source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/KPTV | KPTV (channel 12) is a television station in Portland, Oregon, United States. affiliated with the Fox network. It is owned by Gray Television alongside Vancouver, Washington–licensed MyNetworkTV affiliate KPDX (channel 49). Both stations share studios on NW Greenbrier Parkway in Beaverton, while KPTV's transmitter is located in the Sylvan-Highlands section of Portland.
History
Early years
KPTV signed on the air on September 20, 1952, as Oregon's first television station. KPTV originally broadcast on channel 27, making it also the nation's first commercial television station to broadcast on the UHF band. (the first experimental UHF station was Bridgeport, Connecticut's KC2XAK on channel 24). The station was originally owned by Empire Coil. As Portland's only television station at the time, it carried programming from all four networks of the time: ABC, CBS, NBC and the DuMont Television Network. CBS programming was dropped from KPTV's schedule when Portland's first VHF station, KOIN-TV (channel 6), signed on the air on October 15, 1953. KPTV then became a primary NBC affiliate, and also continued to air some ABC and DuMont programming.
KPTV also aired programs from the short-lived Paramount Television Network during the early 1950s; in fact, it was one of that network's strongest affiliates, carrying Paramount programs such as Time For Beany, Hollywood Wrestling, and Bandstand Revue. During the late 1950s, the station was also briefly affiliated with the NTA Film Network. Empire Coil sold KPTV and its other broadcast property, WXEL (now WJW-TV) in Cleveland, to Storer Broadcasting on November 17, 1954. On August 11, 1954, KPTV became the first television station in Portland to broadcast in color, three days before KOIN achieved the same milestone.
The VHF channel 12 allocation in Portland was first occupied by KLOR-TV, which signed on March 8, 1955, as a primary ABC affiliate with a secondary DuMont affiliation. However, KLOR's network affiliations were short-lived. In 1956, KLOR lost its affiliations with both networks as the DuMont Television Network ceased operations, and the ABC affiliation moved to KGW-TV (channel 8) when that station signed on the air in December. On April 17, 1957, Detroit businessman George Haggerty purchased KPTV from Storer and KLOR from its local owners. On May 1, the two stations merged under KPTV's license, but using the stronger channel 12 signal (channel 27 was later used by independent station KHTV, which was on the air for less than four months in 1959; more recently, the channel 27 frequency was used by the digital signal of PBS member station KOPB-TV, which returned to its original channel 10 assignment following the analog shutdown; the KHTV call letters were later used to sign on channel 39 in Houston in 1967, that station used the callsign from its launch until 1999; it is now KIAH).
On April 17, 1959, KPTV swapped affiliations with KGW and became an ABC affiliate. Later that year, KPTV was sold to the N |
https://en.wikipedia.org/wiki/Blow%20Out%20%28TV%20series%29 | Blow Out is a reality television series that first premiered on the Bravo cable television network in 2004, with a second season broadcasting in 2005. The first season revolved around the construction and launch of Jonathan Salon in Beverly Hills, an upscale Los Angeles hair salon. The second season showed the ongoing business ventures of now celebrity hair stylist Jonathan Antin, including the management of his (two) salons and the launch of his own hair styling product. A third season premiered on March 21, 2006. Season 3 chronicled Jonathan's product launch and growing popularity in the fashion industry.
The Beverly Hills salon, located at 9681 Wilshire Blvd in Beverly Hills, is no longer Antin's and operates under Tom Brophy's Salon as of 2012.
References
External links
Fashion-themed reality television series
Bravo (American TV network) original programming
2004 American television series debuts
2006 American television series endings
2000s American reality television series
Television series by Reveille Productions
English-language television shows |
https://en.wikipedia.org/wiki/D%20cell | D cell can mean:
D battery, a common size of dry-cell electrical battery
D cell (biology), a hormone secreting, regulatory cell type found in the stomach
See also
DCell, one of the Data center network architectures
dCell, a division of Lowe Lintas |
https://en.wikipedia.org/wiki/The%20Simpsons%20Spin-Off%20Showcase | "The Simpsons Spin-Off Showcase" is the twenty-fourth and penultimate episode of the eighth season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on May 11, 1997. The episode centers on fictional pilot episodes of non-existent television series derived from The Simpsons, and is a parody of the tendency of networks to spin off characters from a hit series. As such it includes references to many different TV series. The first fictional spin-off is Chief Wiggum P.I., a cop-dramedy featuring Chief Wiggum and Seymour Skinner. The second is The Love-matic Grampa, a sitcom featuring Moe Szyslak who receives dating advice from Abraham Simpson, whose ghost is possessing a love testing machine. The final segment is The Simpson Family Smile-Time Variety Hour, a variety show featuring the Simpson family except for Lisa, who has been replaced.
The episode was written by David X. Cohen, Dan Greaney and Steve Tompkins, with Ken Keeler coming up with the story and the general idea of intentionally bad writing. It was directed by Neil Affleck, and Tim Conway, Gailard Sartain and Phil Hartman guest-starred.
The producers were initially uneasy about the episode, as they feared that the purposely bad writing would be mistaken for actual bad writing. The episode, however, now appears on several lists of the most popular Simpsons episodes.
Plot
Troy McClure hosts a television special from the "Museum of TV and Television" introducing three spin-off productions, created using characters from The Simpsons. The Fox network has only three programmes — The Simpsons, The X Files and Melrose Place — prepared for the next broadcasting season, and so commissions the producers of The Simpsons to create thirty-five new shows to fill the remainder of the lineup. Unable to handle such a workload, the producers create only three new shows.
"Chief Wiggum, P.I." is a crime-dramedy spin-off and a parody of Magnum, P.I., which follows Chief Wiggum, Ralph and Seymour Skinner. Chief Wiggum and his son Ralph move to New Orleans following Wiggum's removal from the Springfield Police Department for corruption, with Seymour Skinner as Wiggum's sidekick. Wiggum has proclaimed that he will "clean up the city" of New Orleans, but it does not take long before he meets his nemesis, Big Daddy, who warns Wiggum to stay out of his business. Soon after, Ralph is kidnapped and Wiggum finds Big Daddy's calling card left behind. Wiggum manages to track Big Daddy's ransom call to the Mardi Gras, where he briefly runs into the Simpson family, and the two chase each other to Big Daddy's mansion in the New Orleans bayou (in reality the Louisiana governor's mansion which Big Daddy had managed to steal). Chief Wiggum then threatens Big Daddy with a gun, but Big Daddy counters by tossing Ralph at his father, then jumping out the window and swimming away (at an extremely slow speed, due to his weight). Wiggum ultimately lets the villain |
https://en.wikipedia.org/wiki/World%20Drug%20Report | The World Drug Report is a United Nations Office on Drugs and Crime annual publication that analyzes market trends, compiling detailed statistics on drug markets. Using data, it helps draw conclusions about drugs as an issue needing intervention by government agencies around the world. UNAIDs stated on its website "The use of illicit drugs needs to be understood as a social and health condition requiring sustained prevention, treatment, and care. This is one of the major conclusions emerging from the 2015 World Drug Report, published on 26 June by the United Nations Office on Drugs and Crime."
History
The World Drug Report is published annually by the United Nations Office on Drugs and Crime. The first report was published in 1997, the same year the agency was established. The agency was tasked with the responsibility of crime prevention, criminal justice and criminal law reform. The World Drug Report is utilized as an annual overview of the major developments of global drug markets and as a tool to publish evidence-based drug prevention plans. There have been 19 World Drug Reports published since the original report was made public.
Leader of the United Nations Office on Drugs and Crime
On July 9, 2010, United Nations Secretary-General Ban Ki-moon appointed Yury Fedotov of the Russian Federation as executive director for the United Nations Office on Drugs and Crime Leadership. Mr. Fedotov is also Under-Secretary General for the United Nations as a whole. Mr. Fedotov has been active in the UN since 1972, when he was a member of the USSR delegation to the United Nations Disarmament Committee in Geneva. Since then, he has championed international issues around global human and drug trafficking. In that vein, he strongly advocates for supporting counter drug trafficking by building upon regional initiatives by providing technical assistance. Mr. Fedotov also promotes the idea that successful drug policies that stem from the World Drug Report have the ability to develop entire economies. On June 26, 2015, he gave remarks to announce the release of the 2015 World Drug Report. In those remarks, he said, "The report also shows that successful projects can foster a sustainable licit economy, including the transfer of skills and access to land, credit and infrastructure, as well as marketing support and access to markets." He uses his position as executive director of the United Nations Office on Drugs and Crime to encourage UN members to support these programs and initiatives through funding under the premise that this funding will grow their domestic economies.
Research methodology
The World Drug Report relies mainly on data submitted by member states through the Annual Reports Questionnaire, which is revised and monitored by the Commission on Narcotic Drugs. These Member States are all required to submit national drug control related information to the United Nations Office on Drugs and Crime annually, although historically the United Nations does n |
https://en.wikipedia.org/wiki/Multimodal%20interaction | Multimodal interaction provides the user with multiple modes of interacting with a system. A multimodal interface provides several distinct tools for input and output of data.
Introduction
Multimodal human-computer interaction refers to the "interaction with the virtual and physical environment through natural modes of communication", This implies that multimodal interaction enables a more free and natural communication, interfacing users with automated systems in both input and output. Specifically, multimodal systems can offer a flexible, efficient and usable environment allowing users to interact through input modalities, such as speech, handwriting, hand gesture and gaze, and to receive information by the system through output modalities, such as speech synthesis, smart graphics and other modalities, opportunely combined. Then a multimodal system has to recognize the inputs from the different modalities combining them according to temporal and contextual constraints in order to allow their interpretation. This process is known as multimodal fusion, and it is the object of several research works from the nineties to now. The fused inputs are interpreted by the system. Naturalness and flexibility can produce more than one interpretation for each different modality (channel) and for their simultaneous use, and they consequently can produce multimodal ambiguity generally due to imprecision, noises or other similar factors. For solving ambiguities, several methods have been proposed. Finally the system returns to the user outputs through the various modal channels (disaggregated) arranged according to a consistent feedback (fission).
The pervasive use of mobile devices, sensors and web technologies can offer adequate computational resources to manage the complexity implied by the multimodal interaction. "Using cloud for involving shared computational resources in managing the complexity of multimodal interaction represents an opportunity. In fact, cloud computing allows delivering shared scalable, configurable computing resources that can be dynamically and automatically provisioned and released".
Multimodal input
Two major groups of multimodal interfaces have merged, one concerned in alternate input methods and the other in combined input/output. The first group of interfaces combined various user input modes beyond the traditional keyboard and mouse input/output, such as speech, pen, touch, manual gestures, gaze and head and body movements. The most common such interface combines a visual modality (e.g. a display, keyboard, and mouse) with a voice modality (speech recognition for input, speech synthesis and recorded audio for output). However other modalities, such as pen-based input or haptic input/output may be used. Multimodal user interfaces are a research area in human-computer interaction (HCI).
The advantage of multiple input modalities is increased usability: the weaknesses of one modality are offset by the strengths of another. O |
https://en.wikipedia.org/wiki/Ethanol%20%28data%20page%29 | This page provides supplementary chemical data on ethanol.
Material Safety Data Sheet
External MSDS
Structure and properties
Thermodynamic properties
Spectral data
Vapor pressure of liquid
Density of ethanol at various temperatures
Data obtained from
These data correlate as ρ [g/cm3] = −8.461834 T [°C] + 0.8063372 with an R2 = 0.99999.
Properties of aqueous ethanol solutions
Data obtained from
Boiling points of aqueous solutions
Data obtained from CRC Handbook of Chemistry (Page 2117)
‡Azeotropic mixture
Charts
References
Chemical data pages
Data page
Chemical data pages cleanup |
https://en.wikipedia.org/wiki/DShield | DShield is a community-based collaborative firewall log correlation system. It receives logs from volunteers worldwide and uses them to analyze attack trends. It is used as the data collection engine behind the SANS Internet Storm Center (ISC). DShield was officially launched end of November 2000 by Johannes Ullrich. Since then, it has grown to be a dominating attack correlation engine with worldwide coverage.
DShield is regularly used by the media to cover current events. Analysis provided by DShield has been used in the early detection of several worms, like "Ramen", Code Red, "Leaves", "SQL Snake" and more. DShield data is regularly used by researchers to analyze attack patterns.
The goal of the DShield project is to allow access to its correlated information to the public at no charge to raise awareness and provide accurate and current snapshots of internet attacks. Several data feeds are provided to users to either include in their own web sites or to use as an aide to analyze events.
See also
SANS Institute (SysAdmin, Audit, Network and Security – SANS)
Comparison of network monitoring systems
ShieldsUP
SPEWS
References
Further reading
External links
Alert measurement systems
Computer security procedures
Internet properties established in 2000
Internet safety
Web log analysis software |
https://en.wikipedia.org/wiki/Mre%C5%BEa | Mreža ("net" in Croatian) was the first private Croatian television network. It was founded in 1997. From its Zagreb studios, it produced original programs that were later aired on various local and regional stations.
The arrival of Mreža was quite a notable event in Croatian media history, because it was the first time the media monopoly of state-owned Croatian Radiotelevision (HRT) was significantly challenged. Mreža produced original programs in the form of its own news, as well as lavishly produced shows. Mreža also poached some important talent from HRT, including Denis Latin and his popular Latinica talk show.
One of the owners of Mreža was the controversial tycoon Miroslav Kutle, and his activities caused the network to fail. Burdened with debts and financial mismanagement, Mreža disappeared from the Croatian airwaves in 1998, taking a few of the local affiliates with it, including TV Marjan from Split.
External links
Defunct television channels in Croatia
Mass media in Zagreb |
https://en.wikipedia.org/wiki/Twisted%20Metal%3A%20Head-On | Twisted Metal: Head-On is a vehicular combat video game developed by Incognito Entertainment and published by Sony Computer Entertainment on March 24, 2005 for the PlayStation Portable and February 5, 2008 for the PlayStation 2. Santa Monica Studio assisted on development for both titles. Head-On was the seventh game released in the Twisted Metal series, and the first game in the series to ship fully online-enabled.
Head-On is a direct sequel to Twisted Metal 2, while ignoring the events of Twisted Metal III and Twisted Metal 4 and other installments. Akin to other games in the series, Head-On revolves around the same theme of a man named Calypso holding a vehicular combat tournament called "Twisted Metal", with the promise of granting the winner whatever they ask for.
PlayStation 2 port
A PlayStation 2 port of Twisted Metal: Head-On was released on February 5, 2008. The game was developed by Jaffe's newly formed studio Eat Sleep Play and was retitled Twisted Metal Head-On: Extra Twisted Edition. It was never released outside of North America and is thus only available in NTSC format.
The PS2 port contains extra features and bonuses, such as the unreleased live action end movies from Twisted Metal, a behind the scenes documentary and a concept art book. Each physical copy also comes with a code to download a Twisted Metal soundtrack. The documentary includes an answer to a question Twisted Metal fans have been asking for a long time. After fans deciphered a message in the Dark Past documentary as reading "Twisted Metal is coming on psthree", Jaffe confirmed it himself. It also lacks the online play feature of the original PSP version.
Minigames
Head-On also includes minigames that players can access via teleporters, which can be found in each level during Story Mode. These are bonus levels where players must collect power ups while circumventing obstacles that require a variety of tactics, including destroying taxicabs, jumping over chasms, and destroying helicopters using napalm bombs. The catch is that most of these minigames are timed, forcing the player to think on their feet, as it were, while maintaining a balance of caution and risk. Reaching the end of the mini-game prior to the timer's ending allows the player to all their powerups. Several characters can only be unlocked by completing the minigames on certain levels.
Reception
The game was met with average to positive reviews upon release. GameRankings and Metacritic gave it a score of 78.84% and 79 out of 100 for the PSP version, and 73.16% and 73 out of 100 for the PlayStation 2 version.
Notes
References
External links
2005 video games
Incognito Entertainment games
Multiplayer and single-player video games
PlayStation 2 games
PlayStation Portable games
Santa Monica Studio games
Sony Interactive Entertainment games
Twisted Metal
Vehicular combat games
Video games developed in the United States
Video games scored by Inon Zur
Video games set in 2007
Video games set in Egyp |
https://en.wikipedia.org/wiki/The%20Secret%20War%20of%20Lisa%20Simpson | "The Secret War of Lisa Simpson" is the twenty-fifth episode and the season finale of the eighth season of the American animated television series The Simpsons. It first aired on the Fox network in the United States on May 18, 1997. Bart gets sent to a military academy as punishment for bad behavior. While visiting the academy, Lisa sees that the school is far more challenging than hers and she decides that she wants to attend as well. It was directed by Mike B. Anderson, written by Richard Appel and featured Willem Dafoe in a guest spot as the school's commandant.
Plot
After a day watching mind-numbing videos in class, Lisa worries that her education is not challenging enough. Bart's class goes on a field trip to the Springfield Police Department, where Bart finds a room with several megaphones. By placing them all end-to-end and speaking into one, he amplifies his voice enough to create a sonic shock wave that shatters all the glass in Springfield. Chief Wiggum suggests sending Bart to military school to correct his behavior. Under the ruse they are going to Disneyland, Homer and Marge drive the kids to Rommelwood Military School; while visiting a poetry class, Lisa decides to enroll as well in order to experience the challenge she seeks. Homer and Marge reluctantly agree to her plan and depart, ignoring Bart's pleas to let him come home.
As the school's first female cadet, Lisa is assigned a barracks to herself, angering the corps of cadets. After she and Bart endure hazing, Bart is eventually accepted by the other cadets and distances himself from his sister. Lonely, Lisa considers going home, but decides to see it through. As the school year comes to a close, the Commandant reveals the final test for the students: the "Eliminator", a hand-over-hand crawl across a rope suspended high above thorn bushes. Lisa fears she will not be able to complete the task, but Bart helps her train in secret.
On the day of the test, Lisa is the last to cross the Eliminator. She loses her grip on the rope and is in danger of falling as the cadets jeer her, but Bart cheers her on and she successfully completes the task. The other cadets vow to make the rest of the semester unbearable for Bart, but realize that their graduation ceremony is only three hours away. The Commandant awards Lisa a medal engraved "For Satisfactory Completion of the Second Grade". Homer and Marge again promise to take her and Bart to Disneyland, but instead drive them to a dentist's office.
Production
The episode was written by Richard Appel, but the idea of Bart and Lisa attending a military academy had previously been pitched, and had been floating around since 1991. The idea had not yet been used as an episode plot, because the writers had not felt comfortable with taking Bart and Lisa to a strange place early in the series. Because this is the season finale, Yeardley Smith returned to the series for the first time since "In Marge We Trust" since she caught the flu after recording |
https://en.wikipedia.org/wiki/Hardware%20overlay | In computing, hardware overlay, a type of video overlay, provides a method of rendering an image to a display screen with a dedicated memory buffer inside computer video hardware. The technique aims to improve the display of a fast-moving video image — such as a computer game, a DVD, or the signal from a TV card. Most video cards manufactured since about 1998 and most media players support hardware overlay.
The overlay is a dedicated buffer into which one app can render (typically video), without incurring the significant performance cost of checking for clipping and overlapping rendering by other apps. The framebuffer has hardware support for importing and rendering the buffer contents without going through the GPU.
Overview
The use of a hardware overlay is important for several reasons:
In a graphical user interface (GUI) operating system such as Windows, one display-device can typically display multiple applications simultaneously.
Consider how a display works without a hardware overlay. When each application draws to the screen, the operating system's graphical subsystem must constantly check to ensure that the objects being drawn appear on the appropriate location on the screen, and that they don't collide with overlapping and neighboring windows. The graphical subsystem must clip objects while they are being drawn when a collision occurs. This constant checking and clipping ensures that different applications can cooperate with one another in sharing a display, but also consumes a significant proportion of computing power.
A computer draws on its display by writing a bitmapped representation of the graphics into a special portion of its memory known as video memory. Without any hardware overlays, only one chunk of video memory exists which all applications must share - and the location of a given application's video memory moves whenever the user changes the position of the application's window. With shared video memory, an application must constantly check that it is only writing to memory that belongs to that application.
When running a high-bandwidth video application such as a movie player or some games, the computing power and complexity needed to perform constant clipping and checking negatively impacts performance and compatibility. A hardware overlay escapes these limitations. In addition, the graphics processing unit (GPU) provides an efficient way to scale the video in size and often performs color-format conversions (such as MPEG-2's YCbCr into RGB).
An application using a hardware overlay gets a completely separate section of video memory that belongs only to that application. Because nothing else uses it, the program never needs to waste resources in checking whether a given piece of the memory belongs to it, nor does it need to monitor whether the user moves the window and changes the location of the video memory. To get the image from the separate video memory to display in tandem with the remaining shared ele |
https://en.wikipedia.org/wiki/Lux%20%28video%20game%29 | Lux is a series of turn-based strategy computer games, inspired by the rule system of the board game Risk but expanding it to function on any map made up of a graph of countries and the connections between them.
Lux was developed and self-published by developer Sillysoft Games. The user community has been active in growing Lux. Users can create maps and computer AIs for Lux, and submit them to be included in the official plugin manager.
Gameplay
Lux Delux is a Risk-style clone with generally similar rules to the original. Up to six players can play at once, and any empty spot in the game is filled up by "bots," or computer AI personalities. Lux has over 900 maps, each varying in size, shape, and complexity. Regardless of the map, the objective of the game is the same: eliminate all other players so only one remains. Players play for "Raw," which is awarded or taken away for winning or losing games. These games are recorded, and the player with the most Raw at the end of the week is awarded a virtual medal. Aside from the weekly medals, players compete for the best seed, the calculation of a player's best weekly ranking. Awards are distributed on a player's rankings page, along with win percentage, games, and more.
Like Risk, winning in Lux requires both skill and luck, with every attack hanging on the result of a dice roll. However, in spite of the randomness there exists a regular group of players who dominate the multiplayer rankings. Like many online turn-based board games, Lux includes a chat capability, allowing conversation, tactical discussions, offers of alliance, etc., and some players use this as a political tool in their play to great advantage.
The ranking system is very competitive, and has evolved into a two-tiered system where each player has a score in the current week, as well as a seeded place depending on the last 16 weeks of play. The online player base is relatively small (about 700 regular online players), but many of them are fairly dedicated.
AI opponents
A much greater number of users play the game off-line with computer AI opponents. The AI players play by the same rules and are subject to the same game-play limitations as human players, that is, they cannot cheat. About half of these "bots" were programmed by members of the community, and they have evolved to employ sophisticated strategies, such as recognizing players who target them, cooperation, and the imitation of other bots' behavior. Some also respond to text chat, and human responses to them can influence their choice of tactics. The bots sometimes receive respectable rankings for their online play.
Maps
The original maps are numerous and varied, and most of them are made and submitted by players. Some maps are based on historic battles or wars (e.g., there is a map of the Vietnam War), and others are fantasy realms, inspired by other board games (such as "Monopoluxy," or "Scrabblux"), or are simply geometric shapes. In addition, the coding allows for |
https://en.wikipedia.org/wiki/KPDX | KPDX (channel 49) is a television station licensed to Vancouver, Washington, United States, serving the Portland, Oregon area as an affiliate of MyNetworkTV. It is the only major commercial station in Portland that is licensed to the Washington side of the market.
KPDX is owned by Gray Television alongside Fox affiliate KPTV (channel 12). Both stations share studios on NW Greenbrier Parkway in Beaverton, while KPDX's transmitter is located in the Sylvan-Highlands section of Portland. KPDX's signal is relayed in Central Oregon through translator station KUBN-LD (channel 9) in Bend, making the station available in about two-thirds of the state.
Since February 2018, KPDX has been branded as Fox 12 Plus, an extension of the branding used by KPTV.
