source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/IBM%202540
The IBM 2540 is a punched-card computer peripheral manufactured by IBM Corporation for use of System/360 and later computer systems. The 2540 was designed by IBM's Data Processing Division in Rochester, Minnesota, and was introduced in 1965. The 2540 can read punched-cards at 1000 cards per minute (CPM) and punch at 300 CPM. The 2540 is based on the design of the older, slightly slower, 1402. Description The 2540 attaches to a System/360 multiplexer or selector channel through an IBM 2821 Control Unit. A standard 2540 processes standard IBM 80 column punched cards. The card reader (2540R) and card punch (2540P) devices are separately addressable and function independently. The 2540 normally reads and punches EBCDIC data, called data-mode 1. Card reader On the right side of the device is the reader, consisting of an input hopper holding approximately 3100 cards, and three output stackers (right to left – R1, R2, and RP3) each holding approximately 1350 cards. Cards can be directed to an output stacker under program control. Card punch On the left side of the device is the punch, with an input hopper holding about 1350 cards, and three output stackers (left to right – P1, P2, and RP3) each holding 1350 cards. The center stacker (RP3) is shared between the reader and the punch, but is not intended to be used by both at the same time. Cards can be directed to an output stacker under program control. The card is read after punching to ensure that the data was punched correctly. Special features Column binary – this feature, data-mode 2, allows all possible combinations of holes to be read or punched in a column. Punch-feed-read – this feature allows input cards to be read by the punch unit and data simultaneously punched into the same card. This feature was not normally supported by spooling software. 51-column Interchangeable Read Feed – this feature allows the 2540 to read 51-column "stub" cards in addition to standard 80-column cards. Operator setup was required to change card size, so the two sizes could not be intermixed. Installation of this feature reduced the capacities of stackers R1 and R2 to around 800 cards, and reduced read speed to 800 CPM. Successors With the introduction of System/370 IBM announced the improved 3525 card punch and the 3505 card reader in 1971. See also List of IBM products IBM 1442 References External links IBM Systems Reference Library: IBM 2540 Component Description and Operating Procedures (A21-9033-1) 2540 IBM System/360 mainframe line Card reader (punched cards)
https://en.wikipedia.org/wiki/List%20of%20mobile%20network%20operators%20of%20the%20Americas
This is a list of mobile network operators of the Americas. Anguilla Antigua and Barbuda The country has a 127% penetration rate. Argentina The country has a 147% penetration rate = 61.2m mobile subscribers (February 2014) Aruba The country's telecom regulator is the DTZ Bahamas The country has 0.318 million subscribers in total, or an 84% penetration rate. (September 2015) Barbados The country's telecom regulator is the Telecom Unit, under the Division of Energy and Telecommunications within the Prime Minister's Office. Belize Bermuda Bolivia The country has 10.2 million subscribers in total for a population of 10.56 million, or a 96.3% penetration rate. (December 2015) The country's telecom regulator is ATT. Bonaire Brazil The country has 252 million subscribers in total, or a 121.3% penetration rate. (Q4 2022) Anatel regulates the country's telecommunications. Technologies like AMPS, TDMA, iDEN and CDMA 1x/EV-DO were used in the past by some of those networks and have been phased out in favor of newer systems. On 20 April 2022, Oi’s mobile network operations were sold to the country's three largest carriers, Vivo, Claro and TIM. Over the next twelve months, customers will be migrated to one of the other three carriers based on their area codes. British Virgin Islands Canada The country's telecom regulator is the Canadian Radio-television and Telecommunications Commission (CRTC). However, it does not regulate most aspects of mobile phone service; prices and service quality are not regulated at all, while spectrum allocation is handled by Innovation, Science and Economic Development Canada. There are numerous mobile virtual network operators, such as Virgin Mobile Canada. These are not presently listed due to difficulty retrieving data for all such operators, and uncertainty as to whether the figures below include MVNOs operating on the applicable networks. Cayman Islands The British overseas territory has ? million subscribers in total, or a 5% penetration rate. Chile The country's telecom regulator is Subsecretaría de Telecomunicaciones (Subtel), and, as of June 2022, has 26.29 million subscribers in total, including prepaid and postpaid customers, and a 132.57% penetration rate. Colombia The country has 82.2 million subscribers in total. (First Trimester 2023) The country's telecom regulator is the CRC (Comisión de Regulación de Comunicaciones). Costa Rica The country has 7.1 million subscribers in total; with 4.76 million people there are about 149 mobile lines for every 100 citizens (149% penetration rate). Until 2011, Instituto Costarricense de Electricidad had a monopoly on wireless communications. In November 2011, after the market was open as required by DR-CAFTA, Claro and Movistar started service. The country's telecom regulator is SUTEL (Spanish) Cuba The country has over 6 million subscribers in total, or a 45% penetration rate as of December 2019. Curaçao Dominica Dominican Republic The country has 9.
https://en.wikipedia.org/wiki/List%20of%20mobile%20network%20operators%20of%20the%20Asia%20Pacific%20region
This is a list of all mobile phone carriers in the Asia Pacific Region and their respective number of subscribers. Afghanistan The country's telecom regulator is the Afghanistan Telecommunications Regulatory Authority (ATRA). American Samoa , American Samoa has 32,000 subscribers in total, or an 85% penetration rate. Australia The country's telecom regulator is the Australian Communications and Media Authority. Bangladesh The total number of Mobile Phone subscriptions in Bangladesh has reached 185.13 million at the end of May 2023. The country's telecom regulator is the Bangladesh Telecommunication Regulatory Commission (BTRC). Bhutan Bougainville Brunei Darussalam , the penetration rate in Brunei Darussalam was 114%, over a population estimate of over 400,000. The country's telecom regulator is the Authority for Info-communications Technology Industry (AITI). Cambodia , the penetration rate in Cambodia was estimated at 69.318% over a population estimate of over 14.7 million. China (mainland) The country's telecom regulator is the Ministry of Industry and Information Technology. Cook Islands , Cook Islands has 6,000 subscribers in total. Fiji , the penetration rate in Fiji was estimated at 79.957% over a population estimate of around 0.9 million. French Polynesia , the penetration rate in French Polynesia was estimated at 98.7% over a population estimate of around 268.000. Guam , Guam has 185,000 subscribers in total. Hong Kong , the penetration rate in Hong Kong was estimated at 275% over a population estimate of over 7.521 million, with 23.21 million public mobile subscriptions. Hong Kong's telecom regulator is the Office of the Communications Authority (OFCA). , there were 24 registered Mobile Virtual Network Operators, apart from the 4 major mobile network operators in Hong Kong. India Indonesia Indonesia has 254.792 million subscribers in total (April 2018), or a 142.00% penetration rate (January 2017). The regulatory authority for telecommunication in Indonesia is the Ministry of Communication and Informatics, having taking over the roles from the (Indonesia Telecommunication Regulatory Agency), which was dissolved in November 2021. Japan , Japan has 182.15 million subscribers in total, or a 144.61% penetration rate. Kazakhstan , the penetration rate in Kazakhstan was estimated at 131.09% over a population estimate of around 19.08 million, with 25.012 million mobile subscriptions. Kyrgyzstan , Kyrgyzstan has 6.6 million subscribers in total, a 120% penetration rate. Laos , Laos mobile penetration was 70.86% with 4.841 millions subscriptions. Macau , Macau had about 1.969 million subscribers in total. Macau's telecom regulator is Direcção dos Serviços de Correios e Telecomunicações (DSRT). Malaysia , the penetration rate in Malaysia was estimated at 144.2%. The country's telecom regulator is the Malaysian Communications and Multimedia Commission. Maldives , the penetration rate in Maldives
https://en.wikipedia.org/wiki/List%20of%20mobile%20network%20operators%20of%20Europe
A mobile network operator or MNO (also known as a wireless service provider, wireless carrier, cellular company, or mobile network carrier) is a provider of wireless communications services. The main MNOs in Europe are listed below. Albania Albania as per Q1 2021 has 3.66 million subscribers, out of which there are 2.49 million active users (101% penetration rate). An active user is the number of users that communicated in the last three months. The regulatory authority for telecommunication in Albania is the AKEP. In 2022 4iG group, owning ONE Telecommunications, acquires majority stake of ALBtelecom Mobile (80.27%) . Leading to a network merger on 2023. Andorra Andorra has 88,109 mobile subscribers or about 113.63% mobile penetration. Armenia As of 2017, Armenia has 3.5 million subscribers in total, and a 120% penetration rate. Austria Austria has 13,0 million assigned numbers (i.e. 2,0 2G, 10,8 3G and 0,1 4G SIM cards), or a 151.0% penetration rate (Q4 2014). The Regulatory Authority for telecommunication in Austria is the Austrian Regulatory Authority for Broadcasting and Telecommunications (RTR). Azerbaijan In December 2005, Azerbaijan had 2 million subscribers in total, a 25% penetration rate. In 2014, Azerbaijan has over 10 million subscribers in total and 130% penetration rate. Belarus Belarus has 12.0 million subscribers in total, or a 126% penetration rate. (Q4 2020) The Regulatory Authority for telecommunication in Belarus is the Ministry of Communications and Informatization. Belgium Belgium has 13.89 million subscribers in total, or a 124% penetration rate (Q4 2014). The Regulatory Authority for telecommunication in Belgium is the Belgian Institute for Postal services and Telecommunications (BIPT). Bosnia and Herzegovina In December 2022, Bosnia and Herzegovina had 3.811 million subscribers in total, or a penetration rate. The Regulatory Authority for telecommunication in Bosnia and Herzegovina is the Communications Regulatory Agency (Regulatorna agencija za komunikacije, RAK). Bulgaria Bulgaria has 7 964 361 subscribers in total, or a 123,5% penetration rate according to the CRC annual report for 2022. The Regulatory Authority for Telecommunication in Bulgaria is the Communications Regulation Commission (CRC). Croatia Croatia has 4,404,652 subscribers in total, or a 102,8% penetration rate. (4Q 2019) The Regulatory Authority for telecommunication in Croatia is the Hrvatska agencija za poštu i elektronicke komunikacije (website available in Croatian and English language). Cyprus Cyprus has 1.392.480 subscribers in total, or a 151.7% penetration rate (excludes Northern Cyprus). The Regulatory Authority for telecommunication in Cyprus (excluding Northern Cyprus) is OCECPR (Office of the Commissioner of Electronic Communications and Postal Regulation). Czechia The Czech Republic has 16.121 million subscribers in total, or a 151% penetration rate (December 2019). The Regulatory Authority for
https://en.wikipedia.org/wiki/List%20of%20mobile%20network%20operators%20of%20the%20Middle%20East%20and%20Africa
This is a list of mobile network operators of the Middle East and Africa. Algeria In Q2 of 2021, the penetration rate was estimated at 104.13% over a population estimate of 44.02 million. The telecom regulator in Algeria is Autorité de Régulation de la Poste et des Télécommunications (ARPT). Angola In September 2010 the penetration rate was estimated at 63.7% over a population estimate of 13.3 million. The telecom regulator in Angola is Instituto Angolano das Comunicações (INACOM). Bahrain At the end of 2011 the penetration rate was estimated at 133% over a population estimate of 1.27 million. The telecom regulator in Bahrain is Telecommunications Regulatory Authority of Bahrain (TRA). Benin In December 2015, the penetration rate was estimated at 90.33% (in 2014, the population was estimated as 10.33 millions). The telecom regulator in Benin is Autorité de régulation des communications électroniques et de la poste (ARCEP Benin). Botswana In March 2015 the penetration rate was 167% over a population estimate of 2.05 millions. The telecom regulator in Botswana is Botswana Communications Regulatory Authority (BOCRA). Burkina Faso In December 2011 the penetration rate was estimated at 36% over a population estimate of 16.7 million. The telecom regulator in Burkina Faso is Autorité de régulation des communications électroniques et des postes (ARCEP), the current name of the former Autorité de régulation des communications électroniques (ARCE) and of the previous Autorité de régulation des télécommunications (ARTEL). Burundi In 2011 the penetration rate was estimated at 20% over a population estimate of 8 million. The telecom regulator in Burundi is Agence de Régulation et de Contrôle des Télécommunications (ARCT). Cabo Verde In September 2010 the penetration rate was estimated at 87.5% over a population estimate of 0.5 million. The telecom regulator in Cabo Verde is Agência Nacional de Comunicações (ANAC). Cameroon In July 2011 the penetration rate was estimated at 43% over a population estimate of 19.7 million. The telecom regulator in Cameroon is Agence de Régulation des Télécommunications (ART). Central African Republic In September 2010 the penetration rate was estimated at 17.2% over a population estimate of 4.9 million. The telecom regulator in Central African Republic is Agence de régulation des télécommunications (ART). Chad In September 2010 the penetration rate was estimated at 24.3% over a population estimate of 10.7 million. The telecom regulator in Chad is Office Tchadien de Régulation des Télécommunications (OTRT). Comoros In September 2010 the penetration rate was estimated at 20.8% over a population estimate of 0.8 million. The telecom regulator in Comoros is Autorité Nationale de Régulation des TIC (ANRTIC). Congo In Q4 2015 the penetration rate was estimated at 95.7% over a population estimate of 4.6 million. The telecom regulator in Congo is Agence de Régulation des postes et des Communications Electroniqu
https://en.wikipedia.org/wiki/NRG%20Networks
NRG Networks is a UK-based business networking organisation, founded in June 2004 by Kim Sharman and Martin Davies to facilitate the development of business relationships based on trust and knowledge between SME Business Owners in a social network environment. Dave Clarke joined as Chief Executive at the end of 2004 and identified that these business relationships resulted in a network of advocates. Networking for Advocates was subsequently introduced as the NRG networking model. Kim Sharman retired at the end of 2006. The model of "Networking for Advocates" was investigated in some research conducted by Martin Davies and Roger Croft of the University of Bath. The purpose of the research was to further understand the importance of developing trust in business relationships. The research identified certain networking transactions as the currency of developing trusted business relationships. This led to the development of the NRG Networking System based on this Advocacy Model. NRG Business Networking Advocate Model: The organisation is structured around local groups, and primarily delivers its benefits via a monthly lunch meeting, preceded by a business development seminar. References Knowledge West > Services > Innovation Networks, businesses and universities working together NRG to advise on business growth, Financial Times Article May 27, 2006 External links NRG website Professional networks Business organisations based in the United Kingdom
https://en.wikipedia.org/wiki/ExploreZip
ExploreZip (also known as I-Worm.ZippedFiles) is a destructive computer worm that attacks machines running Microsoft Windows. It was first discovered in Israel on June 6, 1999. The worm contains a malicious payload, and utilizes Microsoft Outlook, Outlook Express, or Exchange to mail itself out by replying to unread messages in the user's inbox. The worm also searches mapped drives and networked computers for Windows installations. If found, it copies itself to the Windows folder of the remote computer and then modifies the Win.ini file of the infected computer. On January 8, 2003, Symantec discovered a packed variant of this threat which exhibits the same characteristics. Distribution The worm is distributed in the form of an e-mail with the words:Hi ! I have received your email and I shall send you a reply ASAP. Till then, take a look at the attached zipped docs. bye Payload The message includes an attachment with the name ZIPPED_FILES.EXE. If opened, a dialog box appears in Windows resembling the one normally appearing when opening a corrupted Zip archive, while the worm copies itself onto the machine's hard drive. It also modifies the WIN.INI file (Windows 9x) or the Windows Registry (Windows NT) so that it re-executes on reboot. The worm looks for a copy of Microsoft Outlook to mail itself to all other people in the user's address book. It then destroys Microsoft Office documents, C, C++, and assembly language source files on the user's hard drive by overwriting them with zero-byte files. References External links Worm.ExploreZip – Symantec.com The ExploreZip worm - Computer Incident Advisory Capability (US Department of Energy) Email worms Hacking in the 1990s
https://en.wikipedia.org/wiki/Nested%20sampling%20algorithm
The nested sampling algorithm is a computational approach to the Bayesian statistics problems of comparing models and generating samples from posterior distributions. It was developed in 2004 by physicist John Skilling. Background Bayes' theorem can be applied to a pair of competing models and for data , one of which may be true (though which one is unknown) but which both cannot be true simultaneously. The posterior probability for may be calculated as: The prior probabilities and are already known, as they are chosen by the researcher ahead of time. However, the remaining Bayes factor is not so easy to evaluate, since in general it requires marginalizing nuisance parameters. Generally, has a set of parameters that can be grouped together and called , and has its own vector of parameters that may be of different dimensionality, but is still termed . The marginalization for is and likewise for . This integral is often analytically intractable, and in these cases it is necessary to employ a numerical algorithm to find an approximation. The nested sampling algorithm was developed by John Skilling specifically to approximate these marginalization integrals, and it has the added benefit of generating samples from the posterior distribution . It is an alternative to methods from the Bayesian literature such as bridge sampling and defensive importance sampling. Here is a simple version of the nested sampling algorithm, followed by a description of how it computes the marginal probability density where is or : Start with points sampled from prior. for to do % The number of iterations j is chosen by guesswork. current likelihood values of the points; Save the point with least likelihood as a sample point with weight . Update the point with least likelihood with some Markov chain Monte Carlo steps according to the prior, accepting only steps that keep the likelihood above . end return ; At each iteration, is an estimate of the amount of prior mass covered by the hypervolume in parameter space of all points with likelihood greater than . The weight factor is an estimate of the amount of prior mass that lies between two nested hypersurfaces and . The update step computes the sum over of to numerically approximate the integral In the limit , this estimator has a positive bias of order which can be removed by using instead of the in the above algorithm. The idea is to subdivide the range of and estimate, for each interval , how likely it is a priori that a randomly chosen would map to this interval. This can be thought of as a Bayesian's way to numerically implement Lebesgue integration. Implementations Example implementations demonstrating the nested sampling algorithm are publicly available for download, written in several programming languages. Simple examples in C, R, or Python are on John Skilling's website. A Haskell port of the above simple codes is on Hack
https://en.wikipedia.org/wiki/Framework
A framework is a generic term commonly referring to an essential supporting structure which other things are built on top of. Framework may refer to: Computing Application framework, used to implement the structure of an application for an operating system Architecture framework Content management framework, reusable components of a content management system CSS framework Enterprise architecture framework Framework (office suite), a DOS office application suite in 1984 Framework Computer, a laptop manufacturer for modular laptops Framework-oriented design, uses existing frameworks for application design List of rich web application frameworks Logical framework Multimedia framework, handles media on a computer and through a network Software framework, a reusable set of libraries or classes for a software system or subsystem Web framework, for development of dynamic websites, web applications, and web services Education Australian Qualifications Framework, the hierarchy of educational qualifications in Australia Curriculum framework, a plan, standards or learning outcomes that define content to be learned European Qualifications Framework, a hierarchy of educational qualifications in the European Union Malaysian Qualifications Framework, the hierarchy of educational qualifications in Malaysia National Framework of Qualifications, the hierarchy of educational qualifications in Ireland Schools Interoperability Framework, a data sharing specification for academic institutions Government and law Framework agreement Framework decision, a legislative act of the European Union Legal framework, a form of legal doctrine Local development framework, a spatial planning strategy Logical framework approach, a management tool used in international development projects National Service Framework, policies by the National Health Service of the United Kingdom Music The Framework, Canadian indie-rock band Frameworks (band), American post-hardcore band Frameworks, 2015 album by Samuel Seo "Framework", 2013 song by The Story So Far from What You Don't See Other uses Conceptual framework, a set of theories that serve as the guiding principles of research Cultural framework, traditions, value systems, myths, and symbols that are common in a society Framework (building), a proposed building in Portland, Oregon Framework interpretation (Genesis), an interpretation of the first chapter of Genesis Framework region, a region in the variable domain of a protein Media engagement framework, a construct to understand social media marketing-based audiences Framework Computer, a company to provide a sustainable and repairable laptop See also Frame (disambiguation) Framing (disambiguation) Framework convention (disambiguation) Framework Directive (disambiguation)
https://en.wikipedia.org/wiki/List%20of%20Might%20and%20Magic%20media
This is a list of media related to the Might and Magic series of role-playing video games. Might and Magic was originally created by New World Computing, and was later produced by The 3DO Company and Ubisoft. This list contains all officially released, scheduled, and canceled Might and Magic media, as well as some released fan made add ons. Video games Might and Magic Might and Magic Book One: The Secret of the Inner Sanctum (1986) Might and Magic II: Gates to Another World (1988) Might and Magic III: Isles of Terra (1991) Might and Magic IV: Clouds of Xeen (1992) Might and Magic V: Darkside of Xeen (1993) Might and Magic VI: The Mandate of Heaven (1998) Might and Magic VII: For Blood and Honor (1999) Might and Magic VIII: Day of the Destroyer (2000) Might and Magic IX (2002) Might & Magic X: Legacy (2014) Anthologies Might and Magic Trilogy (1993), includes Might and Magic games III, IV, V, and the fanmade Swords of Xeen. Might and Magic I, II, III, IV, V: Collection Classique (1998), contains the games I-V. Ultimate Might and Magic Archives (1998), includes the first five Might and Magic games, World of Xeen and the fanmade Swords of Xeen. Might and Magic VI: The Mandate of Heaven – Limited Edition (1998), a collector's edition of Might and Magic VI that included the first five games on CD-ROM as well. Might and Magic VI: The Mandate of Heaven – Special Edition (1998), included Might and Magic games I, II, III, IV, V and the fanmade Swords of Xeen as well. Might and Magic Sixpack (1998), includes the first six Might and Magic games. Might and Magic Millennium Edition (1999), includes the Might and Magic games IV, V, VI and VII. Might and Magic (Platinum Edition) (2002), includes the Might and Magic games VI, VII, VIII and IX. Heroes of Might and Magic Heroes of Might and Magic: A Strategic Quest (1995) Heroes of Might and Magic II: The Succession Wars (1996) The Price of Loyalty (1997) Heroes of Might and Magic III: The Restoration of Erathia (1999) Armageddon's Blade (1999) The Shadow of Death (2000) Heroes Chronicles Warlords of the Wasteland (2000) Conquest of the Underworld (2000) Clash of the Dragons (2000) Masters of the Elements (2000) The World Tree (2000) The Fiery Moon (2000) Revolt of the Beastmasters (2001) The Sword of Frost (2001) Heroes of Might and Magic IV (2002) The Gathering Storm (2002) Winds of War (2003) Heroes of Might and Magic V (2006) Hammers of Fate (2006) Tribes of the East (2007) Might & Magic Heroes VI (2011) Pirates of the Savage Sea (2012) Danse Macabre (2012) Shades of Darkness (2013) Might & Magic Heroes VII (2015) Spin-offs Swords of Xeen (1995) Might and Magic Online (MMORPG; canceled ca. 1997-98) Arcomage (1999) Crusaders of Might and Magic (1999) Heroes of Might and Magic for the Game Boy Color (2000) Heroes of Might and Magic II for the Game Boy Color (2000) Warriors of Might and Magic (2000) Heroes of Might and Magic: Quest for the Dragon Bone Staff (2001) Lege
https://en.wikipedia.org/wiki/InfoAg%20Conference
The InfoAg Conferences are a source for information on technology in crop production, data management, and communication. Sponsored by the Foundation for Agronomic Research (FAR) and the International Plant Nutrition Institute (IPNI), the InfoAg conferences feature a line-up of speakers, interest areas, and demonstrations. Previous venues 1995 - Champaign, IL - Chancellor Hotel, June 27-30, 1995 1996 - Champaign, IL - University of Illinois 1997 - Champaign, IL - University of Illinois 1999 - West Lafayette, IN - Purdue University, August 9-11, 1999 2001 - Indianapolis, IN - InfoAg 2001, August 7-9 2003 - Indianapolis, IN - InfoAg 2003, July 30-August 1 2005 - Springfield, IL - InfoAg 2005, July 19-21 2007 - Springfield, IL - InfoAg 2007, July 10-12 2009 - Springfield, IL - InfoAg 2009, July 14-16 2011 - Springfield, IL - InfoAg 2011, July 12-14 2013 - Springfield, IL - InfoAg 2013, July 16-18 2014 - St. Louis, MO - InfoAg 2014, July 29-31 2015 - St. Louis, MO - InfoAg 2015, July 28-30 2016 - St. Louis, MO - InfoAg 2016, August 2-4, 2016 2019 - St. Louis, MO - InfoAg 2019, July 22-25, 2019 Forthcoming venues 2021 - St. Louis, MO - InfoAg 2021, 27–29 July 2021 (no 2020 conference) Regional Conferences In 2005, the InfoAg Conferences began holding regional conferences focused on regional concerns, crops, and speakers. Mid-South 2005 - Tunica, MS - InfoAg Mid-South 2005 Mid-South 2007 - Starkville, MS - InfoAg Mid-South 2007 Northwest 2007 - Kennewick, WA - InfoAg Northwest 2007 Conferences in the United States Agricultural shows in the United States Agronomy
