source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/Cream%20soda%20%28disambiguation%29 | Cream soda is a soft drink.
Cream soda also may refer to:
an early computer project by Steve Wozniak
"Cream Soda", a song from Exist album by Exo, 2023
Cream Soda (band), Russian musical group
See also
Cherry Cream Soda
Ice cream soda |
https://en.wikipedia.org/wiki/Games%20for%20Windows%3A%20The%20Official%20Magazine | Games for Windows: The Official Magazine was a monthly computer game magazine published by Ziff Davis Media, licensing the Games for Windows brand from Microsoft Corporation. It was the successor to Computer Gaming World. The first issue was released in November 2006. As of the April/May 2008 issue, the magazine is no longer offered in print and the editorial staff was integrated with 1UP.
According to Ziff Davis, the magazine was to be a "rebirth" of the Computer Gaming World magazine, which had lost news stand presence over the past few years. Furthermore, according to the editorial staff of CGW/GFW, the magazine would essentially remain unchanged and was in no way subject to Microsoft's influence, something reflected in the language of the legal agreement between Ziff Davis and Microsoft (akin to how the content of Official U.S. PlayStation Magazine (OPM) was not influenced by Sony in any way, outside of demo disc content).
For the last several years, Computer Gaming World coverage had overwhelmingly been on Windows-only games due to the relative lack of games which support other operating systems. According to the editors of the magazine from an August 2006 podcast, the idea of a Windows Games-exclusive magazine began when Microsoft sought to establish Windows as a viable gaming platform (particularly at E3 2006), akin to its console brother, the Xbox. The editors of CGW approached Microsoft with the idea of a platform-focused magazine not unlike OPM or Nintendo Power, who then started a bidding war among different publishers for the rights to do so. Eventually, Ziff-Davis won the rights and because the company already had a computer gaming-based magazine, sought to re-launch the current publication in its current form.
The final editorial staff included Editor-in-Chief Jeff Green, senior editor Sean Molloy, news editor Shawn Elliott, and reviews editor Ryan Scott. Editor Darren Gladstone left the magazine in December 2007 to work for PC World.
The cover of the premiere issue of GFW was considered an homage to the cover of the first issue of CGW, with the prominence of a dragon on both covers.
Located at 1UP.com, the editors of the magazine continued to host the weekly GFW Radio podcast, hosted by the editorial staff. After the departure of several key staff members, including Jeff Green and Shawn Elliott, the last episode was broadcast on September 17, 2008.
References
2006 establishments in the United States
2006 establishments in Canada
2008 disestablishments in the United States
2008 disestablishments in Canada
Monthly magazines published in the United States
Video game magazines published in the United States
Monthly magazines published in Canada
Defunct computer magazines published in the United States
Defunct magazines published in Canada
Magazines established in 2006
Magazines disestablished in 2008
Microsoft Windows magazines |
https://en.wikipedia.org/wiki/Keith%20Stattenfield | Keith Stattenfield is a senior Apple Computer software engineer. He started at Apple Computer in 1989 in the Information Systems & Technology group, then worked on the Macintosh operating system starting in 1995, from the Mac OS 7.5 release on. He led the Netbooting project starting in Mac OS 8.6, and then served as the overall technical lead of Mac OS 9. His California license plate reads "MAC OS 9".
In 2001, he was ranked 14 on the MDJ POWER 25, a list of the most influential people in the Macintosh community.
He has often presented at conferences such as Apple's Worldwide Developers Conference and MacHack (convention).
Keith has a Public-access television show and web site called Keith Explains. He is also a frequent guest on the show John Wants Answers.
References
Knaster and Rizzo (2004) "Mac Toys: 12 Cool Projects for Home, Office, and Entertainment"
External links
Keith Explains
Keith's personal web page
Keith's net boot patent mentioned on slashdot
Keith's net boot patent
Apple Inc. employees
Living people
Year of birth missing (living people)
American inventors |
https://en.wikipedia.org/wiki/Saskatchewan%20Wheat%20Pool | The Saskatchewan Wheat Pool was a grain handling, agri-food processing and marketing company based in Regina, Saskatchewan. The Pool created a network of marketing alliances in North America and internationally which made it the largest agricultural grain handling operation in the province of Saskatchewan. Before becoming Viterra, SWP had operated 276 retail outlets and more than 100 grain handling and marketing centres. The Saskatchewan Wheat Pool operated under the name of AgPro in the prairie provinces of Manitoba and Alberta. Begun as a co-operative in the 1920s, the company became a publicly traded corporation in the 1990s. After the 2007 takeover of its competitor, Winnipeg-based Agricore United, the Pool name was retired. The merged company operated under the name Viterra until 2013, when it was acquired by Glencore International.
Establishment and growth
Farmers, frustrated in their attempts to win a fair price for their wheat, started to look to various marketing systems between 1900 and 1920. The co-operative style of organizing farm operations was one of them. As early as 1902, farmers banded together as the Territorial Grain Growers' Association. The TGGA split into Alberta Farmers' Association and the Saskatchewan Grain Growers' Association (SGGA) in 1906. Also established at this time was the farmers' co-operative elevator company called the Grain Growers' Grain Company (GGGC), which later merged into the United Grain Growers. In 1911 the Saskatchewan Co-operative Elevator Company was formed.
The SGGA met with the United Farmers of Alberta and United Farmers of Manitoba and formed the Saskatchewan Co-operative Wheat Producers Ltd. on August 25, 1923. Informally it was known as the Saskatchewan Wheat Pool, as it collectively helped farmers to obtain a decent price for wheat. The first president was Alexander James McPhail, and the first grain elevator was built in Bulyea in 1925 (in the area of Section 36, Township 16, Range 15, W of the 2nd meridian). The Saskatchewan Co-operative Wheat Producers Ltd. bought out the Saskatchewan Co-operative Elevator Company in 1926. In 1953 The Saskatchewan Co-operative Wheat Producers Ltd. was renamed the Saskatchewan Wheat Pool.
The Wheat Pool elevators have been sentinels in many prairie towns since the early 1900s. They are the topic of numerous prairie landscapes and photographs. The Wheat Pool calendar map or Country Elevator System calendar maps were a mainstay of many pioneer households. These calendar maps depicted the networking of the early CNR and CPR rail lines, the many early incorporated areas, and the locations of the grain elevators. The pictures which surround the elevator map of grain delivered by horse and wagon, early truck, and grain handling at the ports along the calendars show the evolution of the grain handling industry.
In the early 20th century, grain elevators dotted the prairies every 6 to 10 miles (10–15 km) apart, a distance that was a good day's journey for |
https://en.wikipedia.org/wiki/Factor%20base | In computational number theory, a factor base is a small set of prime numbers commonly used as a mathematical tool in algorithms involving extensive sieving for potential factors of a given integer.
Usage in factoring algorithms
A factor base is a relatively small set of distinct prime numbers P, sometimes together with -1. Say we want to factorize an integer n. We generate, in some way, a large number of integer pairs (x, y) for which , , and can be completely factorized over the chosen factor base—that is, all their prime factors are in P.
In practice, several integers x are found such that has all of its prime factors in the pre-chosen factor base. We represent each expression as a vector of a matrix with integer entries being the exponents of factors in the factor base. Linear combinations of the rows corresponds to multiplication of these expressions. A linear dependence relation mod 2 among the rows leads to a desired congruence . This essentially reformulates the problem into a system of linear equations, which can be solved using numerous methods such as Gaussian elimination; in practice advanced methods like the block Lanczos algorithm are used, that take advantage of certain properties of the system.
This congruence may generate the trivial ; in this case we try to find another suitable congruence. If repeated attempts to factor fail we can try again using a different factor base.
Algorithms
Factor bases are used in, for example, Dixon's factorization, the quadratic sieve, and the number field sieve. The difference between these algorithms is essentially the methods used to generate (x, y) candidates. Factor bases are also used in the Index calculus algorithm for computing discrete logarithms.
References
Integer factorization algorithms |
https://en.wikipedia.org/wiki/WMDR%20%28AM%29 | WMDR (1340 AM) is an American radio station licensed to Augusta, Maine. It is owned by Light of Life Ministries and carries religious children's programming.
History
The 1340 frequency was previously known as WFAU; in 1994, its call letters and nostalgia format moved to 1280 AM, while 1340 became religious station WMDR. (The 1280 frequency became WJYE in 2014 and WHTP in 2020.) In May 1998, WMDR changed formats to a religious children's format, changing to Southern Gospel in late 2005, with the children's format moving to WMDR-FM. In March 2007, AM 1340 once again flipped formats with its FM counterpart, inheriting the Contemporary Christian format.
In 2009 the children's format was moved to an on demand section of their website and 1340 changed to a Christian-based talk radio station.
Sometime in early 2017, WMDR returned to airing a religious children's format, now branded as "The Arrow".
Translators
In addition to the main station, WMDR is relayed by two FM translators.
External links
Zap on Demand
Moody Radio affiliate stations
Radio stations established in 1946
Companies based in Augusta, Maine
1946 establishments in Maine
MDR (AM) |
https://en.wikipedia.org/wiki/Fiocruz%20Genome%20Comparison%20Project | The Fiocruz Genome Comparison Project is a collaborative effort involving Brazil's Oswaldo Cruz Institute and IBM's World Community Grid, designed to produce a database comparing the genes from many genomes with each other using SSEARCH. The program SSEARCH performs a rigorous Smith–Waterman alignment between a protein sequence and another protein sequence, a protein database, a DNA or a DNA library.
The nature of the computation in the project allows it to easily take advantage of volunteer computing. This, along with the likely humanitarian benefits of the research, has led the World Community Grid (a volunteer computing grid that uses idle computer clock time) to run the Fiocruz project. All products are in the public domain by contract with WCG.
Description
The problem is that a very large information body (structural, functional, cross-references, etc.) is attached to protein database entries. Once entered the information is rarely updated or corrected. This annotation of predicted protein function is often incomplete, uses non-standard nomenclature or can be incorrect when cross referenced from previous sometimes incorrectly annotated sequences. Additionally, many proteins composed of several structural and/or functional domains are overlooked by automated systems. The comparative information today is huge when compared to the early days of genomics. A single error is compounded and then made complex.
The Genome Comparison Project performs a complete pairwise comparison between all predicted protein sequences, obtaining indices used (together with standardized Gene Ontology) as a reference repository for the annotator community. The project provides invaluable data sources for biologists. The sequence similarity comparison program used in the Genome Comparison Project is called SSEARCH. This program mathematically finds best local alignment between sequence pairs, and is a freely available implementation of the Smith–Waterman algorithm.
SSEARCH's use makes possible a precise annotation, inconsistencies correction, and possible functions assignment to hypothetical proteins of unknown function. Moreover, proteins with multiple domains and functional elements are correctly spotted. Even distant relationships are detected.
See also
Comparative genomics
Notes
External links
Genome Comparison Project
World Community Grid Project
Genomics
Berkeley Open Infrastructure for Network Computing projects
Volunteer computing projects |
https://en.wikipedia.org/wiki/List%20of%20longest-running%20American%20primetime%20television%20series | This is a list of the longest running U.S. primetime television series, ordered by the number of broadcast seasons offered by a U.S. broadcast network or cable network in prime time on the show's original run. Broadcast syndication that could have been scheduled by local stations in prime time have been omitted.
Longest telecasted series
50 seasons or more
30–49 seasons
20–29 seasons
15–19 seasons
12–14 seasons
10–11 seasons
See also
Lists of longest running U.S. shows by broadcast type:
List of longest-running United States television series
List of longest-running U.S. broadcast network television series
List of longest-running U.S. cable television series
List of longest-running U.S. first-run syndicated television series
List of longest-running scripted U.S. primetime television series
Lists of longest running shows internationally:
List of longest-running television shows by category- international list
List of longest-running Australian television series
List of longest-running British television series
List of longest-running Philippine television series
List of shortest running shows:
List of television series canceled after one episode
List of television series canceled before airing an episode
Notes
Longest running prime time
Primetime |
https://en.wikipedia.org/wiki/List%20of%20longest-running%20American%20broadcast%20network%20television%20series | This is a list of the longest-running U.S. broadcast network television series, ordered by the number of broadcast seasons.
To qualify for this list, the programming must originate in North America, be shown on a United States national (not regional) television network, and be first-run (as opposed to a repackaging of previously aired material or material released in other media). For this list, series that were available only on a local or regional basis are excluded. The "number of seasons" total does not include cable broadcasts or series in syndication.
Over 60 years
50–59 years
40–49 years
30–39 years
20–29 years
See also
List of longest-running United States television series
List of longest-running U.S. cable television series
List of longest-running U.S. primetime television series
List of longest-running U.S. first-run syndicated television series
List of longest-running television shows by category
List of longest-running Philippine television series
List of longest-running UK television series
List of longest-running Australian television series
List of television series canceled after one episode
List of television series canceled before airing an episode
Notes
References
Longest running broadcast
Broadcast network |
https://en.wikipedia.org/wiki/DZAR | DZAR (1026 AM) Sonshine Radio is a radio station owned and operated by Sonshine Media Network International thru its licensee Swara Sug Media Corporation in the Philippines. The station's studio is located at the 3rd Floor, ACQ Tower (formerly Jacinta Building I/NBC Tower), Santa Rita St. cor. EDSA, Brgy. Guadalupe Nuevo, Makati, and its transmitter is located along M. Sioson St., Brgy. Dampalit, Malabon. This station operates Monday to Saturday from 4:00 AM to 12:00 MN and Sunday from 5:00 AM to 12:00 MN.
History
The station was established in August 1972 under the ownership of Republic Broadcasting System. It carried the call letters DZXX under 1000 kHz. However, it closed shop by the time Martial Law was declared. On February 1, 1973, it went back on the air, this time under the ownership of Hypersonic Broadcasting Center. In 1975, it changed its call letters to DWXX (Double X) and switched to a news and music format. DWXX closed shop on April 15, 1987. On May 10, 1987, Nation Broadcasting Corporation took over the frequency under the call letters DZAM, later known as DZAM Radyo Commando. During that period, the station operated with 10 kW output, and it featured a uniform network type full-service format (a.k.a. TV-on-radio format), consisting of news, and well-balanced mix of talk, music and entertainment programming for listeners of all ages; the live coverage of PBA games were also aired here during that time.
In 1998, after NBC was acquired by PLDT's MediaQuest Holdings from the consortium led by the Yabut family and real estate magnate Manny Villar, DZAM later changed its callsign as DZAR and relaunched as Angel Radyo, with an upgraded 25 kW signal, followed by the switch to news and talkback format. Some of the personalities who worked for Angel Radyo were TV personalities Boy Abunda, Ricky Carandang, TG Kintanar, Gerry Geronimo, Angelique Lazo, Bernadette Sembrano, Gina dela Vega-Cruz, showbiz columnist Jobert Sucaldito, columnist Rina Jimenez-David, Fernan Emberga, Noli Eala and Tim Orbos.
On January 29, 2005, international televangelist Pastor Apollo C. Quiboloy acquired all of NBC's AM stations under the Swara Sug Media Corporation's ownership. This, in turn, gave birth to Sonshine Radio. At that time its studios moved from NBC Tower/Jacinta Building in EDSA, Guadalupe, Makati to Jollibee Plaza Building in Ortigas Center, Pasig, and finally upgraded to its current 50 kW output, with its news, talk and religious programming.
Its 50,000-watt broadcast signal is heard in its territorial limits (Metro Manila). It is the only Philippine station listened to all over the world live via satellite through Globecast and through the Internet at its website, thus the tag "Dinig sa buong mundo" (Heard all over the world).
In 2012, DZAR studios moved back from Jollibee Plaza Building in Ortigas Center, Pasig to the new home ACQ Tower (formerly NBC Tower/Jacinta Building) in EDSA, Guadalupe, Makati.
On November 21, 2022, the station successf |
https://en.wikipedia.org/wiki/Veidekke | Veidekke () is the largest Norwegian construction and civil engineering company and the fourth largest in Scandinavia. Veidekke's business involves a network of Scandinavia construction and engineering operations, rehabilitation work, major heavy construction contracts and development of dwellings for the company's own account as well as buildings for public use. They recently acquired Reinertsen's civil engineering arm. Other business segments are asphalt operations, production of crushed stone and gravel (aggregates) and maintenance of public roads.
Operations
Veidekke's core activities are linked with construction, property development, civil engineering and consulting, and industrial operations (asphalt/aggregates and road maintenance. Veidekke has developed in concrete, carpentry and road operations.
Engineering
Veidekke took control of 80% of the shares of civil engineering contractor Tore Løkke AS in Åfjord at Fosen in Sør-Trøndelag. They also acquired Reinertsen's onshore construction and civil engineering operations.
Construction
Veidekke is a major player in the Scandinavian construction market and undertakes all types of building and heavy construction projects. Veidekke's contracts include construction of residential and non-residential buildings, schools and other public buildings and renovation of buildings in addition to heavy construction projects such as roads, railways and industrial development projects.
Construction operations in Norway are the responsibility of Veidekke Entreprenør AS. In Denmark, Veidekke's construction operations are looked after by Hoffmann A/S, and in Sweden, construction operations are undertaken by Veidekke Sverige AB.
Property development
The property division, Veidekke Eiendom AS, undertakes the development of dwellings for Veidekke's own account. Another business segment is the development of non-residential buildings and special-purpose buildings for the public sector. The division also carries out maintenance and management of non-residential buildings on behalf of Veidekke and other clients.
Industry
The industry division's operations are concentrated to the Norwegian market and cover the following business areas: Asphalt/aggregates, civil engineering and consulting. and road maintenance. Asphalt/aggregate operations are managed by Veidekke Industry AS. This segment includes production of asphalt and asphalting work, production of gravel and crushed stone, as well as maintenance of public roads.
History
Veidekke's roots go back to 1863 in Denmark (H. Hoffmann & Sønner) and in 1896 in Norway (Høyer Ellefsen). As a company, Veidekke was founded 6 February 1936 by Nico S. Beer and Gustav Piene. In its founding years, Veidekke was a company constructing roads and laying cobblestone. When the Second World War broke out in 1940, the company fulfilled all signed contracts and shut down all operations until after the war.
In 1948, the small and virtually unknown company, Veidekke, won the contr |
https://en.wikipedia.org/wiki/Unidirectional%20Lightweight%20Encapsulation | The Unidirectional Lightweight Encapsulation (ULE) is a Data link layer protocol for the transportation of network layer packets over MPEG transport streams.
Because of the very low protocol overhead, it is especially suited for IP over Satellite services (where every bit counts). Such a system is for example DVB-S. However, ULE can also be used in the context of DVB-C and DVB-T, theoretically in every system which is based on MPEG transport streams (e.g., ATSC).
ULE has been engineered by the IP over DVB (ipdvb) working group of the Internet Engineering Task Force (IETF) and has been standardized in RFC 4326.
Another encapsulation method is Multiprotocol Encapsulation (MPE) which was developed and standardized by the DVB project.
See also
MPEG-2
Generic Stream Encapsulation (GSE)
Multiprotocol Encapsulation (MPE)
Datacasting
Internet Protocol Datacasting (IPDC) for DVB-H
UDcast
Interactive television
Implementations
Software:
Linux Kernel,
ulenet for Windows XP,
The ipdvb Working Group maintains a list of ULE implementations.
References
External links
IP over DVB (ipdvb) Working Group
MPEG
Broadcast engineering
Interactive television
Link protocols
Logical link control |
https://en.wikipedia.org/wiki/Differentiated%20security | Differentiated security is a form of computer security that deploys a range of different security policies and mechanisms according to the identity and context of a user or transaction.
This makes it much more difficult to scale or replicate attacks, since each cluster/individual has a different security profile and there should be no common weaknesses.
One way of achieving this is by subdividing the population into small differentiated clusters. At the extreme, each individual belongs to a different class.
See also
Differentiated service (design pattern)
Separation of protection and security
External links
Differentiated security in wireless networks Andreas Johnsson, 2002.
Computer security procedures |
https://en.wikipedia.org/wiki/ULE | ULE may refer to:
DECT Ultra Low Energy, a wireless communication standard, which is used to create wireless sensor and actuator networks
Unidirectional Lightweight Encapsulation, a protocol for network layer packets over MPEG transport streams
ULE scheduler, a computer operating system scheduler
Ultra low expansion glass, made by Corning Incorporated
Ule (company), a Chinese e-commerce platform
Ule (surname), people surnamed Ule |
https://en.wikipedia.org/wiki/Computer-on-module | A computer-on-module (COM) is a type of single-board computer (SBC), a subtype of an embedded computer system. An extension of the concept of system on chip (SoC) and system in package (SiP), COM lies between a full-up computer and a microcontroller in nature. It is very similar to a system on module (SOM).
Design
COMs are complete embedded computers built on a single circuit board. The design is centered on a microprocessor with RAM, input/output controllers and all other features needed to be a functional computer on the one board. However, unlike a single-board computer, the COM usually lacks the standard connectors for any input/output peripherals to be attached directly to the board.
The module usually needs to be mounted on a carrier board (or "baseboard") which breaks the bus out to standard peripheral connectors. Some COMs also include peripheral connectors. Some can be used without a carrier.
A COM solution offers a dense package computer system for use in small or specialized applications requiring low power consumption or small physical size as is needed in embedded systems. As a COM is very compact and highly integrated, even complex CPUs, including multi-core technology, can be realized on a COM.
Some devices also incorporate field-programmable gate array (FPGA) components. FPGA-based functions can be added as IP cores to the COM itself or to the carrier card. Using FPGA IP cores adds to the modularity of a COM concept because I/O functions can be adapted to special needs without extensive rewiring on the printed circuit board.
A "computer-on-module" is also called a "system-on-module" (SOM).
History
The terms "Computer-on-Module" and "COM" were coined by VDC Research Group, Inc. (formerly Venture Development Corporation) to describe this class of embedded computer boards.
Dr. Gordon Kruberg, founder and CEO of Gumstix, is credited for creating the first COM, predating the next recognizable COM entries by almost 18 months.
Gumstix ARM Linux Machine number is 373, established 9 September 2003, while Kontron's is 735, established 18 April 2005, and Keith & Koep's (now part of SECO) is 776, established 20 June 2005. Boards numbered below 373 were larger and single board computers as opposed to modules, for example, the Itsy, a tiny hand-held device based on the StrongARM.
The rapid development paradigm (COM + expansion board) Dr. Kruberg established has been at the heart of leading edge development since then and used at leading consumer products companies worldwide.
COM's have proven useful in launching entire industries requiring rapid development efforts. For example, in 2005 Apple used a Gumstix COM to test the original iPhone concept.
