source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/EARN
EARN or Earn may refer to: EARN European Academic and Research Network, a defunct computer networking organisation succeeded by TERENA (Trans-European Research and Education Networking Association) Economic Analysis and Research Network, a nationwide (U.S.) network of state and local organizations affiliated with the Economic Policy Institute European Asteroid Research Node, an association of asteroid research groups (see Minor planet) Earn Loch Earn, lake in Scotland River Earn, river in Scotland Bridge of Earn, town in Perthshire, Scotland Earn out, in the purchase of a company etc. Carl Earn (1921–2007), American tennis player See also Earning (disambiguation)
https://en.wikipedia.org/wiki/Call%20admission%20control
Call admission control (CAC) is a form of admission control that prevents or mitigates oversubscription of VoIP networks. CAC is used in the call set-up phase and applies to real-time media traffic as opposed to data traffic. CAC mechanisms complement and are distinct from the capabilities of quality of service tools to protect voice traffic from the negative effects of other voice traffic and to keep excess voice traffic off the network. Since it averts voice traffic congestion, it is a preventive Congestion Control Procedure. It ensures that there is enough bandwidth for authorized flows. Integrated services with RSVP (which reserve resources for the flow of packets through the network) using controlled-load service ensures that a call cannot be set up if it cannot be supported. CAC rejects calls when either there is insufficient CPU processing power, the upstream and downstream traffic exceeds prespecified thresholds, or the number of calls being handled exceeds a specified limit. CAC can be used to prevent congestion in connection-oriented protocols such as ATM. In that context, there are several schemes available. However, VoIP differs in that it uses RTP, UDP and IP, all of which are connectionless protocols. References VoIP protocols
https://en.wikipedia.org/wiki/WAF
WAF, or waf, may refer to: Computing Waf, a software build system written in the Python programming language Web application firewall, a proxy device with protocol awareness of HTTP Web application framework, a software framework that is designed to support the development of dynamic websites, Web applications and Web services Culture World Architecture Festival, an annual festival and awards ceremony for architecture "Wabash Always Fights," the rallying cheer of Wabash College Organisations Welsh Automotive Forum, a company that lobbies the UK government on behalf of the automotive industry in Wales Women in the Air Force (WAF), organized in 1948 and active until 1976 Workers Autonomous Federation, one of several underground trade unions in the People's Republic of China World Archery Federation, a governing sports body World Apostolate of Fátima, a Roman Catholic movement to promote a faith according to the apparitions at Fátima World Armwrestling Federation, a federation of arm wrestling associations which organises world championships Wydad de Fès (Wydad Athletic de Fès), a Moroccan association football club Science and technology WAF1, a protein implicated in p53 transcriptional regulation Weather and Forecasting, an American Meteorological Society journal Width across flats, the distance between the two flats of a wrench (UK: spanner) or socket Wife acceptance factor (or wife approval factor or wife appeal factor), a colloquialism used in discussions related to hi-fi and home theater equipment, home automation Transport Wah Fu station, a proposed MTR station in Hong Kong (MTR station code) Wallyford railway station, East Lothian, Scotland (National Rail station code) Other 'With all faults', a phrase used as a disclaimer of any implied warranty of merchantability (often appears in descriptions of second-hand books, cars, knowledge, etc.)
https://en.wikipedia.org/wiki/RDF%20Schema
RDF Schema (Resource Description Framework Schema, variously abbreviated as RDFS, , RDF-S, or RDF/S) is a set of classes with certain properties using the RDF extensible knowledge representation data model, providing basic elements for the description of ontologies. It uses various forms of RDF vocabularies, intended to structure RDF resources. RDF and RDFS can be saved in a triplestore, then one can extract some knowledge from them using a query language, like SPARQL. The first version was published by the World-Wide Web Consortium (W3C) in April 1998, and the final W3C recommendation was released in February 2014. Many RDFS components are included in the more expressive Web Ontology Language (OWL). Terminology RDFS constructs are the RDFS classes, associated properties and utility properties built on the vocabulary of RDF. Classes Represents the class of everything. All things described by RDF are resources. An rdfs:Class declares a resource as a class for other resources. A typical example of an rdfs:Class is in the Friend of a Friend (FOAF) vocabulary. An instance of is a resource that is linked to the class using the property, such as in the following formal expression of the natural-language sentence: 'John is a Person'. ex:John rdf:type foaf:Person The definition of is recursive: is the class of classes, and so it is an instance of itself. rdfs:Class rdf:type rdfs:Class The other classes described by the RDF and RDFS specifications are: literal values such as strings and integers. Property values such as textual strings are examples of RDF literals. Literals may be plain or typed. the class of datatypes. is both an instance of and a subclass of . Each instance of is a subclass of . the class of XML literal values. is an instance of (and thus a subclass of ). ' the class of properties. Properties Properties are instances of the class and describe a relation between subject resources and object resources. When used as such a property is a predicate (see also RDF: reification). the rdfsdomain of an declares the class of the subject in a triple whose predicate is that property. the rdfs:range of an declares the class or datatype of the object in a triple whose predicate is that property. For example, the following declarations are used to express that the property relates a subject, which is of type , to an object, which is of type : ex:employer rdfs:domain foaf:Person ex:employer rdfs:range foaf:Organization Given the previous two declarations, from the triple: ex:John ex:employer ex:CompanyX can be inferred (resp. follows) that is a , and is a . a property used to state that a resource is an instance of a class. A commonly accepted QName for this property is "a". allows declaration of hierarchies of classes. For example, the following declares that 'Every Person is an Agent': foaf:Person rdfs:subClassOf foaf:Agent Hierarchies of classes support inheritanc
https://en.wikipedia.org/wiki/CPython
CPython is the reference implementation of the Python programming language. Written in C and Python, CPython is the default and most widely used implementation of the Python language. CPython can be defined as both an interpreter and a compiler as it compiles Python code into bytecode before interpreting it. It has a foreign function interface with several languages, including C, in which one must explicitly write bindings in a language other than Python. Design A particular feature of CPython is that it makes use of a global interpreter lock (GIL) on each CPython interpreter process, which means that within a single process, only one thread may be processing Python bytecode at any one time. This does not mean that there is no point in multithreading; the most common multithreading scenario is where threads are mostly waiting on external processes to complete. This can happen when multiple threads are servicing separate clients. One thread may be waiting for a client to reply, and another may be waiting for a database query to execute, while the third thread is actually processing Python code. However, the GIL does mean that CPython is not suitable for processes that implement CPU-intensive algorithms in Python code that could potentially be distributed across multiple cores. In real-world applications, situations where the GIL is a significant bottleneck are quite rare. This is because Python is an inherently slow language and is generally not used for CPU-intensive or time-sensitive operations. Python is typically used at the top level and calls functions in libraries to perform specialized tasks. These libraries are generally not written in Python, and Python code in another thread can be executed while a call to one of these underlying processes takes place. The non-Python library being called to perform the CPU-intensive task is not subject to the GIL and may concurrently execute many threads on multiple processors without restriction. Concurrency of Python code can only be achieved with separate CPython interpreter processes managed by a multitasking operating system. This complicates communication between concurrent Python processes, though the multiprocessing module mitigates this somewhat; it means that applications that really can benefit from concurrent Python-code execution can be implemented with limited overhead. The presence of the GIL simplifies the implementation of CPython, and makes it easier to implement multi-threaded applications that do not benefit from concurrent Python code execution. However, without a GIL, multiprocessing apps must make sure all common code is thread safe. Although many proposals have been made to eliminate the GIL, the general consensus has been that in most cases, the advantages of the GIL outweigh the disadvantages; in the few cases where the GIL is a bottleneck, the application should be built around the multiprocessing structure. After several debates, a project was launched in 2023 to pro
https://en.wikipedia.org/wiki/Perceptual%20Speech%20Quality%20Measure
Perceptual Speech Quality Measure (PSQM) is a computational and modeling algorithm defined in Recommendation ITU-T P.861 that objectively evaluates and quantifies voice quality of voice-band (300 – 3400 Hz) speech codecs. It may be used to rank the performance of these speech codecs with differing speech input levels, talkers, bit rates and transcodings. P.861 was withdrawn and replaced by Recommendation ITU-T P.862 (PESQ), which contains an improved speech assessment algorithm. Why it is used Using the PSQM standard allows automated, simulation-based test methodologies to objectively rate both speech clarity and transmitted voice quality. Various software and/or hardware products have been developed to facilitate this testing. This results in considerable savings in cost and time over the traditional practice of using large groups of people to subjectively evaluate voice signals and assess voice quality. Moreover, it yields objective results that are reliable and reproducible. This is very important to telephony providers who are mandated to maintain high Quality of Service standards. Algorithm PSQM uses a psychoacoustical mathematical modeling (both perceptual and cognitive) algorithm to analyze the pre and post transmitted voice signals, yielding a PSQM value which is a measure of signal quality degradation and ranges from 0 (no degradation) to 6.5 (highest degradation). In turn, this result may be translated into a mean opinion score (MOS), which is an accepted measure of the perceived quality of received media on a numeric scale ranging from 1 to 5. A value of 1 indicates unacceptable, poor quality voice while a value of 5 indicates high voice quality with no perceptible issues. The PSQM algorithm converts the physical-domain signal(s) into the perceptually meaningful psychoacoustic domain through a series of nonlinear processes such as time-frequency mapping, frequency warping and intensity warping. The quality of the coded speech is judged on the differences in the internal representation. The difference is used for the calculation of the noise disturbance as a function of time and frequency. Besides perceptual modeling, the PSQM algorithm uses cognitive modeling such as loudness scaling and asymmetric masking in order to get high correlations between subjective and objective measurements. Limitations PSQM as originally conceived was not developed to account for network Quality of Service perturbations common in Voice over IP applications, items such as packet loss, delay variance (jitter) or non-sequential packets. These conditions usually give inappropriate results under heavy network load simulations, failing to account for a very real perceived loss of voice quality. Attempts to duplicate network fault conditions by introducing significant packet loss result in PSQM values that correspond to falsely inflated MOS values. In order to overcome this limitation, PSQM+ was developed by modifying the original algorithm. PSQM+ generates
https://en.wikipedia.org/wiki/PTV%20%28Family%20Guy%29
"PTV" is the fourteenth episode in the fourth season of the American animated television series Family Guy. It originally aired on the Fox network in the United States on November 6, 2005. The episode sees the Federal Communications Commission (FCC) censor the shows on television after a controversial wardrobe malfunction at the Emmy Awards. Peter starts to create his own TV network which he calls PTV, broadcasting classic shows unedited and uncut, as well as original programming. PTV is a big success and Stewie and Brian join him creating shows for the network. Lois calls the FCC to close PTV as she is concerned over the issue of how children will be influenced by Peter's programming. Not only do the FCC close down the network, but they also start censoring the citizens of Quahog, so the Griffin family travels to Washington, D.C., and convince the Congress to have the FCC's rules reversed. The episode was written by Alec Sulkin and Wellesley Wild and was directed by Dan Povenmire. The episode is a response to the FCC's measures to the Super Bowl XXXVIII halftime show controversy. Show creator Seth MacFarlane commented that the episode's plot was inspired by the rage of the Family Guy crew towards the strict rules that the FCC made after the controversy. The episode contains a sequence of various scenes from different previous episodes. Many of the scenes were cut from the episodes they were originally made for owing to Fox's internal censors. With a Nielsen rating of 4.4, "PTV" was the nineteenth most-watched episode of the week in which it was broadcast. The episode gained mostly positive responses from critics, and received a Primetime Emmy Award nomination for Outstanding Animated Program (for Programming Less Than One Hour) as well as an Annie Award nomination for directing. Plot In a sequence unconnected to the remainder of the episode, Stewie prevents Osama bin Laden from sending a hostile message to the United States by attacking him and killing several of his henchmen, and (in a parody of the opening scene from The Naked Gun) rides off on his Big Wheel, cycling through the scenes from various films and video games. He eventually arrives at his house, where he runs over Homer Simpson. Upon seeing Homer on the ground, Peter asks "Who the hell is that?" In the episode itself, Peter awakens Lois by noisily installing a red carpet in their bedroom, anticipating watching the Emmy Awards, but Lois forces him to go to Meg's school play (which resembles the musical Godspell) instead. After David Hyde Pierce's wardrobe malfunction during the ceremony, the FCC, led by Cobra Commander, receives an insignificant volume of phone calls concerning the incident, and decides to censor any content from television that could be even slightly harmful to viewers. The censorship is applied to such content as Chrissy Snow's cleavage from Three's Company, Ralph Kramden’s threats of spousal abuse on The Honeymooners and even Dick Van Dyke's name. Peter is o
https://en.wikipedia.org/wiki/DBT
DBT may refer to: Danish Board of Technology, a technology assessment institution in Denmark data build tool (dbt), a data analytics tool DBT (gene) DBT Online Inc. a US data mining company Department for Business and Trade, United Kingdom Department of Biotechnology, India .dbt, the extension of a DBase file format Design-basis tornado within a Design basis accident of a nuclear facility Deutscher Bundestag, the lower house of the bicameral parliament of Germany Dialectical behavior therapy, a psychotherapy for psychiatric illnesses such as borderline personality disorder Dibenzothiophene, a chemical compound Dibutyltryptamine, a psychedelic drug Digital breast tomosynthesis, a breast X-ray technique Direct Benefit Transfer, an anti-poverty program launched by Government of India Disney Branded Television Double-blind trial, a methodology for scientific experiments Drive-By Truckers, an alt-country/rock band Dynamic Binary Translation, a technique often used by emulator software
https://en.wikipedia.org/wiki/Argument-dependent%20name%20lookup
In the C++ programming language, argument-dependent lookup (ADL), or argument-dependent name lookup, applies to the lookup of an unqualified function name depending on the types of the arguments given to the function call. This behavior is also known as Koenig lookup, as it is often attributed to Andrew Koenig, though he is not its inventor. During argument-dependent lookup, other namespaces not considered during normal lookup may be searched where the set of namespaces to be searched depends on the types of the function arguments. Specifically, the set of declarations discovered during the ADL process, and considered for resolution of the function name, is the union of the declarations found by normal lookup with the declarations found by looking in the set of namespaces associated with the types of the function arguments. Example An example of ADL looks like this: namespace NS { class A {}; void f(A& a, int i) {} } // namespace NS int main() { NS::A a; f(a, 0); // Calls NS::f. } Even though the function is not in namespace NS, nor is namespace NS in scope, the function is found because of the declared types of the actual arguments in the function call statement. A common pattern in the C++ Standard Library is to declare overloaded operators that will be found in this manner. For example, this simple Hello World program would not compile if it weren't for ADL: #include <iostream> #include <string> int main() { std::string str = "hello world"; std::cout << str; } Using << is equivalent to calling operator<< without the std:: qualifier. However, in this case, the overload of operator<< that works for string is in the std namespace, so ADL is required for it to be used. The following code would work without ADL (which is applied to it anyway): #include <iostream> int main() { std::cout << 5; } It works because the output operator for integers is a member function of the std::ostream class, which is the type of cout. Thus, the compiler interprets this statement as std::cout.operator<<(5); which it can resolve during normal lookup. However, consider that e.g. the const char * overloaded operator<< is a non-member function in the std namespace and, thus, requires ADL for a correct lookup: /* will print the provided char string as expected using ADL derived from the argument type std::cout */ operator<<(std::cout, "Hi there") /* calls a ostream member function of the operator<< taking a void const*, which will print the address of the provided char string instead of the content of the char string */ std::cout.operator<<("Hi there") The std namespace overloaded non-member operator<< function to handle strings is another example: /*equivalent to operator<<(std::cout, str). The compiler searches the std namespace using ADL due to the type std::string of the str parameter and std::cout */ std::cout << str; As Koenig points out in a personal note, without ADL the compiler would indicate an error stating it could not
https://en.wikipedia.org/wiki/Aleph%20kernel
Aleph is a discontinued operating system kernel developed at the University of Rochester as part of their Rochester's Intelligent Gateway (RIG) project in 1975. Aleph was an early step on the road to the creation of the first practical microkernel operating system, Mach. Aleph used inter-process communications to move data between programs and the kernel, so applications could transparently access resources on any machine on the local area network (which at the time was a 3-Mbit/s experimental Xerox Ethernet). The project eventually petered out after several years due to rapid changes in the computer hardware market, but the ideas led to the creation of Accent at Carnegie Mellon University, leading in turn to Mach. Applications written for the RIG system communicated via ports. Ports were essentially message queues that were maintained by the Aleph kernel, identified by a machine unique (as opposed to globally unique) ID consisting of a process id, port id pair. Processes were automatically assigned a process number, or pid, on startup, and could then ask the kernel to open ports. Processes could open several ports and then "read" them, automatically blocking and allowing other programs to run until data arrived. Processes could also "shadow" another, receiving a copy of every message sent to the one it was shadowing. Similarly, programs could "interpose" on another, receiving messages and essentially cutting the original message out of the conversation. RIG was implemented on a number of Data General Eclipse minicomputers. The ports were implemented using memory buffers, limited to 2 kB in size. This produced significant overhead when copying large amounts of data. Another problem, realized only in retrospect, was that the use of global ID's allowed malicious software to "guess" at ports and thereby gain access to resources they should not have had. And since those IDs were based on the program ID, the port IDs changed if the program was restarted, making it difficult to write servers with clients that could rely on a specific port number for service. References Monolithic kernels University of Rochester
https://en.wikipedia.org/wiki/Chilevisi%C3%B3n
Chilevisión (often abbreviated as CHV) is a Chilean free-to-air television channel. It is the third oldest Chilean television network, owned by Paramount Networks Americas, being founded by the University of Chile on November 4, 1960. History Origins When the Institute for Electrical Research and Testing of the Faculty of Physical and Mathematical Sciences of the University of Chile informed the rector Juan Gómez Millas, in 1959, that the experiments were already sufficiently advanced to attempt the permanent operation of a canal, this instructs the Secretary-General, Álvaro Bunster, to establish the corresponding contact with the engineers and to provide the necessary elements for its start-up. Thus, from the very beginning, Channel 9 is assumed as an institutional project of the rectory. Within the University Council, diverse positions were expressed. The deans of the more traditional faculties viewed the initiative with reluctance. They rejected the idea that "the university continues to embark on projects that, in a way, mean becoming a Corfo-Cultural", according to Álvaro Bunster. But some shared cultural extension principles and discovered a powerful tool for it in the new environment. Among these stood out the Dean of the Faculty of Philosophy and Education, Eugenio González, who started a real battle for university television. In its approach, university television is synonymous with cultural television. This position prevailed, and Bunster - the rector's trusted official - was in charge of shaping it. Thus, in May 1960, the Audiovisual Department was created, reporting directly to the General Secretary. Historian Leopoldo Castedo traveled from Berkeley, United States to assume the first direction of the debuting Audiovisual Department that, apart from the television section, includes the former departments of Experimental Cinema, Cinematheque, and Photography. As Director of the channel, Raúl Aicardi, a journalist with extensive experience in the radio field and, at that time, working in the Office of Film and Radio of the US Embassy, is in charge of the Chair of Audiovisual Journalism. from the School of Journalism. The Bunster-Castedo-Aicardi formula, as the first managers of the channel, expresses the search to guarantee the central political and institutional control of the channel, the cultural management of the station, and technical efficiency in its operation. Both the selection of people —all administrative or academic from the university—and the generation of a special instance closely linked to the rectory for the start-up show the explicit institutional will to run the channel as a properly university project. This first stage of Channel 9 coincides with the end of the second term of the rector Juan Gómez Millas, who in cultural matters continues and deepens the principles of the extension of his predecessor Juvenal Hernández. For the rector of modernization, television is justified as a means to "cooperate with public
https://en.wikipedia.org/wiki/KRXI-TV
KRXI-TV (channel 11) is a television station in Reno, Nevada, United States, affiliated with the Fox network. It is owned by Sinclair Broadcast Group, which provides certain services to primary sports-formatted independent station and secondary MyNetworkTV affiliate KNSN-TV (channel 21, owned by Deerfield Media) and NBC affiliate KRNV-DT (channel 4, owned by Cunningham Broadcasting) through separate joint sales and shared services agreements (JSA/SSA). However, Sinclair effectively owns KRNV as the majority of Cunningham's stock is owned by the family of deceased group founder Julian Smith. The three stations share studios on Vassar Street in Reno; KRXI-TV's transmitter is located on Peavine Peak. History The station began operations on New Year's Day 1996, taking the Fox affiliation from KAME which was owned by a separate subsidiary of Cox Enterprises. KRXI-DT2 added RTV on January 7, 2008. The station was depicted in the episode "Drive" of The X-Files as part of a police chase that took place during the show. On July 20, 2012, one day after Cox Media Group purchased WAWS and WTEV in Jacksonville, Florida, and KOKI-TV and KMYT-TV in Tulsa, Oklahoma, from Newport Television, Cox put KRXI-TV (along with the LMA for KAME-TV) and sister stations WTOV-TV in Steubenville, Ohio, WJAC-TV in Johnstown, Pennsylvania, and KFOX-TV in El Paso, Texas (all in markets that are smaller than Tulsa), plus several radio stations in medium to small markets, on the selling block. On February 25, 2013, Cox announced that it would sell the four television stations, and the LMA for KAME, to Sinclair Broadcast Group. The Federal Communications Commission (FCC) granted its approval on April 30, 2013, one day after it approved the sale of sister station, KRXI. The sale was finalized on May 2, 2013. Sinclair would subsequently purchase the non-license assets of a third Reno station, KRNV-DT, on November 22, 2013. Sinclair could not buy KRNV-DT outright because Reno has only six full-power stations—three too few to legally permit a duopoly. With the sale of KRNV's license to Cunningham, Sinclair now controls half of those stations. The sale also created a situation in which a Fox affiliate is the nominal senior partner in a duopoly involving an NBC affiliate and a "Big Three" station. News operation KRXI simulcasts newscasts from former sister station and current Fox owned-and-operated station KTVU in Oakland, California. It includes an hour-long prime time news (weeknights at 10:00 p.m.). All newscasts are presented in high definition from KTVU's studios at Jack London Square in Downtown Oakland. During the nightly news at 10:00 p.m., there were local weather cut-ins provided by AccuWeather meteorologists (weeknights and weekends at 10:40 p.m.). These forecast segments, taped in advance, originate from headquarters on Science Park Road in State College, Pennsylvania. Both of the weather cut-ins ended on June 17, 2014 (weeknights) and on June 20, 2014 (weekends), in favor
https://en.wikipedia.org/wiki/Utility%20computing
