source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/ED50
ED50 ("European Datum 1950", EPSG:4230) is a geodetic datum which was defined after World War II for the international connection of geodetic networks. Background Some of the important battles of World War II were fought on the borders of Germany, the Netherlands, Belgium and France, and the mapping of these countries had incompatible latitude and longitude positioning. During the war the German Military Survey (Reichsamt Kriegskarten und Vermessungswesen), under the command of Lieutenant General Gerlach Hemmerich, began a systematic mapping of the areas under the control of the German Military, a large part of Europe. The allies were also concerned about the state of mapping in Europe, and in 1944 the US Army Map Service set up an intelligence team to collect mapping and surveying information from the Germans as the allied armies moved through Europe after the Normandy landings. The group, known as Houghteam after Major Floyd W. Hough, collected much material. Their greatest success was in April 1945. They found a large cache of material in Saalfeld, Thuringia, which proved to be the entire geodetic archives of the German Army. The shipment, 75 truckloads in all, was transferred to Bamberg, and then to Washington for evaluation. Shortly after this, the team captured the personnel of the Reichsamt für Landesaufnahme, the State Surveying Service, in Friedrichroda, also in Thuringia. This group had been working on the integration of the mapping of the occupied territories with that of Germany, under Professor Erwin Gigas, a geodesist with an international reputation. They were directed to continue this work, in Bamberg in the US zone of occupation, as part of the US-led effort to develop a single adjusted triangulation for Central Europe. This was completed in 1947. The work was then extended to cover much of Western Europe which was completed in 1950, and became ED50. The European triangulation was originally classified military information. It was de-classifired in the 1960s, and became the basis for the definition of international boundaries in the North Sea. It was, and still is, used in much of Western Europe apart from Great Britain, Ireland, Sweden and Switzerland, which have their own datums. It used the International Ellipsoid of 1924 ("Hayford-Ellipsoid" of 1909) (radius of the Earth's equator 6378.388 km, flattening 1/297, both exact). That spheroid was an early attempt to model the whole Earth and was widely used around the world until the 1980s when GRS 80 and WGS 84 were established. Many national coordinate systems of Gauss–Krüger are defined by ED50 and oriented by means of geodetic astronomy. Up to now it has been used in databases of gravity fields, cadastre, small surveying networks in Europe and America, and by some developing countries with no modern baselines. ED50 was also part of the fundamentals of the NATO coordinates (Gauss–Krüger and UTM) up to the 1980s. The geodetic datum of ED50 was centred at the Helmertturm
https://en.wikipedia.org/wiki/Time-Triggered%20Protocol
The Time-Triggered Protocol (TTP) is an open computer network protocol for control systems. It was designed as a time-triggered fieldbus for vehicles and industrial applications. and standardized in 2011 as SAE AS6003 (TTP Communication Protocol). TTP controllers have accumulated over 500 million flight hours in commercial DAL A aviation application, in power generation, environmental and flight controls. TTP is used in FADEC and modular aerospace controls, and flight computers. In addition, TTP devices have accumulated over 1 billion operational hours in SIL4 railway signalling applications. History TTP was originally designed at the Vienna University of Technology in the early 1980s. In 1998 TTTech Computertechnik AG took over the development of TTP, providing software and hardware products. TTP communication controller chips and IP are available from sources including austriamicrosystems, ON Semiconductor and ALTERA. Definition TTP is a dual-channel 4 - 25 Mbit/s time-triggered field bus. It can operate using one or both channels with maximum data rate of 2x 25 Mbit/s. With replicated data on both channels, redundant communication is supported As a fault-tolerant time-triggered protocol, TTP provides autonomous fault-tolerant message transport at known times and with minimal jitter by employing a TDMA (Time-Division Multiple Access) strategy on replicated communication channels. TTP offers fault-tolerant clock synchronization that establishes the global time base without relying on a central time server[citation needed]. TTP provides a membership service to inform every correct node about the consistency of data transmission. This mechanism can be viewed as a distributed acknowledgment service that informs the application promptly if an error in the communication system has occurred. If state consistency is lost, the application is notified immediately. Additionally, TTP includes the service of clique avoidance to detect faults outside the fault hypothesis, which cannot be tolerated at the protocol level. Critical applications TTP is often used in mission critical data communication applications where deterministic operation is a requirement. These operations include aircraft engine management and other aerospace applications. In these applications the TTP networks are often operated as separate networks with separate AS8202NF hardware interface devices and separate, but coordinated, configurations. The TTP protocol offers the unique feature of having all nodes on a network know, at the same time, when any other node fails to communicate or sends unreliable data. The status of each node is updated to all nodes several times each second. Technical details Data communication in TTP is organized in TDMA rounds. A TDMA round is divided into slots. Each node has one sending slot, and must send frames in every round. The frame size allocated to a node can vary from 2 to 240 bytes in length, each frame usually carrying several messages. Th
https://en.wikipedia.org/wiki/List%20of%20Microsoft%20operating%20systems
This is a list of Microsoft written and published operating systems. For the codenames that Microsoft gave their operating systems, see Microsoft codenames. For another list of versions of Microsoft Windows, see, List of Microsoft Windows versions. MS-DOS See MS-DOS Versions for a full list. Windows Windows 1.0 until 8.1 Windows 10/11 and Windows Server 2016/2019/2022 Windows Mobile Windows Mobile 2003 Windows Mobile 2003 SE Windows Mobile 5 Windows Mobile 6 Windows Phone Xbox gaming Xbox system software Xbox 360 system software Xbox One and Xbox Series X/S system software OS/2 Unix and Unix-like Xenix Nokia X platform Microsoft Linux distributions Azure Sphere SONiC Windows Subsystem for Linux CBL-Mariner Other operating systems MS-Net LAN Manager MIDAS Singularity Midori Zune KIN OS Nokia Asha platform Barrelfish Time line See also List of Microsoft topics List of operating systems External links Concise Microsoft O.S. Timeline, by Bravo Technology Center Micro Operating systems
https://en.wikipedia.org/wiki/List%20of%20Microsoft%20software
Microsoft is a developer of personal computer software. It is best known for its Windows operating system, the Internet Explorer and subsequent Microsoft Edge web browsers, the Microsoft Office family of productivity software plus services, and the Visual Studio IDE. The company also publishes books (through Microsoft Press) and video games (through Xbox Game Studios), and produces its own line of hardware. The following is a list of the notable Microsoft software Applications. Software development Azure DevOps Azure DevOps Server (formerly Team Foundation Server and Visual Studio Team System) Azure DevOps Services (formerly Visual Studio Team Services, Visual Studio Online and Team Foundation Service) BASICA Bosque CLR Profiler GitHub Atom GitHub Desktop GitHub Copilot npm Spectrum Dependabot GW-BASIC IronRuby IronPython JScript Microsoft Liquid Motion Microsoft BASIC, also licensed as: Altair BASIC AmigaBASIC Applesoft BASIC Commodore BASIC Color BASIC MBASIC Spectravideo Extended BASIC TRS-80 Level II BASIC Microsoft MACRO-80 Microsoft Macro Assembler Microsoft Small Basic Microsoft Visual SourceSafe Microsoft XNA Microsoft WebMatrix MSX BASIC NuGet QBasic and QuickBASIC TASC (The AppleSoft Compiler) TypeScript VBScript Visual Studio Microsoft Visual Studio Express Visual Basic Visual Basic .NET Visual Basic for Applications Visual C++ C++/CLI Managed Extensions for C++ Visual C# Visual FoxPro Visual J++ Visual J# Visual Studio Code Visual Studio Lab Management Visual Studio Tools for Applications Visual Studio Tools for Office VSTS Profiler Windows API Windows SDK WordBASIC Xbox Development Kit 3D 3D Builder 3D Scan (requires a Kinect for Xbox One sensor) 3D Viewer AltspaceVR Bing Maps for Enterprise (formerly "Bing Maps Platform" and "Microsoft Virtual Earth") Direct3D Havok HoloStudio Kinect for Windows SDK Microsoft Mesh Paint 3D Simplygon Educational Bing Bing Bar Browstat Creative Writer Flip LinkedIn Microsoft Comic Chat Microsoft Math Solver Microsoft Pay (mobile payment and digital wallet service) Microsoft Silverlight MSN Office Online Outlook.com Skype Windows Essentials Microsoft Family Safety Microsoft Outlook Hotmail Connector OneDrive Windows Photo Gallery Yammer Subscription services Microsoft 365 Xbox Game Pass Xbox Game Pass Ultimate Xbox Live Gold Maintenance and administration Microsoft Anti-Virus Microsoft Desktop Optimization Pack Microsoft Security Essentials Sysinternals utilities PageDefrag Process Explorer Process Monitor SyncToy Windows Live OneCare Windows SteadyState Operating systems MS-DOS SB-DOS COMPAQ-DOS NCR-DOS Z-DOS 86-DOS Microsoft Windows DOS-based Windows 1.0x Windows 2.0x Windows 2.1x Windows 3.0 Windows 3.1x Windows for Workgroups 3.11 Windows 9x Windows 95 Windows 98 Windows ME Windows NT Windows NT 3.1 Windows NT 3.5 Windows NT 3.51 Windows NT 4.0 Windows 2000 Windows XP
https://en.wikipedia.org/wiki/Family%20BASIC
is a consumer product for programming on the Nintendo Family Computer, the Japanese equivalent to the Nintendo Entertainment System. Family BASIC was launched on June 21, 1984, to consumers in Japan by Nintendo, in cooperation with Hudson Soft and Sharp Corporation. A second version titled Family BASIC V3 was released on February 21, 1985, with greater memory and new features. Overview The first edition of the Family BASIC application cartridge is bundled with a computer style keyboard and instructional textbook, and requires a cassette tape recorder to save user-generated BASIC programs. Programs can be saved using any cassette tape drive, such as the Famicom Data Recorder. Family BASIC was not designed to be compatible with floppy disk storage on the Famicom Disk System and the Disk System's RAM adapter requires the use of the Famicom's cartridge slot, which prevents using the slot for the Family BASIC cartridge. Family BASIC includes a dialect of the BASIC programming language enhanced for game development. Its Microsoft BASIC-derived command set is extended with support for sprites, animation, backgrounds, musical sequences, and gamepads. Several visual components seen in Nintendo games, such as backgrounds and characters from the Mario and Donkey Kong series , are made available as Family BASIC development componentry, or appear in premade Family BASIC games. Like Integer BASIC and Tiny BASIC, the Family BASIC interpreter only supports integers. It is based on Hudson Soft BASIC for the Sharp MZ80. Its keywords are in English. Development Family BASIC was released in Japan by Nintendo for the Family Computer on June 21, 1984, in Japan. As part of a collaboration between Nintendo, Sharp Corporation, and Hudson Soft, it was created to attract computer users over to the new Famicom. Koji Kondo wrote a section in the instruction manual for programming Japanese popular music in the game, as his second project for Nintendo. Prior to this, Kondo had become interested in producing music through computers by programming sound effects in BASIC on his home computer. Two revisions of Family BASIC were produced — the first, "v.2.1", was released shortly after production of the game begun, and the second, "v.3.0", was released in early 1985. v.3.0 features expanded memory and several minigames built-in to the programming cartridge, indicated by a red cartridge shell. Reception Family BASIC was commercially successful, with more than 400,000 units sold by the end of the 1980s. In a 2011 retrospective review, Retro Gamer thought it was a "some-what useless" peripheral for the Famicom due to its high price point and lack of compatibility with the Famicom Disk System, although they found it to be an interesting collection piece for its rarity and overall concept. In IGN's 2013 retrospective of the Famicom's library that was lost to audiences outside Japan, Lucas Thomas called Family BASIC "a legitimate home computing solution". He criticized the interf
https://en.wikipedia.org/wiki/Geodetic%20control%20network
A geodetic control network (also geodetic network, reference network, control point network, or control network) is a network, often of triangles, which are measured precisely by techniques of control surveying, such as terrestrial surveying or satellite geodesy. A geodetic control network consists of stable, identifiable points with published datum values derived from observations that tie the points together. Classically, a control is divided into horizontal (X-Y) and vertical (Z) controls (components of the control), however with the advent of satellite navigation systems, GPS in particular, this division is becoming obsolete. Many organizations contribute information to the geodetic control network. The higher-order (high precision, usually millimeter-to-decimeter on a scale of continents) control points are normally defined in both space and time using global or space techniques, and are used for "lower-order" points to be tied into. The lower-order control points are normally used for engineering, construction and navigation. The scientific discipline that deals with the establishing of coordinates of points in a control network is called geodesy. Cartography applications After a cartographer registers key points in a digital map to the real world coordinates of those points on the ground, the map is then said to be "in control". Having a base map and other data in geodetic control means that they will overlay correctly. When map layers are not in control, it requires extra work to adjust them to line up, which introduces additional error. Those real world coordinates are generally in some particular map projection, unit, and geodetic datum. Measurement techniques Terrestrial techniques Triangulation In "classical geodesy" (up to the sixties) control networks were established by triangulation using measurements of angles and of some spare distances. The precise orientation to the geographic north is achieved through methods of geodetic astronomy. The principal instruments used are theodolites and tacheometers, which nowadays are equipped with infrared distance measuring, data bases, communication systems and partly by satellite links. Trilateration Electronic distance measurement (EDM) was introduced around 1960, when the prototype instruments became small enough to be used in the field. Instead of using only sparse and much less accurate distance measurements some control networks was established or updated by using trilateration more accurate distance measurements than was previously possible and no angle measurements. EDM increased network accuracies up to 1:1 million (1 cm per 10 km; today at least 10 times better), and made surveying less costly. Satellite geodesy The geodetic use of satellites began around the same time. By using bright satellites like Echo I, Echo II and Pageos, global networks were determined, which later provided support for the theory of plate tectonics. Another important improvement was the
https://en.wikipedia.org/wiki/Geodetic%20astronomy
Geodetic astronomy or astronomical geodesy (astro-geodesy) is the application of astronomical methods into geodetic networks and other technical projects of geodesy. Applications The most important applications are: Establishment of geodetic datum systems (e.g. ED50) or at expeditions apparent places of stars, and their proper motions precise astronomical navigation astro-geodetic geoid determination modelling the rock densities of the topography and of geological layers in the subsurface Monitoring of the Earth rotation and polar wandering Contribution to the time system of physics and geosciences Measuring techniques Important measuring techniques are: Latitude determination and longitude determination, by theodolites, tacheometers, astrolabes or zenith cameras time and star positions by observation of star transits, e.g. by meridian circles (visual, photographic or CCD) Azimuth determination for the exact orientation of geodetic networks for mutual transformations between terrestrial and space methods for improved accuracy by means of "Laplace points" at special fixed points Vertical deflection determination and their use in geoid determination in mathematical reduction of very precise networks for geophysical and geological purposes (see above) Modern spatial methods VLBI with radio sources (quasars) Astrometry of stars by scanning satellites like Hipparcos or the future Gaia. The accuracy of these methods depends on the instrument and its spectral wavelength, the measuring or scanning method, the time amount (versus economy), the atmospheric situation, the stability of the surface resp. the satellite, on mechanical and temperature effects to the instrument, on the experience and skill of the observer, and on the accuracy of the physical-mathematical models. Therefore, the accuracy reaches from 60" (navigation, ~1 mile) to 0,001" and better (a few cm; satellites, VLBI), e.g.: angles (vertical deflections and azimuths) ±1" up to 0,1" geoid determination & height systems ca. 5 cm up to 0,2 cm astronomical lat/long and star positions ±1" up to 0,01" HIPPARCOS star positions ±0,001" VLBI quasar positions and Earth's rotation poles 0,001 to 0,0001" (cm...mm) Astrogeodetic leveling is a local geoid determination method based on vertical deflection measurements. Given a starting value at one point, determining the geoid undulations for an area becomes a matter for simple integration of vertical deflection, as it represents the horizontal spatial gradient of the geoid undulation. See also Arc measurement Astronomy, stellar triangulation, spherical trigonometry Satellite, electro-optics, CCD Satellite geodesy Space geodesy Triangulation, tacheometer Astronavigation, Karl Ramsayer Astrometry Spherical astronomy Surveying Zenith camera References External links Geodesy Astronomical sub-disciplines
https://en.wikipedia.org/wiki/50th%20Space%20Wing
The 50th Space Wing was the United States Space Force's space and cyber warfare wing. The 50th Space Wing was assigned to Space Operations Command and headquartered at Schriever Air Force Base. It was activated in 1949 as the 50th Fighter Wing, serving as a reserve air defense unit, and was redesignated as the 50th Fighter-Interceptor Wing in 1950, before being inactivated in 1951. It was reactivated in 1953 as the 50th Fighter-Bomber Wing, deploying to Europe to join NATO forces, and was redesignated as the 50th Tactical Fighter Wing in 1958. The wing operated for almost 40 years at Hahn Air Base in West Germany. In 1981 it became the first USAF overseas formation to operate the General Dynamics F-16 Fighting Falcon jet. It deployed for the Persian Gulf War of 1991, before being inactivated later that year. It was activated as a space wing on 30 January 1992, replacing the 2nd Space Wing. The 50th Space Wing was inactivated on 24 July 2020 and replaced by the Peterson-Schriever Garrison, with the 50th Network Operations Group and its cyber and satellite control network units forming Space Delta 6, the 50th Operations Group and its satellite communications units forming Space Delta 8, and the 750th Operations Group and its orbital warfare units forming Space Delta 9. Operations The 50th Space Wing was the United States Space Force's space and cyberspace warfare. The 50th Space Wing operated the Global Positioning System (GPS), Defense Satellite Communications System (DSCS), Wideband Global Satellite Communications system, Military Strategic and Tactical Relay, Defense Meteorological Satellite Program, Space Based Space Surveillance system, Operationally Responsive Space satellite system, Advanced Extremely High Frequency satellite system, and the Boeing X-37B Orbital Test Vehicle. It also operated the Air Force Satellite Control Network. At the time of its inactivation on 24 July 2020, the 50th Space Wing had 8,000 space professionals and airmen under its command. The 50th Space Wing was also the host unit for Schriever Air Force Base, providing base support for United States Strategic Command's Joint Functional Component Command for Integrated Missile Defense, the Army's 100th Missile Defense Brigade, and Air Force Reserve Command's 310th Space Wing. Structure in 2020 50th Operations Group (50 OG) 2d Space Operations Squadron (2 SOPS) 4th Space Operations Squadron (4 SOPS) 50th Operations Support Squadron (50 OSS) Detachment 1, 50th Operations Group, Suitland, Maryland 50th Network Operations Group (50 NOG) 21st Space Operations Squadron (21 SOPS), Vandenberg Air Force Base Detachment 1, 21st Space Operations Squadron, Naval Support Facility Diego Garcia Detachment 2, 21st Space Operations Squadron, Andersen Air Force Base Detachment 3, 21st Space Operations Squadron, Kaena Point Satellite Tracking Station 22nd Space Operations Squadron (22 SOPS) 23rd Space Operations Squadron (23 SOPS), New Boston Air Force Station Detachment 1, 23
https://en.wikipedia.org/wiki/Kaena%20Point%20Space%20Force%20Station
Kaena Point Space Force Station is a United States Space Force installation in Kaena Point on the island of Oahu in Hawaii. It is a remote tracking station of the Satellite Control Network responsible for tracking satellites in orbit, many of which support the United States Department of Defense, receiving and processing data and in turn, enabling control of satellites by relaying commands from control centers. The station originally opened in 1959 to support the Corona reconnaissance program. Detachment 3, 21st Space Operations Squadron, part of Space Delta 6, operates Hawaii Tracking Station on the site. It was constructed in 1959, one of three built that year. The facility is placed near the westernmost point of the island of Oahu, atop a high ridge. The two radomes are locally known as the "golf balls", and are a popular landmark for fishing vessels in the surrounding waters. Yokohama Bay State Park is at the base of the ridge, with a hiking trail that goes to the point and around to the northern side of the ridge, to Mokuleia Beach. The station roadways provide access to state hiking and hunting trails, as well as a camping site about inland called Peacock Flats by permit only. Permits to enter through the station to hike, hunt, or camp on the surrounding State lands can be obtained from the Hawaii Department of Land and Natural Resources in downtown Honolulu. On 16 June 2021, it was renamed from Kaena Point Satellite Tracking Station to Kaena Point Space Force Station. References External links Permission form Historic American Engineering Record (HAER) documentation, filed under Ka'ena Point, Wai'anae Mountains above Keawaula Bay, Waialua, Honolulu County, HI: Earth stations in the United States Historic American Engineering Record in Hawaii Installations of the United States Space Force 1959 establishments in Hawaii
https://en.wikipedia.org/wiki/Pkg-config
pkg-config is a computer program that defines and supports a unified interface for querying installed libraries for the purpose of compiling software that depends on them. It allows programmers and installation scripts to work without explicit knowledge of detailed library path information. pkg-config was originally designed for Linux, but it is now also available for BSD, Microsoft Windows, macOS, and Solaris. It outputs various information about installed libraries. This information may include: Parameters (flags) for C or C++ compiler Parameters (flags) for linker Version of the package in question The first implementation was written in shell. Later, it was rewritten in C using the GLib library. Synopsis When a library is installed (automatically through the use of an RPM, deb, or other binary packaging system or by compiling from the source), a .pc file should be included and placed into a directory with other .pc files (the exact directory is dependent upon the system and outlined in the pkg-config man page). This file has several entries. These entries typically contain a list of dependent libraries that programs using the package also need to compile. Entries also typically include the location of header files, version information and a description. Here is an example .pc file for libpng: prefix=/usr/local exec_prefix=${prefix} libdir=${exec_prefix}/lib includedir=${exec_prefix}/include Name: libpng Description: Loads and saves PNG files Version: 1.2.8 Libs: -L${libdir} -lpng12 -lz Cflags: -I${includedir}/libpng12 This file demonstrates how libpng informs that its libraries can be found in /usr/local/lib and its headers in /usr/local/include, that the library name is libpng, and that the version is 1.2.8. It also gives the additional linker flags that are needed to compile code that uses this library. Here is an example of usage of pkg-config while compiling: $ gcc -o test test.c $(pkg-config --libs --cflags libpng) pkg-config can be used by build automation software such as CMake. Comparison with libtool GNU Libtool is an alternative solution for managing the paths, dependencies, and required flags when linking to a library. There are a few differences in the approach taken: pkg-config needs to be invoked explicitly for each dependency, while libtool wraps the call to the compiler. pkg-config has the --static option to distinguish between static and dynamic linking; for a static build the complete list of dependencies is passed to the compiler. libtool does not distinguish between static and dynamic linking, always passing the complete list of dependencies. libtool is only useful if both the application and the library are built using libtool, while a library written in any language can ship a .pc file. pkg-config relies on the library search path, while libtool references libraries by their absolute path. This causes build failures with libtool when, for example, a library is moved from /lib to /usr/lib. Altern
https://en.wikipedia.org/wiki/Three-phase%20commit%20protocol
In computer networking and databases, the three-phase commit protocol (3PC) is a distributed algorithm which lets all nodes in a distributed system agree to commit a transaction. It is a more failure-resilient refinement of the two-phase commit protocol (2PC). Motivation A two-phase commit protocol cannot dependably recover from a failure of both the coordinator and a cohort member during the Commit phase. If only the coordinator had failed, and no cohort members had received a commit message, it could safely be inferred that no commit had happened. If, however, both the coordinator and a cohort member failed, it is possible that the failed cohort member was the first to be notified, and had actually done the commit. Even if a new coordinator is selected, it cannot confidently proceed with the operation until it has received an agreement from all cohort members, and hence must block until all cohort members respond. The three-phase commit protocol eliminates this problem by introducing the Prepared to commit state. If the coordinator fails before sending preCommit messages, the cohort will unanimously agree that the operation was aborted. The coordinator will not send out a doCommit message until all cohort members have ACKed that they are Prepared to commit. This eliminates the possibility that any cohort member actually completed the transaction before all cohort members were aware of the decision to do so (an ambiguity that necessitated indefinite blocking in the two-phase commit protocol). Solution The pre-commit phase introduced above helps the system to recover when a participant or both the coordinator and a participant failed during the commit phase. When the recovery coordinator takes over after the coordinator failed during a commit phase of two-phase commit, the new pre-commit comes handy as follows: On querying participants, if it learns that some nodes are in commit phase then it assumes that the previous coordinator before crashing has made the decision to commit. Hence it can shepherd the protocol to commit. Similarly, if a participant says that it had not received a PrepareToCommit message, then the new coordinator can assume that the previous coordinator failed even before it completed the PrepareToCommit phase. Hence it can safely assume that no participant has committed the changes, and hence safely abort the transaction. Extensions Using Skeen's original three-phase commit protocol, it is possible that a quorum becomes connected without being able to make progress (this is not a deadlock situation; the system will still progress if the network partitioning is resolved). Keidar and Dolev's E3PC refines Skeen's three-phase commit protocol and solves this problem in a way which always allows a quorum to make progress. Disadvantages Three-phase commit assumes a network with bounded delay and nodes with bounded response times; In most practical systems with unbounded network delay and process pauses, it cannot guarantee
