWD's final month as a Telemundo affiliate, the station aired English-language infomercials during the morning and overnight hours.
As an independent station
On January 1, 2002, KFWD became an English-language general entertainment independent station. It acquired syndicated programs displaced by both KXTX and KSTR-TV (channel 49) when both stations affiliated with Spanish-language networks on that date—KXTX having joined Telemundo, while KSTR joined TeleFutura (including programs such as Real TV and Access Hollywood). The station also began carrying live sporting events including the Big 12 men's basketball tournament, as well as FC Dallas and Dallas Sidekicks soccer games that were dropped from KLDT (channel 55, now MeTV affiliate KAZD).
Belo Corporation began managing the station in 2006, providing advertising sales assistance, certain technical services and facilities to support the operations of KFWD; Belo's flagship ABC affiliate WFAA (channel 8, now owned by Tegna) also supplied the station with repurposed editions of its newscasts (consisting of simulcasts of its Monday–Saturday 6:00 p.m., Sunday–Friday 10:00 p.m. and Sunday 5:30 p.m. newscasts) and other programs seen on that station (such as The Dr. Oz Show). Belo also operated KFWD.tv, the station's website, using a website platform similar to that used by Belo's other stations. The management agreement included an option to purchase KFWD and create a duopoly with WFAA; this option was never exercised.
KFWD has been digital-only since June 12, 2009.
On October 17, 2011, KFWD changed its programming format, placing a strong emphasis on classic television series. The new "Classic TV" logo and branding was first unveiled on the station's YouTube channel on August 3, 2011 |
https://en.wikipedia.org/wiki/KTBU | KTBU (channel 55) is a television station licensed to Conroe, Texas, United States, serving as the Houston area outlet for the digital multicast network Quest. It is owned and operated by Tegna Inc. alongside CBS affiliate KHOU (channel 11). Both stations share studios on Westheimer Road near Uptown Houston, while KTBU's transmitter is located near Missouri City, in unincorporated northeastern Fort Bend County. Previously, KTBU maintained separate facilities on Old Katy Road in the northwest side of Houston, while the KHOU studios only housed KTBU's master control and some internal operations.
History
The station first signed on the air on July 15, 1998, from facilities located on Old Katy Road near Memorial Park in northwest Houston, and was originally owned by Charles Dowen Johnson's Humanity Interested Media (alongside KVQT-LD) and then by the Osteen family of Lakewood Church fame. The station launched as an independent station with a general entertainment format including classic and syndicated television series, movies and sports, plus a slate of locally produced shows focusing on sports, history and other topics of interest to Houstonians.
KTBU was later purchased by the Houston-based USFR Media Group, at which time the station moved from its original studios on Old Katy Road to a purpose-built facility on Equity Drive in northwest Houston previously built for the ill-fated News 24 Houston cable news channel, and changed its on-air moniker to "Houston's 55".
In May 2011, the station was sold to the Spanish Broadcasting System for $16 million. Upon the completion of the sale, KTBU dropped all local and national syndicated programs and joined SBS' Mega TV network.
On January 21, 2020, Tegna Inc. agreed to acquire KTBU for $15 million. The sale was completed on March 24, 2020, making KTBU a sister station to Tegna's CBS affiliate KHOU. Three days later, KTBU's main channel flipped to the Tegna-owned Quest multicast network, and eventually KTBU's operations were moved into KHOU's studios near Uptown Houston.
Upon becoming a Tegna property, it was announced that KTBU would take over as the official local television partner of Major League Soccer's Houston Dynamo. KTBU may air CBS network programming should it be preempted by KHOU for long-form breaking news or severe weather coverage or other special programming. Its main role however, is serving as a UHF rebroadcaster for KHOU via its DT11 subchannel, allowing full-market access to the station for viewers who only have a UHF antenna.
On February 22, 2022, Tegna announced that it would be acquired by Standard General and Apollo Global Management for $5.4 billion. As a part of the deal, KTBU and KHOU, along with their Austin sister station KVUE and Dallas sister stations WFAA and KMPX, would be resold to Cox Media Group. The sale was canceled on May 22, 2023.
Technical information
Subchannels
The station's digital signal is multiplexed:
Analog-to-digital conversion
KTBU discontinued reg |
https://en.wikipedia.org/wiki/WINS | WINS may refer to:
Windows Internet Name Service
Wireless integrated network sensors
WINS, off-course betting facilities operated by Japan Racing Association
WINS (AM), an all-news radio station in New York City
WINS-FM, a radio station in New York City
WINS (solution stack), a set of software subsystems
Women in Natural Sciences, an educational program in the UD
World Institute for Nuclear Security
SM&A, stock ticker symbol WINS
See also
Win (disambiguation)
WINZ (disambiguation) |
https://en.wikipedia.org/wiki/South%20Korean%20animation | South Korean animation, or aeni (; ) is hand-drawn and computer-generated animation originating from South Korea.
Etymology
The word aeni comes from the English word "animation" as written in Hangeul, 애니메이션 (aenimeisyeon), similar to Japanese アニメーション (animēshon). Just like anime, aenimeisyeon was shortened to aeni. However, aeni usually refers to Japanese animation in colloquial usage, although it can refer to Korean animation or animation in general. To distinguish it from its Japanese counterpart, Korean animation is often called hanguk aeni (; lit. Korean animation) or guksan aeni (; lit. domestic animation).
A Sino-Korean term manhwa yeonghwa (; Hanja: 漫畫映畫), a portmanteau of manhwa and the Korean term for movie, is also used as a general term for all animation.
History
The South Korean animation industry was in a period of crisis throughout the 2000s. Depression at the reality of being an industry that the West merely gave factory-type drawing to begin to sink in. This followed the 1990s, a period of explosive growth for the industry when Korean studios made most of their profits from OEM, mostly from the United States, or Japan.
In many ways, 2011 was a bright transitional year for Korean animation, with home-produced animated feature films finally finding box office success in South Korea, instead of facing the usual financial failure. As far as overseas export market is concerned, the likes of Rough Draft Korea (RDK) kept on landing new contracts, which have seen Rough Draft perform the manual work on over 45 popular Western cartoon titles over 16 years.
South Korean animation has boomed in popularity in Eastern Asia with the success of the series Pororo the Little Penguin and Origami Warriors in 2011, leaving fans wanting to discover more Korean animations. This success is due in part to perfecting the Korean animation technique, and financial returns being reinvested into new animated products.
Some Korean animators still blame the booming Korean game industry for draining the animation industry's talent pool, but the box office success of the Korean animated film Leafie in 2011 in South Korea is inspiring a new generation.
Animation industry
Animation contracts for Korean animation studios range from collaboration/minor contribution contracts, to most of the work. The South Korean animation industry can be considered dynamic as there are more than a hundred animation studios. While it is mostly firms in South Korea that contract with Western studios, some of the work is reported to be subcontracted to North Korea as well.
Korean animation characters in public spaces
Larva subway was a subway based on and featured a Larva character. It operated from November 2014 until May 2015 on line No. 2. The Seoul government and Metro explained that they wanted to give citizens a chance to celebrate the 40th anniversary of the subways opening.
Tayo buses were organized by the Seoul Metropolitan Government, the Bus Transport Business Asso |
https://en.wikipedia.org/wiki/Care%20Bears%3A%20Journey%20to%20Joke-a-lot | Care Bears: Journey to Joke-a-lot is a 2004 computer-animated musical adventure film, produced by Nelvana and released by Lions Gate Home Entertainment. It was the first Nelvana production featuring the Care Bears in the last 24 years, since the Care Bears Nutcracker Suite television film in 1988. Directed by Mike Fallows and written by Jeffrey Alan Schecter, this was the fourth film to star the Care Bears and their first in 17 years. This was also the first one in the franchise to be computer-animated.
The film centres on Funshine Bear, a Care Bear who loves to laugh and tell jokes. After one of his jokes backfires against Grumpy, another of the Bears, Funshine runs away to find a place where others can appreciate his talents better. He discovers a town known as Joke-a-lot, where laughter and humour are the order of the day, and soon becomes the area's "King". Unknown to the Bear, a rat named Sir Funnybone is using him that way in order to possess an important object called the Royal Sceptre.
Journey to Joke-a-lot premiered in the United States on October 5, 2004, through Lions Gate, and was subsequently released overseas through Universal Pictures Video. It received generally positive reviews, although the computer animation was singled out. In the midst of this installment's success, Lions Gate released a 2005 sequel, The Care Bears' Big Wish Movie. A soundtrack album, featuring the film's songs and some original tracks, was released by Madacy Kids on the same day as the film's debut.
Plot
The Care Bears live in a cloud-filled land known as Care-a-lot ("With All Your Heart"). One of the Bears, Grumpy, is working on a rainbow carousel for the upcoming Care Bear Fair. His fellow Care Bears come by for a look; one of them, Funshine, loves telling jokes and making the other Care Bears laugh. After they reluctantly agree to try the carousel, it goes out of control and sends them into the sky before crashing down. Grumpy feels even worse after Funshine tries to cheer him up with a joke on height restrictions, which the other Bears find funny. Grumpy is not amused and even goes so far as to tell Funshine that if he doesn't understand that cheering up isn't making fun of, then maybe Funshine doesn't belong in Care-A-Lot. As a result, the Bears force him to make up with Funshine by apologizing. Upon reaching his house, they find no trace of their friend. Reading from a note, Tenderheart Bear realizes that Funshine has felt sorry for Grumpy and has gone in search of a place where his talents can be better appreciated. The other Bears are worried about his fate; as they cannot hold their Fair without him, they decide to look for him regardless and bring him back to Care-a-lot. Five of them— Tenderheart, Grumpy, Wish, Cheer and Share volunteer, while Laugh-a-Lot, Love-a-Lot, Friend, Good Luck, Bedtime, and Champ stay home to get ready for the fair.
The day after he runs away ("Make Em Laugh") from home, Funshine hears circus music in th |
https://en.wikipedia.org/wiki/Fighting%20Network%20Rings | Fighting Network Rings, trademarked as RINGS, is a Japanese combat sport promotion that has lived three distinct periods: shoot style puroresu promotion from its inauguration to 1995, mixed martial arts (MMA) promotion from 1995 to its 2002 disestablishment, and a revived MMA promotion from 2008 onward.
RINGS was founded by Akira Maeda on May 11, 1991, following the dissolution of Newborn UWF. At that time, Maeda and Mitsuya Nagai were the only two people to transfer from UWF, wrestlers such as Kiyoshi Tamura, Hiromitsu Kanehara and Kenichi Yamamoto would later also transfer from UWF International.
Despite starting out as a shoot style professional wrestling promotion, RINGS showcased primitive MMA fights, as early as 1991, and notably promoted shoot style wrestling matches alongside these legitimate fights on the same cards. Beginning in 1995, RINGS ceased promoting their product as professional wrestling and following founder Akira Maeda's retirement in 1999, the promotion transitioned into a full-fledged MMA promotion.
The promotion often brought in fighters and professional wrestlers from Shooto, Pancrase, and Pro Wrestling Fujiwara Gumi to compete against RINGS fighters.
Tournaments
Mega Battle Tournament
Mega Battle Tournament 1992 (Oct 29, 1992 – Jan 23, 1993) – Chris Dolman
Mega Battle Tournament 1993 (Oct 23, 1993 – Jan 21, 1994) – Akira Maeda
Mega Battle Tournament 1994 (Sep 21, 1994 – Jan 25, 1995) – Volk Han
Mega Battle Tournament 1995 (Oct 21, 1995 – Jan 24, 1996) – Akira Maeda
Mega Battle Tournament 1996 (Oct 25, 1996 – Jan 22, 1997) – Volk Han
Mega Battle Tournament 1997 (Oct 25, 1997 – Jan 21, 1998) – Kiyoshi Tamura
Mega Battle Tournament 1998 (Oct 23, 1998 – Jan 23, 1999) – Team Georgia
King of Kings
King of Kings Tournament 1999 (Oct 28, 1999 – Feb 26, 2000) – Dan Henderson
King of Kings Tournament 2000 (Oct 9, 2000 – Feb 24, 2001) – Antônio Rodrigo Nogueira
Title tournaments
Light-Heavyweight Title Tournament 1997 (Mar 28 – Aug 13, 1997) – Masayuki Naruse
Middleweight Title Tournament 2001 (Apr 20 – Aug 11, 2001) – Ricardo Arona
Openweight Title Tournament 2001 (Apr 20 – Aug 11, 2001) – Fedor Emelianenko
Other tournaments
Rising Stars Heavyweight Tournament 2000 (Jul 15 – Sep 30, 2000) – Bobby Hoffman
Rising Stars Middleweight Tournament 2000 (Jul 15 – Sep 30, 2000) – Jeremy Horn
Absolute Class Tournament 2001 (Oct 20, 2001 – Feb 15, 2002) – Fedor Emelianenko
Championships
Openweight Championship
Light-Heavyweight Championship (−)
Middleweight Championship (−)
Japanese roster
Akira Maeda
Mitsuya Nagai
Yoshihisa Yamamoto
Masayuki Naruse
Tsuyoshi Kosaka
Wataru Sakata
Kiyoshi Tamura
Kenichi Yamamoto
Hiromitsu Kanehara
Ryuki Ueyama
Koichiro Kimura
Hiroyuki Ito
Yoshinori Nishi
Foreigners
RINGS' system was largely much inspired by organizations such as the National Wrestling Alliance and FIFA, and featured fighters from different countries organized into stables. These foreign fighters would then compete against RINGS' |
https://en.wikipedia.org/wiki/The%20Belonging%20Kind | "The Belonging Kind" is a science fiction short story by cyberpunk authors William Gibson and John Shirley. It was first published in the horror anthology Shadows 4 edited by Charles L. Grant in 1981, later to be included along with several other stories in Gibson's collection Burning Chrome.
It was written prior the conception of the Sprawl universe in which several of Gibson's novels and stories are set, taking place in a setting much more like contemporary American life.
Plot summary
Michael Coretti is a dull, scholarly man who studies and teaches linguistics and social interaction theory. He frequently visits bars to help alleviate the tedium of his everyday life, even though he never feels at ease among the crowds. One night, he meets a woman named Antoinette who seems to fit in perfectly, adapting her speech patterns to match any conversation partner.
Coretti follows Antoinette to various other bars and clubs, watching as she drinks and talks with a male companion; her appearance and clothing shift to let her fit in wherever she goes. He begins to spend more of his nights searching for her in one bar after another, and his teaching deteriorates to the point that he loses his job.
When Coretti sees Antoinette's companion pay a cabdriver with money formed from a pocket within his body, he realizes that the two are not human. He follows them to a room in the hotel where he has been staying, but flees in horror upon finding a crowd of creatures just like them, who can live solely on alcohol and change their appearance and behavior to blend in at any bar they enter. He takes a night job and finds lodgings at a boarding house, but after three weeks he receives a telephone call inviting him to join "the belonging kind." Abandoning the job and his room, he discovers that he has taken on their non-human characteristics and settles in at a bar for an evening of secret mating with Antoinette.
References
External links
"The Belonging Kind" at the William Gibson Aleph
1981 short stories
Cyberpunk short stories
Horror short stories
Short stories by William Gibson |
https://en.wikipedia.org/wiki/WXMI | WXMI (channel 17) is a television station licensed to Grand Rapids, Michigan, United States, serving West Michigan as an affiliate of the Fox network. Owned by the E. W. Scripps Company, the station maintains studios on Plaza Drive (near M-37) on the northern side of Grand Rapids, and its transmitter is located southwest of Middleville.
History
The station signed on the air on March 18, 1982, as an independent station under the call sign WWMA, standing for "West Michigan's Alternative" (as it was the first locally based independent station in the market not associated with a religious organization). The station was founded and originally owned by Heritage Broadcasting Company. Approximately a year after signing on, additional shareholders bought control of the station and changed the call sign to the current WXMI on August 15, 1983. In 1987, WXMI signed an affiliation deal to become the market's Fox affiliate; it joined the network on April 9, 1987, when Fox expanded its programming offerings to include prime time programming. In 1989, the station's stock was purchased by a New York-based company headed by Robert Dudley called Odyssey Television Partners.
Nine years later, WXMI was purchased by Indianapolis-based Emmis Communications, which traded the station with sister KTZZ in Seattle to Tribune Broadcasting in 1998 in exchange for FM station WQCD in New York City.
Aborted acquisition by Sinclair Broadcast Group and resale to Standard Media Group
On May 8, 2017, Hunt Valley, Maryland-based Sinclair Broadcast Group entered into an agreement to acquire Tribune Media for $3.9 billion, plus the assumption of $2.7 billion in debt held by Tribune. Sinclair was precluded from acquiring WXMI directly, as it already owned CBS affiliate WWMT (channel 3). On April 24, 2018, Sinclair announced that it would sell WXMI and eight other stations – Sinclair-operated KOKH-TV in Oklahoma City, WRLH-TV in Richmond, KDSM-TV in Des Moines, WOLF-TV (along with LMA partners WSWB and WQMY) in Scranton–Wilkes-Barre and WXLV-TV in Greensboro/Winston-Salem–High Point, and Tribune-owned WPMT in York, Pennsylvania – to Standard Media Group (an independent broadcast holding company formed by private equity firm Standard General to assume ownership of and absolve ownership conflicts involving the aforementioned stations) for $441.1 million.
Tribune terminated the Sinclair deal on August 9, 2018, and filed a breach of contract lawsuit, three weeks after the FCC's July 18 vote to have the deal reviewed by an administrative law judge amid "serious concerns" about Sinclair's forthrightness in its applications to sell certain conflict properties; the sale to Standard Media was also cancelled, as it was predicated on the closure of the Sinclair–Tribune merger.
Sale to Scripps
On December 3, 2018, Irving, Texas-based Nexstar Media Group announced it would acquire the assets of Tribune Media for $6.4 billion in cash and debt. Nexstar was precluded from acquiring WXMI directly o |
https://en.wikipedia.org/wiki/Prosthaphaeresis | Prosthaphaeresis (from the Greek προσθαφαίρεσις) was an algorithm used in the late 16th century and early 17th century for approximate multiplication and division using formulas from trigonometry. For the 25 years preceding the invention of the logarithm in 1614, it was the only known generally applicable way of approximating products quickly. Its name comes from the Greek prosthesis (πρόσθεσις) and aphaeresis (ἀφαίρεσις), meaning addition and subtraction, two steps in the process.
History and motivation
In 16th-century Europe, celestial navigation of ships on long voyages relied heavily on ephemerides to determine their position and course. These voluminous charts prepared by astronomers detailed the position of stars and planets at various points in time. The models used to compute these were based on spherical trigonometry, which relates the angles and arc lengths of spherical triangles (see diagram, right) using formulas such as
and
where a, b and c are the angles subtended at the centre of the sphere by the corresponding arcs.
When one quantity in such a formula is unknown but the others are known, the unknown quantity can be computed using a series of multiplications, divisions, and trigonometric table lookups. Astronomers had to make thousands of such calculations, and because the best method of multiplication available was long multiplication, most of this time was spent taxingly multiplying out products.
Mathematicians, particularly those who were also astronomers, were looking for an easier way, and trigonometry was one of the most advanced and familiar fields to these people. Prosthaphaeresis appeared in the 1580s, but its originator is not known for certain; its contributors included the mathematicians Ibn Yunis, Johannes Werner, Paul Wittich, Joost Bürgi, Christopher Clavius, and François Viète. Wittich, Yunis, and Clavius were all astronomers and have all been credited by various sources with discovering the method. Its most well-known proponent was Tycho Brahe, who used it extensively for astronomical calculations such as those described above. It was also used by John Napier, who is credited with inventing the logarithms that would supplant it.
Nicholas Copernicus mentions "prosthaphaeresis" several times in his 1543 work , meaning the "great parallax" caused by the displacement of the observer due to the Earth's annual motion.
The identities
The trigonometric identities exploited by prosthaphaeresis relate products of trigonometric functions to sums. They include the following:
The first two of these are believed to have been derived by Jost Bürgi, who related them to [Tycho?] Brahe; the others follow easily from these two. If both sides are multiplied by 2, these formulas are also called the Werner formulas.
The algorithm
Using the second formula above, the technique for multiplication of two numbers works as follows:
Scale down: By shifting the decimal point to the left or right, scale both numbers to value |
https://en.wikipedia.org/wiki/Google%20Web%20Accelerator | Google Web Accelerator was a web accelerator produced by Google. It used client software installed on the user's computer, as well as data caching on Google's servers, to speed up page load times by means of data compression, prefetching of content, and sharing cached data between users. The beta, released on May 4, 2005, works with Mozilla Firefox 1.0+ and Internet Explorer 5.5+ on Windows 2000 SP3+, Windows XP, Windows Server 2003, Windows Vista and Windows 7 machines.
Bugs and privacy issues
It was discovered that Google Web Accelerator had a tendency to prevent YouTube videos from playing, with the message in the YouTube video player, "We're sorry, this video is no longer available." By turning off Google Web Accelerator, the user was able to play YouTube videos again without a problem.
Google Web Accelerator sent requests for web pages, except for secure web pages (HTTPS), to Google, which logged these requests. Some web pages embedded personal information in these page requests.
Google received and temporarily cached cookie data that your computer sent with webpage requests in order to improve performance.
Google crawled every web page it came across leading it to inadvertently deleting web pages.
In order to speed up delivery of content, Google Web Accelerator sometimes retrieved webpage content that the user did not request, and stored it in the Google Web Accelerator cache. Some law experts and IT authors affirmed that Google would "combine personal and clickstream data with existing search history data contained in Google's own cookie"
Google Web Accelerator is no longer available for, or supported by, Google . the Google Web Accelerator is not compatible with Firefox 3.0. Google Web Accelerator is still available for download from other websites. The Labs experiment launched in 2005 was discontinued and no longer supported by Google, since January 2009.
Related
Google Search
Opera Turbo
References
Web Accelerator
Web accelerators |
https://en.wikipedia.org/wiki/Jak%20X%3A%20Combat%20Racing | Jak X: Combat Racing (known as Jak X in Europe, Africa and Australia) is a 2005 vehicular combat video game developed by Naughty Dog and published by Sony Computer Entertainment for the PlayStation 2 console. It is the fourth installment in the Jak and Daxter series. The plot follows protagonist Jak and his allies who, after having been poisoned, must partake in a championship of the fictional sport of "combat racing" in an effort to obtain an antidote.
The gameplay differs from previous installments in the series, focusing on arcade racing rather than action-adventure gameplay. However, the driving mechanics of the game were modeled after the previous entry in the series, Jak 3. Furthermore, Combat Racing was the first Jak and Daxter game to feature a multiplayer mode, with the second being Daxter. In 2017, the game was re-released for the PlayStation 4, alongside Jak and Daxter: The Precursor Legacy, Jak II, and Jak 3.