https://en.wikipedia.org/wiki/Zotero
Zotero () is a free and open-source reference management software to manage bibliographic data and related research materials, such as PDF files. Features include web browser integration, online syncing, generation of in-text citations, footnotes, and bibliographies, an integrated PDF reader and note editor, as well as integration with the word processors Microsoft Word, LibreOffice Writer, and Google Docs. It was originally created at the Center for History and New Media at George Mason University and, as of 2021, is developed by the non-profit Corporation for Digital Scholarship. Features When the Zotero Connector extension is installed in a compatible web browser, a special icon appears in the browser toolbar when a catalog entry or a resource (book, article, thesis) is being viewed on many websites (such as library catalogs or databases like PubMed, Google Scholar, Google Books, Amazon.com, Wikipedia, and publishers' websites). Clicking this icon saves reference information to the Zotero library. Such functionality is made possible by 'translators' – short pieces of computer code, or scripts to understand the structure of web pages and to parse them into citations using its internal formats. For mobile devices or browsers that do not support the Zotero Connector extension a bookmarklet is available. Zotero can also save a copy of the webpage, or, in the case of academic articles, a copy of the full text PDF. Users can then add notes, tags, attachments, and their own metadata. Items are organized through a drag-and-drop interface, and can be searched. Selections of the local reference library data can later be exported as formatted bibliographies. Furthermore, all entries including bibliographic information and user-created rich-text memos of the selected articles can be summarized into an HTML report. Zotero users can generate citations and bibliographies through word processor plugins, or directly in Zotero, using Citation Style Language styles. The house styles of most academic journals are available in Zotero, and the bibliography can be reformatted with a few clicks. Zotero also allows users to create their own customized citation styles. Zotero can import and export citations from or to many formats, including Wikipedia Citation Templates, BibTeX, BibLateX, RefWorks, MODS, COinS, Citation Style Language/JSON, refer/BibIX, RIS, TEI, several flavours of RDF, Evernote, and EndNote. Zotero can associate notes with bibliographic items. It can annotate PDFs and synchronize them with any of its desktop apps and its iOS app. As of 2022, Zotero supports more than forty languages (some of them not totally translated) . Zotero has no institutional customer support service, but the Zotero website provides extensive information, including instructional screencasts, troubleshooting tips, a list of known issues, and user forums. Questions and issues raised in the forums are answered quickly, with users and developers suggesting solutions. Man
https://en.wikipedia.org/wiki/Coding%20conventions
Coding conventions are a set of guidelines for a specific programming language that recommend programming style, practices, and methods for each aspect of a program written in that language. These conventions usually cover file organization, indentation, comments, declarations, statements, white space, naming conventions, programming practices, programming principles, programming rules of thumb, architectural best practices, etc. These are guidelines for software structural quality. Software programmers are highly recommended to follow these guidelines to help improve the readability of their source code and make software maintenance easier. Coding conventions are only applicable to the human maintainers and peer reviewers of a software project. Conventions may be formalized in a documented set of rules that an entire team or company follows, or may be as informal as the habitual coding practices of an individual. Coding conventions are not enforced by compilers. Software maintenance Reducing the cost of software maintenance is the most often cited reason for following coding conventions. In the introductory section on code conventions for the Java programming language, Sun Microsystems offers the following reasoning: Code conventions are important to programmers for a number of reasons: 40%–80% of the lifetime cost of a piece of software goes to maintenance. Hardly any software is maintained for its whole life by the original author. Code conventions improve the readability of the software, allowing engineers to understand new code more quickly and thoroughly. If you ship your source code as a product, you need to make sure it is as well packaged and clean as any other product you create. Quality Software peer review frequently involves reading source code. This type of peer review is primarily a defect detection activity. By definition, only the original author of a piece of code has read the source file before the code is submitted for review. Code that is written using consistent guidelines is easier for other reviewers to understand and assimilate, improving the efficacy of the defect detection process. Even for the original author, consistently coded software eases maintainability. There is no guarantee that an individual will remember the precise rationale for why a particular piece of code was written in a certain way long after the code was originally written. Coding conventions can help. Consistent use of whitespace improves readability and reduces the time it takes to understand the software. Coding standards Where coding conventions have been specifically designed to produce high-quality code, and have then been formally adopted, they then become coding standards. Specific styles, irrespective of whether they are commonly adopted, do not automatically produce good quality code. Reduction of complexity Complexity is a factor going against security. The management of complexity includes the following basic principle: minimize
https://en.wikipedia.org/wiki/Comment
Comment may refer to: Computing Comment (computer programming), explanatory text or information embedded in the source code of a computer program Comment programming, a software development technique based on the regular use of comment tags Law Public comment, a term used by various U.S. government agencies, referring to comments invited regarding a report or proposal Short scholarly papers written by members of a law review Comments on proposed rules under the rulemaking process in United States administrative law Media and entertainment Comment (TV series), a 1958 Australian television series Comment (album), a 1970 album by Les McCann "Comment", a 1969 song by Charles Wright & the Watts 103rd Street Rhythm Band Comment, a quarterly journal published by Cardus Comment, later aCOMMENT, an Australian quarterly literary magazine published 1940-7 Comment section, a user-generated content feature of Web content allowing readers to publish comments Other Comment (linguistics) or rheme, that which is said about the topic (theme) of a sentence Bernard Comment (born 1960), Swiss writer and publisher See also Commentary (disambiguation) Comment spam (disambiguation) Internet commentator (disambiguation) Remark (disambiguation) Annotation, an explanation included with other data Footnote, a note at the bottom of a page Obiter dictum, a remark or observation made by a judge that does not form a necessary part of the court's decision
https://en.wikipedia.org/wiki/Ppc64
ppc64 is an identifier commonly used within the Linux, GNU Compiler Collection (GCC) and LLVM open-source software communities to refer to the target architecture for applications optimized for 64-bit big-endian PowerPC and Power ISA processors. ppc64le is a pure little-endian mode that has been introduced with the POWER8 as the prime target for technologies provided by the OpenPOWER Foundation, aiming at enabling porting of the x86 Linux-based software with minimal effort. Details These two identifiers are frequently used when compiling source code to identify the target architecture. 64-bit Power and PowerPC processors are the following: PowerPC 620 RS64 – Apache, RS64-II Northstar, RS64-III Pulsar/IStar, and RS64-IV SStar POWER3 and POWER3-II POWER4 and POWER4+ PowerPC 970, 970FX, 970MP and 970GX POWER5 and POWER5+ PPE in Cell BE, PowerXCell 8i and Xenon. PWRficient POWER6 and POWER6+ POWER7 and POWER7+ A2, A2I (used in the Blue Gene/Q) and A2O PowerPC e5500 core based PowerPC e6500 core based POWER8 – P8-6c Murano, P8-12c Turismo and Venice, P8E (with NVLink) and CP1 POWER9 – P9C Cumulus, P9N Nimbus and P9 AIO Axone Power10 Microwatt, open source soft core Chiselwatt, open source soft core Defunct 64-bit PowerPC processors are the Motorola G5 and PowerPC e700. References External links Linux Standard Base Specification for the PPC64 Architecture 2.1, 2003 Computer-related introductions in 1997 64-bit computers PowerPC microprocessors Instruction set architectures Power microprocessors IBM microprocessors
https://en.wikipedia.org/wiki/Sean%20MacManus
Sean or Seán MacManus may refer to: Seán MacManus (politician) (born 1950), Irish Sinn Féin politician in Sligo Sean McManus (television executive) (born 1955), American television network executive Seán McManus (priest), County Fermanagh-born, US-based nationalist activist priest See also Shaun McManus (born 1976), Australian rules footballer Shawn McManus (born 1958), American comic book artist
https://en.wikipedia.org/wiki/Scores%20%28computer%20virus%29
Scores was a computer virus affecting Macintosh machines. It was first discovered in Spring 1988. It was written by a disgruntled programmer and specifically attacks two applications that were under development at his former company. These programs were never released to the public. Overview Scores infects the System, Notepad, and Scrapbook files under System 6 and System 7. There is a simple way to identify infection. Normal Notepad and Scrapbook icons will have specific icons under System 7, or little Macintosh icons under System 6. If the icons are blank document icons, it is a good indication the system is infected. Scores begins to spread to other applications two days after infection. The Finder and DA Handler often become infected as well. The second payload, activated after 4 days, will start causing crashes if programs with the ERIC or VULT signatures are run. Both signatures are found on programs written by Electronic Data Systems of Plano, Texas. If a program from the company is run, the virus will crash the system after 25 minutes. The third payload activates after 7 days, and will actively try to stop programs with the VULT signature from writing to disk. If no write to disks happen within 10 minutes, the virus will crash the system. The alleged author of the virus was questioned by the Federal Bureau of Investigation (FBI) soon after the virus was discovered. There were no federal laws with which to charge the author, so they remain free to this day. This loophole resulted in the "Computer Virus Eradication Act of 1988". References Norstad, John. The Viruses. Disinfectant 3.7.1, 1988-1997 Northwestern University John Norstad. INFO-MAC Digest (through Virus-L), Volume 6, Issue 40, The Scores Virus 1988-04-18 Symantec Antivirus, Scores The New York Times, Technology, Sabotage Aimed at Computer Company Destroys Government Data. 1988-07-04 Keith Petersen. VIRUS-L Virus Discussion List, FBI to investigate rogue computer program at NASA. 1988-07-06 Joshua Yeidel. VIRUS-L Virus Discussion List, SCORES Virus (Mac) Sighted At Washington State U. 1988-11-22 Joe Simpson, Virus-L Digest, A description of computer virus epidemic at Miami U. 1988-04-28 Classic Mac OS viruses Hacking in the 1980s
https://en.wikipedia.org/wiki/Christiane%20Fellbaum
Christiane D. Fellbaum is an American linguist and computational linguistics researcher who is Lecturer with Rank of Professor in the Program in Linguistics and the Computer Science Department at Princeton University. The co-developer of the WordNet project, she is also its current director. Biography Fellbaum received a Ph.D. from Princeton University in linguistics in 1980 and later joined Princeton's Cognitive Science Laboratory, working with George Armitage Miller. Together with Miller and his team, she was a creator of WordNet, a large lexical database that serves as a widely used resource in computational linguistics and natural language processing. Many researchers have since built upon her work, including AI researcher Fei-Fei Li, the inventor of ImageNet, which was inspired by a 2006 conversation with Fellbaum as well as by the name and design of the original WordNet. She is a founder and president of the Global WordNet Association, which guides the construction of lexical databases in many languages. She is a site coordinator of the North American Computational Linguistics Open competition. Her research focuses on lexical semantics, the syntax-semantics interface, and computational linguistics. Awards and honors In 2001, Fellbaum was one of fourteen scientists to receive the Wolfgang-Paul Prize of the Humboldt Foundation. She used her award money (1.53 million Euros) to construct an electronic database of German idioms ('Kollokationen im Wörterbuch'), a three-year project that she led at the Berlin-Brandenburg Academy of Sciences. The goal of the project, which focused on collocations that combine nouns with verbs, was to analyze and record a wide range of German-language idioms. In 2006, she and WordNet collaborator George A. Miller were awarded the Antonio Zampolli Prize of the European Language Resources Association. According to the ELRA website, the prize recognizes "individuals whose work lies within the areas of Language Resources and Language Technology Evaluation with acknowledged contributions to their advancements." References External links Biography of Christiane Fellbaum (German) Global WordNet Association Webpage at Princeton Homepage and database access, Kollokationen project (German) Linguists from the United States Living people Women lexicographers Princeton University alumni Princeton University faculty Women linguists Natural language processing researchers Computational linguistics researchers 1950 births
https://en.wikipedia.org/wiki/Recursive%20transition%20network
A recursive transition network ("RTN") is a graph theoretical schematic used to represent the rules of a context-free grammar. RTNs have application to programming languages, natural language and lexical analysis. Any sentence that is constructed according to the rules of an RTN is said to be "well-formed". The structural elements of a well-formed sentence may also be well-formed sentences by themselves, or they may be simpler structures. This is why RTNs are described as recursive. Notes and references See also Syntax diagram Computational linguistics Context free language Finite state machine Formal grammar Parse tree Parsing Augmented transition network Diagrams Natural language processing
https://en.wikipedia.org/wiki/Axum%20%28disambiguation%29
Axum may refer to: Axum, a city in northern Ethiopia also sometimes spelt as Aksum Kingdom of Aksum, a nation in northeastern Africa in the first millennium AD Axum (programming language), a programming language from Microsoft Axum (Star Wars planet), fictional planet within the Star Wars universe Axum, an Israeli hip hop/reggae band whose members are of Ethiopian and Moroccan/Yemeni descent Italian submarine Axum Axum (album by James Newton)
https://en.wikipedia.org/wiki/KVER%20%28FM%29
KVER (branded as "Radio Manantial") is an FM Spanish language religious radio station that serves the El Paso, Texas, area. It is owned by the World Radio Network. External links KVER official website VER (FM)
https://en.wikipedia.org/wiki/Starting%20Out%20%28disambiguation%29
Starting Out may refer to: Starting Out, an Australian television soap opera made for the Nine Network by the Reg Grundy Organisation in 1983 Starting Out (British television series), seven series for schools made by ATV between 1973 and 1992 Starting Out, a British television series created by Maurice Gran and Laurence Marks in 1999 which ran for eight episodes Starting Out, a song by The Screaming Jets from their album All for One (1991)
https://en.wikipedia.org/wiki/Renaming
Renaming may refer to: Place names Geographical renaming Lists of renamed places Computing Batch renaming Great Renaming Register renaming Rename (computing) Rename (relational algebra) See also Rename (disambiguation)
https://en.wikipedia.org/wiki/Synology
Synology Inc. () is a Taiwanese corporation that specializes in network-attached storage (NAS) appliances. Synology's line of NAS is known as the DiskStation for desktop models, FlashStation for all-flash models, and RackStation for rack-mount models. Synology's products are distributed worldwide and localized in several languages. Synology's headquarters are located in Taipei, Taiwan, with subsidiaries located around the world. In 2018, product review website Wirecutter described Synology as a "longtime leader in the small-business and home NAS arena", albeit still a newcomer in the field of Wi-Fi routers. Company history Synology Inc. was founded in January 2000 when Cheen Liao and Philip Wong left Microsoft to pursue an independent project. Liao was a development manager in the Microsoft Exchange Server Group, while Wong was a Sales Director for Microsoft in Taiwan. The two began to write a new operating system called Filer OS based on Berkeley Software Distribution (BSD), which was to be used with Fastora NAS hardware to create a NAS solution. To integrate their NAS software tightly with hardware, Synology released its first complete solution in 2004, the DiskStation DS-101. Since then, Synology has grown to about 650 employees worldwide. Liao and Wong are still with the company, with Liao serving as President of Synology America Corp. and Wong serving Chairman of Synology Inc. DSM extensibility Synology's software architecture allows for third-party add-on application integration. Hundreds of third-party applications are available in addition to Synology's own catalog. Command line access via SSH or Telnet is available. Access to development tools and APIs are also available on Synology's website. Third-party applications can be written in an interpreted programming language such as PHP or compiled to binary format. Public APIs allow custom applications to integrate into Synology's web-based user interface. Installers using the SPK format can install third-party applications directly on the DSM operating system. Vulnerabilities In 2014, a piece of ransomware emerged, dubbed "Synolocker", that targeted Synology devices. See also List of companies of Taiwan References External links Computer storage companies Electronics companies of Taiwan Linux-based devices Network-attached storage Server appliance Companies based in Taipei Computer companies established in 2000 Taiwanese companies established in 2000 Taiwanese brands
https://en.wikipedia.org/wiki/TFX%20%28video%20game%29
TFX is a 1993 combat flight simulator video game developed by Digital Image Design and published by Ocean Software that was released for DOS and Amiga computers. Gameplay The game features an instant-action arcade mode, custom missions, and a campaign mode. The player can fly three aircraft: The Eurofighter Typhoon, the F-22 and the F-117, and can customize payload for each aircraft. The campaign mode takes place in five theatres - Colombia, Somalia, Libya, the Balkans, and the South Georgia Islands. "TFX" stands for Tactical Fighter E(X)periment. While 3 planes were simulated, the internal cockpit for all 3 were the same layout. TFX also featured a virtual cockpit mode, although the cockpit itself was more sparse in this mode. Development The Eurofighter Typhoon, a playable plane in TFX, was still in its prototype stage when TFX was released, with a real Eurofighter Typhoon not making its first flight until 1994. The interactive parts of the game were reduced to still images or omitted altogether for the Amiga version which, although never officially released by Ocean, was later included as a give-away game on a CU Amiga cover disk. An experimental port was produced for the original PlayStation shortly after its release. The Soap Opera Engine was manually programmed in TFX, but would be altered to become automated in future games. TFX was shown at the 1994 European Computer Trade Show at the Business Design Centre in London, England. An Atari Jaguar port was slated to be under development by DID but it never released. Reception Computer Gaming World briefly reviewed TFX in February 1994, calling it "the most advanced flight model yet" due to the many factors taken into account in the simulation, and further called it a simulator for "purist[s]". Another reviewer from CGW in April 1994 praised TFX's "excellent" effects and "detailed" graphics, but criticized the lack of a rudder and other examples of lack of realism, "predictable" computer tactics, the lack of a campaign setting, and an 'irritating' untoggleable autopilot. The reviewer concluded that "TFX feels old fashioned", further expressing that some aspects felt "unfinished", and recommended it only to casual pilots. Amiga Computing gave the Amiga version of TFX an overall score of 93% and highly praised its graphics, calling them "breathtakingly atmospheric" and stating that they were "designed to inspire and awe", and expressed that this "visual realism" give the game's missions further depth. Amiga Computing noted TFX's hardware requirements as 'demanding' for the Amiga, but noted that even with lowered settings TFX is 'more impressive than other flight sims' on the Amiga. In 1994, PC Gamer UK named TFX the 26th best computer game of all time. The editors called it "one of the best flight sims out on the PC and, with a bit of effort, a hugely playable game". References External links TFX at the Hall of Light 1993 video games Amiga games Amiga 1200 games Cancelled Atari Jaguar
https://en.wikipedia.org/wiki/Legacy%20costs
Legacy costs is a term formed by analogy with the computer industry's legacy systems. Legacy costs are those incurred by an organization (whether corporation or city) in prior years under different leadership or when the entity's priorities and resources were different. While it can refer to other commitments (particularly existing infrastructure) as well, it primarily refers to obligations to pay health care costs and pensions under defined-benefit plans for current employees and retirees, usually incurred during the labor peace era after World War II. Legacy costs are believed to hinder American jobs, such as auto manufacturers and central cities, and older airlines worldwide. This belief leads to the idea that legacy costs will lower the company's competitiveness. Organized labor sees such criticisms as part of a desire to abandon any form of social contract between worker and employer. Newer, less-established entities have few or no problems with legacy costs, because they have less pension and health care liabilities (this applies to new suburbs, for example, as well as new companies), and are therefore able to out-compete (in some cases) the older entities. History In the 1990s, steel firms were guaranteed pension funds. Workers had health-care benefits through these steel firms; however, there was an issue in funding for the defined benefit pension funds. In 1986, PBGC took over LTV's pension payments after LTV went bankrupt. The main apprehension was the liabilities between the firms with defined benefit plans and the firms with contribution pension plans. After this problem, many workers believed that the old firms had to pay the costs of the pensions, also known as legacy costs. The Lincoln Institute of Land Policy has conducted research on how much money is spent on pension plans from state and local government in their published 2012 findings. This research used records from Boston College Center for Retirement Research with a Public Plans Database (PPD). The information needed to be counted for the calculation are age and salary histories of members, retirement ages, asset earnings, etc. From this article's database, researchers came to the conclusion that pensions are underfunded because governments do not plan enough funds to insure liabilities expenses in that year. References Costs Legacy systems
https://en.wikipedia.org/wiki/Bluedawn
Bluedawn was an indie folk rock duo from South Korea. The band members included Dawn (real name: Han Hui-Jeong, 한희정; voice, acoustic guitar, piano and programming) and Ssoro (sometimes spelled "Sorrow"; real name: Jeong Sang-Hun, 정상훈; electric guitar, acoustic guitar, voice, and programming). The group was active in the early 2000s and released two albums and one CD containing two EPs. Their 2003 album Bluedawn features the additional musicians Orange_drink (drums) and yjroom (electric guitar) on the song "Sonyeon" ("소년"). The duo disbanded in late 2006 or early 2007, following the recording of their final album, When Spring Comes (보옴이 오면). Dawn is expected to release her first solo album on the Pastel Music label. On November 16, 2012, Jeong Sang-Hun announced on his Twitter account that Bluedawn would be reuniting to release a Christmas album in December 2012. Discography 2003 - Bluedawn (Lo-fi cavare sound) 2005 - Submarine Sickness + Waveless (Pastel Music) 2006 - When Spring Comes (보옴이 오면) (CJ Media Line) 2012 - Blue Christmas References External links Bluedawn official site Bluedawn MySpace Bluedawn photos South Korean folk rock groups
https://en.wikipedia.org/wiki/DPPX
DPPX can relate to IBM DPPX, an operating system introduced by IBM, pre-installed on the IBM 8100 and later ported to the IBM ES/9370 dipeptidyl-peptidase-like protein-6 (DPP6), a protein that is abbreviated either as DPPX or DPP6 (an alternative identifier is VF2) dots per pixel (dppx), a unit for measuring pixel density on the web
https://en.wikipedia.org/wiki/Serving%20Through%20Science
Serving Through Science was "the first regular science-related network series" and the first educational television series broadcast in the United States. The series premiered on the DuMont Television Network in May 1945, and was shown Tuesdays at 9 pm ET. The weekly program starred Dr. Miller McClintock showing short films produced by Encyclopædia Britannica, and was sponsored by U. S. Rubber. The last show aired May 27, 1947. The series' name was also a slogan used by the sponsor in its advertising. See also List of programs broadcast by the DuMont Television Network List of surviving DuMont Television Network broadcasts 1946-47 United States network television schedule References and sources References Sources David Weinstein, The Forgotten Network: DuMont and the Birth of American Television (Philadelphia: Temple University Press, 2004) Alex McNeil, Total Television, Fourth edition (New York: Penguin Books, 1980) Tim Brooks and Earle Marsh, The Complete Directory to Prime Time Network TV Shows, Third edition (New York: Ballantine Books, 1964) DuMont Television Network original programming 1946 American television series debuts 1947 American television series endings Science education television series English-language television shows Black-and-white American television shows
https://en.wikipedia.org/wiki/TSOS
TSOS may stand for Traffic Signal Operations Specialist, a certification sponsored by the Transportation Professional Certification Board. Time Sharing Operating System, a mainframe operating system from RCA run their Spectra computers. Godzilla: Tokyo S.O.S., a 2003 film The Shadow of Saganami, a 2004 science fiction novel by David Weber.
