source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/KisMAC | KisMAC is a wireless network discovery tool for Mac OS X. It has a wide range of features, similar to those of Kismet (its Linux/BSD namesake). The program is geared toward network security professionals, and is not as novice-friendly as similar applications. Distributed under the GNU General Public License, KisMAC is free software.
KisMAC will scan for networks passively on supported cards - including Apple's AirPort, and AirPort Extreme, and many third-party cards, and actively on any card supported by Mac OS X itself.
Cracking of WEP and WPA keys, both by brute force, and exploiting flaws such as weak scheduling and badly generated keys is supported when a card capable of monitor mode is used, and packet reinjection can be done with a supported card (Prism2 and some Ralink cards). GPS mapping can be performed when an NMEA compatible GPS receiver is attached.
Kismac2 is a fork of the original software with a new GUI, new features and that works for OS X 10.7 - 10.10, 64-bit only. It is no longer maintained.
Data can also be saved in pcap format and loaded into programs such as Wireshark.
KisMAC Features
Reveals hidden / cloaked / closed SSIDs
Shows logged in clients (with MAC Addresses, IP addresses and signal strengths)
Mapping and GPS support
Can draw area maps of network coverage
PCAP import and export
Support for 802.11b/g
Different attacks against encrypted networks
Deauthentication attacks
AppleScript-able
Kismet drone support (capture from a Kismet drone)
KisMAC and Germany
The project was created and led by Michael Rossberg until July 27, 2007, when he removed himself from the project due to changes in German law (specifically, StGB Section 202c) that "prohibits the production and distribution of security software". On this date, project lead was passed on to Geoffrey Kruse, maintainer of KisMAC since 2003, and
active developer since 2001. KisMAC is no longer being actively being developed. Primary development, and the relocated KisMAC web site were offline as of September 2016. As of August 6, 2007, the former homepage now denounces the new German law.
KisMac2 was project to continue development but is no longer maintained as well.
See also
Aircrack-ng
iStumbler
Kismet
Netspot
WiFi Explorer
References
External links
Binaries of latest versions
Former homepage
KisMAC Svn
KisMAC2, a currently maintained fork of the original project
Free software programmed in Objective-C
Wireless networking
MacOS-only free software
MacOS network-related software
Network analyzers |
https://en.wikipedia.org/wiki/Autoroutes%20of%20Morocco | Morocco's network of motorways is administered by the state-owned company Autoroutes du Maroc (ADM). It runs the network on a pay-per-use basis, with toll stations placed along its length. The general speed limit is 120 km/h.
History
The first expressway in the country was the A1 Casablanca-Rabat. Construction of the first section started in 1975. Completion of this road between the economic and the administrative capitals took 13 years. Originally, use of the road was free of charge. The toll-road system was introduced as one measure to prevent lengthy construction times, as happened with this first road. Finding investors for new roads would be easier if these roads generated their own revenue to repay investors.
Realized
In 2006, it was announced that ADM will be investing 6.18 billion dirhams ($859 million) to develop its highway network in 2007. These investment packages are part of the objective that aim to complete 1,500 km by 2012.
As of August 2016, ADM manages 1808 km of Morocco's toll roads. As of November 2016 the total length of Morocco's motorways is 1,808 kilometres (paid) and 1,093 kilometres (free) expressways.
Planned
The Kingdom of Morocco is planning investments of around €23 billion in road construction until 2035. The Moroccan government has announced that more than 5,500 kilometres of new highways and expressways are to be constructed with investment totalling €8.8 billion. This includes 700 km of 3x2 roads that will be constructed.
Also 45,000 km of new rural roads will be created in rural areas and the modernization of 7,000 km of rural roads. It is part of new plan of the Moroccan Ministry of Transport, which will invest 660 billion dirhams in the transport and logistics sector.
Completed roads
The main Moroccan expressways are:
Rabat Ring Road (42 km)
A1 Casablanca-Rabat (86 km)
A1 Casablanca–Safi (255 km)
A2 Rabat-Fes (190 km)
A2 Fes-Oujda (306 km)
A3 Casablanca-Marrakesh (220 km)
A3 extension to Agadir (233 km)
A4 Berrechid-Benni Mellal (172 km)
A5 Rabat-Tangier Med (308 km)
A7 Tetouan-Fnideq (28 km)
The construction history of these expressways by segment is as follows:
Road safety
In 2007 762 accidents with casualties were reported, a 5% increase on 2006. The accident-rate per 100 million traveled kilometers dropped by 20% from 30.2 to 24.1 between these years, but the total number as well as rate of deaths didn't go down.
A breakdown of these figures:
Increasing road-safety
Increasing safety is an important goal for the ADM: the new autoroutes are designed to improve safety and the ADM also believes that extending the express-way network will increase overall safety as the through-going (and often high-speed) traffic is moved away from the Route Nationals, that run through the cities and villages along the way. Expressways also use non-level crossings and because there is no oncoming traffic overtaking cars is safer than on normal roads.
The ADM also publishes accident figures to increase the attentio |
https://en.wikipedia.org/wiki/Midsummer%20Dream | Midsummer Dream () is a 2005 computer-animated film from Dygra Films, the creators of The Living Forest. Made in Spain and Portugal, the film is loosely based on William Shakespeare's play A Midsummer Night's Dream.
Character
The main character is the girl Helena, a princess.
Voice cast
The voice cast of the English speaking version includes:
Romola Garai as Helena
Bernard Hill as Theseus
Billy Boyd as Puck
Rhys Ifans as Lysander
Miranda Richardson as Titania
Fiona Shaw as The Witches
Toby Stephens as Demetrius
Production
Directed by Ángel de la Cruz and Manolo Gómez, the production team totalled over 400 people over the lifetime of the project.
See also
List of Spanish films of 2005
Notes and references
Notes
References
Sources
Further reading
External links
2005 films
Spanish animated feature films
2000s Spanish-language films
2005 computer-animated films
Best Animated Film Goya Award winners
Films based on A Midsummer Night's Dream
Portuguese animated films
Portuguese fantasy films
2000s Spanish films |
https://en.wikipedia.org/wiki/Our%20Place%20%28Australian%20TV%20series%29 | Our Place was a short-lived Australian weekly live variety lifestyle programme broadcast on the Nine Network during early 2005.
Overview
Hosts Scott Cam and Cherie Hausler were joined by experts, which included unrelated Simone Maher and Jackie Adams-Maher for pets, Myles Baldwin for gardening, Dr John Tickell for health, Maggie Beer for food and Tara Dennis for home makeovers.
After 17 years on Australian television Don Burke's Burke's Backyard was cancelled at the end of 2004 and left the all important Friday evening 7:30 to 8:30 p.m. time slot, which led into Nine's Friday Night Football, open. After much hype and anticipation Our Place hit the screens on 8 April 2005 (delayed by two weeks due to the broadcast of the Pope John Paul II's funeral).
Cancellation
However, after just five episodes, Our Place was cancelled due to poor ratings and broadcast its final show on Friday 27 May 2005. The time slot has since been occupied by reality shows such as Motorway Patrol and Survivor: Guatemala. Channel 9 tried to revive the series to air during the non-ratings summer season, but there were no takers.
See also
List of Australian television series
List of programs broadcast by Nine Network
References
2005 Australian television series debuts
2005 Australian television series endings
Australian live television series
Australian variety television shows
Nine Network original programming
English-language television shows |
https://en.wikipedia.org/wiki/Scott%20Cam | Scott Cam (born 24 November 1962) is an Australian television presenter, a recipient of the Gold Logie appearing on several lifestyle programmes on the Nine Network. He is best known as the host of the hit reality TV renovation show The Block.
Career
Cam first appeared on Nine's popular lifestyle show Backyard Blitz in 2000, alongside Jamie Durie, doing building segments until the show's cancellation in 2006. In between, he appeared on the successful Renovation Rescue (2004–present) before appearing in his own live lifestyle program Our Place. However, this was cancelled after just five episodes in 2005. From 2008 until 2010, he appeared on Domestic Blitz.
Cam hosted the 2010 series of The Block and has returned as host for every season ever since. He won the Silver Logie for Most Popular Presenter and the Gold Logie for Most Popular Australian TV Personality in 2014 for his work on The Block. Cam also appeared as himself on a send-up of The Block on the comedy program The Joy of Sets in 2011. He also hosted renovating show Reno Rumble which began airing in 2015 through to 2016 over two seasons until its cancellation.
In addition to his television work, he has written two books on building and renovating: Out The Back and the follow-up, Home Maintenance For Knuckleheads. He is also a presenter on the Triple M Saturday morning breakfast show Wrong Side of the Bed.
Scott Cam also heavily features as the brand ambassador for Mitre 10 Australia, and has been doing so since 2011.
He was the subject of an episode of the Australian television genealogical program Who Do You Think You Are? which screened on SBS on 30 April 2019.
Awards and nominations
References
External links
IMG Talent Profile
Australian television presenters
Australian carpenters
Australian people of Italian descent
Triple M presenters
Television personalities from Sydney
1962 births
Living people
Gold Logie winners |
https://en.wikipedia.org/wiki/CDVD | cDVD ("Compact DVD") discs, also known as mini-DVD discs (not to be confused with 8 cm DVDs), are regular data CDs that contain MPEG-2 or MPEG-1 video structured in accordance with the DVD-Video specifications (such as a VIDEO_TS directory containing properly authored IFO/BUP and VOB files, typically on a Mode 1 data track formatted with the UDF 1.02 filesystem).
In the early 2000s, CD recorders and their discs were significantly more available and inexpensive than DVD-R equipment, promoting demand for miniDVD; however, DVD-Video content on other media does not conform to specifications.
When using full resolution video and a single AC-3 soundtrack at typical medium quality encoding settings, a 74 minute (650 MB) CD-R can hold approximately 10 to 15 minutes of material, increasing to about 45 minutes at rather lower quality.
By using non-standard resolutions, long GOPs, more B-frames, and high-compression quantization matrices, it is possible to store up to 2 hours of video with audio and subtitles on a regular 80-minute CD.
Until 2003, few standalone DVD players supported the format, due to firmware limitations and/or not having drives capable of reading a CD at the 9x rate needed to keep up with the maximum bitrate allowed in DVD-Video content, but today, many models contain drives similar to those used on desktop computers, and more versatile firmware as well, so that the proper playback of compact DVDs is often supported, but rarely documented (especially in North America and Europe).
See also
Video CD (VCD) and Super Video CD (SVCD) – standards for video on CDs
BD9 & BD5 – Blu-ray Disc Movie content on DVDs, explicitly allowed by the Blu-ray standard
AVCHD – a digital video specification loosely based on BDMV which can also be played from Blu-ray and non-Blu-ray sources
MiniDVD – 8 cm DVDs
References
120 mm discs
Video storage |
https://en.wikipedia.org/wiki/A.D.%20Police%3A%20To%20Protect%20and%20Serve | is a 1999 cyberpunk anime television series. It is set in a rebooted universe of Bubblegum Crisis, as it is a prequel to the series reboot, Bubblegum Crisis Tokyo 2040.
A.D. Police began as a three-part OVA series seen as a prequel to the Bubblegum Crisis series that was called A.D. Police Files released in 1990. Nine years later the production team decided to use the world view/ background of the original A.D. Police and fleshed it out a bit more, making an anime series consisting of 12 30-minute episodes. By updating the storyline as well as adding more updated elements of reality that have to do with the coming of the new millennium, the makers of the new A.D. Police series sought to create a series that surpassed its predecessor.
In the not-too-distant future VOOMERS (VOodoo Organic Metal Extension Resource), robots manufactured by the Genom Corporation, take care of most of the manual labor in Genom City. Recently the VOOMERS have been malfunctioning and becoming BOOMERS, crazed robots who are often involved in many violent and criminal activities. This is when the A.D. Police comes into play. They are Genom City's anti-robot crime division, specially trained to deal with VOOMER-related situations. Kenji Sasaki is one of the A.D. Police's most skilled officers. His biggest problem is that he doesn't follow orders and his partners either end up getting killed or seriously injured. Enter Hans Kleif, Kenji's newest partner and an amnesiac who was recently transferred to Genom City. Together the two must overcome their differences, fight their past demons, and come together to ensure that Genom City survives the onslaught of the BOOMERS.
A.D. Police: To Protect and Serve is available in North America in a 2-disc special edition DVD from ADV Films. The original series is on DVD from Animeigo.
Background
In 1999 Tokyo was ravaged by an enormous earthquake, leaving the city a desolate wasteland. The government functions relocated to the surrounding suburbs, leaving the former capital to deteriorate into a slum. Reconstruction of the area was thought impossible until a company named Genom, a corporation that made humanoid machines called VOOMERS, began to implement a plan to rebuild Tokyo in 2005. Tokyo has been reborn as "Genom City", a metropolis completely under the control of Genom. This resurrection did not come without a price, as overdrive accidents concerning illegal VOOMERS produced by "Packer Syndicate" have been on the rise.
Plot
The story is based around the lives of Sasaki Kenji and Hans Kleif, two young A.D. Police Detectives who find themselves forging a bond after being forced to work together in order to stop the rogue VOOMERS from turning Genom City back into an urban wasteland. Kenji is a loner who is known for his lack of teamwork. It is this attitude that causes many of his previous partners to be injured or even killed. His latest partner, Paul, was heavily injured during their last mission together and it |
https://en.wikipedia.org/wiki/Transylvania%20%28series%29 | Transylvania was the name of a trilogy of computer games released for several home computers of the 1980s. The games were graphic adventure games created by Antonio Antiochia and produced by Penguin Software/Polarware.
Transylvania
In 1982, this game was released for the Apple II, followed by conversions to the Atari 8-bit family and Commodore 64. It was later released for Macintosh in 1984, then the Amiga, Atari ST and DOS in 1985.
The Crimson Crown - Further Adventures in Transylvania
Released in 1985 under the title The Crimson Crown, on the same platforms as its predecessor. The game tasks the player with a quest to defeat a magical vampire with the assistance of Princess Sabrina (who is now a fledgling magician) and the heir to the throne, Prince Erik.
Transylvania III - Vanquish the Night
Released in 1989 under the title Transylvania III: Vanquish The Night, this game was released for Apple IIGS and PC. It used VGA graphics (PC version), more complex puzzles and a larger vocabulary. The game also had some digital voice and many of the puzzles involved references to ancient mythology. In this game the player had to vanquish an evil king.
Legacy
Many years later, Penguin Software released several of the game series as freeware.
Also after end of official support, an enthusiast reconstructed a source code variant of the game's series engine to port it to modern platforms.
References
External links
more on PolarWare
1980s interactive fiction
1982 video games
1985 video games
1989 video games
Amiga games
Apple II games
Apple IIGS games
Atari 8-bit family games
Atari ST games
Commodore 64 games
DOS games
Freeware games
Classic Mac OS games
Video game franchises
Video games developed in the United States |
https://en.wikipedia.org/wiki/Networked%20Readiness%20Index | The Networked Readiness Index is an index published annually by the World Economic Forum in collaboration with INSEAD, as part of their annual Global Information Technology Report. It aims to measure the degree of readiness of countries to exploit opportunities offered by information and communications technology. The Networked Readiness Index was first conceived of and constructed by Geoffrey Kirkman, Jeffrey Sachs and Carlos Osorio in 2002 at Harvard University.
The 2016 edition covers 139 nations.
References
Global economic indicators
Index numbers
IT infrastructure |
https://en.wikipedia.org/wiki/The%20Source%20%28network%29 | The Source was a radio network operated in the 1970s and 1980s by the NBC Radio Network, with newscasts and features focusing on 18- to 34-year-olds. The network was sold, along with the rest of NBC's radio operations, to Westwood One in August 1987. The Source would last until the late 1990s as a programming source before ultimately being absorbed into Westwood One.
Announcements from the network, voiced by legendary NBC announcer Don Pardo, continued to be heard on many radio stations across the country until Pardo's death in 2014.
Defunct radio networks in the United States
NBC Radio Network
American companies disestablished in 1988
Radio stations disestablished in 1988 |
https://en.wikipedia.org/wiki/Opaque%20predicate | In computer programming, an opaque predicate is a predicate, an expression that evaluates to either "true" or "false", for which the outcome is known by the programmer a priori, but which, for a variety of reasons, still needs to be evaluated at run time. Opaque predicates have been used as watermarks, as they will be identifiable in a program's executable. They can also be used to prevent an overzealous optimizer from optimizing away a portion of a program. Another use is in obfuscating the control or dataflow of a program to make reverse engineering harder.
External links
"A Method for Watermarking Java Programs via Opaque Predicates"
Computer programming
References |
https://en.wikipedia.org/wiki/Wrox%20Press | Wrox Press (established in 1992) is a computer book publisher, originally based in Birmingham, England. Wrox uses a "programmer to programmer" approach, as all books published by Wrox are written by software developers. The original books were easily recognized by their red covers and black and white pictures of the authors.
The holding company of the original Wrox Press, Peer Information, liquidated its assets in an insolvency process executed during 2003. The name and some of the more successful titles (but not the company itself) were acquired by John Wiley & Sons, which continues to publish under the Wrox imprint.
References
External links
Wrox website
Publishing companies established in 1992
Book publishing companies of the United Kingdom
Computer book publishing companies |
https://en.wikipedia.org/wiki/Remote%20Database%20Access | Remote database access (RDA) is a protocol standard for database access produced in 1993 by the International Organization for Standardization (ISO). Despite early efforts to develop proof of concept implementations of RDA for major commercial remote database management systems (RDBMSs) (including Oracle, Rdb, NonStop SQL and Teradata), this standard has not found commercial support from database vendors. The standard has since been withdrawn, and replaced by ISO/IEC 9579:1999 - Information technology -- Remote Database Access for SQL, which has also been withdrawn, and replaced by ISO/IEC 9579:2000 Information technology -- Remote database access for SQL with security enhancement.
Purpose
The purpose of RDA is to describe the connection of a database client to a database server. It includes features for:
communicating database operations and parameters from the client to the server,
in return, transporting result data from the server to the client,
database transaction management, and
exchange of information.
RDA is an application-level protocol, inasmuch that it builds on an existing network connection between client and server. In the case of TCP/IP connections, RFC 1066 is used for implementing RDA.
History
RDA was published in 1993 as a combined standard of ANSI, ISO (International Organization for Standardization) and IEC (International Electrotechnical Commission). The standards definition comprises two parts:
ANSI/ISO/IEC 9579-1:1993 - Remote Database Access -- Part 1: Generic Model, Service and Protocol
ANSI/ISO/IEC 9579-2:1993
References
Sources
Clients (computing)
Servers (computing)
Data access technologies
OSI protocols
Database access protocols |
https://en.wikipedia.org/wiki/How%20I%20Spent%20My%20Strummer%20Vacation | "How I Spent My Strummer Vacation" is the second episode of the fourteenth season of the American animated television series The Simpsons. It first aired on the Fox network in the United States on November 10, 2002. It was intended to be the season premiere, but "Treehouse of Horror XIII" was moved ahead for Halloween.
This episode was heavily promoted due to its list of high-profile guest stars, and is the last episode written by Mike Scully. Production-wise, this episode is also the last to use traditional cel animation. Three weeks later, "Helter Shelter" became the last traditional cel-animated episode to air.
Plot
On a visit to Moe's, Homer has no money to pay for his beer and Moe will not give him any freebies. As a result, he goes around town trying other things to feel drunk, such as breathing thin air on top of a mountain, licking toads, and giving blood. Moe feels guilty about refusing to serve Homer and gives him a free beer, but Homer is already heavily intoxicated. Moe, Lenny and Carl put Homer in a taxi to take him home. In the cab, he is secretly videotaped for a reality show called Taxicab Conversations, and says some unpleasant things about Marge and the kids, as well as revealing his dream of becoming a rock star.
His family is not impressed with him, but soon realize that they do somewhat burden him. To make up for this, the family takes Homer to a Rock 'n Roll Fantasy Camp, run by the Rolling Stones. At the camp, Homer and a bunch of other Springfield citizens learn about rock music, from instructors Mick Jagger and Keith Richards, Elvis Costello, Lenny Kravitz, Tom Petty, and Brian Setzer. Finally, the wannabe rockstars have a mock rock concert, with Homer as the lead guitarist and singer.
When Homer learns that the camp is just a one-week-only camp, he is bitterly disappointed and refuses to leave. Mick Jagger eventually placates Homer by offering him a chance to perform at a benefit gig, the "Concert for Planet Hollywood". An excited Homer gets passes for his friends so they can see him at the concert. Homer's glee turns to embarrassment when he is asked to perform the duties of a roadie. When he goes on stage to test the microphone, seeing his family and friends out there rooting for him, he sings a rock song and steals the show. This angers the rock stars, who attempt to run Homer off the stage with a big mobile fire-breathing devil's head. The devil's head goes out of control and plows into the audience.
The performers, feeling sorry about their actions, offer Homer an opportunity to perform at another benefit concert (for the victims of the recently messed-up gig), but he declines and prefers to perform at home instead. However, at the end of the episode, he replaces his car with the big devil's head (given to him by the band) using it to take Bart and Lisa to school. Principal Skinner tells Homer that he is not allowed to stop his car in the school bus zone. In retaliation, Homer activates the devil's fire breath, |
https://en.wikipedia.org/wiki/Bart%20vs.%20Lisa%20vs.%20the%20Third%20Grade | "Bart vs. Lisa vs. the Third Grade" is the third episode of the fourteenth season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on November 17, 2002. In the episode, the Simpsons buy a satellite television system, which Bart spends so much time watching that he does not study for an important achievement test. He scores so low that Principal Skinner demotes him to third grade, while Lisa does so well that she is moved up to third grade. The two are placed in the same class and become rivals. During a trip to Capital City, they get separated from their class and are forced to help each other in order to find their classmates.
Plot
Homer buys a satellite system with over 500 channels. He and Bart become addicted to it, and Bart does not study at all for an important upcoming achievement test, even as Lisa is spending all her time preparing. Once the test is done, Principal Skinner announces the results at a school assembly. Not only does Bart fail the test and is demoted to the third grade, but Lisa aces the test and gets promoted to the third grade, where they meet their new teacher, Audrey McConnell. Interestingly during class, Bart performs well on tests, having memorized the answers from his previous experience in the third grade, while Lisa has a hard time adjusting to the class. Audrey decides to clamp their desks together after Bart answers a trick question he had seen the previous year, as the teacher thinks Lisa needs Bart's help. Later, Bart gets an A on a map test while Lisa only gets an A−. Bart says that the test was easy and recites all of the answers to Lisa, which he had memorized from last year in third grade (because he claims that the answer key never changes). Lisa proclaims that Bart cheated but the teacher did not hear Bart's recitation and tells Lisa to stop being jealous.
Bart and Lisa are made field trip partners as part of the buddy system on a field trip to Capital City. When they are there, they hear that the flag for the state Springfield is an embarrassment (it contains a Confederate flag, despite the state being from the North), and their teacher assigns for homework an assignment to design a new flag. Lisa calls Marge as she designs her flag, which says "To Fraternal Love". On the phone, she complains about and makes fun of Bart, unmindful of the fact that Bart is overhearing the conversation on another phone and getting very angry about her comments. The next day, Bart, Lisa and the other third-graders hand over their flag designs to the Governor. When the Governor sees Lisa's design, she starts to cry and displays the flag which now reads "Learn to Fart". This appalls Lisa, as Bart innocently admonishes her for making the Governor cry.
Later, Bart again teases Lisa and they get in a fight and miss the bus heading back to Springfield. The fight brings them out of the parking lot and into the forest. As a result, the two wind up getting lost. |
https://en.wikipedia.org/wiki/Fast | Fast or FAST may refer to:
Fast (noun), high speed or velocity
Fast (noun, verb), to practice fasting, abstaining from food and/or water for a certain period of time
Acronyms and coded
Computing and software
Faceted Application of Subject Terminology, a thesaurus of subject headings
Facilitated Application Specification Techniques, a team-oriented approach for requirement gathering
FAST protocol, an adaptation of the FIX protocol, optimized for streaming
FAST TCP, a TCP congestion avoidance algorithm
FAST and later as Fast Search & Transfer, a Norwegian company focusing on data search technologies
Fatigue Avoidance Scheduling Tool, software to develop work schedules
Features from accelerated segment test, computer vision method for corner detection
Federation Against Software Theft, a UK organization that pursues those who illegally distribute software
Feedback arc set in Tournaments, a computational problem in graph theory
USENIX Conference on File and Storage Technologies
Government
Faʻatuatua i le Atua Samoa ua Tasi, a political party in Samoa
Fixing America's Surface Transportation Act, passed by the United States Congress
Foreign-Deployed Advisory and Support Teams, a former program of the US Drug Enforcement Administration; see
Free and Secure Trade, a Canada-United States and Mexico-United States program to facilitate faster cross border trade
Military
Fleet Antiterrorism Security Team, a branch of the United States Marine Corps
Fuel And Sensor Tactical packs, a type of conformal fuel tank developed for the F-15
Future Assault Shell Technology helmet, a combat helmet of United States of America.