Gameplay
In Combat Racing, the player controls characters from the Jak and Daxter series, all of which race in customizable dune buggy-style vehicles. The two main modes of play in the game are Adventure and Exhibition. Jak, the main character of the series, is the only playable character in the Adventure mode, and must participate in a series of Eco Cup Championships in the game's story to obtain an antidote to a poison he and his comrades have consumed. Jak can also take part in a variety of Events in the Championships as to earn Medal Points and advance through the ranks. The main event of the game is the Circuit Race, in which Jak must finish a set of laps in a course while avoiding the wrath of the other racers. The player can destroy these racers as well by picking up Yellow and Red Eco weapons, with Yellow Eco acting as an offensive weapon made to attack and destroy opponents, and Red Eco acting as a defensive weapon made to protect the player from incoming attacks. Green and Blue Eco can also be picked up, acting as health recovery and turbo respectively. Causing and taking damage causes a Dark Eco meter to fill up which, once full, causes weapons to become more potent versions of themselves. Save data from the first three Jak and Daxter games, Daxter and Ratchet: Deadlocked unlock several drivers for the game, including Ratchet from Ratchet & Clank. For the PlayStation 4 port, the save data of the PS4 ports of the first three Jak and Daxter games, Uncharted: The Nathan Drake Collection and Ratchet & Clank (2016) are required to unlock the content.
Plot
A year after the Dark Maker ship has been destroyed in Jak 3, Haven City has been steadily rebuilt after Errol's defeat, and has grown into a peaceful utopia. Kras City, a dangerous dystopian city full of ruthless mobsters, is also home to a popular sport known as "Combat Racing". Jak, Daxter, Ashelin, Samos, Keira and Torn are invited to the reading of Krew's (one of the villains of Jak II) last will, where they meet Krew's daughter, Rayn. After offering a toast, Krew |
https://en.wikipedia.org/wiki/Experimental%20philosophy | Experimental philosophy is an emerging field of philosophical inquiry that makes use of empirical data—often gathered through surveys which probe the intuitions of ordinary people—in order to inform research on philosophical questions. This use of empirical data is widely seen as opposed to a philosophical methodology that relies mainly on a priori justification, sometimes called "armchair" philosophy, by experimental philosophers.
Experimental philosophy initially began by focusing on philosophical questions related to intentional action, the putative conflict between free will and determinism, and causal vs. descriptive theories of linguistic reference. However, experimental philosophy has continued to expand to new areas of research.
Disagreement about what experimental philosophy can accomplish is widespread. One claim is that the empirical data gathered by experimental philosophers can have an indirect effect on philosophical questions by allowing for a better understanding of the underlying psychological processes which lead to philosophical intuitions. Others claim that experimental philosophers are engaged in conceptual analysis, but taking advantage of the rigor of quantitative research to aid in that project. Finally, some work in experimental philosophy can be seen as undercutting the traditional methods and presuppositions of analytic philosophy. Several philosophers have offered criticisms of experimental philosophy.
History
Though, in early modern philosophy, natural philosophy was sometimes referred to as "experimental philosophy", the field associated with the current sense of the term dates its origins around 2000 when a small number of students experimented with the idea of fusing philosophy to the experimental rigor of psychology.
While the modern philosophical movement Experimental Philosophy began growing around 2000, there are some earlier examples, such as Hewson, 1994 and Naess 1938, and the use of empirical methods in philosophy far predates the emergence of the recent academic field. Current experimental philosophers claim that the movement is actually a return to the methodology used by many ancient philosophers. Further, other philosophers like David Hume, René Descartes and John Locke are often held up as early models of philosophers who appealed to empirical methodology.
Areas of research
Consciousness
The questions of what consciousness is, and what conditions are necessary for conscious thought have been the topic of a long-standing philosophical debate. Experimental philosophers have approached this question by trying to get a better grasp on how exactly people ordinarily understand consciousness. For instance, work by Joshua Knobe and Jesse Prinz (2008) suggests that people may have two different ways of understanding minds generally, and Justin Sytsma and Edouard Machery (2009) have written about the proper methodology for studying folk intuitions about consciousness. Bryce Huebner, Michael Bruno, and Hago |
https://en.wikipedia.org/wiki/List%20of%20radio%20stations%20in%20West%20Virginia | The following is a list of FCC-licensed radio stations in the U.S. state of West Virginia, which can be sorted by their call signs, frequencies, cities of license, licensees, and programming formats.
List of radio stations
Defunct
WCFC
WCFC-FM
WMBP-LP
WOBG
WPDX
WQAB
WQTZ-LP
WSPW-LP
WVBL-LP
WVPP-LP
WVPV-LP
WXDB-LP
WXKX
See also
West Virginia media
List of newspapers in West Virginia
List of television stations in West Virginia
Media of cities in West Virginia: Charleston, Huntington, Wheeling
References
Bibliography
External links
West Virginia Broadcasters Association
Tri-State Amateur Radio Association, Huntington, WV
Images
West Virginia
Radio |
https://en.wikipedia.org/wiki/Software%20quality%20assurance | Software quality assurance (SQA) is a means and practice of monitoring all software engineering processes, methods, and work products to ensure compliance against defined standards. It may include ensuring conformance to standards or models, such as ISO/IEC 9126 (now superseded by ISO 25010), SPICE or CMMI.
It includes standards and procedures that managers, administrators or developers may use to review and audit software products and activities to verify that the software meets quality criteria which link to standards.
SQA encompasses the entire software development process, including requirements engineering, software design, coding, code reviews, source code control, software configuration management, testing, release management and software integration. It is organized into goals, commitments, abilities, activities, measurements, verification and validation.
Purpose
SQA involves a three-pronged approach:
Organization-wide policies, procedures and standards
Project-specific policies, procedures and standards
Compliance to appropriate procedures
Guidelines for the application of ISO 9001:2015 to computer software are described in ISO/IEC/IEEE 90003:2018. External entities can be contracted as part of process assessments to verify that projects are standard-compliant. More specifically in case of software, ISO/IEC 9126 (now superseded by ISO 25010) should be considered and applied for software quality.
Activities
Quality assurance activities take place at each phase of development. Analysts use application technology and techniques to achieve high-quality specifications and designs, such as model-driven design. Engineers and technicians find bugs and problems with related software quality through testing activities. Standards and process deviations are identified and addressed throughout development by project managers or quality managers, who also ensure that changes to functionality, performance, features, architecture and component (in general: changes to product or service scope) are made only after appropriate review, e.g. as part of change control boards.
See also
DOD-STD-2167
Quality by Design
Software assurance
Software quality analyst
Software quality management
Software testing
References
External links
"Software Quality Assurance(SQA): Plan, Audit & Review." Meet Guru99 – Free Training Tutorials & Video for IT Courses, www.guru99.com/software-quality-assurance-test-audit-review-makes-your-life-easy.html.
Quality
Quality assurance
Software quality
IEEE standards |
https://en.wikipedia.org/wiki/Software%20rendering | Software rendering is the process of generating an image from a model by means of computer software. In the context of computer graphics rendering, software rendering refers to a rendering process that is not dependent upon graphics hardware ASICs, such as a graphics card. The rendering takes place entirely in the CPU. Rendering everything with the (general-purpose) CPU has the main advantage that it is not restricted to the (limited) capabilities of graphics hardware, but the disadvantage is that more transistors are needed to obtain the same speed.
Rendering is used in architecture, simulators, video games, movies and television visual effects and design visualization. Rendering is the last step in an animation process, and gives the final appearance to the models and animation with visual effects such as shading, texture-mapping, shadows, reflections and motion blur. Rendering can be split into two main categories: real-time rendering (also known as online rendering), and pre-rendering (also called offline rendering). Real-time rendering is used to interactively render a scene, like in 3D computer games, and generally each frame must be rendered in a few milliseconds. Offline rendering is used to create realistic images and movies, where each frame can take hours or days to complete, or for debugging of complex graphics code by programmers.
Real-time software rendering
For real-time rendering the focus is on performance. The earliest texture mapped real-time software renderers for PCs used many tricks to create the illusion of 3D geometry (true 3D was limited to flat or Gouraud-shaded polygons employed mainly in flight simulators.) Ultima Underworld, for example, allowed a limited form of looking up and down, slanted floors, and rooms over rooms, but resorted to sprites for all detailed objects. The technology used in these games is currently categorized as 2.5D.
One of the first games architecturally similar to modern 3D titles, allowing full 6DoF, was Descent, which featured 3D models entirely made from bitmap textured triangular polygons. Voxel-based graphics also gained popularity for fast and relatively detailed terrain rendering, as in Delta Force, but popular fixed-function hardware eventually made its use impossible. Quake features an efficient software renderer by Michael Abrash and John Carmack. With its popularity, Quake and other polygonal 3D games of that time helped the sales of graphics cards, and more games started using hardware APIs like DirectX and OpenGL. Though software rendering fell off as a primary rendering technology, many games well into the 2000s still had a software renderer as a fallback, Unreal and Unreal Tournament for instance, feature software renderers able to produce enjoyable quality and performance on CPUs of that period. One of the last AAA games without a hardware renderer was Outcast, which featured advanced voxel technology but also texture filtering and bump mapping as found on graphics hardware.
|
https://en.wikipedia.org/wiki/Photuris%20%28protocol%29 | In computer networking, Photuris is a session key management protocol defined in RFC 2522.
Photuris is the Latin name of a genus of fireflies native to North America that mimic the signals of other firefly species. The name was chosen as a reference to the (classified) FIREFLY key exchange protocol developed by the National Security Agency and used in the STU-III secure telephone, which is believed to operate by similar principles.
See also
FIREFLY
External links
RFC 2522
Test implementation of Photuris
Network protocols |
https://en.wikipedia.org/wiki/Photuris%20%28disambiguation%29 | Photuris may refer to:
Photuris (genus), a genus of beetles containing several species of firefly
Photuris (protocol), a computer networking session key management protocol |
https://en.wikipedia.org/wiki/Extensible%20Storage%20Engine | Extensible Storage Engine (ESE), also known as JET Blue, is an ISAM (indexed sequential access method) data storage technology from Microsoft. ESE is the core of Microsoft Exchange Server, Active Directory, and Windows Search. It's also used by a number of Windows components including Windows Update client and Help and Support Center. Its purpose is to allow applications to store and retrieve data via indexed and sequential access.
ESE provides transacted data update and retrieval. A crash recovery mechanism is provided so that data consistency is maintained even in the event of a system crash. Transactions in ESE are highly concurrent making ESE suitable for server applications. ESE caches data intelligently to ensure high performance access to data. In addition, ESE is lightweight making it suitable for auxiliary applications.
The ESE Runtime (ESENT.DLL) has shipped in every Windows release since Windows 2000, with native x64 version of the ESE runtime shipping with x64 versions of Windows XP and Windows Server 2003. Microsoft Exchange, up to Exchange 2003 shipped with only the 32-bit edition, as it was the only supported platform. With Exchange 2007, it ships with the 64-bit edition.
Databases
A database is both a physical and logical grouping of data. An ESE database looks like a single file to Windows. Internally the database is a collection of 2, 4, 8, 16, or 32 KB pages (16 and 32 KB page options are only available in Windows 7 and Exchange 2010), arranged in a balanced B-tree structure. These pages contain meta-data to describe the data contained within the database, data itself, indexes to persist interesting orders of the data, and other information. This information is intermixed within the database file but efforts are made to keep data used together clustered together within the database. An ESE database may contain up to 232 pages, or 16 terabytes of data, for 8 kilobyte sized pages.
ESE databases are organized into groups called instances. Most applications use a single instance, but all applications can also use multiple instances. The importance of the instance is that it associates a single recovery log series with one or more databases. Currently, up to 6 user databases may be attached to an ESE instance at any time. Each separate process using ESE may have up to 1024 ESE instances.
A database is portable in that it can be detached from one running ESE instance and later attached to the same or a different running instance. While detached, a database may be copied using standard Windows utilities. The database cannot be copied while it is being actively used since ESE opens database files exclusively. A database may physically reside on any device supported for directly addressable I/O operations by Windows.
Tables
A table is a homogeneous collection of records, where each record has the same set of columns. Each table is identified by a table name, whose scope is local to the database in which the table is contained. The |
https://en.wikipedia.org/wiki/SIMCOS | SIMCOS (an acronym standing for SIMulation of COntinuous Systems) is a computer language and a development environment for computer simulation. In 1989 it was developed by Slovenian experts led by Borut Zupančič.
Properties
The purpose of the language is simulation of dynamic mathematical models of systems, given as set of ordinary differential equations. It is an equation oriented and compiler type of language. Despite its name it can be used for discrete simulation as well. The language suits well to the CSSL'67 standard of simulation languages so portability among other languages conforming to the same standard (e.g. Tutsim, ACSL etc.) is quite simple. It is a DOS based software occasionally it is slightly modified so it can be run under actual versions of Microsoft Windows. Apart from the simulation itself it can also perform parametrisation (a series of simulations with different values of parameters), linearisation of models and optimisation (finding such values of parameters that a criterion function is minimised).
Simulation process
When a simulation scheme must be prepared it must be described in the SIMCOS language. It can be "drawn" (similarly as with an analogue computer) using an enclosed block library graphics tool (it contains basic elements such as integrators, amplifiers, summators, some basic input signals etc.) but more often it is entered as a program using one of text editors, e.g. Edit enclosed with DOS. Whichever form of entry of the model is used, the first phase of simulation reprocesses it into space of states form and rewrites the program into Fortran and prepares files with input parameters. This Fortran program is compiled into an executable file (.EXE) and executed. The executable program reads parameter values from input files, performs the simulation and writes requested calculated values into another file. When it terminates, SIMCOS takes control again and can display results as a graphic plot.
The "heart" of the executable is function INTEG which can solve differential equations using one of several numerical methods. First it reads necessary values (e.g. values of parameters, initial conditions) from files then it calls the function DERIV where the model is actually described as series of functions of its derivatives. The returned values are used at the selected numerical method. Requested calculated results are written into the file and the whole procedure is repeated until the termination condition is satisfied.
Example
Continuous simulation of dead time (its Laplace transform is ) is not a trivial task and usually we use one of Padé approximations. We will simulate Padé approximation of 2nd order
and 4th order:
Input signal is a unit step, communication interval equals 0.01s, length simulation run is 5s, results will be compared with output of built-in discrete function delay (it requires additional array (del in our case) of appropriate size).
y1 is a result of simulation of Padé approximation of 2nd |
https://en.wikipedia.org/wiki/European%20route%20E20 | European route E20 is a part of the United Nations International E-road network. It runs roughly west–east through Ireland, the United Kingdom, Denmark, Sweden, Estonia, and Russia.
Its length is but it is not continuous; at three points, a sea crossing is required. Roll-on/roll-off ferries make the crossings from Dublin to Liverpool and from Stockholm to Tallinn. No publicly accessible ferries traverse the North Sea from Kingston-upon-Hull to Esbjerg (as of 2019), but a ferry for commercial drivers leaves Immingham for Esbjerg on most days.
Route
Ireland
The initial section of the E20 from Shannon Airport to Dublin via Limerick is approximately 228 km long and is only partially signed, along the M7/N7. The section from Shannon Airport to east of Limerick is mainly dual carriageway, with a short section of motorway as part of the Limerick Southern Ring Road. The Shannon Tunnel, opened on 16 July 2010, completed the bypass of Limerick. The section from Limerick to Naas is motorway (M7), and the final section from Naas to Dublin is dual carriageway (N7). A ferry must be used from Dublin to Liverpool.
United Kingdom
E20 follows the A5080 from Liverpool to Huyton, the M62 and M60 from Huyton to South Cave, and the A63 from South Cave to Kingston upon Hull. The route length across the UK is in total but is not signposted.
There are no ferries between Kingston upon Hull and Esbjerg. Alternative ferries were once available from Immingham, which is from Kingston upon Hull, and Harwich, which is from Kingston upon Hull. There are no longer any passenger routes operating between the UK and Scandinavia.
The closest alternative is to take the Eurotunnel Shuttle from Cheriton (Folkestone) to Calais, or take a ferry from Harwich to Hook of Holland. Both of these routes would require a detour of around 900 miles (940 miles to Esbjerg, as this route would require you to drive along the E20 to reach Esbjerg).
Denmark
In Denmark, E20 is a motorway from Esbjerg to the Øresund Bridge. The length of the Danish part is .
It passes first along Jutland from Esbjerg to Kolding, then crosses the Little Belt Bridge onto Funen. E20 crosses the entirety of Funen, passing approximately 2 km south of Odense. Then, at Nyborg, E20 crosses the Great Belt Fixed Link onto Zealand. E20 follows the Vestmotorvejen until Køge, where it goes north to Copenhagen. In Copenhagen, E20 passes south of the city, crossing onto Kastrup where it meets the Copenhagen Airport. Between Køge and Copenhagen, the road has three E-road numbers (also E47 and E55).
The Great Belt Bridge and Øresund Bridge are both tolled. The Øresund crossing begins as a tunnel at Kastrup, which then transfers onto the bridge at the man-made island Peberholm. The road crosses the border between Denmark and Sweden on the Øresund Bridge.
Sweden
In Sweden, E20 is a motorway from the Öresund Bridge in Malmö to Alingsås 48 km northeast of Gothenburg, a long motorway. Furthermore, it is a motorway most of t |
https://en.wikipedia.org/wiki/Dexter%27s%20Laboratory%3A%20Ego%20Trip | Dexter's Laboratory: Ego Trip is an animated television film produced by Hanna-Barbera Cartoons and originally aired on December 10, 1999, on Cartoon Network. It is based on the Cartoon Network's animated television series Dexter's Laboratory. The special follows Dexter, the series' protagonist, as he travels forward through time and meets futuristic versions of himself and his rival Mandark.
While made for television, the film is the directorial debut of series creator Genndy Tartakovsky and was originally intended to conclude the series. Ego Trip was the first Cartoon Network television movie produced, and is the final Dexter's Laboratory installment to be animated using traditional cel animation. This is one of the final times Christine Cavanaugh reprises her role as Dexter; Candi Milo would replace her beginning in the third season.
Plot
After chasing his rival Mandark out of his lab when he tries to steal his latest invention, the Neurotomic Protocore, an energy source that also draws on and distributes the brainpower of its user, Dexter asks his sister Dee Dee to leave the lab, where she unintentionally enters a time machine stored near the entrance. Suddenly, Dexter is confronted with a group of red robots that have appeared from this time machine. They declare that they are here to "destroy the one who saved the future" and appear to make ready to attack Dexter. Dexter easily destroys them with the use of various tools and gadgets from his lab, as the robots mysteriously don't attack at all. Believing that he is "The One Who Saved the Future" that the robots spoke of, Dexter decides to travel through time to discover how "cool" he becomes.
However, in the first time period he visits, Dexter finds a tall, skinny, weak version of himself (known only as "Number Twelve") working in an office designing cubicles – and Mandark is his rich, successful – and sadistically abusive – boss. The kid Dexter berates his older self for allowing Mandark to bully him around and manages to convince him to come along to see how cool they become, but unwittingly leaves the Neurotomic Protocore and its related blueprints out in his cubicle, which Mandark steals as the two Dexters move forward in time.
In the second time period, all the technology from the blueprints has been implemented, creating a utopian society of science and knowledge where anything can be materialized through the power of the Core. The two Dexters meet their much older self, a wizened senior citizen Dexter about the same height as the kid Dexter who is responsible for bringing the world into this new age with his brainpower (and Mandark's brain in a vat who cannot do anything other than complain about his situation). Due to his advanced age, however, Old Man Dexter can't remember anything about how he saved the world, so they travel back in time to find out.
In the third and last time period, which takes place between the first and second time periods, they find a dystopic world wh |
https://en.wikipedia.org/wiki/Freeze%20%28software%20engineering%29 | In software engineering, a freeze is a point in time in the development process after which the rules for making changes to the source code or related resources become more strict, or the period during which those rules are applied. A freeze helps move the project forward towards a release or the end of an iteration by reducing the scale or frequency of changes, and may be used to help meet a roadmap.
The exact rules depend on the type of freeze and the particular development process in use; for example, they may include only allowing changes which fix bugs, or allowing changes only after thorough review by other members of the development team. They may also specify what happens if a change contrary to the rules is required, such as restarting the freeze period.
Common types of freezes are:
A (complete) specification freeze, in which the parties involved decide not to add any new requirement, specification, or feature to the feature list of a software project, so as to begin coding work.
A (complete) feature freeze, in which all work on adding new features is suspended, shifting the effort towards fixing bugs and improving the user experience. The addition of new features may have a disruptive effect on other parts of the program, due both to the introduction of new, untested source code or resources and to interactions with other features; thus, a feature freeze helps improve the program's stability. For example: "user interface feature freeze" means no more features will be permitted to the user interface portion of the code; bugs can still be fixed.
A (complete) code freeze, in which no changes whatsoever are permitted to a portion or the entirety of the program's source code. Particularly in large software systems, any change to the source code may have unintended consequences, potentially introducing new bugs; thus, a code freeze helps ensure that a portion of the program that is known to work correctly will continue to do so. Code freezes are often employed in the final stages of development, when a particular release or iteration is being tested, but may also be used to prevent changes to one portion of a program while another is undergoing development. For example: "physics freeze" means no changes whatsoever will be permitted to the physics portion of the code.
Implementations
In development environments using version control, the use of branching can alleviate delays in development caused by freezes. For example, a project may have a "stable" branch from which new versions of the software are released, and a separate "development" branch in which the developers add new code. The effect of a freeze is then to prevent promotion of some or all changes from the development branch to the stable branch. In other words, the freeze applies only to the stable branch, and developers can continue their work on the development branch.
See also
Feature complete
Software release life cycle
References
Software project management
Software re |
https://en.wikipedia.org/wiki/Disk%20encryption%20software | Disk encryption software is computer security software that protects the confidentiality of data stored on computer media (e.g., a hard disk, floppy disk, or USB device) by using disk encryption.
Compared to access controls commonly enforced by an operating system (OS), encryption passively protects data confidentiality even when the OS is not active, for example, if data is read directly from the hardware or by a different OS. In addition crypto-shredding suppresses the need to erase the data at the end of the disk's lifecycle.
Disk encryption generally refers to wholesale encryption that operates on an entire volume mostly transparently to the user, the system, and applications. This is generally distinguished from file-level encryption that operates by user invocation on a single file or group of files, and which requires the user to decide which specific files should be encrypted. Disk encryption usually includes all aspects of the disk, including directories, so that an adversary cannot determine content, name or size of any file. It is well suited to portable devices such as laptop computers and thumb drives which are particularly susceptible to being lost or stolen. If used properly, someone finding a lost device cannot penetrate actual data, or even know what files might be present.
Methods
The disk's data is protected using symmetric cryptography with the key randomly generated when a disk's encryption is first established. This key is itself encrypted in some way using a password or pass-phrase known (ideally) only to the user. Thereafter, in order to access the disk's data, the user must supply the password to make the key available to the software. This must be done sometime after each operating system start-up before the encrypted data can be used.
Done in software, encryption typically operates at a level between all applications and most system programs and the low-level device drivers by "transparently" (from a user's point of view) encrypting data after it is produced by a program but before it is physically written to the disk. Conversely, it decrypts data immediately after being read but before it is presented to a program. Properly done, programs are unaware of these cryptographic operations.