Benefits
Using a carrier board is a benefit in many cases, as it can implement special I/O interfaces, memory devices, connectors or form factors. Separating the design of the carrier board and COM makes design concepts more modular, if needed. A carrier tailored to a special applic |
https://en.wikipedia.org/wiki/Barker%20Bill%27s%20Cartoon%20Show | Barker Bill's Cartoon Show was the first network television weekday cartoon series, airing on CBS from 1953 to 1955. The 15 minute show was broadcast twice a week, Wednesdays and Fridays, at 5pm Eastern, although some local stations showed both episodes together as a single 30 minute show.
Barker Bill was a portly circus ringmaster with a long black handlebar mustache and dressed in the traditional costume - a fancy suit with white gloves and a top hat.
The show was hosted by a stationary picture of the Barker Bill character with an off-camera announcer introducing the cartoons. The show featured old black and white cartoons obtained from Terrytoons. These were mostly older cartoons from the 1930s, like Farmer Al Falfa and Kiko the Kangaroo, not the more current and better known series such as Mighty Mouse and Heckle and Jeckle.
Barker Bill did not appear in cartoons, but was briefly featured in a newspaper comic strip series from September 1954 to 1955.
Terrytoons was the first major animation studio to give television a license to show its library of old black and white cartoons. The Barker Bill series was so successful that CBS offered to buy the Terrytoons studio, including its production facilities and library of cartoons. Paul Terry accepted the offer and retired in 1955.
This brought well-known Terrytoons characters Mighty Mouse, Heckle and Jeckle and others to television, replacing the Barker Bill series in 1956. The color cartoons were originally broadcast in black and white, but were still suitable when television switched to color and continued to be part of CBS programming until the 1980s.
The older cartoons from the Barker Bill show were re-packaged for syndication under various titles, including Farmer Alfalfa and His Terrytoons Pals, The Terry Toons Club, and Terry Toons Circus.
References
External links
Terrytoons on CBS
American children's animated comedy television series
1950s American animated television series
1953 American television series debuts
1955 American television series endings
Television series by Terrytoons |
https://en.wikipedia.org/wiki/Even%E2%80%93odd%20rule | The even–odd rule is an algorithm implemented in vector-based graphic software, like the PostScript language and Scalable Vector Graphics (SVG), which determines how a graphical shape with more than one closed outline will be filled. Unlike the nonzero-rule algorithm, this algorithm will alternatively color and leave uncolored shapes defined by nested closed paths irrespective of their winding.
The SVG defines the even–odd rule by saying:
The rule can be seen in effect in many vector graphic programs (such as Freehand or Illustrator), where a crossing of an outline with itself causes shapes to fill in strange ways.
On a simple curve, the even–odd rule reduces to a decision algorithm for the point in polygon problem.
The SVG computer graphics vector standard may be configured to use the even–odd rule when drawing polygons, though it uses the non-zero rule by default.
Implementation
Below is a partial example implementation in Python:
def is_point_in_path(x: int, y: int, poly) -> bool:
# Determine if the point is on the path, corner, or boundary of the polygon
#
# Args:
# x -- The x coordinates of point.
# y -- The y coordinates of point.
# poly -- a list of tuples [(x, y), (x, y), ...]
#
# Returns:
# True if the point is in the path or is a corner or on the boundary
num = len(poly)
j = num - 1
c = False
for i in range(num):
if (x == poly[i][0]) and (y == poly[i][1]):
# point is a corner
return True
if ((poly[i][1] > y) != (poly[j][1] > y)):
slope = (x-poly[i][0])*(poly[j][1]-poly[i][1])-(poly[j][0]-poly[i][0])*(y-poly[i][1])
if slope == 0:
# point is on boundary
return True
if (slope < 0) != (poly[j][1] < poly[i][1]):
c = not c
j = i
return c
See also
Nonzero-rule
Jordan curve theorem
Complex polygon
Tessellation
Polygon triangulation
TrueType
References
External links
Definition of fill rules in SVG
Computer graphics algorithms
Parity (mathematics) |
https://en.wikipedia.org/wiki/PIC%20%28markup%20language%29 | In computing, Pic is a domain-specific programming language by Brian Kernighan for specifying line diagrams.
The language contains predefined basic linear objects: line, move, arrow, and spline, the planar
objects box, circle, ellipse, arc, and definable composite elements.
Objects are placed with respect to other objects or absolute coordinates.
A liberal interpretation of the input invokes
default parameters when objects are incompletely specified.
An interpreter translates this description into
concrete drawing commands in a variety of possible output formats.
Pic is a procedural programming language, with variable assignment, macros, conditionals, and looping. The language is an example of a little language originally intended for the comfort of non-programmers in the Unix environment (Bentley 1988).
History
Pic was implemented using Yacc compiler-compiler.
Implementations
Pic was first implemented as a preprocessor in the troff document processing system but is now often used with LaTeX. The pic preprocessor filters a source document, replacing diagram descriptions by drawing commands in a specified format, and passing the rest of the document through without change. Alternatively, diagram source is passed through the preprocessor to produce a file for insertion into the
document source.
A version of pic is included in groff, the GNU version of troff. GNU pic can also act as a preprocessor for TeX documents, emitting its own tpic DVI specials, which aren't as widely supported as those of other TeX graphic facilities. Arbitrary diagram text can be included for formatting by the word processor to which the pic output is directed, and arbitrary graphic processor commands can also be included.
DPIC
Dwight Aplevich's implementation, DPIC, can also generate pdf, postscript, svg, and other images by itself, as well as act as a preprocessor producing several LaTeX-compatible output formats. The three principal sources of pic processors are GNU pic, found on many Linux systems, and dpic, both of which are free, and the original AT&T pic.
Pikchr
Pikchr (pronounced "picture") is a modern replacement for Pic in some contexts, designed to be embedded in Markdown, instead of troff or LaTeX. It should run most of the example scripts contained in the original technical report on Pic with little to no change. Created by D. Richard Hipp, in August 2020, it is used in Fossil, SQLite, and Subplot.
Alternatives
Pic has some similarity with MetaPost and the DOT language.
See also
Eqn language
References
Notes
J. Bentley. More Programming Pearls, Addison-Wesley (1988).
External links
Making Pictures With GNU PIC
Troff resources (see the "pic" section)
DPIC, an implementation of the PIC language by Dwight Aplevich. This implementation has a few nice extensions and outputs many different image formats.
figr, web based pic renderer.
GNU pic2plot "takes one or more files in the pic language, and either displays the figures that they contai |
https://en.wikipedia.org/wiki/Dennis%20Moran%20%28computer%20criminal%29 | Dennis Michael Moran (October 27, 1982 – April 14, 2013), also known by his alias Coolio, was an American computer hacker from Wolfeboro, New Hampshire, who was accused in February 2000 of a series of denial-of-service attacks that shut down some of the most popular websites on the Internet. He was 17 years old when he committed the attacks. He was later arrested and pleaded guilty to defacing the websites of Drug Abuse Resistance Education and RSA Security, as well as unauthorized access of the U.S. Army and Air Force computer systems at four military bases. Moran died of a drug overdose in 2013.
The attacks
On February 7, 2000, a smurf attack generating over 1 gigabit per second of Internet Control Message Protocol traffic was launched against Yahoo!'s routers, causing their websites to be inaccessible to the world for hours. In a message sent to the CERT Coordination Center, Yahoo! network engineer Jan B. Koum stated that the attackers were "above your average script kiddie" and "knew about our topology and planned this large scale attack in advance."
Shortly thereafter, Stanford University's computer security administrator David Brumley began monitoring Internet Relay Chat (IRC) traffic on irc.stanford.edu, which was then a public server on the EFnet IRC network. He discovered discussions about the attack on Yahoo! taking place which led him to believe members of an IRC channel had information about the source of the attacks, and he contacted the FBI to give them transcripts of the IRC chat.
Over the following week a series of equally crippling denial-of-service attacks affected many other major internet sites including eBay, Amazon.com, E*TRADE, and Buy.com. A security consultant named Joel de la Garza also began investigating the IRC channel and while he was in the channel, RSA Security's website was redirected to a hacked web server in Colombia with a defaced copy of their home page. The defacement included a reference to David Brumley's nickname on IRC, as he had joined the channel by then in an attempt to gather more information from Moran. De la Garza witnessed this live show of criminal activity and later reported about it to the media. On March 5, 2000, the FBI raided Moran's house and seized his computers.
After having so much attention drawn to him, and de la Garza's account of Moran being responsible for defacing RSA's website, the FBI investigated Moran's connections to other website defacements. Eventually they passed this evidence on to the New Hampshire Attorney General's office and Moran was charged as an adult with 7 counts of Class A felony unauthorized access of a computer. One year later, on March 9, 2001, he pleaded guilty to 4 counts of misdemeanor unauthorized access of a computer and was sentenced to 12 months in jail with 3 months suspended as well as ordered to pay $15,000 USD in restitution. His arrest took place in Wolfeboro, New Hampshire.
Professional career
During his time in jail, Moran was mentored by P |
https://en.wikipedia.org/wiki/Scheme%20Requests%20for%20Implementation | Scheme Requests for Implementation (SRFI) is an effort to coordinate libraries and extensions of standard Scheme programming language, necessitated by Scheme's minimalist design, and particularly the lack of a standard library before Scheme R6RS. Specific SRFI documents are supported by many Scheme implementations. This, in effect, makes SRFI an informal standards process.
History
At the Scheme Workshop held in Baltimore, Maryland, on September 26, 1998, the attendees considered several proposals for standardized feature sets to include in Scheme implementations.
Alan Bawden proposed that there be a repository for library proposals. Shriram Krishnamurthi volunteered to host the library, and Dave Mason and Mike Sperber joined him as initial editors and coordinators of the library process. The term Request for Implementation, a play on the Internet Request for Comments, was coined at the workshop, and modified to Scheme Request for Implementation by the editors.
On November 1, 1998, the srfi-discuss mailing list was established which had as subscribers many major implementors of Scheme and other contributors to the language. An archive of the discussion is kept online.
The SRFI website, along with the other SRFI procedures, was established in late December 1998.
As of 2023, 245 SRFIs have been published, and new contributions and discussion continue.
References
External links
1998 talk on SRFI history ()
2022 SRFI status report talk ()
Scheme (programming language) |
https://en.wikipedia.org/wiki/Computing%20performance | Computing performance can mean:
Algorithmic efficiency (software)
Computer performance (hardware) |
https://en.wikipedia.org/wiki/Ruby%20License | The Ruby License is a Free and Open Source license applied to the Ruby programming language and also available to be used in other projects. It contains an explicit dual licensing clause, stating that software subject to its terms may be distributed under either the terms included the Ruby License itself or under those of either the GNU General Public Licence v2, or the two-clause BSD License (depending on the version of the Ruby License used).
The license is typically considered to be a free software license due to the presence of the dual-licensing clause.
History
For versions up to 1.9.2, the Ruby programming language was available under an explicit dual-licence scheme which allowed users to choose between a dedicated Ruby licence or the GNU General Public Licence v2 (GPLV2), which is one of the most common free software licences.
Starting at version 1.9.3, the dual-licensing clause changed to offer the choice of the FreeBSD License.
Compatibility
The Ruby License has unusual copyleft requirements, stating that redistributions should not necessarily be under the terms of the Ruby license, but placed "in the Public Domain or otherwise Freely Available". For example, a modified form of a program licensed under the Ruby license may be placed under the FreeBSD License, which is a non copyleft license.
The Ruby License is approved by the Free Software Foundation and is considered compatible with the GNU General Public License, due to its explicit dual-licensing clause.
The Open Source Initiative does not explicitly include the Ruby license as a certified an open source license; this is considered "unnecessary" due to the dual licensing clause.
In discussion over the change of the dual licensing clause on the debian-legal mailing list, it was noted that while the Ruby license itself is arguably not compatible with the Debian Free Software Guidelines, this is unimportant due to the dual-licensing clause.
Software under Ruby license (including the older version when GPLv2 was a listed alternative Ruby 1.9.2 license) may be included in binary form within an Apache product if the inclusion is appropriately labeled.
Adoption
Software other than the Ruby programming language itself which uses the Ruby License includes:
JRuby, an implementation of Ruby atop the Java Virtual Machine
MacRuby, an implementation of Ruby 1.9 directly on top of Mac OS X core technologies such as the Objective-C runtime and garbage collector, the LLVM compiler infrastructure and the Foundation and ICU frameworks. MacRuby contains code from the Ruby project and the source code of the most MacRuby examples, unless specified, are covered by the Ruby license.
RubyGems, a package manager for Ruby
IronRuby, an implementation of Ruby targeting the .NET Framework
The JSON implementation for Ruby
References
External links
Text of the Ruby License
Ruby (programming language)
Free and open-source software licenses |
https://en.wikipedia.org/wiki/Mediated%20VPN | A mediated VPN is a virtual private network topology where two or more participants connect to a central switchboard server managed typically by a third party in order to create a virtual private network between them, as distinct from a typical VPN arrangement whereby clients of an organisation connect to a VPN concentrator managed by the same organization.
Typically a switchboard server (referred to as a mediator) will manage several VPNs, identifying each individually by authentication credentials (such as username, network name and passwords). The mediator's role is to assign IP addresses to each participant in a VPN, and to encrypt data through the switchboard server in order to keep it secure from other participants in other VPNs.
See also
Virtual private network
Virtual Private LAN Service
Point-to-point (telecommunications)
References
Network architecture |
https://en.wikipedia.org/wiki/Cassie%20Newman | Cassie Newman is a fictional character from The Young and the Restless, an American soap opera on the CBS network. Portrayed by Camryn Grimes, the character was introduced on March 19, 1997, by William J. Bell as the biological daughter of Sharon Newman (Sharon Case) who had been adopted. Grace Turner (Jennifer Gareis), Sharon's best friend, tracked Cassie down in hopes of reuniting her with Sharon, but decided to keep the girl for herself. A year passed before Sharon learned Cassie was her daughter, regaining custody with her husband Nicholas Newman (Joshua Morrow), who adopted her.
In 2005, the producers decided to kill off Cassie by having her die from injuries sustained in a car accident, the episode aired on May 24, 2005. The character's death was felt in storyline for years to follow, leading to the dissolution of her parents' marriage and numerous events thereafter. Grimes continued to recur following her character's death, usually in flashbacks, dreams or as a hallucination to the mentally ill; these returns aired from June 7, 2005, until June 14, 2007, and again on May 6, 2009, and March 15, 2010. Grimes' final return as Cassie's ghost was over the course of July 8, 2013, to October 30, 2014, during which the actress would return to The Young and the Restless as a main cast member, as Cassie's previously unknown twin sister, Mariah Copeland. In January 2020, it was reported that Grimes would be reprising the role of Cassie, appearing on February 7. She then made another one-off appearance on December 24, 2021.
Both the actress and character were well received by fans and enjoyed critical acclaim, with Grimes becoming the youngest recipient of the Daytime Emmy Award for Outstanding Younger Actress in a Drama Series in 2000, at age 10.
Character development
When she debuted, Cassie was 6 years old, having been born on January 8, 1991. She was adopted by Alice Johnson (Tamara Clatterbuck) as an infant. However, in 1994, Alice disappeared and left her in the care of her elderly mother Millie. Sharon's best friend Grace Turner (Jennifer Gareis) later tracked down Cassie and took her for herself. The Pittsburgh Post-Gazette said that Grace wanted Cassie as a "pet" despite knowing Sharon was her biological mother. As she grew up, she went from a sweet child to a "rebellious" teen who began to lie to her parents. She also wanted to hang out with older kids at school, like Daniel Romalotti (Michael Graziadei) and Lily Winters (Christel Khalil). She was grounded because of her "rebellious streak". Cassie was described as a "good girl" who wanted to "fit in" but began cutting classes, giving her parents attitude and "a whole host of other angsty teenage pleasantries."
Cassie died following a car crash on the episode that aired May 24, 2005. Grimes said that she has missed the show since leaving, and was shocked to find out that Cassie was killed off. She stated: "If it's meant to happen, it's meant to happen. Everything happens for a reason, |
https://en.wikipedia.org/wiki/Tan%20Kheng%20Hua | Tan Kheng Hua (born 17 January 1963) is a Singaporean actress. She is best known for her supporting roles in the 2018 Hollywood film Crazy Rich Asians and in American television network the CW's martial arts television series Kung Fu (2021-2023).
Early life
Tan acquired an interest in acting when she took a theatre elective while attending Indiana University. She graduated with a Bachelor of Science (magna cum laude) from Indiana University School of Public & Environmental Affairs. After returning to Singapore, she took up a job in public affairs, and pursued acting in her spare time.
Career
The first stage play Tan performed in was John Bowen's The Waiting Room, which was directed by her cousin Ivan Heng. It took almost a decade before Tan became a full-time actress. In the theatre, Tan is in the original casts of landmark plays such as Beauty World, Lao Jiu, Descendants of the Admiral Eunuch, Animal Farm, Cooling Off Day and Falling, for which she won her second Life! Theatre Best Actress Award.
In Singaporean television, Tan is best known for her role as Margaret in Singapore's longest running and most successful sitcom, Phua Chu Kang Pte Ltd, for which she won an Asian Television Award for Best Actress (Comedy). Her first foray into Mandarin-language television, Beautiful Connection, earned her a Best Supporting Actress nomination at the Star Awards.
On the international scene, Tan has appeared in Serangoon Road, Marco Polo and Crazy Rich Asians.
In 2020, Tan was cast as a series regular in Kung Fu, The CW's modern reboot of Kung Fu.
Tan also creates and produces for stage and television in Singapore including the critically acclaimed cabaret act, The Dim Sum Dollies; the dramas 9 Lives and Do Not Disturb, the latter being the first local TV series to receive the maximum 5-star rating from Straits Times Life!, the Mandarin serial, Mr & Mrs Kok and lifestyle infotainment on The Asian Food Channel. Outside of Singapore Tan produced No.7, an original theatre piece commissioned by the Georgetown Festival 2011 in Penang. No.7 was sold out with a waiting list. In 2014, she brought 64 Singaporean and Malaysian artists together in The SIN-PEN Colony to Penang's Georgetown Festival celebrating the cities’ shared heritage of food, visual art, music, theatre and design. The theatre segment within The SIN-PEN Colony, 2 Houses, sold-out within four days. She conceptualized and produced The Twenty-Something Theatre Festival 2016 and Tropicana The Musical (based on the real-life Tropicana entertainment complex) which opened to positive reviews in April 2017.
For her contributions to the arts, Tan was one of fifty local stage personalities in an exhibition celebrating 50 years of Singapore theatre and part of twenty contemporary artists chosen to represent Singapore in Singapore: Inside Out, a showcase presented by the Singapore Tourism Board in Beijing, London and New York City to celebrate Singapore's fiftieth anniversary.
Personal life
Tan marrie |
https://en.wikipedia.org/wiki/Voice%20modem%20command%20set | A voice modem is an analog telephone data modem with a built-in capability of transmitting and receiving voice recordings over the phone line. Voice modems are used for telephony and answering machine applications. Similar to the Hayes command set used for data modems, in which the host PC commands the modem via a series of commands known as AT commands, there exists a well-defined set of common voice AT commands that are somewhat consistent throughout the industry.
Implementation problems
Because voice mode is not the typical use for a modem, many modems on the market have poor or buggy support for their voice modes. Characteristics of a good voice modem depend greatly upon the intended application, and include:
Reliable operation. Many modems simply "lock up" or crash the host PC, though this is more common with Winmodems. Others have flow control bugs and other implementation bugs, possibly causing calls to hang, audio to skip, or audio to keep playing after an attempted abort.
Good audio characteristics. Some modems have an uncorrectably low signal volume or produce audio noise. Some modems are unable to recognize all but the best DTMF signals. Some modems do a poor job of recording, or detecting and reporting silence or the end-of-call voltage reversal, which some applications need.
Support for caller ID, if needed. "Type-1 caller ID" as used in North America is missing from the vast majority of modems. Nearly all modem chipsets support caller ID, but because the typical dial-up Internet user doesn't need caller ID, the extra components needed to support caller ID are often omitted for cost reasons.
Support for multiple instances. The drivers for many internal modems (typically Winmodems) cannot tolerate more than one of the same device inside a single computer. Symptoms of incompatibility include crashes, blue screens of death, or simple inoperability of all but a single modem. External RS-232-based (serial) modems do not have this limitation because each modem contains its own microprocessor and is unaware of other modems on the same host. USB modems may or may not have this problem, because some USB modems are simply serial modems with a "USB-to-serial" converter chipset (in which case there should be no problem), and other USB modems are "host-controlled" and are essentially externally attached Winmodems (in which case the problem may persist).
Plus versus Hash
Each voice modem platform tends to support either one of two sets of voice commands—in particular, one flavor of the command set contains a plus (+) sign, and the other contains a hash (#) sign.
Detecting voice mode
Support for voice mode can be detected on a modem by issuing the following command: AT+FCLASS=?
This command is usually supported containing the plus sign whether a modem supports "plus" or the "hash" command set, because the command (which stands for "fax class") is part of the industry-standard fax commands which always use the plus.
A modem supporting voi |
https://en.wikipedia.org/wiki/%2790s%20on%209 | The '90s on 9 (or just The '90s) is the name of Sirius XM Radio's 1990s commercial-free music channel, heard on Sirius XM channel 9 and Dish Network channel 6009. The channel focuses mostly on hit-driven R&B, Hip-Hop, Rock, Dance and Techno tracks from the 1990s. Many of the station IDs are spoofs of movies, TV characters, songs and TV commercials that were popular during the '90s. Occasionally, lesser-known '90s songs are played, preceded by the "five disc CD changer set on random" tagline. The channel's logo features a compact disc in place of the zero, representing the popularity of CDs in the nineties.
History
The service signed on September 25, 2001, and broadcasts on Sirius XM channel 9 and on Dish Network channel 6009. It was also heard on DirecTV until February 9, 2010. On November 12, 2008, it was added to Sirius, replacing the original Pulse on Sirius channel 9, whereas the new Pulse, formerly Flight 26 was added to channel 12 on the Sirius side. This is Sirius's first all-1990s channel since I-90 signed off on November 4, 2002. The old Pulse carried a 1990s & hot AC hybrid, whereas the new Pulse just carries modern AC music. In addition, it also replaced the online-only Super Shuffle channel on Sirius, last heard on satellites in mid-2008. On February 3, 2014, the channel became jockless when both Jo Jo Morales and KT Harris were let go in a cost-cutting move. It remained jockless until May 26, 2015, when former MTV VJ Downtown Julie Brown, who also hosts the weekend's "Back in the Day Replay Countdown", began hosting the channel on a daily basis.