History
As an independent station
In August 1980, the local KLRK Broadcasting Corporation filed an application to construct a new TV station on channel 49 at Vancouver. The construction permit was granted by the Federal Communications Commission (FCC) on January 5, 1981, and took the KLRK call letters, representing Clark County. KLRK foresaw an independent station emphasizing Southwest Washington sports and news. However, work came to a halt when KLRK ran out of money to build the facility. In late 1981, Camellia City Telecasters, the owner of KTXL-TV in Sacramento, California, filed to buy the construction permit, an action decried by newly built KECH-TV (channel 22 in Salem) and Cascade Video, applicant for a station on channel 40. Camellia's entry in the Portland market was significant because it bought rights to $10 million of films and syndicated programs, which particularly harmed KECH.
Channel 49 would miss several planned launch dates due to multiple factors. The station was forced by Multnomah County to allow other interested broadcasters to rent tower space, and Oregon Public Broadcasting's KOAP-TV and KOPB-FM used the opportunity to consolidate their transmission facilities with the new transmitter. There were also delays in the shipment of structural steel being used to erect the tower. in the West Hills.
Camellia also soon acknowledged that a Washington-specific focus would limit the station's audience and appeal, and changed the call sign to KPDX, representing Portland's airport code. Channel 49 finally signed on October 7, 1983. It maintained a main studio in Vancouver and a production facility in Portland. Initially, KPDX was a general entertainment independent station; the station's format consisted of cartoons, sitcoms, classic movies, drama series and religious programs.
Portland had been big enough since at least the 1960s to support a second independent station alongside long-established KPTV. However, the Portland market is a very large one geographically; it stretches across a large swath of Oregon as well as much of southwestern Washington. The established stations needed an extensive translator network to reach the entire market, an expense which stymied the first attempt at a |
https://en.wikipedia.org/wiki/Irregular%20Z-buffer | The irregular Z-buffer is an algorithm designed to solve the visibility problem in real-time 3-d computer graphics. It is related to the classical Z-buffer in that it maintains a depth value for each image sample and uses these to determine which geometric elements of a scene are visible. The key difference, however, between the classical Z-buffer and the irregular Z-buffer is that the latter allows arbitrary placement of image samples in the image plane, whereas the former requires samples to be arranged in a regular grid.
These depth samples are explicitly stored in a two-dimensional spatial data structure. During rasterization, triangles are projected onto the image plane as usual, and the data structure is queried to determine which samples overlap each projected triangle. Finally, for each overlapping sample, the standard Z-compare and (conditional) frame buffer update are performed.
Implementation
The classical rasterization algorithm projects each polygon onto the image plane, and determines which sample points from a regularly spaced set lie inside the projected polygon. Since the locations of these samples (i.e. pixels) are implicit, this determination can be made by testing the edges against the implicit grid of sample points. If, however the locations of the sample points are irregularly spaced and cannot be computed from a formula, then this approach does not work. The irregular Z-buffer solves this problem by storing sample locations explicitly in a two-dimensional spatial data structure, and later querying this structure to determine which samples lie within a projected triangle. This latter step is referred to as "irregular rasterization".
Although the particular data structure used may vary from implementation to implementation, the two studied approaches are the kd-tree, and a grid of linked lists. A balanced kd-tree implementation has the advantage that it guarantees O(log(N)) access. Its chief disadvantage is that parallel construction of the kd-tree may be difficult, and traversal requires expensive branch instructions. The grid of lists has the advantage that it can be implemented more effectively on GPU hardware, which is designed primarily for the classical Z-buffer.
With the appearance of CUDA, the programmability of current graphics hardware has been drastically improved. The Master Thesis, "Fast Triangle Rasterization using irregular Z-buffer on CUDA" (see External Links), provide a complete description to an irregular Z-Buffer based shadow mapping software implementation on CUDA. The rendering system is running completely on GPUs. It is capable of generating aliasing-free shadows at a throughput of dozens of million triangles per second.
Applications
The irregular Z-buffer can be used for any application which requires visibility calculations at arbitrary locations in the image plane. It has been shown to be particularly adept at shadow mapping, an image space algorithm for rendering hard shadows. In addition t |
https://en.wikipedia.org/wiki/Tao%20Yang | Tao Yang is a Chinese-American computer scientist. Yang is the Chief Scientist and Senior Vice President of Ask.com for web search. He is also a tenured professor in Computer Science at the University of California, Santa Barbara.
Biography
Yang received his B.S. degree in Computer Science from Zhejiang University in 1984. In 1987, Yang received his M.E. degree in Artificial Intelligence from Zhejiang University. Yang obtained his M.Sc in 1990 and Ph.D. in 1993 both in Computer Science from Rutgers University.
Yang joined the Department of Computer Science at University of California, Santa Barbara in 1993.
Research and business
Yang specializes in parallel and distributed systems, Internet search, and parallel scientific computing. He has co-authored over eighty journal and conference papers.
Together with Apostolos Gerasoulis, Yang ran research and development of the Teoma search engine from its startup stage in 2000 and after it was acquired by Ask Jeeves (now Ask.com) in 2001.
Teoma has been the backend search engine for Ask.com since December 2001, competing with other search engines such as Google and Yahoo!.
Awards
1994, Research Initiation Award, from United States National Science Foundation (NSF)
1997, CAREER Award, from NSF
2002, Noble Jeeviant Award, from AskJeeves
References
External links
Home page at UCSB
Year of birth missing (living people)
Living people
Zhejiang University alumni
Rutgers University alumni
Chinese computer scientists
University of California, Santa Barbara faculty
Chinese emigrants to the United States |
https://en.wikipedia.org/wiki/SRX | SRX can refer to:
Singapore Real Estate Exchange
Cadillac SRX
Yamaha SRX motorcycles
Juniper Networks security product series
SRX expansion boards by Roland
Segmentation Rules eXchange standard
Superstar Racing Experience, car racing series
Ghardabiya Airbase IATA code |
https://en.wikipedia.org/wiki/Point%20Blank%20%28TV%20series%29 | Point Blank is a Canadian television comedy series that aired on The Comedy Network in 2002.
Evolving out of the earlier Double Exposure, the show starred Linda Cullen and Bob Robertson as Diane-Barbara Jane and Steele Drummond, respectively, the anchors of a television tabloid newsmagazine which covered news stories, such as alien abduction, human cloning, styrofoam mining and two-ply toilet paper, that went "beyond the truth and below the standards". Cullen and Robertson were the show's sole constant core cast, while a wide variety of Canadian comedians and actors made appearances as characters or journalists in news reports.
Thirteen episodes of the series were produced and aired.
Cast
Tammy Bentz - Macarthur Fantutti
Mark Brandon - Rock Granite
Save Cameron - Yannick Paduch
Nicola Crosbie - Kitty Cowlick
Diana Frances - Trinity Whiskers
Jason Emanuel - Luiz Emilio de Pollo
Andrew Grose - Turdmore Hacking
Roger Haskett - Medgar O'Hill
Campbell Lane - Harry Flotsam
Marjorie Malpass - Phoebe Torque
Dagmar Midcap - Herpzibah Fridge
John Murphy - Chase Bullion
Trish Pattenden - Sandy Stout
Jeff Rechner - Announcer
Yvonne Myers - Sh'lwannalah Jackson
Tanya Reid - Rain Bongwater
Chris Robson - Maytag Hogswallop
Ben Wilkinson - Julian Van Wart
Moishe Teichman - Mayor
References
External links
Point Blank
2000s Canadian satirical television series
2000s Canadian sketch comedy television series
2002 Canadian television series debuts
2002 Canadian television series endings
CTV Comedy Channel original programming
Canadian news parodies |
https://en.wikipedia.org/wiki/Navigation%20mesh | A navigation mesh, or navmesh, is an abstract data structure used in artificial intelligence applications to aid agents in pathfinding through complicated spaces. This approach has been known since at least the mid-1980s in robotics, where it has been called a meadow map, and was popularized in video game AI in 2000.
Description
A navigation mesh is a collection of two-dimensional convex polygons (a polygon mesh) that define which areas of an environment are traversable by agents. In other words, a character in a game could freely walk around within these areas unobstructed by trees, lava, or other barriers that are part of the environment. Adjacent polygons are connected to each other in a graph.
Pathfinding within one of these polygons can be done trivially in a straight line because the polygon is convex and traversable. Pathfinding between polygons in the mesh can be done with one of the large number of graph search algorithms, such as A*. Agents on a navmesh can thus avoid computationally expensive collision detection checks with obstacles that are part of the environment.
Representing traversable areas in a 2D-like form simplifies calculations that would otherwise need to be done in the "true" 3D environment, yet unlike a 2D grid it allows traversable areas that overlap above and below at different heights. The polygons of various sizes and shapes in navigation meshes can represent arbitrary environments with greater accuracy than regular grids can.
Creation
Navigation meshes can be created manually, automatically, or by some combination of the two. In video games, a level designer might manually define the polygons of the navmesh in a level editor. This approach can be quite labor intensive. Alternatively, an application could be created that takes the level geometry as input and automatically outputs a navmesh.
It is commonly assumed that the environment represented by a navmesh is static – it does not change over time – and thus the navmesh can be created offline and be immutable. However, there has been some investigation of online updating of navmeshes for dynamic environments.
History
In robotics, using linked convex polygons in this manner has been called "meadow mapping", coined in a 1986 technical report by Ronald C. Arkin.
Navigation meshes in video game artificial intelligence are usually credited to Greg Snook's 2000 article "Simplified 3D Movement and Pathfinding Using Navigation Meshes" in Game Programming Gems. In 2001, J.M.P. van Waveren described a similar structure with convex and connected 3D polygons, dubbed the "Area Awareness System", used for bots in Quake III Arena.
Notes
References
External links
UDK: Navigation Mesh Reference
Unity: Navigation Meshes
Source Engine: Navigation Meshes
Urho3D: Navigation
Godot Engine Navigation
Cry Engine Navigation And AI
Graph data structures
Video game development
Computational physics
Robotics |
https://en.wikipedia.org/wiki/Slipstream%20%28computer%20science%29 | A slipstream processor is an architecture designed to reduce the length of a running program by removing the non-essential instructions.
It is a form of speculative computing.
Non-essential instructions include such things as results that are not written to memory, or compare operations that will always return true. Also as statistically most branch instructions will be taken it makes sense to assume this will always be the case.
Because of the speculation involved slipstream processors are generally described as having two parallel executing streams. One is an optimized faster A-stream (advanced stream) executing the reduced code, the other is the slower R-stream (redundant stream), which runs behind the A-stream and executes the full code. The R-stream runs faster than if it were a single stream due to data being prefetched by the A-stream effectively hiding memory latency, and due to the A-stream's assistance with branch prediction. The two streams both complete faster than a single stream would. As of 2005, theoretical studies have shown that this configuration can lead to a speedup of around 20%.
The main problem with this approach is accuracy: as the A-stream becomes more accurate and less speculative, the overall system runs slower. Furthermore, a large enough distance is needed between the A-stream and the R-stream so that cache misses generated by the A-stream do not slow down the R-stream.
References
Z. Purser, K. Sundaramoorthy and E. Rotenberg, "A Study of Slipstream Processors", Proc. 33rd Ann. Int'l Symp. Microarchitecture, Monterey, CA, Dec. 2000.
Instruction processing |
https://en.wikipedia.org/wiki/Lazarus%20%28software%29 | Lazarus is a free, cross-platform, integrated development environment (IDE) for rapid application development (RAD) using the Free Pascal compiler. Its goal is to provide an easy-to-use development environment for programmers developing with the Object Pascal language, which is as close as possible to Delphi.
Software developers use Lazarus to create native-code console and graphical user interface (GUI) applications for the desktop, and also for mobile devices, web applications, web services, visual components and function libraries for a number of different platforms, including Mac, Linux and Windows.
A project created by using Lazarus on one platform can be compiled on any other one which Free Pascal compiler supports. For desktop applications a single source can target macOS, Linux, and Windows, with little or no modification. An example is the Lazarus IDE itself, created from a single code base and available on all major platforms including the Raspberry Pi.
Features
Lazarus provides a WYSIWYG development environment for the creation of rich user interfaces, application logic, and other supporting code artifacts, similar to Borland Delphi. Along with project management features, the Lazarus IDE also provides:
A visual windows layout designer
GUI widgets or visual components such as edit boxes, buttons, dialogs, menus, etc.
Non-visual components for common behaviors such as persistence of application settings
Data-connectivity components for MySQL, PostgreSQL, FireBird, Oracle, SQLite, Sybase, and others
Data-aware widget set that allows the developer to see data in visual components in the designer to assist with development
Interactive debugger
Code completion
Code templates
Syntax highlighting
Context-sensitive help
Text resource manager for internationalization
Automatic code formatting
Extensibility via custom components
Cross-platform development
Lazarus uses Free Pascal as its back-end compiler. As Free Pascal supports cross-compiling, Lazarus applications can be cross-compiled from Windows, Linux, or macOS to any of the supported Free Pascal compilation targets. Applications for embedded devices (smartphones, PDAs, routers, game consoles) can be cross-compiled from any desktop platform.
Lazarus provides a cross-platform application framework called the Lazarus Component Library (LCL), which provides a single, unified interface for programmers, with different platform-specific implementations. Using LCL, it is possible to create applications in a write once, compile anywhere manner, unless system-dependent features are used explicitly. LCL was originally modeled after the Visual Component Library (VCL) in Delphi 6, but is not restricted to Windows. This is done by separating the definition of common widget classes and their widgetset-specific implementation. Each widget set is supported by providing an interface which interacts directly with the set.
Database development
Developers can install packages that all |
https://en.wikipedia.org/wiki/KTVW-DT | KTVW-DT (channel 33) is a television station in Phoenix, Arizona, United States, serving as the local outlet for the Spanish-language network Univision. It is owned and operated by TelevisaUnivision alongside Flagstaff-licensed UniMás outlet KFPH-DT, channel 13 (which KTVW-DT simulcasts on its second digital subchannel). Both stations share studios on 30th Street in southern Phoenix, while KTVW-DT's transmitter is located atop South Mountain on the city's south side.
The station's signal is relayed on two low-power translators: Class A station KTVW-CD (channel 6) in Flagstaff, and KDOS-LD (channel 50) in Globe. KTVW is also rebroadcast on the second digital subchannel of KFPH, whose transmitter is located atop Mormon Mountain, about south of Flagstaff in the Coconino National Forest.
In addition, KUVE-DT (channel 46) in Green Valley and KUVE-CD (channel 42) in Tucson operate as semi-satellites of KTVW-DT, expanding the Univision signal into Southern Arizona. As such, they simulcast all Univision programming as provided through their parent, and share a website with KTVW. However, the Tucson stations air separate commercial inserts and legal identifications. There is also a three-hour overnight segment on Monday mornings, in which the Tucson stations broadcast locally produced English-language programming in accordance with KUVE-CD's Class A license. Local newscasts, produced by KTVW and branded as , are simulcast on KUVE and KUVE-CD. Although KUVE maintains its own studios on Forbes Boulevard in Tucson, master control and most internal operations are based at KTVW's facilities.
History
On March 12, 1976, the Legend of Cibola Television Company (reorganized before launch as the Seven Hills Television Company), owned by a series of principals of the Spanish International Network, filed for a construction permit for a new television station on channel 33 in Phoenix, which was granted on August 17, 1977. The original applicant had just one local stockholder, Julia Zozaya (who later built and owned KNNN-FM 99.9). Facilities were jointly constructed with another construction permit, KNXV-TV; the two stations won approval to construct a new tower on South Mountain in 1978.
KTVW-TV signed on as Arizona's first full-time Spanish-language television station on September 2, 1979. Previously, KPAZ-TV channel 21 had aired some Spanish-language programming from 1967 to 1977, but this was curtailed by financial woes and its sale to the Trinity Broadcasting Network. From the beginning, the plan was to build a translator for KTVW in Tucson: this launched November 1, 1980. While owned by SIN-aligned interests, it was not owned by the network proper until then-owner Hallmark Cards acquired it from Seven Hills in 1989.
For 27 years, KTVW was the only full-power Spanish-language television station in Phoenix, which gave it considerable market dominance. In 2006, this came to an end when NBCUniversal and the Daystar Television Network agreed to a trade that con |
https://en.wikipedia.org/wiki/DrayTek | DrayTek () is a network equipment manufacturer of broadband CPE (Customer Premises Equipment), including firewalls, VPN devices, routers, managed switches and wireless LAN devices. The company was founded in 1997. The earliest products included ISDN based solutions, the first being the ISDN Vigor128, a USB terminal adaptor for Windows and Mac OS. This was followed by the ISDN Vigor204 ISDN terminal adaptor/PBX and the Vigor2000, its first router. The head office is located in Hsinchu, Taiwan with regional offices and distributors worldwide.
DrayTek's products cover a wide solution range such as firewall, VPN, VoIP, xDSL/broadband devices, and management software to meet the market trend, go above and beyond customers' expectations.
DrayTek was one of the first manufacturers to bring VPN technology to low cost routers, increasing the viability of remote work. In 2004, DrayTek released the first of its VoIP (Voice-Over-IP) products. In 2006, new products for companies debuted, including larger scale firewalls and Unified Threat Management (UTM) firewalls products however the UTM Firewalls did not sell in sufficient volume and the UTM products ceased development and production.
DrayTek's product line offers business and consumer DSL modems with support for the PPPoA standard compared to the more widely supported PPPoE for use with full-featured home routers and home computers without more expensive ATM hardware. PPPoA is used primarily in the UK for ADSL lines. Most Vigor routers provide a virtual private network (VPN) feature, provides LAN-to-LAN and Remote-Dial-In Connections. In 2011, DrayTek embedded SSL VPN facilities into VigorRouter Series.
DrayTek's Initial Public Offering (IPO) on the Taiwan Stock Exchange occurred in 2004.
March 2021 DrayTek releases new WiFi 6 Access Point to market - DrayTek AP1060C
August 2021 DrayTek announces 2 new WiFi 6 Routers - DrayTek Vigor 2927ax & DrayTek Vigor 2865ax
References
Taiwanese companies established in 1997
Networking hardware companies
Manufacturing companies based in Hsinchu
Manufacturing companies established in 1997
Electronics companies of Taiwan
Taiwanese brands |
https://en.wikipedia.org/wiki/MCMC | MCMC may refer to:
Malaysian Communications and Multimedia Commission, a regulator agency of the Malaysian government
Markov chain Monte Carlo, a class of algorithms and methods in statistics
See also
MC (disambiguation)
MC2 (disambiguation) |
https://en.wikipedia.org/wiki/Perophthalma | Eyemark is also a term used for the CBS network's longtime Eye Device logo.
Perophthalma is a very small butterfly genus in the family Riodinidae. The genus comprises only two species, both found only in Central and South America. They are commonly called eyemarks, alluding to the eyespot on the wings.
Mesosemiini
Riodinidae of South America
Butterfly genera
Taxa named by John O. Westwood |
https://en.wikipedia.org/wiki/Test%20and%20test-and-set | In computer architecture, the test-and-set CPU instruction (or instruction sequence) is designed to implement
mutual exclusion in multiprocessor environments. Although a correct lock can be implemented with test-and-set, the test and test-and-set optimization lowers resource contention caused by bus locking, especially cache coherency protocol overhead on contended locks.
Given a lock:
boolean locked := false // shared lock variable
the entry protocol is:
procedure EnterCritical() {
do {
while ( locked == true )
skip // spin using normal instructions until the lock is free
} while ( TestAndSet(locked) == true ) // attempt actual atomic locking using the test-and-set instruction
}
and the exit protocol is:
procedure ExitCritical() {
locked := false
}
The difference to the simple test-and-set protocol is the additional spin-loop (the test in test and test-and-set) at the start of the entry protocol, which utilizes ordinary load instructions. The load in this loop executes with less overhead compared to an atomic operation (resp. a load-exclusive instruction). E.g., on a system utilizing the MESI cache coherency protocol, the cache line being loaded is moved to the Shared state, whereas a test-and-set instruction or a load-exclusive instruction moves it into the Exclusive state.
This is particularly advantageous if multiple processors are contending for the same lock: whereas an atomic instruction or load-exclusive instruction requires a coherency-protocol transaction to give that processor exclusive access to the cache line (causing that line to ping-pong between the involved processors), ordinary loads on a line in Shared state require no protocol transactions at all: processors spinning in the inner loop operate purely locally.
Cache-coherency protocol transactions are used only in the outer loop, after the initial check has ascertained that they have a reasonable likelihood of success.
If the programming language used supports short-circuit evaluation, the entry protocol could be implemented as:
procedure EnterCritical() {
while ( locked == true or TestAndSet(locked) == true )
skip // spin until locked
}
Caveat
Although this optimization is useful in system programming, test-and-set is to be avoided in high-level concurrent programming: spinning in applications deprives the operating system scheduler
the knowledge of who is blocking on what. Consequently, the scheduler will have to guess on how to allocate CPU time among the threads -- typically just allowing the threads to use up their timing quota. Threads will end up spinning unproductively, waiting for threads that are not scheduled.
By using operating-system provided lock objects, such as mutexes, the OS can schedule exactly the unblocked threads.
See also
Parallel processor
Parallel programming
Mutual exclusion
Test-and-set
Fetch-and-add
References
Gregory R. Andrews, Foundations of Multithreaded, Parallel, and Distributed Progra |
https://en.wikipedia.org/wiki/Diffusing%20update%20algorithm | The diffusing update algorithm (DUAL) is the algorithm used by Cisco's EIGRP routing protocol to ensure that a given route is recalculated globally whenever it might cause a routing loop. It was developed by J.J. Garcia-Luna-Aceves at SRI International. The full name of the algorithm is DUAL finite-state machine (DUAL FSM). EIGRP is responsible for the routing within an autonomous system, and DUAL responds to changes in the routing topology and dynamically adjusts the routing tables of the router automatically.
EIGRP uses a feasibility condition to ensure that only loop-free routes are ever selected. The feasibility condition is conservative: when the condition is true, no loops can occur, but the condition might under some circumstances reject all routes to a destination although some are loop-free.
When no feasible route to a destination is available, the DUAL algorithm invokes a diffusing computation to ensure that all traces of the problematic route are eliminated from the network. At which point the normal Bellman–Ford algorithm is used to recover a new route.
Operation
DUAL uses three separate tables for the route calculation. These tables are created using information exchanged between the EIGRP routers. The information is different than that exchanged by link-state routing protocols. In EIGRP, the information exchanged includes the routes, the "metric" or cost of each route, and the information required to form a neighbor relationship (such as AS number, timers, and K values). The three tables and their functions in detail are as follows:
Neighbor table contains information on all other directly connected routers. A separate table exists for each supported protocol (IP, IPX, etc.). Each entry corresponds to a neighbour with the description of network interface and address. In addition, a timer is initialized to trigger the periodic detection of whether the connection is alive. This is achieved through "Hello" packets. If a "Hello" packet is not received from a neighbor for a specified time period, the router is assumed down and removed from the neighbor table.
Topology table contains the metric (cost information) of all routes to any destination within the autonomous system. This information is received from neighboring routers contained in the Neighbor table. The primary (successor) and secondary (feasible successor) routes to a destination will be determined with the information in the topology table. Among other things, each entry in the topology table contains the following:
"FD (Feasible Distance)": The calculated metric of a route to a destination within the autonomous system.
"RD (Reported Distance)": The metric to a destination as advertised by a neighboring router. RD is used to calculate the FD, and to determine if the route meets the "feasibility condition".
Route Status: A route is marked either "active" or "passive". "Passive" routes are stable and can be used for data transmission. "Active" routes are being recalcul |
https://en.wikipedia.org/wiki/Hermite%20interpolation | In numerical analysis, Hermite interpolation, named after Charles Hermite, is a method of polynomial interpolation, which generalizes Lagrange interpolation. Lagrange interpolation allows computing a polynomial of degree less than that takes the same value at given points as a given function. Instead, Hermite interpolation computes a polynomial of degree less than such that the polynomial and its first derivatives have the same values at given points as a given function and its first derivatives.