Utility computing, or computer utility, is a service provisioning model in which a service provider makes computing resources and infrastructure management available to the customer as needed, and charges them for specific usage rather than a flat rate. Like other types of on-demand computing (such as grid computing), the utility model seeks to maximize the efficient use of resources and/or minimize associated costs. Utility is the packaging of system resources, such as computation, storage and services, as a metered service. This model has the advantage of a low or no initial cost to acquire computer resources; instead, resources are essentially rented. This repackaging of computing services became the foundation of the shift to "on demand" computing, software as a service and cloud computing models that further propagated the idea of computing, application and network as a service. There was some initial skepticism about such a significant shift. However, the new model of computing caught on and eventually became mainstream. IBM, HP and Microsoft were early leaders in the new field of utility computing, with their business units and researchers working on the architecture, payment and development challenges of the new computing model. Google, Amazon and others started to take the lead in 2008, as they established their own utility services for computing, storage and applications. Utility computing can support grid computing which has the characteristic of very large computations or sudden peaks in demand which are supported via a large number of computers. "Utility computing" has usually envisioned some form of virtualization so that the amount of storage or computing power available is considerably larger than that of a single time-sharing computer. Multiple servers are used on the "back end" to make this possible. These might be a dedicated computer cluster specifically built for the purpose of being rented out, or even an under-utilized supercomputer. The technique of running a single calculation on multiple computers is known as distributed computing. The term "grid computing" is often used to describe a particular form of distributed computing, where the supporting nodes are geographically distributed or cross administrative domains. To provide utility computing services, a company can "bundle" the resources of members of the public for sale, who might be paid with a portion of the revenue from clients. One model, common among volunteer computing applications, is for a central server to dispense tasks to participating nodes, on the behest of approved end-users (in the commercial case, the paying customers). Another model, sometimes called the virtual organization (VO), is more decentralized, with organizations buying and selling computing resources as needed or as they go idle. The definition of "utility computing" is sometimes extended to specialized tasks, such as web services. History Utility computing merely means "Pay
https://en.wikipedia.org/wiki/Hollywood%20Showdown
Hollywood Showdown is an American game show that aired on both PAX TV and Game Show Network from January to June 2000, then returned solely to GSN on January 1, 2001 and ran until March 30 of that year. Reruns aired on GSN again from September 2004 to April 2005 plus June 2006 and June 2007 on TV Guide Network. Todd Newton served as host, with Randy West announcing. The show was one of GSN's most popular shows at the time of its airing. Format Seven (originally six) contestants competed against each other over the course of five episodes (ranging Monday through Friday), competing to answer trivia questions pertaining to the entertainment industry. One contestant was in control of the game at any given time, while the others sat in a gallery, each holding an envelope. One of the envelopes held a "Box Office" card, while the others contained cards with cash amounts ranging from $100 to $1,000 in increments of $10. Initial control of the first game on each Monday episode was determined at random. The contestant in control selected one gallery member, who opened his/her envelope and revealed its contents. The host then read a series of toss-up questions, each with three answer choices and open for either contestant to buzz-in. A correct answer awarded one point, while a miss gave the opponent a chance to answer and steal the point. The first contestant to score three points took/retained control, while the opponent had to sit out the remainder of the game. If the gallery member's card showed a dollar amount, it was added to the Box Office jackpot, which began at $10,000 for the start of each Monday episode and was reset to this value after being collected. If the gallery member had the "Box Office" card, the winner of that question round played for the jackpot. Box Office The object of the Box Office round was to answer five open-ended questions correctly. Before each question, the contestant was presented with two category choices. The first four correct answers were worth $500 each, and the fifth won the jackpot. After any correct answer, the contestant could either end the round and keep all money won to that point, or continue to the next question. An incorrect response at any time ended the round and forfeited the accumulated money. If the contestant either ended the round or missed a question, he/she had initial control for the next game. Any contestant who won the jackpot immediately retired from the show, whereupon a new contestant was introduced and given initial control. Friday Payoff Each week was a self-contained competition, meaning that a game in progress on Friday could not continue into the following Monday. If a game was in progress when time ran out on Friday, all remaining gallery members opened their envelopes, and the one holding the Box Office card competed in the final question round for that week. The winner of that round could either accept $1,000 and leave the show, or return on the following Monday to play against a
https://en.wikipedia.org/wiki/Ferranti%20Pegasus
Pegasus was an early British vacuum-tube (valve) computer built by Ferranti, Ltd that pioneered design features to make life easier for both engineers and programmers. Originally it was named the Ferranti Package Computer as its hardware design followed that of the Elliott 401 with modular plug-in packages. Much of the development was the product of three men: W. S. (Bill) Elliott (hardware); Christopher Strachey (software) and Bernard Swann (marketing and customer support). It was Ferranti's most popular valve computer with 38 being sold. The first Pegasus was delivered in 1956 and the last was delivered in 1959. Ferranti received funding for the development from the National Research Development Corporation (NRDC). At least two Pegasus machines survive, one in The Science Museum, London and one which was displayed in the Science and Industry Museum, Manchester but which has now been removed to the storage in the Science Museum archives at Wroughton. The Pegasus in The Science Museum, London ran its first program in December 1959 and was regularly demonstrated until 2009 when it developed a severe electrical fault. In early 2014, the Science Museum decided to retire it permanently, effectively ending the life of one of the world's oldest working computers. The Pegasus officially held the title of the world's oldest computer until 2012, when the restoration of the Harwell computer was completed at the National Museum of Computing. Design In those days it was common for it to be unclear whether a failure was due to the hardware or the program. As a consequence, Christopher Strachey of NRDC, who was himself a brilliant programmer, recommended the following design objectives: The necessity for optimum programming (favoured by Alan Turing) was to be minimised, "because it tended to become a time-wasting intellectual hobby of the programmers". The needs of the programmer were to be a governing factor in selecting the instruction set. It was to be cheap and reliable. The first objective was only partially met: because both program and the data on which it was to operate had to be in the 128 words of primary storage contained in 8-word nickel delay lines. The rest of the memory was held on a 7936-word magnetic drum, which rotated at 3750 rpm, so it was often necessary to use ingenuity to reduce the number of transfers between the fast store and the drum. Pegasus had eight accumulators, seven of which could also be used as index registers, the first computer to allow this dual use. Accumulators 6 and 7 were known as p and q and were involved in multiply and divide and some double-length shift instructions. Each word contained 39 bits plus 1 bit for parity checking. Two 19-bit instructions were packed into one word, with the extra bit that could be used to indicate a breakpoint (optional stop), to assist in debugging. In line with Strachey's second objective, it had a relatively generous instruction set for a computer of its time, but there was no
https://en.wikipedia.org/wiki/Computer-aided%20audit%20tools
Computer-assisted audit tool (CAATs) or computer-assisted audit tools and techniques (CAATTs) is a growing field within the IT audit profession. CAATs is the practice of using computers to automate the IT audit processes. CAATs normally include using basic office productivity software such as spreadsheets, word processors and text editing programs and more advanced software packages involving use statistical analysis and business intelligence tools. But also more dedicated specialized software are available (see below). CAATs have become synonymous with data analytics in the audit process. Traditional auditing vs CAATs Traditional audit example The traditional method of auditing allows auditors to build conclusions based upon a limited sample of a population, rather than an examination of all available or a large sample of data. CAATTs alternative CAATTs, not CAATs, addresses these problems. CAATTs, as it is commonly used, is the practice of analyzing large volumes of data looking for anomalies. A well-designed CAATTs audit will not be a sample, but rather a complete review of all transactions. Using CAATTs the auditor will extract every transaction the business unit performed during the period reviewed. The auditor will then test that data to determine if there are any problems in the data. Traditional audit vs CAATTs on specific risks Another advantage of CAATTs is that it allows auditors to test for specific risks. For example, an insurance company may want to ensure that it doesn't pay any claims after a policy is terminated. Using traditional audit techniques this risk would be very difficult to test. The auditor would "randomly select" a "statistically valid" sample of claims (usually if any of those claims were processed after a policy was terminated). Since the insurance company might process millions of claims the odds that any of those 30–50 "randomly selected" claims occurred after the policy was terminated is extremely unlikely. Using CAATTs the auditor can select every claim that had a date of service after the policy termination date. The auditor then can determine if any claims were inappropriately paid. If they were, the auditor can then figure out why the controls to prevent this failure. In a real-life audit, the CAATTs auditor noted that several claims had been paid after policies were terminated. Using CAATTs the auditor was able to identify every claim that was paid and the exact dollar amount incorrectly paid by the insurance company. Furthermore, the auditor was able to identify the reason why these claims were paid. The reason why they were paid was because the participant paid their premium. The insurance company, having received a payment, paid the claims. Then after paying the claim the participant's check bounced. When the check bounced, the participant's policy was retrospectively terminated, but the claim was still paid costing the company hundreds of thousands of dollars per year. Which looks better in an
https://en.wikipedia.org/wiki/Logie%20Awards%20of%201999
The 41st Annual TV Week Logie Awards was held on Sunday 11 April 1999 at the Crown Palladium in Melbourne, and broadcast on the Nine Network. The ceremony was hosted by Andrew Denton, and guests included Isaac Hayes, Kevin Sorbo, Kathy Griffin, Portia De Rossi and Trudie Goodwin. Winners and nominees In the tables below, winners are listed first and highlighted in bold. Gold Logie Acting/Presenting Most Popular Programs Most Outstanding Programs Performers Isaac Hayes Deborah Conway Hall of Fame After a lifetime in Australian television, Mike Walsh became the 16th inductee into the TV Week Logies Hall of Fame. References External links 1999 television awards 1999 1999 in Australian television
https://en.wikipedia.org/wiki/Comparison%20of%20Pascal%20and%20C
The computer programming languages C and Pascal have similar times of origin, influences, and purposes. Both were used to design (and compile) their own compilers early in their lifetimes. The original Pascal definition appeared in 1969 and a first compiler in 1970. The first version of C appeared in 1972. Both are descendants of the ALGOL language series. ALGOL introduced programming language support for structured programming, where programs are constructed of single entry and single exit constructs such as if, while, for and case. Pascal stems directly from ALGOL W, while it shared some new ideas with ALGOL 68. The C language is more indirectly related to ALGOL, originally through B, BCPL, and CPL, and later through ALGOL 68 (for example in case of struct and union) and also Pascal (for example in case of enumerations, const, typedef and booleans). Some Pascal dialects also incorporated traits from C. The languages documented here are the Pascal of Niklaus Wirth, as standardized as ISO 7185 in 1982, and the C of Brian Kernighan and Dennis Ritchie, as standardized in 1989. The reason is that these versions both represent the mature version of the language, and also because they are comparatively close in time. ANSI C and C99 (the later C standards) features, and features of later implementations of Pascal (Turbo Pascal, Free Pascal) are not included in the comparison, despite the improvements in robustness and functionality that they conferred. Syntax Syntactically, Pascal is much more ALGOL-like than C. English keywords are retained where C uses punctuation symbols – Pascal has and, or, and mod where C uses &&, ||, and % for example. However, C is more ALGOL-like than Pascal regarding (simple) declarations, retaining the type-name variable-name syntax. For example, C can accept declarations at the start of any block, not just the outer block of a function. Semicolon use Another, more subtle, difference is the role of the semicolon. In Pascal, semicolons separate individual statements within a compound statement; instead in C, they terminate the statement. In C, they are also syntactically part of the statement (transforming an expression into a statement). This difference manifests mainly in two situations: in Pascal, a semicolon can never be directly before else, whereas in C, it is mandatory, unless a block statement is used the last statement before an end or until is not required to be followed by a semicolon A superfluous semicolon can be put on the last line before end, thereby formally inserting an empty statement. Comments In traditional C, there are only /* block comments */. This is only supported by certain Pascal dialects like MIDletPascal. In traditional Pascal, there are { block comments } and (* block comments *). Modern Pascal, like Object Pascal (Delphi, FPC), as well as modern C implementations allow C++ style comments // line comments Identifiers and keywords C and Pascal differ in their interpretation of upp
https://en.wikipedia.org/wiki/A%26E%20Networks
{{Infobox company | name = A&E Television Networks, LLC | logo = A+E Networks 2017.svg | type = Joint venture | founded = | hq_location_city = New York City, New York | hq_location_country = United States | key_people = | industry = Mass media | products = Home videofilms | services = Broadcasting & Cable TV | equity = est. $20 billion | equity_year = 2013 | owners = Each of 50% owned by: | parent = Each of 50% owned by: | divisions = | subsid = | footnotes = | homepage = }}A&E Networks (stylized as A+E NETWORKS) is an American multinational broadcasting company that is a 50–50 joint venture between Hearst Communications and The Walt Disney Company through its General Entertainment Content division. The company owns several non-fiction and entertainment-based television brands, including its namesake A&E, History, Lifetime, FYI, and their associated sister channels, and holds stakes in or licenses their international branches. History A&E was formed from the merger of the Alpha Repertory Television Service and the Entertainment Channel, a premium cable channel, in 1984 with their respective owners keeping stakes in the new company. Thus A&E's shareholders were Hearst and ABC (from ARTS) and Radio City Music Hall (Rockefeller Group) and RCA, then the parent of NBC (from Entertainment Channel). The company launched Arts & Entertainment Network, a cultural cable channel, on February 1, 1984. In 1990, after having aired episodes of its original 1960's version starting in 1987, A&E acquired rights to, and started producing new episodes of, the documentary series Biography— which became the channel's flagship program. The network also introduced its own companion magazine A&E Monthly. The company indicated that plans for a history channel were in the works in 1993; it purchased the Lou Reda Productions documentary library and long-term rights for the Hearst Entertainment documentaries archive. In June 1993, the Rockefeller Group's Radio City Music Hall sold its 12.5% stake in A&E to the other three partners (now including NBC in place of RCA after GE's purchase of the latter in 1986) with NBC owning 25% and the other two 37.5% each. Also that month, a new production unit was set up. A&E Networks The A&E channel expanded to Canada, and later Mexico from 1993 to 1994. Biography began airing 5 nights a week in 1994. Also in 1994, A&E, on its 10th anniversary, changed its name from Arts and Entertainment to A&E. The A&E company launched The History Channel on January 1, 1995, with its UK counterpart following on November 1 in partnership with British Sky Broadcasting. A&E Networks considered History to be the driver in international expansion due to a lack of international rights to A&E international co-productions. As expected, the History Channel led A&E's overseas expansion in Brazil with TVA (April 1996), the Nordic and Baltic regions with Modern Times Group (1997), and in Canada (1997). By 1997, the company had started its AETN Intern
https://en.wikipedia.org/wiki/List%20of%20programs%20broadcast%20by%20ABC%20%28Australian%20TV%20network%29
This is a list of television programmes that are currently being broadcast or have been broadcast on ABC Television's ABC TV (formerly ABC1), ABC TV Plus (formerly ABC2 and ABC Comedy), ABC Kids (formerly ABC 4 Kids), ABC Me (formerly ABC3) or ABC News (formerly ABC News 24) in Australia. Current programming Domestic News and current affairs Local productions ABC News 7pm weeknights in NSW/ACT/QLD/VIC/SA/NT/WA/TAS (1956–present) National programs produced in Sydney 7.30 (2011–present) ABC News Mornings (2010–present on ABC and ABC News) ABC News at Noon (2005–present on ABC and ABC News) ABC News Afternoons (2010–present on ABC News) ABC Late News (2018–present) Australian Story (1996–present) The Business (2006–present) The Drum (2010–present) Foreign Correspondent (1992–present) Four Corners (1961–present) Landline (1991–present) The Mix (2014–present) One Plus One (2013–present) Planet America (2012–2013, 2016–present) Q&A (2008–present) Weekend Breakfast (2012–present) National programs produced in Melbourne ABC News at Five (2012–present) China Tonight (2021–present) Insiders (2001–present) News Breakfast (2008–2011 on ABC2, 2011–present on ABC) The World (2010–present) Drama Bay of Fires (2023) Fires (2021–present) Goodwood (2022) Harrow (2018–present) The Heights (2019–present) In Our Blood (2023) Jack Irish (2012–present) The Messenger (2023) Mystery Road (2018–present) The Newsreader (2021–present) Savage River (2022–present) Significant Others (2022–present) Total Control (2019–present) Troppo (2022–present) Comedy All My Friends Are Racist (2021–present) Aunty Donna's Coffee Cafe (2023) Black Comedy (2014–present) Content (2019–present on iView) Fisk (2021–present on iView) Frayed (2019–present) Gold Diggers (2023) The Letdown (2016–present) Limbo (2023) Mother and Son (comedy, 1984–1994, 2023–) Preppers (2021–present) Question Everything (2021–present) Sammy J's Democratic Party (2017–present) Summer Love (2022–present) Tomorrow Tonight (2018, 2022–present) Utopia (2014–present) Entertainment The ABC Of (2022–present) Anh's Brush with Fame (2016–present) Back in Time for Dinner (2018–present) Back in Time for the Corner Shop (2023) Comedy Next Gen (2017–present on ABC Comedy) Escape from the City (2019–present) Gruen (2008–present) Hard Quiz (2016–present) Julia Zemiro's Home Delivery (2013–present) Just Between Us: There’s Something I Want To Tell You (2021–present) Kitchen Cabinet (entertainment 2012–2016, 2023) Take 5 With Zan Rowe (2022–present) The Weekly with Charlie Pickering (2015–present) Win the Week (2021–present) You Can't Ask That (2016–present) Documentary Australia Remastered (2020–present) Australia’s Wild Odyssey (2023) Ask the Doctor (2017–present) A Dog's World (2022–present) Back to Nature (2021–present) Back Roads (2015–present) Better Date Than Never (2023) Beyond the Towers (2021–present) Big Deal (2021) The Black Hand (2023) Books that Made Us (2021–present) Catalyst (2001–present) Compass (1988–present
https://en.wikipedia.org/wiki/Prewitt%20operator
The Prewitt operator is used in image processing, particularly within edge detection algorithms. Technically, it is a discrete differentiation operator, computing an approximation of the gradient of the image intensity function. At each point in the image, the result of the Prewitt operator is either the corresponding gradient vector or the norm of this vector. The Prewitt operator is based on convolving the image with a small, separable, and integer valued filter in horizontal and vertical directions and is therefore relatively inexpensive in terms of computations like Sobel and Kayyali operators. On the other hand, the gradient approximation which it produces is relatively crude, in particular for high frequency variations in the image. The Prewitt operator was developed by Judith M. S. Prewitt. Simplified description In simple terms, the operator calculates the gradient of the image intensity at each point, giving the direction of the largest possible increase from light to dark and the rate of change in that direction. The result therefore shows how "abruptly" or "smoothly" the image changes at that point, and therefore how likely it is that part of the image represents an edge, as well as how that edge is likely to be oriented. In practice, the magnitude (likelihood of an edge) calculation is more reliable and easier to interpret than the direction calculation. Mathematically, the gradient of a two-variable function (here the image intensity function) is at each image point a 2D vector with the components given by the derivatives in the horizontal and vertical directions. At each image point, the gradient vector points in the direction of largest possible intensity increase, and the length of the gradient vector corresponds to the rate of change in that direction. This implies that the result of the Prewitt operator at an image point which is in a region of constant image intensity is a zero vector and at a point on an edge is a vector which points across the edge, from darker to brighter values. Formulation Mathematically, the operator uses two 3×3 kernels which are convolved with the original image to calculate approximations of the derivatives - one for horizontal changes, and one for vertical. If we define as the source image, and and are two images which at each point contain the horizontal and vertical derivative approximations, the latter are computed as: where here denotes the 2-dimensional convolution operation. Since the Prewitt kernels can be decomposed as the products of an averaging and a differentiation kernel, they compute the gradient with smoothing. Therefore, it is a separable filter. For example, can be written as The x-coordinate is defined here as increasing in the "left"-direction, and the y-coordinate is defined as increasing in the "up"-direction. At each point in the image, the resulting gradient approximations can be combined to give the gradient magnitude, using: Using this information, we can als
https://en.wikipedia.org/wiki/GOL%20TV
GOL TV is an American TV sports channel dedicated to soccer owned by GOLTV Inc., based in North Bay Village, Florida. The network broadcasts Portugal Primeira Liga, Paraguayan Primera División, Uruguayan Primera División, Chilean Primera División and Ecuadorian Serie A matches. The network was among the first which started a trend of bilingual broadcasting among networks which serve both English language and Spanish language customers, a strategy since emulated by competitor beIN Sports with their English and Spanish networks and BabyFirst TV. GOL TV maintains one main feed with both English and Spanish language audio and bilingual promotional advertising (though paid programming can vary between English and Spanish and is not cross-translated). Some providers offer the two feeds as separate channels, while others present it as one channel with language selection handled by the viewer at the set-top box through the provider's secondary audio program (SAP) feature. Ownership GOL TV is a corporation of Florida, USA. , Enzo Francescoli was its CEO and managing director. Carriage As of 2017, GOL TV is available on Spectrum, and is available on Spanish language packages on DirecTV and AT&T U-verse. As of October 1, 2018, GOL TV is no longer included in Verizon Fios' channel line-up. Cox removed it from the lineup on April 1, 2019. Talent All based at Nix Media in Lima, Peru In English: Nino Torres: Play-by-play (lead) Piero Montalvo: Play-by-play Manuel Oyola: Play-by-play Programs UEFA Primeira Liga (Portugal) KNVB Cup CONMEBOL Ecuadorian Serie A Peruvian Primera División (one match each week, broadcast taken from GOLPERU) Uruguayan Primera División Chilean Primera División Other programs Tu Fútbol - A weekly series that provides a recap and highlights of league matches from Uruguay. Tu Fútbol: Uruguay airs on Monday at 7:30 p.m. ET. Portugol - A weekly series showcasing a full recap and highlights of the Portuguese Primeira Liga. The program airs every Tuesday night starting at 7:30 p.m. ET. Foot Brazil - A weekly series that provides a recap and highlights of all the games from the São Paulo State Championship and the Brasileirão Serie A, as well as interviews with the biggest stars of Brazilian soccer. It airs on Wednesdays at 7 p.m. and 10 p.m. ET. The Football Review Clubland Former programs Campeonato Brasileiro, Campeonato Paulista Spanish La Liga (2004-2012), Copa del Rey Dutch Eredivisie UEFA Europa League CONCACAF qualifiers for the Gold Cup and FIFA World Cup Lamar Hunt U.S. Open Cup Final German Bundesliga Coppa Italia Supercoppa Italiana GOL TV HD GOL TV HD is a 1080i high definition simulcast of GOL TV that launched on August 1, 2010. Time Warner Cable in New York City added it on August 27, 2010. See also GolTV Canada GOL TV (Latin American) References External links Gol TV Celebrates First Anniversary Official Site Gol TV Canada Gol TV Latinoamérica Television channels and stations established in
https://en.wikipedia.org/wiki/LogMeIn%20Hamachi