Core artists
Backstreet Boys
Mariah Carey
Aerosmith
Alanis Morissette
Britney Spears
Nirvana
Green Day
Gin Blossoms
Boyz II Men
Salt-N-Pepa
Will Smith
Janet Jackson
Michael Jackson
LL Cool J
DJ Jazzy Jeff & The Fresh Prince
Tupac
Biggie
En Vogue
TLC
Spice Girls
NSYNC
References
External links
SiriusXM: '90s on 9
Sirius XM Radio channels
XM Satellite Radio channels
1990s radio stations in the United States
Sirius Satellite Radio channels
1990s-themed radio stations
Radio stations established in 2001 |
https://en.wikipedia.org/wiki/Sofia%27s%20Choice | "Sofia's Choice" is the twelfth episode from the first season of the dramedy series Ugly Betty, which aired on the ABC network in the United States on January 11, 2007. It was written by Silvio Horta, produced by Salma Hayek and directed by Jim Hayman.
Plot
Betty gets her first assignment from Sofia at MYW. She has to write an article about her experience of being an outsider at MODE, but does not want to. Sofia convinces her of doing it by pretending to get emotional and crying. Betty goes back to MODE to ask Marc, Amanda and Daniel about their first impressions of her and starts writing the article. Meanwhile, Daniel takes Sofia to his father's house to have dinner with his parents. It all seems to be going fine, until both couples begin to dance and Claire, Daniel's alcoholic mother, tells Bradford that she does like Sofia, but she thinks that she is hiding something.
Outside, Betty sees Sofia meet Hunter, her ex-boyfriend who is supposed to be in Europe, to give him money in secret. Betty runs back to MODE to inform Christina. They track down Hunter to a male strip club and talk to him; he reveals that Sofia hired him to pose as her fiancé. Daniel announces that he has proposed to Sofia and Betty cannot bring herself to tell him about the lie. The following day, Betty discovers that Sofia hired Hunter to manipulate Daniel, and that their engagement will be announced on the air that morning. Betty also notices a draft of Sofia's latest article. In it, she recommends several steps to get a proposal in 60 days; she applied them all in her relationship with Daniel.
Sofia and Daniel go live on the air as Betty unsuccessfully attempts to stop them. Sofia talks about her new magazine and how she got Daniel to propose to her in 60 days, making him squirm. Sofia also admits that she is not really in love with Daniel and takes her ring off. Daniel leaves the studio in a state of shock. Betty tries to apologize to Daniel, but he is too stunned to even notice her.
Sofia enters the office to thunderous applause from all except Betty, who hands her the article that she has written about working at MODE and quits MYW. Amanda greets an unsuspecting Sofia as she gets into the elevator to leave for the day. When the doors close, Amanda starts to give Sofia a vicious and brutal beating with her purse as the doors close. Betty then goes to see Daniel at MODE, but Marc quickly informs her that he is missing.
Meanwhile, Wilhelmina and Ted continue to progress with their relationship and she is quickly becoming a happier person. She goes to see the mystery woman and tells her that the attempt to take over MODE may not happen. Ted later meets with his ex-wife and decides to try to work things out with her. He breaks up with Wilhelmina, who accepts that she and him never had a future together and returns to her old attitude. Marc tells her that Steve, the private investigator who was working for Bradford but turned out to be a traitor, called, and she answers hi |
https://en.wikipedia.org/wiki/MAC%20filtering | In computer networking, MAC address filtering is a security access control method whereby the MAC address assigned to each network interface controller is used to determine access to the network.
MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and whitelists. While the restriction of network access through the use of lists is straightforward, an individual person is not identified by a MAC address, rather a device only, so an authorized person will need to have a whitelist entry for each device that they would like to access the network.
While giving a network some additional protection, MAC filtering can be circumvented by using a packet analyzer to find a valid MAC and then using MAC spoofing to access the network using that address. MAC address filtering can be considered as security through obscurity because the effectiveness is based on "the secrecy of the implementation or its components".
Port security
Many devices that support MAC filtering do so on a device basis. Whitelisted MAC addresses are allowed through any port on the device and blacklisted MAC addresses are blocked on all ports. Other devices, such as Cisco Catalyst switches, support MAC filtering on a port-by-port basis. This is referred to as port security. Port security may be configured statically with a list, dynamically based on the first given number of addresses detected, or a combination of these two methods. When port security is configured, the default settings are to allow only one MAC address per port, and to shut down the port if the allowed number of addresses is exceeded.
See also
Access-control list
IP address blocking
Private VLAN
References
External links
Computer network security
Media access control |
https://en.wikipedia.org/wiki/Edward%20Quartermaine | Edward Quartermaine is a fictional character from General Hospital, an American soap opera on the ABC network. The character was created in 1978, originally played by David Lewis. John Ingle stepped into the role in 1993, and besides a brief hiatus from 2004 until 2006, he portrayed Edward up until his death on September 16, 2012.
Casting
David Lewis originated the role of Edward in 1978. In 1987 and 1988, Les Tremayne stepped in temporarily due to Lewis' health. Starting on May 3, 1989, Lewis was forced to step down due to his illness. The character was killed off in a plane crash, but Lewis' voice was still heard whenever Lila spoke to her late husband's ghost. After recovering, Lewis returned as Edward on November 26, 1991. His health declined again and he left as the role was recast with John Ingle on August 17, 1993. Ingle received an award for Outstanding Scene Stealer at the Soap Opera Awards in 1999. Ingle was fired in December 2003, and the show planned to again kill off the character, but a last minute storyline change kept the character and Ingle on in a recurring capacity. However, Ingle opted for a contract role of Mickey Horton on Days of Our Lives, and Jed Allan was brought on to play Edward starting on March 1, 2004. In 2006, Allan was let go when Ingle was released from his Days of Our Lives contract and was re-hired for the Edward Quartermaine role. Allan last appeared on December 30, 2005. Ingle reprised the role on April 18, 2006. Following a decline in health and the death of his wife, rumors began circulating that Ingle's Edward was being written out.
In September 2012, soap opera gossip site, Daytime Confidential reported that Ingle could possibly be making his last appearance. Former General Hospital scribe, Michele Val Jean also commented on Ingle's potential departure through Twitter. Ingle died on September 16, 2012. He filmed his final scenes on August 24, and the episode aired on September 11, 2012. Uncredited actors portrayed the role briefly in 2014 and 2019, when the character appeared as a ghost to help escort A. J. Quartermaine and Oscar Nero to heaven.
Character background
Edward was born on September 2, 1918 (according to the date in the family crypt). Edward and his wife Lila are considered to be two of the wealthiest individuals in the fictional town of Port Charles, New York. Edward is the Founder & Chairman, former CEO, and principal shareholder of E.L.Q. Industries. Many of his storylines involve health concerns, such as multiple heart attacks, a bout of amnesia in 1989, a stroke and faked coma, and a time in 2004 when his daughter Tracy had him committed to the Shadybrook Sanitarium, though he later escaped with the assistance of Luke Spencer. Portrayer John Ingle describes, "Edward likes to think that he's taught everyone around him how to be ruthless."
Storyline
1970s
Edward first showed up in Port Charles in 1978, making occasional visits to Port Charles with his wife Lila before moving in with h |
https://en.wikipedia.org/wiki/MSSP | MSSP may refer to:
Managed Security Service Provider, who provides security services for companies
Microsoft Smooth Streaming Protocol, a computer networking protocol designed to support adaptive media streaming
Mobile Service Switching Point, see Service Switching Point
Medicare Shared Savings Program, established by section 3022 of the Affordable Care Act
Master Synchronous Serial Port, a module of a PIC microcontroller that is used for communication with other peripherals
Missionary Society of St Paul (Malta) |
https://en.wikipedia.org/wiki/Hamming%20graph | Hamming graphs are a special class of graphs named after Richard Hamming and used in several branches of mathematics (graph theory) and computer science. Let be a set of elements and a positive integer. The Hamming graph has vertex set , the set of ordered -tuples of elements of , or sequences of length from . Two vertices are adjacent if they differ in precisely one coordinate; that is, if their Hamming distance is one. The Hamming graph is, equivalently, the Cartesian product of complete graphs .
In some cases, Hamming graphs may be considered more generally as the Cartesian products of complete graphs that may be of varying sizes. Unlike the Hamming graphs , the graphs in this more general class are not necessarily distance-regular, but they continue to be regular and vertex-transitive.
Special cases
, which is the generalized quadrangle
, which is the complete graph
, which is the lattice graph and also the rook's graph
, which is the singleton graph
, which is the hypercube graph . Hamiltonian paths in these graphs form Gray codes.
Because Cartesian products of graphs preserve the property of being a unit distance graph, the Hamming graphs and are all unit distance graphs.
Applications
The Hamming graphs are interesting in connection with error-correcting codes and association schemes, to name two areas. They have also been considered as a communications network topology in distributed computing.
Computational complexity
It is possible in linear time to test whether a graph is a Hamming graph, and in the case that it is, find a labeling of it with tuples that realizes it as a Hamming graph.
References
External links
Parametric families of graphs
Regular graphs |
https://en.wikipedia.org/wiki/Weak%20NP-completeness | In computational complexity, an NP-complete (or NP-hard) problem is weakly NP-complete (or weakly NP-hard) if there is an algorithm for the problem whose running time is polynomial in the dimension of the problem and the magnitudes of the data involved (provided these are given as integers), rather than the base-two logarithms of their magnitudes. Such algorithms are technically exponential functions of their input size and are therefore not considered polynomial.
For example, the NP-hard knapsack problem can be solved by a dynamic programming algorithm requiring a number of steps polynomial in the size of the knapsack and the number of items (assuming that all data are scaled to be integers); however, the runtime of this algorithm is exponential time since the input sizes of the objects and knapsack are logarithmic in their magnitudes. However, as Garey and Johnson (1979) observed, “A pseudo-polynomial-time algorithm … will display 'exponential behavior' only when confronted with instances containing 'exponentially large' numbers, [which] might be rare for the application we are interested in. If so, this type of algorithm might serve our purposes almost as well as a polynomial time algorithm.” Another example for a weakly NP-complete problem is the subset sum problem.
The related term strongly NP-complete (or unary NP-complete) refers to those problems that remain NP-complete even if the data are encoded in unary, that is, if the data are "small" relative to the overall input size.
References
Computational complexity theory
Complexity classes |
https://en.wikipedia.org/wiki/Eric%20Hahn | Eric Hahn (born March 19, 1960) is an American serial entrepreneur and computer software programmer who founded an early e-mail-based groupware company called Collabra Software in 1992. Netscape acquired Collabra in 1995, and in 1997 Hahn became Netscape's CTO. According to SEC filings Hahn netted approximately $29 million from sales in Netscape stock.
Career
Hahn founded Proofpoint, Inc in June 2002 which became a publicly traded company in April 2012.
Hahn also co-founded Lookout Software, which was acquired by Microsoft in 2004.
Hahn received his bachelor's degree from Worcester Polytechnic Institute in 1980.
Personal life
Hahn currently lives in Palo Alto, California with his wife and two sons.
References
External links
Netscape
Living people
American computer businesspeople
American technology company founders
Netscape people
American chief technology officers
Worcester Polytechnic Institute alumni
1960 births |
https://en.wikipedia.org/wiki/List%20of%20International%20Emmy%20Award%20winners | This is a list of International Emmy Award winners.
Current categories
Arts Programming
Best Performance by an Actor
Best Performance by an Actress
Comedy
Documentary
Drama series
Non-English Language U.S. Primetime Programs
Non-Scripted Entertainment
Short-Form Series
Telenovela
TV Movie / Mini-Series
Other categories
Children & Young People
Kids: Animation
Kids: Factual & Entertainment
Kids: Live-Action
Journalism
News
Current Affairs
Honorary Awards
Founders Awards
Directorate Award
Others
International Children's Day of Broadcasting Award
Presented by UNICEF in conjunction with International Emmy Awards and awarded to a broadcaster whose children's programming on or around the first Sunday in March of the previous year best reflects the theme declared by UNICEF for that year. Aims and conditions may be found at .
2010 – Télévision Togolaise of Togo for its weekly A Nous La Planete
2009 – Citizen TV of Kenya for its weekly Angels Café
2008 – China Central Television children's channel for documentary On the Way
2007 – National Broadcasting of Thailand for From South to North, From East to West, Thailand ICDB – Unite for Children, Unite Against AIDS
2006 – Teleradio Moldova for their program Let's Play!
2005 – Egyptian TV for Rebellion of the Canes
2004 – ATN Bangla for Amrao pari (We, too, Can)
2003 – Television 13 of Colombia, with the support of Fundación Imaginario for Tropas de Paz (Peace Troops), Disparando Cámaras para la Paz (Cameras Shooting for Peace) and A Prender TV (To Learn TV) Directed by Mariana Ferrer and Alejandro Jaramillo
2002 – Star News of New Delhi, India
2001 – Consorcio Cigala by Canal Capital of Colombia. Directed by Diego León Hoyos Jaramillo. Assistant Director Mariana Ferrer and Alejandro Jaramillo
2001 – ACE Communications of Kenya for contributions to the UNICEF Say Yes for Children Campaign in 2001
2000 – TV Cultura of Brazil
1999 – TV Cultura of Brazil
1998 – TV Cultura of Brazil
1997 – Namibian Broadcasting Corporation
1996 – TVOntario, Canada
1995 – Sabado Chiquito De Corporan of the Dominican Republic
Categories extinct
Dramaturgy
Best European Artist
Arts documentary
Drama series
Performing Arts
Popular Arts
Children & Young People
Kids: Series
Kids: Preschool
Kids: Digital
Kids: TV Movie / Mini-Series
Kids: Non-Scripted Entertainment
Kids: Factual
Interactivity
Best Interactive Channel
Best Interactive Program
Best Interactive TV service
Digital
Digital Program: Children & Young People
Digital Program: Fiction
Digital Program: Non-Fiction
Notes
References
External links
International Emmy Awards
International Emmy Awards ceremonies |
https://en.wikipedia.org/wiki/Link%20Access%20Procedure%20for%20Frame%20Relay | In wide area network computing, Link Access Procedure for Frame Relay (or LAPF) is part of the network's communications protocol which ensures that frames are error free and executed in the right sequence.
LAPF is formally defined in the International Telecommunication Union standard Q.922. It was derived from IBM's Synchronous Data Link Control protocol, which is the layer 2 protocol for IBM's Systems Network Architecture developed around 1975. ITU used SDLC as a basis to develop LAPF for the Frame Relay environment, along with other equivalents: LAPB for the X.25 protocol stack, LAPM for the V.42 protocol, and LAPD for the ISDN protocol stack.
In Frame Relay Local Management Interface (LMI) messages are carried in a variant of LAPF frames.
LAPF corresponds to the OSI model Data Link layer.
External links
Cisco Frame Relay documentation
Link access protocols
Link protocols
Frame Relay |
https://en.wikipedia.org/wiki/Global%20Powder%20Metallurgy%20Property%20Database | The Global Powder Metallurgy Database (GPMD) is an online searchable database that has been developed as the result of a joint project between leading regional powder metallurgy (PM) trade associations, the EPMA and its sister organisations in Japan (JPMA) and North America (MPIF).
This database was created in response to a worldwide recognition that the absence of a readily accessible source of design data was acting as a significant impediment to the wider application of PM products.
Primarily aimed at designers and engineers in the industries using PM products, it is designed to provide verified physical, mechanical and fatigue data for a range of commercially available PM materials.
This culminated in the initial launch of the database at the PM World Congress in Vienna in October 2004. The content of the database, at this launch, was restricted to data on low alloy ferrous and stainless steel PM structural part grades and bronze and iron-based PM bearing grades.
However, enhancement and extension of content and searching capability has been an ongoing process ever since. In January 2007, the content was expanded with the addition of data on non-ferrous PM structural part grades, followed, in March 2007, by the introduction of a new section covering data on Metal Injection Moulding (MIM) materials.
The latest extension to capability involves making full SN Fatigue Curve "pages" (comprising SN curves and details of individual test points) accessible to searchers. The initial content comprises over 130 SN Curve pages, covering a range of Fe-Cu-C grades and based on published information that has been analysed and collated by the group led by Professor Paul Beiss at the Technical University of Aachen. The collated SN curves cover a range of material processing conditions and density levels and a range of fatigue testing conditions (fatigue loading mode, mean stress level and notch factor).
In assembling the GPMD content, a broad range of mechanical, fatigue and physical property data has been collected from the associations’ memberships and rigorously evaluated by regional accreditation committees. However, the database's primary targets are designers and material specifiers in end-user industries who may have no prior knowledge of PM. Therefore, the bulk of the search structure has been designed to take such a searcher to the point where they can decide that they ought to contact a PM parts manufacturer to discuss a potential application in more detail.
External links
Global Powder Metallurgy Property Database
Metallurgy
Chemical databases
Powders |
https://en.wikipedia.org/wiki/Lansdown%20Centre%20for%20Electronic%20Arts | The Lansdown Centre for Electronic Arts was a research centre at Middlesex University in North London, England. It played a significant role in the early development of computer graphics and continued to innovate in interactive media, sonic arts and moving image. It also provided postgraduate and undergraduate teaching.
History
The Centre for Electronic Arts was renamed the Lansdown Centre for Electronic Arts after the death of the computer graphics pioneer John Lansdown, its head from 1993 until 1997. Its roots lay in the work of John Vince to develop computer graphics at the university (then a polytechnic). From the 1970s, Vince and others developed two suites of computer graphics subroutines in the FORTRAN programming language, initially to create line drawings of 2D and 3D objects and, later, full colour images with smooth Gouraud and Phong shading. This work fed into short courses attended by media personnel.
In 1985, Middlesex had been awarded the status of National Centre for Computer Aided Art and Design, under Paul Brown. The UK's first MSc course in Computer Graphics was developed there. One graduate, Keith Waters, went on to a PhD in 1988, awarded for his development of a muscle-based model for facial animation.
The 2008 book White Heat Cold Logic records the pioneering role of Middlesex Polytechnic in British computer art, as does the CACHe project.
See also
Event One (1969)
References
External links
Archived website of the Lansdown Centre for Electronic Arts website
Educational institutions with year of establishment missing
Art schools in London
Middlesex University
Computer art
Computer graphics organizations |
https://en.wikipedia.org/wiki/The%20Sealed%20Book | The Sealed Book was a radio series of mystery and terror tales, produced and directed by Jock MacGregor for the Mutual network. Between March 18 and September 9, 1945, the melodramatic anthology series was broadcast on Sundays from 10:30 pm to 11:00 pm.
Each week, after "the sound of the great gong," host Philip Clarke observed that the mysteriously silent "keeper of the book has opened the ponderous door to the secret vault wherein is kept the great sealed book, in which is recorded all the secrets and mysteries of mankind through the ages, Here are tales of every kind, tales of murder, of madness, of dark deeds strange and terrible beyond all belief." After this introduction, the dramas began, with three organ solo breaks for inserting the commercials of local stations carrying the program. Although this anthology series did not have recurring characters (other than the Narrator and the Keeper of the Book), the writers often used the same names for different characters from week to week, including "Hester", "Drake", and most especially "Roger".
At the end of an episode, Clarke told listeners to tune in the following week when "the sound of the great gong heralds another strange and exciting tale from... the sealed book." Scripts were by Robert Arthur, Jr. and David Kogan, who also were responsible for The Mysterious Traveler, and recycled many of the more popular stories from that parent program. "The Hands of Death" was the first of the 26 episodes which concluded with "You Only Die Once".
External links
Jerry Haendiges Vintage Radio Logs: The Sealed Book
Radio Lovers The Sealed Book (13 episodes)
American radio dramas
1940s American radio programs
Fantasy radio programs
Horror fiction radio programmes
Mutual Broadcasting System programs |
https://en.wikipedia.org/wiki/Bayanat | Bayanat (also known as Bayanat Al Oula for Network Services) () is a Saudi company established in 2005 by three Saudi leading communication firms: Nour Communications, Baud Telecom Company and Al-Harbi Telecom., Bayanat was licensed by the Communication & Information Technology Commission (CITC) to provide local, national, and international data communications services.
Bayanat also obtained a license to provide services in the Kingdom paving the way for the transfer of broadband data services to Large companies and small and medium enterprises. Bayanat, which paid 120 million Saudi riyals for the license fee valid for 25 years, has pledged to invest 2 billion riyals over the next five years in infrastructure development, including a high-speed fiber-optic cable network for high-quality data transmission to the kingdom and its neighbors.
See also
Communication in Saudi Arabia
Integrated Telecom Company
Saudi Telecom Company
Mobily
References
External links
Bayanat Homepage (Official website of Bayanat)
Data Service Provider License for "Bayanat Al Oula for Network Services" (in Arabic PDF format)
List of licensed Service Providers in Saudi Arabia (from CITC website)
Telecommunications companies of Saudi Arabia
Telecommunications in Saudi Arabia
Telecommunications companies established in 2005
2005 establishments in Saudi Arabia |
https://en.wikipedia.org/wiki/Elliot%20Koffman | Elliot Bruce Koffman (born 7 May 1942 in Boston, Massachusetts) is a noted computer scientist and educationist. He is the author of numerous widely used introductory textbooks for more than 10 different programming languages, including Ada, BASIC, C, C++, FORTRAN, Java, Modula-2, and Pascal. Since 1974, he has been a professor of computer and information sciences at Temple University, Philadelphia, Pennsylvania.
Education and career
Koffman attended the Massachusetts Institute of Technology, where he earned his Bachelor of Engineering and Master of Engineering degrees in 1964. He received his PhD in 1967 at Case Institute of Technology with a dissertation on learning games through pattern recognition.
That same year, Koffman began work at the National Security Agency in Fort Meade, Maryland as an electrical engineer. He was promoted to captain of the U.S. Army and assigned to the Defense Intelligence Agency in Washington, D.C. from 1967 to 1969.
Koffman also began his teaching career in 1967, serving as a professorial lecturer at George Washington University, Washington, D.C. (1967–1969); an Assistant Professor (1969–1972) and Associate Professor (1972–1974) in the Department of Electrical Engineering and Computer Science at the University of Connecticut; and an Associate Professor (1974–1978) and Full Professor (1978–present) in the Department of Computer and Information Sciences at Temple University.