https://en.wikipedia.org/wiki/DOS%20Plus
DOS Plus (erroneously also known as DOS+) was the first operating system developed by Digital Research's OEM Support Group in Newbury, Berkshire, UK, first released in 1985. DOS Plus 1.0 was based on CP/M-86 Plus combined with the PCMODE emulator from Concurrent PC DOS 4.11. While CP/M-86 Plus and Concurrent DOS 4.1 still had been developed in the United States, Concurrent PC DOS 4.11 was an internationalized and bug-fixed version brought forward by Digital Research UK. Later DOS Plus 2.x issues were based on Concurrent PC DOS 5.0 instead. In the broader picture, DOS Plus can be seen as an intermediate step between Concurrent CP/M-86 and DR DOS. DOS Plus is able to run programs written for either CP/M-86 or MS-DOS 2.11, and can read and write the floppy formats used by both of these systems. Up to four CP/M-86 programs can be multitasked, but only one DOS program can be run at a time. User interface DOS Plus attempts to present the same command-line interface as MS-DOS. Like MS-DOS, it has a command-line interpreter called COMMAND.COM (alternative name DOSPLUS.COM). There is an AUTOEXEC.BAT file, but no CONFIG.SYS (except for FIDDLOAD, an extension to load some field-installable device drivers (FIDD) in some versions of DOS Plus 2.1). The major difference the user will notice is that the bottom line of the screen contains status information similar to: DDT86 ALARM UK8 PRN=LPT1 Num 10:17:30 The left-hand side of the status bar shows running processes. The leftmost one will be visible on the screen; the others (if any) are running in the background. The right-hand side shows the keyboard layout in use (UK8 in the above example), the printer port assignment, the keyboard Caps Lock and Num Lock status, and the current time. If a DOS program is running, the status line is not shown. DOS programs cannot be run in the background. The keyboard layout in use can be changed by pressing , and one of the function keys –. Commands DOS Plus contains a number of extra commands to support its multitasking features: ADDMEM: Sets the amount of extra memory to allocate to EXE programs. ALARM: A message alarm clock. BACKG: Allows background processes to be listed and stopped. COMSIZE: Sets the amount of memory to allocate to COM programs. PRINT: Print spooler. SLICE: Sets the amount of processor time to give to the foreground program. See also the %$SLICE% environment variable. USER: Sets the user number to use when accessing CP/M media. It also contains subsets of the standard DOS commands and CP/M commands – for example, it has both a built-in COPY command, and a PIP utility, both of which copy files. The CD command can assign one of the three drives N:, O: or P: to a directory on a different drive, in a similar manner to the MS-DOS command SUBST. For example, CD N:=C:\DATA\ACCOUNTS will cause the directory C:\DATA\ACCOUNTS to appear as drive N:. This so-called floating drive feature allows old programs which don't
https://en.wikipedia.org/wiki/DECUS
The Digital Equipment Computer Users' Society (DECUS) was an independent computer user group related to Digital Equipment Corporation (DEC). The Connect User Group Community, formed from the consolidation in May, 2008 of DECUS, Encompass, HP-Interex, and ITUG is the Hewlett-Packard’s largest user community, representing more than 50,000 participants. History DECUS was the Digital Equipment Computer Users' Society, a users' group for Digital Equipment Corporation (DEC) computers. Members included companies and organizations who purchased DEC equipment; many members were application programmers who wrote code for DEC machines or system programmers who managed DEC systems. DECUS was founded in March 1961 by Edward Fredkin. DECUS was legally a part of Digital Equipment Corporation and subsidized by the company; however, it was run by unpaid volunteers. Digital staff members were not eligible to join DECUS, yet were allowed and encouraged to participate in DECUS activities. Digital, in turn, relied on DECUS as an important channel of communication with its customers. DECUS Software Library DECUS had a software library which accepted orders from anyone, distributing programs submitted to it by people willing to share. It was organized by processor and operating system, using information submitted by program submitters, who signed releases allowing this and asserting their right to do so. The DECUS library published catalogs of these offerings yearly, though because it had the catalog mastered by an outside firm, it did not have easy ways to retrieve the content of early catalogs (prior to circa 1980) in machine readable format. Later material was maintained in house and was more easily edited. The charges for copying were somewhat high, reflecting the fact the copies were made by hand on DECUS equipment. Activities There were two DECUS US symposia per year, at which members and DEC employees gave presentations, and could visit an exhibit hall containing many new computer models and peripherals among other things. By grace of the DEC employees, it became a custom to allow users to copy media for one another on these machines. This activity grew with time, and in the spring of 1977 some volunteers from the RSX SIG (Special Interest Group) led by Phil Cannon, Jim Neeland, and several others, arranged an informal drop-off, and made master distributions of all material submitted. Then they and other volunteers essentially made copies of this master distribution on tapes for the rest of the symposium, for anyone with a blank tape to write on. This very quickly grew, and was noted in LUG (local user group) and SIG (special interest group) newsletters. The process of creating a master quickly attracted other volunteers who would make a master index of whatever had been submitted. The process of physically creating master tapes remained much the same until around 1979, when the tapecopy coordinators arranged copying facilities somewhere near the symposiu
https://en.wikipedia.org/wiki/Embeddable%20Common%20Lisp
Embeddable Common Lisp (ECL) is a small implementation of the ANSI Common Lisp programming language that can be used stand-alone or embedded in extant applications written in C. It creates OS-native executables and libraries (i.e. Executable and Linkable Format (ELF) files on unix) from Common Lisp code, and runs on most platforms that support a C compiler. The ECL runtime is a dynamically loadable library for use by applications. It is distributed as free software under a GNU Lesser Public License (LGPL) 2.1+. It includes a runtime system, and two compilers, a bytecode interpreter allowing applications to be deployed where no C compiler is expected, and an intermediate language type, which compiles Common Lisp to C for a more efficient runtime. The latter also features a native foreign function interface (FFI), that supports inline C as part of Common Lisp. Inline C FFI combined with Common Lisp macros, custom Lisp setf expansions and compiler-macros, result in a custom compile-time C preprocessor. External links Giuseppe Attardi. "The Embeddable Common Lisp", ACM Lisp Pointers 8(1), 1995, 30-41. Embeddable Common-Lisp on GitLab Common Lisp implementations Common Lisp (programming language) software Free compilers and interpreters
https://en.wikipedia.org/wiki/Wometco%20Home%20Theater
The Wometco Home Theater (WHT) was an early pay television service in the New York City area that was owned by Miami-based Wometco Enterprises, which owned several major network affiliates in mid-sized media markets and its flagship WTVJ in Miami (then a CBS affiliate on channel 4, now an NBC owned-and-operated station on channel 6). The signals were broadcast beginning in August 1977 on WWHT-TV (channel 68) and later on WSNL-TV (channel 67) out of Smithtown, New York. Overview Initially subscribers paid $15 for a set-top descrambling box that allowed subscribers to view channel 68's scrambled television signals (a later addressable, 2-channel version of this descrambler was developed under vice president of engineering, Alex MacDonald). The service was similar to Home Box Office (HBO), but a Wometco executive told The New York Times that WHT was more likely to select films with a particular interest to the New York City area. Wometco also targeted areas that were not yet served by cable television (although parts of Manhattan had cable television service as early as 1971, the vast majority of the five boroughs of New York City would not begin receiving cable television service until 1988). Programming consisted of 12 features a month, including movies and entertainment specials. In addition, select home games of the NHL's New York Islanders were broadcast live from the Nassau Veterans Memorial Coliseum. Each program was repeated five times during the month. During the daytime, WWHT was a small commercial television station. The station was originally going to be a general entertainment station with shows that independents WNEW-TV (channel 5), WOR-TV (channel 9) and WPIX (channel 11) passed on. However, the costs were too high to acquire such programs so the station broadcast only a couple hours of low budget syndicated shows, The Uncle Floyd Show, public affairs programs, religious programs, stock market reports, and minority-interest and foreign language programs. In 1980, WHT began programming a movie from 10:30 a.m. to 1 p.m. as well, later adding the adult-themed late night service "Nightcap" with its black cat logo. In the fall of 1980, Wometco Enterprises brought in a new management team. The team consisted of Harold Brownstein as the new president and Robert Borders as vice president of marketing, both of whom had previously worked together at a major BTB direct marketing company. Having operated at $1 million plus loss for over four years, this team turned the operation profitable within 18 months. This was accomplished by consolidating numerous satellite offices/functions into the company's headquarters in Fairfield, New Jersey; producing a bi-monthly program guide (instead of monthly), significantly reducing printing and postage costs; and implementing direct response marketing concepts into the company's multimillion-dollar local television ads, so that the company could determine which markets and promotions generated sales, inst
https://en.wikipedia.org/wiki/Canal%2013
Canal 13 (Spanish for Channel 13) may refer to: Canal 13 (Argentina), television network from Buenos Aires, Argentina Canal 13 (Chile), television network from Santiago, Chile Canal 13 (Colombia), television network from Colombia Canal 13 (Costa Rica), a public television station in Costa Rica Canal 13 (Guatemala), television network from Guatemala owned by Remigio Ángel González Canal 13 (Mexico), a regional television network in parts of Mexico Canal 13 (Paraguay), television network that aired the OTI Festival singing competition in Paraguay WORO-DT, a television station in Puerto Rico See also Channel 13 (disambiguation) Canal (disambiguation)
https://en.wikipedia.org/wiki/Committee%20for%20the%20Abolition%20of%20Illegitimate%20Debt
The Committee for the Abolition of Illegitimate Debt (CADTM), formerly called the Committee for the Cancellation of the Third World Debt (CCTWD), is an international network of activists founded on 15 March 1990 in Belgium that campaigns for the cancellation of debts in developing countries and for "the creation of a world respectful of people’s fundamental rights, needs and liberties. Aims CADTM's main aim is to achieve the cancellation of the external public debt in third world countries and subsequently to break the spiral of deeper and deeper indebtedness by setting up models of socially fair and environmentally sustainable development. It describes its supplementary aims as "radically transforming the world's institutional and financial framework"; protection of human rights; strengthening of citizens' movements and activism; and pressuring political leaders to implement human rights guarantees and implementing CADTM and "social movements'" policies. CADTM also aims to support the creation of taxes similar to the Tobin tax, to increase the official aid budget of rich countries to 0.7% of the GDP, to set up a world tax on large incomes, and for global conversion of military expenditure into social and cultural expenditure. It aims to suspend the IMF's and World Bank's structural adjustment policies, to radically reform the World Trade Organization, and to achieve strict control on financial markets and the suppression of tax havens. CADTM claims to support women's emancipation, peoples' right to self-determination, radical land reforms and a general reduction of working hours. Leadership , the president of CADTM was historian and political scientist Éric Toussaint. Publications CADTM publishes a magazine, essays and a website and organises seminars, lectures, debates, training sessions, international conferences and campaigns. It participates in national and international initiatives and in citizens' mobilisations. It lobbies ministers, members of parliament and other politically active citizens. In September 2018, CADTM's submission to the Office of the United Nations High Commissioner for Human Rights (OHCHR) was accepted as a contribution to the OHCHR's development of "Guiding Principles" for human rights impact assessments for economic reform policies. In January 2019, The Economic Times summarised a CADTM article by Qian Benli that criticised the Chinese Belt and Road Initiative as not benefiting ordinary Chinese and being heavily involved in corruption. In February 2019, Democracy Now used a report by CADTM on debt in Puerto Rico to suggest that big holders of Puerto Rican debt, including the investment funds of prestigious US universities, would profit from financing arrangements following Hurricane Maria. References External links Official website Abolition of the Third World Debt Abolition of the Third World Debt
https://en.wikipedia.org/wiki/El%20Trece
Channel 13 (known by its current brand name El Trece, stylized as eltrece) is an Argentine free-to-air television network and the flagship station of the network of the same name, located in the capital of Argentina, Buenos Aires. It is owned by Grupo Clarín through Artear. As mentioned by its name, it broadcasts on VHF channel 13 in Buenos Aires, where the main station is located. History Foundation Channel 13 was founded in 1960, and started broadcasting on 1 October 1960, at 8:30 p.m. The channel was tendered to the company Rio de la Plata S.A. TV, founded by Cuban businessman Goar Mestre and the US network CBS. In the mid-1960s, Editorial Atlántida and Mestre's wife bought the shares of the channel. Since then, Channel 13 began to compete strongly with the other two open private channels of the city of Buenos Aires, Channel 9 and Channel 11, which had gone through a similar process. In those years there were great successes in the Argentine television industry, with Channel 13 broadcasting Viendo a Biondi ("Seeing Biondi"), a comedy show centered on characters by Pepe Biondi; The Falcón Family starring Pedro Quartucci, and sketch comedy shows such as Telecataplum, featuring an innovative group of Uruguayan comedians including Ricardo Espalter, Enrique Almada and Gabriela Acher, among others. Nationalisation In 1974, the government of Isabel Perón nationalised the station along with two other terrestrial private channels of Buenos Aires (Channel 9 and Channel 11), in order to bring a media policy based on the European (and possibly RTVE's) way, where television was largely managed by the government. During the self-styled National Reorganisation Process, the last military dictatorship that ruled the country from 1976 to 1983, the channel's administration was handed over to the Argentine Navy, a condition maintained until 1983, when democratic rule was restored. However, the network continued under public administration, as it had been since the Perón years. The Navy helped the station in its transition to color broadcasts on Labor Day, 1 May 1980. On 2 July 1980, the Channel 13 broadcast studios burned only partly, with no casualties among its workers. Privatisation After 15 years as a government-owned station, in December 1989, Arte Radiotelevisivo Argentino (Artear) S.A (English: Argentine Radio and Television Arts), a company with majority ownership by Artes Gráfico Editorial Argentino S.A (AGEA, English: Argentine Publishing Graphics and Arts), publisher of the Clarín newspaper and part of its multimedia conglomerate, officially took over the station management. Since then, the channel is positioned as second placer in TV ratings in Buenos Aires, competing against Telefe (excluding the 2010-2011 period when it became the ratings leader). In the 1990s, El Trece achieved great ratings, thanks to political comedy programs Tato Bores, programs of cultural and La aventura del hombre, TV series La Banda del Golden Rocket, Montaña
https://en.wikipedia.org/wiki/Video%20BIOS
Video BIOS is the BIOS of a graphics card in a (usually IBM PC-derived) computer. It initializes the graphics card at the computer's boot time. It also implements INT 10h interrupt and VESA BIOS Extensions (VBE) for basic text and videomode output before a specific video driver is loaded. In UEFI 2.x systems, the INT 10h and the VBE are replaced by the UEFI GOP. Much the way the system BIOS provides a set of functions that are used by software programs to access the system hardware, the video BIOS provides a set of video-related functions that are used by programs to access the video hardware as well as storing vendor-specific settings such as card name, clock frequencies, VRAM types & voltages. The video BIOS interfaces software to the video chipset in the same way that the system BIOS does for the system chipset. The ROM also contained a basic font set to upload to the video adapter font RAM, if the video card did not contain a font ROM with this font set instead. Unlike some other hardware components, the video card usually needs to be active very early during the boot process so that the user can see what is going on. This requires the card to be activated before any operating system begins loading; thus it needs to be activated by the BIOS, the only software that is present at this early stage. The system BIOS loads the video BIOS from the card's ROM into system RAM and transfers control to it early in the boot sequence. Early PCs contained functions for driving MDA and CGA cards in the system BIOS, and those cards did not have any Video BIOS built in. When the EGA card was first sold in 1984, the Video BIOS was introduced to make these cards compatible with existing PCs whose BIOS did not know how to drive an EGA card. Ever since, EGA/VGA and all enhanced VGA compatible cards have included a Video BIOS. When the computer is started, some graphics cards (usually certain Nvidia cards) display their vendor, model, Video BIOS version and amount of video memory. Modding Up until the mid 2010s, video ROMs were user-editable/modifiable, which allowed users to configure GPU features like core clocks, VRAM clocks or fan speed curves. In certain cases, a different GPU class could have been unlocked. However, nowadays both NVIDIA and AMD digitally sign video firmware, which has made it impossible to make any changes to it. Still, in many cases, users can flash a firmware image from another OEM, thus unlocking higher performance modes or changing its mode of operation. Older NVIDIA GPU ROMs up until the GeForce 900 series could be edited using NiBiTor (NVIDIA BIOS Editor). See also Graphics processing unit (GPU) VESA BIOS Extensions (VBE) Video Graphics Array (VGA) References Graphics cards BIOS
https://en.wikipedia.org/wiki/Buffer%20underrun
In computing, buffer underrun or buffer underflow is a state occurring when a buffer used for communicating between two devices or processes is fed with data at a lower speed than the data is being read from it. The term is distinct from buffer overflow, a condition where a portion of memory forms a buffer of a fixed size yet is filled with more than that amount of data. This requires the program or device reading from the buffer to pause its processing while the buffer refills. This can cause undesired and sometimes serious side effects because the data being buffered is generally not suited to stop-start access of this kind. In terms of concurrent programming, a buffer underrun can be considered a form of resource starvation. The terms buffer underrun and buffer underflow are also used for meaning buffer underwrite, a condition similar to buffer overflow, but where the program is tricked into writing before the beginning of the buffer, overriding potential data there, like permission bits. General causes and solutions Buffer underruns are often the result of transitory issues involving the connection which is being buffered: either a connection between two processes, with others competing for CPU time, or a physical link, with devices competing for bandwidth. The simplest guard against such problems is to increase the size of the buffer—if an incoming data stream needs to be read at 1 bit per second, a buffer of 10 bits would allow the connection to be blocked for up to 10 seconds before failing, whereas one of 60 bits would allow a blockage of up to a minute. However, this requires more memory to be available to the process or device, which can be expensive. It assumes that the buffer starts full—requiring a potentially significant pause before the reading process begins—and that it will always remain full unless the connection is currently blocked. If the data does not, on average, arrive faster than it is needed, any blockages on the connection will be cumulative; "dropping" one bit every minute on a hypothetical connection with a 60-bit buffer would lead to a buffer underrun if the connection remained active for an hour. In real-time applications, a large buffer size also increases the latency between input and output, which is undesirable in low-latency applications such as video conferencing. CD and DVD recording issues Buffer underruns can cause serious problems during CD/DVD burning, because once the writing is started, it cannot stop and resume flawlessly; thus the pause needed by the underrun can cause the data on the disc to become invalid. Since the buffer is generally being filled from a relatively slow source, such as a hard disk or another CD/DVD, a heavy CPU or memory load from other concurrent tasks can easily exhaust the capacity of a small buffer. Therefore, a technique called buffer underrun protection was implemented by various individual CD/DVD writer vendors, under various trademarks, such as Plextor BurnProof, Nero
https://en.wikipedia.org/wiki/Chaff%20algorithm
Chaff is an algorithm for solving instances of the Boolean satisfiability problem in programming. It was designed by researchers at Princeton University. The algorithm is an instance of the DPLL algorithm with a number of enhancements for efficient implementation. Implementations Some available implementations of the algorithm in software are mChaff and zChaff, the latter one being the most widely known and used. zChaff was originally written by Dr. Lintao Zhang, at Microsoft Research, hence the “z”. It is now maintained by researchers at Princeton University and available for download as both source code and binaries on Linux. zChaff is free for non-commercial use. References M. Moskewicz, C. Madigan, Y. Zhao, L. Zhang, S. Malik. Chaff: Engineering an Efficient SAT Solver, 39th Design Automation Conference (DAC 2001), Las Vegas, ACM 2001. External links Web page about zChaff SAT solvers Boolean algebra Automated theorem proving Constraint programming
https://en.wikipedia.org/wiki/Holographic%20Versatile%20Card
The Holographic Versatile Card (HVC) was a proposed data storage format by Optware; the projected date for a Japanese launch had been the first half of 2007, pending finalization of the specification, however as of March 2022, nothing has yet surfaced. One of its main advantages compared with discs was supposed to be the lack of moving parts when played. They claimed it would hold 30GB of data, have a write speed 3 times faster than Blu-ray, and be approximately the size of a credit card. Optware claimed that at release the media would cost about ¥100 (roughly $1.20) each, that reader devices would initially cost about ¥200,000(roughly $2400) while reader/writer devices would have cost ¥1 000,000 (roughly $12000, as per exchange rate of Apr 2011) each. See also DVD HD DVD Holographic memory Holographic Versatile Disc Vaporware References External links Optware Creator of HVC format. Engadget News report on the Holographic Versatile Card Über Gizmo News report on the Holographic Versatile Card Image of HVC Holographic data storage Vaporware
https://en.wikipedia.org/wiki/GRASP%20%28SAT%20solver%29
GRASP is a well known SAT instance solver. It was developed by João Marques Silva, a Portuguese computer science researcher. It stands for Generic seaRch Algorithm for the Satisfiability Problem. External links GRASP home page References SAT solvers
https://en.wikipedia.org/wiki/International%20Computers%20and%20Tabulators
International Computers and Tabulators or ICT was a British computer manufacturer, formed in 1959 by a merger of the British Tabulating Machine Company (BTM) and Powers-Samas. In 1963 it acquired the business computer divisions of Ferranti. It exported computers to many countries and in 1968 became part of International Computers Limited (ICL). Products The ICT 1101 was known as the EMIDEC 1100 computer before the acquisition of the EMI Computing Services Division who designed and produced it. The ICT 1201 computer used thermionic valve technology and its main memory was drum storage. Input was from 80-column punched cards and output was to 80-column cards and a printer. Before the merger, under BTM, this had been known as the HEC4 (Hollerith Electronic Computer, fourth version). The drum memory held 1K of 40-bit words. The computer was programmed using binary machine code instructions. When programming the 1201, the machine code instructions were not sequential but were spaced to allow for the drum's rotation. This ensured the next instruction was passing under the drum's read heads just as the current instruction had been executed. The ICT 1301, and its smaller cousin the ICT 1300, used germanium transistors and core memory. Backing store was magnetic drum, and optionally one-inch-, half-inch- or quarter-inch-wide magnetic tape. Input was from 80-column punched cards and optionally 160-column punched cards and punched paper tape. Output was to 80-column punched cards, printer and optionally to punched paper tape. The first customer delivery was in 1962, a 1301 sold to the University of London. One of their main attractions was that they performed British currency calculations (pounds, shillings and pence) in hardware. They also had the advantage of programmers not having to learn binary or octal arithmetic as the instruction set was pure decimal and the arithmetic unit had no binary mode, only decimal or pounds, shillings and pence. Its clock ran at 1 MHz. The London University machine still exists (January 2006) and is being reinstated to working condition by a group of enthusiasts. The ICT 1302, used similar technology to the 1300/1301 but was a multiprogramming system capable of running three programs in addition to the Executive. It also used the 'Standard Interface' for the connection of peripherals allowing much more flexibility in peripheral configuration. The 'Standard Interface' was originally prototyped on the 1301 and went on to be used on the 1900 series. The ICT 1400 was a first generation computer using thermionic valves, but was overtaken by transistor technology in 1959 and no sales were made. The ICT 1500 series was a design bought in from the RCA Corporation, who called it the RCA 301. RCA also sold the design to Siemens in Germany and Compagnie des Machines Bull in France who called it the Gamma 30. It used a six-bit byte and had core stores of 10,000, 20,000 or 40,000 bytes. The ICT 1900 series was devised after th
