source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/Thank%20God%2C%20It%27s%20Doomsday
"Thank God, It's Doomsday" is the nineteenth episode of the sixteenth season of the American animated television series The Simpsons. It first aired on the Fox network in the United States on May 8, 2005. Al Jean claims that the recorded commentary for this episode was the last time he saw Don Payne, the writer credited for the episode. Plot Marge tries to cut the kids hair at home, but is stopped when Homer takes them to get haircuts at a new barbershop in the mall. The kids' haircuts are done so badly, that they hide with Homer in a movie theater showing the film Left Below, a parody of Left Behind: The Movie. In response to the kids losing their hair, Marge later makes them wigs using the leftover hair trimmings. Homer now fears that the Rapture will soon be coming. Despite being consoled by Marge and Lisa (who think God would not end the world unless He announced it), Homer encounters signs suggestive of the Rapture. He uses numerology to calculate the date and time of the Rapture and concludes that it is only a week away. Homer predicts that "stars will fall from the sky", then a blimp accident at the Krusty Celebrity Salute to Specials causes some celebrities (or "stars") to fall to their deaths. His prophecy causes many of Springfield's residents to believe that the world will end and they go with him to the Springfield Mesa to wait for the Rapture. A few hours pass without incident, and the people go home. All of them are annoyed at Homer, particularly Moe, who had sold his tavern to be converted to a Japanese sushi bar. Homer goes home and realizes that he has made an error in his calculation, so he returns to the Mesa with no support after getting ostracized by his family. Suddenly, he finds himself naked and ascending into Heaven. Homer arrives in Heaven, where he is greeted by the tour guide who shows him around. He is then shown to his room where he requests to see his family on the big TV screen in his room. Marge and the children are shown being tormented by the devil. He has a talk with God about saving his family. When God refuses to help, due to Jesus' suffering on Earth, Homer becomes angry. He runs around vandalizing Heaven and gets stopped by security. God finally agrees to undo the Rapture by turning back time. Homer later wakes up on the mesa and is reunited with his family, also discovering Moe's Tavern to curiously be back in its normal set up. Reception Don Payne was nominated for a Writers Guild of America Award for Outstanding Writing in Animation at the 58th Writers Guild of America Awards for his script to this episode. Cultural references The title is a reference to the popular saying "thank God it's Friday". The "Left Below" film watched by Homer, Bart and Lisa is a pastiche of the Left Behind franchise. Homer says that the movie Cannonball Run 2 haunted him for the rest of his life. In the final scene, Homer, his fellow bar patrons, and Moe form a tableau of The Last Supper. References External links 20
https://en.wikipedia.org/wiki/Heroes%20of%20Might%20and%20Magic%20II
Heroes of Might and Magic II: The Succession Wars is a turn-based strategy video game developed by Jon Van Caneghem through New World Computing and published in 1996 by the 3DO Company. The game is the second instalment of the Heroes of Might and Magic series and is typically credited as the breakout game for the series. Heroes II was voted the sixth-best PC game of all time by PC Gamer in May 1997. An expansion pack, The Price of Loyalty, was released in 1997. Later, 3DO bundled Heroes II and its expansion pack in one box, released as Heroes of Might and Magic II Gold in 1998. Gameplay For the most part, Heroes of Might and Magic II is largely a graphical overhaul to the first game. Gameplay in both games is along the 4X genre of strategy games, in that the player builds their kingdom from the ground up, securing resources, stronger armies, better generals, and then uses those assets to find and defeat opponents through capturing their castles and defeating their armies. Aside from the updated look, Heroes II added many new features that would become staples in the Heroes of Might and Magic franchise. Heroes II added the Necromancer and Wizard factions, joining the original four factions (Knight, Barbarian, Sorceress, and Warlock) from the first game. These two new factions also come with an army of creatures and a themed town that ties the faction together, and the six are divided down the middle to have 3 "good" and 3 "evil" factions. Each hero still retains the 'primary skill' system from Heroes I but now can also learn secondary skills, giving each hero the ability to become more distinctive as they gain experience. Each hero can possess up to eight different secondary skills and once gained, a skill can be developed from Basic to Advanced and Expert levels. For example, the Wisdom skill allows a hero to learn spells of level 3 and higher, while the Logistics skill increases the hero's movement ability over land. In Heroes I, heroes had a single, fixed special ability according to their class. The magic system was overhauled in Heroes II. Heroes I had used a memorization system in which each spell could be cast a certain number of times before being exhausted, where the player had to return to a guild to relearn the spell. Heroes II uses a magic point system that allows the player to apportion spell use as needed, while the varying point cost of different spells maintains balance. Another major feature introduced in Heroes II is the ability to upgrade certain army units, granting them improved statistics and, in some cases, important abilities. In order to play, players guide around their heroes and have them fight other ones and castles. People have full control over their castles, what to build in them, and whether to upgrade a town to a castle. People can only upgrade each castle once per turn. Lastly, Heroes II added more scenarios to the game and a proper campaign, where the player chooses the good or evil side and plays a series
https://en.wikipedia.org/wiki/Optical%20Carrier%20transmission%20rates
Optical Carrier transmission rates are a standardized set of specifications of transmission bandwidth for digital signals that can be carried on Synchronous Optical Networking (SONET) fiber optic networks. Transmission rates are defined by rate of the bitstream of the digital signal and are designated by hyphenation of the acronym OC and an integer value of the multiple of the basic unit of rate, e.g., OC-48. The base unit is 51.84 Mbit/s. Thus, the speed of optical-carrier-classified lines labeled as OC-n is n × 51.84 Mbit/s. Optical Carrier specifications Optical Carrier classifications are based on the abbreviation OC followed by a number specifying a multiple of 51.84 Mbit/s: n × 51.84 Mbit/s => OC-n. For example, an OC-3 transmission medium has 3 times the transmission capacity of OC-1. OC-1 OC-1 is a SONET line with transmission speeds of up to 51.84 Mbit/s (payload: 50.112 Mbit/s; overhead: 1.728 Mbit/s) using optical fiber. OC-3 OC-3 is a network line with transmission data rate of up to 155.52 Mbit/s (payload: 148.608 Mbit/s; overhead: 6.912 Mbit/s, including path overhead) using fiber optics. Depending on the system OC-3 is also known as STS-3 (electrical level) and STM-1 (SDH). OC-3c / STM-1 (c stands for "concatenated") concatenates three STS-1 (OC-1) frames into a single OC-3 look alike stream. The three STS-1 (OC-1) streams interleave with each other so that the first column is from the first stream, the second column is from the second stream, and the third is from the third stream. Concatenated STS (OC) frames carry only one column of path overhead because they cannot be divided into finer granularity signals. Hence, OC-3c can transmit more payload to accommodate a CEPT-4 139.264 Mbit/s signal. The payload rate is 149.76 Mbit/s and overhead is 5.76 Mbit/s. OC-12 / STM-4 is a network line with transmission speeds of up to 622.08 Mbit/s (payload: 601.344 Mbit/s; overhead: 20.736 Mbit/s). OC-12 lines are commonly used by ISPs as wide area network (WAN) connections. While a large ISP would not use an OC-12 as a backbone (main link), it would for smaller, regional or local connections. This connection speed is also often used by mid-sized (below Tier 2) internet customers, such as web hosting companies or smaller ISPs buying service from larger ones. OC-24 is a network line with transmission speeds of up to 1244.16 Mbit/s (payload: 1202.208 Mbit/s (1.202208 Gbit/s); overhead: 41.472 Mbit/s). Implementations of OC-24 in commercial deployments are rare. OC-48 / STM-16 / 2.5G SONET is a network line with transmission speeds of up to 2488.32 Mbit/s (payload: 2405.376 Mbit/s (2.405376 Gbit/s); overhead: 82.944 Mbit/s). With relatively low interface prices, with being faster than OC-3 and OC-12 connections, and even surpassing gigabit Ethernet, OC-48 connections are used as the backbones of many regional ISPs. Interconnections between large ISPs for purposes of peering or transit are quite common. As of 2005, the only conn
https://en.wikipedia.org/wiki/Autocoder
Autocoder is any of a group of assemblers for a number of IBM computers of the 1950s and 1960s. The first Autocoders appear to have been the earliest assemblers to provide a macro facility. Terminology Both autocoder, and the unrelated autocode, a term of the same era used in the UK for languages of a higher level, derive from the phrase automatic coding. This referred generally to programs which eased the burden of producing the numeric machine language codes of programs. "Autocoding" is seen occasionally, and can refer to any kind of programming system. In some circles "autocoder" could be used generically to refer to what is now called a macro-assembler. History The first Autocoders were released in 1955 for the IBM 702, and in 1956 for the almost compatible IBM 705. They were designed by Roy Goldfinger who earlier had worked on New York University's (NYU) NYAP assembler. These machines were variable word length commercial machines, as were many of the computers for which an Autocoder was released. Besides the 702 and 705, there eventually also were Autocoders for the IBM 1410 and 7010, IBM 7030 (Stretch), 7070/7072/7074, IBM 7080, and the IBM 1400 series. Autocoder as implemented on the IBM 1401 Symbolic Programming System (SPS), was the assembler offered when IBM originally announced 1401 as a punched-card-only computer. SPS had different mnemonics and a different fixed input format from Autocoder. It lacked Autocoder's features and was generally used later only on machines that lacked tape drives, that is, punched-card only. 1401 Autocoder is the most well known Autocoder, undoubtedly due in part to the general success of that series of machines. Autocoder was the primary language of this computer, and its macro capabilities facilitated use of the Input/Output Control System which eased the programming burden. Autocoder also had the ability to process code written for SPS. The 1401 was available in six memory configurations, with 1400, 2000, 4000, 8000, 12000, or 16000 six-bit characters. The 8000-character model was the minimum needed to run the full Autocoder assembler application, including IOCS. However a language subset assembler was available for use with as little as 1400 memory positions. A loadable object file, on punched cards or magnetic tape, could be produced on an 8000-character model which could then be run on a 4000-character machine. The limited language subset only processed punched cards and required 4 passes with intermediate punched card outputs. Influence The popularity of Autocoder inspired other assemblers. ‘’Easycoder’’ for the Honeywell 200, a computer similar to the 1401, resembled Autocoder. Other manufacturers sometimes built competing products, such as NCR's "National's Electronic Autocoder Technique" (NEAT). The Pennsylvania State University developed a "Dual Autocoder Fortran Translator" (DAFT) compiler for the IBM 7074 in the 1960s which made it extremely easy to write (within a single p
https://en.wikipedia.org/wiki/West%20Virginia%20Basic%20Skills%20Computer%20Program
The West Virginia Basic Skills/Computer Education Program is a program of the West Virginia Department of Education. Its goals are to improve basic literacy and arithmetic skills in addition to computer ability. Education in West Virginia
https://en.wikipedia.org/wiki/Computerworld%20Smithsonian%20Award
The Computerworld Smithsonian Award is given out annually to individuals who have used technology to produce beneficial changes for society. Nominees are proposed by a group of 100 CEOs of information technology companies. The award has been given since 1989. Winners 1989 1989 - Inaugural winners, all listed: Bell & Howell's Image Plus Search System; Orangeburg School District 5, Orangeburg, South Carolina; Passaic River Basin Early Flood Warning System, Sierra-Micro Inc.; FIX and FAST, Fidelity Investments; The Missing Children Project, Larry Magid, founder of SafeKids.com and SafeTeens.com, University of Illinois; BI Home Escort System; University of Iowa's National Advanced Driving Simulator; Live Aid, Uplinger Enterprise; The Eyegaze Computer, LC Technologies; American Airlines SABRE Reservation Service; The Innovis DesignCenter. 1992 1992 — A Search for New Heroes 1993 1993 — Pittsburgh Supercomputing Center, a joint project of Carnegie Mellon University and the University of Pittsburgh together with Westinghouse Electric Corporation, established in 1986 by a grant from the National Science Foundation with support from the Commonwealth of Pennsylvania. Its purpose is to develop and make available state-of-the-art high-performance computing for scientific researchers nationwide. 1994 1994 — LOS ALAMOS NATIONAL LABORATORY Parallel Ocean Program (POP) 1995 1995 — NEW YORK STOCK EXCHANGE, INC. Integrated Technology Plan 1996 1996 — Carnegie Mellon FastLab, a multi-university real time financial trading simulator, for visionary use of information technology in the field of education and academia. 1997 1997 — METROPOLITAN TORONTO POLICE, the "Metropolis" program, for technology innovations in policing, including the Computer Aided Dispatch (CAD) system, the automated 911 Emergency Response System, the Computer-Aided Scheduling of Courts system, the Repository of Integrated Computer Images (mugshot) system, the Criminals Information Processing System, the Computer Assisted Reconstruction Enhancement System, and many others 1998 1998 — UNIVERSITY OF CALIFORNIA, BERKELEY'S SEARCH FOR EXTRATERRESTRIAL INTELLIGENCE (SETI) PROGRAM 1998 - William E. Kelvie, Fannie Mae, the first internet originated mortgage 1998 - Mark R. Basile, Incredible Card Corporation, digital biometric emergency health security and retrieval system 1998 - Home Automated Living, Tim Shriver, voice-activated home automation control software 1999 1999 — Virtual Operating Room 2000 2000 — EBay, Montgomery County Public Schools, Department of Primary Industry and Fisheries, Proton World, Independent Electoral Commission of South Africa, Danfoss Drives, National Marrow Donor Program, RealNetworks, Hawkes Ocean Technology, Delta Air Lines, Blackboard Inc., ROGER MAHABIR, CIO, ROYAL BANK OF CANADA DOMINION SECURITIES for advanced internet security techniques support the buying and selling of foreign currencies over the internet, supporting billions of dol
https://en.wikipedia.org/wiki/Computerworld
Computerworld (abbreviated as CW) is an ongoing decades-old professional publication which in 2014 "went digital." Its audience is information technology (IT) and business technology professionals, and is available via a publication website and as a digital magazine. As a printed weekly during the 1970s and into the 1980s, Computerworld was the leading trade publication in the data processing industry. Based on circulation and revenue it was one of the most successful trade publications in any industry. Later in the 1980s it began to lose its dominant position. It is published in many countries around the world under the same or similar names. Each country's version of Computerworld includes original content and is managed independently. The parent company of Computerworld US is IDG Communications. History The publication was launched in 1967 by International Data Group in Boston, whose founder was Patrick J. McGovern. Going international The company IDG offers the brand "Computerworld" in 47 countries worldwide, the name and frequency differ slightly though. When IDG established the Swedish edition in 1983 i.e., the title "Computerworld" was already registered in Sweden by another publisher. This is why the Swedish edition is named . The corresponding German publication is called (which translates to "computer week") instead. Computerworld was distributed as a morning newspaper in tabloid format (41 cm) in 51,000 copies (2007) with an estimated 120,000 readers. From 1999 to 2008, it was published three days a week, but since 2009, it was published only on Tuesdays and Fridays. Going digital In June 2014, Computerworld US abandoned its print edition, becoming an exclusively digital publication. In July 2014, the publisher started the monthly Computerworld Digital Magazine. In 2017 it published features and stories highlighting the magazine's history on the fiftieth anniversary. Computerworlds website first appeared in 1996. Ongoing Computerworld US serves IT and business management with coverage of information technology, emerging technologies and analysis of technology trends. Computerworld also publishes several notable special reports each year, including the 100 Best Places to Work in IT, IT Salary Survey, the DATA+ Editors' Choice Awards and the annual Forecast research report. Computerworld in the past has published stories that highlight the effects of immigration to the U.S. (e.g. the H-1B visa) on software engineers. Staff The executive editor of Computerworld in the U.S. is Ken Mingis, who leads a small staff of editors, writers and freelancers who cover a variety of enterprise IT topics (with a concentration on Windows, Mobile and Apple/Enterprise). See also Patrick Joseph McGovern References Further reading External links 1967 establishments in the United States 1983 establishments in Norway 1983 establishments in Sweden Defunct computer magazines published in the United States International Data Group Magazines
https://en.wikipedia.org/wiki/Thiloa
Thiloa is a genus of the plant family Combretaceae. Species include: Thiloa colombiana Thiloa glaucocarpa Thiloa gracilis Thiloa inundata Thiloa nitida Thiloa paraguariensis Thiloa schultzei Thiloa stigmaria Combretaceae Myrtales genera
https://en.wikipedia.org/wiki/SQR
SQR (Hyperion SQR Production Reporting, Part of OBIEE) is a programming language designed for generating reports from database management systems. The name is an abbreviation of Structured Query Reporter, which suggests its relationship to SQL (Structured Query Language). Any SQL statement can be embedded in an SQR program. History In the early 80's SQR was a 'free' add-on to Gupta's SQLBase. At the time SQLBase was the only relational database that ran on IBM PCs (x86) machines. SQR was written by Israel Stern in Cleveland, Ohio, probably around 1984 or 1985. SQ Software created SQR in the mid 1980s. It had a marketing agreement with D & N Systems, which changed its name to SQL Solutions and was later acquired by Sybase Inc in the early 1990s. To avoid competing directly with Oracle Corporation, Sybase had a marketing and development agreement with MITI for the Oracle database compatible versions of SQR. MITI acquired the full rights to SQR in the mid-1990s. MITI changed its name to SQRiBE Technologies in 1997. Brio Technology acquired SQRiBE in August, 1999. Brio Technology later changed its name to Brio Software. Brio licensed its source code to PeopleSoft Inc. sometime around 2000. Hyperion Solutions Corporation acquired Brio Software in October, 2003. Oracle Corporation acquired PeopleSoft in December, 2004. In March 2007, Oracle Corporation acquired Hyperion Solutions. SQR-Related Products ORACLE: Hyperion SQR Production Reporting - System 9 (Release 9.3.1, 2008); ORACLE: Hyperion SQR Production Reporting - System 11 (Release 11.1.2, 2010); ORACLE: PeopleSoft Enterprise Tools & Technology (PeopleTools, Release 8.52, 2011) General Components SQR Server SQR Viewer SQR Print SQR Execute SQR Workbench for Windows; SQR Developer Features SQR is notable for its database and printing functions. It can embed any SQL statement almost anywhere in a program. One configuration of SQR can access multidimensional databases such as Essbase. It can combine database reads with print instructions, flexibly format data and page breaks, and print variable fonts, sizes, and colors. SQR contains a graph generation command that offers dozens of parameters for adjusting content and appearance. Syntax SQR has four scalar data types. The first three are numeric (variables begin with “#”), character string (variables begin with “$”), and date (variables begin with “$”, same as with character string variables.). Date variables must be declared, to be distinguished from character string variables. Numeric variables may be of more specific types: integer, floating point,...). Database column variables begin with “&”. The values of database columns are set only by a SQL “select” statement; no other command can change their values. SQR has an array data structure. An array has one or more fields, each of one of the available types. Each field may have multiple occurrences, giving SQR the equivalent of two-dimensional arrays. SQR has comman
https://en.wikipedia.org/wiki/Dynamic%20Data%20Exchange
In computing, Dynamic Data Exchange (DDE) is a technology for interprocess communication used in early versions of Microsoft Windows and OS/2. DDE allows programs to manipulate objects provided by other programs, and respond to user actions affecting those objects. DDE was partially superseded by Object Linking and Embedding (OLE), and is currently maintained in Windows systems only for the sake of backward compatibility. History and architecture Dynamic Data Exchange was first introduced in 1987 with the release of Windows 2.0 as a method of interprocess communication so that one program could communicate with or control another program, somewhat like Sun's RPC (Remote Procedure Call). At the time, the only method for communication between the operating system and client applications was the "Windows Messaging Layer." DDE extended this protocol to allow peer-to-peer communication among client applications, via message broadcasts. Because DDE runs via message broadcasts, it is vulnerable to any window-management code that does not pump messages. This problem was not considered during the design of DDE, because DDE predates pre-emptive multitasking. Moreover, any code managing a window handle can respond to a DDE broadcast; the initiator of DDE must distinguish between expected and unexpected responses. DDE interlocutors usually express what information they seek in terms of hierarchical string keys. For example, a cell in Microsoft Excel was known to DDE by its "application" name. Each application could further organize information by groups known as "topic" and each topic could serve up individual pieces of data as an "item". For example, if a user wanted to pull a value from Microsoft Excel which was contained in a spreadsheet called "Book1.xls" in the cell in the first row and first column, the application would be "Excel", the topic "Book1.xls" and the item "r1c1". Internal changes in the cell due to Excel actions would then be signaled (in reverse) to the calling application via additional message broadcasts. Relationship to modern automation technologies The common use of DDE is for custom-developed applications to control off-the-shelf software. For example, a custom in-house application might use DDE to open a Microsoft Excel spreadsheet and fill it with data, by opening a DDE conversation with Excel and sending it DDE commands. This feature has mainly been superseded by the Component Object Model suite of technologies. Microsoft has not used DDE internally since the release of Windows 95. For example, Excel now exposes an extensive OLE Automation object model, which is the recommended method for communicating with Excel. The technique is, however, still in use, particularly for distribution of financial data. Because DDE does not require more operating system components than a conventional Windows GUI program, it is also a [little-used] alternative for programs seeking to minimize their dependencies. NetDDE Wonderwa
https://en.wikipedia.org/wiki/BLIS/COBOL
BLIS/COBOL is a discontinued operating system that was written in COBOL. It is the only such system to gain reasonably wide acceptance. It was optimised to compile business applications written in COBOL. BLIS was available on a range of Data General Nova and Data General Eclipse 16-bit minicomputers. It was marketed by Information Processing, Inc. (IPI), who regularly exhibited the product at the National Computer Conference in the 1970s and 80s. It was priced between US$830 and $10,000 depending on the number of supported users and features. In 1977, IPI boasted over 100 operational installations of the system worldwide. By 1985, a version for the IBM PC existed called PC-BLIS. Originally, most operating systems were written in assembly language for a particular processor or family of processors. Non-assembler operating systems were comparatively slow, but were easier for revision and repair. One of the reasons for the C programming language's low-level features, which resemble assembly language in some ways, is an early intent to use it for writing operating systems. Similar goals led to IBM's development of PL/S. The high-level nature of COBOL, which created some problems for operating system development, was partially addressed in BLIS, since it was deliberately optimized for COBOL. References Discontinued operating systems COBOL Assembly language software
https://en.wikipedia.org/wiki/MonetDB