Koffman's early research was in artificial intelligence and intelligent tutoring systems. In 1974 he began writing and co-authoring textbooks for introductory programming courses for computer science majors (CS1) in programming languages such as Ada, BASIC, C, C++, Fortran, Java, Modula-2, and Pascal. He also wrote textbooks for the first data structures course (CS2) in C++, Java, and Pascal.
In 2009 he was awarded the SIGCSE Outstanding Contribution Award "for an extraordinary record of teaching, curriculum development, publishing papers as well as numerous textbooks, and for helping to shape Computer Science education".
Other activities
Koffman chaired the Association for Computing Machinery (ACM) task force to revise CS1 and CS2 courses from 1983 to 1985. He was also chairman of the ACM Special Interest Group in Computer Science Education (SIGCSE) from 1987 to 1991.
Family
Koffman married Caryn Jackson in 1963. She is a photographer whose work has won awards and has been featured in a local gallery. They have three children, Richard, Deborah and Robin. They live in Elkins Park, Pennsylvania.
Bibliography
(with Frank L. Friedman)
(with Frank L. Friedman)
(with Frank L. Friedman)
(with Frank L. Friedman)
(with Bruce R. Maxim)
(with Richard C. Holt and Chrysanne DiMarco)
(with Frank L. Friedman)
"Ada: Problem Solving and Program Design." Feldman, Michael B. & Koffman, Elliot B., . Addison-Wesley Publishing Company; 1992 & 1993. 795 pages.
(with Michael B. Feldman)
(with Frank L. Friedman)
(with Ursula Wolz)
(with Jeri R. H |
https://en.wikipedia.org/wiki/Ragel | Ragel is a finite-state machine compiler and a parser generator. Initially Ragel supported output for C, C++ and Assembly source code, and was expanded to support several other languages including Objective C, D, Go, Ruby, and Java. Additional language support is also in development. It supports the generation of table or control flow driven state machines from regular expressions and/or state charts and can also build lexical analysers via the longest-match method. Ragel specifically targets text parsing and input validation.
Overview
Ragel supports the generation of table or control flow driven state machines from regular expressions and/or state charts and can also build lexical analysers via the longest-match method.
A unique feature of Ragel is that user actions can be associated with arbitrary state machine transitions using operators that are integrated into the regular expressions. Ragel also supports visualization of the generated machine via graphviz.
The above graph represents a state-machine that takes user input as a series of bytes representing ASCII characters and control codes. 48..57 is equivalent to the regular expression [0-9] (i.e. any digit), so only sequences beginning with a digit can be recognised. If 10 (line feed) is encountered, we're done. 46 is the decimal point ('.'), 43 and 45 are positive and negative signs ('+', '-') and 69/101 is uppercase/lowercase 'e' (to indicate a number in scientific format). As such it will recognize the following properly:
2
45
055
78.1
2e5
78.3e12
69.0e-3
3e+3
but not:
.3
46.
-5
3.e2
2e5.1
Syntax
Ragel's input is a regular expression only in the sense that it describes a regular language; it is usually not written in a concise regular expression, but written out into multiple parts like in Extended Backus–Naur form. For example, instead of supporting POSIX character classes in regex syntax, Ragel implements them as built-in production rules. As with usual parser generators, Ragel allows for handling code for productions to be written with the syntax. The code yielding the above example from the official website is:
action dgt { printf("DGT: %c\n", fc); }
action dec { printf("DEC: .\n"); }
action exp { printf("EXP: %c\n", fc); }
action exp_sign { printf("SGN: %c\n", fc); }
action number { /*NUMBER*/ }
# A floating-point number literal.
number = (
[0-9]+ $dgt ( '.' @dec [0-9]+ $dgt )?
( [eE] ( [+\-] $exp_sign )? [0-9]+ $exp )?
) %number;
main := ( number '\n' )*;
See also
Comparison of parser generators
Executable UML
Finite-state machine
Regular expression
Thompson's construction - the algorithm used by Ragel
Umple
Helsinki Finite-State Technology (HFST)
References
External links
Free compilers and interpreters
Parser generators
Programming language implementation
Pattern matching |
https://en.wikipedia.org/wiki/Tanglewood%20%281987%20video%20game%29 | Tanglewood is a puzzle/adventure computer game published by Microdeal for the Dragon 32 and TRS-80 Color Computer in early 1987. It was released for the Atari ST and Amiga in 1988.
Gameplay
The 8-bit and 16-bit versions of the game have a different setting and characters but the same basic premise. In the 8-bit versions, Tanglewood is a peaceful glade under threat from a property developer and wizard named Sharck. The player controls five different animal characters who have ten days to defeat Sharck before the bulldozers move in.
In the 16-bit version, the premise is that Tanglewood contains valuable minerals that have only been discovered after the protagonist's uncle Arthur acquired mining rights from an unscrupulous company. The company now want to mine Tanglewood themselves and are suing Arthur for the rights back. The player has 10 days until the court case and must find the documents to win the case. Instead of controlling animals, the player controls five remote controlled vehicles.
Development
The game had originally been planned to be based on the children's TV series Willo the Wisp but this was dropped. It was designed and programmed by Ian Murray-Watson with graphics by Pete Lyon. Pete Lyon also produced the graphics for other MicroDeal games including Goldrunner (1987) and Airball (1987).
Tanglewoodwas first released by Microdeal in 1987 in a joint release for the Dragon 32 and TRS-80 Color Computer. It was released on the 16-bit Amiga and Atari ST in 1988. It was also published by Microdeal in the US.
Reception
Reviews were favourable with Dragon User giving a full score of 5/5 with the reviewer stating Tanglewood is "very hard" but "an excellent game". A review of the Atari ST version in ST-Log also emphasised the difficulty of the game but gave particular praise to the graphics and sound effects. "The animation is faultless... but it's the detail that'll knock your socks askew. If the colorful graphics don't get you, the multiple sound effects will. They're superb, from the underwater gurgles to the mobile motors."
References
1987 video games
Amiga games
Atari ST games
Dragon 32 games
Microdeal games
Single-player video games
TRS-80 Color Computer games
Video games developed in the United Kingdom |
https://en.wikipedia.org/wiki/List%20of%20best-selling%20game%20consoles | A home video game console is a standardized computing device tailored for video gaming that requires a computer monitor or television set as an output. Video game consoles usually weigh between on average, and their compact size allows them to be easily used in a variety of locations, making them portable. Handheld controllers are commonly used as input devices. Video game consoles may use one or more data storage devices, such as hard disk drives, optical discs, and memory cards for downloaded content. Dedicated consoles are a subset of game consoles that are only able to play built-in games. Video game consoles in general are also described as "dedicated" in distinction from the more versatile personal computer and other consumer electronics. Sanders Associates engineer Ralph H. Baer along with company employees Bill Harrison and Bill Rusch licensed their television gaming technology to contemporary major TV manufacturer Magnavox. This resulted in Magnavox Odyssey's 1972 release—the first commercially available video game console.
A handheld game console is a lightweight device with a built-in screen, controls, speakers, and has greater portability than a standard video game console. It is capable of playing multiple games unlike tabletop and handheld electronic game devices. Tabletop and handheld electronic game devices of the 1970s and early 1980s are the precursors of handheld game consoles. Mattel introduced the first handheld electronic game with the 1977 release of Auto Race. Later, several companies—including Coleco and Milton Bradley—made their own single-game, lightweight tabletop or handheld electronic game devices. The oldest handheld game console with interchangeable cartridges is the Milton Bradley Microvision from 1979. Nintendo is credited with popularizing the handheld console concept with the Game Boy's release in 1989 and continued to dominate the handheld console market into the early 2000s.
Best-selling game consoles
The following table contains video game consoles that have sold at least units worldwide either through to consumers or inside retail channels. Each console include sales from every iteration unless otherwise noted. The years correspond to when the home or handheld game console was first released (excluding test markets).
Notes
References
WonderSwan Famitsu sources
Release year sources
Atari consoles
: "The test release of the Atari 7800 went by practically unnoticed [...] And so the Atari 7800 collected dust for two years, until the international success of the Nintendo Entertainment System quickly changed the minds of Atari's new management. [...] Atari shipped the now slightly outdated 7800 across the world. [...] Only a few thousand 7800 consoles were shipped in the US during the first marketing attempt."
: Atari VCS 2600, Atari 5200, Atari Lynx.
Microsoft consoles
Nintendo consoles
: "Nintendo teamed with Mitsubishi to build the video-game system and, |
https://en.wikipedia.org/wiki/Earl%20B.%20Hunt | Earl B. Hunt (January 8, 1933 – April 12 or 13, 2016) was an American psychologist specializing in the study of human and artificial intelligence. Within these fields he focused on individual differences in intelligence and the implications of these differences within a high-technology society. He was in partial retirement as emeritus professor of psychology and adjunct professor of computer science at the University of Washington at the time of his death. His book Will We Be Smart Enough? discussed demographic projections and psychometric research as they relate to predictions of possible future workplaces.
He was president of the International Society for Intelligence Research in 2011.
Publications
Books
Magazine articles
References
External links
Exploring Intelligence: Cognition in people, machines, and the future
1933 births
2016 deaths
American computer scientists
20th-century American psychologists
Artificial intelligence researchers
American cognitive scientists
Fellows of the American Psychological Association
Fellows of the American Association for the Advancement of Science
Fellows of the Association for Psychological Science
Intelligence researchers
University of Washington faculty
Yale University alumni |
https://en.wikipedia.org/wiki/LOGO.SYS | LOGO.SYS is a core system file used by the Windows 9x family of operating systems to display its boot-up message.
Overview
LOGO.SYS is a system file that is used as part of the startup process found in the Windows 9x family of operating systems such as Windows 95, Windows 98, and Windows Me to display their boot screens. It is not present in the Windows NT family of operating systems such as Windows NT 4.0, Windows 2000, and Windows XP, as they used various different methods to display their boot screens.
Variants
There are three variants of the file:
LOGO.SYS is the "Starting Windows" message, with the Windows logo. The file is located in the root directory of the boot drive. This is usually , but with drive compression, like DriveSpace, this is the host drive (often ). The default LOGO.SYS file is also stored in IO.SYS and used by MS-DOS during startup if LOGO.SYS could not be found. The display of the logo can be disabled by adding a LOGO=0 setting to the Options section in the MS-DOS 7 configuration file MSDOS.SYS.
LOGOW.SYS is the "Please wait while your computer shuts down" (later "Windows is shutting down" in Windows 98) message. The file is located in the Windows directory, which by default is . The Windows logo is only shown in Windows 95 and 98 (in Windows 95, only the Microsoft Windows 95 wordmark is displayed). Windows Me simply cuts to black after shutting down or cuts to the LOGOS.SYS screen, as it lacks a LOGOW.SYS screen of its own (even if the LOGOW.SYS file is provided in the OS, the shut down screen will still not be displayed). No error will be shown if the file cannot be found.
LOGOS.SYS is the "It's now safe to turn off your computer" message. The file is located in the Windows directory. This message is displayed when Windows has successfully shut down to MS-DOS but is not configured to return to the prompt (COMMAND.COM) again. On systems with proper ACPI support and ATX power supply, the PC may power down instead. If the file cannot be found, the same message is displayed in text mode. No error will be shown if the file cannot be found.
File format
LOGO.SYS is in fact an 8-bit RLE-encoded Windows bitmap file with a resolution of exactly 320×400 pixels at 256 colors. This is displayed in the otherwise little-used 320x400 VGA graphics mode, a compromise to allow the display of a 256-color image with high vertical (but not horizontal) resolution on all compatible systems, even those with plain VGA cards (which could only show 16 colors with high horizontal resolution) and without needing any additional graphics drivers. The mode appears, to any attached monitor, to be identical to the more common 640x400 graphics or 720x400 text modes, and is therefore stretched to a standard 4:3 aspect ratio (meaning the pixels appear to be 1.67x (2/1.2) wider than they are tall, instead of square - as they would be on a full 640x480 VGA display) on a typical 4:3 monitor of the time, and on monitors of other shapes (5:4, 16:9, etc.) w |
https://en.wikipedia.org/wiki/SAP%20IQ | SAP IQ (formerly known as SAP Sybase IQ or Sybase IQ; IQ for Intelligent Query) is a column-based, petabyte scale, relational database software system used for business intelligence, data warehousing, and data marts. Produced by Sybase Inc., now an SAP company, its primary function is to analyze large amounts of data in a low-cost, highly available environment. SAP IQ is often credited with pioneering the commercialization of column-store technology.
At the foundation of SAP IQ lies a column store technology that allows for speed compression and ad-hoc analysis. SAP IQ has an open interface approach towards its ecosystem. SAP IQ is also integrated with SAP's Business Intelligence portfolio of products to form an end-to-end business analytics software stack, and is an integral component of SAP's In-Memory Data Fabric Architecture and Data Management Platform.
History
In the early 1990s, Waltham, Massachusetts-based Expressway Technologies, Inc. developed the Expressway 103, a column-based, engine optimized for analytics, that would eventually become Sybase IQ. Sybase acquired Expressway and re-introduced the product in 1995 as IQ Accelerator, then renamed it shortly thereafter to Sybase IQ, giving it version number 11.0.
By offering the IQ product as part of a collection of related technologies often found in a data warehouse (including Sybase Adaptive Server Enterprise, Replication Server, PowerDesigner PowerDesigner, and SQL Anywhere), Sybase became one of the first mainstream companies to acknowledge the need for specialized products for the data warehouse market.
With version 12.0, Sybase replaced the loosely coupled query interface from Adaptive Server Enterprise with a tight coupling with SQL Anywhere.
Version 16 brings a re-engineered column store for extreme, petabyte scale, data volumes, and more extreme data compression.
In 2014, SAP HANA, together with partners BMMsoft, HP, Intel, NetApp, and Red Hat announced the world's largest data warehouse.
A team of engineers from SAP, BMMsoft, HP, Intel, NetApp, and Red Hat, built the data warehouse using SAP HANA and SAP IQ 16, with BMMsoft Federated EDMT running on HP DL580 servers using Intel Xeon E7-4870 processors under Red Hat Enterprise Linux 6 and NetApp FAS6290 and E5460 storage. The development and testing of the 12.1PB data warehouse was conducted by the SAP/Intel Petascale lab in Santa Clara, Calif., and audited by InfoSizing, an independent Transaction Processing Council certified auditor.
Version history
With the release of SP08, the version numbers have been changed to align with and match SAP HANA's version numbers to reflect the product's continuous integration with SAP HANA. The actual release title SP03 is a follow-on to SP02, covering all platforms not affected by the release.
In-memory data fabric
SAP's new approach streamlines and simplifies Data Warehousing into an In-Memory Data Fabric.
SAP IQ with SAP HANA
With the advent of big data, SAP IQ has coupled with S |
https://en.wikipedia.org/wiki/Stock%20market%20simulator | A stock market simulator is computer software that reproduces behavior and features of a stock market, so that a user may practice trading stocks without financial risk. Paper trading, sometimes also called "virtual stock trading", is a simulated trading process in which would-be investors can practice investing without committing money.
This is accomplished by the manipulation of simulated money and investment positions that behave in a manner similar to the real markets. Investors also use paper trading to test new and different investment strategies. Stock market games are often used for educational purposes.
For example, investors can create several different positions simultaneously to compare the performance and payoff characteristics between multiple strategies. A textbook may state that writing a covered call is synthetically the same as writing a naked put, but in practice there are subtle differences. With a paper trading account, an investor can set up a bull credit spread and a bull debit spread simultaneously and watch how the payoff for each position changes as the market moves.
Other advanced strategies include leverage, short-selling, forex and derivatives trading. Successful execution and profit generation from these strategies usually require high levels of technical knowledge. Investors can test these strategies with paper trading to avoid taking on excessive risk due to inexperience.
Various companies and online trading simulation tools offer paper trading services, some free, others with charges, that allow investors to try out various strategies (some stock brokerage firms allow 14-day 'demo accounts'), or paper trading can be carried out simply by noting down fees and recording the value of investments over time.
The imaginary money of paper trading is sometimes also called "paper money," "virtual money," and "Monopoly money."
Types
Stock market simulators can be broken down into two major categories - financial market simulators, and fantasy simulators.
Financial simulators
Financial market simulators allow users to generate a portfolio based on real stock entries and help them train with virtual currency. Most of the currently active financial simulators use a delayed data feed of between 15 and 20 minutes to ensure that users cannot use their data to trade actively on a competing system. Some simulators can produce random data to mimic price activity. The purpose behind such a system is to let a person practice with fantasy funds in a real-world context so they can determine whether or not they would gain money investing by themselves.
Fantasy simulators
Fantasy simulators trade shares or derivatives of real world items or objects that normally would not be listed on a commodities list or market exchange, such as movies, books or television shows. Some simulators focus on sports and have been linked to active betting and wager based systems.
Technology and implementation
Most of the online stock simulators r |
https://en.wikipedia.org/wiki/KRBK | KRBK (channel 49) is a television station licensed to Osage Beach, Missouri, United States, serving the Springfield area as an affiliate of the Fox network. It is owned by Nexstar Media Group alongside MyNetworkTV affiliate KOZL-TV (channel 27); Nexstar also provides certain services to CBS affiliate KOLR (channel 10) under a local marketing agreement (LMA) with Mission Broadcasting. The stations share studios on East Division Street in Springfield, while KRBK's transmitter is located on Switchgrass Road, north of Fordland.
History
Early history
The station first signed on the air on August 1, 2009; prior to signing on KRBK, Koplar Communications served as the founding owner of KPLR-TV in St. Louis—which it sold to ACME Communications in 1997 (it is now a sister station to KRBK)—and formerly owned KMAX-TV in Sacramento—which once bore the KRBK-TV call letters and which Koplar sold to Pappas Telecasting in 1994 (it is now owned by CBS News and Stations). It immediately became the MyNetworkTV affiliate for the Ozarks. At the time KRBK signed on, MyNetworkTV programming had not been available in the market for several months, after Harrison, Arkansas–based KWBM (channel 31) switched to Daystar upon being sold to the network as part of Equity Media Holdings's auction of its television stations. The station originally branded as "KRBK-HD".
KRBK's transmitter was originally plotted to be located halfway between Springfield and Jefferson City in northern Laclede County, giving it rimshot (Grade B) signals within Springfield and Jefferson City. This is possible because Osage Beach spills into both Camden and Miller counties, and is thus split between the two markets. Most of the city is in Camden County, part of the Springfield market. However, a small sliver in the north is in Miller County, part of the Columbia–Jefferson City market. The transmitter was later moved to Eldridge, in northeastern Laclede County, firmly in the Springfield market.
As a Fox affiliate
On June 20, 2011, Fox announced that it would end its affiliation with the network's Springfield charter affiliate, KSFX-TV (channel 27) following a dispute between the network and that station's owner Nexstar Broadcasting Group over Fox's proposal to increase the amount of retransmission consent fees that its stations must divide with the network; on that same day, Koplar signed an affiliation agreement with Fox to make KRBK the market's new affiliate.
The switch became official on September 1, 2011, with KSFX-TV changing its call letters to KOZL-TV and became an independent station. With the addition of Fox programming on the station, KRBK relegated MyNetworkTV to a secondary affiliation, delaying its programming by two hours to 9:00 to 11:00 p.m.; as a result, KRBK was one of the few Fox-MyNetworkTV hybrid affiliates that carry both networks on the station's main channel (most Fox affiliates that also carry MyNetworkTV programming usually air the latter service on an additional digital |
https://en.wikipedia.org/wiki/WIPS | WIPS may refer to:
WIPS (AM), a radio station (1250 AM) formerly licensed to Ticonderoga, New York, United States
Wireless intrusion prevention system, a network device that monitors the radio spectrum for the presence of unauthorized access points
Walk-in Payment Services, a payment system for people without other access to online services. |
https://en.wikipedia.org/wiki/Democracy%20Alliance | The Democracy Alliance is a network of progressive donors who coordinate their political donations to groups that the Alliance has endorsed. It has been described by Politico as "the country's most powerful liberal donor club".
Members of the Democracy Alliance are required to contribute at least $200,000 a year to groups the Democracy Alliance vets and recommends. From its founding in 2005 through 2014, the Alliance helped distribute approximately $500 million to liberal organizations. In 2017 and 2018 alone, Democracy Alliance members increase that sum to $600 million. Prominent members of the group include billionaires George Soros and Tom Steyer.
The Democracy Alliance planned to spend $374 million during the 2014 midterm election cycle to boost liberal candidates and causes. According to the Democracy Alliance's website, the group "was created to build progressive infrastructure that could help counter the well-funded and sophisticated conservative apparatus in the areas of civic engagement, leadership, media, and ideas."
History
A PowerPoint presentation, "The Conservative Message Machine Money Matrix", created by Rob Stein and shown to individuals and small groups of donors in 2003 and 2004, is often credited as being the impetus for the group's formation.
The first meeting of the Democracy Alliance was held at The Boulders near Scottsdale, Arizona, in April 2005. Rob Stein was appointed interim CEO, pending the group's selection of a permanent leader. George Soros, Peter B. Lewis and Tim Gill were all involved in the organization's founding.
At the Democracy Alliance's second meeting, held at the Chateau Elan near Atlanta, Georgia, in October 2005, management consultant Judy Wade was installed as the CEO of the organization. At the group's fourth meeting in Miami in November 2006, Wade was replaced with Kelly Craighead.
In July 2006, Rob McKay was elected chairman of the board and Anna Burger of the Service Employees International Union (SEIU) was elected vice chair.
In 2012, the Democracy Alliance ceased funding a number of prominent progressive organizations. According to the Huffington Post, "The groups dropped by the Democracy Alliance tend to be those that work outside the [Democratic] party's structure." This move cost the Democracy Alliance the support of Soros ally Peter B. Lewis, the billionaire founder of Progressive Auto Insurance.
According to the Huffington Post, the Democracy Alliance "is largely divided into two camps: one that prefers to focus on electing Democrats to office, and another that argues for more attention to movement and progressive infrastructure building in order to create a power center independent of the Democratic Party apparatus."
In 2015, the Democracy Alliance announced a new strategy called "2020 Vision".
The strategy is centered on electing more Democrats to state level offices to build its political influence by 2020. The Democracy Alliance planned to raise more than $150 million over fi |
https://en.wikipedia.org/wiki/David%20Hayward | Dr. David Hayward is a fictional character from the ABC and The Online Network serial drama All My Children. The role has been portrayed by Vincent Irizarry, off and on, from November 27, 1997, to September 2, 2013.