https://en.wikipedia.org/wiki/NBC%20Studios%20%28New%20York%20City%29
NBC Studios are located in the historic 30 Rockefeller Plaza (on Sixth Avenue between 49th and 50th streets) in Manhattan, New York City. The building houses the NBC television network headquarters, its parent NBCUniversal, and NBC's flagship station WNBC (Channel 4), as well as cable news channel MSNBC. The first NBC Radio City Studios began operating in the early 1930s. Tours of the studios began in 1933, suspended in 2014 and resumed on October 26, 2015. Because of the preponderance of radio studios, that section of the Rockefeller Center complex became known as Radio City (and gave its name to Radio City Music Hall). Current studio spaces Shows produced at NBC Studios New York Among the shows originating at 30 Rockefeller Plaza (shows taping as of the 2020–2021 season in bold): {| class="wikitable sortable" |- ! Program ! Network/Station ! Dates ! Studio |- |The 11th Hour | MSNBC | 2016–present |3A |- | 30 Rock | NBC | 2010 and 2012 | 8H (Live episodes) |- | All In with Chris Hayes | MSNBC | 2013–present | 3K, 4E, 6A, 3A |- |Ayman |MSNBC |2021–present |3C |- | The Amber Ruffin Show | Peacock | 2020–present | 8G |- | Call My Bluff | NBC | 1965 | 6A |- | The Caroline Rhea Show | Syndication | 2002–2003 | 8G |- | Charge Account/Jan Murray Show | NBC | 1960–1962 | 6B |- | Concentration | NBC | 1958–1973 | 3A, 6A, 8G |- | Countdown with Keith Olbermann | MSNBC | 2007–2011 | 1A |- | The Crossover | NBC Sports Network | 2013–2014 | 8G |- |The Cycle | MSNBC |2012–2015 |3A, 3K |- | Dateline NBC | NBC | 1992–present | 3A, 3B, 3K, 4E |- | The David Letterman Show | NBC | 1980 | 6A |- |- |Deadline: White House |MSNBC |2017–present |4E, 3A |- | The Doctors | NBC | 1963–1982 | 3B, 3A |- | Dough Re Mi | NBC | 1958–1960 | 6A |- | Dr. Nancy | MSNBC | 2009 | 3A |- | The Dr. Oz Show | Syndication | 2009–2012 | 6A |- | E! News | E! | 2020 | 6E |- | Early Today | NBC | 2007–present | 3K, 6E, 4E |- | The Ed Show | MSNBC | 2009–2015 | 3K, 3A |- | Eye Guess | NBC | 1966-1969 | 6A |- | Football Night in America | NBC | 2006–2014 | 8G, 8H |- | He Said, She Said | Syndication | 1969-1970 |8H |- | House Party with Steve Doocy | Syndication | 1990 | 6A |- | How to Survive a Marriage | NBC | 1974–1975 | 8G |- | Howdy Doody | NBC | 1947–1960 | 3A,3H,3K,8G |- | Huntley-Brinkley Report | NBC | 1956–1970 | 6B,5HN,8G |- | Jackpot | NBC | 1974–1975 | 8G |- | The Jane Pauley Show | Syndication | 2004–2005 | 8G |- | Jeopardy! | NBC | 1964–1975 | 8G |- | The Kids Tonight Show | Peacock | 2021–present | 6A |- | Last Call with Carson Daly | NBC | 2002–2005 | 8H |- | The Last Word with Lawrence O'Donnell | MSNBC | 2011–present | 3K, 4E |- | Late Night(David Letterman and Conan O'Brien) | NBC | 1982–2009 | 6A |- | Late Night with Jimmy Fallon | NBC | 2009–2014 | 6B, 6A |- | Late Night with Seth Meyers | NBC | 2014–present | 8G |- | Live at Five | WNBC | 1980–2007 | 6B |- | The Match Game | NBC | 1962–1969 | 8H |- | Maya & Marty | NBC | 2016 | 6A |- | Megyn Kelly Today | NBC |
https://en.wikipedia.org/wiki/JFFS
The Journaling Flash File System (or JFFS) is a log-structured file system for use on NOR flash memory devices on the Linux operating system. It has been superseded by JFFS2. Design Flash memory (specifically NOR flash) must be erased prior to writing. The erase process has several limitations: Erasing is very slow (typically 1–100 ms per erase block, which is 103–105 times slower than reading data from the same region). It is only possible to erase flash in large segments (usually 64 KiB or more), whereas it can be read or written in smaller blocks (often 512 bytes). Flash memory can only be erased a limited number of times (typically 103–106) before it becomes worn out. These constraints combine to produce a profound asymmetry between patterns of read and write access to flash memory. In contrast, magnetic hard disk drives offer nearly symmetrical read and write access: read speed and write speed are nearly identical (as both are constrained by the rate at which the disk spins), it is possible to both read and write small blocks or sectors (typically 512 or 4096 bytes), and there is no practical limit to the number of times magnetic media can be written and rewritten. Traditional file systems, such as ext2 or FAT which were designed for use on magnetic media typically update their data structures in-place, with data structures like inodes and directories updated on-disk after every modification. This concentrated lack of wear-levelling makes conventional file systems unsuitable for read-write use on flash devices. JFFS enforces wear levelling by treating the flash device as a circular log. All changes to files and directories are written to the tail of the log in nodes. In each node, a header containing metadata is written first, followed by file data, if any. Nodes are chained together with offset pointers in the header. Nodes start out as valid and then become obsolete when a newer version of them is created. The free space remaining in the file system is the gap between the log's tail and its head. When this runs low, a garbage collector copies valid nodes from the head to the tail and skips obsolete ones, thus reclaiming space. See also List of file systems NILFS UBIFS YAFFS References Sources External links JFFS Homepage (no longer maintained) JFFS developer mailing list Flash file systems supported by the Linux kernel Year of introduction missing
https://en.wikipedia.org/wiki/Object%20Desktop
Object Desktop (OD; previously the Object Desktop Network or ODNT) is an online software subscription service created by Stardock for OS/2 and relaunched for Windows in 1997. Object Desktop includes most graphical user interface customization and productivity products offered by Stardock, including WindowBlinds, Fences, DesktopX, Tweak7, IconPackager and ObjectBar. History OS/2 (1993 to 2001) Object Desktop — initially entitled The Workplace Toolset/2 — was developed over three years by Brad Wardell and Kurt Westerfeld subsequent to Stardock's OS/2 Essentials, a pre-registered set of OS/2 shareware. Object Desktop 1.0 was followed by 1.5 and Professional versions following in short order. By 1997 the OS/2 ISV market was flagging, and many customers were switching to Windows NT 4. 1997 OS/2 revenues were 33% of those in 1996, and they fell to 25% of 1996 levels in 1998. This led to their decision to switch to Windows in mid-1997. Nevertheless, Stardock remained an OS/2 ISV until February 2001, when they stopped selling Object Desktop for OS/2. OS/2 versions were sold as initial versions and upgrades, costing more than later Windows versions due to lower volume of sales. Object Desktop 1.0 The initial release of Object Desktop was both praised for its functionality and criticised for performance and compatibility issues. Object Desktop 1.5 Object Desktop 1.5 was released on 2 May 1996, fixing many problems, and adding the following components: Users of 1.0 could upgrade for $37. Object Desktop Professional Object Desktop Professional was (as the name suggests) aimed at professional users of OS/2. It was released on 24 August 1996, priced at $179; users could also upgrade from OD 1.5 for $69.95, or from OD 1.0 for $119. In addition to the features of OD 1.5, the package included: Object Desktop 2.0 Object Desktop 2.0 was an update to all previously released components, and an integration of the Professional features into the main package. It was priced at $99.95; users of Object Desktop Professional could upgrade for $39, while other versions could be upgraded for $69.95. An upgrade to 2.02 was released at the start of 2000, but it was made clear that it would be the last release . Windows (1997 onwards) Early Experience Program When it became clear that OS/2 would not remain a viable platform, Stardock decided to move to Windows. This required rewriting old components and writing new ones to replace those which were not appropriate for Windows. This would take time, but Stardock needed money immediately to sustain development. To cope with this cashflow problem, Object Desktop users who had switched from OS/2 to Windows were asked to purchase Windows subscriptions in advance of the actual software, on the understanding that their subscription period would only begin when the software was reasonably complete (which ended up as December 1999). This program was called the Early Experience Program. Due to significant goodwill built up ov
https://en.wikipedia.org/wiki/Keith%20Crofford
Keith Crofford (born April 14, 1956) is the former executive vice president of production for Adult Swim, the adult-oriented division of Cartoon Network, and general manager of Williams Street. He was executive producer for several Williams Street in-house productions such as Space Ghost Coast to Coast, Aqua Teen Hunger Force, The Brak Show and Squidbillies. He also served as the executive producer for Williams Street out-of-house productions such as Sealab 2021, Robot Chicken, Tom Goes to the Mayor, Minoriteam and Moral Orel. Crofford was also the executive in charge of production for Adult Swim's The Venture Bros. Crofford was born in Tuscaloosa, Alabama, and attended Florida State University from 1974 to 1978. In 1996, Crofford voiced MOE 2000, an unfeeling computer director, in an episode, "$20.01", of Space Ghost Coast to Coast on Cartoon Network. He also voiced himself in Robot Chicken four times from 2005 to 2008 on Adult Swim. In December 2020, Crofford retired from the company. References External links 1956 births Living people People from Tuscaloosa, Alabama Florida State University alumni American male voice actors American television writers American television executives Cartoon Network executives American male television writers Primetime Emmy Award winners Screenwriters from Alabama Williams Street Television producers from Alabama
https://en.wikipedia.org/wiki/Leonard%20Goldenson
Leonard H. Goldenson (December 7, 1905 – December 27, 1999) was the founder and president of the United States-based television network American Broadcasting Company (ABC), from 1953 to 1986. Goldenson, as CEO of United Paramount Theatres, acquired a then-struggling ABC from candy industrialist Edward J. Noble. Goldenson focused on investing heavily on sports and news coverage along with creating synergy between Hollywood studios and television networks. Goldenson turned ABC into a media conglomerate, owning television and radio stations along with newspapers and book publishers. His innovations with ABC in terms of programming and media synergy would have lasting implications on the American television industry, and be emulated by leadership of other networks. He was portrayed in the 2002 TNT movie Monday Night Mayhem by Eli Wallach. Early life and career Goldenson was born to a Jewish family in Pennsylvania in 1905. He grew up in the town of Scottdale, Pennsylvania, and graduated from Scottdale High School. He was educated at Harvard, and entered the entertainment industry in 1933 as an attorney for Paramount Pictures after graduating from Harvard Law School. Goldenson was hired to help reorganize United Paramount Theatres, Paramount's theater chain, which at the time was nearing bankruptcy. So skillful was his work at this assignment that Paramount's chief executive officer, Barney Balaban, hired Goldenson as deputy to the manager of the Paramount Theaters chain. Career at ABC Goldenson orchestrated the merger of United Paramount Theatres with ABC in 1953 (after Paramount was ordered to spin it off in the wake of United States v. Paramount Pictures, Inc., a 1948 decree of the U.S. Supreme Court). ABC was originally formed in 1943 in the wake of an earlier Supreme Court decree effectively ordering the spinoff of the largely secondary-status Blue Network from its then-parent, NBC; its buyer, industrialist Edward J. Noble, tried to build ABC into a competitive broadcasting company, but by 1951 was rumored to be on the verge of selling the nearly bankrupt operation to CBS, whose management apparently wanted ABC's critically important owned-and-operated television stations. Goldenson rescued ABC by convincing his board of directors to buy the company from Noble for $25 million. becoming the founding president of the merged company which was named American Broadcasting-Paramount Theatres. The modern ABC dates its history from the effective date of the Goldenson transaction, and not the Blue Network spinoff. Although he focused chiefly on ABC Television, Goldenson oversaw all areas of ABC-Paramount's entertainment/media operations for over thirty years, from 1951 to 1986, including the creation of the AmPar Record Corporation in 1955 and the 'rebadging' of the ABC-Paramount group as the American Broadcasting Company in 1968. Goldenson also was instrumental in the sale of ABC to Capital Cities Communications in 1986, which at the time, was the lar
https://en.wikipedia.org/wiki/ThinBasic
thinBasic is a BASIC-like computer programming language interpreter with a central core engine architecture surrounded by many specialized modules. Although originally designed mainly for computer automation, thanks to its modular structure it can be used for wide range of tasks. Main features Syntax As the name suggests, the biggest influence on the syntax of this language was the BASIC language. But, unlike traditional BASICs, as known from the 8-bit era, thinBASIC does differ in few important points. For example, it requires the programmer to declare variables and it does not feature the infamous GOTO and GOSUB statements. Some aspects of the syntax are even inspired in non-BASIC languages, such as C/C++. Thanks to this, thinBASIC optionally allows use of implicit line continuation, simplified addition, subtraction, multiplication and division operators, shortened variable declaration and initialization: ' Traditional syntax allowed in thinBASIC DIM a AS INTEGER ' a is initialized to 0 a = 1 ' a now contains 1 a = a + 1 ' a now contains 2 ' C/C++ inspired syntax allowed in thinBASIC INTEGER a = 1 ' a is initialized to 1 a += 1 ' a now contains 2 ' New syntax introduced in 1.9.10.0 allows defining type from string expression STRING sType = "INTEGER" DIM a LIKE sType Another source of inspiration are the modern versions of BASIC, such as Visual Basic or PowerBASIC. ThinBASIC does offer the main flow control statements, such as SELECT CASE, IF ... THEN/ELSEIF/ELSE/END IF, loops (infinite, conditional, FOR, WHILE/WEND, DO/LOOP WHILE ..., DO/LOOP UNTIL ...) and it also puts very strong effort on providing wide range of built-in functions for number crunching and especially string handling. Variables and data types ThinBASIC supports a wide range of numeric and string data types. Besides those mentioned in the table above, a programmer can define pointers, user-defined types and unions. The special features related to user-defined types in thinBASIC are: the possibility to inherit members from one or more other user-defined types static members (members whose value is shared among all variables of given UDT) dynamic strings Variables can be defined in global, local or static scope. ThinBASIC supports arrays of up to three dimensions. Modules The elemental functionality of the language is provided by the so-called Core module, which is loaded by default, and takes care of parsing too. Besides the Core module, thinBASIC offers other modules, each covering a specific area of functionality, for example: GUI creation console handling file handling 3D graphics networking ... Each module is represented by single DLL, with specific structure. This allows the module to contain not just typical functions and procedures, but also for example constants and user-defined types definitions, immediately available for script without need for header file. The only thing needed is to explicitly mention the u
https://en.wikipedia.org/wiki/Lords%20of%20the%20Realm%20II
Lords of the Realm II (also known as Lords 2) is a computer game published by Sierra On-Line and developed by Impressions Games. It was first released for the PC in 1996, and is the second game in the Lords of the Realm series. The game takes place in a medieval setting, with rulers of several counties warring for the right to be king of the land. Players grow crops, accumulate resources, manufacture weapons, manage armies, build and lay siege to castles, capture provinces, and ultimately attempt to conquer their enemies. Gameplay Lords of the Realm II is very different from many medieval strategy games. There is no magic, and unlike many strategy games, it has no technology tree. Players need to carefully manage food (cows, dairy, grain), population, and happiness levels whilst avoiding Malthusian population meltdowns or other players invading their counties. The game is a combination of a turn-based resource management game, in which players grow crops, accumulate resources, manufacture weapons, manage armies, and build and lay siege to castles; and a real-time strategy game with players controlling units individually or in group formations in battles or during sieges. Compared to the original, Lords of the Realm II features updated graphics and an improved management system. Development Impressions Games general manager David Lester commented during development, "We wanted the game to be more multiplayer friendly, and one way to do that was by adding realtime combat. Besides, when you can bring a castle down by aiming a battering ram or a catapult at it in realtime, it's a lot more satisfying." Reception Sales In the United States, Lords of the Realm II debuted in 16th place on PC Data's computer game sales rankings for December 1996. It rose to #9 in January, and it remained in the firm's top 20 for another two months, before dropping out in April. Returning to the top 20 in May and June, Lords of the Realm II became the 14th-best-selling computer game in the United States during 1997's first half. It exited PC Data's monthly top 20 after a placement of 19th in July. By November, global sales of Lords of the Realm II had surpassed 350,000 copies. Lords of the Realm II went on to be the 19th-biggest computer game seller of 1998, with 245,324 in sales and $2.99 million in revenues. Its total sales ultimately reached 2.5 million copies worldwide. Critical reviews Tim Soete of GameSpot called Lords of the Realm II "a challenging and entertaining experience for strategy enthusiasts." However, he opined that the game was overambitious in its real-time combat aspect, with troops that are difficult to maneuver and battlefields that tend to become overcrowded. A Next Generation critic found it "simply an outstanding upgrade and improvement over the already excellent original." He particularly emphasized the realistic economic model, such as the fact that building an army requires drafting peasants from the population, with a resultant drop i
https://en.wikipedia.org/wiki/Lords%20of%20the%20Realm
Lords of the Realm is a turn-based strategy computer game published and developed by Impressions Games. It was first released on June 15, 1994, and is the first game in the Lords of the Realm series. Summary The game takes place in a medieval setting, with several characters warring for the right to be either King of England or King of Germany. Players manage their armies as well as their land and population, build and lay siege to castles, and generally attempt to crush their enemies. Battles between armies take place in a real-time environment, similar to real-time strategy games, with players able to control individual units as well as control them as a group, during which units group into formations. Players may also choose to allow the computer to determine the outcome of the battle. The game also features a small castle-building portion. Release The game was published by Impression Games in the UK (Amiga) and US (DOS) both in 1994. It was distributed by Sierra On-Line Ltd. in the UK (Windows) in 1997, DMV Daten- und Medienverlag GmbH & Co. KG. in Germany (DOS) in 1997, and Axel Springer Polska Sp. z o.o. in Poland (DOS) in 2001. In the Crucial Entertainment CD release of Lords of the Realm, the game came bundled with a 34-page PDF book of England Under Edward 1 written by Jennifer Hawthorne. This work described English history, ranging from the Norman Conquest through to the reign of King Edward I. Critical reception A reviewer for Next Generation deemed Lords of the Realm a must-have title for strategy fans, citing the randomized events, genuine challenge, impressive rendered cut scenes, player-controlled battles, and overall diverse gameplay. In a retrospective review, Michael House of Allgame wrote, "Whatever faults can be attributed to the game's mechanics or contents are almost uniformly minor and in most instances an error of omission. From structure to game play, Lords of the Realm has notched its own place in wargaming history." The Escapist's Stew Shearer summed up his review with "Lords of the Realm is a stellar strategy game that's more than worth the $5.99 that GOG is asking for it (and Lords of the Realm 2) [sic]. It can have moments where things feel a bit too slow, but overall it's a fantastic experience that fans of the genre would be remiss to skip over". Lords of the Realm was a nominee for Computer Gaming Worlds 1994 "Strategy Game of the Year" award, which ultimately went to X-COM: UFO Defense. The editors called Lords "so fresh in its approach, it even makes animal husbandry fun." PC Gamer US presented Lords of the Realm with its 1994 "Best Historical Simulation" award. The editors wrote that it "strikes a delicate balance between micro- and macro-management—and the result is one of the richest historical sims ever." The One gave the Amiga version of Lords of the Realm an overall score of 84%, praising the game's controls, and stating "Presentation is excellent throughout, making good use of drag bars to make s
https://en.wikipedia.org/wiki/RAD750
The RAD750 is a radiation-hardened single-board computer manufactured by BAE Systems Electronics, Intelligence & Support. The successor of the RAD6000, the RAD750 is for use in high-radiation environments experienced on board satellites and spacecraft. The RAD750 was released in 2001, with the first units launched into space in 2005. Technology The CPU has 10.4 million transistors, an order of magnitude more than the RAD6000 (which had 1.1 million). It is manufactured using either 250 or 150 nm photolithography and has a die area of 130 mm2. It has a core clock of 110 to 200 MHz and can process at 266 MIPS or more. The CPU can include an extended L2 cache to improve performance. The CPU can withstand an absorbed radiation dose of 2,000 to 10,000 grays (200,000 to 1,000,000 rads), temperatures between −55 °C and 125 °C, and requires 5 watts of power. The standard RAD750 single-board system (CPU and motherboard) can withstand 1,000 grays (100,000 rads), temperatures between −55 °C and 70 °C, and requires 10 watts of power. The RAD750 system has a price that is comparable to the RAD6000, the latter of which as of 2002 was listed at US$200,000 (). Customer program requirements and quantities, however, greatly affect the final unit costs. The RAD750 is based on the PowerPC 750. Its packaging and logic functions are completely compatible with the PowerPC 7xx family. The term RAD750 is a registered trademark of BAE Systems Information and Electronic Systems Integration Inc. Deployment In 2010, it was reported that there were over 150 RAD750s used in a variety of spacecraft. Notable examples, in order of launch date, include: Deep Impact comet-chasing spacecraft, launched in January 2005 first to use the RAD750 computer. XSS 11, small experimental satellite, launched 11 April 2005. Mars Reconnaissance Orbiter, launched 12 August 2005. SECCHI (Sun Earth Connection Coronal and Heliospheric Investigation) instrument package on each of the STEREO spacecraft, launched 15 October 2006. WorldView-1 satellite, launched 18 September 2007, has two RAD750s. Fermi Gamma-ray Space Telescope, formerly GLAST, launched 11 June 2008. Kepler space telescope, launched in March 2009. Lunar Reconnaissance Orbiter, launched on 18 June 2009. Wide-field Infrared Survey Explorer (WISE), launched 14 December 2009. Solar Dynamics Observatory, launched 11 February 2010. Juno spacecraft, launched 5 August 2011. Curiosity rover, launched 26 November 2011. Van Allen Probes, launched on 30 August 2012. InSight, launched on 5 May 2018. Perseverance rover, launched 30 July 2020. James Webb Space Telescope, launched 25 December 2021, uses one RAD750 clocked at 118 MHz. References External links Radiation-Hardened Processors Products from BAE Systems BAE Systems’ Radiation-hardened electronics product guide (PDF), from BAE Systems BAE Systems RAD750 processor JTAG Emulator from Corelis.com The CPUs of Spacecraft Computers in Space NASA’s latest Mars rover has t
https://en.wikipedia.org/wiki/List%20of%20Microsoft%20server%20technologies
The following is a list of Microsoft server technology. Backup Data Protection Manager (Beta product) Administration Terminal Services Active Directory (AD) Primary Domain Controller (PDC) Domain Controller Windows Server domain Windows Internet Naming Service (WINS) Remote Desktop Protocol (RDP) Systems Management Server Internet services Active Server Pages (ASP) Application Center Test (ACT) ASP.NET Internet Information Services (IIS) Microsoft Exchange Server Microsoft Forefront Threat Management Gateway (Forefront TMG) Microsoft Project Server Office Web Apps Server SharePoint Skype for Business Server Databases Microsoft SQL Server Microsoft Desktop Engine Developer Services Team Foundation Server Visual Studio Team Services Virtualization Hyper-V See also List of Microsoft topics Server
https://en.wikipedia.org/wiki/Fully%20polynomial-time%20approximation%20scheme
A fully polynomial-time approximation scheme (FPTAS) is an algorithm for finding approximate solutions to function problems, especially optimization problems. An FPTAS takes as input an instance of the problem and a parameter ε > 0. It returns as output a value is at least times the correct value, and at most times the correct value. In the context of optimization problems, the correct value is understood to be the value of the optimal solution, and it is often implied that an FPTAS should produce a valid solution (and not just the value of the solution). Returning a value and finding a solution with that value are equivalent assuming that the problem possesses self reducibility. Importantly, the run-time of an FPTAS is polynomial in the problem size and in 1/ε. This is in contrast to a general polynomial-time approximation scheme (PTAS). The run-time of a general PTAS is polynomial in the problem size for each specific ε, but might be exponential in 1/ε. The term FPTAS may also be used to refer to the class of problems that have an FPTAS. FPTAS is a subset of PTAS, and unless P = NP, it is a strict subset. Relation to other complexity classes All problems in FPTAS are fixed-parameter tractable with respect to the standard parameterization. Any strongly NP-hard optimization problem with a polynomially bounded objective function cannot have an FPTAS unless P=NP. However, the converse fails: e.g. if P does not equal NP, knapsack with two constraints is not strongly NP-hard, but has no FPTAS even when the optimal objective is polynomially bounded. Converting a dynamic program to an FPTAS Woeginger presented a general scheme for converting a certain class of dynamic programs to an FPTAS. Input The scheme handles optimization problems in which the input is defined as follows: The input is made of n vectors, x1,...,xn. Each input vector is made of some non-negative integers, where may depend on the input. All components of the input vectors are encoded in binary. So the size of the problem is O(n+log(X)), where X is the sum of all components in all vectors. Extremely-simple dynamic program It is assumed that the problem has a dynamic-programming (DP) algorithm using states. Each state is a vector made of some non-negative integers, where is independent of the input. The DP works in n steps. At each step i, it processes the input xi, and constructs a set of states Si. Each state encodes a partial solution to the problem, using inputs x1,...,xi. The components of the DP are: A set S0 of initial states. A set F of transition functions. Each function f in F maps a pair (state,input) to a new state. An objective function g, mapping a state to its value. The algorithm of the DP is: Let S0 := the set of initial states. For k = 1 to n do: Let Sk := {f(s,xk) | f in F, s in Sk−1} Output min/max {g(s) | s in Sn}. The run-time of the DP is linear in the number of possible states. In general, this number can be exponential in the
