source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/Information%20integration
Information integration (II) is the merging of information from heterogeneous sources with differing conceptual, contextual and typographical representations. It is used in data mining and consolidation of data from unstructured or semi-structured resources. Typically, information integration refers to textual representations of knowledge but is sometimes applied to rich-media content. Information fusion, which is a related term, involves the combination of information into a new set of information towards reducing redundancy and uncertainty. Examples of technologies available to integrate information include deduplication, and string metrics which allow the detection of similar text in different data sources by fuzzy matching. A host of methods for these research areas are available such as those presented in the International Society of Information Fusion. Other methods rely on causal estimates of the outcomes based on a model of the sources. See also Data fusion (is a subset of Information integration) Sensor fusion Data integration Image fusion Synesthesia Books Springer, Information Fusion in Data Mining (2003), H. B. Mitchell, Multi-sensor Data Fusion – An Introduction (2007) Springer-Verlag, Berlin, S. Das, High-Level Data Fusion (2008), Artech House Publishers, Norwood, MA, and 1596932813 E. P. Blasch, E. Bosse, and D. A. Lambert, High-Level Information Fusion Management and System Design (2012), Artech House Publishers, Norwood, MA. | References External links Discriminant Correlation Analysis (DCA) Information Integration Using Logical View LNCS 1997. International Society of Information Fusion Data management ar:تكامل البيانات de:Informationsintegration
https://en.wikipedia.org/wiki/Deduplication
The term deduplication refers generally to eliminating duplicate or redundant information. Data deduplication, in computer storage, refers to the elimination of redundant data Record linkage, in databases, refers to the task of finding entries that refer to the same entity in two or more files
https://en.wikipedia.org/wiki/Girly%20Edition
"Girly Edition" is the twenty-first episode in the ninth season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on April 19, 1998. In the episode, Lisa and Bart Simpson must co-anchor a new news program, though when Bart is seen as a more successful news anchor, Lisa becomes jealous and seeks revenge. Meanwhile, in the subplot, Homer Simpson gets a monkey helper because of his laziness. "Girly Edition" was the first episode written by Larry Doyle and was directed by Mark Kirkland. Much of the subplot was inspired by the film Monkey Shines. Critics gave the episode positive reviews and it is also one of Yeardley Smith's favorite episodes of the series. Plot After Groundskeeper Willie takes away Bart's skateboard for destroying his leaf pile, Bart fills up Willie's shack with creamed corn as he is sleeping, destroying it. As Willie is taken away for medical attention, he swears revenge on Bart. Meanwhile, Krusty the Clown's show comes under criticism by the Federal Communications Commission for not being educational enough for children. The Channel 6 executive proposes that Krusty cut 10 minutes from his show to make room for a kids' news program, Kidz Newz, where children deliver and report news items. Lisa is recruited as a news anchor along with other Springfield Elementary School children. Bart is not chosen at first, but is made sportscaster after he complains to Marge. Lisa is deemed to be boring by the channel's staff, though they are impressed by Bart's performance. Bart is then promoted to be the co-anchor, causing Lisa to become jealous and resentful. After Bart hears Lisa talking behind his back, he seeks advice from Kent Brockman, who teaches him about the power of human interest stories. Bart becomes successful after creating a segment called "Bart's People", which Lisa disapproves of due to its sappy, emotionally manipulative content. She attempts to copy the segment, but is twice hampered by the Crazy Cat Lady. In a plot to expose Bart's insincerity, she writes and sends a letter, purportedly from an immigrant living in a junkyard who wants to be featured as one of Bart's People. Bart rushes to the city dump to do a live broadcast but is attacked by Willie, who has been living there since his shack was destroyed. Feeling guilty for putting Bart in danger, Lisa hurries to the dump and saves him by using some of his own methods to appeal to Willie's emotions. Bart and Lisa decide to combine their talents in order to get children to really care about the news, only to have Kidz Newz canceled immediately afterward and replaced by a cartoon show intended to sell candy and toys. Meanwhile, Homer discovers that Apu has been wounded in a robbery at the Kwik-E-Mart and has obtained a helper monkey to assist in running the store while he recovers. Homer gets a monkey of his own named Mojo to help around the house, but Mojo instead picks up Homer's bad habits and becomes
https://en.wikipedia.org/wiki/Edwin%20Holmes%20%28inventor%29
Edwin Holmes (April 25, 1820 – 1901) was an American businessman who is credited with inventing, commercializing the electromagnetic burglar alarm and with establishing the first burglar alarm networks. Biography Holmes was born in West Boylston, Massachusetts, to Sally Graves and Thomas Holmes. His father was from New Hampshire where he served as the town postmaster. Holmes married Eliza Ann Richardson. They had four children (two boys and two girls). One girl was Titanic survivor Ella Holmes White. Edwin started his business in 1849 in Boston, as a seller of household items and entrepreneur, and acquired skills which later helped him in establishing the burglar alarm industry. Burglar alarm The alarm was patented in 1853 by the Reverend Augustus Russell Pope (1819–1858) of Somerville, Massachusetts. Edwin Holmes acquired Pope's patent rights in 1857 for US$1500 and manufactured the device in his factory in Boston, Massachusetts. He began to sell them in 1858. His son Edwin Thomas Holmes took over his father's company after his death and documented the events in his biography, A Wonderful Fifty Years. Initially, people were fearful of and skeptical about using electricity for alarms, and the business did not go well. Therefore, in 1859, in search of a new and bigger market Holmes moved his business to New York, which was then perceived as a place where "all the country's burglars made their home". There, by 1866 he installed 1,200 home alarms and began successful marketing among business enterprises. By 1877, he established the first network of alarms monitored by a central station in New York and sent his son to copy this system in Boston. Edwin Thomas, however, discovered that the network could use the pre-existing phone cables instead of laying its own. In this way, he quickly assembled a 700-alarm network, which his father then copied in New York. In 1878, Holmes became the president of the newly established Bell Phone Company. While he sold his interests two years later for US$100,000, he kept his rights to use the company phone lines for his alarm system. The use of electricity for street lights in 1880 changed the market, as people started accepting electrical models. The American Telephone and Telegraph Company bought the Holmes Burglar business in 1905, linking it to emergency call systems for contacting police and fire fighting personnel. After World War II, many inventions were introduced into the business of home alarm systems. It became less expensive and more versatile for use in the 1980s and by the middle of the 1990s the system had become a standard feature. In the most advanced examples of anti-burglary systems, motion detectors, surveillance equipment and electronic tracking devices are being used. See also American District Telegraph References 19th-century American inventors 1820 births 1901 deaths
https://en.wikipedia.org/wiki/Neuro-fuzzy
In the field of artificial intelligence, the designation neuro-fuzzy refers to combinations of artificial neural networks and fuzzy logic. Overview Neuro-fuzzy hybridization results in a hybrid intelligent system that combines the human-like reasoning style of fuzzy systems with the learning and connectionist structure of neural networks. Neuro-fuzzy hybridization is widely termed as fuzzy neural network (FNN) or neuro-fuzzy system (NFS) in the literature. Neuro-fuzzy system (the more popular term is used henceforth) incorporates the human-like reasoning style of fuzzy systems through the use of fuzzy sets and a linguistic model consisting of a set of IF-THEN fuzzy rules. The main strength of neuro-fuzzy systems is that they are universal approximators with the ability to solicit interpretable IF-THEN rules. The strength of neuro-fuzzy systems involves two contradictory requirements in fuzzy modeling: interpretability versus accuracy. In practice, one of the two properties prevails. The neuro-fuzzy in fuzzy modeling research field is divided into two areas: linguistic fuzzy modeling that is focused on interpretability, mainly the Mamdani model; and precise fuzzy modeling that is focused on accuracy, mainly the Takagi-Sugeno-Kang (TSK) model. Although generally assumed to be the realization of a fuzzy system through connectionist networks, this term is also used to describe some other configurations including: Deriving fuzzy rules from trained RBF networks. Fuzzy logic based tuning of neural network training parameters. Fuzzy logic criteria for increasing a network size. Realising fuzzy membership function through clustering algorithms in unsupervised learning in SOMs and neural networks. Representing fuzzification, fuzzy inference and defuzzification through multi-layers feed-forward connectionist networks. It must be pointed out that interpretability of the Mamdani-type neuro-fuzzy systems can be lost. To improve the interpretability of neuro-fuzzy systems, certain measures must be taken, wherein important aspects of interpretability of neuro-fuzzy systems are also discussed. A recent research line addresses the data stream mining case, where neuro-fuzzy systems are sequentially updated with new incoming samples on demand and on-the-fly. Thereby, system updates not only include a recursive adaptation of model parameters, but also a dynamic evolution and pruning of model components (neurons, rules), in order to handle concept drift and dynamically changing system behavior adequately and to keep the systems/models "up-to-date" anytime. Comprehensive surveys of various evolving neuro-fuzzy systems approaches can be found in and. Pseudo outer-product based fuzzy neural networks Pseudo outer product-based fuzzy neural networks (POPFNN) are a family of neuro-fuzzy systems that are based on the linguistic fuzzy model. Three members of POPFNN exist in the literature: POPFNN-AARS(S), which is based on the Approximate Analogical Reasoning Sche
https://en.wikipedia.org/wiki/Eric%20Hehner
Eric "Rick" C. R. Hehner (born 16 September 1947) is a Canadian computer scientist. He was born in Ottawa. He studied mathematics and physics at Carleton University, graduating with a Bachelor of Science (B.Sc.) in 1969. He studied computer science at the University of Toronto, graduating with a Master of Science (M.Sc.) in 1970, and a Doctor of Philosophy (Ph.D.) in 1974. He then joined the faculty there, becoming a full professor in 1983. He became the Bell University Chair in software engineering in 2001, and retired in 2012. Hehner's main research area is formal methods of software design. His method, initially called predicative programming, later called Practical Theory of Programming, is to consider each specification to be a binary (boolean) expression, and each programming construct to be a binary expression specifying the effect of executing the programming construct. Refinement is just implication. This is the simplest formal method, and the most general, applying to sequential, parallel, stand-alone, communicating, terminating, nonterminating, natural-time, real-time, deterministic, and probabilistic programs, and includes time and space bounds. This idea has influenced other computer science researchers, including Tony Hoare. Hehner's other research areas include probabilistic programming, unified algebra, and high-level circuit design. In 1979, Hehner invented a generalization of radix complement called quote notation, which is a representation of the rational numbers that allows easier arithmetic and precludes roundoff error. He was involved with developing international standards in programming and informatics, as a member of the International Federation for Information Processing (IFIP) IFIP Working Group 2.1 on Algorithmic Languages and Calculi, which specified, maintains, and supports the programming languages ALGOL 60 and ALGOL 68. and of IFIP Working Group 2.3 on Programming Methodology. References External links DBLP publications A Practical Theory of Programming, Professor Hehner's book, available free in PDF Eric Hehner archival papers held at the University of Toronto Archives and Records Management Services 1947 births Canadian computer scientists Formal methods people Living people Carleton University alumni University of Toronto alumni Academic staff of the University of Toronto