The character has been a top television villain for years. His criminal actions have been alluded to by authors, as well as recognized by their own fictional characters. David evolves, but always remains a force antagonizing heroes and heroines of the series.
Casting
Guiding Light alum Irizarry joined the cast of All My Children from November 27, 1997, to March 2, 1998, for what was initially meant to be a short term role. Irizarry returned to the series as a contract player on July 8, 1998. Following nine years in the role, Irizarry exited the series on November 28, 2006, with executive producer Julie Hanan Carruthers citing financial and storyline reasons. Following a two-year absence, Irizarry returned to the series on October 23, 2008, and remained with the series until it aired its final episode on September 23, 2011. On December 28, 2012, it was announced that Irizarry reprised the role on the online reboot, which began on April 29, 2013. Irizarry also portrayed the role on One Life to Live for three episodes in February 2005.
Storylines
1997–2006
Dr. David Hayward first arrives in Pine Valley in late 1997 to reclaim his ex-lover, Dr. Allie Doyle. Allie is dating Dr. Jake Martin at the time. When Allie rejects him, David tries to get Jake out of the way. He frames Jake at the hospital by giving stroke patient Adam Chandler the wrong medication. David arrives "just in time" to play hero, which provides him with enough ammunition to get Jake suspended. David ends up leaving Pine Valley for a short time, but returns less than a year later in an attempt to woo Liza Colby, with whom he has grown infatuated.
David remains a common enemy of the Martin family throughout the next several years, constantly at war with Jake and his father, Joe. But it is his obsession with Dixie Cooney, Jake's sister-in-law, which is the fuel for his greatest rival; Tad Martin.
At the time, Dixie is just one of the many women in Pine Valley with whom David has a romantic relationship. Another significant relationship he has is with Erica Kane, and although it does not end in marriage, David grows very close to Erica's daughter, Bianca Montgomery. When Bianca suffers heart problems as the result of her eating disorder (anorexia nervosa) it is David who treats her and ultimately helps her survive. When Bianca is grieving for the death of Frankie Stone, David plans a memorial for his cousin and offers to involve Bianca. To help Bianca through her pain, he reveals that his father committed suicide when he was a child.
Shortly after his relationship with Erica ends, David pours Libidozone, a drug he created and uses to arouse sexual desires, into a punch bowl at a party aboard a yacht. The drug has the known side effect of causing people to act out on th |
https://en.wikipedia.org/wiki/KTGR | KTGR (1580 AM) is a radio station broadcasting a sports format, with programming from the ESPN Radio network. Licensed to Columbia, Missouri, United States, the station serves the Columbia, Missouri, area. The station is currently owned by Zimmer Radio Group of Mid-Missouri.
History
The station was assigned the call letters KBIA by the FCC on October 7, 1954, and began broadcasting in April 1955. Owner Cecil W. Roberts was a former newspaper publisher from Farmington, Mo., who eventually built a chain of a dozen radio stations in six states, all jointly owned by Roberts and his wife, Jane A. Roberts. KBIA became the third radio station in Columbia, joining KFRU (1925) and KOWS 1240 (1937).
As an affiliate of the Missouri Sports Network, KBIA carried University of Missouri football games in 1960.
The station was sold in April 1961 to Barrington Broadcasting Co. for $90,000 (principals were Aubrey D. Reid and his wife, who owned WEW-AM in St. Louis, Mo., and WKYB-AM and WKYB-FM in Paducah, Ky.) In June 1961, the call letters were changed to KCGM.
In November 1966, a subsequent owner, Tiger Broadcasting Co., changed the call letters to KTGR.
Translators
In addition to the main station, KTGR is relayed by an additional translator to widen its broadcast area.
References
External links
Radio Broadcasting History: KTGR
TGR |
https://en.wikipedia.org/wiki/Cobalt%20Qube | The Cobalt Qube was a computer server appliance product line, meant to be web servers, developed by Cobalt Networks, Inc. (later purchased by Sun Microsystems) from 1998 to 2002 featuring a modified Red Hat Linux operating system and a proprietary GUI for server management. The original Qube systems were equipped with RM5230 or RM5231 microprocessors but later models used AMD K6-2 chips. NetBSD operating system has been ported to both the Cobalt Qube and RaQ.
Models
The Qube 2700 was the first product released by Cobalt Networks in 1998. Mark Orr, one of the Cobalt Networks' CEOs, came up with the cobalt color. The green LED in the front was Bill Scott's idea. The 2700 was not a development version number but came from the atomic number of cobalt, 27. The Qube 2700 used the RM5230 microprocessor.
The next product was called the Qube 2800 before being sold. But, released in 2000, was eventually called the Qube 2, leaving the 2800 to designate the system type. The Qube 2 used the RM5231 microprocessor.
Under an OEM arrangement, the Qube 2 units were also produced by Gateway in the form of the Gateway Micro Server. The casing featured on these units was black instead of cobalt blue.
The Qube 3, released in 2002, used an AMD K6-2 CPU at either 300 MHz or 450 MHz and was the last product in the Qube line.
A fourth Qube model was in development but was never released. However, several models were released in the data center-friendly Cobalt RaQ product line after the Cobalt Qube was discontinued.
See also
Strongbolt
References
External links
CobaltFAQs wiki
Brian Smith's NuOnce closed down in Jan 2009 and his PKGs for the CobaltRAQ/Clones/BlueQuartz servers are archived.
Sun servers
Server appliance |
https://en.wikipedia.org/wiki/Qube | Qube or Qubes may refer to:
Technology
QUBE, a former cable television system
Qube Software, London-based makers of 3D software Q (game engine)
Qubes OS, a security-focused desktop operating system
Qube Cinema, a company that makes digital cinema servers
Cobalt Qube, a server appliance produced by Cobalt
QUBE, a virtual learning software program by OpenQwaq
Video games
Intelligent Qube, a 1997 puzzle video game
Q.U.B.E., a 2011 puzzle video game
Q*bert's Qubes, an arcade video game published in 1982
Buildings
The Qube (Detroit), Quicken Loans office building in Detroit
The Qube (Vancouver), a distinctive "hanging" building in Vancouver, BC, Canada
Other
Qube Holdings, an Australian transport company
QubeTV, a conservative video website
The Qube, a component of the game show Qubit
See also
Cube (disambiguation)
Kube (disambiguation)
PocketQube
Q-Be digital audio player |
https://en.wikipedia.org/wiki/Windows.h | windows.h is a Windows-specific header file for the C and C++ programming languages which contains declarations for all of the functions in the Windows API, all the common macros used by Windows programmers, and all the data types used by the various functions and subsystems. It defines a very large number of Windows specific functions that can be used in C. The Win32 API can be added to a C programming project by including the <windows.h> header file and linking to the appropriate libraries. To use functions in xxxx.dll, the program must be linked to xxxx.lib (or libxxxx.dll.a in MinGW). Some headers are not associated with a .dll but with a static library (e.g. scrnsave.h needs scrnsave.lib).
Child header files
There are a number of child header files that are automatically included with windows.h. Many of these files cannot simply be included by themselves (they are not self-contained), because of dependencies.
windows.h may include any of the following header files:
stdarg.h – variable-argument functions (standard C header)
windef.h – various macros and types
winnt.h – various macros and types (for Windows NT)
basetsd.h – various types
guiddef.h – the GUID type
ctype.h – character classification (standard C header)
string.h – strings and buffers (standard C header)
winbase.h – kernel32.dll: kernel services; advapi32.dll:kernel services(e.g. CreateProcessAsUser function), access control(e.g. AdjustTokenGroups function).
winerror.h – Windows error codes
wingdi.h – GDI (Graphics Device Interface)
winuser.h – user32.dll: user services, inline resource macro(e.g. MAKEINTRESOURCE macro ), inline dialog macro(e.g. DialogBox function ).
winnls.h – NLS (Native Language Support)
wincon.h – console services
winver.h – version information
winreg.h – Windows registry
winnetwk.h – WNet (Windows Networking)
winsvc.h – Windows services and the SCM (Service Control Manager)
imm.h – IME (Input Method Editor)
Extra includes
cderr.h – CommDlgExtendedError function error codes
commdlg.h – Common Dialog Boxes
dde.h – DDE (Dynamic Data Exchange)
ddeml.h – DDE Management Library
dlgs.h – various constants for Common Dialog Boxes
lzexpand.h – LZ (Lempel-Ziv) compression/decompression
mmsystem.h – Windows Multimedia
nb30.h – NetBIOS
rpc.h – RPC (Remote procedure call)
shellapi.h – Windows Shell API
wincrypt.h – Cryptographic API
winperf.h – Performance monitoring
winresrc.h – used in resources
winsock.h – Winsock (Windows Sockets), version 1.1
winspool.h – Print Spooler
winbgim.h – Standard graphics library
OLE and COM
ole2.h – OLE (Object Linking and Embedding)
objbase.h – COM (Component Object Model)
oleauto.h – OLE Automation
olectlid.h – various GUID definitions
Macros
Several macros affect the behavior of windows.h.
UNICODE – when defined, this causes TCHAR to be a synonym of WCHAR instead of CHAR, and all type-generic API functions and messages that work with text will be defined to t |
https://en.wikipedia.org/wiki/Erdin%C3%A7%20Sa%C3%A7an | Erdinç Saçan (born 12 May 1979) is a Dutch internet entrepreneur, website administrator, columnist and politician for the PvdA.
Saçan was born in 's-Hertogenbosch. After studying management and data processing at the Fontys college, he established his eponymous company Saçan Consultancy. At the same time, he founded several websites dealing with politics and the position of Turks in the Netherlands. He was elected member of the States-Provincial of North Brabant. In 2006, he was nominated as a candidate for the Dutch House of Representatives but withdrew as a result of his denial of the Armenian genocide.
Armenian genocide controversy
According to the newspaper Trouw, Saçan clearly stated in a chat box of one of his websites that he was a denier of the Armenian genocide of 1915.
PvdA-management asked him to explain this when his comments became public following similar controversial statements of CDA. His first stance was to follow the PvdA-position (that the event was a genocide). Two days later however, on 26 September 2006, Saçan declared he still denied the genocide and withdrew his candidacy of the PvdA. Nebahat Albayrak, number 2 on the PvdA-election list, indicated on behalf of the PvdA that the party should no longer "turn around" the actions surrounding the event and called for a reevaluation of the facts (jointly by Armenia and Turkey) because "all sources had become unclear". Saçan's seat at the States-Provincial was not under discussion; and he declared to be against any form of violence (also genocide).
References
1979 births
Living people
Deniers of the Armenian genocide
Dutch businesspeople
Dutch columnists
Dutch people of Turkish descent
Labour Party (Netherlands) politicians
People from 's-Hertogenbosch
Members of the Provincial Council of North Brabant
Controversies in the Netherlands |
https://en.wikipedia.org/wiki/Teramac | The Teramac was an experimental massively parallel computer designed by HP in the 1990s. The name reflected the project's vision to provide a programmable gate array system with capacity for a million gates running at a megahertz. Contrary to traditional systems, which are useless if there is one defect, Teramac used defective processors -- intentionally -- to demonstrate its defect-tolerant architecture. Even though the computer had 220,000 hardware defects, it was able to perform some tasks 100 times faster than a single-processor high-end workstation.
Teramac was originally developed by scientists in HP's central research lab, HP Labs, in the mid 1990s. Although it contained conventional silicon integrated circuit technology, it paved the way for some of HP's work in nanoelectronics because it provided an architecture on which a chemically assembled computer could operate.
The experience from this program was used to design the Field Programmable Nanowire Interconnect circuit.
Further reading
Computational science
Massively parallel computers |
https://en.wikipedia.org/wiki/Gambit%20%28Scheme%20implementation%29 | Gambit, also called Gambit-C, is a programming language, a variant of the language family Lisp, and its variants named Scheme. The Gambit implementation consists of a Scheme interpreter, and a compiler which compiles Scheme into the language C, which makes it cross-platform software. It conforms to the standards R4RS, R5RS, and Institute of Electrical and Electronics Engineers (IEEE), and to several Scheme Requests for Implementations (SRFIs). Gambit was released first in 1988, and Gambit-C (Gambit with a C backend) was released first in 1994. They are free and open-source software released under a GNU Lesser General Public License (LGPL) 2.1, and Apache License 2.0.
By compiling to an intermediate representation, in this case portable C (as do Chicken, Bigloo and Cyclone), programs written in Gambit can be compiled for common popular operating systems such as Linux, macOS, other Unix-like systems, and Windows.
Gerbil Scheme
Gerbil scheme is a variant of Scheme implemented on Gambit-C. It supports current R*RS standards and common SRFIs and has a state of the art macro and module system inspired by Racket.
Termite Scheme
Termite Scheme is a variant of Scheme implemented on Gambit-C. Termite is intended for distributed computing, it offers a simple and powerful message passing model of concurrency, inspired by that of Erlang.
C++ and Objective-C integration
While the Gambit compiler produces C code only, it has full integration support for C++ and Objective-C compilers such as GNU Compiler Collection (GCC). Thus, software written in Gambit-C can contain C++ or Objective-C code, and can fully integrate with corresponding libraries.
See also
Chicken (Scheme implementation)
Stalin (Scheme implementation)
References
External links
Termite home page on Google Code
Gerbil Scheme homepage
Scheme (programming language) compilers
Scheme (programming language) interpreters
Scheme (programming language) implementations
Free compilers and interpreters |
https://en.wikipedia.org/wiki/Hitachi-LG%20Data%20Storage | Hitachi-LG Data Storage (HLDS, HL-DT-ST or H-L Data Storage), a joint venture between Hitachi, Ltd. and LG Electronics, is a manufacturer of DVD and Blu-ray optical disc drives for desktop computers and laptops. Founded in late 2000, the company began operation in January 2001. In 2006, HLDS began developing Blu-ray Disc drives. The company claims that it has led the disk drive industry in market share since its founding, with a 20% share for fiscal year 2001, 29% for fiscal year 2012, and 60% for fiscal year 2016. Building upon its core optical technology and extensive experience in production management, the company is currently expanding its product lineup to include interactive digital signage, TOF (Time of Flight) 3D sensors, unmanned store solutions, and in-vehicle air purifiers.
References
External links
List of HL-DT-ST optical drive models – CDR Info
Manufacturing companies based in Seoul
Japanese companies established in 2000
South Korean companies established in 2000
Computer companies established in 2000
Computer storage companies
Electronics companies of Japan
Electronics companies of South Korea
Hitachi subsidiaries
LG Corporation
Multinational joint-venture companies
Optical computer storage |
https://en.wikipedia.org/wiki/Gun%20violence%20in%20the%20United%20States%20by%20state | This list of U.S. states includes data for population, murders and non-negligent manslaughter, murders, gun murders, and gun ownership percentage, and calculates rates per 100,000. The population data is from the U.S. Census Bureau. Murder rates were calculated based on the FBI Uniform Crime Reports and the estimated census population of each state.
The 2015 U.S. population total was 320.9 million. The 2015 U.S. overall murder and non-negligent manslaughter rate per 100,000 inhabitants was 4.9.
The 2019 U.S. population total was 328.2 million. The 2019 U.S. overall murder and non-negligent manslaughter rate per 100,000 inhabitants was 5.0.
2015 data
2019 data
See also
Crime in the United States
Gun laws in the United States by state
Gun violence in the United States
United States Peace Index
List of U.S. states and territories by violent crime rate
List of U.S. states and territories by intentional homicide rate
Firearm death rates in the United States by state
Sources
Gun violence |
https://en.wikipedia.org/wiki/SUM%20%28interbank%20network%29 | SUM is an interbank network in forty-two U.S. states (all except Alaska, Alabama, Delaware, Montana, Nebraska, North Dakota, South Dakota, Wyoming), the District of Columbia and Puerto Rico. It is largely made up of smaller local banks and credit unions. Account holders at member institutions do not pay ATM usage fees for using ATMs of any other financial institution within the network.
SUM is a product of NYCE Payments Network, LLC, an FIS company.
See also
ATM usage fees
References
External links
SUM Network website
Banking in the United States
Financial services companies of the United States
Interbank networks |
https://en.wikipedia.org/wiki/Steve%20Bornstein | Steve Bornstein (born April 20, 1952) is the chairman of the Media Networks division of the gaming company Activision Blizzard. He previously held high-ranking roles at NFL Network, ESPN, and ABC. While at ESPN, he organized showing SportsCenter reruns during the morning hours.
Early life and education
Bornstein was born and raised in a Jewish family in Fair Lawn, New Jersey to Julian Leon and Marge Frankel Bornstein. Bornstein is the youngest of four siblings, the others being Fred, Andy, and Faye. He attended the University of Wisconsin–Madison and graduated in 1974 with a Bachelor of Science in communications.
Career
Bornstein began his career as a producer, and later executive producer, at WOSU-TV in Columbus, Ohio. He also worked with Warner-Amex Cable, producing Ohio State Buckeyes football programming for the company's interactive QUBE system.
ESPN
In January 1980, he joined ESPN as the manager of program coordination when the cable sports network was a four-month-old start-up. During his time as manager of programming coordination, he developed and implemented ESPN's successful programming philosophy of presenting a mix of events, sports news and special interest programming. In 1988, Bornstein was promoted to Executive Vice President of Programming and Production. He advanced through the network's programming and production ranks, becoming ESPN's youngest president and CEO in 1990 at age 38.
In January 1992, ESPN Radio was launched and began a rollout of 24-hour programming in October 1998. Also in 1992, Bornstein established the subsidiary ESPN Enterprises to develop new businesses like ESPN.com, which has grown to become the leading sports news and information site on the internet.
Bornstein helped to oversee the debut of ESPN2 in October 1993 and ESPNews in November 1996. In October 1997, Bornstein directed the acquisition of Classic Sports Network and rebranded the channel as ESPN Classic, adding yet another network to the ESPN family. Additionally, Bornstein oversaw the development of ESPN International, which has grown to include ownership - in whole or in part - of 24 television networks internationally, as well as a variety of additional businesses that allow ESPN to reach sports fans in over 61 countries and territories across all seven continents.
In March 1998, ESPN the Magazine was launched as a joint venture of Disney Publishing and ESPN with distribution being handled by Hearst Magazines.
Throughout his time at ESPN, the network created the SportsCenter franchise, NFL Countdown, NFL PrimeTime, Baseball Tonight and the Outside the Lines series. In addition to his contributions to ESPN programming, Bornstein developed the X Games and Winter X Games, week-long extreme sports competitions. Bornstein is also credited with the creation of the ESPYs Awards, short for Excellence in Sports Performance Yearly Award. First awarded in 1993.
During his tenure at ESPN, Bornstein's team won 59 Emmys and 57 Cable Ace Awards.
Ameri |
https://en.wikipedia.org/wiki/One%20Life%20to%20Live%20storylines%20%281968%E2%80%931979%29 | One Life to Live is an American soap opera that was broadcast from 1968 to 2013, on the ABC network from 1968 to 2012. The series starts with One Life to Live storylines (1968–1979). The plot continues in One Life to Live storylines (1980–1989). The plot in the next decade is outlined in One Life to Live storylines (1990–1999) and the story concludes in One Life to Live storylines (2000—2013).
1968–1978
The earliest storylines of One Life to Live focused on the blue collar, Polish Catholic Wolek family, and the super-rich Lords. Additionally, there was also the Rileys, although most of the latter were featured much less prominently. One Life to Live is also noteworthy for including a Black family, the Grays, from the show's earliest episodes.
Sadie and Carla
One of the show's earliest and most controversial storylines was the one that played out between housekeeping director at Llanview Hospital, Sadie Gray (Lillian Hayman), and Carla Benari (Ellen Holly), an actress who arrived in Llanview and became a patient of Dr. Jim Craig's (Robert Milli) at the hospital. Assumed to be Italian American, Carla Benari is an important character immediately upon her arrival, becoming involved in a love triangle between Dr. Craig and internist Price Trainor (Peter DeAnda). Carla also strikes up a friendship with Anna Wolek (Doris Belack), unaware that Sadie is Anna's neighbor and best friend which would become relevant as the storyline progressed on-screen. At this point in the storyline, one ABC affiliate in Texas briefly dropped One Life to Live from its schedule due to the storyline in which Price Trainor, a black man, kissed Carla Benari, who was believed to be white.
The character of Carla, despite debuting in episode 61, months after the show's July 1968 premiere, was conceptualized in Agnes Nixon's original show Bible, and as such is considered part of the story of Llanview from the beginning. Nixon has said she was inspired to create the Carla Gray character after seeing singer Eartha Kitt in a television interview. Kitt expressed her own frustration at facing prejudice from both white and black audiences because of her light-skinned complexion, and the feeling of not belonging to either group. (Even Carla's surname "Gray" reflects the in-between nature of the character, not "black" or "white".) According to actress Ellen Holly's memoir, One Life: An Autobiography of an African American Actress, Nixon based Carla's mother Sadie on a maid who worked for Nixon's family when she was growing up much the same way that Sadie on One Life initially worked as a maid for the Lord family. Nixon based Carla and Sadie's original story on the film Imitation of Life, in which a light-skinned Black woman denies her heritage and her darker-complected mother, and enters white society by passing.
The revelation that Carla Benari was actually Black did not come until Ellen Holly had appeared in the role on-screen for five months. It was to be revealed that Carla Benar |
https://en.wikipedia.org/wiki/One%20Life%20to%20Live%20storylines%20%281980%E2%80%931989%29 | One Life to Live (often abbreviated as OLTL) is an American soap opera created by Agnes Nixon. During the 1980s, the show was broadcast on the ABC television network and episodes were an hour long. This article describes in detail the show's plotlines during that decade.
1980–1983
The early 1980s were a time of big changes for One Life to Live. The Wolek sisters were the spotlight characters of the show as the new decade began. The primary storyline on the show in 1979 concentrates on Viki’s trial for the murder of Marco Dane (Gerald Anthony). Anthony was so popular with fans that he quickly returned (a quick rewrite revealed Marco's heretofore unknown twin brother Mario was killed instead; Marco impersonated him for several years). Karen discovers Marco’s secret but realizes he was genuinely trying to rehabilitate, so she didn’t expose him. Meanwhile, Jenny was treated badly by her husband Brad who then manipulated her into taking him back over and over again. Brad also raped Karen. Jenny was in a high-risk pregnancy at the time, and the news of the rape sent her into early labor. When the baby died in the nursery, Karen forced Marco to switch the child with fellow hooker Katrina Karr's child. Jenny finally left Brad for good and married Dr. Peter Janssen, who was later killed in a car accident. It would be several years before she found out the truth about ‘her’ baby and in a heartbreaking sequence, gave her daughter back to Katrina.