Hermite's method of interpolation is closely related to the Newton's interpolation method, in that both are derived from the calculation of divided differences. However, there are other methods for computing a Hermite interpolating polynomial. One can use linear algebra, by taking the coefficients of the interpolating polynomial as unknowns, and writing as linear equations the constraints that the interpolating polynomial must satisfy. For another method, see .
Statement of the problem
Hermite interpolation consists of computing a polynomial of degree as low as possible that matches an unknown function both in observed value, and the observed value of its first derivatives. This means that values
must be known. The resulting polynomial has a degree less than . (In a more general case, there is no need for to be a fixed value; that is, some points may have more known derivatives than others. In this case the resulting polynomial has a degree less than the number of data points.)
Let us consider a polynomial of degree less than with indeterminate coefficients; that is, the coefficients of are new variables. Then, by writing the constraints that the interpolating polynomial must satisfy, one gets a system of linear equations in unknowns.
In general, such a system has exactly one solution. Charles Hermite proved that this is effectively the case here, as soon as the are pairwise different, and provided a method for computing it, which is described below.
Method
Simple case
When using divided differences to calculate the Hermite polynomial of a function f, the first step is to copy each point m times. (Here we will consider the simplest case for all points.) Therefore, given data points , and values and for a function that we want to interpolate, we create a new dataset
such that
Now, we create a divided differences table for the points . However, for some divided differences,
which is undefined.
In this case, the divided difference is replaced by . All others are calculated normally.
General case
In the general case, suppose a given point has k derivatives. Then the dataset contains k identical copies of . When creating the table, divided differences of identical values will be calculated as
For example,
etc.
Example
Consider the function . Evaluating the function and its first two derivatives at , we obtain the following data:
{| class="wikitable" style="text-align: right; padding: 1em;"
|-
! x || ƒ(x) || ƒ'(x) |
https://en.wikipedia.org/wiki/Pinky%20and%20Perky | Pinky and Perky is a children's television series first broadcast by BBC TV in 1957, and revived in 2008 as a computer-animated adaptation.
Original series
The title characters are a pair of anthropomorphic puppet pigs, named Pinky and Perky, who were originally going to be named Pinky and Porky but there was a problem registering Porky as a character name. This was solved by Margaret Potter, the wife of their producer, Trevor Hill, who also discovered them, when she woke him up one night announcing "I've got it! Pinky and Perky!" They were created by Czechoslovakian immigrants Jan and Vlasta Dalibor who moved to the village of Houndhill, leaving the pigs under the cupboard in The Bungalow. The characters of pigs were chosen because the pig is seen as a symbol of good luck in the former Czechoslovakia. The puppets, who had only very limited movements, looked very alike. Pinky wore red clothes and Perky wore blue, but this distinction was of little use on monochrome TV, so Perky often wore a hat.
Pinky and Perky spoke and sang in high-pitched voices, created by re-playing original voice recordings at twice the original recorded speed; the vocals were sung by Mike Sammes while the backing track was played at half normal speed (Sammes did the same job for Ken Dodd's Diddymen, as Ross Bagdasarian did for the original Chipmunks in the early 1960s)—hence the expression "Pinky and Perky speed", when an LP record is played at 45 rpm or 78 rpm instead of the correct 33 rpm. Pinky and Perky would often sing cover versions of popular songs, but also had their own theme song, "We Belong Together".
They had their own fictional TV station "PPC TV" (a play on "BBC"). They also performed comedy sketches usually with a human foil (similar to Basil Brush). Actor John Slater worked with them as a straight man for many years, enduring soakings from water pistols and similar pranks. Other human companions included Roger Moffat, Jimmy Thompson, Bryan Burdon and Fred Emney.
Their show included other puppets such as the Beakles (an avian parody of the Beatles), Topo Gigio, a mouse puppet who appeared in many later episodes, as well as a female pig. Other puppets included Ambrose Cat, Basil Bloodhound, Bertie Bonkers the baby elephant, Conchita the Cow, Horace Hare and Vera Vixen.
Pinky and Perky also performed guest slots on other shows, including several appearances on Sunday Night at the London Palladium.
The puppets also appeared on TV in the United States on a number of episodes of The Ed Sullivan Show: 532 (14 September 1958), 548 (4 January 1959), 573 (5 July 1959), 740 (10 March 1963), 780 (23 February 1964, where they shared the bill with the Beatles and Morecambe and Wise) and 908 (26 February 1967).
The pigs featured in series, such as Pinky and Perky's Pop Parade and Pinky and Perky's Island, for 11 years until 1968 on the BBC before transferring to ITV until 1972. There were no real people, sketches or stories in the shows at all. Instead, the puppets |
https://en.wikipedia.org/wiki/Tower%20of%20Babel%20%281989%20video%20game%29 | Tower of Babel is a computer game for the Amiga, Atari ST and Acorn Archimedes systems programmed by Pete Cooke, developed by Rainbird Software and released by Microprose Software in 1989. It is a puzzle video game played on a three-dimensional tower-like grid viewed in vector graphics with filled polygons.
Background
The plot of the game is based on the biblical story of the Tower of Babel. At the height of the tower's construction, while it failed in its original purpose to directly contact God, it caught the attention of a passing Zandorian alien spaceship. The Zantorians descended and left three spider-like robots to help the Shinarians in constructing the tower. However, distrust broke out among the two species, and the humans betrayed the robots, stealing their energy packs (called "Klondikes"). Playing the robots, it is the player's job to find the energy packs to be able to get back home to Zantor.
Gameplay
The game play is purely puzzle-based. The famous Tower of Babel itself does not actually appear; instead there are several differently-configured 8*8*4 towers (four floors of 8*8 squares each).
The Zantorians robots are called the Grabber, the Pusher and the Zapper. Each of these has different abilities. The Grabber can collect Klondikes and operate various devices, the Pusher can push things further away, and the Zapper can destroy things. In a tower, players can be assigned any combination of these robots, depending on the tower's design. In each tower, the player's goal is either to destroy a set number of objects, collect a set number of Klondikes, or both. Towers with Klondikes to collect need the Grabber, but the other robots can sometimes be superfluous, and indeed, the destruction of these robots is sometimes necessary for the completion of a tower.
Everything in the game is viewed in a realistic 3D vector graphics view, but the actual movement in the game is far more contained than in games usually associated with such graphics, only allowing square-by-square movement in rectangular directions and vertical movement using special lifts.
Various devices, sentry mechanisms and autonomous robots also inhabit each tower. Some of these can be used to gain an advantage, while some hinder progress.
Editor
Tower of Babel also includes a construction kit where players can design their own towers and save them to disk for later play and distribution. The towers can be password-protected to avoid spoiling them by looking directly at the design.
One feature of the game is the ability to program the robots. Each robot can be given up to eight orders (for example: Forward, Forward, Left, Fire, Right, Forward). In some levels, programming the robots is mandatory, as they need to coordinate their actions in order to solve the level.
Game objects
Block Can be pushed around but cannot be shot.
Converter Changes laser beams into pushing beams and vice versa.
Exchanger When activated by the Grabber, switches places with it and vanis |
https://en.wikipedia.org/wiki/Maurice%20DuBois | Maurice DuBois (born August 20, 1965) is an American television anchorman for WCBS-TV in New York City and the CBS network.
Early life and education
DuBois was born on Long Island, New York, the son of immigrants to the U.S. from Dominica, an island nation in the Caribbean. He attended Port Jefferson High School, and received a Bachelor of Science degree in journalism from the Medill School of Journalism at Northwestern University in Evanston, Illinois. While in college, he served as an intern at the Public Affairs Office of the Brookhaven National Laboratory on Long Island in 1984 and 1985, where he wrote for the employee newspaper, the Brookhaven Bulletin.
Career
DuBois began his career in 1987, when he worked as a desk assistant at KING-TV in Seattle, Washington. Following that, he served as an anchor and reporter at WFLD-TV in Chicago, Illinois, and later at KCRA-TV in Sacramento, California. He then spent seven years In New York at WNBC-TV, the East Coast flagship station of the NBC television network. While at WNBC, DuBois served as a co-anchor of Today in New York, an early-morning local news and entertainment program. During that time, he also hosted Four Stories – a television news-magazine program featuring community heroes – as well as Mind Over Media, special programming for Court-TV for students to understand media images.
In addition, DuBois worked as a substitute news reader on NBC News's Today and as a substitute co-host and news reader on its weekend editions.
In September 2004, DuBois joined WCBS-TV – also in New York and the East Coast flagship station of the CBS television network – as one of its anchors for the 6pm newscast, CBS 2 News at 6 with Dana Tyler. Since then, he has co-anchored CBS 2 News This Morning and CBS 2 News at Noon with Cindy Hsu and also with Mary Calvi.
In January 2011, DuBois began co-anchoring – with Kristine Johnson – CBS 2 News at 5 and CBS 2 News at 11. He is also an occasional substitute of the weekend edition of the CBS Evening News.
In addition to covering local news, DuBois has worked as a reporter, covering national political conventions, AIDS in South Africa, witnessing a double execution – an experience which DuBois described as "intense", the death of Pope John Paul II and the installation of Pope Benedict XVI.
Maurice often gets a shoutout and mentions on Desus & Mero as they are fans and has had cameos on the show.
Community service
DuBois is involved in various community organizations including serving on three non-profit boards – Pencil; Susan G. Komen for the Cure (New York City affiliate); and New York City Center. He has worked with WNET's GED program.
Personal life
DuBois and his wife, Andrea Adair, were married on August 13, 2001. They have two sons and live in Harlem.
Awards and honors
DuBois has won four Emmy Awards and has been honored by the Associated Press. He also received a Trailblazer Award from the New York City chapter of the National Association of Black Journal |
https://en.wikipedia.org/wiki/Army%20Battle%20Command%20System | The Army Battle Command System (ABCS) is a digital Command, Control, Communications, Computers and Intelligence (C4I) system for the US Army. It includes a mix of fixed/semi-fixed and mobile networks. It is also designed for interoperability with US and Coalition C4I systems.
Army Battle Command System (ABCS) Version 6.4 is an integrated suite that allows troops to obtain an automated view of friendly activity and supply movement; plan fires, receive situation and intelligence reports, view the airspace and receive automatically disseminated weather reports.
Systems
ABCS is intended to function as a System of systems concept, with the ultimate goal of being similar to what the internet provides to civilians. Similar to how those using the internet have no need to know the location of the network they connect to, ABCS is intended to provide the same capability. In this way, the ABCS system will allow commanders to see multiple systems on one screen and easily transfer data from one to the next. The system also provides up-to-date information on a map-based display.
Despite these capabilities, the system does have limitations. In particular, it does not integrate well with the GCCS systems used for joint operations. This creates a risk of bad data and database errors in such scenarios.
ABCS combines seven packages into a single system:
The Maneuver Control System (MCS) allows the operator to define routes and view overlays to provide situational awareness. MCS is being phased out and replaced with "Lightning", an ABCS enabled Flash/Java Program that uses the Web Browser interface. It allows users to publish products from CPOF without using the BCS (Battle Command Server) PASS (Publish and Subscribe Service) Server, making Lightning more flexible as it can be used on any Secret Internet Protocol Router Network (SIPRnet-System) as there is no interface software required besides your web browser (Typically IE 8.0 or higher, not compatible with Opera or Firefox at this time.) The system was developed and integrated by Ford Aerospace and Communications Corp. (FACC), Colorado Springs, Colorado.
The Air and Missile Defense Workstations (AMDWS) provide soldiers with an Air Defense picture, and supports the Surface Launched Advanced Medium Range Air-to-Air Missile (SLAM-RAAM) Air Defense Artillery (ADA) system by providing an automated defense planning capability for deployed units.
The Battle Command Sustainment & Support System (BCS3) integrates multiple data sources into one program and provides commanders with a visual layout of battlefield logistics.
The All Source Analysis System (ASAS) can analyze incidents and help determine the patterns of Improvised Explosive Device-related incidents. A commander can determine locations that are typical for IED attacks, so that they know to warn their soldiers of such a threat.
The Advanced Field Artillery Tactical Data System (AFATDS) plan and execute fires during each phase of action, whether a delib |
https://en.wikipedia.org/wiki/Flag%20%28programming%29 | In computer programming, flag can refer to one or more bits that are used to store a binary value or a Boolean variable for signaling special code conditions, such as file empty or full queue statuses.
Flags may be found as members of a defined data structure, such as a database record, and the meaning of the value contained in a flag will generally be defined in relation to the data structure it is part of. In many cases, the binary value of a flag will be understood to represent one of several possible states or statuses. In other cases, the binary values may represent one or more attributes in a bit field, often related to abilities or permissions, such as "can be written to" or "can be deleted". However, there are many other possible meanings that can be assigned to flag values. One common use of flags is to mark or designate data structures for future processing.
Within microprocessors and other logic devices, flags are commonly used to control or indicate the intermediate or final state or outcome of different operations. Microprocessors typically have, for example, a status register that is composed of such flags, and the flags are used to indicate various post-operation conditions, such as when there has been an arithmetic overflow. The flags can be utilized in subsequent operations, such as in processing conditional jump instructions. For example a je (Jump if Equal) instruction in the X86 assembly language will result in a jump if the Z (zero) flag was set by some previous operation.
A command line switch is also referred to as a flag. Command line programs often start with an option parser that translates command line switches into flags in the sense of this article.
See also
Bit field
Control register
Enumerated type
FLAGS register (computing)
Flag byte
Program status word
Semaphore (programming)
Status register
References
Programming idioms
Operating system technology
Central processing unit
Digital registers
da:Flag (computer)
de:Flag (Informatik)
es:Flag
fr:Drapeau (informatique)
id:Bendera (komputasi)
it:Flag
he:דגל (מחשבים)
ja:フラグ (コンピュータ)
pl:Pole znacznikowe
pt:Flag
ru:Флаг (компьютерная техника)
zh:旗標 |
https://en.wikipedia.org/wiki/Perpendicular%20recording | Perpendicular recording (or perpendicular magnetic recording, PMR), also known as conventional magnetic recording (CMR), is a technology for data recording on magnetic media, particularly hard disks. It was first proven advantageous in 1976 by Shun-ichi Iwasaki, then professor of the Tohoku University in Japan, and first commercially implemented in 2005. The first industry-standard demonstration showing unprecedented advantage of PMR over longitudinal magnetic recording (LMR) at nanoscale dimensions was made in 1998 at IBM Almaden Research Center in collaboration with researchers of Data Storage Systems Center (DSSC) – a National Science Foundation (NSF) Engineering Research Center (ERCs) at Carnegie Mellon University (CMU).
Advantages
Perpendicular recording can deliver more than three times the storage density of traditional longitudinal recording. In 1986, Maxell announced a floppy disk using perpendicular recording that could store . Perpendicular recording was later used by Toshiba in 3.5" floppy disks in 1989 to permit 2.88 MB of capacity (ED or extra-high density), but they failed to succeed in the marketplace. Since about 2005, the technology has come into use for hard disk drives. Hard disk technology with longitudinal recording has an estimated limit of due to the superparamagnetic effect, though this estimate is constantly changing. Perpendicular recording is predicted to allow information densities of up to around . , drives with densities of were available commercially. In 2016 the commercially available density was at least . In late 2021 the Seagate disk with the highest density was a consumer-targeted 2.5" BarraCuda. It used density. Other disks from the manufacturer used and .
Technology
The main challenge in designing magnetic information storage media is to retain the magnetization of the medium despite thermal fluctuations caused by the superparamagnetic limit. If the thermal energy is too high, there may be enough energy to reverse the magnetization in a region of the medium, destroying the data stored there. The energy required to reverse the magnetization of a magnetic region is proportional to the size of the magnetic region and the magnetic coercivity of the material. The larger the magnetic region is and the higher the magnetic coercivity of the material, the more stable the medium is. Thus, there is a minimum size for a magnetic region at a given temperature and coercivity. If it is any smaller it is likely to be spontaneously de-magnetized by local thermal fluctuations. Perpendicular recording uses higher coercivity materials because the head's write field penetrates the medium more efficiently in the perpendicular geometry.
The popular explanation for the advantage of perpendicular recording is that it achieves higher storage densities by aligning the poles of the magnetic elements, which represent bits, perpendicularly to the surface of the disk platter, as shown in the illustration. In this not-quite-acc |
https://en.wikipedia.org/wiki/Rail%20transport%20in%20Finland | The Finnish railway network consists of a total track length of . The railways are built with a broad track gauge, of which is electrified. Passenger trains are operated by the state-owned enterprise VR that runs services on of track. These services cover all major cities and many rural areas, though the coverage is less than the coverage provided by the bus services. Most passenger train services originate or terminate at Helsinki Central railway station, and a large proportion of the passenger rail network radiates out of Helsinki. VR also operates freight services. Maintenance and construction of the railway network itself is the responsibility of the Finnish Rail Administration, which is a part of the Finnish Transport Agency (, ). The network consists of six areal centres, that manage the use and maintenance of the routes in co-operation. Cargo yards and large stations may have their own signalling systems.
Finnish trains have a reputation for being spacious, comfortable and clean. The scenery surrounding the railway lines is considered to be of outstanding natural beauty, especially in Eastern Finland with its many lakes. Since the density of population is low in most parts of Finland, the country is not very well suited to railways. Commuter services are nowadays rare outside the Helsinki area, but there are express train connections between most of the cities. As in France, passenger services are mostly connections from various parts of the country to the capital, Helsinki. Currently there are about 260 passenger round trips driven daily in Finland, excluding Helsinki commuter rail. Nightly passenger trains only operate on the busiest lines between Helsinki or Turku via Oulu to Lapland (minimum distance of , leaving most tracks free for nightly freight traffic (about 40 million tonnes per year). In addition there are also good long-distance bus and airplane connections; buses are sometimes faster and/or cheaper than trains (e.g. Helsinki–Pori).
History
The first rail line between Helsinki and Hämeenlinna (today part of the Finnish Main Line) was opened on January 31, 1862. As Finland was then the Grand Duchy of Finland, an autonomous state within Imperial Russia, railways were built to the broad , that was used in Imperial Russia back then. An extension from Riihimäki to the new Finland Station in Saint Petersburg was opened in 1870.
However, the Finnish and Russian rail systems remained unconnected until 1912. Russian trains could not have used the Finnish rail network due to a narrower load gauge. Later the Finnish load gauge was widened to match the Russian load gauge, with hundreds of station platforms or tracks moved further apart from each other.
Further expansion occurred in the 1800s and by 1900 much of the network had been constructed with 3,300 km of track built.
The Finland Railway Bridge across the River Neva in Saint Petersburg, opened in 1912, connected the Finnish State Railways to Russian Railways. Following Finn |
https://en.wikipedia.org/wiki/Cercamon | Cercamon (, fl. 1135-1145) was one of the earliest troubadours. His true name and other biographical data are unknown. He was apparently a Gascony-born jester of sorts who spent most of his career in the courts of William X of Aquitaine and perhaps of Eble III of Ventadorn. He was the inventor of the planh (the Provençal dirge), of the tenso (a sort of rhymed debate in which two poets write one stanza each) and perhaps of the sirventes.
Most of the information about Cercamon's life is nothing but rumour and conjecture; some of his contemporaries credit him as Marcabru's mentor, and some circumstantial evidence points to his dying on crusade as a follower of Louis VII of France.
About seven of his lyrics survive, but not a single melody; the works that most contributed to his fame among his contemporaries, his pastorelas or pastourelles, are lost.
Cercamon means "world searcher" in medieval Occitan.
The fossil primate Cercamonius was named after him.
References
Alfred Jeanroy (1966). Les Poésies de Cercamon. Paris: Libraire Honoré Champion.
Wolf, George and Rosenstein, Roy (1983). The Poetry of Cercamon and Jaufre Rudel. London: Garland Publishing, Inc.
Biographies des troubadours ed. J. Boutière, A.-H. Schutz (Paris: Nizet, 1964) pp. 9–13.
External links
Complete works, in Provençal, with English translations
Gascons
12th-century French troubadours
Year of death unknown
Year of birth unknown |
https://en.wikipedia.org/wiki/Natter | Natter may refer to:
Natter (surname)
Bachem Ba 349, a German manned rocket interceptor from World War II
Natter, an instant messaging client
Natter (social network), a defunct social network |
https://en.wikipedia.org/wiki/Sentinel%20Worlds%20I%3A%20Future%20Magic | Sentinel Worlds I: Future Magic is a 1988 role-playing video game developed by Karl Buiter and published by Electronic Arts for the MS-DOS and Commodore 64 computer systems.
Set in the year 2995, Sentinel Worlds I: Future Magic is an innovative game that allowed a player to command a crew of five Federation officers and embark on an epic quest to save the Caldorre System from space raiders. The player's mission is to develop a crew and a starship and find the raiders' base and rid the system of them. The game was particularly notable for a musical score that simulated multiple instruments by swapping between them faster than the human ear could differentiate.
Gameplay
Sentinel Worlds I: Future Magic combines both the elements of Starflight and The Bard's Tale, and featured some innovations which set it apart from other games at the time. It was one of the pioneers in the budding sci-fi RPG genre.
The game is non-linear and allows players to ignore the entire plot and explore space for as long as they wanted. It mixes elements of an RPG with a space-shooter, requiring both strategy and tactics as the player would have to dog fight enemy vessels. Players can also choose to venture into trading by mining and harvesting resources on other planets. Much of the game also takes the players onto the ground, where they can fight ground battles using a wire-frame 3D display of their environment and engage in conversation, combat, or trade.
The main component of the game starts out in the dog fighting space combat scenario, fighting to protect merchant shipping. As the story progresses, other elements of the game, including exploration, trade, conversation, ship boarding, ground combat and investigation are brought into the mix. Players must balance their resources and cash with repairs from battle, buying new weapons and armor, and upgrading their vessel.
Plot
Setting
At the start of the game, the players are sent as part of a task force to combat a group of mysterious space raiders in the Caldorre system, who appear from nowhere to ravage merchant shipping in the area. Earlier efforts with battleships were ineffective against the light, agile raiders, so smaller Interceptor-class vessels with specially trained crews were dispatched to counter the threat and eventually end it. The Caldorre system has only three worlds—Caldorre itself, inhabited by a technologically advanced culture that dwells in huge towers on the planet's surface and service passing ships; Norjaenn, a frontier like world embroiled in a bitter war between rancher types and settler farmers over limited land space, and Ceyjavik, an icy world that is home to many exotic arctic animals and a small research station.
Story
In the year 2995, the Federation dispatches a squadron of Interceptor fighters to the Caldorre system with orders to investigate reports of mysterious pirate attacks on merchant shipping. The player controls the crew of one such vessel, a team of five. The investigatio |
https://en.wikipedia.org/wiki/Stomatogastric%20nervous%20system | The Stomatogastric Nervous System (STNS) is a commonly studied neural network composed of several ganglia in arthropods that controls the motion of the gut and foregut. The network of neurons acts as a central pattern generator. It is a model system for motor pattern generation because of the small number of cells, which are comparatively large and can be reliably identified. The system is composed of the stomatogastric ganglion (STG), oesophageal ganglion and the paired commissural ganglia.
Because of the many similarities between vertebrate and invertebrate systems, especially with regards to basic principles of neuronal function, invertebrate model systems such as the crustacean stomatogastric nervous system continue to provide key insight into how neural circuits operate in the numerically larger and less accessible vertebrate CNS.
Understanding how neuronal networks enable animals and humans to make coordinated movements is a continuing goal of neuroscience research. The stomatogastric nervous system of decapod crustaceans, which controls aspects of feeding, has contributed significantly to the general principles guiding our present understanding of how rhythmic motor circuits operate at the cellular level.