https://en.wikipedia.org/wiki/Freak%20the%20Sheep%20Vol.%202
Freak The Sheep Volume 2 was a New Zealand compilation album organised by the bNet student radio network. It was named after a bFM New Zealand music radio show that has been running since 1987. Unlike the previous Freak the Sheep compilation which focused on Auckland bands, this compilation had bands from around the country. The concept was similar to the 1986 National Student Radio Weird Culture Weird Custom compilation LP, which launched the careers of Cassandra's Ears and the Puddle. At the time of release it was very difficult for uncommercial bands to release music, and most bands on the compilation had only self-released cassettes that were only available in their own towns. The Cyclops and the Axel Grinders had previous releases on international labels, but this was their first release in their own country. It was the first release from Into The Void, a Christchurch band that performed for several decades. It was released by the Flying Nun label in 1992 on cassette and CD. Track listing "Fat Little Man - Head Like a Hole "Swill of the Gods" - Axel Grinders "God" - Blue Marbles "Gettin' My Thing Together" - Gestalt "Made Easy" - Swim Everything "In the Ear" - Tinnitus "Real Swingers" - Leaders of Style "Gash" - Into the Void "Falling Golden Trumpets" - Cyclops "Will Shiver" - Book of Martyrs "Abacus" - Lushburger "Ego" - Queen Meanie Puss References Record label compilation albums Compilation albums by New Zealand artists 1992 compilation albums Flying Nun Records compilation albums Rock compilation albums
https://en.wikipedia.org/wiki/NBT%20Bank
NBT Bank, N.A. is an American financial institution that operates through a network of 140 banking locations in New York, Pennsylvania, Vermont, Massachusetts, New Hampshire, Maine and Connecticut. NBT Bank and its parent company, NBT Bancorp Inc., are headquartered in Norwich, New York, United States. NBT Bancorp is traded on the Nasdaq Global Select Market under the symbol NBTB. History Founded in 1856, NBT Bank was first a state-chartered bank called the Bank of Norwich. On June 28, 1865, the bank received a national charter (which it holds to this day) and changed its name to the National Bank of Norwich. In 1918, NBT Bank was one of the first national banks in New York State to apply for and receive trust powers under a Federal Reserve Act and established a Trust Department. In 1925, NBT Bank changed its name a second time to better reflect its expanded services. Over the years, the area served by NBT Bank expanded and in 1989 the bank changed its name for the third time to The National Bank and Trust Company without "of Norwich." In 1995, the bank changed its name for the fourth time to NBT Bank, N.A. (The "N.A." stands for "National Association" and is used primarily in formal or legal contexts.) At the same time, NBT Bank introduced its current logo featuring a blue star and red lettering. In 2016, NBT Bank celebrated its 160th year in business and published an updated history of the bank to commemorate this milestone. Mergers and acquisitions NBT Bank completed its first acquisitions in the 1930s. Since that time, the bank has continued to grow through bank and branch acquisitions as well as through organic expansion. Since 2000, NBT Bank acquired the following banks: LA Bank based in Scranton, Pennsylvania in 2000; Pioneer American Bank based in Carbondale, Pennsylvania in 2000; First National Bank of Northern New York based in Norfolk, New York in 2001; Central National Bank based in Canajoharie, New York in 2001; City National Bank and Trust Company based in Gloversville, New York in 2005; Hampshire First Bank based in Manchester, New Hampshire in 2012; and Alliance Bank based in Syracuse, New York in 2013. The merger with Alliance Bank was completed on March 8, 2013 and is NBT Bank's largest to date. In December 2022, NBT announced that it will acquire the Connecticut-based Salisbury Bancorp in an equity transaction valued at $204 million. Naming rights NBT Bank owns the naming rights to NBT Bank Stadium in Syracuse, New York. References External links Banks established in 1856 Banks based in New York (state) Companies listed on the Nasdaq Economy of Syracuse, New York Mortgage lenders of the United States
https://en.wikipedia.org/wiki/Surf%20Patrol
Surf Patrol, Australia's Lifesavers is an Australian reality television series that airs on the Seven Network. The series is produced by the Australian production company Cornerbox, the producers of Seven's other factual series The Force and Border Security: Australia's Front Line. The first season was presented by Simon Westaway, with Naomi Robson taking over for season two, and Tom Williams for series three. The show premiered on 9 July 2007. The second season started airing from 12 May 2008, with a third aired from 14 July 2009. Overview The show follows the work of volunteer Surf Lifesavers on the beaches of New South Wales, Victoria, and Queensland. It also features the work of the Sydney Westpac Life Saver Rescue Helicopter and Sydney's Offshore Rescue Boats, such as the Cronulla District Lifesaver Rescue Boat. Reception Series One The first season, consisting of 17 episodes, began airing on 9 July 2007. The first reason of Surf Patrol was viewed by an average of 1.45 million people in Australia's mainland capital cities over the course of the series and was the highest rating program of the week on several occasions. Series Two Following its highly successful debut in 2007, Channel 7 and Cornerbox ordered a second season of Surf Patrol, which began filming on 22 December 2007. The second season consisted of 20 episodes, and covered more beaches than the first series. Surf Lifesaving Australia President, Ron Rankin AM, welcomed the news of a second series and said the program was a tribute to the work of surf lifesavers across the country: "I have travelled around Australia extensively during the Year of the Surf Lifesaver and many people have told me how much they love Surf Patrol and the realistic portrayal of SLSA members," he said. "We look forward to working closely with Cornerbox and Channel 7 to ensure that the second series portrays the very best of our movement." Series Three Season three of Surf Patrol focused on the beaches of Queensland, primarily the Northern Gold Coast and Southport & Surfers Paradise SLSCs. Many episodes primarily feature Lifesavers Ryan Knight (Lifesaver of the Year), Kenny Lloyd (Surfers Paradise Patrol Captain) and Tom Abella (popular public figure) due to their relative popularity with viewers. The season debuted well, attracting an audience of 1.526 million viewers. See also Bondi Rescue, a similar series References External links Australian factual television series Seven Network original programming 2007 Australian television series debuts 2009 Australian television series endings Television shows set in Victoria (state) Television shows set in New South Wales Television shows set in Queensland
https://en.wikipedia.org/wiki/Jack-Tor
"Jack-Tor" is the fifth episode of the first season of the American situation comedy 30 Rock, which aired on November 16, 2006 on the NBC network in the United States, and on November 8, 2007 in the United Kingdom. The episode was written by Robert Carlock and was directed by Don Scardino. Guest stars in this episode include Katrina Bowden, Lonny Ross, Keith Powell, Maulik Pancholy, Teddy Coluca, Donald Glover, Doug Moe, and Matthew Stocke. The episode focuses on Jack Donaghy's (Alec Baldwin) pressure on the writers of TGS with Tracy Jordan to integrate General Electric products into the show, which forces Liz Lemon (Tina Fey) to integrate Jack himself into a self-referential sketch about product placement. Frank Rossitano (Judah Friedlander) and James "Toofer" Spurlock (Keith Powell) trick Jenna Maroney (Jane Krakowski) into thinking that her job is in danger, and Liz wonders if Tracy Jordan (Tracy Morgan) might be illiterate when he refuses to read cue cards. Plot Jack tells Liz and the writers of TGS Tracy Jordan that he wants them to insert General Electric (GE) products into the show. The writers express their reluctance in doing product placements for GE (even though during the scene the cast talk about how great Snapple's White Green Tea tastes), but Liz agrees on the condition that Jack appears in the sketch. The next day, Liz watches a video containing outtakes from Jack's product placement video, where she discovers that he repeatedly forgot his lines after 142 takes. After realizing that he needs help, Liz encourages Jack to go through with the sketch, which he ultimately is able to shoot. Tracy decides that he is going to take a break from rehearsals after he is called back on stage to read his cue cards. When Tracy appears to be ignoring his cue cards, Jenna informs Liz of the situation, and realizes that Tracy might be illiterate, citing an earlier promo cue card mishap ("The Aftermath") as an example. Liz confronts Tracy about the problem; he admits that he is illiterate and agrees to get help. Liz later notices Tracy reading a newspaper, and learns that he was using the ploy to get out of work. Liz tells Tracy that she is not going to take it anymore, and forces him to go through with the sketch. Jenna tells Pete that she wishes to insert a music number called "Muffin Top" into the show, which she claims is a big hit overseas. As a prank, Frank and Toofer tell her that several people are going to be fired. Believing them, Jenna tries to seduce an NBC executive whom she sees talking to Jack. Liz later notifies Jenna that no one is going to be fired, and that the executive is actually an extra on the show. Jenna aims to get back at the pair, and although Toofer admits that he was too smart for Jenna's tactics, Frank is seen running around naked outside Jack's balcony. Jenna finally gets her chance to perform "Muffin Top", unaware that the show has already ended and the number was scratched at the last moment, thanks to Liz. Pro
https://en.wikipedia.org/wiki/Code%20rate
In telecommunication and information theory, the code rate (or information rate) of a forward error correction code is the proportion of the data-stream that is useful (non-redundant). That is, if the code rate is for every bits of useful information, the coder generates a total of bits of data, of which are redundant. If is the gross bit rate or data signalling rate (inclusive of redundant error coding), the net bit rate (the useful bit rate exclusive of error correction codes) is . For example: The code rate of a convolutional code will typically be , , , , , etc., corresponding to one redundant bit inserted after every single, second, third, etc., bit. The code rate of the octet oriented Reed Solomon block code denoted RS(204,188) is 188/204, meaning that redundant octets (or bytes) are added to each block of 188 octets of useful information. A few error correction codes do not have a fixed code rate—rateless erasure codes. Note that bit/s is a more widespread unit of measurement for the information rate, implying that it is synonymous with net bit rate or useful bit rate exclusive of error-correction codes. See also Information rate Entropy rate Punctured code References Information theory Rates
https://en.wikipedia.org/wiki/WYDA
WYDA (96.9 FM "Air1") is a radio station licensed to Troy, Ohio. The station airs the Christian worship formatted Air1 network programmed by the Educational Media Foundation. WYDA is broadcast to Dayton, its northern suburbs and the Upper Miami Valley region of Miami, Clark, Shelby, Champaign, Darke and surrounding counties in West Central Ohio with local offices are located on south Main in Dayton. History Originally WTRJ, which first signed-on with Satellite Music Network programming in the summer of 1991, then later switching from Adult Contemporary to gospel music. It was purchased in 1996 by Dayton-based Hawes-Saunders Broadcasting becoming WRNB, which continued satellite programming services using ABC Radio's "Solid Gold Soul" format as a sister to WROU-FM "U-92" licensed to West Carrollton. WRNB also aired the Tom Joyner Morning Show from ABC Radio. Financial difficulties forced Hawes-Saunders to sell WROU to Radio One and the Troy station WRNB to EMF Broadcasting in 2003 now airing K-LOVE programming as WOKL. In 2007, WOKL began low-power simulcasting on translators W231AZ 94.1 MHz northeast of Sidney, W244BR 96.7 in Springfield, and W269BP 101.7 MHz in Richmond, Indiana. (See complete list of translators below.) K-LOVE programming is also heard on WKLN 102.3 in Wilmington (the former WSWO-FM) serving the south Dayton and northern Cincinnati suburbs as well as WNLT 104.3 licensed to Harrison serving Fairfield and metropolitan Cincinnati. In addition, WOAR 88.3 located in the eastern Clark County community of South Vienna(And a translator in the SW Clark County village of Enon at 103.3) aired K-LOVE programming, but has since switched and now airs Air One Christian programming for Springfield, London, Urbana, Mechanicsburg, Marysville and Grove City as well as Fairborn, Medway, Donnelsville, and Yellow Springs. WVSO was formerly an affiliate of American Family Radio. The WSWO-LP calls have moved to a low power FM station in Huber Heights, Ohio with the WRNB calls transplanted to an FM station in the Philadelphia market which is also owned by Radio One. WOKL switches to Air 1 According to posts on the Cincinnati boards at Radio Discussions dot com, WOKL switched affiliation from K-LOVE to Air 1 during the week of December 3, 2012. This move was made after the transmitting tower of 30,000-watt WKCD (formerly WCDR 90.3 MHz in Cedarville) was moved from Cedarville to a new site in Dayton. Up to this point, Air-1 programming was heard on an FM translator at 88.3 MHz in South Vienna in eastern Clark County, Ohio. It has been speculated that the current translators of WOKL would follow suit in broadcasting the programming of Air 1. The WKCD (former WCDR) translator at 98.1 FM in Sidney has been sold to Muzzy Broadcasting, owners of WPTW in Piqua. On December 3, 2012, the station changed its call sign to the current WYDA. Translators of WYDA In addition to the main station, WYDA is relayed by an additional four translators to widen its bro
https://en.wikipedia.org/wiki/Pkill
(see ) is a command-line utility initially written for use with the Solaris 7 operating system in 1998. It has since been reimplemented for Linux and some BSDs. As with the and commands, is used to send signals to processes. The command allows the use of extended regular expression patterns and other matching criteria. Example usage Kill the most recently created process: pkill -n acroread Send a USR1 signal to process: pkill -USR1 acroread See also Some other unix commands related to process management and killing include: , which sends signals processes by process ID instead of by pattern-matching against the name. , which changes the priority of a process. and , which display a list of processes and their resource usage; can send signals to processes directly from this list. , a command-line utility to send signals or report process status. is favoured over it. References External links Oracle: Man pages pgrep, pkill Oracle: How to terminate a process (pkill) Unix process- and task-management-related software
https://en.wikipedia.org/wiki/Pgrep
pgrep is a command-line utility initially written for use with the Solaris 7 operating system by Mike Shapiro. It has since been available in illumos and reimplemented for the Linux and BSDs (DragonFly BSD, FreeBSD, NetBSD, and OpenBSD). It searches for all the named processes that can be specified as extended regular expression patterns, and—by default—returns their process ID. Alternatives include pidof (finds process ID given a program name) and ps. Example usage The default behaviour of pgrep (returning the process identifier of the named tasks) simplifies an otherwise complex task and is invoked with: $ pgrep 'bash' Which is roughly equivalent to: $ ps ax | awk '{sub(/.*\//, "", $5)} $5 ~ /bash/ {print $1}' Additional functionality of pgrep is listing the process name as well as the PID (-l Lists the process name as well as the process ID) of all processes belonging to the group alice (-G Only match processes whose real group ID is listed. Either the numerical or symbolical value may be used): $ pgrep -l -G alice showing all processes that do not belong to the user root (-u euid Only match processes whose effective user ID is listed. Either the numerical or symbolical value may be used) by inverting the matching (-v Negates the matching): $ pgrep -v -u root and only matching the most recently started process (-n Select only the newest (most recently started) of the matching processes): $ pgrep -n # The most recent process started $ pgrep -n -u alice emacs # The most recent `emacs` process started by user `alice` See also List of Unix commands pidof — find the process ID of running programs pkill — signal processes based on name and other attributes ps — display the currently running processes grep — search for lines of text that match one or many regular expressions References Unix process- and task-management-related software
https://en.wikipedia.org/wiki/Circus%20Time
Circus Time is a variety program presented in the United States by television network ABC on Thursday evenings from October 4, 1956 to June 27, 1957. Circus Time was not an actual circus broadcast but rather a circus-themed program, in which both traditional circus acts and more traditional mainstream forms of entertainment were presented. The host, or "ringmaster" in the show's parlance, was ventriloquist Paul Winchell, who was "assisted" by his dummies Jerry Mahoney and Knucklehead Smiff. Mainstream musical guests appearing on the program at times included The Diamonds, Mickey and Sylvia and the Dell Vikings. Martin Stone Associates produced the program. Hartz Mountain Products and Bauer & Black were sponsors. References Brooks, Tim and Marsh, Earle, The Complete Directory to Prime Time Network and Cable TV Shows 1956 American television series debuts 1957 American television series endings 1950s American variety television series American Broadcasting Company original programming Circuses Circus television shows
https://en.wikipedia.org/wiki/Barcode%20system
A barcode system is a network of hardware and software, consisting primarily of mobile computers, printers, handheld scanners, infrastructure, and supporting software. Barcode systems are used to automate data collection where hand recording is neither timely nor cost effective. Despite often being provided by the same company, Barcoding systems are not radio-frequency identification (RFID) systems. Many companies use both technologies as part of larger resource management systems. History In 1948, Bernard Silver was a graduate student at Drexel Institute of Technology in Philadelphia. A local food chain store owner had made an inquiry to the Drexel Institute asking about research into a method of automatically reading product information during checkout. Silver joined together with fellow graduate student Norman Joseph Woodland to work on a solution. Woodland's first idea was to use ultraviolet light sensitive ink. The team built a working prototype but decided that the system was too unstable and expensive. They went back to the drawing board. On October 20, 1949, Woodland and Silver filed their patent application for the "Classifying Apparatus and Method", describing their invention as "article classification… through the medium of identifying patterns". The first commercially successful barcode reading system was patented in November 1969 by John F. Keidel for the General Atronics Corp. It was soon realized that there would have to be some sort of industry standard set. In 1970, the Universal Grocery Products Identification Code or UGPIC was written by a company called Logicon Inc. The first company to produce bar code equipment for retail trade use (using UGPIC) was the American company Monarch Marking in 1970, and for industrial use, the British company Plessey Telecommunications was also first in 1970. UGPIC evolved into the U.P.C. symbol set or Universal Product Code, which is still used in the United States. George J. Laurer is considered the inventor of U.P.C. or Uniform Product Code, which was invented in 1973. In June 1974, the first U.P.C. scanner was installed at a Marsh's supermarket in Troy, Ohio. The first product to have a barcode included was a packet of Wrigley's Gum. Hardware There is a wide range of hardware that is manufactured today for use in Barcode Systems. The best known brand of handheld scanners and mobile computers is Symbol, which is now a division of Motorola. Other manufacturers include Datalogic, Intermec, HHP (Hand Held Products), Microscan Systems, Unitech, Metrologic, PSC and PANMOBIL. Software While there is a range of hardware on the market, software is more difficult to find from the hardware manufacturers. Some ERP, MRP, and other inventory management software have built in support for barcode reading and some even allow the software to run directly on a mobile computer. Besides full management software, there are more than a few software development kits on the market that allow the developer
https://en.wikipedia.org/wiki/OpenLayers
OpenLayers is an open-source (provided under the 2-clause BSD License) JavaScript library for displaying map data in web browsers as slippy maps. It provides an API for building rich web-based geographic applications similar to Google Maps and Bing Maps. Features OpenLayers supports GeoRSS, KML (Keyhole Markup Language), Geography Markup Language (GML), GeoJSON and map data from any source using OGC-standards as Web Map Service (WMS) or Web Feature Service (WFS). History The library was originally based on the Prototype JavaScript Framework. OpenLayers was created by MetaCarta after the O'Reilly Where 2.0 conference of June 29–30, 2005, and released as open source software before the Where 2.0 conference of June 13–14, 2006, by MetaCarta Labs. Two other open-source mapping tools released by MetaCarta are FeatureServer and TileCache. Since November 2007, OpenLayers has been an Open Source Geospatial Foundation project. Notes External links Free GIS software Geographical technology JavaScript libraries Keyhole Markup Language Web mapping
https://en.wikipedia.org/wiki/Casper%27s%20Scare%20School
Casper's Scare School (also known as Casper's Scare School: The Movie) is a 2006 computer animated television film based on the Harvey Comics cartoon character Casper the Friendly Ghost. The film premiered on Cartoon Network on October 20, 2006. It was produced by Classic Media. A TV series of the same name was produced in 2009, as well as a 2008 video game of the same name. Plot As a result of Casper being too friendly with a boy named Jimmy Bradley and failing to scare enough humans, Kibosh, the King of the Underworld, has Casper enrolled into a Scare School, to prevent him from being banished into the Valley of the Shadows, headed by the two-headed headmaster Alder and Dash. At Scare School he befriends Ra, a mummy with unraveling issues and Mantha, a zombie girl who keeps falling apart, as well as Cappy, a pirate who takes them to the school, and his parrot Beaky. There they learn to keep the Balance between scaring "fleshies" too often or too little both of which, the staff believe, would cause them to rise up and dominate the creatures of the Underworld. His first three lessons result in Casper being given detention from the teachers. The school bully, a vampire, named Thatch and his cronies spy on Casper in an attempt to sabotage him. Casper feels unable to cope with having to be scary so he decides to go to the Valley of the Shadows by himself believing the Balance would have to go without him. Upon his arrival Casper finds the Valley to be a colorful garden and he meets his great-aunt Spitzy, who the Ghostly Trio claimed were not allowed to talk about, and the other creatures who were banished there for refusing to scare humans. Meanwhile, Alder and Dash plot to use a petrification potion to turn Kibosh into stone and take over the Underworld and Deedstown. They test the potion on the Ghostly Trio, who arrive to meet the headmaster(s) after Casper's disappearance, before inviting Kibosh. When Casper's friends discover this they go to the Valley of the Shadows to warn him. Upon their arrival they discover that they can leave the Valley although the residents believe they cannot and had never even tried to. Casper then goes to Deedstown with his friends to stop Alder and Dash in their plot. The headmasters are convinced to stop by their "ancle" (aunt and uncle in one) Belle and Murray, from the Valley of the Shadows, and when everyone is returned to their original forms Kibosh allows the creatures to be friends with "fleshies" every once in a while. Kibosh confides in Casper that he once had two human friends and shows him a photograph. He tells him that being scary and growing up is hard, but he has confidence in Casper. Meanwhile, Cappy and Beaky soar over the soccer field while Thatch swabs the deck as punishment for his actions. Cast Devon Werkheiser - Casper, Casper's Shadow Brett DelBuono - Jimmy Bradley Kendre Berry - Ra Christy Carlson Romano - Mantha James Belushi - Alder Bob Saget - Dash Matthew Underwood - Thatch K