Joe Riley succumbed to a brain tumor and died in the fall of 1979, only weeks before Viki delivered their second son (whom she named Joseph in his memory). Viki buried herself in work as a publisher of the Banner, and in looking after Tina, who was perpetually involved with one bad-news boyfriend after another. Although she deliberately avoided a new relationship, she attracted two prospective love interests. One was Ted Clayton, Tina’s father (actually stepfather, though she didn’t know it at the time) who was more interested in Viki’s wealth than her. The other was Clint Buchanan (Clint Ritchie), who took over Joe’s position as chief editor of the Llanview Banner. Viki and Clint clashed both professionally and personally – Clint was a no-nonsense cowboy who initially saw Viki as a pampered Primadonna. Eventually, though true love won out and, despite numerous schemes by Ted, Viki and Clint were married. Ted was finally gunned down, prompting a devastated Tina to leave Llanview for a while.
Quickly following Clint to Llanview were his brother Bo Buchanan (Robert S. Woods), and Father Asa Buchanan (Phil Carey). Asa is a Texas oil baron millionaire who has a love-hate relationship with his sons, and practically everyone he knew. The Buchanan clan was an obvious attempt to imitate the then wildly popular prime-time soap Dallas, but the Buchanans proved to be such big hits that they soon dominated the entire show. Most of the Wolek and Lord family members who anchored OLTL since its inception were written out, or |
https://en.wikipedia.org/wiki/One%20Life%20to%20Live%20storylines%20%281990%E2%80%931999%29 | One Life to Live is an American soap opera that was broadcast on the ABC network from 1968 to 2012. The series began with One Life to Live storylines (1968–1979). The plot continues in One Life to Live storylines (1980–1989). The plot in the next decade is outlined in One Life to Live storylines (1990–1999) and the story concludes in One Life to Live Storylines (2000–2013).
1990 to 1992
Lord love the children
After discovering that the charity group Tina began working for in late 1989 is really an illegal adoption ring headed by Serena and Ambrose Wyman, Tina, Viki, Roger and Cord team up to take them down. They are helped by Max and Gabrielle who become involved when their son Al is kidnapped to be sold. Ambrose lures them to an old factory on New Year's Eve 1989 where hidden fireworks are set to explode and kill them. Clint rescues them but the Wymans escape after shooting Max. While everyone else is at the hospital, Tina tracks down the Wymans on their yacht and pulls a gun on them. They then gain the advantage and hold her hostage. Clint and Cord rescue her before she is killed and the Wymans are arrested. Soon after, she fails to break up Cord and Debra's relationship, Tina then bids farewell to Llanview and leaves with her son CJ.
Mendorra
The final adventures of the Rauch-era feature political intrigue in the fictional country of Mendorra, which has been wreaking havoc on Llanview citizens for years. The royal battle between brothers Prince Raymond and Roland Hohenstein come to head with Sarah and Megan being captured and held prisoner in Mendorra by the evil Prince Roland after traveling there to help Prince Raymond who went blind while rescuing Megan from a fire. Roland hatches an evil plot in which Sarah is to marry Raymond so he can assume the throne. Bo, Cord, Dorian, Cassie and Debra team up to save them and in the conclusion, Bo poses as Raymond and marries Sarah in the cathedral. After the royal wedding, Sarah, Bo, Megan and Raymond escape on skis still dressed in their wedding attire and ski down a mountain with Roland in pursuit (on location in Austria). Then Roland and Raymond battle to the death with good defeating evil and Raymond winning back the throne.
Michael Grande and drug cartels
As the new decade begins, Viki runs for mayor of Llanview on a strong anti-drug platform. Roger Gordon manages her campaign, and the two fight their mutual feelings for each other. Meanwhile, Gabrielle's mother Julia Medina (Linda Thorson), who is every bit the schemer her daughter is, sets her sights on snaring Clint. Making things even more complicated is Viki’s opponent, Herb Callison, whose campaign is managed by newly returned Dorian (now played by Elaine Princi). Viki wins, and becomes a target of the local drug cartel, whose mastermind is Michael Grande.
Michael has alienated virtually everybody in Llanview. When he is gunned down, there is no shortage of suspects. But Megan is arrested, tried and found guilty of the crime. Jake Ha |
https://en.wikipedia.org/wiki/One%20Life%20to%20Live%20storylines%20%282000%E2%80%932013%29 | One Life to Live was an American soap opera that was broadcast on the ABC network from July 1968 to January 2012, and online from April to August 2013. The series starts with One Life to Live storylines (1968–79). The plot continues in One Life to Live storylines (1980–89). The plot in the next decade is outlined in One Life to Live storylines (1990–1999) and the story concludes in One Life to Live storylines (2000–2013).
One Life to Live (2000-2013)
2000
Into the new millennium, more new characters were introduced, including Lindsay's (Catherine Hickland) sister Melanie (Darlene Vogel) and her husband Colin (Ty Treadway). Colin was killed, but his twin brother was brought on the canvas, only to lose his mind and become a killer. Phelps' tenure saw the departure of a number of long-running actors, such as Laura Koffman (Cassie), Clint Ritchie (Clint), and Strasser (again).
2001 and 2002
Jill Farren Phelps and Megan McTavish left in early 2001, and they were respectively replaced by new executive producer Gary Tomlin and new head writers Lorraine Broderick and Christopher Whitesell. Many of the actors hired under Phelps' tenure were let go. Fan favorite Gabrielle returned after a ten-year absence and romanced Max, then Bo. Storylines became more campy, and the show had a much-acclaimed week in May 2002 where the episodes were broadcast live. This experimentation was mixed with truly dark tales such as Todd selling Blair's baby, telling her the child was dead and then passing him off as an adopted baby when he realized he was the natural father. Another story involved Viki returning to her former split personality Niki Smith to block out the painful memory of being raped by Mitch Laurence (Roscoe Born). She had one child with Clint (Natalie) and the other child (Jessica) was fathered by Mitch. Another storyline was Antonio (Kamar de los Reyes) having a one-night stand with a woman who turned out to be his fiancé Keri's (Sherri Saum) mother, Liz (Barbara Niven). She then implanted her embryo into Keri, meaning that Keri was unknowingly giving birth to her fiancé's child. To the chagrin of many viewers, much airtime was devoted to Lindsay's daughter, Jen (Jessica Morris).
2003
In early 2003, Malone and Josh Griffith were rehired as head writers with Frank Valentini taking over as executive producer. A new major storyline involved Mitch kidnapping sisters, Natalie and Jessica, to figure out which one's heart was a match for their grandfather. Victor had been faking his death. He was too ill to have major confrontations with his children and died a few weeks into the story. Dorian then showed up as Mitch's new bride, and she became enmeshed in a storyline involving a jewel hunt as well as a "curse" that blinded Mitch. Mitch was later killed by Jessica. Another story involved the return of Cord and Tina's daughter, Sarah Roberts, as rock singer Flash (Shanelle Workman). Flash dated, and even kissed, Joey Buchanan (Bruce Michael Hall), her cousin. Jo |
https://en.wikipedia.org/wiki/List%20of%20the%20bryophytes%20of%20Canada | Parent page: Flora of Canada
This is a listing of the non-vascular plants of Canada, and includes the mosses, liverworts and hornworts.
IDD - incomplete distribution data
Anthocerotophyta (hornworts)
Anthocerotaceae
Notothyladaceae
Bryophyta (mosses)
Andreaeaceae
Andreaeobryaceae
Archidiaceae
Aulacomniaceae
Bartramiaceae
Bryaceae
Catoscopiaceae
Hypopterygiaceae
Meesiaceae
Mniaceae
Lists of plants
Non-vascular plants
Bryophytes |
https://en.wikipedia.org/wiki/EXPRESS%20%28data%20modeling%20language%29 | EXPRESS is a standard for generic data modeling language for product data. EXPRESS is formalized in the ISO Standard for the Exchange of Product model STEP (ISO 10303), and standardized as ISO 10303-11.
Overview
Data models formally define data objects and relationships among data objects for a domain of interest. Some typical applications of data models include supporting the development of databases and enabling the exchange of data for a particular area of interest. Data models are specified in a data modeling language. EXPRESS is a data modeling language defined in ISO 10303-11, the EXPRESS Language Reference Manual.
An EXPRESS data model can be defined in two ways, textually and graphically. For formal verification and as input for tools such as SDAI the textual representation within an ASCII file is the most important one. The graphical representation on the other hand is often more suitable for human use such as explanation and tutorials. The graphical representation, called EXPRESS-G, is not able to represent all details that can be formulated in the textual form.
EXPRESS is similar to programming languages such as Pascal. Within a SCHEMA various datatypes can be defined together with structural constraints and algorithmic rules. A main feature of EXPRESS is the possibility to formally validate a population of datatypes - this is to check for all the structural and algorithmic rules.
EXPRESS-G
EXPRESS-G is a standard graphical notation for information models. It is a companion to the EXPRESS language for displaying entity and type definitions, relationships and cardinality. This graphical notation supports a subset of the EXPRESS language. One of the advantages of using EXPRESS-G over EXPRESS is that the structure of a data model can be presented in a more understandable manner. A disadvantage of EXPRESS-G is that complex constraints cannot be formally specified. Figure 1 is an example. The data model presented in figure could be used to specify the requirements of a database for an audio compact disc (CD) collection.
Simple example
A simple EXPRESS data model looks like fig 2, and the code like this:
SCHEMA Family;
ENTITY Person
ABSTRACT SUPERTYPE OF (ONEOF (Male, Female));
name: STRING;
mother: OPTIONAL Female;
father: OPTIONAL Male;
END_ENTITY;
ENTITY Female
SUBTYPE OF (Person);
END_ENTITY;
ENTITY Male
SUBTYPE of (Person);
END_ENTITY;
END_SCHEMA;
The data model is enclosed within the EXPRESS schema Family. It contains a supertype entity Person with the two subtypes Male and Female. Since Person is declared to be ABSTRACT only occurrences of either (ONEOF) the subtype Male or Female can exist. Every occurrence of a person has a mandatory name attribute and optionally attributes mother and father. There is a fixed style of reading for attributes of some entity type:
a Female can play the role of mother for a Person
a Male can play the role of father for a Person
EXPRESS Buildi |
https://en.wikipedia.org/wiki/Birdz%20%28TV%20series%29 | Birdz is a Canadian animated television series created by Larry Jacobs, who later worked on Cyberchase. It was produced by Nelvana Limited in association with CBS Television and STVE. The show was first aired on 3 October 1998, on CBS with the final episode's airing on 2 January 1999. Later, it was shown in Scotland in 2001, aired on Scottish Television and Grampian TV (now STV North) - now both known as STV. The show was returned from 2015 as part of the "Weans' World" block on STV Glasgow and STV Edinburgh.
Plot
The show is about an anthropomorphic 13-year-old bird named Eddie Storkowitz, who films his everyday life in aspiration of becoming a filmmaker. His family includes his father, Morty, who is a psychiatrist; mother Betty, an artist; college-age older sister Steffy; and baby sister Abby. Several episodes focus on Eddie's class, which includes an owl named Olivia, a robin named Spring, a turkey named Tommy, a woodpecker named Gregory, and a bat named Sleepy, plus teacher Miss Finch and principal Mr. Pip.
Theme music
The song "Surfin' Bird" by the Trashmen was covered as a theme song for the series.
Cancellation
The show's creator Larry Jacobs thought that the show received poor ratings because it aired after the news in most markets.
Cast and characters
Susan Roman as Eddie
David Huband as Morty
Sally Cahill as Betty
Stephanie Morgenstern as Steffy
Alison Sealy-Smith as Abby
Jill Frappier as Miss Finch
Len Carlson as Mr. Pip
Chris Wiggins as Officer Pigeon
Richard Binsley as Mr. Nuthatch
Ruby Smith-Merovitz as Spring
Karen Bernstein as Olivia
Adam Reid as Tommy
Julie Lemieux as Sleepy
Rick Jones as Gregory
Episodes
Telecast and home media
The show was first introduced in October 1998 on CBS's Saturday morning lineup with repeats until Spring 1999. In the 2000s, the show was also aired on the Omni Broadcasting Network. Later, it was shown in Scotland in 2001, aired on Scottish Television and Grampian TV (now STV North) - now both known as STV. The show was returned from 2015 as part of the "Weans' World" block on STV Glasgow and STV Edinburgh.
In the late 1990s, Alliance Atlantis released videotapes of the show.
In 2019, the show has begun being uploaded to Corus' Retro Rerun YouTube channel. As of 2022, the show is now streaming on Tubi.
References
External links
1998 Canadian television series debuts
1999 Canadian television series endings
1990s Canadian animated television series
1990s Canadian children's television series
Animated television series about birds
Canadian children's animated comedy television series
CBS original programming
CTV Television Network original programming
English-language television shows
Television series by Nelvana
Television series by STV Studios |
https://en.wikipedia.org/wiki/BBC%20One%20Northern%20Ireland | BBC One Northern Ireland is a Northern Irish free-to-air television channel owned and operated by BBC Northern Ireland. It is the Northern Irish variation of the UK-wide BBC One network.
The service is broadcast from Broadcasting House in Belfast. In the rest of the UK, BBC One Northern Ireland is available as a regional variant on most TV service providers. In the Republic of Ireland, BBC One Northern Ireland is available as a standard channel.
History
On 24 October 2012, an HD variation of BBC One Northern Ireland was launched, to coincide with the completion of the digital switchover process in Northern Ireland. On 18 November 2013, BBC One Northern Ireland HD was swapped with the SD channel on Sky's EPG for HD subscribers.
The BBC One Northern Ireland branding is utilised from 6am until the handover to the BBC News Channel with live continuity handled by a team of regional announcers who double up as playout directors. The channel's main competitor is UTV while also competing with RTÉ One, RTÉ Two and Virgin Media One from the Republic of Ireland. Although BBC One NI and UTV are competitors, on the final night of UK digital switchover, BBC One NI and UTV joined forces for a special simulcast, The Magic Box, with Eamonn Holmes, celebrating 60 years of TV history.
References
External links
1955 establishments in Northern Ireland
BBC television channels in the United Kingdom
English-language television stations in the United Kingdom
Television channels and stations established in 1955
Television in Northern Ireland
Television stations in Ireland
BBC Northern Ireland |
https://en.wikipedia.org/wiki/BBC%20One%20Wales | BBC One Wales is a Welsh free-to-air television channel owned and operated by BBC Cymru Wales. It is the Welsh variation of the UK-wide BBC One network and is broadcast from Central Square in Cardiff.
History and operation
The channel was launched on February 9, 1964 as BBC Cymru Wales.
BBC One Wales broadcasts around three hours of non-news programmes for Wales each week alongside six hours a week of national news for Wales from BBC Wales Today.
BBC One Wales branding is utilised between 6am and around 1am each day with live continuity handled by a team of national announcer/directors.
A high-definition simulcast of BBC One Wales launched on 29 January 2013 on Freeview, Freesat, Sky and Virgin Media. On 10 December 2013, BBC One Wales HD was swapped with the SD channel on Sky's EPG for HD subscribers.
Programming
References
External links
1964 establishments in Wales
BBC television channels in the United Kingdom
English-language television stations in the United Kingdom
Television channels and stations established in 1964
Television channels in Wales
BBC Cymru Wales |
https://en.wikipedia.org/wiki/BBC%20Two%20Wales | BBC Two Wales is a Welsh free-to-air television channel owned and operated by BBC Cymru Wales as a variation of the BBC Two network. It is broadcast from Central Square in Cardiff with live continuity provided by a team of announcer/directors. The channel opts out from the main BBC Two schedule.
From 5 November 2001 until 2 January 2009, BBC Two Wales was the name of the analogue service broadcasting to Wales, and was the brand used on the digital service outside the broadcasting hours used by BBC 2W. BBC 2W was the sister channel to BBC Two Wales, until the digital switchover saw the end of analogue broadcasts in Wales. The specific BBC 2W service was closed down and the BBC Two Wales brand used.
Programming
Programming is much the same as BBC Two, with the exception of some Welsh-oriented programming. Frequently, schedules are changed as a result of an additional programme being inserted and other programmes seen on the BBC Two network being delayed until a slot becomes available.
Presentation is parallel to that of BBC Two itself, with BBC Two Wales sharing the same idents and channel design. The primary addition is the word 'Wales' under the BBC Two logo inside the box.
Availability
BBC Two Wales can be seen both in Wales on all television platforms, usually on Channels 2, or 102 depending on the system, and in other regions of the UK via most satellite providers and on some other digital television providers. Programmes shown exclusively on BBC Two Wales can also be seen again, for 28 days after broadcast on the BBC iPlayer service.
BBC Two Wales HD
BBC Two Wales was made available in high definition on 29 November 2018 on Freeview (in Wales only), Sky and Freesat, with addition to Virgin Media cable to follow on 4 December. On Freesat HD boxes, BBC Two Wales HD directly replaced the SD version on 102 in Wales and 971 elsewhere; the SD version was relocated to 106 in Wales (the slot previously used for the network BBC Two HD) and 979 elsewhere; viewers in Wales can now access the network version of BBC Two HD on 949. On Freeview HD in Wales, BBC Two Wales HD directly replaced the network version on 102. On Sky, the 'HD swap' facility places BBC Two Wales HD on 102 on HD boxes in Wales, with the SD and network versions further down the guide. Standard-definition receivers saw little change, with BBC Two Wales in SD remaining at 2/102 as before.
References
External links
Mass media in Wales
Television channels and stations established in 1965
BBC television channels in the United Kingdom
BBC Cymru Wales
1965 establishments in Wales |
https://en.wikipedia.org/wiki/Gast%20gun | The Gast gun was a German twin barrelled machine gun that was developed by Karl Gast of Vorwerk und Companie of Barmen and used during the First World War. Its unique operating system produced a very high rate of fire of 1,600 rounds per minute. The same principle was later used as the basis for the widely used Gryazev-Shipunov GSh-23L series of Russian aircraft autocannon.
Description
The weapon combines two barrels into a single mechanism so that the recoil from firing one barrel loads and charges the second. Ammunition feeds into the gun from two vertically mounted cylindrical drums, one on each side. The drums held 180 rounds of German 7.92 mm rifle ammunition, feeding them into the breech using a compressed spring. An experienced gunner could change ammunition drums in a few seconds. The weapon could fire single shots if one side of the mechanism had a problem.
The gun's relative lightness at approximately without ammunition led to its airborne use; a telescopic sight was mounted between the two barrels. Its simple design eased maintenance and enabled it to be field stripped in one minute.
History
In January 1915, Karl Gast invented the gun, which would become known as the Gast Maschinengewehr Modell 1917, while working for the Vorwerk company, the first weapon was produced in January 1916. Gast took out patents on 21 January 1916 and 13 February 1917, describing his weapon as "a double-barreled machine gun with recoiling barrels". Rates of fire of 1,600 rounds per minute were achieved during trials.
In August 1917, Gast's demonstration so impressed ordnance experts that a production order for 3,000 guns, along with spare parts and ten ammunition drums for each gun, was awarded to Vorwerk und Companie at a unit price of 6,800 marks each. Delivery of the first 100 guns was promised for 1 June 1918, with production increasing to 500 guns per month by September 1918. Production of the weapon exceeded these initial projections, and the weapons were favorably received with promises of an order for a further 6,000 guns being made in September 1918.
A version of the gun in 13 mm (13.2×92mmSR), the Gast-Flieger MG, was also under development, which used the same ammunition as the Maxim MG TuF and had two, curved, box magazines.
The gun was rarely used in service, and its existence was kept secret until three years after the Armistice; in 1921 the Allied Control Commission finally became aware of the Gast gun when a cache of 25 of the guns, ammunition, and designs was found near Königsberg. Gast himself had applied for a US patent in 1920, which was issued in 1923. A Gast gun was evaluated by the US Army and found to be reliable and mechanically practical. However it was not felt to offer a sufficient advantage over existing machine guns to justify the expense of producing the weapon.
Years later the Gast design was copied by Soviet engineers seeking to improve firing rates of their aircraft autocannon without resorting to the Gatling gun co |
https://en.wikipedia.org/wiki/Type%20punning | In computer science, a type punning is any programming technique that subverts or circumvents the type system of a programming language in order to achieve an effect that would be difficult or impossible to achieve within the bounds of the formal language.
In C and C++, constructs such as pointer type conversion and union — C++ adds reference type conversion and reinterpret_cast to this list — are provided in order to permit many kinds of type punning, although some kinds are not actually supported by the standard language.
In the Pascal programming language, the use of records with variants may be used to treat a particular data type in more than one manner, or in a manner not normally permitted.
Sockets example
One classic example of type punning is found in the Berkeley sockets interface. The function to bind an opened but uninitialized socket to an IP address is declared as follows:
int bind(int sockfd, struct sockaddr *my_addr, socklen_t addrlen);
The bind function is usually called as follows:
struct sockaddr_in sa = {0};
int sockfd = ...;
sa.sin_family = AF_INET;
sa.sin_port = htons(port);
bind(sockfd, (struct sockaddr *)&sa, sizeof sa);
The Berkeley sockets library fundamentally relies on the fact that in C, a pointer to struct sockaddr_in is freely convertible to a pointer to struct sockaddr; and, in addition, that the two structure types share the same memory layout. Therefore, a reference to the structure field my_addr->sin_family (where my_addr is of type struct sockaddr*) will actually refer to the field sa.sin_family (where sa is of type struct sockaddr_in). In other words, the sockets library uses type punning to implement a rudimentary form of polymorphism or inheritance.
Often seen in the programming world is the use of "padded" data structures to allow for the storage of different kinds of values in what is effectively the same storage space. This is often seen when two structures are used in mutual exclusivity for optimization.
Floating-point example
Not all examples of type punning involve structures, as the previous example did. Suppose we want to determine whether a floating-point number is negative. We could write:
bool is_negative(float x) {
return x < 0.0;
}
However, supposing that floating-point comparisons are expensive, and also supposing that float is represented according to the IEEE floating-point standard, and integers are 32 bits wide, we could engage in type punning to extract the sign bit of the floating-point number using only integer operations:
bool is_negative(float x) {
unsigned int *ui = (unsigned int *)&x;
return *ui & 0x80000000;
}
Note that the behaviour will not be exactly the same: in the special case of x being negative zero, the first implementation yields false while the second yields true. Also, the first implementation will return false for any NaN value, but the latter might return true for NaN values with the sign bit set.