https://en.wikipedia.org/wiki/John%20C.%20Reynolds
John Charles Reynolds (June 1, 1935 – April 28, 2013) was an American computer scientist. Education and affiliations John Reynolds studied at Purdue University and then earned a Doctor of Philosophy (Ph.D.) in theoretical physics from Harvard University in 1961. He was a professor of information science at Syracuse University from 1970 to 1986. From then until his death, he was a professor of computer science at Carnegie Mellon University. He also held visiting positions at Aarhus University (Denmark), The University of Edinburgh, Imperial College London, Microsoft Research (Cambridge, UK) and Queen Mary University of London. Academic work Reynolds's main research interest was in the area of programming language design and associated specification languages, especially concerning formal semantics. He invented the polymorphic lambda calculus (System F) and formulated the property of semantic parametricity; the same calculus was independently discovered by Jean-Yves Girard. He wrote a seminal paper on definitional interpreters, which clarified early work on continuations and introduced the technique of defunctionalization. He applied category theory to programming language semantics. He defined the programming languages Gedanken and Forsythe, known for their use of intersection types. He worked on a separation logic to describe and reason about shared mutable data structures. Reynolds created an elegant, idealized formulation of the programming language ALGOL, which exhibits ALGOL's syntactic and semantic purity, and is used in programming language research. It also made a convincing methodologic argument regarding the suitability of local effects in the context of call-by-name languages, in contrast with the global effects used by call-by-value languages such as ML. The conceptual integrity of the language made it one of the main objects of semantic research, along with Programming Computable Functions (PCF) and ML. He was an editor of journals such as the Communications of the ACM and the Journal of the ACM. In 2001, he was appointed a Fellow of the Association for Computing Machinery (ACM). He won the ACM SIGPLAN Programming Language Achievement Award in 2003, and the Lovelace Medal from the British Computer Society in 2010. Selected publications Books The Craft of Programming, Prentice Hall International, 1981. . Theories of Programming Languages, Cambridge University Press, 1998. . Articles References Further reading Olivier Danvy, Peter O'Hearn and Philip Wadler (editors), "Festschrift for John C. Reynolds's 70th Birthday". Theoretical Computer Science, 375(1–3):1–350, 1 May 2007. Editorial, pages 1–2. Stephen Brookes, Peter O'Hearn and Uday Reddy, "The Essence of Reynolds". POPL 2014, pages 251–256. External links Curriculum Vitae Program Verification and Semantics: Further Work (London, 2004) 1935 births 2013 deaths Harvard University alumni Purdue University alumni American computer scientists Formal methods peopl
https://en.wikipedia.org/wiki/Google%20WiFi
Google WiFi is a municipal wireless network deployed in Mountain View, California. It is entirely funded by Google and installed primarily on Mountain View lightposts. Google had committed to keeping the service free until 2010. The initial service was shut down by Google on May 3, 2014 at their Mountain View base, and provided a new public outdoor WiFi. Wireless access As of 2009, Google used over 500 Tropos Networks MetroMesh routers acting as access points mounted primarily on utility poles providing usable signal and broadband internet access to over 95% of the city's area of . As of 2009, it serves over 16,000 unique users each month and handles over 500 gigabytes of data in 24 hours. There are three aggregation points (or base stations) that all traffic is forwarded to. The radios in the access points offer both GoogleWiFi (which has no encryption) and GoogleWiFiSecure (which uses WPA to encrypt the over-the-air traffic) service set identifiers (SSID). Google WiFi only requires its end users have a Google Account. Google offers a free virtual private network (VPN) software client called Google Secure Access (GSA) and maintains a list of other recommended third-party VPN software packages. Unlike a residential gateway, the network does not use network address translation (NAT): it provides a routable IP Address from a DHCP pool with a one-hour "DHCP lease" under the DNS domain wifi.google.com directly to the client PC. A mobile laptop user can roam through Mountain View and maintain the same IP address for at least the one-hour lease time. While the equipment is of high quality and well-placed, actual coverage with a laptop with built-in Wi-Fi hardware is less than 100% of the claimed area; the system works well in commercially zoned areas but residential coverage areas are still spotty from block to block. There are areas in the city which do not have city owned light poles and thus do not have routers. Rollout The service was announced by Google on September 20, 2005 and the service went live on August 16, 2006. Google WiFi was available throughout most of Mountain View. Network decline Around the summer of 2012, the network declined significantly. Users in some neighborhoods could not get connections, and the connections that were obtained in other areas had problems. Mountain View stated, "The city has received many complaints in recent months regarding the performance and reliability of the free Google Wi-Fi system in Mountain View, particularly at our library." Computerworld reported that "An August field test by IDG News Service found it impossible to get a working connection at numerous points around the city, including City Hall and the main library." Users at the library do not use the Google WiFi connection but rather the wired Ethernet connections that the library makes available at many tables. The city does not know what is wrong with the network except that it does not work. Google believes that video streaming on
https://en.wikipedia.org/wiki/Rank%20%28J%20programming%20language%29
Rank is a generalization of looping as used in scalar (non-array-oriented) programming languages. It is also a generalization of mapcar in the language Lisp and map in modern functional programming languages, and a generalization of scalar extension, inner (matrix) product, and outer product in APL\360. The canonical implementation of rank may be the language J, but it is also available in Dyalog APL, the International Organization for Standardization (ISO) technical standard on Extended APL, and NARS2000. Rank has several different meanings. In general, the concept of rank is used to treat an orthogonal array in terms of its subarrays. For example, a two-dimensional array may be dealt with at rank 2 as the entire matrix, or at rank 1 to work with its implicit one-dimensional columns or rows, or at rank 0 to work at the level of its individual atoms. Noun rank – The rank of a noun is a nonnegative integer. Verb rank – The rank of a verb is a list of three integers. The rank conjunction – The rank conjunction (") is used to derive a verb with a specific rank. Rank as a generalization of looping Understanding rank requires knowing some very basic array-oriented programming concepts. In most array-based languages, reduction is denoted with a forward slash /. In J, the slash takes a left argument of the function and a right argument of the array to be reduced by that function. +/ 1 2 3 6 The result is 1 + 2 + 3, as expected. An N-dimensional integer array can also be created with i. which takes a vector of integers as its arguments. The number of integers defines the dimension and the absolute value of each integer defines the length of the corresponding dimension. i. 3 0 1 2 i. 2 3 0 1 2 3 4 5 i. 2 3 4 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Now let's reduce a two-dimensional array by addition. +/ i. 2 3 3 5 7 The result is 0 1 2 + 3 4 5, as expected. Reduction runs down each column, adding together all the numbers in that column. This application of +/ to a two-dimensional array corresponds to the C code fragment: for(j = 0; j < 3; ++j) { sum[j] = 0; } for(i = 0; i < 2; ++i) { for(j = 0; j < 3; ++j) { sum[j] += array[i][j]; } } Suppose we wanted to add up the items of each row, as in the C code fragment: for(i = 0; i < 2; ++i) { sum[i] = 0; for(j = 0; j < 3; ++j) { sum[i] += array[i][j]; } } To produce the result 3 12. We can do this in J without looping simply by using rank. +/"1 i. 2 3 3 12 To illustrate further how rank works in J, we can see the original expression is rank 2. The operator is mapped at the highest rank to the array. +/"2 i. 2 3 3 5 7 It is common to refer to the lower-dimensional arrays by these names, though they are disputed sometimes. {| class="wikitable" |- !style="text-align:center;" |Name !style="text-align:center;" |Rank |- |style="text-align:center;" |Atom or scalar |style="text-align:center;" |0 |- |style="
https://en.wikipedia.org/wiki/Computer-generated
Computer-generated usually refers to a sound or visual that has been created in whole or in part with the aid of computer software or computer hardware. Computer-generated may refer to: Computer animation Computer art Computer graphics Computer-generated holography Computer-generated imagery (CGI) Computer-generated music
https://en.wikipedia.org/wiki/Animax
, stylized as ANIMAX, is a Japanese animation satellite television network, dedicated to broadcasting anime programming. A subsidiary of Sony Pictures Entertainment Japan, it is headquartered in in Minato, Tokyo, Japan, with its co-founders and shareholders including Sony Pictures Entertainment Japan and studios Bandai Namco Filmworks, Toei Animation, TMS Entertainment, and production company Nihon Ad Systems. Animax is the first and largest 24-hour network in the world dedicated to anime. The channel also dubbed imported cartoons in Japanese language. Animax previously operated separate TV channels for Asia (four separate feeds for South East Asia, the Philippines, Hong Kong and Taiwan), South Asia and South Korea; in addition to either owning, or licensing its brand to, several television networks, programming blocks, and VOD platforms around the world. As of 2020, most of these services have either been sold off to third-parties or closed altogether. History Established on May 20, 1998 by Sony, originally premiered in Japan on July 1, the same year, across the SKY PerfecTV! satellite television platform. Headquartered in Minato, Tokyo, Japan, and presided by Masao Takiyama, Animax's shareholders and founders include Sony Pictures Entertainment (Japan), Sunrise, Toei Animation, TMS Entertainment, and NAS. Its founders also include noted anime producer and production designer Yoshirō Kataoka. The network began broadcasting in high definition from October 2009. Animax also exhibits affiliations with anime pioneer Osamu Tezuka's Tezuka Productions company, Pierrot, Nippon Animation, and numerous others. It has produced and exclusively premiered several anime in Japan, such as Ghost in the Shell: Stand Alone Complex, Ultra Maniac, Astro Boy, Hungry Heart: Wild Striker, Aishiteruze Baby, and many others, including Madhouse's anime adaptations of Marvel's Iron Man, Wolverine, and X-Men. Noted Japanese celebrities and personalities to have appeared on Animax with their own programs, include actress Natsuki Katō, among numerous others. The network's narrators are the voice actors Yukari Tamura and Kōsuke Okano, and from October 2007, Sayuri Yahagi. Animax also hosts and organizes several anime-based competitions across Japan, such as the Animax Taishō scriptwriting competition and Animax Anison Grand Prix anime song music competition, which are judged by a panel of noted anime figures, as well as several events and concerts across Japan, such as the annual , an annual live concert during which renowned Japanese bands, artists and voice actors perform to a live audience, often held at Zepp Tokyo. Apart from operating its business primarily as a television network, Animax has also begun operating a mobile television service. In February 2007, Animax announced that it would be launching a mobile television service of its network on the mobile phone company MOBAHO! from April 2007, having its programming being viewable by the company's mobile ph