Some disk encryption software (e.g., TrueCrypt or BestCrypt) provide features that generally cannot be accomplished with disk hardware encryption: the ability to mount "container" files as encrypted logical disks with their own file system; and encrypted logical "inner" volumes which are secretly hidden within the free space of the more obvious "outer" volumes. Such strategies provide plausible deniability.
Well-known examples of disk encryption software include: BitLocker for Windows; FileVault for Apple OS/X; LUKS a standard free software mainly for Linux and TrueCrypt, a non-commercial freeware application, for Windows, OS/X and Linux.
A 2008 study found data remanence in dynamic random access memory (DRAM), with data retention |
https://en.wikipedia.org/wiki/Bandwidth%20%28company%29 | Bandwidth is a communications platform as a service company. It sells software application programming interfaces (or APIs) for voice and messaging, using their own IP voice network.
History
Bandwidth was formed in 1999 by David Morken who was later joined by Henry Kaestner as co-founder in 2001, merging Bandwidth International into Bandwidth.com. Bandwidth moved to Centennial Campus of North Carolina State University in Raleigh, North Carolina in 2012. Bandwidth announced in 2020 a plan to move its corporate headquarters to 2021 Edwards Mill Road in Raleigh. The proposed campus is slated to include two five-story buildings, covering 450,000 square feet, and later an additional 350,000 square foot phase. Bandwidth also stated an intent to hire for some 1,000 new positions at the time of the announcement.
As of December 31, 2018, Bandwidth maintains a workforce of 700+ employees.
On November 10, 2017, the company had an initial public offering on the NASDAQ which raised $80 million in capital by selling 4 million $20 shares.
Acquisitions
On October 12, 2020, Bandwidth announced it had signed a definitive agreement to acquire Voxbone for an enterprise value of €446 million EUR.
Partnership
In August 2020, Bandwidth announced it had partnered with NC State University for a study that which ran from February 2019 to January 2020 to study fraudulent traffic patterns associated with robocalling.
See also
Unified communications
Voxbone
References
External links
Cloud communication platforms
Software companies of the United States
VoIP companies of the United States
Companies listed on the Nasdaq
2017 initial public offerings
Companies based in Raleigh, North Carolina
Publicly traded companies of the United States
Technology companies of the United States
1999 establishments in North Carolina
Information technology companies of the United States
American companies established in 1999
Software companies based in North Carolina
Software companies established in 1999 |
https://en.wikipedia.org/wiki/List%20of%20Germanwings%20destinations | As of October 2015, German low-cost carrier Germanwings served the following destinations. During 2016, the network had been incorporated into Eurowings.
Destinations
References
External links
Germanwings
Lists of airline destinations |
https://en.wikipedia.org/wiki/Personal%20data | Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person.
The abbreviation PII is widely accepted in the United States, but the phrase it abbreviates has four common variants based on personal or personally, and identifiable or identifying. Not all are equivalent, and for legal purposes the effective definitions vary depending on the jurisdiction and the purposes for which the term is being used. Under European Union and United Kingdom data protection regimes, which centre primarily on the General Data Protection Regulation (GDPR), the term "personal data" is significantly broader, and determines the scope of the regulatory regime.
National Institute of Standards and Technology Special Publication 800-122 defines personally identifiable information as "any information about an individual maintained by an agency, including (1) any information that can be used to distinguish or trace an individual's identity, such as name, social security number, date and place of birth, mother's maiden name, or biometric records; and (2) any other information that is linked or linkable to an individual, such as medical, educational, financial, and employment information." For instance, a user's IP address is not classed as PII on its own, but is classified as a linked PII.
Personal data is defined under the GDPR as "any information which [is] related to an identified or identifiable natural person". The IP address of an Internet subscriber may be classed as personal data.
The concept of PII has become prevalent as information technology and the Internet have made it easier to collect PII leading to a profitable market in collecting and reselling PII. PII can also be exploited by criminals to stalk or steal the identity of a person, or to aid in the planning of criminal acts. As a response to these threats, many website privacy policies specifically address the gathering of PII, and lawmakers such as the European Parliament have enacted a series of legislation such as the GDPR to limit the distribution and accessibility of PII.
Important confusion arises around whether PII means information which is identifiable (that is, can be associated with a person) or identifying (that is, associated uniquely with a person, such that the PII identifies them). In prescriptive data privacy regimes such as the US federal Health Insurance Portability and Accountability Act (HIPAA), PII items have been specifically defined. In broader data protection regimes such as the GDPR, personal data is defined in a non-prescriptive principles-based way. Information that might not count as PII under HIPAA can be personal data for the purposes of GDPR. For this reason, "PII" is typically deprecated internationally.
Definitions
The U.S. government used the term "personally identifiable" in 2007 in a memorandum from the Executive Office of the President, Office of Management and Budget (OMB), and |
https://en.wikipedia.org/wiki/Melissa%20Francis | Melissa Ann Francis (born December 12, 1972) is an American television news personality who most recently appeared as an anchor and commentator for the Fox Business Network (FBN) and Fox News (FNC). Previously, she worked as an actress.
Prior to FBN, she worked at CNBC. She had been the co-host of After The Bell weekday afternoons with Connell MacShane. She also was most recently an anchor on FNC's Happening Now newscast. She most recently had been a regular panelist on FNC's afternoon talk show Outnumbered. However, in late October 2020, it was reported that she had been pushed out of Fox. Although there was not a formal announcement to that effect, all signs point to her having departed Fox, likely not on her terms.
Education
Born and raised in Los Angeles, Francis graduated from Harvard University in 1995 with a Bachelor of Arts degree in economics.
Career
Acting
Francis started her acting career on television by appearing in a Johnson & Johnson shampoo commercial at 6 months old. She was known for her role as Cassandra Cooper Ingalls on Little House on the Prairie, for two seasons. Other television appearances include two series regular roles: Morningstar/Eveningstar and Joe’s World, and three films including Man, Woman and Child, where she played Paula Beckwith. She has also had appearances in the television series St. Elsewhere in 1986 and the 1988 film Bad Dreams, where she played young Cynthia. Melissa appeared in nearly 100 commercials during her acting career. She is reportedly the inspiration for the fictional character Avery Jessup (conceived of and played by Elizabeth Banks) in the show 30 Rock, although Banks herself has denied this.
Journalism
Francis has worked as a reporter for CNBC and CNET.
In January 2012, Francis became an anchor for Fox Business Network.
In 2014, Francis became a recurring co-host of Fox News Channel's talk and news commentary program, Outnumbered. She also anchored FNC's Happening Now newscast.
Departure from Fox
In late October 2020, it was reported that Francis had been pushed out at Fox. She had not been seen on the network since early in the month. Her contract had expired about a year earlier and had not been renewed.
The only communication on the issue from Francis herself came in a tweet, where she thanked her followers for their support. However, her profile on Twitter soon dropped any reference to Fox as well.
In late 2020, Francis filed a pay discrimination action against Fox. Francis claimed that Fox News underpaid her compared to her male colleagues, and she initiated legal claims against Fox. Fox and Francis reached a settlement in June 2022 whereby Fox paid Francis $15 million.
Writer
Francis authored a book in November 2012, Diary of a Stage Mother's Daughter: A Memoir, concerning the trials, tribulations and joys of having an overbearing mother; and in April 2017, published Lessons from the Prairie, relating childhood experiences from the show as applied to her adult life.
|
https://en.wikipedia.org/wiki/Macintosh%20Quadra%20700 | The Macintosh Quadra 700 was a personal computer designed, manufactured and sold by Apple Computer from October 1991 to March 1993. It was introduced alongside the Quadra 900 as the first computers in the Quadra series using Motorola 68040 processor, in order to compete with IBM compatible PCs powered by the Intel i486DX. The Quadra 700 is also the first computer from Apple to be housed in a mini-tower form factor, which in 1991 was becoming a popular alternative to standard desktop-on-monitor cases that were common through the 1980s.
The Quadra 700 was considerably more popular than the Quadra 900 (succeeded after six months by the very similar Quadra 950) that it was sold alongside, due to the 900/950 being expensive and bulky with its full tower case. The Quadra 700 originally had a list price of US$5,700, but had dropped to under $4,700 for a base model by the time its replacement, the Macintosh Quadra 800, went on sale in early 1993. The Centris 650, also introduced around the same time, offered similar performance to the Quadra 700 but in a desktop-style case with more expansion options while its entry-level configuration had a price point closer to $3,000.
Hardware
Form factor: The Quadra 700 case is largely the same as the popular Macintosh IIcx and Macintosh IIci models; this made it possible for users of those models to upgrade to the more powerful Quadra 700. Users sometimes placed the older case vertically in a mini-tower orientation and the Quadra 700 recognized this by having the Apple logo and model name printed in the vertical orientation. The IIcx and IIci were designed to allow their rubber feet to be moved to the side for vertical orientation as well.
CPU: Motorola 68040 @ 25 MHz. The clock oscillator runs at 50 MHz; replacing it with a faster oscillator (up to 74 MHz) results in a performance increase.
Memory: The Quadra 700 could be upgraded to 68 megabytes of RAM, which with its 25 MHz processor made it a very useful computer for scientific or design work.
Expansion: Two NuBus slots and a Processor Direct Slot; processor upgrades from Apple and other manufacturers were sold for the 700 when the PowerPC 601 accelerator cards came along in 1994.
Storage: 80 and 160 MB hard disks were available at launch. A faster 230 MB unit became available in mid-1992 when the Quadra 950 was introduced.
Video: Like the IIci, the 700 has integrated graphics built into the system board but, unlike the earlier model, it uses dedicated VRAM for its video memory. The onboard video came with 512 kilobytes of VRAM soldered to the motherboard, and supported resolutions up to 1152x870. The video memory was expandable to 2 megabytes via six 256-kilobyte 100ns VRAM SIMMs in each of the VRAM SIMM expansion slots on the motherboard. Expanding the video memory to 2 megabytes allowed for 24-bit (Millions) color at resolutions up to 832x624.
Sound: 8-bit stereo, 22 KHz.
Ports: I/O was available with dual serial ports, two ADB ports, an AAUI Et |
https://en.wikipedia.org/wiki/Password%20Safe | Password Safe is a free and open-source password manager program originally written for Microsoft Windows but supporting wide area of operating systems with compatible clients available for Linux, FreeBSD, Android, IOS, BlackBerry and other operating systems as well.
The Linux version is available for Ubuntu (including the Kubuntu and Xubuntu derivatives) and Debian. A Java-based version is also available on SourceForge. On its page, users can find links to unofficial releases running under Android, BlackBerry, and other mobile operating systems.
History
The program was initiated by Bruce Schneier at Counterpane Systems, and is now hosted on SourceForge (Windows) and GitHub (Linux) and developed by a group of volunteers.
Design
After filling in the master password the user has access to all account data entered and saved previously. The data can be organized by categories, searched, and sorted based on references which are easy for the user to remember.
There are various key combinations and mouse clicks to copy parts of the stored data (password, email, username etc.), or use the autofill feature (for filling forms).
The program can be set to minimize automatically after a period of idle time and clears the clipboard.
It is possible to compare and synchronize (merge) two different password databases. The program can be set up to generate automatic backups.
Password Safe does not support database sharing, but the single-file database can be shared by any external sharing method (for example Syncthing, Dropbox etc.). Database is not stored online.
Features
Note: All uncited information in this section is sourced from the official Help file included with the application
Password management
Stored passwords can be sectioned into groups and subgroups in a tree structure.
Changes to entries can be tracked, including a history of previous passwords, the creation time, modification time, last access time, and expiration time of each password stored. Text notes can be entered with the password details.
Import and export
The password list can be exported to various file formats including TXT, XML and previous versions of Password Safe. Password Safe also supports importing these files
Password Safe supports importing TXT and CSV files which were exported from KeePass version 1.x (V1). KeePass version 2.x (V2) allows databases to be exported as a KeePass V1 database, which in turn can be imported to Password Safe.
Password Safe cannot directly import an XML file exported by KeePass V1 or V2, as the fields are too different. However, the Help file provides instructions for processing an exported XML file with one of multiple XSLT files (included with Password Safe) which will produce a Password Safe compatible XML file that can then be imported.
File encryption
Password Safe can encrypt any file using a key derived from a passphrase provided by the user through the command-line interface.
Password generator
The software features a built-in |
https://en.wikipedia.org/wiki/Witchaven%20II%3A%20Blood%20Vengeance | Witchaven II: Blood Vengeance is a fantasy-themed first-person shooter for DOS compatible operating systems released in 1996 by Capstone Software. It is a sequel to 1995's Witchaven. Both games use the Build engine. It was Capstone's last proprietary game before they and their parent company Intracorp went bankrupt. In Witchaven II, the player controls the returning knight Grondoval, the hero of the first game, as he is trying to stop an evil witch from carrying a titular blood vengeance in revenge for him having slain her sister in the original game. It received generally negative reviews, with criticism directed at its controls, enemy AI, and general mediocrity as compared to other first-person shooters coming out at the time. The game is supported by the BuildGDX source port.
Gameplay
The sequel's gameplay system is very similar but features some other improvements over the first game, such as possibility to wield two weapons (one in each hand) and to hold a shield in the non-weapon hand. Compared with the previous game the level of difficulty was also increased and the graphics were partially refined. Unlike the first game in the series it came with the Build level editor which meant that the players were able to create their own levels. Unlike in the first game, most enemies are men instead of monsters.
Plot
Witchaven II takes place after the events of the first game, when the forces of darkness were triumphed over: the witch queen Illwhyrin was destroyed in her lair in the isle of Char and the evil curse was lifted. During the victory party celebrating the destruction of Witchaven, the hero of the game, Grondoval, falls into a slumber. After awaking, he is told by the mysterious female golden dragon named Ikethsti that the great witch Cirae-Argoth, one of the most powerful of Nether-Reaches Order of Witches, has arrived to avenge the death of her sister. An army of demons and Argothonian clansmen has abducted Grondoval's beloved princess Elizabeth and the other people of his homeland Stazhia to exact the titular blood vengeance and now it is only up to Grondoval to try and rescue his countrymen before they will all be gone forever. His new quest is fight his way to find and vanquish Cirae-Argoth, thwarting her plot, and to capture the Horned Skull item which would then contain her evil powers forever. The story is told in the intro sequence and further explained in the game's manual.
After killing Cirae-Argoth, the game ends with a cinematic sequence showing her corpse turn into a skeleton, which then suddenly rises and attempts to flee while laughing until it's hit and shattered by Grondoval's magic missile. Grondoval loses consciousness and awakens in a different location. The dragon Ikethsti arrives again to tell a cryptic message, saying the whole plot was really an elaborate set up as Cirae-Argoth was not her real master and Grondoval's kindred has never disappeared; it was actually only Grondoval who has vanished. (This scene dire |
https://en.wikipedia.org/wiki/Catastrophe%20modeling | Catastrophe modeling (also known as cat modeling) is the process of using computer-assisted calculations to estimate the losses that could be sustained due to a catastrophic event such as a hurricane or earthquake. Cat modeling is especially applicable to analyzing risks in the insurance industry and is at the confluence of actuarial science, engineering, meteorology, and seismology.
Catastrophes/ Perils
Natural catastrophes (sometimes referred to as "nat cat") that are modeled include:
Hurricane (main peril is wind damage; some models can also include storm surge and rainfall)
Earthquake (main peril is ground shaking; some models can also include tsunami, fire following earthquakes, liquefaction, landslide, and sprinkler leakage damage)
severe thunderstorm or severe convective storms (main sub-perils are tornado, straight-line winds and hail)
Flood
Extratropical cyclone (commonly referred to as European windstorm)
Wildfire
Winter storm
Human catastrophes include:
Terrorism events
Warfare
Casualty/liability events
Forced displacement crises
Cyber data breaches
Lines of business modeled
Cat modeling involves many lines of business, including:
Personal property
Commercial property
Workers' compensation
Automobile physical damage
Limited liabilities
Product liability
Business Interruption
Inputs, Outputs, and Use Cases
The input into a typical cat modeling software package is information on the exposures being analyzed that are vulnerable to catastrophe risk. The exposure data can be categorized into three basic groups:
Information on the site locations, referred to as geocoding data (street address, postal code, county/CRESTA zone, etc.)
Information on the physical characteristics of the exposures (construction, occupation/occupancy, year built, number of stories, number of employees, etc.)
Information on the financial terms of the insurance coverage (coverage value, limit, deductible, etc.)
The output of a cat model is an estimate of the losses that the model predicts would be associated with a particular event or set of events. When running a probabilistic model, the output is either a probabilistic loss distribution or a set of events that could be used to create a loss distribution; probable maximum losses ("PMLs") and average annual losses ("AALs") are calculated from the loss distribution. When running a deterministic model, losses caused by a specific event are calculated; for example, Hurricane Katrina or "a magnitude 8.0 earthquake in downtown San Francisco" could be analyzed against the portfolio of exposures.
Cat models have a variety of use cases for a number of industries, including:
Insurers and risk managers use cat modeling to assess the risk in a portfolio of exposures. This might help guide an insurer's underwriting strategy or help them decide how much reinsurance to purchase.
Some state departments of insurance allow insurers to use cat modeling in their rate filings to help determine how muc |
https://en.wikipedia.org/wiki/DTR | DTR may refer to:
Medicine
Deep tendon reflex
Technology
Data Terminal Ready, a control signal in RS-232 serial communications
Desktop replacement computer, portable, with desktop-like capabilities
Digital Tape Recorder in spacecraft of the Voyager program
Others
The Deuteronomist historian (Dtr)
Dietetic Technician, Registered
Dorian Thompson-Robinson (born 1999), American football player
Downtown Radio, Northern Ireland |
https://en.wikipedia.org/wiki/STDM | STDM may refer to:
Statistical time-division multiplexing
Sociedade de Turismo e Diversões de Macau
Spread-Transform Dither Modulation
Spatio-temporal Data Mining
Société de Transports Départementaux de la Marne
STEINMETZDEMEYER architectes urbanistes |
https://en.wikipedia.org/wiki/Hauppauge | Hauppauge ( ) can refer to:
Hauppauge, New York, a hamlet on Long Island in the United States
Hauppauge Computer Works, a computer component company located in Hauppauge, New York
Hauppauge MediaMVP, a network media player by Hauppauge Computer Works
Hauppauge Industrial Association, a business organization in Hauppauge, New York
Hauppauge Union Free School District in Hauppauge, New York
Hauppauge High School |
https://en.wikipedia.org/wiki/Multilevel%20feedback%20queue | In computer science, a multilevel feedback queue is a scheduling algorithm. Scheduling algorithms are designed to have some process running at all times to keep the central processing unit (CPU) busy. The multilevel feedback queue extends standard algorithms with the following design requirements:
Separate processes into multiple ready queues based on their need for the processor.
Give preference to processes with short CPU bursts.
Give preference to processes with high I/O bursts. (I/O bound processes will sleep in the wait queue to give other processes CPU time.)
The multilevel feedback queue was first developed by Fernando J. Corbató (1962). For this accomplishment, the Association for Computing Machinery awarded Corbató the Turing Award.
Process scheduling
Whereas the multilevel queue algorithm keeps processes permanently assigned to their initial queue assignments, the multilevel feedback queue shifts processes between queues. The shift is dependent upon the CPU bursts of prior time-slices.
If a process uses too much CPU time, it will be moved to a lower-priority queue.
If a process is I/O-bound or an interactive process, it will be moved to a higher-priority queue.
If a process is waiting too long in a low-priority queue and starving, it will be aged to a higher-priority queue.
Algorithm
Multiple FIFO queues are used and the operation is as follows:
A new process is inserted at the end (tail) of the top-level FIFO queue.
At some stage the process reaches the head of the queue and is assigned the CPU.
If the process is completed within the time-slice of the given queue, it leaves the system.
If the process voluntarily relinquishes control of the CPU, it leaves the queuing network, and when the process becomes ready again it is inserted at the tail of the same queue which it relinquished earlier.
If the process uses all the quantum time, it is pre-empted and inserted at the end of the next lower level queue. This next lower level queue will have a time quantum which is more than that of the previous higher level queue.
This scheme will continue until the process completes or it reaches the base level queue.
At the base level queue the processes circulate in round robin fashion until they complete and leave the system. Processes in the base level queue can also be scheduled on a first come first served basis.
Optionally, if a process blocks for I/O, it is 'promoted' one level, and placed at the end of the next-higher queue. This allows I/O bound processes to be favored by the scheduler and allows processes to 'escape' the base level queue.
For scheduling, the scheduler always starts picking up processes from the head of the highest level queue. Only if the highest level queue has become empty will the scheduler take up a process from the next lower level queue. The same policy is implemented for picking up in the subsequent lower level queues. Meanwhile, if a process comes into any of the higher level queues, it will preempt a proc |
https://en.wikipedia.org/wiki/BrickOS | brickOS is an open-source operating system created by Markus Noga as firmware to operate as an alternative software environment for the Lego Mindstorms Robotic Invention System [14]. brickOS is the first open-source software made for Lego Mindstorms robots. It is embedded with a C/C++-based and a Java-based environment for RCX program through utilizing g++ and jack toolchain. It uses a Hitachi H8 cross compiler assembler as its primary toolchain.
The operating system comprises demonstration programs implemented in C and C++ and an alternative operating system for the Lego Mindstorms. It provides users with utilities that allows them to download compiled programs and install the operating system for RCX.
Features
BrickOS was designed and developed using Linux as a replacement for the previous operating system for Lego Mindstorms, which is also known as LegOS. It is capable of being implemented on the Windows system and most Unices [6]. It allows for a more flexible and higher performances system that is much superior to LegOS [3]. The current version of the system's main features includes [3]:
BrickOS programs are executed natively instead of interpreted bytes code [12] like that of a standard firmware which in terms makes the program faster. BrickOS is flexible with controlling outputs [2], for instance, it can alter 255 value of motor speed. Another feature is that brickOS contains a LegOS Network Protocol (LNP) which allows for more than one driver to communicate. This protocol will broadcast message to any RCXs component within the receiving area. By adding layers to the command, the message can filter out the recipient to arrive at the addressed RCX.
BrickOS provides a development environment that allows users to freely implement the provided RCX drivers, such as sensors and motors, using C or C++ programming languages. It can be used alongside libre simulators LegoSim and Emmulegos, which provide graphical interfaces to create a virtual machine that eases the users in the debugging process.
The success of the system is built upon the community that constructed it. The system library and resources at any moment can be modified and updated freely with new functionalities and solutions from the programming community, separating the system from the limited tools provided by the manufacturer. With the help of the Internet, solutions are made accessible to everyone.
Application
Robotics
The implementation of robots has become a crucial asset in this current industrial world. In robotics, libre software (or open-source software) like brickOS is considered a traditional tool for developing robots [1]. The potential robotic application, in general, is vast. For instance, many enterprises have decided to bring robotics into use to replace human labor in factories for manufacturing products and managing storage. The essential of these applications has become a motivation for industries to invest in further research in robotics.
The practices |
https://en.wikipedia.org/wiki/Prototype%20Verification%20System | The Prototype Verification System (PVS) is a specification language integrated with support tools and an automated theorem prover, developed at the Computer Science Laboratory of SRI International in Menlo Park, California.