LogMeIn Hamachi is a virtual private network (VPN) application developed and released in 2004 by Alex Pankratov. It is capable of establishing direct links between computers that are behind network address translation (NAT) firewalls without requiring reconfiguration (when the user's PC can be accessed directly without relays from the Internet/WAN side). Like other VPNs, it establishes a connection over the Internet that emulates the connection that would exist if the computers were connected over a local area network (LAN). Hamachi became a LogMeIn product after the acquisition of Applied Networking Inc. in 2006. It is currently available as a production version for Microsoft Windows and macOS, as a beta version for Linux, and as a system-VPN-based client compatible with Android and iOS. For paid subscribers Hamachi runs in the background on idle computers. The feature was previously available to all users but became restricted to paid subscribers only as of November 19, 2012. Operational summary Hamachi is a proprietary centrally-managed VPN system, consisting of the server cluster managed by the vendor of the system and the client software, which is installed on end-user devices. Client software adds a virtual network interface to a computer, and it is used for intercepting outbound as well as injecting inbound VPN traffic. Outbound traffic sent by the operating system to this interface is delivered to the client software, which encrypts and authenticates it and then sends it to the destination VPN peer over a specially initiated UDP connection. Hamachi currently handles tunneling of IP traffic including broadcasts and multicast. The Windows version also recognizes and tunnels IPX traffic. Each client establishes and maintains a control connection to the server cluster. When the connection is established, the client goes through a login sequence, followed by the discovery process and state synchronization. The login step authenticates the client to the server and vice versa. The discovery is used to determine the topology of the client's Internet connection, specifically to detect the presence of NAT and firewall devices on its route to the Internet. The synchronization step brings a client's view of its private networks in sync with other members of these networks. When a member of a network goes online or offline, the server instructs other network peers to either establish or tear down tunnels to the former. When establishing tunnels between the peers, Hamachi uses a server-assisted NAT traversal technique, similar to UDP hole punching. Detailed information on how it works has not been made public. This process does not work on certain combinations of NAT devices, requiring the user to explicitly set up a port forward. Additionally 1.0 series of client software are capable of relaying traffic through vendor-maintained 'relay servers'. In the event of unexpectedly losing a connection to the server, the client retains all its tunnels a
https://en.wikipedia.org/wiki/Yahoo%21%20Music
Yahoo! Music was a brand under which Yahoo! provided a variety of music services, including Internet radio, music videos, news, artist information, and original programming. Previously, users with Yahoo! accounts could gain access to hundreds of thousands of songs sorted by artist, album, song and genre. History Yahoo Music began as "LAUNCH", a website and magazine produced by LAUNCH Media which Yahoo acquired for US$12 million in 2001. LAUNCH was later rebranded as "Yahoo Music", then simply "Y! Music" in February 2005. LAUNCH's LAUNCHcast Internet radio and music video offerings were integrated into Yahoo's site along with artist profiles containing an extensive selection of music and biographical information. On September 14, 2004, Yahoo purchased Musicmatch, Inc., makers of the Musicmatch Jukebox software. As of Musicmatch 10.1, Yahoo has rebranded Musicmatch Jukebox as Yahoo Music Musicmatch Jukebox, and integrated it with the Yahoo Music Engine store. The main difference is the branding and physical program. In 2005, Yahoo Music became the first major online music service to provide a $5 per month unlimited download service similar to the Open Music Model, albeit with digital rights management, called Yahoo! Music Unlimited. Yahoo Music was the number one online music site in terms of audience reach and total time spent in March 2007. In 2008, Yahoo announced that Yahoo Music Unlimited will be merged into Rhapsody. This merge was completed with the shutdown of Yahoo Music Unlimited on September 30, 2008. In 2011, Yahoo Music became the main CBS Radio player, with its rival AOL Radio switching to Slacker Radio. A year later, Yahoo would switch to iHeartRadio as its music service. As of September 2018, Yahoo! Music's site has been consolidated into Yahoo! Entertainment's site and all Yahoo! Music's URLs redirect to Yahoo! Entertainment with its own "Music" section. Services Yahoo Music offered a variety of services, including: Artist profiles, music videos and lyrics Live Sets – video concerts from A-list artists Official Grammy Awards coverage Pepsi Smash on Yahoo Music – video interviews, performances, and reality segments Play – music identifier Who's Next – Listeners' vote on emerging artists Yahoo! Music Jukebox Yahoo! Music Radio (formerly LAUNCHcast; content provided by iHeartRadio) and LAUNCHcast Plus Internet radio (until February 2009) Yahoo! Music Unlimited subscription streaming and download service References External links Music American music websites Music Internet properties established in 2001 Internet properties disestablished in 2018
https://en.wikipedia.org/wiki/Savitzky%E2%80%93Golay%20filter
A Savitzky–Golay filter is a digital filter that can be applied to a set of digital data points for the purpose of smoothing the data, that is, to increase the precision of the data without distorting the signal tendency. This is achieved, in a process known as convolution, by fitting successive sub-sets of adjacent data points with a low-degree polynomial by the method of linear least squares. When the data points are equally spaced, an analytical solution to the least-squares equations can be found, in the form of a single set of "convolution coefficients" that can be applied to all data sub-sets, to give estimates of the smoothed signal, (or derivatives of the smoothed signal) at the central point of each sub-set. The method, based on established mathematical procedures, was popularized by Abraham Savitzky and Marcel J. E. Golay, who published tables of convolution coefficients for various polynomials and sub-set sizes in 1964. Some errors in the tables have been corrected. The method has been extended for the treatment of 2- and 3-dimensional data. Savitzky and Golay's paper is one of the most widely cited papers in the journal Analytical Chemistry and is classed by that journal as one of its "10 seminal papers" saying "it can be argued that the dawn of the computer-controlled analytical instrument can be traced to this article". Applications The data consists of a set of points {xj, yj}, j = 1, ..., n, where xj is an independent variable and yj is an observed value. They are treated with a set of m convolution coefficients, Ci, according to the expression Selected convolution coefficients are shown in the tables, below. For example, for smoothing by a 5-point quadratic polynomial, m = 5, i = −2, −1, 0, 1, 2 and the jth smoothed data point, Yj, is given by , where, C−2 = −3/35, C−1 = 12 / 35, etc. There are numerous applications of smoothing, which is performed primarily to make the data appear to be less noisy than it really is. The following are applications of numerical differentiation of data. Note When calculating the nth derivative, an additional scaling factor of may be applied to all calculated data points to obtain absolute values (see expressions for , below, for details). Location of maxima and minima in experimental data curves. This was the application that first motivated Savitzky. The first derivative of a function is zero at a maximum or minimum. The diagram shows data points belonging to a synthetic Lorentzian curve, with added noise (blue diamonds). Data are plotted on a scale of half width, relative to the peak maximum at zero. The smoothed curve (red line) and 1st derivative (green) were calculated with 7-point cubic Savitzky–Golay filters. Linear interpolation of the first derivative values at positions either side of the zero-crossing gives the position of the peak maximum. 3rd derivatives can also be used for this purpose. Location of an end-point in a titration curve. An end-point is an inflection poin
https://en.wikipedia.org/wiki/Change%20management%20auditing
Change management auditing is the process by which companies can effectively manage change within their information technology systems. Changes to computer software must be monitored in order to reduce the risk of data loss, corruption, malware, errors, and security breaches. Change risks Proper change control auditing can lower the following risks: Security features of the network turn off. Harmful code is distributed to users. Sensitive data is lost or becomes insecure. Financial report errors occur. Control procedure The following features are commonly part of a change management auditing procedure: Change management procedures are formally documented and controlled. Changes are requested in a formal process. Requests are recorded and stored for reference. The effect of the requested change is assessed.Each change is assessed based on its projected effect to the computer system and business operations. The assessment is documented with the request. Priority is based on urgency, potential benefits, and the ease with which changes can be corrected. Controls are imposed on changes.Changes are limited by automated or manual controls. In particular, unauthorized changes are periodically searched for. An emergency change process is in place.Policies clearly define emergency changes. Generally, these are errors that significantly impair system function and business operations, increase the system's vulnerability, or both. Emergency changes override some, but not all, controls. For instance, a proposed change might be documented, but not permitted without authorization. Change documentation is periodically updated. Maintenance tasks and changes are recorded. Controls are applied to new software releases.For security, new software releases often require controls such as back ups, version control, and a secure implementation. Software distribution is assessed for compliance.Software distribution is assessed for compliance with license agreements. Noncompliance can have disastrous financial and legal results. Changes are submitted for approval.Proposed changes are submitted for approval after auditors have reviewed the required resources, other changes, the effect, urgency, and the system's stability. Duties are separatedResponsibility for creation, approval, and application are assigned to different personnel to avoid undesired changes. Changes are reviewed.Changes are monitored to assess the efficacy of change management policies. See also Change management Information technology audit Information technology audit - operations References External links International Organization for Standardization (ISO) Information Systems Audit and Control Association (ISACA) Information technology management
https://en.wikipedia.org/wiki/Digital%20Data%20Communications%20Message%20Protocol
Digital Data Communications Message Protocol (DDCMP) is a byte-oriented communications protocol devised by Digital Equipment Corporation in 1974 to allow communication over point-to-point network links for the company's DECnet Phase I network protocol suite. The protocol uses full or half duplex synchronous and asynchronous links and allowed errors introduced in transmission to be detected and corrected. It was retained and extended for later versions of the DECnet protocol suite. DDCMP has been described as the "most popular and pervasive of the commercial byte-count data link protocols". See also DEX References Overview of the protocol Protocol specification (courtesy of DEC) Notes Network protocols
https://en.wikipedia.org/wiki/Logie%20Awards%20of%201998
The 40th Annual TV Week Logie Awards was held on Sunday 19 April 1998 at the Crown Palladium in Melbourne, and broadcast on the Nine Network. The ceremony was hosted by Daryl Somers, and guests included Matt LeBlanc, Kathy Najimy, Kenny Rogers and Reba McEntire. Winners and nominees In the tables below, winners are listed first and highlighted in bold. Gold Logie Acting Most Popular Programs Most Outstanding Programs Hall of Fame After a lifetime in Australian television, Graham Kennedy became the 15th inductee into the TV Week Logies Hall of Fame. However, Bert Newton accepted the award on his behalf. References External links 1998 1998 television awards 1998 in Australian television
https://en.wikipedia.org/wiki/Systems%20Applications%20Products%20audit
Systems Applications Products audit is an audit of a computer system from SAP to check its security and data integrity. SAP is the acronym for Systems Applications Products. It is a system that provides users with a soft real-time business application. It contains a user interface and is considered very flexible. In an SAP audit the two main areas of concern are security and data integrity. Overview Systems, Applications, Products in data processing, or SAP, was originally introduced in the 1980s as SAP R/2, which was a system that provided users with a soft real-time business application that could be used in multiple currencies and languages. As client–server systems began to be introduced, SAP brought out a server based version of their software called SAP R/3, henceforth referred to as SAP, which was launched in 1992. SAP also developed a graphical user interface, or GUI. For the next 12 years SAP dominated the large business applications market. It was successful primarily because it was flexible. Because SAP was a modular system (meaning that the various functions provided by it could be purchased piecemeal) it was a versatile system. A company could simply purchase modules that they wanted and customize the processes to match the company’s business model. SAP’s flexibility, while one of its greatest strengths is also one of its greatest weaknesses that leads to the SAP audit. There are three main enterprise resource planning (ERP) systems used in today’s larger businesses: SAP, Oracle, and PeopleSoft. ERP's are specifically designed to help with the accounting function and the control over various other aspects of the companies business such as sales, delivery, production, human resources, and inventory management. Despite the benefits of ERP’s, there are many potential pitfalls that companies who turn to ERP’s occasionally fall into. Security Segregation of duties Security is the first and foremost concern in any SAP audit. There should be proper segregation of duties and access controls, which is paramount to establishing the integrity of the controls for the system. When a company first receives SAP, it is almost devoid of all security measures. When implementing SAP a company must go through an extensive process of outlining their processes and then building their system security from the ground up to ensure proper segregation of duties and proper access. Proper profile design and avoidance of redundant user ID’s and superuser access will be important in all phases of operation. Along with this comes the importance of ensuring restricted access to terminals, servers, and the data center to prevent tampering. Because each company will have different modules each company’s security structure will be distinctly different. A typical Example from SAP will be Creating a Vendor and also able to pay an invoice. The Create a Vendor Transaction is XK01 and pay invoice transaction FB60. If the User or Role in SAP has those two transa
https://en.wikipedia.org/wiki/Database%20audit
Database auditing involves observing a database to be aware of the actions of database users. Database administrators and consultants often set up auditing for security purposes, for example, to ensure that those without the permission to access information do not access it. References Further reading Gallegos, F. C. Gonzales, D. Manson, and S. Senft. Information Technology Control and Audit. Second Edition. Boca Raton, Florida: CRC Press LLC, 2000. Ron Ben-Natan, IBM Gold Consultant and Guardium CTO. Implementing Database Security and Auditing. Digital Press, 2005. KK Mookhey (2005). IT Audit. Vol. 8. Auditing MS SQL Server Security. IT Audit. Vol. 8 Murray Mazer. Database Auditing-Essential Business Practice for Today’s Risk Management May 19, 2005. Audit Types of auditing Computer access control
https://en.wikipedia.org/wiki/Mainframe%20audit
A mainframe audit is a comprehensive inspection of computer processes, security, and procedures,with recommendations for improvement. Definition of mainframe A mainframe computer is not easy to define. Most people associate a mainframe with a large computer, but mainframes are getting smaller all the time. The terms mainframe and enterprise server are converging. Supercomputers are generally used for their speed and complexity, while mainframes are used for storing large volumes of sensitive data. Mainframes are typically the most secure, efficient, and cost-effective computing option for organizations dealing with transactions on a large, enterprise-level scale. Considerations Organizations in different industries have different auditing and security requirements. Some factors affecting the organizations' requirements are: regulatory requirements and other external factors; management, objectives, and business practices; and the organizations' performance compared to the industry. This information can be obtained by conducting outside research, interviewing employees, touring the data center and observing activities, consultations with technical experts, and looking at company manuals and business plans. Another consideration is the level of mainframe access employees have and if password policies are in place and followed. Evidence of implementation can be obtained by requesting employee manuals, evaluating the software and user histories, and by physical observation of the environment. (Gallegos, 2004). Physical access is also an area of interest. Are cables adequately protected from damage and sniffing between the Network and the Data Center? This can be achieved by proper routing of the cables, encryption, and a good network topology. Physical observation of where the cables are routed and confirmation of the security procedures should be obtained. Tests of controls should be conducted to determine any additional weaknesses. Does the mainframe have access to an adequate uninterruptible power supply? Are physical controls such as power badges for access, fire suppression devices, and locks in place to protect the data center (and the mainframe inside) from theft, manipulation or damage? Physical observation is necessary to ensure these requirements. The Operating System What controls are in place to make sure the system is continually updated? Is the software configured to do updates, or is it done by the system technicians? Controls should be in place to deter unauthorized manipulation or theft of data. Proper separation of duties also needs to be verified. The company’s internal controls need to be tested to determine if they are effective. Samples of entries into the system should be examined to verify that the controls are effective, while unauthorized and suspicious voided transactions need to be investigated. (Gallegos, 2004) Are there any processes on the system that could needlessly compromise other components? Procedures an
https://en.wikipedia.org/wiki/Millennium%20Run
The Millennium Run, or Millennium Simulation (referring to its size) is a computer N-body simulation used to investigate how the distribution of matter in the Universe has evolved over time, in particular, how the observed population of galaxies was formed. It is used by scientists working in physical cosmology to compare observations with theoretical predictions. Overview A basic scientific method for testing theories in cosmology is to evaluate their consequences for the observable parts of the universe. One piece of observational evidence is the distribution of matter, including galaxies and intergalactic gas, which are observed today. Light emitted from more distant matter must travel longer in order to reach Earth, meaning looking at distant objects is like looking further back in time. This means the evolution in time of the matter distribution in the universe can also be observed directly. The Millennium Simulation was run in 2005 by the Virgo Consortium, an international group of astrophysicists from Germany, the United Kingdom, Canada, Japan and the United States. It starts at the epoch when the cosmic background radiation was emitted, about 379,000 years after the universe began. The cosmic background radiation has been studied by satellite experiments, and the observed inhomogeneities in the cosmic background serve as the starting point for following the evolution of the corresponding matter distribution. Using the physical laws expected to hold in the currently known cosmologies and simplified representations of the astrophysical processes observed to affect real galaxies, the initial distribution of matter is allowed to evolve, and the simulation's predictions for formation of galaxies and black holes are recorded. Since the completion of the Millennium Run simulation in 2005, a series of ever more sophisticated and higher fidelity simulations of the formation of the galaxy population have been built within its stored output and have been made publicly available over the internet. In addition to improving the treatment of the astrophysics of galaxy formation, recent versions have adjusted the parameters of the underlying cosmological model to reflect changing ideas about their precise values. To date (mid-2018) more than 950 published papers have made use of data from the Millennium Run, making it, at least by this measure, the highest impact astrophysical simulation of all time. Size of the simulation For the first scientific results, published on June 2, 2005, the Millennium Simulation traced 2160, or just over 10 billion, "particles." These are not particles in the particle physics sense – each "particle" represents approximately a billion solar masses of dark matter. The region of space simulated was a cube with about 2 billion light years as its length. This volume was populated by about 20 million "galaxies". A super computer located in Garching, Germany executed the simulation, which used a version of the GADGET code, for
https://en.wikipedia.org/wiki/Any%20Day%20Now%20%28TV%20series%29
Any Day Now is an American drama series that aired on the Lifetime network from 1998 to 2002. Set in Birmingham, Alabama, Any Day Now explored issues around race and friendship and how they affect the lives of two devoted lifelong friends over the years—from the 1960s to the current day. The show stars Annie Potts and Lorraine Toussaint, portraying best friends since childhood, as they openly and honestly address events in their interracial community. The show's title is taken from the 1962 song "Any Day Now", written by Burt Bacharach and Bob Hilliard. A version performed by Lori Perry served as the show's theme song. Setting Any Day Now focuses on the lives and interactions of two female protagonists: Mary Elizabeth "M.E." O'Brien Sims (Potts) and Rene Jackson (Toussaint). The two had grown up as close friends in Birmingham, Alabama, in the 1960s during the peak of the Civil Rights Movement. However, their friendship ended when M.E. became pregnant and chose, despite Rene's disapproval, to keep the child, drop out of college, and marry her boyfriend, Colliar Sims. More than twenty years later, M.E. and her husband still live in Birmingham, where they struggle to make ends meet. Their oldest son, Bobby, died as a child; but they have two more children, daughter Kelly and son Davis. Rene moved to Washington, D.C., where she was a successful attorney for many years; but, after the death of her father, Rene decides to move back to Birmingham and establish a law practice there. She reunites with M.E., and the two quickly resume their close friendship. In every episode, contemporary storylines are interwoven with a storyline from their shared past. Format Each hour-long episode explores a theme contained alternating scenes from two different timelines. The 1960s timeline followed the young version of the girls, who were best friends in Birmingham in the 1960s. Their friendship provides an inside look at the civil rights movement as it affects the residents of Birmingham. Their friendship blossoms despite the discomfort of M.E.'s naively bigoted parents and her openly racist Uncle Jimmy, an avowed member of the Ku Klux Klan. M.E. and Rene's friendship was fostered by Renee's activists parents along with M.E.'s loving grandmother and her older brother, Johnny, who was sent to Vietnam, while M.E.'s older sister, Teresa, often threatened to tell their parents that M.E.'s "little colored friend" had been in their house. Colliar Sims (Chris Mulkey), M.E.'s childhood sweetheart and eventual husband, played a large role in this timeline as well. Rene's family included her father, James (John Lafayette), who was a lawyer and an active member of the Civil Rights Movement; her mother, Sarah, also active in the movement; and her older brother Elston, who was the same age as M.E.'s brother Johnny but dodged the draft by fleeing to Canada. The contemporary timeline showed M.E. and Rene as adults. M.E. is a homemaker with aspirations of becoming a writer,
https://en.wikipedia.org/wiki/Pane
Pane or Panes may refer to: Paned window (architecture), a window that is divided into sections known as "panes" Paned window (computing), elements of a graphical display Pane (mythology), a type of satyr-like creature from Greek mythology Pane di Altamura, type of bread made from flour from the Altamura area of the Provincia di Bari, in the South East of Italy Panes, Asturias, one of eight parishes in Peñamellera Baja, a municipality within the province and autonomous community of Asturias, in northern Spain. People Pane Armijn Pane (1908–1970), an Indonesian author. Also known as Adinata, A. Soul, Empe, A. Mada, A. Banner and Kartono Gina Pane (1939–1990), French artist of Italian origins Irma Pane, Indonesian American pop singer Karen W. Pane, American administrator, former Assistant Secretary for Policy and Planning at the Department of Veterans Affairs Lafran Pane (1922–1991), Indonesian academic Luigi Pane, Italian director and video artist Mauro Pane (1963–2014), Italian driver, kart driver champion Michele Pane (1876–1953), Italian American symbolist poet and journalist Mikill Pane (born 1985), English rapper Sanusi Pane (1905–1968), Indonesian writer, journalist, and historian Panes Michael Panes (born 1963), American actor, writer, musician and composer Roger Panes (1933–1974), British member of the Exclusive branch of the Plymouth Brethren. In 1974 he killed his wife and three children with an axe before hanging himself Roo Panes (born 1988), British singer-songwriter See also Pain (disambiguation) Pan (disambiguation) Panel (disambiguation)
https://en.wikipedia.org/wiki/Sundance%20TV
Sundance TV (formerly known as Sundance Channel) is an American pay television channel owned by AMC Networks that launched on February 1, 1996. The channel is named after Robert Redford's character in Butch Cassidy and the Sundance Kid and, while it is an extension of Redford's non-profit Sundance Institute, the channel operates independently of both the Institute and the Sundance Film Festival. Originally, Sundance was devoted to airing documentaries, independent feature films, short films, world cinema, and coverage on the latest developments from each year's Sundance Film Festival. The channel has since incorporated both original and acquired programming and became fully ad-supported in 2013, with programming being edited for content soon thereafter. , the channel was available to approximately 60.668 million households with television (52.1% of all subscribers) in the United States. History As Sundance Channel (1996–2014) After negotiations during 1994 broke down to turn Robert Redford into a partner in AMC Networks predecessor Rainbow Media's Independent Film Channel, Redford launched Sundance Channel in February 1996 as a joint venture between Showtime Networks (then a division of Viacom, later owned by CBS Corporation and subsequently by ViacomCBS), PolyGram (now NBCUniversal), and Redford (who also served as the creative director of the network). The channel was initially launched on five cable systems in New York City; Los Angeles; Alexandria, Virginia; Chamblee, Georgia; and Pensacola, Florida. It originally operated mainly as a premium channel, commonly packaged with Showtime and its sister networks The Movie Channel and Flix. On May 7, 2008, the Rainbow Media subsidiary of Cablevision, owners of rival network IFC, announced that it had purchased Sundance Channel for $496 million. The acquisition of Sundance Channel by Rainbow Media was completed in June 2008. On July 1, 2011, Rainbow Media was spun off from Cablevision into a separate company, which was renamed AMC Networks. Since the sale, Sundance would expand into original programming. 2012 saw the premieres of two new unscripted series in the form of Get To Work and Push Girls, before the channel's second miniseries, Restless, premiered in December. Restless went on to receive two Emmy Award nominations. It was also announced that Sundance had picked up its first solely owned original series, and former developmental project from sister channel AMC, Rectify, and its third miniseries Top of the Lake. Much like AMC, the channel's original programming garnered critical acclaim. On March 4, 2013, Sundance began airing AMC's Breaking Bad, to which the channel has exclusive syndication rights, on Monday nights. In October of that year, the channel became fully ad supported. As Sundance TV (2014–present) On January 27, 2014, it was announced that the Sundance Channel would rebrand as Sundance TV on February 1, 2014. 2014 featured the channel's fourth miniseries The Honourable