https://en.wikipedia.org/wiki/Pacific%20Telegraph%20Company
The Pacific Telegraph Company was one of the organizations responsible for constructing the telegraph line which resulted in the first transcontinental telegraph network in the United States. The company built the section of line between Julesburg, Colorado Territory (where it connected with existing telegraph networks to the eastern United States) and Salt Lake City, Utah Territory. The Pacific Telegraph Company's line was completed on October 17, 1861 (although the first messages were not sent until October 18), allowing telegraphic messages from Salt Lake City to reach the eastern United States. The Overland Telegraph Company's line from California reached the telegraph office in downtown Salt Lake City on October 24, 1861, completing the transcontinental network. The Pacific Telegraph Company was absorbed into the Western Union Telegraph Company in 1864. History Organization The Pacific Telegraph Act of 1860 called for the facilitation of telegraphic communication between the east and west coasts of the United States. A contract for construction of the telegraph line, as authorized by the act, was awarded to Hiram Sibley of the Western Union Telegraph Company. Sibley and the Western Union would organize other telegraph companies to build the line. On January 11, 1864, the Nebraska Territorial Legislature incorporated the Pacific Telegraph Company, which was then organized on April 17, 1861, in Rochester, New York. The company's board of directors was largely made up of men who were also directors of the Western Union Telegraph Company. Jeptha H. Wade was elected president of the new company with Hiram Sibley as vice-president. Also serving on the board was Charles M. Stebbins, president of the Missouri and Western Telegraph Company, another company controlled by Western Union interests. The Missouri and Western Telegraph Company had already completed a line from Brownville to Fort Kearny (both in Nebraska Territory), via Omaha. In 1861, this same company would extend the line from Fort Kearny to Julesburg, and it was from Julesburg that the Pacific Telegraph Company would build west to Salt Lake City in Utah Territory. Brownville was stated as the eastern terminus for the telegraph line in Sibley's contract with the federal government. Construction and operation Edward Creighton managed construction for the company, which started in Nebraska Territory on July 4, 1861, and simultaneously from Salt Lake City a week later. The Pacific Telegraph Company's line was completed to Salt Lake City on October 17, 1861, and the first messages were sent the following day, October 18. Brigham Young, President of the Church of Jesus Christ of Latter-day Saints, sent the first message to company president Jeptha H. Wade, congratulating him on the completion of the work. Afterwards, Frank Fuller, acting governor of Utah Territory, sent a telegram to President Abraham Lincoln saying the citizens of the territory were loyal to the United States. The tr
https://en.wikipedia.org/wiki/ISO%2011783
ISO 11783, known as Tractors and machinery for agriculture and forestry—Serial control and communications data network (commonly referred to as "ISO Bus" or "ISOBUS") is a communication protocol for the agriculture industry based on the SAE J1939 protocol (which includes CANbus) . It is managed by the ISOBUS group in VDMA. The ISOBUS standard specifies a serial data network for control and communications on forestry or agricultural tractors and implements. Parts The standard comes in 14 parts: ISO 11783-175388: General standard for mobile data communication ISO 18883-2: Physical layer ISO 11783-3: Data link layer ISO 11783-4: Network layer ISO 11783-5: Network management ISO 11783-6: Virtual terminal ISO 11783-7: Implement messages application layer ISO 11783-8: Power train messages ISO 11783-9: Tractor ECU ISO 11783-10: Task controller and management information system data interchange ISO 11783-11: Mobile data element dictionary ISO 11783-12: Diagnostics services ISO 11783-13: File server ISO 11783-14: Sequence control Agricultural Industry Electronics Foundation and ISOBUS The Agricultural Industry Electronics Foundation works to promote ISOBUS and coordinate enhanced certification tests for the ISO 11783 standard. External links ISO 11783-1:2017 Official VDMA page for ISOBUS Open-source PoolEdit editor for creating ISOBUS user interfaces 11783 Network protocols
https://en.wikipedia.org/wiki/ITK
ITK may stand for: ITK (gene), a mammalian gene encoding IL2-inducible T-cell kinase Itk, ( IncrTk), a programming language Innovation TK Ltd Insight Segmentation and Registration Toolkit, an extensible open source image software library Kalimantan Institute of Technology (Institut Teknologi Kalimantan), a university in Balikpapan, Indonesia Inuit Tapiriit Kanatami, a Canadian organisation representing Inuit
https://en.wikipedia.org/wiki/Wide-format%20printer
Wide format printers (large format printers) are generally accepted to be any computer-controlled printing machines (printers) that support a maximum print roll width of between . Printers with capacities over 100 in wide are considered super-wide or grand format. Wide-format printers are used to print banners, posters, trade show graphics, wallpaper, murals, backlit film (duratrans), vehicle image wraps, electronic circuit schematics, architectural drawings, construction plans, backdrops for theatrical and media sets, and any other large format artwork or signage. Wide-format printers usually employ some variant of inkjet or toner-based technology to produce the printed image; and are more economical than other print methods such as screen printing for most short-run (low quantity) print projects, depending on print size, run length (quantity of prints per single original), and the type of substrate or print medium. Wide-format printers are usually designed for printing onto a roll of print media that feeds incrementally during the print process, rather than onto individual sheets. Technologies Wide-format printers can be categorized by the type of ink transfer process they employ: Aqueous: Thermal or Piezo inkjet printers using an ink known as aqueous or water-based. The term water base is a generally accepted misnomer. The pigment is held in a non-reactive carrier solution that is sometimes water and other times a substitute liquid, including a soy-based liquid used by Kodak. Aqueous ink generally comes in two flavors, dye and pigment. Dye ink is high color, low UV-resistant variety that offers the widest color gamut. Pigment ink is generally duller in color, requiring more inks to achieve wide inks but withstands fading from UV rays. Similar in general principle to desktop inkjet printers. Finished prints must be laminated to protect them if they are to be used outdoors. Various substrates (media) are available, including canvases, banners, metabolized plastic, and cloth. Aqueous technology requires that all materials be properly coated to accept and hold the ink. Solvent: This term is used to describe any ink that is not water-based. Piezo inkjet printers whose inks use petroleum or a petroleum by-product such as an acetone like carrier liquid. "Eco-Solvent" inks usually contain glycol esters or glycol ether esters and are slower drying. The resulting prints are waterproof. May be used to print directly on uncoated vinyl and other media as well as ridged substrates such as Painted/Coated Metal, Foam Board and PVC. The solvents soften the base material and allow the ink pigments to mechanically latch on to the chemically etched surface. Certain ink manufacturers have different bite based on what solvent carriers they use. Which is what makes solvent ink prints more durable than aqueous inks. However, solvent inks give off strong odor or fumes when drying, as the carrier fluid dissipates through applied heat from the printer's platen. Ther
https://en.wikipedia.org/wiki/Xplorer%C2%B2
xplorer² (formerly 2xExplorer) is a dual-pane file manager for Microsoft Windows operating systems, developed by Nikos Bozinis (Nikolaos Achilleos Bozinis). It offers the functionality of orthodox file managers through an interface similar to the familiar Windows Explorer. Some of its features are tabbed file management within each pane, viewing and editing text files, searching for files using arbitrary criteria, the ability to compare and synchronize folders and the ability to perform queued or concurrent copy and move operations with error handling (robust file transfer). The file finder module is claimed to be “outclass” from other search tools. xplorer² is fully shell integrated, supporting all windows shell extension handlers that provide preview, text content search and file property information. It also supports many Total Commander WDX/WLX/WCX extension plugins. Later versions support multi-folder browsing in side-by-side panels (aka Miller columns), detect duplicate and similar files and pictures to clean up hard disk space. xplorer² comes in two paid varieties, professional and ultimate. The ultimate version is more expensive but includes a faster search engine (it integrates with Windows Search) and is portable (can be run off a USB stick) Apart from the commercial version of the program, there is also a version which is free for personal and academic use. Three features of the Professional version not present in the Lite version are advanced search (Omni-Finder), full Unicode support and robust transfer. xplorer² has been in constant development since 2002. Over the years there have been many independent reviews for xplorer². Lifehacker considered it the "best alternative file browser for windows" in a 2011 review, and many reviews rank it among the five best free replacements for Windows Explorer See also Comparison of file managers References External links The home page of xplorer² Official portable version xplorer² / 2X Explorer Products Forum zabkat YouTube channel with training videos Orthodox file managers File managers for Microsoft Windows
https://en.wikipedia.org/wiki/Rolf%20Pfeifer
Rolf Pfeifer (born 1947) is a former professor of computer science at the Department of Informatics University of Zurich, and director of the Artificial Intelligence Laboratory, where he retired from in 2014. Currently he is a specially appointed professor at Osaka University, and a visiting professor at Shanghai Jiao Tong University. He has a master's degree in physics and mathematics and a Ph.D. in computer science from the Swiss Federal Institute of Technology (ETH) in Zurich, Switzerland. He spent three years as a post-doctoral fellow at Carnegie Mellon University and at Yale University in the U.S. Having worked as a visiting professor and research fellow at Free University of Brussels, the MIT Artificial Intelligence Laboratory, the Neurosciences Institute (NSI) in San Diego, and the Sony Computer Science Laboratory in Paris, he was elected "21st Century COE Professor, Information Science and Technology" at the University of Tokyo for 2003/2004, from where he held the first global, fully interactive, videoconferencing-based lecture series "The AI Lectures from Tokyo" (including Tokyo, Beijing, Jeddah, Warsaw, Munich, and Zurich). This lectures were renamed the ShanghAI Lectures and since 2009 they have been broadcast all over the world. He is the author of the books Understanding Intelligence (co-author: C. Scheier), How the Body Shapes the Way We Think: A New View of Intelligence MIT Press, 2006 (with Josh Bongard), and "Designing Intelligence" (with Josh Bongard and Don Berry). He has published over 100 scientific articles. His research interests include Embodied cognition, Biorobotics, Autonomous agents/mobile robots, Artificial life, Morphology/morpho-functional machines, Situated Design, Emotion. Books Understanding Intelligence, Bradford Books, 2001; with Christian Scheier How the Body Shapes the Way We Think: A New View of Intelligence, Bradford Books, 2006; with Josh Bongard Designing Intelligence Paperback, GRIN, 2013, with Josh Bongard, Don Berry External links Rolf Pfeifer's homepage at the Artificial Intelligence Laboratory References Artificial intelligence researchers Swiss roboticists 1947 births Living people People associated with the University of Zurich Academic staff of the University of Zurich Researchers of artificial life