PVS is based on a kernel consisting of an extension of Church's theory of types with dependent types, and is fundamentally a classical typed higher-order logic. The base types include uninterpreted types that may be introduced by the user, and built-in types such as the booleans, integers, reals, and the ordinals. Type-constructors include functions, sets, tuples, records, enumerations, and abstract data types. Predicate subtypes and dependent types can be used to introduce constraints; these constrained types may incur proof obligations (called type-correctness conditions or TCCs) during typechecking. PVS specifications are organized into parameterized theories.
The system is implemented in Common Lisp, and is released under the GNU General Public License (GPL).
See also
Formal methods
List of proof assistants
References
Owre, Shankar, and Rushby, 1992. PVS: A Prototype Verification System. Published in the CADE 11 conference proceedings.
External links
PVS website at SRI International's Computer Science Laboratory
Summary of PVS by John Rushby at the Mechanized Reasoning database of Michael Kohlhase and Carolyn Talcott
Formal specification languages
Proof assistants
Dependently typed languages
Lisp (programming language)
Common Lisp (programming language) software
Free theorem provers
Free software programmed in Lisp
SRI International software |
https://en.wikipedia.org/wiki/Electrical%20resistivities%20of%20the%20elements%20%28data%20page%29 |
Electrical resistivity
References
WEL
As quoted at http://www.webelements.com/ from these sources:
G.W.C. Kaye and T. H. Laby in Tables of physical and chemical constants, Longman, London, UK, 15th edition, 1993.
A.M. James and M.P. Lord in Macmillan's Chemical and Physical Data, Macmillan, London, UK, 1992.
D.R. Lide, (ed.) in Chemical Rubber Company handbook of chemistry and physics, CRC Press, Boca Raton, Florida, USA, 79th edition, 1998.
J.A. Dean (ed) in Lange's Handbook of Chemistry, McGraw-Hill, New York, USA, 14th edition, 1992.
CRC
As quoted from various sources in an online version of:
David R. Lide (ed), CRC Handbook of Chemistry and Physics, 84th Edition. CRC Press. Boca Raton, Florida, 2003; Section 12, Properties of Solids; Electrical Resistivity of Pure Metals
CR2
As quoted in an online version of:
David R. Lide (ed), CRC Handbook of Chemistry and Physics, 84th Edition. CRC Press. Boca Raton, Florida, 2003; Section 4, Properties of the Elements and Inorganic Compounds; Physical Properties of the Rare Earth Metals
which further refers to:
Beaudry, B. J. and Gschneidner, K.A., Jr., in Handbook on the Physics and Chemistry of Rare Earths, Vol. 1, Gschneidner, K.A., Jr. and Eyring, L., Eds., North-Holland Physics, Amsterdam, 1978, 173.
McEwen, K.A., in Handbook on the Physics and Chemistry of Rare Earths, Vol. 1, Gschneidner, K.A., Jr. and Eyring, L., Eds., North-Holland Physics, Amsterdam, 1978, 411.
LNG
As quoted from:
J.A. Dean (ed), Lange's Handbook of Chemistry (15th Edition), McGraw-Hill, 1999; Section 4, Table 4.1 Electronic Configuration and Properties of the Elements
See also
Chemical properties
Chemical element data pages
Elements |
https://en.wikipedia.org/wiki/Heroes%20of%20Might%20and%20Magic%20III%3A%20Armageddon%27s%20Blade | Heroes of Might and Magic III: Armageddon's Blade is the first of two expansion packs for the turn-based strategy game Heroes of Might and Magic III. It was developed by New World Computing for Microsoft Windows and released by The 3DO Company in 1999.
Gameplay
The most significant change in Armageddon's Blade is the addition of the Conflux, bringing the total number of alignments in Heroes of Might and Magic III to nine. The town is themed around classical elements, and includes other creatures to round out the selection. Six new campaigns were included, one acting as a continuation of the base game's storyline, with the other five revolving around adventures taking place in the same fictional world. Over 35 single scenarios were also added.
Returning as non-aligned units, several creature types from previous Heroes games make an appearance. These include Peasants, Boars, and Halflings. The expansion also introduced some new non-aligned creature types, such as the powerful Azure Dragon. Eleven new campaign heroes and two new artifacts – Armageddon's Blade and the Vial of Dragonblood – were introduced as well. Several new map objects, including special quest towers that only allow passage if the hero meets certain criteria defined by the author of the map, also appear here for the first time.
A random map generator included with the expansion allows players to create random maps using a variety of customizable parameters. Finally, a standalone campaign editor packaged with the game allows for the composition of new campaigns from individual scenario maps.
Plot
Only one of the six new campaigns available in Armageddon's Blade directly concerns the main storyline. The events of Armageddon's Blade immediately follow the events of Might and Magic VII: For Blood and Honor. As the kingdom of Erathia struggles to rebuild following the Restoration Wars, the Kreegans of Eeofol launch a surprise invasion. Already war-weary, the forces of Queen Catherine are no match for the formidable Kreegan army.
Following the death of the Kreegans' king, Xenofex, a usurper named Lucifer Kreegan takes control of Eeofol and, driven by a vision, begins to seek a means to fashion an ancient weapon known as Armageddon's Blade, capable of setting the world on fire. His general Xeron is tasked with locating the components for the Blade. To stop him, the armies of Erathia and AvLee launch an attack on Eeofol, receiving assistance from the very elements as they manifest in Conflux towns. Queen Catherine and the recently liberated King Roland are assisted by the mysterious elven warrior Gelu in the ensuing war. Xeron obtains the Blade, but is defeated by Gelu on his return to Eeofol. Gelu claims the Blade, and, at the behest of Queen Catherine, uses it to slay Lucifer Kreegan. Following this event, the Ironfists return to Enroth and the Blade is passed on to Gelu. The story is continued in Heroes Chronicles: The Sword of Frost, eventually leading to a cataclysm that sets th |
https://en.wikipedia.org/wiki/IEC%2060870 | In electrical engineering and power system automation, the International Electrotechnical Commission 60870 standards define systems used for telecontrol (supervisory control and data acquisition). Such systems are used for controlling electric power transmission grids and other geographically widespread control systems. By use of standardized protocols, equipment from many different suppliers can be made to interoperate. IEC standard 60870 has six parts, defining general information related to the standard, operating conditions, electrical interfaces, performance requirements, and data transmission protocols. The 60870 standards are developed by IEC Technical Committee 57 (Working Group 03).
List of IEC 60870 parts
IEC TR 60870-1-1:1988 General considerations. Section One: General principles
IEC 60870-1-2:1989 General considerations. Section Two: Guide for specifications
IEC TR 60870-1-3:1997 General considerations - Section 3: Glossary
IEC TR 60870-1-4:1994 General considerations - Section 4: Basic aspects of telecontrol data transmission and organization of standards IEC 870-5 and IEC 870-6
IEC TR 60870-1-5:2000 General considerations - Section 5: Influence of modem transmission procedures with scramblers on the data integrity of transmission systems using the protocol IEC 60870-5
IEC 60870-2-1:1995 Operating conditions - Section 1: Power supply and electromagnetic compatibility
IEC 60870-2-2:1996 Operating conditions - Section 2: Environmental conditions (climatic, mechanical and other non electrical influences)
IEC 60870-3:1989 Interfaces (electrical characteristics)
IEC 60870-4:1990 Performance requirements
IEC 60870-5
IEC 60870 part 5, known as Transmission protocols, provides a communication profile for sending basic telecontrol messages between two systems, which uses permanent directly connected data circuits between the systems. The IEC TC 57 WG3 have developed a protocol standard for telecontrol, teleprotection, and associated telecommunications for electric power systems. The result of this work is IEC 60870-5. Five documents specify the base IEC 60870-5:
IEC 60870-5-1 Transmission Frame Formats
IEC 60870-5-2 Data Link Transmission Services
IEC 60870-5-3 General Structure of Application Data
IEC 60870-5-4 Definition and Coding of Information Elements
IEC 60870-5-5 Basic Application Functions
IEC 60870-5-6 Guidelines for conformance testing for the IEC 60870-5 companion standards
IEC TS 60870-5-7 Security extensions to IEC 60870-5-101 and IEC 60870-5-104 protocols (applying IEC 62351)
The IEC TC 57 has also generated companion standards:
IEC 60870-5-101 Transmission Protocols - companion standards especially for basic telecontrol tasks
IEC 60870-5-102 Transmission Protocols - Companion standard for the transmission of integrated totals in electric power systems (this standard is not widely used)
IEC 60870-5-103 Transmission Protocols - Companion standard for the informative interface of protection equipment
IEC 60870-5 |
https://en.wikipedia.org/wiki/File%20attribute | File attributes are a type of meta-data that describe and may modify how files and/or directories in a filesystem behave. Typical file attributes may, for example, indicate or specify whether a file is visible, modifiable, compressed, or encrypted. The availability of most file attributes depends on support by the underlying filesystem (such as FAT, NTFS, ext4)
where attribute data must be stored along with other control structures. Each attribute can have one of two states: set and cleared. Attributes are considered distinct from other metadata, such as dates and times, filename extensions or file system permissions. In addition to files, folders, volumes and other file system objects may have attributes.
DOS and Windows
Traditionally, in DOS and Microsoft Windows, files and folders accepted four attributes:
Archive (A): When set, it indicates that the hosting file has changed since the last backup operation. Windows' file system sets this attribute on any file that has changed. Backup software then has the duty of clearing it upon a successful full or incremental backup (not a differential one).
Hidden (H): When set, indicates that the hosting file is hidden. MS-DOS commands like dir and Windows apps like File Explorer do not show hidden files by default, unless asked to do so.
System (S): When set, indicates that the hosting file is a critical system file that is necessary for the computer to operate properly. MS-DOS and Microsoft Windows use it to mark important system files. MS-DOS commands like dir and Windows apps like File Explorer do not show system files by default even when hidden files are shown, unless asked to do so.
Read-only (R): When set, indicates that a file should not be altered. Upon opening the file, file system API usually does not grant write permission to the requesting application, unless the application explicitly requests it. Read-only attributes on folders are usually ignored, being used for another purpose.
As new versions of Windows came out, Microsoft has added to the inventory of available attributes on the NTFS file system, including but not limited to:
Compressed (C): When set, Windows compresses the hosting file upon storage. For more information, see .
Encrypted (E): When set, Windows encrypts the hosting file upon storage to prevent unauthorized access. For more information, see .
Not Content-Indexed (I): When set, Indexing Service or Windows Search do not include the hosting file in their indexing operation.
Other attributes that are displayed in the "Attributes" column of Windows Explorer include:
Directory (D): The entry is a subdirectory, containing file and directory entries of its own.
Reparse Point (L): The file or directory has an associated re-parse point, or is a symbolic link.
Offline (O): The file data is physically moved to offline storage (Remote Storage).
Sparse (P): The file is a sparse file, i.e., its contents are partially empty and non-contiguous.
Temporary (T): The file i |
https://en.wikipedia.org/wiki/AstroGrid | AstroGrid was a £7.7M project which built a data-grid for UK astronomy, forming part of the UK contribution to the International Virtual Observatory. AstroGrid announced its first full production release on 1 April 2008.
The project ran, in three phases, from 2001 to 2009. Accounts of its end-days suggest that many in the community regretted its early closing.
References
External links
http://www.astrogrid.org
http://www.stfc.ac.uk/
Astronomy in the United Kingdom
College and university associations and consortia in the United Kingdom
Grid computing projects
Information technology organisations based in the United Kingdom
Science and Technology Facilities Council
University of Edinburgh
Virtual observatories |
https://en.wikipedia.org/wiki/WKRC-TV | WKRC-TV (channel 12) is a television station in Cincinnati, Ohio, United States, affiliated with CBS and The CW. It is owned by Sinclair Broadcast Group, which provides certain services to MyNetworkTV affiliate WSTR-TV (channel 64) under a local marketing agreement (LMA) with Deerfield Media. Both stations share studios on Highland Avenue in the Mount Auburn section of Cincinnati, where WKRC-TV's transmitter is also located.
History
Early history
WKRC-TV first signed on the air on April 4, 1949, originally operating as a CBS affiliate on VHF channel 11; it is Cincinnati's second-oldest television station, but the first to receive an FCC license. The station was owned by the Ohio-based Taft family, who were active in both politics and media. The Tafts published The Cincinnati Times-Star, and also owned WKRC radio (550 AM and 101.9 FM, now WKRQ) under their broadcasting subsidiary, Radio Cincinnati. In 1958, the Tafts sold the Times-Star to the locally based rival E. W. Scripps Company, owner of The Cincinnati Post and WCPO-AM-FM-TV. The Tafts' broadcasting interests were then reorganized as Taft Broadcasting, with WKRC-AM-FM-TV as the flagship stations. The WKRC stations' call letters were derived from the original owner of WKRC radio, Clarence Ogden of the Kodel Radio Company ("Ko" for Clarence O. and "del" for Della his wife). Following the release of the Federal Communications Commission (FCC)'s Sixth Report and Order, WKRC-TV moved to channel 12 on October 12, 1952.
Tri-State Network
In 1953, three television stations owned by Taft Broadcasting Company and Cox Enterprises formed the short-lived "Tri-State Network" to compete with entertainment programming produced by Crosley Broadcasting Corporation on Crosley television stations in the Cincinnati, Columbus and Dayton broadcast markets. On January 11, 1954, The Wendy Barrie Show premiered from the studios of WHIO-TV in Dayton, simulcast on Taft Broadcasting's WKRC-TV in Cincinnati and WTVN (now WSYX) in Columbus. Barrie's contract was terminated in October 1954, and she was replaced by her co-host of nine months, Don Williams.
As an ABC affiliate
In 1961, the station became an ABC affiliate, switching networks with WCPO-TV. This came after that network's founder Leonard Goldenson persuaded Taft president Hulbert Taft Jr., a longtime friend, to switch several of the company's stations to ABC. During the late 1950s, the station was also briefly affiliated with the NTA Film Network. WKRC's nickname in the 1960s was "Tall 12", a reference to the station's transmitter tower which was the tallest in Cincinnati at the time. Like WCPO-TV, channel 12 used a distinctive jingle ID at the top of the hour in the 1960s. The upbeat, orchestrated "Channel 12" jingle was followed by children's show host Glenn Ryle announcing: "This is WKRC-TV Cincinnati". Also, during its tenure with ABC, WKRC (through ABC) aired a number of animated shows produced by Hanna-Barbera, which Taft purchased in 1967. In 1975, |
https://en.wikipedia.org/wiki/Snake-in-the-box | The snake-in-the-box problem in graph theory and computer science deals with finding a certain kind of path along the edges of a hypercube. This path starts at one corner and travels along the edges to as many corners as it can reach. After it gets to a new corner, the previous corner and all of its neighbors must be marked as unusable. The path should never travel to a corner which has been marked unusable.
In other words, a snake is a connected open path in the hypercube where each node connected with path, with the exception of the head (start) and the tail (finish), it has exactly two neighbors that are also in the snake. The head and the tail each have only one neighbor in the snake. The rule for generating a snake is that a node in the hypercube may be visited if it is connected to the current node and it is not a neighbor of any previously visited node in the snake, other than the current node.
In graph theory terminology, this is called finding the longest possible induced path in a hypercube; it can be viewed as a special case of the induced subgraph isomorphism problem. There is a similar problem of finding long induced cycles in hypercubes, called the coil-in-the-box problem.
The snake-in-the-box problem was first described by , motivated by the theory of error-correcting codes. The vertices of a solution to the snake or coil in the box problems can be used as a Gray code that can detect single-bit errors. Such codes have applications in electrical engineering, coding theory, and computer network topologies. In these applications, it is important to devise as long a code as is possible for a given dimension of hypercube. The longer the code, the more effective are its capabilities.
Finding the longest snake or coil becomes notoriously difficult as the dimension number increases and the search space suffers a serious combinatorial explosion. Some techniques for determining the upper and lower bounds for the snake-in-the-box problem include proofs using discrete mathematics and graph theory, exhaustive search of the search space, and heuristic search utilizing evolutionary techniques.
Known lengths and bounds
The maximum length for the snake-in-the-box problem is known for dimensions one through eight; it is
1, 2, 4, 7, 13, 26, 50, 98 .
Beyond that length, the exact length of the longest snake is not known; the best lengths found so far for dimensions nine through thirteen are
190, 370, 712, 1373, 2687.
For cycles (the coil-in-the-box problem), a cycle cannot exist in a hypercube of dimension less than two. The maximum lengths of the longest possible cycles are
0, 4, 6, 8, 14, 26, 48, 96 .
Beyond that length, the exact length of the longest cycle is not known; the best lengths found so far for dimensions nine through thirteen are
188, 366, 692, 1344, 2594.
Doubled coils are a special case: cycles whose second half repeats the structure of their first half, also known as symmetric coils. For dimensions two through seven the leng |
https://en.wikipedia.org/wiki/Epson%20QX-10 | The Epson QX-10 is a microcomputer running CP/M or TPM-III (CP/M-80 compatible) which was introduced in 1983. It was based on a Zilog Z80 microprocessor, running at 4 MHz, provided up to 256 KB of RAM organized in four switchable banks, and included a separate graphics processor chip (µPD7220) manufactured by NEC to provide advanced graphics capabilities. In the USA and Canada, two versions were launched; a basic CP/M configuration with 64 KB RAM and the HASCI configuration with 256 KB RAM and the special HASCI keyboard to be used with the bundled application suite, called Valdocs. TPM-III was used for Valdocs and some copy protected programs like Logo Professor. The European and Japanese versions were CP/M configurations with 256 KB RAM and a graphical Basic interpreter.
The machine had internal extension slots, which could be used for extra serial ports, network cards or third party extensions like an Intel 8088 processor, adding MS-DOS compatibility.
Rising Star Industries was the primary American software vendor for the HASCI QX series. Their product line included the TPM-II and III operating system, Valdocs, a robust BASIC language implementation, a graphics API library used by a variety of products which initially supported line drawing and fill functions and was later extended to support the QX-16 color boards, Z80 assembler, and low level Zapple machine code monitor which could be invoked from DIP switch setting on the rear of the machine.
QX-11
The "Abacus" is a IBM PC compatible machine released in 1985 booting MS-DOS 2.11 from 64 KB ROM. It has a Intel 8086-2 CPU at 8 MHz, 128 to 512 KB of RAM and two 3½" floppy drives (360 KB format). The sound chip has 3 sound tones plus one noise channel with 16 independent volume levels, graphics are 640x400 and the joystick ports are Atari-2600 compatible. There was also support for custom ROM cartridges.
QX-16
Its successor, the dual-processor QX-16, added a 16-bit Intel processor with Color Graphics Adapter enabling it to also boot MS-DOS 2.11. The case of the QX-16 was enlarged to provide enough physical space for an internal hard-drive in contrast to the QX-10's dual-floppy configuration.
Valdocs
VALuable DOCumentS by Rising Star Industries is a pseudo-GUI WYSIWYG integrated software/OS for document creation and management, written as a set of interactive application and system modules which ran only on Epson's QX-10 and QX-16 computers. A version designed to run on the IBM PC was in development when Rising Star closed in 1986.
Valdocs shipped to beta testers c. late 1982. Beta and initial production releases of Valdocs' application modules were written in the Forth programming language while its system-oriented modules (such as E-Mail and disk utilities) were written in Z-80 Assembly Language. Later releases of Valdocs' applications were written in the C programming language with some modules written in compiled RSI Basic.
The initial release of Valdocs included WYSIWYG word proce |
https://en.wikipedia.org/wiki/OPC%20Data%20Access | The OPC Data Access Specification is the first of a group of specifications known as the OPC Classic Specifications.
OPC Data Access is a group of client–server standards that provides specifications for communicating real-time data from data acquisition devices such as PLCs to display and interface devices like Human–Machine Interfaces (HMI), SCADA systems and also ERP/MES systems. The specifications focus on the continuous communication of data.
The OPC Data Access specification is also known as OPC DA. OPC DA deals only with real-time data and not historical data (for historical data you need to use OPC Historical Data Access, or OPC HDA) or events (for Alarms and Events you need to use OPC Alarms and Events, or OPC AE). There are three attributes associated with OPC DA data. These are
a value,
the quality of the value, and
a timestamp.
The OPC DA specification states that these three attributes have to be returned to an OPC client making a request. Therefore, if the data source is not capable of providing a timestamp, for example, the OPC DA server must create a timestamp.
The OPC Classic specifications are based on the Microsoft COM technology and define a C/C++ interface. A standard Automation wrapper interface is also defined for access from Visual Basic, Delphi and other automation-enabled languages. Several vendors offer .NET toolkits to make the OPC interface accessible in .NET applications.
The newer OPC .NET (OPC Xi) specification is based on WCF (Windows Communication Foundation) and defines a .NET interface with the functionality of the OPC Classic specifications OPC DA, OPC HDA and OPC AE (Alarms&Events).
The more recent OPC Unified Architecture allows the same functionality but offers platform independence and optionally complex information modelling capabilities.
See also
OPC Foundation
Distributed Component Object Model
OPC Unified Architecture
References
External links
OPC Programmers' Connection
Industrial automation |
https://en.wikipedia.org/wiki/Myron%20W.%20Krueger | Myron Krueger (born 1942 in Gary, Indiana) is an American computer artist who developed early interactive works. He is also considered to be one of the first generation virtual reality and augmented reality researchers.
While earning a Ph.D. in Computer Science at the University of Wisconsin–Madison, Krueger worked on a number of early interactive computer artworks. In 1969, he collaborated with Dan Sandin, Jerry Erdman and Richard Venezky on a computer-controlled environment called "glowflow," a computer-controlled light sound environment that responded to the people within it. Krueger went on to develop Metaplay, an integration of visuals, sounds, and responsive techniques into a single framework. In this, the computer was used to create a unique real-time relationship between the participants in the gallery and the artist in another building. In 1971, his "Psychic space" used a sensory floor to perceive the participants' movements around the environment. A later project, "Videoplace," was funded by the National Endowment for the arts and a two-way exhibit was shown at the Milwaukee Art Museum in 1975.
From 1974 to 1978 M. Krueger performed computer graphics research at the Space Science and Engineering Center of the University of Wisconsin–Madison in exchange for institutional support for his "Videoplace" work. In 1978, joined the computer science faculty at the University of Connecticut, where he taught courses in hardware, software, computer graphics and artificial intelligence.
"Videoplace" has been exhibited widely in both art and science contexts in the United States and Canada, and it was also shown in Japan. It was included in the SIGGRAPH Art Show in 1985 and 1990. "Videoplace" was also the featured exhibit at SIGCHI (Computer-Human Interaction Conference) in 1985 and 1989, and at the 1990 Ars Electronica Festival. Instead of taking the virtual reality track of head-mounted display and data glove (which would come later in the 1980s), he investigated projections onto walls.
Krueger later used the hardware from Videoplace for another piece, Small Planet. In this work, participants are able to fly over a small, computer-generated, 3D planet. Flying is done by holding one's arms out, like a child pretending to fly, and leaning left or right and moving up or down. Small Planet was shown at SIGGRAPH '93, Interaction '97 (Ogaki, Japan), Mediartech '98 (Florence, Italy).