This kind of type punning is more dangerous |
https://en.wikipedia.org/wiki/TKIET | The Tatyasaheb Kore Institute of Engineering & Technology (abbreviated TKIET), (An Autonomous Institute) established in 1983, offers courses in Computer science and engineering, Mechanical engineering, Chemical engineering, Civil engineering and Electronics & Telecommunications engineering in UG and Mechanical engineering, Civil engineering and Electronics & Telecommunication engineering for PG level. TKIET is recognized by the government of Maharashtra, and is approved by the All India Council of Technical Education, New Delhi. It is accredited by the National Board of Accreditation (NBA), New Delhi. In year 2016 the institute was accredited by NAAC 'A' grade with CGPA 3.27 which is highest in Shivaji University. The Institute is affiliated with Shivaji University, Kolhapur.
The TKIET campus is 30 km northwest of Kolhapur city in rural Warananagar. The institute has over 2000 students from across the nation.
History
Tatyasaheb Kore Institute of Engineering and Technology (TKIET) was established in 1983. The institute is located at Warananagar, 30 km away from Kolhapur a district headquarter and 10 km to the west from Kini-Wathar on Pune-Bangalore National Highway NH-4. TKIET has emerged as one of the leading technological institutes in Western Maharashtra. The institute's lush green campus spreads over 30 acres.
Departments
Courses offered are:
Undergraduate
Computer Science Engineering
Civil Engineering
Electronics & Telecommunication Engineering
Chemical Engineering
Mechanical Engineering
Post-Graduate
Chemical Engineering
Electronics & Telecommunication Engineering
Mechanical (Design) Engineering
Construction Management (civil)
Ph. D
Chemical Engineering
Mechanical Engineering (proposed)
Civil Engineering (proposed)
Hostels
There are 11 hostels (7 for boys and 2 for girls). All the hostels are named after notable persons in India.
The boys' hostels are:
Bhaskar
Raman
Tilak
Sir Visvesvaraya (S.V)
Bhabha
Shivaji
Nehru
The girls' hostels are:
Savitri Bai Phule
Placements
The Training and Placement Cell of TKIET, Warananagar handles campus placement of the engineering graduates.
Students from TKIET are working with multinational companies such as Merrill Lynch, Nomura, Microsoft Technologies, Sun Systems, IBM, Ford, and Hyundai.
Also the top companies in India have students from TKIET like L&T, TCS, Wipro, SBI, Mahindra and Mahindra, Mindtree, BSF and many more.
Institute Achievements
Institute is accredited by NAAC with grade ‘A’
Awarded as one of the Best Engineering College Campus in the country.
College grabbed platinum recognition by AICTE and CII survey for industrial collaboration.
Many professors from the institute received best faculty award by Indian Society for Technical Education (ISTE), New Delhi.
See also
List of universities in India
Universities and colleges in India
Education in India
References
External links
http://www.tkietwarana.org/
Universities and colleges in Maharashtra
Kolhapur |
https://en.wikipedia.org/wiki/Single-user%20mode | Single-user mode is a mode in which a multiuser computer operating system boots into a single superuser. It is mainly used for maintenance of multi-user environments such as network servers. Some tasks may require exclusive access to shared resources, for example running fsck on a network share. This mode can also be used for security purposes network services are not run, eliminating the possibility of outside interference. On some systems a lost superuser password can be changed by switching to single-user mode, but not asking for the password in such circumstances is viewed as a security vulnerability.
Unix family
Unix-like operating systems provide single-user mode functionality either through the System V-style runlevels, BSD-style boot-loader options, or other boot-time options.
The run-level is usually changed using the init command, runlevel 1 or S will boot into single-user mode.
Boot-loader options can be changed during startup before the execution of the kernel.
In FreeBSD and DragonFly BSD it can be changed before rebooting the system with the command nextboot -o "-s" -k kernel, and its bootloader offers the option on bootup to start in single-user mode. In Solaris the command reboot -- -s will cause a reboot into single-user mode.
macOS users can accomplish this by holding down after powering the system. The user may be required to enter a password set in the firmware. In OS X El Capitan and later releases of macOS, the mode can be reversed to single-user mode with the command sudo launchctl reboot userspace -s in Terminal, and the system can be fully rebooted in single-user mode with the command sudo launchctl reboot system -s. Single-user mode is different from a safe mode boot in that the system goes directly to the console instead of starting up the core elements of macOS (items in /System/Library/, ignoring /Library/, ~/Library/, et al.). From there users are encouraged by a prompt to run fsck or other command line utilities as needed (or installed).
Microsoft Windows
Microsoft Windows provides Recovery Console, Last Known Good Configuration, Safe Mode and recently Windows Recovery Environment as standard recovery means.
Also, bootable BartPE-based third-party recovery discs are available.
Recovery Console and recovery discs are different from single-user modes in other operating systems because they are independent of the maintained operating system. This works more like chrooting into other environment with other kernel in Linux.
References
UNIX Research System Programmer's Manual
Operating system technology
Booting |
https://en.wikipedia.org/wiki/Target%20Disk%20Mode | Target Disk Mode (sometimes referred to as TDM or Target Mode) is a boot mode unique to Macintosh computers.
When a Mac that supports Target Disk Mode is started with the 'T' key held down, its operating system does not boot. Instead, the Mac's firmware enables its drives to behave as a SCSI, FireWire, Thunderbolt, or USB-C external mass storage device.
A Mac booted in Target Mode can be attached to the port of any other computer, Mac or PC, where it will appear as an external device. Hard drives within the target Mac, for example, can be formatted or partitioned exactly like any other external drive. Some computers will also make their internal CD/DVD drives and other internal and external peripheral hardware available to the host computer.
Target Disk Mode is useful for accessing the contents of a Mac which cannot load its own operating system. Target Disk Mode is the preferred form of old-computer to new-computer interconnect used by Apple's Migration Assistant. Migration Assistant supports Ethernet (wired) or Wi-Fi, which TDM does not. Neither supports USB; however, Thunderbolt-to-Firewire, Thunderbolt-to-Gigabit-Ethernet, and USB-3.0-to-Gigabit-Ethernet adapters are an option when one of the computers does not have Firewire or Thunderbolt.
History
Apple introduced disk mode access with the original PowerBook 100 and continued to offer it with most subsequent PowerBook series and FireWire-equipped Macs. As long as the requisite software appeared in the system ROM, the Mac could be booted into disk mode.
Target Disk Mode was originally called SCSI Disk Mode, and a special cable (SCSI System Cable) allowed the original PowerBook series to attach to a desktop Mac as an external SCSI disk. A unique system control panel on the PowerBook was used to select a non-conflicting SCSI ID number from the host Mac.
This also made it possible to select the disk in the Startup control panel and boot up from it.
With the change to IDE drives starting with the PowerBook 150 and 190, Apple implemented HD Target Mode, which essentially enabled SCSI Disk Mode by translating the external SCSI commands via the ATA driver. Officially reserved for Apple's portables only, the mode was supported by all PowerBooks except the 140, 145, 145B, 150 and 170. However, SCSI Disk Mode can be implemented unofficially on any Macintosh with an external SCSI port by suspending the startup process with the interrupt switch, as long as all internal drives on the chain can be set to different IDs than the active host system's devices.
When Apple dropped the SCSI interface, starting with the AGP Power Mac G4 and “Pismo” PowerBook G3, FireWire Target Disk mode replaced the earlier disk mode implementation, also receiving official support beyond laptops to all subsequent Macs with built-in Firewire.
Thunderbolt supports Target Disk Mode.
The 12-inch Retina MacBook (early 2015) has only one expansion port, a USB-C port that supports charging, external displays, and Target Disk |
https://en.wikipedia.org/wiki/List%20of%20Hawaii%20Five-O%20%281968%20TV%20series%29%20episodes | Hawaii Five-O is a police procedural television series created by Leonard Freeman for the CBS television network. Starring Jack Lord, the series premiered on September 20, 1968, and ended after 12 seasons on April 4, 1980, during which time 282 episodes were produced and broadcast. The series covers a fictional special state task force for the state of Hawaii led by Detective Steve McGarrett (Jack Lord).
To date, all 12 seasons have been released on DVD in Region 1, as well as the first seven seasons for Regions 2 and 4. Except for Season 2 Episode 16 which is banned.
Series overview
Episodes
Season 1 (1968–69)
Season 2 (1969–70)
Season 3 (1970–71)
Season 4 (1971–72)
Season 5 (1972–73)
Season 6 (1973–74)
Creator and executive producer Leonard Freeman died during this season.
Season 7 (1974–75)
Season 8 (1975–76)
Season 9 (1976–77)
Season 10 (1977–78)
Season 11 (1978–79)
Season 12 (1979–80)
References
External links
Lists of American crime drama television series episodes |
https://en.wikipedia.org/wiki/Database%20administration | Database administration is the function of managing and maintaining database management systems (DBMS) software. Mainstream DBMS software such as Oracle, IBM Db2 and Microsoft SQL Server need ongoing management. As such, corporations that use DBMS software often hire specialized information technology personnel called database administrators or DBAs.
Responsibilities
Installation, configuration and upgrading of Database server software and related products.
Evaluate Database features and Database related products.
Establish and maintain sound backup and recovery policies and procedures.
Take care of the Database design and implementation.
Implement and maintain database security (create and maintain users and roles, assign privileges).
Database tuning and performance monitoring.
Application tuning and performance monitoring.
Setup and maintain documentation and standards.
Plan growth and changes (capacity planning).
Work as part of a team and provide 24/7 support when required.
Do general technical troubleshooting and give cons.
Database recovery
Types
There are three types of DBAs:
Systems DBAs (also referred to as physical DBAs, operations DBAs or production Support DBAs): focus on the physical aspects of database administration such as DBMS installation, configuration, patching, upgrades, backups, restores, refreshes, performance optimization, maintenance and disaster recovery.
Development DBAs: focus on the logical and development aspects of database administration such as data model design and maintenance, DDL (data definition language) generation, SQL writing and tuning, coding stored procedures, collaborating with developers to help choose the most appropriate DBMS feature/functionality and other pre-production activities.
Application DBAs: usually found in organizations that have purchased 3rd party application software such as ERP (enterprise resource planning) and CRM (customer relationship management) systems. Examples of such application software includes Oracle Applications, Siebel and PeopleSoft (both now part of Oracle Corp.) and SAP. Application DBAs straddle the fence between the DBMS and the application software and are responsible for ensuring that the application is fully optimized for the database and vice versa. They usually manage all the application components that interact with the database and carry out activities such as application installation and patching, application upgrades, database cloning, building and running data cleanup routines, data load process management, etc.
While individuals usually specialize in one type of database administration, in smaller organizations, it is not uncommon to find a single individual or group performing more than one type of database administration.
Automation of database administration
The degree to which the administration of a database is automated dictates the skills and personnel required to manage databases. On one end of the spectrum, a system |
https://en.wikipedia.org/wiki/Made%20to%20Order%20%28TV%20series%29 | Made to Order is a Canadian lifestyle show airing in more than 150 countries, including the Food Network and Fine Living in Canada, Fine Living in the US, Discovery Travel, and Living in Asia, Australia, India and South America. It features the behind-the-scenes of the running of rain, a high-end restaurant in Toronto, Ontario run by Michael and Guy Rubino. It had 39 episodes.
References
Food Network (Canadian TV channel) original programming
Food reality television series
2000s Canadian cooking television series
2004 Canadian television series debuts
2006 Canadian television series endings |
https://en.wikipedia.org/wiki/Chantilly-Gouvieux%20station | Chantilly-Gouvieux is a railway station on the TER Hauts-de-France regional rail network in Chantilly, France.
Service
There is TER service at Chantilly-Gouvieux complemented by RER D service.
References
External links
Railway stations in Oise
Railway stations in France opened in 1859 |
https://en.wikipedia.org/wiki/Blangy%E2%80%94Glisy%20station | Blangy—Glisy station (French: Gare de Blangy—Glisy) is a closed railway station in the Picardy region of France. It was served by trains of the TER Picardie regional rail network. The station is located half-way of the villages of Glisy and Blangy-Tronville. As of 2010, it is served by a TER taxi service.
Services
Two TER Picardie rail lines served Blangy-Glisy:
Amiens - Laon - Reims
Amiens - Saint-Quentin
References
Defunct railway stations in Somme (department) |
https://en.wikipedia.org/wiki/List%20of%20diplomatic%20missions%20of%20Canada | This is a list of diplomatic missions of Canada. Canada has an extensive diplomatic network maintained by Global Affairs Canada.
Overview
As a Commonwealth country, Canada's diplomatic missions in the capitals of other Commonwealth countries are referred to as High Commissions (as opposed to embassies). Canada has diplomatic and consular offices (including honorary consuls that are not included in this list) in over 270 locations in approximately 180 foreign countries.
Under the terms of the Canada–Australia Consular Services Sharing Agreement, the two countries provide consular services to each other's citizens at a number of locations around the world. At this time, there are 19 locations where Canadian offices provide consular services to Australians, and 12 other cities where Canadians can obtain consular services from Australian offices. In an emergency, Canadians can also seek assistance from British offices around the world if there is no resident Canadian office.
The province of Quebec has its own Ministry of International Relations (French: Ministère des Relations internationales) and a network of 33 offices in 18 countries "to promote and defend Québec's interests internationally while ensuring respect for its authority and the consistency of government activities." Other provinces, such as Alberta, British Columbia, and Ontario, also maintain offices abroad.
From 2 June 2019, Canada suspended embassy operations in Caracas, Venezuela effective immediately because its diplomats were no longer able to obtain visas. Minister Chrystia Freeland said in a statement that "President Nicolás Maduro’s regime has taken steps to limit the ability of foreign embassies to function in Venezuela” and "that Canadian diplomats in Venezuela will no longer be in a position to obtain diplomatic accreditation under the Maduro regime." The Canadian Embassy in Bogotá, Colombia now handles consular assistance for Canadian citizens living in Venezuela.
Africa
Algiers (Embassy)
Ouagadougou (Embassy)
Yaoundé (High Commission)
Kinshasa (Embassy)
Cairo (Embassy)
Addis Ababa (Embassy)
Accra (High Commission)
Abidjan (Embassy)
Nairobi (High Commission)
Bamako (Embassy)
Rabat (Embassy)
Maputo (High Commission)
Abuja (High Commission)
Lagos (Deputy High Commission)
Kigali (Office of the High Commission)
Dakar (Embassy)
Pretoria (High Commission)
Johannesburg (Trade Office)
Juba (Embassy)
Dar es Salaam (High Commission)
Tunis (Embassy)
Lusaka (Office of the High Commission)
Harare (Embassy)
Americas
Buenos Aires (Embassy)
Bridgetown (High Commission)
La Paz (Program Office of the Embassy)
Brasilia (Embassy)
Rio de Janeiro (Consulate General)
São Paulo (Consulate General)
Belo Horizonte (Trade Office)
Porto Alegre (Trade Office)
Recife (Trade Office)
Santiago de Chile (Embassy)
Bogotá (Embassy)
San José (Embassy)
Havana (Embassy)
Santo Domingo (Embassy)
Puerto Plata (Consulate)
Punta Cana (Office |
https://en.wikipedia.org/wiki/Fleet%20management%20software | Fleet management software (FMS) is computer software that enables people to accomplish a series of specific tasks in the management of any or all aspects relating to a fleet of vehicles operated by a company, government, or other organisation. These specific tasks encompass all operations from vehicle acquisition through maintenance to disposal.
Fleet management software functions
The main function of fleet management software is to accumulate, store, process, monitor, report on and export information. Information can be imported from external sources such as gas pump processors, territorial authorities for managing vehicle registration (for example DVLA and VOSA), financial institutions, insurance databases, vehicle specification databases, mapping systems and from internal sources such as Human Resources and Finance.
Vehicle management
Fleet management software should be able to manage processes, tasks and events related to all kinds of vehicles - car, trucks, earth-moving machinery, buses, forklift trucks, trailers and specialist equipment, including:
Vehicle inventory - the number and type of vehicles
Vehicle maintenance - specific routine maintenance and scheduled maintenance, and ad hoc requirements
Licensing, registration, MOT and tax
Vehicle insurance including due dates and restrictions
Cost management and analysis
Vehicle disposal
Driver management
Driver license management, including special provisions
Logging of penalty points and infringements against a licence
Booking system for pool vehicles
Passenger safety (SOS)
Incident management
Accidents and fines, plus apportioning costs to drivers
Tracking
Telematics
Route planning
Logbooks and work time
Alerts
Fleet management metrics to track
Identification Metrics such as vehicle ID, company ID, location ID, Driver ID
Utilization Metrics such as mileage and fuel data
Behavioral Metrics like average speed and harsh acceleration
Trip Metrics like number of trips, average duration
Maintenance Metrics like maintenance costs and number of diagnostics
Software procurement and development
Fleet management software can be developed in-house by the company or organisation using it, or be purchased from a third party. It varies greatly in its complexity and cost.
Fleet management software is directly related to fleet management. It originated on mainframe computers in the 1970s and shifted to the personal computers in the 1980s when it became practical. In later years however, Fleet Management Software has been more efficiently provided as SaaS. Fleet management software has become increasingly necessary and complex as increasing amounts of vehicle related legislation has been brought in.
See also
Vehicle tracking
References
Business software
Transportation planning
Automotive software
Fleet management |
https://en.wikipedia.org/wiki/Romulus%20%28modelling%20kernel%29 | The Romulus b-rep solid modeler (or simply Romulus) was released in 1978 by Ian Braid, Charles Lang, Alan Grayer, and the Shape Data team in Cambridge, England. It was the first commercial solid modeling kernel designed for straightforward integration into CAD software. Romulus incorporated the CAM-I AIS (Computer Aided Manufacturers International's Application Interface Specification) and was the only solid modeler (other than its successors Parasolid and ACIS) ever to offer a third-party standard API to facilitate high-level integration into a host CAD software program. Romulus was quickly licensed by Siemens, HP and several other CAD software vendors.
See also
Comparison of computer-aided design editors
Shape Data Limited
References
3D graphics software |
https://en.wikipedia.org/wiki/FlandersBio | flanders.bio, founded in 2004, is the networking organisation for the life sciences sector in Flanders and represents and supports around 350 member companies. The key strategic objectives of flanders.bio are knowledge exchange and valorisation, human capital development, internationalization of the cluster activities and visibility, familiarization of the public with products derived from the sector and the further development of a supportive environment for the members of flanders.bio.
The flanders.bio network brings together companies with activities in the life sciences – companies that are for example developing biopharmaceuticals, medical technologies or agricultural or industrial biotech products. The network also welcomes research institutes, universities and providers of capital, services and technologies to the life sciences community.
Since 2018, Willem Dhooge and Pascale Engelen are both co-General Managers at flanders.bio. They were preceded by Henk Joos, Ann De Beuckelaer, Ann Van Gysel and Els Vanheusden. Dirk Reyn (Managing Partner Bioqube Factory Fund) is Chairman of the flanders.bio Board of Directors, and Erwin Blomsma (CEO and co-founder at ViroVet) is Vice-Chairman.
See also
Belgian Society of Biochemistry and Molecular Biology
BIO.be
European Federation of Pharmaceutical Industries and Associations (EFPIA)
EuropaBio
Flanders Institute for Biotechnology (VIB)
Flanders Investment and Trade
Flemish institute for technological research (VITO)
GIMV
Institute for the promotion of Innovation by Science and Technology (IWT)
Participatiemaatschappij Vlaanderen
Pharma.be
Science and technology in Flanders
References
External links
flanders.bio
overview of the flanders.bio members is available on https://flanders.bio/en/member-directory
Medical and health organisations based in Belgium
Science and technology in Belgium
Flanders |
https://en.wikipedia.org/wiki/Current%20research%20information%20system | A current research information system (CRIS) is a database or other information system to store, manage and exchange contextual metadata for the research activity funded by a research funder or conducted at a research-performing organisation (or aggregation thereof).
CRIS systems are also known as Research Information Management or RIM Systems (RIMS).
Features
The data model underpinning a CRIS relies on a set of basic entities as defined by the Common European Research Information Format (CERIF ) model maintained by the non-profit organisation euroCRIS.
The links connecting these entities provide a standardised semantic layer that provides consistency to the data model. The basic CERIF entities are people, organisations, projects and outputs (publications, research data, patents). Further second-level entities in the comprehensive snapshot of research provided by CERIF are for instance funding, research facilities and equipment or skills.
System interoperability lies at the core of CRIS operation, both from an internal and an external viewpoint. Internally, information is exchanged between the multiple information-gathering systems at institutions (HR systems, project management tools, finance management systems, etc.) and the one-stop-shop CRIS where all the institutional research information is kept. From an external interoperability perspective, metadata need to be exchanged between the systems at research-performing organisations where the research is actually conducted and the systems run by research funders and governmental bodies in charge of research assessment processes. By providing a standard approach to information description, the CERIF model becomes a key feature for enabling this system interoperability.
A particularly important area of system interoperability is CRIS/IR interoperability, i.e. the information exchange workflows between Current Research Information Systems and Institutional Repositories. While these two kinds of systems were once seen as competing with each other, nowadays they tend to work together via efficient mechanisms for information exchange around research outputs and their associated metadata. Recent developments in furthering the interoperability between these systems has led to their merging into a single CRIS/repository systems. This is the so-called CRIS/repository integration.
CRIS surveys are regularly conducted in order to capture a snapshot of what is traditionally a swiftly evolving landscape. In 2016 EUNIS and euroCRIS carried out a survey and published a report on CRIS/IR interoperability in Europe. An extension of this survey was jointly conducted by OCLC Research and euroCRIS on a worldwide basis in 2018 that resulted in the Dec 2018 report “Practices and Patterns in Research Information Management: Findings from a Global Survey”. Besides highlighting the key influence of national-level research assessment exercises on the availability of CRIS systems in a country, the report states th |
https://en.wikipedia.org/wiki/Shape%20analysis%20%28program%20analysis%29 | In program analysis, shape analysis is a static code analysis technique that discovers and verifies properties of linked, dynamically allocated data structures in (usually imperative) computer programs. It is typically used at compile time to find software bugs or to verify high-level correctness properties of programs. In Java programs, it can be used to ensure that a sort method correctly sorts a list. For C programs, it might look for places where a block of memory is not properly freed.
Applications
Shape analysis has been applied to a variety of problems:
Memory safety: finding memory leaks, dereferences of dangling pointers, and discovering cases where a block of memory is freed more than once.