MonetDB is an open-source column-oriented relational database management system (RDBMS) originally developed at the Centrum Wiskunde & Informatica (CWI) in the Netherlands. It is designed to provide high performance on complex queries against large databases, such as combining tables with hundreds of columns and millions of rows. MonetDB has been applied in high-performance applications for online analytical processing, data mining, geographic information system (GIS), Resource Description Framework (RDF), text retrieval and sequence alignment processing. History Data mining projects in the 1990s required improved analytical database support. This resulted in a CWI spin-off called Data Distilleries, which used early MonetDB implementations in its analytical suite. Data Distilleries eventually became a subsidiary of SPSS in 2003, which in turn was acquired by IBM in 2009. MonetDB in its current form was first created in 2002 by doctoral student Peter Boncz and professor Martin L. Kersten as part of the 1990s' MAGNUM research project at University of Amsterdam. It was initially called simply Monet, after the French impressionist painter Claude Monet. The first version under an open-source software license (a modified version of the Mozilla Public License) was released on September 30, 2004. When MonetDB version 4 was released into the open-source domain, many extensions to the code base were added by the MonetDB/CWI team, including a new SQL front end, supporting the SQL:2003 standard. MonetDB introduced innovations in all layers of the DBMS: a storage model based on vertical fragmentation, a modern CPU-tuned query execution architecture that often gave MonetDB a speed advantage over the same algorithm over a typical interpreter-based RDBMS. It was one of the first database systems to tune query optimization for CPU caches. MonetDB includes automatic and self-tuning indexes, run-time query optimization, and a modular software architecture. By 2008, a follow-on project called X100 (MonetDB/X100) started, which evolved into the VectorWise technology. VectorWise was acquired by Actian Corporation, integrated with the Ingres database and sold as a commercial product. In 2011 a major effort to renovate the MonetDB codebase was started. As part of it, the code for the MonetDB 4 kernel and its XQuery components were frozen. In MonetDB 5, parts of the SQL layer were pushed into the kernel. The resulting changes created a difference in internal APIs, as it transitioned from MonetDB Instruction Language (MIL) to MonetDB Assembly Language (MAL). Older, no-longer maintained top-level query interfaces were also removed. First was XQuery, which relied on MonetDB 4 and was never ported to version 5. The experimental Jaql interface support was removed with the October 2014 release. With the July 2015 release, MonetDB gained support for read-only data sharding and persistent indices. In this release the deprecated streaming data module DataCell was also remo
https://en.wikipedia.org/wiki/MTV%20Global
MTV Global (formerly MTV Europe) is the international version of the American TV channel MTV as 24-hour music video and entertainment pay television network officially launched on 1 August 1987 as part of the worldwide MTV network. Initially, MTV served all regions of Europe, being one of the few TV channels focused on the entire European market. At the moment, MTV serves a number of European countries, African, Asian, Oceanian, Middle Eastern and Caribbean territories. Over the years, MTV Global has been divided into many different channels for certain countries. Most countries in Europe, Asia, Oceania, Latin America and the Caribbean now have their own versions of the channel, and therefore MTV Global is now mostly available in those countries where there is no localized version of MTV. History On 1 August 1987 at 00:01 BST, MTV Europe officially launched with an Elton John concert in Amsterdam at the Roxy Club marked in conjunction with MTV, as a commemoration of its sixth anniversary. The first video clip shown on the air was "Money for Nothing" by Dire Straits. Moreover, the beginning and end of the clip were supplemented with the slogan "I want my MTV", voiced by Sting. The initiator of the launch of MTV in Europe was Robert Maxwell. Then his company Robert Maxwell Group with British Telecom and Viacom (the copyright holder of the "MTV" brand) in joint cooperation, created the MTV Europe TV channel. The office was located in London at 40 Conduit St. The channel was launched in the United Kingdom, Denmark, Finland, the Netherlands and Sweden; a year later MTV Europe expanded to West Germany, Belgium, Switzerland, Greece and Norway. The channel was immediately accepted into 1.6 million households. The original line-up of VJs included presenters from Belgium, Denmark and France, as well as Ray Cokes and Steve Blame from the UK. Since that time, MTV has popularized the use of the term VJ to describe their profession. At that time, such programs as MTV's Greatest Hits, Headbanger's Ball, MTV's Most Wanted, The Big Picture (a program about cinema), The Pulse (about fashion and style), 120 Minutes and MTV Coca-Cola Report (music news, interviews and tour dates of musicians) were produced. In February 1988, MTV Europe moved to the Camden Town area at 20-23 Mandela St. In October of the same year, the management of MTV Europe visited the Soviet Union for preliminary negotiations on the start of work. At the same time, an application for registration of the TV channel was submitted. In 1989, MTV Europe covered the Moscow Music Festival live from the Lenin Stadium. At the same time, the TV channel started in East Berlin, East Germany. Soviet artists officially debuted on MTV in the summer of 1989. The Moscow group "Cruise" released the Hit for MTV manifesto song at the same time. In February 1990, MTV Europe was launched in Poland and Czechoslovakia. In the same year, Viacom bought 25% of MTV Europe's shares from British Telecom. In early 1
https://en.wikipedia.org/wiki/Data%20mapping
In computing and data management, data mapping is the process of creating data element mappings between two distinct data models. Data mapping is used as a first step for a wide variety of data integration tasks, including: Data transformation or data mediation between a data source and a destination Identification of data relationships as part of data lineage analysis Discovery of hidden sensitive data such as the last four digits of a social security number hidden in another user id as part of a data masking or de-identification project Consolidation of multiple databases into a single database and identifying redundant columns of data for consolidation or elimination For example, a company that would like to transmit and receive purchases and invoices with other companies might use data mapping to create data maps from a company's data to standardized ANSI ASC X12 messages for items such as purchase orders and invoices. Standards X12 standards are generic Electronic Data Interchange (EDI) standards designed to allow a company to exchange data with any other company, regardless of industry. The standards are maintained by the Accredited Standards Committee X12 (ASC X12), with the American National Standards Institute (ANSI) accredited to set standards for EDI. The X12 standards are often called ANSI ASC X12 standards. The W3C introduced R2RML as a standard for mapping data in a relational database to data expressed in terms of the Resource Description Framework (RDF). In the future, tools based on semantic web languages such as RDF, the Web Ontology Language (OWL) and standardized metadata registry will make data mapping a more automatic process. This process will be accelerated if each application performed metadata publishing. Full automated data mapping is a very difficult problem (see semantic translation). Hand-coded, graphical manual Data mappings can be done in a variety of ways using procedural code, creating XSLT transforms or by using graphical mapping tools that automatically generate executable transformation programs. These are graphical tools that allow a user to "draw" lines from fields in one set of data to fields in another. Some graphical data mapping tools allow users to "auto-connect" a source and a destination. This feature is dependent on the source and destination data element name being the same. Transformation programs are automatically created in SQL, XSLT, Java, or C++. These kinds of graphical tools are found in most ETL (extract, transform, and load) tools as the primary means of entering data maps to support data movement. Examples include SAP BODS and Informatica PowerCenter. Data-driven mapping This is the newest approach in data mapping and involves simultaneously evaluating actual data values in two data sources using heuristics and statistics to automatically discover complex mappings between two data sets. This approach is used to find transformations between two data sets, discovering substring
https://en.wikipedia.org/wiki/Neutral%20Internet%20Exchange%20of%20the%20Czech%20Republic
The Neutral Internet eXchange of the Czech Republic (NIX.CZ) associates Internet Service Providers in the Czech Republic with the objective of interconnecting their networks. The memorandum of association was signed on August 30, 1996. The association was registered by the District Council for Prague 6 on October 1, 1996 under company registration number 65990471. Its statutory body is a three-member Board of directors. Under its articles of association, the highest body of the association is the general meeting. The association is an active member of Euro-IX. The association has constructed an internet exchange point in Prague, the Czech Republic, which interconnects the Internet networks of the individual providers, both association members and external customers, and allows IPv4 and IPv6 peering currently in five independent locations, Points of Presence. NIX.SK In 2015 NIX.CZ acquired SITELiX in Bratislava, Slovakia, and since then operate it as NIX.SK. See also List of Internet exchange points References External links Official website, nix.cz Traffic statistics NIX.CZ in the Public Register of the Czech republic, justice.cz Internet exchange points in the Czech Republic Internet in the Czech Republic
https://en.wikipedia.org/wiki/Monochromatic%20triangle
In graph theory and theoretical computer science, the monochromatic triangle problem is an algorithmic problem on graphs, in which the goal is to partition the edges of a given graph into two triangle-free subgraphs. It is NP-complete but fixed-parameter tractable on graphs of bounded treewidth. Problem statement The monochromatic triangle problem takes as input an n-node undirected graph G(V,E) with node set V and edge set E. The output is a Boolean value, true if the edge set E of G can be partitioned into two disjoint sets E1 and E2, such that both of the two subgraphs G1(V,E1) and G2(V,E2) are triangle-free graphs, and false otherwise. This decision problem is NP-complete. Generalization to multiple colors The problem may be generalized to triangle-free edge coloring, finding an assignment of colors to the edges of a graph so that no triangle has all three edges given the same color. The monochromatic triangle problem is the special case of triangle-free edge-coloring when there are exactly two colors available. If there exists a two-color triangle-free edge coloring, then the edges of each color form the two sets E1 and E2 of the monochromatic triangle problem. Conversely, if the monochromatic triangle problem has a solution, we can use one color for E1 and a second color for E2 to obtain a triangle-free edge coloring. Connection to Ramsey's theorem By Ramsey's theorem, for any finite number k of colors, there exists a number n such that complete graphs of n or more vertices do not have triangle-free edge colorings with k colors. For k = 2, the corresponding value of n is 6. That is, the answer to the monochromatic triangle problem on the complete graph K6 is no. Parameterized complexity It is straightforward to express the monochromatic triangle problem in the monadic second-order logic of graphs (MSO2), by a logical formula that asserts the existence of a partition of the edges into two subsets such that there do not exist three mutually adjacent vertices whose edges all belong to the same side of the partition. It follows from Courcelle's theorem that the monochromatic triangle problem is fixed-parameter tractable on graphs of bounded treewidth. More precisely, there is an algorithm for solving the problem whose running time is the number of vertices of the input graph multiplied by a quickly-growing but computable function of the treewidth. References NP-complete problems Graph coloring
https://en.wikipedia.org/wiki/Richard%20Stearns
Richard Stearns may refer to: Richard Stearns (World Vision), president of the evangelical charity World Vision Richard E. Stearns (born 1936), American theoretical computer scientist Richard G. Stearns (born 1944), United States federal judge Richard Stearns (sailor) (born 1927), American Olympic sailor R. H. Stearns (1824–1909), tradesman, philanthropist, and politician from Massachusetts See also Richard Sterne (disambiguation) Richard Stern (disambiguation)
https://en.wikipedia.org/wiki/Center%20for%20Emerging%20Visual%20Artists
The Center for Emerging Visual Artists was founded in 1984 as Creative Artists Network (CAN) in Philadelphia, Pennsylvania, by Felicity R. "Bebe" Benoliel in an apartment at the Barclay Hotel on Rittenhouse Square. The non-profit organization serves emerging artists who live and work within 100 miles of Philadelphia, an area that includes the cities of Baltimore, MD and New York, NY, and the entire states of Delaware and New Jersey. The Center for Emerging Visual Artists provides a two-year career development program to artists accepted by the organization's board of artistic advisors. Alumni of the program include the painters Jane Golden and Vincent Desiderio, multidisciplinary artist Arlene Rush, and photographer Judy Gelles. Following the death of founder and executive director Benoliel in 2000, the organization began a process of reorganization under Antonia W. Hamilton. In 2001 Maida R. Milone, Esq. was appointed president and chief executive officer. The organization began using the name "The Center for Emerging Visual Artists" in 2004. In recent years, the organization has increased its emphasis on programs that serve the entire community, including artists, art collectors, and the general public. See also External links www.cfeva.org Culture of Philadelphia
https://en.wikipedia.org/wiki/IL%20%28network%20protocol%29
The Internet Link protocol or IL is a connection-based transport-layer protocol designed at Bell Labs originally as part of the Plan 9 operating system and is used to carry 9P. It is assigned the Internet Protocol number of 40. It is similar to TCP but much simpler. Its main features are: Reliable datagram service In-sequence delivery Internetworking using IP Low complexity, high performance Adaptive timeouts As of the Fourth Edition of Plan 9, 2003, IL is deprecated in favor of TCP/IP because it doesn't handle long-distance connections well. See also Fast Local Internet Protocol References Further reading —The original paper describing IL Inferno (operating system) Internet Protocol based network software Network protocols Plan 9 from Bell Labs Transport layer protocols
https://en.wikipedia.org/wiki/Transaction%20printing
Transaction Printing describes a mode of submitting a job to a printing device. A digital printing system is attached to a computer database and many similar pages, called forms, are printed; each, for example, with a different person's data filling the form such as a monthly telephone or cable bill. Simply stated, transaction printing is the printing of multiple transactions for each customer along with the fixed line details like name and address. This is more used in BFSI sectors, for example, bank statements. Transaction printing jobs are similar to, but often more complex than variable data printing jobs such as mail merge. Transaction printing frequently requires customized formatting to present transaction data in a printable and customer-readable format. Currently, printing applications are designed to print transactional details along with the external information (not available in the transaction database), often involving promotional material. Transaction print jobs are different from 'publishing' print jobs in that the print controller does not know when the job will end when it starts. A transactional print job may involve a hundred, a thousand, or a few million impressions. Many digital printing system's controllers are designed to ingest the entire job, arrange its resources according to the size of the job and then begin printing the job last page first so that what is produced is a 'book' with the user seeing the first page first. This 'publishing' model obviously does not work for 'transaction' printing and a controller using a different internal model for jobs must be used. References Printing
https://en.wikipedia.org/wiki/Comet%20Cursor
Comet Cursor was a software program written by Comet Systems. It allowed users of the Microsoft Windows operating system to change the appearance of their mouse cursor and to allow websites to use customized cursors for visitors. The product installed itself without user permission and is an early example of spyware. History Comet Systems was founded in 1997. Its most famous product, Comet Cursor, was released the same year for free. When installed, Comet Cursor changes a user's mouse cursor when they visit participating websites. Websites could use these cursors to display their own brands instead of standard icons. By 1999, there were 55,000 websites using the technology, including Comedy Central, Mattel, and Warner Bros. Banner ads also used the technology. Comet reported 20 million users in 2001, when it integrated a price comparison service in the software. The company was criticized for secretly tracking users who installed the software, each of whom was given a unique serial number. In November 1999, the company started distributing its software as part of a package with several versions of RealNetworks' RealPlayer multimedia software. That same month, the RealPlayer was accused of violating the privacy of its users and breaching its own privacy policy by collecting information about what software was installed alongside the RealPlayer. Compounding the issue of spyware, the software installed itself unknowingly on many users' computers. Microsoft's Internet Explorer browser allowed ActiveX controls, such as Comet Cursor, to install themselves with no user interaction and without asking permission, and users did not realize they had installed Comet Cursor with RealPlayer. For these reasons, Comet Cursor was cited as one of the 25 Worst Tech Products by PC World. Although no longer distributed, the product has been blacklisted as spyware by some Internet watchdog companies such as Lavasoft and Symantec. Microsoft recommends that users who experience problems with the application uninstall it. FindWhat.com purchased Comet in February 2004, and the Comet Cursor was phased out of their product line. References Adware Spyware 1997 software
https://en.wikipedia.org/wiki/Stakkato
Stakkato is the alias of Swede Philip Gabriel Pettersson, the alleged perpetrator of a worldwide cyber attack known to have occurred from at least December 2003 until May 2005, targeting many sites on the Internet including the US Military, White Sands Missile Range, NASA, a number of US academic institutions (known to include Caltech, Stanford University, San Diego Supercomputer Center, and UIUC), and a number of non-US academic institutions (known to include Uppsala University in Sweden and University College Cork in Ireland) and several other Internet locations. By using locally based kernel exploits (a sophisticated technique that requires a high knowledge level and advanced development skills), Stakkato managed to elevate its user privileges and gain control of various systems within numerous government agencies and private sector enterprises. Via stolen login credentials Stakkato was able to gain access to these systems for well over two years. Finally, Stakkato was able to gain access to Cisco Corporation's router internetwork operating system (IOS) source code, which enabled the attacker to develop custom exploits, rootkits (backdoors), and enhanced control of routers around the world. Philip Gabriel Pettersson from Uppsala, Sweden, then 16 years old, was questioned over the attack in March 2005, while possible accomplices were searched in Sweden, Britain, and elsewhere in Europe. Pettersson was indicted with five felonies in May 2009, and in February 2010 his prosecution was transferred to Swedish authorities. See also Byzantine Foothold Moonlight Maze Solar Sunrise Titan Rain References External links Bodmer, Kilger, Carpenter, & Jones (2012). Reverse Deception: Organized Cyber Threat Counter-Exploitation. New York: McGraw-Hill Osborne Media. , Swede indicted for NASA-CISCO hacks Hacker infiltrated government computers, CNN, 10 May 2005 The Stakkato Intrusions - What happened and what have we learned?, technical presentation at CCGrid06, 17 May 2006 Tempting Fate, Abe Singer, ;login: February 2005. Description of attacks and response at SDSC. Swedish Notice to DOJ concerning possible prosecution of stakkato, DOJ, 5 February 2010 20th-century births Living people Computer criminals Swedish criminals Hacking (computer security)
https://en.wikipedia.org/wiki/Compy
Compy may refer to: An abbreviation, slang term or pet name for a computer The shortened form of Procompsognathus, as used in the book Jurassic Park Compy 386, a computer in the comedy web series Homestar Runner
https://en.wikipedia.org/wiki/Sylk
Sylk may refer to: Sylk, a character from Glitter (film) Symbolic Link (SYLK), a Microsoft file format typically used to exchange data between applications, specifically spreadsheets
https://en.wikipedia.org/wiki/XHR
XHR may refer to: Hernican language Xenia Hotels & Resorts XHR-FM, a radio station in Linares, Nuevo León, Mexico XMLHttpRequest, a JavaScript class for Ajax programming
https://en.wikipedia.org/wiki/Meet-me%20room
A meet-me room (MMR) is a place within a colocation center (or carrier hotel) where telecommunications companies can physically connect to one another and exchange data without incurring local loop fees. Services provided across connections in an MMR may be voice circuits, data circuits, or Internet Protocol traffic. An MMR provides a safe production environment where the carrier handover point equipment can be expected to run on a 24/7 basis with minimal risk of interruption. It is typically located within the data center. To interconnect, companies order a patch from their cage or suite to the MMR and then arrange for the organization running the facility to connect them together. These physical connections may be an optical fiber cable, coaxial cable, twisted pair, or any other networking medium. Typically, a meet-me room will discourage or disallow customers from installing large amounts of equipment. However, multiplexing equipment is often welcome in the meet-me room, so that a customer can have a single connection between the room and the rest of their equipment in the building, and the multiplexing equipment can then break that out to allow for direct, private connections to several other organizations present in the meet-me room. An Internet exchange point can also be present in a meet-me room to allow many organizations in the meet-me room to interchange traffic without having to make physical interconnections between every possible pair of organizations. Examples One Wilshire: Los Angeles, California Westin Building: Seattle, Washington MAE-West (located in Market Post Tower): Downtown San Jose, California 60 Hudson St, New York 111 Eighth Ave, New York Infomart: Dallas, Texas 350 E. Cermak Rd: Chicago 165 Halsey Street, Newark, New Jersey 399 Chai Wan Road, Hong Kong References Internet hosting Internet architecture Internet exchange points Telecommunications infrastructure
https://en.wikipedia.org/wiki/File%20Alteration%20Monitor
In computing, the File Alteration Monitor, also known as FAM and sgi_fam, provides a subsystem developed by Silicon Graphics for Unix-like operating systems. The FAM subsystem allows applications to watch certain files and be notified when they are modified. This greatly aids the applications, because before FAM existed, such applications would have to read the disk repeatedly to detect any changes, which resulted in high disk and CPU usage. For example, a file manager application can detect if some file has changed and can then update a displayed icon and/or filename. The FAM system consists of two parts: famd — the FAM Daemon, which provides notifications and listens for requests. Administrators can configure it by editing the file /etc/fam.conf libfam — the interface to the client Although FAM may seem unnecessary now that many newer kernels include built-in notification support (inotify in Linux, for example), using FAM provides two benefits: Consistently using FAM enables applications to work on a greater variety of platforms, agnostic of the kernel. FAM is network-aware, and if a monitor is started on an NFS share, it will attempt to contact a FAM server on the NFS server and have it monitor the file locally, which is more efficient. The main problem with FAM is that during the creation of a large number of files (for example during the first login in a desktop environment) it slows down the entire system, using many CPU cycles. See also kqueue (FreeBSD) inotify (Linux) dnotify (Linux; predecessor of inotify) FSEvents (Mac OS) portmap (SunOS) TCP Wrapper/libwrap References External links The FAM homepage The Watchful Eye of FAM – Linuxdevcenter article Unix file system technology
https://en.wikipedia.org/wiki/Open%20Cluster%20Framework
Open Cluster Framework (OCF) is a set of standards for computer clustering. The project started as a working group of the Free Standards Group, now part of the Linux Foundation. Original supporters included several computing companies and groups, including Compaq, Conectiva, IBM, Linux-HA, MSC Software, the Open Source Development Lab, OSCAR, Red Hat, SGI and SUSE. OCF Resource agents are currently supported by Linux-HA Heartbeat, the high-availability cluster software. References External links OCF website Cluster computing Free system software High-availability cluster computing