He envisioned the art of interactivity, as opposed to art that happens to be interactive. That is, the idea that exploring the space of interactions between humans and computers was interesting. The focus was on the possibilities of interaction itself, rather than on an art project, which happens to have some response to the user. Though his work was somewhat unheralded in mainstream VR thinking for many years as it moved down a path that culminated in the "goggles 'n gloves" archetype, his legacy has experienced greater interest as more recent technological app |
https://en.wikipedia.org/wiki/Vedea%20%28disambiguation%29 | Vedea can refer to:
Vedea, a river of Romania
Vedea, Teleorman, a commune in Romania
Vedea, Giurgiu, a commune in Romania
Vedea (programming language), a visualization programming language from Microsoft |
https://en.wikipedia.org/wiki/Safe%20mode | Safe mode is a diagnostic mode of a computer operating system (OS). It can also refer to a mode of operation by application software. Safe mode is intended to help fix most, if not all, problems within an operating system. It is also widely used for removing rogue security software.
Background
Microsoft Windows, macOS, Android and Linux distributions such as Ubuntu and Linux Mint are examples of contemporary operating systems that implement a safe mode (called "Safe Boot" in macOS) as well as other complex electronic devices.
In safe mode, an operating system has reduced functionality, but the task of isolating problems is easier since many non-core components are disabled, such as sound. An installation that will only boot into safe mode typically has a major problem, such as disk corruption or the installation of poorly-configured software that prevents the operating system from successfully booting into its normal operating mode.
Though it varies by operating system, safe mode typically loads only essential executable modules and disables devices except for those necessary to display information and accept input. It can also take the form of a parallel "miniature" operating system that has no configuration information shared with the normal operating system. For example, on Microsoft Windows, the user can also choose to boot to the Recovery Console, a small text-based troubleshooting mode kept separate from the main operating system (which can also be accessed by booting the install CD) or to various "safe mode" options that run the dysfunctional OS but with features, such as video drivers, audio, and networking, disabled.
Safe mode typically provides access to utility and diagnostic programs so a user can troubleshoot what is preventing the operating system from working normally. Safe mode is intended for maintenance, not functionality, and it provides minimal access to features.
Operating systems
Windows
Microsoft Windows' safe mode (for 7/Vista /XP /2000/ME/98/95) is accessed by pressing the F8 key as the operating system boots. Also, in a multi-boot environment with multiple versions of Windows installed side by side, the F8 key can be pressed at the OS selector prompt to get to safe mode. However, under Windows 8 (released in 2012), the traditional press-F8-for-safe-mode-options UI convention no longer works, and either Shift-F8 or a special GUI-based workaround is necessary.
Unix
An equivalently minimal setting in Unix-like operating systems is single-user mode, in which daemons and the X Window System are not started, and only the root user can log in. It can do emergency repairs or maintenance, including resetting users' passwords on the machine without the need to know the old one.
macOS
In macOS holding the shift key after powering up activates Safe Boot that has background maintenance features (Besides the mode selection, it runs a file system repair, and in Mac OS 10.4, it disables all fonts other than those in /Sys |
https://en.wikipedia.org/wiki/Windows%20USER | Windows USER is a component of the Microsoft Windows operating system that provides core functionality for building simple user interfaces. The component has existed in all versions of Windows, and includes functionality for window management, message passing, input processing and standard controls.
Functionality and role
Windows USER provides a large part of the core user experience for Microsoft Windows. Historically, it was responsible for:
Causing windows to be drawn (using GDI as a device-independent API for drawing primitives)
Obscuring overlapping windows behind others
Window size and positioning
Providing all the standard window management controls (such as close boxes or title bars)
Providing the standard Windows menu bar
Providing of standard controls (such as button, List box or Edit Box)
Providing dialog box management (short-cut keys, tab key processing)
Processing all user input from the mouse and keyboard
The desktop background image (until Windows 8)
Drawing all standard visual elements
Inter-process communication using Dynamic Data Exchange
Mouse pointer cursor display and management
Data transfer (Clipboard)
Gradually, as Windows has become larger and better factored, Windows USER has cooperated with other components to provide this functionality:
Controls: Starting with Windows 95, new controls were placed into a separate common controls component. Starting with Windows XP, new implementations of the standard controls were also moved to that same component.
Standard Visuals: Starting with Windows XP, visual elements are drawn by the Theming component.
Windows Management experience: Starting with Windows Vista, drawing standard window management was moved from Windows USER to the Desktop Window Manager when the Aero theme is enabled. Starting with Windows 8, window frames are always drawn by DWM, except in the Windows Preinstallation Environment.
Inter-program communication: Starting with Windows 3.1, Object Linking and Embedding replaced Dynamic Data Exchange as the recommended model for inter program communication.
Menu bar: Starting in Windows 7, the Ribbon interface is a recommended replacement for the menu bar and context menus. It is provided by the UIRibbon component.
Desktop wallpaper: Starting in Windows 8, drawing of the desktop wallpaper was moved to Windows Explorer, except in the Windows Preinstallation Environment, where the desktop wallpaper is drawn by the WallpaperHost.exe application. Wherever USER would have drawn the desktop background before, a solid screen of the user's accent color is drawn instead.
Mouse pointer: Starting in Windows Vista when DWM is enabled, drawing of the mouse pointer is managed by it. However, starting in Windows 11, it will no longer display with DWM disabled, unless the file %SystemRoot%\System32\DWMInit.dll does not exist.
Developer experience
Windows USER implements abstractions that are used to build Windows applications. These include
HWND (Handle to |
https://en.wikipedia.org/wiki/Font%20Book | Font Book is a font manager by Apple Inc. for its macOS operating system. It was first released with Mac OS X Panther in 2003.
Features
It is opened by default whenever the user clicks on a new .otf or .ttf font file. The user can view the font and install it, at which point the font will be copied to a centralised folder of user-installed fonts and be available for all apps to use.
It may also be used as a browser of all installed fonts. The user may view the list of fonts and see their alphabets, their complete repertoire of characters or how they set a sample text of the user's choice.
The program also allows users to:
Group fonts into collections, which can then be used in all Cocoa programs.
View details of fonts, such as their designer’s name.
Activate/deactivate individual fonts or collections.
Check the data integrity of font files.
Export font collections for use on another computer
It does not feature any editing tools, even for changing font properties. This means that the user cannot use it to rename, merge or split up fonts or to redesign or modify fonts by (for example) changing kerning rules or exporting small capitals into a separate style.
In the 2003–2007 period, Apple's Font Book faced some criticism regarding an inability to validate and auto-activate fonts. These features were added to Font Book with the release of Mac OS X Leopard.
References
External links
Apple's Font Book user guide
Font Book 101 from Apple
MacOS
MacOS-only software made by Apple Inc.
Font managers
Products introduced in 2003 |
https://en.wikipedia.org/wiki/HITS%20algorithm | Hyperlink-Induced Topic Search (HITS; also known as hubs and authorities) is a link analysis algorithm that rates Web pages, developed by Jon Kleinberg. The idea behind Hubs and Authorities stemmed from a particular insight into the creation of web pages when the Internet was originally forming; that is, certain web pages, known as hubs, served as large directories that were not actually authoritative in the information that they held, but were used as compilations of a broad catalog of information that led users direct to other authoritative pages. In other words, a good hub represents a page that pointed to many other pages, while a good authority represents a page that is linked by many different hubs.
The scheme therefore assigns two scores for each page: its authority, which estimates the value of the content of the page, and its hub value, which estimates the value of its links to other pages.
History
In journals
Many methods have been used to rank the importance of scientific journals. One such method is Garfield's impact factor. Journals such as Science and Nature are filled with numerous citations, making these magazines have very high impact factors. Thus, when comparing two more obscure journals which have received roughly the same number of citations but one of these journals has received many citations from Science and Nature, this journal needs be ranked higher. In other words, it is better to receive citations from an important journal than from an unimportant one.
On the Web
This phenomenon also occurs in the Internet. Counting the number of links to a page can give us a general estimate of its prominence on the Web, but a page with very few incoming links may also be prominent, if two of these links come from the home pages of sites like Yahoo!, Google, or MSN. Because these sites are of very high importance but are also search engines, a page can be ranked much higher than its actual relevance.
Algorithm
Steps
In the HITS algorithm, the first step is to retrieve the most relevant pages to the search query. This set is called the root set and can be obtained by taking the top pages returned by a text-based search algorithm. A base set is generated by augmenting the root set with all the web pages that are linked from it and some of the pages that link to it. The web pages in the base set and all hyperlinks among those pages form a focused subgraph. The HITS computation is performed only on this focused subgraph. According to Kleinberg the reason for constructing a base set is to ensure that most (or many) of the strongest authorities are included.
Authority and hub values are defined in terms of one another in a mutual recursion. An authority value is computed as the sum of the scaled hub values that point to that page. A hub value is the sum of the scaled authority values of the pages it points to. Some implementations also consider the relevance of the linked pages.
The algorithm performs a series of iterations, eac |
https://en.wikipedia.org/wiki/Mars%20Rising | Mars Rising is a vertically scrolling shooter written by David Wareing and released as shareware by Ambrosia Software for Macintosh computers in 1998. Reviewers called out similarities to Xevious and Raiden. It was followed by Deimos Rising in 2001.
Reception
Legacy
The 2001 sequel, Deimos Rising, adds 16-bit color, alpha transparency, motion blur, improved artwork and a wider range of enemies and weapons. It was ported to Microsoft Windows.
References
External links
1998 video games
Ambrosia Software games
Classic Mac OS games
Classic Mac OS-only games
Vertically scrolling shooters
Video games developed in the United States
Video games set on Mars |
https://en.wikipedia.org/wiki/Auroran | Auroran may refer to:
a person who lives in or comes from one of the many geographical locations throughout the world named Aurora
a fictional empire in the Escape Velocity Nova computer game
a type of daedra in The Elder Scrolls computer game series. |
https://en.wikipedia.org/wiki/Kaena%3A%20The%20Prophecy | Kaena: The Prophecy (French: Kaena: La prophétie) is a 2003 adult computer-animated fantasy adventure film produced by Xilam.
Chris Delaporte started work on the film in 1995 after leaving at Éric Chahi's company Amazing Studio halfway through development of the Studio's only game Heart of Darkness. Originally intended as a video game, the project spun off into a film. There was, however, a tie-in video game produced.
Kaena was released theatrically in France by BAC Films on June 4, 2003, and was later dubbed into English, with Destination Films handling US distribution. The English dub features the voices of Kirsten Dunst, Richard Harris (in his last role before his death), Anjelica Huston, Keith David and Ciara Janson. The film received generally negative reviews from critics, who criticized its story, although its animation was praised.
Plot
The film begins with an alien ship crash landing on a desert planet. The alien survivors, known as Vecarians, are quickly killed by the planet's predatory native inhabitants, the Selenites. The ship's core, Vecanoi, survives, and from it sprouts Axis, a massive tree reaching up into space.
600 years later, a race of human-like tree-dwellers have evolved living in the branches of Axis. One of them, a teenager named Kaena (voiced by Kirsten Dunst), is an adventurous daydreamer who longs to explore the world beyond the confines of her village. Kaena's inquisitiveness is opposed as heresy by the village elder, who commands his people to stay productive and toil for the villager's gods (who are, unbeknownst to them, the Selenites living in the planet below).
Led by prophetic dreams of a world with a blue sun and plentiful water, Kaena eventually defies the elder and climbs to the top of Axis. There, she encounters the ancient alien Opaz (voiced by Richard Harris), the last survivor of the Vecarian race that crash landed on the planet centuries ago. Opaz has used his technology to evolve a race of intelligent worms to serve him and help him escape the planet. Upon learning of Kaena's dreams, Opaz enlists her help in retrieving Vecanoi, which contains the collective memory of his people.
However, Vecanoi rests at the base of Axis, where the Selenites dwell. The Queen of the Selenites (voiced by Anjelica Huston) blames Vecanoi for the destruction of their planet, and has spent most of her life (and sacrificed the future of her people) attempting to destroy it.
Cast
French cast
Cécile de France as Kaena
Michael Lonsdale as Opaz
Victoria Abril as La reine
Jean Piat as Le prêtre
English cast
Kirsten Dunst as Kaena
Richard Harris as Opaz
Anjelica Huston as Queen of the Selenites
Keith David as Voxem
Michael McShane as Assad
Greg Proops as Gommy
Tom Kenny as Zehos
Tara Strong as Essy
Dwight Schultz as Ilpo
John DiMaggio as Enode
Ciara Janson as Kamou, Roya
Jennifer Darling as Reya
Cornell John as Demok
Gary Martin as The Priest
William Attenborough as Sambo
Production
The project started as |
https://en.wikipedia.org/wiki/Virtual%20Private%20LAN%20Service | Virtual Private LAN Service (VPLS) is a way to provide Ethernet-based multipoint to multipoint communication over IP or MPLS networks. It allows geographically dispersed sites to share an Ethernet broadcast domain by connecting sites through pseudowires. The term sites includes multiplicities of both servers and clients. The technologies that can be used as pseudo-wire can be Ethernet over MPLS, L2TPv3 or even GRE. There are two IETF standards-track RFCs (RFC 4761 and RFC 4762) describing VPLS establishment.
VPLS is a virtual private network (VPN) technology. In contrast to L2TPv3, which allows only point-to-point layer 2 tunnels, VPLS allows any-to-any (multipoint) connectivity.
In a VPLS, the local area network (LAN) at each site is extended to the edge of the provider network. The provider network then emulates a switch or bridge to connect all of the customer LANs to create a single bridged LAN.
VPLS is designed for applications that require multipoint or broadcast access.
Mesh establishment
Since VPLS emulates a LAN, full mesh connectivity is required. There are two methods for full mesh establishment for VPLS: using Border Gateway Protocol (BGP) and using Label Distribution Protocol (LDP). The "control plane" is the means by which provider edge (PE) routers communicate for auto-discovery and signalling. Auto-discovery refers to the process of finding other PE routers participating in the same VPN or VPLS. Signalling is the process of establishing pseudowires (PW). The PWs constitute the "data plane", whereby PEs send customer VPN/VPLS traffic to other PEs.
BGP provides both auto-discovery and signalling. The mechanisms used are very similar to those used in establishing Layer-3 MPLS VPNs. Each PE is configured to participate in a given VPLS. The PE, through the use of BGP, simultaneously discovers all other PEs in the same VPLS, and establishes a full mesh of pseudowires to those PEs.
With LDP, each PE router must be configured to participate in a given VPLS, and, in addition, be given the addresses of other PEs participating in the same VPLS. A full mesh of LDP sessions is then established between these PEs. LDP is then used to create an equivalent mesh of PWs between those PEs.
An advantage to using PWs as the underlying technology for the data plane is that in the event of failure, traffic will automatically be routed along available backup paths in the service provider's network. Failover will be much faster than could be achieved with e.g. Spanning Tree Protocol (STP). VPLS is thus a more reliable solution for linking together Ethernet networks in different locations than simply connecting a WAN link to Ethernet switches in both locations.
VPLS has significant advantages for both service providers and customers. Service providers benefit because they can generate additional revenues by offering a new Ethernet service with flexible bandwidth and sophisticated service level agreements (SLAs). VPLS is also simpler and mor |
https://en.wikipedia.org/wiki/Names%20Database | The Names Database was a social network, owned and operated by Classmates.com, a wholly owned subsidiary of United Online. The site does not appear to be significantly updated since 2008, and has many broken links and display issues. Since 2007, United States and Canadian registrations do not work, and instead redirect to a Classmates.com sign up page. At least half of its members are believed to be outside the United States.
The primary purpose of the website is to reconnect with old friends and classmates, which is related to the site's tagline "Making the World a Smaller Place." After registration, the names of all people in the database are fully searchable. However, contact with these members is limited until the database is "unlocked" by obtaining a "blue membership".
As of October 2006, blue memberships can be purchased for one- or three-year periods, or obtained for free by referring friends. However, as of July 2013, there does not appear to be any functioning way to upgrade and there is a permanent message saying "Please come back later" translated into seven languages in that part of the site. A non-searchable static version of the database is nevertheless still available, which lists names and high school affiliations. This static version is freely available (without any registration needed). However, the URL for that static version listed on the explanation page is incorrect and leads to a site with a permanent maintenance message.
History
Launched by entrepreneur Gabriel Weinberg, the company was acquired by Classmates.com for "approximately $10 million in cash" in March 2006. At the time of acquisition, the company had "approximately 50,000 pay subscribers and [was] expected to generate less than a million dollars in revenues" that year. United Online CEO Mark Goldston said the acquisition of "The Names Database is a great addition to Classmates.com and furthers our overall mission of connecting people." As of 2013, United Online no longer mentions the company in its Form 10-K annual report, except once to say it "excludes" in its "active accounts" calculation.
Before the acquisition, the company's legal name was actually Opobox, Inc. and was doing business as The Names Database. According to Delaware corporation records (where the company was registered), Opobox had been around since 2001. For a period of two years the business was registered but inactive. The Names Database was formed in 2003 after Gabriel Weinberg put up pages of names that were subsequently indexed by search engines.
Criticism
Like other social networks such as Hi5, Names Database has been criticized for being abnormally and intrusively aggressive at pressuring registrants to refer friends. Upon registration, the site immediately asks you to refer friends and then checks the validity of any address you enter, attempting to disallow fraudulent information. However, free access to searching the database is granted in the email confirmation without ref |
https://en.wikipedia.org/wiki/LED%20printer | An LED printer is a type of computer printer similar to a laser printer. Such a printer uses a light-emitting diode (LED) array as a light source in the printhead instead of the laser used in laser printers and, more generally, in the xerography process. The LED bar pulse-flashes across the entire page width and produces the image on the print drum or belt as it moves past.
LEDs are more efficient and reliable than conventional laser printers, since they have fewer moving parts, allowing for less mechanical wear. Depending on design, LED printers can have faster rates of print than some laser-based designs, and are generally cheaper to manufacture. In contrast to LED printers, laser printers require combinations of rotating mirrors and lenses that must remain in alignment throughout their use. The LED print head has no moving parts, and the individual assemblies tend to be more compact.
History
Oki Electric Industry claims to have made the first LED printer in 1981. A commercialized variant called OPP6220 was developed in 1986. It was a compact monotonic printer with a resolution of 240 dpi and a speed of 16 ppm. A 1989 model called OL400 was noted for its low cost. By 1997, Oki has pushed the resolution to 1200 dpi, and has produced upscaled models that handle A3-sized paper. The OKIPAGE 8c from 1998 was the first color LED printer for OKI. It simply utilizes a tandem array of four LED-toner pairs.
Variants
OKI Data has developed specialty LED Printers that use a CMYW toner system rather than CMYK. The OKI 920WT and 711WT have been developed for apparel-decorating processes, replacing the typical black toners ("K") with a white toner. The purpose is to allow the heat transfer application to dark fabrics and maintain the vibrancy of the colors. The LED immediately prints and dries the full color image onto a velum-like material, which is then heat-pressed to an adhesive sheet for application.
References
External links
Computer printers
Non-impact printing |
https://en.wikipedia.org/wiki/Weasel%20program | The weasel program or Dawkins' weasel is a thought experiment and a variety of computer simulations illustrating it. Their aim is to demonstrate that the process that drives evolutionary systems—random variation combined with non-random cumulative selection—is different from pure chance.
The thought experiment was formulated by Richard Dawkins, and the first simulation written by him; various other implementations of the program have been written by others.
Overview
In chapter 3 of his book The Blind Watchmaker, Dawkins gave the following introduction to the program, referencing the well-known infinite monkey theorem:
The scenario is staged to produce a string of gibberish letters, assuming that the selection of each letter in a sequence of 28 characters will be random. The number of possible combinations in this random sequence is 2728, or about 1040, so the probability that the monkey will produce a given sequence is extremely low. Any particular sequence of 28 characters could be selected as a "target" phrase, all equally as improbable as Dawkins's chosen target, "METHINKS IT IS LIKE A WEASEL".
A computer program could be written to carry out the actions of Dawkins's hypothetical monkey, continuously generating combinations of 26 letters and spaces at high speed. Even at the rate of millions of combinations per second, it is unlikely, even given the entire lifetime of the universe to run, that the program would ever produce the phrase "METHINKS IT IS LIKE A WEASEL".
Dawkins intends this example to illustrate a common misunderstanding of evolutionary change, i.e. that DNA sequences or organic compounds such as proteins are the result of atoms randomly combining to form more complex structures. In these types of computations, any sequence of amino acids in a protein will be extraordinarily improbable (this is known as Hoyle's fallacy). Rather, evolution proceeds by hill climbing, as in adaptive landscapes.
Dawkins then goes on to show that a process of cumulative selection can take far fewer steps to reach any given target. In Dawkins's words:
By repeating the procedure, a randomly generated sequence of 28 letters and spaces will be gradually changed each generation. The sequences progress through each generation:
Generation 01:
Generation 02:
Generation 10:
Generation 20:
Generation 30:
Generation 40:
Generation 43:
Dawkins continues:
Implications for biology
The program aims to demonstrate that the preservation of small changes in an evolving string of characters (or genes) can produce meaningful combinations in a relatively short time as long as there is some mechanism to select cumulative changes, whether it is a person identifying which traits are desirable (in the case of artificial selection) or a criterion of survival ("fitness") imposed by the environment (in the case of natural selection). Reproducing systems tend to preserve traits across generations, because the offspring inherit a copy of the parent's traits. It is the |
https://en.wikipedia.org/wiki/OAS | OAS or Oas may refer to:
Chemistry
O-Acetylserine, amino-acid involved in cysteine synthesis
Computers
Open-Architecture-System, the main user interface of Wersi musical keyboards
OpenAPI Specification (originally Swagger Specification), specification for machine-readable interface files for RESTful Web services
Oracle Application Server, software platform
Medicine
Open aortic surgery, surgical technique
Oral allergy syndrome, food-related allergic reaction in the mouth
2'-5'-oligoadenylate synthase, an enzyme
OAS1, OAS2, OAS3, anti-viral enzymes in humans
Organizations
Office of Aviation Services, agency of the United States Department of the Interior
Ontario Archaeological Society, organization promoting archaeology within the Province of Ontario, Canada
Organisation Armée Secrète, French dissident terrorist organisation, active during the Algerian War (1954–62), fighting against Algerian independence
Organization of American States, continental organization of the Western Hemisphere
Oxford Art Society, society for artists in the city of Oxford, England
Transport
Oasis LRT station, Singapore, LRT station abbreviation OAS
Other
Ohio Auction School, school for auctioneers in Ohio, U.S.
Old Age Security, social security payment available to most Canadians aged 65 or older
Option-adjusted spread, the yield-curve spread of a fixed-income security, adjusted for the cost of embedded options
Oas, Albay, municipality in the Philippines
See also
Oaş (disambiguation) |
https://en.wikipedia.org/wiki/Terminal%20server | A terminal server connects devices with a serial port to a local area network (LAN). Products marketed as terminal servers can be very simple devices that do not offer any security functionality, such as data encryption and user authentication. The primary application scenario is to enable serial devices to access network server applications, or vice versa, where security of the data on the LAN is not generally an issue. There are also many terminal servers on the market that have highly advanced security functionality to ensure that only qualified personnel can access various servers and that any data that is transmitted across the LAN, or over the Internet, is encrypted. Usually, companies that need a terminal server with these advanced functions want to remotely control, monitor, diagnose and troubleshoot equipment over a telecommunications network.