https://en.wikipedia.org/wiki/H100
H100 or H-100 may refer to: H100, NVIDIA GPU H.100 (computer telephony), a standard for communication between PCI cards in a computer telephony system H100 series, a diesel multiple unit train in Japan Heathkit H100, a kit by Heathkit sold assembled as the Zenith Z-100 computer Hyundai Grace, a minibus or van Hyundai Porter, a pickup truck iRiver H100 series, a series of hard drive digital audio players produced by iriver The fourth generation of Toyota HiAce, also known as H100
https://en.wikipedia.org/wiki/Structured%20analysis%20and%20design%20technique
Structured analysis and design technique (SADT) is a systems engineering and software engineering methodology for describing systems as a hierarchy of functions. SADT is a structured analysis modelling language, which uses two types of diagrams: activity models and data models. It was developed in the late 1960s by Douglas T. Ross, and was formalized and published as IDEF0 in 1981. Overview Structured analysis and design technique (SADT) is a diagrammatic notation designed specifically to help people describe and understand systems. It offers building blocks to represent entities and activities, and a variety of arrows to relate boxes. These boxes and arrows have an associated informal semantics. SADT can be used as a functional analysis tool of a given process, using successive levels of details. The SADT method not only allows one to define user needs for IT developments, which is often used in the industrial Information Systems, but also to explain and present an activity's manufacturing processes and procedures. History SADT was developed and field-tested during the period of 1969 to 1973 by Douglas T. Ross and SofTech, Inc. The methodology was used in the MIT Automatic Programming Tool (APT) project. It received extensive use starting in 1973 by the US Air Force Integrated Computer Aided Manufacturing program. According to Levitt (2000) SADT is "part of a series of structured methods, that represent a collection of analysis, design, and programming techniques that were developed in response to the problems facing the software world from the 1960s to the 1980s. In this timeframe most commercial programming was done in COBOL and Fortran, then C and BASIC. There was little guidance on "good" design and programming techniques, and there were no standard techniques for documenting requirements and designs. Systems were getting larger and more complex, and the information system development became harder and harder to do so. As a way to help manage large and complex software. SADT was among a series of similar structured methods, which had emerged since the 1960 such as: Structured programming in circa 1967 with Edsger W. Dijkstra. Structured design around 1975 with Larry Constantine and Ed Yourdon Structured analysis in circa 1978 with Tom DeMarco, Yourdon, Gane & Sarson, McMenamin & Palmer. Information technology engineering in circa 1990 with James Martin. In 1981 the IDEF0 formalism was published, based on SADT. SADT topics Top-down approach The structured analysis and design technique uses a decomposition with the top-down approach. This decomposition is conducted only in the physical domain from an axiomatic design viewpoint. Diagrams SADT uses two types of diagrams: activity models and data models. It uses arrows to build these diagrams. The SADT's representation is the following: A main box where the name of the process or the action is specified On the left-hand side of this box, incoming arrows: inputs of the action. On t
https://en.wikipedia.org/wiki/Repertory%20%28disambiguation%29
Repertory is the theatrical programming model. Repertory'''also may refer to: Homeopathic repertory , aspect of the eponymous therapeutic system The "New-England Repertory", 19th-century Massachusetts newspaper Repertory (London)'', each of the respective series of historical records, of two "courts" governing that city
https://en.wikipedia.org/wiki/National%20Driver%20Register
The National Driver Register (NDR) is a computerized database of information about United States drivers who have had their driver's licenses revoked or suspended, or who have been convicted of serious traffic violations, such as driving under the influence or drugs or alcohol. (see 23 Code of Federal Regulations 1327 Appendix A for a complete list of violations). The records are added and maintained and deleted by the motor vehicle agency (MVA) of the state that convicted the driver or withdrew the driver's license. Checks for problem drivers When a person applies for a driver's license, either as a new applicant or as a renewing applicant in a participating state, the state MVA must check if the name is on the NDR's Problem Driver Pointer System (PDPS) (as required by federal regulation—see 23 CFR 1327.5(b)(1)). If a person has been reported to the NDR by any state as a "problem driver", the prospective licensing state must investigate the driver's history from the state that added the NDR record. Depending on the results of the investigation and the state's own laws, the prospective licensing state may be required to deny the license. Thus, this "PDPS check" enables the state MVAs to prevent someone with a suspended or revoked driver's license in one state from obtaining a driver's license in another state. On March, 29th, 2021 the California DMV declined to renew a California DL for a California resident of 32 years based upon and NDR PDPS flag created by the state of MA for a $50 parking ticket levied in 1989 and a $40 late fee. A driver in Washington State nearly had their license revoked due to a PDPS flag created by the Ohio BMV for an apaid $24 fee from 1998. The Ohio BMV generated a new Ohio DL for the Washington resident in order to suspend it and report it to the NDR. The PDPS check also makes it harder for a person to obtain more than one driver's license at any one time. Not all records on the NDR are correct. Some may have been added in the past incorrectly for misdemeanor violations, such as not returning license plates in New York state. Some records may identify the wrong driver. Some records for specific convictions may have met data retention requirements and are eligible for deletion. A driver must contact the state that added the record to have that state delete an incorrect record. To find out if you have a record on NDR PDPS, see the next section. The NDR may not contain all required records. For example, a man in Pennsylvania was convicted of driving under the influence of marijuana cigarettes and crack cocaine in 1997, and was never put on the NDR. Participation by states Currently, and for the past few decades, all U.S. states participate in NDR, to avoid losing federal funding. Federal Regulation 23 CFR 1327.1 states, "This part provides procedures for States to participate in the National Driver Register (NDR) Problem Driver Pointer System (PDPS) and for other authorized parties to receive information from th
https://en.wikipedia.org/wiki/WYDN
WYDN (channel 48) is a religious television station licensed to Lowell, Massachusetts, United States, broadcasting the Daystar Television Network to the Boston area. It is owned and operated by the Educational Public TV Corporation, a subsidiary of Daystar sister company Word of God Fellowship, Inc. WYDN's studios are co-located with those of local public access channel Dedham TV on Sprague Street in Dedham, and it shares transmitter facilities with Concord, New Hampshire–licensed Ion Television station WPXG-TV (channel 21) on Fort Mountain near Epsom, New Hampshire. History The station first signed on the air on May 5, 1999, as an affiliate of Prime Time Christian Broadcasting (now God's Learning Channel) as a straight simulcast of KMLM in Odessa, Texas. Originally licensed to Worcester, Massachusetts, WYDN operated its analog transmitter atop Asnebumskit Hill in Paxton (a site which is and has been used by Worcester area FM and TV stations since FM pioneer Edwin Howard Armstrong erected the tower in the 1940s) until the June 12, 2009, digital transition; its digital transmitter operated from the WBZ-TV tower in Needham. By the early 2000s, the station switched to Daystar after it was acquired by its Word of God Fellowship, Inc. licensing subsidiary, and Daystar immediately pushed for successful must-carry carriage from local cable providers. WYDN sold its frequency rights as part of the Federal Communications Commission (FCC)'s 2017 spectrum incentive auction and reached a channel sharing agreement with Ion Television O&O WPXG-TV; it began broadcasting from WPXG's transmitter on April 23, 2018. As WPXG's broadcasting radius does not cover Worcester, WYDN changed its city of license to Lowell, Massachusetts. Technical information Analog-to-digital conversion WYDN shut down its analog signal, over UHF channel 48, on June 12, 2009, the official date on which full-power television stations in the United States transitioned from analog to digital broadcasts under federal mandate. The station's digital signal continued to broadcasts on its pre-transition UHF channel 47. Through the use of PSIP, digital television receivers display the station's virtual channel as its former UHF analog channel 48. See also Channel 33 digital TV stations in the United States Channel 48 virtual TV stations in the United States List of television stations in Massachusetts List of Daystar (TV network) affiliates Notes References External links Daystar Television Network 1999 establishments in Massachusetts Companies based in Dedham, Massachusetts Daystar Television Network affiliates Mass media in Lowell, Massachusetts Television channels and stations established in 1999 YDN
https://en.wikipedia.org/wiki/Svchost.exe
Svchost.exe (Service Host, or SvcHost) is a system process that can host one or more Windows services in the Windows NT family of operating systems. Svchost is essential in the implementation of shared service processes, where a number of services can share a process in order to reduce resource consumption. Grouping multiple services into a single process conserves computing resources, and this consideration was of particular concern to NT designers because creating Windows processes takes more time and consumes more memory than in other operating systems, e.g. in the Unix family. However, if one of the services causes an unhandled exception, the entire process may crash. In addition, identifying component services can be more difficult for end users. Problems with various hosted services, particularly with Windows Update, get reported by users (and headlined by the press) as involving svchost. The svchost process was introduced in Windows 2000, although the underlying support for shared service processes has existed since Windows NT 3.1. Implementation Its executable image, or (for 32-bit services running on 64-bit systems) runs in multiple instances, each hosting one or more services. Services running in SvcHost are implemented as dynamically-linked libraries (DLLs). Each service's registry key must have a value named under the subkey, pointing to the respective service's DLL file. Their definition is of the form ; (i.e. ). Services sharing the same SvcHost process specify the same parameter, having a single entry in the SCM's database. The first time that a SvcHost process is launched with a specific parameter, it looks for a value of the same name under the key, which it interprets as a list of service names. Then it notifies the SCM of all the services that it hosts. SCM does not launch a second SvcHost process for any of those received services; instead, it simply sends a "start" command to the respective SvcHost process containing the name of the service that should be launched within its context, and whose respective DLL SvcHost loads. According to a 2003 Microsoft presentation, the minimum working set of a shared service is approximately 150 KB instead of 800 KB for a standalone process. Changes to Service Host grouping in Windows 10 Starting with Windows 10 version 1903, Microsoft changed the way services are grouped into host processes. On client computer systems with more than 3.5 GB of memory, services are no longer grouped into shared host processes. Instead, each service is run in its own process. This results in better isolation of services, making the computer system more resilient to service failures and vulnerabilities and easier to debug. However, it adds some memory overhead. Service tags Starting with Windows Vista, the internal identification of services inside shared processes (svchost included) is achieved by so-called service tags. The service tag for each thread is stored in the SubProcessTag of its thread