https://en.wikipedia.org/wiki/Canopy%20research
Canopy research is the field of scientific research based upon data collected in the canopy of trees. Objects Description of plant and animal species residing in the tree-summits. Mainly ancient forests and tropical forests are studied. Study of forest ecosystem dynamics, change drivers and other factors that shape forest systems. Collection of meteorological data. Meteorological studies can help researchers measure the efficacy of forest canopies in offsetting global climate change. Researchers at the Agricultural Research Service have calibrated a model for forest canopies that measures and estimates the amount of carbon a forest canopy absorbs/releases due to photosynthesis/respiration. The research found that the forest canopy shifted from a carbon “sink” (of net carbon absorption due to photosynthesis) to a carbon “source” (of net carbon respiration) following the defoliation of the canopy due to the gypsy moth. This research helps scientists determine the role of trees in offsetting carbon released into the atmosphere, which contributes to global warming, and the biological influences that impact it. Chief discoveries 90% of animal and 50% of plant species in tropical rainforests live in the upper levels of the large trees. As many as 1000 different insects have been collected from one tree. Tropical forests require a minimum area to develop their crucial micro climate and to provide habitats for larger mammals. While grown forests continue to store carbon dioxide, young forests store up ten times more. Canopy research is a relatively new scientific field which was hampered for a long time by lack of means of access to the tree canopies and lack of appropriate means of housing researchers. Climbing gear, tree houses, canopy walkways, cranes, airships and inflatable platforms resting on the treetops have lately overcome these barriers. Cranes have proven to offer the best three-dimensional access. The effort to set them up is worthwhile, as most research projects are long term. Airships (or dirigibles, or blimps) offer the best means of accessing large areas of canopy. Tree houses are best for housing because they offer dry, light and secure accommodation without cutting down an area of forest. See also Canopy (biology) Leaf Area Index Nalini Nadkarni, American ecologist who pioneered the study of Costa Rican rain forest canopies. Stephen C. Sillett, Kenneth L. Fisher Chair in Redwood Forest Ecology, Humboldt State University. The White Diamond, a Werner Herzog documentary about building an airship for canopy research. Margaret D. Lowman, American ecologist who pioneered usage of canopy walkways References External links Global Canopy Programme Canopy Database Project Canopy Research - Earthwatch Institute page. Dendronautics "Doing Canopy Science" Prof Stephen Sillett, photogallery with "brief description of... techniques and illustrations of their applications..." Everhart, S.E. 2010. Upper canopy collec
https://en.wikipedia.org/wiki/Giorgi%20Japaridze
Giorgi Japaridze (also spelled Giorgie Dzhaparidze) is a Georgian-American researcher in logic and theoretical computer science. He currently holds the title of Full Professor at the Computing Sciences Department of Villanova University. Japaridze is best known for his invention of computability logic, cirquent calculus, and Japaridze's polymodal logic. Research During 1985–1988 Japaridze elaborated the system GLP, known as Japaridze's polymodal logic. This is a system of modal logic with the "necessity" operators [0],[1],[2],…, understood as a natural series of incrementally weak provability predicates for Peano arithmetic. In "The polymodal logic of provability" Japaridze proved the arithmetical completeness of this system, as well as its inherent incompleteness with respect to Kripke frames. GLP has been extensively studied by various authors during the subsequent three decades, especially after Lev Beklemishev, in 2004, pointed out its usefulness in understanding the proof theory of arithmetic (provability algebras and proof-theoretic ordinals). Japaridze has also studied the first-order (predicate) versions of provability logic. He came up with an axiomatization of the single-variable fragment of that logic, and proved its arithmetical completeness and decidability. In the same paper he showed that, on the condition of the 1-completeness of the underlying arithmetical theory, predicate provability logic with non-iterated modalities is recursively enumerable. In Studia Logica 50 he did the same for the predicate provability logic with non-modalized quantifiers. In 1992–1993, Japaridze came up with the concepts of cointerpretability, tolerance and cotolerance, naturally arising in interpretability logic. He proved that cointerpretability is equivalent to 1-conservativity and tolerance is equivalent to 1-consistency. The former was an answer to the long-standing open problem regarding the metamathematical meaning of 1-conservativity. Within the same line of research, Japaridze constructed the modal logics of tolerance (1993) and of the arithmetical hierarchy (1994), and proved their arithmetical completeness. In 2002 Japaridze introduced "the Logic of Tasks", which later became a part of his Abstract Resource Semantics on one hand, and a fragment of Computability Logic (see below) on the other hand. Japaridze is best known for founding Computability Logic in 2003 and making subsequent contributions to its evolution. This is a long-term research program and a semantical platform for "redeveloping logic as a formal theory of (interactive) computability, as opposed to the formal theory of truth that it has more traditionally been". In 2006 Japaridze conceived cirquent calculus as a proof-theoretic approach that manipulates graph-style constructs, termed cirquents, instead of the more traditional and less general tree-like constructs such as formulas or sequents. This novel proof-theoretic approach was later successfully used to "tame" variou
https://en.wikipedia.org/wiki/Interurban%20streetcars%20in%20Southern%20New%20England
Southern New England at one time had a large network of street railway lines, including several true interurban streetcars. It was possible to go from New York City to Boston completely on streetcars on at least three routes: via Hartford, Connecticut, Springfield, Massachusetts, and Worcester, Massachusetts; via New London, Connecticut and Worcester, or via New London and Providence, Rhode Island. The majority of streetcar lines in Southern New England ran in mixed traffic on city streets in downtown areas and alongside local highways between towns. Only a smaller number of lines had significant interurban characteristics, including long stretches of private rights of way and roadside reservations that supported operations at speeds far higher than street traffic; most were located in relatively uncrowded Eastern Connecticut with longer distances between population centers. For a brief period from 1916 to 1919, the Shore Line Electric Railway - later called "one of the few New England electric lines of genuine interurban technology" - owned all these interurban-type lines. They included the Groton and Stonington Street Railway, the Norwich and Westerly Railway, and the New London Division of the Connecticut Company. Due to competition from automobiles, all were abandoned between 1920 and 1940. Currently, the only services that come close to the definition of an interurban are two sections of the MBTA rapid transit system in Boston, both converted commuter rail routes rather than original interurbans. The Green Line D branch (formerly the Boston & Albany Railroad's Highland branch) was converted in 1959 and runs modern light rail equipment; the Ashmont–Mattapan High Speed Line was converted in 1929 and runs historic PCC streetcars. References Railroad History Database The Shore Line Trolley Museum - Trolley Towns CT Interurban railways in Connecticut Interurban railways in Massachusetts Interurban railways in Rhode Island
https://en.wikipedia.org/wiki/Nested%20transaction
A nested transaction is a database transaction that is started by an instruction within the scope of an already started transaction. Nested transactions are implemented differently in different databases. However, they have in common that the changes are not made visible to any unrelated transactions until the outermost transaction has committed. This means that a commit in an inner transaction does not necessarily persist updates to the system. In some databases, changes made by the nested transaction are not seen by the 'host' transaction until the nested transaction is committed. According to some, this follows from the isolation property of transactions. The capability to handle nested transactions properly is a prerequisite for true component-based application architectures. In a component-based encapsulated architecture, nested transactions can occur without the programmer knowing it. A component function may or may not contain a database transaction (this is the encapsulated secret of the component. See Information hiding). If a call to such a component function is made inside a BEGIN - COMMIT bracket, nested transactions occur. Since popular databases like MySQL do not allow nesting BEGIN - COMMIT brackets, a framework or a transaction monitor is needed to handle this. When we speak about nested transactions, it should be made clear that this feature is DBMS dependent and is not available for all databases. Theory for nested transactions is similar to the theory for flat transactions. The banking industry usually processes financial transactions using open nested transactions, which is a looser variant of the nested transaction model that provides higher performance while accepting the accompanying trade-offs of inconsistency. Further reading Gerhard Weikum, Gottfried Vossen, Transactional information systems: theory, algorithms, and the practice of concurrency control and recovery, Morgan Kaufmann, 2002, References Transaction processing
https://en.wikipedia.org/wiki/Quantum%20sort
A quantum sort is any sorting algorithm that runs on a quantum computer. Any comparison-based quantum sorting algorithm would take at least steps, which is already achievable by classical algorithms. Thus, for this task, quantum computers are no better than classical ones, and should be disregarded when it comes to time complexity. However, in space-bounded sorts, quantum algorithms outperform their classical counterparts. References Sorting algorithms Quantum algorithms
https://en.wikipedia.org/wiki/FSV
FSV may refer to: Fidelity Special Values, a British investment trust File System Visualizer, a file manager for Linux and other Unix-like operating systems Fort St. Vrain Generating Station, in Colorado, United States M1131 Fire Support Vehicle Fullskip Void, in Realm of the Mad God
https://en.wikipedia.org/wiki/MicroEmpix
MicroEmpix is the microkernel (much nearer to an exokernel) version of Empix, an operating system (OS) developed at the Computing Systems Laboratory (CSLab) of the Electrical & Computer Engineering department at the National Technical University of Athens. Empix began in the late 1980's as the laboratory's effort to write a small Unix-like modern multitasking OS, intended for educational use. Borrowing most of its basic characteristics (file system, binary format, shell) from other popular OSes of the time (Xinu, Minix, DOS). Empix is quite small (about 10,000 lines of code) and supports Intel x86 processors, in the IBM Personal Computers (PC) XT (8088), and AT (80286) architectures, floppy disks and hard disk drives (with the File Allocation Table (FAT) 16 limits), and Enhanced Graphics Adapter (EGA) graphics (80x25 color terminal) and the serial ports. It has a shell with some basic commands, and the ability to execute multiple processes. MicroEmpix is far different. It's about 1,600 lines of code (over which about 1,000 devoted to serial port control), and it's a microkernel, meaning that it creates and runs processes in kernel-space, with no distinction between process-space and kernel space. What the kernel sees, the process sees and vice versa. No system calls occur to require a system call dispatcher or a similar mechanism. Kernel functions are inherent to the processes created, and there is but one user. References External links The MicroEmpix Fan Site Microkernels
https://en.wikipedia.org/wiki/Liveware
Liveware was used in the computer industry as early as 1966 to refer to computer users, often in humorous contexts, by analogy with hardware and software. It is a slang term used to denote people using (attached to) computers, and is based on the need for a human, or liveware, to operate the system using hardware and software. Other words meaning the same or similar to liveware include wetware, meatware and jellyware. Meatware and jellyware are most often used by internal customer support personnel as slang terms when referencing human operating errors. The term liveware is found in the Culture novels by Iain M. Banks. A Culture Ship is named "Liveware Problem". References Computer jargon
https://en.wikipedia.org/wiki/New%20trade%20theory
New trade theory (NTT) is a collection of economic models in international trade theory which focuses on the role of increasing returns to scale and network effects, which were originally developed in the late 1970s and early 1980s. The main motivation for the development of NTT was that, contrary to what traditional trade models (or "old trade theory") would suggest, the majority of the world trade takes place between countries that are similar in terms of development, structure, and factor endowments. Traditional trade models relied on productivity differences (Ricardian model of comparative advantage) or factor endowment differences (Heckscher–Ohlin model) to explain international trade. New trade theorists relaxed the assumption of constant returns to scale, and showed that increasing returns can drive trade flows between similar countries, without differences in productivity or factor endowments. With increasing returns to scale, countries that are identical still have an incentive to trade with each other. Industries in specific countries concentrate on specific niche products, gaining economies of scale in those niches. Countries then trade these niche products to each other – each specializing in a particular industry or niche product. Trade allows the countries to benefit from larger economies of scale. Some have used NTT to argue that using protectionist measures to build up a large industrial base in certain promising industries will then allow those industries to dominate the world market. Less quantitative forms of a similar "infant industry" argument against free trade have been advanced by previous trade theorists. Development Although aspects of trade with increasing returns had been worked out earlier, especially in work by Avinash Dixit, new trade theory is associated with Paul Krugman's work in the late 1970s, developing into what is known as the Dixit-Stiglitz-Krugman trade model and the Helpman–Krugman model. Krugman states that he originally learned about the effects of monopolistic competition on trade from Robert Solow, but that theories of International economics a generation earlier had completely ignored returns to scale. In 1996 he wrote, "The idea that trade might reflect an overlay of increasing-returns specialization on comparative advantage was not there at all: instead, the ruling idea was that increasing returns would simply alter the pattern of comparative advantage." "New" new trade theory Marc Melitz and Pol Antràs started a new trend in the study of international trade. While new trade theory put emphasis on the growing trend of intermediate goods, this new trend emphasizes firm level differences in the same industry of the same country and this new trend is frequently called 'new' new trade theory (NNTT). NNTT stresses the importance of firms rather than sectors in understanding the challenges and the opportunities countries face in the age of globalization. As international trade is increasingly li
https://en.wikipedia.org/wiki/Multispectral%20imaging
Multispectral imaging captures image data within specific wavelength ranges across the electromagnetic spectrum. The wavelengths may be separated by filters or detected with the use of instruments that are sensitive to particular wavelengths, including light from frequencies beyond the visible light range, i.e. infrared and ultra-violet. It can allow extraction of additional information the human eye fails to capture with its visible receptors for red, green and blue. It was originally developed for military target identification and reconnaissance. Early space-based imaging platforms incorporated multispectral imaging technology to map details of the Earth related to coastal boundaries, vegetation, and landforms. Multispectral imaging has also found use in document and painting analysis. Multispectral imaging measures light in a small number (typically 3 to 15) of spectral bands. Hyperspectral imaging is a special case of spectral imaging where often hundreds of contiguous spectral bands are available. Applications Military target tracking Multispectral imaging measures light emission and is often used in detecting or tracking military targets. In 2003, researchers at the United States Army Research Laboratory and the Federal Laboratory Collaborative Technology Alliance reported a dual band multispectral imaging focal plane array (FPA). This FPA allowed researchers to look at two infrared (IR) planes at the same time. Because mid-wave infrared (MWIR) and long wave infrared (LWIR) technologies measure radiation inherent to the object and require no external light source, they also are referred to as thermal imaging methods. The brightness of the image produced by a thermal imager depends on the objects emissivity and temperature.  Every material has an infrared signature that aids in the identification of the object. These signatures are less pronounced in hyperspectral systems (which image in many more bands than multispectral systems) and when exposed to wind and, more dramatically, to rain. Sometimes the surface of the target may reflect infrared energy. This reflection may misconstrue the true reading of the objects’ inherent radiation. Imaging systems that use MWIR technology function better with solar reflections on the target's surface and produce more definitive images of hot objects, such as engines, compared to LWIR technology. However, LWIR operates better in hazy environments like smoke or fog because less scattering occurs in the longer wavelengths. Researchers claim that dual-band technologies combine these advantages to provide more information from an image, particularly in the realm of target tracking. For nighttime target detection, thermal imaging outperformed single-band multispectral imaging. Dual band MWIR and LWIR technology resulted in better visualization during the nighttime than MWIR alone. Citation Citation. The US Army reports that its dual band LWIR/MWIR FPA demonstrated better visualizing of tactical vehic
https://en.wikipedia.org/wiki/Xenon%20%28disambiguation%29
Xenon is a chemical element with symbol Xe and atomic number 54. Xenon may also refer to: Computing Xenon (processor), the Xbox 360 CPU Xenon (program), a Dutch web spider intended to discover tax evasion LG Xenon, a mobile phone manufactured by LG Electronics Xenon, a codename for the Xbox 360 Entertainment Games Xenon (pinball) Xenon (video game) Self-replicating spacecraft in the X video game series A planet in the Space Quest series Other entertainment Xenon (manga), a Japanese manga by Masaomi Kanzaki The Xenon Codex, a 1988 album by Hawkwind Xenon Entertainment, a film distribution company Xenon, a robot from the Superhuman Samurai Syber-Squad television show People Xenon (general), a Seleucid general Xenon (tyrant), a tyrant of the ancient Greek city of Hermione Vehicles Celier Xenon 2, a Polish autogyro Celier Xenon 4, a Maltese autogyro Tata Xenon, an Indian pickup truck Other uses Xenon (nightclub), a former New York City nightclub Xenon, a Campagnolo groupset Xenon arc lamp XENON Dark Matter Search Experiment See also Xenic (disambiguation) Xeno (disambiguation) Xeon, an Intel CPU Zeno (disambiguation) Zenon (disambiguation) Xe (disambiguation) Isotopes of xenon
https://en.wikipedia.org/wiki/KTXH
KTXH (channel 20), branded on-air as My 20 Vision, is a television station in Houston, Texas, United States, serving as the local outlet for the MyNetworkTV programming service. It is owned and operated by Fox Television Stations alongside Fox outlet KRIV (channel 26). Both stations share studios on Southwest Freeway (I-69/US 59) in Houston, while KTXH's transmitter is located near Missouri City, Texas. KTXH began broadcasting in November 1982 as Houston's third independent station. A month after going on air, its broadcast tower collapsed in a construction accident that killed five people. The station recovered and emerged as Houston's sports independent, beginning long associations with the Houston Astros and Houston Rockets that continued uninterrupted through the late 1990s and sporadically until the early 2010s. Not long after starting up, KTXH was sold twice in rapid succession for large amounts. However, when the independent station trade, advertising market, and regional economy cooled, it was sold again for less than half of its previous value. The Paramount Stations Group acquired KTXH and other stations in two parts between 1989 and 1991, bringing much-needed stability. KTXH was one of several Paramount-owned stations to be charter outlets for the United Paramount Network (UPN) in 1995; in 2001, after UPN was acquired by CBS, Fox took possession of the station in a trade and merged its operations with KRIV. When UPN merged into The CW in 2006, bypassing all of Fox's UPN and independent stations in the process, the station became part of Fox's MyNetworkTV service. In 2021, the station became one of two ATSC 3.0 (NextGen TV) transmitters for the Houston area; its subchannels are now transmitted by other local stations on its behalf. History Construction, start-up, and tragedy Interest in channel 20 in Houston began to emerge in 1976, as three groups filed applications for new television stations in light of the emerging technology of subscription television (STV). These were Channel 20 Houston, Inc., a group led by Robert S. Block of Milwaukee; Channel 20, Inc., headed by Sidney Shlenker; and CPI Subscription TV, subsidiary of cable television company Communications Properties, Inc. CPI withdrew, and a settlement application between the Block and Shlenker consortia—Channel 20, Inc.—was granted the construction permit by the Federal Communications Commission (FCC) on May 19, 1980. It was the second joint settlement between Block and Shlenker for a Texas station; the Shlenker consortium, with Milt Grant as head of operations, had previously received the construction permit for KTXA in Fort Worth in March. That station began broadcasting in February 1981 as a hybrid operation, with commercial programming and ON TV, the STV service owned by Oak Industries. Oak was to own a majority stake in the local ON TV operation. Channel 20's launch was delayed due to holdups in determining the local structure of the ON TV franchise and a dispute inv
https://en.wikipedia.org/wiki/KCWX
KCWX (channel 2) is a television station licensed to Fredericksburg, Texas, United States, affiliated with MyNetworkTV. Although Fredericksburg is within the Austin DMA, the station is officially assigned by Nielsen to the larger San Antonio market, and its signal covers the San Antonio and Bexar County area. The station is owned by Austin-based Corridor Television and maintains main studios in Austin on West Avenue. Its main transmitter is located on the Gillespie–Kendall county line. Since its sign-on in 2000, KCWX's history has straddled the San Antonio and Austin markets; since 2006, it has only held a network affiliation in the San Antonio market. History The long road to construction In 1986, the Federal Communications Commission added a channel 2 assignment to Fredericksburg, located from Austin and from San Antonio; the allotment was possible without interfering with channel 2 stations in Nuevo Laredo to the south, Midland to the west, Denton to the north, and Houston to the east. The availability of a VHF station that could potentially serve two media markets attracted attention. In June 1987, the FCC designated twelve applicants for comparative hearing. Some of the applicants, notably the Telemundo network, dropped out in the months following the hearing designation order. Administrative law judge Edward Luton made his initial decision on who should be granted the channel out of six contenders in June 1989; he selected Stonewall Television, owned by Marquis Whittington and Robert Simmons. The FCC's review board, however, overturned this decision in 1993 and gave the nod to Fredericksburg Channel 2, an applicant whose principal stakeholders were former San Antonio Spurs owner Red McCombs and Bob Roth, a former manager and son of the owner of KONO-TV channel 12 in San Antonio in the 1950s and 1960s. As appeals continued on the 1993 decision, tragedy struck. On October 20, 1995, Roth took two executives from the Hearst Corporation to scout the area and view the proposed transmitter site. The car they were traveling in was involved in a head-on collision south of Stonewall; Roth died at the age of 73. No one was wearing seat belts at the time of the accident. In 1996, Fredericksburg Channel 2 merged with one of its five competing applicants: Global Information Technologies of Austin, a company owned by Carmen and Saleem Tawil. The Tawils had previously built and sold a low-power independent TV station in Austin, K13VC. In August 1997, the FCC approved the combined application of Fredericksburg Channel 2 and Global and dismissed the other applicants, one of which, Frontier Broadcasting, challenged the dismissal in federal appeals court; Frontier had its application dismissed over transmitter site issues in 1989. With a construction permit in hand, the partnership, taking the name of Corridor Television, began building channel 2 in 1998. The call letters KBEJ, a sequential assignment, were given to the construction permit in May 1998.