A console server (also referred to as console access server, console management server, serial concentrator, or serial console server) is a device or service that provides access to the system console of a computing device via networking technologies.
History
Although primarily used as an Interface Message Processor starting in 1971, the Honeywell 316 could also be configured as a Terminal Interface Processor (TIP) AND PROVIDE terminal server support for up to 63 ASCII serial terminals through a multi-line controller in place of one of the hosts.
Historically, a terminal server was a device that attached to serial RS-232 devices, such as "green screen" text terminals or serial printers, and transported traffic via TCP/IP, Telnet, SSH or other vendor-specific network protocols (e.g., LAT) via an Ethernet connection.
Digital Equipment Corporation's DECserver 100 (1985), 200 (1986) and 300 (1991) are early examples of this technology. (An earlier version of this product, known as the DECSA Terminal Server was actually a test-bed or proof-of-concept for using the proprietary LAT protocol in commercial production networks.) With the introduction of inexpensive flash memory components, Digital's later DECserver 700 (1991) and 900 (1995) no longer shared with their earlier units the need to download their software from a "load host" (usually a Digital VAX or Alpha) using Digital's proprietary Maintenance Operations Protocol (MOP). In fact, these later terminal server products also included much larger flash memory and full support for the Telnet part of the TCP/IP protocol suite. Many other companies entered the terminal-server market with devices pre-loaded with software fully compatible with LAT and Telnet.
Modern usage
A "terminal server" is used many ways but from a basic sense if a user has a serial device and they need to move data over the LAN, this is the product they need.
Raw TCP socket connection: A raw TCP socket connection which can be initiated from the terminal server or from the remote host/server. This can be point-to-point or shared, where serial devices (like card readers, scan |
https://en.wikipedia.org/wiki/Dyck%20language | In the theory of formal languages of computer science, mathematics, and linguistics, a Dyck word is a balanced string of brackets.
The set of Dyck words forms a Dyck language. The simplest, D1, use just two matching brackets, e.g. ( and ).
Dyck words and language are named after the mathematician Walther von Dyck. They have applications in the parsing of expressions that must have a correctly nested sequence of brackets, such as arithmetic or algebraic expressions.
Formal definition
Let be the alphabet consisting of the symbols [ and ]. Let denote its Kleene closure.
The Dyck language is defined as:
Context-free grammar
It may be helpful to define the Dyck language via a context-free grammar in some situations.
The Dyck language is generated by the context-free grammar with a single non-terminal , and the production:
That is, S is either the empty string () or is "[", an element of the Dyck language, the matching "]", and an element of the Dyck language.
An alternative context-free grammar for the Dyck language is given by the production:
That is, S is zero or more occurrences of the combination of "[", an element of the Dyck language, and a matching "]", where multiple elements of the Dyck language on the right side of the production are free to differ from each other.
Alternative definition
In yet other contexts it may instead be helpful to define the Dyck language by splitting into equivalence classes, as follows.
For any element of length , we define partial functions and by
is with "" inserted into the th position
is with "" deleted from the th position
with the understanding that is undefined for and is undefined if . We define an equivalence relation on as follows: for elements we have if and only if there exists a sequence of zero or more applications of the and functions starting with and ending with . That the sequence of zero operations is allowed accounts for the reflexivity of . Symmetry follows from the observation that any finite sequence of applications of to a string can be undone with a finite sequence of applications of . Transitivity is clear from the definition.
The equivalence relation partitions the language into equivalence classes. If we take to denote the empty string, then the language corresponding to the equivalence class is called the Dyck language.
Properties
The Dyck language is closed under the operation of concatenation.
By treating as an algebraic monoid under concatenation we see that the monoid structure transfers onto the quotient , resulting in the syntactic monoid of the Dyck language. The class will be denoted .
The syntactic monoid of the Dyck language is not commutative: if and then .
With the notation above, but neither nor are invertible in .
The syntactic monoid of the Dyck language is isomorphic to the bicyclic semigroup by virtue of the properties of and described above.
By the Chomsky–Schützenberger representation theorem, any context-fr |
https://en.wikipedia.org/wiki/Sim%20Wong%20Hoo | Sim Wong Hoo (; 1955 – 4 January 2023) was a Singaporean inventor and billionaire entrepreneur known for founding Creative Technology, a designer and manufacturer of products for personal computers and personal digital entertainment devices. He served as the chairman and chief executive officer of Creative Technology from 1981 until his death in 2023. Creative Technology is notable for its products such as the Sound Blaster audio card and the Creative ZEN range of audio and media products.
Early life and education
Sim was born into a Zhao'an Hokkien family in the Colony of Singapore. He attended Bukit Panjang Government High School, before graduating from Ngee Ann Technical College (now Ngee Ann Polytechnic) in 1975. After serving his mandatory National Service, Sim worked in the private engineering sector for a year.
Career
On 1 July 1981, with a capital outlay of S$10,000, Sim, along with former schoolmate Ng Kai Wa, opened a computer repair shop in Pearl's Centre, in Chinatown, and founded Creative Technology.
Sim started by developing and selling an add-on memory boards for the Apple II computer. Creative Technology subsequently began creating customised PCs adapted for the Chinese language, including enhanced audio capabilities that allowed the devices to produce speech and melodies.
In 1988, Sim established an office in the United States, and began selling Sound Blaster, a stand-alone sound card. It was among the first dedicated audio processing cards widely available to general consumers. Creative Technology dominated the PC audio market until the 2000s, when OEM PCs began to be built with integrated sound boards in the motherboard. Sound Blaster then found itself reduced to a niche product.
In May 2006, Creative Technology filed suit against Apple Inc. for violating their "Zen patent", which pertained to patent infringement with their iPod, iPod nano and iPod mini players. Apple countersued Creative Technology, and then launched a second suit pertaining to icons and data display and entry in such portable devices. In August 2006, Apple announced it would be paying $100,000,000 to Creative Technology to license the hierarchical user interface outlined in the Zen patent.
In late 2011, Sim announced a new product, the HanZpad, at a news conference in Beijing.
Reception
Sim won accolades from both industry and government for his innovations. He was awarded the Bintang Bakti Masyarakat (Public Service Star) by Singapore in 2001 for outstanding achievements in the business field. He was named in second spot as Asia's Businessman of the Year in January 2001 by Fortune Magazine.
At age 45, he became the youngest billionaire in Singapore. He was also the first person to be named Singapore's Businessman of the Year twice, in 1992 and 1997. In 2002, he was named Person of the Year by the Singapore Computer Society in recognition of his contribution to the IT industry. Sim was considered to be one of the most famous entrepreneurs of Singapor |
https://en.wikipedia.org/wiki/Linear%20probing | Linear probing is a scheme in computer programming for resolving collisions in hash tables, data structures for maintaining a collection of key–value pairs and looking up the value associated with a given key. It was invented in 1954 by Gene Amdahl, Elaine M. McGraw, and Arthur Samuel and first analyzed in 1963 by Donald Knuth.
Along with quadratic probing and double hashing, linear probing is a form of open addressing. In these schemes, each cell of a hash table stores a single key–value pair. When the hash function causes a collision by mapping a new key to a cell of the hash table that is already occupied by another key, linear probing searches the table for the closest following free location and inserts the new key there. Lookups are performed in the same way, by searching the table sequentially starting at the position given by the hash function, until finding a cell with a matching key or an empty cell.
As write, "Hash tables are the most commonly used nontrivial data structures, and the most popular implementation on standard hardware uses linear probing, which is both fast and simple."
Linear probing can provide high performance because of its good locality of reference, but is more sensitive to the quality of its hash function than some other collision resolution schemes. It takes constant expected time per search, insertion, or deletion when implemented using a random hash function, a 5-independent hash function, or tabulation hashing. Good results can also be achieved in practice with other hash functions such as MurmurHash.
Operations
Linear probing is a component of open addressing schemes for using a hash table to solve the dictionary problem. In the dictionary problem, a data structure should maintain a collection of key–value pairs subject to operations that insert or delete pairs from the collection or that search for the value associated with a given key.
In open addressing solutions to this problem, the data structure is an array (the hash table) whose cells (when nonempty) each store a single key–value pair. A hash function is used to map each key into the cell of where that key should be stored, typically scrambling the keys so that keys with similar values are not placed near each other in the table. A hash collision occurs when the hash function maps a key into a cell that is already occupied by a different key. Linear probing is a strategy for resolving collisions, by placing the new key into the closest following empty cell.
Search
To search for a given key , the cells of are examined, beginning with the cell at index (where is the hash function) and continuing to the adjacent cells , , ..., until finding either an empty cell or a cell whose stored key is .
If a cell containing the key is found, the search returns the value from that cell. Otherwise, if an empty cell is found, the key cannot be in the table, because it would have been placed in that cell in preference to any later cell that has not yet been s |
https://en.wikipedia.org/wiki/Quadratic%20probing | Quadratic probing is an open addressing scheme in computer programming for resolving hash collisions in hash tables. Quadratic probing operates by taking the original hash index and adding successive values of an arbitrary quadratic polynomial until an open slot is found.
An example sequence using quadratic probing is:
Quadratic probing can be a more efficient algorithm in an open addressing table, since it better avoids the clustering problem that can occur with linear probing, although it is not immune. It also provides good memory caching because it preserves some locality of reference; however, linear probing has greater locality and, thus, better cache performance.
Quadratic function
Let h(k) be a hash function that maps an element k to an integer in [0, m−1], where m is the size of the table. Let the ith probe position for a value k be given by the function
where c2 ≠ 0 (If c2 = 0, then h(k,i) degrades to a linear probe). For a given hash table, the values of c1 and c2 remain constant.
Examples:
If , then the probe sequence will be
For m = 2n, a good choice for the constants are c1 = c2 = 1/2, as the values of h(k,i) for i in [0, m−1] are all distinct (in fact, it is a permutation on [0, m−1]). This leads to a probe sequence of (the triangular numbers) where the values increase by 1, 2, 3, ...
For prime m > 2, most choices of c1 and c2 will make h(k,i) distinct for i in [0, (m−1)/2]. Such choices include c1 = c2 = 1/2, c1 = c2 = 1, and c1 = 0, c2 = 1. However, there are only m/2 distinct probes for a given element, requiring other techniques to guarantee that insertions will succeed when the load factor exceeds 1/2.
For , where m, n, and p are integer greater or equal 2 (degrades to linear probe when p = 1), then gives cycle of all distinct probes. It can be computed in loop as: , and
For any m, full cycle with quadratic probing can be achieved by rounding up m to closest power of 2, compute probe index: , and skip iteration when . There is maximum skipped iterations, and these iterations do not refer to memory, so it is fast operation on most modern processors. Rounding up m can be computed by:
uint64_t roundUp2(uint64_t v){
v--;
v |= v >> 1;
v |= v >> 2;
v |= v >> 4;
v |= v >> 8;
v |= v >> 16;
v |= v >> 32;
v++;
return v;
}
Limitations
Alternating signs
If the sign of the offset is alternated (e.g. +1, −4, +9, −16, etc.), and if the number of buckets is a prime number congruent to 3 modulo 4 (e.g. 3, 7, 11, 19, 23, 31, etc.), then the first offsets will be unique (modulo ). In other words, a permutation of 0 through is obtained, and, consequently, a free bucket will always be found as long as at least one exists.
References
External links
Tutorial/quadratic probing
Hashing
Articles with example C code
Articles with example Java code
Search algorithms |
https://en.wikipedia.org/wiki/GSF | GSF may refer to:
Gamlakarleby Segelförening, a Finnish yacht club
Generic sensor format, used for storing bathymetry data
Genoa Social Forum
Georgia Southern and Florida Railway
Glasgow Science Festival
Global Sanitation Fund
GlobalSantaFe Corporation, a defunct American offshore oil and gas company
Global Strategy Forum
Golden State Foods, an American food service company
GoSports Foundation
Grand slam force, in contract bridge
Grieg Seafood, a Norwegian seafood company
Suzuki Bandit series, a series of motorcycles |
https://en.wikipedia.org/wiki/Kinetica | Kinetica is a racing video game developed by Santa Monica Studio and published by Sony Computer Entertainment for the PlayStation 2. It was released in North America only on October 16, 2001. It is the debut game of Santa Monica Studio. It was the first game to use the Kinetica game engine which would later be used for the video games SOCOM U.S. Navy SEALs, God of War and God of War II. The game incorporates the use of SoundMAX audio technology by Analog Devices. An art book titled The Art of Kinetica was included with the game itself, containing artwork of the game's characters. In 2016, the game was re-released on PlayStation 4.
Gameplay
Kinetica is set in the future versions of Earth's major cities, outer-space, and some fictional locations in the Earth's distant future. Twelve racers compete while wearing "Kinetic Suits", which have wheels on the hands and feet, giving racers the appearance of motorcycles. Kinetic Suits have the ability to scale walls and ceilings, the vehicles are capable of reaching terminal velocity and beyond, reaching speeds of over .
The goal is the same as any racing game: be the first to cross the finish line. There are fifteen tracks and three seasons in the game. Each season consists of four tracks that the player must obtain a certain place in to advance. Getting first place in every race in a season will unlock a bonus track, and getting first place in the bonus track will unlock both the default and alternate versions of one of the unlockable characters. In order to progress through the game, the player must obtain first, second, or third place in the first season races. In the second season, the player must place first or second place, while in the third season the player must win each race in first place to advance.
Scattered around the tracks are power-up crystals that come in yellow and purple colors. Collecting five yellow crystals will give the player a power-up, while getting one purple crystal automatically gives the player a power-up regardless of how many yellow crystals the player has collected. Characters can perform stunts on the ground and in the air to add to the boost meter to gain access to faster than normal speeds, though this meter can also be filled by getting one of the three boost power-ups from the power-up crystals.
Reception
Kinetica received "generally favorable reviews" according to the review aggregator website Metacritic. Louis Bedigian of GameZone praised the game, stating "it practically annihilates Extreme G3 and the last two F-Zero games released." Gary Whitta of Next Generation called it "An intriguing twist on a largely played-out genre, although the Autobots-style racers might turn some gamers off."
References
External links
2001 video games
Cyberpunk video games
Science fiction racing games
Multiplayer and single-player video games
PlayStation 2 games
PlayStation 2-only games
Sony Interactive Entertainment games
Video games developed in the United States
Santa Monica |
https://en.wikipedia.org/wiki/Sky%20Sword%20II | The Sky Sword II (, Tien Chien II), or TC-2, is a Taiwanese beyond-visual-range air-to-air missile. It has an inertial navigation system, a data-link for mid-course guidance and active radar homing for terminal guidance, beyond visual range. It also has ECCM capability and can engage multiple targets. According to Su Tzu-yun, chief executive officer at the Center for Advanced Technology at Tamkang University, they are a cost-effective design which can perform a key role in Taiwan's defense strategy, and substantially offset China's air superiority. Some details of its design were revealed for the first time at the Paris Air Show in 2015. The pulse doppler radar seeker reportedly has a detection range of .
Development
Development of the Sky Sword II family began during the 1990s.
Service history
In 2017 a Sky Sword II launched by a F-CK-1 during a training exercise failed to ignite and fell into the sea. In 2019 TC-2 was among 117 missiles fired during a training exercise off Taiwan's west coast.
Variants
TC-2N
A ship-launched, surface-to-air version was later developed and designated TC-2N. It began development in 1994, and a ground-based test was first carried out against a low-flying drone in 1997. This development was revealed to the public in 2005 and the intention to make it compatible with vertical launch methods was later announced in 2006. The first ship-based launch was held in mid 2014. In the naval role the TC-2N fills an air defense gap between the Phalanx CIWS and SM-2 systems with a range of .
The missile has all-weather capability, is equipped with a thrust-vectoring booster to increase its range as well as maneuverability during launch phase (although early ship-based launch trials were carried out without this feature), and can engage anti-ship missiles and aircraft. It also has folding control surfaces to be quad-packed into either above-deck oblique launchers or in-deck vertical launch systems.
By May 2021 the TC-2N had passed its live fire trials and operational evaluations. Final evaluation was conducted aboard the Tuo Chiang-class corvette Ta Chiang.
Tuo Chiang-class corvette Ta Chiang(PGG-619) are equipped to carry up to 16 TC-2N.
Yushan-class landing platform dock are equipped to carry up to 32 TC-2N.
TC-2A
TC-2A is an anti-radiation missile, similar to the AGM-88 HARM. The TC-2A program began soon after the completion of the TC-2. It fills the requirement of the ROCAF for an Anti-Radiation Missile to arm the F-CK-1. It is reported to be long, in diameter, weighs (warhead weighs ), and with a range of . The passive radar seeker on the TC-2A has been reported as having a detection range of .
TC-2C
TC-2C is an advanced air-to-air version first tested in 2017 and intended to replace the standard TC-2. It features a number of incremental improvements including an improved rocket motor which allows an engagement range of . Maximum speed is in the Mach 6 range.
In 2021 it was announced that an extended range ve |
https://en.wikipedia.org/wiki/Intel%20High%20Definition%20Audio | Intel High Definition Audio (IHDA) (also called HD Audio or development codename Azalia) is a specification for the audio sub-system of personal computers. It was released by Intel in 2004 as the successor to their AC'97 PC audio standard.
Features
The Intel High Definition Audio specification includes the following features:
Up to 15 input and 15 output streams
Up to 16 PCM audio channels per stream
Sample resolutions of 8–32 bits
Sample rates of 6–192 kHz
Support for audio codecs (e.g., ADC, DAC), modem codecs, and vendor-defined codecs
Discoverable codec architecture
Fine-grained codec power-control
Audio jack detection, sensing, and retasking
Motherboards typically do not have any more than eight built-in output channels (7.1 surround sound) and four input channels (back and front panel microphone inputs, and a back-panel stereo line-in). Users requiring more audio I/Os will typically opt for a sound card or an external audio interface, as these provide additional features that are more oriented towards professional audio applications.
Operating system support
The Service Pack 3 update to Windows XP and all later versions of Windows (from Vista onwards) included the Universal Audio Architecture (UAA) class driver, which supported audio devices built to HD Audio's specifications. Retrospective UAA drivers were also built for Windows 2000, Server 2003 and XP Service Pack 1/2. macOS provides support for Intel HD Audio with its AppleHDA driver. Several Linux operating systems also support HD Audio, as well as OpenSolaris, FreeBSD, and OpenBSD.
Host controller
Like AC'97, HD Audio acts as a device driver, defining the architecture, link frame format, and programming interfaces used in the hardware of the host controller of the PCI bus and linking it to a codec used by a computer's software. Configurations of the host controller (Chipset) are available from third-party suppliers, including Nvidia, VIA and AMD, while codecs have also been provided by third-party suppliers including Realtek, Conexant, IDT, VIA, SigmaTel, Analog Devices and Cirrus Logic. AMD's TRX40 chipset was introduced in 2019 for use with Ryzen "Threadripper" CPUs, which provided the Realtek ALC1220 chip instead of the HD Audio interface. As a result, a separate USB or PCIe audio device was required to integrate HD audio codecs on TRX40 motherboards.
Limitations
As with the previous AC'97 standard, HD Audio does not specify handlers for the media buttons attached to headphone jacks (i.e., Play/Pause, Next, Previous, Volume up, Volume down).
Front panel connector
Computer motherboards often provide a connector to bring microphone and headphone signals to the computer's front panel. Intel provides a general specification for this process, but the signal assignments are different for both AC'97 and HD Audio headers.
The pin assignments for the AC'97 and HD Audio connectors are:
The HD Audio 3.5 mm subminiature audio jack differed from connectors used in the AC'97 spe |
https://en.wikipedia.org/wiki/Krylo%20Airlines | Krylo Airlines was an airline based in Moscow, Russia, which operated regional passenger services and freight charters between 1990 and 2003.
Code data
IATA Code: K9
ICAO Code: KRI
Callsign: Krylo
History
The airline was established in December 1990 and started operations in January 1991. It started international charter services as a means of earning revenue following a fall in state funding.
Fleet
Upon closure, the Krylo Airlines fleet included one Antonov An-26
References
Defunct airlines of Russia
Airlines established in 1990
Airlines disestablished in 2003
Companies based in Moscow
1990 establishments in Russia
2003 disestablishments in Russia |
https://en.wikipedia.org/wiki/Winner-take-all%20%28computing%29 | Winner-take-all is a computational principle applied in computational models of neural networks by which neurons compete with each other for activation. In the classical form, only the neuron with the highest activation stays active while all other neurons shut down; however, other variations allow more than one neuron to be active, for example the soft winner take-all, by which a power function is applied to the neurons.
Neural networks
In the theory of artificial neural networks, winner-take-all networks are a case of competitive learning in recurrent neural networks. Output nodes in the network mutually inhibit each other, while simultaneously activating themselves through reflexive connections. After some time, only one node in the output layer will be active, namely the one corresponding to the strongest input. Thus the network uses nonlinear inhibition to pick out the largest of a set of inputs. Winner-take-all is a general computational primitive that can be implemented using different types of neural network models, including both continuous-time and spiking networks.
Winner-take-all networks are commonly used in computational models of the brain, particularly for distributed decision-making or action selection in the cortex. Important examples include hierarchical models of vision, and models of selective attention and recognition. They are also common in artificial neural networks and neuromorphic analog VLSI circuits. It has been formally proven that the winner-take-all operation is computationally powerful compared to other nonlinear operations, such as thresholding.
In many practical cases, there is not only one single neuron which becomes active but there are exactly k neurons which become active for a fixed number k. This principle is referred to as k-winners-take-all.
Circuit example
A simple, but popular CMOS winner-take-all circuit is shown on the right. This circuit was originally proposed by Lazzaro et al. (1989) using MOS transistors biased to operate in the weak-inversion or subthreshold regime. In the particular case shown there are only two inputs (IIN,1 and IIN,2), but the circuit can be easily extended to multiple inputs in a straightforward way. It operates on continuous-time input signals (currents) in parallel, using only two transistors per input. In addition, the bias current IBIAS is set by a single global transistor that is common to all the inputs.
The largest of the input currents sets the common potential VC. As a result, the corresponding output carries almost all the bias current, while the other outputs have currents that are close to zero. Thus, the circuit selects the larger of the two input currents, i.e., if IIN,1 > IIN,2, we get IOUT,1 = IBIAS and IOUT,2 = 0. Similarly, if IIN,2 > IIN,1, we get IOUT,1 = 0 and IOUT,2 = IBIAS.
A SPICE-based DC simulation of the CMOS winner-take-all circuit in the two-input case is shown on the right. As shown in the top subplot, the input IIN,1 was fixed at 6nA, wh |
https://en.wikipedia.org/wiki/Bad%20Day%20%28viral%20video%29 | Bad Day (also known as Badday, Computer rage or Office rage) is a 27-second viral video where a frustrated office worker assaults his cubicle computer. It has circulated virally online since 1997. The video became a cultural embodiment of computer rage, and is the subject of several parodies and ad campaigns.