https://en.wikipedia.org/wiki/Beyond%20Dark%20Castle
Beyond Dark Castle is a computer game, released for Macintosh in 1987 by Silicon Beach Software. It was designed by Mark Stephen Pierce and programmed by Jonathan Gay. It is the sequel to Dark Castle, with more levels, monsters and items, as well as a larger game map and longer levels. A second sequel, Return to Dark Castle, was released in 2008. Activision published ports for the Commodore 64 and the Amiga. Plot The game starts off with the end of Dark Castle, where Prince Duncan toppled the Black Knight's throne. In the original version, after toppling the throne, the Black Knight stands up shaking his fist, and a gargoyle drops Duncan in Trouble 3. In the newer version by Delta Tao Software, Color Dark Castle, after defeating the Black Knight on advanced, the Black Knight's throne falls down, off the bottom of the screen, and Duncan does a victory dance as it fades out. When starting a new game in Beyond Dark Castle, the player sees Duncan approaching a fireplace and mantle. Duncan attempts to remove a nearby torch from the wall, only to have the whole wall turn around like a trapdoor. Duncan finds himself in a large anteroom, where there are five pedestals. Over the course of the game, the player collects five orbs to fill these pedestals, opening a gate that leads to the final duel with the Black Knight. Gameplay Beyond Dark Castle is much more difficult than Dark Castle. A helicopter backpack has been added and Duncan can now collect and drop bombs. These can be used to destroy snakes, rats, and even walls. There is now a health meter that needs to be replenished, multiple keys can be collected, and the levels now scroll (horizontally and vertically). Games can also be saved and loaded (using a unique "computer room"), and there is also a practice mode. While in Dark Castle the Black Knight's chambers could be entered at any time, Beyond Dark Castle requires Duncan to collect five orbs which are scattered around the new, much larger castle. As before, the Fireball and Shield must also be acquired before the assault on the Black Knight himself. Levels The game has 15 levels, like the first game, which came out of the 5 doors in the Great Hall. Ye Roof: Computer Room, Clock Tower, Swamp, Forrest West Tower: West Tower Wall, West Labyrinth, West Tower Top East Tower: Black Knight's Brewery, East Labyrinth, East Tower Top Underground: Basement, Catacombs, Dungeon Main Hall: Ante Room, Black Knight's Showdown & The Final Battle Reception Computer Gaming World said that Beyond Dark Castle was superior to its predecessor, approving of the new save and practice options. While very successful—ranking in the top five on Macworld list of bestselling Macintosh entertainment software 21 times—it was Silicon Beach's last game, as productivity software like SuperPaint was much more lucrative. Reviews Jeux & Stratégie #52 Games #93 Trivia A colorized Mac version was planned by Delta Tao Software but dropped. A version of Dark Castle was made fo
https://en.wikipedia.org/wiki/Information%20access
Information access is the freedom or ability to identify, obtain and make use of database or information effectively. There are various research efforts in information access for which the objective is to simplify and make it more effective for human users to access and further process large and unwieldy amounts of data and information. Several technologies applicable to the general area are Information Retrieval, Text Mining, Machine Translation, and Text Categorisation. During discussions on free access to information as well as on information policy, information access is understood as concerning the insurance of free and closed access to information. Information access covers many issues including copyright, open source, privacy, and security. Groups such as the American Library Association, the American Association of Law Libraries, Ralph Nader's Taxpayers Assets Project have advocated for free access to legal information. The vendor neutral citation movement in the legal field is working to ensure that courts will accept citations from cases on the web which do not have the traditional (copyrighted) page numbers from the West Publishing company. There is a worldwide Free Access to Law Movement which advocates free access to legal information. The Wired Magazine Article Who Owns The Law is an introduction to the access to legal information issue. Postsecondary organizations such as K-12 work to share information. They feel it is a legal and moral obligation to provide access (including to people with disabilities or impairments) to information through the services and programs they offer. Some effects of charging for information access, such as literature searches for physicians, is studied in the article "Fee or Free: The Effect of Charging on Information Demand". In this study, a $5 charge resulted in a 77% decrease in searches. See also Access to Knowledge movement Free culture Open access Open content References External links CRS Report - Access to Government Information in the United States ALA- Access to Electronic Information, Services, and Networks Access to Information - The World Bank page Information science Library science
https://en.wikipedia.org/wiki/AMC%20Networks
AMC Networks Inc. is an American entertainment company headquartered in 11 Penn Plaza, New York. AMC Networks owns and operates the eponymous cable channel and its siblings, IFC, We TV, and Sundance TV; the art house movie theater IFC Center in New York City; the independent film companies IFC Films and RLJE Films; the anime licensor Sentai Filmworks; the premium subscription streaming services AMC+, IFC Films Unlimited, Acorn TV, Allblk, Shudder, Sundance Now, Philo and Hidive; and a minority interest in leading Canadian production studio Shaftesbury Films. The company operates in Europe & Latin America through its international division, AMC Networks International. Through joint ventures with BBC Studios, the company manages BBC America and BBC World News cable channels in the US. Due to this relationship, AMC Networks additionally maintains a minority share in the US operations of the British-TV streaming service BritBox, a joint venture between the BBC and ITV plc. Formerly known as Rainbow Media Holdings, LLC (or alternately Rainbow Programming Holdings), the company was founded in 1980 as a subsidiary of Cablevision. It became a publicly traded company in July 2011. The company is majority-owned and controlled by the Dolan family. History As "Rainbow Media" When Rainbow Programing Services was formed in mid-1980, it originally was a joint-venture of four cable television companies: Cablevision, Comcast, Cox Communications, and Daniels & Associates. The first service to come out of the partnership was launched on December 8, 1980. The hybrid service, which broadcast nightly on satellite time subleased from the National Christian Network featured culture events network Bravo on Sunday and Monday nights and adult-oriented B movie network Escapade the rest of the week. Due to the involvement of the four cable companies, the new service quickly gained subscribers. By July 1981, both channels expanded their offerings to seven nights a week. In August 1981, Playboy Enterprises became half-owner of Escapade which introduced a new programming block to the channel in early 1982. By the end of that year the network would relaunch as The Playboy Channel. In the years that followed, the three other cable companies would exit the partnership, leaving Cablevision as the sole owner of Rainbow by 1983. Cablevision transferred control of its previously launched regional sports network SportsChannel New York to Rainbow. In 1983, three other regional sports networks were acquired: PRISM New England (soon to be relaunched as SportsChannel New England), Philadelphia-based PRISM, and Chicago-based SportsVision. Playboy also bought out Rainbow's share in The Playboy Channel, although it would continue to market the channel for the next few years. In 1984, Rainbow added another new network to its portfolio, American Movie Classics (AMC) which initially featured "classic" pre-1970 movies. Cablevision began packaging AMC and Bravo together as the Rainbow Servi
https://en.wikipedia.org/wiki/Robert%20L.%20Cook
Robert L. Cook (December 10, 1952) is a computer graphics researcher and developer, and the co-creator of the RenderMan rendering software. His contributions are considered to be highly influential in the field of animated arts. In 2009, Cook was elected a member of the National Academy of Engineering for building the motion picture industry's standard rendering tool. Cook was born in Knoxville, Tennessee and educated at Duke University and Cornell University. While at Cornell, Cook worked with Donald P. Greenberg. Education B.S. in physics, 1973, Duke University, N.C. M.S. in computer graphics, 1981, Cornell University, Ithaca, N.Y. Career Robert Cook was involved with Lucasfilm and later had the position as Vice President of Software Development at Pixar Animation Studios, which he left in 1989. In November 2016, he became the Commissioner of the Technology Transformation Service of the U.S. General Services Administration. Computer Animation Rendering Star Trek II: The Wrath of Khan (1982) computer graphics: Industrial Light & Magic André and Wally B. (1984) 3D rendering Luxo, Jr. (1986) rendering Red's Dream (1987) reyes / miracle tilt Toy Story (1995) renderman software development Toy Story 2 (1999) rendering software engineer Monsters, Inc. (2001) software team lead Cars (2006) software team lead Up (2009) software development: Pixar studio team Awards 1987, ACM SIGGRAPH Achievement Award in recognition of his contributions to the fields of computer graphics and visual effects. 1992, Scientific and Engineering Award for the development of "RenderMan" software which produces images used in motion pictures from 3D computer descriptions of shape and appearance. 1999, Fellow of the Association for Computing Machinery. 2000, Academy Award of Merit (Oscar) for significant advancements to the field of motion picture rendering as exemplified in Pixar's RenderMan. Their broad professional influence in the industry continues to inspire and contribute to the advancement of computer-generated imagery for motion pictures. GATF InterTech Award MacWorld World Class Award Seybold Award for Excellence 2009, The Steven Anson Coons Award for Outstanding Creative Contributions to Computer Graphics 2009, Elected to the National Academy of Engineering References 1952 births Living people American animators American computer scientists American physicists Computer graphics professionals Cornell University alumni Duke University alumni People from Knoxville, Tennessee Fellows of the Association for Computing Machinery Members of the United States National Academy of Engineering Lucasfilm people Pixar people
https://en.wikipedia.org/wiki/Wiki%20%28disambiguation%29
A wiki (or wiki wiki) is a collaborative website. Wiki or wiki wiki may also refer to the following: Computing and technology .wiki, a generic top-level domain overseen by ICANN PBworks (formerly PBwiki), a commercial real-time collaborative editing (RTCE) system Wiki software, software used to run a wiki website Wikimedia Foundation, a US non-profit charitable organization Wikimedia movement, or Wikimedia, the global community of contributors to Wikimedia Foundation projects Wikipedia, an encyclopedia wiki sometimes referred to as "wiki" WikiWikiWeb, the original wiki website, and originator of the word "wiki" Places Wiki Peak, a mountain in Alaska, USA People with the name Wiki (rapper), stage name of Patrick Morales, an American rapper Wiki Baker, vocalist and community worker from New Zealand Wiki González, Major League baseball player Wieke Hoogzaad (nicknamed Wiki de Viking), Dutch triathlete Ruben Wiki, New Zealand rugby league footballer Arts, entertainment, and media Fictional entities W1K1, pronounced "wiki", a mini-robot from the 1970s Filmation sci-fi show Jason of Star Command Wiki, a sidekick character in the video game Zack & Wiki: Quest for Barbaros' Treasure Vicky the Viking (also Wikki or Wickie), a 1970s animated cartoon character Wiki Dankowska, a fictional character in the British television show Coronation Street Music "Jam on Revenge (the Wikki-Wikki Song)", a 1983 single by the band Newcleus "Wiki wiki", a phrase meant to simulate a DJ scratching a turntable, used by Newcleus in several songs as well as Will Smith's "Wild Wild West", among others Other uses in arts, entertainment, and media WIKI (FM) a country music radio station in Carrollton, Kentucky, United States "Wiki-wiki", a story (and title character) written by the title character of Jack London's novel Martin Eden Other uses Wiki wiki dollar, a 1960s gasoline give-away promotion Wiki Wiki Shuttle, a Hawaiian airport bus system WikiLeaks, an international non-profit organisation that publishes secret information, news leaks, and classified media provided by anonymous sources See also List of wikis Wick (disambiguation) Wicked (disambiguation) Wicket Wicki (disambiguation) Wicky (disambiguation) Wookie (disambiguation)
https://en.wikipedia.org/wiki/Home%20Entertainment%20Suppliers
Home Entertainment Suppliers Pty. Ltd. (or HES) is an Australian company that distributes computer games and gaming equipment. HES' offices are based in Riverwood, Sydney. HES's founder and managing director is Sebastian Giompaolo. They began distributing Commodore 64 titles such as Pitfall! in 1982 and Kung-Fu Master in 1985 and Atari 2600 titles nearing the end of the 1980s under the name Activision. HES still remains a dominant distributor within Australia, despite not being well known. HES currently is the distributor for Mad Catz, Saitek, and Gamester joysticks, cables, memory cards, and other peripherals. HES also remains the official Australian distributor for Action Replay. Quite a large number of software titles are currently also being distributed by HES for Windows, Xbox, PlayStation 2 and Game Boy Advance by publishers ZOO Digital Publishing, Tru Blu Entertainment and Phantagram. In the past, HES had gained a reputation for developing and distributing some interesting peripherals such as their auto fire controllers, Game Boy power adaptors, Master System converters for the Mega Drive and adapters for NES games such as the HES Unidaptor and HES Unidaptor MKII. In 1999, the company created the publishing arm Tru Blu Entertainment for software titles created by the company, including the hit NRL Rugby League and AFL Live titles. Nintendo Entertainment System Unlicensed In the late 1980s and early 1990s, HES ported games from American Game Cartridges, American Video Entertainment (AVE), Bit Corp, Color Dreams, Epyx, Thin Chen Enterprise (Sachen, Joy Van, etc.) and Tengen onto the Nintendo Entertainment System (NES) as unlicensed titles, although they did not release games by Camerica or Active Enterprises. Most games were released in plastic cases like a video box with printed instructions on the inside, however sometimes the AVE titles were released in their original AVE boxes with a HES sticker simply stuck over AVE's original one. HES at the time became widely known for their unlicensed distribution of NES games at budget prices. Nintendo tried to fight against all unlicensed companies by introducing a Nintendo Seal of Quality on all their products which signified that titles adorning the symbol are guaranteed to operate on their NES hardware. To combat this, HES introduced their own seal that mimicked Nintendo’s seal, possibly in the hope of confusing buyers. In order to circumvent other methods that Nintendo created to stop unlicensed developers (10NES), HES developed the 'Piggy Back' or 'Dongle' games, where one could insert an official NES cart into the HES game and it operated the country code of the official title instead of HES'. This was so successful that HES also used the same technology to build a device to entirely bypass the 10NES security protocol which was released as the HES Unidaptor. The adapter allowed 72-pin and 60-pin NTSC NES/Famicom games to be played on a PAL NES. HES introduced games to Australia that
https://en.wikipedia.org/wiki/Sarah%20Shahi
Aahoo Jahansouzshahi (born ), known professionally as Sarah Shahi, is an American actress. She played Billie on Sex/Life, Carmen on The L Word in 2005, Kate Reed in the USA Network legal drama Fairly Legal (2011–2012), and Sameen Shaw on the CBS crime drama Person of Interest (2012–2016). She has also appeared in the main role Det. Dani Reese in Life, and in a supporting role in Alias. In 2018, she starred in the series Reverie. In 2019, she appeared in a recurring role in City on a Hill on Showtime and appeared in seven episodes of the series The Rookie as romantic interest Jessica Russo. In 2023 she received critical praise for her role of White House Deputy Chief of Staff Zahra Bankston in the LGBTQ romantic comedy film Red, White & Royal Blue . Early life Sarah Shahi was born Aahoo Jahansouzshahi on and raised in Euless, Texas, U.S. Her father Abbas Jahansouzshahi and her mother Mahmonir Soroushazar, an interior designer, divorced when she was 10 years old. Her mother was born in Spain to an Iranian father and a Spanish mother. Her father is from Iran. Her father's family left Iran two years before the Iranian Revolution. Her father, who was working at the American embassy in Iran, was slated for execution when the last Shah's regime collapsed in 1979, but was able to flee the country. Shahi has an older brother, Cyrus, and a younger sister, Samantha, who is a production assistant. Her birth name, Aahoo (), means 'gazelle' in Persian. Shahi adopted Sarah as her name in second grade after hearing a song called "Sarah" because she was "tormented" by other children about her birth name, Aahoo. At her father's behest, she grew up speaking Persian, in addition to English. Shahi's parents began entering her in beauty pageants at the age of eight. Shahi attended Trinity High School, and Southern Methodist University. She was a member of Alpha Chi Omega during her time at SMU. Shahi won the Miss Fort Worth pageant in 1997. Hoping to become an actress, she joined the Dallas Cowboys Cheerleaders (1999–2000) squad despite not having cheered before. Later, she moved to Los Angeles. Career While working as an extra on the set of Dr. T and the Women in Texas, Shahi met director Robert Altman, who encouraged her to move to Hollywood, where she received roles in several series, including Alias, Dawson's Creek, Reba, and Supernatural. In 2005 she appeared in the supporting character role of DJ Carmen de la Pica Morales on The L Word, which she joined in its second season. Shahi's two-year contract was not renewed after the end of the fourth season, and her character was written out. Shahi was named number 90 on the Maxim "Hot 100 of 2005" list, moving up to number 66 in 2006 and 36 in 2012. She appeared on the cover of Maxims 2012 'TV's Hottest Girls' Issue in October 2012. She ranked number 5 on the AfterEllen.com hot list in 2007. She played Farah in the second season of Sleeper Cell, and also appeared in HBO's The Sopranos in 2007, in the Season 6b
https://en.wikipedia.org/wiki/Logie%20Awards%20of%201997
The 39th Annual TV Week Logie Awards was held on Sunday 18 May 1997 at the Crown Palladium in Melbourne, and broadcast on the Nine Network. The ceremony was hosted by Daryl Somers, and guests included Patrick Stewart, Daniel Davis, Laura Innes, David James Elliott, Michael T. Weiss and Ben Elton. Winners Gold Logie Most Popular Personality on Australian Television Winner: Lisa McCune in Blue Heelers (Seven Network) Acting/Presenting Most Popular Actor Winner: Martin Sacks in Blue Heelers (Seven Network) Most Popular Actress Winner: Lisa McCune in Blue Heelers (Seven Network) Most Outstanding Actor Winner: Colin Friels in Water Rats (Nine Network) Most Outstanding Actress Winner: Alison Whyte in Frontline (ABC TV) Most Popular Light Entertainment Personality Winner: Daryl Somers in Hey Hey It's Saturday (Nine Network) Most Popular Comedy Personality Winner: Eric Bana in Full Frontal (Seven Network) Most Popular New Talent Winner: Tasma Walton in Blue Heelers (Seven Network) Most Popular Programs Most Popular Series Winner: Blue Heelers (Seven Network) Most Popular Light Entertainment Program Winner: Hey Hey It's Saturday (Nine Network) Most Popular Comedy Program Winner: Full Frontal (Seven Network) Most Popular Public Affairs Program Winner: A Current Affair (Nine Network) Most Popular Lifestyle or Information Program Winner: Better Homes and Gardens (Seven Network) Most Popular Sports Program Winner: The AFL Footy Show (Nine Network) Most Popular Sports Event Winner: 1996 Atlanta Olympic Games (Seven Network) Most Popular Children's Program Winner: Agro's Cartoon Connection (Seven Network) Most Outstanding Programs Most Outstanding Achievement in Drama Production Winner: Water Rats (Nine Network) Most Outstanding Achievement in Public Affairs Winner: "The Prisoners Who Waited", Sunday (Nine Network) Most Outstanding Documentary Winner: Somebody Now – Nobody's Children Seven Years On (ABC TV) Most Outstanding Achievement in News Winner: "Port Arthur Massacre", ABC News (ABC TV) Most Outstanding Achievement in Comedy Winners: Club Buggery (ABC TV) Most Outstanding Achievement in Sport Winners: 1996 Atlanta Olympic Games – Kieren Perkins 1500m Victory (Seven Network) Performers Human Nature Hall of Fame After a lifetime in Australian television, Garry McDonald became the 14th inductee into the TV Week Logies Hall of Fame. References External links 1997 1997 television awards 1997 in Australian television
https://en.wikipedia.org/wiki/Keith%20Schengili-Roberts
Keith Schengili-Roberts is a long-time author on Internet technologies, beginning with his work for the magazines Toronto Computes! in the early 1990s and then The Computer Paper from the mid-1990s up until 2003. He also currently lectures on Information Architecture at the University of Toronto's iSchool. Previous to IXIASOFT, Keith was a DITA consultant for Mekon, working with teams at ARM, Schlumberger, eBay Deutschland and Infineon. Author In 1994 he worked on Delrina's Cyberjack Web browser and on its accompanying Web site, one of the first commercial Web sites. His long-running series on HTML, Weaving Your Own Web Site was drawn from his professional experience, and ran monthly for almost just over 90 issues in The Computer Paper Publication. Many of the early issues in this series were pulled together to form the core of his first book The Advanced HTML Companion in 1997. Since then several other books have followed. His interest in CSS began while writing his second book on HTML in 1998, when he realized that there were no good references on the subject. So he decided to write one. Musician Between 1988 and 1991 Schengili-Roberts was in a Kingston, Ontario indie band called "Miscellaneous 'S'". Occasional one-off reunions have taken place since then. Bibliography Current Practices and Trends in Technical and Professional Communication (published 2017) Contributed a chapter to this book Core CSS, 2nd Edition (published 2004) Core CSS (published 2000) The Advanced HTML Companion, 2nd Edition (co-written with Kim Silk) (published 1998) The Advanced HTML Companion (Japanese Translation) (published 1997) The Advanced HTML Companion (published 1997) References https://web.archive.org/web/20080502165025/http://www.cbp.ca/eventsPages/judges.asp Judging Committee for the Canadian Business Press Awards https://web.archive.org/web/20080225020752/http://plc.fis.utoronto.ca/about/plcinstructors.asp List of instructors at the University of Toronto's Professional Learning Centre http://www.ixiasoft.com/en/news-and-events/2014/dita-expert-keith-schengili-roberts-joins-ixiasoft/ DITA Expert Keith Schengili-Roberts Joins IXIASOFT External links Schengili-Roberts' Personal Blog Miscellaneous "S" Living people Canadian technology writers Information architects Canadian skeptics Year of birth missing (living people)
https://en.wikipedia.org/wiki/Logie%20Awards%20of%201996
The 38th Annual TV Week Logie Awards was held on Sunday, April 21, 1996, at the Melbourne Park Function Centre in Melbourne, and broadcast on the Nine Network. The ceremony was hosted by Daryl Somers, and guests included Gloria Reuben and Holly Hunter. Winners and nominees The nominees for the 38th Logie Awards were announced in early April 1996. Unlike previous years, there were five nominations in each category. These were then cut to three on the night of the ceremony. The winners were announced during the awards ceremony on 21 April 1996. Winners are listed first, highlighted in boldface. Gold Logie Acting/Presenting {| class=wikitable width="100%" |- ! width="25%"| Most Popular Actor ! width="25%"| Most Popular Actress |- | valign="top"| Dieter Brummer for Home and Away (Seven Network) Guy Pearce for Snowy River: The McGregor Saga (Nine Network) Martin Sacks for Blue Heelers (Seven Network) Gary Sweet for Police Rescue (ABC) John Wood for Blue Heelers (Seven Network) | valign="top" | Lisa McCune for Blue Heelers (Seven Network) Tempany Deckert for Home and Away (Seven Network) Isla Fisher for Home and Away (Seven Network) Melissa George for Home and Away (Seven Network) Rebecca Gibney for Halifax f.p. (Nine Network) |- ! width="50%"| Most Outstanding Actor ! width="50%"| Most Outstanding Actress |- | valign="top"| Richard Roxburgh for Blue Murder (ABC) | valign="top"| Jacqueline McKenzie for Halifax f.p. (Nine Network) |- ! width="50%"| Most Popular New Talent ! width="50%"| Most Popular Light Entertainment Personality |- | valign="top"| Nic Testoni for Home and Away (Seven Network) Kate Fischer for (Seven Network) Katrina Hobbs for Home and Away (Seven Network) Wendy Mooney for Don't Forget Your Toothbrush (Nine Network) John Seru for Australian Gladiators (Seven Network) | valign="top"| Daryl Somers for Hey Hey It's Saturday (Nine Network) Ernie Dingo for The Great Outdoors (Seven Network) Tim Ferguson for Don't Forget Your Toothbrush (Nine Network) Sam Newman for AFL Footy Show (Nine Network) Jo Beth Taylor for Australia's Funniest Home Video Show (Nine Network) |- ! width="50%"| Most Popular Comedy Personality |- | valign="top"| 'Magda Szubanski for Full Frontal (Seven Network) Andrew Denton for Denton (Seven Network) Tim Ferguson for Don't Forget Your Toothbrush (Nine Network) Jimeoin for Jimeoin (Seven Network) Daryl Somers for Hey Hey It's Saturday (Nine Network) |} Most Popular Programs Most Outstanding Programs Most Outstanding Achievement in Drama ProductionWinner:Blue Murder (ABC TV) Most Outstanding Achievement in Public AffairsWinner:"Minor Surgery, Major Risk", Four Corners (ABC TV) Most Outstanding DocumentaryWinner:Untold Desires (SBS TV) Most Outstanding Achievement in NewsWinner:"Muraroa Protests", National Nine News (Nine Network) Most Outstanding Achievement in ComedyWinners:Frontline (ABC TV) Most Outstanding Achievement by a Regional NetworkWinners:No Time For Frailty'' (Prime Television) Performers Kate C
https://en.wikipedia.org/wiki/Logie%20Awards%20of%201995
The 37th Annual TV Week Logie Awards were held on 28 April 1995 at the Melbourne Concert Hall in Melbourne, and broadcast on the Seven Network. The ceremony was hosted by Andrew Daddo and Noni Hazelhurst. Guests included Dean Cain, Mark Curry, Holly Robinson and Big Bird. Nominees and winners Winners are listed first and highlighted in bold. The nominees were confirmed in the 15 April 1995 issue of TV Week. Gold Logie Acting/Presenting Most Popular Programs Most Outstanding Programs Performers Hot Taps Alyssa-Jane Cook Mental As Anything Hall of Fame After a lifetime in Australian television, Jack Thompson became the 12th inductee into the TV Week Logie Hall of Fame. References External links 1995 1995 television awards 1995 in Australian television
https://en.wikipedia.org/wiki/SSEM
SSEM can refer to: Manchester Baby or Small-Scale Experimental Machine, historic computer South Seas Evangelical Mission, missionary organization in the Solomon Islands Serial-section electron microscopy (ssEM), a form of transmission electron microscopy Abreviación de la Secretaria de Seguridad del Estado de México S.S.E.M. (Policía del Estado de México) anteriormente Comisión Estatal de Seguridad Ciudadana (CES) y que se le modifico el nombre al tomar posesión de la gobernatura el Lic. Alfredo del Mazo 2017.