https://en.wikipedia.org/wiki/GPU%20%28disambiguation%29
A Graphics processing unit, or GPU, is a special stream processor used in computer graphics hardware. GPU may also refer to Gambia Press Union General Public Utilities, a defunct American electric utility General Purpose Uniform, of the Royal Australian Air Force Global Peace and Unity, an annual Muslim conference Ground power unit, used to power aircraft on the ground State Political Directorate (Russian: , Gosudarstvennoye Politicheskoye Upravlenie), the secret police of the RSFSR and USSR from 1922 to 1923
https://en.wikipedia.org/wiki/Backup%20%28disambiguation%29
Backup is the computing function of making copies of data to enable recovery from data loss. Backup may also refer to: Information technology Backup (backup software), Apple Mac software Backup and Restore, Windows software Backup software, the software that performs this function List of backup software, specific software packages, loosely categorized Backup site, part of a disaster recovery plan Electrical power facilities Battery backup, the use of batteries to continue operation of electrical devices in the absence of utility electric power Backup battery, similar to above Backup generator, the use of a generator to achieve a similar purpose Music Backup band, a band who plays music in support of a lead musician Backing vocalist, one who sings in harmony with a "lead vocalist" "Back Up" (Danity Kane song), 2006 "Back Up" (Pitbull song), 2004 "Back Up" (Dej Loaf song), feat. Big Sean, 2015 "Back Up" (Snoop Dogg song), 2015 "Back Up", a song by Yeat from Afterlyfe, 2023 Motor vehicle Backup camera, a camera on the rear of a vehicle, used while moving backwards Back-up collision, a type of car accident Backing up, driving a vehicle in reverse gear Others Back-up goaltender, an ice hockey team's second-string goaltender Backup (TV series), a BBC series about a police Operational Support Unit Backup, a 2009 video game by Gregory Weir Backup, in sports, a substitute player for a player in the starting lineup See also
https://en.wikipedia.org/wiki/Lt.%20Kernal
Lt. Kernal is a SASI hard drive subsystem developed for the 8-bit Commodore 64 and Commodore 128 home computers. The Lt. Kernal is capable of a data transfer rate of more than per second and 65 kilobytes per second in Commodore 128 fast mode. History The original design of both the technically complicated hardware interface and disk operating system came from Lloyd Sponenburgh and Roy Southwick of Fiscal Information, Inc., a now-defunct Florida-based turnkey vendor of minicomputer-based medical information systems. Fiscal demonstrated a working prototype in 1984 and starting advertising the system for sale early in 1985. It immediately found a niche with some Commodore software developers and bulletin board sysops. It was released over the years in capacities of 10 megabytes to 330 megabytes. The subsequent development of a multiplexing accessory allows one Lt. Kernal to be shared by up to 16 computers, using a round robin scheduling algorithm. This makes the use of the Lt. Kernal with multiple line BBSs practical. Later, streaming tape support, using QIC-02 tape cartridges, was added to provide a premium backup strategy. Fiscal built the units to order until late 1986, at which time the decision was made to turn over the production, marketing and customer support to Xetec Inc. Fiscal continued to provide secondary technical support, as well as free DOS upgrades, until December 1991, at which time production of new Lt. Kernal systems ceased. Following the shutdown of Xetec in 1995, private support of the Lt. Kernal was carried on for several years by Ron Fick until his untimely death in 1999. Overview Lt. Kernal uses a 5" hard disk drive with a capacity of 10 MB and later up to 330 MB. The hard drive uses MFM to encode data and an ST-506 interface to the OMTI 5300 intelligent SASI controller. This controller board presents a SASI (SCSI) externally that is connected via a cable with DB-25 connectors in both ends. That is plugged into the host adapter that handles the SASI signals and protocol with a controller that plugs directly into the 44-pin ROM cartridge expansion slot in the form of a physical edge connector that mates the controller board to the system bus of the host computer. The connection between the computer host adapter (DB-25F) and the hard drive unit consists of a cable with two DB-25 connectors. A key feature of the Lt. Kernal is its sophisticated disk operating system, which behaves much like that of the Point 4 minicomputers that Fiscal was reselling in the 1980s. A high degree of control over the Lt. Kernal is possible with simple typed commands, many of which had never been seen before in the 8-bit Commodore environment. It features a keyed random access filing system. Reception The Lt. Kernal was favorably and comprehensively reviewed in The Transactor, which praised the drive's speed, storage capacity, and ease of use. Some criticism was levied at the product's incomplete documentation, its drain on the resources
https://en.wikipedia.org/wiki/Census%20Information%20Center
The Census Information Center program is part of the U.S. Census Bureau's data dissemination network. History The Census Information Center (CIC) Program was started in 1988 to improve access to census data by minority groups and economically disadvantaged segments of the population, who have been traditionally undercounted in censuses and surveys. The original five participating organizations were: The National Urban League, The National Council of La Raza, the William C. Velasquez Institute, the Asian and Pacific Islander American Health Forum and the Americans for Indian Opportunity (replaced by the Native America Public Telecommunications). For more than a decade, from 1988 to April 2000, the CIC program did not grow beyond the original 5 organizations and languished due to a lack of funding and support. In April 2000, the Census Bureau renewed its commitment to close the minority and economic gap in data access by expanding the CIC Program to include 54 additional organizations representing under-served communities, bringing the number of Program participants to 59 organizations. Funding was made available for training, data products, postage and staff to ensure the success of the Program. Between 2000 and 2005 15 organizations left the program for various reasons. In September 2006, the Census Bureau admitted an additional 13 organizations. Participants Arab American Institute Asian American Federation of New York Asian American Studies Center/National CAPACD, University of California, Los Angeles Asian American Studies Program, University of Maryland Asian and Pacific Islander American Health Forum Asian Pacific American Legal Center of Southern California ASIAN, Inc. Bayamon Central University California Indian Manpower Consortium Capital Area Council of Governments Center for Applied Research, Norfolk State University Center for Border Health Research Center for Business and Economic Research, Louisiana State University in Shreveport Center on Pacific Studies Interwork Institute, San Diego State University Child Welfare League of America Children's Defense Fund Chinese American Voters Education Committee Community Service Council of Greater Tulsa Dillard University Dubois Bunche Center for Public Policy, Medgar Evers College - City University of New York First Alaskans Institute Florida Agricultural & Mechanical University Goodwill Industries International, Inc. Howard University Indian Affairs Department, State of New Mexico Instituto de Investigaciones Interdisciplinarias, University of Puerto Rico at Cayey Inter-University Program for Latino Research, Notre Dame University Joint Center for Political and Economic Studies Korean American Coalition Latin American Chamber of Commerce Leadership Conference on Civil Rights LeMoyne-Owen College Meharry Medical College Metro Chicago Information Center Mississippi Urban Research Center, Jackson State University NAACP National Asian Pacific Center on
https://en.wikipedia.org/wiki/PL/8
PL/8 (or PL.8), is a dialect of PL/I developed by IBM Research in the 1970s by compiler group, under Martin Hopkins, within a major research program that led to the IBM RISC architecture. It was so-called because it was about 80% of PL/I. Written in PL/I and bootstrapped via the PL/I Optimizing compiler, it was an alternative to PL/S for system programming, compiling initially to an intermediate machine-independent language with symbolic registers and machine-like operations. It applied machine-independent program optimization techniques to this intermediate language to produce exceptionally good object code. The intermediate language was mapped by the back-end to the target machine's register architecture and instruction set. Back-ends were written for IBM 801, S/370, Motorola 68000, and POWER/PowerPC. A version was used on IBM mainframes as a development tool for software that was being designed for the IBM AS/400, as well as to write the "i370" internal code for the "Capitol" chipset used in the IBM 9377 processor and some ES/9370 models and the millicode for S/390 and z/Architecture processors. References PL/I programming language family
https://en.wikipedia.org/wiki/Austin%20Tate
Austin Tate is Emeritus Professor of Knowledge-based systems in the School of Informatics at the University of Edinburgh. From 1985 to 2019 he was Director of AIAI (Artificial Intelligence Applications Institute) in the School of Informatics at the University of Edinburgh. He is known for his contributions to AI Planning, applications of Artificial Intelligence, and work on collaborative systems in Virtual Worlds. Early life and education Tate was born 12 May 1951, Knottingley, West Yorkshire, UK. He completed his B.A. (Hons) Computer Studies, Lancaster University, 1969-1972. He completed his postgraduate study in Machine Intelligence at University of Edinburgh, supervised by Donald Michie, 1972-1975 and a Master of Science degree in e-Learning at the University of Edinburgh, 2011-2012. Research and career Tate's research interests are in Artificial intelligence. Selected publications Tate, A. (1977) Generating Project Networks, Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI-77), pp. 888–893, Cambridge, MA, USA, Morgan Kaufmann. Tate, A., Levine, J., Dalton, J. and Nixon, A. (2003) Task Achieving Agents on the World Wide Web, in "Spinning the Semantic Web" (Fensel, D., Hendler, J., Liebermann, H. and Wahlster, W.), Chapter 15, pp. 431–458, MIT Press, 2003. Other Publications: O-Plan Papers, I-X Papers Honours and awards Tate's awards and honours include: 1993 – Elected AAAI Fellow 1998 – Fellow of the Workflow Management Coalition (WfMC) 1999 – Elected a Fellow of the Royal Society of Edinburgh (FRSE) 1999 – Fellow of the European Association for Artificial Intelligence (EurAI) 2000 – Fellow of the British Computer Society (FBCS) 2006 – Fellow of the Society for the Study of Artificial Intelligence and the Simulation of Behaviour (SSAISB) 2012 – Elected a Fellow of the Royal Academy of Engineering (FREng) Personal life He was married in 1975 to Margaret (née Mowbray) at Knottingley, West Yorkshire, England. References External links Research: AIAI Planning and Activity Management Group website AI Planners: Traverser, Interplan, Nonlin, O-Plan, I-X/I-Plan Example Projects: AKT (Advanced Knowledge Technologies), CoAX (Coalition Agents eXperiment), FireGrid, OpenKnowledge, I-Room, OpenVCE Virtual World Avatar: Ai Austin's website Interests: Austin Tate's Gerry Anderson Web Area, Supercar, Fireball XL5 1951 births People from Knottingley Living people Artificial intelligence researchers Alumni of Lancaster University Alumni of the University of Edinburgh Academics of the University of Edinburgh Fellows of the Royal Academy of Engineering Fellows of the Royal Society of Edinburgh British computer scientists Fellows of the British Computer Society Fellows of the Association for the Advancement of Artificial Intelligence Fellows of the SSAISB Fellows of the European Association for Artificial Intelligence
https://en.wikipedia.org/wiki/Infrabel
Infrabel is a Belgian government-owned public limited company. It builds, owns, maintains and upgrades the Belgian railway network, makes its capacity available to railway operator companies, and handles train traffic control. Infrabel was created on 1 January 2005 from the split of the once unitary National Railway Company of Belgium (SNCB/NMBS). By 31 December 2009, it had 12,875 employees, while the CEO was Benoît Gilson, who succeeded the long-serving in that role in 2020. Between its creation in 2005 up until 31 December 2013, 93.6% of stock was owned by SNCB-Holding, representing 20% of the voting rights minus one vote; the remainder, 80% of the voting rights (+ one vote) and 6.4% of stock had been controlled directly by the Belgian state, represented by the minister of the Civil Service and is a Public Companies and by the State Secretary for Mobility. EBITDA for fiscal year 2009 amounted to €55.01 million, EBT to €69.61 million. The balance sheet total as of 31 December 2009 was €13.8 billion. By 31 December 2009, Infrabel oversaw 3,578 kilometres of railway lines, 12,218 switches, 1,913 level crossings (partly the road-side signalling), 223 railway signalling cabins, one traffic control centre, four workshops, 7,163 railway structures, and 339 unmanned stops. Of the 11 railway undertakings certified to operation on the Belgian railway network, six customers effectively drove trains during 2009: National Railway Company of Belgium (SNCB), Crossrail Benelux, Veolia Cargo Nederland BV, SNCF Fret, TrainsporT AG and ERS Railways BV. In the following year, 492 freight and 4,132 passenger train paths per day were delivered by Infrabel. Since 1 January 2014, Infrabel has been an Autonomous Public Company and is no longer owned by SNCB-Holding. The company has two direct subsidiaries: TUC Rail NV/SA and the Brussels Creosote Centre (Creosoteer Centrum Van Brussel/Chantier de Creosotage de Bruxelles NV/SA). Additionally, Infrabel is a partner in the EuroCarex high-speed railway freight project. History During the early to mid 2000s, the National Railway Company of Belgium (SNCB/NMBS) was substantially reorganised, partially in order to comply with relevant legislation set out by the European Union; the railway infrastructure management company Infrabel was created in January 2005 as one of several new railway companies established at this time. SNCB continued to exist as an operator of both passenger and freight trains upon the Belgian railway network, while Infrabel took on the construction, modernisation, maintenance, traffic management, and safe operation of the Belgium rail infrastructure. In addition to regular operations, the new entity was quick to involve itself in multiple public–private partnerships to bring about a variety of improvements. One early focus area for investment by Infrabel was the various ports across Belgium, such works were largely focused on electrification, new signalling systems, and the installation of additional
https://en.wikipedia.org/wiki/Defense%20in%20depth%20%28computing%29
Defense in depth is a concept used in information security in which multiple layers of security controls (defense) are placed throughout an information technology (IT) system. Its intent is to provide redundancy in the event a security control fails or a vulnerability is exploited that can cover aspects of personnel, procedural, technical and physical security for the duration of the system's life cycle. Background The idea behind the defense in depth approach is to defend a system against any particular attack using several independent methods. It is a layering tactic, conceived by the National Security Agency (NSA) as a comprehensive approach to information and electronic security. The term defense in depth in computing is inspired by a military strategy of the same name, but is quite different in concept. The military strategy revolves around having a weaker perimeter defense and intentionally yielding space to buy time, envelop, and ultimately counter-attack an opponent, whereas the information security strategy simply involves multiple layers of controls, but not intentionally ceding ground (cf. honeypot.) Controls Defense in depth can be divided into three areas: Physical, Technical, and Administrative. Physical Physical controls are anything that physically limits or prevents access to IT systems. Fences, guards, dogs, and CCTV systems and the like. Technical Technical controls are hardware or software whose purpose is to protect systems and resources. Examples of technical controls would be disk encryption, File integrity software, and authentication. Hardware technical controls differ from physical controls in that they prevent access to the contents of a system, but not the physical systems themselves. Administrative Administrative controls are organization's policies and procedures. Their purpose is to ensure that there is proper guidance available in regard to security and that regulations are met. They include things such as hiring practices, data handling procedures, and security requirements. Methods Using more than one of the following layers constitutes an example of defense in depth. System and application Antivirus software Authentication and password security Encryption Hashing passwords Logging and auditing Multi-factor authentication Vulnerability scanners Timed access control Internet Security Awareness Training Sandboxing Intrusion detection systems (IDS) Network Firewalls (hardware or software) Demilitarized zones (DMZ) Virtual private network (VPN) Physical Biometrics Data-centric security Physical security (e.g. deadbolt locks) Example In the following scenario a web browser is developed using defense in depth - the browser developers receive security training the codebase is checked automatically using security analysis tools the browser is regularly audited by an internal security team ... is occasionally audited by an external security team ... is executed inside a sandb
https://en.wikipedia.org/wiki/National%20College%20Television
National College Television (NCTV) was an advertiser-supported program network that serviced over 300 college and university television stations. Founded in 1981, the network distributed a schedule of specialized programming to college students. At one point, they claimed a student audience of 7,000,000. The network stopped operations in the Spring of 1990. In 1985, they were one of the first in the world to use TV touch-screen interactive displays used by university students, staff, and others. Programming Audiophilia - NCTV's music concert series spotlighted popular artists of the day. Adult Cartoons — From the archives of the Museum of Cartoon Art, this show featured classic 1920s-1940s cartoons, as well as new animation and international selections. Campus America - newsmagazine (national, produced out of NCTV offices), with hosts Marilyn Freeman and Batt Johnson Healthy State- studio-based health show (national, produced out of NCTV offices) General College - college soap opera that began in 1987 as a student production at the University of North Carolina at Chapel Hill. Jack Fist, P.I. — A comedy film noir detective show set in the 1940s, broadcast in black and white. Columbia University. Mad Dog Cartoons – a later rebranding of Adult Cartoons, adding live hosting by a hillbilly-style comic and his bulldog. New Grooves - billed as "the most progressive mix of music videos anywhere" this show was hosted veteran DJ Meg Griffin, and the playlist was based on reported airplay from over 150 college radio stations. The Spike Jones Show - rebroadcasts of the classic 1950s series starring Jones and The City Slickers. Talk is Cheap - Weekly television interview show hosted by Marilyn Freeman (national, produced out of NCTV offices) Uncensored - a documentary series exploring issues of the day. The Walter Winchell File - featured crime stories from the 1950s TV show featuring the newspaper columnist. Off The Cuff - sketch comedy series produced by the University of North Carolina at Chapel Hill. Null & Void - sketch comedy series produced by UUTV at Syracuse University. Good News, Bad News - sitcom set in a campus newspaper run by the students. Produced by UCLA. The Roommate Game - A tribute to the Newlywed Game, this American University produced game show where roommates were asked a set of questions about their off set roommate, who then returned to answer the same questions. Those with the same answers gained points and won prizes. Sandy Silverman was the initial host. The show was criticized for being somewhat risque among some more conservator NCTV member campuses. College Dating Club - Another game show hosted by Sandy Silverman. Two "babes" would choose from two "Dudes" the remainder of which was the "reject for the day." The show ran only the last season of NCTV in the spring of 1990. References Defunct television networks in the United States Television channels and stations established in 1981
https://en.wikipedia.org/wiki/Amstrad%20PPC%20512
The Amstrad PPC512 and Amstrad PPC640 were the first portable IBM PC compatible computers made by Amstrad. Released in 1987, they were a development of the desktop PC-1512 and PC-1640 models. As portable computers, they contained all the elements necessary to perform computing on the move. They had a keyboard and a monochrome LCD display built in and also had space for disposable batteries to power the PC where a suitable alternative power source (i.e. mains or 12 volt vehicle power) was not available. The PCs came with either one or two double density double side floppy disc drives and the PPC640 model also featured a modem. Both models were supplied with PPC Organiser software and the PPC640 was additionally supplied with the Mirror II communications software. Hardware The two computers had very similar specifications. The PPC512 had an NEC V30 processor running at 8 MHz, 512 KiB of memory, a full-size 102-key keyboard with a numeric keypad, a built-in liquid crystal display (not backlit) that could emulate the CGA or MDA and either one or two 720k 3.5" floppy drives (the model was either the PPC512S or PPC512D depending on the number of drives it had). The PPC640 was otherwise identical except that it had 640 KiB of memory, a built-in 2400 baud modem (unusually fast for its day), and its case was a darker shade of grey. Both versions of the machine had an empty socket on the main circuit board so that an Intel 8087 coprocessor could be installed to permit hardware processing of floating point arithmetic. The PPC included standard connectors for RS-232, Centronics and CGA/MDA video, allowing existing peripherals to be used. All the signals used by the 8-bit ISA bus were also available through a pair of expansion connectors. There was available an external card cage for expansion cards. Four possible power sources could be used: Ten C-size alkaline batteries. (10 x 1.5v = 15 volts, but the load was such the voltage dropped to nearer 12 volts in use) Mains adaptor Car cigarette lighter An Amstrad PC-MD, PC-CD or PC-ECD Monitor (These monitors all contained a power supply) The physical layout of the components was unlike most laptop designs: instead of the lid containing the screen, it contained the keyboard. The hinges were therefore at the front of the main unit, rather than the back. The LCD was hinged separately and folded down into a recess on the top of the system unit. The one or two floppy drives were located on the right-hand side. When closed, the size of the PPC was 45 cm wide × 10 cm high × 23 cm deep. A bank of six DIP switches was used to select whether the video hardware emulated CGA or MDA, and whether to use an internal or external monitor. No official hard drive option or docking station was manufactured, but both were sold by third-party manufacturers. Software MS-DOS 3.3 was supplied with all PPCs, along with PPC Organiser - a memory-resident suite of utilities including a card file, diary, calculator and telep