https://en.wikipedia.org/wiki/Chlorine%20fluoride
A chlorine fluoride is an interhalogen compound containing only chlorine and fluorine. External links National Pollutant Inventory - Fluoride compounds fact sheet NIST Standard Reference Database WebElements Inorganic chlorine compounds Fluorides Interhalogen compounds
https://en.wikipedia.org/wiki/Lime%20Street%20%28TV%20series%29
Lime Street is an American action/drama series that aired on the ABC television network during the 1985 television season. The series was created by Linda Bloodworth-Thomason, who also served as executive producer alongside husband Harry Thomason, and series star Robert Wagner. Premise James Culver (Robert Wagner), a widower, raises his two daughters, Elizabeth (Samantha Smith) and Margaret Ann (Maia Brewton) with his father, Henry (Lew Ayres), and investigates insurance cases with the British Edward Wingate (John Standing). Production The cast of Lime Street included veteran Hollywood star Robert Wagner and Samantha Smith. Smith, a schoolgirl in Manchester, Maine, had written then-Soviet premier Yuri Andropov a letter asking him whether he was truly desirous of a nuclear war with the United States, as she had heard suggested by some. He wrote her a reply stating that he was not, and then invited her to visit the Soviet Union; the event, which was followed by media in both countries and elsewhere around the world, gained her fame. Two versions exist of how Smith was cast into the show: one story states that she had caught the attention of Bloodworth-Thomason in early 1985 when the latter's brother-in-law spotted her on a talk show and suggested that she might fit the role of the elder daughter in the series, at that time known as J.G. Culver. Another suggests that Wagner, who had first seen her on The Tonight Show, called her up, asking her to audition for the role. Three episodes and the pilot had been shot when Smith was killed on August 25, 1985, in the crash of a small plane belonging to Bar Harbor Airlines. Smith's death occurred prior to the airing of any of the programs, the premiere being on September 21. Although production continued, her role was never recast. Auditions were held instead for a new character, another daughter to Wagner's character, but the notion was entirely dropped. The plan had been for Smith's character, Elizabeth, to live on off-screen, moving to Paris to be with her divorced mother. The show was subsequently dedicated to Smith's memory. Critical reviews on Lime Street were not enamored of the program itself. Bill Kelley of the Sun-Sentinel said, "Apart from the fact that the pilot devotes a large volume of boring time to depicting Wagner's J.G. Culver character as a doting father, there is virtually nothing to separate Lime Street from such Wagner series as It Takes a Thief, Switch or Hart to Hart....The series pins its hopes squarely on the TV audience's fondness for the Wagner they have come to know over the years, rather than on plot turns or originality." There was genuine praise for Smith's talents and acting ability in the few episodes she had completed. John Leonard of New York said "...Samantha was wonderful—gawky but sincere, life-loving, a saint with bangs...." However, the series had trouble finding much of an audience, mainly due to competition from NBC's The Golden Girls (a top ten hit) and 227 (
https://en.wikipedia.org/wiki/Instruction%20selection
In computer science, instruction selection is the stage of a compiler backend that transforms its middle-level intermediate representation (IR) into a low-level IR. In a typical compiler, instruction selection precedes both instruction scheduling and register allocation; hence its output IR has an infinite set of pseudo-registers (often known as temporaries) and may still be – and typically is – subject to peephole optimization. Otherwise, it closely resembles the target machine code, bytecode, or assembly language. For example, for the following sequence of middle-level IR code t1 = a t2 = b t3 = t1 + t2 a = t3 b = t1 a good instruction sequence for the x86 architecture is MOV EAX, a XCHG EAX, b ADD a, EAX For a comprehensive survey on instruction selection, see. Macro expansion The simplest approach to instruction selection is known as macro expansion or interpretative code generation. A macro-expanding instruction selector operates by matching templates over the middle-level IR. Upon a match the corresponding macro is executed, using the matched portion of the IR as input, which emits the appropriate target instructions. Macro expansion can be done either directly on the textual representation of the middle-level IR, or the IR can first be transformed into a graphical representation which is then traversed depth-first. In the latter, a template matches one or more adjacent nodes in the graph. Unless the target machine is very simple, macro expansion in isolation typically generates inefficient code. To mitigate this limitation, compilers that apply this approach typically combine it with peephole optimization to replace combinations of simple instructions with more complex equivalents that increase performance and reduce code size. This is known as the Davidson-Fraser approach and is currently applied in GCC. Graph covering Another approach is to first transform the middle-level IR into a graph and then cover the graph using patterns. A pattern is a template that matches a portion of the graph and can be implemented with a single instruction provided by the target machine. The goal is to cover the graph such that the total cost of the selected patterns is minimized, where the cost typically represents the number of cycles it takes to execute the instruction. For tree-shaped graphs, the least-cost cover can be found in linear time using dynamic programming, but for DAGs and full-fledged graphs the problem becomes NP-complete and thus is most often solved using either greedy algorithms or methods from combinatorial optimization. References External links Alternative ways of supporting different generations of computer Compiler optimizations
https://en.wikipedia.org/wiki/Revival%20%28television%29
In television, a revival is a television series that returns to produce new episodes after being off the air for a certain amount of time, particularly due to cancellation. Definition Network executives may decide to attempt to revive a television program when they feel that a market once again exists for it. It is one of several programming strategies television networks employ to capitalize further on successful programs; among the other methods are spin-offs, reboots, remakes, cast reunions, television movies and sequels. Unlike spin-offs, in which a television network creates an entirely new series around an existing character or setting, a revival reintroduces most or many of the original program's storylines, characters, and locales, and usually attempts to resolve story arcs that the original run failed to complete, as opposed to a sequel that may introduce a new storyline with some of the same characters after the previous series' story ended. Revivals usually take place at some point after the original series ends. By contrast, reboots and remakes may feature many of the original characters differently, but are usually played by new cast members and without taking into account events or continuity that occurred during the original series. List of television series revivals See also List of television spin-offs Moratorium Remake Reboot Sequel Spin-off Bibliography References Continuity (fiction) Television terminology
https://en.wikipedia.org/wiki/Mind%27s%20Eye%20%28film%20series%29
The Mind's Eye series consists of several art films rendered using computer-generated imagery of varying levels of sophistication, with original music scored note-to-frame. The series was conceived by Steven Churchill of Odyssey Productions in 1989. The initial video was directed, conceptualized, edited and co-produced by Jan Nickman of Miramar Productions and produced by Churchill. The first three products in the series were released on VHS (by BMG) and LaserDisc (by Image Entertainment) and also released on DVD (by Simitar Entertainment). The fourth program in the series was released and distributed by Sony Music on DVD. Overview The typical entry in the Mind's Eye series is a short package film, usually 50 to 60 minutes long, with an electronic music soundtrack over a series of music video-like sequences. The original film, titled The Mind's Eye: A Computer Animation Odyssey, by director and co-producer Jan Nickman and producer Steven Churchill, consisted of a non-rigid structure of many semi-related sequences. The general style which characterizes the series is light and cartoonish, due to the difficulty of rendering more complicated images using the computers of the day. The computer animation sequences that appeared in the films were generally not produced specifically for the Mind's Eye series but rather were work originally created for other purposes, including demo reels, commercials, music videos, and feature films. Nickman then assembled these sequences into a narrative through creative editing, which resulted in a double platinum selling film considered to be a milestone in the field of computer animation. As a result, The Mind's Eye: A Computer Animation Odyssey reached No. 12 on Billboard'''s video hits chart. This approach gave Churchill access to the best-quality computer graphics of the time without having to bear their substantial production costs. The soundtracks for the films were composed by James Reynolds, Jan Hammer, Thomas Dolby and Kerry Livgren (founder and guitarist for Kansas). Films Spin-off titles and other releases Two other anthologies released by Churchill did not include the term "The Mind's Eye" as part of their titles and are thus not considered to be part of the series. Churchill's most recent releases have been entries in the eight part Computer Animation series. A second sister series obliquely referencing Computer Animation is formed by the original Mind's Eye video and Cyberscape: A Computer Animation Vision (August 28, 1997, co-produced by Zoe Productions and Odyssey Productions), a surreal animation chronicling the evolution of human life and thought, by Beny Tchaicovsky. Reception and adaptationsBeyond the Mind's Eye was a bestseller in the US when it was originally released on VHS and LaserDisc. Roger Ebert selected it as his "Video Pick of the Week" for the week of December 23, 1992 on the TV series Siskel & Ebert. Several excerpts from The Mind's Eye were seen in the 1992 sci-fi horror film
https://en.wikipedia.org/wiki/Tea%20Horse%20Road
The Tea Horse Road or Chamadao (), now generally referred to as the Ancient Tea Horse Road or Chamagudao () was a network of caravan paths winding through the mountains of Sichuan, Yunnan and Tibet in Southwest China. This was also a tea trade route. It is also sometimes referred to as the Southern Silk Road or Southwest Silk Road. There are numerous surviving archaeological and monumental elements, including trails, bridges, way stations, market towns, palaces, staging posts, shrines and temples along the route. "Ancient Tea Horse Road" is a historical concept with a specific meaning. It refers to a major traffic road formed by the exchange of tea and horses between Han and Tibet from the Tang and Song Dynasties to the Republic of China. Road classification Shaanxi-Gansu Tea Horse Road (陕甘茶马古道) Shaanxi-Gansu Tea Horse Road is the main road for tea in mainland China to travel west and exchange for horses. It is one of the main routes of the ancient Silk Road. Tanggu Road (蹚古道) Beginning in the Han dynasty, it was formed by Shaanxi merchants and the ancient tea-horse market in the southwest frontier. Since the government of the Ming and Qing dynasties imposed government control on tea sales, tea sales were divided into regions, and the most prosperous tea and horse trading market was in Kangding. Yunnan-Tibet Tea Horse Road (滇藏茶马古道) It was formed in the late sixth century AD. It started from Yiwu and Pu'er in Xishuangbanna, the main tea producing area of Yunnan, and entered Tibet through today's Dali Bai Autonomous Prefecture, Lijiang City and Shangri-La, and went directly to Lhasa. Some were also re-exported from Tibet to India and Nepal, which was an important trade route between ancient China and South Asia. Sichuan-Tibet Tea Horse Road (川藏茶马古道) The Ancient Sichuan-Tibet Tea-Horse Road is a part of the Shaanxi-Kangding-Tibet Tea-Horse Road. It starts from Ya'an, the tea producing area of Yazhou in the east, passes through Dajian Furnace (now Kangding), reaches Lhasa, Tibet in the west, and finally leads to Bhutan, Nepal and India. More than a thousand kilometres, it is an indispensable bridge and link between ancient Tibet and the mainland. History Sichuan and Yunnan are believed to be the first tea-producing regions in the world. The first records of tea cultivation suggest that tea was cultivated on Sichuan's Mount Mengding (蒙顶山) between Chengdu and Ya'an earlier than 65 BC. Ya'an has been an important hub of tea trading till the 20th century. From around a thousand years ago, the Tea Horse Road become a trade link from Yunnan to Tibet; and to Central China via Sichuan Province. It is believed that it was through this trading network that tea (typically tea bricks) first spread across China and Asia from its origins in Pu'er county in Yunnan. The route earned the name because of the common trade of Tibetan ponies for Chinese tea, a practice dating back at least to the Song dynasty, when the sturdy horses were important for China to
https://en.wikipedia.org/wiki/Encantadia%20%282005%20TV%20series%29
Encantadia is a 2005 Philippine television drama fantasy series broadcast by GMA Network. The series is the first installment of the Encantadia franchise. Directed by Mark A. Reyes, it stars Sunshine Dizon, Iza Calzado, Karylle, Diana Zubiri, Dingdong Dantes and Jennylyn Mercado. It premiered on May 2, 2005 on the network's Telebabad line up. The series concluded on December 9, 2005 with a total of 160 episodes. It was replaced by Etheria: Ang Ikalimang Kaharian ng Encantadia in its timeslot. The series is streaming online on YouTube. Premise In the land of Encantadia, the Sang'gre sisters Alena, Danaya, Amihan and Pirena are designated guardians of four kingdoms within Encantadia. Trusted by the four gems that will keel the peace in the entire land. The ambition of Pirena will destroy this peace. It is one against three, it is sister against sisters. Cast and characters Lead cast Dingdong Dantes as Ybarro / Ybrahim Sunshine Dizon as Pirena Iza Calzado as Amihan Karylle as Alena Diana Zubiri as Danaya Jennylyn Mercado as Lira / Milagros Supporting cast Mark Herras as Anthony Yasmien Kurdi as Mira John Regala as Apitong Pinky Amador as Carmen Polo Ravales as Hitano Nancy Castiglione as Muyak Marky Lopez as Wantuk Alfred Vargas as Aquil Pen Medina as Hagorn Leila Kuzma as Agane Girlie Sevilla as Gurna Michael Roy Jornales as Apek Gayle Valencia as Dina Denise Laurel as Marge Ehra Madrigal as Gigi Recurring cast Cindy Kurleto as Cassiopea Bobby Andrews as Asval Arthur Solinap as Muros Benjie Paras as Wahid Guest cast Dawn Zulueta as Minea Richard Gomez as Raquim Al Tantay as Arvak Ian Veneracion as Armeo Allan Paule as Dado Miguel Faustman as Bathala Nicola Sermonia as young Pirena Kristine Mangle as young Amihan Abigael Arazo as young Alena Julianne Gomez as young Danaya Dominic Gacad as young Apitong Phytos Ramirez as young Anthony Irma Adlawan as Amanda Jay Aquitania as Banjo Brad Turvey as Axilom Gerard Pizzaras as Bandok Juliana Palermo as Lavanea Diane Sison as Mayne Romnick Sarmenta as Avilan Jake Cuenca as Kahlil Eddie Gutierrez as Dakila Zoren Legaspi as Bagwis Jey Gumiran as Cleu Antonio Aquitania as Alipato Sunshine Garcia as Agua Margaret Wilson as Aera Cheska Garcia as Aure Lloyd Barredo as Abog Vangie Labalan as Rosing Dino Guevarra as Carlos Juan Carlo Dizon as Chao CJ Ramos as Bono Ratings According to AGB Nielsen Philippines' Mega Manila household television ratings, the pilot episode of Encantadia earned a 45.9% rating. The series had its highest rating with a 51.7% rating. Accolades Home media release On March 4, 2008, GMA Records released the series on DVD. The 160 episodes are divided into 12 volumes of DVDs. Reboot Encantadia was rebooted in 2016 by GMA Entertainment TV. Marian Rivera played the role of Mine-a. While the four lead roles were portrayed by Kylie Padilla, Gabbi Garcia, Sanya Lopez and Glaiza de Castro. References External links 2
https://en.wikipedia.org/wiki/Boston%20Cyberarts%20Festival
The Boston Cyberarts Festival used to be the largest festival of digital art, performance and film created using new technology in the USA. Around 22,000 people attended the festival in 2007 where they witnessed the work of over 200 artists from all over the world. The festival took place once every two years in Boston, Massachusetts, USA usually spanning the last week of April and the first week in May. The festival was first held on 1 – 15 May 1999, and the last festival took place on 22 April – 8 May 2011. The Festivals were organized by Boston Cyberarts Inc, a non-profit arts organization. , the director of Cyberarts is George Fifield, who was one of the original cofounders of the organization. Boston Cyberarts, Inc. continues to exist as a non-profit arts organization, but has redirected its energies to promoting the arts and technology year-round, rather than biennially. The most visible continuing effort is the Boston Cyberarts Gallery, which used to be the Axiom Center for New and Experimental Media. The gallery was and is located in the Jamaica Plain neighborhood of Boston, in the Green Street station building on the MBTA Orange Line rapid transit line. The online presence of the past Boston Cyberarts Festivals, including online exhibits, is archived and still accessible free of charge. Location The festival was located in Boston, Massachusetts. The festival usually featured a central headquarters where visitors could get information about the events and also attend the opening night party. Massachusetts had arguably the densest population of digital artists in the US, making Boston the high-technology cultural center of the country. The festival's events were held in Boston's art galleries, museums, universities, and public spaces. For those unable to attend the festival physically, there were virtual festival events held on the internet. First event Around 22,000 people attended the Festival in 2007 where they witnessed the work of over 200 artists from all over the world. Events and exhibitions took place at 81 Festival events organized by over 60 arts organizations in Boston. The events featured: Visual art Animation Video Music Film Dance Installations Lectures Conferences; and Discussions Boston Cyberarts Inc also presented its own exhibitions and performances during the Festival. For example, at the Computer Museum they presented the exhibition 'Mind into Matter', co-curated by Festival director George Fifield and Francine Koslow Miller. This was the first international survey of digital sculpture. Over 100 events took place organized by 60 cultural and education institutions, including museum and gallery exhibitions and visual arts programming. Art The art work at the festival has been produced using computers; often alongside more traditional mediums such as paint, photography, film, musical instruments or dance and performance. The festival celebrates international art and the wealth of artistic talent in
https://en.wikipedia.org/wiki/Cyberarts
Cyberarts or cyberart refers to the class of art produced with the help of computer software and hardware, often with an interactive or multimedia aspect. Overview The term "cyberarts" is vague and relatively new; nevertheless, much of the work described by this term is rarely described any other way. For instance, a common type of cyberart which is produced programmatically by applying a set of design rules to a natural or preexisting process. A program could produce a few million such 'works of art' in a minute. The word "CyberArts" is claimed as a registered trademark by Miller Freeman Inc., promoter of a series of muti-media technology conferences known as CyberArts International during the early 1990s. ″Recent works of bioart propose to connect the viewer, transformed into a user, with different biological organisms by pirating their biometric data using digital interfaces. These immersive aesthetic propositions are based on a plural conception of the human body, forged in the crucible of cybernetics. Their new modes of communication explore the alternative path of an ecological continuum where the user enters a becoming-cyborg, far from the classic representations of human-machine coupling. They encourage us to reconsider the notion of bioart, in favor of cyberart.″ See also Digital art, computer art, Internet art, electronic art, new media art, Virtual art electronica, techno Ars Electronica Boston Cyberarts Festival CyberArts International References External links Cybernet glossary April 1999 essay by a skeptical Christopher Green on the topic of cyberart Definition and description of cyberart by cyberart pioneer Rodney Chang (Pygoya)
https://en.wikipedia.org/wiki/CPN-AMI
CPN-AMI is a computer-aided software engineering environment based on Petri Net specifications. It provides the ability to specify the behavior of a distributed system—and to evaluate properties such as invariants (preservation of resources), absence of deadlocks, liveness, or temporal logic properties (relations between events in the system). CPN-AMI relies on AMI-Nets, that are well-formed Petri nets with syntactic facilities. Well Formed Petri nets were jointly elaborated between the University of Paris 6 (Université P. & M. Curie) and the University of Torino in the early 1990s. This Petri net class supports symbolic techniques for model checking, and thus provides a very compressed way to store all states of a system. Since 2016 CPN-AMI has been listed by the owners as "still available but not maintained any more" (). See also Well-formed Petri net Petriscript References External links More information about CPN-AMI. BNF of AMI-Net References Integrated development environments Formal methods tools Petri nets
https://en.wikipedia.org/wiki/Geotagging
Geotagging, or GeoTagging, is the process of adding geographical identification metadata to various media such as a geotagged photograph or video, websites, SMS messages, QR Codes or RSS feeds and is a form of geospatial metadata. This data usually consists of latitude and longitude coordinates, though they can also include altitude, bearing, distance, accuracy data, and place names, and perhaps a time stamp. Geotagging can help users find a wide variety of location-specific information from a device. For instance, someone can find images taken near a given location by entering latitude and longitude coordinates into a suitable image search engine. Geotagging-enabled information services can also potentially be used to find location-based news, websites, or other resources. Geotagging can tell users the location of the content of a given picture or other media or the point of view, and conversely on some media platforms show media relevant to a given location. The geographical location data used in geotagging can, in almost every case, be derived from the global positioning system, and based on a latitude/longitude-coordinate system that presents each location on the earth from 180° west through 180° east along the Equator and 90° north through 90° south along the prime meridian. The related term geocoding refers to the process of taking non-coordinate-based geographical identifiers, such as a street address, and finding associated geographic coordinates (or vice versa for reverse geocoding). Such techniques can be used together with geotagging to provide alternative search techniques. Applications In social media Geotagging is a popular feature on several social media platforms, such as Facebook and Instagram. Facebook users can geotag photos that can be added to the page of the location they are tagging. Users may also use a feature that allows them to find nearby Facebook friends by generating a list of people according to the location tracker in their mobile devices. Instagram uses a map feature that allows users to geotag photos. The map layout pin points specific photos that the user has taken on a world map. Photos Two main options can be used to geotag photos: capturing GPS information at the time the photo is taken or "attaching" geocoordinates to the photograph after the picture is taken. In order to capture GPS data at the time the photograph is captured, the user must have a camera with built in GPS or a standalone GPS along with a digital camera. Because of the requirement for wireless service providers in United States to supply more precise location information for 911 calls by September 11, 2012, more and more cell phones have built-in GPS chips. Most smart phones already use a GPS chip along with built-in cameras to allow users to automatically geotag photos. Others may have the GPS chip and camera but do not have internal software needed to embed the GPS information within the picture. A few digital cameras also h
https://en.wikipedia.org/wiki/King%27s%20Quest%20IV
King's Quest IV: The Perils of Rosella is a graphic adventure game developed and released by Sierra On-Line for the MS-DOS, Amiga, Apple II, Apple IIGS, and Atari ST computers in 1988. The player takes on the role of Princess Rosella, daughter of King Graham of Daventry (King's Quest I and King's Quest II) and the twin sister of Gwydion/Alexander (King's Quest III), who must save her father and a good fairy and destroy an evil witch. Critically acclaimed, it was one of the first PC games to support a sound card. Gameplay King's Quest IV uses the Adventure Game Interpreter (AGI) and Sierra's Creative Interpreter (SCI) systems. This is the only chapter in the King's Quest series where the action takes place in real-time and within the allotted time limit, as the events of the game cover about 24 hours. Some activities must be completed during the day, while other puzzles can be solved only at night (the nightfall in the game happens either at 9 pm or at a certain point in the plot). The overall high difficulty of King's Quest III was toned down in King's Quest IV. Plot Picking up immediately where King's Quest III: To Heir Is Human left off, as King Graham tosses his children his adventure's cap, he suffers a massive heart attack and is left on his death bed. The devastated Princess Rosella is contacted via the Magic Mirror by the good fairy Genesta in the faraway land of Tamir who reveals the existence of a magic fruit that can heal King Graham in exchange for Rosella helping Genesta. Rosella agrees and is teleported to the fairy kingdom of Tamir. The realm's ruler, Queen Genesta, reveals that her archenemy, the evil fairy Lolotte, has stolen her talisman without which Genesta will die in twenty-four hours. Additionally, without the talisman, Genesta lacks the power to return Rosella to Daventry. Rosella agrees to undertake a quest for both the talisman and the magic fruit and goes out undercover, dressed as a peasant girl. Rosella manages to find the fruit, traversing a dangerous underground passage and swamp, but is captured in Queen Lolotte's perilous mountains and imprisoned in her castle. The witch demands that Rosella undertake three tasks for her in order for Rosella to earn her freedom and a big reward. Rosella reluctantly agrees and captures a unicorn, steals the golden hen and recovers Pandora's Box for Lolotte who intends to use the items to increase her evil power and influence. Lolotte reveals that her hideous and deformed son Edgar has fallen in love with Rosella and she intends for them to marry, trapping Rosella and condemning King Graham and Genesta to death. However, a sympathetic Edgar helps Rosella escape and she slays Lolotte with Cupid's bow. Rosella recovers the talisman, the hen and Pandora's Box and rescues the unicorn. In order to keep Pandora's Box from being used for evil again, Rosella returns it to its tomb and seals the entrance so that no one else can ever enter. Rosella returns the talisman and the hen to Gen