https://en.wikipedia.org/wiki/1983%20in%20country%20music
This is a list of notable events in country music that took place in the year 1983. Events March — In a span of two days, two major cable networks signed on the air. Country Music Television (CMT) went on-the-air March 5, while The Nashville Network (TNN) came on two days later on March 7. CMT (originally called "CMTV") was chiefly video-oriented, while TNN offered more feature-oriented programming. Top hits of the year Singles released by American artists Singles released by Canadian artists Top new album releases Other top albums {| class="wikitable sortable" |- ! US ! Album ! Artist ! Record Label |- | align="center"| 34 | After All This Time | Mel Tillis | MCA |- | align="center"| 61 | All-American Cowboys | Various Artists | Kat Family |- | align="center"| 41 | All-American Redneck | Randy Howard | Warner Bros. |- | align="center"| 35 | All Time Heart Touching Favorites | Roger Whittaker | Main Street |- | align="center"| 61 | Back | Lynn Anderson | Permian |- | align="center"| 36 | Behind the Scene | Reba McEntire | Mercury |- | align="center"| 48 | Better Days | Guy Clark | Warner Bros. |- | align="center"| 61 | Bill Monroe and Friends | Bill Monroe | MCA |- | align="center"| 57 | Classic Conway | Conway Twitty | MCA |- | align="center"| 70 | Classic Country | Albert Coleman's Atlanta Pops | Epic |- | align="center"| 30 | Close Up | Louise Mandrell | RCA |- | align="center"| 56 | Country Boy's Heart | Ronnie McDowell | Epic |- | align="center"| 63 | Country Christmas, Volume 2 | Various Artists | RCA |- | align="center"| 36 | Country Classics | Charley Pride | RCA |- | align="center"| 50 | Dangerous | Tony Joe White | Columbia |- | align="center"| 35 | Delia Bell | Delia Bell | Warner Bros. |- | align="center"| 41 | Devoted to Your Memory | Moe Bandy | Columbia |- | align="center"| 28 | The Epic Collection (Recorded Live) | Merle Haggard | Epic |- | align="center"| 66 | Even the Strong Get Lonely | Tammy Wynette | Epic |- | align="center"| 64 | Footprints in the Sand | Cristy Lane | LS/Liberty |- | align="center"| 30 | For Every Rose | Johnny Rodriguez | Epic |- | align="center"| 27 | The Great American Dream | B. J. Thomas | Cleveland Int'l. |- | align="center"| 33 | Greatest Hits | Razzy Bailey | RCA |- | align="center"| 63 | Greatest Hits | Lacy J. Dalton | Columbia |- | align="center"| 41 | Greatest Hits | Johnny Lee | Warner Bros. |- | align="center"| 67 | Greatest Hits | Ray Stevens | RCA |- | align="center"| 31 | Gus Hardin | Gus Hardin | RCA |- | align="center"| 42 | Harvest Moon | Joe Waters | New Colony |- | align="center"| 27 | The Heart Never Lies | Michael Martin Murphey | Liberty |- | align="center"| 44 | Heart to Heart | Merle Haggard & Leona Williams | Mercury |- | align="center"| 38 | Hello in There | David Allan Coe | Columbia |- | align="center"| 35 | I Was the One | Elvis Presley | RCA |- | align="center"| 55 | It's About Time | John Denver | RCA |- | align="center"| 65 | The Jim Reeves Medley | Jim Reeves | RCA
https://en.wikipedia.org/wiki/1985%20in%20country%20music
This is a list of notable events in country music that took place in the year 1985. Events January — In radio, the United Stations Programming Network’s "Solid Gold Country," a country music spinoff of the oldies-focused "Solid Gold Scrapbook," switches from a three-hour-a-week show to a five-day-a-week program (with the option to air all five hours in as a weekly program). Under the new format, each hourly program covered a different topic, such as a profile on a singer, songwriter or producer; a look back at the popular songs from the current week in a past year, gold records from the current month and other topics under virtually every conceivable topic. The new program will run 8-1/2 years. May 8 - 20th Academy of Country Music Awards: Alabama, George Strait, and Reba McEntire win A story published in The New York Times declares that country music is "dead." However, a number of new acts – Randy Travis and Dwight Yoakam among them – are working behind the scenes to change the trend. The Country Music Association Awards introduced a new award, Music Video of the Year. The first recipient was Hank Williams Jr.'s video for "All My Rowdy Friends Are Coming Over Tonight." Top hits of the year Singles released by American artists Singles released by Canadian artists Top new album releases {| class="wikitable sortable" |- ! US ! Album ! Artist ! Record Label |- | style="text-align:center;"| 1 | 40-Hour Week | Alabama | RCA |- | style="text-align:center;"| 8 | Alabama Christmas | Alabama | RCA |- | style="text-align:center;"| 25 | Amber Waves of Grain | Merle Haggard | Epic |- | style="text-align:center;"| 1 | Anything Goes | Gary Morris | Warner Bros. |- | style="text-align:center;"| 8 | The Ballad of Sally Rose | Emmylou Harris | Warner Bros. |- | style="text-align:center;"| 7 | Centerfield | John Fogerty | Warner Bros. |- | style="text-align:center;"| 22 | Darlin', Darlin| David Allan Coe | Columbia |- | style="text-align:center;"| 7 | Don't Call Him a Cowboy | Conway Twitty | Warner Bros. |- | style="text-align:center;"| 24 | Favorite Country Hits | Ricky Skaggs | Epic |- | style="text-align:center;"| 1 | Five-O | Hank Williams Jr. | Curb/Warner Bros. |- | style="text-align:center;"| 4 | The Forester Sisters | The Forester Sisters | Warner Bros. |- | style="text-align:center;"| 4 | Greatest Hits | George Strait | MCA |- | style="text-align:center;"| 25 | Get to the Heart | Barbara Mandrell | MCA |- | style="text-align:center;"| 1 | Greatest Hits | Earl Thomas Conley | RCA |- | style="text-align:center;"| 4 | Greatest Hits | Lee Greenwood | MCA |- | style="text-align:center;"| 1 | Greatest Hits Vol. 2 | Ronnie Milsap | RCA |- | style="text-align:center;"| 10 | Half Nelson | Willie Nelson | Columbia |- | style="text-align:center;"| 1 | Greatest Hits Volume 2 | Hank Williams Jr. | Curb/Warner Bros. |- | style="text-align:center;"| 2 | Hang On to Your Heart | Exile | Epic |- | style="text-align:center;"| 1 | The Heart of the Matter | Kenny
https://en.wikipedia.org/wiki/Invid
Fact InVID Project (invid-project.eu), funded by European Union, develops tools to verify video content spread via social media, see Applications of artificial intelligence#Deep-fakes Fiction The Invid (sometimes Invids) is either of two distinct fictional, villainous groups: Invid (Robotech), an alien species from the Robotech TV series universe The Invids, a group of pirates from the Star Wars expanded universe. Invid can also mean: Invid War, a comic book set in the Robotech Universe Invid War: Aftermath, a comic book set in the Robotech Universe Robotech RPG Book Five: Invid Invasion, an RPG book set in the Robotech Universe The New Generation: The Invid Invasion, an omnibus edition novel set in the Robotech Universe Invid Invasion, Robotech #10 novel Before the Invid Storm, Robotech #21 novel
https://en.wikipedia.org/wiki/Merthyr%20line
The Merthyr line is a commuter railway line in South Wales from central Cardiff to Merthyr Tydfil and Aberdare. The line is part of the Cardiff urban rail network, known as the Valley Lines. History The line is historically the Taff Vale Railway, the first rail development in the Valleys in the 1840s and associated with the notorious Taff Vale Judgment in 1901 when the courts penalised trade unions for losses caused by strikes. The Aberdare line was closed in 1964 under the Beeching Axe. The line was re-opened in 1988 in an attempt to stimulate jobs and employment in the valley in response to the closure of the last few coal mines. In 2005, following further grant from the Welsh Assembly, the stations at Abercynon, Penrhiwceiber, Fernhill, Cwmbach and Aberdare were extended to four-car length to accommodate longer peak trains in an initiative to relieve overcrowding, train leasing/running costs also funded by the Welsh Assembly Government. The route The line follows the Rhondda line as far as Pontypridd, serving Cathays, Llandaf, Radyr, Taff's Well, Treforest and Pontypridd. It then divides at Abercynon with separate branches to Merthyr and Aberdare up diverging valleys. The Merthyr branch serves Quakers Yard, Merthyr Vale, Troed-y-rhiw, Pentre-bach and Merthyr Tydfil. The Welsh Assembly Government confirmed in February 2007 that it is grant funding, in conjunction with European Union Objective 1 assistance, a scheme to upgrade the line north of Abercynon, including reinstatement of 2 miles of double track, to enable the introduction of a half-hourly train service, the revenue costs of which the Welsh Assembly Government will also meet. The enhanced service was said to commence in 2008 but postponed to May 2009. The Aberdare branch serves Penrhiwceiber, Mountain Ash, Fernhill, Cwmbach and Aberdare. Although following the original TVR route, beyond the former Abercwmboi Halt to access Tower Colliery, the line diverts onto the route of the former Vale of Neath Railway. The line continues beyond Aberdare – for goods purposes only – to serve Tower Colliery, which was the last deep coal mine to remain open in South Wales. Mountain Ash station was redeveloped with a grant from the Welsh Assembly Government in the early part of the decade, the scheme including the provision of a new station and a passing loop to permit an upgrade of the passenger service to two trains per hour from late 2003. There are a few gaps in the half-hourly service to enable coal/stone trains to run to/from Tower Colliery/Hirwaun. Services The line is currently operated by Transport for Wales (TfW) as part of the Valley Lines network. TfW replaced the previous franchise, Arriva Trains Wales in October 2018. Both the Merthyr and Aberdare branch lines have a half-hourly service during the day which decreases to hourly in the evening. On a Sunday service frequency decreases to two-hourly. In December 2017, Arriva Trains Wales introduced extra sunday morning services on
https://en.wikipedia.org/wiki/King%20of%20the%20Hill%20%28The%20Simpsons%29
"King of the Hill" is the twenty-third episode of the ninth season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on May 3, 1998. It was written by John Swartzwelder and directed by Steven Dean Moore, and guest stars Brendan Fraser and Steven Weber. The episode sees Homer trying to climb a large mountain to impress Bart after he humiliates him at a church picnic with his lack of fitness. Plot After his obesity embarrasses Bart at a church picnic, Homer attempts to lose weight by going on midnight jogs around town. He soon discovers "Power Sauce", an energy bar made with apples which he starts to eat regularly. At a gym, Homer meets Rainier Wolfcastle, who becomes his fitness coach. In two months, Homer is healthier, and more muscular and reveals his new exercise habits to his family. At the gym, two Power Sauce representatives, Brad and Neil, ask Rainier to climb to the top of Springfield's tallest mountain, "The Murderhorn", as a publicity stunt. When he refuses, Bart insists Homer volunteer to do it. Grampa begs Homer not to climb the mountain, telling him how he "died" when he was betrayed by a friend, C. W. McAllister, during their climb on the Murderhorn in 1928, also as a corporate publicity stunt. Despite this, he accepts the challenge and is aided by two Sherpas, whom he fires after waking up one night to find them secretly dragging him up. Homer radios this to Brad and Neil, who fail to convince him to abandon the climb. The mountain proves too treacherous and high for Homer, who takes shelter in a cave. In it, he finds McAllister's frozen body and evidence proving it was Grampa who betrayed him. Too tired and ashamed to continue, Homer sticks his flagpole on the plateau. An ensuing crack collapses the rest of the mountain, making the plateau he is on the peak. Proud, Homer uses McAllister's body to sled down the mountainside, where he is greeted by the crowd. Production The episode was pitched and written by John Swartzwelder. The writing staff had to find a new angle for Homer's weight problems, as the idea had been used several times before. This was emphasized in this episode when Marge does not seem to care that Homer is going to try to lose weight again. In the scenes where the Sherpas were speaking, the show staff went to great lengths to find translations. Originally, the producers of the film adaption of the book Into Thin Air were contacted to help. The film producers were shocked at the trouble the Simpsons staff were going to, and replied that they had simply made up translations in the film. The staff then had to consult various experts by telephone. The idea of the upper part of the mountain collapsing so Homer would be at the peak came from Mike Scully's brother Brian, after the staff "desperately needed a way out". Cultural references The mountain Homer must climb, the Murderhorn, is a reference to the mountain Matterhorn, which is located in th
https://en.wikipedia.org/wiki/Capital%20FM
Capital FM may refer to: Radio stations Europe Capital (radio network), a network of twelve UK-based music radio stations Capital FM 105.3, a Russian radio station YLE Capital FM, a Finnish radio station North America CIBX-FM, a Fredericton, New Brunswick radio station that used the "Capital FM" brand name in the 2000s and 2010s CKGC-FM, an Iqaluit, Nunavut radio station that uses Capital FM as a brand name CKRA-FM, "96.3 Capital FM", an Edmonton, Alberta radio station Africa 98.4 Capital FM, a Kenyan radio station owned by Capital Group LTD Capital Radio 604, a former South African radio station Asia Capital FM 88.9, a former radio station in Kuala Lumpur, Malaysia Radio Capital (Dhaka), a radio station based in Dhaka, Bangladesh Capital 95.8FM, a Mandarin-language radio station in Singapore DWFT, broadcasting as 104.3 Capital FM2, a radio station in Metro Manila, Philippines. See also Capital Radio (disambiguation)
https://en.wikipedia.org/wiki/YLE%20Capital%20FM
YLE Capital FM was a Finnish radio station owned by Yle. It broadcast foreign language programming 24 hours a day, in cooperation with major international broadcasters. Capital FM also aired Yle broadcasts about Finland in English and Russian, French and German. Capital FM could be listened to in Greater Helsinki (97.5 MHz), Tampere (88.3 MHz), Turku (96.7 MHz), Lahti (90.3 MHz) and Kuopio (88.1 MHz). In August 2005, the name of the station was changed into Yle Mondo. The FM frequencies outside Helsinki were unavailable for use by the Yle Mondo, but services continue in Helsinki. The channel is also available throughout Finland as one of the audio channels of the Yle Digital Television. Capital FM had started in 1978 as a relay of Yle External Service (Yle Radio Finland) programming for the capital metroplex area. With the gradual expansion of foreign language output on YLE Radio Finland, the station was on the air almost 12 hours per day, but there were blank hours between segments. For some special occasions, a full-service schedule was produced, such as the tenth anniversary of the CSCE 1975 Summit arranged in 1985 and Summit between George Bush and Michail Gorbachov in September 1990. During an international broadcasting meeting (hosted by the CBC) in Hamilton, Ontario, in the spring of 1990, the head of external broadcasting at Yle, Juhani Niinisto, had talked with various international broadcasters about the possibility of a launching a relay-based service. The response had been positive, but final corporate go ahead was not given in Finland until the summer of 1991. The first programme lineup included the Voice of America in its light VOA Europe version, BBC World Service and Deutsche Welle in German. Radio France Internationale in French joined shortly. By the mid-1990s, the station had added ABC Radio Australia (via WRN, London), National Public Radio (US) and the Spanish domestic news network RNE Todo Noticias in Spanish. For some two years, the station also carried the C-SPAN Weekly Radio Journal from the US. Spanish was important as tens of thousands of Finnish nationals spent part of winters in Spain. It was also better to relay a domestic channel than the external broadcaster from that country. In the early 2000s, China Radio International in English, domestic services from Norway and Denmark, in Norwegian and Danish, South African Broadcasting Corporation SABC in English (via WRN) and the Vatican Radio in Italian had been added. The Vatican Radio was taken as efforts to get RAI in Italian had failed. In 1998, the Yle international foreign language production was changed to be produced primarily for the Capital FM, with secondary use as an international service. That meant early morning production for the domestic prime time. With the closing of the Yle external service foreign language production in English, German and French in October 2002, the Yle News unit established within Yle News kept producing morning newscasts o
https://en.wikipedia.org/wiki/Logical%20address
In computing, a logical address is the address at which an item (memory cell, storage element, network host) appears to reside from the perspective of an executing application program. A logical address may be different from the physical address due to the operation of an address translator or mapping function. Such mapping functions may be, in the case of a computer memory architecture, a memory management unit (MMU) between the CPU and the memory bus. Computer memory The physical address of computer memory banks may be mapped to different logical addresses for various purposes. In a system supporting virtual memory, there may actually not be any physical memory mapped to a logical address until an access is attempted. The access triggers special functions of the operating system which reprogram the MMU to map the address to some physical memory, perhaps writing the old contents of that memory to disk and reading back from disk what the memory should contain at the new logical address. In this case, the logical address may be referred to as a virtual address. See also Memory segment Flat memory model Memory address Virtual memory
https://en.wikipedia.org/wiki/Name%E2%80%93value%20pair
A name–value pair, also called an attribute–value pair, key–value pair, or field–value pair, is a fundamental data representation in computing systems and applications. Designers often desire an open-ended data structure that allows for future extension without modifying existing code or data. In such situations, all or part of the data model may be expressed as a collection of 2-tuples in the form <attribute name, value> with each element being an attribute–value pair. Depending on the particular application and the implementation chosen by programmers, attribute names may or may not be unique. Examples of use Some of the applications where information is represented as name-value pairs are: E-mail, in RFC 2822 headers Query strings, in URLs Optional elements in network protocols, such as IP, where they often appear as TLV (type–length–value) triples Bibliographic information, as in BibTeX and Dublin Core metadata Element attributes in SGML, HTML and XML Some kinds of database systems – namely a key–value database OpenStreetMap map data Windows registry entries Environment variables Use in computer languages Some computer languages implement name–value pairs, or more frequently collections of attribute–value pairs, as standard language features. Most of these implement the general model of an associative array: an unordered list of unique attributes with associated values. As a result, they are not fully general; they cannot be used, for example, to implement electronic mail headers (which are ordered and non-unique). In some applications, a name–value pair has a value that contains a nested collection of attribute–value pairs. Some data serialization formats such as JSON support arbitrarily deep nesting. Other data representations are restricted to one level of nesting, such as INI file's section/name/value. See also Attribute (computing) Entity–attribute–value model Key–value database Query string References 4 Data modeling
https://en.wikipedia.org/wiki/PAST%20storage%20utility
PAST is a large-scale, distributed, persistent storage system based on the Pastry peer-to-peer overlay network. See also Pastry (DHT) (PAST section) External links A. Rowstron and P. Druschel. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility. 18th ACM SOSP'01, Lake Louise, Alberta, Canada, October 2001. PAST homepages: freepastry.org, Microsoft Research http://www.cse.lehigh.edu/~brian/course/advanced-networking/reviews/weber-past.html http://ieeexplore.ieee.org/xpl/abs_free.jsp?arNumber=990064 IEEE Distributed data storage
https://en.wikipedia.org/wiki/Datang%20Telecom%20Group
Datang Telecom Group (officially Datang Telecom Technology & Industry Group) is a Chinese state-owned telecommunications equipment group headquartered in Beijing, China. The group was founded in September 1998 by the China Academy of Telecommunications Technology (CATT) and manufactures telecommunications equipment. It is best known for its leading role in developing the Chinese TD-SCDMA 3G mobile telecommunications standard through its subsidiary DT Mobile (formerly known as Datang Mobile). Datang Telecom Group also provides military communications infrastructure to the People's Liberation Army. History Datang Telecom Group was the trading name of the China Academy of Telecommunications Technology since September 1998. The academy itself was founded in 1957. In 1998 a limited company Datang Telecom Technology was also incorporated and floated in the Shanghai Stock Exchange on 21 October 1998. In April 2007, Datang secured a 36.6% share of China Mobile's first large-scale TD-SCDMA network construction contracts. In March 2012, Datang Telecom agreed to acquire three companies: TD-SCDMA chipmaker Leadcore Technology, handset design and manufacturing company Shanghai Uniscope Technologies, and its subsidiary Qidong Uniscope Electronics; Datang already held a 51 percent stake in Shanghai Uniscope. Operations Datang's business areas include high-capacity digital switching, optical networking, data communication, and digital microwave communication equipment and software and system integration services. However, revenue from these sectors is far outweighed by the company's spending on TD-SCDMA research and product development, and in recent years the company has taken out a series of heavy loans from state-owned Chinese banks to fund this development. In 2012, the United States-China Economic and Security Review Commission released a report alleging connections between Datang and the People's Liberation Army, in particular via Datang's Tenth Research Institute in Xi'an. Subsidiaries (100.0%) Datang Telecom Technology (33.94%) References External links Companies based in Beijing Government agencies established in 1957 Telecommunication equipment companies of China Government-owned companies of China Chinese brands Chinese companies established in 1957 Defence companies of China
https://en.wikipedia.org/wiki/Booknotes
Booknotes is an American television series on the C-SPAN network hosted by Brian Lamb, which originally aired from 1989 to 2004. The format of the show is a one-hour, one-on-one interview with a non-fiction author. The series was broadcast at 8 p.m. Eastern Time each Sunday night, and was the longest-running author interview program in U.S. broadcast history. Background and production History Booknotes debuted on April 2, 1989. The first guest was former United States National Security Advisor Zbigniew Brzezinski, discussing The Grand Failure: The Birth and Death of Communism in the Twentieth Century. The fifth anniversary was marked on April 10, 1994 with a special two-hour show featuring over 50 of the 300 authors previously featured on the program. For the tenth anniversary of Booknotes in 1999, Brian Lamb compiled and edited an anthology of stories on 78 people who influenced American history from the 18th century to 1999. Titled Booknotes: Life Stories, each contributed story was written by a well-known biographer. After 801 interviews, the final broadcast aired December 5, 2004. Lamb's guest was Mark Edmundson, author of Why Read?, professor of English at the University of Virginia and a contributing editor at Harper's Magazine. The show was intended to end with the 800th episode, but due to a miscalculation, the final program was actually the 801st. Booknotes segments continue to be re-aired on C-SPAN's companion network C-SPAN 2, during Saturday Book TV broadcasts, while C-SPAN 3 airs repeat segments every weeknight at 11 p.m. Pacific Time. All 801 transcripts are available online and the 801 shows can be viewed online via the Booknotes website. Lamb's own copies of the Booknotes books, most of which contain his personal marginalia, are housed in the rare books collection of George Mason University. Development The Booknotes concept grew out of a one-off interview special with Neil Sheehan, author of A Bright Shining Lie, in September 1988. The interview itself resulted from Lamb having viewed a short commercial television interview with Sheehan and wanting to hear more. According to Lamb, a strong viewer response to the program led to the decision to start producing a weekly author interview program. Format Each Booknotes episode devoted one full hour to an interview with the author of a recently released non-fiction book. In order to avoid duplicate appearances by any one author, each guest appeared only once on the program, thus allowing for over 800 different authors to be interviewed every week over a fifteen-year stretch. The hour-long interviews explored authors' work habits, thoughts and lives, while also covering the intentions of their book and how, or if, these were achieved. Production Research for the interviews was simple: producers identified subjects, arranged for them to appear and Brian Lamb would then read the book in the week prior to the interview. One reason for discontinuing the series, according to Lamb, was
https://en.wikipedia.org/wiki/Class-5%20telephone%20switch
A Class-5 telephone switch is a telephone exchange in the public switched telephone network (PSTN) that directly serves subscribers and manages subscriber calling features. Class-5 services include basic dial-tone, calling features, and additional digital and data services to subscribers connected to a local loop. Function A Class-5 switch provides telephone service to end customers locally in the exchange area, and thus it is concerned with "subscriber type" activities: generation of dial-tone and other "comfort noises"; handling of network services such as advice of duration and charge etc. Specifically, a class-5 switch provides dial tone, local switching and access to the rest of the network. Class-4 switches do not provide subscriber lines, their role is to route calls between other switches. Typically a Class-5 switch serves an area of a city, an individual town, or several villages and could serve from several hundred to 100,000 subscribers. Since the replacement of electromechanical exchanges by modern digital ones, the function of a class-5 switch in rural areas is often performed by a remote switch or Remote Digital Terminal installed at the original switch site to handle local switching or concentration, respectively. The Class-5 switching infrastructure is then physically located in a larger population center. Urban areas with extensive underground plant tend to keep the classic class-5 office architecture. Hardware Before the office classification system for Direct Distance Dialing (DDD) was established, the principal designs in use for Class 5 in the US were crossbar systems, Panel switches, and Strowger-type step-by-step systems. The DDD program involved installations of large numbers of new 5XB crossbar switches in the 1950s and 1960s. In addition, 1ESS switches and their variants appeared in the 1960s. Most of these systems were removed in the late 20th century, primarily replaced in North America by DMS-10, DMS-100 and 5ESS switches in the Bell operating territories and the GTD-5 EAX in the GTE operating areas. Principal European products include Ericsson AXE telephone exchange, Siemens EWSD and Alcatel-Lucent S12 and E10. In the 21st century, US and European service providers continued to upgrade their networks, replacing older DMS-10, DMS-100, 5ESS, GTD-5 and EWSD switches with Voice over IP technology. See also Community dial office PSTN network topology Softswitch Telephone exchange equipment
https://en.wikipedia.org/wiki/IReview