https://en.wikipedia.org/wiki/Sumatran%20flying%20squirrel
The Sumatran flying squirrel (Hylopetes winstoni) is a flying squirrel only found on the island of Sumatra. It is listed as data deficient on the IUCN red list. Originally discovered in 1949, it is known only from a single specimen. It is a nocturnal, arboreal creature, spending most of its life in the canopy. The Sumatran flying squirrel is threatened by a restricted range and habitat loss due to logging. Unlike most other flying squirrels, it does not have a membrane connecting to its tail. References External links indonesianfauna.com Hylopetes Mammals of Indonesia Mammals described in 1949 Species known from a single specimen
https://en.wikipedia.org/wiki/Tobacco%20Radio%20Network
Tobacco Radio Network was a radio network owned and operated by Capitol Broadcasting Company of Raleigh, North Carolina. Begun in 1942, the network was dedicated to educating and keeping farmers informed of the latest agricultural news, stories, and market standings. With the help of broadcaster Ray Wilkinson, the network went from being broadcast on one North Carolina affiliate to affiliates from Virginia to Florida. In the late 1940s, a sister station was formed called the Tobacco Sports Network, which carried North Carolina collegiate football and basketball. In 1959, the two networks were merged into the Tobacco Network and later that became the Capitol Agribusiness Network. In 1996, all of Capitol Broadcasting's radio networks were restructured and merged into the North Carolina News Network. References http://www.cbc-raleigh.com/division/ncnn.asp http://history.capitolbroadcasting.com/divisions/tobacco-radio-network/page/2/ Defunct radio networks in the United States 1942 establishments in the United States 1996 disestablishments in the United States Radio stations established in 1942 Radio stations disestablished in 1996 Defunct radio stations in the United States
https://en.wikipedia.org/wiki/Syukuro%20Manabe
is a Japanese–American meteorologist and climatologist who pioneered the use of computers to simulate global climate change and natural climate variations. He was awarded the 2021 Nobel Prize in Physics jointly with Klaus Hasselmann and Giorgio Parisi, for his contributions to the physical modeling of earth's climate, quantifying its variability, and predictions of climate change. Early life and education Born in 1931 in Shinritsu Village, Uma District, Ehime Prefecture, Japan. Both his grandfather and his father were physicians, who operated the only clinic in the village. A classmate recalled that, even in elementary school, he was already "interested in the weather, making comments such as 'If Japan didn't have typhoons, we wouldn't have so much rain.'" Manabe attended Ehime Prefectural Mishima High School. When he was accepted into the University of Tokyo, his family expected him to study medicine, but "whenever there's an emergency, the blood rushes to my head, so I would not have made a good doctor." Furthermore, "I had a horrible memory and I was clumsy with my hands. I thought that my only good trait was to gaze at the sky and get lost in my thoughts." He joined the research team of Shigekata Shono (1911-1969), and majored in meteorology. Manabe received a BA degree in 1953, an MA degree in 1955, and a DSc degree in 1958, all from the University of Tokyo. Career After finishing his doctorate, Manabe went to the United States to work at the General Circulation Research Section of the U.S. Weather Bureau, now the Geophysical Fluid Dynamics Laboratory of NOAA, continuing until 1997. From 1997 to 2001, he worked at the Frontier Research System for Global Change in Japan serving as Director of the Global Warming Research Division. In 2002 he returned to the United States as a visiting research collaborator at the Program in Atmospheric and Oceanic Science, Princeton University. He currently serves as senior meteorologist at the university. He also engaged as a specially invited professor at Nagoya University from December 2007 to March 2014. Scientific accomplishments Working at NOAA's Geophysical Fluid Dynamics Laboratory, first in Washington, DC and later in Princeton, New Jersey, Manabe worked with director Joseph Smagorinsky to develop three-dimensional models of the atmosphere. As the first step, Manabe and Wetherald (1967) developed one-dimensional, single-column model of the atmosphere in radiative-convective equilibrium with positive feedback effect of water vapor. Using the model, they found that, in response to the change in atmospheric concentration of carbon dioxide, the temperature increases at the Earth's surface and in the troposphere, whereas it decreases in the stratosphere. The development of the radiative-convective model was a critically important step towards the development of comprehensive general circulation model of the atmosphere (Manabe et al. 1965). They used the model to simulate for the first time the thre
https://en.wikipedia.org/wiki/List%20of%20diplomatic%20missions%20of%20Hungary
Hungary has a wide network of diplomatic missions, having redefined itself as a medium-sized power in Central Europe, and recently has joined NATO (1999) and the European Union (2004). Its network of embassies and consulates abroad reflect its foreign policy priorities in Western Europe, and in neighbouring countries that share historic links to Hungary, as those that host ethnic Hungarians. Current missions Africa Americas Asia Europe Oceania Multilateral organizations Gallery Closed missions Africa Asia Americas See also Foreign relations of Hungary Notes References Ministry of Foreign Affairs of the Republic of Hungary Diplomatic missions Hungary
https://en.wikipedia.org/wiki/Ron%20Jeffries
Ron Jeffries (born December 26, 1939) is one of the three founders of the Extreme Programming (XP) software development methodology circa 1996, along with Kent Beck and Ward Cunningham. He was from 1996, an XP coach on the Chrysler Comprehensive Compensation System project, which was where XP was invented. He is an author of Extreme Programming Installed, the second book published about XP. He has also written Extreme Programming Adventures in C#. He is one of the 17 original signatories of the Agile Manifesto. Background A Quote Books Articles References External links 1939 births Living people Extreme programming American technology writers American computer scientists American computer programmers Agile software development
https://en.wikipedia.org/wiki/Purify
Purify may refer to: Purification (disambiguation), the act or process of purifying IBM Rational Purify, in computing, debugger software Maurice Purify (born 1986), American football wide receiver James & Bobby Purify, American soul music vocal duo Purify (album), a mini album released by the Canadian death metal band Axis of Advance in January 2006 Purify (Funk Trek album), the second album by Omaha funk/jazz fusion band Funk Trek "Purify", a song by Metallica on the album St. Anger "Purify", a song by Neurosis on the album Through Silver in Blood "Purify", a song by Lacuna Coil on the album Unleashed Memories See also Purified (disambiguation) Putrify
https://en.wikipedia.org/wiki/Palm%20Vx
The Palm Vx was a personal digital assistant made by the Palm Computing division of 3Com. It benefited from the sleek design and low weight of its predecessor, the Palm V, while increasing the available storage to 8 MB. At 114 grams, it was one of the lightest models ever offered by Palm. Retail price at launch was US$399. Soon after the release of the Vx, Palm Computing was spun off to form Palm, Inc. As a result, later-production Palm Vx units were the first Palm devices to no longer carry "3Com" branding. Features The Vx is based on the Palm V design, with the primary difference between the two being the Vx's 8 megabytes of RAM compared to the V's 2 megabytes. This was one of the last Palm models not to include an SD/MMC memory card slot. It was also one of the first to feature interaction with email, AvantGo, and other online programs. The Vx is powered by a Motorola Dragonball EZ processor operating at 20 MHz. It was originally equipped with Palm OS 3.3, but later models came with Palm OS 3.5. An upgrade to Palm OS 4.1 was formerly offered for sale on the Palm Website but is no longer available. The device has a built in rechargeable battery (not replaceable unless the unit is disassembled), and a button on the top of the screen that permitted access to a contrast menu. It also includes an illumination feature, which causes the screen to be backlit by a green glow. However, the default backlight behaviour was inverted so that the text glowed while the background remained dark. This had the unfortunate side effect of making backlit pictures appear as negative images and made the display hard to read if the ambient lighting was at the same level as the backlight. The screen is very crisp and clear in bright sunlight and total darkness. Special editions On August 1, 2000, Palm announced the release of a "Claudia Schiffer Edition" of the Palm Vx. The Palm Vx CSE featured a blue brushed-metal finish instead of the usual silver color, and came pre-loaded with a HealtheTec diet, exercise, and weight management software package, and Abroad!, a travel organization program. The device was sold exclusively through the supermodel's website, and retailed for US$399. Palm also released limited edition, colored versions of the Palm Vx without special branding. The special edition was offered in "gold" and "millennium blue". There is also the "Palm CreSenda" edition with a blue faceplate reflecting the corporate color of CreSenda Wireless. References External links Palm.com Details 3Com Debuts Special Edition Palm Computing Organizers for Holiday Season , 3Com/Palm Press Release, October 4, 1999 Palm OS devices Computer-related introductions in 1999 68k-based mobile devices
https://en.wikipedia.org/wiki/Cheat%20Engine
Cheat Engine (CE) is a proprietary, source available freeware memory scanner/debugger created by Eric Heijnen ("Byte, Darke") for the Windows operating system in 2008. Cheat Engine is mostly used for cheating in computer games and is sometimes modified and recompiled to support new games. It searches for values input by the user with a wide variety of options that allow the user to find and sort through the computer's memory. Cheat Engine can also create standalone trainers that can operate independently of Cheat Engine, often found on user forums or at the request of another user. While it is source-available, it is not free and open source software, as its license contains restrictions on redistribution. Features Cheat Engine can view the disassembled memory of a process and allow the addition and/or alteration of game states to give the user advantages such as infinite health, time, or ammunition. It also has some Direct3D manipulation tools, allowing vision through walls "Wallhacking" and zooming in/out "FOV changes", and with some advanced configuration, Cheat Engine can move the mouse to get a certain texture into the center of the screen. This is commonly used to create aimbots. However, the main use for Cheat Engine is in single player aspect of games, and its use in multiplayer games is discouraged. As of version 6.1, Cheat Engine can produce game trainers from the tables. While trainers generated in this way are typically very large for their intended purpose, generally used for testing purposes, some have been released by trainers groups as "final" versions, and even some popular sites are fully based on CE trainers due to the ease of trainer creation with CE. However, despite their popularity, CE trainer maker has not been updated since its implementation in version 6.1—it is largely unsupported, and emphasis is given on using Lua to generate trainers. Even the trainer maker itself uses Lua scripts to generate trainers. Implementations Two branches of Cheat Engine exist, Cheat Engine Delphi and Cheat Engine Lazarus. Cheat Engine Delphi is primarily for 32-bit versions of Windows XP. Cheat Engine Lazarus is designed for 32 and 64-bit versions of Windows 7. Cheat Engine is, with the exception of the kernel module, written in Object Pascal. Cheat Engine exposes an interface to its device driver with dbk32.dll, a wrapper that handles both loading and initializing the Cheat Engine driver and calling alternative Windows kernel functions. Due to a programming bug in Lazarus pertaining to the use of try and except blocks, Cheat Engine Lazarus had to remove the use of dbk32.dll and incorporate the driver functions in the main executable. The kernel module, while not essential to normal CE use, can be used to set hardware breakpoints and bypass hooked API in Ring 3, even some in Ring 0. The module is compiled with the Windows Driver Kit and is written in C. Cheat Engine also has a plugin architecture for those who do not wish to share t
https://en.wikipedia.org/wiki/HPFS
HPFS may refer to: High Performance File System, a computer file system for OS/2 High Point Friends School, a school in North Carolina, US See also Hi Performance FileSystem (HFS), a computer file system for HP-UX HPF (disambiguation)
https://en.wikipedia.org/wiki/Yoav%20Freund
Yoav Freund (; born 1961) is an Israeli professor of computer science at the University of California San Diego who mainly works on machine learning, probability theory and related fields and applications. He is best known for his work on the AdaBoost algorithm, an ensemble learning algorithm which is used to combine many "weak" learning machines to create a more robust one. He and Robert Schapire received the Gödel prize in 2003 for their joint work on AdaBoost. He is an alumnus of the prestigious Talpiot program of the Israeli army. Selected works References External links Freund's homepage at UCSD Living people American computer scientists Gödel Prize laureates University of California, San Diego faculty University of California, Santa Cruz alumni 1961 births
https://en.wikipedia.org/wiki/Batara%20Eto
, formerly known as Batara Kesuma, is the co-founder and Chief Technology Officer (as of 2007) of mixi, a Japanese social networking site. He is currently co-founder and managing partner of East Ventures, a venture capital firm focusing on Japan and Southeast Asia. He proposed mixi in December 2003, and was responsible for creating the corporation. He was born on 27 July 1979 in Medan, Indonesia. He graduated from the Engineering division of Takushoku University. Batara changed his citizenship to Japanese in March 2007, hence changing his last name to Eto, which is passed down from his grandfather who was originally from Japan. References Living people 1979 births Indonesian people of Japanese descent Indonesian emigrants to Japan Naturalized citizens of Japan Indonesian company founders Japanese company founders Japanese people of Indonesian descent Chief technology officers 21st-century Indonesian businesspeople 21st-century Japanese businesspeople
https://en.wikipedia.org/wiki/Network%20booting
Network booting, shortened netboot, is the process of booting a computer from a network rather than a local drive. This method of booting can be used by routers, diskless workstations and centrally managed computers (thin clients) such as public computers at libraries and schools. Network booting can be used to centralize management of disk storage, which supporters claim can result in reduced capital and maintenance costs. It can also be used in cluster computing, in which nodes may not have local disks. In the late 1980s/early 1990s, network boot was used to save the expense of a disk drive, because a decently sized harddisk would still cost thousands of dollars, often equaling the price of the CPU. Hardware support Contemporary desktop personal computers generally provide an option to boot from the network in their BIOS/UEFI via the Preboot Execution Environment (PXE). Post-1998 PowerPC (G3 G5) Mac systems can also boot from their New World ROM firmware to a network disk via NetBoot. Old personal computers without network boot firmware support can utilize a floppy disk or flash drive containing software to boot from the network. Process The initial software to be run is loaded from a server on the network; for IP networks this is usually done using the Trivial File Transfer Protocol (TFTP). The server from which to load the initial software is usually found by broadcasting a Bootstrap Protocol or Dynamic Host Configuration Protocol (DHCP) request. Typically, this initial software is not a full image of the operating system to be loaded, but a small network boot manager program such as PXELINUX which can deploy a boot option menu and then load the full image by invoking the corresponding second-stage bootloader. Installations Netbooting is also used for unattended operating system installations. In this case, a network-booted helper operating system is used as a platform to execute the script-driven, unattended installation of the intended operating system on the target machine. Implementations of this for Mac OS X and Windows exist as NetInstall and Windows Deployment Services, respectively. Legacy Before IP became the primary Layer 3 protocol, Novell's NetWare Core Protocol (NCP) and IBM's Remote Initial Program Load (RIPL) were widely used for network booting. Their client implementations also fit into smaller ROM than PXE. Technically network booting can be implemented over any of file transfer or resource sharing protocols, for example, NFS is preferred by BSD variants. See also Wake-on-LAN (WoL) References External links PXE specification The Preboot Execution Environment specification v2.1 published by Intel & SystemSoft Remote Boot Protocol Draft draft of the PXE Client/Server Protocol included in the PXE specification NetBoot NetBoot 2.0: Boot Server Discovery Protocol (BSDP)
https://en.wikipedia.org/wiki/Paula%20Cwikly
Paula Cwikly is an American soap opera writer for the Daytime television serial The Young and the Restless. She was NBC Daytime's director of daytime programming. She is a 1982 graduate of the University of Dayton. Career As the World Turns Associate Head Writer: Fall 2003 - March 2, 2005, August 5, 2005 - January 6, 2006 Days of Our Lives Co-Head Writer: March 29, 2002 - March 6, 2003 Associate Head Writer: 2000 - March 28, 2002, March 6, 2003 - September 3, 2003 Sunset Beach Writer: 1998 - 1999 The Young and the Restless Breakdown Writer: January 4, 2008 – 2012 Associate Head Writer: August 7, 2006 - August 3, 2007 Awards and nominations Daytime Emmy Awards Nominated for Best Writing; As The World Turns, 2004-06 Winner for Best Writing; As The World Turns, 2005 Writers Guild of America Award Nomination for 2006 Season, The Young And The Restless); 2005 Season; As The World Turns; 2001 Season; Days of our Lives References External links American soap opera writers Daytime Emmy Award winners Year of birth missing (living people) Living people American women television writers Women soap opera writers 21st-century American women
https://en.wikipedia.org/wiki/American%20Oil%20Chemists%27%20Society
The American Oil Chemists' Society (AOCS) is an international professional organization based in Urbana, Illinois dedicated to providing the support network for those involved with the science and technology related to fats, oils, surfactants, and other related materials. Founded in 1909, AOCS has approximately 2,000 members in 90 countries who are active in a total of ten divisions and six sections, of which only one of the sections is within the United States. History The AOCS was started in May 1909 under the name Society of Cotton Products Analysts as a group that promoted recommended methods for chemical processes focused on the cottonseed industry. In 1920, the name was changed to American Oil Chemists' Society.<ref name="SATS">National Academy of Sciences - National Research Council (1961), Scientific and Technological Societies of the United States and Canada, 7th ed.; National Academy of Sciences, National Research Council, Washington D.C.</ref> In 1976, AOCS hosted the first World Conference on Oilseed and Vegetable Oils Processing Technologies in Amsterdam, presided over by the AOCS president Frank White. According to the official AOCS site, "the mission of AOCS is to provide high standards of quality among those with a professional interest in the science and technology of fats, oils, surfactants, and related materials and is continually fulfilled by AOCS Technical Services. Its esteemed products and services help professionals maintain excellence in their industry". Technical (Laboratory) Services AOCS Technical has been facilitating global trade and laboratory integrity through its fine products, programs, and services since 1909. Official Methods and Recommended Practices of the AOCS,6th Edition AOCS methods are used in hundreds of laboratories on all six continents. The 6th Edition contains more than 400 fats, oils and lipid related methods critical for processing and trading. Laboratory Proficiency Program (LPP) The AOCS LPP is the world's most extensive and respected collaborative proficiency testing program for oil- and fat- related commodities, oilseeds, oilseed meals, and edible fats. Established in 1915, more than 500 chemists in over 40 countries participate, creating a who's who list of the finest companies in the fats and oils world. Publications AOCS has published over 100 books, three technical journals related to edible oil chemistry: Journal of the American Oil Chemists' Society (JAOCS), Lipids, Journal of Surfactants and Detergents, and the news magazine, International News on Fats, Oils, and Related Materials (INFORM).'' In addition to its own distribution channels, AOCS has also partnered with online libraries like CRC/Taylor & Francis and Springer to make content available electronically. Meetings AOCS holds the international Annual Meeting every year for both members and non-members. In 2009, the 100th annual meeting was held in Orlando, Florida, celebrating the centennial of the organization. In
https://en.wikipedia.org/wiki/FS-VDSL