Rhythmic behaviors include all motor acts that at their core involve a rhythmic repeating set of movements. The circuits underlying such rhythmic behaviors, central pattern generators (CPGs), all operate on the same general principles. These networks remain rhythmic in the completely isolated nervous system, even in the absence of all rhythmic neuronal input, including feedback from sensory systems. Although the details differ in each circuit, all CPGs use the same set of cellular-level mechanisms for circuit construction. More importantly, CPG circuits are usually not dedicated to producing a single neuronal activity pattern. This flexibility results largely from the ability of different neuromodulators to change the cellular and synaptic properties of individual circuit neurons. When the properties of circuit components are changed, the output of the circuit itself is modified. These aspects of CPG operation are often shared by other circuits, enabling a general understanding of neuronal circuit operation.
The STNS contains a set of distinct but interacting motor circuits. The understanding of this multifunctional network contributed importantly to the general understanding of neural circuit operation. The value of this system has resulted from its accessibility, the use of several innovative techniques, and the combined research effort of around 15 laboratories over the past ~30 years.
External links
A Scholarpedia article on the stomatogastric ganglion
Overview and links
Journal of Visualized Experiments: Cancer borealis stomatogastric nervous system dissection video article
List of Laboratories currently working on the stomatogastric nervous system
Animal nervous system
Arthropod anatomy |
https://en.wikipedia.org/wiki/IJCAI%20Computers%20and%20Thought%20Award | The IJCAI Computers and Thought Award is presented every two years by the International Joint Conference on Artificial Intelligence (IJCAI), recognizing outstanding young scientists in artificial intelligence. It was originally funded with royalties received from the book Computers and Thought (edited by Edward Feigenbaum and Julian Feldman), and is currently funded by IJCAI.
It is considered to be "the premier award for artificial intelligence researchers under the age of 35".
Laureates
Terry Winograd (1971)
Patrick Winston (1973)
Chuck Rieger (1975)
Douglas Lenat (1977)
David Marr (1979)
Gerald Sussman (1981)
Tom Mitchell (1983)
Hector Levesque (1985)
Johan de Kleer (1987)
Henry Kautz (1989)
Rodney Brooks (1991)
Martha E. Pollack (1991)
Hiroaki Kitano (1993)
Sarit Kraus (1995)
Stuart Russell (1995)
Leslie Kaelbling (1997)
Nicholas Jennings (1999)
Daphne Koller (2001)
Tuomas Sandholm (2003)
Peter Stone (2007)
Carlos Guestrin (2009)
Andrew Ng (2009)
Vincent Conitzer (2011)
Malte Helmert (2011)
Kristen Grauman (2013)
Ariel D. Procaccia (2015)
Percy Liang (2016) for his contributions to both the approach of semantic parsing for natural language understanding and better methods for learning latent-variable models, sometimes with weak supervision, in machine learning.
Devi Parikh (2017)
Stefano Ermon (2018)
Guy Van den Broeck (2019) for his contributions to statistical and relational artificial intelligence, and the study of tractability in learning and reasoning.
Piotr Skowron (2020) for his contributions to computational social choice, and to the theory of committee elections.
Fei Fang (2021) for her contributions to integrating machine learning with game theory and the use of these novel techniques to tackle societal challenges such as more effective deployment of security resources, enhancing environmental sustainability, and reducing food insecurity.
Bo Li (2022) for her contributions to uncovering the underlying connections among robustness, privacy, and generalization in AI, showing how different models are vulnerable to malicious attacks, and how to eliminate these vulnerabilities using mathematical tools that provide robustness guarantees for learning models and privacy protection.
Pin-Yu Chen (2023) for his contributions to consolidating properties of trust, robustness and safety into rigorous algorithmic procedures and computable metrics for improving AI systems.
See also
List of computer science awards
References
Academic awards
Artificial intelligence
Computer science awards |
https://en.wikipedia.org/wiki/Type%20M | Type M or M type may refer to:
Science and technology
Type M, a xD-Picture Card
Type M, a name for the 15 amp BS 546 electrical plug
Vaio Type M, a kind of Vaio computer from Sony
M-type asteroid
m-type filter, an electronic filter
M-type star
M-types, an implementation of inductive type
Other uses
Audi Type M, a 1920s car
Beretta 92FS Compact Type M, a pistol
MG M-type, a sports car
See also
M class (disambiguation)
Class M (disambiguation) |
https://en.wikipedia.org/wiki/Cowboy%20coding | Cowboy coding is software development where programmers have autonomy over the development process. This includes control of the project's schedule, languages, algorithms, tools, frameworks and coding style. Typically, little to no coordination exists with other developers or stakeholders.
A cowboy coder can be a lone developer or part of a group of developers working with minimal process or discipline. Usually it occurs when there is little participation by business users, or fanned by management that controls only non-development aspects of the project, such as the broad targets, timelines, scope, and visuals (the "what", but not the "how").
"Cowboy coding" commonly sees usage as a derogatory term when contrasted with more structured software development methodologies.
Disadvantages
In cowboy coding, the lack of formal software project management methodologies may be indicative (though not necessarily) of a project's small size or experimental nature. Software projects with these attributes may exhibit:
Lack of release structure
Lack of estimation or implementation planning might cause a project to be delayed. Sudden deadlines or pushes to release software may encourage the use of "quick and dirty" techniques that will require further attention later.
Inexperienced developers
Cowboy coding can be common at the hobbyist or student level where developers might initially be unfamiliar with the technologies, such as testing, version control and/or build tools, usually more than just the basic coding a software project requires.
This can result in underestimating time required for learning, causing delays in the development process. Inexperience might also lead to disregard of accepted standards, making the project source difficult to read or causing conflicts between the semantics of the language constructs and the result of their output.
Uncertain design requirements
Custom software applications, even when using a proven development cycle, can experience problems with the client concerning requirements. Cowboy coding can accentuate this problem by not scaling the requirements to a reasonable timeline, and might result in unused or unusable components being created before the project is finished. Similarly, projects with less tangible clients (often experimental projects, see independent game development) could begin with code and never a formal analysis of the design requirements. Lack of design analysis could lead to incorrect or insufficient technology choices, possibly requiring the developer to port or rewrite their software in order for the project to be completed.
Incompleteness
Many software development models, such as Extreme Programming, use an incremental approach which stresses that the software must be releasable at the end of each iteration. Non-managed projects may have few unit tests or working iterations, leaving an incomplete project unusable. As such, agile methodologies have been compared to cowboy coding but agile has |
https://en.wikipedia.org/wiki/Havoc%20Pennington | Robert Sanford Havoc Pennington (born c. 1976) is an American computer engineer and entrepreneur. He is known in the free software movement due to his work on HAL, GNOME, Metacity, GConf, and D-Bus.
History
Havoc Pennington graduated from the University of Chicago in 1998. After graduation, he worked at Red Hat as a Desktop manager/engineer for nine years, ending in 2008. He also founded the project freedesktop.org in 2000. He promoted the idea of the Gnome Online Desktop in 2007. For a time, he led the development of the 2006–2009 Mugshot project. From 2008 until June 2011, he worked on a consumer product for the startup company Litl (hardware, and proprietary software and services). From 2011 to 2015 he worked for Typesafe (now Lightbend). In 2017 he cofounded Tidelift, which seeks to improve the ecosystem around open source software by providing support for professional teams using open source and helping maintainers build sustainable businesses around their projects.
See also
Lennart Poettering
Publications
Havoc Pennington, GTK+ /Gnome Application Development, Sams, , 1999.
References
External links
Havoc Pennington on Instagram
GNOME developers
Free software programmers
1970s births
Living people
American computer programmers
University of Chicago alumni
Red Hat employees
fr:Freedesktop.org#Havoc Pennington |
https://en.wikipedia.org/wiki/IMSI-catcher | An international mobile subscriber identity-catcher, or IMSI-catcher, is a telephone eavesdropping device used for intercepting mobile phone traffic and tracking location data of mobile phone users. Essentially a "fake" mobile tower acting between the target mobile phone and the service provider's real towers, it is considered a man-in-the-middle (MITM) attack. The 3G wireless standard offers some risk mitigation due to mutual authentication required from both the handset and the network. However, sophisticated attacks may be able to downgrade 3G and LTE to non-LTE network services which do not require mutual authentication.
IMSI-catchers are used in a number of countries by law enforcement and intelligence agencies, but their use has raised significant civil liberty and privacy concerns and is strictly regulated in some countries such as under the German Strafprozessordnung (StPO / Code of Criminal Procedure). Some countries do not have encrypted phone data traffic (or very weak encryption), thus rendering an IMSI-catcher unnecessary.
Overview
A virtual base transceiver station (VBTS) is a device for identifying the temporary mobile subscriber identity (TMSI), international mobile subscriber identity (IMSI) of a nearby GSM mobile phone and intercepting its calls, some are even advanced enough to detect the international mobile equipment identity (IMEI). It was patented and first commercialized by Rohde & Schwarz in 2003. The device can be viewed as simply a modified cell tower with a malicious operator, and on 4 January 2012, the Court of Appeal of England and Wales held that the patent is invalid for obviousness.
IMSI-catchers are often deployed by court order without a search warrant, the lower judicial standard of a pen register and trap-and-trace order being preferred by law enforcement. They can also be used in search and rescue operation for missing persons. Police departments have been reluctant to reveal use of these programs and contracts with vendors such as Harris Corporation, the maker of Stingray and Kingfish phone tracker devices.
In the UK, the first public body to admit using IMSI catchers was the Scottish Prison Service, though it is likely that the Metropolitan Police Service has been using IMSI catchers since 2011 or before.
Body-worn IMSI-catchers that target nearby mobile phones are being advertised to law enforcement agencies in the US.
The GSM specification requires the handset to authenticate to the network, but does not require the network to authenticate to the handset. This well-known security hole is exploited by an IMSI catcher. The IMSI catcher masquerades as a base station and logs the IMSI numbers of all the mobile stations in the area, as they attempt to attach to the IMSI-catcher. It allows forcing the mobile phone connected to it to use no call encryption (A5/0 mode) or to use easily breakable encryption (A5/1 or A5/2 mode), making the call data easy to intercept and convert to audio.
The 3G wireless s |
https://en.wikipedia.org/wiki/TLN%20%28TV%20channel%29 | TLN (formerly Telelatino) is a Canadian English-language discretionary specialty channel owned by TLN Media Group. The channel primarily broadcasts lifestyle programming surrounding the cultures of Latin America and Italy, including cooking and travel-related programs, as well as coverage of international soccer, and mainstream television series and films.
TLN previously broadcast in a trilingual format, carrying programming in the Italian, Spanish, and English languages (with the latter usually focusing on off-network reruns of entertainment programs starring actors of Italian or Spanish descent). This format was later phased out with the launch of sister digital cable channels dedicated solely to Italian- and Spanish-language programs, and TLN subsequently relaunched in 2018 with a larger focus on lifestyle programming.
History
On October 23, 2007, TLN launched TLN en Español, a Category B Spanish language general entertainment channel. The channel would later be relaunched as Univision Canada in 2014.
In April 2018, the network introduced a new marketing campaign, Colour Your Life, to signal a shift in focus for the channel to include "all lovers of the mainstream cultural lifestyle" in addition to existing viewers, after having phased out its foreign-language programs in favour of more lifestyle programming relevant to Italian and Spanish culture.
Corus Entertainment previously owned a 50.5% majority share in the service; it later sold its interest to its existing partners and Di Felice for $19 million in 2019.
Programming
The network primarily airs programming related to Italian and Spanish cultures, including travel and cuisine.
TLN broadcasts a substantial amount of soccer programming, airing Serie A matches since 1984. TLN later secured the rights to air all Serie A matches between 2018 and 2021. and UEFA Champions League matches involving Italian and Spanish teams from 2002 to 2009. In 2009, TLN secured the rights to the UEFA Europa League to become the exclusive Canadian broadcaster of this tournament through to 2012.
In 2006, TLN partnered with CBC Sports to sub-license its rights to FIFA tournaments, including the 2010 and 2014 FIFA World Cup. In 2015, TLN also sub-licensed Spanish-language rights to the 2015 Pan American Games in Toronto from CBC, collaborating with the U.S. Spanish rightsholder ESPN Deportes.
Controversy with RAI
From its inception up until mid-2003, TLN's Italian programming was derived primarily from RAI, Italy's state owned broadcaster, which made a commitment in 1984 to supply programming to Canada through TLN for as long as TLN was licensed in Canada. A dispute arose in 2003 when the head of RAI's international channel, decided to repudiate RAI's supply obligations as well as its 2001 agreement to launch a 24-hour RAI Canada channel, in favour of challenging Canada's regulatory regime by indicating that it wanted to deliver RAI programming through its own international channel on its own terms withou |
https://en.wikipedia.org/wiki/Native%20Communications | Native Communications Inc. (NCI) is a public radio network in the Canadian province of Manitoba. The network provides programming by and for Canadian First Nations was founded by Donald A. McIvor of Wabowden, Manitoba. The network mainly plays country music in order to appeal to a more general audience, while still serving the First Nations with its other programming.
NCI-FM broadcasts 24 hours a day, 7 days a week, on more than 50 FM radio transmitters located throughout Manitoba, reaching over 70 communities. Its headquarters is located at 1507 Inkster Boulevard in Winnipeg. The company also operates CIUR-FM, a youth-oriented radio station in Winnipeg which airs distinct programming from the main network, and is a new country station compared to the general NCI network.
The newest major site (on-air May 2002) includes a transmitter (2.7 watts) located near Minnedosa, servicing the Brandon and Dauphin regions. as well as one in Ontario.
References
External links
www.ncifm.com
Query the REC's Canadian station database for Native Communications Inc. stations
Canadian radio networks
First Nations radio stations in Canada
Mass media in Winnipeg
Thompson, Manitoba
Community radio organizations |
https://en.wikipedia.org/wiki/Telecentre | A telecentre is a public place where people can access computers, the Internet, and other digital technologies that enable them to gather information, create, learn, and communicate with others while they develop essential digital skills. Telecentres exist in almost every country, although they sometimes go by a different names including public internet access center (PIAP), village knowledge center, infocenter, Telecottage, Electronic Village Hall, community technology center (CTC), community multimedia center (CMC), multipurpose community telecentre (MCT), Common/Citizen Service Centre (CSC) and school-based telecentre. While each telecentre is different, their common focus is on the use of digital technologies to support community, economic, educational, and social development—reducing isolation, bridging the digital divide, promoting health issues, creating economic opportunities, and reaching out to youth for example.
Evolution of the telecentre movement
The telecentre movement's origins can be traced to Europe's telecottage and Electronic Village Halls (originally in Denmark) and Community Technology Centers (CTCs) in the United States, both of which emerged in the 1980s as a result of advances in computing. At a time when computers were available but not yet a common household good, public access to computers emerged as a solution. Today, although home ownership of computers is widespread in the United States and other industrialized countries, there remains a need for free public access to computing, whether it is in CTCs, telecottages or public libraries to ensure that everyone has access to technologies that have become essential.
There are also CTCs located in most of the states of Australia, they are also known as Community Resource Centres (often abbreviated to CRC) that provide technology, resources, training and educational programs to communities in regional, rural and remote areas.
Types
Beyond the differences in names, public ICT access centers are diverse, varying in the clientele they serve, the services they provide, as well as their business or organizational model. Around the world, some telecentres include NGO-sponsored, local government, commercial, school-based, and university-related In the United States and other countries, public access to the Internet in libraries may also be considered within the “telecentre concept”, especially when the range of services offered is not limited to pure access but also includes training end-users. Each type has advantages and disadvantages when considering attempts to link communities with ICTs and to bridge the digital divide. Among the various types:
NGO-sponsored telecentres are hosted by an NGO, which manages the center and integrates it, to one degree or another, into the organization's core business
Local government telecentres seek to further local development; they often aim to disseminate information, decentralize services, and encourage civic participation, in additi |
https://en.wikipedia.org/wiki/Osborne%20%28computer%20retailer%29 | Osborne was the name of one of the largest and most successful computer wholesalers and resellers in Australia. Osborne Corporation in Australia was originally registered by President Computers founded by Tom Cooper, the name was transferred back to the US HQ founder Adam Osborne and his Osborne Corporation Inc as a good will gesture by Cooper in the early stages of a highly successful launch of the Osborne 1 across the Australian marketplace. Adam Osborne at this time visited Sydney Australia at the invitation of Cooper to witness first hand the phenomenal success the Osborne 1 was experiencing in the Australian market.
The Agency would in time would change hands to land with Stanley Falinsky as the final Australian distributor. The famous and original Osborne 1 "luggable" computer featuring a Z-80 processor and running CP/M as the operating system. When Osborne Corporation USA collapsed changes in the Australian business entity occurred whereas Falinsky's company retained the Osborne Company name transitioning into IBM PC compatibles in the mid-1980s and had great success with both business and government clients.
A number of entities were involved in the complex trading relationship of the brand in Australia. A search of the ASIC names database return 28 entries for "Osborne Computers". Telnet pty Ltd, Peak Pacific, Computer Manufacturing Services Pty Ltd, System Support Services Pty Ltd, Osborne Computers (UK) Ltd, Osborne Computers (NZ)are a few of the other related entities at the time.
As cited, the fact remains that in 1982, Osborne Corporation was originally represented in Australia exclusively by President Computers Pty Ltd headed by Tom Cooper, a Captain of Industry in the emerging Australian PC era. With outstanding success of Osborne 1 sales in Australia, President Computers was lauded at the time by Osborne Corp USA as the largest global distributor of Osborne I luggable computers outside of Computerland USA. However with success, Osborne's visiting CFO had his own sights on the Australian marketplace and convinced Adam Osborne to split the Agency much to Cooper's objection. This move saw President Computers equally divide its current Dealership arrangement when Osborne Corporation setup to hold half the dealership Agency locally. Upon this decision President Computers then exclusively signed on Osborne's luggable rival the US Del Mar CA manufactured Kaypro Computer produced by Non Liner Systems which boasted a larger format inbuilt screen.
Cooper who held a strong relationship with Adam Osborne also was privy to the early view of the new Osborne II model, sighting warehouses full of the first model, Cooper cautioned Osborne that the Osborne II should only be announced once clearance of the original Osborne 1 stock holdings had been depleted, ultimately dismissing such advice contributed to Osborne Corporations demise and Chapter 11 filing in September 1983, whereas Osborne Corporation in Australia was then restructured and |
https://en.wikipedia.org/wiki/Harris%20%28train%29 | The Harris trains were the first steel-bodied Electric Multiple Unit train to operate on the suburban railway network of Melbourne, Victoria, Australia. They were introduced in 1956, by the Victorian Railways, and last operated in 1988, although a number of the carriages were converted for other uses and are still operating. They were named after Norman Charles Harris, Chairman of Commissioners of the Victorian Railways, between 1940 and 1950.
Description
The Harris trains were commonly referred to as "Blue Trains" due to their deep blue colour, with only a yellow band about halfway up the body. Royal blue and yellow were common colours for the Victorian Railways rolling stock.
The trains had a saloon seating layout, divided into smaller sections by full-height partitions. They were provided with either two or three sets of hand-operated dual sliding doors per carriage side. Later sets were fitted with power doors. Interiors were split into smoking and no-smoking compartments until late 1978, with the abolition of smoking on trains, and carriages were designated as First or Second class until 1958, when one class travel was introduced. Most of the carriages were delivered without end gangways between carriages, but safety concerns led to these being added in the final five sets as delivered from mid-1966. These sets were also fitted with only two doors per carriage side rather than three, permitting additional seating and reflecting the increasing average travel distance.
The first thirty trains were fitted with automatic couplers at both ends of all carriages, and the second series with semi-permanent drawbars, except for the driving ends of motor carriages, and one end of BT ("backing trailer") carriages. Later, drawbars were fitted in the middle of first series blocks and units, although the final ten Motor cars had automatic couplers at both ends.
First-series motor cars had 59 second-class seats and trailers 72 seats (first class in the T cars or second class in the BT cars), divided into smoking and non-smoking sections. For the second series the internal partitions were removed, and capacities increased to 65 and 80 passengers respectively for a total gain of 50 seats per seven-car train. Smoking was then only permitted in the middle third of each carriage. Later, a policy change saw smoking permitted in the whole of each Motor carriage, and not at all in trailers.
History
The first 30 7-carriage trains, known as the first series, were constructed in the United Kingdom by Gloucester Railway Carriage and Wagon Company, and delivered between 1956 and 1959. Another 30, the second series, were built by Martin & King in Melbourne, and delivered between 1961 and 1967. From 1966, these were delivered with end doors and gangways between carriages, allowing passengers to change carriages.
The first series of "T" and "BT" trailers were built by Comeng (the first 10 in Sydney, the rest in Melbourne), and finished by Martin & King, with the rema |
https://en.wikipedia.org/wiki/Microdrive%20%28disambiguation%29 | The Microdrive is a miniature hard disk drive device in the CompactFlash II format from the late 1990s, originally developed by IBM.
Microdrive may also refer to:
ZX Microdrive, a tape-loop data storage system developed by Sinclair Research in the 1980s
Micro drive, a type of drivetrain on a bicycle |
https://en.wikipedia.org/wiki/Auf%20Wiedersehen%20Monty | Auf Wiedersehen Monty (German for "Goodbye Monty") is a computer game for the ZX Spectrum, Commodore 64, Amstrad CPC, MSX and Commodore 16. Released in 1987, it is the fourth game in the Monty Mole series. It was written by Peter Harrap and Shaun Hollingworth with music by Rob Hubbard and Ben Daglish.
Gameplay
The player controls Monty as he travels around Europe collecting money in order to buy a Greek island - Montos, where he can safely retire. Gameplay is in the style of a flick-screen platform game, similar to many such games of the 1980s such as Technician Ted and Jet Set Willy. Some screens (such as those representing the Eiffel Tower and the Pyrenees) bear some relation to their real-life counterparts but most are just typical platform game screens.
Auf Wiedersehen Monty contains many features and peculiarities for the player to discover. Examples include being suddenly attacked by a bull's head in Spain after collecting a red cape (presumably a reference to bullfighting), a car being dropped in one of two places on entering a screen representing Düsseldorf in West Germany, a chef's hat found in Sweden (a reference to the Swedish Chef of Muppets fame; also, the two rooms representing Sweden are subtitled Bjorn and Borg), and a record in Luxembourg that when collected makes Monty breakdance to the game's title music (this may be a reference to Radio Luxembourg).
It is possible to get to areas of the game more quickly by flying from an airport using air tickets which can be collected throughout the game. Some parts of the game can only be reached in this manner.
As well as money, there are other miscellaneous objects to collect in the game for points. This was important as the player needs a certain number of points to get to Montos. These are often particular to the country Monty is visiting (such as berets in France). Bottles of wine or a glass of beer in West Germany cause Monty to briefly become drunk and his control to become slightly erratic leading to a reversal of controls, repeated jumping or Monty climbing any ladders or drainpipes he encounters.
Trivia
The game screens are laid out geographically, with the complete map of the game corresponding to a map of Europe.
The money that Monty collects are labeled "EC", the European Currency Unit, one decade before the euro was introduced.
The title was inspired by the then-popular television series, Auf Wiedersehen, Pet.
The game won the award for best platform game of the year according to the readers of Crash magazine.
The game was voted number 57 in the Your Sinclair Readers' Top 100 Games of All Time.
Sequels
Moley Christmas was released later in the same year. A further Monty Mole game, called Impossamole was released in 1990. It took a different form to the previous games being more of a "console-style" arcade game.
References
External links
Auf Wiedersehen Monty at MobyGames
1987 video games
Amstrad CPC games
Commodore 16 and Plus/4 games
Commodore 64 games
Greml |
https://en.wikipedia.org/wiki/Dr.%20Sbaitso | Dr. Sbaitso is an artificial intelligence speech synthesis program released late in 1991 by Creative Labs in Singapore for MS-DOS-based personal computers. The name is an acronym for "SoundBlaster Acting Intelligent Text-to-Speech Operator."