https://en.wikipedia.org/wiki/Pionier
Pionier may refer to: PIONIER, the Polish academic network Pionier, the German-language paper published by Karl Heinzen PIONIER (VLTI), an instrument at the VLTI astronomical observatory "Pioniere", combat engineering battalions in some German speaking countries See also Pioneer (disambiguation)
https://en.wikipedia.org/wiki/Computational%20epidemiology
Computational epidemiology is a multidisciplinary field that uses techniques from computer science, mathematics, geographic information science and public health to better understand issues central to epidemiology such as the spread of diseases or the effectiveness of a public health intervention. Computational epidemiology traces its origins to mathematical epidemiology, but began to experience significant growth with the rise of big data and the democratization of high-performance computing through cloud computing. Introduction In contrast with traditional epidemiology, computational epidemiology looks for patterns in unstructured sources of data, such as social media. It can be thought of as the hypothesis-generating antecedent to hypothesis-testing methods such as national surveys and randomized controlled trials. A mathematical model is developed which describes the observed behavior of the viruses, based on the available data. Then simulations of the model are performed to understand the possible outcomes given the model used. These simulations produce as results projections which can then be used to make predictions or verify the facts and then be used to plan interventions and meters towards the control of the disease's spread. References External links Sax Institute - Decision Analytics Computational science Epidemiology
https://en.wikipedia.org/wiki/Synchroscope
In AC electrical power systems, a synchroscope is a device that indicates the degree to which two systems (generators or power networks) are synchronized with each other. For two electrical systems to be synchronized, both systems must operate at the same frequency, and the phase angle between the systems must be zero (and two polyphase systems must have the same phase sequence). Synchroscopes measure and display the frequency difference and phase angle between two power systems. Only when these two quantities are zero is it safe to connect the two systems together. Connecting two unsynchronized AC power systems together is likely to cause high currents to flow, which will severely damage any equipment not protected by fuses or circuit breakers. Operating principles The simplest aid to synchronizing a generator to another system uses lamps wired between similar phases of the two systems; when the lamps stay dark, the voltage and frequency of the two systems are the same and the generator may be connected. However, the accuracy of this approach is low since it is difficult to discern slight phase differences, and the lamps do not show the relative speeds of the two systems. Synchroscopes are instruments that show the relative frequency (speed) difference and the phase angle between the machine to be synchronized and the system voltage. Since most synchroscopes are connected only to a single phase of the two systems, they cannot assure that the phase sequence is correct. When generators are newly connected to a power system, or temporary connections are used, other means are required to assure both systems have the same phase sequence. Some generators use both a synchroscope and a set of two lamps. If the lamps flash out of sequence, then the phase sequence is incorrect. Synchroscopes are electrodynamic instruments, which rely on the interaction of magnetic fields to rotate a pointer. In most types, unlike voltmeters and wattmeters, there is no restoring spring torque for the magnetically produced torques to overcome; the pointer system is free to rotate continually. Synchroscopes have a damping vane to smooth out vibration of the moving system. A polarized-vane synchroscope has a field winding with a phase-shifting network arranged to produce a rotating magnetic field. The field windings are connected to the "incoming" machine. A single-phase polarizing winding is connected to the "running" system. It is mounted perpendicular to the field winding and produces a magnetic flux that passes through the moving vanes. The moving vanes turn a shaft that carries a pointer moving over a scale. If the frequency of the source connected to the polarizing winding is different from the source connected to the field winding, the pointer rotates continually at a speed proportional to the difference in system frequencies (the beat frequency). The scale is marked to show the direction of rotation corresponding to the "incoming" machine running faster than
https://en.wikipedia.org/wiki/Strictness%20analysis
In computer science, strictness analysis refers to any algorithm used to prove that a function in a non-strict functional programming language is strict in one or more of its arguments. This information is useful to compilers because strict functions can be compiled more efficiently. Thus, if a function is proven to be strict (using strictness analysis) at compile time, it can be compiled to use a more efficient calling convention without changing the meaning of the enclosing program. Note that a function f is said to diverge if it returns : operationally, that would mean that f either causes abnormal termination of the enclosing program (e.g., failure with an error message) or that it loops infinitely. The notion of "divergence" is significant because a strict function is one that always diverges when given an argument that diverges, whereas a lazy (or non-strict) function is one that may or may not diverge when given such an argument. Strictness analysis attempts to determine the "divergence properties" of functions, which thus identifies some functions that are strict. Approaches to strictness analysis Forward abstract interpretation Strictness analysis can be characterized as a forward abstract interpretation which approximates each function in the program by a function that maps divergence properties of the arguments onto divergence properties of the results. In the classical approach pioneered by Alan Mycroft, the abstract interpretation used a two-point domain with 0 denoting the set considered as a subset of the argument or return type, and 1 denoting all values in the type. Demand analysis The Glasgow Haskell Compiler (GHC) uses a backward abstract interpretation known as demand analysis to perform strictness analysis as well as other program analyses. In demand analysis, each function is modelled by a function from value demands on the result to value demands on the arguments. A function is strict in an argument if a demand for its result leads to a demand for that argument. Projection-based strictness analysis Projection-based strictness analysis, introduced by Philip Wadler and R.J.M. Hughes, uses strictness projections to model more subtle forms of strictness, such as head-strictness in a list argument. (By contrast, GHC's demand analysis can only model strictness within product types, i.e., datatypes that only have a single constructor.) A function is considered head-strict if , where is the projection that head-evaluates its list argument. There was a large body of research on strictness analysis in the 1980s. References Implementation of functional programming languages Static program analysis
https://en.wikipedia.org/wiki/Undefined%20variable
An undefined variable in the source code of a computer program is a variable that is accessed in the code but has not been declared by that code. In some programming languages, an implicit declaration is provided the first time such a variable is encountered at compile time. In other languages such a usage is considered to be sufficiently serious that a diagnostic being issued and the compilation fails. Some language definitions initially used the implicit declaration behavior and as they matured provided an option to disable it (e.g. Perl's "use warnings" or Visual Basic's "Option Explicit"). Examples The following provides some examples of how various programming language implementations respond to undefined variables. Each code snippet is followed by an error message (if any). CLISP (setf y x) *** - EVAL: variable X has no value C int main() { int y = x; return 0; } foo.c: In function `main': foo.c:2: error: `x' undeclared (first use in this function) foo.c:2: error: (Each undeclared identifier is reported only once foo.c:2: error: for each function it appears in.) JavaScript A ReferenceError only happens if the same piece of executed code has a or a (but not ) declaration later on, or if the code is executed in strict mode. In all other cases, the variable will have the special value . "use strict"; let y = x; let y = x; let x; // causes error on line 1 ReferenceError: x is not defined Source File: file:///c:/temp/foo.js Lua y = x (no error, continuing) print(y) nil ML (Standard ML of New Jersey) val y = x; stdIn:1.9 Error: unbound variable or constructor: x MUMPS Set Y=X <UNDEF> OCaml let y = x;; Unbound value x Perl my $y = ($x // 0) + 1; # defined-or operator (no error) PHP 5 $y = $x; (no error) $y=""; $x=""; error_reporting(E_ALL); $y = $x; PHP Notice: Undefined variable: x in foo.php on line 3 Python 2.4 >>> x = y Traceback (most recent call last): File "<stdin>", line 1, in <module> NameError: name 'y' is not defined REXX signal on novalue y = x +++ Error 30 in line 2: Label not found Ruby irb(main):001:0> y = x NameError: undefined local variable or method `x' for main:Object from (irb):1 Tcl % set y $x can't read "x": no such variable VBScript Dim y y = x (no error) Option Explicit Dim y y = x (3, 1) Microsoft VBScript runtime error: Variable is undefined: 'x' References Variable (computer science) Software bugs
https://en.wikipedia.org/wiki/Team%20OS/2
Team OS/2 was an advocacy group formed to promote IBM's OS/2 operating system. Originally internal to IBM with no formal IBM support, Team OS/2 successfully converted to a grassroots movement formally supported (but not directed) by IBM - consisting of well over ten thousand OS/2 enthusiasts both within and without IBM. It is one of the earliest examples of both an online viral phenomenon and a cause attracting supporters primarily through online communications. The decline of Team OS/2 largely coincided with IBM's abandonment of OS/2 and the coinciding attacks orchestrated by Microsoft on OS/2, Team OS/2, and IBM's early attempts at online evangelism. History Beginnings Team OS/2 was a significant factor in the spread and acceptance of OS/2. Formed in February 1992, Team OS/2 began when IBM employee Dave Whittle, recently appointed by IBM to evangelize OS/2 online, formed an internal IBM discussion group titled TEAMOS2 FORUM on IBM's worldwide network, which at the time, served more individuals than did the more academic Internet. The forum header stated that its purpose was The forum went viral as increasing numbers of IBMers worldwide began to contribute a wide variety of ideas as to how IBM could effectively compete with Microsoft to establish OS/2 as the industry standard desktop operating system. Within a short time, thousands of IBM employees had added the words TEAMOS2 to their internet phone directory listing, which enabled anyone within IBM to find like-minded OS/2 enthusiasts within the company and work together to overcome the challenges posed by IBM's size, insularity, and top-down marketing style. TEAMOS2 FORUM quickly caught the attention of some IBM executives, including Lee Reiswig and Lucy Baney, who after initial scepticism, offered moral and financial support for Whittle's grass roots and online marketing efforts. IBM's official program for generating word-of-mouth enthusiasm was called the "OS/2 Ambassador Program", where OS/2 enthusiasts company-wide could win Gold, Silver, and Bronze Ambassador pins and corporate recognition with various levels of structured achievement. Both the OS/2 Ambassador Program and Team OS/2 were effective in evangelizing OS/2 within IBM, but only Team OS/2 was effective in generating support for the promotion of OS/2 outside of IBM. Externalization Whittle began to extend the Team OS/2 effort outside of IBM with various posts on CompuServe, Prodigy, bulletin boards, newsgroups, and other venues. He also made a proposal to IBM executives, which they eventually implemented when IBM Personal Software Products moved to Austin, Texas, that they form a "Grass Roots Marketing Department". Team OS/2 went external that spring, when the first Team OS/2 Party was held in Chicago. The IBM Marketing Office in Chicago created a huge banner visible from the streets. Microsoft reacted when Steve Ballmer roamed the floor with an application on diskette that had been specially programmed to crash OS/2