The Full Service-VDSL Committee (FS-VDSL) was founded in July 2000 with the aim of rapidly specifying a low cost, high capability end-to-end multi-service network based on VDSL Frequency Band Plan 998 which can be quickly and economically deployed to enable customers, focusing principally on consumer market, to benefit from competition. It was a non-profit international organization based in Switzerland. FS-VDSL was closed, according to its statutes, after 3 years of activity. Its specifications, downstreamed to ITU-T Study Group 16 became international standards as Recommendations H.610 and H.611. At closing time, FS-VDSL was composed of 106 members, including Telcos, Telecommunication manufacturers, chip manufacturers, service providers. Specifications The FS-VDSL Specifications are composed of 5 parts : Operator Requirements Specification (Defining services requirements and infrastructure deployment issues. Protecting digital content is also addressed.) Architecture (SA) Specification (Defining end-to-end platform architecture and protocols) Customer Premises Equipment Specification - CPE - (Defining customer equipment configurations and connectivity functions.) Physical Layer Specification for Interoperable VDSL Systems (Promoting VDSL transceiver interoperability) Operations, Administration, Maintenance & Provisioning Specification (Defining the operational aspects for economic deployment of VDSL platforms) FS-VDSL and ITU-T The Full Service VDSL Specifications were published on June 5, 2002. This means that anybody can access them from this web site, that any vendor can implement them, provided they comply with IPR rules, and that any operator can use them to provide services on their network. This forum has therefore achieved the first objective foreseen when the FS-VDSL Committee was set up in 2000. The normal result should have been to wind up the forum on expiry of its work. However, the FS-VDSL specifications are only private documents, with no legal basis and despite their technical value, they cannot be referenced in official procurements in the same way as recognised standards - only official recognised standards have such status. The Telecommunication Standardisation Sector of the International Telecommunication Union (ITU-T), a multi-governmental entity which is part of the United Nations, has now facilitated this forum to join their efforts to promote global standards. The FS-VDSL Management Committee has agreed to form a specialised group tasked with publishing ITU-T specifications or Recommendations based on the work done so far. This group has been accepted by the ITU-T management as the FS-VDSL Focus Group. The creation of the Focus Group was formally approved by Study Group 16 at its meeting in October 2002. The parts 2 and 3 of the specifications was reformated by the Focus Group as Recommendation H.610 and part 5 as Recommendation H.611 External links Digital subscriber line
https://en.wikipedia.org/wiki/Merle%20Becker
Merle Becker is a television producer/director, and the founder of the independent film company Freakfilms, Inc. Becker was involved in MTV Animation's late-1990s programming, including Beavis and Butthead, Daria, Station Zero, and Cartoon Sushi. She left MTV in early 2000 to start Freakfilms and worked on Comedy Central's Tough Crowd with Colin Quinn. She has also worked on the 59th Annual Tony Awards, as well as various other shows for Fuse, VH1 and MTV. In 2004, Becker produced and directed a documentary, Saving Newburgh. In 2009, Becker produced and directed the award-winning documentary American Artifact: The Rise of American Rock Poster Art, which is now featured in the Rock and Roll Hall of Fame Museum. Merle also won a Telly Award for her YouTube channel, "DIY Film with Merle Becker" in 2023. External links American Artifact: The Rise of American Rock Poster Art Official movie website Freakfilms, Inc. website Living people Year of birth missing (living people) American television directors American women television directors Place of birth missing (living people)
https://en.wikipedia.org/wiki/Acer%20N%20series
The Acer N series is a line of PDAs produced by Acer for the Pocket PC 2002 operating system and its successors over the period 2003 to 2005. The newer models are ones from the n300 series – Acer n310 and Acer n311. The Acer N series is well known for the USB hosts in the newer models. By the time of the introduction of the later models smartphones were thought to beginning to make significant in-roads into the market for PDAs. References N series Windows Mobile Classic devices
https://en.wikipedia.org/wiki/IPDS
IPDS may refer to: IBM Intelligent Printer Data Stream Infrasonic passive differential spectroscopy
https://en.wikipedia.org/wiki/IS1
IS1, IS-1, or variation, may refer to: IS1 IS1 may refer to: HMG Infosec Standard No.1, a computer security standard used in the UK The IBM IS1, an early relational database system IS-1 IS-1 may stand for: The Soviet tank IS-1 the first model of the Soviet Iosif Stalin tank series The first model of the Soviet Istrebitel Sputnikov missile; see anti-satellite weapon Nikitin IS-1, a retractable wing fighter aircraft See also ISI (disambiguation) IS (disambiguation)
https://en.wikipedia.org/wiki/Sport%20TV
Sport TV is a Portuguese sports-oriented premium cable and satellite television network with seven premium channels in Portugal, one sports news channel and one channel in Portuguese-speaking Africa. The first channel, then only known as Sport TV, was launched on 16 September 1998. It is owned by Altice Portugal, NOS, Vodafone Portugal and Global Media Group (and originally had the participation of RTP). It is available in almost all television distribution operators in Portugal as a premium subscription channel. Sport TV broadcasts mainly association football, basketball, volleyball, futsal, rugby, surf, golf, athletics, wrestling, and American sports, combat sports, auto racing, and tennis. It also features debates, news, and sports reports. All Primeira Liga matches are exclusively broadcast by Sport TV, with the exception of Benfica home matches, which are broadcast on the club's channel, BTV. History On 16 September 2005, seven years after the opening of the first channel, Sport TV launched a second channel, SportTV 2. It regularly broadcasts alternative sports such as mountaineering, cycling and radical sports. The channel was available only through ZON TV Funtastic Life package, but the model did not work. They relaunched the channel as a premium channel, also available on Cabovisão and Portugal Telecom's MEO. This was followed in June 2008 by SportTV 3. Sport TV shown UEFA Euro 2008 in HD, through ZON TV. On January 22, 2010, the thematic golf channel SPORT.TV Golfe and its HD simulcast, SPORT.TV Golfe HD were launched. On August 13, 2010, they launched SPORT.TV Liga Inglesa, a HD channel dedicated to the Premier League, broadcasting 380 games and 400 highlights per season, made by the Premier League (also broadcasting on other countries). On January 7, 2011, SPORT.TV1, SPORT.TV2 and SPORT.TV3 started to broadcast in 16:9. On August 13, 2011, all of the SportTV main channels started to broadcast in HD and it was launched a new channel, SPORT.TV4, that also is available in HD. At the same time, the Sport TV HD channel ended its two-year run. On June 5, 2013, Sport TV stopped broadcasting in the United States. On August 1, 2013, SPORT TV launched a new channel, SPORT.TV Live, replacing SPORT.TV4. On August 14, 2014, SPORT.TV Live was renamed to SPORT.TV4 again (there's also SPORT.TV4 HD). SPORT.TV Golfe was renamed to SPORT.TV5, which is also available in HD. Controversies Sport TV is widely regarded as anti-competitive, since it is the only group of channels in Portugal with the rights to broadcast the Primeira Liga matches (except Benfica home games). In September 2007, Sport TV sent a cease and desist to a Portuguese live TV streaming website tvtuga.com because the latter was providing links to streams of UEFA Champions League matches that only SPORT TV had the rights to broadcast in Portugal. This has caused great public concern with regard to the monopoly abuse status of the SPORT TV channels. On 17 January 2011, Sport
https://en.wikipedia.org/wiki/Rick%20Olarenshaw
Rick Olarenshaw (born 1 February 1973) is a former Australian rules footballer in the Australian Football League. He was formerly a boundary rider for Network Seven until being replaced by Matthew Richardson. Playing career Essendon Olarenshaw was recruited from Keilor in 1990 to the Essendon Football Club, where he won the under-19s best and fairest in 1991. He made his senior AFL debut in 1993 with the Bombers and enjoyed a quick rise that year. The left-foot wingman was an important player in the 1993 Bombers premiership side (known as the "Baby Bombers"). Over the following seasons he suffered numerous injuries, particularly to his rib and back, but he went on to enjoy a good season in 1997. Later career/trades Olarenshaw was traded to Collingwood (instead of his preferred club, the Kangaroos) at the end of 1998 after agreeing to leave Essendon. Olarenshaw was disillusioned by the new surroundings at Collingwood and suffered injuries that restricted him to just five games with the club. At the end of 2000, he was traded to the Kangaroos, but he managed only one game before announcing his retirement in 2001. Statistics |- |- style="background-color: #EAEAEA" |style="text-align:center;background:#afe6ba;"|1993† |style="text-align:center;"| | 47 || 16 || 5 || 5 || 207 || 118 || 325 || 75 || 21 || 0.3 || 0.3 || 12.9 || 7.4 || 20.3 || 4.7 || 1.3 || 0 |- ! scope="row" style="text-align:center" | 1994 |style="text-align:center;"| | 47 || 10 || 1 || 1 || 70 || 58 || 128 || 25 || 12 || 0.1 || 0.1 || 7.0 || 5.8 || 12.8 || 2.5 || 1.2 || 3 |- style="background-color: #EAEAEA" ! scope="row" style="text-align:center" | 1995 |style="text-align:center;"| | 47 || 11 || 3 || 2 || 112 || 72 || 184 || 42 || 4 || 0.3 || 0.2 || 10.2 || 6.5 || 16.7 || 3.8 || 0.4 || 2 |- ! scope="row" style="text-align:center" | 1996 |style="text-align:center;"| | 47 || 8 || 1 || 0 || 96 || 76 || 172 || 46 || 7 || 0.1 || 0.0 || 12.0 || 9.5 || 21.5 || 5.8 || 0.9 || 1 |- style="background-color: #EAEAEA" ! scope="row" style="text-align:center" | 1997 |style="text-align:center;"| | 47 || 15 || 2 || 2 || 141 || 117 || 258 || 52 || 23 || 0.1 || 0.1 || 9.4 || 7.8 || 17.2 || 3.5 || 1.5 || 0 |- ! scope="row" style="text-align:center" | 1998 |style="text-align:center;"| | 47 || 17 || 2 || 5 || 140 || 122 || 262 || 50 || 23 || 0.1 || 0.3 || 8.2 || 7.2 || 15.4 || 2.9 || 1.4 || 0 |- style="background-color: #EAEAEA" ! scope="row" style="text-align:center" | 1999 |style="text-align:center;"| | 8 || 5 || 0 || 1 || 28 || 29 || 57 || 13 || 10 || 0.0 || 0.2 || 5.6 || 5.8 || 11.4 || 2.6 || 2.0 || 0 |- ! scope="row" style="text-align:center" | 2000 |style="text-align:center;"| | 8 || 0 || — || — || — || — || — || — || — || — || — || — || — || — || — || — || — |- style="background-color: #EAEAEA" ! scope="row" style="text-align:center" | 2001 |style="text-align:center;"| | 47 || 1 || 0 || 0 || 2 || 2 || 4 || 1 || 0 || 0.0 || 0.0 || 2.0 || 2.0 || 4.0 || 1.0 || 0.0 || 0 |- class="sortbottom" ! co
https://en.wikipedia.org/wiki/The%20One%20with%20Monica%27s%20Thunder
"The One with Monica's Thunder" is the first episode of Friends seventh season. It first aired on the NBC network in the United States on October 12, 2000. Plot The episode begins with the gang celebrating Monica and Chandler's engagement, after Ross finally shows up after missing the proposal. Monica suggests that everyone dress up so that they can go to the Plaza for champagne. Joey announces that he cannot stay out too late as he has a commercial audition in the morning. He is auditioning for the role of a 19-year-old, which is 12 years younger than he is, and his efforts to "de-age" by dressing and acting like a teenager are met with ridicule. Phoebe, on the other hand, would love to sing at the wedding, and badgers Monica until she agrees just to get her to get dressed for the night. While everyone is getting ready, Monica and Chandler have an intimate moment, but are derailed when Chandler has an incident. Chandler leaves to confide in Joey, and later Rachel, for advice. Rachel herself meets up with Ross in the hallway and asks whether they will themselves marry other people in the future. The topic shifts to their relationship, and Rachel compliments Ross on how good he was in bed. She then says that they never had a "bonus night": two exes who have broken up get back together for one night of "no strings attached" sex. Suddenly, both are tempted by the idea, but Ross tries to tell Rachel that it is not a good idea for them to spend the night together. However, the next time Monica opens the door, she is shocked to see Ross and Rachel kissing at the threshold. When they try to apologize, Monica accuses Rachel of stealing her thunder, and preempting Monica's big night by getting back together with Ross. The two ex-lovers protest mightily, and Monica is almost convinced when Phoebe comes in, immediately misinterprets the situation and asks if she can sing at Ross and Rachel's wedding too. When Chandler and Joey return, Joey is also delighted at the "reunion", and Monica accuses Rachel of being unable to stand anyone else being in the spotlight. Rachel tries desperately to patch things up, but Monica is not in the mood to listen and cancels out on going to the Plaza. Chandler follows Monica into the bedroom to calm her down, and they begin to kiss, leading to a resurgence of Chandler's erection, but they are soon interrupted by Phoebe; Joey plants doubts in Phoebe's mind that Monica and Chandler will let them play at their wedding, so she begins demanding her down payment at this point. They refuse, culminating in her picketing their apartment, guitar in hand, over the rest of the night. No sooner have Chandler and Monica reasserted their privacy, Rachel returns to make amends; unfortunately, this evolves into an even bigger fight, and Rachel storms out, telling Ross to come with her so they can have sex. Ross follows to Rachel's room where she tells him they are not really going to do it, she just wants Monica to think they are. She trie
https://en.wikipedia.org/wiki/Arc%20the%20Lad%20%28video%20game%29
Arc the Lad is a tactical role-playing video game developed by G-Craft and published by Sony Computer Entertainment exclusively for the PlayStation. It was the best-selling Japanese PlayStation game of 1995 with over a million copies sold. The story begins as the young girl Kukuru goes to put out the Flame Cion. At the same time, the hero Arc begins his quest to search for his estranged father, who left him and his mother 10 years ago. The two meet after Kukuru has put out the flame and is attacked by monsters. Despite a heavy push for a North American release from RPG fans, the video game media, and third-party publishers, Arc the Lad was never formally released outside of Japan. However, years later it was included in the North American compilation Arc the Lad Collection. Gameplay Arc the Lad is a tactical RPG. In battle, the player has an area where each character may move, much like Final Fantasy Tactics or Tactics Ogre. The areas the player can move are marked by blue tiles, and when using a melee attack on an enemy, the player can attack an enemy at any side the player can reach, and a cursor will be above the enemy to let the player know that he can attack the enemy. If the player uses magic or special abilities to attack the enemy, there will be a red set of tiles that show the player the range in which the spell or attack will reach. Unlike Final Fantasy Tactics, Arc the Lad is not isometric, therefore all tiles are the same size and shape. Outside of battle, the character must select given areas on a map to access them. For example, to reach a battlefield, dungeon, or castle, the player will be given a general world map, to which the player will select a continent, then a map of the continent will be displayed. The player then must select a highlighted area to enter it. The game will always prompt the player to save once the player has selected an area to go to. Virtually no towns can be selected in this game. Only dungeons, small areas, and fields may be selected. Once a player has selected an area, depending on the area chosen, the character may have the ability to explore the entire area. Many areas, however, do not allow for such freedom. Often the player will select an area and this may trigger an event, such as dialogue or battles. Because of this, most of the plot is given through dialogue during events as there are very few non-playable characters, or NPCs, to give information on where the player must go to. At the end of the game, the player can save after beating the final boss. This save data is actually cleared save game data that they can use to transport to a new game in Arc the Lad II. All their characters' stats and attributes and items will be transferred over to Arc the Lad II. Plot and setting Story The game begins with a girl named Kukuru who is a member of the Sacred Clan in Seirya (スメリア, Sumeria), a clan that protects the Flame Cion. She is sent by the mayor of her town to extinguish this flame, but once
https://en.wikipedia.org/wiki/Blood%20Dawn
Blood Dawn is a cyberpunk role-playing game designed by Lawrence R. Sims and first published by Optimus Design Systems in 1996. History Optimus Design Systems (ODS) published the Blood Dawn RPG as a 240-page softcover book in 1996. Three years later, ODS sold the Blood Dawn license to SSDC, Inc. Gameplay This cyberpunk roleplaying game is set in a post-apocalyptic alternate 21st century timeline on Earth. Characters can play "normal" humans or mutants. Character creation uses a "point buy" system: players must distribute 130 ability points between Strength, Manual Dexterity, IQ, Agility, Constitution, Guts, Intuition and Charisma. The player then spends 2000 skill points on skills such as animal husbandry or weather prediction. (If the character is a mage, the player must spend at least 750 of these skill points on spells.) Any leftover skill points can be spent on armor, weapons and equipment. Action resolution compares the difficulty rating of a task with the character's relevant ability. The player must roll a 20-sided dice below the difference between ability and difficulty. Magic uses a point-spend system: mages can cast spells by spending points from a renewable pool, with greater spells requiring more points. Once the mage is out of spell points, the mage must wait until spell points renew in order to cast more spells. Reception In the July 1997 edition of Dragon (Issue 237), Rick Swan thought that Blood Dawn was "ambitious but unfocused, lurching between cynicism and whimsy... But though Blood Dawn is kind of a mess, it’s a fascinating mess, rife with possibility for players willing to sift the gems from the junk." Swan found the character creation system a snap; he was also intrigued by the available pregenerated characters. He found the action resolution system quite simple, and also liked the flexibility of the magic system. But he found the combat system "burdened with a host of variables and nitpicky calculations... All this clutter, I guess, is supposed to enhance realism. But it just made me reach for the aspirin." Swan also criticized the game setting, calling it "your standard Kentucky Fried Earth." Swan criticized the lack of background detail, which he felt would not get a campaign started. "There’s no suitable home base for the PCs. There aren’t any maps. There are a handful of adventure hooks, but no complete scenarios." He concluded with an ambivalent recommendation: "The upside: solid characters, interesting magic system, good presentation. The downside: clunky combat mechanics, sketchy game world, no developed adventures. The verdict: a qualified thumbs up." Reviews Shadis #26 (April, 1996) Arcane #12 (November 1996) References External links Blood Dawn website Cyberpunk role-playing games Role-playing games introduced in 1996
https://en.wikipedia.org/wiki/Kensei%3A%20Sacred%20Fist
Kensei: Sacred Fist, known in Japan as , is a 1998 3D-based fighting game developed by Konami Computer Entertainment Tokyo and published by Konami. It was first released in Japan on November 19, 1998, in North America on December 11, 1998, and in Europe the same year. It was later re-released in 2001 under the reissue title Kensei: Sacred Fist Value Series. The game is a straight-to-console release, without an arcade counterpart. Gameplay Kensei uses a button distribution style, separating them into punch, kick, throw and guard. The system provides the player with a large array of moves and combos, and multi-step throws are available, though both normal and multi-throws can be countered by pressing a button that flashes on the screen. Game speed is rather slow (one of the reasons for it not to become an arcade game), and relies more on timing, strategy and accurate knowledge of attack ranges to land successful combo strings and juggles. Button-mashing is often a bad tactical choice, since the characters remain vulnerable for long times after performing an unsuccessful combo. Jumping is realistic, albeit for some extra height. Sidestepping is allowed but is a much slower move, aside from some characters who integrate special sidesteps in their movesets. The guard button acts rather as a "dodge" button, as the characters' animation shows them avoiding the attacks rather than taking them on their guard. Characters may assume rapidly a counter-offensive position or be "bounced back" to dodge, and the recovery time relies on the player's ability to press the guard button with sufficient time. Low attacks must be guarded by pressing Down + Guard Button, while pressing Up + Guard Button may allow the character to sidestep at the end of a combo. The Arcade game structure of Kensei comprises 10 stages, with the first eight being made up of random opponents. The specific playing character will encounter a sub-boss in the ninth stage while the tenth one will have them facing off against the crime lord Leimeng and the eleventh (and final) one will have the playing character battle against Leimeng's bodyguard Kaiya. Along with the classical Survival, Training, and Time Attack modes, a special mini-game can be activated once all characters have been unlocked: it's a "racing" mode where the player controls a character and makes it run through a circuit, using button mashing to gain speed. Playable Characters The game features 9 initial playable fighters from around the world with their own varied fighting styles and 14 hidden characters that can be unlocked through the completion of the game. Most of the unlockables share a moveset with one of the main characters, with slight modifications regarding the attacking range and combo length. The following is a list of the 9 main characters, with their unlockable counterparts: Yugo Sangunji (Karate, Japan): Yugo was forced into fighting his brother Akira as a result of their parents' disagreement over traini
https://en.wikipedia.org/wiki/MODELLER
Modeller, often stylized as MODELLER, is a computer program used for homology modeling to produce models of protein tertiary structures and quaternary structures (rarer). It implements a method inspired by nuclear magnetic resonance spectroscopy of proteins (protein NMR), termed satisfaction of spatial restraints, by which a set of geometrical criteria are used to create a probability density function for the location of each atom in the protein. The method relies on an input sequence alignment between the target amino acid sequence to be modeled and a template protein which structure has been solved. The program also incorporates limited functions for ab initio structure prediction of loop regions of proteins, which are often highly variable even among homologous proteins and thus difficult to predict by homology modeling. Modeller was originally written and is currently maintained by Andrej Sali at the University of California, San Francisco. It runs on the operating systems Unix, Linux, macOS, and Windows. It is freeware for academic use. Graphical user interfaces (GUIs) and commercial versions are distributed by Accelrys. The ModWeb comparative protein structure modeling webserver is based on Modeller and other tools for automatic protein structure modeling, with an option to deposit the resulting models into ModBase. Due to Modeller's popularity, several third party GUIs for MODELLER are available: EasyModeller is freeware and is one of the earliest third party GUIs for Modeller. Recent version (EasyModeller 4.0) supports Linux and Windows operating system. UCSF Chimera has a simple interface to Modeller. PyMod is a free and open-source plugin for PyMOL and has a comprehensive interface for Modeller. It supports Linux, Windows and macOS. MaxMod is a standalone GUI for MODELLER on Windows. See also List of protein structure prediction software References External links ModWeb EasyModeller - A GUI for Modeller. UCSF Chimera interface to Modeller PyMod - A PyMOL plugin for Modeller MINT - A GUI for Modeller MaxMod - A standalone GUI for Modeller on Windows. Molecular modelling software Computational biology
https://en.wikipedia.org/wiki/Aleph%20One%20%28disambiguation%29