History
Dr. Sbaitso was distributed with various sound cards manufactured by Creative Technology in the early 1990s.
The program "conversed" with the user as if it were a psychologist, though most of its responses were along the lines of "WHY DO YOU FEEL THAT WAY?" rather than any sort of complicated interaction. When confronted with a phrase it could not understand, it would often reply with something such as "THAT'S NOT MY PROBLEM." Dr. Sbaitso repeated text out loud that was typed after the word "SAY." Repeated swearing or abusive behavior on the part of the user caused Dr. Sbaitso to "break down" in a "PARITY ERROR" before resetting itself. The same would happen, if the user types "say parity."
The program introduced itself with the following lines:
HELLO [UserName], MY NAME IS DOCTOR SBAITSO.
I AM HERE TO HELP YOU.
SAY WHATEVER IS IN YOUR MIND FREELY,
OUR CONVERSATION WILL BE KEPT IN STRICT CONFIDENCE.
MEMORY CONTENTS WILL BE WIPED OFF AFTER YOU LEAVE,
SO, TELL ME ABOUT YOUR PROBLEMS.
The program was designed to showcase the digitized voices the cards were able to produce, though the quality was far from lifelike. Additionally, there was a version of this program for Microsoft Windows through the use of a program called Prody Parrot; this version of the software featured a more detailed graphical user interface.
Commands
If the user submits "HELP", a list of commands will appear. If the user then submits "M", more commands will appear. There are three pages of commands in total, with guidance on how to use each of the features.
See also
ALICE
ELIZA
History of natural language processing
References
External links
1991 video games
Speech synthesis
Applications of artificial intelligence
DOS games
DOS-only games
Chatbots
Video games developed in Singapore |
https://en.wikipedia.org/wiki/Michael%20Erlewine | John Michael Erlewine (; born July 18, 1941) is an American musician, astrologer, photographer, TV host, publisher and Internet entrepreneur who founded the music online database site AllMusic (previously known as All Music Guide) in 1991.
Career
Erlewine has had several careers. As a musician, he was active in the Michigan folk scene in the late 1950s and early 1960s. In 1961 he hitchhiked with Bob Dylan, and had traveled to Greenwich Village, Venice, California, and San Francisco. He and his brother Dan founded a blues band called The Prime Movers, which regularly played Chicago; other members included "Blue" Gene Tyranny (Robert Sheff). When the drummer left, they replaced him with Iggy Pop (James Osterberg), then 18 years old. The Prime Movers gave him the nickname "Iggy" as he had played in the band The Iguanas. According to biographer Jim Ambrose, the two years Osterberg spent in the band made him aware of "art, politics, and experimentation".
In 1977 Erlewine founded Matrix Software. He was the first person to program astrology on microcomputers and make astrological programs available to the astrological community. He has published more than forty books on astrology and related topics.
Michael Erlewine and his band, the Prime Movers, were inducted into the Michigan Rock and Roll Legends Hall of Fame in 2015.
Family
Erlewine and his wife have four children, including musician May Erlewine. He is the uncle of music critic Stephen Thomas Erlewine.
All Music Guide
In the 1990s, Erlewine founded the All Music Guide (allmusic.com), the All Movie Guide (allmovie.com), and the All Game Guide (allgame.com). The first site in particular has become an important popular music reference that licenses its content to numerous other websites. Erlewine regained control of Matrix Software (astrologysoftware.com) in November 2008 and continues as director of that company.
Television channel
Erlewine is the host on a 12-segment television channel called Spirit Grooves/Dharma Grooves, featuring topics on alternative awareness and reaching some 540,000 viewers.
Publications
Erlewine, Michael, 1980, "Astrological programming manual", American Federation of Astrologers, Tempe, Ariz.
Erlewine, Michael, 1992, "All-Music Guide", editor (Miller-Freeman)
Erlewine, Michael, 1999, "All-Music Guide to the Blues", editor (Miller-Freeman)
Erlewine, Michael, 1999, "All-Music Guide to Rock", editor (Miller-Freeman)
Erlewine, Michael, 1997, "All-Music Guide to Country", editor (Miller-Freeman)
Erlewine, Michael, 1996, "All-Music Guide to Jazz", editor (Miller-Freeman)
Erlewine, Michael, 1976, "The Sun Is Shining", paperback (Heart Center Publications)
Erlewine, Michael, 1976, "Astrophysical Directions", paperback (Heart Center Publications)
Erlewine, Michael, 1976, "Interface: Planetary Nodes”, paperback (Heart Center Publications)
Erlewine, Michael, 1981, “Local Space: Relocation Astrology”, paperback (Heart Center Publications)
Erlewine, Michael, “Tibetan |
https://en.wikipedia.org/wiki/Moonbase%203 | Moonbase 3 is a British science fiction television programme that ran for six episodes in 1973. It was a co-production between the BBC, 20th Century Fox and the American ABC network. Created by Doctor Who producer Barry Letts and script editor Terrance Dicks as a realistic alternative strand of TV science-fiction, it was not a commercial or critical success (Dicks himself has stated in a foreword to a collection of Tom Baker-era Doctor Who scripts that they "overdid the grimness and forgot about the sense of wonder that science fiction is all about").
It starred Donald Houston as Director David Caulder, who is appointed to the position after the previous director was killed while returning to Earth. Ralph Bates was Michel Lebrun, the deputy director, who was concerned about keeping to the rules. Fiona Gaunt played Doctor Helen Smith, the base's psychiatrist, and Barry Lowe played Tom Hill, the head of the base technical section.
The programme was notable for its combination of realistic spaceflight procedures, ensured by hiring BBC technical adviser James Burke, and its strong character-based writing. Although very dated in terms of its looks and assumptions about the future, it remains well regarded in retrospect.
Concept and setting
Moonbase 3 was set in the year 2003 – some 30 years into the future at time of broadcast – and dramatised life in the enclosed environment of the titular moonbase. Five world powers have colonised the Moon: America (Moonbase 1, commanded by Bill Jackson), Russia (Moonbase 2), Europe (Moonbase 3), China (Moonbase 4, commanded by General Cheng) and Brazil (Moonbase 5). The European Moonbase 3 has been in existence for 8 years at the time the series starts. With oversight provided by the European Space Assembly and the European Aeronautics and Space Administration, Moonbase 3 is a shoestring operation when compared with the Russian and American efforts and much of base director David Caulder's job is to stave off budget cuts or a complete shutdown in the face of sceptical bureaucrats.
Alongside technical problems such as stranded astronauts, explosive decompressions and failed experiments, the inhabitants of the moonbase must also deal with psychological problems arising from the cramped, dangerous environment they live in. In "Departure and Arrival", a mental breakdown suffered by a shuttle pilot has tragic consequences. "Achilles Heel" and "Outsiders" deal with the fallout from crew members' difficulty with living up to the standards they have set for themselves. "Behemoth" and "View of a Dead Planet" deal with forms of mass hysteria.
Principal characters
Dr David Caulder (Donald Houston)
Appointed Director of Moonbase 3 following the death of his predecessor, David Caulder is a scientist, academic and administrator. A lecturer at the University of Oxford, he rose to prominence when he was appointed Chancellor of the University during a period of student unrest and managed to calm the situation down, earning |
https://en.wikipedia.org/wiki/List%20of%20data%20references%20for%20chemical%20elements | The List of data references for chemical elements is divided into datasheets that give values for many properties of the elements, together with various references. Each datasheet is sequenced by atomic number.
References for chemical elements
List of chemical elements — with basic properties like standard atomic weight, m.p., b.p., abundance
Abundance of the chemical elements
Abundances of the elements (data page) — Earth's crust, sea water, Sun and Solar System
Abundance of elements in Earth's crust
Atomic radii of the elements (data page) — atomic radius (empirical), atomic radius (calculated), van der Waals radius, covalent radius
Boiling points of the elements (data page) — Boiling point
Critical points of the elements (data page) — Critical point
Densities of the elements (data page) — Density (solid, liquid, gas)
Elastic properties of the elements (data page) — Young's modulus, Poisson ratio, bulk modulus, shear modulus
Electrical resistivities of the elements (data page) — Electrical resistivity
Electron affinity (data page) — Electron affinity
Electron configurations of the elements (data page) — Electron configuration of the gaseous atoms in the ground state
Electronegativities of the elements (data page) — Electronegativity (Pauling scale)
Hardnesses of the elements (data page) — Mohs hardness, Vickers hardness, Brinell hardness
Heat capacities of the elements (data page) — Heat capacity
Heats of fusion of the elements (data page) — Heat of fusion
Heats of vaporization of the elements (data page) — Heat of vaporization
Ionization energies of the elements (data page) — Ionization energy (in eV) and molar ionization energies (in kJ/mol)
Melting points of the elements (data page) — Melting point
Oxidation states of the elements — Oxidation state
Speeds of sound of the elements (data page) — Speed of sound
Thermal conductivities of the elements (data page) — Thermal conductivity
Thermal expansion coefficients of the elements (data page) — Thermal expansion
Vapor pressures of the elements (data page) — Vapor pressure |
https://en.wikipedia.org/wiki/List%20of%20Saudia%20destinations | Saudi Arabian airline Saudia flies to over 120 cities in Asia, Europe, Africa and North America from its hubs of Jeddah, Riyadh and Medina.
The airline plans to expand its fleet and network by 2030 serving 150 destinations worldwide. The airline had planned 11 destinations this year and 39/49 new aircraft orders.
Destinations
See also
Saudia Cargo#Destinations for cargo destinations
References
Saudia
Lists of airline destinations
Saudi Arabia transport-related lists
SkyTeam destinations |
https://en.wikipedia.org/wiki/Harz%20Narrow%20Gauge%20Railways | The Harz Narrow Gauge Railways (German: Harzer Schmalspurbahnen or HSB) is a railway company that operates a network in the Harz mountains, in central Germany (formerly East Germany - officially the German Democratic Republic ). The company was formed after the Second World War as a merger of two earlier companies. It owns about 140 kilometres (86 miles) of track, connecting the principal towns of Wernigerode, Nordhausen and Quedlinburg and several smaller settlements in the area. Much of the network is steeply graded and picturesque, but its most popular destination is the Brocken, the highest mountain in the region. The company runs a significant number of its trains with steam haulage, mostly employing 1950s vintage 2-10-2 tank locomotives, hauling traditional open-platform bogie carriages. The company is mainly owned by the various local authorities whose territories it serves.
Forerunners
The present-day narrow gauge operator emerged as a result of the merger of two different railway companies that operated their own lines:
In 1887 the first narrow gauge line in the Harz, from Gernrode to Mägdesprung, was opened. It was owned by the Gernrode-Harzgerode Railway Company (Gernrode-Harzgeroder Eisenbahn-Gesellschaft) or GHE. In the years that followed, the line was extended and the network enlarged. The GHE network included the railway lines from Gernrode to Harzgerode, Hasselfelde and Eisfelder Talmühle. Because the line followed a section of the valley of the Selke, a small river, it was also nicknamed the Selke Valley Railway (Selketalbahn). Another pet name was the Anhalt Harz Railway (Anhaltische Harzbahn).
In 1896 a second railway company was entered into the commercial register that wanted to build a narrow gauge railway through the Harz. On 22 December 1898 the Nordhausen-Wernigerode Railway Company (Nordhausen-Wernigeroder Eisenbahn-Gesellschaft) or NWE opened special services on the line from Wernigerode to the Brocken (the Brocken Railway). The so-called Trans-Harz Railway (Harzquerbahn) from Wernigerode via Drei Annen Hohne to Nordhausen was fully opened to traffic on 27 March 1899.
After the Second World War the entire network fell within the Soviet Zone of Occupation, later East Germany. The GHE and NWE were subordinated to the East German Deutsche Reichsbahn in on 1 April 1949.
The HSB period
On 1 February 1993 the private railway company Harzer Schmalspurbahnen GmbH (HSB) took over all stock, lines, staff, etc., from the Deutsche Reichsbahn and since then has acted as both the railway operating company (EVU) and railway infrastructure company (EIU). Shareholders in the HSB are the districts of Harz and Nordhausen, the communes along the railways, the town of Quedlinburg, the municipality of Tanne and the spa company of Braunlage. Its head office is in Wernigerode, where its workshops and locomotive depot are located. Today the HSB has the longest single network of narrow gauge railway in Germany, with a total length of |
https://en.wikipedia.org/wiki/Ike%20Nassi | Isaac Robert "Ike" Nassi, born 1949 in Brooklyn, New York, is the founder, and former CTO and chairman at TidalScale, Inc. before its acquisition by HPE, and an Adjunct Professor of Computer Science at the University of California, Santa Cruz. He is known for creating (with Ben Shneiderman) the highly influential Nassi–Shneiderman diagram notation. He also helped design the Ada programming language.
Ike is a Life Fellow of the IEEE, and a Senior Life Member of ACM.
Early life
Ike is a graduate of Brooklyn Technical High School. He earned a bachelor's degree in mathematics, a master's degree and doctorate in Computer Science from Stony Brook University, New York, in 1974.
Career
Ike was formerly EVP and Chief Scientist at SAP AG, and the practice lead of the SAP Research Technology Infrastructure practice, which was focused on guiding SAP's technology infrastructure vision, direction, and execution. His group was also responsible for the SAP Sponsored Academic Research Program.
Prior to his work at TidalScale and SAP, Ike helped start three companies: Firetide, InfoGear Technology, and Encore Computer. He co-founded the wireless mesh company Firetide and then served as its EVP, chief technology officer (CTO), and chairman of the board. Ike was the CTO and head of product operations at InfoGear prior to its acquisition by Cisco Systems. He helped start Encore Computer, a pioneer in symmetric multiprocessors and forerunner of today's multicore processors.
In addition to his start-up experience, Ike held an executive position at Cisco Systems following its acquisition of InfoGear Technology. He joined Apple Inc. to run the new Advanced Technology Group research lab in Cambridge, MA near MIT, work on the Dylan programming language intended for the Apple Newton, become VP of Development Tools in California, become SVP of Software, launch MkLinux, and become a Corporate Officer. He served on the boards of Taligent and the OpenDoc Foundation. He also held executive and senior management roles at Visual Technology (Tewkesbury, MA), Digital Equipment Corporation, and at SofTech.
Ike serves as an active member of the board of trustees of the Computer History Museum in Mountain View, California, and formerly served on the board of the Anita Borg Institute for Women and Technology. He is a member of the Industry Advisory Board of the IEEE Computer Society, and member of the Advisory Boards of Northwestern University, Stony Brook University, and Peking University. He has been a visiting scholar at Stanford University and U.C. Berkeley, and was most recently a visiting scientist at MIT. Nassi holds several patents and He was a member of the Defense Advanced Research Projects Agency's Information Systems and Technology group and has testified before Congress on the Emerging Telecommunications Act of 1991.
Awards
Ike was awarded a Certificate for Distinguished Service in 1983 from the Department of Defense for his work on the design of the Ada programming |
https://en.wikipedia.org/wiki/International%20Superstar%20Soccer%2064 | International Superstar Soccer 64 (officially abbreviated as ISS 64, originally released in Japan as and then later adapted as ) is a video game developed by Konami Computer Entertainment Osaka in the International Superstar Soccer series by Konami. Its team lineup follows the Super NES version of International Superstar Soccer Deluxe, only with South Africa replacing Morocco.
International Superstar Soccer 64 was met with critical acclaim, and often called one of the best of the Nintendo 64's third-party releases.
Gameplay
The game is similar to the PlayStation version (including the same player names, with the exception of Japan, England and a handful of American players), but with some teams having a more inaccurate home or away kit. The USA, for example, uses their 1994 World Cup Adidas "stripes" kit as their home kit and their then-current Nike home kit as their away kit. Gameplay is similar to that of the Super NES predecessor, International Superstar Soccer Deluxe, upgraded for the Nintendo 64 with 3D animation. While it keeps largely the same team squads (with the teams now sporting near-authentic kits), South Africa debuted in this game as a selectable side, replacing Morocco. However, the Japanese version has teams that are not present in the Western versions: Bolivia, Yugoslavia, Iran, Australia, Canada and Saudi Arabia.
There are six game modes, including single match, league battle and penalty shoot-out. The player can assign a team member to cover a specific member of the opposing team. The International Cup has the player competing against a range of teams from around the world in a round-robin tournament, while the World League is a series of 70 matches against every one of other teams in the game.
The player can also contest a penalty shoot-out competition with up to 4 players or attempt to complete certain scenarios. These matches are set up with a specific goal—for example, scoring a goal within a given time limit or stopping the opposing team from scoring.
Teams
USA/European version exclusive
Japanese version exclusive
Reception
The game was a commercial success, selling over 1 million units in Europe.
The game met with critical acclaim in Japan. In an interview around the time of the game's release in the region, Shigeru Miyamoto said that "Konami's soccer game may be better than [Nintendo's N64] games. It looks really good." Edge said that the Japanese import was "the most versatile and entertaining football game seen on any platform, and forms a strong addition to Nintendo's 64bit [sic] portfolio." GamePro said that Striker "ranks as the best soccer game for the Japanese N64 and quite possibly one of the best soccer titles in Japan. If you own a Japanese N64, Strikers worth a kick-off." Next Generation said that the same Japanese import "goes farther than most titles in presenting a fantastic look and feel. Just make sure you have a few friends around to play it, otherwise you'll tire from 10-3 wi |
https://en.wikipedia.org/wiki/International%20Superstar%20Soccer%20Pro | International Superstar Soccer Pro (known in Japan as and in North America as Goal Storm '97) is a football video game developed by Konami Computer Entertainment Tokyo. It is a slightly improved version of the Japan-exclusive J-League Jikkyō Winning Eleven 97.
It features 32 international teams, four different stadia, 13 team formations along with eight unique strategies and a choice of Exhibition Mode, International League, International Cup and a Penalty Kick mode. It can be played as a one or two player game.
Teams available
International Superstar Soccer Pro includes 32 different international teams based on their real equivalents of season 1996/1997 with accurate home, away and goalkeeper kits featuring manufacturer logos and national emblems. The line-up of each team consists of 16 fictional players.
Reception
The game was met with positive reviews. Critics were particularly pleased with the fluid, lifelike animations, and the simplicity and responsiveness of the controls. In addition, the game was also praised for its strong blend of realism and fun, an aspect which was noted by Kraig Kujawa of Electronic Gaming Monthly. However, the audio was criticized, with the primary complaints being the inconsistency of the announcer and the annoying clicking sound which accompanies players moving down the field. In Japan, Famitsu gave it a score of 26 out of 40.
Next Generation was generally positive to the game. Although the magazine commented that the game cannot be compared with Worldwide Soccer '97 for Sega Saturn in terms of graphics and controls, they appreciated the pace and strategy of the game, and ultimately recommended the game for PlayStation owners. GamePro concluded that it comes in second to FIFA 97, but recommended players rent both games to see which one better suits their tastes. In Absolute PlayStation, Martin gave it an 86% and called it "the first soccer game on PSX that has the correct balance between superb graphics and intuitive controls", while co-reviewer Adam gave it an 8/10 and praised the players for being easily recognizable despite the absence of a players' license.
Legacy
International Superstar Soccer Pro was considered a "game-changer" for football games, which had been largely dominated by rival FIFA on home systems for the last several years. Developed by Konami Tokyo, ISS Pro introduced a new 3D engine capable of better graphics and more sophisticated gameplay than its rival. Whereas FIFA had a simpler "arcade-style" approach to its gameplay, ISS Pro introduced more complex simulation gameplay emphasizing tactics and improvisation, enabled by tactical variety such as nine in-match strategy options. It spawned the Pro Evolution Soccer (PES) series, which became known for having "faster-paced tactical play" and more varied emergent gameplay, while FIFA was known for having more licenses. In the late 2000s, EA responded by borrowing gameplay elements from PES to improve FIFA, which eventually pulled ahead c |
https://en.wikipedia.org/wiki/ISS%20Pro%20Evolution | ISS Pro Evolution (known as World Soccer: Jikkyou Winning Eleven 4 in Japan) is the third video game in the ISS Pro series, developed exclusively for the PlayStation by Konami Computer Entertainment Tokyo, a division of Konami.
Content
The number of international teams has been increased from the previous release. The teams are still not licensed, although they have their original home, away and goalkeeper kits with emblems and logos resembling their official emblems. However, like in ISS Pro 98, player names are misspelled, but most of them sound right while being pronounced, such as Nigel Martyn being known in the game as "Martin" (the unlicensed name has the same pronunciation as the real name). Each team consists of 22 players.
In ISS Pro Evolution, for the very first time in the series club teams have been included (there are 16 clubs featured in the game, such as FC Barcelona) along with national teams; however, they could only be played in the new mode Master League, unless the player has exported the team on the memory card. Club teams are named with their respective city names in reference to their real-life equivalents, such as "London" and "Amsterdam" for Arsenal and Ajax, respectively. Just like national teams, club teams consist of 22 players. The line-ups reflect the actual squads of the 1998/1999 season, as well as the uniforms.
The 10 different stadiums included in ISS Pro Evolution are no longer generic stadiums named in letters order like in previous versions (although there is an imitation of the old Wembley Stadium in ISS Pro 98). The stadiums' fictional names stand for their real-life equivalents; for example, Old Trafford appears as "Trad Brick Stadium".
Master League
One of the main new features of ISS Pro Evolution is a new game mode named the Master League. The Master League is an exclusive league consisting of 16 club teams included in the game reflecting the best European clubs of that time. Regardless which team you choose to play its squad will be replaced with generic squad consisting of fictional players. The idea of the Master League, beside winning the whole competition, is to complete a squad with real players on terms of transfers. The transfers are based on exchanging players for points you gain according to your match record, which is calculated accordingly to the results achieved - a victory equals 8 points and a draw gains 4 points. Bonus points depending on the goal difference at the end of the match are added to the total point score as well (the bonus is adjusted to the difficulty of the Master League thus goal difference on the hard difficulty level is multiplied by 2). Upon completion of the Master League, due to the lack of different divisions, clubs are not promoted or relegated, regardless of their finishing position. Instead, the Master League begins from the start, and all players acquired from transfers are kept in the player's squad, and the player can continue playing the Master League to e |
https://en.wikipedia.org/wiki/Business%20activity%20monitoring | Business activity monitoring (BAM) is software that aids the monitoring of business activities that are implemented in computer systems.
The term was originally coined by analysts at Gartner, Inc. and refers to the aggregation, analysis, and presentation of real-time information about activities inside organizations, customers, and partners. A business activity can either be a business process that is orchestrated by a business process management (BPM) software, or a series of activities spanning across multiple systems and applications. BAM is intended to provide a summary of business activities to operations managers and upper management.
Description
Business activity monitoring provides real-time information about the status and results of various operations, processes, and transactions. The main benefits of BAM are to enable an enterprise to make better informed business decisions, quickly address problem areas, and re-position organizations to take full advantage of emerging opportunities.
One of the most visible features of BAM is the presentation of information on dashboards containing the key performance indicators (KPIs) used to provide assurance and visibility of activity and performance. This information is used by technical and business operations to provide visibility, measurement, and assurance of key business activities. It can also be exploited by event correlation to detect and warn against impending problems.
Although BAM systems usually use a computer dashboard display to present data, BAM is distinct from the dashboards used by business intelligence (BI) insofar as events are processed in real-time or near real-time and pushed to the dashboard in BAM systems, whereas BI dashboards refresh at predetermined intervals by polling or querying databases. Depending on the refresh interval selected, BAM and BI dashboards can be similar or vary considerably.