Organizations
Farnborough Air Sciences Trust, an aviation museum
Financial Alliance for Sustainable Trade
Firefighter assist and search team, a team of firefighters dedicated to the rescue of other firefighters
Fulbright Academy of Science & Technology
Science and medicine
FAST (stroke) (Face, Arm, Speech, and Time), a mnemonic for the symptoms of a stroke
Farpoint Asteroid Search Team, an asteroid search team located at the Farpoint Observatory
Fast Auroral Snapshot Explorer, one in the series of NASA's Small Explorer spacecraft
Five-hundred-meter Aperture Spherical Telescope (), a large single-dish radio telescope in Guizhou province, China
Fluorescence-activating and absorption-shifting tag, genetically-encoded protein tag used in molecular biology
Focused assessment with sonography for trauma, an ultrasound used to examine the abdomen of a trauma patient
Fourier amplitude sensitivity testing, a variance-based global sensitivity analysis method
Future Attribute Screening Technology
Other acronyms
Fifteen and Send Time, a type of dog agility competition
Fairfield and Suisun Transit
Free ad-supported streaming television
Arts and entertainment
"Fast" (Juice Wrld song), 2019
"Fast" (Luke Bryan song), 2016
"Fast" (Sueco song), 2019
"Fast", a song by Chief Keef and Zaytoven from GloToven, 2019
Fast, a |
https://en.wikipedia.org/wiki/String-to-string%20correction%20problem | In computer science, the string-to-string correction problem refers to determining the minimum cost sequence of edit operations necessary to change one string into another (i.e., computing the shortest edit distance). Each type of edit operation has its own cost value. A single edit operation may be changing a single symbol of the string into another (cost WC), deleting a symbol (cost WD), or inserting a new symbol (cost WI).
If all edit operations have the same unit costs (WC = WD = WI = 1) the problem is the same as computing the Levenshtein distance of two strings.
Several algorithms exist to provide an efficient way to determine string distance and specify the minimum number of transformation operations required. Such algorithms are particularly useful for delta creation operations where something is stored as a set of differences relative to a base version. This allows several versions of a single object to be stored much more efficiently than storing them separately. This holds true even for single versions of several objects if they do not differ greatly, or anything in between.
Notably, such difference algorithms are used in molecular biology to provide some measure of kinship between different kinds of organisms based on the similarities of their macromolecules (such as proteins or DNA).
Extension
The extended variant of the problem includes a new type of edit operation: swapping any two adjacent symbols, with a cost of WS.
This version can be solved in polynomial time under certain restrictions on edit operation costs.
Robert A. Wagner (1975) showed that the general problem is NP-complete. In particular, he proved that when WI < WC = WD = ∞ and 0 < WS < ∞ (or equivalently, changing and deletion are not permitted), the problem is NP-complete.
References
Problems on strings |
https://en.wikipedia.org/wiki/Logic%20Programming%20Associates | Logic Programming Associates (LPA) is a company specializing in logic programming and artificial intelligence software. LPA was founded in 1980 and is widely known for its range of Prolog compilers and more recently for VisiRule.
LPA was established to exploit research at the Department of Computing and Control at Imperial College London into logic programming carried out under the supervision of Prof Robert Kowalski. One of the first implementations made available by LPA was micro-PROLOG which ran on popular 8-bit home computers such as the Sinclair ZX Spectrum and Apple II. This was followed by micro-PROLOG Professional one of the first Prolog implementations for MS-DOS.
As well as continuing with Prolog compiler technology development, LPA has a track record of creating innovative associated tools and products to address specific challenges and opportunities.
History
In 1989, LPA developed the Flex expert system toolkit, which incorporated frame-based reasoning with inheritance, rule-based programming and data-driven procedures. Flex has its own English-like Knowledge Specification Language (KSL) which means that knowledge and rules are defined in an easy-to-read and understand way.
Flex was quickly establshed as the leading Prolog-based expert system toolkit supporting frames, rules and procedures. Flex was licenced to other Prolog providors on other hardware platforms such as Telecomputing Plc to supplement Top One on IBM and ICL mainframes.
Other implementation sincluded Quintec Flex, Quintus Flex and BIM flex who were all on Unix and/or Vax/VMS platforms.
Flex was adopted by the Open Univeristy as part of its course T396 which was designed by Prof Adrian Hopgood. Some of the teaching material is now available.
Flex was also use by David A Ferrucci and Selmer Bringsjord in their storytelling machine, BRUTUS.
LPA made Flex available on Windows, DOS and Macintosh PCs, and in the early 2000's developed VisiRule as a way to create Flex/KSL programs simly by drawing a diagram - no need to write any code!
In 1992, LPA helped set up the Prolog Vendors Group, a not-for-profit organization whose aim was to help promote Prolog by making people aware of its usage in industry.
In 1999/2000, LPA helped set up Business Integrity Ltd, to bring to market some document assembly technology that LPA had developed using WinProlog and its recent web technology, ProWeb. This lead the creation of Contract Express which became sold to most major law firms. In 2015, Thomson Reuters acquired Business Integrity Ltd. The genesis of BIL are described here.
LPA's core product is LPA Prolog for Windows , a compiler and development system for the Microsoft Windows platform. The current LPA software range comprises an integrated AI toolset which covers various aspects of Artificial Intelligence including Logic Programming, Expert Systems, Knowledge-based Systems, Data Mining, Agents and Case-based reasoning etc.
In 2004, LPA launched VisiRule a graphical tool |
https://en.wikipedia.org/wiki/Molex | Molex LLC is a manufacturer of electronic, electrical, and fiber optic connectivity systems. Molex offers over 100,000 products across a variety of industries, including data communications, medical, industrial, automotive and consumer electronics. They are notable for pioneering the Molex connector, which has seen universal adoption in personal computing. The company is considered the second largest electronic connector company in the world.
History
Molex was established in 1938 by Frederick Krehbiel. The company began by making flowerpots out of an industrial byproduct plastic called Molex. Krehbiel developed this material by combining asbestos tailings, coal tar pitch, and limestone. Aside from flower pots, Molex also sold salt shakers before it expanded into electrical connectors and sensors. Later they made connectors for General Electric and other appliance manufacturers out of the same plastic. Molex acquired Woodhead Industries in 2006; the largest acquisition in the former's history at the time.
On February 14, 2005, Molex announced its results for the six months ended December 31, 2004, that reflect certain adjustments to its results of operations for the first fiscal quarter ended September 30, 2004. In March 2005, a class action lawsuit against Molex Inc. and certain of its officers and directors for artificially inflating the market price through materially false and misleading statements was announced. In 2007, a settlement of $10.5 million fund plus interest was reached.
In 2009, Hermann Simon mentioned this company as an example of a "Hidden Champion". During this period, Molex already operated 59 manufacturing plants all over the world, posting a sustained 12% annual growth rate. Following another expansion strategy, the company started producing complex, three-dimensional electronic components for medical applications in 2011.
In September 2013, Koch Industries purchased Molex for $7.2 billion. Koch indicated Molex will retain its company name and headquarters in Lisle, Illinois, and be run as a subsidiary.
In November 2016, Molex acquired the Wisconsin-based Phillips-Medisize. As a private equity investment firm, Phillips-Medisize specializes in plastic injection molding and the manufacture of medical instruments. Phillips-Medisize incorporates a wide variety of products and services, including drug delivery, mobile and portable medical devices, and primary pharmaceutical packaging and diagnostic products. Employing 5,400 people in 21 locations worldwide, Phillips-Medisize operates as an indirect subsidiary of Molex.
References
Companies based in DuPage County, Illinois
American companies established in 1938
Companies formerly listed on the Nasdaq
Electronics companies of the United States
Koch Industries
Lisle, Illinois
Manufacturing companies based in Illinois
2013 mergers and acquisitions
1938 establishments in Illinois
Electronics companies established in 1938
American corporate subsidiaries |
https://en.wikipedia.org/wiki/IRC-Galleria | IRC-Galleria (Finnish for "IRC gallery") is a social networking website in Finland. It was founded in December 2000 by Tomi Lintelä as a photo gallery for the Finnish users of Internet Relay Chat (IRC). As of April 2009, IRC-Galleria had over 500,000 registered users and 9 million images.
IRC-Galleria users are required to be 13 years of age or older. The site’s primary language is Finnish. A majority of users are aged between 13 and 22, with the mean age being about 20 years.
IRC-Galleria has also operated in some other European countries such as Russia, Estonia and Germany.
History
In 2007, video game company Sulake bought the website. The price of 12.5 million euros was paid in future stocks, but in the end Sulake never went public.
In fall 2008, the Helsinki police started a program in which a police officer created an account in IRC-Galleria to openly communicate with the youth. The following year, two more police officers joined the program. By December 2009, the officers had received about 50,000 comments and questions, including crime tips and reports of bullying in schools.
In 2014, IRC-Galleria was purchased by Herdifier Oy, a company owned by some of the creators and early workers of the website. At the time, the website was reportedly visited by 30% of Finnish young adults, and had about 100,000 weekly visitors. The service is financed with advertising, SMS-based services, T-shirts and optional VIP packages.
Technology
IRC-Galleria is a photo gallery and users are required to have at least one accepted image. The maximum number of visible images per user is limited to 60 for regular users an 10,000 for VIP users. A user's default image must contain the user's face.
Communication in IRC-Galleria is based on short messages, comments, each of which is associated with either a picture or a community. Each user can be a member of 100 communities. Some of the communities are representations of actual IRC channels, and joining them requires IRC-based identification. Comments are only visible to those who are logged in.
See also
List of social networking websites
References
External links
Finnish social networking websites
Image-sharing websites |
https://en.wikipedia.org/wiki/Missionary%3A%20Impossible | "Missionary: Impossible" is the fifteenth episode of the eleventh season of the American television series The Simpsons. It originally aired on the Fox network in the United States on February 20, 2000. In the episode, Homer gets in trouble with PBS after confessing he does not have $10,000 to give them for their pledge drive, and ends up a missionary on a South Pacific island. It was directed by Steven Dean Moore and was the final episode written by Ron Hauge.
Plot
In an attempt to end a PBS pledge drive which interrupts a favorite show of his (a Thames Television British sitcom titled Do Shut Up), Homer anonymously pledges $10,000 to the network. However he is traced by the network, who press him for the money, but when it quickly becomes apparent that he cannot pay, he is chased by pledge drive host Betty White and a mob of PBS personalities (including the cast of Do Shut Up, Fred Rogers, Yo-Yo Ma, the Teletubbies, Big Bird, Oscar the Grouch, and Elmo). Homer claims sanctuary in the church, where Reverend Lovejoy gets the heat off him by sending him to be a missionary in Micronesia, even though he has little religious faith and knowledge of Christianity (such as mispronouncing Jesus as Jebus).
Homer arrives on an island and meets the outgoing missionaries and the natives, including a native girl who he names Lisa Jr. because she sounds just like Lisa. After initially despairs that there is no television or beer, and resorting to licking frogs for their hallucinogenic poison, Homer tries to teach them about religion, but realizing that he knows nothing. Instead, he decides to build a casino, introducing the natives to alcohol (brewed from holy water), gambling, gluttony, and violence to the island, ruining their virtuous way of life.
After the failure of the casino, Homer builds a chapel in penance, but he and Lisa Jr. ring the bell too loudly, causing an earthquake that releases a river of lava. As the two are about to sink to their deaths in the lava, the scene cuts to another pledge drive; this time, however, for the Fox network. It is revealed that The Simpsons itself is in danger of cancellation, while the entire network is facing financial hardship. Various Fox show personalities, with a cranky Rupert Murdoch, are manning the phones; the host is again Betty White, who entreats the viewers to help keep "crude, low-brow programming", such as Family Guy, on air. A caller pledges $10,000; Murdoch excitedly tells them that they have saved the network. The caller is revealed to be Bart, who responds to Murdoch's declaration by saying "Wouldn't be the first time".
Production
"Missionary: Impossible" was written by Ron Hauge and directed by Steven Dean Moore as part of the eleventh season of the show (1999–2000). Betty White's role was originally written for Mary Tyler Moore. Moore was unavailable, so they asked White, who accepted the role.
Cultural references
In the beginning of the episode Homer is watching a program called Do Shut Up, de |
https://en.wikipedia.org/wiki/Charles%20II%3A%20The%20Power%20and%20the%20Passion | Charles II: The Power and the Passion is a British television film in four episodes, broadcast on BBC One in 2003, and produced by the BBC in association with the A&E Network in the United States, which also released it in North America with heavy edits. It was produced by Kate Harwood, directed by Joe Wright and written by screenwriter Adrian Hodges, whose credits include David Copperfield and The Lost World.
Synopsis
The film covers the life of Charles II – beginning just before his Restoration to the throne in 1660. He was deeply traumatised by the execution of his father in 1649, after the former's defeat in the Wars of the Three Kingdoms; it begins, however, with his penurious exile in Antwerp in 1658. The film's emphasis is on his court, and his conflicts with Parliament – essentially the same issues which led to the Civil War between his father Charles I and the House of Commons, the politics of who would succeed him – and his relationships with his family, his mistresses and his illegitimate son James, Duke of Monmouth.
The film dramatises both Charles's laziness and frivolous diversion, leaving political issues to his chancellor Sir Edward Hyde, but becoming increasingly irritated by the paternalistic way which Hyde behaves towards him. Dismissing Hyde, he takes the reins of power himself, determined that his brother should succeed him in the event of his not having any legitimate children (despite opposition to James's Catholicism), and that Royal Power not be challenged by Parliament.
The production won the British Academy Television Award for Best Drama Serial in 2004. Composer Rob Lane received an nomination for Outstanding Music Composition for a Miniseries, Movie or a Special (Dramatic Underscore) at the 32nd International Emmy Awards.
Summary of differences between American & UK versions
It was shown in the United States under the title The Last King: The Power and the Passion of King Charles II. This version, however, was heavily edited. The original British version is a four part series. For American broadcast, over an hour was edited out, and it was shown in two 90 min (with commercials, 2 hour) installments.
The edits often make little regard for either the script's continuity or coherence. Unless otherwise stated, items said to have been left out refer to the version shown in America and the DVD version available.
Many things are left out including the full details of the Treaty of Dover which contained a secret clause wherein Charles promised Louis XIV, his first cousin, to convert to Catholicism for an enormous sum of money. Louis also promised six thousand French troops if Charles needed them.
The edited American version also leaves out Charles's trickery of George Villiers, Duke of Buckingham (played by Rupert Graves) regarding the treaty's secret provision. Thus, Buckingham's later opposition to Charles's insistence that his brother James (later James II), played by Charlie Creed-Miles, inherit the throne a |
https://en.wikipedia.org/wiki/List%20of%20programs%20broadcast%20by%20The%20WB | The following is a list of programs broadcast by The WB. Some programs were carried over to The CW, a network formed through a partnership between WB parent company Time Warner and UPN corporate parent CBS Corporation, in September 2006 following the closure of The WB. Titles are listed in alphabetical order followed by the year of debut in parentheses.
Former programming
Dramas
7th Heaven (1996–2006)
Savannah (1996–97)
Buffy the Vampire Slayer (1997–2001) (moved to UPN)
Charmed (1998–2006)
Dawson's Creek (1998–2003)
Felicity (1998–2002)
Hyperion Bay (1998–99)
Three (1998)
Angel (1999–2004)
Jack & Jill (1999–2001)
Popular (1999–2001)
Rescue 77 (1999)
Roswell (1999–2001) (moved to UPN)
Safe Harbor (1999)
D.C. (2000)
Gilmore Girls (2000–06)
Young Americans (2000)
Smallville (2001–06)
Dead Last (2001)
Birds of Prey (2002–03)
Everwood (2002–06)
Glory Days (2002)
Black Sash (2003)
Tarzan (2003)
One Tree Hill (2003–06)
Jack & Bobby (2004–05)
The Mountain (2004–05)
Summerland (2004–05)
Just Legal (2005–06)
Related (2005–06)
Supernatural (2005–06)
The Bedford Diaries (2006)
Pepper Dennis (2006)
Comedies
Adult animation
Mission Hill (1999–2000; moved to Adult Swim)
Baby Blues (2000; moved to Adult Swim)
Invasion America (1998)
The PJs (2000–01; from Fox)
The Oblongs (2001; moved to Adult Swim)
Reality/other
Daytime
Children's programming
See also
List of programs broadcast by The WB 100+ Station Group – for programs aired by The WB's master programming feed for smaller markets
List of programs broadcast by Kids' WB – for programs aired as part of The WB's Saturday-morning cartoon block.
List of programs broadcast by The CW - for programs that transitioned to The WB's successor network, The CW.
References
External links
WB
Programs broadcast by The WB |
https://en.wikipedia.org/wiki/Pygmoelian | "Pygmoelian" is the sixteenth episode of the eleventh season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on February 27, 2000. In the episode, after getting his face censored out on the Duff Beer calendar for not being photogenic, Moe Szyslak gets plastic surgery and becomes the star of a popular soap opera.
Plot
After being tricked into evacuating the house by Homer, who had set off the fire alarm early in the morning, the family goes to the Duff Days festival sponsored by Duff Beer. While there, they see Moe Szyslak enter a bartending competition and win the grand prize of having his photo taken for the upcoming Duff calendar. However, when the calendar goes on sale, Moe is dismayed to find his face covered by several layers of stickers due to his ugliness. He takes Lenny and Carl up on their suggestion that he have plastic surgery; although he is reluctant to go through with the procedure, it leaves him with a handsome face. Filled with new confidence, he confronts old adversaries, including the producers of the soap opera It Never Ends, complaining that he was rejected for the part of Dr. Tad Winslow 25 years earlier because of his appearance. When the actor portraying the role is fired after demanding a salary increase, the producers hire Moe to replace him.
Meanwhile, Bart and Lisa discover that Maggie's pink Duff Days elephant balloon has blown away in the wind. They go after it until it ends up in a gay Republican coalition's office where the members are discussing what their mascot should be. One member dismisses the pink elephant as being too precise about their group's identity. They then give Lisa a bumper sticker supporting a gay president in 2084, admitting that they have to be realistic about their long-term goals.
Taping of It Never Ends goes well until Moe reads in a top-secret book of future plot lines that his character is to be killed off. Infuriated, he gets revenge by revealing all the plots on the air, with help from Homer. The producer angrily interrupts to tell Moe that his character's death was meant to be part of a dream sequence, as indicated by the book's color-coding of pages that Moe had remembered incorrectly, and fires him. Moe confidently states that he can get a role on any other soap opera he wants, but as he is leaving, a set piece falls on his face and crushes it back to its original appearance. His life returns to normal at the bar, where he wonders how the accident left him with his original face instead of an entirely new one.
Production and themes
"Pygmoelian" was written by Larry Doyle and directed by Mark Kirkland as part of the eleventh season of The Simpsons (1999–2000).
In a 2007 article, Slant critic Ed Gonzales noted that in relation to the episode's primary story of Moe's plastic surgery, the subplot of Bart and Lisa chasing Maggie's pink elephant balloon into a meeting for gay Republicans serves as "a seemingly arbitrar |
https://en.wikipedia.org/wiki/Days%20of%20Wine%20and%20D%27oh%27ses | "Days of Wine and D'oh'ses" is the eighteenth episode of the eleventh season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on April 9, 2000. In the episode, Barney realizes how much of a pathetic drunk he is after watching his birthday party video and decides to give up alcohol forever, which upsets his friend Homer. Meanwhile, Bart and Lisa work together to take a memorable photo for a new phone book cover contest.
It was the first episode of the show to be written by cast member Dan Castellaneta and his wife Deb Lacusta. They originally pitched the story during the production of the series' fourth season, but the concept was rejected on the basis of being too similar to the episode "Duffless"; it was later revived by showrunner Mike Scully.
Several staff members opposed the idea of Barney becoming sober because they did not think his character change would be funny. Several critics, including Chris Turner, were also not fond of Barney's change.
Plot
Believing that no-one remembered his birthday, Barney is shown an embarrassing video of his birthday party, during which he is mocked by his friends with gag gifts including coupons from Moe for helicopter-flying lessons at the Springfield Flight School. Realizing that he is a hideous drunk, being so intoxicated that he forgot the events of that day, Barney vows to get sober. At first, he finds sustaining sobriety tough, but he finds his way to an AA meeting with Homer's help, and soon takes the helicopter lessons using the coupons. At Moe's Tavern, Homer is treated as the new Barney and is forced by Moe, Lenny, and Carl to perform drunken antics. Barney gives Homer a ride in the helicopter a few lessons later with the two arguing about Barney's new sobriety and Homer's unhappiness that they no longer have ridiculous adventures.
Meanwhile, to get their picture on the cover of the new phone book and win the prize of a new bike, Bart and Lisa enter an amateur photo contest. They find an old camera with an old roll of film and start to take snapshots with it. One day, they are taking pictures atop Mt. Springfield when Bart inadvertently starts a forest fire by carelessly discarding a hot flashbulb, putting them in imminent danger.
At Moe's, Barney arrives to make amends for his drunken behavior; when he and Homer see the news report of the fire, they band together to save Bart and Lisa. They hop in the helicopter, but land in the middle of a bridge when Barney panics over flying the helicopter, having not yet finished the lessons. When a Duff beer truck on the bridge spills its contents in front of Barney, Homer refuses to let him give up on sobriety and drinks an entire six-pack in his place, leaving Barney touched at his gesture. Together, Barney and a drunken Homer save the kids, and Bart commemorates the moment by taking a photo of the fire on Mt. Springfield, submitting it as his and Lisa's entry to the photo contest.
Th |
https://en.wikipedia.org/wiki/Last%20Tap%20Dance%20in%20Springfield | "Last Tap Dance in Springfield" is the twentieth episode of the eleventh season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on May 7, 2000. In the episode, Lisa decides to sign up for tap dancing lessons after being inspired by a film about a girl who enters a tango contest and wins. Meanwhile, Bart and Milhouse hide out at the mall to escape going to summer camp. "Last Tap Dance in Springfield" was written by Julie Thacker, who based it on her own experiences with dance classes.
The episode has received mixed reviews from critics.
Plot
On a trip to the mall, Homer sees an optometrist to get his eyes examined and gets laser surgery after rejecting a number of eyeglasses. After the surgery, Homer rejects the optometrist's advice to take eye drops to keep his eyes from crusting over. While he is temporarily blinded, he gets tricked into driving to the liquor store to buy Jack Daniel's and "a carton of smokes" for Dolph, Jimbo, and Kearney by Kearney impersonating Marge's voice.
At the same time, Marge and Lisa find items for Bart's school camping trip. While watching the film Tango de La Muerte at the mall's cineplex, Lisa identifies with the main female character, a bookworm named "Lisabella" whom the tango champion asks to be his partner and with whom he then falls in love. This inspires Lisa to enroll at a dance school, where she wants to take tango classes. She is pushed into tap lessons by an obnoxious former child star named Vicki Valentine. Lisa's hopes of being a dancer are crushed when she finds that she is the worst dancer there, even being out-performed by Ralph Wiggum. She continues to attend the tap classes because she does not want to upset Homer and Marge.
When the school organizes a dance recital, Vicki refuses to let Lisa dance and relegates her to pulling the curtain to open the show (only to later decide that the curtain-pulling is too important for Lisa and instead do it herself). Professor Frink, overhearing, devises a plan to attach a device to Lisa's shoes that will make them automatically tap at any percussive sound. This allows her to mimic the other dancers and take part in the recital. She becomes a star at the show, even upstaging an enraged Vicki, but when the audience applauds her, her shoes go out of control. Homer stops the shoes from going haywire by tripping Lisa. Vicki finally seems to empathize with Lisa's desperation to be a star (though she notes that this involved her destroying Buddy Ebsen's credit rating, much to Homer and Marge's bemusement). Lisa walks off with her parents, having decided that tap dancing is not for her.
Meanwhile, Bart and Milhouse sneak out of their camping trip after discovering that Nelson Muntz will be there with them with plans to regularly beat them both up. They decide to hide in the mall for the duration, having shoe fights and causing havoc once the mall has closed. The next morning, the mall manager an |
https://en.wikipedia.org/wiki/Ratchet%3A%20Deadlocked | Ratchet: Deadlocked (known as Ratchet: Gladiator in Europe and Australia) is a 2005 action platformer, developed by Insomniac Games and published by Sony Computer Entertainment for the PlayStation 2 as the fourth installment of the Ratchet & Clank series.
The game's story begins as Ratchet, Clank, and Al are abducted and forced to compete in "DreadZone", a violent game show in which heroes are forced to kill each other. Ratchet is given a "DeadLock" collar, which will explode if he becomes uncooperative or boring. The three must find a way to deactivate the collars and free the other heroes being held prisoner. Deadlocked was the last Ratchet & Clank game to be rated T, despite the introduction of the E10+ rating earlier that year. It's also the last main series Ratchet & Clank game to be released on PlayStation 2.