https://en.wikipedia.org/wiki/Loren%20Carpenter
Loren C. Carpenter (born February 7, 1947) is a computer graphics researcher and developer. Biography He was a co-founder and chief scientist of Pixar Animation Studios. He is the inventor of the Reyes rendering algorithm and is one of the authors of the PhotoRealistic RenderMan software which implements Reyes and renders all of Pixar's movies. Following Disney's acquisition of Pixar, Carpenter became a senior research scientist at Disney Research. He retired in early 2014. In around 1967 Carpenter began work at Boeing Computer Services (a part of aircraft maker Boeing) in Seattle, Washington. During his time there Carpenter studied for a B.S. in mathematics (1974) and an M.S. in Computer Science (1976), both from the University of Washington. Some of his work concerned using computer technology to improve Boeing's mechanical design processes, which were still entirely done by hand on paper. On July 14, 1980, he gave a presentation at the SIGGRAPH conference, in which he showed "Vol Libre", a 2-minute computer generated movie. This showcased his software for generating and rendering fractally generated landscapes, and was met with a standing ovation, and (as Carpenter had hoped) he was immediately invited to work at Lucasfilm's Computer Division (which would become Pixar). There Carpenter worked on the "genesis effect" scene of Star Trek II: The Wrath of Khan, which featured an entire fractally-landscaped planet. He and his wife Rachel founded Cinematrix, a company that researches computer-assisted interactive audience participation. Carpenter invented the A-buffer hidden surface determination algorithm. The PXR24 compression scheme used in Industrial Light & Magic's Open EXR file format is based on Carpenter's work. In 2006 made improvements to the popular Mersenne Twister random number generator. As of 2022 Carpenter is working with Ostrich Air Inc and FireBot Labs Inc as a Private Investor and Technical Consultant for their Fully Autonomous AI Driven Fire Fighting Drone Platform. Computer animation Star Trek II: The Wrath of Khan (1982) computer graphics: Industrial Light & Magic André and Wally B. (1984) 3D rendering Tin Toy (1988) elf Toy Story (1995) modeling & animation system development/modeling team/renderman software development/shader team A Bug's Life (1998) modeling artist Toy Story 2 (1999) rendering software engineer Monsters, Inc. (2001) additional effects developer Finding Nemo (2003) studio tools research and development The Incredibles (2004) software engineering Cars (2006) development team: Renderman Ratatouille (2007) renderman development WALL-E (2008): (theme parks: Pixar studio team Up (2009) theme parks and 360: Pixar studio team Toy Story 3 (2010) 360 group: Pixar studio team Cars 2 (2011) 360 group: Pixar studio team Brave (2012) 360 group: Pixar studio team Monsters University (2013) researcher: software research and development, Pixar Studio Team Awards 1985, ACM SIGGRAPH Achievement Award. 1992, Sci
https://en.wikipedia.org/wiki/Bandersnatch%20%28disambiguation%29
The Bandersnatch is a fictional creature mentioned in Lewis Carroll's poem Jabberwocky. Bandersnatch may also refer to: Bandersnatch (video game), a computer game written by Imagine Software and later released as Brataccas Bandersnatch (Known Space), a sluglike sentient creature in Larry Niven's fictional Known Space universe 9780 Bandersnatch, an asteroid Bandersnatch, a newspaper run by John Abbott College students A Sasquatch infected with the HMHVV-II virus in the Shadowrun role-playing game Frumious Bandersnatch, a seminal 1960s psychedelic rock band from San Francisco, California Black Mirror: Bandersnatch, a television film of the anthology series Black Mirror
https://en.wikipedia.org/wiki/Directorate-General%20for%20Communications%20Networks%2C%20Content%20and%20Technology
The Directorate-General for Communications Networks, Content and Technology (also called Connect) is a Directorate-General of the European Commission and is responsible for EU investment in research, innovation and development of critical digital technologies (such as Artificial Intelligence, Common Data Spaces, High-Performance Computing, 5G, Micro-Electronics, Blockchain and Quantum). The current Director-General is Roberto Viola, under the responsibility of the European Commissioner for Internal Mark et. In 2020, it had 828 employees. Structure Directorates The organization of the Director General office was: A: Artificial Intelligence and Digital Industry (Director: Lucilla Sioli) The directorate's objective is to strengthen competitiveness and to ensure that any industry in any sector in Europe can make the best use of digital innovations to compete on a global scale, grow and create jobs. The Directorate is responsible for the coordination of the digitisation of industry strategy following the adoption of the DSM technology package in April 2016 including links with national initiatives such as Industrie 4.0 (DE), industrie du future (FR), smart industry (NL), etc. B: Connectivity (Director: Rita Wezenbeek) Designing and monitoring a legally predictable (regulatory) environment for electronic communications in the EU. As the basis for the Digital Single Market, this environment should foster a pro-competitive single market for the roll-out of high-speed internet networks and the delivery of electronic communications services. This will be an essential contribution to boost innovation, growth and jobs in Europe. Directorate C: Digital Excellence and Science Infrastructure (Director: Thomas Skordas) Directorate provides support to future ICT Technologies and Infrastructures such as the Destination Earth. D: Policy Strategy and Outreach (Director: Thibaut Kleiner) The Policy Strategy and Outreach Directorate is responsible for the consistent implementation of the Commission Work Programme and the legislation under the responsibility of DG CONNECT in line with better regulation principles. It ensures coherence between the DSM strategy and the available EU financial instruments, notably the ICT part of H2020 and the Connecting Europe Facility (CEF), but also the European structural and investment funds (EFSI) and the European Fund for Strategic Investments (EFSI). It is the outward-facing element of the DG, responsible for involving stakeholders in delivering policy and research outcomes, engaging with member states' authorities and the other institutions, the media and other interested stakeholders, and for communicating within and outside the EU and managing internal communication within the DG. E: Future Networks (Director: Pearse O'Donohue) The Directorate is responsible for the strategic advancement of the policy, technological research and standardisation on all-encompassing Future Internet dimension, ensuring an innovat
https://en.wikipedia.org/wiki/Pohlig%E2%80%93Hellman%20algorithm
In group theory, the Pohlig–Hellman algorithm, sometimes credited as the Silver–Pohlig–Hellman algorithm, is a special-purpose algorithm for computing discrete logarithms in a finite abelian group whose order is a smooth integer. The algorithm was introduced by Roland Silver, but first published by Stephen Pohlig and Martin Hellman (independent of Silver). Groups of prime-power order As an important special case, which is used as a subroutine in the general algorithm (see below), the Pohlig–Hellman algorithm applies to groups whose order is a prime power. The basic idea of this algorithm is to iteratively compute the -adic digits of the logarithm by repeatedly "shifting out" all but one unknown digit in the exponent, and computing that digit by elementary methods. (Note that for readability, the algorithm is stated for cyclic groups — in general, must be replaced by the subgroup generated by , which is always cyclic.) Input. A cyclic group of order with generator and an element . Output. The unique integer such that . Initialize Compute . By Lagrange's theorem, this element has order . For all , do: Compute . By construction, the order of this element must divide , hence . Using the baby-step giant-step algorithm, compute such that . It takes time . Set . Return . Assuming is much smaller than , the algorithm computes discrete logarithms in time complexity , far better than the baby-step giant-step algorithm's . The general algorithm In this section, we present the general case of the Pohlig–Hellman algorithm. The core ingredients are the algorithm from the previous section (to compute a logarithm modulo each prime power in the group order) and the Chinese remainder theorem (to combine these to a logarithm in the full group). (Again, we assume the group to be cyclic, with the understanding that a non-cyclic group must be replaced by the subgroup generated by the logarithm's base element.) Input. A cyclic group of order with generator , an element , and a prime factorization . Output. The unique integer such that . For each , do: Compute . By Lagrange's theorem, this element has order . Compute . By construction, . Using the algorithm above in the group , compute such that . Solve the simultaneous congruence The Chinese remainder theorem guarantees there exists a unique solution . Return . The correctness of this algorithm can be verified via the classification of finite abelian groups: Raising and to the power of can be understood as the projection to the factor group of order . Complexity The worst-case input for the Pohlig–Hellman algorithm is a group of prime order: In that case, it degrades to the baby-step giant-step algorithm, hence the worst-case time complexity is . However, it is much more efficient if the order is smooth: Specifically, if is the prime factorization of , then the algorithm's complexity is group operations. Notes References Number theoretic algorithms
https://en.wikipedia.org/wiki/Computer%20fraud
Computer fraud is the use of computers, the Internet, Internet devices, and Internet services to defraud people or organizations of resources. In the United States, computer fraud is specifically proscribed by the Computer Fraud and Abuse Act (CFAA), which criminalizes computer-related acts under federal jurisdiction and directly combats the insufficiencies of existing laws. Types of computer fraud include: Distributing hoax emails Accessing unauthorized computers Engaging in data mining via spyware and malware Hacking into computer systems to illegally access personal information, such as credit cards or Social Security numbers Sending computer viruses or worms with the intent to destroy or ruin another party's computer or system. Phishing, social engineering, viruses, and DDoS attacks are fairly well-known tactics used to disrupt service or gain access to another's network, but this list is not inclusive. Notable incidents The Melissa Virus/Worm The Melissa Virus appeared on thousands of email systems on March 26, 1999. It was disguised in each instance as an important message from a colleague or friend. The virus was designed to send an infected email to the first 50 email addresses on the users’ Microsoft Outlook address book. Each infected computer would infect 50 additional computers, which in turn would infect another 50 computers. The virus proliferated rapidly and exponentially, resulting in substantial interruption and impairment of public communications and services. Many system administrators had to disconnect their computer systems from the Internet. Companies such as Microsoft, Intel, Lockheed Martin and Lucent Technologies were forced to shut down their email gateways due to the vast amount of emails the virus was generating. The Melissa virus is the most costly outbreak to date, causing more than $400 million in damages to North American businesses. After an investigation conducted by multiple branches of government and law enforcement, the Melissa Virus/Worm was attributed to David L. Smith, a 32-year-old New Jersey programmer, who was eventually charged with computer fraud. Smith was one of the first people ever to be prosecuted for the act of writing a virus. He was sentenced to 20 months in federal prison and was fined $5,000. In addition, he was also ordered to serve three years of supervised release after completion of his prison sentence. The investigation involved members of New Jersey State Police High Technology Crime Unit, the Federal Bureau of Investigation (FBI), the Justice Department’s Computer Crime and Intellectual Property Section, and the Defense Criminal Investigative Service. See also Information security Information technology audit External links Information Security & Computer Fraud Cases & Investigations Union Bank of Switzerland Cornell Law: Computer and Internet Fraud References Internet fraud Information technology audit
https://en.wikipedia.org/wiki/Into%20the%20West%20%28miniseries%29
Into the West is a 2005 miniseries produced by Steven Spielberg and DreamWorks, with six two-hour episodes (including commercials). The series was first broadcast in the U.S. on Turner Network Television (TNT) on six Fridays starting on June 10, 2005. It was also shown in the UK on BBC2 and BBC HD from November 4, 2006, and in Canada on CBC Television. The series also aired in the U.S. on AMC during the summer (June/July) and fall (autumn, September/October) of 2012. The miniseries begins in the 1820s and is told mainly through the third person narration of Jacob Wheeler (Matthew Settle) and Loved By the Buffalo (Joseph M. Marshall III), although episodes outside the direct observation of both protagonists are also shown. The plot follows the story of two families, one white American and one Native American, as their lives become mingled through the momentous events of American expansion. The story intertwines real and fictional characters and events spanning the period of expansion of the United States in the American frontier from 1825 to 1890. The show has a large cast, with about 250 speaking parts. The series features well-known performers including Josh Brolin, Gary Busey, Michael Spears, Tonantzin Carmelo, Skeet Ulrich, Garrett Wang, Steve Reevis, Rachael Leigh Cook, Wes Studi, Irene Bedard, Alan Tudyk, Christian Kane, Russell Means, Jay Tavare, Keri Russell, Graham Greene, Sean Astin, Beau Bridges, Judge Reinhold, Zahn McClarnon, Tom Berenger, Gil Birmingham, David Paymer, Raoul Trujillo, Eric Schweig, Lance Henriksen, Simon R. Baker, Tyler Christopher, Tatanka Means, Gordon Tootoosis, Sheila Tousey, Annabella Piugattuk, and Will Patton. It was filmed in Drumheller, Alberta and Santa Fe, New Mexico. Episodes Episode 1: "Wheel to the Stars" Growling Bear (Gordon Tootoosis), an elderly Lakota medicine man, has an apocalyptic vision that the buffalo his people rely upon will soon vanish from the prairie and the Lakota will live in square houses. His vision is controversial and his apprentice, Soaring Eagle (Gerald Auger), convinces most of the people to disregard Growling Bear's dark vision. A young boy named White Feather (Chevez Ezaneh) overhears and seeks out the now discredited Growling Bear to learn more about his vision. Before he dies, Growling Bear gives White Feather a necklace symbolizing the Lakota medicine wheel. This necklace is passed on to various characters through the miniseries. Later, during a buffalo jump hunt led by White Feather's older brothers Running Fox (Matthew Strongeagle) and Dog Star (Pony Boy Osuniga), many people from the village are killed during the stampede, but White Feather is miraculously spared when the spirit of deceased Growling Bear appears to protect him. The tribe renames him Loved by the Buffalo and begin to regard him as a holy man healing people by taking their pain upon himself. This causes Soaring Eagle to become jealous and he tries to undermine Loved by the Buffalo (Simon Baker) b
https://en.wikipedia.org/wiki/Acetic%20acid%20%28data%20page%29
This page provides supplementary chemical data on acetic acid. Material Safety Data Sheet The handling of this chemical may incur notable safety precautions. It is highly recommend that you seek the Material Safety Datasheet (MSDS) for this chemical from a reliable source and follow its directions. PTCL Safety web site Science Stuff Structure and properties Thermodynamic properties Vapor pressure of liquid Table data obtained from CRC Handbook of Chemistry and Physics 44th ed. Distillation data Spectral data References Chemical data pages Chemical data pages cleanup
https://en.wikipedia.org/wiki/Synergy%20%28software%29
Synergy is a software application for sharing a keyboard and mouse between multiple computers. It is used in situations where several PCs are used together, with a monitor connected to each, but are to be controlled by one user. The user needs only one keyboard and mouse on the desk — similar to a KVM switch without the video. Partly open source and partly closed source, the open source components are released under the terms of the GNU General Public License, which is free software. The first version of Synergy was created on May 13, 2001, by Chris Schoeneman and worked with the X Window System only. Synergy now supports Windows, macOS, Linux, and other Unix-like operating systems. Design Once the program is installed, users can move the mouse "off" the side of their desktop on one computer, and the mouse pointer will appear on the desktop of another computer. Key presses will be delivered to whichever computer the mouse-pointer is located in. This makes it possible to control several machines as easily as if they were a single multi-monitor computer. The clipboard and even screensavers can be synchronized. The program is implemented as a server which defines which screen-edges lead to which machines, and one or more clients, which connect to the server to offer the use of their desktops. The keyboard and mouse are connected to the server machine. As of version 2.0 (2017) keystrokes, mouse movements and clipboard contents are sent via an encrypted SSL network connection. This previously required the purchase of the Pro edition in version 1. In July 2013 the Defuse Security Group reported the proprietary encryption used in Synergy 1.6 to be insecure and released an exploit which could be used to passively decrypt the commands sent to the Synergy 1.6 clients. This was solved by using SSL in 1.7. TCP/IP communications (default port 24800) are used to send mouse, keyboard and clipboard events between computers in Synergy 1. History The first incarnation of Synergy was CosmoSynergy, created by Richard Lee and Adam Feder then at Cosmo Software, Inc., a subsidiary of SGI (née Silicon Graphics, Inc.), at the end of 1996. They wrote it, and Chris Schoeneman contributed, to solve a problem: most of the engineers in Cosmo Software had both an Irix and a Windows box on their desks and switchboxes were expensive and annoying. CosmoSynergy was a great success but Cosmo Software declined to productize it and the company was later closed. Synergy is a from-scratch reimplementation of CosmoSynergy. It provides most of the features of the original and adds a few improvements. Synergy+ was created in 2009 as a maintenance fork for the purpose of fixing bugs inherited from the original version. The original version of Synergy had not been updated for a notable length of time (as of 6 June 2010, the latest release was 2 April 2006). There was never official confirmation that the original Synergy project had been abandoned; however, there was public discussio
https://en.wikipedia.org/wiki/Power%20Macintosh%207500
The Power Macintosh 7500 is a personal computer designed, manufactured and sold by Apple Computer from August 1995 to May 1996. The 7500 was introduced alongside the Power Macintosh 7200 and 8500 at the 1995 MacWorld Expo in Boston. Apple referred to these machines collectively as the "Power Surge" line, communicating that these machines offered a significant speed improvement over its predecessors. The 7500 introduced a new case design, later dubbed "Outrigger" by Mac enthusiasts. There were two derivative models: the Power Macintosh 7600, identical to the 7500 except for the CPU which was a PowerPC 604 or 604e processor instead of the 7500's 601; and the Power Macintosh 7300, identical to the 7600 but without the video inputs found in both the 7500 and 7600. Hardware The 7500 is one of the first PCI-capable Macs manufactured by Apple; NuBus expansion cards are not supported. It has a PowerPC 601 processor rated at 100 MHz that is replaceable via a daughtercard. It also includes full composite video and S-Video input capability, but no output, as the 7500 was designed to be a video conferencing system, not a multimedia editing machine—this was the 8500's task. The main bus runs at 45 MHz or 50 MHz (set by the CPU daughtercard), and the CPU at integer or half-integer multiples of this speed. The bus can be temperamental with sensitivity to different kinds of RAM or of L2 cache, which could cause problems with aftermarket CPU cards trying to increase the clock speed. Models In addition to the standard matrix of configurations available from Apple, various third-party resellers offered a wide variety of configurations. Power Macintosh 7500/100: 8 or 16 MB RAM, 512 MB or 1 GB HDD, AppleCD 600i 4x CD-ROM drive. Timeline References 7500 7500 Macintosh desktops Computer-related introductions in 1995 it:Power Macintosh 7500
https://en.wikipedia.org/wiki/WERS
WERS (88.9 FM) is one of Emerson College's two radio stations (the other being campus station WECB), located in Boston, Massachusetts, United States. Programming features over 20 different styles of music and news, including live performances and interviews. WERS stands as the oldest non-commercial radio station in New England, and has been in operation since November 1949. Among the founders of the station was WEEI program director Arthur F. Edes, who first taught broadcasting courses at Emerson in 1932 and helped to plan a campus radio station. The chief architect of WERS in its early years was Professor Charles William Dudley. Translators In June 2007, WERS inaugurated a translator station on 96.5 MHz in New Bedford, Massachusetts, relaying WERS's programming to New Bedford and nearby communities. Another translator, on 101.5 MHz in Gloucester, Massachusetts, on Cape Ann, went on the air in July 2008. Critical acclaim According to The Princeton Review, WERS is the #1 college radio station in America, an award the station has won or come close to winning almost every year since The Princeton Review started ranking colleges. WERS is the most highly rated student-run college radio station in the US. In the Boston market (10th largest in the nation), WERS's daytime programming usually ranks at 20th to 25th. Sports In the late 1990s and mid-2000s, WERS featured a successful sports-themed program, Sports Sunday, which aired Sundays from noon to 2 pm. The program won three consecutive Associated Press annual awards for student sports programming (2002, 2003, and 2004). Guests of the show included former basketball great Bill Walton, Boston Globe columnist Kevin Paul DuPont, Hockey East commissioner Joe Bertagna, former Northeastern University men’s hockey head coach Bruce Crowder, InsideHockey.com columnist James Murphy, and NHL.com columnist Bob Snow. Former show hosts include Lon Nichols (current anchor for KLKN in Lincoln, Nebraska), Lowell Galindo (current ESPNU anchor), Tom Gauthier (current radio broadcaster and director of media relations for the Bowling Green Hot Rods), Justin Termine (current anchor and producer for NBA Radio on Sirius), Mike Gastonguay (interned as an associate producer for KXTA’s Loose Cannons), Matt Porter (Palm Beach Post Miami Hurricanes beat reporter), Steve Crowe (Boston Globe part-timer) and Ryan Heisler (noted triathlete). References External links Official Website WERS Broadcast Stream WECB - Emerson's On-Campus Radio Station Emerson College ERS Radio stations established in 1949 ERS 1949 establishments in Massachusetts Adult album alternative radio stations in the United States
https://en.wikipedia.org/wiki/Crazing
Crazing is the phenomenon that produces a network of fine cracks on the surface of a material, for example in a glaze layer. Crazing frequently precedes fracture in some glassy thermoplastic polymers. As it only takes place under tensile stress, the plane of the crazing corresponds to the stress direction. The effect is visibly distinguishable from other types of fine cracking because the crazing region has different refractive indices from surrounding material. Crazing occurs in regions of high hydrostatic tension, or in regions of very localized yielding, which leads to the formation of interpenetrating microvoids and small fibrils. If an applied tensile load is sufficient, these bridges elongate and break, causing the microvoids to grow and coalesce; as microvoids coalesce, cracks begin to form. Polymers Crazing occurs in polymers, because the material is held together by a combination of weaker Van der Waals forces and stronger covalent bonds. Sufficient local stress overcomes the Van der Waals force, allowing a narrow gap. Once the slack is taken out of the backbone chain, covalent bonds holding the chain together hinder further widening of the gap. The gaps in a craze are microscopic in size. Crazes can be seen because light reflects off the surfaces of the gaps. The gaps are bridged by fine filament called fibrils, which are molecules of the stretched backbone chain. The fibrils are only a few nanometers in diameter, and cannot be seen with a light microscope, but are visible with an electron microscope. The thickness profile of a crazing is like a sewing needle: the very tip of the crazing may be as thin as several atoms. As the distance from the tip increase, it tends to thicken gradually with the rate of the increase diminishing with distance. Therefore, the growth of crazing has a critical distance from the tip. The opening angle of the crazing lies between 2° and 10°. The boundary between crazing and surrounding bulk polymer is very sharp, the microstructure of which can be scaled down to 20Å or less, which means it can only be observed by electron microscopy. A craze is different from a crack in that it cannot be felt on the surface and it can continue to support a load. Furthermore, the process of craze growth prior to cracking absorbs fracture energy and effectively increases the fracture toughness of a polymer. The initial energy absorption per square meter in a craze region has been found to be up to several hundred times that of the uncrazed region, but quickly decreases and levels off. Crazes form at highly stressed regions associated with scratches, flaws, stress concentrations and molecular inhomogeneities. Crazes generally propagate perpendicular to the applied tension. Crazing occurs mostly in amorphous, brittle polymers like polystyrene (PS), acrylic (PMMA), and polycarbonate; it is typified by a whitening of the crazed region. The white colour is caused by light-scattering from the crazes. The production of craz
https://en.wikipedia.org/wiki/Polytypic
Polytypic means of more than one type. It often refers to: Polytypic function, in computer science Polytypic habitat, in ecology, a habitat not dominated by a single species Polytypic taxon, in biology, a taxon with more than one immediately subordinate taxa See also Polyclonal antibodies Polytypes in crystallography Race (classification of human beings) for a discussion of whether the species Homo sapiens is polytypic
https://en.wikipedia.org/wiki/Elizabeth%20Dilling