iReview was a service offered by Apple Computer (now Apple Inc.) dedicated to reviews of Internet content. During the 2000 Macworld Conference in San Francisco, Apple CEO Steve Jobs introduced this service along with iTools, which was the free predecessor to Apple's current iCloud subscription service. iReview was part of a reaction to the commercial success of the iMac that resulted in thousands of new computer owners suddenly having access to the Internet. The main purpose of the service was to give new users a place for detailed reviews on websites on the World Wide Web. iReview was integrated into the Apple website as part of the new "tabbed" layout, with a dedicated tab alongside iCards, iTools, the online store, QuickTime, and online support. Once a visitor clicked on the iReview tab, they could choose from one of 15 categories of websites for specific reviews on subjects that may be of interest. Each initial review was published by Apple employees, who gave their input on the site along with a detailed review and an overall rating. Visitors to iReview were also able to review and rate the sites themselves as well. Users could organize the viewing of reviews by ratings or by simple searches. Cancellation In February 2001, Apple cancelled the iReview service. Its failure to generate traffic is generally attributed to a lack of awareness of the service by most web users, a lack of perceived openness of the system, and the idea that most people would typically not spend time reading others' opinions of websites when they could quickly generate their own opinions by visiting the sites themselves. References Apple Inc. services Recommender systems
https://en.wikipedia.org/wiki/Singularity%20%28operating%20system%29
Singularity is an experimental operating system developed by Microsoft Research between July 9, 2003, and February 7, 2015. It was designed as a high dependability OS in which the kernel, device drivers, and application software were all written in managed code. Internal security uses type safety instead of hardware memory protection. Operation The lowest-level x86 interrupt dispatch code is written in assembly language and C. Once this code has done its job, it invokes the kernel, which runtime system and garbage collector are written in Sing# (an extended version of Spec#, itself an extension of C#) and runs in unprotected mode. The hardware abstraction layer is written in C++ and runs in protected mode. There is also some C code to handle debugging. The computer's basic input/output system (BIOS) is invoked during the 16-bit real mode bootstrap stage; once in 32-bit mode, Singularity never invokes the BIOS again, but invokes device drivers written in Sing#. During installation, Common Intermediate Language (CIL) opcodes are compiled into x86 opcodes using the Bartok compiler. Security design Singularity is a microkernel operating system. Unlike most historic microkernels, its components execute in the same address space (process), which contains software-isolated processes (SIPs). Each SIP has its own data and code layout, and is independent from other SIPs. These SIPs behave like normal processes, but avoid the cost of task-switches. Protection in this system is provided by a set of rules called invariants that are verified by static program analysis. For example, in the memory-invariant states there must be no cross-references (or memory pointers) between two SIPs; communication between SIPs occurs via higher-order communication channels managed by the operating system. Invariants are checked during installation of the application. (In Singularity, installation is managed by the operating system.) Most of the invariants rely on the use of safer memory-managed languages, such as Sing#, which have a garbage collector, allow no arbitrary pointers, and allow code to be verified to meet a given computer security policy. Project status The first Singularity Research Development Kit (RDK), RDK 1.1, was initially released on March 4, 2008, being released under a shared source license allowing academic non-commercial use and available from CodePlex. RDK 2.0 was later released on November 14, 2008. Similar projects Inferno, first created in 1995, based on Plan 9 from Bell Labs; programs are run in a virtual machine and written in Limbo instead of C# with CIL; open-source software JavaOS, a legacy OS based on the same concept as Singularity JNode, an OS similar in concept to Singularity, but with Java instead of C# with CIL JX, a Java OS that, like Singularity, uses type safety instead of computer hardware memory protection Phantom OS, a managed OS SharpOS, a former effort to write an operating system using C#; open-source software MOS
https://en.wikipedia.org/wiki/IBM%20SAN%20File%20System
The IBM SAN File System is a distributed, heterogeneous file system developed by IBM to be used in storage area networks. There are many virtualization features included, such as allowing heterogeneous operating systems to access the same data and file spaces. Write-in-place b-trees were used as in the DB2 database, later on better known as core of the btrfs. IBM discontinued selling the SAN File System in April 2007. It has been replaced by IBM General Parallel File System (GPFS). References External links SAN File System at IBM Shared disk file systems IBM file systems SAN File System
https://en.wikipedia.org/wiki/Least%20slack%20time%20scheduling
Least slack time (LST) scheduling is an algorithm for dynamic priority scheduling. It assigns priorities to processes based on their slack time. Slack time is the amount of time left after a job if the job was started now. This algorithm is also known as least laxity first. Its most common use is in embedded systems, especially those with multiple processors. It imposes the simple constraint that each process on each available processor possesses the same run time, and that individual processes do not have an affinity to a certain processor. This is what lends it a suitability to embedded systems. Slack time This scheduling algorithm first selects those processes that have the smallest "slack time". Slack time is defined as the temporal difference between the deadline, the ready time and the run time. More formally, the slack time for a process is defined as: where is the process deadline, is the real time since the cycle start, and is the remaining computation time. Applications In realtime scheduling algorithms for periodic jobs, an acceptance test is needed before accepting a sporadic job with a hard deadline. One of the simplest acceptance tests for a sporadic job is calculating the amount of slack time between the release time and deadline of the job. Suitability LST scheduling is most useful in systems comprising mainly aperiodic tasks, because no prior assumptions are made on the events' rate of occurrence. The main weakness of LST is that it does not look ahead, and works only on the current system state. Thus, during a brief overload of system resources, LST can be suboptimal. It will also be suboptimal when used with uninterruptible processes. However, like the earliest deadline first, and unlike rate monotonic scheduling, this algorithm can be used for processor utilization up to 100%. See also Earliest deadline first scheduling - a different algorithm for dynamic priority scheduling, which guarantees optimal throughput. Processor scheduling algorithms
https://en.wikipedia.org/wiki/Fetch-and-add
In computer science, the fetch-and-add (FAA) CPU instruction atomically increments the contents of a memory location by a specified value. That is, fetch-and-add performs the operation increment the value at address by , where is a memory location and is some value, and return the original value at . in such a way that if this operation is executed by one process in a concurrent system, no other process will ever see an intermediate result. Fetch-and-add can be used to implement concurrency control structures such as mutex locks and semaphores. Overview The motivation for having an atomic fetch-and-add is that operations that appear in programming languages as are not safe in a concurrent system, where multiple processes or threads are running concurrently (either in a multi-processor system, or preemptively scheduled onto some single-core systems). The reason is that such an operation is actually implemented as multiple machine instructions: load into a register; add to register; store register value back into . When one process is doing and another is doing concurrently, there is a race condition. They might both fetch and operate on that, then both store their results with the effect that one overwrites the other and the stored value becomes either or , not as might be expected. In uniprocessor systems with no kernel preemption supported, it is sufficient to disable interrupts before accessing a critical section. However, in multiprocessor systems (even with interrupts disabled) two or more processors could be attempting to access the same memory at the same time. The fetch-and-add instruction allows any processor to atomically increment a value in memory, preventing such multiple processor collisions. Maurice Herlihy (1991) proved that fetch-and-add has a finite consensus number, in contrast to the compare-and-swap operation. The fetch-and-add operation can solve the wait-free consensus problem for no more than two concurrent processes. Implementation The fetch-and-add instruction behaves like the following function. Crucially, the entire function is executed atomically: no process can interrupt the function mid-execution and hence see a state that only exists during the execution of the function. This code only serves to help explain the behaviour of fetch-and-add; atomicity requires explicit hardware support and hence can not be implemented as a simple high level function. << atomic >> function FetchAndAdd(address location, int inc) { int value := *location *location := value + inc return value } To implement a mutual exclusion lock, we define the operation FetchAndIncrement, which is equivalent to FetchAndAdd with inc=1. With this operation, a mutual exclusion lock can be implemented using the ticket lock algorithm as: record locktype { int ticketnumber int turn } procedure LockInit(locktype* lock) { lock.ticketnumber := 0 lock.turn := 0 } procedure Lock(locktype* loc
https://en.wikipedia.org/wiki/AnoNet
anoNet is a decentralized friend-to-friend network built using VPNs and software BGP routers. anoNet works by making it difficult to learn the identities of others on the network allowing them to anonymously host IPv4 and IPv6 services. Motivation Implementing an anonymous network on a service by service basis has its drawbacks, and it is debatable if such work should be built at the application level. A simpler approach could be to design an IPv4/IPv6 network where its participants enjoyed strong anonymity. Doing so allows the use of any number of applications and services already written and available on the internet at large. IPv4 networks do not preclude anonymity by design; it is only necessary to decouple the identity of the owner of an IP address from the address itself. Commercial internet connectivity and its need of billing records makes this impossible, but private IPv4 networks do not share that requirement. Assuming that a router administrator on such a metanet knows only information about the adjacent routers, standard routing protocols can take care of finding the proper path for a packet to take to reach its destination. All destinations further than one hop can for most people's threat models be considered anonymous. This is because only your immediate peers know your IP. Anyone not directly connected to you only knows you by an IP in the 21.0.0.0/8 range, and that IP is not necessarily tied to any identifiable information. anoNet is pseudonymous Everyone can build a profile of an anoNet IP address: what kind of documents it publishes or requests, in which language, about which countries or towns, etc. If this IP ever publishes a document that can lead to its owner's identity, then all other documents ever published or requested can be tied to this identity. Unlike some other Friend to Friend (F2F) programs, there is no automatic forwarding in anoNet that hides the IP of a node from all nodes that are not directly connected to it. However, all existing F2F programs can be used inside anoNet, making it harder to detect that someone uses one of these F2F programs (only a VPN connection can be seen from the outside, but traffic analysis remain possible). Architecture Since running fiber to distant hosts is prohibitively costly for the volunteer nature of such a network, the network uses off-the-shelf VPN software for both router to router, and router to user links. This offers other advantages as well, such as invulnerability to external eavesdropping and the lack of need for unusual software which might give notice to those interested in who is participating. To avoid addressing conflict with the internet itself, anoNet initially used the IP range 1.0.0.0/8. This was to avoid conflicting with internal networks such as 10.0.0.0/8, 172.16.0.0/12 and 192.168.0.0/16, as well as assigned Internet ranges. In January 2010 IANA allocated 1.0.0.0/8 to APNIC. In March 2017 anoNet changed the network to use the 21.0.0.0/8 subnetw
https://en.wikipedia.org/wiki/Blitz%20%28video%20game%29
Blitz is an action game published by Commodore for its VIC-20 home computer in 1981. The game is based on the 1977 arcade video game Canyon Bomber from Atari, Inc., with the goal of clearing boulders replaced with bombing closely packed skyscrapers. Several later clones of the concept also use the urban setting. The game is played with a single button which drops a bomb. Taylor originally self-published the game as Vic New York. Blitz was later sold by Mastertronic as New York Blitz. He also wrote Blitz-64 for the Commodore 64 and Blitz-16 for the Commodore 16. Gameplay A plane flies across a single-screen cityscape at a steady speed. When it reaches the edge of the screen, it wraps to the other side at a lower altitude, with its speed increasing each pass. The player drops bombs from the plane, and each bomb removes one or more segments of the structure it hits. As the plane descends, it risks colliding with remaining buildings. The level is complete when all buildings are destroyed, and the plane has descended safely to the bottom of the screen. Development The game was prompted by a verbal description of Canyon Bomber, originally released as an arcade video game by Atari, Inc. in 1977 and ported to the Atari VCS. The change from a canyon filled with rock pillars to a city of skyscrapers was copied by later clones including Blitz (ZX Spectrum), City Bomber (C64), and City Lander (ZX81). Simon Taylor wrote the game as Vic New York before he contracted with Commodore in 1982. Taylor later produced versions for the Commodore 64, Commodore 16, and Epson HX-20 portable computer. Legacy Mastertronic later sold the game as the budget-priced New York Blitz. Jeff Minter wrote a 1982 ZX Spectrum game inspired by Blitz called Bomber (also published as City Bomber). References 1981 video games VIC-20 games Video games developed in the United Kingdom
https://en.wikipedia.org/wiki/CyberGraphX
CyberGraphX (pronounced "cybergraphics"), is the standard ReTargetable Graphics API available for the Amiga and compatible systems. It was developed by Thomas Sontowski and Frank Mariak and later adopted by Phase5 for use with their graphics cards. Many other graphics card manufacturers who offered hardware for Amiga and compatible systems used it as well. Versions The latest version is CyberGraphX V5 used in MorphOS. Its features include: AltiVec accelerated Display Data Channel (DDC) and gamma correction support Hardware accelerated operations for alpha blending, tinting, gradients, stretching PowerPC native, with support for AmigaOS drivers The original CyberGraphX software for AmigaOS is no longer actively maintained. CyberGraphX V4 was the last release for that platform so far. AROS implements CyberGraphX V4 compatible API. Alternative RTG APIs are Picasso 96 and Enhanced Graphics System, the first is used in AmigaOS4 and implements the CyberGraphX V4 API with some V5 extensions. Dual monitor support AGP-Radeon + PCI-Radeon: fail AGP-Radeon + PCI-Voodoo: ok (Apple Open Firmware only) AGP-Voodoo + PCI-Voodoo: unknown AGP-Voodoo + PCI-Radeon: ok Up to 2560×1600 running on Dual-link DVI, for example a Radeon 9650 with 256 MB Drivers and libraries cgxsystem.library cgxbootpic.library cgxdither.library cgxvideo.library (cybpci.library) ddc.library cgx3drave.library cgxmpeg.library References MorphOS 2.0 release notes External links Selection of CyberGraphX drivers at the Unofficial phase5 Support Page AmigaOS Amiga Amiga APIs Graphics libraries MorphOS
https://en.wikipedia.org/wiki/Incheon%20Subway%20Line%201
Incheon Subway Line 1 is a north-south subway line, part of the Incheon Subway system. The line is also included as a part of the overall Seoul Metropolitan Subway network; Bupyeong Station has a free transfer with Seoul Subway Line 1, Gyeyang Station connects with the AREX Line which leads to Incheon International Airport and Seoul Station, Bupyeong-gu Office Station has a free transfer with Seoul Subway Line 7, and Woninjae Station has a free transfer with the Suin-Bundang Line. Background Incheon's Line 1 makes Incheon the fourth city in South Korea and fifth in the Korean Peninsula with a subway system, after Pyongyang, Seoul, Busan, and Daegu. A trip along the line from Gyeyang in the north to the International Business District in the south takes approximately 57 minutes. From Bakchon station to the International Business District station, the line is underground. History March 1999: Trial runs begin. October 6, 1999: The line opens from Bakchon to Dongmak, after six years of construction. December 7, 1999: A northern extension from Bakchon to Gyulhyeon opens. March 16, 2007: Another northern extension from Gyulhyeon to Gyeyang opens, connecting with the Airport Railroad June 1, 2009: A southern extension from Dongmak to International Business District opens. December 12, 2020: One stop extension to Songdo Moonlight Festival Park opens. Future plans A northward 3-station extension of the line is proposed to provide transportation to the developing Geomdan New City. Construction began in November 2020 and is expected to be completed no earlier than 2024. Rolling Stock The line uses 34 8-car trains. The first 25 trains were built between 1998 and 1999 by Daewoo Heavy Industries and Rotem, while the last 9 trains were built between 2007 and 2008 by Hyundai Rotem to provide trains following the extension of the line. Stations All stations are location in Incheon. See also Incheon Subway List of metro systems Seoul Metropolitan Subway Transportation in South Korea References External links Incheon Rapid Transit Corporation homepage, in English Incheon Subway at UrbanRail.net Seoul Metropolitan Subway lines Subway Line 1 Railway lines opened in 1999 1999 establishments in South Korea
https://en.wikipedia.org/wiki/Read%E2%80%93eval%E2%80%93print%20loop
A read–eval–print loop (REPL), also termed an interactive toplevel or language shell, is a simple interactive computer programming environment that takes single user inputs, executes them, and returns the result to the user; a program written in a REPL environment is executed piecewise. The term usually refers to programming interfaces similar to the classic Lisp machine interactive environment. Common examples include command-line shells and similar environments for programming languages, and the technique is very characteristic of scripting languages. History In 1964, the expression READ-EVAL-PRINT cycle is used by L. Peter Deutsch and Edmund Berkeley for an implementation of Lisp on the PDP-1. Since at least the 1980s, the abbreviations REP Loop and REPL are attested in the context of Scheme. Overview In a REPL, the user enters one or more expressions (rather than an entire compilation unit) and the REPL evaluates them and displays the results. The name read–eval–print loop comes from the names of the Lisp primitive functions which implement this functionality: The read function accepts an expression from the user, and parses it into a data structure in memory. For instance, the user may enter the s-expression (+ 1 2 3), which is parsed into a linked list containing four data elements. The eval function takes this internal data structure and evaluates it. In Lisp, evaluating an s-expression beginning with the name of a function means calling that function on the arguments that make up the rest of the expression. So the function + is called on the arguments 1 2 3, yielding the result 6. The print function takes the result yielded by eval, and prints it out to the user. If it is a complex expression, it may be pretty-printed to make it easier to understand. The development environment then returns to the read state, creating a loop, which terminates when the program is closed. REPLs facilitate exploratory programming and debugging because the programmer can inspect the printed result before deciding what expression to provide for the next read. The read–eval–print loop involves the programmer more frequently than the classic edit–compile–run–debug cycle. Because the print function outputs in the same textual format that the read function uses for input, most results are printed in a form that could be copied and pasted back into the REPL. However, it is sometimes necessary to print representations of elements that cannot sensibly be read back in, such as a socket handle or a complex class instance. In these cases, there must exist a syntax for unreadable objects. In Python, it is the <__module__.class instance> notation, and in Common Lisp, the #<whatever> form. The REPL of CLIM, SLIME, and the Symbolics Lisp Machine can also read back unreadable objects. They record for each output which object was printed. Later when the code is read back, the object will be retrieved from the printed output. REPLs can be created to support any t
https://en.wikipedia.org/wiki/Pure
Pure may refer to: Computing A pure function A pure virtual function PureSystems, a family of computer systems introduced by IBM in 2012 Pure Software, a company founded in 1991 by Reed Hastings to support the Purify tool Pure-FTPd, FTP server software Pure (programming language), functional programming language based on term rewriting Pure Storage, a company that makes datacenter storage solutions Pure (CRIS), a research information system bought by Elsevier. Companies and products Pure (app), dating app Pure (restaurant chain), a British fast food chain Pure Insurance, Privilege Underwriters Reciprocal Exchange Pure Trading, a Canadian electronic communication network operated by CNQ Pure Digital, a UK consumer electronics company specialising in DAB radios Pure Oil, a U.S. chain of gas stations Propulsion Universelle et Récuperation d'Énergie (PURE), a motorsport engineering company Pure FM (Portsmouth), a university radio station based in Portsmouth, UK Pure (Belgian radio station), a former Belgian radio station Literature Pure (magazine), a magazine created by Peter Sotos Pure (Miller novel), a 2011 novel by Andrew Miller Pure (Baggott novel), a 2012 novel by Julianna Baggott PURE, 2016 play about chocolate manufacture, commissioned by Mikron Theatre Company Video games Pure (video game), an off-road racing video game for Microsoft Windows, Xbox 360 and PlayStation 3 Establishments Pure Nightclub, a nightclub in Las Vegas, Nevada Music Pure (Canadian band), a Canadian rock band till 2000 Albums Pure (3 Colours Red album), 1997 Pure (Godflesh album), 1992 Pure (Gary Numan album), 2000 Pure (Hayley Westenra album), 2003 Pure (In the Woods... album), 2016 Pure (No Angels album), 2003 Pure (The Lightning Seeds album), 1996 Pure (Maksim Mrvica album), 2007 Pure II (Maksim Mrvica album), 2008 Pure (The Primitives album), 1989 Pure (The Jesus Lizard album), 1989 Pure (Lara Fabian album), 1997 Pure (Pendragon album), 2008 Pure (Boney James album), 2004 Pure (Chris Potter album), 1994 Songs "Pure" (song), by The Lightning Seeds, 1989 "Pure", a song and single by 3 Colours Red from Pure, 1997 "Pure", a song by Cigarettes After Sex from Cry, 2019 "Pure", a song by Dream "Pure", a song by Endless Shame "Pure", a song by Orgy from their 2005 album Punk Statik Paranoia "Pure", a song by Paris Angels B-side to "Perfume (Loved Up)", 1991 Film and television Pure (2002 film), a 2002 British film Pure (2005 film), a 2005 Canadian film Pure (2010 film), a 2010 Swedish film Pure (Canadian TV series), a 2017 Canadian TV series Pure (British TV series), a 2019 UK TV series "Pure" (Law & Order: Special Victims Unit), an episode of Law & Order: Special Victims Unit "Pure" (Into the Dark), an episode of the first season of Into the Dark Places Pure, Ardennes See also Cleanliness Impurity (disambiguation) Pure land PureGym, a chain of health clubs in the United Kingdom Puritans Purity (disa
https://en.wikipedia.org/wiki/Indrail%20Pass
An Indrail Pass was a special railway pass available to foreign nationals created along the lines of the Eurail Pass for unlimited travel without reservation of a ticket on the Indian Railways network. This ticket was available for a special time period from half a day to 90 days. Vide Railway Board order, Indrail passes have been discontinued. References External links indrail passes Guardian Tips on Indian Train Travel Tourism in India Indian Railways Rail passes
https://en.wikipedia.org/wiki/Corpse%20Killer
Corpse Killer is a horror-themed rail shooter developed and published by Digital Pictures for the Sega CD, Sega CD 32X, 3DO, Sega Saturn, Windows 95 and Macintosh computers. An interactive variation on the zombie film genre, it utilizes live-action full motion video in a format similar to other games developed by Digital Pictures. Reviews for the game were mixed, generally criticizing the repetitive gameplay and low video quality, though many reviewers enjoyed the campy nature of the cutscenes. Corpse Killer was the first CD game released for the Sega 32X. It was later remastered for Steam, PlayStation 4 and Nintendo Switch. Footage from the game was recycled for the 2003 film Game Over. Story An unnamed United States Marine is airdropped onto a tropical island on a top secret mission to stop the evil Dr. Hellman, who plans to release his army of zombies on the world. He is bitten by a zombie and also meets an attractive female reporter and a Rastafarian male driver. Four of the marine lieutenant's comrades are captured by Hellman and turned into zombies. To rescue them, the lieutenant infiltrates Hellman's compound and shoots each of them with bullets coated with extract from Datura plants, which can turn freshly-created zombies back into humans. Cast Vincent Schiavelli as Hellman Jeremiah Birkett as Winston Bridget Butler as Julie John Cassini as Magliano Gary Anthony Sturgis as Fleming Erin Bobo as Duffy Bill Moseley as Captain Charles Kahlenberg as General Gameplay Most of the gameplay is similar to other light gun video games such as Lethal Enforcers. The player moves through the jungle shooting various zombies, collecting better ammunition (to prepare for a raid on Hellman's compound) and medicine to recover health. Development John Lafia directed the live-action footage, which was filmed on location in the Caribbean, with most scenes being shot in Puerto Rico. The actors portraying the zombies wore latex masks. Sega Saturn features The Sega Saturn version of the title was released with the subtitle of "Graveyard Edition". This version features a few exclusives such as full-screen video (other versions have the FMV boxed in), improved video quality, a difficulty select (ranging from normal to bloodthirsty to cannibal), items and power-ups that drop down from the top of the screen and can be shot and collected, and "in your face" zombie attacks. These attacks involve a zombie that pops up immediately in front of the "camera" and attacks the player. They can only be killed with armor-piercing rounds or Datura rounds. The Saturn version is also the only version of the game to lack light gun support (though there is no mention of light guns in the manual or packaging for the 3DO version, it does in fact include light gun support). Reception Reviewing the Sega CD version, GamePro remarked that "This frisky first-person blast-a-thon looks and feels like a bad live-action movie. But your taste for 'bad' just might bring this Corpse to life
https://en.wikipedia.org/wiki/John%20J.%20Anderson