The gameplay is similar to that of other games in the series, but focuses more on shooter aspects rather than platforming. The player, as Ratchet, fights in DreadZone tournaments across the "Shadow Sector" in the "Solana" Galaxy, with a large variety of weapons. This game was the first in the series to feature cooperative gameplay in a story mode, and also includes an online multiplayer mode. Some vehicles return from previous games, and new ones are introduced. For the first time, Clank (in his typical form) was not a playable character.
Deadlocked was met with generally favorable reviews and was a commercial success, selling 2.1 million copies by 2007.
Gameplay
The gameplay of Deadlocked is similar to that of previous Ratchet & Clank games, with a combination of shooting, action, and platforming, although it emphasizes more on the combat aspects of the series, with very little platforming. Deadlocked was the first game in the Ratchet and Clank series to contain an adjustable difficulty level, and is the first to have a cooperative story mode with two players.
The player controls Ratchet from a third-person perspective, although first-person play is possible, while competing in missions and tournaments, defeating enemies, and occasionally controlling vehicles. "Combat bots", two robots which follow the player in most missions, give Ratchet extra firepower, and perform several tasks for him, such as planting explosives and hacking orbs. Combat bots can be upgraded and given new paint schemes, head designs, and weaponry. After completing missions, the player is awarded a certain amount of "Dreadpoints" and bolts, the game's form of currency. Bolts can also be obtained by defeating enemies, or by locating hidden "Jackpot" crates across planets. Certain amounts of "Dreadpoints" are required to unlock new planets, and affect Ratchet's leaderboard rank amongst other contestants of Dreadzone.
There are ten weapons in Deadlocked, fewer than most other games in the series. However, weapons can now be extensively modified using a large range of "Alpha" and "Omega" mods, which improve weapon abilities. Alpha mods improve statistics such |
https://en.wikipedia.org/wiki/Digital%20reference | Digital reference (more commonly called virtual reference) is a service by which a library reference service is conducted online, and the reference transaction is a computer-mediated communication. It is the remote, computer-mediated delivery of reference information provided by library professionals to users who cannot access or do not want face-to-face communication. Virtual reference service is most often an extension of a library's existing reference service program. The word "reference" in this context refers to the task of providing assistance to library users in finding information, answering questions, and otherwise fulfilling users’ information needs. Reference work often but not always involves using reference works, such as dictionaries, encyclopedias, etc. This form of reference work expands reference services from the physical reference desk to a "virtual" reference desk where the patron could be writing from home, work or a variety of other locations.
The terminology surrounding virtual reference services may involve multiple terms used for the same definition. The preferred term for remotely delivered, computer-mediated reference services is "virtual reference", with the secondary non-preferred term "digital reference" having gone out of use. "Chat reference" is often used interchangeably with virtual reference, although it represents only one aspect of virtual reference. Virtual reference includes the use of both synchronous (i.e., IM, videoconferencing) and asynchronous communication (i.e., texting and email). Here, "synchronous virtual reference" refers to any real-time computer-mediated communication between patron and information professional. Asynchronous virtual reference is all computer-mediated communication that is sent and received at different times.
History
The earliest digital reference services were launched in the mid-1980s, primarily by academic and medical libraries, and provided by e-mail. These early-adopter libraries launched digital reference services for two main reasons: to extend the hours that questions could be submitted to the reference desk, and to explore the potential of campus-wide networks, which at that time was a new technology.
With the advent of the graphical World Wide Web, libraries quickly adopted webforms for question submission. Since then, the percentage of questions submitted to services via webforms has outstripped the percentage submitted via email.
In the early- to mid-1990s, digital reference services began to appear that were not affiliated with any library. These digital reference services are often referred to as "AskA" services. An example of an AskA services is at the Internet Public Library.
Providing remote-based services for patrons has been a steady practice of libraries over the years. For example, before the widespread use of chat software, reference questions were often answered via phone, fax, email and audio conferencing. Email is the oldest type of virtual referen |
https://en.wikipedia.org/wiki/Xen%20%28disambiguation%29 | Xen is a hypervisor allowing multiple computer operating systems to execute on the same computer hardware concurrently.
Xen may also refer to:
Xen, a programming language, now part of Cω
Xen (Half-Life), a fictional location of the computer game Half-Life
Xen (album), by Arca, 2014
People
Xen C. Scott (1882–1924), American sports coach
Xen Balaskas (1910–1994), South African cricketer
See also
Xen Cuts, a compilation album from the record label Ninja Tune
Zen (disambiguation) |
https://en.wikipedia.org/wiki/Mobile%20Station%20Roaming%20Number | The Mobile Station Roaming Number (MSRN) is an E.164-defined telephone number used to route telephone calls in a mobile network from a GMSC (Gateway Mobile Switching Centre) to the target MAC id (c61fc003db4659a8). It can also be defined as a directory number temporarily assigned to a mobile for a mobile terminated call. A MSRN is assigned for every mobile terminated call, not only the calls where the terminating MS lives on a different MSC than the originating MS. Although this seems unnecessary since many vendors' VLR's are integrated with the MSC, the GSM specification indicates that the MSC and VLR (Visitor Location Register) do not need to reside on the same switch. They are considered two different nodes as they have their own routing addresses. The MSRN is one of the returned parameters into SRI Response message. In particular the MSRN is used into an MNP scenario (in this case it can be modified as 'RgN + MSISDN').
Mobile technology |
https://en.wikipedia.org/wiki/Interactive%20Multimedia%20Association | The Interactive Multimedia Association (IMA) was an industry association which developed a set of audio algorithms. The most important is the ADPCM algorithm which is in use by Apple and Microsoft.
The Interactive Multimedia Association ceased operations around 1998. An archived copy of the document IMA Recommended Practices for Enhancing Digital Audio Compatibility in Multimedia Systems (version 3.0), which describes the IMA ADPCM algorithm, is available.
External links
RFC 3551, page 13 - IMA ADPCM (DVI4)
References
Standards organizations in the United States |
https://en.wikipedia.org/wiki/Rijndael%20S-box | The Rijndael S-box is a substitution box (lookup table) used in the Rijndael cipher, on which the Advanced Encryption Standard (AES) cryptographic algorithm is based.
Forward S-box
The S-box maps an 8-bit input, , to an 8-bit output, . Both the input and output are interpreted as polynomials over GF(2). First, the input is mapped to its multiplicative inverse in , Rijndael's finite field. Zero, as the identity, is mapped to itself. This transformation is known as the Nyberg S-box after its inventor Kaisa Nyberg. The multiplicative inverse is then transformed using the following affine transformation:
where is the S-box output and is the multiplicative inverse as a vector.
This affine transformation is the sum of multiple rotations of the byte as a vector, where addition is the XOR operation:
where represents the multiplicative inverse, is the bitwise XOR operator, is a left bitwise circular shift, and the constant is given in hexadecimal.
An equivalent formulation of the affine transformation is
where , , and are 8 bit arrays, is 01100011, and subscripts indicate a reference to the indexed bit.
Another equivalent is:
where is polynomial multiplication of and taken as bit arrays.
Inverse S-box
The inverse S-box is simply the S-box run in reverse. For example, the inverse S-box of b8 is 9a. It is calculated by first calculating the inverse affine transformation of the input value, followed by the multiplicative inverse. The inverse affine transformation is as follows:
The inverse affine transformation also represents the sum of multiple rotations of the byte as a vector, where addition is the XOR operation:
where is the bitwise XOR operator, is a left bitwise circular shift, and the constant is given in hexadecimal.
Design criteria
The Rijndael S-box was specifically designed to be resistant to linear and differential cryptanalysis. This was done by minimizing the correlation between linear transformations of input/output bits, and at the same time minimizing the difference propagation probability.
The Rijndael S-box can be replaced in the Rijndael cipher, which defeats the suspicion of a backdoor built into the cipher that exploits a static S-box. The authors claim that the Rijndael cipher structure is likely to provide enough resistance against differential and linear cryptanalysis even if an S-box with "average" correlation / difference propagation properties is used (cf. the "optimal" properties of the Rijndael S-box).
Example implementation in C language
The following C code calculates the S-box:
#include <stdint.h>
#define ROTL8(x,shift) ((uint8_t) ((x) << (shift)) | ((x) >> (8 - (shift))))
void initialize_aes_sbox(uint8_t sbox[256]) {
uint8_t p = 1, q = 1;
/* loop invariant: p * q == 1 in the Galois field */
do {
/* multiply p by 3 */
p = p ^ (p << 1) ^ (p & 0x80 ? 0x1B : 0);
/* divide q by 3 (equals multiplication by 0xf6) */
q ^= q << 1;
q ^= q << 2;
q ^= q << 4;
q ^= q & 0x |
https://en.wikipedia.org/wiki/Knowledge%20engineer | A knowledge engineer is a professional engaged in the science of building advanced logic into computer systems in order to try to simulate human decision-making and high-level cognitive tasks. A knowledge engineer supplies some or all of the "knowledge" that is eventually built into the technology.
Overview
Often, knowledge engineers are intermediaries employed to translate highly technical information which they elicit from domain experts into the actual computer program or data system .
Knowledge engineers interpret and organize information on how to make systems decisions .
The term "knowledge engineer" first appeared in the 1980s in the first wave of commercialization of AI – the purpose of the job is to work with a client who wants an expert system created for them or their business.
Validation and verification
Knowledge engineers are involved with validation and verification.
Validation is the process of ensuring that something is correct or conforms to a certain standard. A knowledge engineer is required to carry out data collection and data entry, but they must use validation in order to ensure that the data they collect, and then enter into their systems, fall within the accepted boundaries of the application collecting the data.
It is important that a knowledge engineer incorporates validation procedures into their systems within the program code. After the knowledge-based system is constructed, it can be maintained by the domain expert .
References
— composed in conjunction with the AIPS-2002 Workshop on Knowledge Engineering Tools and Techniques for AI Planning
Knowledge engineering |
https://en.wikipedia.org/wiki/ShopHQ | ShopHQ (formerly ValueVision, ShopNBC, Evine Live, and Evine) is an American cable, satellite and broadcast home shopping television network and multi-channel video retailer owned by iMedia Brands Inc., whose assets were acquired by IV Media on August 16, 2023.
Overview
Launched on March 12, 1991 as ValueVision, the channel has Qurate's HSN, QVC, and Jewelry Television as its competitors. Already called between 2013 and 2015 with that name, it was called ShopHQ again in 2019.
In addition to ShopHQ, iMedia operates two other brands; ShopHQ Health, offering health and wellness products, and the Bulldog Shopping Network, which carries products for men. Controlled by The Clinton Group until 2023, Comcast had a 12.5% stake in the company.
Both ShopHQ and iMedia Brands (IMBI) are headquartered in Eden Prairie, Minnesota. In August, 2023, they were acquired by IV Media, a subsidiary of Innovation Ventures, LLC.
History
ValueVision and ShopNBC/HQ
After being founded in June 1990, ValueVision Media (VVM) had a part of the company sold to NBC ten years later. When ValueVision was renamed ShopNBC in November 2000, its rebranding included a new logo that features the NBC peacock, but the parent company retained its name.
In 2010, it was reported that NBC might sell its stake in ValueVision Media, due in part to a pending merger between NBCUniversal and Comcast. One month after formally announcing that it would sell its stake back to VVM, NBCU ultimately decided to maintain its investment in the company in June.
After acquiring NBCUniversal's financial interest in 2013, ValueVision Media announced the network would be renamed ShopHQ (visually branded as SHQP). Mark Cuban's American Dream aired on the network in 2014, and was part of a plan under the Clinton Group management to feature more celebrity hosts.
Evine
On February 13, 2015, the ShopHQ network was rebranded as EVINE Live, following ValueVision Media's acquisition of e-commerce company Dollars Per Minute, the owner of the EVINE trademark, in order to distance itself from the reputation it held under ValueVision/ShopNBC/ShopHQ.
The network hired former QVC host Kathy Levine, and has featured merchandise branded under different reality TV stars, including Lisa Vanderpump and Countess Luann DeLesseps. It has also premiered concepts from other well-known celebrities, including Paula Deen, Vanessa Williams, Nancy O’Dell, Holly Robinson Peete, Karen Fairchild, Dr. Terry Dubrow and Heather Dubrow, Todd English, Donny Osmond and Bob Vila. It also sells products on its e-commerce website, Evine.com.
EVINE Live launched a high definition feed of the channel in 1080i (including the acquisition of HD tier channel slots under new carriage agreements) the same year, but until September 2017, remained in standard definition, merely rebroadcasting the SD feed. The network converted to an upscaled standard definition widescreen presentation in the fall of 2016, and quietly upgraded to HD a year after.
In Ju |
https://en.wikipedia.org/wiki/Differential%20GPS | Differential Global Positioning Systems (DGPSs) supplement and enhance the positional data available from global navigation satellite systems (GNSSs). A DGPS for GPS can increase accuracy by about a thousandfold, from approximately to .
DGPSs consist of networks of fixed position, ground-based reference stations. Each reference station calculates the difference between its highly accurate known position and its less accurate satellite-derived position. The stations broadcast this data locally—typically using ground-based transmitters of shorter range. Non-fixed (mobile) receivers use it to correct their position by the same amount, thereby improving their accuracy.
The United States Coast Guard (USCG) previously ran DGPS in the United States on longwave radio frequencies between and near major waterways and harbors. It was discontinued in March of 2022. The USCG's DGPS was known as NDGPS (Nationwide DGPS) and was jointly administered by the Coast Guard and the Army Corps of Engineers. It consisted of broadcast sites located throughout the inland and coastal portions of the United States including Alaska, Hawaii and Puerto Rico. The Canadian Coast Guard (CCG) also ran a separate DGPS system, but discontinued its use on December 15, 2022. Other countries have their own DGPS.
A similar system which transmits corrections from orbiting satellites instead of ground-based transmitters is called a Wide-Area DGPS (WADGPS) Satellite Based Augmentation System.
History
When GPS was first being put into service, the US military was concerned about the possibility of enemy forces using the globally available GPS signals to guide their own weapon systems. Originally, the government thought the "coarse acquisition" (C/A) signal would give only about , but with improved receiver designs, the actual accuracy was . Starting in March 1990, to avoid providing such unexpected accuracy, the C/A signal transmitted on the L1 frequency () was deliberately degraded by offsetting its clock signal by a random amount, equivalent to about of distance. This technique, known as Selective Availability, or SA for short, seriously degraded the usefulness of the GPS signal for non-military users. More accurate guidance was possible for users of dual-frequency GPS receivers which also received the L2 frequency (), but the L2 transmission, intended for military use, was encrypted and was available only to authorized users with the decryption keys.
This presented a problem for civilian users who relied upon ground-based radio navigation systems such as LORAN, VOR and NDB systems costing millions of dollars each year to maintain. The advent of a global navigation satellite system (GNSS) could provide greatly improved accuracy and performance at a fraction of the cost. The accuracy inherent in the S/A signal was however too poor to make this realistic. The military received multiple requests from the Federal Aviation Administration (FAA), United States Coast Guard (USCG) and Uni |
https://en.wikipedia.org/wiki/Alberta%20SuperNet | Alberta SuperNet is a municipal broadband network in the Canadian province of Alberta. The network links Alberta's public institutions, as well as rural communities and First Nations in the province. SuperNet was constructed as a public-private partnership between the government of Alberta, Bell West, and Axia NetMedia.
Structure
The Alberta SuperNet began construction in 2001. It consists of two components: a base area network which serves 27 urban communities, and an "extended area" network which connects rural and First Nations areas to the SuperNet. The network provides layer 3 connectivity. Parts of the network, especially in Northern Alberta, utilize wireless links instead of fibre. Linking Fort Chipewyan was especially difficult, due to its terrain and the protected Wood Buffalo National Park—necessitating a 120 km wireless link from the Birch Mountains.
The network consists of over 13,000 kilometers of trenched fibre optic lines and wireless links, serving 429 communities.
Axia NetMedia was contracted to sell wholesale access to the network. On June 29, 2018, Service Alberta announced that it had declined to renew its contract with Axia NetMedia, and that it had reached a multi-year deal with Bell Canada to assume operations of SuperNet. Bell Canada subsequently announced the following Monday that it had also agreed to acquire Axia SuperNet Ltd., the local Axia subsidiary.
Reception
Since Alberta SuperNet was not intended to serve as a last mile network, its success in bridging the rural-urban digital divide depends on private ISPs to connect rural homes and businesses to SuperNet. In many rural communities these services have been slow to develop due to the lack of a clear business case or economic incentive, resulting in criticism of this aspect of the SuperNet model.
In 2005, the Association of Canadian Engineering Companies gave the Award of Excellence to Morrison Hershfield for project management of the Alberta SuperNet.
References
External links
Government of Alberta news release, July 24, 2001
Axia Supernet Ltd. ownership details
Wide area networks
Communications in Alberta |
https://en.wikipedia.org/wiki/PhoneNET | PhoneNET was an implementation of the AppleTalk networking physical layer created by Farallon Computing (now Netopia).
Instead of the shielded twisted pair wiring and three-pin Mini-DIN connectors employed by Apple's LocalTalk implementation, PhoneNET uses standard four-conductor telephone (Category 1) patch cords and RJ-11 modular connectors.
Like LocalTalk, the maximum speed for data transfer was 230 kbit/s unless accelerating drivers were used to override the operating system's drivers. Unlike LocalTalk, which only supported a daisy chain topology, PhoneNET was principally used in star topologies over structured cabling plants.
Functionality
Unlike LocalTalk's four-wire grounded implementation, PhoneNET used a single twisted pair, or the outside two wires of a four-conductor flat cable.
As normal telephone equipment used the inside two wires, PhoneNET could share cabling with telephones, allowing both phone calls and networking over a single cable.
Superseded by
Though PhoneNET transceivers are still available from third parties for use on legacy Macintosh networks, no Apple computer or device has been made with the RS-422 mini-DIN-8 serial ports required for LocalTalk networking since the discontinuation of the Power Macintosh G3 in 1999.
, Apple devices use Ethernet or wireless networking.
External links
PhoneNET User's Guide: Scribd - Internet Archive
Schematics
Photos
Local area networks
Physical layer protocols |
https://en.wikipedia.org/wiki/EPON | EPON may refer to:
Ethernet passive optical network
United Panhellenic Organization of Youth, a Greek leftist youth organization founded during World War II
A type of epoxy resin used in sample preparation for electron microscopes. |
https://en.wikipedia.org/wiki/Serveis%20Ferroviaris%20de%20Mallorca | Serveis Ferroviaris de Mallorca () or SFM is a company which operates the metre gauge railway network on the Spanish island of Majorca. The total length, including Palma Metro, also operated by this company, is 85 km.
Overview
In 1977, the line Palma - Inca was the sole remnant of a network that once connected Palma with most of the island. In 2001, the section Inca - Sa Pobla reopened, followed by the section Inca - Sineu in 2002 and Sineu - Manacor in 2003.
The expected extension of the branch line from Sa Pobla onwards to Alcúdia in 2005 has yet to be built.
The line from Manacor to Artà was under construction for a planned 2012 reopening. The project was halted in 2013 (with most of the groundwork completed) and an announcement made that the route instead was to be converted "for the time being") to a via verde for cyclists and walkers.
Electrification
€30m was invested in electrifying the whole line, from Palma to Inca, at 1.5 kV DC, which was completed in 2011. CAF EMUs have been purchased; these displaced diesel vehicles, which were then sold to Overview LDA and to Kenya Railways for use on suburban services in Nairobi.
See also
Ferrocarril de Sóller (FS)
FEVE
Majorca rail network
Rail transport in Spain
Transport in Spain
Tranvía de Sóller
References
External links
Rail transport in the Balearic Islands
Railway companies of Spain
Metre gauge railways in Spain |
https://en.wikipedia.org/wiki/List%20of%20University%20of%20Michigan%20alumni | There are more than 640,000 living alumni of the University of Michigan in 180 countries across the globe. Notable alumni include computer scientist and entrepreneur Larry Page, actor James Earl Jones, and President of the United States Gerald Ford.
Alumni
Nobel laureates
Stanley Cohen (Ph.D. 1949), co-winner of the 1986 Nobel Prize in Physiology or Medicine for discovering growth factors (proteins regulating cell growth) in human and animal tissue
Jerome Karle (Ph.D. 1944), chief scientist, Laboratory for the Structure of Matter, Naval Research Laboratory; Nobel Prize in Chemistry, 1985
Paul Milgrom (BA 1970) is an American economist and won the prize for economics in 2020
Marshall Nirenberg (Ph.D. 1957), Chief of Biomedical Genetics, National Heart, Lung and Blood Institute, NIH; Nobel Prize in Physiology or Medicine, 1968
H. David Politzer (BS 1969), physicist; professor at California Institute of Technology; Nobel Prize in Physics, 2004
Robert Shiller (BA 1967), economist, academic, and best-selling author
Richard Smalley (COE: BS 1965), chemist, Nobel Prize in 1996 for the co-discovery of fullerenes
Samuel C. C. Ting (BS 1959, Ph.D. 1962), physicist, awarded Nobel Prize in 1976 for discovering the J/ψ particle
Thomas H. Weller (A.B. 1936, M.S. 1937), Nobel Prize in Physiology or Medicine, 1954
Activists
Benjamin Aaron (LS&A 1937), scholar of labor law; director of the National War Labor Board during World War II; vice chairman of the National Wage Stabilization Board during the Truman administration
Ricardo Ainslie (Ph.D.), native of Mexico City, Mexico; Guggenheim award winner
Santos Primo Amadeo (BA), a.k.a. "Champion of Hábeas Corpus;" attorney and law professor at the University of Puerto Rico; Senator in the Puerto Rico legislature; counsel to the American Civil Liberties Union branch in Puerto Rico, established in 1937; winner of a Guggenheim award
Huwaida Arraf (LS&A: 1998), Palestinian rights activist; co-founder of the International Solidarity Movement; chair of the Free Gaza Movement
Octavia Williams Bates (BA 1877; LAW 1896), suffragist, clubwoman, author
Jan BenDor (SOSW M.S.W.), women's rights activist, member of Michigan Women's Hall of Fame
Bunyan Bryant, environmental justice advocate
Mary Frances Berry (LAW: JD/Ph.D.), former chairwoman of United States Civil Rights Commission
Cindy Cohn (LAW: JD 1988), attorney for Bernstein v. United States, legal director for the Electronic Frontier Foundation
Richard Cordley (BA 1854), abolitionist minister who served Lawrence, Kansas, during the 19th century
George William Crockett (LAW: JD 1934), African American attorney; state court judge in Detroit, Michigan; US Representative; national vice-president of the National Lawyers Guild; participated in the founding convention of the racially integrated National Lawyers Guild in 1937, and later served as its national vice-president; first African American lawyer in the U.S. Department of Labor (1939–1943)
Clarence Darrow (LAW 1878), |
https://en.wikipedia.org/wiki/Analog | Analog or analogue may refer to:
Computing and electronics
Analog signal, in which information is encoded in a continuous variable
Analog device, an apparatus that operates on analog signals
Analog electronics, circuits which use analog signals
Analog computer, a computer that uses analog signals
Analog recording, information recorded using an analog signal
Functional analog (electronic), a system that fulfills the same function as another
Structural analog (electronic), a system that has the same structure as another
Entertainment
Albums and songs
Analog (album), an album by Eureka Farm
"Analog" (song), a song by Tyler, The Creator, featuring Hodgy Beats, from Goblin
Analogue (album), a 2005 album by A-ha
"Analogue" (All I Want), the title track of the 2005 album by A-ha
Books and magazines
Analog Science Fiction and Fact, a science-fiction magazine
ANALOG Computing, a 1981–1989 magazine about Atari computers
Analogue: A Hate Story, a 2012 visual novel by Christine Love
Other entertainment
Analogue (literature), a literary work that shares motifs, characters or events with another but is not directly derived from it
Analogue (theatre company), British
Analog (TV series), a Canadian television series (1971–1972)
Other
Analogue (company)
Analog Devices, a semiconductor company
Analog (program), a computer program that analyzes log files from web servers
Analogical models, a method of representing a phenomenon of the world by another, more understandable or analyzable system
Functional analog (chemistry), a compound with similar properties
Structural analog, a compound with an altered chemical structure
Substrate analog, a compound that resembles the substrate in an enzymatic reaction
Root analogue dental implant
See also
Analogy (disambiguation)
Analog Man (disambiguation) |
https://en.wikipedia.org/wiki/Carol%20Costello | Carol Costello (born October 11, 1961) is an American television anchor and former host of CNN Newsroom. In 2017, she left CNN to join sister network HLN, based in Los Angeles. In October 2018, HLN announced that Costello would be let go, with the final broadcast of her show taking place on October 26.