Aleph One () is the second aleph number. Aleph One may also refer to: Aleph One (game engine), an enhanced version of the Marathon 2 game engine Elias Levy, computer security professional, former moderator of Bugtraq Aleph-1 (album), a 2007 album by Alva Noto
https://en.wikipedia.org/wiki/Georgia%20Tech%20Cable%20Network
The Georgia Tech Cable Network (GTCN) is the on-campus television provider of the Georgia Institute of Technology in Atlanta, Georgia. Established in 1995, GTCN serves the on-campus buildings, especially Georgia Tech Housing. Content They have a 123-channel lineup, 24 of which are HD, and two of which (channels 20 and 21) they generate content for themselves. In particular, they have a show called "Ramblin' Research" that shows professors' research and personal interests. In addition, they show many recent movies. The network is also part of the Georgia Tech emergency notification system. Dish Network provides most of GTCN's non-original programming. The service also rebroadcasts several Atlanta-area high-definition channels. The source of this high-definition content is not Dish Network; it is instead taken directly from local over-the-air broadcasts. GTCN also has one of the widest selections of international channels of cable networks in the United States. History The Georgia Tech Cable Network was initially established in 1995, and had 54 channels. There was an interactive show called TutorVision, where Georgia Tech students called in questions to be worked live on TV. Other past shows include Tech Shorts and Dr. Staff, humor shows about life at Georgia Tech. GTCN used to broadcast WREK-FM, Georgia Tech's student-run radio station, on channel 17 from 2003 to early 2009. According to then general manager, Trey Rhodes, the station was “never really notified about [GTCN taking us off the channel], no warning beforehand at all." The station management had an agreement with GTCN that they would be receiving another channel for their new HD content, but instead were demoted to background music for the channel guide. Carol Pulliam, the general manager of GTCN, defended this decision by stating that demoting WREK-FM would allow for the creation of three more HD channels on the network. References External links Official site Georgia Tech Student television networks
https://en.wikipedia.org/wiki/Low-energy%20adaptive%20clustering%20hierarchy
Low-energy adaptive clustering hierarchy ("LEACH") is a TDMA-based MAC protocol which is integrated with clustering and a simple routing protocol in wireless sensor networks (WSNs). The goal of LEACH is to lower the energy consumption required to create and maintain clusters in order to improve the life time of a wireless sensor network. Protocol LEACH is a hierarchical protocol in which most nodes transmit to cluster heads, and the cluster heads aggregate and compress the data and forward it to the base station (sink). Each node uses a stochastic algorithm at each round to determine whether it will become a cluster head in this round. LEACH assumes that each node has a radio powerful enough to directly reach the base station or the nearest cluster head, but that using this radio at full power all the time would waste energy. Nodes that have been cluster heads cannot become cluster heads again for P rounds, where P is the desired percentage of cluster heads. Thereafter, each node has a 1/P probability of becoming a cluster head again. At the end of each round, each node that is not a cluster head selects the closest cluster head and joins that cluster. The cluster head then creates a schedule for each node in its cluster to transmit its data. All nodes that are not cluster heads only communicate with the cluster head in a TDMA fashion, according to the schedule created by the cluster head. They do so using the minimum energy needed to reach the cluster head, and only need to keep their radios on during their time slot. LEACH also uses CDMA so that each cluster uses a different set of CDMA codes, to minimize interference between clusters. Properties Properties of this algorithm include: Cluster based Random cluster head selection each round with rotation. Or cluster head selection based on sensor having highest energy Cluster membership adaptive Data aggregation at cluster head Cluster head communicate directly with sink or user Communication done with cluster head via TDMA Threshold value Shortcomings of LEACH Shortcomings of LEACH include: Remaining energy among the nodes isn't considered when selecting Cluster Heads Random and variable size cluster formations Random and uneven distribution of cluster heads Single hop communication in situations where energy use is less efficient from cluster head to base station Multi-clustering might not be required at some point and, at some point, number of optimum clusters could be as high as N (number of live nodes in the network) References Wireless sensor network Cluster analysis algorithms
https://en.wikipedia.org/wiki/A5%20%28Croatia%29
The A5 motorway () is a motorway in Croatia spanning . It connects Osijek, the largest city in Slavonia region, to the Croatian motorway network at the Sredanci interchange of the A3 motorway. The A5 represents a significant north–south transportation corridor in Croatia and is a part of the European route E73. The A5 motorway route also follows Pan-European corridor Vc. In addition to Osijek, the A5 motorway also passes near Đakovo and Beli Manastir. The first section of the A5, joining the Sredanci interchange to Đakovo, was opened in 2007; the route to Osijek opened in 2009. In 2015, the first section south of the A3, from Sredanci interchange to Svilaj was opened, and the second one, extending to the Sava River and border of Bosnia and Herzegovina, along with the Svilaj bridge on the Croatia – Bosnia and Herzegovina border was opened in 2021. The section between Osijek and Beli Manastir was opened in 2022. Once the entire Pan-European corridor Vc is completed, motorists will recognize the A5's importance as a transit route. When completed, the corridor shall entail the A5 itself extended to the Hungarian border and connected to the Hungarian M6 motorway as well as Bosnia and Herzegovina's A1 motorway and the A10 motorway, completing the corridor route at the Adriatic Sea coast. The motorway consists of two traffic lanes and an emergency lane in each driving direction separated by a central reservation. All intersections of the A5 motorway are grade separated. There are five exits and four rest areas operating along the route. The motorway is tolled using a ticket system, integrated with the A3, and each exit includes a toll plaza. Route description The A5 is an important north–south motorway covering in the eastern Croatian region of Slavonia, connecting the region's largest city, Osijek, to the remainder of the Croatian motorway system. The A5's southern terminus joins the A3 motorway at the Sredanci interchange; its northern terminus is near Osijek, connecting to the city's southern bypass. As a part of the road network of Croatia, the A5 is a part of European route E73. The motorway is of great importance to Croatia's economic development, especially tourism, as it represents a major southward transport route from southern Hungary. The Pan-European corridor Vc will include the A5, and its completion will highlight the importance of the A5 motorway. The cities and towns with an immediate connection to the A5 include Beli Manastir via the D517, Đakovo via the D7 and Čepin via the Ž4105 county road. The A5 motorway consists of two traffic lanes and an emergency lane in each driving direction, with carriageways separated by the median. All existing interchanges are trumpet interchanges, except for Sredanci, which is a cloverleaf. The A5 features a number of rest areas which provide various services including restrooms, filling stations and restaurants. The motorway has four interchanges, providing access to several towns and cities and
https://en.wikipedia.org/wiki/Fuun%20Lion-Maru
, known as Lion-Man outside Japan, was a tokusatsu television series that aired on the Fuji Television Network in Japan in 1973. Produced by P Productions — the studio behind its previous tokusatsu series including Magma Taishi, Spectreman and Kaiketsu Lion-Maru, it was the second series in the Lion-Maru trilogy, and featured a third Maru-like character named Black Jaguar. It also reunites only two actors: Tetsuya Ushio as Shishimaru (Lion Maru) and Yoshitaka Fukushima as Jonosuke (Tiger Joe), since Akiko Kujo and Norihiko Umechi were not featured in the sequel series, who is replace by Ryoko Miyano and Tsunehiro Arai. This Lion-Maru is deemed "the Rolling Tempest Ninja Warrior." Story The series has its context in Feudal Japan where, for any warrior, more important than life itself was to maintain his honor. It tells the story of Dan Shishimaru, a 22-year-old samurai who, after having his brother Dan Kage Noshin killed by Nezuma, a human monster allied with the evil group Mantle, goes into battle with a desire for revenge and justice. Like the original Shishimaru, Dan Shishimaru has the ability to transform into a superpowered anthropomorphic lion, wielding a special katana. Cast Main Cast Shishimaru Dan/Lion Maru (voice): Tetsuya Ushio Shinobu: Ryoko Miyano Sankichi/Taro (ep 14): Tsunehiro Arai Hyoba Kurokage/Black Jaguar (voice) (2-11 & 25) : Masaki Hayasaki Jōnosuke Tora/Tiger Joe (voice): Yoshitaka Fukushima Nijino Nanairo (17-20, 22 & 24): Naoyuki Sugano Voice Actors Mantle God: Kiyoshi Kobayashi Agdar: Tōru Ōhira (ep 1), Yoshiaki Yoda (2-23) Narrator/Monsters: Masaki Okabe Kaiketsu Lion Man (voice) (ep 9): Tetsuya Ushio Shizue (voice) (ep 17 & 18): Ryoko Miyano Stunt Actors Fuun Lion-Maru: Kanehiro Nomiyama Tiger Joe, Jr.: Kenzo Nakayama, Masami Yogawa Kaiketsu Lion Man: Kazuo Kamoshida Agdar: Hiroshi Mihara Monsters: Hajime Araki, Hiromi Hara Shizue (17 & 18): Noriko Egawa Music Opening Theme by & Ending Theme by & International Broadcasts and Home Video In its home country of Japan, the series was released in full on Laserdisc as a 7-disc collection set by Nikkatsu Video on December 24, 1993, titled the "Fuun Lion Maru Perfect Collection." The set contains all 25 episodes of the series. On April 25, 2000, the series was re-released again by Esmock as a new 7-disc collection lineup containing all 25 episodes. On March 25, 2005, Amusesoft released a DVD boxset of the series containing all 25 episodes of the series titled "Fuun Lion Maru Premium Collector's Edition Bullet Box." The series has never been released under any individual singular DVD. The only region in the world besides Japan to air all 25 episodes of this series was in Brazil back in 1989, where it was popularized. It aired on the now-defunct Rede Manchete under Lion-Man (but also Poderoso Lion Man as what the character is known there) with a Brazilian Portuguese dub and due to its success, it caused them to also air the first series Kaiketsu Lion-Maru, afterwards
https://en.wikipedia.org/wiki/A7%20%28Croatia%29
The A7 motorway () is a motorway in Croatia. It connects the nation's largest port in Rijeka, to the Croatian motorway network, as well as to the Rupa and Pasjak border crossings to Slovenia. The motorway forms part of a longitudinal transportation corridor in Croatia, and it is a part of European route E61 Villach–Ljubljana–Trieste–Rijeka. The A7 motorway route south of Orehovica interchange, where it also intersects Pan-European corridor Vb, is a part of European route E65. The A7 motorway runs near a number of Croatian cities and provides access to Učka Nature Park and, indirectly, to numerous resorts in the Istria and Kvarner Gulf regions. The motorway is nationally significant because of its positive economic impact on the cities and towns it connects, and because of its contribution to tourism in Croatia. The importance of the motorway as a transit route will be further increased upon completion of a proposed expansion of the Port of Rijeka and Rijeka transport node. The motorway consists of two traffic lanes and an emergency lane in each driving direction, separated by a central reservation. There are no emergency lanes in the tunnels. All intersections of the A7 motorway are grade separated. Numerous bridges, viaducts, tunnels, and other structures were required as the route traverses rugged terrain. As of 2010, there are ten exits and two rest areas situated along the route. Most of the motorway is not tolled, but a single section is tolled using an open toll system with pricing tied to vehicle classification. Plans for the motorway were officially formulated in 1974 and the construction was started in 1977. The first sections were completed as a two-lane expressway with grade-separated intersections, in 1988 and 1990, comprising the western arm of Rijeka bypass. As the first stage of the A6 motorway construction spanning between Zagreb and Rijeka neared completion in the 2000s, construction of a proper motorway along the A7 route started. In December 2009, the Diračje–Orehovica section was upgraded to a six-lane motorway, bringing the entire route between Rupa border crossing and Sveti Kuzam interchange to a uniform standard. Two new sections of the A7 motorway are currently under construction, extending the route eastward into vicinity of Kraljevica, Crikvenica, and Krk Bridge. The two sections are scheduled to be completed by 2012. Current long-term plans for developing the A7 motorway define its ultimate southern terminus in Žuta Lokva at the interchange of the A1 motorway. This section is no longer part of any short-term plans, as no funding until 2012 is currently scheduled for the section. Further long-term plans specify an outer Rijeka bypass and a new interchange with the A8 expressway. Route description The A7 motorway is an important north–south motorway in western Croatia, connecting the nation's largest port and the city of Rijeka to the Slovenian road network at the Rupa border crossing. The A7 motorway currently co
https://en.wikipedia.org/wiki/List%20of%20Olympic%20medalists%20in%20Rugby%20sevens
This is the complete list of Olympic medalists in rugby sevens. Seven-a-side Men's Women's Notes References International Olympic Committee results database Rugby union medalists Lists of rugby union players
https://en.wikipedia.org/wiki/MBROLA
MBROLA is speech synthesis software as a worldwide collaborative project. The MBROLA project web page provides diphone databases for many spoken languages. The MBROLA software is not a complete speech synthesis system for all those languages; the text must first be transformed into phoneme and prosodic information in MBROLA's format, and separate software (e.g. eSpeakNG) is necessary. History MBROLA project started in 1995 at the TCTS Lab of the Faculté polytechnique de Mons (Belgium) as a scientific project to obtain a set of speech synthesizers for as many languages as possible. The first release of MBROLA software was in 1996 and was provided as freeware for non-commercial, non-military application. Licenses for created voice databases differ, but are also mostly for non-commercial and non-military use. Due to its free usage only for non-commercial applications, MBROLA was as alternative choice for private/home users for de facto speech synthesis engine eSpeakNG in Linux workstations, but mostly was not used for commercial solutions (e.g. for speaking time clocks, boarding notifications for ports and terminals etc.) After initial development of voice databases updates and support of MBROLA software ceased and gradually closed-source binaries fell behind development of recent hardware and operating systems. To deal with this MBROLA development team decided to release MBROLA as open source software, and on October 24, 2018, source code was released on GitHub with GNU Affero General Public License. On January 23, 2019, tool called MBROLATOR was released to provide creation of MBROLA database from WAV files with the same license. Used technology MBROLA software uses MBROLA (Multi-Band Resynthesis OverLap Add) algorithm for speech generation. Although it is diphone-based, the quality of MBROLA's synthesis is considered to be higher than that of most diphone synthesisers as it preprocesses the diphones imposing constant pitch and harmonic phases that enhances their concatenation while only slightly degrading their segmental quality. MBROLA is a time-domain algorithm similar to PSOLA, which implies very low computational load at synthesis time. Unlike PSOLA, however, MBROLA does not require a preliminary marking of pitch periods. This feature has made it possible to develop the MBROLA project around the MBROLA algorithm, through which many speech research labs, companies, or individuals around the world have provided diphone databases for many languages and voices. References MBROLA source code repository Using Festival with MBROLA External links MBROLA voices (database for MBROLA speech synthesizer) MBROLATOR (database creation tool for MBROLA speech synthesizer) Speech synthesis Computational linguistics
https://en.wikipedia.org/wiki/Paterius
Paterius (died 606) was a bishop of Brescia. He is known as a compiler, in particular of works of Pope Gregory I, for whom he had worked as a notary. His sole surviving work is the Liber testimoniorum veteris testamenti, an anthology of Gregory's works of biblical exegesis, arranged in the order of the biblical passages discussed. The work survives in over 120 complete or partial manuscripts. Notes References 6th-century births 606 deaths Bishops of Brescia 6th-century historians 7th-century Italian bishops 6th-century writers in Latin 6th-century Italian writers
https://en.wikipedia.org/wiki/The%20Design%20of%20an%20Optimizing%20Compiler
The Design of an Optimizing Compiler (Elsevier Science Ltd, 1980, ), by William Wulf, Richard K. Johnson, Charles B. Weinstock, Steven O. Hobbs, and Charles M. Geschke, was published in 1975 by Elsevier. It describes the BLISS optimizing compiler for the PDP-11, written at Carnegie Mellon University in the early 1970s. The compiler ran on a PDP-10 and was one of the first to produce well-optimized code for a minicomputer. Because of its elegant design and the quality of the generated code, the compiler and book remain classics in the compiler field. Although the original book has been out of print for many years, a print on demand version remains available from University Microfilms International. Reception Software: Practice and Experience said compiling experts would benefit the most with The Design of an Optimizing Compiler. References External links The Design of an Optimizing Compiler - Online version at CMU Computer programming books Compilers 1975 non-fiction books Elsevier books
https://en.wikipedia.org/wiki/Nils%20John%20Nilsson
Nils John Nilsson (February 6, 1933 – April 23, 2019) was an American computer scientist. He was one of the founding researchers in the discipline of artificial intelligence. He was the first Kumagai Professor of Engineering in computer science at Stanford University from 1991 until his retirement. He is particularly known for his contributions to search, planning, knowledge representation, and robotics. Early life and education Nilsson was born in Saginaw, Michigan, in 1933. He received his Ph.D. from Stanford in 1958, and spent much of his career at SRI International, a private research lab spun off from Stanford. Nilsson served as a lieutenant in the U.S. Air Force from 1958 to 1961; he was stationed at the Rome Air Development Center in Rome, New York. Career SRI International Starting in 1966, Nilsson, along with Charles A. Rosen and Bertram Raphael, led a research team in the construction of Shakey, a robot that constructed a model of its environment from sensor data, reasoned about that environment to arrive at a plan of action, then carried that plan out by sending commands to its motors. This paradigm has been enormously influential in AI. Textbooks such as Introduction to Artificial Intelligence, Essentials of Artificial Intelligence, and the first edition of Artificial Intelligence: A Modern Approach show this influence in almost every chapter. Although the basic idea of using logical reasoning to decide on actions is due to John McCarthy, Nilsson's group was the first to embody it in a complete agent, along the way inventing the A* search algorithm and founding the field of automated temporal planning. In the latter pursuit, they invented the STRIPS planner, whose action representation is still the basis of many of today's planning algorithms. The subfield of automated temporal planning called classical planning is based on most of the assumptions built into STRIPS. Stanford University In 1985, Nilsson became a faculty member at Stanford University, in the Computer Science Department. He was chair of the department from 1985 to 1990. He was the Kumagai Professor of Engineering from the foundation of the Chair in around 1991 until his retirement, and remained Kumagai Professor Emeritus until his death. He was the fourth President of the AAAI (1982–83) and a Founding Fellow of that organization. Nilsson wrote or coauthored several books on AI, including two that have been especially widely read - Principles of Artificial Intelligence (1982) and Logical Foundations of Artificial Intelligence (1987). Awards and memberships In 2011, Nilsson was inducted into IEEE Intelligent Systems' AI's Hall of Fame for the "significant contributions to the field of AI and intelligent systems". Personal life On July 19, 1958, Nilsson married Karen Braucht, with whom he had two children. Braucht died in 1991. In 1992 he married Grace Abbott, who had four children from a previous marriage. Nilsson died on April 23, 2019, at his home in Me
https://en.wikipedia.org/wiki/Jordan%20Raskopoulos
Jordan Nicola Bridget Raskopoulos (born 25 January 1982) is an Australian comedian, actress, streamer and singer best known for her role as a writer and performer on the Network Ten sketch comedy show The Ronnie Johns Half Hour, and as lead singer for comedy rock group the Axis of Awesome (2006–2018). Her father is former footballer Peter Raskopoulos, and her brother is Steen Raskopoulos, a fellow comedian. Career In 2003, Raskopoulos became involved with Impro Australia's Theatresports events including The Belvoir St Theatre Theatresports and the Cranston Cup competitions, winning State and National Titles. In 2005, she became part of the university sketch comedy supergroup The 3rd Degree who performed at the Melbourne International Comedy Festival. This group formed the base of the Network Ten's Logie award-winning cult ensemble sketch comedy television show The Ronnie Johns Half Hour, in which Raskopoulos starred and for which she wrote. After the success of The Ronnie Johns Half Hour, Raskopoulos went on to appear in Stupid, Stupid Man, Stand Up Australia, Hole in the Wall, Good News Week and Thank God You're Here, and has provided voices for the ABC2 machinima series The Team. She was a team captain for a season of the SBS sports show The Squiz. In 2007, her debut solo stage show was called The Adventures of the Man with the Dominant Claw. With her band the Axis of Awesome, Raskopoulos has appeared on Q&A, Good News Week and The Footy Show. In 2022, she appeared on Question Everything. From 2006 until 2018, Raskopoulos fronted the award-winning musical comedy trio the Axis of Awesome, whose parody song "4 Chords" has received over 81 million hits on YouTube and is one of the highest-rated comedy videos on the site. The group came to attention after the release of their songs parodying the 2007 Australian federal election and received a Moosehead award at the 2008 Melbourne International Comedy Festival for their show The Axis of Awesome Comeback Spectacular. Since 2009, the Axis of Awesome have produced four albums and toured extensively in the United States, UK, Europe, Asia and Australia, with sold-out seasons at the Edinburgh Festival Fringe. They broke up in 2018, after a temporary hiatus. Prior to publicly coming out as a trans woman, Raskopoulos wrote articles on transgender issues for Junkee under the pseudonym Nicola Fierce. Logies controversy Raskopoulos was cast in the supporting role of Trax in the 2012 movie Underground: The Julian Assange Story along with Rachel Griffiths, Anthony LaPaglia and Alex Williams. In January 2013, Raskopoulos requested users of the internet forum Something Awful to vote for her in the most popular actor category of the 2013 Logie Awards, promising in return to allow site users to write her acceptance speech. This caused some controversy, with news outlets reporting that Raskopoulos, who despite a high-profile international comedy career was relatively unknown in Australian acting circles, planne