Plot
In the surveillance-style video, an office worker in his cubicle is becoming increasingly irritated with the computer. He slaps the monitor and pounds on the keyboard with his fist before picking the keyboard up and using it like a baseball bat to knock the monitor off of the desk. His neighbor peers over the partition twice in curiosity. The video ends with the protagonist kicking the monitor out of his cubicle.
Production and spread
The video clip was staged and produced by Durango, Colorado-based Loronix Information Systems to demonstrate the benefits of their digital video surveillance system for release on a promotional CD. The video is an example of a potential use for the surveillance system. The video's subject is Vinny Licciardi, the company's shipping manager. Licciardi appeared in a series of promotional videos extolling the benefits of Loronix's special brand of digital video recording systems. Loronix was the first company to develop a digital video surveillance system to replace video tape recorders. , Loronix is a subsidiary of Verint Systems.
Bad Day has circulated online since at least 1997. It made its largest impression via email, where its reasonable size made distribution easy. The origin was revealed in 1998 originally by CNN and later in print by Security Distribution Magazine. The company first heard of the video's popularity in June 1998. Its popularity within the company created internal computer issues.
Legacy
According to user interaction expert Frank Thissen, though fictional, it provides an example of how user expectations from longstanding social conventions can be frustrated through poor programming. In the Bad Day scenario, "The expectations of the user are obviously badly neglected", and the computer's lack of reaction or poor reaction is understood in the context of a human social situation, such as when someone walks away in the middle of a conversation. Wireds Michelle Delio called the protagonist "the patron saint of computer bashers".
Follow-ups to the video were featured on TechTV promos, where the same man is videotaped throwing the computer down a flight of stairs, and later running it over with his car. A 2005 spoof was produced by GoViral for the network security firm NetOp, showing a computer fighting back. The video is also frequently used in Angry German Kid parodies, with the office worker in the video often being portrayed as Leopold's dad, and is given the name "Harold Slikk".
References
External links
1996 films
Human–computer interaction
Viral videos |
https://en.wikipedia.org/wiki/Pierre-Arnoul%20de%20Marneffe | Pierre-Arnoul Frédéric Guy Donat de Marneffe (August 19, 1946 – July 9, 2023) was a Belgian computer scientist and professor emeritus at the University of Liège (ULiège). He studied civil engineering (mechanics section) at the Faculté polytechnique de Mons (FPMs) and obtained a PhD in applied sciences at the University of Liège (1976), in addition he obtained a Ph.D. in Computer science at Cambridge University in 1982.
His ideas expressed in Holon Programming inspired Donald Knuth in creating WEB, the first published literate programming environment.
References
Pierre-Arnoul de Marneffe, Holon Programming. Univ. de Liège, Service d'Informatique (December, 1973).
External links
University of Liège
Literate programming
Belgian computer scientists
Walloon people
University of Liège alumni
Living people
1946 births |
https://en.wikipedia.org/wiki/HCJB | HCJB, "The Voice of the Andes", was the first radio station with daily programming in Ecuador and the first Christian missionary radio station in the world. The station was founded in 1931 by Clarence W. Jones, Reuben Larson, and D. Stuart Clark. HCJB now focuses on Ecuador with unified programming on FM at 89.3 MHz in Pichincha, at 92.5 MHz in Manabí, at 96.1 MHz in Tungurahua and Cotopaxi, at 98.3 MHz in Esmeraldas and with separate programming on AM at 690 kHz.
Broadcasts in Spanish and indigenous languages on 6.05 MHz (1 kW), continue on an intermittent basis with a new solid state transmitter which in 2017 replaced an older (5 kW) transmitter. These broadcasts were not listed on the HCJB English website .
History
Radio station HCJB started as the vision of Clarence Wesley Jones (1900–1986), a musician, graduate of Moody Bible Institute, and the son of a Salvation Army minister. Following his graduation from Moody, Jones worked under evangelist Paul Rader and was part of the founding staff of the Chicago Gospel Tabernacle where Jones assisted in leading music, working with youth and overseeing Rader's weekly radio ministry called "WJBT" (Where Jesus Blesses Thousands) Impressed by the impact Rader's radio ministry had made, Jones felt called to establish missionary radio in Latin America. As a result, Jones traveled to Venezuela, Colombia, Panama and Cuba on a seven-week trip in 1928 looking for a suitable location for his envisioned radio station, but was unable to obtain the necessary government permits. Back in Chicago nearly two years later, Jones met Christian & Missionary Alliance (CMA) missionaries from Ecuador - Reuben and Grace Larson, John and Ruth Clark and Paul and Bernice Young. These missionaries encouraged Jones to consider Ecuador as the place to start his missionary radio station.
As the first step in fulfilling his vision, Jones needed to obtain a contract of approval from the Ecuadorian government for setting up the radio station. Reuben Larson and D. Stuart Clark, along with Ecuadorian lawyer Luís Calisto, worked to procure the initial contract. On August 15, 1930, the Ecuadorian Congress approved a bill which granted Jones a 25-year contract to operate a radio station in the country.
As with all countries having a governing body over broadcast operations, the call letters HCJB were obtained through the government of Ecuador, beginning with the internationally allocated prefix for Ecuador's broadcast stations (HC). Station co-founders Jones and Larson advocated for, and were granted by the government, call letters that were an acronym indicative of the stations' agreed upon purpose. The result was Heralding Christ Jesus' Blessings. In Spanish (one of the original broadcast languages of the South American station) the call letters represent Hoy Cristo Jesús Bendice.
Jones incorporated the World Radio Missionary Fellowship, Inc. (WRMF) on March 9, 1931 as a non-profit entity and overseeing organization over HCJB. Jone |
https://en.wikipedia.org/wiki/Over-the-air | "Over-the-air" is a synonym for "over a wireless network".
Over-the-air can also refer to
Electronics and technology
Over-the-air programming, secure distribution of software, configuration settings, or encryption keys to electronic devices via an insecure connection
Terrestrial television, broadcast of television using radio waves from an earth-based transmitter
Radio broadcasting, transmission of audio by radio waves intended to reach a wide audience
Events
Over the Air, a mobile-focused hack day and developer conference series in London
See also
OTA bitmap, also known as Over The Air Bitmap, a proprietary specification for black and white images for mobile phones
Ota (disambiguation) |
https://en.wikipedia.org/wiki/Voronezhavia | Voronezhavia was an airline based in Voronezh, Russia. Its flight operations had been taken over by Polet Airlines, Voronezhavia itself manages Voronezh Airport.
Code data
IATA Code: ZT
ICAO Code: VRN
Callsign: Voronezhavia
Destinations
Domestic destinations
Anapa
Chelyabinsk
Yekaterinburg
Kazan
Moscow
Norilsk
Perm
Saint Petersburg
Samara
Sochi
Ufa
Voronezh
International destinations
Turkey
Adana
Azerbaijan
Baku
Moldova
Chişinău
Ukraine
Dnipro
Kyiv
Belarus
Minsk
Armenia
Yerevan
External links
Official website
Defunct airlines of Russia
Former Aeroflot divisions
Companies based in Voronezh |
https://en.wikipedia.org/wiki/Blue%20Route | Blue Route may refer to:
Blue Route (Nova Scotia), a cycling network under construction in the province of Nova Scotia
Interstate 476, a highway in Pennsylvania known as the Blue Route
See also
Blue Line (disambiguation)
Blue belt (disambiguation) |
https://en.wikipedia.org/wiki/WKW | WKW may refer to:
Wer-kennt-wen, popular German social networking site
WKW Wilk, modern sniper rifle
Wong Kar-wai, Chinese film director |
https://en.wikipedia.org/wiki/Ryazanaviatrans | Ryazanaviatrans was an airline based in Turlatovo, Ryazan, Russia. It operated scheduled and charter regional feeder flights.
Code data
ICAO Code: RYZ
Callsign: Ryazan
History
The airline was established in 1992. On 31 October 2012, it was ordered to cease operations due to increased safety regulations. At that time, its aircraft fleet consisted of two Antonov An-24.
References
External links
Ryazanaviatrans
Defunct airlines of Russia
Airlines established in 1992
Airlines disestablished in 2012
Companies based in Ryazan |
https://en.wikipedia.org/wiki/Playhouse%20Disney | Playhouse Disney was a brand of programming blocks and international cable and satellite television channels that were owned by the Disney Channels Worldwide unit (now Disney Branded Television) of The Walt Disney Company's Disney–ABC Television Group. It originated in the United States as a morning program block on the Disney Channel. Aimed mainly at children at two to five years of age, its programming featured a mix of live-action and animated series.
The Playhouse Disney block on Disney Channel was rebranded as the Disney Junior block on Disney Channel on February 14, 2011. The remaining channels and blocks using the Playhouse Disney brand outside the US relaunched under the Disney Junior brand over the next three years, concluding with the rebranding of the Playhouse Disney block on Disney Channel Russia on September 1, 2013.
History
Early years (1997–2002)
Prior to Playhouse Disney's launch, Disney Channel had aired a lineup of preschool-targeted programs to compete with Nick Jr. (which were mixed alongside animated series aimed at older children) during the morning hours since its debut in April 1983.
On April 6, 1997, Disney Channel underwent a relaunch that signified the beginning of its full conversion into a commercial-free basic cable channel, and its preschool block now utilized a similar graphics package for its promotions as that used for the channel's afternoon children's programs. After Disney Channel's preschool block premiered three new original series in 1998 (PB&J Otter, Rolie Polie Olie (produced by Nelvana), and Out of the Box), the block officially launched as Playhouse Disney on February 1, 1999.
One of Playhouse Disney's most popular series was Bear in the Big Blue House, which debuted on October 20, 1997; the series was named by TV Guide as one of the "top 10 new shows for kids" that year.
For the first three years of its run, the Playhouse Disney block originally aired each weekday from 8:30 a.m. to 2:30 p.m. Eastern Time, and weekends from 6:00 to 10:00 a.m. Eastern Time. Following each program, which usually ran 23 minutes (most of which, except for films, aired without promotional interruption), the remainder of the time period was filled by either short segments and music videos (the latter of which were originally aired under the banner "Feet Beat") or an episode of an acquired short series.
On April 16, 2001, Playhouse Disney received a new rebrand produced by motion graphics company Beehive; actress Allyce Beasley began serving as the U.S. block's promo announcer at this time, a capacity she would hold until March 30, 2007, being replaced by Margit Furseth. Playhouse Disney also premiered two new original series in 2001 (Stanley and The Book of Pooh). Radio Disney cross-promoted the block by rebranding its "Mickey and Minnie's Tune Time" block as "Playhouse Disney", and in 2002, the TV block's "Feet Beat" interstitials were renamed "BB's Music Time" to promote the Radio Disney block. On June 25, 2001, D |
https://en.wikipedia.org/wiki/Z/Architecture | z/Architecture, initially and briefly called ESA Modal Extensions (ESAME), is IBM's 64-bit complex instruction set computer (CISC) instruction set architecture, implemented by its mainframe computers. IBM introduced its first z/Architecture-based system, the z900, in late 2000. Later z/Architecture systems include the IBM z800, z990, z890, System z9, System z10, zEnterprise 196, zEnterprise 114, zEC12, zBC12, z13, z14, z15 and z16.
z/Architecture retains backward compatibility with previous 32-bit-data/31-bit-addressing architecture ESA/390 and its predecessors all the way back to the 32-bit-data/24-bit-addressing System/360. The IBM z13 is the last z Systems server to support running an operating system in ESA/390 architecture mode. However, all 24-bit and 31-bit problem-state application programs originally written to run on the ESA/390 architecture will be unaffected by this change.
Operating system support
IBM's operating systems z/OS, z/VSE, z/TPF, and z/VM are versions of MVS, VSE, Transaction Processing Facility (TPF), and VM that support z/Architecture. Older versions of z/OS, z/VSE, and z/VM continued to support 32-bit systems; z/OS version 1.6 and later, z/VSE Version 4 and later, and z/VM Version 5 and later require z/Architecture.
Linux also supports z/Architecture with Linux on IBM Z.
z/Architecture supports running multiple concurrent operating systems and applications even if they use different address sizes. This allows software developers to choose the address size that is most advantageous for their applications and data structures.
On July 7, 2009, IBM on occasion of announcing a new version of one of its operating systems implicitly stated that Architecture Level Set 4 (ALS 4) exists, and is implemented on the System z10 and subsequent machines. The ALS 4 is also specified in LOADxx as ARCHLVL 3, whereas the earlier z900, z800, z990, z890, System z9 specified ARCHLVL 2. Earlier announcements of System z10 simply specified that it implements z/Architecture with some additions: 50+ new machine instructions, 1 MB page frames, and hardware decimal floating point unit (HDFU).
Most operating systems for the z/Architecture, including z/OS, generally restrict code execution to the first 2 GB (31 address bits, or 231 addressable bytes) of each virtual address space for reasons of efficiency and compatibility rather than because of architectural limits. Linux on IBM Z allows code to execute within 64-bit address ranges.
z/OS
Each z/OS address space, called a 64-bit address space, is 16 exabytes in size.
Code (or mixed) spaces
The z/OS implementation of the Java programming language is an exception. The z/OS virtual memory implementation supports multiple 2 GB address spaces, permitting more than 2 GB of concurrently resident program code.
Data-only spaces
Data-only spaces are memory regions that can be read from and written to, but not used as executable code. (Similar to the NX bit on other modern processors.)
By default, the |
https://en.wikipedia.org/wiki/WXSP-CD | WXSP-CD (channel 15) is a low-power, Class A television station licensed to Grand Rapids, Michigan, United States, serving West Michigan as an affiliate of MyNetworkTV. It is owned by Nexstar Media Group alongside Grand Rapids–licensed NBC affiliate WOOD-TV (channel 8) and Battle Creek–licensed ABC affiliate WOTV (channel 41). The stations share studios on College Avenue Southeast in the Heritage Hill section of Grand Rapids, while WXSP-CD's transmitter is located in Walker (along I-96). Another repeater station licensed to Grand Rapids, WOLP-CD (channel 35), utilizes and is co-located with WOOD-TV's transmitter southwest of Middleville.
History
The station signed on the air on July 23, 1986, as W29AD, broadcasting on UHF channel 29. It moved to UHF channel 15 and acquired the W15AM calls on January 12, 1988. In the station's early days, it was a translator for World Harvest Television from WHME-TV in South Bend, Indiana, which is owned by LeSEA Broadcasting (now Family Broadcasting Corporation). The station was then purchased by LIN TV, the owner of WOOD-TV, and converted to the station's Local Weather Station (LWS) format with the call sign WOWD-LP (variation on WOOD-TV). WOWD and its low-power network of repeaters aired 24-hour weather information direct from WOOD-TV's weather center, including current conditions and severe weather coverage. This was in an early pre-digital format comparable to the now defunct NBC Weather Plus.
The weather programming aired from the mid-1990s until it switched to a general entertainment programming format a few years later. It featured graphic displays of various current conditions and forecasts as well as periodic forecast segments from WOOD-TV's meteorologists. Short commercial breaks would feature promotional advertising for WOOD-TV's news and entertainment programming, as well as LWS' station identification. A format change took place when it became a UPN affiliate on August 31, 1999 (displacing that network from secondary carriage on WOOD-TV and WOTV), prompting the move of LWS to the early morning hours and the adoption of new calls, WXSP-LP. The call-sign WXSP-CA was acquired after it became a Class A station, which meets stricter requirements than most low-powered television stations. WXSP-CD continues to carry WOOD-TV's radar in late night weekend slots when paid programming is unable to be sold.
On January 24, 2006, the Warner Bros. unit of Time Warner and CBS Corporation announced that the two companies would shut down The WB and UPN and combine the networks' respective programming to create a new "fifth" network called The CW. On February 22, 2006, News Corporation announced the launch of a new "sixth" network called MyNetworkTV, which would be operated by Fox Television Stations and its syndication division Twentieth Television. MyNetworkTV was created to compete against another upstart network that would launch at the same time that September, The CW (an amalgamated network that was originall |
https://en.wikipedia.org/wiki/NICE%20Ltd. | NICE is an Israeli technology company specializing in customer relations management software (NICE CXone), artificial intelligence, digital and workforce engagement management solutions. The company serves various industries, such as financial services, telecommunications, healthcare, outsourcers, retail, media, travel, service providers, and utilities.
The company is listed on both the Tel Aviv Stock Exchange and the NASDAQ. In Tel Aviv, it is part of the TA-35 Index.
History
NICE was founded in 1986 as Neptune Intelligence Computer Engineering (NICE) in Israel. Much of the early technology developed by NICE was for contact centers, financial services and business intelligence markets. The computer engineers that founded NICE created a telephony voice recording system in the early 90s, followed by ATM software under the subsidiary, NICECom. The ATM vendor quickly grew its operations in the 90s and NICE sold its subsidiary to 3Com in 1994 for $54 million. In 2007, NICE acquired Actimize for $280 million. The company developed risk management software for various markets, identifying risks for its customers.
In 2011 NICE acquired UK-based Fizzback, with the value of the deal said to be $80 million. The UK company specialized in customer feedback, collecting real-time customer experience information. At the time of acquisition, Fizzback processed 150 million individual feedback reports; many of these reports taken in real-time from social media platforms. During the same year, NICE announced the acquisition of analytics firm, Merced Systems for $150 million. Merced was a provider of performance management services, offered predominantly as software as a service with additional analytics and workforce optimization.
In 2014, Zeevi Bregman left his role as CEO, to be replaced by Barak Eilam who previously served as President, a role he had held for 18 months before becoming CEO.
In 2016, NICE acquired inContact for a reported $960 million allowing NICE to expand their customer services offering and integrate a cloud contact center, using a Contact Center as a Service (CCaaS) approach. Paul Jarman of inContact would continue as CEO to lead the inContact division once integrated into NICE.
In 2018, NICE acquired The Mattersight Corporation that was founded as a behavioral analytics software company in 1994, before diversifying into cloud analytics and its SaaS offering. The agreed deal was $90 million, which made the total acquisition price 25% above share value and Mattersight's service offering was integrated into NICE.
In May 2019, NICE acquired Brand Embassy allow NICE to manage customer interactions across a greater number of platforms, including social media. According to BizJournals, this would include 30 additional channels, such as Facebook, WhatsApp and LinkedIn.
In April 2021, it was announced that NICE would be acquiring MindTouch, a San Diego-based knowledge management company. It was founded in 2005 it offered KM (knowledge managem |
https://en.wikipedia.org/wiki/Azc%C3%A1rraga%20family | The Azcárraga family is a wealthy Mexican media dynasty. The center of their business empire, Televisa, is the main television network in Mexico and the largest producer and broadcaster of Spanish language media around the world.
Notable members
Raúl Azcárraga Vidaurreta. Founder of XEW.
Emilio Azcárraga Vidaurreta, brother of the former. Founder of Televisa.
Emilio Azcárraga Milmo, son of Emilio Azcárraga Vidaurreta.
Emilio Azcárraga Jean, son of Azcárraga Milmo. Current president of Grupo Televisa.
Cristian Roberto Azcárraga, son of Azcárraga. Current vice-president of Grupo Televisa.
Gastón Azcárraga Andrade, fugitive from Mexican justice and former head of Grupo Posadas and Mexicana airlines.
Carmela Azcarraga Milmo, daughter of Emilio Azcarraga Vidaurreta.
External links
History of EAV and EAM at the Museum of Broadcast Communications.
Mexican business families
Mexican mass media owners
Mexican people of Basque descent
Television company families |
https://en.wikipedia.org/wiki/A%20Star%20Is%20Born%20Again | "A Star Is Born Again" is the thirteenth episode of the fourteenth season of the American animated television series The Simpsons. It first aired on the Fox network in the United States on March 2, 2003. The episode owes much of its plot to Notting Hill (1999). While that film is about an actress finding happiness with the owner of an independent bookstore, the episode features Hollywood movie star Sara Sloane (Marisa Tomei) falling for Ned Flanders after visiting the Leftorium. The episode title doubles as a reference to the film A Star Is Born and being born again, meaning a person who has converted to Christianity, particularly in American evangelism.
This is the only Simpsons episode in which the same person has been accredited with two different names, where James L. Brooks is credited as the Executive Producer and Executive Creative Consultant, and again as Jim Brooks as a Special Guest Voice.
Plot
During the annual Jellyfish Festival, which welcomes back the Stinging Red Jellyfish to the shores of Springfield, Ned Flanders becomes depressed because he is alone. The other adults have partners with whom to spend a romantic evening at the Jellyfish Cotillion, and this is Ned's first festival without his wife Maude.
Ned returns to the Leftorium to work on his taxes and take his mind off things. A woman comes in, looking for a pair of left-handed eyelash curlers. After chatting with Ned she asks him out on a date. After she leaves, Ned notices a movie poster with her face on it; she is Sara Sloane, a movie star.
Sara and Ned hit it off, with Sara loving Ned's simple, quaint lifestyle and honesty. They go on several dates, though they encounter some problems, especially from tabloid reporters following them. Also, Sara is much less inhibited than Ned, causing some tension.
When her movie wraps, Sara asks Ned to return to Hollywood with her. Ned has a horrible dream about the bad things of Hollywood in a sequence that includes a cameo by series producer James L. Brooks, and also the "Hollywood" sign reading "Hollyweird", and refuses. Sara therefore tries staying in Springfield, to be with Ned. She slowly starts settling in with the locals, joining Marge's book club hosted by author Helen Fielding and going shopping with Ned.
At a concert, to which Sara wears a low-cut dress, Sara tells Ned she wants to have sex with him. Ned eventually relents, but insists on marriage if they are to continue a sexual relationship. Sara is unwilling to get married, and they break up and she returns to Hollywood. She gets a quickie marriage and divorce to Bob Balaban. Ned finds that he is now more attractive to women because of his famous relationship.
Cultural references
This episode is largely a parody of the film Notting Hill (1999).
A billboard depicting Los Angeles personality Angelyne can be seen during Ned Flanders' Hollywood dream sequence.
When Helen Fielding runs around being chased by bobbies and a man in a gorilla suit following the book club mee |
https://en.wikipedia.org/wiki/AF-heap | In computer science, the AF-heap is a type of priority queue for integer data, an extension of the fusion tree using an atomic heap proposed by M. L. Fredman and D. E. Willard.
Using an AF-heap, it is possible to perform insert or decrease-key operations and delete-min operations on machine-integer keys in time . This allows Dijkstra's algorithm to be performed in the same time bound on graphs with edges and vertices, and leads to a linear time algorithm for minimum spanning trees, with the assumption for both problems that the edge weights of the input graph are machine integers in the transdichotomous model.
See also
Fusion tree
References
Heaps (data structures)
Priority queues |
https://en.wikipedia.org/wiki/Fare%20network | The Fare network (formerly Football Against Racism in Europe) is a network set up to counter discrimination in European football. The network was set up in Vienna, Austria, in February 1999 after a meeting of football supporters' groups, football players' unions and football associations. The network has received backing from the European governing body UEFA, FIFA and the European Commission for its aims.