Early life and education
Costello is a graduate of Minerva High School, a public high school in Minerva, Ohio, and Kent State University where she earned a B.A. in journalism. After attending Kent State University, Costello worked at Akron, Ohio's WAKR-TV as an award-winning police and court reporter. Following that Costello was an Emmy Award-winning anchor/reporter for WSYX, the ABC affiliate, and WBNS 10-TV, the CBS affiliate in Columbus, Ohio. She also worked as the 6 and 11pm news anchor for WBAL-TV in Baltimore between 1992 and 1995.
Career
CNN
Costello worked as an anchor at CNN Headline News (now called HLN) and was also the anchor of Good Morning Washington and an investigative reporter at WJLA-TV, the ABC affiliate in Washington, D.C., during the September 11 attacks.
She previously worked out of the network's New York City bureau. She was part of CNN's Peabody-winning coverage of Hurricane Katrina and the 2008 presidential election, and also covered the Virginia Tech massacre, the inauguration of Barack Obama and the Casey Anthony trial. Costello has done in-depth reporting on bullying, coal ash, and women's issues. After a CNN viewer nominated her, Costello ran with the Olympic torch through the streets of Atlanta prior to the Atlanta Olympics.
As a reporter and anchor, Costello has interviewed Jimmy Carter, Bill Clinton, Hillary Clinton and George H. W. Bush. Previously, Costello anchored the CNN early morning program CNN Daybreak and also was news reader and correspondent on American Morning. She was the anchor of CNN Daybreak, then a New York-based correspondent, and subsequently a contributor to The Situation Room. Costello hosted the 9 am–11 am slot of CNN Newsroom, based out of CNN's New York news bureau.
Costello elicited criticism when she referred to audio of Bristol Palin describing an assault on her to police as "quite possibly the best minute and a half of audio we've ever come across." Paul Bedard called Costello's "rude and crude enjoyment" an easy slap by a prominent female media star on a young woman. Costello later stated that "in retrospect, I deserve such criticism and would like to apologize."
On January 30, 2017, Costello announced that she would return to HLN to host a new program from Los Angeles. On August 21, 2017, her new show Across America with Carol Costello debuted.
On October 16, 2018, it was announced by HLN that Costello was to be laid off, along with Michaela Pereira and Ashleigh Banfield, as part of the network's decision to scale back their live news programming. The final broadcasts for their programs took place on Friday, October 26, 2018. Although both Ashleigh Banfield and Michaela Pereir |
https://en.wikipedia.org/wiki/Ransomware | Ransomware is a type of cryptovirological malware that threatens to publish the victim's personal data or permanently block access to it unless a ransom is paid. While some simple ransomware may lock the system without damaging any files, more advanced malware uses a technique called cryptoviral extortion. It encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them. In a properly implemented cryptoviral extortion attack, recovering the files without the decryption key is an intractable problem, and difficult to trace digital currencies such as paysafecard or Bitcoin and other cryptocurrencies are used for the ransoms, making tracing and prosecuting the perpetrators difficult.
Ransomware attacks are typically carried out using a Trojan disguised as a legitimate file that the user is tricked into downloading or opening when it arrives as an email attachment. However, one high-profile example, the WannaCry worm, traveled automatically between computers without user interaction.
Starting as early as 1989 with the first documented ransomware known as the AIDS trojan, the use of ransomware scams has grown internationally. There were 181.5 million ransomware attacks in the first six months of 2018. This record marks a 229% increase over this same time frame in 2017. In June 2014, vendor McAfee released data showing that it had collected more than double the number of ransomware samples that quarter than it had in the same quarter of the previous year. CryptoLocker was particularly successful, procuring an estimated US$3 million before it was taken down by authorities, and CryptoWall was estimated by the US Federal Bureau of Investigation (FBI) to have accrued over US$18 million by June 2015. In 2020, the IC3 received 2,474 complaints identified as ransomware with adjusted losses of over $29.1 million. The losses could be more than that, according to the FBI. Globally, according to Statistica, there were about 623 million ransomware attacks in 2021, and 493 million in 2022.
Operation
The concept of file-encrypting ransomware was invented and implemented by Young and Yung at Columbia University and was presented at the 1996 IEEE Security & Privacy conference. It is called cryptoviral extortion and it was inspired by the fictional facehugger in the movie Alien. Cryptoviral extortion is the following three-round protocol carried out between the attacker and the victim.
[attacker→victim] The attacker generates a key pair and places the corresponding public key in the malware. The malware is released.
[victim→attacker] To carry out the cryptoviral extortion attack, the malware generates a random symmetric key and encrypts the victim's data with it. It uses the public key in the malware to encrypt the symmetric key. This is known as hybrid encryption and it results in a small asymmetric ciphertext as well as the symmetric ciphertext of the victim's data. It zeroizes the symmetric key and the original plaintext |
https://en.wikipedia.org/wiki/WPPX-TV | WPPX-TV (channel 61) is a television station licensed to Wilmington, Delaware, United States, broadcasting the Ion Television network to the Philadelphia area. It is owned and operated by the Ion Media subsidiary of the E. W. Scripps Company and maintains offices on Main Street in Manayunk, with a transmitter in Roxborough, both sections of Philadelphia.
Channel 61 in Wilmington signed on the air in 1986 as WTGI-TV, the first commercial television station in Delaware since 1958. It intended to operate as a general-market independent station but found itself with too little cash, as a result of nonexistent carriage on local cable systems, and was forced to switch to home shopping programming to generate revenue. From 1988 to 1995, the station operated as a multilingual ethnic broadcaster with Spanish-language programs from Telemundo as well as shows in Italian, Korean, and other languages. This ended when Paxson Communications Corporation, forerunner to Ion Media, acquired WTGI-TV and incorporated it into its Infomall TV network, broadcasting infomercials and paid programs; these stations formed the core of the Pax network, predecessor to Ion, in 1998.
History
Construction and launch
Though channel 61 had been allocated to Wilmington since 1966, the channel attracted little interest for primarily economic reasons. As Wilmington is part of the Philadelphia television market, any station on the channel would have to compete with Philadelphia stations for viewers and program rights. Rollins, Inc., withdrew its application in 1971 and opted to enter the cable television business instead. However, as the 1970s ended, interest began to surge in the channel, and at least one group was conducting ascertainment studies in the community in February 1979. By September 1980, there were three applications on file for channel 61. Sixty-One Corporation proposed a subscription television outlet, HHL Broadcasting a commercial independent, and Delaware Valley Broadcasters initially pitched a station with Christian and family-oriented programming. The field had ballooned to seven by January 1982, when the Federal Communications Commission (FCC) designated the various applications for comparative hearing.
Delaware Valley Broadcasters was awarded the construction permit in 1983 and initially selected the call sign WDVI. The group remained low-profile until July 1985, when it announced an October start date and some details of its proposed programming as a commercial independent. However, channel 61 would be beset by a year of delays and other changes. By September, the proposed call sign had changed to WBOT-TV (the "Best of Television") to avoid confusion with WPVI-TV in Philadelphia, and construction was under way on the downtown Wilmington studios and the transmitter site in South Harrison Township, New Jersey. A keystone of the station's new programming was to be a series of 75 Philadelphia Big 5 basketball games. However, the second selection of a call sign dr |
https://en.wikipedia.org/wiki/WFPA-CD | WFPA-CD (channel 28) is a low-power, Class A television station in Philadelphia, Pennsylvania, United States, broadcasting the Spanish-language UniMás network. It is owned and operated by TelevisaUnivision alongside Vineland, New Jersey–licensed Univision owned-and-operated station WUVP-DT (channel 65) and Wildwood, New Jersey–licensed True Crime Network affiliate WMGM-TV (channel 40). The three stations share studios on North Delsea Drive in Vineland; WFPA-CD's transmitter is located in the Roxborough section of Philadelphia.
History
The station originally operated as a repeater of New York City's Univision owned-and-operated station, WXTV. It was first licensed as a translator, W35AB, operating on UHF channel 35. After WYBE was granted a license to operate a full-power station on channel 35, the translator moved to channel 28 and was ultimately relicensed as a low-power station, WXTV-LP (although the station was instead branded as Univision 42). In 2002, Univision Communications acquired WUVP (channel 65), and moved its programming there. Channel 28 began to air programming from the then-new TeleFutura network (which relaunched as UniMás in January 2013), and its call letters were changed to WFPA-CA.
In June 2006, the station was added to Philadelphia area Comcast systems on digital cable channel 251. WFPA is also available to DirecTV customers as part of the Philadelphia local channel package, as well as on FiOS in widescreen SD via WUVP-DT 65.2.
In some areas of the market, especially those north of Philadelphia, WFPA's signal causes some reception issues with the digital signal of New York City's WNBC, which also broadcasts its digital signal on channel 35 (remapped to virtual channel 4).
On June 3, 2015, the station was licensed for digital operation and changed its call sign to WFPA-CD.
Technical information
Subchannels
The station's digital signal is multiplexed:
References
External links
UniMás TV website
WUVP Univision 65 Philadelphia website
FPA-CD
UniMás network affiliates
Get (TV network) affiliates
Quest (American TV network) affiliates
Twist (TV network) affiliates
Television channels and stations established in 1995
1995 establishments in Pennsylvania
FPA-CD
FPA-CD |
https://en.wikipedia.org/wiki/WTVE | WTVE (channel 51) is a television station licensed to Willow Grove, Pennsylvania, United States, serving the Philadelphia area and primarily airing paid programming from OnTV4U. It is owned by WRNN-TV Associates alongside Princeton, New Jersey–licensed ShopHQ affiliate WMCN-TV (channel 44) and Trenton, New Jersey–licensed Class A station WPHY-CD (channel 25). WTVE and WPHY-CD share studios on East State Street in Trenton; through a channel sharing agreement, the two stations transmit using WPHY-CD's spectrum from an antenna in the Roxborough section of Philadelphia.
History
The station first signed on the air on May 4, 1980, as an independent station, originally licensed to Reading, Pennsylvania. When it launched, WTVE initially maintained a general entertainment format with a mix of off-network sitcoms from the 1960s and early 1970s, movies, drama series and talk shows, as well as a local newscast. However, the station did not carry many cartoons. While the station received sizeable viewership, it was not profitable.
Beginning in September 1981, WTVE began running the subscription television service SelecTV, which aired feature films just finished with their theatrical runs, each evening from 8 to 10 p.m. By January 1982, SelecTV programming expanded to 8 p.m. to midnight. That spring, the station began running SelecTV from 7 p.m. to 5 a.m. on weekdays and from 3 p.m. to 5 a.m. on weekends. In the fall of 1982, WTVE added Financial News Network programming each weekday from noon to 5 p.m., and began carrying religious programs on Saturday and Sunday mornings. WTVE switched to SelecTV programming after 6 p.m. weekdays and after noon on weekends.
By the fall of 1983, WTVE was running SelecTV full-time, with the exception of weekday broadcasts of The 700 Club and the Independent Network News, along with other religious and public affairs shows on Saturday and Sunday mornings. SelecTV was dropped in the late 1980s, and was replaced with home shopping programming from Shop at Home and infomercials. In 1998, WTVE affiliated with the Spanish-language Telemundo network, before switching back to an English-language format after a year.
WTVE's primary analog transmitter (prior to the digital transition) was located in Reading; the analog signal barely reached the Philadelphia suburbs and Lebanon, in the eastern part of the Harrisburg market. As a result, WTVE depended heavily on "must-carry" rules to reach viewers in the Philadelphia market on cable. WTVE at one point had a repeater in Philadelphia on channel 7; that station now operates independently as WWJT-LP.
WTVE had been in Chapter 11 bankruptcy, managed by trustee George Miller until its $13.5-million takeover by WRNN-TV Associates received FCC approval on May 15, 2008. WRNN-TV Associates subsequently sold the station to NRJ TV (a company unrelated to European broadcaster NRJ Radio) in 2011. On June 1, 2016, the station joined the SonLife Broadcasting Network.
On December 9, 2019, it was anno |
https://en.wikipedia.org/wiki/KPIX-TV | KPIX-TV (channel 5) is a television station licensed to San Francisco, California, United States, serving as the San Francisco Bay Area's CBS network outlet. It is owned and operated by the network's CBS News and Stations division alongside independent station KPYX (channel 44), also licensed to San Francisco. Both stations share studios at Broadway and Battery Street, just north of San Francisco's Financial District, while KPIX's transmitter is located atop Sutro Tower. In addition to KPYX, KPIX shares its building with formerly co-owned radio stations KCBS, KFRC-FM, KITS, KLLC, KRBQ and KZDG, although they use a different address number for Battery Street (865 as opposed to 855).
History
KPIX signed on the air on December 22, 1948, the first television station in Northern California as well as the 49th in the United States. It was originally owned by Associated Broadcasters, owners of KSFO (560 AM). Initially, channel 5's signal was transmitted from the top of the Mark Hopkins Hotel on Nob Hill. It later moved to a shared transmitter tower with KGO-TV (channel 7) at the Sutro Mansion (which was located midway between Mount Sutro and Twin Peaks), and then to the Sutro Tower in 1973. KPIX's first master control room was in the attic of the Mark Hopkins Hotel (just above the "Top of the Mark" bar).
The station immediately joined CBS due to a deal KSFO's owners had worked out with the television network one year earlier. KSFO was CBS radio's Bay Area affiliate from 1937 to 1941, when Associated Broadcasters backed out of a deal for CBS to buy the station. When KSFO was still affiliated with CBS, it was originally slated to move to 740 AM, the frequency of San Jose's KQW. 740 AM was the last 50,000-watt frequency available in the Bay Area, and KSFO was to raise its power to 50,000 watts after moving to 740. However, after KSFO parted ways with CBS radio, the network moved its Bay Area affiliation to KQW and was not about to give up the advantage of owning the Bay Area's last available 50,000-watt station. After lengthy Federal Communications Commission (FCC) hearings, KSFO won the 740 frequency, but later decided to stay at 560 and concentrate its efforts on building a television station. It traded the 740 frequency to CBS in return for getting the CBS television network affiliation for the Bay Area. KQW remained at 740 and its call sign was changed to KCBS.
The station also carried programming from DuMont until that network folded in 1956. It even carried a few NBC programs until KRON-TV (channel 4) signed on in November 1949, and programs from the short-lived Paramount Television Network, such as Frosty Frolics, Time For Beany, Cowboy G-Men and Bandstand Revue.
When KPIX's first competitor, KGO-TV, signed on in May 1949, KPIX produced programs to welcome it into the Bay Area. KPIX cameras were used on the first episode of the CBS News program See It Now on November 18, 1951, which opened with the first live simultaneous coast-to-coast TV tran |
https://en.wikipedia.org/wiki/Kannel | Kannel may refer to:
Kannel (telecommunications), an open source Wireless Application Protocol (WAP) and Short Message Service (SMS) gateway for UNIX operating systems.
Kannel (instrument), an Estonian zither similar to the Finnish kantele
People
Astrid Kannel (born 1967), Estonian television journalist
Theophilus Van Kannel (1841–1919), American who invented the revolving door
Estonian-language surnames |
https://en.wikipedia.org/wiki/Adrian%20Fisher%20%28maze%20designer%29 | Adrian Fisher is a British pioneer, inventor, designer and creator of mazes, puzzles, public art, tessellations, tilings, patterns and networks of many kinds. He is responsible for more than 700 mazes in 42 countries since 1979.
Before embarking on his career, Fisher was educated at Oundle School and Portsmouth Polytechnic.
Fisher has created 63 mirror mazes, and pioneered the extensive use of thematic chambers within mirror mazes, to achieve Mirror Maze Adventures. He has created 44 hedge mazes, and pioneered the use of Folly Towers, Tunnels, Walk-through Parting Waterfalls and Foaming Fountain Gates in mazes. He designed the world's first cornfield maize maze in 1993 and over 400 since, and has set 7 Guinness World Records. He has created water mazes, most notably the award-winning Beatles Maze (with Randoll Coate and Graham Burgess), and the Jersey Water Maze. He pioneered the genre of Path-in-Grass Mazes, and has created over a dozen around the world.
Fisher has invented several brick paving and mosaic tiling systems. For the Orang Utan Pavement Maze at Edinburgh Zoo, he invented a new paver tessellation using 7-sided and 5-sided (regular pentagon) bricks. The 'Fisher Paver', his second paving system uses 7-sided and 4-sided bricks and has been installed within paving projects on both sides of the Atlantic. Its benefits include being able to achieve dynamic and intriguing designs straight off the pallet with no cutting, thus offering excellent labour productivity when laying; it only requires one new 7-sided paver shape, yet its modular scale matches all industry-standard paving systems. Fisher's third paving system is the Mitre System, which he invented and patented together with the American mathematician Ed Pegg. Used for both mosaics and paving, their distinctive angular shapes create unique and pleasing images. Notable examples of its use in England include four Historic Mosaics with the Millennium Maze in Marlow, Buckinghamshire, and the 24 ft high SciTec Mosaic at Oundle School, Northamptonshire; and in America, the Tree of Life Mosaic in a private garden in Roxbury, Connecticut.
His Colour Mazes have been published in Scientific American, and walk-on examples can be found in the New York Hall of Science, Eureka Children's Museum in Halifax England, The Exploratory in Bristol, Cape Coral Children's Science Center in Florida, and over 30 other locations worldwide.
He designed the Star Map concept for London Buses, upon which was based the Spider Map system currently in use by London Buses.
In the 1980s, he co-designed the Blenheim Palace maze, that appears in the 2016 Bank of England £5 note.
Fisher designs puzzles for British newspapers and the World Puzzle Championships. The Guardian newspaper named him as one of Britain's top 50 designers. He has written over a dozen books on mazes and puzzles, in particular The Art of the Maze (Orion Books, 1990), Secrets of the Maze (Thames & Hudson) and The Amazing Book of Maze |
https://en.wikipedia.org/wiki/TextEdit%20%28API%29 | TextEdit was the name of a collection of application programming interfaces (APIs) in the classic Mac OS for performing text editing.
These APIs were originally designed to provide a common text handling system to support text entry fields in dialog boxes and other simple text editing within the Macintosh GUI. Over time, they were extended to provide more advanced text editing features, but its limited original scope led to fundamental limitations. Apple repeatedly stated that TextEdit was not a word processor, and therefore providing rich text editing was always left to third-party developers.
Basic limitations of TextEdit include:
only provides support for 8-bit character sets
16-bit internal indexing limits text to a maximum length of about 32,000 characters
use of QuickDraw for glyph rendering limited the maximum height of a text block to 32,767 pixels - this could be encountered well before the character limit was hit with larger font sizes.
The first incarnation of TextEdit provided support for only a single style of text, which was applied to all text in the block. This was more than adequate for its intended use, supporting text entry fields. Later, support was added for styled text so that TextEdit could be used for more complex text editing tasks, such as text editing areas in web browsers, etc.
TextEdit remains part of the Carbon API on macOS, but has been superseded by numerous other solutions including ATSUI in Carbon, the third party WASTE text engine, as well as NSText and related classes within Cocoa.
Macintosh operating systems APIs
TextEdit |
https://en.wikipedia.org/wiki/Extended%20Data%20Services | Extended Data Services (now XDS, previously EDS), is an American standard classified under Electronic Industries Alliance standard CEA-608-E for the delivery of any ancillary data (metadata) to be sent with an analog television program, or any other NTSC video signal.
XDS is used by TV stations, TV networks, and TV program syndication distributors in the US for several purposes.
Here are some of the most common uses of XDS:
The "autoclock" system delivers time data via an XDS "Time-of-Day Packet" for automatically setting the clock of newer TVs & VCRs sold in the US. Most PBS stations provide this service.
Rudimentary program information which can be displayed on-screen, such as the name and remaining time of the program,
Station identification,
V-chip content ratings data.
XDS is also used by the American TV network ABC for their Network Alert System (NAS). NAS is a one-way communication system used by ABC to inform and alert their local affiliate stations across the US of information regarding ABC's network programming (such as program timings & changes, news special report information, etc.), using a special decoder manufactured for ABC by EEG Enterprises , a manufacturer of related equipment for the TV broadcast industry such as closed captioning and general-purpose XDS encoders. The CBS Television Network uses a similar method to transmit three separate internal messaging services to stations: one for programming departments, one for master control operations, and one for newsrooms.
Many standard definition receivers produced by Dish Network encode XDS data into their output signal. Data encoded includes time of day, program name, program description, program time remaining, channel identification, and content rating. This data is obtained from the satellite service's EPG and replaces any data which may have been present when the signal was uplinked.
XDS uses the same line in the vertical blanking interval as closed captioning (NTSC line 21), and shares the available second video field bandwidth with the closed captioning channels CC3 and CC4, and with the text channels TXT3 and TXT4.
XDS information is used by TV commercial detection software to skip advertisements.
External links
Does anybody really know what time it is? - Faults & Failures October 2000 IEEE Spectrum - about some failures in the autoclock system in 2000
Television technology
Standards of the United States |
https://en.wikipedia.org/wiki/Hughes%20Television%20Network | HTN Communications, better known as Hughes Television Network (HTN) and formerly Sports Network, was an American television network created by Richard Eugene Bailey. The company is now in the business of providing video and audio services to sports networks.
It never lived up to its dream of being the nation's fourth television network, following the demise of the DuMont Television Network. HTN limited itself to broadcasting sports events, including the Stanley Cup Finals, PBA Bowling and special programming, including the Muppets special The Frog Prince, and provided facilities links to a loose network of stations, who were usually independents or affiliates of ABC, CBS, or NBC.
In 2013, HTN Communications merged with The Switch.
History
Sports Network Incorporated
Originally working as chief network coordinator at ABC in 1954, Richard Eugene Bailey conceived of a cost-effective means of broadcasting away Major League Baseball games to their home cities. The idea came from the BBDO advertising agency, who appealed to Bailey on behalf of advertisers, Schaefer Beer and Lucky Strike cigarettes, to save money on their broadcast of Brooklyn Dodgers games; Bailey came up with the concept of "streamlining transmission operations." This innovation for covering away games became the basis for the Sports Network.
Bailey capitalized his company with $1,000. In December 1956, Bailey met with sponsors, ad agencies and the baseball teams' representatives at Chicago's Hotel Knickerbocker to get SNI off the ground. In 1956, the first operational year, the network had 300 television and 1,200 radio broadcasts of major league baseball games.
In the fall 1956, SNI started showing Cleveland Browns football games. In later years, they acquired rights to Big Ten and Atlantic Coast Conference basketball. SNI's coverage of the 1963 NCAA final, where Loyola University Chicago upset the University of Cincinnati, was a ratings smash, with a larger audience than CBS' hit westerns Have Gun – Will Travel and Gunsmoke.
By the early sixties, the Browns (still on SNI) were the only NFL team not signed to a major TV network. At the insistence of new commissioner Pete Rozelle, the Browns dropped SNI when the entire league signed a collective television contract with CBS in 1962.
Hughes Television Network
After Howard Hughes failed to purchase a controlling interest in ABC in 1968, Hughes' Hughes Tool Company purchased the Sports Network and renamed it the Hughes Television Network, with Dick Bailey continuing as president.
On a staggered schedule in May 1971, The Frog Prince was shown on HTN with 150 stations including WCBS-TV and sponsored by RJR Foods.
Paramount Pictures purchased the Network including its satellite time in planning for the Paramount Programming Service in 1976. After the planned network's launch was scuttled in 1978, Paramount sold HTN to Madison Square Garden in 1979. In 1986, Joseph M. Cohen, a Madison Square Garden executive, led an investment gro |
https://en.wikipedia.org/wiki/SP-1%20switch | SP-1 (Stored Program 1) was the name of a computerized telephone exchange (a so-called switching office) manufactured by Northern Electric (later Northern Telecom and now Nortel Networks beginning in 1972) in Canada. It was introduced in 1971 (as stated in a Northern Telecom print ad that is included (page 55) in a history of Nortel, written by Peter C. Newman who was commissioned by Nortel to write it. Copyright is 1995. No ISBN.)
As indicated by the name "Stored Program", the SP-1 introduced computer control to the telephone switching market. (AT&T's #1ESS preceded the SP-1 by several years.)
A central computer controlled the operation of the switch. Switch behavior was determined by the operation of a computer program.
With its use of computer hardware and software control, the SP-1 marked an evolutionary step in telephony design. It was an intermediate form between the previous generation of electromechanical systems and the next generation of fully digital systems. Like the previous generation of systems, the SP-1 was an analog switch that used a special form of mechanical relay (Minibar crossbar switch) to provide the voice connections. The voice signal remained in the analog domain throughout the exchange, with the crossbar switches providing a metallic path to connect the end points of a call together. However the SP1 replaced the previous generation's complex relay-based controllers (markers) with a modern Harvard architecture electronic computer, with separate data and program memories. SSI DTL logic was used throughout. Two types of memory was used - ferrite sheet memory for the CPU and Piggyback Twistor memory for the storage of program and routing information. A number of variations on the base switch were available. A "two wire" version for local service, a four wire version for toll service. Two/four wire versions were also available as was a TOPS variant that was used to provide Operator services. The first four wire switch (four wire-tops, i.e., it provided toll switching and operator services) was placed in service in Thunder Bay circa 1972. The operator service consoles (CRTs) used an Intel 4004 processor.