Some products provide trouble notification functions, which allows them to interact automatically with the issue tracking system. For example, whole groups of people can be sent e-mails, voice or text messages, according to the nature of the problem. Automated problem solving, where feasible, can correct and restart failed processes.
Processing events
While early technology processed events emitted as the process was being orchestrated, this had the disadvantage of requiring enterprises to invest in BPM before being able to acquire and use BAM. The newer products are based on complex event processing (CEP) technology, and can process high volumes of underlying technical events to derive higher level business events, therefore reducing the dependency on BPM, and providing BAM to a wider audience of customers.
Examples
A bank may be interested in minimizing the amount of capital it borrows overnight from a central bank. Interbank transfers must be communicated and arranged through automation by a set time each business day. The failure of any vital communication could cost the |
https://en.wikipedia.org/wiki/Cannonball%20Run%202001 | Cannonball Run 2001 is a reality television series broadcast on the USA Network in 2001. It was inspired by the Cannonball Baker Sea-to-Shining-Sea Memorial Trophy Dash, an outlaw road race of the 1970s which was the source for the famous Cannonball Run movies. The show featured a series of five location-specific challenges along a New York-to-Los Angeles course, as in the original race.
Development of the series started without the participation of Brock Yates, organizer of the original Cannonball and holder of the trademark; indeed, the production company paid Yates for the use of the name just before the show debuted. Yates was not pleased with the series, as he felt it was fake and staged.
In 2005, Yates teamed up with a Cannonball driver and film producer J Sanchez to produce a more authentic reality series called Cannonball: This Is Reality to run alongside the actual One Lap of America race. The project was shelved in 2006 due to lack of interest from networks.
External links
USA Network original programming
2000s American reality television series
2001 American television series debuts
2001 American television series endings |
https://en.wikipedia.org/wiki/Fortinet | Fortinet is a cybersecurity company with headquarters in Sunnyvale, California. The company develops and sells security solutions like firewalls, endpoint security and intrusion detection systems. Fortinet has offices located all over the world.
Brothers Ken Xie and Michael Xie founded Fortinet in 2000. The company's first and main product was FortiGate, a physical firewall. The company later added wireless access points, sandbox and messaging security. The company went public in November 2009.
History
Early history
In 2000, Ken Xie and his brother Michael Xie co-founded Appligation Inc. The company was renamed ApSecure in December 2000 and later renamed again to Fortinet, based on the phrase "Fortified Networks."
Fortinet introduced its first product, FortiGate, in 2002, followed by anti-spam and anti-virus software. The company raised $13 million in private funding from 2000 to early 2003. Fortinet's first channel program was established in October 2003. The company began distributing its products in Canada in December 2003 and in the UK in February 2004. By 2004, Fortinet had offices in Asia, Europe, and North America.
In April 2005, a German court issued a preliminary injunction against Fortinet's UK subsidiary in relation to source code for its GPL-licensed elements. The dispute ended a month later after Fortinet agreed to make the source code available upon request.
Growth and expansion
Fortinet became profitable in the third quarter of 2008. Later that year, the company acquired the intellectual property of IPLocks, a database security and auditing company. In August 2009, Fortinet acquired the intellectual property and other assets of Woven Systems, an Ethernet switching company.
According to market research firm IDC, by November 2009, Fortinet held over 15 percent of the unified threat management market. Also in 2009, CRN Magazines survey-based annual report card placed Fortinet first in network security hardware, up from seventh in 2007. In November 2009, Fortinet had an initial public offering. By the end of the first day of trading, the company had raised $156 million.
By 2010, Fortinet had $324 million in annual revenues and held the largest share of the unified threat management market according to IDC.
Fortinet made four acquisitions from 2012 to 2016. The company acquired app-hosting service XDN (formerly known as 3Crowd) in December 2012, Coyote Point in 2013, and Wi-Fi hardware company Meru Networks in 2015. In June 2016, Fortinet acquired IT security, monitoring and analytics software vendor, AccelOps.
Recent history
In July 2014, Fortinet announced a technical certification program called the Network Security Expert (NSE) program. In March 2016, Fortinet launched a Network Security Academy to help fill open cybersecurity jobs in the U.S. Fortinet donated equipment and provided information to universities to help train students for jobs in the field. Also in 2016, Fortinet launched a program called FortiVet to recruit |
https://en.wikipedia.org/wiki/Xinu | Xinu Is Not Unix (Xinu, a recursive acronym), is an operating system for embedded systems, originally developed by Douglas Comer for educational use at Purdue University in the 1980s. The name is both recursive, and is Unix spelled backwards. It has been ported to many hardware platforms, including the DEC PDP-11 and VAX systems, Motorola 68k (Sun-2 and Sun-3 workstations, AT&T UNIX PC, MECB), Intel x86, PowerPC G3, MIPS, ARM architecture and AVR (atmega328p/Arduino). Xinu was also used for some models of Lexmark printers.
Despite its name suggesting some similarity to Unix, Xinu is a different type of operating system, written with no knowledge of the Unix source code, or compatibility goals. It uses different abstractions, and system calls, some with names matching those of Unix, but different semantics.
History
Xinu first ran on the LSI-11 platform. A Motorola 68000 port was done by Derrick Burns in 1984. A VAX port was done in 1986 by Comer and Tom Stonecypher, an IBM PC compatible port in 1988 by Comer and Timothy Fossum, a second Motorola 68000 (Sun 3) port circa 1988 by Shawn Ostermann and Steve Chapin, a Macintosh platform port in 1989 by Comer and Steven Munson, an Intel 80486 version by John Lin in 1995, a SPARC port by Jim Griffioen, and a PowerPC port in 2005 and MIPS port of Embedded Xinu in 2006 by Dennis Brylow.
Later developments
Dennis Brylow at Marquette University has ported Xinu to both the PowerPC and MIPSEL processor architectures. Porting Xinu to reduced instruction set computing (RISC) architectures greatly simplified its implementation, increasing its ability to be used as a tool for teaching and research.
MIPSEL was chosen as a target architecture due to the proliferation of the MIPSEL-based WRT54GL router and the cool incentive that motivates some students to become involved in projects. The first embedded Xinu systems laboratory based on the WRT54GL router was developed at Marquette University. In collaboration with the Marquette Xinu team, an embedded Xinu laboratory was formed at the University of Mississippi, laying the groundwork for further work on developing a Virtual Xinu Laboratory.
Embedded Xinu
Embedded Xinu is a fresh reimplementation of the Xinu design, in ANSI C, on an embedded RISC architecture. The MIPS port of Embedded Xinu was developed from 2006 to 2010 at Marquette University, under the direction of Dr. Dennis Brylow. The Embedded Xinu operating system is copyright (c) 2007, 2008, 2009, and 2010 by Douglas Comer and Dennis Brylow.
University of Mississippi Embedded Xinu Laboratory
The Xinu Laboratory in the University of Mississippi's Department of Computer and Information Science was formed during the summer of 2008 by Dr. Paul Ruth. Assisting him in the project were Jianshu Zhao and Patrick Hoover, who were both graduate students at the time. Also assisting him were Chelsea Norman and Kevin Kent, who were undergraduates at the time. The initial laboratory is based on the Marquette University |
https://en.wikipedia.org/wiki/Dell%20Dimension | The Dell Dimension series was a line of home and business desktop computers manufactured by Dell. In 2007, the Dimension series was discontinued and replaced with the Dell Inspiron series for low-end models and the Dell Studio series for higher-end models.
The last high-end computers to be released under the Dimension line were the 9200 and 9200c (XPS 410 and XPS 210 in the American market, respectively). The E520, E521 and C521 were re-introduced under the Inspiron line under the names Inspiron 530, 531, 530s and 531s, with a revised case design.
Models
Dimension 4xx Series - 433SV, 466V
Dimension 9xx Series - 900
Dimension 1xxx Series - 1000, 1100
Dimension 2xxx Series - 2010, 2100, 2200, 2300, 2300C, 2350, 2400, 2400C
Dimension 3xxx Series - 3000, 3100, 3100c, 3400, 3800
Dimension 4xxx Series - 4100, 4200, 4300, 4300S, 4400, 4500, 4500C, 4500S, 4550, 4600, 4600C, 4700, 4700C, 4700 MCE, 4800
Dimension 5xxx Series - 5000, 5100, 5150, 5150C, 5200, 5200C
Dimension 8xxx Series - 8100, 8200, 8250, 8300, 8300N, 8400, 8400 MCE
Dimension 9xxx Series - 9100, 9150, 9200, 9200C
Dimension B Series - B110
Dimension C Series - C521
Dimension D Series - DE051
Dimension E Series - E310, E510, E520, E521, E530
Dimension J Series
Dimension L Series (Lxxx is MHz; R is PIII; C, CX, CXE are Celeron)
L___c - L400c, L433c, L466c, L500c
L___cx - L433cx, L500cx, L533cx, L566cx, L600cx, L633cx, L667cx, L700cx, L733cx, L800cx
L___cxe - L700cxe, L800cxe
L___r - L500r, L550r, L600r, L667r, L733r, L800r, L866r, L933r, L1000r, L1100r
Dimension M Series - M166a, M200a, M233a
Dimension P Series - P100a, P133a, P166a, P75t, P90t, P100t, P120t, P133t, P133v, P166v, P200v
Dimension V Series - V333, V350, V400, V450, V333c, V400c, V433c, V466c
Dimension XPS Series
XPS 4 - 466V
XPS B - B866, B933, B1000, B533r, B600r, B667r, B733r, B800r, B866r, B933r, B1000r
XPS D - D233, D266, D300, D333
XPS H - H233, H266
XPS M - M166s, M200s, M233s
XPS P - P60, P75, P90, P100, P90c, P100c, P120c, P133c, P150c, P166c, P133s, P166s, P200s
XPS Pro - Pro150, Pro200, Pro150n, Pro180n, Pro200n
XPS R - R350, R400, R450
XPS T - T450, T500, T550, T600, T600r, T650r, T700r, T750r, T800r, T850r
Technical details
4xx series
9xx series
1xxx series
2xxx series
3xxx and 5xxx series
* As of BIOS Revision 1.1.11 # As of BIOS Revision 2.4
4xxx series
8xxx series
The Dimension 8200 shipped with two different motherboards depending on the release date. The earlier version used the i850 chipset with a Socket 478 (400 MHz FSB), while the later version used the i850E chipset with a Socket 478 (400 MHz and 533 MHz FSB).
9xxx series
The Dimension 9150 was known as the XPS 400 in United States markets, along with the Dimension 9200 being rebadged to XPS 410 in U.S. markets.
L series
M series
P series
V series
*Dell lists this speed in the technical specifications, however the "V466c" model does not seem to have been released, and Intel never released a 466 MHz Slot 1 Celeron
XPS series
Referenc |
https://en.wikipedia.org/wiki/8%20%28Do%20As%20Infinity%20video%29 | 8 is Do As Infinity's fourth video collection.
Video track listing
"Under the Sun"
"Under the Moon"
"Field of Dreams" (bonus clip)
References
External links
8 at Avex Network
Do As Infinity video albums
2004 video albums
Music video compilation albums
2004 compilation albums |
https://en.wikipedia.org/wiki/Trapped-ion%20quantum%20computer | A trapped-ion quantum computer is one proposed approach to a large-scale quantum computer. Ions, or charged atomic particles, can be confined and suspended in free space using electromagnetic fields. Qubits are stored in stable electronic states of each ion, and quantum information can be transferred through the collective quantized motion of the ions in a shared trap (interacting through the Coulomb force). Lasers are applied to induce coupling between the qubit states (for single qubit operations) or coupling between the internal qubit states and the external motional states (for entanglement between qubits).
The fundamental operations of a quantum computer have been demonstrated experimentally with the currently highest accuracy in trapped-ion systems. Promising schemes in development to scale the system to arbitrarily large numbers of qubits include transporting ions to spatially distinct locations in an array of ion traps, building large entangled states via photonically connected networks of remotely entangled ion chains, and combinations of these two ideas. This makes the trapped-ion quantum computer system one of the most promising architectures for a scalable, universal quantum computer. As of April 2018, the largest number of particles to be controllably entangled is 20 trapped ions.
History
The first implementation scheme for a controlled-NOT quantum gate was proposed by Ignacio Cirac and Peter Zoller in 1995, specifically for the trapped-ion system. The same year, a key step in the controlled-NOT gate was experimentally realized at NIST Ion Storage Group, and research in quantum computing began to take off worldwide.
In 2021, researchers from the University of Innsbruck presented a quantum computing demonstrator that fits inside two 19-inch server racks, the world's first quality standards-meeting compact trapped-ion quantum computer.
Paul trap
The electrodynamic quadrupole ion trap currently used in trapped-ion quantum computing research was invented in the 1950s by Wolfgang Paul (who received the Nobel Prize for his work in 1989). Charged particles cannot be trapped in 3D by just electrostatic forces because of Earnshaw's theorem. Instead, an electric field oscillating at radio frequency (RF) is applied, forming a potential with the shape of a saddle spinning at the RF frequency. If the RF field has the right parameters (oscillation frequency and field strength), the charged particle becomes effectively trapped at the saddle point by a restoring force, with the motion described by a set of Mathieu equations.
This saddle point is the point of minimized energy magnitude, , for the ions in the potential field. The Paul trap is often described as a harmonic potential well that traps ions in two dimensions (assume and without loss of generality) and does not trap ions in the direction. When multiple ions are at the saddle point and the system is at equilibrium, the ions are only free to move in . Therefore, the ions will re |
https://en.wikipedia.org/wiki/Atari%20Coldfire%20Project | The Atari Coldfire Project (ACP) is a volunteer project that has created a modern Atari ST computer clone called the FireBee.
Reason for the project
The Atari 16 and 32 computer systems (ST, TT and Falcon) were popular home computers in the 1980s and the first half of the 1990s. Atari withdrew largely from the computer market in 1993, and completely in 1995-1996 when Atari merged with JTS and all support for the platform by Atari was dropped. The systems Atari had built became increasingly left behind as newer and faster systems came out. The few dedicated users who were left wanted more processing power to develop more-advanced TOS applications, paving the way for a number of "clone" machines, such as the 68040-based Milan and the 68060-based Hades, both of which were considerably more powerful than the 68030-based TT and Falcon and the 68000-based ST/STe. These machines support ISA and PCI buses, which make the use of network and graphics cards designed for the PC possible (something no original Atari machines could do). The machines also support tower cases, making it possible to use internal CD drives.
A new clone named Phenix never made it to market in final form. However, the powerful rev. 6 68060 CPU it would use did make it into a new accelerator board for the Falcon, the CT60/CT63 series, which meant that, for the first time, the Atari platform had a CPU rated at over 100 MHz. The use of a high-speed bus and PC133 RAM also accounted for a big performance improvement and significantly increased the Falcon's on-board memory limit from 14 MiB to 512 MiB with a CT60.
These systems were not mass-produced and are now hard to find. While the CT60/CT63 needs a Falcon "donor" system, and is still not as powerful as the ACP potential system could be, the ACP will use a completely new design, moving away from 68K CPUs to the newer ColdFire class, more powerful than even the fastest 68K chips while still having a largely similar (but not completely compatible) instruction set. It will also allow for the integration of many I/O ports that are currently only available through extensive hardware modification on the Atari platform.
Specifications
The specifications for the ACP have changed considerably over time, in response to advancing technology and price considerations. However, it seems the following will be in the final design according to former Atari Coldfire Project homepage:
Processor: Coldfire MCF5474, 264 MHz, 400 MIPS
RAM: DDR, 512 MB Main- + 128 MB Video- and Special-RAM on Board, Speed: 1 Gbit/s
Flash: 8 MB on Board for Operating Systems
Atari compatible interface ports:
TT/Falcon-IDE,
ST/TT-Floppy
TT-SCSI (but faster)
ACSI
ROM-Port: 2×2 mm Connector
Printer Port, parallel
ST/TT-serial
Midi
ST-Sound, YM2149 over AC'97
ST/TT/Falcon-Video
Atari-Keyboard with Mouse
Other Ports:
Ethernet 10/100, 1 Port
USB 2.0 Host (ISP1563), 5 Ports
Compact-Flash, 1 Port
SD-Card, 1 Port
AC'97 Stereo Codec with DMA-Sound Output and Sa |
https://en.wikipedia.org/wiki/Lazarus%20Churchyard | Lazarus Churchyard is a fictional character in a British comics series, created in 1991 by Warren Ellis and illustrated by Matt Brooker under the pseudonym D'Israeli. The stories are cyberpunk in theme, although Ellis himself does not consider it so and prefers to call it "decadent SF".
Publication history
Lazarus Churchyard stories originally appeared in Blast! magazine, and were reprinted in the Judge Dredd Megazine. Although some stories have been illustrated by others, Ellis has said he considers only the D'Israeli-illustrated work "the definitive Churchyard".
Tundra Press released three-issue comic-book series, Lazarus Churchyard, in 1992. This was collected the same year as the trade paperback Lazarus Churchyard: The Final Cut (Atomeka Press), reissued by Image Comics () in 2001.
Fictional character biography
The eponymous central character took part in a "plasborging" experiment in which around eighty per cent of his body was replaced with an intelligent, evolving plastic, which can react in 0.132 of a second to any situation and adapt accordingly. In the story, this adaptation usually takes the form of growing spikes, blades or similar weapons. The plastic also processes toxins of all kinds, essentially making Churchyard immortal.
The stories take place 400 years after this experiment. Churchyard is by now tired of his immortality and wants to die. He inhabits a dystopian future in which the United Kingdom has been taken over by the corporation Isis-Elek and renamed Savoy, while large parts of the globe have been rendered uninhabitable by germ warfare.
In popular culture
The hard rock bands Lucy's Drowning and Meathook Seed both took their names from elements of the story.
Footnotes
References
British comics titles
Image Comics titles
2000 AD comic strips |
https://en.wikipedia.org/wiki/TFP | TFP may stand for:
Concepts
Tailored fiber placement
Thin filament pyrometry
Thin film polarizer
Time for print
Total factor productivity
Total functional programming
Transference focused psychotherapy
Tapered floating point
Trust framework policy
Travaux Forcés à Perpetuité, French for "hard labour for life", as stated in Les Misérables by Victor Hugo
Organisations
Tradition, Family and Property
American Society for the Defense of Tradition, Family and Property
Terry Farrell and Partners
Taiwan Farmers' Party, a political party in Taiwan
The Food Project
Tobacco-Free Portfolios
Products
Trifluoperazine
Transformers: Prime |
https://en.wikipedia.org/wiki/Rail%20Alphabet | Rail Alphabet is a neo-grotesque sans-serif typeface designed by Jock Kinneir and Margaret Calvert for signage on the British Rail network. First used at Liverpool Street station, it was then adopted by the Design Research Unit (DRU) as part of their comprehensive 1965 rebranding of the company.
A redesigned version, Rail Alphabet 2, is planned to be used across the Great British Railways network, whilst the double arrow logo will also be restored as the primary brand identifier for the network.
Rail Alphabet is similar to a bold weight of Helvetica, but with some differences in character shapes, stroke width and x-height to aid legibility. The typeface also has some similarities to Akzidenz-Grotesk, which had earlier provided the same designers the broad inspiration for the Transport typeface used for road signs in the United Kingdom.
The typeface was designed specifically for signage and the designers included features to support this such as a bespoke letter-spacing system and two slightly different weights to provide optimum visibility on both light and dark backgrounds.
British Rail
In 1949, the Railway Executive decided on standard types of signs to be used at all stations. Lettering was to use redrawn versions of Gill Sans lettering on a background of the regional colour. This style persisted for nearly 15 years.
In the early 1960s, British Railways (which rebranded as British Rail in 1965) trialled new signs at Coventry station that made use of Kinneir and Calvert's recently launched Transport typeface. While Transport has since been an enduring success on road signs, it was designed around the specific needs of road users – such as visibility at speed and in all weathers. The subsequent creation of Rail Alphabet was intended to provide a style of lettering more specifically suited to stations where it would primarily be viewed indoors by pedestrians.
The Design Research Unit's 1965 rebranding of British Railways included a new logo (the double arrow), a shortened name British Rail, and the total adoption of Rail Alphabet for all lettering other than printed matter including station signage, trackside signs, fixed notices, signs inside trains and train liveries.
Key elements of the rebranding were still being used during much of the 1980s and Rail Alphabet was also used as part of the livery of Sealink ships until that company's privatisation in the late 1980s. However, by the end of the 1980s, British Rail's various business units were developing their own individual brands and identities with use of Rail Alphabet declining as a consequence. The typeface remained in near-universal use for signs at railway stations but began to be replaced with alternatives in other areas, such as in InterCity's 1989 Mark 4 passenger carriages which made use of Frutiger for much of their interior signage.
After British Rail
The privatisation of British Rail from 1994 accelerated the decline in use of the typeface on the railway network with most o |
https://en.wikipedia.org/wiki/IP%20Pascal | IP Pascal is an implementation of the Pascal programming language using the IP portability platform, a multiple machine, operating system and language implementation system. It implements the language "Pascaline" (named after Blaise Pascal's calculator), and has passed the Pascal Validation Suite.
Overview
IP Pascal implements the language "Pascaline" (named after Blaise Pascal's calculator), which is a highly extended superset of ISO 7185 Pascal. It adds modularity with namespace control, including the parallel tasking monitor concept, dynamic arrays, overloads and overrides, objects, and a host of other minor extensions to the language. IP implements a porting platform, including a widget toolkit, TCP/IP library, MIDI and sound library and other functions, that allows both programs written under IP Pascal, and IP Pascal itself, to move to multiple operating systems and machines.
IP Pascal is one of the only Pascal implementations that still exist that has passed the Pascal Validation Suite, a large suite of tests created to verify compliance with ISO 7185 Pascal.
Although Pascaline extends ISO 7185 Pascal, it does not reduce the type safety of Pascal (as many other dialects of Pascal have by including so called "type escapes"). The functionality of the language is similar to that of C# (which implements a C++ like language but with the type insecurities removed), and Pascaline can be used anywhere that managed programs can be used (even though it is based on a language 30 years older than C#).
Open or closed status
The author of Pascaline the language has stated that there is no wish to have it remain as a proprietary language. IP Pascal is sold as an implementation of Pascaline, but the language itself can and should be open, and should have quality implementations.
To that end, the full specification for Pascaline will be published online, and the long-term intention is to create a version of the open source Pascal-P5 compiler-interpreter (an ISO 7185 version of Wirth's Pascal-P4 compiler-interpreter) which implements Pascaline compliance. This will be known as the Pascal-P6 compiler, and it will also be openly published and distributed.
The value of IP Pascal as a commercial product will be based on the IDE and compiler-encoder resources of that system.
This article follows a fairly old version of Pascaline. A newer version of Pascaline exists as Pascal-P6, part of the Pascal-P series. See the references below.
Language
IP Pascal starts with ISO 7185 Pascal (which standardized Niklaus Wirth's original language), and adds:
Modules, including parallel task constructs process, monitor and share
module mymod(input, output);
uses extlib;
const one = 1;
type string = packed array of char;
procedure s: string);
private
var s: string;
procedure s: string);
var i: integer;
begin
for i := 1 to max(s) do write(s[i])
end;
begin { initialize monitor }
end;
begin { shutdown monitor }
end.
Modules have entry and exit s |
https://en.wikipedia.org/wiki/Cyberinfrastructure | United States federal research funders use the term cyberinfrastructure to describe research environments that support advanced data acquisition, data storage, data management, data integration, data mining, data visualization and other computing and information processing services distributed over the Internet beyond the scope of a single institution. In scientific usage, cyberinfrastructure is a technological and sociological solution to the problem of efficiently connecting laboratories, data, computers, and people with the goal of enabling derivation of novel scientific theories and knowledge.