https://en.wikipedia.org/wiki/Data%20analysis
Data analysis is the process of inspecting, cleansing, transforming, and modeling data with the goal of discovering useful information, informing conclusions, and supporting decision-making. Data analysis has multiple facets and approaches, encompassing diverse techniques under a variety of names, and is used in different business, science, and social science domains. In today's business world, data analysis plays a role in making decisions more scientific and helping businesses operate more effectively. Data mining is a particular data analysis technique that focuses on statistical modeling and knowledge discovery for predictive rather than purely descriptive purposes, while business intelligence covers data analysis that relies heavily on aggregation, focusing mainly on business information. In statistical applications, data analysis can be divided into descriptive statistics, exploratory data analysis (EDA), and confirmatory data analysis (CDA). EDA focuses on discovering new features in the data while CDA focuses on confirming or falsifying existing hypotheses. Predictive analytics focuses on the application of statistical models for predictive forecasting or classification, while text analytics applies statistical, linguistic, and structural techniques to extract and classify information from textual sources, a species of unstructured data. All of the above are varieties of data analysis. Data integration is a precursor to data analysis, and data analysis is closely linked to data visualization and data dissemination. The process of data analysis Analysis refers to dividing a whole into its separate components for individual examination. Data analysis is a process for obtaining raw data, and subsequently converting it into information useful for decision-making by users. Data is collected and analyzed to answer questions, test hypotheses, or disprove theories. Statistician John Tukey, defined data analysis in 1961, as:"Procedures for analyzing data, techniques for interpreting the results of such procedures, ways of planning the gathering of data to make its analysis easier, more precise or more accurate, and all the machinery and results of (mathematical) statistics which apply to analyzing data."There are several phases that can be distinguished, described below. The phases are iterative, in that feedback from later phases may result in additional work in earlier phases. The CRISP framework, used in data mining, has similar steps. Data requirements The data is necessary as inputs to the analysis, which is specified based upon the requirements of those directing the analytics (or customers, who will use the finished product of the analysis). The general type of entity upon which the data will be collected is referred to as an experimental unit (e.g., a person or population of people). Specific variables regarding a population (e.g., age and income) may be specified and obtained. Data may be numerical or categorical (i.e., a text labe
https://en.wikipedia.org/wiki/WWJE-DT
WWJE-DT (channel 50) is a television station licensed to Derry, New Hampshire, United States, serving the Boston area as an affiliate of True Crime Network. It is owned by TelevisaUnivision alongside Marlborough, Massachusetts–licensed Univision-owned station WUNI (channel 66). The two stations share main studios and transmitter facilities on Parmenter Road in Hudson, Massachusetts. WWJE is operated separately from WUNI's joint sales agreement (JSA) with Entravision Communications–owned UniMás affiliate WUTF-TV (channel 27) in Worcester. WWJE formerly broadcast local newscasts from a studio located in Concord, branded as the NH1 News Network or NH1 News. Besides WBIN, sister radio station WNNH also used the NH1 News branding from August 2015 to August 2017. WBIN-TV was one of only two television stations based in the state of New Hampshire to broadcast local newscasts (alongside WMUR-TV), as much of the state is part of the Boston media market. On February 17, 2017, WBIN canceled its newscasts as part of a wind-down of the station's operations following the sale of its spectrum in the Federal Communications Commission (FCC)'s incentive auction. The station shut down its channel 35 transmitter on Merrill Hill in Hudson, New Hampshire on September 15, 2017, and began operating on channel 27 through a channel sharing agreement with channel 66 (then WUTF-DT); the WBIN-TV license was subsequently sold by Carlisle One Media, a company controlled by Bill Binnie, to WUNI's owner, Univision Communications. History Prior history of channel 50 in Boston The channel 50 allocation in the Boston market originally belonged to WXPO-TV, which launched in October 1969. It operated from two studios: its offices and master production facilities were located on Dutton Street in downtown Lowell, Massachusetts; however, its transmitter and "main" studio was on Governor Dinsmore Road in Windham, New Hampshire, to comply with FCC regulations requiring that a station's transmitter be located within of its city of license. However, the station's coverage in many parts of Greater Boston was spotty at best. The station's Lowell studios were located less than from the transmitter of WLLH, making high-quality production impossible during the day due to RF interference with the cameras. Advertisers were scared off when the Lowell Sun blacklisted anyone who bought commercials on the station. Bills went unpaid for several months. By early 1970, 90% of the station's staff was removed from the payroll, although many continued with the station, believing it could pull through. The Lowell studio was closed down that spring; finally, in June the power company pulled the plug at the Windham studios during a Maverick rerun, taking WXPO off the air. On July 17, 1973, channel 50 returned to the air with a test transmission, with plans to return the station to the air later that year, possibly as New Hampshire's CBS affiliate. Those plans never materialized, and the WXPO-TV licen
https://en.wikipedia.org/wiki/Vivisimo
Vivisimo was a privately held technology company in Pittsburgh, Pennsylvania, specialising in the development of computer search engines. The company was acquired by IBM in May 2012 and is now branded as IBM Watson Explorer, a product of the IBM Watson Group. Vivisimo's public web search engine Clusty was a metasearch engine with document clustering; it was sold to Yippy, Inc. in 2010. Vivisimo specialized in federated search and document clustering. For example, Vivisimo clustering could divide the results of a search for "cell" into groups including "biology", "battery", and "prison". Vivisimo software supported both structured and unstructured information. History Vivisimo was founded in 2000 by three computer science researchers at Carnegie Mellon University: Chris Palmer, Jerome Pesenti, and Raul Valdes-Perez. The name was taken from the Spanish superlative adjective vivísimo meaning "very lively" or "very clever." In October 2008, Vivisimo was awarded the contract to power the search portion of FirstGov.gov (now called USA.gov), the official web portal of the United States federal government. In 2012, IBM acquired Vivisimo to boost its Big Data Analytics capabilities . Products Velocity was sold as an installed or hosted application to enterprises, governments, and OEMs. With Vivisimo providing additional professional services. Velocity's social search features allowed users to contribute to organizational content by tagging, voting, annotating and sharing search results. The contributions are instantly indexed in new searches. References Online companies of the United States Defunct internet search engines IBM acquisitions Companies based in Pittsburgh Computer companies established in 2000 2012 mergers and acquisitions
https://en.wikipedia.org/wiki/Deborah%20McGuinness
Deborah Louise McGuinness (born ca. 1960) is an American computer scientist and researcher at Rensselaer Polytechnic Institute (RPI). She is a professor of Computer, Cognitive and Web Sciences, Industrial and Systems Engineering, and an endowed chair in the Tetherless World Constellation, a multidisciplinary research institution within RPI that focuses on the study of theories, methods and applications of the World Wide Web. Her fields of expertise include interdisciplinary data integration, artificial intelligence, specifically in knowledge representation and reasoning, description logics, the semantic web, explanation, and trust. Education McGuinness completed her Ph.D. in computer science from Rutgers University in 1997 with a thesis titled “Explaining Reasoning in Description Logics”. She received a master's degree in computer science from the University of California, Berkeley (1981) and a Bachelor of Science in computer science and Bachelor of Arts (BA) in mathematics from Duke University (1980). Career McGuinness’ career began in 1980 as a technical staff member for AT&T Bell Labs where for eighteen years, she worked in Artificial Intelligence applied and fundamental research, with business rotations in Home Information Systems, Home Communication Systems and managed an emerging technologies and applications group for AT&T's personal online services. From 1998 to 2007, McGuinness served as co-director and senior research scientist and later acting director in the Knowledge Systems Laboratory (KSL), Artificial Intelligence Laboratory at Stanford University. In October 2007, she joined the faculty at RPI and became an endowed constellation chair with James Hendler, within the Tetherless World Constellation. While at RPI, she became the founding director of the Web Science Research Center and Director of Health Analytics at the Institute for Data Exploration and Application (IDEA). McGuinness is CEO and president of her own consulting firm for clients wishing to plan, develop, deploy, and maintain semantic web and/or AI applications. She also is an inventor on 5 patents and has served as an expert witness in a number of cases, many in the area of configuration. Research McGuinness has worked in knowledge representation and reasoning environments, and their applications, for over 40 years. She has led multimillion-dollar, government sponsored research efforts, many in multi-disciplinary areas, delivering long-lived software and world class publishable results on topics including but not limited to health, exposure, cancer, smoking and drug repurposing research. McGuinness is known for her work on description logics, particularly her work on the CLASSIC knowledge representation system, explanation components for description logics, and a number of applications of description logics such as the PROSE and QUESTAR configurators from AT&T and Lucent Laboratories. She was integral in the creation of DARPA Agent Markup Language (DAML) and
https://en.wikipedia.org/wiki/Diane%20Pozefsky