The next generation of systems evolved from the SP1 design to replace the analog switch with a digital technology.
SP-1 proved the feasibility of software-controlled systems for telephony. It set the stage for the introduction of fully digital systems with the development of the DMS (Digital Multiplex Systems) by Nortel in the 1970s. (Nortel's SL-1 (PBX) was Nortel's first fully digital switching system, and it was introduced in service in 1975.)
See also
DMS-100
Electronic Switching System
1ESS switch
TXE
Stored Program Control exchange
SP-1 Technical Bulletin
Telephone exchange equipment
Nortel products |
https://en.wikipedia.org/wiki/YES%20Network | The Yankee Entertainment and Sports Network (YES) is an American pay television regional sports network owned by Yankee Global Enterprises (the largest shareholder with 26%), Sinclair Broadcast Group and Entertainment Studios (which owns 20%), Amazon (which owns 15%), and The Blackstone Group, RedBird Capital and Mubadala Investment Company, which each own 13%. Primarily serving New York City, New York and the surrounding metropolitan area, it broadcasts a variety of sports events, as well as magazine, documentary and discussion programs; however, its main emphasis is focused on games and team-related programs involving the New York Yankees of Major League Baseball (owned by minority partner Yankee Global), the NBA's Brooklyn Nets, the WNBA's New York Liberty and New York City FC of Major League Soccer.
YES Network's offices are based at the Metlife Building in Midtown Manhattan. YES programs, including Yankees and Nets pre- and post-game shows, are produced in studios that are located in Stamford, Connecticut. The channel is available on cable and IPTV providers in New York, New Jersey, Connecticut and parts of Pennsylvania; it is available nationally on some cable systems (as part of a designated sports tier), via satellite on DirecTV, and regionally on Frontier, AT&T U-verse, Verizon Fios, and Cox Communications.
History
Beginnings
YES is the product of a holding company founded in 1999 called YankeeNets, created out of a merger of the business operations of the Yankees and the New Jersey Nets. One of the reasons behind the operational merger was to allow both teams to gain better leverage over their own broadcast rights; each party believed that it would obtain better individual deals, if they negotiated the rights collectively.
Two years earlier in 1997, Cablevision – which at the time had owned the Nets' television broadcaster, SportsChannel New York (later known as Fox Sports Net New York, and now known as MSG Sportsnet) – became the sole owner to the television rights of all seven Major League Baseball, NBA and NHL teams in the New York City market when it acquired the competing MSG Network (previously owned by Viacom through its 1994 purchase of the network's former parent Paramount Communications), which had held the broadcast rights to the Yankees since 1989. This led to monopoly-like tactics, including the shift of some games to the cable-exclusive MSG Metro Channels, which had very limited distribution as Cablevision, Comcast and Time Warner Cable routinely fought over carriage agreements. Cablevision attempted to buy the Yankees outright, but could not agree to acceptable terms with George Steinbrenner and his partners.
To exit its MSG/Cablevision deal, the Yankees would have to give them the right to match any new right agreement and show a judge that a third party was willing to purchase their rights and launch a channel. Thus, new YankeeNets CEO Harvey Schiller hired IMG to provide a valuation for the prospective YankeeNets |
https://en.wikipedia.org/wiki/INI%20file | An INI file is a configuration file for computer software that consists of a text-based content with a structure and syntax comprising key–value pairs for properties, and sections that organize the properties. The name of these configuration files comes from the filename extension INI, for initialization, used in the MS-DOS operating system which popularized this method of software configuration. The format has become an informal standard in many contexts of configuration, but many applications on other operating systems use different file name extensions, such as conf and cfg.
History
The primary mechanism of software configuration in Windows was originally a text file format that comprised text lines with one key–value pair per line, organized into sections. This format was used for operating system components, such as device drivers, fonts, and startup launchers. INI files were also generally used by applications to store individual settings.
The format was maintained in 16-bit Microsoft Windows platforms up through Windows 3.1x. Starting with Windows 95 Microsoft favored the use of the Windows Registry and began to steer developers away from using INI files for configuration. All subsequent versions of Windows have used the Windows Registry for system configuration, but applications built on the .NET Framework use special XML .config files. The initialization-file functions are still available in Windows and developers may still use them.
Besides Windows software, platform-agnostic software may use this file format for configuration. Some Unix-like config files also use a similar format. INI is human-readable and simple to parse, so it is a usable format for configuration files that do not require much greater complexity.
Examples of use
Desktop.ini files determine the display of directories in Windows, e.g., the icons for a directory.
Git configuration files are similar to INI files.
The freedesktop.org format, which provides a link to an application, uses a similar format. Other examples with Unix-like system software include systemd service files and .
PHP uses the INI format for its "php.ini" configuration file in both Windows and Linux systems.
Example
The following example file has two sections: one for the owner of the software, and one for a payroll database connection. Comments record the last person who modified the file and the reason for modification.
; last modified 1 April 2001 by John Doe
[owner]
name = John Doe
organization = Acme Widgets Inc.
[database]
; use IP address in case network name resolution is not working
server = 192.0.2.62
port = 143
file = "payroll.dat"
Format
INI is an informal format, with features that vary from parser to parser (INI dialects). Some features are more shared across different parsers than others and can be considered as the hard core of the format (e.g. square brackets for sections, newlines for delimiting different nodes, etc.). Attempts to create parsers able to support |
https://en.wikipedia.org/wiki/Literal%20%28computer%20programming%29 | In computer science, a literal is a textual representation (notation) of a value as it is written in source code. Almost all programming languages have notations for atomic values such as integers, floating-point numbers, and strings, and usually for booleans and characters; some also have notations for elements of enumerated types and compound values such as arrays, records, and objects. An anonymous function is a literal for the function type.
In contrast to literals, variables or constants are symbols that can take on one of a class of fixed values, the constant being constrained not to change. Literals are often used to initialize variables; for example, in the following, 1 is an integer literal and the three letter string in "cat" is a string literal:
int a = 1;
string s = "cat";
In lexical analysis, literals of a given type are generally a token type, with a grammar rule, like "a string of digits" for an integer literal. Some literals are specific keywords, like true for the boolean literal "true".
In some object-oriented languages (like ECMAScript), objects can also be represented by literals. Methods of this object can be specified in the object literal using function literals. The brace notation below, which is also used for array literals, is typical for object literals:
{"cat", "dog"}
{name: "cat", length: 57}
Literals of objects
In ECMAScript (as well as its implementations JavaScript or ActionScript), an object with methods can be written using the object literal like this:
var newobj = {
var1: true,
var2: "very interesting",
method1: function () {
alert(this.var1)
},
method2: function () {
alert(this.var2)
}
};
newobj.method1();
newobj.method2();
These object literals are similar to anonymous classes in other languages like Java.
The JSON data interchange format is based on a subset of the JavaScript object literal syntax, with some additional restrictions (among them requiring all keys to be quoted, and disallowing functions and everything else except data literals). Because of this, almost every valid JSON document (except for some subtleties with escaping) is also valid JavaScript code, a fact exploited in the JSONP technique.
See also
Character literal
Function literal
Here document – a file literal or stream literal
Hexadecimal floating-point literal
Integer literal
String literal
References
Programming constructs |
https://en.wikipedia.org/wiki/NASAMS | NASAMS (Norwegian Advanced Surface-to-Air Missile System, also known as the National Advanced Surface-to-Air Missile System) is a distributed and networked short- to medium-range ground-based air defense system developed by Kongsberg Defence & Aerospace (KDA) and Raytheon. The system defends against unmanned aerial vehicles (UAVs), helicopters, cruise missiles, unmanned combat aerial vehicles (UCAVs), and fixed wing aircraft, firing any of a wide range of existing missiles.
NASAMS was the first application of a surface-launched AIM-120 AMRAAM (Advanced Medium Range Air-to-Air Missile). NASAMS 2 is an upgraded version of the system capable of using Link 16, which has been operational since 2007. , NASAMS 3 is the latest upgrade. Deployed in 2019, it adds capability to fire AIM-9X Sidewinder, IRIS-T SLS and AMRAAM-ER missiles, and introduces mobile air-liftable launchers. NASAMS has proven interoperability with longer range systems such as Patriot.
Development
Development of NASAMS began in the 1980s when Kongsberg Defence & Aerospace (KDA) teamed up with Hughes Missile Systems and Hughes Aircraft Ground Systems Group and initiated the program as a cooperative effort for the Royal Norwegian Air Force (RNoAF). As originally envisioned, NASAMS would replace two Nike Hercules facilities in defending Norway's southern air bases, where it would act in conjunction with F-16s in providing a layered defense.
The integrated air defense battle management command and control system, based on KS500F computers and the KMC9000 control console with two color CRT displays, was first developed for the Norwegian Adapted Hawk (NOAH) program, an upgrade to the MIM-23B Improved Hawk semi-active radar head, surface-to-air missile system. This command and control system integrated existing AN/MPQ-46 High Power Illuminator Doppler Radar (HPIR) with AN/TPQ-36 counter-battery radar, modified into a three-dimensional low-altitude airspace surveillance radar with the TPQ-36A software upgrade.
The upgraded NOAH would still engage only one target per launcher pad, which was insufficient to counter the emerging threat of massive firing of cruise missiles. RNoAF ordered further development of a distributed, network-centric air defense system with multiple launchers and radars.
The MIM-23B missile was replaced with the active radar homing AIM-120 AMRAAM missile, which also uses an inertial navigation system during initial approach. The TPQ-36A radar was upgraded to the rotating AN/MPQ-64 Sentinel configuration. Test launches were performed in June 1993. The system had an initial operational capability in late 1994 – early 1995. It was fully operationally fielded in 1998.
An enhanced NASAMS 2 was developed in the 2000s and became operational in 2006. A third generation, NASAMS 3, was developed in the 2010s and fielded in 2019.
First generation NASAMS
The system integrates U.S.-built TPQ-36A air defense X band 3D radar and AMRAAM missiles with a Norwegian developed battle |
https://en.wikipedia.org/wiki/ProSiebenSat.1%20Welt | ProSiebenSat1 Welt (styled as P7S1 Welt as of January 2020) is a German-language television channel developed for North American audiences.
The channel offers old and current programming selections from the commercial German television channels Sat.1, ProSieben, kabel eins, ProSieben Maxx, Sat.1 Gold and sixx, which are owned by ProSiebenSat.1 Media. The channel went on the air in February 2005 and is available via the satellite provider Dish Network and select cable companies, often offered as part of a German Language Package together with the public German state-owned Deutsche Welle network. ProSiebenSat1 Welt is also available in Canada through a partnership with Ethnic Channels Group.
Shows
Current Shows
Abenteuer Alltag – Jetzt bauen wir!
Abenteuer Alltag – so leben wir Deutschen
Abenteuer Leben – täglich Wissen
Achtung Kontrolle! – Einsatz für die Ordnungshüter
Achtung Notaufnahme
Akte 20.17
All About You — Das Fashion Duell
Alpenstar TV
Anna und die Liebe
Anwälte im Einsatz
Auf die Plätze! Fertig! Weg!
Auf Streife
BeefBattle - Duell am Grill
Britt – Der Talk um eins
Das große Backen
Der Bulle von Tölz
Der Glücksvollzieher
Deine Chance! 3 Bewerber – 1 Job
Deutschlands größte Kriminalfälle
Die 2 - Anwälte mit Herz
Die Anstalt – Zurück ins Leben
Die Dreisten Drei – jetzt noch dreister
Die Ruhrpottwache
Die Straßen von Berlin
Die Wunderbare Welt der Tierbaby
Do it Yourself – S.O.S.
EDGE Action Sports World
Einsatz in Köln - Die Kommissare
Extreme
Flames - Geschmack ist alles
Follow us! Das ProSieben-Reportermagazin
Frank: der Weddingplaner
Freunde - Das Leben beginnt
Galileo
Hilfe - Ich bin pleite! Letzte Rettung Pfandleiher
In Gefahr - Ein verhängnisvoller Moment
Inside mit Stefan Gödde
Inspektor Rolle
Jetzt wird's schräg
Kampf der Köche
Karawane der Köche
K1 Magazin
K1 Reportage
K11 – Kommissare im Einsatz
Kiss Bang Love
Lenßen & Partner
Maddin in Love
Mannsbilder
Mein Lokal, Dein Lokal
Mein Mann, sein Hobby und Ich
Mein neues Leben (und: Mein neues Leben – XXL
Mein großer dicker peinlicher Verlobter
Messer, Gabel, herz - Das Blind-Date Dinner
Mission Wahnsinn - Für Geld zum Held
Niedrig und Kuhnt – Kommissare ermitteln
Pain & Fame - Wer wird Deutschlands bester Tätowierer?
Paula kommt - Sex und Gute Nacktgeschichten
Patchwork Family
Reality Affairs
Restaurant Startup
Rosins Restaurant
Richter Alexander Hold
Risky Quiz
Sat.1 Reportage
Schicksale - und plötzlich ist alles anders
SK Kölsch
Sweet & Easy - Enie backt — Das Foodmagazin
taff
Uncovered
Verdächtig
Verrückt nach Clara
Weibsbilder
We Are Family! So lebt Deutschland
Yvonne Willicks räumt auf
Zieh mich an!
Zwischen Meer und Maloche
Former Shows
24 Stunden – My Story
Abenteuer Auto
Abenteuer Natur
Akte – Reporter decken auf
Alles außer Sex
alphateam – Die Lebensretter im OP
Avenzio – Schöner leben!
Der Bergdoktor
Besser Essen – Leben leicht gemacht
Bim Bam Bino
BIZZ
Bundesliga
Clever! – Die |
https://en.wikipedia.org/wiki/Attack%20of%20the%20Mutant%20Camels | Attack of the Mutant Camels is a surrealist computer game written by Jeff Minter and released for the Commodore 64 and Atari 8-bit family in 1983 by Minter's Llamasoft. The horizontally scrolling shooter is similar to the Atari 2600 game The Empire Strikes Back (1982), with AT-AT walkers replaced by giant camels. Confusingly, a very different game from Jeff Minter's Gridrunner series was also released in the US under the name Attack of the Mutant Camels.
Llamasoft released a sequel, Revenge of the Mutant Camels, in 1984.
Gameplay
The player controls a small jet plane and has the task of killing giant yellow camels before they reach the home base. Doing so requires several dozens of shots. The camels retaliate by shooting fireballs from their mouths. If a camel reaches the base, the game is lost. Once all camels on a level are killed, the player has to survive a "hyperspace" sequence which requires avoiding high-speed missiles. Upon successful completion, the next level presents a new wave of camels, with slightly harder gameplay.
Legacy
In 2011, Attack of the Mutant Camels was chosen to be featured in the Smithsonian Institution's "The Art of Video Games" exhibit.
In 2012 the assembly language source code of the Konix version of the game was released on GitHub.
References
External links
Attack of the Mutant Camels at Atari Mania
Llamasoft's 8-bit games, from which AMC is downloadable
https://web.archive.org/web/20120319051045/http://c64s.com/game/94/attack_of_the_mutant_camels/
1983 video games
Commodore 64 games
Atari 8-bit family games
Horizontally scrolling shooters
Llamasoft games
Commercial video games with freely available source code
Video game clones
Video games developed in the United Kingdom
Video games about animals
Fictional camelids |
https://en.wikipedia.org/wiki/Kaffeine | Kaffeine is a media player for Unix-like operating systems by KDE. By default it uses libVLC media framework but also supports GStreamer. It also supports the use of MPlayer project's binary codecs for proprietary formats. Kaffeine developers have also produced a Mozilla plugin to start the player for streaming content over the web.
Features include streaming, DVB, DVD, Video CD and CD audio.
See also
References
External links
Extragear
Free media players
Free software programmed in C++
KDE Applications
Linux media players
Software DVD players
Software that uses GStreamer
Video software that uses Qt |
https://en.wikipedia.org/wiki/CHKDSK | In computing, CHKDSK (short for "check disk") is a system tool and command in DOS, Digital Research FlexOS, IBM/Toshiba 4690 OS, IBM OS/2, Microsoft Windows and related operating systems. It verifies the file system integrity of a volume and attempts to fix logical file system errors. It is similar to the fsck command in Unix and similar to Microsoft ScanDisk, which co-existed with CHKDSK in Windows 9x and MS-DOS 6.x.
Implementations
An early implementation of a 'CheckDisk' was the CHECKDSK that was a part of Digital Equipment Corporation hardware's diagnostics, running on early 1970s TENEX and TOPS-20.
SCP 86-DOS
The CHKDSK command was first implemented in 1980 by Tim Paterson and included in Seattle Computer Products 86-DOS.
MS-DOS / IBM PC DOS
The command is available in MS-DOS versions 1 and later.
CHKDSK is implemented as an external command. MS-DOS versions 2.x - 4.x use chkdsk.com as the executable file. MS-DOS versions 5.x and later use chkdsk.exe as the executable file.
CHKDSK can also show the memory usage, this was used before the command MEM.EXE was introduced in MS-DOS 4.0 to show the memory usage. In DR DOS the parameter /A limited the output to only show the memory usage.
MS-DOS 5.0 bug
CHKDSK and UNDELETE in MS-DOS 5.0 have a bug which can corrupt data: If the file allocation table of a disk uses 256 sectors, running CHKDSK /F can cause data loss and running UNDELETE can cause unpredictable results. This normally affects disks with a capacity of approximately a multiple of 128 MB. This applies to CHKDSK.EXE and UNDELETE.EXE bearing a datestamp of April 9, 1991. This bug was fixed in MS-DOS 5.0a.
Microsoft Windows
CHKDSK can be run from DOS prompt, Windows Explorer, Windows Command Prompt, Windows PowerShell or Recovery Console.
On Windows NT operating systems, CHKDSK can also check the disk surface for bad sectors and mark them (in MS-DOS 6.x and Windows 9x, this is a task done by Microsoft ScanDisk). The Windows Server version of CHKDSK is RAID-aware and can fully recover data in bad sectors of a disk in a RAID-1 or RAID-5 array if other disks in the set are intact.
Fragments of files and directories deemed as corrupt as a result of, for example, power outages while writing, file name overlength, and/or invalid characters in file name, are moved into a directory under the partition's root, named found.000, and renamed into generic hexadecimally numbered files and directories starting with file00000000.chk and dir_00000000.chk respectively.
On Windows NT family, a standard CHKDSK scan consists of three phases of testing file metadata. It looks for errors but does not fix them unless it is explicitly ordered to do so. The same applies to surface scan—this test, which could be extremely time-consuming on large or low-performance disks, is not carried out unless explicitly requested. CHKDSK requires exclusive write access to the volume to perform repairs.
Due to the requirement of the monopolized access to the drive, the |
https://en.wikipedia.org/wiki/Trolleybuses%20in%20Greater%20Boston | The Boston-area trolleybus (or, as known locally, trackless trolley) system formed part of the public transportation network serving Greater Boston in the U.S. state of Massachusetts. It opened on April 11, 1936, with a large network operating for the next quarter-century. Measured by fleet size, the Boston-area system was the second-largest trolleybus system in the United States at its peak (end of 1952), with only the Chicago system having more trolleybuses than Boston's 463 (with the Atlanta system being close behind Boston, with 453). After 1963, the only remaining portion was a four-route cluster operating from the Harvard bus tunnel at Harvard station, running through Cambridge, Belmont, and Watertown. The Massachusetts Bay Transportation Authority took over the routes in 1964.
The system was expanded by the Silver Line (Waterfront), a 2004-opened bus rapid transit network using dual-mode buses which ran as trolleybuses in a tunnel in the Seaport District of Boston before switching to diesel power to serve other destinations. The Harvard lines were converted to diesel hybrid buses in 2022, followed by the Silver Line in 2023.
History
The first trackless trolley line in the Boston transit system was opened by the Boston Elevated Railway (BERy) on April 11, 1936. Replacing a streetcar line over the same route, it was a crosstown line (later numbered 77, and today served by the bus) running from Harvard station east to Lechmere station. (Substitution of buses for streetcars on the route had been proposed as early as 1930.) Additional lines were opened in 1937, and by 1942, the system had 14 lines, of which 10 were former streetcar lines and four were former motor bus lines. In 1947, the BERy was succeeded by the public Metropolitan Transit Authority (MTA) as the operator of Boston's urban transit system, and in 1964, the MTA was replaced by the Massachusetts Bay Transportation Authority (MBTA), which remains the system's operator today.
The BERy was owned by private investors, but came under public control from 1918. It served 13 municipalities of Greater Boston, including Boston proper. The MTA's service area was limited to these municipalities (with the addition of Revere). Following a change of management, the MTA began replacing trolleybuses with motorbuses, starting in 1958. Only four trolleybus lines remained after 1963, all based in Cambridge. Four decades later, the MTA's successor, the MBTA, built the Silver Line (Waterfront), and that line's opening in late 2004 reintroduced trolleybus service in Boston proper.
At the trolleybus system's peak, the maximum number of trolleybus routes in operation was 37, with most route running in the near north suburbs of Boston. In addition, there were the disconnected Dorchester and Arborway networks.
Prior to the opening of the Silver Line, a total of 43 trolleybus lines had historically existed, but not all concurrently, making the all-time total 44 (counting the Silver Line trunk |
https://en.wikipedia.org/wiki/NatureServe%20conservation%20status | The NatureServe conservation status system, maintained and presented by NatureServe in cooperation with the Natural Heritage Network, was developed in the United States in the 1980s by The Nature Conservancy (TNC) as a means for ranking or categorizing the relative imperilment of species of plants, animals, or other organisms, as well as natural ecological communities, on the global, national or subnational levels. These designations are also referred to as NatureServe ranks, NatureServe statuses, or Natural Heritage ranks. While the Nature Conservancy is no longer substantially involved in the maintenance of these ranks, the name TNC ranks is still sometimes encountered for them.
NatureServe ranks indicate the imperilment of species or ecological communities as natural occurrences, ignoring individuals or populations in captivity or cultivation, and also ignoring non-native occurrences established through human intervention beyond the species' natural range, as for example with many invasive species).
NatureServe ranks have been designated primarily for species and ecological communities in the United States and Canada, but the methodology is global, and has been used in some areas of Latin America and the Caribbean. The NatureServe Explorer website presents a centralized set of global, national, and subnational NatureServe ranks developed by NatureServe or provided by cooperating U.S. Natural Heritage Programs and Canadian and other international Conservation Data Centers.
Introduction
Most NatureServe ranks show the conservation status of a plant or animal species or a natural ecological community using a one-to-five numerical scale (from most vulnerable to most secure), applied either globally (world-wide or range-wide) or to the entity's status within a particular nation or a specified subnational unit within a nation. Letter-based notations are used for various special cases to which the numerical scale does not apply, as explained below. Ranks at various levels may be concatenated to combine geographical levels, and also to address infraspecific taxa (subspecies and plant varieties).
Global, national, and subnational levels
NatureServe conservation statuses may be applied at any or all of three geographical levels:
G - Ranks designated at the global (or range-wide) level (G-rank),
N - Ranks designated at a national level (N-rank) for a particular nation, and
S - Ranks designated at a subnational level (S-rank) for a particular next-lower geographical unit within a nation, such as a state in the US.
Commonly encountered ranks
The most commonly encountered NatureServe conservation statuses at the G-, N-, or S-level are:
Numbers
1 — Critically imperiled — (typically having 5 or fewer occurrences, or 1,000 or fewer individuals).
2 — Imperiled — (typically having 6 to 20 occurrences, or 1,001 to 3,000 individuals).
3 — Vulnerable — (rare; typically having 21 to 100 occurrences, or 3,001 to 10,000 individuals).
4 — Apparently se |
https://en.wikipedia.org/wiki/William%20Pugh%20%28computer%20scientist%29 | William Worthington Pugh Jr. (born 1960) is an American computer scientist who invented the skip list and the Omega test for deciding Presburger arithmetic. He was the co-author of the static code analysis tool FindBugs, and was highly influential in the development of the current memory model of the Java language. Pugh received a Ph.D. in computer science, with a minor in acting, from Cornell University.
In 2012 he became professor emeritus of the University of Maryland's department of computer science in College Park. He is on the technical advisory board for the static analysis company Fortify Software.
External links
Website
American computer scientists
Living people
University of Maryland, College Park faculty
1960 births |
https://en.wikipedia.org/wiki/Nancy%20Hafkin | Nancy Jane Hafkin is a pioneer of networking and development information and electronic communications in Africa, spurring the Pan African Development Information System (PADIS) of the United Nations Economic Commission for Africa (UNECA) from 1987 until 1997. She also played a role in facilitating the Association for Progressive Communications's work to enable email connectivity in more than 10 countries during the early 1990s, before full Internet connectivity became a reality in most of Africa.