Elizabeth Eloise Kirkpatrick Dilling (April 19, 1894 – April 30, 1966) was an American writer and political activist. In 1934, she published The Red Network—A Who's Who and Handbook of Radicalism for Patriots, which catalogs over 1,300 suspected communists and their sympathizers. Her books and lecture tours established her as the pre-eminent female right-wing activist of the 1930s, and one of the most outspoken critics of the New Deal, which she referred to as the "Jew Deal". In the mid-to-late 1930s, Dilling expressed sympathy for Nazi Germany. Dilling was the best-known leader of the World War II women's isolationist movement, a grass-roots campaign that pressured Congress to refrain from helping the Allies. She was among 28 anti-war campaigners charged with sedition in 1942; the charges were dropped in 1946. While academic studies have predominantly ignored both the anti-war "Mothers' movement" and right-wing activist women in general, Dilling's writings secured her a lasting influence among right-wing groups. She organized the Paul Reveres, an anti-communist organization, and was a member of the America First Committee. Early life and family Dilling was born Elizabeth Eloise Kirkpatrick on April 19, 1894, in Chicago, Illinois. Her father, Lafayette Kirkpatrick, was a surgeon of Scotch-Irish ancestry; her mother, Elizabeth Harding, was of English and French ancestry. Her father died when she was six weeks old, after which her mother added to the family income by selling real estate. Dilling's brother, Lafayette Harding Kirkpatrick, who was seven years her senior, became wealthy by the age of 23 after developing properties in Hawaii. Dilling had an Episcopalian upbringing, and attended a Catholic girls' school, Academy of Our Lady. She was highly religious, and was known to send her friends 40-page letters about the Bible. Prone to bouts of depression, she went on vacations in the US, Canada, and Europe with her mother. In 1912, she enrolled at the University of Chicago, where she studied music and languages, intending to become an orchestral musician. She studied the harp under Walfried Singer, the Chicago Symphony's harpist. She left after three years before graduating, lonely and bitterly disillusioned. In 1918, she married Albert Dilling, an engineer studying law who attended the same Episcopalian church as Elizabeth. The couple were well off financially, thanks to Elizabeth's inherited money and Albert's job as chief engineer for the Chicago Sewerage District. They lived in Wilmette, a Chicago suburb, and had two children, Kirkpatrick in 1920, and Elizabeth Jane in 1925. The family traveled abroad at least ten times between 1923 and 1939, experiences that focused Dilling's political outlook and served to convince her of American superiority. In 1923, they visited Britain, France and Italy. Offended by the lack of gratitude from the British for American intervention in World War I, Dilling vowed to oppose any future American involvement
https://en.wikipedia.org/wiki/Terry%20Bollinger
Terry Benton Bollinger (born February 6, 1955, Fredericktown, Missouri) is an American computer scientist who works at the MITRE Corporation. In 2003 he wrote an influential report for the U.S. Department of Defense (U.S. DoD) in which he showed that free and open source software (FOSS) had already become a vital part of the United States Department of Defense software infrastructure, and that banning or restricting its use would have had serious detrimental impacts on DoD security, research capabilities, operational capabilities, and long-term cost efficiency. His report ended a debate about whether FOSS should be banned from U.S. DoD systems, and in time helped lead to the current official U.S. DoD policy of treating FOSS and proprietary software as equals. The report is referenced on the DoD CIO web site and has been influential in promoting broader recognition of the importance of free and open source software in government circles. Bollinger is also known for his activity in the IEEE Computer Society, where he was an editor for IEEE Software for six years, wrote the founding charter for IEEE Security & Privacy Magazine, and received an IEEE Third Millennium Medal for lifetime contributions to IEEE. He has written about a wide range of software issues including effective development processes, cyber security, and distributed intelligence. Life and work Bollinger received Bachelor's and master's degrees in Computer Science at the Missouri University of Science and Technology (S&T), from which he also received a Professional Degree in December 2009 for lifetime accomplishments. He has had a lifelong interest in multi-component (crowd) intelligence as an aspect of artificial intelligence, as well as a strong interest in the hard sciences, including the possible relevance of quantum theory to faster but fully classical, energy-efficient information processing in biological systems. His metaphors for understanding quantum entanglement and encryption have been quoted in the Russian technical press. From 2004 to 2010, Bollinger was the chief technology analyst for the U.S. DoD Defense Venture Catalyst Initiative (DeVenCI), an effort created by the Secretary of Defense after the September 11, 2001 terrorist attacks. DeVenCI selects qualified applicants from leading venture capital firms to contribute voluntary time and expertise to finding emerging commercial companies and technologies that could be relevant to DoD technology needs. Bollinger currently works full-time for the Office of Naval Research (ONR) research arm of the Marine Corps, where he helps assess and support research into the science of autonomy, robotics, and artificial intelligence. See also Use of Free and Open Source Software (FOSS) in the U.S. Department of Defense Publications See DBLP Bibliography for Terry Bollinger References 1955 births Living people Missouri University of Science and Technology alumni Senior Members of the IEEE American computer scientists Artif
https://en.wikipedia.org/wiki/Capilano%20University
Capilano University (CapU) is a teaching-focused public university based in North Vancouver, British Columbia, Canada, located on the slopes of the North Shore Mountains, with programming that also serves the Sea-to-Sky Corridor and the Sunshine Coast. The university is named after Chief Joe Capilano Sa7plek (Sahp-luk) who was the leader of the Squamish people (Sḵwx̱wú7mesh) from 1895 to 1910. Capilano University's degree programs are approved by the Government of British Columbia’s Ministry of Advanced Education, Skills and Training. The degree-granting powers of the university are legislated by British Columbia's University Act. In 2012, CapU became Canada's first university to receive accreditation from the Northwest Commission on Colleges and Universities (or NWCCU) in Washington, one of six major regional agencies in the U.S. that are recognized by the United States Department of Education. Capilano University's sports teams, The Blues, have won 15 national titles in the Canadian Collegiate Athletic Association, and 61 provincial titles in the Pacific Western Athletic Association. The university was originally founded as Capilano College by school boards and residents of the North Shore and Howe Sound in 1968 based on the need for a public institution serving the local communities immediately northwest of Vancouver. Initial enrolment was 784 students. In 2008, the province changed Capilano College's designation to a university and, as of 2019, it has grown to enrol approximately 12,700 students per year. Capilano University's academic offerings include nationally and internationally recognized liberal arts, professional, and career programs which lead to degrees, diplomas, and certificates. History Founding The school boards of North and West Vancouver, Howe Sound and Sechelt formed a committee to determine the need for a community college to serve the region. The proposal to build a college on the North Shore passed by a plebiscite in North and West Vancouver and the Howe Sound in 1968. The provincial government granted approval, and Capilano College had its name selected from submissions made by North Shore residents, in honour of Chief Joe Capilano of the Sḵwx̱wú7mesh Coast Salish nation. Capilano College opened on September 10, 1968, with 784 students attending classes after hours at West Vancouver Secondary. The Capilano College Foundation was created in 1970 to provide scholarships and bursaries for students. In 1970, construction began on the North Vancouver campus in the Lynnmour area. Three years later, the permanent North Vancouver campus opened with 1,965 students in attendance. The first vocational programs were offered in portable buildings brought from West Vancouver Secondary. The first permanent structure at the North Vancouver campus, the original library building, also opened. In 1975 Capilano College opened the Squamish Learning Centre and Community Information Services at 38038 Cleveland Avenue in Squamish. In 1976
https://en.wikipedia.org/wiki/BootVis
BootVis is a Microsoft computer application that allows "PC system designers and software developers" (not aimed at end-users) to check how long a Windows XP machine takes to boot, and then to optimize the boot process, sometimes considerably reducing the time required. BootVis has been replaced with XbootMgr, and is no longer available from Microsoft's website. Use BootVis defines boot and resume times as the time from when the power switch is pressed to the time at which the user is able to start a program from a desktop shortcut. The application measures time taken during Windows XP's boot or resume period. BootVis can also invoke the optimization routines built into Windows XP, such as defragmenting the files accessed during boot, to improve startup performance. This optimization is automatically done by Windows at three-day intervals. Because the Global Logger session used by BootVis is triggered by registry entries, it runs every time that the entries appear in the registry, which has resulted in some users seeing large quantities of hard drive being used for the trace.log file (in C:\WINDOWS\System32\LogFiles\WMI). Upon rebooting the file will shrink but will grow again as the computer runs. The user can run BootVis again and click Trace→Stop Tracing, which will stop the file from growing and allow it to be safely deleted. The Bootvis.exe tool is no longer available from Microsoft. Similar tools Soluto measures the boot time and lets the user decide if and when a software shall be started automatically. It is using an information database populated by the input from the users. WinBootInfo logs drivers and applications loaded during system boot, measures Windows boot times, records CPU and I/O activity during the boot. Boot Log XP troubleshoots boot-up problems in Windows XP, creates a new boot log file. r2 Studios' Startup Delayer allows users to optionally delay or disable applications that would otherwise run during start up. References External links Argus Boot Accelerator TweakHound rebuke - "Bootvis, MS wassup?" Softpedia download page Boot Log XP r2 Studios' Startup Delayer Discontinued Microsoft software Windows-only proprietary software Computer system optimization software
https://en.wikipedia.org/wiki/Edwin%20Cole
Edwin Cole may refer to: Edwin Louis Cole (1922–2002), founder of the Christian Men's Network Edwin Cole (RAF officer) (1895–?), World War I flying ace Buddy Cole (musician) (Edwin LeMar Cole, 1916–1964), jazz pianist and orchestra leader
https://en.wikipedia.org/wiki/XGameStation%20series
The XGameStation is a series of embedded systems, primarily designed as a dedicated home video game console, created by Andre LaMothe and sold by his company Nurve Networks LLC. Originally designed to teach electronics and video game development to programmers, newer models concentrate more on logic design, multi-core programming, game programming, and embedded system design and programming with popular microcontrollers. Prototype Versions The XGameStation was originally conceived of as a handheld system called the nanoGear based around the 68HC12 microprocessor, a modern derivative of the 6809. The system would also contain modern derivatives of the 6502 and Z-80 microprocessors, for retro coders and hackers, and to make emulation of classic computer and video game systems easier. After several iterations, the plan changed to use an ARM microprocessor and an FPGA on which a custom designed GPU was implemented. But after finishing this project it was decided that the resulting system was cost prohibitive and much too advanced for beginners. Instead, the plan was changed again finally resulting in the XGS Micro Edition, based on the SX52 microcontroller. The ARM and FPGA-based system was renamed the XGS Mega Edition after the release of the Micro Edition, and though planned to be sold, it was never released. Original XGameStation Then original XGameStation was announced by August 2003. XGS Micro Edition (ME) The XGS Micro Edition was announced in 2004. The XGS Micro Edition is a pre-built video game console based around the SX52 microcontroller, which is a high-speed PIC microcontroller running at 80 MHz for a total of 80 MIPS. The color television video signal is generated in software on the microcontroller. Sound is generated by a ROHM BU8763 chip. For input, the system has a single PS/2 connector for keyboard or mouse input, as well as two DB-9 for connecting Atari-compatible joysticks. Programming is done in assembly language or in a custom written XGS Basic, either on a PC and then transferred to the console or on the system itself. It has add-on packs for creating your own expansion card and electronic experimenting kit. The Micro Edition contains the XGameStation unit, "Designing Your Own Video Game Console" - a detailed book in PDF format teaching the basics of electronics, a power supply, A/V cables, a joystick, a COM cable, and a few extras such as a PDF version of one of Andre LaMothe's previous books "Tricks of the Windows Game Programming Gurus". Video signal generated by software The most remarkable aspect of the SX52 Processor is its ability to create a color video signal using only software, and still have the power to simultaneously run the software that uses this video display in order to create an elementary video game or game demo. These latter programs may or may not evolve into a real (playable) game, as often the memory of the SX52 processor is too restricted to support them. Some people also write non-game video demos t
https://en.wikipedia.org/wiki/Film%20scanner
A film scanner is a device made for scanning photographic film directly into a computer without the use of any intermediate printmaking. It provides several benefits over using a flatbed scanner to scan in a print of any size: the photographer has direct control over cropping and aspect ratio from the original, unmolested image on film; and many film scanners have special software or hardware that removes scratches and film grain and improves color reproduction from film. Film scanners can accept either strips of 35 mm or 120 film, or individual slides. Low-end scanners typically only take 35mm film strips, while medium- and high-end film scanners often have interchangeable film loaders. This allows the one scanning platform to be used for different sizes and packaging. For example, some allow microscope slides to be loaded for scanning, while mechanised slide loaders allow many individual slides to be batch scanned unattended. Some software used to process images scanned by film scanners allows for automatic color correction based on the film manufacturer and type. In many cases the source film may not be marked with this information in human-readable form, but might be marked at the bottom edge with a DX film edge barcode following a standard maintained by ANSI and I3A. Dust and scratches Dust and scratches on the film can be a big problem for scanning. Because of their reduced size (compared to prints), the scanners are capable of resolutions much higher than a regular flatbed scanner; typically at least 2000 samples per inch (spi), up to 4000 spi or more. At these resolutions dust and scratches take on gigantic proportions. Even small specks of dust, invisible to the naked eye, can obscure a cluster of several pixels. For this reason, techniques have been developed to remove their appearance from a scan, see film restoration. The simplest is the median filter, often called despeckle in many graphic manipulation programs, e.g. in Adobe Photoshop and the GIMP. It works by examining a pixel in relation to the pixels surrounding it; if it is too different from the surrounding pixels then it is replaced with one set to their median value. This and other methods can be quite effective but have the disadvantage that the filter cannot know what actually is dust or noise. It will also degrade fine detail in the scan. Infrared cleaning Infrared cleaning works by collecting an infrared channel from the scan at the same time as the visible colour channels (red, green, and blue). This is done by using a light source that also produces infrared radiation, and having a fourth row of sensors on the linear CCD sensor. Photographic film is mostly transparent to infrared radiation (no matter what the visible image contains) but dust and scratches aren't, so they show up in the IR channel. This information can then be used to automatically remove the appearance of dust and scratches in the visible channels and replace them with something similar to their
https://en.wikipedia.org/wiki/UP%20Diliman%20Department%20of%20Computer%20Science
The Department of Computer Science is one of nine departments in the University of the Philippines Diliman College of Engineering. Academic programs The Department of Computer Science administers the four-year bachelor of science in computer science program and the master of science in computer science program. As of AY 2009-2010, the department had 553 undergraduate and 89 graduate students mentored by 27 faculty members, seven of whom are PhD degree holders. Undergraduate The bachelor of science in computer science program is designed to equip the student with knowledge of the fundamental concepts and a reasonable mastery of the basic tools and techniques in computer science. The undergraduate program incorporates the core material, which is universally accepted as common to computer science undergraduate programs (computer programming, computer organization, computer systems, data structures and algorithms, file processing, and programming languages). Underpinning the software orientation of the program are the subjects on database systems, software engineering, artificial intelligence, computer networks and special problems (primarily, software projects). Graduate The master of science in computer science program aims to provide the student with both breadth and depth of knowledge in the concepts and techniques related to the design, programming, and application of computing systems. The doctor of philosophy in computer science program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects of computing. They should be able to formulate computing problems and develop new and innovative technology as novel solutions to address those problems. The graduates gain expertise to independently contribute to research and development (R&D) in a specialized area of computer science. The program prepares graduates for professional and research careers in industry, government or academe. Research groups Algorithms and Complexity Laboratory The Algorithms and Complexity Laboratory (ACL) was co-founded by Henry Adorna Ph.D. and Jaime DL Caro, Ph.D. Research areas: models of computation and complexity (automata and formal language theory and applications, natural computing, bioinformatics, riceInformatics, formal models for e-voting), Algorithmics, Designs and Implementations (visualization and implementations, algorithmics for hard problems, algorithmic game theory, scheduling problem), combinatorial networks, information technology in education. Computer Security Group The Computer Security Group (CSG) was founded by Susan Pancho-Festin, Ph.D. Research areas: cryptographic algorithms, message protocols, and coding techniques to enhance enterprise and mobile applications. Computer Vision and Machine Intelligence Group The Computer Vision and Machine Intelligence Group (CVMIG), the first formally organized research group of the department was founded by Prospero Naval Jr., Ph.D.
https://en.wikipedia.org/wiki/SIGCSE
SIGCSE is the Association for Computing Machinery's (ACM) Special Interest Group (SIG) on Computer Science Education (CSE), which provides a forum for educators to discuss issues related to the development, implementation, and/or evaluation of computing programs, curricula, and courses, as well as syllabi, laboratories, and other elements of teaching and pedagogy. SIGCSE is also the colloquial name for the SIGCSE Technical Symposium on Computer Science Education, which is the largest of the four conferences organized by SIGCSE. The main focus of SIGCSE is higher education, and discussions include improving computer science education at high school level and below. The membership level has held steady at around 3300 members for several years. The current chair of SIGCSE is Alison Clear for July 1, 2022 to June 30, 2025. Conferences SIGCSE has four annual conferences. The SIGCSE Technical Symposium on Computer Science Education is held in the United States with an average annual attendance of approximately 1600 in recent years. The most recent conference was held March 15 through March 19, 2023 in Toronto, Canada. The annual conference on Innovation and Technology in Computer Science Education (ITiCSE). The next ITiCSE will be held July 10 - July 12, hosted by the University of Turku in Turku, Finland. This conference is attended by about 200-300 and is mainly held in Europe, but has also been held in countries outside of Europe ((Israel - 2012), and (Peru - 2016)). The International Computing Education Research (ICER) conference. This conference has about 70 attendees and is held in the United States every other year. On the alternate years it rotates between Europe and Australasia. The next conference will be held August 8–10, 2023 in Chicago, Illinois. The ACM Global Computing Education (CompEd) conference. This conference will be held at locations outside of the typical North American and European locations. The first conference was held in Chengdu, China between the 17th and 19 May 2019. The second will be held in Hyderabad, India, from December 7 to December 9, 2023. It is planned for CompEd to be held every other year. Newsletter/Bulletin The SIGCSE Bulletin is a quarterly newsletter that was first published in 1969. It evolved from an informal gathering of news and ideas to a venue for columns, editor-reviewed articles, research announcements, editorials, symposium proceedings, etc. In 2010, with the inception of ACM Inroads magazine, the Bulletin was transformed into an electronic newsletter sent to all SIGCSE members providing communications about SIGCSE: announcing activities, publicizing events, and highlighting topics of interest. In other words, it has returned to its roots. Awards SIGCSE has two main awards that are given out annually. Outstanding Contribution Award The SIGCSE Award for Outstanding Contribution to Computer Science Education is given annually since 1981. Lifetime Service Award The SIGCSE Life Service to C
https://en.wikipedia.org/wiki/Tadpole%20Computer
Tadpole Computer was a manufacturer of rugged, military specification, UNIX workstations, thin client laptops and lightweight servers. History Tadpole was founded in 1994 and originally based in Cambridge, England, then for a time in Cupertino, California. In 1998, Tadpole acquired RDI Computer Corporation of Carlsbad, California, who produced the competing Britelite and Powerlite portable SPARC-based systems, for $6 million. Tadpole was later acquired by defense contractor General Dynamics, in April 2005. Production continued until March 2013 but since then, they no longer sell any systems; and support for their products is provided by Flextronics. An anonymous US intelligence officer had stated to Reuters in 2013 that a decade earlier the US secretly created a company reselling laptops from Tadpole Computer to Asian governments. The reseller added secret software that allowed intelligence analysts to access the machines remotely. Products Tadpole laptops used a variety of architectures, such as SPARC, Alpha, PowerPC and x86. Although very expensive, these classic Tadpoles won favour as a method to show corporation's proprietary software (IBM/HP/DEC) on a self-contained portable device on a client site in the days before remote connectivity. SPARC The original SPARCbook 1 was introduced in 1992 with 8–32 MB RAM and a 25 MHz processor. It was followed by several further SPARCbooks, UltraSPARCbooks (branded as Ultrabooks) - and the Voyager IIi. These all ran the SunOS or Solaris operating systems. In 2004, Tadpole released the Viper laptop. The SPARCLE was based on a 500-600 MHz UltraSPARC IIe or 1 GHz UltraSPARC IIIi. DEC Alpha An Alpha-based laptop, the ALPHAbook 1, was announced on 4 December 1995 and became available in 1996. The Alphabook 1 was manufactured in Cambridge, England. It used an Alpha 21066A microprocessor specified for a maximum clock frequency of 233 MHz. The laptop used the OpenVMS operating system. IBM PowerPC A PowerPC-based laptop was also produced - the IBM RISC System/6000 N40 Notebook Workstation, powered by a 50 MHz PowerPC 601 and with between 16 and 64MB RAM - and designed to run IBM AIX. x86 Tadpole also produced a range of x86-based notebook computers, including the Tadpole P1000, and the TALIN laptops with SUSE Linux, or optionally Microsoft Windows. See also Military computers RDI PowerLite Toughbook, Panasonic's rugged portable computers References External links www.tadpolecomputer.com on the Internet Archive SPARCbook 3000ST - The coolest 90s laptop 1994 establishments in California 2005 disestablishments in California American companies established in 1994 American companies disestablished in 2005 Computer companies established in 1994 Computer companies disestablished in 2005 Defunct computer companies of the United Kingdom Defunct computer companies of the United States Defunct computer hardware companies SPARC microprocessor products
https://en.wikipedia.org/wiki/Linux%20%28disambiguation%29
Linux is a family of computer operating systems based on the Linux kernel. Linux may also refer to: 9885 Linux, an asteroid Linux distribution, an operating system made as a collection of software based on the Linux kernel Linux kernel, an operating system kernel See also List of Linux distributions
https://en.wikipedia.org/wiki/Min-conflicts%20algorithm