Diane P. Pozefsky is a research professor at the University of North Carolina in the department of Computer Science. Pozefsky was awarded the Women in Technology International (WITI) 2011 Hall of Fame Award for contributions to the fields of Science and Technology. Education Pozefsky earned a A.B in applied mathematics from Brown University in 1972 and her Ph.D. from the Department of Computer Science at UNC in 1979 under the tutelage of Doctor Mehdi Jazayeri. Career Pozefsky joined IBM Corporation, Raleigh, NC, in 1979 as a member of the Communication Systems Architecture Department working in the specification and application of the Systems Network Architecture (SNA), a large and complex feature-rich network architecture developed in the 1970s by IBM. Similar in some respects to the OSI reference model, but with a number of differences. SNA is essentially composed of seven layers. She worked for IBM for 25 years and was named an IBM Fellow in 1994 in recognition of her work on APPN and AnyNet architectures and development. She was tasked with the network and application design for the 1998 and 2000 Olympics. Her work life has largely been focused on networking and software engineering, including: developing networking protocols deploying the network at the Nagano Olympics development processes storage networking application development mobile computing She has worked in development, design, and architecture and two areas that she has become particularly interested in later in here career are improving quality and blending theory and practice. Dr. Diane Pozefsky returned to UNC after retiring from IBM in June 2004. Publications Pozefsky's publications include: “Storage Networking: More than an SNA Anagram” in NCP and 3745/46 Today, Summer 2001. “MPTN Transport Gateway”, with D. Ogle in SNA and TCP/IP Enterprise Networking, Manning Publications Co, 1997. “Multiprotocol Transport Networking: Eliminating Application Dependencies on Communications Protocols” with R. Turner et al., IBM Systems Journal volume 34 issue 3, pp. 472–500, July 1995. “Multiprotocol Transport Networking: A General Internetworking Solution” with K. Britton et al., Proceedings of 1993 International Conference on Network Protocols, pp. 14–26, IEEE Computer Society Press, October 1993. “SNA’s Design for Networking” with D. Pitt and J. Gray, IEEE Network volume 6 number 6, pp. 16–31, November 1992. “LAN-PBX Gateway Alternatives” with J. Gray and D. Pitt, Proceedings of the IFIP TC 6/WG 6.4 International In-Depth Symposium on Local Communications Systems: LAN and PBX, pp. 143–156, Elsevier Science Publishers, 1987. “SNA Networks of Small Systems” with Baratz et al., Selected Areas in Communications volume SAC-3 Number 3, pp. 416–426, May 1985. "A Meta-Implementation for Systems Network Architecture," with F. D. Smith, IEEE Transactions on Communications, COM-30(6) pp. 1348–1355, June 1982. “Space-Efficient Storage Management in an Attribute Grammar Evaluat
https://en.wikipedia.org/wiki/ProClarity
ProClarity Corporation was a software company specializing in business intelligence and data analysis applications. The company was founded in 1995 as Knosys Inc. in Boise, Idaho. The company was renamed ProClarity after its primary commercial software product, "ProClarity", in 2001. ProClarity's software products integrated tightly with Microsoft Analysis Services. Among ProClarity's more than 2,000 global clients were AT&T, Ericsson, Hewlett-Packard, Home Depot, Pennzoil QuakerState, Reckitt Benckiser, Roche, Siemens, USDA, Verizon, and Wells Fargo. On April 3, 2006, Microsoft announced the acquisition of ProClarity. The company was gradually folded into Microsoft's Business Division while a final update to the software product, version 6.3, was released in 2007. Additional business intelligence components, such as PerformancePoint Services for SharePoint 2010, and business intelligence improvements in Excel were released by the division in subsequent years. References External links Microsoft business intelligence Business intelligence companies Former Microsoft subsidiaries Business services companies established in 1995 Online analytical processing Companies based in Boise, Idaho
https://en.wikipedia.org/wiki/Macintosh%20Repair%20%26%20Upgrade%20Secrets
Macintosh Repair & Upgrade Secrets is a hardback book for repairing and upgrading Apple Macintosh personal computers from the Macintosh 128K to Macintosh SE models. The book was written by Larry Pina and is out of print. It was first published in 1990 by Hayden Books, with . See also Larry Pina Computer books Macintosh internals Books by Larry Pina
https://en.wikipedia.org/wiki/Replication%20%28computing%29
Replication in computing involves sharing information so as to ensure consistency between redundant resources, such as software or hardware components, to improve reliability, fault-tolerance, or accessibility. Terminology Replication in computing can refer to: Data replication, where the same data is stored on multiple storage devices Computation replication, where the same computing task is executed many times. Computational tasks may be: Replicated in space, where tasks are executed on separate devices Replicated in time, where tasks are executed repeatedly on a single device Replication in space or in time is often linked to scheduling algorithms. Access to a replicated entity is typically uniform with access to a single non-replicated entity. The replication itself should be transparent to an external user. In a failure scenario, a failover of replicas should be hidden as much as possible with respect to quality of service. Computer scientists further describe replication as being either: Active replication, which is performed by processing the same request at every replica Passive replication, which involves processing every request on a single replica and transferring the result to the other replicas When one leader replica is designated via leader election to process all the requests, the system is using a primary-backup or primary-replica scheme, which is predominant in high-availability clusters. In comparison, if any replica can process a request and distribute a new state, the system is using a multi-primary or multi-master scheme. In the latter case, some form of distributed concurrency control must be used, such as a distributed lock manager. Load balancing differs from task replication, since it distributes a load of different computations across machines, and allows a single computation to be dropped in case of failure. Load balancing, however, sometimes uses data replication (especially multi-master replication) internally, to distribute its data among machines. Backup differs from replication in that the saved copy of data remains unchanged for a long period of time. Replicas, on the other hand, undergo frequent updates and quickly lose any historical state. Replication is one of the oldest and most important topics in the overall area of distributed systems. Data replication and computation replication both require processes to handle incoming events. Processes for data replication are passive and operate only to maintain the stored data, reply to read requests and apply updates. Computation replication is usually performed to provide fault-tolerance, and take over an operation if one component fails. In both cases, the underlying needs are to ensure that the replicas see the same events in equivalent orders, so that they stay in consistent states and any replica can respond to queries. Replication models in distributed systems Three widely cited models exist for data replication, each having its own properti
https://en.wikipedia.org/wiki/Adam%20Boland
Adam Boland (born 1977) is the Managing Director of Australian production company, Bohdee Media. He had previously been the executive producer of the Seven Network's breakfast show Sunrise and created The Morning Show and Weekend Sunrise. Early life and education Boland was born in Sydney, Australia, in 1977, and lived his early life in Parramatta, Sydney. He then moved to Queensland with his mother. He studied journalism and politics at the University of Canberra in 1993, but left after one year to pursue a cadetship. Career His first job was as a cadet reporter at radio station 4BC in Brisbane from 1994 to 1995. He then moved briefly to Melbourne radio station 3AW before starting his television career in 1995, as a Sky News Australia producer, where he remained until 1997. From 1997 until 1999, Boland served as the Cairns Bureau Chief of Network Ten, gaining notoriety for interviewing comedian Jerry Seinfeld at Cairns Airport. Before working on Sunrise, Boland was a senior producer in ATN-7's Sydney newsroom. From February 2002 until November 2010, Boland was the executive producer for the Seven Network's breakfast show Sunrise. The show with Boland at the helm gained the position of number one breakfast morning program, pipping the Nine Network's Today out of the spot which it held for 20 years. He also created The Morning Show and Weekend Sunrise. In June 2010, the Seven Network confirmed that Boland intended to leave the network at the end of the year, following the expiry of his contract. Seven's director of news and current affairs, Peter Meakin, said that Boland was not intending to move to another network. In August 2010, the Seven Network announced that Boland would be setting up his own production company but would spend two days a week at the network in 2011 as Director of Social Media and Strategy. In November 2011, Boland was appointed as executive producer of Weekend Sunrise. He left the Seven Network in February 2013. During late 2011 until mid 2012, Boland and then partner Julian Wong endeavoured to set up a Ginseng Korean bathhouse in Potts Point, New South Wales, but after falling $1.2 million short of the needed $4.4 million to fund the whole project the venture did not eventuate. Boland and Wong reportedly lost $600,000 on the project. In March 2013, Boland joined Network Ten as the network's director of Morning Television. He resigned due to ill-health on 23 January 2014, less than three months after the programs he created, Wake Up and Studio 10 launched. In October 2014, Boland released the book Brekky Central: Behind the smiles of Australian breakfast television () which reflects on his media career and the competitive television industry. He founded Bohdee Media in 2018. Personal life Boland suffers from depressive illnesses including Bipolar disorder and the conditions have impacted on his life to the extent that he has had to stop work for significant periods to regain his health. In 2010, Boland was selected
https://en.wikipedia.org/wiki/Eisbrecher
; ) is a German Neue Deutsche Härte band that consists primarily of Alexander Wesselsky (vocals) and Noel Pix (lead guitar/programming), with live support from Jürgen Plangger (guitar), Rupert Keplinger (bass), and Achim Färber (drums). In the United States and Canada, their record label is currently Metropolis Records. The band's lyrics and slogans often include terms of ice and sailing, such as "Ahoi" ("Ahoy") and "Es wird kalt" ("It's getting cold"); vocalist Alexander Wesselsky often wears naval and military clothing in performances. History Formation and early years (2003–2009) After leaving Megaherz in 2003 due to creative differences, Wesselsky got together with Noel Pix, who composed the synths, guitars and programming for Megaherz's albums Kopfschuss and Himmelfahrt. In January 2004, the band released their self-titled debut album, Eisbrecher. The first 5,000 copies of the album included a blank CD with permission for purchasers to legally copy the music onto the blank. This was done as a protest against what the band felt was a "criminalization" of fans. The band would release their second album Antikörper in October 2006. This album would become the band's debut album on the German Media Control Charts as it charted at No. 85. The band then toured with U.D.O. in December 2006. In 2007, Eisbrecher performed at two major German music festivals, Wave-Gotik-Treffen and Summer Breeze Open Air. In May 2008, live bass player Martin Motnik left the band, and was replaced by former Megaherz guitar player Olliver Pohl. "Kann denn Liebe Sünde sein?" was released on 18 July 2008 in Germany as the first single to promote their third album, Sünde. It reached third place in the German Alternative charts. The album was released on 22 August 2008 in Germany and debuted on the Media Control Charts at 18th place. The band then went a tour between September 2008 and October 2009, playing in Germany, Austria, Russia, the Netherlands and Switzerland. Music videos were planned for "This Is Deutsch" and "Kann denn Liebe Sünde sein", but were cancelled in favor of new material and live shows. In early March 2009, the band signed with a new American music label, Metropolis Records, due to Dancing Ferret Discs closing in late 2008. Eiszeit and Die Hölle muss warten (2009–2013) On 24 April 2009, Wesselsky and Noel Pix were guests on Radio Goethe to promote the American release of Sünde. Wesselsky mentioned that he would love to tour the United States "as soon as possible". He also mentioned that, with the popularity of Rammstein, Nena and Falco, he hopes that Eisbrecher can become the next big German act in the United States. He also talked about their upcoming fourth album; no title was named, but he stated that work was in progress. He described that the new album will be "very rockish, very pop and very heart breaking." On 20 June 2009, Eisbrecher performed at their first major Austrian music festival, Nova Rock Festival; other bands, such as Killswi
https://en.wikipedia.org/wiki/Synchronization%20in%20telecommunications