Work
Hafkin studied history and anthropology at Brandeis University in Boston from 1960 to 1965. She then studied at Boston University from 1965 to 1967. There, she found a mentor in Professor Ruth Morgenthau, who encouraged her to intensively study African history during her graduate studies from 1967 to 1973. At the time it was a young field in which many women were active. Hafkin received her doctorate with a thesis on Trade, Society and Politics in Northern Mozambique from 1753-1913.
Move to Ethiopia
Hafkin moved to Ethiopia in 1975 with her husband, Berhanu Abebe, an Ethiopian classmate at Brandeis, and they lived in Addis Ababa for nearly 25 years, until 2000.
When Hafkin worked for the United Nations Economic Commission for Africa (UNECA), the Internet did not yet exist. While her efforts with UNECA were focused on economic development in every African country, she noticed that information was basically inaccessible on the continent with data being shared by fax and postal delivery. There wasn't even one public library in the country so she decided to address the information crisis by launching the Pan African Development Information System (PADIS) in 1986.
In addition to her role with PADIS, she worked as a visiting professor at the University of Addis Ababa as the Chair of History from 1980–1981.
Through her time with PADIS, was able to help establish the first electronic communications networks in ten African countries and actively convinced many African government officials of the importance of the Internet.
Over the years Hafkin significantly contributed to "sharpening global awareness of developments in the context of gender and information technology as well as enabling fast and inexpensive access to information technology and thus information and networking on the African continent." Through the efforts of PADIS, new African networks have broadened access to information resources while reducing the isolation of African students.
Return to the U.S.
In 2000, she left her position with the U.N. and returned to the United States with her husband so she could continue her work improving information access for women, one of her initial goals as a young researcher.
Since retiring from academia, Hafkin still acts as a keynote speaker and gives lectures on the empowerment and participation of women in information technology.
Writing
Nancy Hafkin edited Cinderella or Cyberella?: Empowering Women in the Knowledge Society, which was publis |
https://en.wikipedia.org/wiki/Object%20composition | In computer science, object composition and object aggregation are closely related ways to combine objects or data types into more complex ones. In conversation the distinction between composition and aggregation is often ignored. Common kinds of compositions are objects used in object-oriented programming, tagged unions, sets, sequences, and various graph structures. Object compositions relate to, but are not the same as, data structures.
Object composition refers to the logical or conceptual structure of the information, not the implementation or physical data structure used to represent it. For example, a sequence differs from a set because (among other things) the order of the composed items matters for the former but not the latter. Data structures such as arrays, linked lists, hash tables, and many others can be used to implement either of them. Perhaps confusingly, some of the same terms are used for both data structures and composites. For example, "binary tree" can refer to either: as a data structure it is a means of accessing a linear sequence of items, and the actual positions of items in the tree are irrelevant (the tree can be internally rearranged however one likes, without changing its meaning). However, as an object composition, the positions are relevant, and changing them would change the meaning (as for example in cladograms).
Programming technique
Object-oriented programming is based on objects to encapsulate data and behavior. It uses two main techniques for assembling and composing functionality into more complex ones, sub-typing and object composition. Object composition is about combining objects within compound objects, and at the same time, ensuring the encapsulation of each object by using their well-defined interface without visibility of their internals. In this regard, object composition differs from data structures, which do not enforce encapsulation.
Object composition may also be about a group of multiple related objects, such as a set or a sequence of objects. Delegation may enrich composition by forwarding requests or calls made to the enclosing composite object to one of its internal components.
In class-based and typed programming languages, types can be divided into composite and non-composite types, and composition can be regarded as a relationship between types: an object of a composite type (e.g. car) "has" objects of other types (e.g. wheel). When a composite object contains several sub-objects of the same type, they may be assigned to particular roles, often distinguished by names or numbers. For example, a Point object might contain 3 numbers, each representing distance along a different axis, such as 'x', 'y', and 'z'. The study of part-whole relationships in general, is mereology.
Composition must be distinguished from subtyping, which is the process of adding detail to a general data type to create a more specific data type. For instance, cars may be a specific type of vehicle: car is |
https://en.wikipedia.org/wiki/Function%20composition%20%28computer%20science%29 | In computer science, function composition is an act or mechanism to combine simple functions to build more complicated ones. Like the usual composition of functions in mathematics, the result of each function is passed as the argument of the next, and the result of the last one is the result of the whole.
Programmers frequently apply functions to results of other functions, and almost all programming languages allow it. In some cases, the composition of functions is interesting as a function in its own right, to be used later. Such a function can always be defined but languages with first-class functions make it easier.
The ability to easily compose functions encourages factoring (breaking apart) functions for maintainability and code reuse. More generally, big systems might be built by composing whole programs.
Narrowly speaking, function composition applies to functions that operate on a finite amount of data, each step sequentially processing it before handing it to the next. Functions that operate on potentially infinite data (a stream or other codata) are known as filters, and are instead connected in a pipeline, which is analogous to function composition and can execute concurrently.
Composing function calls
For example, suppose we have two functions and , as in and . Composing them means we first compute , and then use to compute . Here is the example in the C language:
float x, y, z;
// ...
y = g(x);
z = f(y);
The steps can be combined if we don't give a name to the intermediate result:
z = f(g(x));
Despite differences in length, these two implementations compute the same result. The second implementation requires only one line of code and is colloquially referred to as a "highly composed" form. Readability and hence maintainability is one advantage of highly composed forms, since they require fewer lines of code, minimizing a program's "surface area". DeMarco and Lister empirically verify an inverse relationship between surface area and maintainability. On the other hand, it may be possible to overuse highly composed forms. A nesting of too many functions may have the opposite effect, making the code less maintainable.
In a stack-based language, functional composition is even more natural: it is performed by concatenation, and is usually the primary method of program design. The above example in Forth:
g f
Which will take whatever was on the stack before, apply g, then f, and leave the result on the stack. See postfix composition notation for the corresponding mathematical notation.
Naming the composition of functions
Now suppose that the combination of calling f() on the result of g() is frequently useful, and which we want to name foo() to be used as a function in its own right.
In most languages, we can define a new function implemented by composition. Example in C:
float foo(float x) {
return f(g(x));
}
(the long form with intermediates would work as well.) Example in Forth:
: foo g f ;
In languages such as C |
https://en.wikipedia.org/wiki/Global%20Telecommunications%20System | The Global Telecommunication System (GTS) is a secured communication network enabling real-time exchange of meteorological data from weather stations, satellites and numerical weather prediction centres, providing critical meteorological forecasting, warnings, and alerts. It was established by the World Meteorological Organization in 1951 under the World Weather Watch programme for the free and open exchange of meteorological information.
The GTS consists of an integrated network of point-to-point circuits, and multi-point circuits which interconnect meteorological telecommunication centres. The circuits of the GTS are composed of a combination of terrestrial and satellite telecommunication links. They comprise point-to-point circuits, point-to-multi-point circuits for data distribution, multi-point-to-point circuits for data collection, as well as two-way multi-point circuits. Meteorological Telecommunication Centres are responsible for receiving data and relaying it selectively on GTS circuits. The GTS is organized on a three level basis:
The Main Telecommunication Network (MTN)
The Regional Meteorological Telecommunication Networks (RMTNs)
The National Meteorological Telecommunication Networks (NMTNs)
Satellite-based data collection and/or data distribution systems are integrated in the GTS as an essential element of the global, regional and national levels of the GTS. Data collection systems operated via geostationary or near-polar orbiting meteorological/environmental satellites, including the Argos System, are widely used for the collection of observational data from data collection platforms. Marine data are also collected through the International Maritime Mobile Service and Inmarsat satellites.
References
Further reading
WMO (2013) Manual on the Global Telecommunications System WMO publication 386
External links
WMO's Global Telecommunication System
WMO's GTS Community Site
1951 establishments
Telecommunications-related introductions in the 1950s
Meteorological data and networks
Data collection satellites |
https://en.wikipedia.org/wiki/Computer-aided%20architectural%20design | Computer-aided architectural design (CAAD) software programs are the repository of accurate and comprehensive records of buildings and are used by architects and architectural companies for architectural design and architectural engineering. As the latter often involve floor plan designs CAAD software greatly simplifies this task.
The first program was created back in the 1960s to increase architects' productivity, which at the time was held back by manual drawing of blueprints.
Computer-aided design also known as CAD was originally the type of program that architects used, but since CAD could not offer all the tools that architects needed to complete a project, CAAD developed as a distinct class of software.
Overview
All CAD and CAAD systems employ a database with geometric and other properties of objects; they all have some kind of graphic user interface to manipulate a visual representation rather than the database; and they are all more or less concerned with assembling designs from standard and non-standard pieces. Currently, the main distinction which causes one to speak of CAAD rather than CAD lies in the domain knowledge (architecture-specific objects, techniques, data, and process support) embedded in the system. A CAAD system differs from other CAD systems in two respects:
It has an explicit object database of building parts and construction knowledge.
It explicitly supports the creation of architectural objects.
In a more general sense, CAAD also refers to the use of any computational technique in the field of architectural design other than by means of architecture-specific software. For example, software which is specifically developed for the computer animation industry (e.g. Maya and 3DStudio Max), is also used in architectural design. These programs can produce photo realistic 3d renders and animations. Nowadays real-time rendering is being popular thanks to the developments in graphic cards. The exact distinction of what properly belongs to CAAD is not always clear. Specialized software, for example for calculating structures by means of the finite element method, is used in architectural design and in that sense may fall under CAAD. On the other hand, such software is seldom used to create new designs.
In 1974 Caad became a current word and was a common topic of commercial modernization.
Three-dimensional objects
CAAD has two types of structures in its program. The first system is surface structure which provides a graphics medium to represent three-dimensional objects using two-dimensional representations. Also algorithms that allow the generation of patterns and their analysis using programmed criteria, and data banks that store information about the problem at hand and the standards and regulations that applies to it. The second system is deep structure which means that the operations performed by the computer have natural limitations. Computer hardware and machine languages that are supported by these make it easy to |
https://en.wikipedia.org/wiki/Pseudo-LRU | Pseudo-LRU or PLRU is a family of cache algorithms which improve on the performance of the Least Recently Used (LRU) algorithm by replacing values using approximate measures of age rather than maintaining the exact age of every value in the cache.
PLRU usually refers to two cache replacement algorithms: tree-PLRU and bit-PLRU.
Tree-PLRU
Tree-PLRU is an efficient algorithm to select an item that most likely has not been accessed very recently, given a set of items and a sequence of access events to the items.
This technique is used in the CPU cache of the Intel 486 and in many processors in the PowerPC family, such as Freescale's PowerPC G4 used by Apple Computer.
The algorithm works as follows: consider a binary search tree for the items in question. Each node of the tree has a one-bit flag denoting "go left to insert a pseudo-LRU element" or "go right to insert a pseudo-LRU element". To find a pseudo-LRU element, traverse the tree according to the values of the flags. To update the tree with an access to an item N, traverse the tree to find N and, during the traversal, set the node flags to denote the direction that is opposite to the direction taken.
This algorithm can be sub-optimal since it is an approximation. For example, in the above diagram with A, C, B, D cache lines, if the access pattern was: C, B, D, A, on an eviction, B would chosen instead of C. This is because both A and C are in the same half and accessing A directs the algorithm to the other half that does not contain cache line C.
Bit-PLRU
Bit-PLRU stores one status bit for each cache line. These bits are called MRU-bits. Every access to a line sets its MRU-bit to 1, indicating that the
line was recently used. Whenever the last remaining 0 bit of a set's status bits is
set to 1, all other bits are reset to 0. At cache misses, the leftmost line whose MRU-bit is 0 is replaced.
See also
Cache algorithms
References
https://people.cs.clemson.edu/~mark/464/p_lru.txt
http://www.ipdps.org/ipdps2010/ipdps2010-slides/session-22/2010IPDPS.pdf
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.217.3594&rep=rep1&type=pdf
Memory management algorithms |
https://en.wikipedia.org/wiki/WTTG | WTTG (channel 5) is a television station in Washington, D.C., serving as the market's Fox network outlet. It is owned and operated by the network's Fox Television Stations division alongside MyNetworkTV station WDCA (channel 20). WTTG and WDCA share studios on Wisconsin Avenue in Bethesda, Maryland. Through a channel sharing agreement, the stations transmit using WTTG's spectrum from a tower also located in Bethesda on River Road at the site of WDCA's former studio facilities.
WTTG's signal is rebroadcast on a low-power digital translator station, W24ES-D, in Moorefield, West Virginia (which is owned by Valley TV Cooperative, Inc.).
History
Early years (1945–1958)
The station traces its history to May 19, 1945, when television set and equipment manufacturer Allen B. DuMont founded W3XWT, the second experimental station in the nation's capital (after NBC's W3XNB, forerunner to WRC-TV). Later in 1945, DuMont Laboratories began a series of experimental coaxial cable hookups between W3XWT and its other television station, WABD (now WNYW) in New York City. These hookups were the beginning of the DuMont Television Network, the world's first commercial television network. DuMont began regular network service in 1946. The Federal Communications Commission (FCC) granted a 90-day commercial license – the first in the nation's capital – to WTTG that November 29, and the first program that aired on the station was a Washington Lions hockey game from Uline Arena on December 10, sponsored by the U.S. Rubber Company. It continued using the experimental 5 kW transmitter of W3XWT until late in 1947, when work had progressed enough on its final transmission site to move there at low power; DuMont did not complete construction and begin full-time, full-power operation until June 1949.
The station was named for Thomas T. Goldsmith Jr., the DuMont Network's chief engineer and a close friend of Dr. DuMont.
Like WABD and DuMont's other owned-and-operated station, WDTV in Pittsburgh, WTTG was far more successful than the network as a whole. In 1956, after DuMont shut down network operations, WTTG and WABD became independent stations and were spun off from DuMont Laboratories as the DuMont Broadcasting Corporation (WDTV was sold to Westinghouse Electric Corporation the previous year; it is now CBS owned-and-operated station KDKA-TV). DuMont later changed its name to Metropolitan Broadcasting in order to distance itself from its former parent company.
As an independent station (1958–1986)
In 1958 Washington investor John Kluge bought controlling interest in Metropolitan Broadcasting from Paramount Pictures and installed himself as its chairman. He changed the company's name to Metromedia in 1961. Goldsmith sat on Metromedia's board of directors for over a quarter-century. Channel 5 gained a sister station on radio when Metromedia purchased WASH (97.1 FM) in 1968. At first, WTTG ran on a low budget. However, in the late 1960s, it benefited from Metromedia's aggressiv |
https://en.wikipedia.org/wiki/WDCW | WDCW (channel 50), branded on-air as DCW 50, is a television station in Washington, D.C., serving as the local outlet for the CW television network. It is owned and operated by network majority owner Nexstar Media Group alongside Hagerstown, Maryland–licensed independent station WDVM-TV (channel 25); the two stations share studios on Wisconsin Avenue in Washington's Glover Park neighborhood. Through a channel sharing agreement with Univision station WFDC-DT (channel 14), WDCW transmits using WFDC's spectrum from a tower in the Tenleytown area of Washington's Northwest quadrant.
The station began broadcasting in November 1981 as WCQR, culminating a 17-year struggle to get the station on air that included the death of the original permittee, bankruptcy, and years in the FCC's comparative hearing process. The station launched primarily as a vehicle for subscription television (STV) programming from Super TV, which served the Washington and Baltimore areas. After the station was sold in 1985, it became WFTY and dropped the subscription content, operating as the Washington area's third independent station. After a foreclosure sale in 1993, it affiliated with The WB in 1995, improving its programming and market standing, and was sold to Tribune Broadcasting. WDCW was one of the charter affiliates of The CW in 2006. Over the years, the station has had several partial attempts at airing or producing local newscasts; the most recent, DC News Now, debuted in 2022.
History
Pre-broadcasting history
The history of channel 50 in Washington, D.C., began in 1964 when the first application was received for the channel from All American Television Features, owned by record executive and conductor Mitch Miller. That application was joined by three others. Theodore (Ted) Granik had once hosted The American Forum of the Air, a debate program on NBC. O. Roy Chalk, then-owner of DC Transit, applied through his company, Transportation Communications of America. The Greater Washington Educational Television Association, owner of WETA-TV (channel 26), sought to establish channel 50 as a second educational channel. WETA dropped out of the channel 50 race when the Federal Communications Commission (FCC) moved channel 32 from Lock Haven, Pennsylvania, to Washington for noncommercial educational use, but a fourth applicant, Washington lawyer Vincent B. Welch, entered the proceeding under the banner of the Colonial Television Corporation.
Comparative hearings were held in January 1966. Though Miller did not exactly impress with his failure to recall the names of important D.C. public officials, he did enough to get the initial nod from examiner Basil P. Cooper, who lauded Miller's proposal to move to Washington, host a Saturday night program, and take an active hand in management. Miller, however, was bumped from the lead when the FCC review board opted to strike a different note. In a July 1967 decision, the board chose the application of Granik, a 29-year Washington res |
https://en.wikipedia.org/wiki/Libquantum | Libquantum is a C library quantum mechanics simulator originally focused on virtual quantum computers. It is licensed under the GNU GPL. It was a part of SPEC 2006. The latest version is stated to be v1.1.1 (Jan 2013) on the mailing list, but on the website there is only v0.9.1 from 2007.
An author of libquantum, Hendrik Weimer, has published a paper in Nature about using Rydberg atoms for universal quantum simulation with colleagues, using his own work.
References
External links
libquantum homepage
Virtualization software
Quantum information science
Quantum programming |
https://en.wikipedia.org/wiki/State%20highways%20in%20Oregon | The state highway system of the U.S. state of Oregon is a network of highways that are owned and maintained by the Highway Division of the Oregon Department of Transportation (ODOT).
Highways and routes
The state highway system consists of about of state highways, that is, roadways owned and maintained by ODOT. When minor connections and frontage roads are removed, that number drops to approximately or around 9% of the total road mileage in the state. Oregon's portion of the Interstate Highway System totals . Transfers of highways between the state and county or local maintenance require the approval of the Oregon Transportation Commission (OTC), a five-member governor-appointed authority that meets monthly. These transfers often result in discontinuous highways, where a local government maintains part or all of a main road within its boundaries.
Two separate numbering systems are used: routes (e.g. Interstate 84, U.S. Route 26, and Oregon Route 140) are those used by the general public, and their shields are posted on guide signs and maps. These comprise the Interstate Highways, U.S. Highways, and Oregon state routes (e.g. OR 201). Highways, on the other hand, are used internally by ODOT; they are named and numbered (e.g. Pacific Highway No. 1, Willamette Highway No. 18). The two systems, while largely overlapping, are not congruent. Many routes are signed on streets which are maintained by counties and cities, and thus are not part of the state highway system at all, e.g. OR 8, whose eastern- and westernmost portions, Canyon Road and Gales Creek Road, are not actually state highways. On the other hand, some state highways are not signed as routes at all; the Beaverton–Tualatin Highway No. 141 has an official route designation (OR 141), but remains entirely unsigned. Signed routes may comprise several highways; for instance, OR 47 is overlaid on the Mist–Clatskanie Highway No. 110, Nehalem Highway No. 102, and Tualatin Valley Highway No. 29. Likewise, highways may consist of several routes; Tualatin Valley Highway No. 29 comprises parts of OR 8 and OR 47. Every highway is fully state-maintained, and every route is at least partially state-maintained.
The OTC designates the paths of these routes as they follow state highways and local roads; any U.S. Route or Interstate numbers must also be approved by the American Association of State Highway and Transportation Officials (AASHTO). Route signs are maintained by the same agency as the roads they are posted along. If a local government maintains a numbered route, it signs an agreement with the state to keep the signs posted, thus keeping a continuous route for the benefit of travelers.
History
The initial primary state highway system was designated in 1917, initially consisting of 36 named and numbered highways, including some designated earlier that year by the Oregon State Legislature and others added to the network by the Oregon State Highway Commission, the predecessor to the |
https://en.wikipedia.org/wiki/List%20of%20state%20highways%20in%20Oklahoma | Oklahoma has a large network of numbered highways maintained by the state. These roads fall into one of three categories: Interstate Highways, U.S. Highways, and state highways. Interstate and U.S. Highways are continuous with surrounding states, while state highways are not (though Oklahoma and another state's department of transportation may coordinate numbering).
The majority of the numbered highways within Oklahoma are maintained by the Oklahoma Department of Transportation (ODOT). The only exceptions are sections of Interstate 44 (I-44) and U.S. Highway 412 (US 412), which run along turnpikes maintained by the Oklahoma Turnpike Authority (OTA). (I-44 runs along the H.E. Bailey, Turner, and Will Rogers turnpikes; US 412 is signed along the Cimarron and Cherokee turnpikes.)
Individual counties may establish a numbering system to apply to roads that they maintain. These highways are not listed here.
State highways
Oklahoma's state highways serve as the second-lowest tier on the Oklahoma road system. They are marked with a number contained inside an outline of the state, having been formerly marked inside a white circle in a black box until January 2006.
SH-81 has not been issued for a state highway so that is not confused with US Highways and Interstates bearing the same number designation. SH-35 has been issued, but it is only for a short spur, far from I-35. SH-60, SH-62, SH-69, and SH-75 were once assigned but these designation have since been revoked. Other two-digit highways that have yet to be assigned include: SH-12, SH-13, SH-21, SH-41, SH-57, SH-61, SH-68, and SH-90. SH-40 was once issued, but was absorbed into U.S. Highway 177; see SH-40A. SH-41, which was an east-west route across west-central Oklahoma that began at the intersection of S.W. 29th and May Avenue in Oklahoma City and veered southwest to Mustang, Union City and Minco before continuing west through Binger, Eakly, Cordell and Sayre and then crossing the Texas border near Sweetwater, was redesignated as SH-152 over its entire length in 1955. Across the Texas Panhandle, the highway continues as TX-152 to Dumas, Texas. SH-61 had a strange east-west route across south-central Oklahoma that started at SH-13 (Now SH-3W). Where it headed south, passing through Vanoss and then to Roff, where it turned east to Fittstown. It then headed south with SH-99 until turning east again. The road turned north in Jessie. It went north until it turned back east north of Stonewall It turned east again until it ended on SH-48 in Luna.
Many Oklahoma state highways have short spur routes connecting them to towns which lie off of the main route. Many times, these bear the same number as the parent highway, with a letter suffix. Some state highway spurs and loops from US highways have designations that are drawn from the parent US Highway designation.
As higher-level roads replaced sections of some routes, those sections sometimes had their designation revoked. This led to some highways being |
https://en.wikipedia.org/wiki/Polygonal%20modeling | In 3D computer graphics, polygonal modeling is an approach for modeling objects by representing or approximating their surfaces using polygon meshes. Polygonal modeling is well suited to scanline rendering and is therefore the method of choice for real-time computer graphics. Alternate methods of representing 3D objects include NURBS surfaces, subdivision surfaces, and equation-based (implicit surface) representations used in ray tracers.
Geometric theory and polygons
The basic object used in mesh modeling is a vertex, a point in three-dimensional space. Two vertices connected by a straight line become an edge. Three vertices, connected to each other by three edges, define a triangle, which is the simplest polygon in Euclidean space. More complex polygons can be created out of multiple triangles, or as a single object with more than 3 vertices. Four sided polygons (generally referred to as quads) and triangles are the most common shapes used in polygonal modeling. A group of polygons, connected to each other by shared vertices, is generally referred to as an element. Each of the polygons making up an element is called a face.
In Euclidean geometry, any three non-collinear points determine a plane. For this reason, triangles always inhabit a single plane. This is not necessarily true of more complex polygons, however. The flat nature of triangles makes it simple to determine their surface normal, a three-dimensional vector perpendicular to the triangle's surface. Surface normals are useful for determining light transport in ray tracing, and are a key component of the popular Phong shading model. Some rendering systems use vertex normals instead of face normals to create a better-looking lighting system at the cost of more processing. Note that every triangle has two face normals, which point to opposite directions from each other. In many systems only one of these normals is considered valid – the other side of the polygon is referred to as a backface, and can be made visible or invisible depending on the programmer’s desires.
Many modeling programs do not strictly enforce geometric theory; for example, it is possible for two vertices to have two distinct edges connecting them, occupying exactly the same spatial location. It is also possible for two vertices to exist at the same spatial coordinates, or two faces to exist at the same location. Situations such as these are usually not desired and many packages support an auto-cleanup function. If auto-cleanup is not present, however, they must be deleted manually.
A group of polygons which are connected by shared vertices is referred to as a mesh. In order for a mesh to appear attractive when rendered, it is desirable that it be non-self-intersecting, meaning that no edge passes through a polygon. Another way of looking at this is that the mesh cannot pierce itself. It is also desirable that the mesh not contain any errors such as doubled vertices, edges, or faces. For some |
https://en.wikipedia.org/wiki/List%20of%20state%20highways%20in%20Idaho | The Idaho Transportation Department (ITD) is responsible for the establishment and classification of a state highway network, including of roads that are classified as Interstate Highways, U.S. Highways, and state highways within the state of Idaho in the United States. The current state highway marker consists of a white background, black numbering, and a solid black geographic outline of the state of Idaho.