https://en.wikipedia.org/wiki/King%27s%20Quest%20VII
King's Quest VII: The Princeless Bride is a graphic adventure game developed and published by Sierra On-Line for the MS-DOS, Microsoft Windows and Macintosh computers in 1994. It features high-resolution graphics in a style reminiscent of Disney animated films and is the only King's Quest game with multiple protagonists: Queen Valanice and Princess Rosella, who are both spirited away to the realm of Eldritch, and Rosella is transformed into a troll. They must find a way to return Rosella to normal and find her true love, get rid of a powerful evil force threatening this realm, and get back to their kingdom Daventry. King's Quest VII is the only game in the series to divide the story into chapters. Some puzzles have multiple solutions, and there are two possible endings. Critical reactions to the game were generally positive. Gameplay King's Quest VII is different from the previous King's Quest games in terms of structure. The action is separated into six chapters, each set primarily in a different region of the realm of Eldritch. The player alternates between two heroines, Valanice and Rosella, with each chapter. The two heroines travel through some of the same places during the course of the game, finally meeting up again in the end. Aside from the multi-chapter layout, the most significant change in game structure is the simplification of user interface by the use of smart pointer. When playing the game, the pointer lights up when passed over an object that can be used. Players can get or use objects and talk to characters by directly clicking on them, whereas previous games required the player to select an action icon and then click on the environment, and can click on the environment without indicating which parts of the game could be interacted with. One of the game's highlights is its graphics; King's Quest VII has very elaborate and colorful graphics, compared to other games of the time, with painted backgrounds and animation techniques. The game makes use of SVGA graphics, new at the time, before The Dig and Space Quest 6. Also included are certain areas that pan from one side to the other, rather than going from screen to screen. Despite the cartoonish graphics characteristic of family-friendly computer games, the game includes several violent death scenes. Plot The name of this entry, The Princeless Bride, is a pun on the title of The Princess Bride. Like most King's Quest titles, it is also a reference to the plot: Princess Rosella is soon to be a bride, but ends up in another world shortly before her marriage. It is the only entry in the series to feature Queen Valanice in a major role, and also the only one in which King Graham is not shown or mentioned at all (with one minor exception in version 1.4). Sierra marketed the game as an improvement in the series by stating that completion of earlier KQ adventures was not necessary to fully enjoy the game, even though the final chapter revealed a strong connection to the events of
https://en.wikipedia.org/wiki/Cooksville
Cooksville may refer to: Places Canada Cooksville (Mississauga), a neighbourhood in Mississauga, Ontario, Canada Cooksville GO Station, a station in the GO Transit network located in the neighbourhood Mississauga East—Cooksville, an electoral district of Mississauga which includes the neighbourhood United States Cooksville, Georgia Cooksville, Illinois Cooksville, Maryland Cooksville, Wisconsin
https://en.wikipedia.org/wiki/VT180
The VT180 is a personal computer produced by Digital Equipment Corporation (DEC) of Maynard, Massachusetts, USA. Introduced in early 1982, the CP/M-based VT180 was DEC's entry-level microcomputer. "VT180" is the unofficial name for the combination of the VT100 computer terminal and VT18X option. The VT18X includes a 2 MHz Zilog Z80 microprocessor and 64K RAM on two circuit boards that fit inside the terminal, and two external 5.25-inch floppy disk drives with room for two more in an external enclosure. The VT180 was codenamed "Robin". Digital later released a full-fledged personal computer known as the Rainbow 100 as the successor to Robin. When Digital ended the VT100 terminal family in 1983, it also discontinued the VT180. No direct replacement was offered, although the Rainbow 100 eventually provided a superset of Robin's functionality. References External links DEC Robin, DigiBarn Computer Museum DEC VT180, Terminals Wiki Character-oriented terminal DEC computer terminals 8-bit computers
https://en.wikipedia.org/wiki/Sticky%20bit
In computing, the sticky bit is a user ownership access right flag that can be assigned to files and directories on Unix-like systems. There are two definitions: one for files, one for directories. For files, particularly executables, superuser could tag these as to be retained in main memory, even when their need ends, to minimize swapping that would occur when another need arises, and the file now has to be reloaded from relatively slow secondary memory. This function has become obsolete due to swapping optimization. For directories, when a directory's sticky bit is set, the filesystem treats the files in such directories in a special way so only the file's owner, the directory's owner, or root user can rename or delete the file. Without the sticky bit set, any user with write and execute permissions for the directory can rename or delete contained files, regardless of the file's owner. Typically this is set on the /tmp directory to prevent ordinary users from deleting or moving other users' files. The modern function of the sticky bit refers to directories, and protects directories and their content from being hijacked by non-owners; this is found in most modern Unix-like systems. Files in a shared directory such as /tmp belong to individual owners, and non-owners may not delete, overwrite or rename them. History The sticky bit was introduced in the Fifth Edition of Unix (in 1974) for use with pure executable files. When set, it instructed the operating system to retain the text segment of the program in swap space after the process exited. This speeds up subsequent executions by allowing the kernel to make a single operation of moving the program from swap to real memory. Thus, frequently-used programs like editors would load noticeably faster. One notable problem with "stickied" programs was replacing the executable (for instance, during patching); to do so required removing the sticky bit from the executable, executing the program and exiting to flush the cache, replacing the binary executable, and then restoring the sticky bit. Subsequently, this behavior became operative only in HP-UX and UnixWare. Solaris appears to have abandoned this in 2005. The 4.4-Lite release of BSD retained the old sticky bit behavior, but it has been subsequently dropped from OpenBSD (as of release 3.7) and FreeBSD (as of release 2.2.1). No version of Linux has ever supported this traditional behavior; Linux performs caching of executable files in the same way as all files, so re-executing the program to flush the cache is not necessary. Usage The most common use of the sticky bit is on directories residing within filesystems for Unix-like operating systems. When a directory's sticky bit is set, the filesystem treats the files in such directories in a special way so only the file's owner, the directory's owner, or root can rename or delete the file. Without the sticky bit set, any user with write and execute permissions for the directory can rename or dele
https://en.wikipedia.org/wiki/Rainbow%20100
The Rainbow 100 is a microcomputer introduced by Digital Equipment Corporation (DEC) in 1982. This desktop unit had a monitor similar to the VT220 and a dual-CPU box with both Zilog Z80 and Intel 8088 CPUs. The Rainbow 100 was a triple-use machine: VT100 mode (industry standard terminal for interacting with DEC's own VAX), 8-bit CP/M mode (using the Z80), and CP/M-86 or MS-DOS mode using the 8088. It ultimately failed to in the marketplace which became dominated by the simpler IBM PC and its clones which established the industry standard as compatibility with CP/M became less important than IBM PC compatibility. Writer David Ahl called it a disastrous foray into the personal computer market. The Rainbow was launched along with the similarly packaged DEC Professional and DECmate II which were also not successful. The failure of DEC to gain a significant foothold in the high-volume PC market would be the beginning of the end of the computer hardware industry in New England, as nearly all computer companies located there were focused on minicomputers for large organizations, from DEC to Data General, Wang, Prime, Computervision, Honeywell, and Symbolics Inc. Models The Rainbow came in three models, the 100A, 100B and 100+. The "A" model was the first released, followed later by the "B" model. The most noticeable differences between the two models were the firmware and slight hardware changes. The systems were referred to with model numbers PC-100A and PC-100B respectively; later were also designated PC-100B2. The system included a user-changeable ROM chip in a special casing to support their keyboard layout and language of the boot screen. On the 100A, the ROMs only supported three languages. The Rainbow did not have an ISA bus, so the typical RAM limit didn't apply, with both models supporting a maximum RAM of over . PC-100A The "A" model was the first produced by Digital. The distinguishing characteristic of the "A" model from an end-user perspective was that the earlier firmware did not support booting from a hard disk. Other distinguishing hardware features included the three 2764 (8 KB) ROM chips holding the system firmware and the case fan/power supply combinations. In addition, the 100A was unable to move its hardware interrupt vectors to avoid the conflict with MS-DOS soft INT 21, etc. DOS had to take unusual actions to distinguish between the hard and soft vectors. The Rainbow 100A initially only supported of RAM total, but the limitation in the memory expansion slot was later worked around with a special adapter card, though the maximum was limited to PC-100B The "B" model followed the "A" model, and introduced a number of changes. The "B" model featured the ability to boot from a hard disk (referred to as the Winchester drive) via the boot menu due to updated firmware. The hardware changes included bigger firmware stored on two and an improved case fan/power supply. The firmware allowed selection of the boot screen
https://en.wikipedia.org/wiki/DEC%20Professional%20%28computer%29
The Professional 325 (PRO-325), Professional 350 (PRO-350), and Professional 380 (PRO-380) are PDP-11 compatible microcomputers. The Pro-325/350 were introduced in 1982 and the Pro-380 in 1985 by Digital Equipment Corporation (DEC) as high-end competitors to the IBM PC. History Like the cosmetically similar Rainbow 100 and DECmate II (also introduced at that time), the PRO series uses the LK201 keyboard and 400KB single-sided quad-density floppy disk drives (known as RX50), and offers a choice of color or monochrome monitors. For DEC, none of the three would be favorably received, and the industry instead standardized on Intel 8088-based IBM PC compatibles which are all binary program compatible with each other. In some ways, the PDP-11 microprocessors are technically superior to the Intel-based chips. While the 8088 is restricted to 1MB of memory because of its 20-bit address bus, DEC microprocessors are capable of accessing 4MB with their 22-bit addressing (although direct addressing of memory is limited in both approaches to 64KB segments, limiting the size of individual code and data objects). BYTE in 1984 reported that Venix on the PC outperformed the same operating system on the DEC Professional and PDP-11/23. Further, although the PDP-11 was a very successful minicomputer, it lacked a wide base of affordable small business software. By comparison, many existing CP/M applications (see the Rainbow 100) were easily ported to the similar 8086/8088 chips and MS-DOS operating system. Porting existing PDP-11 software to the PRO was complicated by design decisions that rendered it partially incompatible with its parent product line. Industry critics observed that this incompatibility appeared at least in part deliberate, as DEC belatedly sought to "protect" its more-profitable mainstream PDP-11s from price competition with lower-priced PCs. The PRO was never widely accepted as an office personal computer, nor as a scientific workstation, where the market was also headed to Intel 8086, or alternately to Motorola 68000-based computers. The failure of DEC to gain a significant foothold in the high-volume PC market would be the beginning of the end of the computer hardware industry in New England, as nearly all computer companies located there were focused on minicomputers for large organizations, from DEC to Data General, Wang, Prime, Computervision, Honeywell, and Symbolics Inc. Technical specifications The PRO-325 and -350 use the F-11 chipset (as used in LSI-11/23 systems) to create a single-board PDP-11 with up to six expansion slots of a proprietary CTI (Computing Terminal Interconnect) bus using 90-pin ZIF connectors. The PRO family uses dual RX50 floppy drives for storage; the PRO-325 has only floppies, and the 350 and 380 also include an internal hard drive. Mainline PDP-11s generally use separate serial terminals as console and display devices; the PRO family uses built-in bit-mapped graphics to drive a combined console and display.
https://en.wikipedia.org/wiki/LK201
The LK201 is a detachable computer keyboard introduced by Digital Equipment Corporation of Maynard, Massachusetts in 1982. It was first used by Digital's VT220 ANSI/ASCII terminal and was subsequently used by the Rainbow-100, DECmate-II, and Pro-350 microcomputers and many of Digital's computer workstations such as the VAXstation and DECstation families. The keyboard layout was new at the time, adding a set of cursor and miscellaneous keys between the main keyboard and the numeric keypad. The cursor keys were arranged in what has now become the standard "Inverted T" arrangement seen on essentially all contemporary full-sized computer keyboards. The keyboard also added a Compose key to allow typing of all of the characters in the terminal's extended character set using two-stroke mnemonics, for instance produced . An LED on the keyboard indicated an ongoing compose sequence. Ergonomic considerations caused the keyboard to be designed with a very low profile; it was very thin, especially when compared to the keyboard used on the VT100. The keyboard connected using a modular connector over which flowed power and asynchronous serial data. At the time of its introduction, the differences between the new layout and the traditional Teletype Model 33 and VT100 layouts proved disruptive, but the LK201's key arrangement was emulated by the even more successful Model M keyboard and through it became the de facto standard for all full-sized computer keyboards. Today's standard layout differs primarily in the restoration of the Escape Key found on the VT100 and that the numeric keypad has two double-height keys instead of one, decreasing the number pad keys from 18 to 17. The VT220 Compose key would survive in the European ISO standard but not in the U.S. ANSI standard. Follow-on keyboards from Digital refined the design introduced with the LK201. One notable departure from the basic LK201 design was a Unix-oriented keyboard, the LK421, that omitted the added middle group of cursor and miscellaneous function keys but included a dedicated Escape Key. Many Unix users preferred a narrower, ASCII-oriented keyboard rather than the rather-wide LK201 arrangement and the Escape Key was essential for several popular Unix editors. References External links BSD documentation on LK201 keyboard More pictures of the LK201 including internals LK201 Keycode and Keyboard Division Chart (in color) (jpg 67k) (The scancode of Right Shift is xab, not xae which is (Left) Shift only (see the next reference). LK201 Keycodes and Keyboard Divisions Computer keyboard models DEC hardware
https://en.wikipedia.org/wiki/Rainbow%20and%20Greens
Rainbow and Greens (虹と緑, Niji to Midori) was a Green political organization in Japan from 1998–2008. It was a nationwide network of prefectural assembly members, usually running on local platforms variously named as "living citizen network", "living club", "living cooperative" or the Rainbow and Greens 500-Member List Movement . It is a member of the Asia-Pacific Green Network. The national spokespersons for the party were Kiyoshi Matsuya , former Shizuoka Prefecture assembly member and the city councillor Mutsuko Katsura in Ibaraki, Osaka. The symbol of the "rainbow" represents diversity, solidarity and the cooperation which respect personal differences; the colour "green" signifies conversion to an economy which coexists with natural environment. Electoral record In the 2004 parliamentary election, this network of local groups supported the Democratic Party of Japan and the conservative-leaning national Green party Environmental Green Political Assembly (Midori no Kaigi). In the 2007 election, the party supported Ryuhei Kawada, who was elected to the House of Councillors. Kawada announced that he will organize a Green party group in the House, helping the Rainbow and Greens to become a national political party. Reportedly, the Rainbow and Greens have decided to dissolve itself in December 2007 and merge with the Japan Greens. References External links Rainbow and Greens official website Green political parties Defunct political parties in Japan Political parties established in 1998 Political parties disestablished in 2008 1998 establishments in Japan 2008 disestablishments in Japan
https://en.wikipedia.org/wiki/Suhas%20Patil
Suhas S. Patil (born 1944) is an Indian-American entrepreneur, academic, and venture capitalist. He founded Cirrus Logic, a fabless semiconductor company. Patil's work has covered computer architecture, parallel processing computers, very-large-scale integration devices, and integrated circuit design automation software. He also serves on the boards of The Tech Museum and the World Affairs Council of Northern California. He is known for describing the "cigarette smokers problem" for concurrent computing in 1971. Early life and education Patil grew up in Jamshedpur, India. His father was the first person in the family to go to a university and get an engineering degree and worked at Tata Steel while Patil was growing up. Patil went to study intermediate science at St. Xavier's College, Kolkata and then to the Indian Institute of Technology Kharagpur for his bachelor's degree in electrical engineering. He attended the Massachusetts Institute of Technology for his masters and doctorate degrees, graduating in 1967 and 1970 respectively. Career From 1970 until 1975, Patil was assistant professor of electrical engineering at Massachusetts Institute of Technology. While at MIT, he also served as assistant director of Project MAC (Multi-Access Computer), the largest computer science laboratory in the U.S, where the timesharing computer system was developed. At MIT, he worked in the area of computer architecture and related topics. As a gift to the Massachusetts Institute of Technology, Patil awarded $1.5 million for the construction of the Suhas and Jayashree Patil Conference Center at the Stata Center. From 1977 to 1981, he was a member of the faculty at the University of Utah School of Computing. Patil founded Patil Systems, Inc., in 1981 in Salt Lake City, which was renamed as Cirrus Logic in 1984 when it moved to Silicon Valley. He has been the Chairman of Cirrus Logic since its founding and Emeritus since 1997. He is currently the Chairman of Digité, Inc. and Chairman of the Board of Cradle Technologies. Patil co-founded a global not for profit organization, the TiE – The Ind-US Entrepreneurs in 1992 with successful entrepreneurs and businessowners of Indian origin in Silicon Valley to mentor entrepreneurs and young companies. He served as TiE's first president. Personal life Patil's son is DJ Patil, who was the first Chief Data Scientist of the United States Office of Science and Technology Policy. See also Cigarette smokers problem References External links Biography in IIT Kharagpur Alumni Directory Living people American people of Indian descent American businesspeople Indian emigrants to the United States Massachusetts Institute of Technology alumni 1944 births Businesspeople from Jharkhand University of Utah faculty IIT Kharagpur alumni MIT School of Engineering faculty American electrical engineers Indian electrical engineers Marathi people
https://en.wikipedia.org/wiki/Boy-Scoutz%20%27n%20the%20Hood
"Boy-Scoutz 'n the Hood" is the eighth episode of the fifth season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on November 18, 1993. In the episode, Bart, intoxicated from an all-syrup Squishee, mistakenly joins the Junior Campers, a Boy Scout-style organization. Homer and Bart join a father-son rafting trip which goes awry when they are stranded at sea. The episode was written by Dan McGrath and directed by Jeffrey Lynch. Ernest Borgnine guest starred in the episode as himself. He recorded his lines at the Village Recorder in West Los Angeles. The episode makes cultural references to the films My Dinner with Andre, The Terminator, On the Town, "Crocodile" Dundee, Deliverance, Friday the 13th, and Boyz n the Hood (in the title) as well as the song "Sugar, Sugar" by The Archies. Since airing, the episode has received mostly positive reviews from television critics. It acquired a Nielsen rating of 13.0, and was the highest-rated show on the Fox network the week it aired. Plot Bart and Milhouse find $20 that Homer lost and order a Super Squishee made entirely of syrup from Apu at the Kwik-E-Mart. With their senses reeling from the high sugar content, they spend the rest of the money drinking sugary drinks. The next morning, Bart wakes up with a hangover and realizes he joined the Junior Campers during his revelry. Bart plans to quit the group as soon as possible, but he attends a meeting to avoid a pop quiz at school. When he learns that Junior Campers are issued pocket knives, he keeps attending meetings. Homer mocks him relentlessly for embracing the scouts. When a father-son rafting trip is planned, neither Bart nor Homer wish to go together. They offer invitations to each other thinking they will both refuse them, but inadvertently end up agreeing to attend. Homer is distressed when he learns that he and Bart will share a raft with Ned and his son Rod. When Homer loses the map after folding it into a makeshift hat that blows away, they paddle the wrong way and find themselves lost at sea, thanks to Homer believing the current will take them back to land. Homer continues to make the situation difficult by eating most of the rations of food they have, throwing Rod's walkman into the sea when it stops working and shooting down a plane with a flare gun. They are stranded with no food or water for several days. The raft springs a leak after Homer accidentally drops a pocket knife he was intending to gift to Bart. All seems lost, but Homer smells the scent of food from a Krusty Burger on an unmanned offshore oil rig and places a large order. Bart is proud of his father after the rafting party survives their ordeal. Production "Boy-Scoutz 'n the Hood" was written by Dan McGrath and directed by Jeffrey Lynch. The episode was recorded at the Village Recorder in West Los Angeles. Ernest Borgnine guest starred in the episode as himself. The staff liked his work on the films Mart
https://en.wikipedia.org/wiki/22%20Short%20Films%20About%20Springfield
"22 Short Films About Springfield" is the twenty-first episode of the seventh season of the American animated television series The Simpsons. It originally aired on the Fox Network in the United States on April 14, 1996. It was written by Richard Appel, David X. Cohen, Jonathan Collier, Jennifer Crittenden, Greg Daniels, Brent Forrester, Dan Greaney, Rachel Pulido, Steve Tompkins, Josh Weinstein, Bill Oakley, and Matt Groening, with the writing being supervised by Daniels. The episode was directed by Jim Reardon. Phil Hartman guest starred as Lionel Hutz and the hospital board chairman. The episode depicts brief incidents experienced by a wide array of Springfield residents in a series of interconnected stories that take place over a single day. The episode's concept originated from the end segment of the season four episode "The Front", and serves as a loose parody of Pulp Fiction, which gave the staff the idea of a possible spin-off from The Simpsons. The title is a reference to the film Thirty Two Short Films About Glenn Gould. The episode received positive reviews from critics and is noted for its popularity among fans, with the "Steamed Hams" segment becoming a popular Internet meme in 2016. Plot The episode is a series of shorts ranging in length from under half a minute to over two and a half minutes, each showing daily life in Springfield, after Bart wonders if anything interesting happens to the town's citizens. Bart and Milhouse spit and squirt condiments from a highway overpass onto cars, then go to the Kwik-E-Mart. Apu closes the Kwik-E-Mart for five minutes to attend a party at Sanjay's house, trapping Moleman in the store. Bart unknowingly throws gum in Lisa's hair, and Marge tries to remove the gum by putting peanut butter and mayonnaise on her hair. Lisa's hair attracts a swarm of bees, one of which flies away. While bike riding with Mr. Burns, Smithers suffers an allergic reaction to the bee's sting and rides to the hospital, but the orderlies admit only Burns. Dr. Nick is criticized by the hospital board for his unorthodox medical procedures, only to treat Grampa with an electric light socket, saving his career. Moe gets robbed by Snake after Barney gives him $2,000 to pay for a portion of his $14 billion bar tab. While hosting Superintendent Chalmers for lunch, Principal Skinner burns his roast and bluffs his way through the meal, setting his house on fire in the process. Homer accidentally traps Maggie in a newspaper vending box. Chief Wiggum, Lou, and Eddie compare McDonald's and Krusty Burger. Bumblebee Man arrives home after a horrible day at work and his house is destroyed, causing his wife to leave him. Snake runs Wiggum over, and their ensuing fight ends with Herman capturing them at gunpoint in his store. Reverend Lovejoy urges his pet Old English Sheepdog to use Ned Flanders's lawn as a toilet. Various townspeople advise Marge and Lisa how to remove the gum stuck in Lisa's hair. Cletus offers Brandine