https://en.wikipedia.org/wiki/Knowledge%20Forum
Knowledge Forum is an educational software designed to help and support knowledge building communities. Previously, the product was called Computer Supported Intentional Learning Environments (CSILE). It was designed for a short period of time by York University and continued at the Ontario Institute for Studies in Education, University of Toronto, to support knowledge building pedagogies, practices and research designated in this area. In 1983, CSILE was prototyped in a university course and in 1986 it was used for the first time in an elementary school, as a full version. CSILE was considered the first networked system designed for collaborative learning (Carl Bereiter webpage). The main contributors were Marlene Scardamalia and Carl Bereiter. In 1995, the software was redesigned in accordance to World Wide Web philosophy by OISE in cooperation with Learning in Motion. The new generation was called Knowledge Forum (KF). Knowledge Forum is an asynchronous Computer-mediated communication (CMC) technology that provides a shared discourse environment. It facilitates collaborative knowledge-building strategies, textual and graphical representation of ideas, and reorganization of knowledge artifacts. The product is now used in a variety of social contexts in 19 countries in the Americas, Europe, Asia, Australia and New Zealand. The Institute for Knowledge Innovation and Technology (IKIT) from OISE is the research group that takes charge of future developments of Knowledge Forum. Specifications Knowledge Forum (KF) Server is implemented for Windows, Mac and Linux platforms, while the latest version (KF 4.8) has a Client written in as a hybrid of Java applet and web pages. KF can be used as an e-learning system or as an in-class technology. For each class and course there is a database, individually assigned for each entity. The main feature of the product is called note. With notes, users can do the followings: Offer various options of finding for existing notes Write a new note Co-author, when more users share the authorship for the same note Reference and quote an existing note Annotate allows users to comment on an existing note without creating a new one. Reply (built-on) on a specific note. Rise-above notes which subsume sets of related notes. The main technique that KF uses is called scaffolding (Scardamalia, 2004). Learners use a specific set of scaffolds that directs other toward cognitive operations that will help them to improve their understanding. The basic set of scaffolds is the following one: My theory I need to understand New information This theory cannot explain A better theory Putting our knowledge together Software features Knowledge Forum has some basic components that all Learning Management Systems have. It has facilities for posting messages, searching for notes, uploading documents, and online assignments. However, KF is not a typical LMS. Some features (such as grade book, live chat, student information
https://en.wikipedia.org/wiki/Continuous%20knapsack%20problem
In theoretical computer science, the continuous knapsack problem (also known as the fractional knapsack problem) is an algorithmic problem in combinatorial optimization in which the goal is to fill a container (the "knapsack") with fractional amounts of different materials chosen to maximize the value of the selected materials. It resembles the classic knapsack problem, in which the items to be placed in the container are indivisible; however, the continuous knapsack problem may be solved in polynomial time whereas the classic knapsack problem is NP-hard. It is a classic example of how a seemingly small change in the formulation of a problem can have a large impact on its computational complexity. Problem definition An instance of either the continuous or classic knapsack problems may be specified by the numerical capacity of the knapsack, together with a collection of materials, each of which has two numbers associated with it: the weight of material that is available to be selected and the total value of that material. The goal is to choose an amount of each material, subject to the capacity constraint and maximizing the total benefit In the classic knapsack problem, each of the amounts must be either zero or ; the continuous knapsack problem differs by allowing to range continuously from zero to . Some formulations of this problem rescale the variables to be in the range from 0 to 1. In this case the capacity constraint becomes and the goal is to maximize the total benefit Solution technique The continuous knapsack problem may be solved by a greedy algorithm, first published in 1957 by George Dantzig, that considers the materials in sorted order by their values per unit weight. For each material, the amount xi is chosen to be as large as possible: If the sum of the choices made so far equals the capacity W, then the algorithm sets xi = 0. If the difference d between the sum of the choices made so far and W is smaller than wi, then the algorithm sets xi = d. In the remaining case, the algorithm chooses xi = wi. Because of the need to sort the materials, this algorithm takes time O(n log n) on inputs with n materials. However, by adapting an algorithm for finding weighted medians, it is possible to solve the problem in time O(n). References Combinatorial optimization
https://en.wikipedia.org/wiki/Divine%20Design
Divine Design is a Canadian interior design show which airs on W Network in Canada and HGTV in the United States. It is hosted by Candice Olson, one of Canada's top designers. In the show, Olson heads a team of artisans and skilled labourers that includes Paul Daly (carpenter), Lorne Hogan (carpenter), Chico García (electrician), Edmond Joseph (seamster), Terry Edward Briceland (seamster), and Andrew Downward (painter). The half-hour show features Olson's step-by-step interior redesign of a client's living space mixed with campy comedy shorts before each commercial break. Reruns of the show are seen on Yes TV. Show format At the start of each show, Candice meets the home owners and discusses the issues with the room. Next, Candice reveals her point of inspiration, illustrations and colour scheme to the audience. The room is cleared of all contents, then the walls are painted. Next, the lights are installed. The carpenter generally constructs at least one new custom piece in addition to helping to reset the room with all new furniture. Occasionally, Candice will use the room's existing furniture—if she does, she generally re-upholsters it. Then, the seamster hangs curtains and makes accent pillows. Finally, the room is accessorized. At the end of the show, the room is "revealed" to the homeowners. Usually before or after ads, small comedic skits are performed, such as one episode where she is seen swinging Tarzan style from lighting wiring (episode number unknown). Throughout the program, Candice chooses a handful of specific pieces or techniques to highlight. She refers to her "elevations" and room illustrations to help guide viewers through her vision. Candice often dislikes matching furniture sets, which she calls "matchy, matchy." For example, she will often choose two very different looking nightstands for a bedroom. Candice prefers to use recessed lighting in almost all cases, using spotlights to highlight artwork or other focal points. Branding Candice Olson published "Candice Olson on Design," a book that walks readers through her TV rooms in more complete detail. A 2-disc DVD of several episodes has also been released by PeaceArch Entertainment. External links See also Candice Tells All 2003 Canadian television series debuts 2000s Canadian reality television series 2010s Canadian reality television series 2011 Canadian television series endings W Network original programming
https://en.wikipedia.org/wiki/Gregory%20Ulmer
Gregory Leland Ulmer (born December 23, 1944) is a professor in the Department of English at the University of Florida (Gainesville) and a professor of Electronic Languages and Cybermedia at the European Graduate School in Saas-Fee, Switzerland. Career From 1972 to 1977 Ulmer worked as an assistant professor in the Humanities Department of the University of Florida and became the Acting Chair of the department in 1979. He received tenure in 1977, and he became the co-director of the Institute for European & Comparative Studies (1987–1990), and the director of the film studies program (1986–1989). Many of Ulmer's theories grow out of his home-spun "puncepts" like textshop, choragraphy, applied grammatology, mystory, heuretics, and post(e)-pedagogy. His explorations into what he refers to as an "anticipatory consciousness" designed to utilize the force of intuition as a way to invent emergent forms of knowledge, are methodologically remixed by Ulmerian disciples all over the world. One such project to grow out of Ulmer's magical mystery tour is Illogic of Sense: The Gregory L. Ulmer Remix, an e-book publication that highlights how Ulmer's seminal work has been central to contemporary thinking on the future of writing and new forms of hybridized "digital rhetoric." Published by the Alt-X Press, which was founded by Ulmer's former student turned artist and writer Mark Amerika, the ebook is said to have finally fulfilled the long-promised potential of online publishing to use stimulating visual arrangement, media hybridization, and typographical ingenuity to blur the distinction between publication, exhibition, and design performance, which further brings to mind Ulmer's own self-consciously titled book "Internet Invention." Academic interests Ulmer's work focuses on hypertext, electracy and cyberlanguage and is frequently associated with "emerAgency," "choragraphy," "mystoriography," heuretics, and concept avatar. Following his motto (from the Japanese poet Matsuo Bashō) "not to follow in the footsteps of the masters, but to seek what they sought," Ulmer developed a mode for research and pedagogy that does for electracy what the argumentative essay (paper) does for literacy. He is the author of several books: Illogic of Sense: The Gregory Ulmer Remix; Applied Grammatology: Post(e)-Pedagogy from Jacques Derrida to Joseph Beuys; Teletheory: Grammatology in the Age of Video; Heuretics: The Logic of Invention; Internet Invention: From Literacy to Electracy; and Electronic Monuments. . He has also published numerous articles and maintains a personal website and blog, Heuretics. See also List of thinkers influenced by deconstruction Electracy References External links Gregory Ulmer at the European Graduate School. Biography, bibliography, articles and web resources. Gregory Ulmer at the University of Florida. Biography and publications. Darren Tofts and Lisa Gye (eds.). Illogic of Sense: The Gregory L. Ulmer Remix (Boulder, CO: Alt X P
https://en.wikipedia.org/wiki/MacMag
The MacMag virus, also known by various other names, is a computer virus introduced in 1988 by Richard Brandow, who at the time was editor and publisher of MacMag computer magazine in Montréal. Operation of the virus The virus infects classic Macintosh computers, and the intention was that on 2 March 1988 all infected computers would show the message "RICHARD BRANDOW, publisher of MacMag, and its entire staff would like to take this opportunity to convey their UNIVERSAL MESSAGE OF PEACE to all Macintosh users around the world", and the virus would then delete itself. According to the virus itself, it was written by Drew Davidson. The virus is a boot sector virus, which is spread in the form of a HyperCard stack called "New Apple Products," which contained very poor pictures of the then-new Apple scanner. It copied a resource into the System folder on a Mac, as an "initial" program, which would run automatically every time the system started up. The program then copied itself onto any bootable disk which was opened. Damage caused Brandow intended the virus to be benign, giving a friendly message and causing no harm. However a bug in the virus caused infected Mac II computers to undergo system crashes before this date. Another bug, which affected very few users, caused files other than the original virus to be deleted during the termination stage. It also caused a great deal of anxiety among users who found that their computers were infected with an unwanted program the nature of which was unknown. The virus infected Aldus Corporation's FreeHand, and Aldus had to recall thousands of copies of FreeHand, leading them to threaten legal action. Brandow's Attitudes to the virus Brandow persistently called himself the "author" of the virus, but in fact he did not write it: he commissioned it to be written, and the virus internally contained the name "Drew Davidson". He never apologized, and always indicated that he was proud of his action. When confronted by users who had been adversely affected by the virus he used to reply with an argument about the level of handgun ownership in the United States. References Norstad, John. The Viruses. Disinfectant 3.7.1 ©1988-1997 Northwestern University. Classic Mac OS viruses
https://en.wikipedia.org/wiki/MDEF
MDEF was a computer virus affecting Macintosh machines. There are four known strains. The first, MDEF A (aka Garfield), was discovered in May 1990. Strains B (aka Top Cat), C, and D were discovered in August 1990, October 1990, and January 1991, respectively. MDEF A, B, and C can infect application files and system files, and sometimes document files as well. The D strain will infect only applications. None of the viruses were designed to do damage, but they often do. MDEF D can sometimes damage applications beyond repair. Quick action by computer security personnel and the New York State Police resulted in identification of the author, a juvenile. This was the same person responsible for writing the CDEF virus. References Norstad, John. The Viruses. Disinfectant 3.7.1 ©1988-1997 Northwestern University. Classic Mac OS viruses
https://en.wikipedia.org/wiki/Surajit%20Chaudhuri
Surajit Chaudhuri is an Indian-American computer scientist notable for his contributions to database management systems. He is currently a distinguished scientist at Microsoft Research, where he leads the Data Management, Exploration and Mining group. Chaudhuri is an ACM Fellow. Education He received his B.Tech. from Indian Institutes of Technology (IIT), Kharagpur, and his Ph.D. in computer science from Stanford University in 1991 under Jeffrey Ullman. From 1992 to 1995, he has worked at HP Labs, Palo Alto. References External links Website American computer scientists Fellows of the Association for Computing Machinery Living people Stanford University School of Engineering alumni Year of birth missing (living people) Database researchers Microsoft employees Microsoft Research people People from Redmond, Washington Indian computer scientists
https://en.wikipedia.org/wiki/Marlene%20Scardamalia
Marlene Scardamalia is an education researcher, professor at the Ontario Institute for Studies in Education, University of Toronto. Contributions She is considered one of the pioneers in computer-supported collaborative learning. Other areas of research where Scardamalia made contributions are: Cognitive development Educational uses of computers Intentional learning The nature of expertise Psychology of writing Research-based innovation in learning and knowledge work Knowledge innovation. Since the 1980s she supervised the design, development and research of Computer Supported Intentional Learning Environments (CSILE). The new version of CSILE was renamed Knowledge Forum and has been used in educational technology since 1996. Knowledge Forum was designed to offer technical support for Knowledge building theory. It is designed to help knowledge building communities. From 1996 to 2002, she was the K-12 theme leader for Canada's TeleLearning Network of Centres of Excellence. She is also one of the founders and main researchers of the Institute for Knowledge Innovation and Technology (IKIT). Books by Scardamalia Scardamalia, M., Bereiter, C. Fillion, B. (1981). Writing for Results: A Sourcebook of Consequential Composing Activities; Curriculum Series; Ontario Institute for Studies in Education(44). Bereiter, C. and Scardamalia, M. (1987) The Psychology of Written Composition. Lawrence Erlbaum Associates Bereiter, C. and Scardamalia, M. (1989). Across the World: Reading Skills Workbook Level 3:2. Bereiter, C. and Scardamalia, M. (1993). Surpassing Ourselves: An Inquiry into the Nature and Implications of Expertise. Anderson,V., Brown, A., Scardamalia, M., Campione, J. and Bereiter, C. (1995). Continuous assessment (collections for young scholars, masters/grade 3. Anderson,V., Brown, A., Scardamalia, M., Campione, J. and Bereiter,C. (1995). Essay and writing assessment (collections for Young scholars, masters/grade 3). Bereiter, C., Anderson, A., Brown, A., and Scardamalia, M. (1995). Reproducible Masters - Support for Teacher Tool Cards. Koschmann, T., Scardamalia, M., Zimmerman, B.J., and Bereiter, C. (2000). Problem-based Learning: A Research Perspective on Learning Interactions. Awards In 2008, she became the recipient of the José Vasconcelos World Award of Education for her remarkable contributions in the field of social education, revolutionizing schooling by engaging students more directly and productively in creative work based on knowledge and ideas. See also Carl Bereiter Knowledge building Knowledge Forum IKIT OISE University of Toronto External links The Institute for Knowledge Innovation and Technology The Ontario Institute for Studies in educations Marlene Scardamalia at IKIT Knowledge Forum Further reading Scardamalia, M. (2004). Ask the experts: what's the next revolution in education going to be? [Video series]. Ontario Institute for Studies in Education, University of Toronto. Link to video Ref
https://en.wikipedia.org/wiki/Global%20Historical%20Climatology%20Network
The Global Historical Climatology Network (GHCN) is a data set of temperature, precipitation and pressure records managed by the National Climatic Data Center (NCDC), Arizona State University and the Carbon Dioxide Information Analysis Center. The aggregate data are collected from many continuously reporting fixed stations at the Earth's surface. In 2012, there were 25,000 stations within 180 countries and territories. Some examples of monitoring variables are the total daily precipitation and maximum and minimum temperature. A caveat to this is 66% of the stations report only the daily precipitation. The original idea for the application of the GHCN-M data was to provide climatic analysis for data sets that require daily monitoring. Its purpose is to create a global base-line data set that can be compiled from stations worldwide. This work has often been used as a foundation for reconstructing past global temperatures, and was used in previous versions of two of the best-known reconstructions, that prepared by the NCDC, and that prepared by NASA as its Goddard Institute for Space Studies (GISS) temperature set. The average temperature record is 60 years long with ~1650 records greater than 100 years and ~220 greater than 150 years (based on GHCN v2 in 2006). The earliest data included in the database were collected in 1697. History The initial version of Global Historical Climatology Network was developed in the summer of 1992. This first version, known as Version 1 was a collaboration between research stations and data sets alike to the World Weather Records program and the World Monthly Surface Station Climatology from the National Center for Atmospheric Research. Within the stations, all of them have at least 10 years of data, 2/5 have more than 50 years of data, and 1/10 have 100 years of data.  Version 1, or more commonly notated as V1 was the collection of monthly mean temperatures from 6,000 stations. There were, as of 2022, 3 subsequent versions of the GHCN – M have been created as described below. Map and description The GHCN is one of the primary reference compilations of temperature data used for climatology, and is the foundation of the GISTEMP Temperature Record. This map based on GHCN version 3 shows 7,280 fixed temperature stations in the GHCN catalog color-coded by the length of the available record as of 2007. Sites that are actively updated in the database (2,277) are marked as "active" and shown in large symbols, other sites are marked as "historical" and shown in small symbols. In some cases, the "historical" sites are still collecting data but due to reporting and data processing delays (of more than a decade in some cases) they do not contribute to current temperature estimates. After this map was created, version 4 of GHCN was released and increase the number of reported stations to over 24,000. Advantages These are direct, in-situ measurements which were not interpolated or based on model simulations. This image
https://en.wikipedia.org/wiki/KXPA
KXPA (1540 kHz) is a commercial AM radio station licensed to Bellevue, Washington, and serving the Seattle metropolitan area. It is part of the nationwide Multicultural Radio Broadcasting network, one of 30 stations owned by Arthur Liu, which cater to minority and immigrant communities with programs in their native languages. The transmitter is located off 118th Avenue SE in Bellevue, near Kelsey Creek. KXPA is powered at 5,000 watts. But at night, to avoid interfering with other stations on 1540, KXPA uses a directional antenna, with much of the signal pointed west over Seattle and Puget Sound. Programming KXPA airs brokered ethnic programming days and evenings, with adult standards from the "Music of Your Life" Network heard late nights. Clients buy blocks of time on KXPA and host shows in their native language, supported by advertisers targeting those communities. Languages include Spanish, Russian, Mandarin and Vietnamese. History KXPA is derived from two radio stations. The AM 1540 station signed on the air in March 1964 as KBVU. It was owned by Birch Bay Broadcasting, powered at 1,000 watts. KBVU aired a jazz format, but went dark in 1967. Another station in Bellevue, KFKF, had signed on the air in March 1958 at AM 1330. It was a 1,000-watt daytimer, required to go off the air at sunset. In 1969, Kemper Freeman, who owned KFKF, purchased the license for AM 1540 so he could move his station there and make it a round-the-clock operation. AM 1540 then became KFKF, a completely brand new radio station. Stewart Ballinger bought KFKF in August 1972, switching the call sign to KBES, with a middle of the road (MOR) format. KBES was co-owned with 92.5 KFKF-FM (now KQMV). The two simulcast most of their programming. In November 1974, when 92.5 FM flipped to progressive rock as KZAM-FM, the AM followed suit and became KZAM, still simulcasting. On May 19, 1978, after Sandusky Broadcasting bought the stations, KZAM adopted a "Rock of the ‘80s" new wave format, the first of its kind in the Seattle market. The FM continued to air album rock until July 1983, when it flipped to adult contemporary music. Due to poor ratings, on February 23, 1981, KZAM went back to simulcasting the FM until July 15 of that year, when the AM became all-jazz KJZZ. On December 17, 1984, it became KLSY, with an automated hot adult contemporary sound. It became a complete simulcast of its FM sister a year later. In January 1992, due to Sandusky's purchase of AM 880 KIXI, the Federal Communications Commission's ownership limits put Sandusky over the maximum number of stations in the Seattle area. KLSY was spun off to new owners and became KBLV, with a classic country format known as "Country Gold." KBLV formed a network by simulcasting with KJUN and KJUN-FM in Tacoma, KENU in Enumclaw, KTOL in Olympia, and KWYZ in Everett. In early 1996, the Country Gold Network discontinued operations due to financial problems, with all stations being put up for sale. KBL