History
During the 1920s, in lieu of numbering its highways, Idaho had a system of lettered Sampson Trails. They were marked by businessman Charles B. Sampson of Boise at no expense to the state, using orange-colored shields. By 1929, the trails system had included of marked highways that covered most of the state. By the mid-1930s, the state had adopted a more standard system of numbered state highways.
In 1978, the ITD began using brown state highway markers to denote scenic Idaho highways, in addition to the main highway markers that featured a black background and white lettering and the name "IDAHO" in black lettering inside a white geographic outline of the state. The brown markers were discontinued around 2012, and in April 2020, ITD changed the coloring of the main state highway marker to its current color scheme, also adding a wide version of the marker for three-digit highways and removing the word "IDAHO" from all markers in the process.
Sampson Trails
The following Sampson Trails were marked:
A, Boise to Wyoming via Twin Falls and Pocatello; became US-30 and US-30N
B, Boise to Canada via Lewiston and Coeur d'Alene; became US-30, US-30N, US-95, and SH-1
C, Pocatello to Montana via Idaho Falls; became US-91 and US-191
D, Boise to New Meadows via Banks; became SH-15 (today's SH-55)
E, not on the 1926 map
F, Boise to Blackfoot via Stanley; became SH-21, SH-17, US-93 (today's SH-75), and SH-27
G, Mountain Home to Picabo via Fairfield; became SH-22 (today's US-20)
H, Bliss to Trude via Arco; became SH-24, SH-23, SH-22, SH-29, and an unnumbered road (today's US-20 and US-26)
I, Pioneer to Idaho Falls; became an unnumbered road
J, Nevada to Shoshone via Twin Falls; became US-93
K, Utah to McCammon via Preston; became US-91
L, not on the 1926 map
M, Washington to Montana via Coeur d'Alene; became US-10
N, Bonners Ferry to Montana; became US-2
O, Oregon to Caldwell; became SH-49 and SH-18
P, Utah to Downey; became SH-36
Q, Declo to Fairfield; became SH-25 and SH-46
R, not on the 1926 map
S, Oregon to Nampa; became unnumbered road and SH-45
T, Star to Grimes Pass; became SH-16, unnumbered road, and SH-17
U, Utah to Montpelier; became SH-35
V, Hailey to Stanley; became US-93 (today's SH-75)
W, not on the 1926 map
X, not on the 1926 map
Y, Bonners Ferry to Canada; became US-95
State highways
See also
List of Interstate Highways in Idaho
List of U.S. Highways in Idaho
References
External links
Idaho Transportation Department
Road Signs of Idaho (archived April 27, 2004)
Pend Oreille Scenic Byway
St |
https://en.wikipedia.org/wiki/Redcode | Redcode may refer to:
The programming language used in the simulation game Core War
REDCODE, a video codec used in RED Digital Cinema cameras
See also
Code Red (disambiguation) |
https://en.wikipedia.org/wiki/Milhouse%20Doesn%27t%20Live%20Here%20Anymore | "Milhouse Doesn't Live Here Anymore" is the twelfth episode of the fifteenth season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on February 15, 2004. The episode was written by David Chambers and Julie Chambers, which they would go on to work on other shows later on such as Fancy Nancy, and was directed by Matthew Nastuk.
Plot
During a school field trip, Bart notices a change in Milhouse's behavior. Milhouse talks back to Mrs. Krabappel and wanders away from the group. He causes mischief with Bart, and tells him that he does not care what anyone thinks of him anymore. Finally, Milhouse reveals that he is moving to Capitol City with his mother. Bart visits Milhouse in Capitol City, only to find that Milhouse has dyed his hair blonde, is wearing fashionable clothes, and is cultivating a "bad-boy" image, even going so far as to give Bart a wedgie in front of his new Capitol City friends. At home, seeing how depressed Bart is (who even cries), Marge suggests he spend more time with Lisa. The two begin to bond by washing the car and riding bikes, and after they discover an Indian burial mound together, they become best friends.
Meanwhile, at Moe's Tavern, Apu and Manjula are celebrating their anniversary, and Homer realizes he does not have a gift for Marge for their anniversary. After being thrown out of the bar, Homer sits on the street and people start giving him money. He dances and earns enough money to buy Marge some flowers. He also does a rendition of the song "Mr. Bojangles" and asks for money. Homer continues his panhandling, and eventually makes enough money to buy Marge a pair of diamond earrings. When he continues panhandling afterward, angry bums bring Marge to see what Homer is doing. Marge is mortified and angry, but cannot bring herself to throw the earrings away.
Milhouse returns to Springfield when his father wins custody of Milhouse via court order. After she finds out Bart told Milhouse about their secret Indian burial mound, Lisa feels that Bart is acting like their friendship never existed and that he has been using her to fill a void. Bart, however, shows her that he still values her as a sister by giving her a set of cards with nice things he will do for her on them, and the two hug. The episode ends with Isabel Sanford at the TV and Radio museum, pointing out how sitcoms usually resort to using sappy endings for their episodes.
Reception
Julie Chambers & David Chambers were nominated for a Writers Guild of America Award for Outstanding Writing in Animation at the 57th Writers Guild of America Awards for their script to this episode.
References
External links
The Simpsons (season 15) episodes
2004 American television episodes |
https://en.wikipedia.org/wiki/Resistance%3A%20Fall%20of%20Man | Resistance: Fall of Man is a 2006 first-person shooter video game for the PlayStation 3. It was developed by Insomniac Games and published by Sony Computer Entertainment. The game is set in an alternate history 1951, and follows Sergeant Nathan Hale as he and the human resistance forces attempt to drive a mysterious alien-like invasion out of the United Kingdom. The story continues in Resistance 2.
The game was originally developed under the title I-8, as it was the eighth title to be in production by Insomniac Games. It was released as a PlayStation 3 launch title in the United States on November 17, 2006 and in the PAL region on March 23, 2007. Resistance had positive critical reception, garnering particular praise in view of its status as a launch title and winning several awards. As of 2007, the game sold more than 2.1 million copies.
Sony and Insomniac Games became embattled with the Church of England for using interior shots of Manchester Cathedral to recreate the building within the game, as well as "promoting violence" within the building.
The game, along with its sequels Resistance 2 and Resistance 3, shut down its online servers on April 8, 2014. Digital versions of the first two games were released after the servers' closure in Europe.
Plot
In the 1900s, an insect-like alien race known as the Chimera arrive in Russia. Using advanced technology, they infect hundreds of civilians and subject them to artificial evolution, creating a diverse army of creatures ranging from simple foot soldiers to spider-like giants. By 1949, all of Europe has fallen to the Chimera. The following year, a vast invasion force tunnels under the English Channel, conquering much of England and leaving only scattered pockets of human resistance.
In 1951, the United States, despite taking a position of neutrality in the conflict, sends a task force to assist the UK as part of "Operation Deliverance". Among the soldiers is Army Ranger Sgt. Nathan Hale. However, soon after landing in York, he and his squad are ambushed by enemy troops, who infect them with the Chimera virus. Hale, the only survivor, discovers that he has an innate resistance to full infection. Instead, he gains increased strength and reflexes, the ability to instantly heal light injuries, and gold-colored irises, a common trait of the Chimera.
Sent to a Chimera conversion center in Grimsby, Hale meets British intelligence officer Captain Rachel Parker and helps her escape. In turn, Parker allows him to accompany British forces launching an offensive in Manchester to recover a missing convoy. The convoy's cargo is subsequently transferred to a resistance command center in Cheshire, which soon comes under attack from the Chimera. While attempting to provide assistance, Hale is separated from Parker and ends up fighting off the attack single-handedly. He then investigates the cargo, which turns out to be an Angel, a powerful creature that directs the Chimera's hive mind. The Angel tries to use it |
https://en.wikipedia.org/wiki/Jim%20Allchin | James Edward Allchin (born 1951, Grand Rapids, Michigan, United States) is an American computer scientist, philanthropist and guitarist. He is a former Microsoft executive.
He assisted Microsoft in creating many of the system platform components including Microsoft Windows, Windows Server, server products such as SQL Server, and developer technologies. He is best known for building Microsoft's server business and for leading foundational releases of Windows 2000, Windows XP and Windows Vista. He is also known for his leading role in the architecture and development of the directory services technology Banyan VINES. He has won numerous awards in his career such as the Technical Excellence Person of the Year in 2001. Jim Allchin led the Platforms division at Microsoft, overseeing the development of Windows client from Windows 98 to Windows Vista, Windows Server from NT Server 4.0 to Windows Server 2008, as well as several releases of Microsoft server products as well as Windows CE and Windows Embedded line of products. After serving sixteen years at Microsoft, Allchin retired in early 2007 when Microsoft officially released the Windows Vista operating system to consumers. He is now a professional musician.
Biography
Early years
Allchin was born in Grand Rapids, Michigan, in 1951. While he was still an infant, the Allchin family moved to Keysville, Florida, where his parents worked on a farm. Allchin grew up in a tin-roof house built by his father. Later, Allchin and his older brother Keith also worked on the farm to support the family financially.
While fixing equipment on the farm, Allchin developed an interest in engineering. He studied Electrical engineering at the University of Florida, but dropped out to play in a number of bands. He later returned to the university and graduated with BS in Computer Science in 1973.
After receiving his degree, Allchin joined Texas Instruments, where he helped build a new operating system. Afterwards, he followed a former lecturer, Dick Kiger, to Wyoming, where he helped him to start a new company offering computer services nationwide, before moving on to another company in Dallas, Texas.
Allchin returned to his studies, earning the degree of MS in Computer Science from Stanford University in 1980. Allchin wrote a language-independent, portable file system while at Stanford. While pursuing his PhD in Computer Science at Georgia Institute of Technology in the early eighties, he was the primary architect of the Clouds distributed object-oriented operating system; his PhD thesis was entitled "An Architecture for Reliable Decentralized Systems".
In 1983, Allchin was recruited to Banyan by founder Dave Mahoney, eventually being Senior Vice President and Chief Technology Officer. During his seven years at Banyan, he created the VINES distributed operating system, which included the StreetTalk directory protocol as well as a series of network services based on the Xerox XNS stack.
Bill Gates tried to recr |
https://en.wikipedia.org/wiki/Jagged%20array | In computer science, a jagged array, also known as a ragged array or irregular array is an array of arrays of which the member arrays can be of different lengths, producing rows of jagged edges when visualized as output. In contrast, two-dimensional arrays are always rectangular so jagged arrays should not be confused with multidimensional arrays, but the former is often used to emulate the latter.
Arrays of arrays in languages such as Java, PHP, Python (multidimensional lists), Ruby, C#.NET, Visual Basic.NET, Perl, JavaScript, Objective-C, Swift, and Atlas Autocode are implemented as Iliffe vectors.
Examples
In C# and Java jagged arrays can be created with the following code:
int[][]c;
c = new int[2][]; // creates 2 rows
c[0] = new int[5]; // 5 columns for row 0
c[1] = new int[3]; // create 3 columns for row 1
In C and C++, a jagged array can be created (on the stack) using the following code:
int jagged_row0[] = {0,1};
int jagged_row1[] = {1,2,3};
int *jagged[] = { jagged_row0, jagged_row1 };
In C/C++, jagged arrays can also be created (on the heap) with an array of pointers:
int *jagged[5];
jagged[0] = malloc(sizeof(int) * 10);
jagged[1] = malloc(sizeof(int) * 3);
In C++/CLI, jagged array can be created with the code:
using namespace System;
int main()
{
array<array<double> ^> ^ Arrayname = gcnew array <array<double> ^> (4); // array contains 4
//elements
return 0;
}
In Fortran, a jagged array can be created using derived types with allocatable component(s):
type :: Jagged_type
integer, allocatable :: row(:)
end type Jagged_type
type(Jagged_type) :: Jagged(3)
Jagged(1)%row = [1]
Jagged(2)%row = [1,2]
Jagged(3)%row = [1,2,3]
In Python, jagged arrays are not native but one can use list comprehensions to create a multi-dimensional list which supports any dimensional matrix:
multi_list_3d = [[[] for i in range(3)] for i in range(3)]
# Produces: [[[], [], []], [[], [], []], [[], [], []]]
multi_list_5d = [[[] for i in range(5)] for i in range(5)]
# Produces: [[[], [], [], [], []], [[], [], [], [], []], [[], [], [], [], []], [[], [], [], [], []], [[], [], [], [], []]]
See also
Variable-length array
Iliffe vector
References
Arrays
Articles with example Python (programming language) code |
https://en.wikipedia.org/wiki/2M%20%28TV%20channel%29 | 2M is a Moroccan free-to-air television network. It was established by the royal-owned conglomerate, ONA, before being sold to, in part, the Moroccan government. Of 2M, 45.3% is owned by Bank of Africa, while approximately 32.5% by the Moroccan government, Al Mada (12%), with the remaining shares being owned by Atlas Merédith, the Grandson in-law of Othman Benjelloun (10.2%).
The channel is available free-to-air locally on digital signal with national coverage, and on satellite television via Globecast, Nilesat and Arabsat.
2M offers services in Arabic, French, and Berber.
Background
2M was set up as a second national television channel with the aim of promoting competition and diversity in Moroccan audio-visual broadcasting.
2M started its programmes officially on 4 March 1989. It used to be a cable channel broadcasting unscrambled twice a day. After 7 years of activity, SOREAD (ONA group), the major shareholder, withdrew from the management of this TV channel due to financial reasons. The Moroccan state took over the control of 2M with a participation of 68% in its capital. This takeover was supported by a major effort to develop the audio-visual sector.
Radio 2M is the companion radio channel to 2M, presenting music, news, and information directly from Morocco in Arabic and French.
Content
2M challenged taboos by debating controversial issues and established a reputation for itself as a symbol of freedom of speech in Morocco. The channel regularly broadcasts news, films, sports and music. It is a government-controlled public TV station and it has been alleged that the government also controls editorial choices.
2M has two separate feeds: one available nationwide via terrestrial television, and a satellite feed under the branding 2M Monde (French for lit. 2M World). Both feeds have the same local shows but are aired at different times. 2M Monde does not broadcast Hollywood movies and American TV shows because the network only buys their broadcasting rights for within Morocco.
2M in figures
Personnel: 500 people, including 30% executives;
Coverage: 80% of the population;
Capital: 302,371,500 Moroccan dirham (€27,008,467 / £18,228,395 / US$36,750,427), including 68% owned by the state and 20.7% owned by Mohammed VI's holding SNI.
Programming
Foreign shows
List of American and European TV shows broadcast by the local version of 2M (which may change time by time):
24
Alias
Bones
Buffy (Buffy contre les vampires)
CSI (Les Experts)
CSI: NY (Les Experts : Manhattan)
CSI: Miami (Les Experts : Miami)
Cuenta Atràs () (Moroccan dubbing)
Damages
Dark Angel
Desperate Housewives
Dexter
Friends
Gossip Girl
Instant Star (Ma vie de star)
Jericho
Just Cause (En quête de justice)
Law & Order (New York District)
Law & Order: Special Victims Unit (New York unité spéciale)
Los hombres de Paco () (Moroccan dubbing)
Mad Men
Medium
Maid in Manhattan (Amour à Manhattan)
Más sabe el diablo (L'Ange du diable, El Diablo)
NCIS (NCIS : Enq |
https://en.wikipedia.org/wiki/Jet%20Data%20Access%20Objects | Jet Data Access Objects is a general programming interface for database access on Microsoft Windows systems, primarily for Jet and ACE databases.
History
DAO were originally called "VT Objects.: DAO 1.0 came up in November 1992 as part of Access 1.0. In version 3.5 it was able to bypass the Jet engine all together and directly access ODBC data sources, including Microsoft SQL Server and other enterprise database systems. DAO 3.6 shipped with Jet 4.0. Access 2007 and later uses ACE with its ACEDAO, where most new features supported by ACE are added to. ACEDAO no longer supports ODBCDirect.
Design
DAO works by creating a "workspace" object in which all database operations are performed. The workspace object exists as a session object that exists within a larger database engine object. There are two types of database engines: a Jet Database Engine object, and an ODBCDirect database engine.
Jet
The Jet database engine (in Access 2007 and later, ACE) object consists of several objects:
a workspace object containing
a groups-and-users object
a database object containing objects which consist of:
containers of objects
query definition (QueryDef) objects
Recordset objects which are defined by a set of field objects
relation objects which show the relationship between different fields in the database
table definition (TableDef) objects which consist of fields and indexes of selected fields.
a series of error objects
The first version of DAO used Snapshot/Dynaset/Table objects etc. In DAO 2.0 Recordset etc. objects were introduced. DAO 3.0/3.5 only supported the old objects using a special compatibility TLB, which was removed completely in DAO 3.6.
ODBCDirect
The ODBCDirect database engine consists of a workspace object and an errors object. The main differences between this database engine and the Jet database engine are:
the workspace object contains only a series of ODBC connection objects
the database object consists of a series of recordset objects
The ODBC connection objects consist of QueryDef objects and recordset objects.
See also
Microsoft Data Access Components
ActiveX Data Objects (ADO)
Remote Data Objects (RDO)
References
External links
DAO object model diagram with links to class reference pages
Microsoft application programming interfaces |
https://en.wikipedia.org/wiki/SK8%20%28programming%20language%29 | SK8 (pronounced "skate") was a multimedia authoring environment developed in Apple's Advanced Technology Group from 1988 until 1997. It was described as "HyperCard on steroids", combining a version of HyperCard's HyperTalk programming language with a modern object-oriented application platform. The project's goal was to allow creative designers to create complex, stand-alone applications. The main components of SK8 included the object system, the programming language, the graphics and components libraries, and the Project Builder, an integrated development environment.
For much of its history, SK8 remained a research project, and inspired a number of other Apple projects like AppleScript, as well as seeing use as a prototyping platform. Although around 1993 a team was assigned by the Apple Product Division to release a SK8 runtime, the limitation of the Mac's capabilities as well as the shift to the PowerPC chip made such a large project intractable. With the bulk of the original vision completed and no easy path to release as part of MacOS, active development ended in 1996–1997, and the Macintosh Common Lisp source code for the entire project was released to the public in 1997.
History
The SK8 project was created by Ruben Kleiman when he joined Apple in 1987. He had come to Apple to develop a flexible, object-oriented user interface and multimedia development environment. The name of the project derived from his interest in skateboarding. Coincidentally, at this time the HyperCard, with its direct manipulation interface and scripting language, was about to ship. While HyperCard was great for simple applications it used a limited interaction model – the "stacks" of cards" – that limited its potential applicability. SK8 attempted to extend these benefits to a wider programming role.
Early work on what would become SK8 focused on infrastructure rather than visual programming. Kleiman's first effort was a dynamic, prototype-based object system, MacFrames, a frame/object system with plug-ins for inference engines. Through preferences settings, MacFrames was used to emulate a large variety of object systems, including IntelliCorp's KEE. This research, in concert with users developing actual applications and prototypes at Apple, yielded the object model used in SK8. MacFrames was developed in Coral Lisp, which was acquired by Apple and became Macintosh Common Lisp.
The Macintosh at that time had no generalized inter-process communication (IPC) system. Kleiman created an IPC init for the Mac to allow MacFrames to communicate with other processes, in particular, HyperCard. This allowed HyperCard to be used as a visual programming front-end for MacFrames. Another goal of MacFrames was to build distributed processing right into the object system. Instead of using an RPC API, one simply set the object's property with the desired value and callback for the results. MacFrames was used by Apple's QA group to create an automated black-box testing system.
|
https://en.wikipedia.org/wiki/Sam%20McCall | Sam McCall is a fictional character from General Hospital, an American soap opera on the ABC network. Created by Charles Pratt, Jr. and Robert Guza, Jr., the character made her debut on the episode airing on October 1, 2003, portrayed by Kelly Monaco. Sam is the daughter of mob boss Julian Jerome (William deVry) and attorney Alexis Davis (Nancy Lee Grahn), born and placed for adoption when both were teenagers. She arrived in town as a con artist trying to reverse her family's bad luck by destroying the five lucky cards of the "Dead Man's Hand." Upon her arrival, she was characterized as a "sexy bad girl, with a nose for intrigue." Since her introduction, the character has matured into a self-assured and confident woman, while still retaining traces of her adventuresome, bad girl ways.
Monaco's performance has been met with critical acclaim, having garnered her the Daytime Emmy Award nomination for Outstanding Lead Actress in a Drama Series in 2006.
Casting
The role of Samantha McCall was originated by former Baywatch star and Playboy's April 1997 Playmate of the Month, Kelly Monaco on October 1, 2003. Monaco, who had previously portrayed Livvie Locke on the ABC Daytime spinoff soap opera Port Charles, was one of several performers from the cancelled soap to join the cast of the main show. Monaco had also auditioned for ABC Daytime's All My Children as well as CBS Daytime's As the World Turns, both of which were based in New York at the time, and Monaco's eagerness to stay on the West coast led to her ultimately signing with General Hospital, based in Los Angeles.
In 2005, Monaco joined the first season of ABC's Dancing with the Stars and was the first champion of what turned into a multi-season competition.
In August 2009, a casting call was sent out to recast the role of Sam, leaving fans shocked by her possible departure. Despite rumors and speculation, Monaco's co-stars Steve Burton (Jason Morgan) and Nancy Lee Grahn (Alexis Davis) denied she was departing from the show. Monaco herself dispelled the rumors, stating there was "really no doubt" she would renew her contract; it was merely standard procedure for ABC to release the casting call since she and the network had not signed off on a new contract by a set deadline.
In July 2020, it was announced that Monaco would take temporary leave from the role; in a social media post, Monaco's mother cited her need to take a 14-day self-isolated quarantine—following a "breathing problem" after production resumed—related to the COVID-19 pandemic in the United States. As a result, the role was recast with Lindsay Hartley, who appeared from August 4 to August 13, 2020. Monaco returned to the role on August 18. Hartley briefly filled in for Monaco again on February 3, 4 and 7, 2022.
Storylines
Backstory
Samantha, also known as Sam, is born on May 11, 1980, (Mother's Day) in Chatham, Maine to a 16-year-old Alexis Davidovitch (Nancy Lee Grahn). While at boarding school, Alexis' father, Mikkos Cassadi |
https://en.wikipedia.org/wiki/Heats%20of%20fusion%20of%20the%20elements%20%28data%20page%29 |
Heat of fusion
Notes
Values refer to the enthalpy change between the liquid phase and the most stable solid phase at the melting point (normal, 101.325 kPa).
References
CRC
As quoted from various sources in an online version of:
David R. Lide (ed), CRC Handbook of Chemistry and Physics, 84th Edition. CRC Press. Boca Raton, Florida, 2003; Section 6, Fluid Properties; Enthalpy of Fusion
LNG
As quoted from various sources in:
J.A. Dean (ed), Lange's Handbook of Chemistry (15th Edition), McGraw-Hill, 1999; Section 6, Thermodynamic Properties; Table 6.4, Heats of Fusion, Vaporization, and Sublimation and Specific Heat at Various Temperatures of the Elements and Inorganic Compounds
WEL
As quoted at http://www.webelements.com/ from these sources:
G.W.C. Kaye and T.H. Laby in Tables of physical and chemical constants, Longman, London, UK, 15th edition, 1993.
D.R. Lide, (ed.) in Chemical Rubber Company handbook of chemistry and physics, CRC Press, Boca Raton, Florida, USA, 79th edition, 1998.
A.M. James and M.P. Lord in Macmillan's Chemical and Physical Data, Macmillan, London, UK, 1992.
H. Ellis (Ed.) in Nuffield Advanced Science Book of Data, Longman, London, UK, 1972.
See also
Thermodynamic properties
Chemical element data pages |
https://en.wikipedia.org/wiki/Heats%20of%20vaporization%20of%20the%20elements%20%28data%20page%29 |
Heat of vaporization
Notes
Values refer to the enthalpy change in the conversion of liquid to gas at the boiling point (normal, 101.325 kPa).
References
Zhang et al.
CRC
As quoted from various sources in an online version of:
David R. Lide (ed.), CRC Handbook of Chemistry and Physics, 84th Edition. CRC Press. Boca Raton, Florida, 2003; Section 6, Fluid Properties; Enthalpy of Vaporization
GME
Kugler HK & Keller C (eds) 1985, Gmelin handbook of inorganic and organometallic chemistry, 8th ed., 'At, Astatine', system no. 8a, Springer-Verlag, Berlin, , pp. 116–117
LNG
As quoted from various sources in:
J.A. Dean (ed.), Lange's Handbook of Chemistry (15th Edition), McGraw-Hill, 1999; Section 6, Thermodynamic Properties; Table 6.4, Heats of Fusion, Vaporization, and Sublimation and Specific Heat at Various Temperatures of the Elements and Inorganic Compounds
WEL
As quoted at http://www.webelements.com/ from these sources:
G.W.C. Kaye and T. H. Laby in Tables of physical and chemical constants, Longman, London, UK, 15th edition, 1993.