John J. Anderson or J.J. Anderson (November 8, 1956 – October 17, 1989) was a writer and editor covering computers and technology. The New Jersey native was Executive Editor of Computer Shopper and Atari Explorer. At the time of his death he was an editor for MacUser magazine in Foster City, California. He was 32, and was survived by a wife, Lauren Hallquist Anderson, and two children. John began writing the "Apple Cart" column in Creative Computing magazine in January 1983 after David Lubar left to work for a video game company in California. He followed this with the "Outpost Atari" column in the same magazine. John would become Creative's Executive Editor, working alongside founding editors David Ahl and Betsy Staples. Death and legacy John and fellow MacUser editor Derek van Alstyne were killed in San Francisco during the 1989 Loma Prieta earthquake. They were visiting the city for a business meeting when the front of a building collapsed, burying his car in debris from a brick wall. MacUser named two of its annual Editors' Choice Awards, celebrating distinguished achievement and up-and-coming talent, respectively, after the pair. On October 31, 1989, the John Anderson Memorial Fund was established by Ziff Davis as a trust fund for John's two children. Bill Ziff, President of Ziff, personally contributed $50,000. References American magazine editors 1956 births 1989 deaths Writers from New Jersey Writers from California 20th-century American non-fiction writers
https://en.wikipedia.org/wiki/Cleverpath%20AION%20Business%20Rules%20Expert
Cleverpath AION Business Rules Expert (formerly Platinum AIONDS, and before that Trinzic AIONDS, and originally Aion) is an expert system and Business rules engine owned by Computer Associates by 2000. History The product was created around 1986 as "Aion" by the Aion company. In its initial release Aion was multi-platform and continues to be deliverable to the PC, Unixs, and Mainframe computer's. In addition it ties in seamlessly with a variety of databases including Oracle, Microsoft SQL Server, and ODBC. Aion was founded by Harry Reinstein, Larry Cohn, Garry Hallee, Scott Grinis, and others. From Scott Grinis's bio: Scott founded Aion, a company that developed expert systems and whose advanced inference engine and object technology were used by financial services and insurance firms to develop risk-scoring and underwriting applications. Harry Reinstein was quoted as saying: “Our biggest competitor was not AICorp, it was COBOL” Trinzic owned AION by 1993. A reference in a 1993 announcement indicates that Trinzic's formation was the result of a merger (paraphased): Trinzic set three development initiatives shortly after its formation from the merger of Aion Corp. and AICorp. The other initiatives -- adding SQL extensions to Aion/DS and evaluating the unbundling of some of that product's object-oriented programming capabilities -- are still active. Writing in 1993 Judith Hodges and Deborah Melewski give the date for the merger: Two rival artificial intelligence software vendors -- AICorp, Inc. and Aion Corp. -- merged in September 1992 to form Trinzic Corp. As part of the merger, redundant jobs were eliminated (20% of the combined work force), leaving a total work force of 245 employees worldwide. The new firm also boasted a combined installed base of more than 1,200 sites representing more than 10,000 software licenses. Although in the merger, technically AICorp bought Aion, as AICorp was a public company and Aion was still private, the reality was that Aion's leadership and technology subsumed AICorp's. Jim Gagnard, the CEO of Aion, became CEO of Trinzic and AICorp's flagship product, KBMS, was discontinued, while the Aion Development System continued to be enhanced and KBMS customers were assisted in converting to AIONDS, under the continued technical leadership of Garry Hallee and Scott Grinis. On August 1, 1994 Trinzic released version 6.4 of AIONDS saying, in part: Trinzic Corp., Palo Alto, Calif., has unveiled The Aion Development System (AionDS) Version 6.4, an upgrade to the company's development environment for building business process automation applications. Version 6.4 provides a visual development environment for Microsoft Windows or OS/2 PM applications using business rules. Trinzic was acquired by PLATINUM Technologies in 1995 which retained at least some of Trinzic's acquisitions Platinum Technologies was acquired by Computer Associates in 1999. CA changed the system's name to CA Aion Business Rules Exp
https://en.wikipedia.org/wiki/Wafer-scale%20integration
Wafer-scale integration (WSI) is a rarely used system of building very-large integrated circuit (commonly called a "chip") networks from an entire silicon wafer to produce a single "super-chip". Combining large size and reduced packaging, WSI was expected to lead to dramatically reduced costs for some systems, notably massively parallel supercomputers. The name is taken from the term very-large-scale integration, the state of the art when WSI was being developed. Overview In the normal integrated circuit manufacturing process, a single large cylindrical crystal (boule) of silicon is produced and then cut into disks known as wafers. The wafers are then cleaned and polished in preparation for the fabrication process. A photographic process is used to pattern the surface where material ought to be deposited on top of the wafer and where not to. The desired material is deposited and the photographic mask is removed for the next layer. From then on the wafer is repeatedly processed in this fashion, putting on layer after layer of circuitry on the surface. Multiple copies of these patterns are deposited on the wafer in a grid fashion across the surface of the wafer. After all the possible locations are patterned, the wafer surface appears like a sheet of graph paper, with grid lines delineating the individual chips. Each of these grid locations is tested for manufacturing defects by automated equipment. Those locations that are found to be defective are recorded and marked with a dot of paint (this process is referred to as "inking a die" and more modern wafer fabrication techniques no longer require physical markings to identify defective die). The wafer is then sawed apart to cut out the individual chips. Those defective chips are thrown away, or recycled, while the working chips are placed into packaging and re-tested for any damage that might occur during the packaging process. Flaws on the surface of the wafers and problems during the layering/depositing process are impossible to avoid, and cause some of the individual chips to be defective. The revenue from the remaining working chips has to pay for the entire cost of the wafer and its processing, including those discarded defective chips. Thus, the higher number of working chips or higher yield, the lower the cost of each individual chip. In order to maximize yield one wants to make the chips as small as possible, so that a higher number of working chips can be obtained per wafer. Lowering cost The significant fraction of the cost of fabrication (typically 30%-50%) is related to testing and packaging the individual chips. Further cost is associated with connecting the chips into an integrated system (usually via a printed circuit board). Wafer-scale integration seeks to reduce this cost, as well as improve performance, by building larger chips in a single package – in principle, chips as large as a full wafer. Of course this is not easy, since given the flaws on the wafers a single large d
https://en.wikipedia.org/wiki/File%20system%20API
A file system API is an application programming interface through which a utility or user program requests services of a file system. An operating system may provide abstractions for accessing different file systems transparently. Some file system APIs may also include interfaces for maintenance operations, such as creating or initializing a file system, verifying the file system for integrity, and defragmentation. Each operating system includes the APIs needed for the file systems it supports. Microsoft Windows has file system APIs for NTFS and several FAT file systems. Linux systems can include APIs for ext2, ext3, ReiserFS, and Btrfs to name a few. History Some early operating systems were capable of handling only tape and disk file systems. These provided the most basic of interfaces with: Write, read and position More coordination such as device allocation and deallocation required the addition of: Open and close As file systems provided more services, more interfaces were defined: Metadata management File system maintenance As additional file system types, hierarchy structure and supported media increased, additional features needed some specialized functions: Directory management Data structure management Record management Non-data operations Multi-user systems required APIs for: Sharing Restricting access Encryption API overviews Write, read and position Writing user data to a file system is provided for use directly by the user program or the run-time library. The run-time library for some programming languages may provide type conversion, formatting and blocking. Some file systems provide identification of records by key and may include re-writing an existing record. This operation is sometimes called PUT or PUTX (if the record exists) Reading user data, sometimes called GET, may include a direction (forward or reverse) or in the case of a keyed file system, a specific key. As with writing run-time libraries may intercede for the user program. Positioning includes adjusting the location of the next record. This may include skipping forward or reverse as well as positioning to the beginning or end of the file. Open and close The open API may be explicitly requested or implicitly invoked upon the issuance of the first operation by a process on an object. It may cause the mounting of removable media, establishing a connection to another host and validating the location and accessibility of the object. It updates system structures to indicate that the object is in use. Usual requirements for requesting access to a file system object include: The object which is to be accessed (file, directory, media and location) The intended type of operations to be performed after the open (reads, updates, deletions) Additional information may be necessary, for example a password a declaration that other processes may access the same object while the opening process is using the object (sharing). This may depend on the in
https://en.wikipedia.org/wiki/David%20Banks%20%28actor%29
David Banks (born 24 September 1951) is an English actor, writer and author. He is best known for playing the Cyber Leader in the Doctor Who stories Earthshock (1982), The Five Doctors (1983), Attack of the Cybermen (1985) and Silver Nemesis (1988). As a theatre actor, he has played many leading roles in London and throughout the UK. He is also the author of several published books. Career Acting His numerous TV appearances include long-running portrayals in Brookside, playing the wrongly convicted murderer Graeme Curtis, and 181 episodes of L!ve TV’s drama series Canary Wharf as Max Armstrong, head of news, who was finally abducted by aliens. He also appeared in EastEnders in 1992, playing the photographer, Gavin, at Michelle Fowler's graduation ceremony. During the 1980s, he was the Cyber Leader in the science fiction series Doctor Who in all stories featuring the Cybermen: Earthshock (1982), The Five Doctors (1983), Attack of the Cybermen (1985) and Silver Nemesis (1988). In 1989, he played the part of Karl the Mercenary in the stage play Doctor Who - The Ultimate Adventure, except for two performances when he appeared as The Doctor, replacing Jon Pertwee who had fallen ill. He writes and directs and has worked extensively as a voice artist, recording over 100 audiobooks – including an unabridged version of J. R. R. Tolkien's The Lord of the Rings (Talking Books, 2006). In 2007, he revived his portrayal of Karl the Mercenary in a Big Finish Productions audio adaptation of Doctor Who - The Ultimate Adventure with Colin Baker as The Doctor. In 2018, he reprised his role as the Cyber Leader for the Big Finish audio story Hour of the Cybermen and again in 2019 for the audio story Conversion. Writing Banks is the author of several published books. In 1988, he wrote Doctor Who – Cybermen, illustrated by Andrew Skilleter (Who Dares Publishing, 1988), which encompasses the history and conceptual origins of cybermen. He adapted the book into four audio cassettes, The ArcHive Tapes, which he also narrated. (These were re-released on CD in 2013 with bonus material by Explore Multimedia.) He later wrote the novel Iceberg (Virgin, 1993) for the Virgin New Adventures range of Doctor Who spin-off novels, which was set in 2006, when an inversion of the Earth's magnetic field is threatening to destroy human civilization, and featured the Cybermen and the investigative journalist Ruby Duvall. His play Severance, about the 12th century lovers Abelard and Heloise, was first performed in 2002. In 2008, he was invited to deliver a paper about cyber emotions entitled "Life as an emotionless killing machine: Cybermen in a Strange State" by the Universities of Sydney and Melbourne. This paper references the recent reappearance of Cybermen on television after a long absence. Filmography Television Notes External links David Banks: Spotlight entry David Banks Dr Who Image Archive 1951 births English male soap opera actors Living people Male actors from Kin
https://en.wikipedia.org/wiki/Gridlock%20%28disambiguation%29
Gridlock is the inability to move on a transport network. Gridlock may also refer to: Gridlock (politics), a situation when the government is unable to act or pass laws because rival parties control different parts of the executive branch and the legislature. Gridlock (novel), a novel by Ben Elton Gridlock (band), an electronic music band Gridlock (game show), a 1990s game show in Ireland Gridlock (board game) "Gridlock", a song by The Pogues from the album Peace and Love "Gridlock", a song by Anthrax from the album Persistence of Time "Gridlock!", a song by Electric Six from the album Heartbeats and Brainwaves Gridlock, a 1996 TV movie starring David Hasselhoff Gridlock'd, a 1997 film "Gridlock" (Doctor Who), an episode of Doctor Who "Gridlock", a music video by Angry Kid Gridlock (film), a 1980 film Gridlock!, a pricing game on the game show The Price Is Right
https://en.wikipedia.org/wiki/Java%20BluePrints
Java BluePrints is Sun Microsystems' best practices for Enterprise Java development. This is Sun's official programming model for Java Platform, Enterprise Edition (Java EE) Software Development Kit (SDK). It began with Java Pet Store, the original reference application for the Java EE platform. This became the de facto source code for using Enterprise JavaBeans and all the latest components of the Java EE platform. History Java BluePrints began as J2EE BluePrints and was started by Connie Weiss, Jeff Jackson, Jim Inscore, Nick Kassem, and Rick Saletta. The original engineers included Inderjeet Singh, Greg Murray, Sean Brydon, Vijay Ramachandran, Elisabeth White, and Nick Kassem. Nick Kassem is the author of the original book. The idea of Java Pet Store came from Connie Weiss and Greg Murray who were both animal lovers. After the first year, Nick Kassem left the team and Inderjeet Singh became lead architect. The Java BluePrints team was led by Larry Freeman from J2EE 1.2 in 2000 up until Java EE 5 in 2006. Throughout its existence, Java BluePrints has offered all of its content for free and has been focused on promoting developer success. Java Pet Store became the symbol for J2EE's ascendency; Microsoft created a competing .NET Pet Shop to showcase its competing technology. Since then, many technologies such as Tapestry, Spring, and others have implemented their own versions of the Pet Store application as a way to demonstrate best practices for their given technology. With the arrival of J2EE 1.4 technology, web services became a standard part of the Java EE specification. Java BluePrints came out with a second application: the Java Adventure Builder reference application. This application never became as popular as Java Pet Store but then again, it never became as controversial. Books There have been three Java BluePrints books, and the Core Java EE design patterns which are hosted on the Java BluePrints site have become the standard lingua for Java EE application development. Java BluePrints was the first source to promote Model View Controller (MVC) and Data Access Object (DAO) for Java EE application development. Before this, the MVC design pattern was widely promoted as part of Smalltalk. The latest Java BluePrints offering is the Java BluePrints Solutions Catalog. It covers topics as diverse as Java Server Faces, Web Services, and Asynchronous Javascript and XML (Ajax). Articles are smaller and more focused and include sample code that shows how a solution is implemented. Its focus is on the J2EE 1.4 SDK. References External links Java BluePrints Web site BluePrints
https://en.wikipedia.org/wiki/Jacksonville%2C%20Tampa%20and%20Key%20West%20Railway
The Jacksonville, Tampa and Key West Railway was a railroad and steamboat network in Florida at the end of the 19th century. Most of its lines became part of the Plant System in 1899 and the Atlantic Coast Line Railroad in 1902. The line remains in service today with a vast majority of it now being CSX Transportation's Sanford Subdivision. History The Tampa, Peace Creek and St. Johns River Railroad was incorporated in 1879, William Van Fleet as president and received a charter to build a railroad from Jacksonville to Tampa. The company , by way of congressional land grants thru the general assembly of Florida, by an act of January 6, 1855, 'to provide for and encourage a liberal system of internal improvements in the state,' declared that the lands granted to the state by the acts of congress of March 3, 1845, and September 28, 1850, together with the proceeds thereof, accrued or that might thereafter accrue, should be set apart and made a separate fund, to be called the internal improvement of the state; and that, for the purpose of assuring a proper application of the fund for the objects mentioned, the lands, and the funds arising from the sale thereof, after paying the necessary expenses of selection, management, and sale, should be vested in five trustees, to wit, in the governor of the state, the comptroller of public accounts, the state treasurer, the attorney general, and the register of state lands, and their successors in office, to hold the same for the uses provided in the act; and by its twenty-ninth section, the general assembly reserved the right to grant to such railroad companies, thereafter chartered, as they might deem proper, upon their compliance with the provisions of the act as to the manner of constructing the road and the drainage of the land, the alternate sections of the 'swamp and overflowed lands' for six miles on each side of the line of the road of any such company. That the Jacksonville, Tampa & Key West Railway Company was incorporated in March 1878, under the general corporation act of the state, of February 1874, by the name of the Tampa, Peace Creek & St. John's River Railroad Company. That the legislature of Florida, by act of March 4, 1879, granted to that company alternate sections of the lands given to the state by the act of congress of September 28, 1850, within six miles on each side of the track or line of its road, provided that the company should comply with the specified provisions of the act of January 6, 1855; and further granted to the company, in consideration of the greatly improved value which would accrue to the state from the construction of the road, 10,000 acres of the same class of lands for each mile of road it might construct, such lands to be of those nearest to the line of the road, its branches and extensions,—this last-named grant being made subject to the rights of all creditors of the internal improvement fund, and to the trusts to which the fund was applicable under the act of
https://en.wikipedia.org/wiki/One-hot
In digital circuits and machine learning, a one-hot is a group of bits among which the legal combinations of values are only those with a single high (1) bit and all the others low (0). A similar implementation in which all bits are '1' except one '0' is sometimes called one-cold. In statistics, dummy variables represent a similar technique for representing categorical data. Applications Digital circuitry One-hot encoding is often used for indicating the state of a state machine. When using binary, a decoder is needed to determine the state. A one-hot state machine, however, does not need a decoder as the state machine is in the nth state if, and only if, the nth bit is high. A ring counter with 15 sequentially ordered states is an example of a state machine. A 'one-hot' implementation would have 15 flip flops chained in series with the Q output of each flip flop connected to the D input of the next and the D input of the first flip flop connected to the Q output of the 15th flip flop. The first flip flop in the chain represents the first state, the second represents the second state, and so on to the 15th flip flop, which represents the last state. Upon reset of the state machine all of the flip flops are reset to '0' except the first in the chain, which is set to '1'. The next clock edge arriving at the flip flops advances the one 'hot' bit to the second flip flop. The 'hot' bit advances in this way until the 15th state, after which the state machine returns to the first state. An address decoder converts from binary to one-hot representation. A priority encoder converts from one-hot representation to binary. Comparison with other encoding methods Advantages Determining the state has a low and constant cost of accessing one flip-flop Changing the state has the constant cost of accessing two flip-flops Easy to design and modify Easy to detect illegal states Takes advantage of an FPGA's abundant flip-flops Using a one-hot implementation typically allows a state machine to run at a faster clock rate than any other encoding of that state machine Disadvantages Requires more flip-flops than other encodings, making it impractical for PAL devices Many of the states are illegal Natural language processing In natural language processing, a one-hot vector is a 1 × N matrix (vector) used to distinguish each word in a vocabulary from every other word in the vocabulary. The vector consists of 0s in all cells with the exception of a single 1 in a cell used uniquely to identify the word. One-hot encoding ensures that machine learning does not assume that higher numbers are more important. For example, the value '8' is bigger than the value '1', but that does not make '8' more important than '1'. The same is true for words: the value 'laughter' is not more important than 'laugh'. Machine learning and statistics In machine learning, one-hot encoding is a frequently used method to deal with categorical data. Because many machine learning models need the
https://en.wikipedia.org/wiki/WMUR-TV
WMUR-TV (channel 9) is a television station licensed to Manchester, New Hampshire, United States, broadcasting ABC programming to most of New Hampshire. Owned by Hearst Television, the station maintains studios on South Commercial Street in downtown Manchester, and its transmitter is located on the south peak of Mount Uncanoonuc in Goffstown. Manchester is part of the larger Boston television market, making WMUR-TV part of a nominal duopoly with that city's ABC affiliate, WCVB-TV (channel 5); however, the two stations maintain separate operations. As a result, WMUR is the only New Hampshire-based television station with a news operation. In addition to WCVB-TV, WMUR-TV shares common coverage areas with four sister stations: the Portland, Maine, duopoly of ABC affiliate WMTW and CW affiliate WPXT; and the Burlington, Vermont, duopoly of CW affiliate WNNE in Montpelier and Plattsburgh, New York–based NBC affiliate WPTZ. History Early years The station signed on the air on March 28, 1954, as the first television station in New Hampshire. It was founded by former governor Francis P. Murphy, owner of WMUR radio (610 AM; now WGIR) through a company known as the Radio Voice of New Hampshire, Inc. Murphy beat out several challengers, including William Loeb III, publisher of the Manchester Union-Leader. It broadcast from a Victorian-style house on Elm Street in Manchester, alongside its sister radio station. In addition to carrying ABC programming (the station having been affiliated with the network since its sign-on), WMUR aired daily newscasts, local game shows and movies. In 1955, channel 9 boosted its signal significantly, providing a strong signal extending well into the Boston area. Murphy was well aware of this and began airing programming that had previously not been available in Boston. The following year, however, Murphy decided to retire. While a buyer was found immediately for the AM station, there were few takers for channel 9. Finally, in early 1957, he agreed in principle to sell WMUR-TV to Storer Broadcasting. However, Storer came under fire when it announced plans to move the station's transmitter to just outside Haverhill, Massachusetts—only north of Boston. It soon became apparent that Storer intended to move all of channel 9's operations across the border to Massachusetts and reorient it as the Boston market's third VHF station. The outcry led regulators to reject Storer's request to build a new tower near Haverhill. Storer then backed out of the deal, and the station remained in Murphy's hands until his death in December 1958. His estate finally sold the station a few months later to Richard Eaton's United Broadcasting. Storer eventually fulfilled their Boston ambitions in 1966 with the purchase of the channel 38 license as WSBK-TV. Soon after taking over, United laid off all but nine of WMUR's employees and reduced local programming to its two daily newscasts. For the next 22 years, United ran channel 9 on a shoestring budget,
https://en.wikipedia.org/wiki/Attack%20of%20the%20Zolgear
is an arcade game for one to six players released by Namco. It is a sequel to Galaxian 3. This game used two LaserDisc players simultaneously for the outer space background, while computer generated graphics were overlaid on top. Synopsis Attack of the Zolgear is set in the time when space exploration has reached its peak. Humanity has since expanded its presence beyond the Milky Way. Around one of the colonies that are part of the current expansion, Exia, there is a moon orbiting around it called Zol. Zol serves as a diplomatic space port of tremendous importance of intergalactic relations, but its gravity is unstable, causing serious problems for spaceships trying to land or take off. Investigations uncovered a gravitational quirk in one of Zol's giant craters, and the search for the source has begun. And the source is found, a horrifying and unspeakable discovery, beneath the crater there is an alien life of unimaginable size—the great threat of humanity—Zolgear. Following its discovery, Zolgear destroys everything on Zol before leaping into space, heading for Exia, with its intent of destroying the colony. Only Dragoon stands in its way and can save the day for Exia: Dragoon J2, more powerful than its precursor, Dragoon, is headed for Exia for the United Galaxy Space Force (UGSF) in a mission to save humanity. In other media Zolgear appears in later Namco games: in Bounty Hounds, player can fight an infant Zolgear. In the canceled Japanese real-time strategy game New Space Order, the Zolgear would have been a player-controllable unit (treated as a "planet buster" unit, which can reduce a targeted planet's population to zero) in the "Sacred Religious State" nation. Notes References External links 1994 video games Arcade video games Arcade-only video games LaserDisc video games Namco arcade games Space trading and combat simulators Video games developed in Japan Video games scored by Shinji Hosoe Video game sequels Galaxian
https://en.wikipedia.org/wiki/List%20of%20Microsoft%20Windows%20application%20programming%20interfaces%20and%20frameworks
The following is a list of Microsoft APIs and frameworks. APIs Current Component Model ActiveX (while not supported in the default web browser Microsoft Edge) Component Object Model (COM) Distributed Component Object Model (DCOM) COM+ Microsoft Data Access Components (MDAC), including: OLE DB Cryptographic API (CAPICOM) ActiveX Data Objects (ADO) Collaboration Data Objects (CDO); Windows Runtime (WinRT) Universal Windows Platform (UWP) DirectShow DirectX Direct2D Direct3D DirectDraw DirectInput DirectMusic DirectPlay DirectSetup DirectSound DirectWrite XACT (Cross-platform Audio Creation Tool) XAudio 2 Media Foundation (Windows Vista / Windows 7) Interface Graphics Device Interface (GDI) and GDI+ Application Programming Interface (API) Messaging Application Programming Interface (MAPI) Remote Application Programming Interface (RAPI) Speech Application Programming Interface (SAPI) Telephony Application Programming Interface (TAPI) Extensible Storage Engine (Jet Blue) Object linking and embedding (OLE) OLE Automation Uniscribe (see Template:Microsoft APIs section: Software Factories) Windows Image Acquisition (WIA) Windows Management Instrumentation (WMI) Winsock Win32 console Windows API (current versions: Win32; Win64) Deprecated Active Scripting Collaboration Data Objects for Windows NT Server Dynamic Data Exchange Older data access technologies Jet Database Engine Data object Jet Data Access Objects Remote Data Objects (RDO) Remote Data Services (RDS) Setup API Windows API (old versions: Win16; Win32s) XNA libraries for cross platform Xbox 360/Windows development Frameworks .NET Framework Remoting, Assemblies, Metadata Common Language Runtime, Common Type System, Global Assembly Cache, Microsoft Intermediate Language, Windows Forms ADO.NET, ASP.NET Windows Communication Foundation (WCF) Windows Presentation Foundation (WPF) Windows Workflow Foundation (WF) Windows CardSpace (WCS) Universal Windows Platform (UWP) Windows PowerShell Microsoft Management Console (MMC) Text Services Framework Windows Driver Model Windows Driver Foundation Libraries Microsoft Foundation Class Library (MFC) Active Template Library (ATL) Framework Class Library (FCL) Object Windows Library (OWL) Standard Template Library (STL) Visual Component Library (VCL) Windows Template Library (WTL) Windows UI Library (WinUI) Text Object Model (TOM) Third parties See also List of Microsoft topics Windows