https://en.wikipedia.org/wiki/Micropolygon
In 3D computer graphics, a micropolygon (or μ-polygon) is a polygon that is very small relative to the image being rendered. Commonly, the size of a micropolygon is close to or even less than the area of a pixel. Micropolygons allow a renderer to create a highly detailed image. The concept of micropolygons was developed within the Reyes algorithm, in which geometric primitives are tessellated at render time into a rectangular grid of tiny, four-sided polygons. A shader might fill each micropolygon with a single color or assign colors on a per-vertex basis. Shaders that operate on micropolygons can process an entire grid of them at once in SIMD fashion. This often leads to faster shader execution, and allows shaders to compute spatial derivatives (e.g. for texture filtering) by comparing values at neighboring micropolygon vertices. Furthermore, a renderer using micropolygons can support displacement mapping simply by perturbing micropolygon vertices during shading. This displacement is usually not limited to the local surface normal but can be given an arbitrary direction. Further reading Robert L. Cook., Loren Carpenter, and Edwin Catmull. "The Reyes image rendering architecture." Computer Graphics (SIGGRAPH '87 Proceedings), pp. 95–102. Anthony Apodaca, Larry Gritz: Advanced RenderMan: Creating CGI for Motion Pictures, Morgan Kaufmann Publishers, 3D computer graphics
https://en.wikipedia.org/wiki/Trumpet%20Winsock
Trumpet Winsock is a TCP/IP stack for Windows 3.x that implemented the Winsock API, which is an API for network sockets. It was developed by Peter Tattam from Trumpet Software International and distributed as shareware software. History The first version, 1.0A, was released in 1994. It rapidly gained reputation as the best tool for connecting to the internet. Guides for internet connectivity commonly advised to use Trumpet Winsock. The author received very little financial compensation for developing the software. In 1996, a 32-bit version was released. Lawsuit In the Trumpet Software Pty Ltd. v OzEmail Pty Ltd. case, the defendant had distributed Trumpet Winsock for free with a magazine. It did also suppress notices that the software was developed by Trumpet Software. Replacement by Microsoft Windows 95 includes an IPv4 stack but it is not installed by default. An early version of this IPv4 stack, codenamed Wolverine, was released by Microsoft for Windows for Workgroups in 1994. Microsoft also released Internet Explorer 5 for Windows 3.x with an included dialer application for calling the modem pool of a dial-up Internet service provider. The Wolverine stack does not include a dialer but another computer on the same LAN may make a dialed connection or a dialer not included with Wolverine may be used on the computer using Wolverine. Architecture The binary for Trumpet Winsock is called TCPMAN.EXE. Other files included the main winsock.dll and three UCSC connection .cmd file scripts. References External links Internet Archive - Trumpet Winsock Winworld - Trumpet Winsock Cyber Harvard - Using Trumpet On Netcruiser Accounts Network socket 1994 software History of the Internet Windows communication and services
https://en.wikipedia.org/wiki/Grapher
Grapher is a computer program bundled with macOS since version 10.4 that is able to create 2D and 3D graphs from simple and complex equations. It includes a variety of samples ranging from differential equations to 3D-rendered Toroids and Lorenz attractors. It is also capable of dealing with functions and compositions of them. One can edit the appearance of graphs by changing line colors, adding patterns to rendered surfaces, adding comments, and changing the fonts and styles used to display them. Grapher is able to create animations of graphs by changing constants or rotating them in space. History Before Grapher and Mac OS X, Mac OS 9 was bundled with Pacific Tech's Graphing Calculator, a similar program to Grapher that had been included with over 20 million Macintoshes since 1994 with System 7. No versions of Mac OS X prior to Mac OS X v10.4 included a bundled graphing calculator application. On July 22, 2004, Apple bought Arizona Software's "Curvus Pro X," and renamed it “Graphing Calculator”, before deciding on “Grapher”. The news was publicly announced on September 15, 2004 at AppleInsider. Version 2.0 of Grapher was bundled with Mac OS X v10.5, and version 2.1 with Mac OS X v10.6. It was notable for being one of the few applications bundled with 10.6 to ship without 64-bit support. As of OS X 10.9, it became a 64-bit application. Features Grapher is a graphing calculator capable of creating both 2D graphs including classic (linear-linear), polar coordinates, linear-logarithmic, log-log, and polar log, as well as 3D graphs including standard system, cylindrical system, and spherical system. Grapher is a Cocoa application which takes advantage of Mac OS X APIs. It also supports multiple equations in one graph, exporting equations to LaTeX format, and comes with several pre-made equation examples. It is one of the few sophisticated graphing programs available capable of easily exporting clean vector art for use in printed documents (although exporting 3D graphs to vector is not possible). Animation of graphs is also supported in both 2D and 3D, generating a QuickTime file. It is also possible to use the operating system's copy-and-paste feature to copy equations from the application's visual equation editor. By doing so, Grapher functions as something of an equation editor; the user may copy images, EPS, PDF or LaTeX versions of entered equations into other applications. Any equation can be entered and copied; it is not limited to plottable equations. References External links Official user guide MacOS-only software made by Apple Inc. Plotting software TeX
https://en.wikipedia.org/wiki/Dalek%20Attack
Dalek Attack is a 1992 computer game based on the long-running British science fiction television series Doctor Who, in which the player controls the Doctor and fights recurring adversaries, the Daleks and other enemies. In most versions of the game, the player can choose between playing as the Fourth, Fifth or Seventh Doctor; in the MS-DOS and Amiga versions, the player can play as the Second, Fourth or Seventh Doctor, and in the ZX Spectrum version only the Seventh Doctor was available. A second player may play as the Doctor's companion (Ace or a UNIT soldier, although in the Spectrum version only Ace is available). K-9 also makes appearances later in the game as does Davros, creator of the Daleks in the TV series, as the final end of level boss. The game is set in London, Paris, New York, Tokyo and Skaro. The game was released on all major formats of the time except for the Amstrad CPC, which was announced but never released. It was designed and storyboarded by 221B Software Development. Graphics were by John Gyarmati and Wayne Dalton. Nick Kimberley programmed the PC, Spectrum and (unreleased) Amstrad versions. The Amiga and Atari ST versions were programmed by Richard Turner. Jason Heggie was in charge of the Commodore 64 version. Music was by Paul Tankard. On the PC and Amiga versions, there was a secret room behind some blocks. The room gave some of the programming credits for each game, in particular the graphics and music. The credits were hidden in this way due to the BBC not wanting individual credits for the game development team to be included in the game. The ZX Spectrum version was released in 1993 after a successful campaign by Your Sinclair readers as Alternative Software were unsure whether the Spectrum release would be commercially viable. Dalek Attack became the last full-price licensed game to be released for the machine. It differed from all the others in its first level; in all the other releases the first level involved the Doctor on a hoverboard going along the sewer. The Spectrum version had the Doctor on foot running around collecting hostages and avoiding globes. The Spectrum version also lost out on other features such as different enemies; only the Robomen, Ogrons and standard Daleks featured. The end-level guardians were also different. Before its release Spectrum owners who wrote to Alternative Software pressing for a release received a letter back stating that the game was in production, and were sent a sticker depicting the game's box front emblazoned with the legend "I've Been Exterminated!" Other versions of the game featured special Daleks such as hovering Daleks from the TV Century 21 comics strips of the 1960s. 1960s "movie" Daleks also made an appearance, as did the special weapons Dalek from Remembrance of the Daleks. Another special Dalek also featured, based on a sketch by Dalek designer Ray Cusick in an article from the 1989 Doctor Who Magazine 10th Anniversary Special showing how a Dalek
https://en.wikipedia.org/wiki/CBOF-FM
CBOF-FM (90.7 MHz) is a non-commercial radio station located in Ottawa, Ontario, Canada. It airs a French language news/talk format, much of which comes from the Ici Radio-Canada Première network. The studios and offices are located at the CBC Ottawa Broadcast Centre on Queen Street (across from the Confederation Line light rail station) in Downtown Ottawa. Owned and operated by the Canadian Broadcasting Corporation (French: Société Radio-Canada), CBOF-FM has an effective radiated power (ERP) of 84,000 watts as a class C1 station, using an omnidirectional antenna located off Chemin Dunlop in Camp Fortune, Quebec. Programming The station's current local programs are Les matins d'ici, heard weekday mornings from 5:30 a.m. to 9 a.m., and Sur le vif airing on weekday afternoons, 3 p.m. to 6 p.m. The early morning program from 5 a.m. to 5:30 a.m., Info matin, originates from CBF-FM Montreal and is also heard in Quebec City. CBOF-FM's Saturday morning local program is Les malins, heard from 7:00 a.m. to 11 a.m. History The station signed on in 1964 as CBOF. It was originally on the AM band at 1250 kHz, with 10,000 watts day and night. Before then, Radio-Canada relied on privately owned AM 970 CKCH in nearby Hull, Quebec, as well as the 50,000-watt signal of Montreal's AM 690 CBF, to serve Ottawa's francophones. On January 15, 1975 the Canadian Radio-television and Telecommunications Commission (CRTC) approved the CBC's application to increase CBOF's signal from 10,000 watts to 50,000 watts day and night at 1250 kHz. In the 1980s, the CBC made the decision to begin moving many of its English and French-language AM stations to the FM dial. The CRTC approved the CBC's application to convert CBOF from the AM band to the FM band, on November 9, 1989. CBOF moved to its current frequency on 90.7 MHz on January 7, 1991 as CBOF-FM. After a period of simulcasting on both AM and FM, the AM transmitter was shutdown. Its sister station on 102.5, on the Radio-Canada Musique network, which used the CBOF-FM call sign before that date, is now known as CBOX-FM. CBOF-FM, like all Première network stations but unlike most FM stations, broadcasts in mono. While still on the AM dial, CBOF experimented with AM stereo broadcasts between 1984 and 1987, testing all four AM stereo systems (C-QUAM, Kahn-Hazeltine, Harris and Magnavox) proposed at the time. Transmitters The two AM repeaters in Rolphton, Ontario and Maniwaki, Quebec were the last two remaining CBOF repeaters that operated on the AM band. The AM transmitters of CBOF-1 990 and CBOF-4 1400 were converted to the FM band. On March 17, 2022, the CBC submitted an application to move CBOF-1 990 to 94.3 MHz. The CRTC approved the CBC's applications to move both CBOF-1 and CBOM Maniwaki to the FM band on June 1, 2022. On September 20, 2022, the CBC submitted an application to convert CBOF-4 1400 to 98.5 MHz which was approved on November 28, 2022. Former repeaters Former CBOF repeaters that have been silent
https://en.wikipedia.org/wiki/CBOX-FM
CBOX-FM (102.5 MHz) is a non-commercial French-language radio station. It broadcasts the Société Radio-Canada's Ici Musique network in Ottawa, Ontario. CBOX's studios are located in the CBC Ottawa Broadcast Centre on Queen Street (across from the Confederation Line light rail station) in Downtown Ottawa, while its transmitter is located in Camp Fortune, Quebec. CBOX-FM plays a variety of music, including adult album alternative (AAA), classical music and jazz. This station signed on for the first time on September 12, 1974, the same day Radio-Canada launched a separate FM service. It was formerly known as CBOF-FM until 1991, when sister station AM 1250 CBOF switched to the FM dial at 90.7 MHz. For a time, CBOX-FM aired one local programme on weekday mornings, Beau temps, mauvais temps, hosted by Jhade Montpetit. This program, which was heard on every station belonging to the Ici Musique network, using local or regional hosts, was cancelled in June 2014, due to cuts to the 2014-2015 CBC/Radio-Canada budget. References External links Box Box Box Radio stations established in 1974 1974 establishments in Ontario
https://en.wikipedia.org/wiki/CBOQ-FM
CBOQ-FM is a Canadian radio station. It broadcasts the Canadian Broadcasting Corporation's CBC Music network at 103.3 FM in Ottawa, Ontario. CBOQ's studios are located in the CBC Ottawa Broadcast Centre on Queen Street (across from the Confederation Line light rail station) in Downtown Ottawa, while its transmitter is located in Camp Fortune, Quebec. The station was launched on February 27, 1948 as CBO-FM. It adopted its current callsign in 1991, when its AM sister station CBO moved to the FM band. External links CBC Ottawa BOQ BOQ Radio stations established in 1947 1947 establishments in Ontario
https://en.wikipedia.org/wiki/CBBS-FM
CBBS-FM is a Canadian radio station, which broadcasts the Canadian Broadcasting Corporation's CBC Music network on 90.1 FM in Sudbury, Ontario. The station was originally licensed by the CRTC in 1984. However, due to financial constraints at the CBC, the station was never launched, and the CBC was forced in 1991 to surrender all of its non-operating licenses. The license surrender left Sudbury as one of the largest cities in all of Canada not served by the CBC's music network. The CBC subsequently applied for a new license, which was awarded in 2000, and the station launched on March 29, 2001. The network's Take Five, hosted by Shelley Solmes, broadcast from the Art Gallery of Sudbury the day of the station's launch. Transmitters At present, the station only broadcasts in Sudbury. In long-term expansion plans that the CBC has filed with the CRTC, the station was slated to add rebroadcasters in Elliot Lake, Iron Bridge, Kapuskasing, Little Current, North Bay, Sault Ste. Marie, Temiskaming Shores, Timmins and Wawa, although no firm timeframe for this service expansion has been announced. References External links CBC Sudbury BBS BBS Radio stations established in 2001 2001 establishments in Ontario
https://en.wikipedia.org/wiki/CBBX-FM
CBBX-FM is a Canadian radio station. It broadcasts the Société Radio-Canada's Ici Musique network at 90.9 FM in Sudbury, Ontario. History The station was originally licensed by the CRTC in 1984. However, due to financial constraints at the CBC, the station was never launched, and the CBC was forced in 1991 to surrender all of its non-operating licenses. Some sources may incorrectly cite the station's call sign as CBOS-FM, the call sign that was assigned to the unlaunched 1984 license. The CBC subsequently applied for a new license, which was awarded in 2000. The station went on the air on April 20, 2001, approximately one month after the launch of CBC Radio 2's CBBS-FM. On June 29, 2007, the CBC was given approval to add a rebroadcaster of CBBX in Timmins on 105.7 MHz. As of 2015, however, the Timmins transmitter has not been launched, and due to recent funding cutbacks at the CBC its launch appears unlikely. On March 30, 2015, Eternacom, the owners of the Christian radio station CJTK-FM Sudbury, received CRTC approval to add a new FM transmitter at Timmins to operate at 105.5 MHz, which is first-adjacent to the unbuilt rebroadcaster of CBBX-FM. In long-term expansion plans that the CBC has filed with the CRTC, the station was also slated to add rebroadcasters in Hearst, Kapuskasing and North Bay, although no firm timeframe for this service expansion has been announced. References External links Bbx Bbx Bbx Radio stations established in 2001 2001 establishments in Ontario
https://en.wikipedia.org/wiki/CBON-FM
CBON-FM is a Canadian radio station. It broadcasts the Société Radio-Canada's Ici Radio-Canada Première network at 98.1 FM in Sudbury, Ontario. The station also serves much of Northern Ontario through a network of relay transmitters. History On July 28, 1975, the Canadian Broadcasting Corporation received approval from the CRTC to operate a new french-language FM station at Sudbury, Ontario on the frequency 98.1 MHz. Prior to the station's launch in 1978, Radio-Canada programming was carried on private affiliate CFBR. The CRTC decision authorizing the launch of CBON-FM in fact encouraged, but did not direct, Radio-Canada to retain an AM frequency for its talk radio network, and to reserve CBON-FM for its music network. However, the station launched in 1978 as an affiliate of the talk network after the CBC was unable to negotiate an agreement with F. Baxter Ricard to directly acquire CFBR. Prior to CBON-FM's sign-on, CJBC Toronto simulcasted on most of the rebroadcast transmitters across northern Ontario. Radio-Canada's music network was not available in the city until the launch of CBBX-FM in 2001, although from 1984 to 1991 the CBC held an unused license to launch that station. Programming The station's regional morning program is Le matin du Nord, weekdays from 6 a.m. to 9 a.m., and its regional afternoon program is Jonction 11-17, weekdays from 3:30 p.m. to 6 p.m. On Saturday mornings, the station airs the provincewide morning program À échelle humaine. The provincewide programs airs on CBON and CJBC, as well as CBEF in Windsor. On all public holidays, either Pas comme d'habitude from CJBC in Toronto is heard provincewide (except Ottawa) from 3 p.m. to 6 p.m. On some holidays, Y'a pas deux matins pareils from CJBC or Le matin du Nord from CBON airs on both stations, but on some others holidays, both stations air their local shows as usual or both stations air Matins sans frontières from CBEF Windsor. Transmitters AM to FM and technical information On February 28, 2017, the CBC submitted an application to convert CBON-6 1010 to 98.5 MHz. The callsign CBON-FM-6 was chosen for the new FM transmitter. The CRTC approved the CBC's application to move CBON-6 to 98.5 MHz on July 11, 2017. In 2017, the CBC surrendered its licence for the low-power AM rebroadcaster CBON-10 1110 Matachewan. This makes CBON-12 Mattawa one of the last remaining low-power AM transmitters to rebroadcast CBON-FM Sudbury. No plans have been announced to either convert the Mattawa transmitter to the FM band or shutdown completely. On August 19, 2021, the CRTC approved the CBC's application to increase the average effective radiated power (ERP) for CBON-FM-5 at 101.7 MHz Elliot Lake from 1,000 to 7,245 watts (maximum ERP from 2,640 to 17,622 watts), increasing the effective height of the antenna above average terrain from 141.0 to 165.3 metres. References External links Ici Radio-Canada Première Bon Bon Bon Radio stations established in 1978 1978 establishments
https://en.wikipedia.org/wiki/CJBC%20%28AM%29
CJBC is a Canadian Class A clear-channel station, which broadcasts at 860 AM in Toronto, Ontario. It is that city's outlet of the Ici Radio-Canada Première network. CJBC's studios are located at the Canadian Broadcasting Centre, while its transmitter is located in Hornby. History The station was originally launched in 1925 as CKNC on 840 AM, owned by the Canadian National Carbon Company. In January 1927, the station moved to 690 kHz, returning to 840 kHz a month later. The station then moved to 580 in 1928, and to 1030 kHz in 1931. The station was leased and then acquired by the Canadian Radio Broadcasting Commission, the forerunner of the modern Canadian Broadcasting Corporation, in 1933 and became CRCY, before leaving the airwaves in 1935. The following year, it returned at 1420 kHz, as a signal booster for CRCT. The station's callsign was changed to CBY in 1938, in 1941 the station moved to 1010 kHz, and the callsign was changed again to the current CJBC on November 15, 1943. In 1944, CJBC became the flagship of the CBC's Dominion Network. On September 1, 1948, CJBC moved to its current frequency, 860 kHz, exchanging frequencies with the privately-owned CFRB. Its signal strength was boosted to 50,000 watts, up from its previous strength of 1,000 watts. As a Dominion Network affiliate, the station carried network programming in the evening, which included light entertainment fare and some American programming, and local programming during the day. CJBC began carrying some French language programming in 1962, initially in the form of a nightly, half-hour newscast. With the closure of the Dominion Network on October 1, 1962, CJBC's French schedule expanded to two hours of programming each evening. The station adopted a French-only schedule when it became a fully fledged Radio-Canada station on October 1, 1964. Federal Member of Parliament Ralph Cowan attempted to fight the changeover, arguing that since the French language had no legal status outside of Quebec, the station's conversion to French was inappropriate and illegal; however, his case was dismissed by the Ontario Supreme Court in 1965 on grounds of legal standing, as Cowan could not show material harm from the format change. The station has been carried on rebroadcasters in Belleville, Kingston and Midland-Penetanguishene since 1977, London since 1978 and Peterborough since 1980. CJBC also had rebroadcasters under the CJBC callsign that served most of northern Ontario that changed to CBON-FM programming out of Sudbury after the station signed on in 1978. CBEF in Windsor, although officially licensed as a separate station, has also been a de facto rebroadcaster of CJBC since staffing cutbacks in 2009; the station maintained a skeleton staff of just two reporters for local news breaks, while otherwise simulcasting CJBC's programming at all times. Eventually, CBEF would expand its local programming with a morning program and local news bulletins, though otherwise broadcasting a simil
https://en.wikipedia.org/wiki/CJBC-FM
CJBC-FM is a public radio station, broadcasting at 90.3 MHz in Toronto, Ontario, Canada. A French-language station, it airs the programming of Radio-Canada's Ici Musique network. CJBC's studios are located in the Canadian Broadcasting Centre, while its transmitter is located atop First Canadian Place in Toronto's Financial District. The station launched on November 3, 1992. It is a sister station to CJBC, which is part of the Ici Radio-Canada Première network. In December 2017, CJBC-FM added an HD Radio feed to broadcast high-quality digital radio signals throughout much of Toronto. CJBC-FM has retransmitters in Windsor and Paris (Kitchener/Waterloo). Programming As a part of the Ici Musique network, CJBC-FM mainly broadcasts the same programs as the rest of the network. However, the station simulcasts the local Ici Première morning and afternoon drive time programs Y'a pas deux matins pareils and L'heure de pointe. The morning show has been simulcast since 2004 and the afternoon show since 2020. Transmitters References External links ICI Musique Jbc Jbc Jbc Radio stations established in 1992 1992 establishments in Ontario HD Radio stations
https://en.wikipedia.org/wiki/CBM-FM
CBM-FM (93.5 MHz) is a public non-commercial radio station in Montreal, Quebec. It carries the English-language CBC Music network. Owned and operated by the government-owned Canadian Broadcasting Corporation, CBM-FM is a Class C1 station. It transmits from the Mount Royal candelabra tower with an effective radiated power of 100,000 watts, using horizontal polarization. Its studios and offices, along with those of CBC Radio One sister station CBME-FM, are located at Maison Radio-Canada on René Lévesque Boulevard. History In 1947, CBM-FM first signed on at 100.7 MHz. In its early years, it simulcast the programming of co-owned CBM. French language CBF-FM also officially went on the air that year, at 95.1 MHz, although it had done experimental broadcasts for several years leading up to its sign-on. In 1960, CBM-FM began airing separate programming, along with the other CBC FM stations, playing mostly classical music. It became a simulcast of CBM again in 1962, but returned to separate programming in 1964. In 1971, CBM-FM moved to 93.5. CBF-FM took over the 100.7 frequency vacated by CBM-FM. The CBC FM network was rebranded CBC Stereo on 3 November 1975, and CBC Radio Two in 1997. In 2006, CBM-FM and other Radio Two stations began a transition from mostly classical and jazz programming to a mix of adult album alternative, singer-songwriter and world music, as well as some classical and jazz. The weeknight version of the jazz program Tonic, hosted by Katie Malloch, originated from CBM-FM until Malloch's retirement in 2012. Rebroadcasters References External links BM BM BM Radio stations established in 1946 1946 establishments in Quebec
https://en.wikipedia.org/wiki/CBFX-FM
CBFX-FM (100.7 MHz) is a public non-commercial radio station in Montreal, Quebec. It is the flagship station of the Ici Musique Network and broadcasts in French. Owned and operated by the government-owned Canadian Broadcasting Corporation (French: Société Radio-Canada), CBFX-FM is a Class C1 station. It transmits from the Mount Royal candelabra tower with an effective radiated power of 100,000 watts. Its studios and offices, along with those of Ici Radio-Canada Première sister station CBF-FM, are located at Maison Radio-Canada on René Lévesque Boulevard. History On March 13, 1946, the station began experimental broadcasts as VE9CB on 98.1 MHz. It received a full license on March 5, 1948, as CBF-FM, broadcasting at 95.1 MHz. For most of its early years, it simulcast co-owned CBF. Occasionally in the 1960s and 70s, it would break away from its AM counterpart to air special programming. With the CBC's English-language FM network already established since the 1960s, plans were made to create a French-language FM network, with CBF-FM as its originating station. In 1971, in preparation for its role as the French FM flagship, CBF-FM swapped frequencies with CBM-FM. CBF-FM moved to 100.7, just vacated by CBM-FM, while that station moved to a new frequency, 93.5 MHz. The move not only allowed CBF-FM to boost its signal to a full 100,000 watts, but it also began to broadcast in stereo for the first time. In 1972, La Chaîne Culturelle (The Cultural Network) was launched on four CBC-owned FM stations, CBF-FM in Montreal, CBOF-FM in Ottawa, CBV-FM in Quebec City and CBJ-FM in Chicoutimi. The network aired mostly classical music with some jazz and other arts programming. In 1998, CBF-FM changed its call sign. Its AM sister station, CBF, moved to the FM band and picked up the CBF-FM call letters. That required the former CBF-FM to switch to a new call sign, CBFX-FM. In 2004, the network was renamed Espace Musique. And in 2014, it became Ici Musique, still with 100.7 CBFX-FM as its originating station. Transmitters 1 - On April 25, 2013, the CRTC approved the CBC's application to amend the licenses of CBFX's rebroadcasters at Trois-Rivières and Sherbrooke, with both stations broadcasting at least 20 minutes of local programming each week, with the remainder programming from the Espace Musique network. The Trois-Rivières repeater at 104.3 MHz will upgrade to an average ERP of 45,400 watts, and a maximum ERP of 100,000 watts (up from 43,000 watts max ERP currently) with an effective height above average terrain of 249.7 metres. The Sherbrooke transmitter at 90.7 MHz will keep its existing parameters with an ERP of 25,000 watts (non-directional antenna with an EHAAT of 173 metres). Though CBFX-4 and CBFX-5 are technically rebroadcasters of CBFX, on-air idents show they actually rebroadcast Ottawa's CBOX-FM. References External links ICI Musique Bfx Bfx Bfx Radio stations established in 1948 1948 establishments in Quebec fr:CBFX-FM