Origin
The term National Information Infrastructure had been popularized by Al Gore in the 1990s. This use of the term "cyberinfrastructure" evolved from the same thinking that produced Presidential Decision Directive NSC-63 on Protecting America's Critical Infrastructures (PDD-63). PDD-63 focuses on the security and vulnerability of the nation's "cyber-based information systems" as well as the critical infrastructures on which America's military strength and economic well-being depend, such as the electric power grid, transportation networks, potable water and wastewater infrastructures.
The term "cyberinfrastructure" was used in a press briefing on PDD-63 on May 22, 1998 with Richard A. Clarke, then national coordinator for security, infrastructure protection, and counter-terrorism, and Jeffrey Hunker, who had just been named director of the critical infrastructure assurance office. Hunker stated:
"One of the key conclusions of the President's commission that laid the intellectual framework for the President's announcement today was that while we certainly have a history of some real attacks, some very serious, to our cyber-infrastructure, the real threat lay in the future. And we can't say whether that's tomorrow or years hence. But we've been very successful as a country and as an economy in wiring together our critical infrastructures. This is a development that's taken place really over the last 10 or 15 years—the Internet, most obviously, but electric power, transportation systems, our banking and financial systems."
The term "cyberinfrastructure" was used by a US National Science Foundation (NSF) blue-ribbon committee in 2003 in response to the question: how can NSF, as the nation's premier agency funding basic research, remove existing barriers to the rapid evolution of high performance computing, making it truly usable by all the nation's scientists, engineers, scholars, and citizens? The NSF use of the term focuses on the integrated assemblage of these information technologies with one another.
A workshop on cyberinfrastructure for the social sciences was held in San Diego, California in May 2005. Another conference was held in January 2007 in Washington, D.C.
A "CyberInfrastructure Partnership" existed from February 2005 until 2009.
A collaboration led by the University of Wisconsin–Madison and Boston University had a web site called |
https://en.wikipedia.org/wiki/Blue%20Network | The Blue Network (previously known as the NBC Blue Network) was the on-air name of a now defunct American radio network, which broadcast from 1927 through 1945.
Beginning as one of the two radio networks owned by the National Broadcasting Company (NBC), the independent Blue Network was born of a divestiture in 1942, arising from antitrust litigation. In 1945, the Blue Network formally became the American Broadcasting Company (ABC).
Early history
The Blue Network dates to 1923, when the Radio Corporation of America acquired WJZ in Newark, New Jersey, from Westinghouse, which had established the station in 1921. WJZ moved to New York City in May of that year. When RCA commenced operations of WRC in Washington, D.C., on August 1, 1923, the root of a network was born, though it did not operate under the name by which it would later become known. Radio historian Elizabeth McLeod said it was not until 1924 that the "Radio Group" formally began network operations.
The core stations of the "Radio Group" were RCA's stations WJZ and WRC, along with the Westinghouse station WBZ, then in Springfield, Massachusetts, and WGY, the General Electric station in Schenectady, New York.
RCA's principal rival before 1926 was the radio broadcasting department of the American Telephone & Telegraph Company. In 1921, AT&T began using this department as a test-bed for equipment being designed and manufactured by its Western Electric subsidiary.
The RCA stations operated at a significant disadvantage to their rival chain. AT&T used its high-quality transmission lines, and declined to lease them out to competing entities, forcing RCA to use the telegraph lines of Western Union, which were not as well calibrated to voice transmission as the AT&T lines.
Nevertheless, the WJZ network sought to compete toe-to-toe with the AT&T network, which was built around a different New York station, WEAF. For example, both stations sent announcer teams to cover the 1924 Democratic National Convention, which was held in Madison Square Garden in New York City. Promotional material produced in 1943 claimed certain "firsts" in broadcasting by WJZ, such as the first educational music program in April 1922, the first World Series broadcasts in 1922, and the first complete opera broadcast, The Flying Dutchman, from the Manhattan Opera House.
Creation
RCA (as well as its consortium partners General Electric and Westinghouse) received a break in 1926, when AT&T made a corporate decision to exit the broadcasting business and focus on its telecommunications business.
The first step by AT&T was to create the Broadcasting Company of America on May 15, 1926, to hold its broadcasting assets, which included WEAF and WCAP in Washington. As reported in the press, this move was due to the growth in the radio broadcasting activities of AT&T and the special issues related thereto, though it would appear that subsequent activities in disposing of the assets of BCA may have also played a role in the de |
https://en.wikipedia.org/wiki/Miller%20Puckette | Miller Smith Puckette (born 1959) is the associate director of the Center for Research in Computing and the Arts as well as a professor of music at the University of California, San Diego, where he has been since 1994.
Puckette is known for authoring Max, a graphical development environment for music and multimedia synthesis, which he developed while working at IRCAM in the late 1980s. He is also the author of Pure Data (Pd), a real-time performing platform for audio, video and graphical programming language for the creation of interactive computer music and multimedia works, written in the 1990s with input from many others in the computer music and free software communities.
Biography
An alumnus of St. Andrew's-Sewanee School in Tennessee, Miller Puckette got involved in computer music in 1979 at MIT with Barry Vercoe. In 1979 he became a Putnam Fellow.
He earned a Ph.D. in mathematics from Harvard University in 1986 after completing an undergraduate degree at MIT in 1980. He was a member of the MIT Media Lab from its opening in 1985 until 1987 before continuing his research at IRCAM, and since 1997 has been a part of the Global Visual Music project.
He used Max to complete his first work, which is called Pluton from the second work of Manoury' series called Sonus ex Machina.
He is the 2008 SEAMUS Award Recipient.
On May 11, 2011, he received the title of Doctor Honoris Causa from the University of Mons.
On July 21, 2012, he received an Honorary Degree from Bath Spa University in recognition of his extraordinary contribution to computer music research.
He was the recipient of the Gold Medal at the 1975 Math Olympiads and the Silver Medal at the 1976 Math Olympiads.
Selected publications
For a full list, see: http://msp.ucsd.edu/publications.html
Puckette, Miller (2004) “Who Owns our Software?: A first-person case study” Proceedings, ISEA, pp. 200–202, republished in September 2009 issue of Montréal: Communauté électroacoustique canadienne / Canadian Electroacoustic Community.
Puckette, Miller (2002) Computer Music Journal 26(4): pp. 31–43.
References
External links
Miller Puckette's website
Software by Miller Puckette
Theory and Techniques of Electronic Music
Visual Music Project
Living people
University of California, San Diego faculty
Harvard University alumni
International Mathematical Olympiad participants
Putnam Fellows
1959 births
MIT Media Lab people |
https://en.wikipedia.org/wiki/Raymond%20Perrault | Raymond Perrault may refer to:
Ray Perrault (1926–2008), Canadian politician
C. Raymond Perrault, director of the Artificial Intelligence Center at SRI International
Raymond Edward Perrault (1949–2012), president and C.E.O. of Research Tool & Die Works, Inc. |
https://en.wikipedia.org/wiki/12%20oz.%20Mouse | 12 oz. Mouse is an American adult animated television series created by Matt Maiellaro for Cartoon Network's late-night programming block, Adult Swim. The series revolves around Mouse Fitzgerald, nicknamed "Fitz" (voiced by Maiellaro), an alcoholic mouse who performs odd jobs so he can buy more beer. Together with his chinchilla companion Skillet, Fitz begins to recover suppressed memories that he once had a wife and a child who have now vanished. This leads him to seek answers about his past and the shadowy forces that seem to be manipulating his world.
In producing the series, Maiellaro crudely designed the characters as a cost-cutting measure; the series was originally animated by Radical Axis. He intended for the series to lack continuity starting from the pilot but established a serial format after starting the second episode. He had constructed an ending for the series as well as a detailed map of characters; however, the series finale concluded differently from planned. Maiellaro cast people around his office for the characters, starring himself as the protagonist and Nine Pound Hammer vocalist Scott Luallen as the voice of Roostre; the band also performs the opening theme.
The pilot episode for 12 oz. Mouse, "Hired", premiered on June 19, 2005. The series became a regular staple of Adult Swim's lineup on October 23 of that year and originally ended on December 17, 2006. A stand-alone webisode was released online on May 16, 2007. Critical reception was mixed; some praised the series' experimental nature, while others felt confounded by it.
In 2018, a double-length special, entitled "Invictus", aired on October 14 and it was announced that 12 oz. Mouse was also revived as a series. The third season, consisting of 11 episodes, premiered on July 20, 2020, and ended on July 31. The ending credits of both "Invictus" and the season 3 episodes feature a song by Amaranthe and animation by Awesome Inc.
In February 2021, it was revealed that the show would not be picked up for a fourth season.
Premise
The show revolves around a mouse named Mouse Fitzgerald (voiced by Matt Maiellaro), nicknamed "Fitz", who is fond of beer and caught in a world of espionage, love, and the delights of odd jobs. The show employs a serial format, and its ongoing storyline developed from absurdist comedy to include mystery and thriller elements. Fitz begins to recover suppressed memories that he once had a wife and a child who have now vanished. This leads him to seek answers about his past and the shadowy forces that seem to be manipulating his world.
Fitz suspects there is a sinister conspiracy involving fields of "asprind" pills beneath the city, and Shark (Adam Reed), Clock, and Rectangular Businessman's (Kurt Soccolich) attempt to control the nature of time and reality. Fitz and Skillet receive help from Liquor (Matt Harrigan), Roostre (Scott Luallen), Peanut Cop (Nick Weidenfeld) and others as they engage in gun battles, blow things up, and try to understand |
https://en.wikipedia.org/wiki/Air%20data%20computer | An air data computer (ADC) or central air data computer (CADC) computes altitude, vertical speed, air speed, and Mach number from pressure and temperature inputs. It is an essential avionics component found in modern aircraft. This computer, rather than individual instruments, can determine the calibrated airspeed, Mach number, altitude, and altitude trend data from an aircraft's pitot-static system. In some very high-speed aircraft such as the Space Shuttle, equivalent airspeed is calculated instead of calibrated airspeed.
Air data computers usually also have an input of total air temperature. This enables computation of static air temperature and true airspeed.
In Airbus aircraft the air data computer is combined with attitude, heading and navigation sources in a single unit known as the Air Data Inertial Reference Unit (ADIRU) this has now been replaced by the Global Navigation Air Data Inertial Reference System (GNADIRS).
On the Embraer Embraer E-Jet family the concept has been refined further by splitting air data acquisition and measuring – performed by combined pitot/static "air data smart probes" with integrated sensors – and computation of parameters performed by "air data applications" (ADA) executed on non-dedicated processing units. As all information from the sensors is transmitted electrically, routing of pitot and static pressure lines through the aircraft and associated maintenance tasks can be avoided.
In simpler aircraft and helicopters the Air Data Computers, generally two in number, and smaller, lighter and simpler than an ADIRU, may be called Air Data Units, although their internal computational power is still significant. They commonly have the pitot and static pressure inputs, as well as outside air temperature from a platinum resistance thermometer and may control heating of the pitot tube and static vent to prevent blockage due to ice. As on simpler aircraft, there is usually not a fly-by-wire system, the outputs are typically to the cockpit altimeters or display system, flight data recorder and autopilot system. Output interfaces typically are ARINC 429, Gillham or even IEEE 1394 (Firewire). The data provided may be true airspeed, pressure altitude, density altitude and Outside Air Temperature (OAT), but with no involvement in aircraft attitude or heading, as there are no gyroscopes or accelerometers fitted internally. These devices are usually autonomous and do not require pilot input, merely sending continuously updated data to the recipient systems while the aircraft is powered up. Some, like the Enhanced Software Configurable Air Data Unit (ESCADU) are software configurable to suit many different aircraft applications.
Apart from commercial ADCs implementation, there are available do-it-yourself, and Open implementations.
History
Electrical-mechanical air data computers were developed in the early 1950s to provide a central source of airspeed, altitude, and other signals to avionic systems that needed this dat |
https://en.wikipedia.org/wiki/QFD | QFD may refer to:
Quality function deployment
Quantum flavordynamics
Question-focused dataset
Boufarik Airport, Algeria
Qufu East railway station, China Railway pinyin code QFD |
https://en.wikipedia.org/wiki/Hazard%20pointer | In a multithreaded computing environment, hazard pointers are one approach to solving the problems posed by dynamic memory management of the nodes in a lock-free data structure. These problems generally arise only in environments that don't have automatic garbage collection.
Any lock-free data structure that uses the compare-and-swap primitive must deal with the ABA problem. For example, in a lock-free stack represented as an intrusively linked list, one thread may be attempting to pop an item from the front of the stack (A → B → C). It remembers the second-from-top value "B", and then performs compare_and_swap(target=&head, newvalue=B, expected=A). Unfortunately, in the middle of this operation, another thread may have done two pops and then pushed A back on top, resulting in the stack (A → C). The compare-and-swap succeeds in swapping `head` with `B`, and the result is that the stack now contains garbage (a pointer to the freed element "B").
Furthermore, any lock-free algorithm containing code of the form
Node* currentNode = this->head; // assume the load from "this->head" is atomic
Node* nextNode = currentNode->next; // assume this load is also atomic
suffers from another major problem, in the absence of automatic garbage collection. In between those two lines, it is possible that another thread may pop the node pointed to by this->head and deallocate it, meaning that the memory access through currentNode on the second line reads deallocated memory (which may in fact already be in use by some other thread for a completely different purpose).
Hazard pointers can be used to address both of these problems. In a hazard-pointer system, each thread keeps a list of hazard pointers indicating which nodes the thread is currently accessing. (In many systems this "list" may be probably limited to only one or two elements.) Nodes on the hazard pointer list must not be modified or deallocated by any other thread.
When a thread wishes to remove a node, it places it on a list of nodes "to be freed later", but does not actually deallocate the node's memory until no other thread's hazard list contains the pointer. This manual garbage collection can be done by a dedicated garbage-collection thread (if the list "to be freed later" is shared by all the threads); alternatively, cleaning up the "to be freed" list can be done by each worker thread as part of an operation such as "pop" (in which case each worker thread can be responsible for its own "to be freed" list).
In 2002, Maged Michael of IBM filed an application for a U.S. patent on the hazard pointer technique, but the application was abandoned in 2010.
Alternatives to hazard pointers include reference counting.
See also
Concurrent data structure
Hazard (computer architecture)
Finalizer
References
External links
Concurrent Building Blocks - C++ implementation of Hazard Pointer (called "SMR") and other lock-free data structures. Also has Java interfaces.
Concurrency Kit - C implementation o |
https://en.wikipedia.org/wiki/XDoclet | XDoclet is an open-source code generation library that enables Attribute-oriented programming for Java via insertion of special Javadoc tags. It comes with a library of predefined tags, which simplify coding for various technologies: Java EE, Web services, Portlet etc.
Example
A typical XDoclet comment might look like this:
/****
* This is the Account entity bean. It is an example of how to use the
* EJBDoclet tags.
*
* @see Customer
*
* @ejb.bean
* name="bank/Account"
* type="CMP"
* jndi-name="ejb/bank/Account"
* local-jndi-name="ejb/bank/LocalAccount"
* primkey-field="id"
* schema = "Customers"
*
* @ejb.finder
* signature="java.util.Collection findAll()"
* unchecked="true"
*
* @ejb.finder signature="java.util.Collection findByName(java.lang.String name)"
* unchecked="true"
* query= "SELECT OBJECT(o) FROM Customers AS o WHERE o.name
* LIKE ?1"
*
* @ejb.transaction
* type="Required"
*
* @ejb.interface
* remote-class="test.interfaces.Account"
*
* @ejb.value-object
* match="*"
*
* @version 1.5
*/
Books
References
External links
XDoclet project site
XDoclet2 project site
Java platform
Java development tools
Java (programming language) libraries |
https://en.wikipedia.org/wiki/Multi-adjoint%20logic%20programming | Multi-adjoint logic programming defines syntax and semantics of a logic programming program in such a way that the underlying maths justifying the results are a residuated lattice and/or MV-algebra.
The definition of a multi-adjoint logic program is given, as usual in fuzzy logic programming, as a set of weighted rules and facts of a given formal language F. Notice that we are allowed to use different implications in our rules.
Definition: A multi-adjoint logic program is a set P of rules of the form <(A ←i B), δ> such that:
1. The rule (A ←i B) is a formula of F;
2. The confidence factor δ is an element (a truth-value) of L;
3. The head A is an atom;
4. The body B is a formula built from atoms B1, …, Bn (n ≥ 0) by the use of conjunctors, disjunctors, and aggregators.
5. Facts are rules with body ┬.
6. A query (or goal) is an atom intended as a question ?A prompting the system.
Implementations
Implementations of Multi-adjoint logic programming:
Rfuzzy,
Floper,
and more we do not remember now.
Programming languages |
https://en.wikipedia.org/wiki/Attribute-oriented%20programming | Attribute-oriented programming (@OP) is a technique for embedding metadata, namely attributes, within program code.
Attribute-oriented programming in various languages
Java
With the inclusion of Metadata Facility for Java (JSR-175) into the J2SE 5.0 release it is possible to utilize attribute-oriented programming right out of the box.
XDoclet library makes it possible to use attribute-oriented programming approach in earlier versions of Java.
C#
The C# language has supported attributes from its very first release. These attributes was used to give run-time information and are not used by a preprocessor. Currently with source generators, you can use attributes to drive generation of additional code at compile-time.
UML
The Unified Modeling Language (UML) supports a kind of attribute called stereotypes.
Hack
The Hack programming language supports attributes. Attributes can be attached to various program entities, and information about those attributes can be retrieved at run-time via reflection.
Tools
Annotation Processing Tool (apt)
Spoon, an Annotation-Driven Java Program Transformer
XDoclet, a Javadoc-Driven Program Generator
References
External links
Don Schwarz. Peeking Inside the Box: Attribute-Oriented Programming with Java5
Sun JSR 175
Attributes and Reflection - sample chapter from Programming C# book
Modeling Turnpike Project
Fraclet : An annotation-based programming model for the Fractal component model
Attribute Enabled Software Development book
Programming paradigms |
https://en.wikipedia.org/wiki/Discard%20Protocol | The Discard Protocol is a service in the Internet Protocol Suite defined in RFC 863. It was designed for testing, debugging, measurement, and host-management purposes.
A host may send data to a host that supports the Discard Protocol on either Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) port number 9. The data sent to the server is simply discarded. No response is returned. For this reason, UDP is usually used, but TCP allows the services to be accessible on session-oriented connections (for example via HTTP proxies or some virtual private network (VPN)).
Inetd implementation
On most Unix-like operating systems a discard server is built into the inetd (or xinetd) daemon. The discard service is usually not enabled by default. It may be enabled by adding the following lines to the file and reloading the configuration:
discard stream tcp nowait root internal
discard dgram udp wait root internal
The Discard Protocol is the TCP/UDP equivalent of the Unix file-system node /dev/null. Such a service is guaranteed to receive what is sent to it and can be used for debugging code requiring a guaranteed reception TCP or UDP payloads.
On various routers, this TCP or UDP port 9 for the Discard Protocol (or port 7 for the Echo Protocol relaying ICMP datagrams) is also used by default as a proxy to relay Wake-on-LAN (WOL) magic packets from the Internet to hosts on the local network in order to wake them up remotely (these hosts must also have their network adapter configured to accept WOL datagrams and the router must have this proxy setting enabled, and possibly also a configuration of forwarding rules in its embedded firewall to open these ports on the Internet side).
See also
Character Generator Protocol
Daytime Protocol
Time Protocol
External links
RFC 348, the Discard Process
RFC 863, the Discard Protocol
Application layer protocols |
https://en.wikipedia.org/wiki/Echo%20Protocol | The Echo Protocol is a service in the Internet Protocol Suite defined in RFC 862. It was originally proposed as a way to test and measure an IP network.
A host may connect to a server that supports the Echo Protocol using the Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP) on the well-known port number 7. The server sends back an identical copy of the data it received.
Inetd implementation
On UNIX-like operating systems an echo server is built into the inetd family of daemons. The echo service is usually not enabled by default. It may be enabled by adding the following lines to the file and telling inetd to reload its configuration:
echo stream tcp nowait root internal
echo dgram udp wait root internal
On various routers, this TCP or UDP port 7 for the Echo Protocol for relaying ICMP datagrams (or port 9 for the Discard Protocol) is also configured by default as a proxy to relay Wake-on-LAN (WOL) magic packets from the Internet to hosts on the local network in order to wake them up remotely (these hosts must also have their network adapter configured to accept WOL datagrams and the router must have this proxy setting enabled, and possibly also a configuration of forwarding rules in its embedded firewall to open these ports on the Internet side).
See also
Discard Protocol
Daytime Protocol
QOTD
Character Generator Protocol
Time Protocol
ICMP Echo Request
References
External links
RFC 347 Echo Process
RFC 862 Echo Protocol
Application layer protocols |
https://en.wikipedia.org/wiki/Stentoften%20Runestone | The Stentoften Runestone, listed in the Rundata catalog as DR 357, is a runestone which contains a curse in Proto-Norse that was discovered in Stentoften, Blekinge, Sweden.
Inscription
Transliteration
AP niuhAborumz ¶ niuhagestumz ¶ hAþuwolAfz gAf j ¶ hAriwolAfz (m)A--u snuh-e ¶ hidez runono fe(l)(A)h ekA hed¶erA
AQ niu hAborumz ¶ niu hagestumz ¶ hAþuwolAfz gAf j ¶ hAriwolAfz (m)A--u snuh-e ¶ hidez runono fe(l)(A)h ekA hed¶erA
B ginoronoz
C herAmAlAsAz ¶ ArAgeu we(l)Aduds| |sA þAt
D bAriutiþ
Transcription
AP <niuha>borumz <niuha>gestumz Haþuwulfz gaf j[ar], Hariwulfz ... ... haidiz runono, felh eka hedra
AQ niu habrumz, niu hangistumz Haþuwulfz gaf j[ar], Hariwulfz ... ... haidiz runono, felh eka hedra
B ginnurunoz.
C Hermalausaz argiu, Weladauþs, sa þat
D briutiþ.
Translation
This is the English translation provided by Rundata:
AP(To the) <niuha>dwellers (and) <niuha>guests Haþuwulfar gave ful year, Hariwulfar ... ... I, master of the runes(?) conceal here
AQ nine bucks, nine stallions, Haþuwulfar gave fruitful year, Hariwulfar ... ... I, master of the runes(?) conceal here
B runes of power.
C Incessantly (plagued by) maleficence, (doomed to) insidious death (is) he who this
D breaks.
Interpretation
In lines AP and AQ, in the phrase "gaf j" ("gave j"), the j-rune is an ideographic rune (Begriffsrune) that stands for the rune name *jera, meaning "harvest" or "bountiful or fruitful year." One runologist suggests that line AQ is describing an animal sacrifice in return for a good harvest as part of a fertility ritual.
History
The Stentoften runestone was discovered in 1823 by the dean O. Hammer. It was lying down with the inscription facing downwards, surrounded by five sharp larger stones forming a pentagon or a pentagram. Consequently, the stone has been part of a larger monument like the Björketorp Runestone further east. In 1864, the runestone was moved into the church of Sölvesborg.
Most scholars date the inscription to the 7th century and it is carved with a type of runes that form an intermediate version between the Elder Futhark and the Younger Futhark. A characteristic example of this is the a-rune which has the same form as the h-rune of the younger futhark. This is the rune that is transliterated with A. The k-rune, which looks like a Y is a transition form between and in the two futharks. There are quite few intermediary inscriptions like this one. Three more are known from Blekinge, i.e. the Björketorp Runestone, the Istaby Runestone and the Gummarp Runestone, which were moved to Copenhagen and lost in the Copenhagen Fire of 1728.