In computer science, the min-conflicts algorithm is a search algorithm or heuristic method to solve constraint satisfaction problems. Given an initial assignment of values to all the variables of a constraint satisfaction problem, the algorithm randomly selects a variable from the set of variables with conflicts violating one or more its constraints. Then it assigns to this variable the value that minimizes the number of conflicts. If there is more than one value with a minimum number of conflicts, it chooses one randomly. This process of random variable selection and min-conflict value assignment is iterated until a solution is found or a pre-selected maximum number of iterations is reached. Because a constraint satisfaction problem can be interpreted as a local search problem when all the variables have an assigned value (called a complete state), the min conflicts algorithm can be seen as a repair heuristic that chooses the state with the minimum number of conflicts. Algorithm algorithm MIN-CONFLICTS is input: console.csp, A constraint satisfaction problem. max_steps, The number of steps allowed before giving up. current_state, An initial assignment of values for the variables in the csp. output: A solution set of values for the variable or failure. for i ← 1 to max_steps do if current_state is a solution of csp then return current_state set var ← a randomly chosen variable from the set of conflicted variables CONFLICTED[csp] set value ← the value v for var that minimizes CONFLICTS(var,v,current_state,csp) set var ← value in current_state return failure Although not specified in the algorithm, a good initial assignment can be critical for quickly approaching a solution. Use a greedy algorithm with some level of randomness and allow variable assignment to break constraints when no other assignment will suffice. The randomness helps min-conflicts avoid local minima created by the greedy algorithm's initial assignment. In fact, Constraint Satisfaction Problems that respond best to a min-conflicts solution do well where a greedy algorithm almost solves the problem. Map coloring problems do poorly with Greedy Algorithm as well as Min-Conflicts. Sub areas of the map tend to hold their colors stable and min conflicts cannot hill climb to break out of the local minimum. The function counts the number of constraints violated by a particular object, given that the state of the rest of the assignment is known. History Although Artificial Intelligence and Discrete Optimization had known and reasoned about Constraint Satisfaction Problems for many years, it was not until the early 1990s that this process for solving large CSPs had been codified in algorithmic form. Early on, Mark Johnston of the Space Telescope Science Institute looked for a method to schedule astronomical observations on the Hubble Space Telescope. In collaboration with Hans-Marti
https://en.wikipedia.org/wiki/Commercial%20bandwidth
Commercial bandwidth is a term for the regular capacity of the telephone network required for intelligible speech. It was defined as 300 to 3,400 hertz, although the modern PSTN is theoretically capable of transmitting from 0 to 7,000 Hz using ISDN. See also DS0 Bandwidth (signal processing) Voice frequency References Telephony
https://en.wikipedia.org/wiki/Luna%20%28TV%20series%29
Luna was a British children's science fiction TV comedy show produced by Central Television for the ITV network which ran for two series in 1983 and 1984. The first series was recorded at the former ATV studios in Elstree, the second at their Nottingham facility. Premise Luna was also the name used by the show's two central characters, the first played by Patsy Kensit (1st series) and a replacement by Joanna Wyatt (2nd series). Luna was co-written by Colin Prockter and Colin Bennett; Bennett also acted in it. The show was created and produced by Micky Dolenz of the pop group the Monkees. Dolenz said that the idea for Luna dated back to the late sixties and was based on his daughter Ami; the idea only came into being after he had met Colin Bennett in Hollywood. The character 80H was played by Roy Macready and U2 by Bob Goody. The show was about the domestic life of an eccentric family group set in the year 2040 - although in the setting the characters are not in fact biologically related but assigned to shared living quarters by the bureaucracy. Parts of the setting were decidedly dystopic; in the first episode, Luna is threatened with execution for having lost her citizen's identity card. A distinctive feature of the show was the language of "techno-talk", used by all of the characters and described as an alternative version of English that had emerged to make it easier for computers to understand human speech. Techno-talk was characterised by the formation of new words from stems that already existed in regular spoken English. It also had echoes of George Orwell's Newspeak, albeit that it had been created for a different purpose. For example, the characters live in a "habiviron" (from habitat and environment); similarly, school is "eduviron"; a child is a "diminibeing" (abbreviated to "dimini") and "regrets!" and "gratitudes!" replace "sorry" and "thank you". The first season was repeated in the weeks immediately prior the broadcast of the second season, but the programme has not been repeated since then. Characters Luna (1st season: 72-batch-19Y) - a female "diminibeing". Luna is kind and demure; having been raised in a "dimini colony", she knows very little about the old world but is curious to learn about it and keen to fit in with the others. Andy likes her for the "civilising influence" she brings to the habiviron. Luna was given her name by Andy, because she asked for one; Andy chose it because she was "batched" on the moon. Luna (2nd season) a different character from the above, intended as a replacement - the original Luna has left and so the habiviron is assigned a new diminifemale at the start of the second season, but she adopts the same name as her predecessor. Although equally as kind-hearted as her predecessor, she has a somewhat less demure and more lively and outgoing personality. Brat (3G-batch-19Y) - a geeky male diminibeing. Brat is younger than Luna, and extremely intelligent and technical; he can fix most of the ma
https://en.wikipedia.org/wiki/Mad%20Maestro%21
Mad Maestro!, known in Japan as , is a classical music rhythm game for the PlayStation 2 (PS2). It was developed by Desert Productions and released in Japan by Sony Computer Entertainment (SCEI) and abroad by Eidos Interactive under their "Fresh Games" label on October 11, 2001 in Japan, then later in March 2002 for North America and Europe. Playing as the orchestra conductor Takt, the player must play the song by pressing the button according to the correct pressure on the screen. The game utilizes a soundtrack composed of entirely classical music by famous composers such as Beethoven, Brahms, and Tchaikovsky. The game's original title was . Despite mixed critical reception in the west, the game was sold well and received positive reviews in its native Japan. This led to three Japan-only follow-ups with two "expansions", Bravo Music: Christmas Edition in 2001, and Bravo Music: Chou-Meikyokuban in 2002, and alongside them, a proper sequel called Let's Bravo Music also in 2002. Gameplay Typically rhythm games rely on timed input according to on-screen cues and tempo. Mad Maestro features this style of gameplay, with the additional layer of pressure sensitivity. Utilizing the pressure sensitivity with the DualShock 2, the player must conduct an orchestra by tapping correlating buttons with varying degrees of pressure. There are three levels of pressure; light, medium and hard. By playing good and increasing their score, the player can reach Bravo Mode, which is required to beat the stage. By playing 3 or more notes bad however, the player is forced into Devil Mode, where their score will fall until they play a correct cycle perfectly. The Japanese release featured an optional Baton peripheral. Story In Bravo Town, a young composer named Takt is the leader of an orchestral group known as the Bravo Youth Orchestra, and they perform at the town's Concert Hall. To modernize the town however, Bravo Town announces that they will tear down the hall. Prior to the date however, a fairy and overall guardian to the hall named Symphony awakens. She flies over to Takt's house, who tells him that the concert hall was around for a very long time, and that if it does get demolished, music could lose their power. So, she recognizes Takt's musical power and they decide to recruit various Bravo Town citizens to convince the town to keep the Concert Hall. After recruiting a couple, a clown and her lion partner, a fashion designer and a model, a reporter and some aliens, as well as a young flute prodigy and a long-forgotten-about composer, the new Bravo Youth Orchestra compose at the hall, which convinces the town to keep the hall as everyone returns to their life, and Symphony goes back to becoming the guardian of the Concert Hall. Characters : A young orchestra composer, and the main composer for the "Bravoes", an orchestra group created by himself. He is visited by the magical fairy Symphony while looking at new songs, who tells him about the demolition of the
https://en.wikipedia.org/wiki/Omnibus%20%28survey%29
An omnibus survey is a method of quantitative marketing research where data on a wide variety of subjects is collected during the same interview. Usually, multiple research clients will provide proprietary content for the survey (paying to 'get on the omnibus'), while sharing the common demographic data collected from each respondent. An omnibus survey generally uses a stratified sample and can be conducted either by mail, telephone, or Internet. The advantages to the research client include cost savings (because the sampling and screening costs are shared across multiple clients) and timeliness (because omnibus samples are large and interviewing is ongoing). However, the number of questions will be smaller and sometimes the theme of one of the research client will not be of interest for a part of the respondents. Sources Survey methodology
https://en.wikipedia.org/wiki/Java%20Web%20Start
In computing, Java Web Start (also known as JavaWS, javaws or JAWS) is a deprecated framework developed by Sun Microsystems (now Oracle) that allows users to start application software for the Java Platform directly from the Internet using a web browser. The technology enables seamless version updating for globally distributed applications and greater control of memory allocation to the Java virtual machine. Java Web Start was distributed as part of the Java Platform until being removed in Java SE 11, following its deprecation in Java SE 9. The code for Java Web Start was not released by Oracle as part of OpenJDK, and thus OpenJDK originally did not support it. IcedTea-Web provides an independent open source implementation of Java Web Start that is currently developed by the AdoptOpenJDK community, RedHat and Karakun AG, and which is bundled in some OpenJDK installers. Next to this OpenWebStart provides an open source based implementation that is based on IcedTea-Web but offers more features and commercial support options. Functionality Unlike Java applets, Web Start applications do not run inside the browser. By default they run in the same sandbox as applets, with several minor extensions like allowing to load and save the file that is explicitly selected by the user through the file selection dialog. Only signed applications can be configured to have additional permissions. Web Start has an advantage over applets in that it overcomes many compatibility problems with browsers' Java plugins and different JVM versions. Web Start programs are no longer an integrated part of the web page, they are independent applications that run in a separate frame. Web Start can also launch unmodified applets that are packaged inside .jar files, by writing the appropriate JNLP file. This file can also pass the applet parameters. Such applets also run in a separate frame. Applet launcher may not support some specific cases like loading class as resource. Like applets, Java Web Start is cross-platform. Deprecation With JDK9, several deployment technologies including applets and Java Web Start were deprecated by Oracle. In March 2018, Oracle announced it will not include Java Web Start in Java SE 11 (18.9 LTS) and later. Developers will need to transition to other deployment technologies. A few stand-alone alternatives have since arisen. Implementation The developer prepares a special XML file with JNLP extension. This file describes the application requirements, code location, parameters and additional permissions (if any). The browser downloads this file as any other and (following its MIME type, application/x-java-jnlp-file) opens it with Web Start tool. Web Start tool downloads all necessary resources and launches the application. Java Web Start provides a series of classes in the javax.jnlp package which provide various services to the application. Sun designed most of these services with the aim of allowing carefully controlled access to resou
https://en.wikipedia.org/wiki/Mac%20OS%20X%20Leopard
Mac OS X Leopard (version 10.5) is the sixth major release of macOS, Apple's desktop and server operating system for Macintosh computers. Leopard was released on October 26, 2007 as the successor of Mac OS X Tiger, and is available in two editions: a desktop version suitable for personal computers, and a server version, Mac OS X Server. It retailed for $129 for the desktop version and $499 for Server. Leopard was superseded by Mac OS X Snow Leopard (version 10.6) in 2009. Mac OS X Leopard is the last version of macOS that supports the PowerPC architecture as its successor, Mac OS X Snow Leopard, functions solely on Intel based Macs. According to Apple, Leopard contains over 300 changes and enhancements compared to its predecessor, Mac OS X Tiger, covering core operating system components as well as included applications and developer tools. Leopard introduces a significantly revised desktop, with a redesigned Dock, Stacks, a semitransparent menu bar, and an updated Finder that incorporates the Cover Flow visual navigation interface first seen in iTunes. Other notable features include support for writing 64-bit graphical user interface applications, an automated backup utility called Time Machine, support for Spotlight searches across multiple machines, and the inclusion of Front Row and Photo Booth, which were previously included with only some Mac models. Apple missed Leopard's release time frame as originally announced by Apple's CEO Steve Jobs. When first discussed in June 2005, Jobs had stated that Apple intended to release Leopard at the end of 2006 or early 2007. A year later, this was amended to Spring 2007; however, on April 12, 2007, Apple issued a statement that its release would be delayed until October 2007 because of the development of the iPhone. Mac OS X Leopard is the first version of Mac OS X to run on the MacBook Air. New and changed features End-user features Apple advertised that Mac OS X Leopard has 300+ new features, including: A new and improved Automator, with easy starting points to easily start a workflow. It also can quickly create or edit workflows with new interface improvements. Now it can use a new action called "Watch Me Do" that lets users record a user action (like pressing a button or controlling an application without built-in Automator support) and replay as an action in a workflow. It can create more useful Automator workflows with actions for RSS feeds, iSight camera video snapshots, PDF manipulation, and much more. Back to My Mac, a feature for MobileMe users that allows users to access files on their home computer while away from home via the internet. Boot Camp, a software assistant allowing for the installation of other operating systems, such as Windows XP (SP2 or later) or Windows Vista, on a separate partition (or separate internal drive) on Intel-based Macs. Dashboard enhancements, including Web Clip, a feature that allows users to turn a part of any Web page displayed in Safari into a live Das
https://en.wikipedia.org/wiki/Hotspot%20gateway
A hotspot gateway is a device that provides authentication, authorization and accounting for a wireless network. This can keep malicious users off of a private network even in the event that they are able to break the encryption. A wireless hotspot gateway helps solve guest user connectivity problems by offering instant Internet access without the need for configuration changes to the client computer or any resident client-side software. This means that even if client configuration such as network IP address (including Gateway IP, DNS) or HTTP Proxy settings are different from that of the provided network, the client can still get access to the network instantly with their existing network configuration. Some of the prominent hotspot gateway brands are - WiJungle, Nomadix, Wavertech etc. See also Hotspot (Wi-Fi) References Wireless access points
https://en.wikipedia.org/wiki/Steve%20Harvey%27s%20Big%20Time%20Challenge
Steve Harvey's Big Time Challenge, also known as Steve Harvey's Big Time and Big Time, is a television variety show that aired on the WB Network from 2003 to 2005, hosted by Steve Harvey. In each episode, performers compete for a $10,000 prize. References External links 2000s American sketch comedy television series 2000s American stand-up comedy television series 2000s American variety television series 2003 American television series debuts 2005 American television series endings English-language television shows The WB original programming Talent shows Television series by Warner Bros. Television Studios
https://en.wikipedia.org/wiki/Damian%20Conway
Damian Conway (born 5 October 1964 in Melbourne, Australia) is a computer scientist, a member of the Perl and Raku communities, a public speaker, and the author of several books. Until 2010, he was also an adjunct associate professor in the Faculty of Information Technology at Monash University. Damian completed his BSc (with honours) and PhD at Monash. He is perhaps best known for his contributions to Comprehensive Perl Archive Network (CPAN) and Raku (Perl 6) language design, and his training courses, both on programming techniques and public speaking skills. He has won the Larry Wall Award three times for CPAN contributions. His involvement in Perl 6 language design has been as an interlocutor and explicator of Larry Wall. He is one of the authors of the Significantly Prettier and Easier C++ Syntax (SPEC). Books Object Oriented Perl: A Comprehensive Guide to Concepts and Programming Techniques (Manning Publications, 2000, ) Perl Best Practices (O'Reilly Media, 2005, ) (with "chromatic" and Curtis "Ovid" Poe) Perl Hacks: Tips & Tools for Programming, Debugging, and Surviving (Hacks) (O'Reilly Media, 2006, ) References External links Damian Conway's homepage Damian Conway's old homepage at Monash meta::cpan modules authored by Damian Conway Interview on CodingByNumbers podcast Interview on How I Vim 1964 births Living people Australian computer scientists Perl writers Australian technology writers Computer science educators Monash University alumni Academic staff of Monash University Free software programmers Scientists from Melbourne
https://en.wikipedia.org/wiki/MSDOS.SYS
MSDOS.SYS is a system file in MS-DOS and Windows 9x operating systems. In versions of MS-DOS from 1.1x through 6.22, the file comprises the MS-DOS kernel and is responsible for file access and program management. MSDOS.SYS is loaded by the DOS BIOS IO.SYS as part of the boot procedure. In some OEM versions of MS-DOS, the file is named MSDOS.COM. In Windows 95 (MS-DOS 7.0) through Windows ME (MS-DOS 8.0), the DOS kernel has been combined with the DOS BIOS into a single file, IO.SYS (aka WINBOOT.SYS), while MSDOS.SYS became a plain text file containing boot configuration directives instead. If a WINBOOT.INI file exists, the system will retrieve these configuration directives from WINBOOT.INI rather than from MSDOS.SYS. When Windows 9x is installed over a preexisting DOS install, the Windows file may be temporarily named MSDOS.W40 for as long as Windows' dual-boot feature has booted the previous OS. Likewise, the MSDOS.SYS of the older system is named MSDOS.DOS for as long as Windows 9x is active. Some DOS utilities expect the MSDOS.SYS file to have a minimal file size of at least 1 KB. This is the reason why a large dummy comment is typically found in the MSDOS.SYS configuration file since Windows 95. By default, the file is located in the root directory of the bootable drive/partition (normally C:\ for hard disks) and has the hidden, read-only, and system file attributes set. The MS-DOS derivative (DCP) by the former East-German VEB Robotron used a filename instead. IBM PC DOS as well as DR DOS since 5.0 (with the exception of DR-DOS 7.06) used the file IBMDOS.COM for the same purpose, whereas DR DOS 3.31 to 3.41 used DRBDOS.SYS instead. FreeDOS uses the file KERNEL.SYS for the same purpose. Windows NT-based operating systems (NT 3.1–4, 2000, XP, and 2003) use the NTLDR file and NT 6+ operating systems (Vista, 2008, 7, 8, 8.1, and 10) use bootmgr instead, as they have a different boot sequence. See also IO.SYS IBMDOS.COM DRBDOS.SYS COMMAND.COM List of DOS system files Architecture of Windows 9x Notes References External links MSDOS.SYS in Windows 9x (95/98/ME): Microsoft Knowledge Base (MSKB): List of MSDOS.SYS articles MDGx: Windows 95/98/ME Complete MSDOS.SYS Reference UKT Support: Contents of the MSDOS.SYS File Computer Hope: Information about Window MSDOS.SYS file MDGx: WINBOOT.INI DOS kernel DOS files DOS configuration files
https://en.wikipedia.org/wiki/Computer-aided%20production%20engineering
Computer-aided production engineering (CAPE) is a relatively new and significant branch of engineering. Global manufacturing has changed the environment in which goods are produced. Meanwhile, the rapid development of electronics and communication technologies has required design and manufacturing to keep pace. Description of CAPE CAPE is seen as a new type of computer-aided engineering environment which will improve the productivity of manufacturing/industrial engineers. This environment would be used by engineers to design and implement future manufacturing systems and subsystems. Work is currently underway at the United States National Institute of Standards and Technology (NIST) on CAPE systems. The NIST project is aimed at advancing the development of software environments and tools for the design and engineering of manufacturing systems. CAPE and the Future of Manufacturing The future of manufacturing will be determined by the efficiency with which it can incorporate new technologies. The current process in engineering manufacturing systems is often ad hoc, with computerized tools being used on a limited basis. Given the costs and resources involved in the construction and operation of manufacturing systems, the engineering process must be made more efficient. New computing environments for engineering manufacturing systems could help achieve that objective. Why is CAPE important? In much the same way that product designers need computer-aided design systems, manufacturing and industrial engineers need sophisticated computing capabilities to solve complex problems and manage the vast data associated with the design of a manufacturing system. In order to solve these complex problems and manage design data, computerized tools must be used in the application of scientific and engineering methods to the problem of the design and implementation of manufacturing systems. Engineers must address the entire factory as a system and the interactions of that system with its surrounding environment. Components of a factory system include: the physical plant housing the manufacturing facility; the production facilities which perform the manufacturing operations; the technologies used in the production facility; the work centers/stations, machinery, equipment, tools, and materials which comprise or are used by the production facilities; the various support facilities; the relationship between the factory and its environment. CAPE must not only be concerned with the initial design and engineering of the factory, it must also address enhancements over time. CAPE should support standard engineering methods and problem-solving techniques, automate mundane tasks, and provide reference data to support the decision-making process. The environment should be designed to help engineers become more productive and effective in their work. This would be implemented on personal computers or engineering workstations which have been configured with app
https://en.wikipedia.org/wiki/Null%20%28SQL%29
In SQL, null or NULL is a special marker used to indicate that a data value does not exist in the database. Introduced by the creator of the relational database model, E. F. Codd, SQL null serves to fulfil the requirement that all true relational database management systems (RDBMS) support a representation of "missing information and inapplicable information". Codd also introduced the use of the lowercase Greek omega (ω) symbol to represent null in database theory. In SQL, NULL is a reserved word used to identify this marker. A null should not be confused with a value of 0. A null value indicates a lack of a value, which is not the same thing as a value of zero. For example, consider the question "How many books does Adam own?" The answer may be "zero" (we know that he owns none) or "null" (we do not know how many he owns). In a database table, the column reporting this answer would start out with no value (marked by Null), and it would not be updated with the value "zero" until we have ascertained that Adam owns no books. SQL null is a marker, not a value. This usage is quite different from most programming languages, where null value of a reference means it is not pointing to any object. History E. F. Codd mentioned nulls as a method of representing missing data in the relational model in a 1975 paper in the FDT Bulletin of ACM-SIGMOD. Codd's paper that is most commonly cited in relation with the semantics of Null (as adopted in SQL) is his 1979 paper in the ACM Transactions on Database Systems, in which he also introduced his Relational Model/Tasmania, although much of the other proposals from the latter paper have remained obscure. Section 2.3 of his 1979 paper details the semantics of Null propagation in arithmetic operations as well as comparisons employing a ternary (three-valued) logic when comparing to nulls; it also details the treatment of Nulls on other set operations (the latter issue still controversial today). In database theory circles, the original proposal of Codd (1975, 1979) is now referred to as "Codd tables". Codd later reinforced his requirement that all RDBMSs support Null to indicate missing data in a 1985 two-part article published in Computerworld magazine. The 1986 SQL standard basically adopted Codd's proposal after an implementation prototype in IBM System R. Although Don Chamberlin recognized nulls (alongside duplicate rows) as one of the most controversial features of SQL, he defended the design of Nulls in SQL invoking the pragmatic arguments that it was the least expensive form of system support for missing information, saving the programmer from many duplicative application-level checks (see semipredicate problem) while at the same time providing the database designer with the option not to use Nulls if they so desire; for example, in order to avoid well known anomalies (discussed in the semantics section of this article). Chamberlin also argued that besides providing some missing-value functionality, p
https://en.wikipedia.org/wiki/Word%20FM
Word FM may refer to: WORD-FM, a radio station broadcasting on 101.5 FM in Pittsburgh, Pennsylvania, USA The Word FM, a network of stations in Eastern Pennsylvania, USA, which includes WBYO KWRD-FM, a radio station broadcasting on 100.7 FM in Highland Village, Texas, USA, which is branded as "The Word FM" Word FM (Ghana), a radio station broadcasting on 88.3 FM in Bolgatanga (Zuarungu), Ghana. WYRD-FM, a radio station broadcasting on 98.9 FM in Spartanburg, South Carolina that previously simulcasted sister station WORD and still brands with its call letters.