D.R. Lide, (ed.) in Chemical Rubber Company handbook of chemistry and physics, CRC Press, Boca Raton, Florida, USA, 79th edition, 1998.
A.M. James and M.P. Lord in Macmillan's Chemical and Physical Data, Macmillan, London, UK, 1992.
H. Ellis (ed.) in Nuffield Advanced Science Book of Data, Longman, London, UK, 1972.
See also
Thermodynamic properties
Chemical element data pages |
https://en.wikipedia.org/wiki/Handle%20leak | A handle leak is a type of software bug that occurs when a computer program asks for a handle to a resource but does not free the handle when it is no longer used. If this occurs frequently or repeatedly over an extended period of time, a large number of handles may be marked in-use and thus unavailable, causing performance problems or a crash.
The term is derived from memory leak. Handle leaks, like memory leaks, are specific instances of resource leaks.
Causes
One cause of a handle leak is when a programmer mistakenly believes that retrieving a handle to an entity is simply obtaining an unmanaged reference, without understanding that a count, a copy, or other operation is actually being performed. Another occurs because of poor exception handling design patterns when programmers do not consider that when an exception occurs and a sub routine is exited prematurely, the cleanup code at the end of the routine may not be executed.
An example of this might be retrieving a handle to the display device. Programmers might use this handle to check some property (e.g. querying the supported resolutions), and then simply proceed on without ever releasing the handle. If the handle was just a pointer to some data structure with no additional management, then allowing the handle to pass out of scope would not cause an issue. However, in many cases, such handles must be explicitly closed or released to avoid leaking resources associated with them; the exact requirements for what must be done with a handle varies by interface.
References
Software bugs |
https://en.wikipedia.org/wiki/Dr.%20Watson%20%28debugger%29 | Dr. Watson is an application debugger included with the Microsoft Windows operating system. It may be named drwatson.exe, drwtsn32.exe or dwwin.exe, depending on the version of Windows.
Overview
The tool is named after Doctor Watson of Sherlock Holmes fame, the idea being that it would collect error information (symptoms) following a program crash. The use of the word "Watson" has since been expanded to include general end-user feedback services. The original name of this diagnostic tool was "Sherlock".
The information obtained and logged by Dr. Watson is the information needed by technical support personnel to diagnose a program error for a computer running Windows. A text file (usually drwtsn32.log) is created whenever an error is detected, and can be delivered to support personnel by the method they prefer. A crash dump file can also be created, which is a binary file that a programmer can load into a debugger. Dr. Watson can be made to generate more exacting information for debugging purposes if the appropriate symbol files are installed and the symbol search path (environment variable) is set.
When a program error occurs in Windows, the system searches for a program error handler. A program error handler deals with errors as they arise during the running of a program. If the system does not find a program error handler, the system verifies that the program is not currently being debugged and considers the error to be unhandled. The system then processes unhandled errors by looking in the registry for a program error debugger for which Dr. Watson is the default. A third-party debugger can also be used in place of Dr. Watson. The Watcom C Compiler includes a similar crash-analysis tool named "Dr. Watcom".
Beginning with Windows XP, Dr. Watson (drwtsn32.exe) was extended with (dwwin.exe) "Problem Reports and Solutions". On some versions of Windows the older version (drwatson.exe) may be available by typing "drwatson.exe" into the command prompt box or in the 'Search programs and files' box in the Start menu in Windows 7.
See also
Windows Error Reporting
ProcDump
References
External links
Kirk Glerum and Mike Hollinshead - Watson (what happens when your system crashes?)
How to disable Dr. Watson for Windows
Windows components
Windows administration |
https://en.wikipedia.org/wiki/KABC-TV | KABC-TV (channel 7) is a television station in Los Angeles, California, United States, serving as the West Coast flagship of the ABC network. Owned and operated by the network's ABC Owned Television Stations division, the station maintains studios in the Grand Central Business Centre of Glendale, and its transmitter is located on Mount Wilson.
History
Channel 7 first signed on the air under the call sign KECA-TV on September 16, 1949. It was the last television station licensed to Los Angeles operating on the VHF band to debut and the last of ABC's five original owned-and-operated stations to make its debut, after San Francisco's KGO-TV, which signed on four months earlier. It was also the last of the Los Angeles "classic seven" TV stations which were originally on the VHF dial, prior to the 2009 digital conversions. (No other stations debuted in Los Angeles until 1962, when the first two UHF Los Angeles stations launched (KIIX [now KWHY-TV] and KMEX-TV, channels 22 and 34, respectively).)
The station's call sign was named after Los Angeles broadcasting pioneer Earle C. Anthony, whose initials were also present on channel 7's then-sister radio station, KECA (790 AM, now KABC). On February 1, 1954, KECA-TV changed its call sign to KABC-TV.
Originally, KABC-TV was located at the ABC Television Center, now called The Prospect Studios, on Prospect Avenue in the Los Feliz neighborhood of Los Angeles, east of Hollywood. In 2000, KABC-TV moved to nearby Glendale into a new state-of-the-art facility designed by César Pelli, as part of the Disney Grand Central Creative Campus (GC3), in the Grand Central Business Centre on the site of the former Grand Central Airport. The station is currently located east (along the corridor of the Los Angeles River and State Route 134) of ABC's West Coast headquarters on the Walt Disney Studios lot in Burbank.
KABC-TV has used the Circle 7 logo since 1962 (the same year ABC created and implemented its current logo) and augmented its bottom left quadrant with the ABC network logo in 1997. The station's news anchors and reporters wear Circle 7 lapel pins when they appear on camera, a practice that had once been standard at each of the original five ABC-owned stations.
On February 4, 2006, KABC-TV became the first television station in the state of California to broadcast its local newscasts in high definition using HD cameras in the studio and debuted an updated set.
KABC-TV shut down its analog signal, over VHF channel 7, at noon on June 12, 2009, as part of the federally mandated transition from analog to digital television. The station's digital signal relocated from its pre-transition UHF channel 53, which was among the high band UHF channels (52–69) that were removed from broadcasting use as a result of the transition, to its analog-era VHF channel 7. After the transition occurred, some viewers had difficulty receiving KABC's signal, despite operating at a high effective radiated power of 25 kW. On March 31, 20 |
https://en.wikipedia.org/wiki/HabibMetro | Habib Metropolitan Bank, () commonly known as HABIBMETRO, is a Pakistani subsidiary of Swiss bank Habib Bank AG Zurich. It is based in Karachi, Pakistan. It has a branch network of 490+.
History
The bank was founded in October 1992 as Metropolitan Bank and subsequently started its operations.
Habib Bank AG Zurich was founded by Mohammed Ali Habib of the House of Habib as the government started privatization of the banking sector in Pakistan.
In 2006, Habib Bank AG Zurich's Pakistan operations were merged into Metropolitan Bank Limited and subsequently renamed Habib Metropolitan Bank Limited.
In 2015, HABIBMETRO won Asian Development Bank (ADB) award.
The parent bank, Habib Bank AG Zurich has operations in Hong Kong, Singapore, United Arab Emirates, Kenya, South Africa, United Kingdom and Canada.
FinCEN
HABIBMETRO was named in FinCEN leak, published by Buzzfeed News and the International Consortium of Investigative Journalists (ICIJ). It had two suspicious transactions flagged.
Awards
HABIBMETRO was awarded Best Islamic Banking Brand at the GIFA in 2020.
References
External links
Official Website
Pakistani subsidiaries of foreign companies
Companies listed on the Pakistan Stock Exchange
Pakistani companies established in 1992
Banks established in 1992
Banks of Pakistan
Companies based in Karachi
2006 mergers and acquisitions
Mergers and acquisitions of Pakistani companies |
https://en.wikipedia.org/wiki/Cascading%20%28software%29 | Cascading is a software abstraction layer for Apache Hadoop and Apache Flink. Cascading is used to create and execute complex data processing workflows on a Hadoop cluster using any JVM-based language (Java, JRuby, Clojure, etc.), hiding the underlying complexity of MapReduce jobs. It is open source and available under the Apache License. Commercial support is available from Driven, Inc.
Cascading was originally authored by Chris Wensel, who later founded Concurrent, Inc, which has been re-branded as Driven. Cascading is being actively developed by the community and a number of add-on modules are available.
Architecture
To use Cascading, Apache Hadoop must also be installed, and the Hadoop job .jar must contain the Cascading .jars. Cascading consists of a data processing API, integration API, process planner and process scheduler.
Cascading leverages the scalability of Hadoop but abstracts standard data processing operations away from underlying map and reduce tasks. Developers use Cascading to create a .jar file that describes the required processes. It follows a ‘source-pipe-sink’ paradigm, where data is captured from sources, follows reusable ‘pipes’ that perform data analysis processes, where the results are stored in output files or ‘sinks’. Pipes are created independent from the data they will process. Once tied to data sources and sinks, it is called a ‘flow’. These flows can be grouped into a ‘cascade’, and the process scheduler will ensure a given flow does not execute until all its dependencies are satisfied. Pipes and flows can be reused and reordered to support different business needs.
Developers write the code in a JVM-based language and do not need to learn MapReduce. The resulting program can be regression tested and integrated with external applications like any other Java application.
Cascading is most often used for ad targeting, log file analysis, bioinformatics, machine learning, predictive analytics, web content mining, and extract, transform and load (ETL) applications.
Uses of Cascading
Cascading was cited as one of the top five most powerful Hadoop projects by SD Times in 2011, as a major open source project relevant to bioinformatics and is included in Hadoop: A Definitive Guide, by Tom White. The project has also been cited in presentations, conference proceedings and Hadoop user group meetings as a useful tool for working with Hadoop and with Apache Spark
MultiTool on Amazon Web Services was developed using Cascading.
LogAnalyzer for Amazon CloudFront was developed using Cascading.
BackType - social analytics platform
Etsy - marketplace
FlightCaster - predicting flight delays
Ion Flux - analyzing DNA sequence data
RapLeaf - personalization and recommendation systems
Razorfish - digital advertising
Domain-Specific Languages Built on Cascading
PyCascading - by Twitter, available on GitHub
Cascading.jruby - developed by Gregoire Marabout, available on GitHub
Cascalog - authored by Nathan Marz, av |
https://en.wikipedia.org/wiki/Voyeur%20%28video%20game%29 | Voyeur is an interactive movie video game released in 1993 for the Philips CD-i. It was ported to MS-DOS compatible operating systems and Macintosh. A major selling point for the game was the "mature" content of the full-motion video sequences, with a number of simulated sex scenes.
A sequel was released for MS-DOS and Macintosh, Voyeur II, and a finished beta version of the sequel for Philips CD-i has been discovered.
Plot
The player takes on the role of a private investigator hired by a member of the wealthy Hawke family in order to gain enough evidence to bring down the corrupt Reed Hawke (played by Robert Culp), CEO of Hawke Industries. Hawke has gathered his family together for the weekend to prepare for his announcement that he will be running for President of the United States. The player controls a video camera located in a building opposite to spy on the Hawke family home in an effort to gather enough evidence to destroy Reed Hawke's career. The player character's client is randomly selected each time a new game is started, and the storyline also changes according to the player's actions.
Development
The design of Voyeur was inspired by the Alfred Hitchcock film Rear Window starring Jimmy Stewart, Grace Kelly, Wendell Corey, Thelma Ritter, and Raymond Burr. In the film, L. B. Jeffries (Stewart) looks into the rear windows of a building across the interior courtyard from his apartment. He is able to see only some of what is going on in the apartments. He has to imagine the rest. He eventually thinks a murder has been committed in one of the apartments. In his effort to get evidence on the murderer, he puts himself and his girlfriend, Lisa Fremont (Kelly), in mortal danger.
This dramatic device was the basis for the design of Voyeur. The player can only see partial scenes playing in the windows of the Reed Hawke mansion at any point in time in the narrative. They must decide what is happening and what they want to do about it based on this partial information. The design also makes use of a ticking clock. Scenes appear in the windows of the Hawke mansion only for a brief period of time. If the player misses any of them or chooses to look at something else, their sense of what is going on could be incomplete. The player has the weekend to stop the nomination of Reed Hawke for president. If they guess wrong about which member of the family is betraying Hawke, the player is killed by Chantal, his personal assistant.
Reception
In 1993 Voyeur Cd-i was featured in Time Magazine September 27, 1993 Attack of the Video Games. In 1994, Voyeur CD-i won seven Interactive Academy Awards including best director, best design and best actors male and female.
Reviewing the Macintosh version, a Next Generation critic remarked derisively on the limited interactivity of full motion video based games, but said that Voyeur is a superior game by the standards of its genre due to the solid acting. He gave it two out of five stars.
Next Generation revie |
https://en.wikipedia.org/wiki/Strut%20%28disambiguation%29 | A strut is a structural component.
Strut(s) may also refer to:
Technology and computing
Strut (typesetting), a vertical rule with no width
Strut bar, an automotive suspension accessory
Strut channel, a standardized formed structural system
MacPherson strut, a component of some vehicle suspensions
Apache Struts, a web application framework for Java
Film and television
Strut (TV series), a 2016 American reality show
Strut!, a documentary film by Max Raab
Music
The Struts, an English rock band
Strut Records, a British record label
Albums
Strut (album) or the title song (see below), by Lenny Kravitz 2014
Strut, by Kevin Toney, 2001
Strut, by Michael Kaeshammer, 2004
Songs
"Strut" (The Cheetah Girls song), 2006
"Strut" (Lenny Kravitz song), 2014
"Strut" (Sheena Easton song), 1984
"Strut", a song by Adam Lambert from For Your Entertainment, 2009
"Strut", a song by Bloc Party from Alpha Games, 2022
"Strut", a song by KMFDM from Blitz, 2009
"Strut", a song by Taj Mahal from Dancing the Blues, 1993
See also
"Her Strut", a 1980 song by Bob Seger
Strutt, a surname
Strutter (disambiguation) |
https://en.wikipedia.org/wiki/Departmental%20boot%20image | A departmental boot image is a boot image for any computer that has been enhanced by adding some applications and passwords specific to a task or group or department in an organization. This has many of the advantages of a thin client strategy, but can be done on any operating system base as long as the boot device is large enough to accommodate the boot and applications together.
A typical departmental Windows XP boot image is usually so large that it requires a DVD to store, and may be too large for network booting. Accordingly, it is usually installed on a fixed or removable hard drive kept inside the machine, rather than installed over a network or from a ROM.
There are some boot image control complexity and total cost of operations advantages to using a departmental boot image instead of a common boot image for the entire organization, or a thin client:
all the capabilities of a full operating system are available, not just those of a thin client
applications with inflexible software licenses need not be paid for the entire organization, but can be paid only for the departments that actually use them and have them installed on their machines
applications that interact badly can be segmented so that an accounting program and an engineering program do not "clobber each other's libraries" or otherwise interfere as they would if both sets of applications were installed in one boot image
overall size of each boot image can be controlled to fit within network or removable disk limits
Disadvantages include the complexity of creating and managing several large boot images, and determining when a department needs to upgrade its applications. If each user is allowed to do this on their own, then, the discipline soon degrades and the shop will be no easier to manage than one that consists of one-off computers with their own quirks, frequently requiring re-imaging and whose issues are not really diagnosable nor comparable to each other. Some experts believe that any departmental boot image regime degrades rather quickly to this state without extraordinary discipline and controls, and advocate thin clients to ensure such control.
It is however increasingly possible to restrict users from installing "their own" applications on a standard boot image, and to automatically re-install when a variant boot image is detected. While this would be draconian in a large organization with one boot image it is often quite acceptable when the boot image is maintained at a departmental level and users can request that it be upgraded with a minimum of bureaucracy and waiting.
Booting
Disk images |
https://en.wikipedia.org/wiki/CERT%20Polska | CERT Polska is Computer Emergency Response Team which operates within the structures of Naukowa i Akademicka Sieć Komputerowa (Scientific and Academic Computer Network or NASK) – a research institute which conducts scientific activity, operates the national .pl domain registry and provides advanced IT network services. CERT Polska is the first Polish computer emergency response team. Active since 1996 in the environment of response teams, it became a recognised and experienced entity in the field of computer security. Since its launch, the core of the team's activity has been handling security incidents and cooperation with similar units worldwide. It also conducts extensive R&D into security topics.
In 1997, CERT Polska became a member of the international forum of response teams – FIRST, and since 2000 it has been a member of the working group of European response teams – TERENA TF-CSIRT and an associated organisation Trusted Introducer. In 2005 on the initiative of CERT Polska, a forum of Polish abuse teams was created - Abuse FORUM, while in 2010 CERT Polska joined Anti-Phishing Working Group, an association of companies and institutions which actively fight on-line crime.
The main tasks of CERT Polska include:
registration and handling of network security incidents for Poland and the “.pl” domain name space;
providing watch & warning services to Internet users in Poland;
active response in case of direct threats to users;
cooperation with other CERT teams in Poland and worldwide;
participation in national and international projects related to IT security;
research activity in relation to methods of detecting security incidents, analysis of malware, systems for exchanging information on threats;
development of proprietary tools for detection, monitoring, analysis, and correlation of threat;
regular publication of CERT Polska Report on security of Polish on-line resources;
information/education activities aimed at increasing the awareness in relation to IT security;
performing independent analyses and testing solutions related to IT security.
Notes
External links
CSIRT Description for CERT Polska
Homepage
Internet in Poland
Computer emergency response teams |
https://en.wikipedia.org/wiki/Off-the-record%20messaging | Off-the-Record Messaging (OTR) is a cryptographic protocol that provides encryption for instant messaging conversations. OTR uses a combination of AES symmetric-key algorithm with 128 bits key length, the Diffie–Hellman key exchange with 1536 bits group size, and the SHA-1 hash function. In addition to authentication and encryption, OTR provides forward secrecy and malleable encryption.
The primary motivation behind the protocol was providing deniable authentication for the conversation participants while keeping conversations confidential, like a private conversation in real life, or off the record in journalism sourcing. This is in contrast with cryptography tools that produce output which can be later used as a verifiable record of the communication event and the identities of the participants. The initial introductory paper was named "Off-the-Record Communication, or, Why Not To Use PGP".
The OTR protocol was designed by cryptographers Ian Goldberg and Nikita Borisov and released on 26 October 2004. They provide a client library to facilitate support for instant messaging client developers who want to implement the protocol. A Pidgin and Kopete plugin exists that allows OTR to be used over any IM protocol supported by Pidgin or Kopete, offering an auto-detection feature that starts the OTR session with the buddies that have it enabled, without interfering with regular, unencrypted conversations. Version 4 of the protocol has been in development since 2017 by a team led by Sofía Celi, and reviewed by Nik Unger and Ian Goldberg. This version aims to provide online and offline deniability, to update the cryptographic primitives, and to support out-of-order delivery and asynchronous communication.
History
OTR was presented in 2004 by Nikita Borisov, Ian Avrum Goldberg, and Eric A. Brewer as an improvement over the OpenPGP and the S/MIME system at the "Workshop on Privacy in the Electronic Society" (WPES). The first version 0.8.0 of the reference implementation was published on 21 November 2004. In 2005 an analysis was presented by Mario Di Raimondo, Rosario Gennaro, and Hugo Krawczyk that called attention to several vulnerabilities and proposed appropriate fixes, most notably including a flaw in the key exchange. As a result, version 2 of the OTR protocol was published in 2005 which implements a variation of the proposed modification that additionally hides the public keys. Moreover, the possibility to fragment OTR messages was introduced in order to deal with chat systems that have a limited message size, and a simpler method of verification against man-in-the-middle attacks was implemented.
In 2007 Olivier Goffart published mod_otr for ejabberd, making it possible to perform man-in-the-middle attacks on OTR users who don't check key fingerprints. OTR developers countered this attack by introducing a socialist millionaire protocol implementation in libotr. Instead of comparing key checksums, knowledge of an arbitrary shared secret can be ut |
https://en.wikipedia.org/wiki/Xlib | Xlib (also known as libX11) is an X Window System protocol client library written in the C programming language. It contains functions for interacting with an X server. These functions allow programmers to write programs without knowing the details of the X protocol.
Few applications use Xlib directly; rather, they employ other libraries that use Xlib functions to provide widget toolkits:
X Toolkit Intrinsics (Xt)
Athena widget set (Xaw)
Motif
FLTK
GTK
Qt (X11 version)
Tk
SDL (Simple DirectMedia Layer)
SFML (Simple and Fast Multimedia Library)
Xlib appeared around 1985, and is used in GUIs for many Unix-like operating systems. A re-implementation of Xlib was introduced in 2007 using XCB.
Data types
The main types of data in Xlib are the Display structure and the types of the identifiers.
Informally, a display is a physical or virtual device where graphical operations are done. The Display structure of the Xlib library contains information about the display, but more importantly it contains information relative to the channel between the client and the server. For example, in a Unix-like operating system, the Display structure contains the file handle of the socket of this channel (this can be retrieved using the ConnectionNumber macro.) Most Xlib functions have a Display structure as an argument because they either operate on the channel or are relative to a specific channel. In particular, all Xlib functions that interact with the server need this structure for accessing the channel. Some other functions need this structure, even if they operate locally, because they operate on data relative to a specific channel. Operations of this kind include for example operations on the event queue, which is described below.
Windows, colormaps, etc. are managed by the server, which means that the data about their actual implementation is all stored in the server. The client operates on these objects by using their identifiers. The client cannot directly operate on an object, but can only request the server to perform the operation specifying the identifier of the object.
The types Windows, Pixmap, Font, Colormap, etc. are all identifiers, which are 32-bit integers (just as in the X11 protocol itself). A client 'creates' a window by requesting that the server create a window. This is done via a call to an Xlib function that returns an identifier for the window, that is, a number. This identifier can then be used by the client for requesting other operations on the same window to the server.
The identifiers are unique to the server. Most of them can be used by different applications to refer to the same objects. For example, two applications connecting with the same server use the same identifier to refer to the same window. These two applications use two different channels, and therefore have two different structures; however, when they request operations on the same identifier, these operations will be done on the same object.
Protocol an |
https://en.wikipedia.org/wiki/%40stake | ATstake, Inc. was a computer security professional services company in Cambridge, Massachusetts, United States. It was founded in 1999 by Battery Ventures (Tom Crotty, Sunil Dhaliwal, and Scott Tobin) and Ted Julian. Its initial core team of technologists included Dan Geer (Chief Technical Officer) and the east coast security team from Cambridge Technology Partners (including Dave Goldsmith).
History
In January 2000, @stake acquired L0pht Heavy Industries (who were known for their many hacker employees), bringing on Mudge as its Vice President of Research and Development. Its domain name was atstake.com. In July 2000, @stake acquired Cerberus Information Security Limited of London, England, from David and Mark Litchfield and Robert Stein-Rostaing, to be their launchpad into Europe, the Middle East and Africa. @stake was subsequently acquired by Symantec in 2004.
In addition to Dan Geer and Mudge, @stake employed many famous security experts including Dildog, Window Snyder, Dave Aitel, Katie Moussouris, David Litchfield, Mark Kriegsman, Mike Schiffman, the grugq, Chris Wysopal, Alex Stamos, Cris Thomas, and Joe Grand.
In September 2000, an @stake recruiter contacted Mark Abene to recruit him for a security consultant position. The recruiter was apparently unaware of his past felony conviction since @stake had a policy of not hiring convicted hackers. Mark was informed by a company representative that @stake could not hire him, saying: "We ran a background check." This caused some debate regarding the role of convicted hackers working in the security business.
@stake was primarily a consulting company, but also offered information security training through the @stake academy, and created a number of software security tools:
LC 3, LC 4 and LC 5 were versions of a password auditing and recovery tool also known as L0phtCrack
WebProxy was a security testing tool for Web applications
SmartRisk Analyzer was an application security analysis tool
The @stake Sleuth Kit (TASK) was an open source digital forensics tool (now called The Sleuth Kit).
Symantec later stopped selling LC5 to new customers citing US Government export regulations, and discontinued support in December 2006. In January 2009, L0phtCrack was acquired by the original authors from Symantec; L0phtCrack 6 was announced at the SOURCE Boston Conference on March 11, 2009. The technology underlying SmartRisk Analyzer was extended, and eventually brought to market by the Symantec spinoff Veracode.
Symantec announced its acquisition of @stake on September 16, 2004, and completed the transaction on October 9, 2004.
Several members of @Stake left to form the computer security company "iSEC Partners" in 2004. Former @stake academy instructors Rob Cheyne and Paul Hinkle later formed the information security training company "Safelight Security Advisors" in 2007. The remaining portion of the @Stake consulting group continues to operate as the "Security Advisory Services" team within |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.