The Stentoften, Istaby Runestone and Gummarp Runestone inscriptions can be identified with the same clan through the names that are mentioned on them, and the names are typical for chieftains. The Björketorp Runestone lacks names and is raised some tens of kilometers from the others. However, it is beyond doubt that the Björketorp runestone is connected to them, because in addition to the special r |
https://en.wikipedia.org/wiki/Daytime%20Protocol | The Daytime Protocol is a service in the Internet Protocol Suite, defined in 1983 in RFC 867. It is intended for testing and measurement purposes in computer networks.
A host may connect to a server that supports the Daytime Protocol on either Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) port 13. The server returns an ASCII character string of the current date and time in an unspecified format.
Inetd implementation
On UNIX-like operating systems a daytime server is usually built into the inetd (or xinetd) daemon. The service is usually not enabled by default. It may be enabled by adding the following lines to the file and telling inetd to reload its configuration:
daytime stream tcp nowait root internal
daytime dgram udp wait root internal
An example output may be:
Thursday, February 2, 2006, 13:45:51-PST
See also
List of well-known ports
Echo Protocol
QOTD
Time Protocol
Network Time Protocol
External links
RFC 867
List of NIST time servers supporting this protocol
Network time-related software
Application layer protocols |
https://en.wikipedia.org/wiki/Time%20Protocol | The Time Protocol is a network protocol in the Internet Protocol Suite defined in 1983 in RFC 868 by Jon Postel and K. Harrenstein. Its purpose is to provide a site-independent, machine readable date and time.
The Time Protocol may be implemented over the Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP). A host connects to a server that supports the Time Protocol on port 37. The server then sends the time as a 32-bit unsigned integer in binary format and in network byte order, representing the number of seconds since 00:00 (midnight) 1 January, 1900 GMT, and closes the connection. Operation over UDP requires the sending of any datagram to the server port, as there is no connection setup for UDP.
The fixed 32-bit data format means that the timestamp rolls over approximately every 136 years, with the first such occurrence on 7 February 2036. Programs that use the Time Protocol must be carefully designed to use context-dependent information to distinguish these dates from those in 1900.
Many Unix-like operating systems used the Time Protocol to monitor or synchronize their clocks using the rdate utility, but this function was superseded by the Network Time Protocol (NTP) and the corresponding ntpdate utility. NTP is more sophisticated in various ways, among them that its resolution is finer than one second.
Inetd implementation
On most UNIX-like operating systems a Time Protocol server is built into the inetd (or xinetd) daemon. The service is usually not enabled by default. It may be enabled by adding the following lines to the file and reloading the configuration.
time stream tcp nowait root internal
time dgram udp wait root internal
See also
Echo Protocol
Discard Protocol
Daytime Protocol
Character Generator Protocol
rdate, a tool for querying the current time from a network server
External links
vervest.org - HTTP Time Protocol
freestone-group.com - FG Time Sync
Network time-related software
Application layer protocols |
https://en.wikipedia.org/wiki/The%20Network%20%28professional%20wrestling%29 | The Network was a professional wrestling stable that was formed in 1999 when ECW began to broadcast nationally on TNN.
History
The Network was a professional wrestling stable that was formed in 1999 when ECW began to broadcast nationally on TNN.
TNN did not give ECW much money to produce their program, yet expected ECW to have high-quality production values like WCW Monday Nitro and Monday Night Raw. Also, TNN poorly advertised and promoted ECW, producing barely any press releases or TV ads, even though ECW was TNN's highest rated weekly program at that point. The only real time that TNN actually advertised ECW was during the ECW program itself, as well during NASCAR on TNN coverage. Heyman decided to recruit Don Callis, who played the part of Cyrus, to serve as a metaphor, so to speak, for the real problems between ECW and TNN at that point. Callis played a representative for TNN/The Network, who constantly criticized the violent nature of ECW programming, and commentator Joel Gertner in particular for his sexually-loaded commentary and ring introductions. Callis would threaten to replace ECW's programming with episodes of RollerJam.
Cyrus was joined in his quest against ECW by Steve Corino, the self-proclaimed "King of Old School", who got heat railing against hardcore wrestling. Corino brought with him the wrestlers he managed who then became "The Network"; Rhino, Yoshihiro Tajiri, and Corino's own manager and old school wrestler Jack Victory. When Corino turned on Justin Credible, the group slowly imploded until only Cyrus, Rhino and Jerry Lynn remained allies, up until the point where Cyrus managed Rhino to the ECW World Heavyweight Championship and Jerry Lynn against the returning Rob Van Dam at the final pay-per-view.
Members
Members
Cyrus
Rhino
Yoshihiro Tajiri
Scotty Anton
Steve Corino
Jack Victory
Lou E. Dangerously
Allies
Justin Credible
Lance Storm
Jason Knight
Dawn Marie
Francine
Championships
Extreme Championship Wrestling
ECW World Heavyweight Championship (3 times) – Rhino (1), Steve Corino (1), and Justin Credible (1)
ECW World Television Championship (3 times) – Rhino (2), and Yoshihiro Tajiri (1)
See also
Impact Players
Unholy Alliance
References
Extreme Championship Wrestling teams and stables |
https://en.wikipedia.org/wiki/System%20of%20record | A system of record (SOR) or source system of record (SSoR) is a data management term for an information storage system (commonly implemented on a computer system running a database management system) that is the authoritative data source for a given data element or piece of information, like for example a row (or record) in a table. In data vault it is referred to as the record source.
Background
The need to identify systems of record can become acute in organizations where management information systems have been built by taking output data from multiple source systems, re-processing this data, and then re-presenting the result for a new business use.
In these cases, multiple information systems may disagree about the same piece of information. These disagreements may stem from semantic differences, differences in opinion, use of different sources, differences in the timing of the extract, transform, load processes that create the data they report against, or may simply be the result of bugs.
Use
The integrity and validity of any data set is open to question when there is no traceable connection to a good source, and listing a source system of record is a solution to this. Where the integrity of the data is vital, if there is an agreed system of record, the data element must either be linked to, or extracted directly from it. In other cases, the provenance and estimated data quality should be documented.
The "system of record" approach is a good fit for environments where both:
there is a single authority over all data consumers, and
all consumers have similar needs
Trade-offs
In diverse environments, one instead needs to support the presence of multiple opinions. Consumers may accept different authorities or may differ on what constitutes an authoritative source -- researchers may prefer carefully vetted data, while tactical military systems may require the most recent credible report.
See also
Golden record (informatics), the master version or valid version of a data element in a single source of truth system
Master data management, defining the handling of master data
Privacy Act of 1974, U.S. law including requirement for agencies to publish System Of Records Notices (SORN) in the Federal Register to identify the system and describe the use of individuals' data.
Single source of truth, practice of using one source for a particular data element
References
Nwaneri, Chineye (2019-02-12). "System of Record, System of Reference, Golden Records, and other confusing terms in Master Data Management". Retrieved 2020-06-06.
Information systems
Data management |
https://en.wikipedia.org/wiki/LAND | A LAND (local area network denial) attack is a DoS (denial of service) attack that consists of sending a special poison spoofed packet to a computer, causing it to lock up. The security flaw was first discovered in 1997 by someone using the alias "m3lt", and has resurfaced many years later in operating systems such as Windows Server 2003 and Windows XP SP2.
Mechanism
The attack involves sending a spoofed TCP SYN packet (connection initiation) with the target host's IP address to an open port as both source and destination. This causes the machine to reply to itself continuously. It is, however, distinct from the TCP SYN Flood vulnerability.
Other LAND attacks have since been found in services like SNMP and Windows 88/tcp (kerberos/global services). Such systems had design flaws that would allow the device to accept request on the wire appearing to be from themselves, causing repeated replies.
Vulnerable systems
Below is a list of vulnerable operating systems:
AIX 3.0
AmigaOS AmiTCP 4.2 (Kickstart 3.0)
BeOS Preview release 2 PowerMac
BSDi 2.0 and 2.1
Digital VMS
FreeBSD 2.2.5-RELEASE and 3.0 (Fixed after required updates)
HP External JetDirect Print Servers
IBM AS/400 OS7400 3.7
Irix 5.2 and 5.3
Mac OS MacTCP, 7.6.1 OpenTransport 1.1.2 and 8.0
NetApp NFS server 4.1d and 4.3
NetBSD 1.1 to 1.3 (Fixed after required updates)
NeXTSTEP 3.0 and 3.1
Novell 4.11
OpenVMS 7.1 with UCX 4.1-7
QNX 4.24
Rhapsody Developer Release
SCO OpenServer 5.0.2 SMP, 5.0.4
SCO Unixware 2.1.1 and 2.1.2
SunOS 4.1.3 and 4.1.4
Windows 95, NT and XP SP2,
Prevention
Most firewalls should intercept and discard the poison packet thus protecting the host from this attack. Some operating systems released updates fixing this security hole.
See also
Slowloris (computer security)
High Orbit Ion Cannon
Low Orbit Ion Cannon
ReDoS
Denial-of-service attack
References
External links
Insecure.Org's original post about the attack
Article about XP's vulnerability
Denial-of-service attacks
Types of cyberattacks |
https://en.wikipedia.org/wiki/Information%20revolution | The term information revolution describes the "radical changes wrought by computer technology on the storage of and access to information since the mid-1980s" or current economic, social and technological trends beyond the Industrial Revolution.
Many competing terms have been proposed that focus on different aspects of this societal development.
The British polymath crystallographer J. D. Bernal introduced the term "scientific and technical revolution" in his 1939 book The Social Function of Science to describe the new role that science and technology are coming to play within society. He asserted that science is becoming a "productive force", using the Marxist Theory of Productive Forces. After some controversy, the term was taken up by authors and institutions of the then-Soviet Bloc. Their aim was to show that socialism was a safe home for the scientific and technical ("technological" for some authors) revolution, referred to by the acronym STR. The book Civilization at the Crossroads, edited by the Czech philosopher Radovan Richta (1969), became a standard reference for this topic.
Daniel Bell (1980) challenged this theory and advocated post-industrial society, which would lead to a service economy rather than socialism. Many other authors presented their views, including Zbigniew Brzezinski (1976) with his "Technetronic Society".
Information in social and economic activities
The main feature of the information revolution is the growing economic, social and technological role of information. Information-related activities did not come up with the Information Revolution. They existed, in one form or the other, in all human societies, and eventually developed into institutions, such as the Platonic Academy, Aristotle's Peripatetic school in the Lyceum, the Musaeum and the Library of Alexandria, or the schools of Babylonian astronomy. The Agricultural Revolution and the Industrial Revolution came up when new informational inputs were produced by individual innovators, or by scientific and technical institutions. During the Information Revolution all these activities are experiencing continuous growth, while other information-oriented activities are emerging.
Information is the central theme of several new sciences, which emerged in the 1940s, including Shannon's (1949) Information Theory and Wiener's (1948) Cybernetics. Wiener stated: "information is information not matter or energy". This aphorism suggests that information should be considered along with matter and energy as the third constituent part of the Universe; information is carried by matter or by energy. By the 1990s some writers believed that changes implied by the Information revolution will lead to not only a fiscal crisis for governments but also the disintegration of all "large structures".
The theory of information revolution
The term information revolution may relate to, or contrast with, such widely used terms as Industrial Revolution and Agricultural Revolution. Note, |
https://en.wikipedia.org/wiki/TCP%20Port%20Service%20Multiplexer | The TCP Port Service Multiplexer (TCPMUX) is a little-used Internet protocol defined in . The specification describes a multiplexing service that may be accessed with a network protocol to contact any one of a number of available TCP services of a host on a single, well-known port number.
The specification of TCPMUX, RFC 1078, was deprecated in 2016 by for technical reasons and lack of use in the Internet.
Description
A host may connect to a server that supports the TCPMUX protocol on TCP port 1. The host then sends a name of the service required, followed by a pair of carriage return and line feed characters (CRLF). The server replies with a '+' or '-' character and an optional message, followed by CRLF. In case of a positive reply ('+'), the protocol or service requested is started, otherwise the connection is closed.
This service also features a reserved name, "HELP". If the remote server receives this message it will output a multi-line message listing the names of all supported services, one service name per line.
Security risks
Enabling TCPMUX on a server enables an attacker to easily find out the services running on the host, either by using the "HELP" command or by requesting a large number of services. This has the same effect as port scanning the host for available services iteratively. Because TCPMUX allows someone to use any service only by accessing port number 1, the protocol makes it difficult to apply traditional port-based firewall rules that block access from certain or all hosts to specific services.
See also
List of TCP and UDP port numbers
References
Internet protocols
Transmission Control Protocol |
https://en.wikipedia.org/wiki/Metadata%20facility%20for%20Java | The Metadata Facility for Java is a specification for Java that defines an API for annotating fields, methods, and classes as having particular attributes that indicate they should be processed in specific ways by development tools, deployment tools, or run-time libraries.
The specification was developed under the Java Community Process as JSR 175, and was released as a part of J2SE 5.0 (Tiger).
External links
JSR 175 A Metadata Facility for the Java Programming Language
JSR 250 Common Annotations (defines common Java SE and Java EE annotations)
JSR 269 Pluggable Annotation Processing API (defines a pluggable interface for developing build-time annotation processors)
Java
Java specification requests |
https://en.wikipedia.org/wiki/Hurban | Hurban is a radio programming format from radio chain giant iHeartMedia and Senior VP Alfredo Alonso. Hurban radio stations target young Hispanics in the United States, primarily consisting of reggaeton, Latin trap, Latin rap, and Latin dance. Advertisements and DJs are usually presented in a mixture of English and Spanish.
The word hurban is a portmanteau of the terms "Hispanic" and "urban."
Artists
Core artists of the hurban format include Daddy Yankee, Don Omar, Julio Voltio and Tego Calderón.
History
KLOL in Houston, Texas debut LATINO & PROUD as the first Hurban formatted radio station in continental U.S. in late 2004. By 2007, Clear Channel dropped the hurban format and picked up a Spanish Contemporary format. Most of the original personalities have been let go since and the station is no longer bilingual. The only original on-air personality that still remains to this day is Liz Arreola, or Liz de Mega as she is known. Most of the current personalities have been ordered to cease the "Spanglish" act on the air and stick with Spanish.
The format has grown to many other cities, including New York WXNY, Los Angeles KXOL , Denver, Miami, and Albuquerque, NM. But more recently, the format has been replaced in several cities. The list includes Miami, Denver, Albuquerque, Dallas (KZZA), and Las Vegas.
Development of the hurban ideology
The new radio format dubbed "hurban" may seem like it is merely another attempt to profit off of the tastes of a particular ethnic group that has a preference for a given type of music, but this is not the case. These pan-Latin radio stations are embracing reggaeton, hip hop and dancehall music, which largely comprise and explicate hurban thoughts and ideas through their lyrics and styles. Nevertheless, the scope of this music can be comprehended more thoroughly when we understand the movement as a grassroots attempt that will perhaps bring together the pan-Latino movement in the music industry. In relation to the hurban music movement, there are other means by which Hispanic urbans are being encouraged to represent their ethnic background. Clear Channel Communications, a major broadcasting company, announced in fall 2004 that it was transforming 20 to 25 of its 1,200 stations to Hispanic formats over the subsequent 18 months. Some individuals may have felt disappointed when they realized that one of their favorite radio stations was changed in an effort to accommodate the needs of the hurban audience. Tension between musical genres may also exist in subtle commercial competitions such as these with the potential to affect an individual's prejudices that tend to develop in a multi-racial and multi-cultural America. Hurban radio stations may provide the means for the pan-Latino population to develop a sense of communication within the community that will reverberate in America and abroad.
See also
Reggaeton
Latin trap
Latin hip hop
Latin dance
Latin Grammy Award for Best Urban Music Album
Latin Grammy Award f |
https://en.wikipedia.org/wiki/Global%20Leadership%20Foundation | The Global Leadership Foundation (GLF) is a non-profit, non-governmental organization consisting of a network of former heads of state/government and other distinguished leaders (GLF Members), who seek to assist developing countries in improving governance, bolstering democratic institutions, and resolving conflicts. The organization does so by arranging for GLF Members to provide confidential peer-to-peer advice to current heads of government, who are committed to peace, democracy, and development. The Global Leadership Foundation is active across the world, works via invitation from a head of government, and its work is confidential.
Organization
The Global Leadership Foundation (GLF) was set up in 2004 by F. W. de Klerk as a network of former national leaders to advise newly-democratic countries on issues of governance and stability. GLF works discreetly on policy issues with these leaders. The initial members were Václav Havel, Quett Masire, and Aníbal Cavaco Silva.
Since its establishment in 2004, GLF's engagements have included advice on the following:
Democratic institutions, effective governance, and transition from authoritarian rule
Effective election management
Regional and national security
Political reconciliation and implementation of international agreements
Tackling armed resistance movements and terrorist organizations
Economic reform, resource management, and trade
Access to humanitarian aid
In addition to the provision of direct but discreet advice on an ever-increasing range of topics to serving national leaders, GLF engages in the following:
Active discussion of important global issues
Proactive consideration of national crisis situations with international implications
Dialogues with the heads of key multilateral institutions
International conferences on topical issues
Consultation and working with like-minded organizations
While GLF does not seek to publicize its work with world leaders, some visits are in the public domain, such as the 2011 visit to the Maldives by Cassam Uteem, the 2013 visit to Kenya by Joe Clark and Quett Masire, the 2014 and 2015 visits to Ghana by FW de Klerk, Quett Masire and Kaspar Villiger, and the mediation role Quett Masire played in negotiating a ceasefire agreement in Mozambique in 2016.
Upon de Klerk's death in late 2021, Helen Clark became the new GLF chair.
There are currently 45 GLF Members. New members are selected by existing members.
The Foundation is supported by the GLF International Council, which consists of organizations and individuals who recognize the importance of GLF's work and support the foundation financially. A limit is placed on the size of each donation to preserve the foundation's independence.
GLF is registered in the Canton of Bern, Switzerland. It has two associate foundations: GLF (USA), a 501(c)(3) foundation registered in Delaware, US; and GLF (UK), a charity registered in England and Wales.
A recent publication by BBC documentary prod |
https://en.wikipedia.org/wiki/Cromwell%20%28computing%29 | Cromwell is a replacement firmware for the Microsoft Xbox gaming console that has been developed by the Xbox Linux Project. If programmed onto the onboard flash chip of the Xbox or a modchip, it can boot the Linux operating system and practically convert the Xbox into a full PC.
It is unusual in that it is a legal firmware (because it does not use any of Microsoft's code to function) and was developed primarily through reverse-engineering of the original Microsoft BIOS and its boot process. In light of this, many Xbox modchip manufacturers ship this firmware with their chips to avoid litigation and copyright infringement claims. The main function of this firmware is to load the Linux operating system, although it also supports other features, such as the ability to reprogram the hardware with another firmware image, lock and unlock the hard disk, and change video mode (PAL/NTSC). Unlike the vast majority of Xbox firmware images, it is not able to load Xbox games (either original or otherwise). This is because the original Microsoft firmware image contains the kernel of the Xbox operating system (widely believed to be a stripped-down Windows 2000 derivative) - that is, the firmware is the operating system. As Cromwell does not contain this, it is not able to allow games to load and function.
Cromwell includes code from other open source projects, but combines them in a unique way. This is a list of components that can be found in Cromwell:
a Linux 2.6-derived USB stack in a standalone version (i.e. it runs without Linux)
Linux kernel-derived JPEG decompression code
Etherboot networking code
GRUB filesystem support and bootloader code
The standalone version of the Linux USB stack from Cromwell has been ported to the ReactOS operating system.
External links
Cromwell Manual
Custom firmware |
https://en.wikipedia.org/wiki/The%20Job%20%282001%20TV%20series%29 | The Job is an American single-camera sitcom that aired on ABC between March 14, 2001 and April 24, 2002. Several of the principal actors went on to either star or guest star in the FX network's Denis Leary-produced Rescue Me. In Rescue Me, the lead character (played by Leary) is very similar to Mike McNeil, but is a fireman rather than a police officer.
Summary
The series follows a New York City police officer named Mike McNeil (Denis Leary) – who indulges in adultery, alcohol, cigarettes, and prescription drug abuse – and his fellow bumbling detective pals. The show, which appeared to borrow the tone and look of NYPD Blue for semi-satirical purposes, was built around the Mike McNeil character, but relied on a strong ensemble cast.
Cast
Denis Leary as Det. Mike McNeil
Bill Nunn as Det. Terrence Phillips
Lenny Clarke as Det. Frank Harrigan
Karyn Parsons as Toni
Diane Farr as Det. Jan Fendrich
Adam Ferrara as Det. Tommy Manetti
John Ortiz as Det. Ruben Sommariba
Julian Acosta as Al Rodriguez
Wendy Makkena as Karen McNeil
Keith David as Lt. Williams
Episodes
Season 1 (2001)
Season 2 (2002)
Home media
The complete series (19 episodes) was released on DVD in the United States in May 2005.
References
External links
2001 American television series debuts
2002 American television series endings
2000s American single-camera sitcoms
American Broadcasting Company original programming
Television series by ABC Studios
Fictional portrayals of the New York City Police Department
English-language television shows
Television series by DreamWorks Television
Television shows set in New York City
Television shows filmed in New York (state) |
https://en.wikipedia.org/wiki/Rendition%2C%20Inc. | Rendition, Inc., was a maker of 3D computer graphics chipsets in the mid to late 1990s. They were known for products such as the Vérité 1000 and Vérité 2x00 and for being one of the first 3D chipset makers to directly work with Quake developer John Carmack to make a hardware-accelerated version of the game (vQuake). Rendition's major competitor at the time was 3Dfx. Their proprietary rendering APIs were Speedy3D (for DOS) and RRedline (for Windows).
3D Chipsets
Vérité V1000
Released in 1996, Rendition's V1000 chipset was notable for its RISC-based architecture. The V1000 was the first PC graphics card to utilize a programmable core to render 3D graphics. V1000 was both faster and more advanced (in terms of features) than competitors such as the Matrox Millennium, ATI Rage, and S3 Virge. Only 3DFX's Voodoo Graphics was faster, but unlike the 3DFX Voodoo, the V1000 included 2D/VGA capability making it the only acceptably fast single-board solution for 3D games.
Vérité supported a local framebuffer of up to 4 MB EDO DRAM, on a 64-bit bus (for a theoretical 400 MB/s bandwidth). Aside from 3D games, Vérité contained an IBM VGA compatible display controller, and served as a traditional 2D/GUI accelerator for the Windows operating system.
Vérité's first claim to fame was being the only accelerator supported by Quake. Board partner Number Nine Visual Technology later canceled their Vérité products. In the book Masters of Doom, Carmack cited bad experiences with programming the Vérité as the reason for id's shift away from proprietary APIs toward the industry-standard OpenGL.
The V1000 was fairly popular when it was launched. At least four companies sold Vérité boards: the Creative Labs 3D Blaster PCI, the Sierra Screamin' 3D, the Canopus Total 3D, and the Intergraph Reactor (later renamed Intense 3D 100). A handful of software titles shipped with V1000 support. As the ATI Rage, S3 Virge, and Matrox Mystique delivered 3D graphics of questionable benefit, id Software's vQuake and Eidos's Tomb Raider were influential in fueling consumer interest in 3D rendering hardware. The Vérité (and Voodoo) ports added 16-bit color rendering, bilinear filtering, per-polygon MIP mapping, and edge anti-aliasing to the game's 3D visuals. Released in time for Christmas 1996, both vQuake and Tomb Raider demonstrated the V1000's 3D hardware to be both faster and better-looking than software rendering on even the most powerful host CPU.
An interesting piece of V1000's technology was its use of bus master DMA transfers for data transfer across the PCI bus. This allowed the board to transfer data much more efficiently than with the alternative FIFO mode of the bus. Unfortunately, the immaturity of the PCI bus at the time, and the limited use of bus mastering in general in systems of the day, caused DMA bugs to surface with Vérité. If a motherboard chipset wasn't capable of DMA, Vérité was forced to operate in FIFO mode and performance dropped dramatically. Additional |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.