https://en.wikipedia.org/wiki/DPMA
DPMA is an acronym that may refer to: Data Processing Management Association, now Association of Information Technology Professionals Deutsches Patent- und Markenamt, the German Patent and Trade Mark Office Division de police maritime et aéroportuaire
https://en.wikipedia.org/wiki/Disclosure%20%28novel%29
Disclosure is a novel by Michael Crichton, his ninth under his own name and nineteenth overall, and published in 1994. The novel is set at a fictional computer hardware manufacturing company. The plot concerns protagonist Tom Sanders and his struggle to prove that he was sexually harassed by his female employer. Summary Tom Sanders, the head of advanced products manufacturing at DigiCom, expects to be promoted to run the advanced products division after DigiCom's merger with a publishing house. Instead, the promotion is given to his ex-girlfriend, Meredith Johnson, who recently moved to Seattle from the company's headquarters in Cupertino, California. Later that day, Meredith calls Tom into her office, ostensibly to discuss an advanced CD-ROM drive. She aggressively tries to resume their relationship, despite Tom's repeated attempts to resist. When he spurns her sexual advances, Meredith angrily vows to make him pay. The next morning, Tom discovers that Meredith has retaliated by falsely accusing him of sexual harassment. DigiCom president Bob Garvin, fearing that the incident could jeopardize the merger, tells the company's general counsel, Phil Blackburn, to propose transferring Tom to the company's Austin facility. However, Tom's division is due to be spun off as a publicly traded company after the merger, and if he is transferred, he will lose stock options which would have made him a wealthy man. In addition, Tom's coworkers treat him with animosity, as they have believed Meredith's story. Seemingly out of options, Tom gets in touch with Seattle attorney Louise Fernandez, who agrees to take the case. Tom threatens to sue Meredith and DigiCom for sexual harassment unless Meredith is fired, throwing the merger and his future with the company in jeopardy. During a mediation, Tom discovers that when he called one of his colleagues, John Levin, about the problems with the drive, John's answering machine recorded the whole incident with Meredith. He and Louise also discover that DigiCom officials have known for some time that Meredith has a history of unwelcome advances toward male coworkers, and yet did nothing to stop it. Confronted with this evidence, DigiCom is forced to agree to a settlement in which Meredith is quietly pushed out and Tom is restored to his former post. That night, Tom gets an email from "A Friend" warning him that all is not normal yet. Later, he overhears Meredith and Phil planning to make it look like Tom is responsible for defects in the CD-ROM project, thereby giving DigiCom an excuse to fire him for incompetence. Tom is initially unable to access the company database to prove his innocence, since Meredith has revoked his authorization. He circumvents the block through a prototype of the company's virtual reality machine that visualizes data. Tom discovers that Meredith changed the quality control specifications at the Malaysian plant manufacturing the drive. These changes, ostensibly to appease Malaysian
https://en.wikipedia.org/wiki/QuickTransit
QuickTransit was a cross-platform virtualization program developed by Transitive Corporation. It allowed software compiled for one specific processor and operating system combination to be executed on a different processor and/or operating system architecture without source code or binary changes. QuickTransit was an extension of the Dynamite technology developed by the University of Manchester Parallel Architectures and Languages research group, which now forms part of the university's Advanced Processor Technologies research group. Silicon Graphics announced QuickTransit's first availability in October 2004 on its Prism visualization systems. These systems, based on Itanium 2 processors and the Linux operating system, used QuickTransit to transparently run application binaries compiled for previous SGI systems based on the MIPS processor and IRIX operating system. This technology was also licensed by Apple Computer in its transition from PowerPC to Intel (x86) CPUs, starting in 2006. Apple marketed this technology as "Rosetta". In August 2006, IBM announced a partnership with Transitive to run Linux/x86 binaries on its Power ISA-based Power Systems servers. IBM named this software System p AVE during its beta phase, but it was renamed to PowerVM Lx86 upon release. In November 2006, Transitive launched QuickTransit for Solaris/SPARC-to-Linux/x86-64, which enabled unmodified Solaris applications compiled for SPARC systems to run on 64-bit x86-based systems running Linux. This was followed in October 2007 by QuickTransit for Solaris/SPARC-to-Linux/Itanium, which enabled Solaris/SPARC applications to run on Itanium systems running Linux. A third product, QuickTransit for Solaris/SPARC-to-Solaris/x86-64, was released in December 2007, enabling Solaris/SPARC applications to run on 64-bit x86 systems running Solaris. IBM acquired Transitive in June 2009 and merged the company into its Power Systems division. IBM announced in September 2011 it would discontinue marketing for the PowerVM Lx86 product in January of 2012, withdrawing it from sale completely in April 2013. Apple removed Rosetta from Mac OS X starting with Mac OS X Lion in 2011. Most of the original team now work for the BBC, Apple in California and ARM in Manchester. References External links IBM PowerVM site IBM PowerVM Lx86 Web page Virtualization software Department of Computer Science, University of Manchester
https://en.wikipedia.org/wiki/OSM
OSM may refer to: Software and websites OpenStreetMap, an open source project to develop free geographic data OpenStreetMap Foundation, a British non-profit foundation OsmAnd, a map and navigational application for Android and iOS based on data from OpenStreetMap Open Service Mesh, a free and open source cloud native service mesh Organizations Austrian Student Mission () Office of Surface Mining, a branch of the US Department of the Interior OSM TV, a Bosnian commercial television channel Montreal Symphony Orchestra (), a Canadian symphony orchestra Science Oncostatin M, a protein Osmole (unit), a unit of osmotic concentration Osmotic avoidance abnormal protein, for example OSM-9 Transportation Honda OSM, a 2008 Japanese concept sports car Mosul International Airport, Iraq, IATA airport code OS-M, a series of space launch rockets from OneSpace Other uses Operational Service Medal (disambiguation), multiple campaign medals Order of the Secret Monitor, an appendant order of Freemasonry O.S.M., the post-nominal letters used by members of the Servite Order
https://en.wikipedia.org/wiki/CCNP
A Cisco Certified Network Professional (CCNP) is a person in the IT industry who has achieved the professional level of Cisco Career Certification. Professional certifications Prior to February 2020 there were approximately eight professional-level certification programs within Cisco Career Certifications. CCDP CCNP Cloud CCNP Collaboration CCNP Data Center CCNP Routing and Switching CCNP Security CCNP Service Provider CCNP Wireless Cisco has announced that as of February 2020, the above format has been retired and replaced with the following: CCNP Enterprise (integrating CCNP Routing and Switching, CCDP and CCNP Wireless) CCNP Data Center (integrating CCNP Cloud) CCNP Security CCNP Service Provider CCNP Collaboration Cisco Certified DevNet Professional Migration guides to the newer certification exams are available from Cisco at its CCNP Migration Tools page. Required exams Starting February 2020, no entry-level certification will be required to attempt the CCNP exams. Relevant entry-level certifications need to be passed in advance, if someone wants to attempt the Professionals level exams. The associate-level certification programs are: CCDA, CCNA Cloud, CCNA Collaboration, CCNA Cyber Ops, CCNA Data Center, CCNA Industrial, CCNA Routing and Switching, CCNA Security, CCNA Service Provider and CCNA Wireless. Each area of expertise requires passing the relevant exams for certification with a professional understanding and capability of networking. For example, the CCNP Routing and Switching consists of three exams: Implementing IP Routing (ROUTE), Implementing IP Switched Networks (SWITCH) and Troubleshooting and Maintaining IP Networks (TSHOOT). Validity The validity of CCNP Certification is 3 years. Renewal requires certification holders to register for and pass same or higher level Cisco recertification exam(s) every 3 years. Related certifications Associate-level certification: CCNA Expert-level Certification: CCIE References CCNA Training with WebAsha Cisco Systems Information technology qualifications
https://en.wikipedia.org/wiki/CCNA
CCNA (Cisco Certified Network Associate) is an information technology (IT) certification from Cisco Systems. CCNA certification is an associate-level Cisco Career certification. The Cisco exams have changed several times in response to changing IT trends. In 2020, Cisco announced an update to its certification program that "Consolidated and updated associate-level training and certification." Cisco has consolidated the previous different types of Cisco-certified Network Associate with a general CCNA certification. The content of the exams is proprietary. Cisco and its learning partners offer a variety of different training methods, including books published by Cisco Press, and online and classroom courses available under the title "Interconnecting Cisco Network Devices". Exam To achieve a CCNA certification, candidates must earn a passing score on Cisco exam No. 200-301. After the exam, candidates receive a score report along with a score breakdown by exam section and the passing score for the given exam. The exam tests a candidate's knowledge and skills required to install, operate, and troubleshoot a small to medium size enterprise branch network. The exam covers a broad range of fundamentals, including network fundamentals, network access, IP connectivity, IP services, security fundamentals, automation, and programmability. Prerequisites There are no prerequisites to take the CCNA certification exam. There is also a starting point of networking which is the CCT (Cisco Certified Technician). Validity The validity of CCNA Certification is three years. Renewal requires certification holders to register for and pass the same or higher level Cisco re-certification exam(s) every three years. See also Cisco Networking Academy Cisco certifications DevNet Cyber Ops CCNP CCIE Certification References Cisco CCNA 200-301 Online Course UK". Distance Learning Guide External links CCNA Certification References Information technology qualifications Computer security qualifications Cisco Systems
https://en.wikipedia.org/wiki/Laura%20Allen
Laura Allen (born March 21, 1974) is an American actress. She starred as Lily Tyler during the first two seasons of the USA Network television series The 4400. Personal life Allen was born in Portland, Oregon, the daughter of Julie and David Allen. She grew up on Bainbridge Island, Washington, as the middle child of three sisters. She attended Wellesley College as a sociology major and graduated in 1996. She worked with the NYPD as a domestic violence counselor before pursuing acting. She and Bruce Weyman married at the Relais Palazzo del Capitano in Pienza, Italy, on September 23, 2006. They have two sons. Career Allen first established her career portraying Laura Kirk-English DuPres on the soap opera All My Children from 2000 to 2002, taking over the role from Lauren Roman who originated the role from 1995 to 1998. After departing AMC, Allen went on to play Susan Delacorte in Mike Newell's Mona Lisa Smile. She later starred in USA Network's hit series, The 4400. She played the role of Lily Tyler. However, her character was written out of the show before its third season. She reprised the role of Lily Tyler in 2007 in the fourth season of The 4400 for one episode. In 2006, Allen was a guest star on House M.D. in the episode "All In", as Sarah, the mother of a sick 6-year-old boy. She was also a guest star in the season 2 episode of Criminal Minds "Open Season" as the victim of two serial killers and in the 2007 season premiere of Law & Order: SVU. She starred as Julia Mallory in the first season of the FX drama series Dirt. Her character was a Hollywood heroin addict. She also appeared as a former love interest of Owen Hunt on the ABC's Grey's Anatomy in 2009. Other recent projects include the thrillers Hysteria, From Within, The Collective, and Old Dogs. She has played regular characters in two television series: Katie Nichols in Terriers in 2010 and Hannah Britten in Awake in 2012. In 2014 she portrayed Meg in the American horror film Clown. She also portrayed Linda Kessler in the drama thriller film Nanny Cam. In May 2016, Allen guest starred in the thirteenth episode of the first season of Criminal Minds: Beyond Borders, titled "Paper Orphans". She played Emily Wagner, the mother of a young girl who was kidnapped in Haiti. Filmography Film Television References External links 1974 births American soap opera actresses American television actresses 21st-century American actresses Living people Actresses from Portland, Oregon Actresses from Washington (state) Wellesley College alumni American film actresses
https://en.wikipedia.org/wiki/Australian%20Rail%20Track%20Corporation
The Australian Rail Track Corporation (ARTC) is an Australian Government-owned statutory corporation. It operates one of the largest rail networks in the nation spanning 8,500km across five states, 39 worksites. ARTC continues to expand the network through major infrastructure projects including Inland Rail, which is a new 1,700km freight line between Melbourne and Brisbane via regional Victoria, NSW and Queensland that will complete Australia’s national freight network and better connect producers to markets. History In November 1996, the Australian Government announced a major rail reform package that included the sale of government-owned train operators Australian National and National Rail, and the establishment of ARTC to manage the sections of the interstate rail network which had been controlled by the two former organisations. ARTC was incorporated in February 1998, with operations starting in July 1998 when the lines managed by Australian National's Track Australia were transferred to it. These were the lines from Kalgoorlie to Port Augusta, Tarcoola to Alice Springs, Port Augusta to Whyalla, Adelaide to Broken Hill, Adelaide to Serviceton, and the Outer Harbor line in Adelaide. Its inaugural CEO was David Marchant. In 2000, the Tarcoola to Alice Springs line was leased to the Asia Pacific Transport Consortium as part of the project to extend the line to Darwin. Victoria In 1999, ARTC signed a five-year deal with VicTrack, the rail manager for the Victorian government, to lease the standard gauge North East line from Albury to Melbourne and the Western standard gauge line from Melbourne to Serviceton. This was later extended for another 10 years, and in May 2008 for another 45 years. As part of the lease extension, the run-down and under-utilised broad-gauge line from Seymour to Albury, that paralleled the standard gauge line, was leased to ARTC and converted to standard gauge. Included was construction of the five-kilometre Wodonga Rail Bypass which eliminated 11 level crossings in that city. In March 2009, the Portland line from Maroona to Portland would be leased to ARTC for 50 years, with $15 million to be invested in the line. ARTC also manages the Oaklands railway line between Benalla, Victoria and Oaklands, New South Wales. Western Australia In 2001, ARTC was granted rights for fifteen years to sell access between Kalgoorlie and Kwinana, Perth, to interstate rail operators under a wholesale access agreement with the Western Australian track-lessee Arc Infrastructure. New South Wales In September 2004, the New South Wales Government-owned RailCorp leased its interstate and Hunter Valley lines to the ARTC for 60 years. The lines covered by the lease are: Main South line between Macarthur and Albury North Coast line between Maitland and Border Loop Main North line between Broadmeadow and Werris Creek Broken Hill line between Parkes and Broken Hill Unanderra to Moss Vale line Sandy Hollow to Gulgong line Cootamundra to Par
https://en.wikipedia.org/wiki/Conner%20Peripherals
Conner Peripherals, Inc. (commonly referred to as Conner), was a company that manufactured hard drives for personal computers. Conner Peripherals was founded in 1985 by Seagate Technology co-founder and San Jose State University alumnus Finis Conner (1943– ). In 1986, they merged with CoData, a Colorado start-up founded by MiniScribe founders Terry Johnson and John Squires. CoData was developing a new type of small hard disk that put the capacity of a 5.25-inch drive into the smaller (and now commonplace) 3.5-inch format. The CoData drive was the first Conner Peripherals product. The company was partially financed by Compaq, who was also a major customer for many years. Hard disks Design concepts Conner's drives were notable for eschewing the "tub" type of head-disk assembly, where the disks are inside a large base casting shaped like a square bowl or vault with a flat lid; instead, they preferred the flat base plate approach, which was more resistant to shock and less likely to warp or deform when heated. Their first drives had the base plate carrying the disks, head arm and actuator enclosed inside a long aluminum cartridge, fixed to a bulkhead on the other side with two screws and sealed with a large, square O-ring. Conner's 1/3-height (1-inch thick) drives used a domed, cast aluminum lid with four screws, one on each corner, sealed to the base plate with a rubber gasket. The printed circuit board was bolted to the bottom of the base plate, with the mounting holes for the drive drilled into tabs cast into the sides of the base plate. This design would be Conner's trademark look well into the 1990s. Logically, Conner's drives had some of the characteristics of the original MiniScribe drives (of which John Squires had also been a designer), with a large amount of intelligence built into the drive's central processing unit (CPU); Conner drives used a single Motorola 68HC11 microcontroller, and ran a proprietary real-time operating system that implemented the track-following algorithms (the "servo" system) in software, as well as managing the bus interface. Running these functions in software saved a lot of hardware; in 1986, most drives used a separate PID controller for the spindle, and used a CPU mainly to manage the bus interface and generate positioning pulses for a stepper motor. SCSI support added yet another CPU to interpret the SCSI commands, and track-following servos required analog components that often populated entire circuit boards of their own, thus driving up costs. Another cost-saving measure was the ability of the drive to test itself when it was initially powered on after being assembled in the factory. Unlike many competitive products, this required only a power connection, not a dedicated computer or test system. Performance issues and the Chinook dual-actuator drive Conner products suffered from lower performance compared to drives that had more on-board buffer memory, or those that spun the media at speeds greater
https://en.wikipedia.org/wiki/Electronic%20literature
Electronic literature or digital literature is a genre of literature encompassing works created exclusively on and for digital devices, such as computers, tablets, and mobile phones. A work of electronic literature can be defined as "a construction whose literary aesthetics emerge from computation", "work that could only exist in the space for which it was developed/written/coded—the digital space". This means that these writings cannot be easily printed, or cannot be printed at all, because elements crucial to the text are unable to be carried over onto a printed version. Definitions N. Katherine Hayles defines electronic literature as "'digital born' (..) and (usually) meant to be read on a computer", clarifying that this does not include e-books and digitised print literature. A definition offered by the Electronic Literature Organization (ELO) states electronic literature "refers to works with an important literary aspect that takes advantage of the capabilities and contexts provided by the stand-alone or networked computer". This can include hypertext fiction, animated poetry (often called kinetic poetry) and other forms of digital poetry, literary chatbots, computer-generated narratives or poetry, art installations with significant literary aspects, interactive fiction and literary uses of social media. The definition of electronic literature is controversial within the field, with strict definitions being criticised for excluding valuable works, and looser definitions being so murky as to be useless. Scott Rettberg argues that an advantage of a wide definition is its flexibility, which allows it to include new genres as new platforms and modes of literature emerge. History Precursors Scholars have discussed a range of pre-digital precursors to electronic literature, from the ancient Chinese book the I Ching, to John Clark's mechanical Latin Verse Machine (1830-1843) to the Dadaist movement's cut-up technique. Print novels that were designed to be read non-linearly, such as Julio Cortázar's Hopscotch and Nabokov's Pale Fire (1962), are cited as "print antecedents" of electronic literature. 1950s The 1952 love letter generator that the British computer scientist Christopher Strachey wrote for the Manchester Mark 1 computer is probably the first example of literature that requires a computer to be generated or read. The work generates short love letters, and is an example of combinatory poetry, also called generative poetry. The original code has been lost, but digital poet Nick Montfort has reimplemented it based on remaining documentation of its output, and this version can be viewed in a web browser. In 1959 the German computer scientist Theo Lutz's wrote [[Stochastic Texts]], which "for many years was considered the first digital literary text." Lutz wrote a program on a Z22 computer that "produced random short sentences based on a corpus of chapter titles and subjects from Franz Kafka's The Castle". Lutz's work has been discusse
https://en.wikipedia.org/wiki/Plant%20Proteome%20Database
The Plant Proteome Database is a National Science Foundation-funded project to determine the biological function of each protein in plants. It includes data for two plants that are widely studied in molecular biology, Arabidopsis thaliana and maize (Zea mays). Initially the project was limited to plant plastids, under the name of the Plastid PDB, but was expanded and renamed Plant PDB in November 2007. See also Proteome References External links Plant Proteome Database home page Plant physiology Government databases in the United States Biological databases
https://en.wikipedia.org/wiki/Panic%21%20%28video%20game%29
Panic! is a puzzle point and click video game developed by Sega and Office I and published by Sega in Japan and Data East USA in North America for the Sega CD, in collaboration with the Theatrical Group WAHAHA Hompo. It was released on April 23, 1993 in Japan, localized to North America in October 1994, and later released for the PlayStation 2 in Japan on August 8, 2002. The game involves pressing numerous buttons in order to transverse a young boy, called Slap, or his dog, called Stick, through a complex labyrinth. It is one of the few Sega CD games that supports the Sega Mega Mouse. Story During the intro, the game explains that a virus has infected the world's computer systems. Slap and his dog Stick (who has been sucked into his TV) must carry an antidote to the central computer to fix it. To this end, Slap and Stick must traverse a grid of levels, pushing buttons to advance. Gameplay Each level is presented as a new area with a mechanical device, and a set of buttons to press. Each button causes an animation and/or teleports Slap to another room. Sometimes the buttons are booby-trapped and cause the destruction of a variety of monuments. The grid also features a few game overs on the grid, marked by flashing skulls on the map. The buttons themselves have no indication on what they do when pressed. It is possible to backtrack into previous levels, and buttons once pressed are not marked, unless they were booby-trapped. Version differences Two stages were removed for the North American release: Level 2-B, a scene with a cigarette machine, and Level 9-B, featuring a Japanese typewriter. The level 12-D sends the player to the Japanese Mega-CD BIOS screen, but this scene was not changed in the North American version and still showed the Japanese BIOS screen instead of the American one. Reception The four reviewers of Electronic Gaming Monthly noted that Panic! is not actually a game, but opined that it is nonetheless very original and enjoyable for a while, though all but one of them also felt it gets boring fairly quickly. They particularly enjoyed the high quality animations and often "sick" sense of humor, and gave it a score of 5.75 out of 10. GamePro panned the game, chiefly for its trial-and-error gameplay which requires players to watch many "pointless" scenes. They added, "You might feel differently if there were at least great jokes coming from the switches, but the humor is mostly simplistic cartoons with childish graphics, like basic versions of animations from Monty Python." They gave Panic! a 2.0 out of 5 for graphics, 4.0 for sound, and 1.0 for both control and funfactor, making it one of only 12 games in GamePro history to earn a score of 1.0 or lower. Game Players magazine described the game as being made "for people on drugs, by people on drugs." Richard Leadbetter, editor of Mean Machines Sega, awarded the Japanese version of the game a score of 90%. Next Generation reviewed the Sega CD version of the game, rating it two
https://en.wikipedia.org/wiki/Nuclear%20matrix
In biology, the nuclear matrix is the network of fibres found throughout the inside of a cell nucleus after a specific method of chemical extraction. According to some it is somewhat analogous to the cell cytoskeleton. In contrast to the cytoskeleton, however, the nuclear matrix has been proposed to be a dynamic structure. Along with the nuclear lamina, it supposedly aids in organizing the genetic information within the cell. The exact function of this structure is still disputed, and its very existence has been called into question. Evidence for such a structure was recognised as long ago as 1948, and consequently many proteins associated with the matrix have been discovered. The presence of intra-cellular proteins is common ground, and it is agreed that proteins such as the Scaffold, or Matrix Associated Proteins (SAR or MAR) have some role in the organisation of chromatin in the living cell. There is evidence that the nuclear matrix is involved in regulation of gene expression in Arabidopsis thaliana. Whenever a similar structure can actually be found in living cells remains a topic of discussion. According to some sources, most, if not all proteins found in nuclear matrix are the aggregates of proteins of structures that can be found in the nucleus of living cells. Such structures are nuclear lamina, which consist of proteins termed lamins which can be also found in the nuclear matrix. Validity of nuclear matrix For a long time the question whether a polymer meshwork, a “nuclear matrix” or “nuclear-scaffold” or "NuMat" is an essential component of the in vivo nuclear architecture has remained a matter of debate. While there are arguments that the relative position of chromosome territories (CTs), the equivalent of condensed metaphase chromosomes at interphase, may be maintained due to steric hindrance or electrostatic repulsion forces between the apparently highly structured CT surfaces, this concept has to be reconciled with observations according to which cells treated with the classical matrix-extraction procedures maintain defined territories up to the point where a minor subset of acidic nuclear matrix proteins is released – very likely those proteins that governed their association with the nuclear skeleton. The nuclear matrix proteome consists of structural proteins, chaperones, DNA/RNA-binding proteins, chromatin remodeling and transcription factors. The complexity of NuMat is an indicator of diverse structural and functional significance of its proteins. Scaffold/Matrix attachment regions (S/MARs) S/MARs (scaffold/matrix attachment regions), the DNA regions that are known to attach genomic DNA to variety of nuclear proteins, show an ever increasing spectrum of established biological activities. There is a known overlap of this large group of sequences with sequences termed LADs (lamina attachment domains). S/MARs find increasing use for the rational design of vectors with widespread use in gene therapy and biotechnology. Nowad
https://en.wikipedia.org/wiki/Redback%20Networks
Redback Networks provided hardware and software used by Internet service providers to manage broadband services. The company's products included the SMS (Subscriber Management System), SmartEdge, and SmartMetro product lines. In January 2007, the company was acquired by Ericsson. History Redback Networks was founded in August 1996 by Gaurav Garg, Asher Waldfogel, and William M. Salkewicz. The company received seed money from Sequoia Capital. In May 1999, during the dot-com bubble, the company became a public company via an initial public offering. After pricing at $23 each, shares soared 266% on the first day of trading. In November 1999, the company acquired Siara Systems, which at the time only had products in the prototype stage, for $4.3 billion in stock. In 2000, its share price peaked at $198 but fell to $0.27 in October 2002, after the burst of the dot-com bubble. In August 2000, the company acquired Abatis Systems. In October 2000, the company opened a regional headquarters in Hong Kong. In January 2007, the company was acquired by Ericsson for $1.9 billion, or $25 per share. References 1996 establishments in California 1999 initial public offerings 2007 mergers and acquisitions Companies formerly listed on the Nasdaq Dot-com bubble
https://en.wikipedia.org/wiki/Watford%20High%20Street%20railway%20station
Watford High Street is a railway station in Watford, Hertfordshire, United Kingdom. It is served by the Watford DC line on the London Overground network. It is the only station on the line's sole deviation from the West Coast Main Line. History The station was opened by the Watford and Rickmansworth Railway (W&RR) on 1 October 1862, with services running from to . In 1912 a branch was opened to . The line came under the ownership of London and North Western Railway (LNWR), which was absorbed into the London, Midland and Scottish Railway (LMS) in 1923, following the grouping of Britain's railway companies. Additional rail services were introduced to Watford High Street; on 16 April 1917 the Underground Electric Railways Company of London extended its Bakerloo line through this station to , and in 1922 the LNWR completed the suburban Camden to Watford Junction New Line, linking Watford High Street to via the Watford DC Line (shared with the Bakerloo line). After nationalisation in 1948, the Watford DC Line was run by British Rail (from 1986 under its Network SouthEast brand). At the height of operation around the 1950s, Watford High Street was served by the Bakerloo line, and by British Rail trains on both the Croxley Green and Rickmansworth branches, a local all-stations service to Euston and another local service to via . Over the years, most of these services were gradually withdrawn. The Rickmansworth branch was a poorly used service and passenger services were terminated by BR in 1952. Croxley Green services continued as Parliamentary trains until the line closed fully in 1996. On 24 September 1982, London Transport cut back the Bakerloo line to run only as far north as (reinstating the service as far as in 1984). London Broad Street station was closed in 1986 and trains on the Primrose Hill route were diverted to until 1992, when passenger services on the Primrose Hill line were withdrawn completely. After the withdrawal of the Croxley, Bakerloo and Broad Street routes, the only remaining service running from Watford High Street was British Rail's Watford DC Line to Euston. Following the privatisation of British Rail the franchise for the Watford DC Line was taken over by National Express who ran the line under its Silverlink Metro name. In 2007 the line was brought under the control of Transport for London, who today operate it as part of the London Overground network; this service uses the 750 V DC lines for its all-stations local service with the 4th rail presently redundant except as part of the electrical return circuit. Location Watford High Street station is located in the Lower High Street in Watford town centre. In the immediate vicinity around the station are a number of retail and civic amenities including the Watford Museum, containing a gallery of fine art and displays of local heritage, and the atria Watford Shopping Centre (also known as the Harlequin Centre), the largest shopping centre in Hertfordshire, which a
https://en.wikipedia.org/wiki/FINO
In computer science, FINO is a humorous scheduling algorithm. It is an acronym for first in, never out as opposed to traditional first in, first out (FIFO) and last in, first out (LIFO) algorithms. A similar acronym is "FISH", for first in, still here. FINO works by withholding all scheduled tasks permanently. No matter how many tasks are scheduled at any time, no task ever actually takes place. A stateful FINO queue can be used to implement a memory leak. The first mention of FINO appears in the Signetics 25120 write-only memory joke datasheet. See also Bit bucket Black hole (networking) Null route Write-only memory References Scheduling algorithms Computer humor