See also
Football Supporters Europe
References
External links
Racism in association football
Anti-racist organizations in Europe
Organizations established in 1999
Association football fandom
1999 establishments in Austria |
https://en.wikipedia.org/wiki/Real-time%20clock%20alarm | A real time clock alarm is a feature that can be used to allow a computer to 'wake up' after shut down to execute tasks every day or on a certain day. It can sometimes be found in the 'Power Management' section of a motherboard's BIOS/UEFI setup. Wake On LAN, Wake on ring, and IPMI functions could also be used to start a computer after it is turned off.
In Linux, the real time clock alarm can be set or retrieved using /proc/acpi/alarm or /sys/class/rtc/rtc0/wakealarm. Alternatively the rtcwake utility may be used which prevents problems when using local time instead of UTC by automatically processing the /etc/adjtime file. systemd can be used to wake a system and run a task at a specific time.
In Microsoft Windows there are different programs which could be used to 'wake up' a computer from standby or hibernation. Task Scheduler settings for power management can be used to 'Wake the computer to run this task'.
References
See also
Alert on LAN
Wake-on-Ring (WOR)
Wired for Management
Wake-on-LAN
Alarms
Alarm
Operating system technology
BIOS
Unified Extensible Firmware Interface |
https://en.wikipedia.org/wiki/Bui%20Tuong%20Phong | Bui Tuong Phong (December 14, 1942 – July 1975) was a Vietnamese-born computer graphics researcher and pioneer. He invented the widely used Phong shading algorithm and Phong reflection model.
Life
Phong was born in Hanoi, then French Indochina. After attending the Lycée Albert Sarraut there, he moved with his family to Saigon in 1954, where he attended the Lycée Jean Jacques Rousseau. He went to France in 1964 and was admitted to the Grenoble Institute of Technology. He received his from Grenoble in 1966 and his Diplôme d'Ingénieur from the ENSEEIHT, Toulouse, in 1968. In 1968, he joined the (then IRIA) as a researcher in Computer Science, working in the development of operating systems for digital computers.
He went to the University of Utah College of Engineering in September 1971 as a research assistant in Computer Science and he received his Ph.D. from the University of Utah in 1973.
Phong knew that he was terminally ill with leukemia while he was a student. In 1975, after his tenure at the University of Utah, Phong joined Stanford University as a professor.
Phong was married to Bùi Thị Ngọc Bích from Nha Trang, Vietnam, in 1969 in Paris, France. He and his wife had one daughter.
According to Professor Ivan Sutherland and Phong's friends, Phong was intelligent, affable and modest. About improving the quality of synthesized images he wrote, "We do not expect to be able to display the object exactly as it would appear in reality, with texture, overcast shadows, etc. We hope only to display an image that approximates the real object closely enough to provide a certain degree of realism."
Two years after receiving his Ph.D., Phong died in 1975 of end-stage leukemia.
Work on computer graphics
Phong was the inventor of the Phong reflection model and the Phong shading interpolation method, techniques widely used in computer graphics. He published the description of the algorithms in his 1973 PhD dissertation and a 1975 paper.
He developed the first algorithm for simulating specular phenomena. When working on his doctorate, he was very focused on selecting a topic and completing his dissertation very fast. Professor David C. Evans very enthusiastically supported him in this project. Professor Ivan Sutherland worked with him for improving the previous Mach banding problems, and on using normals for shading. His fellow students also supported him very much, including James H. Clark, Franklin C. Crow, George Randall, Dennis Ting and John Riley. He finished his dissertation much faster than other students of the time did.
Phong, Robert McDermott, Jim Clark and Raphael Rom had created the very first computer graphics generated picture that looked like its physical model: the Volkswagen Beetle. As a computer graphics icon, it still crops up in highly respected journals and animated features.
See also
Blinn–Phong shading model
References
1942 births
1975 deaths
Computer graphics researchers
People from Hanoi
Vietnamese expatriates in the |
https://en.wikipedia.org/wiki/Michael%20Dertouzos | Michael Leonidas Dertouzos (; November 5, 1936 – August 27, 2001) was a professor in the department of Electrical Engineering and Computer Science at the Massachusetts Institute of Technology (MIT) and Director of the MIT Laboratory for Computer Science (LCS) from 1974 to 2001.
Dertouzos predicted the expansion of computer use very early, and was one of the pioneers in many areas of technology. These included his contributions to the Web particularly through his visionary approach to ubiquitous computing.
Early life
Dertouzos was born in Athens, Greece. His father was an admiral in the Greek navy and the young Dertouzos often accompanied him aboard destroyers and submarines. This experience cultivated his interest in technology so that he learned Morse code, shipboard machinery, and mathematics at an early age. When he was 16, he came across Claude Shannon's work on information theory and MIT's attempt to build a mechanical mouse robot; these were said to have driven him to study in the university.
Dertouzos went to high school at Athens College. He came to the United States to study after the end of World War II and was awarded a Fulbright scholarship to study electrical engineering. Dertouzos completed his bachelor's and master's degrees at the University of Arkansas in 1957 and 1959. He earned his Ph.D. in electrical engineering from MIT in 1964.
Career
After graduating, he immediately joined the faculty of MIT, where he stayed for the rest of his career. During Dertouzos's term, LCS innovated in a variety of areas, including RSA encryption, the spreadsheet, the NuBus, the X Window System, and the Internet. Dertouzos was instrumental in creating the World Wide Web Consortium and bringing it to MIT. He was a firm supporter of the GNU Project, Richard Stallman, and the FSF, and their continued presence at MIT. He was also the sponsor of Project Oxygen at MIT, which aimed to develop "pervasive, human-centered computing through a combination of specific user and system technologies".
In 1968, he co-founded Computek, Inc., a manufacturer of graphics and intelligent terminals, with Marvin C. Lewis and Dr. Huber Graham.
He died on August 27 2001 at Massachusetts General Hospital at the age of 64. He is buried at the First Cemetery of Athens.
Honours
On November 5, 2018, Google recognized him with a doodle.
Bibliography
Dertouzos, The Unfinished Revolution: Human-Centered Computers and What They Can Do For Us, 2001, .
Dertouzos, What Will Be: How the New World of Information Will Change Our Lives, 1997, .
"Communications, Computers and Networks", in Scientific American Special Issue on Communications, Computers, and Networks, September, 1991
(co-author), Made in America: Regaining the Productive Edge, 1989, .
References
Further reading
K. Warwick "Scrubbing the future clean", Review of 'What will be' by Michael Dertouzos, New Scientist, p. 44, 9 August 1997.
External links
Oral history interview with Michael L. Dertouzos. Charles Babba |
https://en.wikipedia.org/wiki/Transportation%20network | Transportation network may refer to:
Transport network, physical infrastructure
Transportation network (graph theory), the mathematical graph theory
Transportation network company, a legal term for a ridesharing company in certain jurisdictions |
https://en.wikipedia.org/wiki/The%20Tao%20of%20Programming | The Tao of Programming is a book written in 1987 by Geoffrey James. Written in a tongue-in-cheek style spoof of classic Taoist texts such as the Tao Te Ching and Zhuangzi which belies its serious message, it consists of a series of short anecdotes divided into nine "books":
The Silent Void
The Ancient Masters
Design
Coding
Maintenance
Management
Corporate Wisdom
Hardware and Software
Epilogue
Geoffrey James wrote two other books on this theme, The Zen of Programming (978-0931137099) in 1988 and Computer Parables: Enlightenment in the Information Age (978-0931137136) in 1989.
See also
Hacker koan
References
External links
The Tao of Programming
Software development books
1987 non-fiction books
Computer humor
Satirical books
Taoism in popular culture |
https://en.wikipedia.org/wiki/Portal%20Software | Portal Software, Inc., was founded in 1985 as Portal Information Network, one of the first Internet service providers in the San Francisco Bay Area. It was founded by John Little. The company offered its own interface through modem access that featured Internet email. Towards the end of the 1980s, the company offered FTP.
During this time, the company developed its own account management software. In 1992, John Little decided to focus on developing Portal's internal software for other ISPs, which he saw as a fast evolving market. Their ISP business was shut down and the accounts sold to Sprint. The company was renamed Portal Software in 1993 and Dave Labuda joined the new company as co-founder. Little and Labuda developed a scalable and flexible real-time enterprise software architecture, which they applied to the management of customers and revenue for internet and telecom service providers.
Portal Software developed a billing and revenue software suite (Portal Infranet) primarily targeted at telecommunications companies and ISPs. It was one of the largest companies in its business. Customers of Portal Software included PSINet, AOL Time Warner, China Mobile, Deutsche Telekom, France Télécom, iG Brazil, Juno Online Services, KPN, Orange UK, Reuters, SIRIUS Satellite Radio, Sprint Canada, Telefónica, Telenor, Telstra, TIM, U.S. Cellular, Vodafone, SaskTel and XM Satellite Radio. In order to address the telecommunications market, Portal software acquired the InteGrate software from Solution42, a German company which had a history in high-performance telecommunications Rating. This allowed a realistic performance of rating telephony usage events, something that was not feasible with the 'real-time' rating engine they had developed in-house.
Portal Software was bought by Oracle Corporation in 2006 for an estimated $220 Million. Portal Software is now a business unit of Oracle. Like other acquisition software, Portal Software will be integrated with the core products of Oracle such as Siebel (CRM), PeopleSoft (ERP/CRM), JD Edwards (ERP). At the time of the acquisition, Dave Labuda was the CEO, Bhaskar Gorti was a Senior Vice President of Worldwide Marketing and Sales, JK Chelladurai was the Managing Director of India development center, Bruce Grainger Vice President of Americas, Tim Porter Vice President of EMEA.
References
Defunct software companies of the United States
Software companies based in the San Francisco Bay Area
Oracle acquisitions
Software companies established in 1985
1985 establishments in California
2006 mergers and acquisitions |
https://en.wikipedia.org/wiki/Feedback%20arc%20set | In graph theory and graph algorithms, a feedback arc set or feedback edge set in a directed graph is a subset of the edges of the graph that contains at least one edge out of every cycle in the graph. Removing these edges from the graph breaks all of the cycles, producing a directed acyclic graph, an acyclic subgraph of the given graph. The feedback arc set with the fewest possible edges is the minimum feedback arc set and its removal leaves the maximum acyclic subgraph; weighted versions of these optimization problems are also used. If a feedback arc set is minimal, meaning that removing any edge from it produces a subset that is not a feedback arc set, then it has an additional property: reversing all of its edges, rather than removing them, produces a directed acyclic graph.
Feedback arc sets have applications in circuit analysis, chemical engineering, deadlock resolution, ranked voting, ranking competitors in sporting events, mathematical psychology, ethology, and graph drawing. Finding minimum feedback arc sets and maximum acyclic subgraphs is NP-hard; it can be solved exactly in exponential time, or in fixed-parameter tractable time. In polynomial time, the minimum feedback arc set can be approximated to within a polylogarithmic approximation ratio, and maximum acyclic subgraphs can be approximated to within a constant factor. Both are hard to approximate closer than some constant factor, an inapproximability result that can be strengthened under the unique games conjecture. For tournament graphs, the minimum feedback arc set can be approximated more accurately, and for planar graphs both problems can be solved exactly in polynomial time.
A closely related problem, the feedback vertex set, is a set of vertices containing at least one vertex from every cycle in a directed or undirected graph. In undirected graphs, the spanning trees are the largest acyclic subgraphs, and the number of edges removed in forming a spanning tree is the circuit rank.
Applications
Several problems involving finding rankings or orderings can be solved by finding a feedback arc set on a tournament graph, a directed graph with one edge between each pair of vertices. Reversing the edges of the feedback arc set produces a directed acyclic graph whose unique topological order can be used as the desired ranking. Applications of this method include the following:
In sporting competitions with round-robin play, the outcomes of each game can be recorded by directing an edge from the loser to the winner of each game. Finding a minimum feedback arc set in the resulting graph, reversing its edges, and topological ordering, produces a ranking on all of the competitors. Among all of the different ways of choosing a ranking, it minimizes the total number of upsets, games in which a lower-ranked competitor beat a higher-ranked competitor. Many sports use simpler methods for group tournament ranking systems based on points awarded for each game; these methods can provide a cons |
https://en.wikipedia.org/wiki/Matsudono%20Motofusa | was an imperial regent in the late 12th century, serving both Emperor Rokujō and Emperor Takakura. He was also called , as he came from the village of Matsudono, near Kyoto. Fujiwara no Tadataka and Matsudono Moroie were his first and third sons, respectively.
Though wielding great power as sesshō and kampaku, Motofusa was prevented from becoming the head of the Fujiwara family by the political maneuvers of Taira no Kiyomori. An incident in 1170, while Motofusa was on his way to the Hōjuji Palace, further cemented his rivalry with the Taira clan. The Regent, along with a large retinue, was making his way to the palace for a ceremony which the cloistered Emperor Go-Shirakawa was supposed to attend, when a young boy, Taira no Sukemori, refused to make way for him and his retinue. As a result, the Regent's men smashed Sukemori's carriage and humiliated him. Sukemori was a grandson of Kiyomori and so, after a few failed attempts at reprisal, followers of Taira no Shigemori (Sukemori's father) attacked the Regent's men on their way to a solemn ceremony, dragging them from their horses and humiliating them. These events, while seemingly minor on the surface, led to a rift between Emperor Go-Shirakawa and the Taira, and therefore to closer relations between Go-Shirakawa and the Minamoto, enemies of the Taira.
He is the maternal grandfather of the founder of Sōtō Zen Buddhism in Japan, Eihei Dōgen.
In 1179, he ordained as a Buddhist monk and took the Dharma name Zenkan (善観). When he died in 1230, he was given the posthumous Buddhist names Nakayamain (中山院) and Bodaiin (菩提院).
Service as Regent
1166–1168: Sessho under Emperor Rokujō.
1168–1172: Sessho under Emperor Takakura.
1172–1179: Kampaku under Emperor Takakura.
1144 births
1230 deaths
Fujiwara clan
Matsudono family
People of Heian-period Japan
People of Kamakura-period Japan
Sesshō and Kampaku
Heian period Buddhist clergy
Kamakura period Buddhist clergy
12th-century regents |
https://en.wikipedia.org/wiki/MASN | Mid-Atlantic Sports Network (MASN) is an American regional sports network owned as a joint venture between two Major League Baseball franchises, the Baltimore Orioles (which owns a controlling 77% interest) and the Washington Nationals (which owns the remaining 23%). Headquartered in Baltimore, Maryland, the channel broadcasts regional coverage of sports events in the Washington, D.C., and Baltimore metropolitan areas.
MASN is available on approximately 23 cable and fiber optic television providers in Maryland, the District of Columbia, Virginia, eastern and central North Carolina, West Virginia, south central Pennsylvania and Delaware (on providers such as Comcast, Cox Communications, RCN, Mediacom, Charter Communications and Verizon FiOS, covering an area stretching from Harrisburg, Pennsylvania to Charlotte, North Carolina); it is also available nationwide on satellite via DirecTV.
History
When the Montreal Expos relocated to Washington, D.C., in 2004 to begin play as the Nationals in 2005, issues arose regarding television rights for the new franchise. The Orioles have had a sizable following in the Washington area since moving from St. Louis in 1954, and have claimed Washington as part of their home territory since the second Washington Senators franchise became the Texas Rangers in 1972. Since at least 1981, Major League Baseball had designated the Orioles' television territory as extending from Harrisburg to Charlotte. The Orioles agreed to share their home territory with the Nationals in return for the ability to air Nationals games on the Orioles' planned regional sports network, to be named the Mid-Atlantic Sports Network. Major League Baseball, which owned the Expos-Nationals franchise from 2002 to 2006, paid the Orioles $75 million for a 10% stake in MASN, with the Orioles maintaining a controlling interest of 90%. As part of the deal, the Nationals' stake in the network would increase by one percent per year to 33% over 23 years, at which point the increases would cease and ownership would be fixed at 67% Orioles and 33% Nationals. Under the arrangement, MASN paid the Nationals $20 million to broadcast their games in 2005, and were bound to renegotiate the amount they paid the Nationals based on the fair market value of the Nationals′ broadcast rights in 2012 and once every five years thereafter. With this settled, the Mid-Atlantic Sports Network launched on April 4, 2005.
The family of Lerner Enterprises founder Ted Lerner subsequently became part-owners in MASN after their purchase of the Washington Nationals in July 2006. The same month that the Lerners acquired minority interest in MASN, the network, which originally broadcast only during Orioles and Nationals games, converted into a 24-hour channel with an expanded roster of collegiate sports events and local and national programming. It has become a strong competitor to the area's dominant regional sports network, Comcast SportsNet Mid-Atlantic, now known as Monumental Spo |
https://en.wikipedia.org/wiki/Jerrold%20Electronics | Jerrold Electronics was an American provider of cable television equipment, including subscriber converter boxes, distribution network equipment (amplifiers, multitap outlets), and headend equipment in the United States.
History
The company was founded by future Pennsylvania governor Milton Jerrold Shapp (the company name was derived from his middle name) in 1950. The company was one of the earliest pioneers of community antenna television systems (cable television). The company headquarters was located at 401 Walnut Street in Philadelphia, Pennsylvania.
Shapp sold the company to General Instrument in 1967. However, the Jerrold brand name continued to be used on equipment into the 1990s.
In the late 1990s, the Jerrold name went out of use, and General Instrument merged with Motorola becoming the Motorola Connected Home Solutions division. Motorola Connected Home Solutions was acquired by Arris in 2012. The equipment was popular with many cable pirates by then and by 2005, most cable companies have discontinued use of Jerrold equipment in favor of digital cable.
See also
Cable television in the United States
Keneth Alden Simons
Notes
References
There are a number of sources available covering the history of Jerrold and the cable industry as a whole.
Parsons, P. Blue Skies: A History of Cable Television Temple University Press, 2008
Extensive history
Stubbs, G. From workhorse to icon. The 704 Jerrold Field Strength Meter CED Magazine, November/December 2004, p. 42
History of one notable instrument
Taylor, A.S. History Between Their Ears: Recollections of Pioneer CATV Engineers The Cable Center, 2000
Histories of key engineering staff involved
External links
NCTA (National Cable & Telecommunications Association) History of Cable Television. Washington, DC 2001
Brief narrative history
United States: Cable Television The Museum of Broadcast Communications 2001
Extensive, well documented
Young, C. ''RFMD. CATV Hybrid Amplifier Modules: Past, Present, Future’’ (RFMD Greensboro 2009)
History of CATV amplifier development
1950 establishments in Pennsylvania
2012 establishments in Pennsylvania
American companies established in 1950
Electronics companies established in 1950
Companies disestablished in 2012
Cable television in the United States
Defunct companies based in Pennsylvania
Companies based in Philadelphia
Electronics companies of the United States |
https://en.wikipedia.org/wiki/Literal%20pool | In computer science, and specifically in compiler and assembler design, a literal pool is a lookup table used to hold literals during assembly and execution.
Multiple (local) literal pools are typically used only for computer architectures that lack branch instructions for long jumps, or have a set of instructions optimized for shorter jumps. Examples of such architectures include the IBM System/360 and its successors, which had a number of instructions which took 12-bit address offsets. In this case, the compiler would create a literal table on every 4K page; any branches whose target was less than 4K bytes away could be taken immediately; longer branches required an address lookup via the literal table. The entries in the literal pool are placed into the object relocation table during assembly, and are then resolved at link edit time.
The ARM architecture also makes use of multiple local pools, as does AArch64, the 64-bit extension to the original ARM.
Another architecture making use of multiple local pools is C-SKY, a 32-bit architecture designed for embedded SoCs.
In certain ways, a literal pool resembles a TOC or a global offset table (GOT), except that the implementation is considerably simpler, and there may be multiple literal tables per object.
Perhaps the most common type of literal pool are the literal pools used by the LDR Rd,=const pseudo-instruction in ARM assembly language
and similar instructions in IBM System/360 assembly language,
which are compiled to a LOAD with a PC-relative addressing mode and the constant stored in the literal pool.
On the IBM S/390 and zSeries architecture, the GNU assembler, "as" (which is invoked during the gcc build process) will use general-purpose register R13 to store a pointer to the literal pool.
Often some particular constant value will be used multiple times in a program.
Many linkers, by default, store each unique constant once, in a single combined literal pool; that improves code size.
The Java virtual machine has a "string literal pool" and a "class constant pool".
References
Compiler construction |
https://en.wikipedia.org/wiki/A%20Star%20Is%20Torn | "A Star Is Torn" is the eighteenth episode of the sixteenth season of the American animated television series The Simpsons. It first aired on the Fox network in the United States on May 8, 2005. Fantasia Barrino guest stars as Clarissa Wellington.
Plot
After being unable to shop at the Kwik-E-Mart because it is being held up, Lisa suggests the Simpsons have a vegetarian meal with ingredients purchased from a nearby stall, which they enjoy until Bart, Homer, Marge, and Maggie feel queasy and begin vomiting. Because she is a vegetarian, Lisa is immune to the "vitamins, minerals, and trace amounts of bug feces". Lisa points out that the rest of them are so used to processed foods that their bodies were not prepared for organic foods. As the family sits on the couch, wrapped in blankets, Lisa feeds them dry toast, and gently sings them to sleep with the "Hush, Little Baby" song. The next morning, the family is feeling better, eating fried chicken while watching TV. They see Krusty make an endorsement for his "Li'l Starmaker" competition, a children's American Idol-style competition where the winner shall be animated in an episode of Itchy & Scratchy. Bart convinces Lisa to enter because he believes she has a great voice.
At the competition, another child (played by guest star Fantasia Barrino) sings a fancy version of Lisa's planned song, "Hush, Little Baby", which is declared by Bart to sound like "Whitney Houston brought to life". Lisa starts to panic, but Homer comes to her rescue by going to the nearby piano store and writing a song for her to sing. She sings the song, "I'm Talking Springfield", which praises Springfield (except Ned Flanders), delighting the crowd. Soon, the competition enters its knockout stages. Homer, now Lisa's manager, starts using every means at his disposal to make Lisa feel comfortable. He even gets her the right spotlight by beating up the technician.
The competition progresses and contestants are eliminated, with Paul Simon disqualified after posing as a 10-year-old, leaving just fan favorites Cameron and Lisa in the final to take place the next week. However, Homer's aggressive treatment of staff at the competition makes Lisa mad. As a result, Lisa fires him as her manager, causing him to be upset. Later that night, as the rest of the family eat dinner, Homer enters to announce that he has become Cameron's manager. Lisa is sad that Homer is upset with her.
During the competition final, Lisa sings a song that she has written herself, called "Always My Dad", dedicated to Homer. The song expresses how much she loves her dad, and how sorry she is for hurting him. After she finishes, everyone loves it. Cameron, now restyled by Homer as "Johnny Rainbow", then sings a rather condescending song called "Privileged Boy" that Homer wrote, the lyrics of which say how much better he is than everyone else. The audience boos Cameron and throw tomatoes at him, and he flees the stage in disgrace. Lisa is thrilled that Homer sabotag |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.