Finding array out-of-bounds errors
Checking type-state properties (for example, ensuring that a file is open() before it is read())
Ensuring that a method to reverse a linked list does not introduce cycles into the list
Verifying that a sort method returns a result that is in sorted order
Example
Shape analysis is a form of pointer analysis, although it is more precise than typical pointer analysis. Pointer analysis attempts to determine the set of objects to which a pointer can point (called the points-to set of the pointer). Unfortunately, these analysis are necessarily approximate (since a perfectly precise static analysis could solve the halting problem). Shape analysis can determine smaller (more precise) points-to sets.
Consider the following simple C++ program.
Item *items[10];
for (int i = 0; i < 10; ++i) {
items[i] = new Item(...); // line [1]
}
process_items(items); // line [2]
for (int i = 0; i < 10; ++i) {
delete items[i]; // line [3]
}
This program builds an array of objects, processes them in some arbitrary way, and then deletes them. Assuming that the process_items function is free of errors, it is clear that the program is safe: it never references freed memory, and it deletes all the objects that it has constructed.
Unfortunately, most pointer analyses have difficulty analyzing this program precisely. In order to determine points-to sets, a pointer analysis must be able to name a program's objects. In general, programs can allocate an unbounded number of objects; but in order to terminate, a pointer analysis can only use a finite set of names. A typical approximation is to give all the objects allocated on a given line of the program the same name. In the example above, all the objects constructed at line [1] would have the same name. Therefore, when the delete statement is analyzed for the first time, the analysis determines that one of the objects named [1] is being deleted. The second time the statement is analyzed (since it is in a loop) the analysis warns of a possible error: since it is unable to distinguish the objects in the array, it may be that the second delete is deleting the same object as the first delete. This warning is spurious, and the goal of shape analysis is to avoid such warnings.
Summarizat |
https://en.wikipedia.org/wiki/The%20One%20with%20Ross%20and%20Monica%27s%20Cousin | "The One with Ross and Monica's Cousin" is the nineteenth episode of Friends seventh season. It first aired on the NBC network in the United States on April 19, 2001.
The Daily Beast included the episode in their list of 15 Times 'Friends' Was Really, Really Weird, due to Ross' crush on his cousin.
Plot
Joey auditions for a big movie role which requires him to appear naked. A problem arrives, however, when the part calls for an uncircumcised man. Monica helps Joey try to get the part by making replicas of things on the outside of the body using various meats and silly putty. Joey goes to his audition, which goes well until a part of the replica falls off, horrifying the director and casting director.
Rachel and Phoebe plan Monica's bridal shower at the last minute. The two had completely forgotten until Monica reminds them, so are left to make quick decisions for a party within two days. Arbitrarily calling people from Monica's address book Phoebe takes from her purse results in a weird crowd neither of them knows and they both forget to invite the bride. When Monica arrives, she accidentally bad mouths the guests under the belief that they left before she arrived.
Ross and Monica's cousin, Cassie, visits, and Chandler becomes attracted to her. As a result, she moves from Monica's to Ross' apartment. Unfortunately, Ross gets smitten by her looks as well. When he and Cassie are watching a movie together, Ross gets the impression that Cassie wants to have sex with him, so he reaches out to kiss her. Horrified, she storms out of the apartment. Cassie finally stays at Phoebe's, but she is smitten by her looks as well.
Reception
Sam Ashurst from Digital Spy ranked the episode #148 on their ranking of the 236 Friends episodes, writing that it had an "amusing twist ending".
The Independent writer Clémence Michallon ranked the episode #206 on their ranking of the 236 Friends episodes.
CollegeHumor writer Willie Muse had a negative opinion on "The One with Ross and Monica's Cousin", due to him considering Ross' move on his cousin to be one of the worst things he ever did.
Grantland writer Sam Hockley-Smith thought that the show jumped the shark with this episode, as he considered Ross' crush on his cousin to be one of his most embarrassing moments.
References
Friends (season 7) episodes |
https://en.wikipedia.org/wiki/Pointer%20analysis | In computer science, pointer analysis, or points-to analysis, is a static code analysis technique that establishes which pointers, or heap references, can point to which variables, or storage locations. It is often a component of more complex analyses such as escape analysis. A closely related technique is shape analysis.
This is the most common colloquial use of the term. A secondary use has pointer analysis be the collective name for both points-to analysis, defined as above, and alias analysis. Points-to and alias analysis are closely related but not always equivalent problems.
Example
For the following example program, a points-to analysis would compute that the points-to set of p is {x, y}.
int x;
int y;
int* p = unknown() ? &x : &y;
Introduction
As a form of static analysis, fully precise pointer analysis can be shown to be undecidable. Most approaches are sound, but range widely in performance and precision. Many design decisions impact both the precision and performance of an analysis; often (but not always) lower precision yields higher performance. These choices include:
Field sensitivity (also known as structure sensitivity): An analysis can either treat each field of a struct or object separately, or merge them.
Array sensitivity: An array-sensitive pointer analysis models each index in an array separately. Other choices include modelling just the first entry separately and the rest together, or merging all array entries.
Context sensitivity or polyvariance: Pointer analyses may qualify points-to information with a summary of the control flow leading to each program point.
Flow sensitivity: An analysis can model the impact of intraprocedural control flow on points-to facts.
Heap modeling: Run-time allocations may be abstracted by:
their allocation sites (the statement or instruction that performs the allocation, e.g., a call to malloc or an object constructor),
a more complex model based on a shape analysis,
the type of the allocation, or
one single allocation (this is called heap-insensitivity).
Heap cloning: Heap- and context-sensitive analyses may further qualify each allocation site by a summary of the control flow leading to the instruction or statement performing the allocation.
Subset constraints or equality constraints: When propagating points-to facts, different program statements may induce different constraints on a variable's points-to sets. Equality constraints (like those used in Steensgaard's algorithm) can be tracked with a union-find data structure, leading to high performance at the expense of the precision of a subset-constraint based analysis (e.g., Andersen's algorithm).
Context-Insensitive, Flow-Insensitive Algorithms
Pointer analysis algorithms are used to convert collected raw pointer usages (assignments of one pointer to another or assigning a pointer to point to another one) to a useful graph of what each pointer can point to.
Steensgaard's algorithm and Andersen's algorithm are common |
https://en.wikipedia.org/wiki/Covariant%20return%20type | In object-oriented programming, a covariant return type of a method is one that can be replaced by a "narrower" type when the method is overridden in a subclass. A notable language in which this is a fairly common paradigm is C++.
C# supports return type covariance as of version 9.0. Covariant return types have been (partially) allowed in the Java language since the release of JDK5.0, so the following example wouldn't compile on a previous release:// Classes used as return types:
class A {
}
class B extends A {
}
// "Class B is narrower than class A"
// Classes demonstrating method overriding:
class C {
A getFoo() {
return new A();
}
}
class D extends C {
// Overriding getFoo() in parent class C
B getFoo() {
return new B();
}
}
More specifically, covariant (wide to narrower) or contravariant (narrow to wider) return type refers to a situation where the return type of the overriding method is changed to a type related to (but different from) the return type of the original overridden method. The relationship between the two covariant return types is usually one which allows substitution of the one type with the other, following the Liskov substitution principle. This usually implies that the return types of the overriding methods will be subtypes of the return type of the overridden method. The above example specifically illustrates such a case. If substitution is not allowed, the return type is invariant and causes a compile error.
Another example of covariance with the help of built in Object and String class of Java:
class Parent {
public Object getFoo() {
return null;
}
}
class Child extends Parent {
// String is child of the greater Object class
public String getFoo() {
return "This is a string";
}
// Driver code
public static void main(String[] args) {
Child child = new Child();
System.out.println(child.getFoo());
}
}
See also
Covariance and contravariance (computer science)
External links
Covariant Return Types in C++
References
Method (computer programming) |
https://en.wikipedia.org/wiki/Education%20in%20Flanders | The education in the Flemish Community covers the Dutch-speaking part of Belgium and consists of three networks (netten): government-provided education (gemeenschapsonderwijs), subsidized public schools (by provinces and municipalities) and subsidized free schools (mainly affiliated to the Catholic church).
Generally
In the past there were conflicts between state schools and Catholic schools (de schoolstrijd), and disputes regarding whether the Catholic schools' should be funded by the government. The 1958 School Pact was an agreement by the three large political parties (the Christian Democratic, Socialist and Liberal parties) to end these conflicts.
Due to the federalization of Belgium, education is organised by the three communities since 1989. Since then, the Flemish Government organises education in the Flemish Region as well as in the bilingual Brussels-Capital Region where the Government of the French Community is also responsible. The Flemish Community organises the Dutch-language education but has to provide French-language schools in the 12 municipalities with language facilities within the Flemish Region.
The federal level only regulates a few general matters: the start and end of compulsory education (which is between the ages of 6 and 18), the minimal conditions for issuing diplomas, and the pension scheme. Article 24 of the Belgian Constitution furthermore guarantees free education, the right of parents to choose their school and the (philosophical, ideological and religious) neutrality of government-provided schools. These state schools have to provide the choice between the teaching of one of the recognized religions and non-denominational moral teaching.
Networks
Education is organised through three networks.
First, there are state schools directly provided by the Flemish government, which is called Gemeenschapsonderwijs (literally "community education"), stylised as "GO!", education of the Flemish Community. They are both primary and secondary schools as well as adult education centres. Most secondary schools are commonly named (Koninklijk) Atheneum ("(Royal) Atheneum"), most of which were built in the 1960s during the schoolstrijd ("school struggle") in Belgium. One of the oldest athenea is the Royal Atheneum of Antwerp, which exists since 1808.
Secondly, there are subsidized public schools (officieel gesubsidieerd onderwijs), which are public schools organized by provinces and municipalities. Those provided by the municipalities are coordinated through the Education Secretariat of the Cities and Municipalities of the Flemish Community (Onderwijssecretariaat van de Steden en Gemeenten van de Vlaamse Gemeenschap; OVSG). This network also includes a few schools organised by the Flemish Community Commission (VGC) in Brussels.
Lastly, there are subsidized free schools (vrij gesubsidieerd onderwijs), which is with about 70% of the pupils by far the largest group. They are mainly organized by an organization affiliated to |
https://en.wikipedia.org/wiki/ROM%20Mark | In computing, ROM Mark or BD-ROM Mark is a serialization technology designed to guard against mass production piracy or the mass duplication and sale of unauthorized copies of pre-recorded Blu-ray Discs. Only licensed BD-ROM manufacturers have access to the equipment that can make these unique ROM Marks, thus allowing authentic BD-ROM media like movies and music to be identified.
The ROM Mark contains the Volume ID required to decrypt content encrypted using AACS.
See also
Burst Cutting Area
Notes
References
Panasonic, Philips, Sony. 3C BD-ROM Mark Specification.
Edmonds, Robert A.; (Saratoga, CA) ; McDonnell, Kevin J.; (Pleasanton, CA) ; Meulder, Johan De; (Kessel, BE). "Method and apparatus for identifying a digital recording source".
MPAA. "Digital Content Protection Status Report". IRMA Annual Recording Media Forum. (PowerPoint file, via The Internet Archive)
CDRInfo. "Blu-ray Disc Marking System Explained".
CDRInfo. "DaTARIUS DaTABANK Reads BD-ROM Mark".
Blu-ray Disc
Optical disc authoring
Compact Disc and DVD copy protection |
https://en.wikipedia.org/wiki/Inside%20the%20Box | Inside the Box is a Canadian television game show which debuted on September 18, 2006, on the cable network TVtropolis, and was syndicated in the United States by Program Partners in the 2008 television season. In the show, three contestants compete for a chance to win up to by trying to guess television shows, characters, or actors by asking the other contestants either yes or no questions related to the subject. The show ran for two seasons, ending on December 7, 2007.
The series was created by Michael Geddes and Christopher Geddes of Lone Eagle Entertainment in Toronto, Ontario, and is hosted by actor/comedian Sam Kalilieh. The two were also producers of two other game shows, Game On and You Bet Your Ass.
Gameplay
The game has a similar format to 20 Questions, with a few minor twists. Three rounds in total are played. Three contestants compete for a chance at CA$10,000. In the first two rounds, each contestant gets a turn inside a television-shaped booth called "The Box" which contains 2 monitors, while the other two players are seated at separate desks with single monitors facing and to the left and right of "The Box". The contestant "Inside the Box" is given a basic category to indicate what kind of an answer is being sought (for example, "Series", "Reality Series", "Male Actor", "Female Character", etc.), a list of questions on a touch-sensitive screen and reads questions selected from the list to one of their two opponents. Answers are usually derived from American pop culture. The opponents outside The Box are shown only a photograph and the name of the character/actor/show which is the correct answer on their monitor screens.
The contestant in the booth has two minutes to determine the correct answer by alternately asking their opponents the "Yes or No" questions they are shown. If an opponent answers the question incorrectly, they are given a time penalty of 5 seconds. Each Yes-response question is displayed on screen for the viewers to see and on the second screen in The Box, regardless of whether the player outside the Box answered correctly or not. After each group of 5 "Yes" responses, the clock is stopped, new questions are made available to the Box contestant and a more detailed clue is given. The player in the Box is given a free guess, but if they can't correctly answer, the clock resumes and they must continue asking questions. The contestant continues to ask questions until either time runs out, or they are able to give a correct answer. The player in The Box may ask at any time for the clock to be stopped so they can attempt a guess, but an incorrect guess under these conditions results in a 5-second penalty. After each player's turn in The Box, the scores are totalled and time penalties assessed; then the remaining contestants are given their turn in The Box.
The scoring is based on time; for instance, if a player correctly identifies the answer with 35 seconds to spare, those 35 seconds are added to their score. Any t |
https://en.wikipedia.org/wiki/Near%20Caves | The Near Caves or the Caves of Saint Anthony (, Blyzhni pechery; , Blizhnie peschery) are historic caves and a network of tunnels of the medieval cave monastery of Kyiv Pechersk Lavra in Kyiv, the capital of Ukraine. The Near Caves have a total length of 383 metres and are 5 to 20 metres deep (see map).
The Near Caves were founded when in 1057, Saint Varlaam was appointed as the first hegumen (abbot) of the Kyiv Pechersk Lavra by Saint Anthony. Monk Anthony withdrew himself from the monastery and later settled on a new hill, where he dug out a new underground cell, now called the Near Caves.
Constructions
The Near Caves contain the underground Church of Saint Anthony, the Church of the Entry of the Mother of God into the Temple, and the Saint Varlaam Church. The caves also have a total of 79 surviving burials, among them being Nestor the Chronicler, the icon artists Alipy and Grigory, the doctor Agapit, the prince-ascetic Nikolai Sviatosha, the holy martyr Kuksha, as well as the remains of the epic hero Ilya Muromets. During the examination of the remains, it was established that Ilya Muromets had died from a stab wound. According to a legend, a force of angels transported him from the place where he had died to the Lavra caverns.
The Near Cave's main temple is the Church of the Elevation of the Cross (Khrestovozdvizhenska), which was constructed in the Ukrainian Baroque style from 1700-1704. The church's carved icons of 1769 have survived to this day. From the 19th century, the church served as a burial vault for the Kyiv Metropolitans. The old refectory of the church is connected to the brother's cells, a Neoclassical style building with a four-column portico dating from the 1830s.
At the foot of the hill stands the Near Cave's belltower, which was designed and constructed by architect Stepan Kovnir in 1760. Also, the headstones of a number of well-known Kyivans can be seen in front of the Khrestovozdvizhenska Church, namely, the headstone of the general-governor Aleksandr Bezak, which was designed by architect Mikhail Ikonnikov in 1860).
Beneath the Near Caverns, two old draw-wells were recently discovered. According to the legend one of them was dug by Saint Anthony and the other by his best-known disciple, Theodosius of Kyiv. Beside the draw-wells, a chapel was built, now known as the Church of the Life-Giving Spring, built in honour of the Icon of the Mother God.
See also
:Category:Burials at the Near Caves, Kyiv Pechersk Lavra
Saint Anthony's Caves
Notes
References
lavra.ua - Map of Kyiv Pechersk Lavra near caverns, in Ukrainian
Kyiv Pechersk Lavra
Caves of Ukraine
Eastern Orthodox church buildings in Ukraine
Buildings and structures in Kyiv
11th-century Eastern Orthodox church buildings
Christian monasteries established in the 11th century |
https://en.wikipedia.org/wiki/TSMP | TSMP, an acronym for Time Synchronized Mesh Protocol, was developed by Dust Networks as a communications protocol for self-organizing networks of wireless devices called motes. TSMP devices stay synchronized to each other and communicate in time-slots, similar to other TDM (time-division multiplexing) systems. Such deterministic communication allows the devices to stay extremely low power, as the radios only turn on for the periods of scheduled communication. The protocol is designed to operate very reliably in a noisy environment. It uses channel hopping to avoid interference -- the packets between TSMP devices get sent on different radio channels depending on time of transmission. TSMP distinguishes itself from other time-slotted mesh-based protocols, in that time-slot timing is maintained continuously and enables a network to duty-cycle on a transmitter-receiver pair-wise basis, as opposed to putting the entire network to sleep for extended periods of time (as is done in a beacon-based protocol, such as DigiMesh).
Dust Networks' underlying time synchronized mesh networking technology has been standardized by the HART Communications Foundation with the WirelessHART protocol, the International Society of Automation ISA100 standard and in internet protocol standards, such as IEEE802.15.4E MAC layer, and IETF 6TiSCh.
Time synchronized mesh networking is marketed for applications that require reliability and ultra long battery life, typically measured in years.
It is intended for the industrial market for manufacturing-process monitoring and control.
See also
Wireless sensor network
External links
TSMP Whitepaper (archived webpage as of October 2006
DigiMesh
Kristofer S. J. Pister and Lance Doherty, TSMP: Time Synchronized Mesh Protocol, Proceedings of the IASTED International Symposium on Distributed Sensor Networks (DSN08), November 2008, Orlando, Florida, USA.
Wireless sensor network |
https://en.wikipedia.org/wiki/E44 | E44, E-44 or E.44 may refer to:
Transportation
European route E44, a road part of the E-road network
E 44 road (United Arab Emirates)
PRR E44, an American electric road switcher locomotive built for the Pennsylvania Railroad
Kushiro Sotokan Road and Nemuro Road, route E44 in Japan
Military
HMS E44, a World War I-era British E-class submarine |
https://en.wikipedia.org/wiki/CBAF-FM-5 | CBAF-FM-5 is a French-language public radio station located in Halifax, Nova Scotia. It is part of the Ici Radio-Canada Première Network.
Owned and operated by the Canadian Broadcasting Corporation, it broadcasts at 92.3 MHz with an effective radiated power of 91,000 watts, using horizontal polarization. It is a Class C station using a non-directional antenna. The broadcast tower is located on Washmill Lake Drive in Clayton Park. The studios and offices are located on Chebucto Road in Halifax. The station also serves as the Première outlet for the Island of Newfoundland, by way of two repeaters.
Programming
The station has an ad-free news/talk format and is part of the Ici Radio-Canada Première network, which operates across Canada. Like all Première stations, but unlike most FM stations, it broadcasts in mono.
The station produces a morning drive time show (Le Réveil, Monday to Friday from 6 to 9 a.m.) and a Saturday morning fill-in show (Ça se passe ICI from 11 a.m. to 12 p.m.). An afternoon drive time program, L'heure de pointe Acadie comes from CBAF-FM Moncton, which also airs on CBAF-FM-15 in Charlottetown, Prince Edward Island.
History
The station signed on in 1979 as a rebroadcaster of CBAF 1300 in Moncton. In 1987, it became a separate station, despite retaining a rebroadcaster-like call sign.
CBAF-FM-5 was originally identified as CBAF-19-FM. The call sign change took effect on September 1, 1989.
At that time, the old 1300 signal of CBAF was shut down.
Transmitters
References
External links
Ici Radio-Canada Première
(full list)
BAF
BAF
BAF
BAF
Radio stations established in 1979
1979 establishments in Nova Scotia |
https://en.wikipedia.org/wiki/Rescue%20Heroes%3A%20The%20Movie | Rescue Heroes: The Movie is a 2003 Canadian direct-to-video computer animated film based on the TV series Rescue Heroes.
Plot
After rescuing the citizens of Berkheiser, North Dakota from an earthquake, the Rescue Heroes are sent to Ecuador to evacuate two reporters who are trapped in a crashed helicopter following an eruption of the Mount Sangay volcano. While climbing the volcano, Rocky Canyon, out of overconfidence, neglects to use the piton gloves, resulting in both him and Billy Blazes falling off the mountain. He brings Billy to safety and the two are able to rescue the reporters. Billy later reprimands Rocky for both his recklessness and for not relying on his teammates for help.
Meanwhile, a series of atypical thunderstorms begins to occur around the world, resulting in numerous natural disasters on a global scale. Billy dispatches the Rescue Heroes around the world to deal with these events, and reluctantly sends Rocky to Geis, Switzerland to act as backup following a major avalanche. While rescuing a snowboarder, Rocky deviates from orders and takes a dangerous path down the mountain, consequently coming into the path of another avalanche. Both Rocky and the snowboarder are able to escape safely, but Billy suspends Rocky from field duty. While Billy attempts to repair a damaged dam on the Pa Sak River in Thailand, he suddenly blacks out, causing the dam to collapse and the river to flood. Billy falls ill and loses consciousness, but is rescued by Jack Hammer, who puts a rope on the Hyperjet, bringing Billy safely away from the damaged dam.
The Rescue Heroes identify that the storms originated from Sangay; and deduce that the lightning is a product of a previously unidentified magnetic element in the volcanic ash. The storms are being drawn north by the Earth's magnetic field and, when they converge, they will explode, resulting in global cataclysm. Meanwhile, Rocky discovers that Billy's illness is due to a poisonous plant he came in contact with during the Sangay mission. Blaming himself for Billy's injury, Rocky volunteers to go with Wendy Waters to recover the plant's root from the volcano to cure Billy.
Rocky is given permission to go with Wendy to retrieve the antidote. They tell Matt Medic that they are bringing Billy in the Hyperjet back to Ecuador in order to retrieve the antidote, which Matt agrees. While in the Hyperjet, Rocky deduces that a message he heard from Billy earlier, "out of many, one," was referring to lightning bolts, and that the storms can be stopped by using a lightning rod to ground their electricity. He tells the other Rescue Heroes and Jake Justice contacts the United Nations, resulting in both the rescue Heroes and countries working together to build an enormous, mile-high lightning rod in Greenland.
During the construction, Jack Hammer is injured and the Rescue Heroes’ jet cable is fused to the top of the tower by a lightning strike. Rocky and a cured Billy are able to rescue Jack and disconnect the ca |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.