https://en.wikipedia.org/wiki/Gran%20Canaria%20Airport
Gran Canaria Airport , sometimes also known as Gando Airport (), is a passenger and freight airport on the island of Gran Canaria. It is an important airport within the Spanish air-transport network (owned and managed by a public enterprise, AENA), as it holds the sixth position in terms of passengers, and fifth in terms of operations and cargo transported. It also ranks first of the Canary Islands in all three categories, although the island of Tenerife has higher passenger numbers overall if statistics from the two airports located on the island are combined. The facility covers of land and contains two 3,100m runways. The airport is located in the eastern part of Gran Canaria on the Bay of Gando (Bahía de Gando), to the south of Las Palmas, and from the popular tourist areas in the south. In 2014 it handled over 10.3 million passengers, ranking 1st in the Canary Islands and 5th in Spain by passenger traffic. Gran Canaria Airport is an important hub for passengers travelling to West Africa (Morocco, Mauritania, Senegal, Cape Verde, among others), and to the Atlantic Isles of Madeira and the Azores. It serves as base for Binter Canarias, Canaryfly, Ryanair, Norwegian Air Shuttle and Vueling. Other airlines use it as a base to operate charter flights to Cape Verde and Gambia (TUI fly Deutschland and TUI fly Nordic), but only in the winter. History In 1919, Frenchman Pierre George Latécoère was granted clearance from the French & Spanish governments to establish an airline route between Toulouse and Casablanca. This also included stopovers in Málaga, Alicante and Barcelona. The airport opened on 7 April 1930, after King Alfonso XIII signed a royal order announcing that the military air force installations on the Bay of Gando would become a civilian airfield. In its existence, the airport has become the largest gateway into the Canary Islands, as well as the largest in terms of passenger and cargo operations, although the island of Tenerife has higher passenger numbers overall between the two airports located on the island. In 1946, the old passenger terminal opened, which took two years to build. In 1948 a runway was built, which was completed and fully tarmacked in 1957. In 1963, improvements to the airport were made. This included new parking spaces, enlargement of the terminal and the provision of a visual approach slope indicator system. In 1964, a transmission station was built. In 1966 a new control tower was completed, replacing the old control tower that was constructed in 1946. In 1970, work began on the current passenger terminal which opened in March 1973. During this time, a second runway was being built and this was completed in 1980. On 18 February 1988, Binter Canarias announced that the airline's main base was to be established at Gran Canaria. The base opened on 26 March 1989. In October 1991, the terminal was enlarged with improved facilities so it could handle more passengers. In December 2010, low-cost carrier Ryana
https://en.wikipedia.org/wiki/Islampura
Islampura or Krishan Nagar (former name of this locality) is a residential neighborhood and a Union Council located in Data Gunj Bakhsh Zone, Lahore, Punjab, Pakistan. It is primarily a residential area located adjacent to the Punjab Secretariat. Its postal code is 54000. Education Government Sector Schools Government boys high school Chishtia Government boys high school Islamia. Pakturk marif school islampura Private Scector Schools M.D Junior Model and Higher Scenodary School. Lahore Kids Campus. John McDonald high school References External links Islampura (Lahore) map on wikimapia Data Gunj Bakhsh Zone Populated places in Lahore District
https://en.wikipedia.org/wiki/The%20Principal%20and%20the%20Pauper
"The Principal and the Pauper" is the second episode of the ninth season of the American animated television series The Simpsons. It first aired on the Fox network in the United States on September 28, 1997. In the episode, Seymour Skinner begins to celebrate his twentieth anniversary as principal of Springfield Elementary School, when a man arrives claiming that Skinner has assumed his identity. Principal Skinner admits that his real name is Armin Tamzarian, and that he had thought the true Seymour Skinner, a friend from the Army, had died in the Vietnam War. Armin leaves Springfield, but is later persuaded to return as principal. "The Principal and the Pauper" was written by Ken Keeler and directed by Steven Dean Moore. It guest-starred Martin Sheen as the real Seymour Skinner. Although it aired during the show's ninth season, it was a holdover from season eight. Since its initial airing, the episode is often regarded as one of the most controversial episodes of the entire series. Many fans and critics reacted negatively to the revelation that Principal Skinner, a recurring character since the first episode who had undergone much character development, was an impostor. The episode has been criticized by series creator Matt Groening, and by Skinner's voice actor Harry Shearer. Plot On the eve of his 20th anniversary as school principal (since this episode debuted in 1997, this implies that Skinner was inaugurated as principal in 1977), Seymour Skinner is lured by his mother to Springfield Elementary School for a surprise party. The celebration goes well until a strange man arrives, claiming to be the real Seymour Skinner. Principal Skinner admits that he is an impostor, and that his real name is Armin Tamzarian. Armin then tells the story of the events that led him to steal Seymour Skinner's identity. Armin was once a troubled young man from Capital City who enlisted in the Army in order to avoid a jail sentence for petty crimes (although merely apologizing to his victims was also an option). There, he met and befriended the real Sergeant Seymour Skinner, who became his mentor and helped him find meaning in his troubled life. Seymour told Armin that his dream was to become an elementary school principal in Springfield after the war. Later, Seymour was declared missing and presumed dead. Armin took the news of the apparent death to Seymour's mother, Agnes. Upon meeting him, however, Agnes mistook him for her son, and Armin could not bear to deliver the message. He instead allowed Agnes to call him Seymour, and took over Seymour's life. Meanwhile, the real Seymour Skinner spent five years in a POW camp, then worked in a sweatshop (in Wuhan, China) for two decades until it was shut down by the United Nations. Following these revelations, the people of Springfield begin to distrust Armin, who decides that there is no longer any place for him in Springfield and leaves for Capital City, sadly breaking up with Edna Krabappel in the process. Havin
https://en.wikipedia.org/wiki/OpenCV
OpenCV (Open Source Computer Vision Library) is a library of programming functions mainly for real-time computer vision. Originally developed by Intel, it was later supported by Willow Garage, then Itseez (which was later acquired by Intel). The library is cross-platform and licensed as free and open-source software under Apache License 2. Starting in 2011, OpenCV features GPU acceleration for real-time operations. History Officially launched in 1999 the OpenCV project was initially an Intel Research initiative to advance CPU-intensive applications, part of a series of projects including real-time ray tracing and 3D display walls. The main contributors to the project included a number of optimization experts in Intel Russia, as well as Intel's Performance Library Team. In the early days of OpenCV, the goals of the project were described as: Advance vision research by providing not only open but also optimized code for basic vision infrastructure. No more reinventing the wheel. Disseminate vision knowledge by providing a common infrastructure that developers could build on, so that code would be more readily readable and transferable. Advance vision-based commercial applications by making portable, performance-optimized code available for free – with a license that did not require code to be open or free itself. The first alpha version of OpenCV was released to the public at the IEEE Conference on Computer Vision and Pattern Recognition in 2000, and five betas were released between 2001 and 2005. The first 1.0 version was released in 2006. A version 1.1 "pre-release" was released in October 2008. The second major release of the OpenCV was in October 2009. OpenCV 2 includes major changes to the C++ interface, aiming at easier, more type-safe patterns, new functions, and better implementations for existing ones in terms of performance (especially on multi-core systems). Official releases now occur every six months and development is now done by an independent Russian team supported by commercial corporations. In August 2012, support for OpenCV was taken over by a non-profit foundation OpenCV.org, which maintains a developer and user site. In May 2016, Intel signed an agreement to acquire Itseez, a leading developer of OpenCV. In July 2020, OpenCV announced and began a Kickstarter campaign for the OpenCV AI Kit, a series of hardware modules and additions to OpenCV supporting Spatial AI. In August 2020, OpenCV launched OpenCV.ai – the professional consulting arm. The team of developers provides consulting services and delivers Computer Vision, Machine Learning, and Artificial intelligence solutions. Applications OpenCV's application areas include: 2D and 3D feature toolkits Egomotion estimation Facial recognition system Gesture recognition Human–computer interaction (HCI) Mobile robotics Motion understanding Object detection Segmentation and recognition Stereopsis stereo vision: depth perception from 2 cameras Structure from mot
https://en.wikipedia.org/wiki/Void%20type
The void type, in several programming languages derived from C and Algol68, is the return type of a function that returns normally, but does not provide a result value to its caller. Usually such functions are called for their side effects, such as performing some task or writing to their output parameters. The usage of the void type in such context is comparable to procedures in Pascal and syntactic constructs which define subroutines in Visual Basic. It is also similar to the unit type used in functional programming languages and type theory. See Unit type#In programming languages for a comparison. C and C++ also support the pointer to void type (specified as void *), but this is an unrelated notion. Variables of this type are pointers to data of an unspecified type, so in this context (but not the others) void * acts roughly like a universal or top type. A program can convert a pointer to any type of data (except a function pointer) to a pointer to void and back to the original type without losing information, which makes these pointers useful for polymorphic functions. The C language standard does not guarantee that the different pointer types have the same size or alignment. In C and C++ A function with void result type ends either by reaching the end of the function or by executing a return statement with no returned value. The void type may also replace the argument list of a function prototype to indicate that the function takes no arguments. Note that in all of these situations, void is not a type qualifier on any value. Despite the name, this is semantically similar to an implicit unit type, not a zero or bottom type (which is sometimes confusingly called the "void type"). Unlike a real unit type which is a singleton, the void type lacks a way to represent its value and the language does not provide any way to declare an object or represent a value with type void. In the earliest versions of C, functions with no specific result defaulted to a return type of int and functions with no arguments simply had empty argument lists. Pointers to untyped data were declared as integers or pointers to char. Some early C compilers had the feature, now seen as an annoyance, of generating a warning on any function call that did not use the function's returned value. Old code sometimes casts such function calls to void to suppress this warning. By the time Bjarne Stroustrup began his work on C++ in 1979–1980, void and void pointers were part of the C language dialect supported by AT&T-derived compilers. The explicit use of void vs. giving no arguments in a function prototype has different semantics in C and C++, as detailed in the following table: The C syntax to declare a (non-variadic) function with an as-yet-unspecified number of parameters, e.g. void f() above, was deprecated in C99. In C23 (and C++), a function prototype with empty parentheses declares a function with zero parameters. In Haskell Quite contrary to C++, in the functional p
https://en.wikipedia.org/wiki/Internet%20Locator%20Server
An Internet Locator Server (abbreviated ILS) is a server that acts as a directory for Microsoft NetMeeting clients. An ILS is not necessary within a local area network and some wide area networks in the Internet because one participant can type in the IP address of the other participant's host and call them directly. An ILS becomes necessary when one participant is trying to contact a host who has a private IP address internal to a local area network that is inaccessible to the outside world, or when the host is blocked by a firewall. An ILS is also useful when a participant has a different IP address during each session, e.g., assigned by the Dynamic Host Configuration Protocol. There are two main approaches to using Internet Location Servers: use a public server on the Internet, or run and use a private server. Private Internet Location Server The machine running an Internet Location Server must have a public IP address. If the network running an Internet Location Server has a firewall, it is usually necessary to run the server in the demilitarized zone of the network. Microsoft Windows includes an Internet Location Server. It can be installed in the Control Panel using Add/Remove Windows Components, under "Networking Services" (Site Server ILS Services). The Internet Location Server (ILS) included in Microsoft Windows 2000 offers service on port 1002, while the latest version of NetMeeting requests service from port 389. The choice of 1002 was to avoid conflict with Windows 2000's domain controllers, which use LDAP and Active Directory on port 389, as well as Microsoft Exchange Server 2000, which uses port 389. If the server is running neither Active Directory nor Microsoft Exchange Server, the Internet Location Server's port can be changed to 389 using the following command at a command prompt: ILSCFG [servername] /port 389 Additional firewall issues Internet Location Servers do not address two other issues with using NetMeeting behind a firewall. First, although a participant can join the directory from an external IP address, the participant cannot join a meeting unless the internal host manually adds the participant to the meeting from the directory. Second, while this approach is fine for data conferencing, audio or video conferencing requires opening of a wide range of ports on the firewall. In this case, it may be desirable to use a gateway. See also User Location Service LDAP Windows communication and services
https://en.wikipedia.org/wiki/Packet%20Storm
Packet Storm Security is an information security website offering current and historical computer security tools, exploits, and security advisories. It is operated by a group of security enthusiasts that publish new security information and offer tools for educational and testing purposes. Overview The site was originally created by Ken Williams who sold it in 1999 to Kroll O'Gara and just over a year later, it was given back to the security community. While at Kroll O'Gara, Packet Storm awarded Mixter $10,000 in a whitepaper contest dedicated to the mitigation of distributed denial of service attacks. Today, they offer a suite of consulting services and the site is referenced in hundreds of books. In 2013, Packet Storm launched a bug bounty program to buy working exploits that would be given back to the community for their own testing purposes. Later that year, they worked with a security researcher to help expose a large scale shadow profile issue with the popular Internet site Facebook. After Facebook claimed that only 6 million people were affected, additional testing by Packet Storm exposed that the numbers were not accurately reported. References External links Computer security organizations Computer network security Internet properties established in 1998
https://en.wikipedia.org/wiki/Network%20manager
Network manager may refer to: Network administrator, profession NetworkManager, software utility for Linux and other Unix-like operating systems
https://en.wikipedia.org/wiki/Beyond%20Belief%3A%20Fact%20or%20Fiction
Beyond Belief: Fact or Fiction is an American television anthology series created by Lynn Lehmann, presented by Dick Clark Productions, and produced and aired by the Fox network from 1997 to 2002. Starting in 2021, a fifth season was produced for the German market, where new episodes are released each Halloween. Each episode features stories, all of which appear to defy logic, and some of which are allegedly based on actual events. The viewer is offered the challenge of determining which are true and which are false. At the end of the show, it is revealed to the viewer whether the tales were true or works of fiction. The series was hosted by James Brolin in season one and by Jonathan Frakes from seasons two, onwards. The show was narrated by Don LaFontaine for the first three seasons and by Campbell Lane for the fourth season. The Germany-exclusive fifth season is narrated by Eberhard Prüfer. Format The stories told in the program all have some connection with the supernatural, ghosts, psychic phenomena, coincidences, destiny, or other such unusual occurrences. Each episode of the show, as well as all stories within, are introduced with a pun or some other form of witticism pertaining to the particular story and episode, and they all include the underlying moral that not everything we perceive as truth and falsehood is as such, and that it can often be difficult to truly separate fact from fiction, hence the show's title. Since the Frakes era, the intros are filmed on a set resembling the interior of a Victorian mansion. Each episode typically features five stories, at least one of which is supposedly true and at least one of which is a complete fabrication. The majority of true stories on the show are based on first-hand research conducted by author Robert Tralins yet mostly perpetuate hearsay or urban legends as facts, while many of the ones that turned out to be false are either completely fictional or modern-dressed re-tellings of untrue urban legends. From season two onwards Jonathan Frakes would end each story with a pun related to the story, while James Brolin always retold a story instead of showing a clip. Popularity, cancellation and revivals Beyond Belief: Fact or Fiction had a sporadic airing schedule on its original networks, sometimes going for weeks or even months between airings. There is a two-year lag between Don LaFontaine and Campbell Lane's stints as narrator for the show, during which time it was believed that it had been cancelled, only for it to be brought back for another season in the summer of 2002. It was cancelled after its 2002 season. During his stint as narrator, Lane played the character John August in the Season 4 segment 'The Cigar Box'. In Germany, where Beyond Belief: Fact or Fiction is known as X-Factor: Das Unfassbare (The Unfathomable), the show was especially successful and still has a cult following. This led to the X-Factor brand being extended to other shows: The Paranormal Borderline became X-F
https://en.wikipedia.org/wiki/Supreme%20Council%20of%20ICT%20of%20Iran
SCICT is the main council in Iran for ICT affairs. SCICT is managed by Nasrollah Jahangard. The first form of ICT in Iran was the fax in 1988, and then the computer. Now Iran itself develops ICT. Iranian universities are connected to a gigabit ethernet backbone. Computers have not yet reached all people in Iran. As of 2005, most of the Internet connections are dial-up, but faster ADSL connections are becoming more popular. See also Takfa Communications in Iran Virastyar External links Supreme Council of ICT Government of the Islamic Republic of Iran
https://en.wikipedia.org/wiki/Path%20tracing
Path tracing is a computer graphics Monte Carlo method of rendering images of three-dimensional scenes such that the global illumination is faithful to reality. Fundamentally, the algorithm is integrating over all the illuminance arriving to a single point on the surface of an object. This illuminance is then reduced by a surface reflectance function (BRDF) to determine how much of it will go towards the viewpoint camera. This integration procedure is repeated for every pixel in the output image. When combined with physically accurate models of surfaces, accurate models of real light sources, and optically correct cameras, path tracing can produce still images that are indistinguishable from photographs. Path tracing naturally simulates many effects that have to be specifically added to other methods (conventional ray tracing or scanline rendering), such as soft shadows, depth of field, motion blur, caustics, ambient occlusion, and indirect lighting. Implementation of a renderer including these effects is correspondingly simpler. An extended version of the algorithm is realized by volumetric path tracing, which considers the light scattering of a scene. Due to its accuracy, unbiased nature, and algorithmic simplicity, path tracing is used to generate reference images when testing the quality of other rendering algorithms. However, the path tracing algorithm is relatively inefficient: A very large number of rays must be traced to get high-quality images free of noise artifacts. Several variants have been introduced which are more efficient than the original algorithm for many scenes, including bidirectional path tracing, volumetric path tracing, and Metropolis light transport. History The rendering equation and its use in computer graphics was presented by James Kajiya in 1986. Path tracing was introduced then as an algorithm to find a numerical solution to the integral of the rendering equation. A decade later, Lafortune suggested many refinements, including bidirectional path tracing. Metropolis light transport, a method of perturbing previously found paths in order to increase performance for difficult scenes, was introduced in 1997 by Eric Veach and Leonidas J. Guibas. More recently, CPUs and GPUs have become powerful enough to render images more quickly, causing more widespread interest in path tracing algorithms. Tim Purcell first presented a global illumination algorithm running on a GPU in 2002. In February 2009, Austin Robison of Nvidia demonstrated the first commercial implementation of a path tracer running on a GPU , and other implementations have followed, such as that of Vladimir Koylazov in August 2009. This was aided by the maturing of GPGPU programming toolkits such as CUDA and OpenCL and GPU ray tracing SDKs such as OptiX. Path tracing has played an important role in the film industry. Earlier films had relied on scanline rendering to produce CG visual effects and animation. In 1998, Blue Sky Studios rendered the Academy
https://en.wikipedia.org/wiki/Markie%20Mark
Mark Strippel is the former Head of Content Commissioning at BBC Radio 1Xtra and BBC Asian Network. Early life Strippel was born in Hounslow, West London and studied at Lampton School, Queen Mary and Westfield and the University of Law. Career In 2001, Strippel was a founding member of Panjabi Hit Squad. The group were signed to Def Jam UK, leading to remixes for Ashanti, Mariah Carey, Beenie Man and various compilation albums. He joined the BBC in 2003 as a DJ on BBC Radio 1Xtra and was part of the original launch line-up, staying until 2007 when he moved into a management role as Head of Music at BBC Asian Network. In 2017, he was given responsibility for BBC Radio 1Xtra in a leadership role. He is responsible for strategic direction, content commissioning and talent for BBC Radio 1Xtra with signings including Kenny Allstar, Snoochie Shy, Sir Spyro, Reece Parkinson, Nadia Jae, Big Zuu, Jeremiah Asiamah and Moses Boyd. In 2018, he defended the BBC's responsibility to play drill music, highlighting the need to balance "a commitment to UK music and the scene with a duty of care to audiences." In late 2018, Strippel signed Tiffany Calver as the new face of the 1Xtra Rap Show, Europe's biggest hip-hop radio platform. References External links Markie Mark Biography at BBC Press Office Markie Mark appointment as Head of Music at BBC Asian Network - BBC Press Office 1974 births Living people English DJs BBC Asian Network
https://en.wikipedia.org/wiki/Unidirectional%20Link%20Detection
Unidirectional Link Detection (UDLD) is a data link layer protocol from Cisco Systems to monitor the physical configuration of the cables and detect unidirectional links. UDLD complements the Spanning Tree Protocol which is used to eliminate switching loops. Unidirectional Link Detection (UDLD) is one of two major features (UDLD and loop guard) in Cisco Switches to prevent Layer 2 loops. Spanning-Tree Protocol (STP) resolves redundant physical topology into a loop-free, tree-like forwarding topology via blocking one or more ports. However, Unidirectional Link failure can cause "traffic blackholing" and loops in the Switch topology. In order to detect the unidirectional links before the forwarding loop is created, UDLD works by exchanging protocol packets between the neighboring devices. In order for UDLD to work, both switch devices on the link must support UDLD and have it enabled on respective ports. Description If two devices, A and B, are connected via a pair of optical fibers, one used for sending from A to B and other for sending from B to A, the link is bidirectional (two-way). If one of these fibers is broken, the link has become one-way or unidirectional. The goal of the UDLD protocol is to detect a broken bidirectional link (e.g. transmitted packets do not arrive at the receiver, or the fibers are connected to different ports). For each device and for each port, a UDLD packet is sent to the port it links to. The packet contains sender identity information (device and port), and expected receiver identity information (device and port). Each port checks that the UDLD packets it receives contain the identifiers of his own device and port. UDLD is a Cisco-proprietary protocol but HP, Extreme Networks, and AVAYA all have a similar feature calling it by a different name. HP calls theirs Device Link Detection Protocol (DLDP). Extreme Networks call it Extreme Link Status Monitoring (ELSM) and AVAYA calls theirs, Link-state Tracking. Brocade/Ruckus Networks ICX Switches offer this feature as Uni-Directional Link Detection(UDLD). Similar functionality in a standardized form is provided as part of the Ethernet OAM protocol that is defined as part of the Ethernet in the First Mile changes to 802.3 (previously 802.3ah). D-Link has their DULD feature built on top of Ethernet OAM function. Brocade devices running Ironware support a proprietary form of UDLD. The use of UDLD over 10GbE is augmented, as per 802.3ae/D3.2 standard, when a fault is detected in the physical link: The local device signals local fault is signaled by PHY The local device ceases transmission of MAC frames and transmits remote fault The remote device receives remote fault and stops sending frames and continuously generates idle frames External links Understanding and Configuring the Unidirectional Link Detection Protocol Feature at Cisco Systems http://docs.ruckuswireless.com/fastiron/08.0.30/fastiron-08030-l2guide/GUID-CE29A0CF-07A6-40C3-A999-9AF5FB8AC020.