https://en.wikipedia.org/wiki/Virotherapy
Virotherapy is a treatment using biotechnology to convert viruses into therapeutic agents by reprogramming viruses to treat diseases. There are three main branches of virotherapy: anti-cancer oncolytic viruses, viral vectors for gene therapy and viral immunotherapy. These branches use three different types of treatment methods: gene overexpression, gene knockout, and suicide gene delivery. Gene overexpression adds genetic sequences that compensate for low to zero levels of needed gene expression. Gene knockout uses RNA methods to silence or reduce expression of disease-causing genes. Suicide gene delivery introduces genetic sequences that induce an apoptotic response in cells, usually to kill cancerous growths. In a slightly different context, virotherapy can also refer more broadly to the use of viruses to treat certain medical conditions by killing pathogens. History Chester M. Southam, a researcher at Memorial Sloan Kettering Cancer Center, pioneered the study of viruses as potential agents to treat cancer. Oncolytic virotherapy Oncolytic virotherapy is not a new idea – as early as the mid 1950s doctors were noticing that cancer patients who suffered a non-related viral infection, or who had been vaccinated recently, showed signs of improvement; this has been largely attributed to the production of interferon and tumour necrosis factors in response to viral infection, but oncolytic viruses are being designed that selectively target and lyse only cancerous cells. In the 1940s and 1950s, studies were conducted in animal models to evaluate the use of viruses in the treatment of tumours. In the 1940s–1950s some of the earliest human clinical trials with oncolytic viruses were started. Mechanism It is believed that oncolytic virus achieve their goals by two mechanisms: selective killing of tumor cells as well as recruitment of host immune system. One of the major challenges in cancer treatment is finding treatments that target tumor cells while ignoring non-cancerous host cells. Viruses are chosen because they can target specific receptors expressed by cancer cells that allow for virus entry. One example of this is the targeting of CD46 on multiple myeloma cells by measles virus. The expression of these receptors are often increased in tumor cells. Viruses can also be engineered to target specific receptors on tumor cells as well. Once viruses have entered the tumor cell, the rapid growth and division of tumor cells as well as decreased ability of tumor cells to fight off viruses make them advantageous for viral replication compared to non-tumorous cells. The replication of viruses in tumor cells causes tumor cells to lyse killing them and also release signal to activate the host's own immune system, overcoming immunosuppression. This is done through the disruption of the microenvironment of the tumor cells that prevents recognition by host immune cells. Tumor antigens and danger-associated molecular patterns are also released during the lys
https://en.wikipedia.org/wiki/Augmented%20transition%20network
An augmented transition network or ATN is a type of graph theoretic structure used in the operational definition of formal languages, used especially in parsing relatively complex natural languages, and having wide application in artificial intelligence. An ATN can, theoretically, analyze the structure of any sentence, however complicated. ATN are modified transition networks and an extension of RTNs. ATNs build on the idea of using finite state machines (Markov model) to parse sentences. W. A. Woods in "Transition Network Grammars for Natural Language Analysis" claims that by adding a recursive mechanism to a finite state model, parsing can be achieved much more efficiently. Instead of building an automaton for a particular sentence, a collection of transition graphs are built. A grammatically correct sentence is parsed by reaching a final state in any state graph. Transitions between these graphs are simply subroutine calls from one state to any initial state on any graph in the network. A sentence is determined to be grammatically correct if a final state is reached by the last word in the sentence. This model meets many of the goals set forth by the nature of language in that it captures the regularities of the language. That is, if there is a process that operates in a number of environments, the grammar should encapsulate the process in a single structure. Such encapsulation not only simplifies the grammar, but has the added bonus of efficiency of operation. Another advantage of such a model is the ability to postpone decisions. Many grammars use guessing when an ambiguity comes up. This means that not enough is yet known about the sentence. By the use of recursion, ATNs solve this inefficiency by postponing decisions until more is known about a sentence. See also Context free language Finite state machine Formal grammar Parsing Recursive transition network References Winograd, Terry (1983), Language as a Cognitive Process, Volume 1: Syntax, Addison–Wesley, Reading, MA. External links An introduction on ATNs by Paul Graham in On Lisp Automata (computation) Natural language parsing
https://en.wikipedia.org/wiki/Freedows
Freedows is: a Brazilian Linux distribution; see Freedows Linux a suspended project for creating a free operating system; see Freedows OS
https://en.wikipedia.org/wiki/VoiceOver
VoiceOver is a screen reader built into Apple Inc.'s macOS, iOS, tvOS, watchOS, and iPod operating systems. By using VoiceOver, the user can access their Macintosh or iOS device based on spoken descriptions and, in the case of the Mac, the keyboard. The feature is designed to increase accessibility for blind and low-vision users, as well as for users with dyslexia. The keyboard shortcut to activate VoiceOver is Command-F5. macOS VoiceOver was first introduced in Mac OS X 10.4 and the target was users who had difficulty in reading due to vision impairment, particularly the blind. A preview had also been made available for Mac OS X 10.3 Panther, and was titled "Spoken Interface Preview." VoiceOver treats the user interface as a hierarchy of elements, which are navigated by various keystrokes. Elements also are "interacted" with—for example, interacting with a text box allows reading its text and, if possible, editing it; interacting with a scroll bar allows it to be moved using the keyboard. VoiceOver also includes support for many Braille displays. In addition, VoiceOver includes features for those that cannot use the mouse, such as keyboard-based navigation. For users with MacBooks or Magic Trackpads, a number of special multitouch features are also available. The trackpad will respond to gestures, much like iOS's version of VoiceOver. A specific example is using the trackpad to explore the actual visual layout of elements on the screen - sliding one finger around the trackpad will select elements, tapping twice will activate them. In Mac OS X 10.5, Apple added the "Alex" voice, which offered improved quality of speech and a more human-like sound. Previously, the voices were directly descended from those used in Apple's "Speech Manager," which originated in the early 1990s. Also, Alex voice has natural breathing, unlike all other voices in Apple. In Mac OS X 10.7, Apple offered the download of RealSpeak voices from Nuance for use with VoiceOver. Accessibility Inspector Accessibility Inspector is made to verify the accessibility of OS X applications. It displays information about the GUI element that is currently under the cursor. iPod Shuffle After its success on Macs, Apple added VoiceOver to the iPod Shuffle. This assists users of the iPod Shuffle in controlling the playback of songs by having titles read out. With the 2010 revision of iPod Shuffle, the user can also have VoiceOver read out playlists. Unlike VoiceOver on OS X, where VoiceOver is marketed as an accessibility feature, on the iPod Shuffle VoiceOver is intended to be used by everyone, disabled or not. iOS A few months later, with the release of the iPhone 3GS, VoiceOver was added to iOS. When the iPod Touch was upgraded to match the hardware of the iPhone 3GS (in iPod touch's third generation), it also gained VoiceOver capability. The iPad, since its introduction, has also had VoiceOver capability. VoiceOver on iOS interacts with the user by using various "gestures," dif
https://en.wikipedia.org/wiki/Restaurant%20Makeover
Restaurant Makeover is a television series on HGTV Canada that currently airs as reruns on the Food Network Canada and HGTV Canada, as well as the Fine Living channel and Food Network in the United States, DTour and in over 16 other countries worldwide. The pilot episode starred designer Robin De Groot and chef Brad Long in the Coco's Cafe. Most of the restaurants involved in the series were located in the Greater Toronto Area. The series has been rebooted as Restaurant Takeover on Food Network Canada. Synopsis It is hosted by chefs Brad Long, Rene Chauvin, Lynn Crawford, Massimo Capra, Corbin Tomaszeski, David Adjey, and Susur Lee along with designers Robin De Groot, Meredith Heron, Cherie Nicole Stinson, Jessica Cotton, Glen Peloso, Brenda Bent, Cheryl Torrenueva, Lisa North, and Jonathan Furlong, who perform renovation makeovers on restaurants desiring transformation. The premise of the show is to challenge two restaurant professionals, one designer and one chef, to overhaul a struggling restaurant with a very limited budget and time. Originally the show would match funds provided by the restaurant owners up to $20,000; however, that decreased to just $15,000 as the show moved into its later seasons. Criticism Although the show's premise is to help struggling restaurants, a number of establishments have failed shortly after their makeover — sometimes before the episode of the show featuring the restaurant had aired, thus not allowing them to reap the benefits of added exposure. Some critics held the opinion that participating in Restaurant Makeover was a "kiss of death" for failing restaurants. However, it was noted that given the dire condition of some participants' establishments, even a significant change could not salvage the business. List of renovated restaurants Season 1 Season 2 Season 3 Season 4 Season 5 References External links Episode list from Food Network Canada Episode list from HGTV Food reality television series Food Network (Canadian TV channel) original programming HGTV (Canada) original programming 2005 Canadian television series debuts 2008 Canadian television series endings 2000s Canadian reality television series Television series by Alliance Atlantis
https://en.wikipedia.org/wiki/Alexander%20Stepanov
Alexander Alexandrovich Stepanov (; born November 16, 1950, Moscow) is a Russian-American computer programmer, best known as an advocate of generic programming and as the primary designer and implementer of the C++ Standard Template Library, which he started to develop around 1992 while employed at HP Labs. He had earlier been working for Bell Labs close to Andrew Koenig and tried to convince Bjarne Stroustrup to introduce something like Ada generics in C++. He is credited with the notion of concept. He is the author (with Paul McJones) of Elements of Programming, a book that grew out of a "Foundations of Programming" course that Stepanov taught at Adobe Systems (while employed there). He is also the author (with Daniel E. Rose) of From Mathematics to Generic Programming. He retired in January 2016 from A9.com. Standard Template Library and generic programming Alexander Stepanov is an advocate of generic programming. Although David Musser had already developed and advocated some aspects of generic programming by 1971, it was limited to a rather specialized area of software development (computer algebra). Stepanov recognized the full potential for generic programming and persuaded his then-colleagues at General Electric Research and Development (including, primarily, David Musser and Deepak Kapur) that generic programming should be pursued as a comprehensive basis for software development. At the time there was no real support in any programming language for generic programming. The first major language to provide such support was Ada, with its generic units feature. By 1987 Stepanov and Musser had developed and published an Ada library for list processing that embodied the results of much of their research on generic programming. However, Ada had not achieved much acceptance outside the defense industry and C++ seemed more likely to become widely used and provide good support for generic programming even though the language was relatively immature. Another reason for turning to C++, which Stepanov recognized early on, was that the C/C++ model of computation (which allows very flexible access to storage via pointers) is crucial to achieving generality without losing efficiency. It eventually led to the development of the Standard Template Library of C++. See also Object-oriented programming criticism References Further reading External links Collected Papers of Alexander A. Stepanov An interview of Stepanov, from STLport, 1997 Another interview, from Dr. Dobbs, March 1995 Range Partition Adapters A STL-based multi-threaded library, inspired from an article of Alexander Stepanov. An interview, by Andrew Binstock, with Alexander Stepanov and Paul McJones on Elements of Programming. A9 Video lectures by Alexander Stepanov. C++ people 1950 births Living people Scientists from Moscow Russian computer programmers
https://en.wikipedia.org/wiki/UNIVAC%20II
The UNIVAC II computer was an improvement to the UNIVAC I that the UNIVAC division of Sperry Rand first delivered in 1958. The improvements included the expansion of core memory from 2,000 to 10,000 words; UNISERVO II tape drives, which could use either the old UNIVAC I metal tapes or the new PET tapes; and some transistorized circuits (although it was still overwhelmingly a vacuum tube computer). It was fully compatible with existing UNIVAC I programs for both code and data. It weighed about . Circuit elements of entire system Above figures are approximate and do not include input-output devices. Programming and numerical system Decimal point occurs at the right of the sign digit. Arithmetic unit Addition, subtraction, and multiplication times given below include reading and executing the instruction. The time includes formation of the result in the accumulator. All instructions, however are performed at minimum latency rates. Magnetic core All users utilize a 2,000-word, 24,000-digit magnetic-core storage unit. Each of the planes is divided into two sections of 50 by 40 cores, making 2,000 cores in each section. Each section contains one core - for one binary position (bit) - of every one of the 2,000 words. The same relative binary position of the other half-word is held in a core in the same physical location in the other section of the plane. Thus each plane contains two binary positions in each of 2,000 words; the first and 43rd, for example, or the 9th and 52nd. Physically the memory is a rectangular prism . A memory location thus always implies two cores in all 42 planes. The two cores are determined by the intersection of one column of fifty possible columns with two rows of the 80 possible rows. One row is in each section of the plane. All 42 planes are used twice for each word. Associated with the memory is a half-word insertion register of 42-bit capacity. Each bit is temporarily stored in a magnetic core of this register during a memory reference. Each of these register cores is associated with one of the 42 memory planes. To write into the memory, the first half of the word is placed in the insertion register and the address selector alerts the appropriate column and the proper row of the top section in each of the 42 planes. At the appropriate instant the information is transferred from each core of the insertion register to the selected core in the corresponding plane of the memory. Forty-two pulse times later, the second half word has been placed in the insertion register and the process is repeated in the lower section of the memory. Read-outs are accomplished in a reverse manner. The speed of the memory has been adjusted to the speed of the arithmetic portion of the Univac which permits the transfer into or out of the memory of 12 characters in 40 microseconds. Word pulses flow from or to the high speed bus and the insertion register via a mechanism which converts from serial to parallel an
https://en.wikipedia.org/wiki/CJTK-FM
CJTK-FM is a Canadian radio station, which airs Christian music and programming at 95.5 FM in Sudbury, Ontario. The station is owned by Eternacom, and was licensed by the CRTC in 1997. The station is branded as KFM and uses one of the current slogans as "Positive & Encouraging". History On June 6, 1997, Curtis Belcher, the owner of Enternacom Inc., received CRTC approval to operate a new Christian music radio station in Sudbury and began broadcasting later that same year. CJTK-FM started as a small low-power 35 watt FM radio station in Sudbury at 95.5 FM in late 1997, which CJTK became the first Christian station to be granted a power increase, and go from low-power status (35 watts), to a full power (1,400 watts). In 2000, the station received approval to add an FM rebroadcaster at North Bay to operate on the frequency, 89.5 MHz. On February 26, 2004, the CRTC denied Eternacom's request to change CJTK-FM-1's frequency from 89.5 MHz to 99.3 MHz. In 2005, CJTK-FM applied to change North Bay's frequency from 89.5 MHz to 107.3 MHz, although when the application was approved, the station would operate at 103.5 MHz instead. Once the change took place, the CJTK-FM-1 operating at 89.5 was deleted. On December 5, 2005, CJTK received approval to add a rebroadcaster at Little Current on the frequency, 102.1 MHz and began broadcasting in September 2006. A repeater was also added in Elliot Lake on 102.5 MHz in 2008. The Canadian Communications Foundation website reports that in 2007, Eternacom received approval to change the authorized contours of CJTK-FM by increasing effective radiated power from 1,400 watts to 8,100 watts. It's uncertain if there are any CRTC decision references regarding the power increase to 8.1 kW. In 2009, CJTK adopted its current logo and branding as KFM. Both the current and the former logo are still used on CJTK's website. The station's former brandings were known as K95.5, or just simply the K and was also used on CJTK's other repeaters. CJTK was the play-by-play voice of the Sudbury Wolves for the 2009-2010 Ontario Hockey League season. The Sudbury Wolves games were formerly aired on CIGM. On October 11, 2011, Eternacom Inc. applied to add a new low-power FM transmitter in Mattawa, Ontario, which will rebroadcast the programming of CJTK-FM-1 North Bay. The proposed new FM transmitter was approved on December 6, 2011, and will operate in Mattawa at 93.9 MHz. This will be Mattawa's first local FM signal in that community. On March 30, 2015, the CRTC approved Eternacom's application to add an FM transmitter at Timmins, which will rebroadcast CJTK-FM on 105.5 MHz. On August 16, 2018, the Commission approved an application by Eternacom Inc. (Eternacom), on behalf of Harvest Ministries Sudbury, for authority to acquire from Eternacom the assets of the English-language commercial specialty (Christian music) radio stations CJTK-FM Sudbury, CJTK FM-1 North Bay and CJTK-FM-3 Elliot Lake, Ontario, and their rebroadcasting transmit
https://en.wikipedia.org/wiki/Back-face%20culling
In computer graphics, back-face culling determines whether a polygon of a graphical object is drawn. It is a step in the graphical pipeline that tests whether the points in the polygon appear in clockwise or counter-clockwise order when projected onto the screen. If the user has specified that front-facing polygons have a clockwise winding, but the polygon projected on the screen has a counter-clockwise winding then it has been rotated to face away from the camera and will not be drawn. The process makes rendering objects quicker and more efficient by reducing the number of polygons for the program to draw. For example, in a city street scene, there is generally no need to draw the polygons on the sides of the buildings facing away from the camera; they are completely occluded by the sides facing the camera. In general, back-face culling can be assumed to produce no visible artifact in a rendered scene if it contains only closed and opaque geometry. In scenes containing transparent polygons, rear-facing polygons may become visible through the process of alpha composition. In wire-frame rendering, back-face culling can be used to partially address the problem of hidden-line removal, but only for closed convex geometry. A related technique is clipping, which determines whether polygons are within the camera's field of view at all. Another similar technique is Z-culling, also known as occlusion culling, which attempts to skip the drawing of polygons that are covered from the viewpoint by other visible polygons. In non-realistic renders certain faces can be culled by whether or not they are visible, rather than facing away from the camera. "inverted hull" or "front face culling" can be used to simulate outlines or toon shaders without post-processing effects. Implementation One method of implementing back-face culling is by discarding all triangles where the dot product of their surface normal and the camera-to-triangle vector is greater than or equal to zero where is the view point, is the first vertex of a triangle and is its normal, defined as a cross product of two vectors representing sides of the triangle adjacent to Since cross product is non-commutative, defining the normal in terms of cross product allows to specify normal direction relative to triangle surface using vertex order(winding): If points are already in view space, can be assumed to be , the origin. It is also possible to use this method in projection space by representing the above inequality as a determinant of a matrix and applying the projection matrix to it. Another method exists based on reflection parity, which is more appropriate for two dimensions where the surface normal cannot be computed (also known as CCW check). Let a unit triangle in two dimensions (homogeneous coordinates) be defined as Then for some other triangle, also in two dimensions, define a matrix that transforms the unit triangle: so that: Discard the triangle if matrix contained an o
https://en.wikipedia.org/wiki/DW-TV
DW-TV () is a German multilingual TV news network of Deutsche Welle. Focussing on news and informational programming, it first started broadcasting 1 April 1992. DW broadcasts on satellite and is uplinked from Berlin. DW's English broadcast service is aimed at an international audience. History DW (TV) began as RIAS-TV, a television station launched by RIAS, a West Berlin broadcaster in August 1988. The fall of the Berlin Wall the following year and German reunification in 1990 led to the closure of RIAS-TV. On 1 April 1992, Deutsche Welle inherited RIAS-TV's broadcast facilities, using them to start a German and English-language television channel broadcast via satellite, DW (TV), adding a short Spanish broadcast segment the following year. In 1995, it began 24-hour operation (12 hours in German, 10 hours in English, two hours in Spanish). At that time, DW (TV) introduced a new news studio and a new logo. In 2001, Deutsche Welle (in conjunction with ARD and ZDF) founded a subscription TV channel for North American viewers called German TV. The project was shut down after four years due to low subscriber numbers. It was replaced by the DW-TV channel, which is also a subscription service. Unlike most other international broadcasters, DW-TV doesn't charge terrestrial stations for use of its programming, and as a result its News Journal and other programmes are rebroadcast on numerous public broadcasting stations in several countries, including the United States, Australia, and New Zealand. In the Philippines, some English-language programmes are broadcast nationwide on Net 25 and PTV 4. In the U.S., some of its programs were distributed via the World Channel as well as MHz Worldview, although after the closure of MHz Worldview in 2020, a few stations have since offered a full carriage of DW-TV. In March 2009, DW-TV expanded its television services in Asia with two new channels: DW-TV Asia and DW-TV Asia+. DW-TV Asia (DW-TV Asien in German) broadcasts 16 hours of German programming and eight hours in English while DW-TV Asia+ broadcasts 18 hours of English programmes plus six hours of German programmes. In August 2009, DW-TV ceased broadcasts on Sky channel 794 in the United Kingdom. The channel continues to be available via other satellites receivable in the UK. Deutsche Welle relaunched their television channels and their schedules on 6 February 2012, using the abbreviation DW for all its services. Deutsche Welle changed its schedules again on 22 June 2015, with DW in Asia and Oceania and DW (Europe) merged to become a 24-hour English news channel. English programmes on DW (Arabia) and DW (Español) were discontinued. Logos Reception DW-TV is broadcast via the AsiaSat 7, GSAT-15, Nilesat 102, Atlantic Bird 3, Hot Bird 13B, AMC-1 and Intelsat 9 satellites. DW-TV is also available on the Internet and on Digital terrestrial television in a handful of cities in the United States. Satellite jamming A transponder on Hot Bird 8, used by DW-T
https://en.wikipedia.org/wiki/American%20Heroes%20Channel