https://en.wikipedia.org/wiki/SGML%20entity
In the Standard Generalized Markup Language (SGML), an entity is a primitive data type, which associates a string with either a unique alias (such as a user-specified name) or an SGML reserved word (such as #DEFAULT). Entities are foundational to the organizational structure and definition of SGML documents. The SGML specification defines numerous entity types, which are distinguished by keyword qualifiers and context. An entity string value may variously consist of plain text, SGML tags, and/or references to previously defined entities. Certain entity types may also invoke external documents. Entities are called by reference. Entity types Entities are classified as general or parameter: A general entity can only be referenced within the document content. A parameter entity can only be referenced within the document type definition (DTD). Entities are also further classified as parsed or unparsed: A parsed entity contains text, which will be incorporated into the document and parsed if the entity is referenced. A parameter entity can only be a parsed entity. An unparsed entity contains any kind of data, and a reference to it will result in the application's merely being notified of the entity's presence; the content of the entity will not be parsed, even if it is text. An unparsed entity can only be external. Internal and external entities An internal entity has a value that is either a literal string, or a parsed string comprising markup and entities defined in the same document (such as a Document Type Declaration or subdocument). In contrast, an external entity has a declaration that invokes an external document, thereby necessitating the intervention of an entity manager to resolve the external document reference. System entities An entity declaration may have a literal value, or may have some combination of an optional SYSTEM identifier, which allows SGML parsers to process an entity's string referent as a resource identifier, and an optional PUBLIC identifier, which identifies the entity independent of any particular representation. In XML, a subset of SGML, an entity declaration may not have a PUBLIC identifier without a SYSTEM identifier. SGML document entity When an external entity references a complete SGML document, it is known in the calling document as an SGML document entity. An SGML document is a text document with SGML markup defined in an SGML prologue (i.e., the DTD and subdocuments). A complete SGML document comprises not only the document instance itself, but also the prologue and, optionally, the SGML declaration (which defines the document's markup syntax and declares the character encoding). Syntax An entity is defined via an entity declaration in a document's document type definition (DTD). For example: <!ENTITY greeting1 "Hello world"> <!ENTITY greeting2 SYSTEM "file:///hello.txt"> <!ENTITY % greeting3 "¡Hola!"> <!ENTITY greeting4 "%greeting3; means Hello!"> This DTD markup declares the following: An internal
https://en.wikipedia.org/wiki/Lok%20Ma%20Chau%20station
Lok Ma Chau is the northwestern terminus in Lok Ma Chau on the Lok Ma Chau Spur Line, a branch line of the of Hong Kong's MTR network, which was built to alleviate the immigration checkpoint between Hong Kong and mainland China's Shenzhen at Lo Wu station. The MTR Corporation is promoting the Lok Ma Chau Spur Line as a direct connection with of the Shenzhen Metro, which is also operated by the MTR Corporation alongside . On 4 February 2020, MTR has temporarily closed this station and suspended train service to and from this station following the Government's measures to contain the outbreak of the COVID-19 pandemic. The station reopened on the 8th January, 2023. History Lok Ma Chau station, together with the spur line, opened on the afternoon of 15 August 2007. The adjoining Futian Checkpoint station on Line 4 of the Shenzhen Metro opened on 28 June 2007. Like Lo Wu station, this station is located in the Frontier Closed Area, hence access is restricted to passengers with a permit or a passport and visa to mainland China. On 2 December 2007, this station was leased to the MTR Corporation, along with the entire KCR network, by the Kowloon-Canton Railway Corporation, for a period of 50 years, giving Lok Ma Chau station the shortest station life under KCR operation. Station layout Lok Ma Chau Spur Line Control Point The Lok Ma Chau Spur Line Control Point () is an immigration control point connected with the Lok Ma Chau station. It is the second control point along the land border of Hong Kong to have a railway access. The control point is connected via a pedestrian footbridge to the Futian Port, an immigration port of entry of the PRC, and from there to Shenzhen Metro's Futian Checkpoint station. The control point was opened on 15 August 2007 together with the opening of the KCR Lok Ma Chau Spur Line between Lok Ma Chau and Sheung Shui station. The crossing consists of a cable-stay double-deck pedestrian bridge across the Sham Chun River, which forms the border between Hong Kong and the rest of the PRC. The lower deck handles pedestrians heading from Hong Kong to Futian Port, while the upper deck handles those coming from Futian Port to Hong Kong. Immigration facilities are located within the station building on both ends of the bridge. Electricity to the Hong Kong half of the bridge is provided by CLP Power, and Hong Kong's jurisdiction and law enforcement on the bridge also terminate at the midpoint, as on the Lo Wu Bridge. The control point is open between 06:30 and 22:30, unlike the 24-hour vehicle Lok Ma Chau Control Point nearby. Later pedestrian crossing can be made at Lo Wu Control Point, until 00:00. Although the Lok Ma Chau Spur Line Control Point is often referred to as a railway crossing, it is in fact a pedestrian crossing, unlike the Lo Wu Control Point, where no bus or any other public transport can reach. Furthermore, there is no through-train service, as the railway line is not connected with the railways in mainland Ch
https://en.wikipedia.org/wiki/Goto%20%28disambiguation%29
goto is a statement found in many computer programming languages. Goto may also refer to: Places Gotō, Nagasaki, a city in Japan Gotō Islands, Japanese islands in the East China Sea People Gotō (surname), a Japanese surname, including a list of people with the name Kazushige Goto, a software engineer who developed the highly optimized GotoBLAS linear algebra library Arts, entertainment, and media G0-T0, a droid in the video game Star Wars: Knights of the Old Republic II – The Sith Lords Goto Dengo, a character in Neal Stephenson's 1999 novel Cryptonomicon The Goto Family, a powerful Yakuza family from The Raid 2 Hideaki Goto, Yakuza boss and head of Goto Family Keiichi Goto, son of Hideaki Goto and heir of Goto Family Organizations GoTo.com, later Overture Services, Inc., a pay-for-placement Internet search service acquired by Yahoo! Goto-gumi, a Japanese yakuza organization GoTo (Indonesian company), an Indonesian holding company which is the parent company of Gojek and Tokopedia GoTo (US company), an American software company based in Boston, Massachusetts. Formerly known as LogMeIn, Inc. Other uses GoTo (telescopes), a type of telescope mount and related software Goto (food), a kind of Philippine rice congee ~Go To~, an alternative name for the 2019 Bring Me the Horizon album Music to Listen To... See also Go (disambiguation)
https://en.wikipedia.org/wiki/Double%20compare-and-swap
Double compare-and-swap (DCAS or CAS2) is an atomic primitive proposed to support certain concurrent programming techniques. DCAS takes two not necessarily contiguous memory locations and writes new values into them only if they match pre-supplied "expected" values; as such, it is an extension of the much more popular compare-and-swap (CAS) operation. DCAS is sometimes confused with the double-width compare-and-swap (DWCAS) implemented by instructions such as x86 CMPXCHG16B. DCAS, as discussed here, handles two discontiguous memory locations, typically of pointer size, whereas DWCAS handles two adjacent pointer-sized memory locations. In his doctoral thesis, Michael Greenwald recommended adding DCAS to modern hardware, showing it could be used to create easy-to-apply yet efficient software transactional memory (STM). Greenwald points out that an advantage of DCAS vs CAS is that higher-order (multiple item) CASn can be implemented in O(n) with DCAS, but requires O(n log p) time with unary CAS, where p is the number of contending processes. One of the advantages of DCAS is the ability to implement atomic deques (i.e. doubly linked lists) with relative ease. More recently, however, it has been shown that an STM can be implemented with comparable properties using only CAS. In general however, DCAS is not a silver bullet: implementing lock-free and wait-free algorithms using it is typically just as complex and error-prone as for CAS. Motorola at one point included DCAS in the instruction set for its 68k series; however, the slowness of DCAS relative to other primitives (apparently due to cache handling issues) led to its avoidance in practical contexts. , DCAS is not natively supported by any widespread CPUs in production. The generalization of DCAS to more than two addresses is sometimes called MCAS (multi-word CAS); MCAS can be implemented by a nestable LL/SC, but such a primitive is not directly available in hardware. MCAS can be implemented in software in terms of DCAS, in various ways. In 2013, Trevor Brown, Faith Ellen, and Eric Ruppert have implemented in software a multi-address LL/SC extension (which they call LLX/SCX) that while being more restrictive than MCAS enabled them, via some automated code generation, to implement one of the best performing concurrent binary search tree (actually a chromatic tree), slightly beating the JDK CAS-based skip list implementation. In general, DCAS can be provided by a more expressive hardware transactional memory. IBM POWER8 and Intel Intel TSX provide working implementations of transactional memory. Sun's cancelled Rock processor would have supported it as well. References External links US Patent 4584640 Method and apparatus for a compare and swap instruction Concurrency control
https://en.wikipedia.org/wiki/PICMG
PICMG, or PCI Industrial Computer Manufacturers Group, is a consortium of over 140 companies. Founded in 1994, the group was originally formed to adapt PCI technology for use in high-performance telecommunications, military, and industrial computing applications, but its work has grown to include newer technologies. PICMG is distinct from the similarly named and adjacently-focused PCI Special Interest Group (PCI-SIG). PICMG currently focuses on developing and implementing specifications and guidelines for open standardsbased computer architectures from a wide variety of interconnects. Background PICMG is a standards development organization in the embedded computing industry. Members work collaboratively to develop new specifications and enhancements to existing ones. The members benefit from participating in standards development, gain early access to leading-edge technology, and forging relationships with thought leaders and suppliers in the industry. The original PICMG mission was to provide extensions to the PCI standard developed by PCI-SIG for a range of applications. The organization's collaborations eventually expanded to include a variety of interconnect technologies for industrial computing and telecommunications. PICMG's specifications are used in a wide variety of industries including industrial automation, military, aerospace, telecommunications, medical, gaming, transportation, physics/research, test and measurement, energy, drone/robotics, and general embedded computing. In 2011, PICMG completed its transfer of assets from the Communications Platforms Trade Association (CP-TA). Since 2006, CP-TA had been a collaboration of communications vendors, developing interoperability testing requirements, methodologies, and procedures based on open specifications from PICMG, The Linux Foundation, and the Service Availability Forum. PICMG has continued the educational and marketing outreach formerly conducted by members of the CP-TA marketing work group. the benefits of open specifications and standards include multiple sources, scalability and upgrades, a large ecosystem of interoperable products, proven and tested designs, etc. But they should not be confused with open source. Open source groups tend to focus on specific product designs where even the Gerber files, schematics, and mechanical drawings are included. This lends itself to monochrome, commodity products with little differentiation. Open specification/open standard groups on the other hand define focus on common interfaces for interoperable products rather than finished products. Multiple vendors contribute to the base definitions and interfaces, but the implementation varies greatly. The result is a variety of interoperable products with a wide range of applications. Specification naming convention For many years, PICMG used a numerical naming convention with specification being referred to as “PICMG X.YY”. Where X was used denoted differing form factors ("1" for slot ca
https://en.wikipedia.org/wiki/Twelf
Twelf is an implementation of the logical framework LF developed by Frank Pfenning and Carsten Schürmann at Carnegie Mellon University. It is used for logic programming and for the formalization of programming language theory. Introduction At its simplest, a Twelf program (called a "signature") is a collection of declarations of type families (relations) and constants that inhabit those type families. For example, the following is the standard definition of the natural numbers, with standing for zero and the successor operator. nat : type. z : nat. s : nat -> nat. Here is a type, and and are constant terms. As a dependently typed system, types can be indexed by terms, which allows the definition of more interesting type families. Here is a definition of addition: plus : nat -> nat -> nat -> type. plus_zero : {M:nat} plus M z M. plus_succ : {M:nat} {N:nat} {P:nat} plus M (s N) (s P) <- plus M N P. The type family is read as a relation between three natural numbers , and , such that . We then give the constants that define the relation: the constant indicates that . The quantifier can be read as "for all of type ". The constant defines the case for when the second argument is the successor of some other number (see pattern matching). The result is the successor of , where is the sum of and . This recursive call is made via the subgoal , introduced with . The arrow can be understood operationally as Prolog's , or as logical implication ("if M + N = P, then M + (s N) = (s P)"), or most faithfully to the type theory, as the type of the constant ("when given a term of type , return a term of type "). Twelf features type reconstruction and supports implicit parameters, so in practice, one usually does not need to explicitly write (etc.) above. These simple examples do not display LF's higher-order features, nor any of its theorem checking capabilities. See the Twelf distribution for its included examples. Uses Twelf is used in several different ways. Logic programming Twelf signatures can be executed via a search procedure. Its core is more sophisticated than Prolog, since it is higher-order and dependently typed, but it is restricted to pure operators: there is no cut or other extralogical operators (such as ones for performing I/O) as are often found in Prolog implementations, which may make it less well-suited for practical logic programming applications. Some uses of Prolog's cut rule can be obtained by declaring that certain operators belong to deterministic type families, which avoids recalculation. Also, like λProlog, Twelf generalizes Horn clauses to hereditary Harrop formulas, which allow for logically well-founded operational notions of fresh-name generation and scoped extension of the clause database. Formalizing mathematics Twelf is mainly used today as a system for formalizing mathematics, especially the metatheory of programming languages. As such, it is closely related to Coq and Isabell
https://en.wikipedia.org/wiki/ICT%201301
The ICT 1301 and its smaller derivative ICT 1300 were early business computers from International Computers and Tabulators. Typical of mid-sized machines of the era, they used core memory, drum storage and punched cards, but they were unusual in that they were based on decimal logic instead of binary. Description The 1301 was the main machine in the line. Its main memory came in increments of 400 words of 48 bits (12 decimal digits or 12 four-bit binary values, 0-15) plus two parity bits. The maximum size was 4,000 words. It was the first ICT machine to use core memory. Backing store was magnetic drum and optionally one-inch-, half-inch- or quarter-inch-wide magnetic tape. Input was from 80-column punched cards and optionally 160-column punched cards and punched paper tape. Output was to 80-column punched cards, line printer, and optionally to punched paper tape. The machine ran at a clock speed of 1 MHz and its arithmetic logic unit (ALU) operated on data in a serial-parallel fashion—the 48-bit words were processed sequentially four bits at a time. A simple addition took 21 clock cycles; hardware multiplication averaged 170 clock cycles per digit; and division was performed in software. A typical 1301 requires 700 square feet (65 square metres) of floor space and weighs about . It consumes about 13kVA of three-phase electric power. The electronics consist of over 4,000 printed circuit boards each with many germanium diodes (mainly OA5), germanium transistors (mainly Mullard GET872), resistors, capacitors, inductors, and a handful of thermionic valves and a few dozen relays operated when buttons were pressed. Integrated circuits were not available commercially at the time. History The 1301 was designed by an ICT and GEC joint subsidiary, Computer Developments Limited (CDL) at GEC's Coventry site formed in 1956. CDL was taken over by ICT, but the 1301 was built at the GEC site as ICT lacked the manufacturing capability at that time. The computer was announced in May 1960, though development had started much earlier. The first customer delivery was in 1962, a 1301 sold to the University of London. One of their main attractions was that they performed British currency calculations (pounds, shillings and pence) in hardware. They also had the advantage of programmers not having to learn binary or octal arithmetic as the instruction set was pure decimal and the arithmetic unit had no binary mode, only decimal or pounds, shillings and pence. The London University machine was restored to working condition by a group of enthusiasts completing their task in 2012. Over 200 computers in the range were delivered, making it the best selling second generation British computer. Had the development been faster, it would have had more commercial potential. Peripherals Standard The card reader could read 600 standard punched cards per minute, each with a capacity of up to 80 characters. The card punch could punch 100 cards per minute. The line printer
https://en.wikipedia.org/wiki/Six%20Degrees%3A%20The%20Science%20of%20a%20Connected%20Age
Six Degrees: The Science of a Connected Age (2004 in paperback, and 2003 in hardcover, ) is a popular science book by Duncan J. Watts covering the application of network theory to sociology. The book covers Watts' own work on small-world networks, and continues on to cover scale-free networks, network searching, epidemics and network failures, social decision-making, thresholds in networks, and innovation in large organizations and its lack. In addition to covering the theoretical models and empirical case studies, the book also includes several stories about the character of the researchers who developed this science and their relationships with each other. The case studies used include blackouts in the North American electricity distribution network, the relationships among members of corporate boards of directors, the distribution of wealth in societies, peer-to-peer file-sharing systems, computer viruses, economic bubbles, and the 1997 Aisin fire crisis at Toyota. See also Social network References Publisher's site Book review in The Guardian (UK Newspaper) 2003 books Networks Sociology books
https://en.wikipedia.org/wiki/Hypernauts
Hypernauts is a proof of concept show produced by Foundation Imaging and Netter Digital Entertainment. To further prove that the computer-generated imagery and visual effects created in Babylon 5 were easily applied to other venues, the Hypernauts were born. ABC purchased thirteen episodes of the show from DIC Productions, L.P., eight of which ran on Saturday mornings for a single season in 1996 at 10:00 AM. ABC decided not to pick up the series for a second season, and did not air the five remaining episodes. The show was created and produced by Ron Thornton and Douglas Netter, its executive story editor was Christy Marx, who also wrote four episodes. Marx had previously written for both Babylon 5 and Captain Power. Another series writer was Katherine Lawrence who was nominated for a Writers Guild of America Award due to her script for Ice Bound. Plot Due to its lineage, Hypernauts featured relatively detailed designs of its technology and its aliens, as well as a fairly intricate plot, especially for a Saturday morning children's series. The premise of the series was that three cadets from the Academy of Galactic Exploration become lost in a Hyper Bubble (hyperspace) mid-jump and must band together with an alien named Kulai in order to survive in an unfamiliar part of the galaxy. Kulai (unbeknownst to the cadets) is a Chalim priestess from a planet called Pyria, a planet that was strip-mined by a warlike race called the Triiad, led by the Pyran traitor, Paiyin. The sole purpose of the Triiad is to wipe out intelligent races, and in the process acquire raw materials from their destroyed planets to continually create new war machines using automated self-replicating factory ships called "Makers". The Hypernauts, as they are called in the academy, cannot match the Triiad's firepower with their own so they must rely on stealth, wits and (occasionally) their modified "mech suits" in order to escape the Triiad. They are based in an ancient abandoned exploration ship called the Star Ranger which is hidden in an asteroid field. The ship's obsolete AI is named Horten. For long-range missions they use a four-person "jump" ship called the Flapjack which is Hyper Bubble capable but has a short range, unlike a full-fledged exploration ship. They use the Star Ranger as a mother ship (with fusion engines) and with its vast database of explored nearby planets, they continue exploring (as they are trained to). After learning of the Hypernauts (from their first encounter with Paiyin), the Triiad have activated and englobed the central region of the Milky Way Galaxy in a sensor net called "The Sphere of Interception", which can identify any end-to-end destination point for any hyperspace jump passing in and out of it (which includes any form of communication) so returning/calling home would lead the Triiad directly to Earth. The Hypernauts must keep the location of Earth a secret and somehow try to warn Earth of the Triiad's existence. Hypernauts characters
https://en.wikipedia.org/wiki/Text%20sim
Text sims are computer or video games that focus on using a text based element to simulate some aspect of the real world. Text sims typically focus on creating as detailed a simulation of their object as possible, and therefore, other traditional game elements are often set aside in pursuit of creating an accurate simulation experience for the user. This pursuit of accurate simulation often comes at the expense of some or most audio or graphical elements. Numerous examples of soundless and graphic-light text sims exist. The best selling text sim of all time is the Championship Manager/Football Manager series, published by Sports Interactive games, sold in America as Worldwide Soccer Manager. This soccer text simulation is an advanced version of a text sim with a 2D graphical sim engine for soccer games. There are several genres of text sims. The most popular may be the sports text sim. In addition to the above-mentioned Football Manager, there are several text-based sim games in baseball, football, basketball, hockey, even wrestling. This genre is typically heavy is stats, and some games have been compared to spreadsheets with all of their detail to simulating the true environment of the sport. One of the flagship products of the sports text sim is Front Office Football, which is renowned for creating a very accurate experience as a general manager of a professional football team while also retaining a heavy statistical engine. Out of the Park Baseball is another example of such a sports sim with a true-to-life experience. Another genre of text sims is the tycoon genre. Although early entrants in the tycoon genre were graphically based, such as Railroad Tycoon and later Roller Coaster Tycoon, a large number of tycoon clones arose. The tycoon genre focuses on an economic simulation of one or more commercial elements. Many recent budget tycoon games have more in common with text sims than the original games, often retaining graphics merely as an interface to appeal to the general audience. Examples of these games include Coffee Tycoon, where a player runs a coffee shop franchise; Hollywood Mogul, where the player creates and runs a movie studio; and Starship Tycoon where the player manages a merchant spaceship plying the trade routes in the future. One of the earliest text sims was a simplistic economics-based game, called Lemonade Stand, where the player takes on the role of a child managing his lemonade stand. A third text sim genre is the political simulation. Political enterprises such as elections lend themselves well to the statistics-oriented text sim gaming. These text sims often focus on elections, although a few chose instead to focus on the running on a country. Due to the nature of this genre, it often relies on a graphical interface, typically a map. However, the game information is delivered in a text-based format. Examples of this genre include The Political Machine and Power Politics, where the player tries to win an election fo
https://en.wikipedia.org/wiki/Scientific%20community%20metaphor
In computer science, the scientific community metaphor is a metaphor used to aid understanding scientific communities. The first publications on the scientific community metaphor in 1981 and 1982 involved the development of a programming language named Ether that invoked procedural plans to process goals and assertions concurrently by dynamically creating new rules during program execution. Ether also addressed issues of conflict and contradiction with multiple sources of knowledge and multiple viewpoints. Development The scientific community metaphor builds on the philosophy, history and sociology of science. It was originally developed building on work in the philosophy of science by Karl Popper and Imre Lakatos. In particular, it initially made use of Lakatos' work on proofs and refutations. Subsequently, development has been influenced by the work of Geof Bowker, Michel Callon, Paul Feyerabend, Elihu M. Gerson, Bruno Latour, John Law, Karl Popper, Susan Leigh Star, Anselm Strauss, and Lucy Suchman. In particular Latour's Science in Action had great influence. In the book, Janus figures make paradoxical statements about scientific development. An important challenge for the scientific community metaphor is to reconcile these paradoxical statements. Qualities of scientific research Scientific research depends critically on monotonicity, concurrency, commutativity, and pluralism to propose, modify, support, and oppose scientific methods, practices, and theories. Quoting from Carl Hewitt, scientific community metaphor systems have characteristics of monotonicity, concurrency, commutativity, pluralism, skepticism and provenance. monotonicity: Once something is published it cannot be undone. Scientists publish their results so they are available to all. Published work is collected and indexed in libraries. Scientists who change their mind can publish later articles contradicting earlier ones. concurrency: Scientists can work concurrently, overlapping in time and interacting with each other. commutativity: Publications can be read regardless of whether they initiate new research or become relevant to ongoing research. Scientists who become interested in a scientific question typically make an effort to find out if the answer has already been published. In addition they attempt to keep abreast of further developments as they continue their work. pluralism: Publications include heterogeneous, overlapping and possibly conflicting information. There is no central arbiter of truth in scientific communities. skepticism: Great effort is expended to test and validate current information and replace it with better information. provenance: The provenance of information is carefully tracked and recorded. The above characteristics are limited in real scientific communities. Publications are sometimes lost or difficult to retrieve. Concurrency is limited by resources including personnel and funding. Sometimes it is easier to rederive a
https://en.wikipedia.org/wiki/Smoking%20clover
According to the Jargon File, smoking clover is a computer display hack, originally created by Bill Gosper. Several converging lines are drawn on a color monitor in such a way that every pixel struck has its color incremented—altered to the next hue up or down. The color map is then repeatedly rotated. The result of this is a rainbow-hued, shimmering four-leaf clover. The program has been described as "psychedelic", and Gosper joked about keeping it a secret from the Food and Drug Administration (FDA) due to its "hallucinogenic properties". Source code for Linux to reproduce the effect is available on the web. Notes Psychedelia Novelty software
https://en.wikipedia.org/wiki/Psion%20netBook
The Psion netBook is a small subnotebook computer developed by Psion. Released in 1999, it was for the mobile enterprise market. Description Similar in design to the later, consumer-oriented Psion Series 7, the netBook has a clamshell design, a Video Graphics Array (VGA) resolution touch-sensitive colour screen, 32 MB random-access memory (RAM), 190 MHz StrongARM SA-1100 processor and a QWERTY computer keyboard. The RAM is upgradeable by adding an extra 32 MB chip. The netBook is powered by a removable rechargeable lithium-ion battery, giving a battery life of 8 to 10 hours. The netBook runs the EPOC ER5 operating system, the predecessor of Symbian OS. Unlike the Psion Series 7, the netBook operating system runs from RAM. A Java virtual machine runtime system (environment), conforming to Java version 1.1.8, is available. In October 2003, Psion Teklogix announced the NetBook Pro, replacing the original netBook. This was similar to the earlier model, but upgraded with a 16-bit colour Super VGA (SVGA, 800 × 600 pixel) display, 128 MB of RAM, and a 400 MHz Intel XScale PXA255 processor running Windows CE .NET Framework 4.2 instead of EPOC. It is also possible to run Linux on this model. An open-source project OpenPsion, formerly PsiLinux, ported Linux to the Psion netBook and other Psion PDAs. Included software Agenda – a personal information management program Bombs – a minesweeper game Calc – a calculator Comms – a terminal emulator Contacts – a contacts manager Data – a flat-file database program Email – an email, SMS and fax client Jotter – a multipage scratchpad NetStatRF – a Wi-Fi card monitor Program – an Open Programming Language (OPL) editor Record – a voice recording program, for use with the in-built microphone Sheet – a spreadsheet and graphing package Sketch – a drawing program (for use with the touch-screen interface) Spell – a spellchecker, thesaurus and anagram program Time – a world clock and alarm program Opera – a web browser Word – a word processor The Netbook trademark Psion registered the trademark NETBOOK in various territories, including European Union and , which was applied for on 18 December 1996 and registered by United States Patent and Trademark Office (USPTO) on 21 November 2000. They used this trademark for the netBook product, discontinued in November 2003, and from October 2003, the NETBOOK PRO, later also discontinued. Intel began use of the term netbook in March 2008 as a generic term to describe "small laptops that are designed for wireless communication and access to the Internet", believing they were "not offering a branded line of computers here" and "see no naming conflict". In response to the growing use of this term, on 23 December 2008, Psion Teklogix sent cease and desist letters to various parties including enthusiast website(s) demanding they no longer use the term "netbook". During the twelve years since Psion first lodged the original netbook trademark, the term had become p
https://en.wikipedia.org/wiki/Analog%20modeling%20synthesizer
An analog modeling synthesizer is a synthesizer that generates the sounds of traditional analog synthesizers using digital signal processing components and software algorithms. Analog modeling synthesizers simulate the behavior of the original electronic circuitry in order to digitally replicate their tone. This method of synthesis is also referred to as virtual analog or VA. Analog modeling synthesizers can be more reliable than their true analog counterparts since the oscillator pitch is ultimately maintained by a digital clock, and the digital hardware is typically less susceptible to temperature changes. While analog synthesizers need an oscillator circuit for each voice of polyphony, analog modeling synthesizers do not face this problem. This means that many of them, especially the more modern models, can produce as many polyphonic voices as the CPU on which they run can handle. Modeling synths also provide patch storage capabilities and MIDI support not found on most true analog instruments. Analog modeling synthesizers that run entirely within a host computer operating system are typically referred to as analog software synthesizers. The term was not used until the 1990s when the Nord Lead came out. Examples of VA synthesizers include: Access Virus line of VA synths AKAI Miniak virtual analog synthesizer from AKAI Professional Alesis Ion, Micron and Fusion Arturia Origin Clavia Nord Lead and Nord Modular series Korg Z1, Prophecy, MS-2000, microKORG, RADIAS, R3, KingKORG, Electribe Kurzweil PC3X M-Audio Venom Novation Supernova, Supernova II, Nova, A-Station, K-Station, X-Station, XioSynth, Ultranova, MiniNova Oberheim OB12 Quasimidi Raven, Rave-O-Lution, Polymorph, Sirius Roland JP-8000, JP-8080, V-Synth, SH-201, SH-01 Gaia, JU-06, SH-32, Aira System-8, Aira System-1 Waldorf Q, Q+, MicroQ and Blofeld Yamaha AN1x, Yamaha Reface CS, AN200 References Sound synthesis types