American Heroes Channel (formerly Military Channel and originally Discovery Wings Channel) is an American multinational pay television channel owned by the Warner Bros. Discovery Networks unit of Warner Bros. Discovery. The network carries programs related to the military, warfare, and military history and science. , the channel is available to approximately 59,917,000 pay television households (51.5% of households with at least one television set) in the United States. Background The channel launched in July 1998, as Discovery Wings Channel; it originally focused on programs relating to aircraft and aerospace. During its early years, the network also aired a weather segment near the top of each hour featuring aviation forecast data from the National Weather Service. Discovery Communications filed a trademark application with the United States Copyright Office for the use of the name "Military Channel" in 2002, after the trademark was abandoned by an unrelated start-up cable network based in Louisville, Kentucky, also named The Military Channel, which went dark in 1999 and later went bankrupt. That network – which focused on the heroes, history and hardware of the international military scene – experienced difficulty raising capital, despite early success. On January 10, 2005, the network was rebranded as the Military Channel. Carrying over from its original format, many of the network's programs as the Military Channel were dedicated to aerial warfare and related technologies and issues. In 2005, the channel aired its first live program from Philadelphia at the site of the Army–Navy college football game, two hours before that game's kickoff, in which Fox Sports commentator Chris Myers hosted from a set outside of Lincoln Financial Field. On March 3, 2014, the channel was rebranded as American Heroes Channel, with the intent to "provide more history based, narrative-style documentary programming." The network is a sponsor of the United Service Organizations (USO) and frequently runs commercials for that organization. Programming Many of the programs featured on American Heroes Channel are war documentaries, the contents of which deal in large part with modern warfare, and in particular the U.S. military from World War II onward. While the A+E Networks-owned History, Military History and H2 air similar programming, those networks tend to show more programs about other time periods and cultures (ancient, Roman, Medieval, Eastern, and other forms of warfare). AHC has a more contemporary subject matter than those competitors, but it occasionally presents historical programming as well. Actor Dennis Haysbert serves as the network's continuity announcer for its on-air promotions. In addition, the channel also presents feature films with a military theme (usually within the hosted movie series An Officer and a Movie, which is hosted by Lou Diamond Phillips), as well as individual episodes of other shows (such as Belly of the Beast, Build It Bigge
https://en.wikipedia.org/wiki/CBQ-FM
CBQ-FM is a Canadian radio station, airing the Canadian Broadcasting Corporation's CBC Music network at 101.7 FM in Thunder Bay, Ontario. The station was launched on August 13, 1984. External links BQ BQ Radio stations established in 1984 1984 establishments in Ontario
https://en.wikipedia.org/wiki/Rogers%20Telecom
Rogers Telecom Inc. is a subsidiary of Rogers Communications. It is a Canadian company based in Toronto that focuses on integrated communications as a provider of data, e-business and voice services to business and households. It used to be known as Sprint Canada Inc., pursuant to a 1993 branding agreement between parent Call-Net Enterprises Inc. with what is now Sprint Nextel Corporation. In 1998, Call-Net acquired long-distance service and data-circuit provider Fonorola of Montreal for about $1.8 billion and merged it into Sprint Canada. On May 11, 2005, Rogers Communications Inc. and Call-Net jointly announced that they entered into an agreement under which RCI would acquire 100% of Call-Net under a plan of arrangement (). The deal was approved by shareholders and an Ontario court on June 30, 2005, and completed July 1. The deal allowed Rogers to enter the residential phone business to challenge Bell Canada. On July 7, 2005, Sprint Canada Inc. became Rogers Telecom Inc. and Call-Net Enterprises Inc. became Rogers Telecom Holdings Inc. History Sprint Canada was launched in the early 1990s with Candice Bergen as its spokesperson. Bergen also was pitching the products of their U.S. sister company. CallNet licensed the name Sprint from the United States Sprint Corporation up until it was bought out and renamed by Rogers Communications. Home Phone service Current The Rogers Home Phone service in Canada was launched on July 1, 2005, on the same day that Rogers Telecom was acquired by Rogers Communications Inc. The current offering is VoIP technology using Rogers's Internet cable. A special converter offers home-phone service with traditional RJ11 telephone-line jacks within the house. The VoIP service is currently available in regions served by Rogers Hi-Speed Internet. This service operates using the PacketCable technology over the company's cable network. Service is delivered by cable to the subscriber's residence and is connected into a home-phone terminal, which then provides the connection to the internal wiring at the address. The home-phone terminal has a six-hour backup and can support up to two different phone numbers. Legacy (2005-2010) The landline service, which was available from mid-2005 to mid-2010, operated switches co-located in the Bell Canada network. As such, Rogers did not maintain the phone lines and was affected by the Bell Subco strike of 2005, which impaired its ability to provide timely service. The same also applied to the Telus strike in Alberta and British Columbia. During the time of the local strikes, Rogers Telecom was not able to provide exact installation dates in those two provinces. Due to legal obligations, however, Rogers's customers received higher-priority service during strikes than actual Bell Canada or Telus customers. Rogers wanted to discontinue its traditional voice services by the end of 2008. For this reason, Rogers's customers with this service were sent a notice in June 2008. They c
https://en.wikipedia.org/wiki/WUVP-DT
WUVP-DT (channel 65) is a television station licensed to Vineland, New Jersey, United States, broadcasting the Spanish-language Univision network to the Philadelphia area. It is owned and operated by TelevisaUnivision alongside Wildwood, New Jersey–licensed True Crime Network affiliate WMGM-TV (channel 40) and low-power, Class A UniMás station WFPA-CD (channel 28). The stations share studios on North Delsea Drive in Newfield, New Jersey, north of Vineland, with additional offices in Center City, Philadelphia. Through a channel sharing agreement with CW O&O WPHL-TV (channel 17), WUVP-DT transmits using WPHL-TV's spectrum from a tower in the Roxborough section of Philadelphia. Channel 65 was originally established as WRBV, one of the first Black-owned stations in the United States, in 1981. A protracted and expensive construction process with multiple legal battles prompted it to be placed in receivership just five months after going on air. It continued as an independent under receivership and another owner until 1986, when it was sold to the Home Shopping Network. Univision acquired the station in 2002 as part of its purchase of USA Broadcasting. History WRBV On June 14, 1978, the Renaissance Broadcasting Corporation of Willingboro, headed by former New Jersey Public Television employee Donald McMeans, applied for a construction permit for channel 65 in Vineland. A construction permit for WRBV was granted on February 1, 1979, making Renaissance just the second Black-owned group to receive a TV station permit; the only other such station was Detroit's WGPR-TV. From the outset, there were doubters. One was a Vineland city councilor, Si Solazzo, who called the company "a little shaky" after McMeans opted not to partner with the city to land a $1.6 million grant to finance the station. However, the grant deal got over the hump. With financing lined up, McMeans then attempted to secure a network affiliation. However, ABC showed no interest in bringing an affiliation to South Jersey, and McMeans instead signed a deal to broadcast the subscription television (STV) service of Wometco Home Theater. After the FCC agreed to waive its rule only permitting one STV station in each market in exchange for a promise of local programming in the 7 p.m. hour, ground was broken on the Vineland facilities in March 1980. The construction did not go smoothly, either. In one day in September, a court order halted construction on the tower in Waterford Township, New Jersey— southeast of Philadelphia—because the township claimed Renaissance had not filed for the appropriate building permits and raised environmental objections to the site in the Pine Barrens, and the company discovered an error in the contract relating to the federal grant that threatened to leave construction incomplete. The New Jersey Pinelands Commission threatened to revoke its permit to build the tower. By late October, with all of the permitting issues for the tower solved, construction was movi
https://en.wikipedia.org/wiki/Next-generation%20network
The next-generation network (NGN) is a body of key architectural changes in telecommunication core and access networks. The general idea behind the NGN is that one network transports all information and services (voice, data, and all sorts of media such as video) by encapsulating these into IP packets, similar to those used on the Internet. NGNs are commonly built around the Internet Protocol, and therefore the term all IP is also sometimes used to describe the transformation of formerly telephone-centric networks toward NGN. NGN is a different concept from Future Internet, which is more focused on the evolution of Internet in terms of the variety and interactions of services offered. Introduction of NGN According to ITU-T, the definition is: A next-generation network (NGN) is a packet-based network which can provide services including Telecommunication Services and is able to make use of multiple broadband, quality of service-enabled transport technologies and in which service-related functions are independent from underlying transport-related technologies. It offers unrestricted access by users to different service providers. It supports generalized mobility which will allow consistent and ubiquitous provision of services to users. From a practical perspective, NGN involves three main architectural changes that need to be looked at separately: In the core network, NGN implies a consolidation of several (dedicated or overlay) transport networks each historically built for a different service into one core transport network (often based on IP and Ethernet). It implies amongst others the migration of voice from a circuit-switched architecture (PSTN) to VoIP, and also migration of legacy services such as X.25, Frame Relay (either commercial migration of the customer to a new service like IP VPN, or technical emigration by emulation of the "legacy service" on the NGN). In the wired access network, NGN implies the migration from the dual system of legacy voice next to xDSL setup in local exchanges to a converged setup in which the DSLAMs integrate voice ports or VoIP, making it possible to remove the voice switching infrastructure from the exchange. In the cable access network, NGN convergence implies migration of constant bit rate voice to CableLabs PacketCable standards that provide VoIP and SIP services. Both services ride over DOCSIS as the cable data layer standard. In an NGN, there is a more defined separation between the transport (connectivity) portion of the network and the services that run on top of that transport. This means that whenever a provider wants to enable a new service, they can do so by defining it directly at the service layer without considering the transport layer – i.e. services are independent of transport details. Increasingly applications, including voice, tend to be independent of the access network (de-layering of network and applications) and will reside more on end-user devices (phone, PC, set-top box). Un
https://en.wikipedia.org/wiki/WJZ-TV
WJZ-TV (channel 13) is a television station in Baltimore, Maryland, United States, serving as the market's CBS outlet. It is owned and operated by the network's CBS News and Stations division, and maintains studios and offices on Television Hill in the Woodberry section of Baltimore, adjacent to the transmission tower it shares with several other Baltimore broadcast outlets. History Early history The station first signed on the air on November 1, 1948, as WAAM, becoming the third television station in Baltimore behind WBAL-TV (channel 11) and WMAR-TV (channel 2), all within just over a year. The station was originally owned by Radio-Television of Baltimore Inc., whose principals were Baltimore businessmen and brothers, Ben and Herman Cohen. Channel 13 was originally an ABC affiliate, the network's fifth outlet to be located on the East Coast. It carried a secondary affiliation with the DuMont Television Network until its closure in 1956. Both affiliations moved from WMAR-TV, which became an exclusive CBS affiliate. On the station's second day of operations, WAAM broadcast the 1948 presidential election returns and various entertainment shows, remaining on the air for 23 consecutive hours. Channel 13 has been housed in the same studio facility, located near Druid Hill Park on what was then known as Malden Hill (now known as Television Hill), since the station's inception; the building was the first in Baltimore specifically designed for television production and broadcasting. As a DuMont affiliate, WAAM originated many Baltimore Colts games for the network's National Football League coverage. The Westinghouse Electric Corporation purchased WAAM from the Cohen brothers in May 1957. Westinghouse then took control of the station in August of that year, and changed its callsign to WJZ-TV the following month. The WJZ call letters had previously resided on ABC's flagship radio/television combination in New York City, which changed its calls to WABC-AM-FM-TV in 1953. However, Westinghouse's history with that set of call letters went back even further, as it was the original owner of WJZ radio, the flagship station of NBC's Blue Network, which would eventually become ABC. All of Baltimore's television stations at the time had fairly short transmission towers in the medium's early years; channel 13's original tower was located next to the station's studios. In 1959, WJZ-TV collaborated with WBAL-TV and WMAR-TV to form a joint venture to build the world's first three-pronged candelabra tower. Constructed behind the WJZ-TV studios and opposite the original channel 13 tower, it was the tallest free standing television antenna in the United States at the time of its completion. The new tower significantly improved channel 13's signal coverage in central Maryland, and also added new viewers in Pennsylvania, Delaware, Washington, D.C., and Virginia. WJZ-TV nearly lost its ABC affiliation in 1977, when the network briefly pursued WBAL-TV just as ABC became
https://en.wikipedia.org/wiki/Manufacturing%20Message%20Specification
Manufacturing Message Specification (MMS) is an international standard (ISO 9506) dealing with messaging systems for transferring real time process data and supervisory control information between networked devices or computer applications. The standard is developed and maintained by the ISO Technical Committee 184 (TC184). MMS defines the following A set of standard objects which must exist in every device, on which operations like read, write, event signaling etc. can be executed. Virtual manufacturing device (VMD) is the main object and all other objects like variables, domains, journals, files etc. comes under VMD. A set of standard messages exchanged between a client and a server stations for the purpose of monitoring or controlling these objects. A set of encoding rules for mapping these messages to bits and bytes when transmitted. MMS original communication stack MMS was standardized in 1990 under two separate standards as ISO/IEC 9506-1 (2003): Industrial Automation systems - Manufacturing Message Specification - Part 1: Service Definition ISO/IEC 9506-2 (2003): Industrial Automation systems - Manufacturing Message Specification - Part 2: Protocol Specification This version of MMS used seven layers of OSI network protocols as its communication stack: MMS stack over TCP/IP Because the Open Systems Interconnection protocols are challenging to implement, the original MMS stack never became popular. In 1999, Boeing created a new version of MMS using Internet protocols instead of the bottom four layers of the original stack plus RFC 1006 ("ISO Transport over TCP") in the transport layer. The top three layers use the same OSI protocols as before. In terms of the seven-layer OSI model, the new MMS stack looks like this: With the new stack, MMS has become a globally accepted standard. External links MMS Protocol Details MMS Overview MMS V1 Abstract Syntax MMS Protocol Description MMS. Presentation by Prof. Dr. H. Kirrmann, ABB Research Center, Baden, Switzerland ISO standards
https://en.wikipedia.org/wiki/Machine%20orders
Machine orders data (also known as machine tool order data) is a figure issued by Japan Machine Tool Builders Association (JMTBA) every month. It serves as one indicator of the Japanese economy. In the forex market, the release of such data is often followed by sharp change in currency exchange rate. Macroeconomic indicators Economy of Japan Japanese business terms
https://en.wikipedia.org/wiki/A%20World%20Apart%20%28TV%20series%29
A World Apart is an American daytime drama that ran from March 30, 1970, to June 25, 1971, on the ABC television network. Overview The initial stories were written by Katherine Phillips (adopted daughter of Irna Phillips, who created Guiding Light, As the World Turns and Another World). The story concerned a soap opera writer who adopted two children, a fictionalized version of Irna Phillips' life. Soap opera writer Betty Kahlman (Elizabeth Lawrence, Augusta Dabney) raised her adopted children without a husband. Her sounding board and friend was fellow soap opera writer Meg Johns, played by actress Anna Minot. Betty married Russell Barry (William Prince) and the early focus was on generational conflicts between a newly married middle-aged couple and their confused children. People tried to understand each other, but were ultimately "a world apart", echoing the title. Eventually, the show-within-a-show element was scaled back, and writer Katherine Phillips was replaced by Richard Holland and Suzanne Holland. At that point, Betty and Russell settled into a tranquil marriage. Other storylines centered on the Sims family, who were mired in less turmoil than the Kahlmans, but still had their problems, as Dr. Ed Sims (James Noble) and his extremely conservative wife Adrian (Kathleen Maguire) struggled with their rebellious daughter Becky (Erin Connor). Cast Many of the show's performers went on to later notability as actors, including Susan Sarandon (Patrice Kahlman),NathanYoung, [Bill Sims] NathanYoung Nicolas Surovy (Fred Turner), Susan Sullivan (Nancy Condon), Dorothy Lyman (Julie Stark), and David Birney (Oliver Harrell). James Noble (Dr. Ed Sims) would eventually play Governor Eugene Gatling on the television comedy Benson alongside Robert Guillaume. Clifton Davis, who played Matt Hampton, would later appear in both That's My Mama and Amen, where he played Reverend Reuben Gregory. Jane White and Davis played mother and son on both A World Apart and Amen. Broadcast history The series ran Monday through Friday at 12:30 p.m. EST (11:30 a.m. Central), opposite CBS' then-popular Search for Tomorrow and NBC's The Who, What, or Where Game. It managed only a minuscule 2.8 rating, making it the second-worst-rated soap on the three networks—ahead of only The Best of Everything, which aired just before A World Apart, at noon EST. (The ironically-named Best sported an even-worse figure of 1.8, one of lowest ever for a US soap opera. Both series debuted on the same day, replacing re-runs of Bewitched and That Girl.) ABC canceled the show after a little over a year, wrapping up with a moving episode where Patrice Kahlman finally made peace with giving her newborn son up for adoption (among the few, if not only, episodes of this show known to survive). References External links 1970 American television series debuts 1971 American television series endings American Broadcasting Company original programming American television soap operas English-
https://en.wikipedia.org/wiki/Tokyo%20FM
(abbreviation:TFM) is a radio station in Chiyoda, Tokyo, Japan. It is the flagship station of the Japan FM Network (JFN). Timeline The station's forerunner, FM Tokai (FM東海, abbreviated FMT), owned by Tokai University, was launched on May 1, 1960 as an experimental station (call sign at the time of founding in 1958 JS2AO, changed in 1960 to JS2H. This station closed on April 25, 1970, replaced the next day by Tokyo FM, Japan's third commercial FM-radio broadcaster, after FM Aichi and FM Osaka. In 1985, the station's headquarters moved from the Kokusai-Tsushin Center (later KDD, now KDDI) buildings in Nishi-Shinjuku, where they had been since 1974, to the current location, Koujimachi in Chiyoda ward. The TOKYO FM Midtown Studio, a satellite studio, was closed down on January 15, 2017. Broadcasting JOAU-FM Frequency: 80.0 MHz (Tokyo Tower) Program Countdown Station (simulcast over all JFN Stations) Zen-Noh presents Countdown jp cosmo Pops Best 10 McDonald's SOUND IN MY LIFE Tatsuro Yamashita presents Rakuten card Sunday Song Book Suzuki Talking FM (hosted by Masaharu Fukuyama) morinaga presents Ayaka Hirahara Healing Venus (simulcast over FM OSAKA and FM AICHI(@fm)) Atsuko Maeda's Heart Songs School of Lock! (simulcast over all JFN Stations) Website References Mass media companies based in Tokyo Radio stations in Japan Radio stations established in 1970 Chiyoda, Tokyo 1970 establishments in Japan
https://en.wikipedia.org/wiki/Geographic%20information%20system%20software
A GIS software program is a computer program to support the use of a geographic information system, providing the ability to create, store, manage, query, analyze, and visualize geographic data, that is, data representing phenomena for which location is important. The GIS software industry encompasses a broad range of commercial and open-source products that provide some or all of these capabilities within various information technology architectures. History The earliest geographic information systems, such as the Canadian Geographic Information System started in 1963, were bespoke programs developed specifically for a single installation (usually a government agency), based on custom-designed data models. During the 1950s and 1960s, academic researchers during the quantitative revolution of geography began writing computer programs to perform spatial analysis, especially at the University of Washington and the University of Michigan, but these were also custom programs that were rarely available to other potential users. Perhaps the first general-purpose software that provided a range of GIS functionality was the Synagraphic Mapping Package (SYMAP), developed by Howard T. Fisher and others at the nascent Harvard Laboratory for Computer Graphics and Spatial Analysis starting in 1965. While not a true full-range GIS program, it included some basic mapping and analysis functions, and was freely available to other users. Through the 1970s, the Harvard Lab continued to develop and publish other packages focused on automating specific operations, such as SYMVU (3-D surface visualization), CALFORM (choropleth maps), POLYVRT (topological vector data management), WHIRLPOOL (vector overlay), GRID and IMGRID (raster data management), and others. During the late 1970s, several of these modules were brought together into Odyssey, one of the first commercial complete GIS programs, released in 1980. During the late 1970s and early 1980s, GIS was emerging in many large government agencies that were responsible for managing land and facilities. Particularly, federal agencies of the United States government developed software that was by definition in the public domain because of the Freedom of Information Act, and was thus released to the public. Notable examples included the Map Overlay and Statistical System (MOSS) developed by the Fish & Wildlife Service and Bureau of Land Management (BLM) starting in 1976; the PROJ library developed at the United States Geological Survey (USGS), one of the first programming libraries available; and GRASS GIS originally developed by the Army Corps of Engineers starting in 1982. These formed the foundation of the open source GIS software community. The 1980s also saw the beginnings of most commercial GIS software, including Esri ARC/INFO in 1982; Intergraph IGDS in 1985, and the Mapping Display and Analysis System (MIDAS), the first GIS product for MS-DOS personal computers, which later became MapInfo. These would proli
https://en.wikipedia.org/wiki/Endace
Endace Ltd is a privately owned network monitoring company, based in New Zealand and founded in 2001. It provides network visibility and network recording products to large organizations. The company was listed on the London Stock Exchange in 2005 and then delisted in 2013 when it was acquired by Emulex. In 2016 Endace was spun out of Emulex and is currently a private company. In October 2016, The Intercept revealed that some Endace clients were intelligence agencies, including the British GCHQ (known for conducting massive surveillance on network communications) and the Moroccan DGST, likewise known for mass surveillance of its citizens. Background and history Endace was founded after the DAG project at the School of Computing and Mathematical Sciences at the University of Waikato in New Zealand. The first cards designed at the university were intended to measure latency in ATM networks. In 2006, Endace transitioned from component manufacturer to appliance manufacturer to managed infrastructure provider. The company now sells network visibility fabrics, based on its range of network recorders, to large corporations and government agencies. Endace was the first New Zealand company to list on London's Alternative Investment Market when it floated in mid-June 2005 a move which was not without controversy. Poor share price performance in the early years and a seeming failure to attract a broad enough shareholder base lent weight to the criticism that Endace should have focused initially on developing its local profile (via NZX) rather than pushing for overseas investment (via London AIM). Endace is headquartered in Auckland, New Zealand, and has an R&D centre in Hamilton, New Zealand, and offices in Australia, United States and Great Britain. Key innovations of the DAG The DAG project grew from academic research at Waikato University. Having found that software measurements of ATM cells (or packets) were unsatisfactory, both for reasons of accuracy and lack of certainty about packet loss, the research group set about developing their own hardware to generate better quality recordings. This hardware and its subsequent iterations introduced two fundamental innovations: hardware timestamping and hardware accounting for packet loss. Hardware timestamping Conventionally, each packet or cell is given a timestamp by the host machine's kernel (i.e. in software) when the kernel driver is notified that a new packet has arrived. This approach results in poor quality timestamps for several reasons, among them the considerable latency and jitter between the packet arriving at the network interface and receipt by the kernel driver and uncertainty caused by interrupt coalescing wherein one host interrupt signifies the arrival of several packets. Such poor quality limits what research can usefully be done on network performance and related fields. To solve this, the DAG generates timestamps in the hardware as close to the network interface as possible.