Many services running on modern digital telecommunications networks require accurate synchronization for correct operation. For example, if telephone exchanges are not synchronized, then bit slips will occur and degrade performance. Telecommunication networks rely on the use of highly accurate primary reference clocks which are distributed network-wide using synchronization links and synchronization supply units. Ideally, clocks in a telecommunications network are synchronous, controlled to run at identical rates, or at the same mean rate with a fixed relative phase displacement, within a specified limited range. However, they may be mesochronous in practice. In common usage, mesochronous networks are often described as synchronous. Components Primary reference clock (PRC) Modern telecommunications networks use highly accurate primary master clocks that must meet the international standards requirement for long term frequency accuracy better than 1 part in 1011. To get this performance, atomic clocks or GPS disciplined oscillators are normally used. Synchronization supply unit Synchronization supply units (SSU) are used to ensure reliable synchronisation distribution. They have a number of key functions: They filter the synchronisation signal they receive to remove the higher frequency phase noise. They provide distribution by providing a scalable number of outputs to synchronise other local equipment. They provide a capability to carry on producing a high quality output even when their input reference is lost, this is referred to as holdover mode. Quality metrics In telecoms networks two key parameters are used for measurement of synchronisation performance. These parameters are defined by the International Telecommunication Union in its recommendation G.811, by European Telecommunications Standards Institute in its standard EN 300 462-1-1, by the ANSI Synchronization Interface Standard T1.101 defines profiles for clock accuracy at each stratum level, and by Telecordia/Bellcore standards GR-253 and GR-1244. Maximum time interval error (MTIE) is a measure of the worst case phase variation of a signal with respect to a perfect signal over a given period of time. Time deviation (TDEV) is a statistical analysis of the phase stability of a signal over a given period of time. See also PDH, SDH and SONET Caesium standard Synchronous network Isochronous signal Mesochronous network Plesiochronous system Asynchronous communication Phase-locked loop References Synchronization Data transmission Network architecture
https://en.wikipedia.org/wiki/Image-based%20modeling%20and%20rendering
In computer graphics and computer vision, image-based modeling and rendering (IBMR) methods rely on a set of two-dimensional images of a scene to generate a three-dimensional model and then render some novel views of this scene. The traditional approach of computer graphics has been used to create a geometric model in 3D and try to reproject it onto a two-dimensional image. Computer vision, conversely, is mostly focused on detecting, grouping, and extracting features (edges, faces, etc.) present in a given picture and then trying to interpret them as three-dimensional clues. Image-based modeling and rendering allows the use of multiple two-dimensional images in order to generate directly novel two-dimensional images, skipping the manual modeling stage. Light modeling Instead of considering only the physical model of a solid, IBMR methods usually focus more on light modeling. The fundamental concept behind IBMR is the plenoptic illumination function which is a parametrisation of the light field. The plenoptic function describes the light rays contained in a given volume. It can be represented with seven dimensions: a ray is defined by its position , its orientation , its wavelength and its time : . IBMR methods try to approximate the plenoptic function to render a novel set of two-dimensional images from another. Given the high dimensionality of this function, practical methods place constraints on the parameters in order to reduce this number (typically to 2 to 4). IBMR methods and algorithms View morphing generates a transition between images Panoramic imaging renders panoramas using image mosaics of individual still images Lumigraph relies on a dense sampling of a scene Space carving generates a 3D model based on a photo-consistency check See also View synthesis 3D reconstruction Structure from motion References External links Quan, Long. Image-based modeling. Springer Science & Business Media, 2010. Computer graphics Applications of computer vision 3D imaging
https://en.wikipedia.org/wiki/Radio%20audiobook
Radio audiobook is a radio programming format for audiobooks. The programming is usually in series format due to the length of the books. The books may be abridged or unabridged, sometimes as dramatisations. The productions may be for radio only, or also distributed through other media such as vinyl record, cassette tape, CD-ROM and digital download. Books include all genres such as fiction and non-fiction. They are read by an actor, the author or a full-cast. Channels which have regular audiobook programming include BBC Radio 4, BBC 6Music, Oneword and BBC World Service in the UK, RTÉ Radio 1 in Ireland, National Public Radio in the US, and ABC local radio and ABC Radio National in Australia. The concept is differentiated from the radio reading service, which also consists of reading books in an audio format, in that the radio reading service is designed for accessibility to the visually impaired, illiterate and others unable to read, whereas the radio audiobook format is designed as entertainment for a general audience. The radio reading service is thus more restricted because it must read its material verbatim and lacks the artistic licence available to a radio audiobook format. List of audiobook shows The following is a list of radio shows that play audiobooks. It is not a list of specific audiobooks. BBC Radio 4 "Afternoon Reading" external link features either a short story or an abridged book. "Book at Bedtime" external link presents modern classics, new works by leading writers and literature from around the world. "Book of the Week" external link Non-fiction, biography, autobiography, travel, diaries, essays, humour and history. "Poetry Please" external link a selection of poems chosen by listeners. BBC World Service "Off the Shelf" serialized books of many types. It is not on air anymore. BBC Radio 4 Extra BBC 6Music "Steve Lamacq" external link Steve Lamacq's Library of Rock and Roll related books. "6Music's reading festival" external link Six Music celebrates reading, writing and books. RTÉ Radio 1 "Fiction 15" external link newly commissioned writing for younger listeners. "Francis Macmanus Short Story" external link short stories. "The Poem and the Place" external link brings together poems and the places which inspired them. ABC Radio National "The Book Reading" external link classic and contemporary fiction by Australian and world writers, read by actors. "Short story" external link two short stories a week. ABC local radio "Short story project" external link short stories from around Australia. Oneword Virtually all of Oneword's programming, 24 hours a day. external link See also The World's Great Novels NBC Presents: Short Story Accessible information Radio Radio Radio formats
https://en.wikipedia.org/wiki/HP%20Brio
The HP Brio was a line of desktop personal computers made by Hewlett-Packard. The 7000 series was targeted at mainstream business computing, and started with a street price of $2449, inclusive of a 15-inch monitor. The 8000 was designed for "power-hungry" business users. Both series were announced in September 1998. In June 1999, HP announced Brio models BA and BAx that included Microsoft Office 2000 Small Business. They were launched at street prices of $999 and $1,499 respectively. Announced in October 1999 at an estimated street price of $499, the BA200 was aimed at small businesses that purchase white box PCs—non-branded PCs assembled by resellers or consumer PCs from manufacturers such as eMachines at retail. The PCs came ready for Windows 2000, and were certified for Novell network operating systems, for easy integration into a networked environment. They also shipped with HP Brio Internet Center and HP Brio Center, which together provided comprehensive Internet and e-commerce capabilities and online support. Alongside HP's announcement of a new HP Brio Business PC line with the HP Brio Internet Center, HP also announced an agreement with AT&T; WorldNet Service to provide small- and medium-business customers with fast, easy access to the Internet. The alliance with AT&T was meant to provide small and medium businesses with an end-to-end solution—from initial connection to creating a Web site and online store. In 1998, HP partnered with Symantec to incorporate pcANYWHERE32, a remote-control software package, on all HP Brio PCs for small and medium companies without an information technology (IT) staff. Geared for small business users, the value lines of Brio PCs offered on-screen and online tech support. The latter came via a customized Yahoo! web site that featured news, business tips, stock reports, and product-specific service and support content from HP. In May 2000, the HP Brio BA200 placed sixth on PC World's May list of Top 10 Budget PCs. In January 2002, Netscape Communications announced that it had licensed its Netcenter Web portal to Hewlett-Packard for the Brio line of business computers. Models The following is a list of all HP Brio models ever launched. "x" in the following names is a variable for models 71-85. HP Brio 71xx HP Brio 80xx HP Brio 81xx HP Brio 82xx HP Brio 83xx HP Brio 84xx HP Brio 85xx HP Brio BA200 HP Brio BA210 HP Brio BA400 HP Brio BA410 HP Brio BA600 HP Brio BAx HP Brio BA HP Brio BA300 References Brio
https://en.wikipedia.org/wiki/Machin-like%20formula
In mathematics, Machin-like formulae are a popular technique for computing (the ratio of the circumference to the diameter of a circle) to a large number of digits. They are generalizations of John Machin's formula from 1706: which he used to compute to 100 decimal places. Machin-like formulas have the form where is a positive integer, are signed non-zero integers, and and are positive integers such that . These formulas are used in conjunction with Gregory's series, the Taylor series expansion for arctangent: Derivation The angle addition formula for arctangent asserts that if All of the Machin-like formulas can be derived by repeated application of equation . As an example, we show the derivation of Machin's original formula one has: and consequently Therefore also and so finally An insightful way to visualize equation is to picture what happens when two complex numbers are multiplied together: The angle associated with a complex number is given by: Thus, in equation , the angle associated with the product is: Note that this is the same expression as occurs in equation . Thus equation can be interpreted as saying that multiplying two complex numbers means adding their associated angles (see multiplication of complex numbers). The expression: is the angle associated with: Equation can be re-written as: Here is an arbitrary constant that accounts for the difference in magnitude between the vectors on the two sides of the equation. The magnitudes can be ignored, only the angles are significant. Using complex numbers Other formulas may be generated using complex numbers. For example, the angle of a complex number is given by and, when one multiplies complex numbers, one adds their angles. If then is 45 degrees or radians. This means that if the real part and complex part are equal then the arctangent will equal . Since the arctangent of one has a very slow convergence rate if we find two complex numbers that when multiplied will result in the same real and imaginary part we will have a Machin-like formula. An example is and . If we multiply these out we will get . Therefore, . If you want to use complex numbers to show that you first must know that when multiplying angles you put the complex number to the power of the number that you are multiplying by. So and since the real part and imaginary part are equal then, Lehmer's measure One of the most important parameters that characterize computational efficiency of a Machin-like formula is the Lehmer's measure, defined as . In order to obtain the Lehmer's measure as small as possible, it is necessary to decrease the ratio of positive integers in the arctangent arguments and to minimize the number of the terms in the Machin-like formula. Nowadays at the smallest known Lehmer's measure is due to H. Chien-Lih (1997), whose Machin-like formula is shown below. It is very common in the Machin-like formulas when all numerators Two-term formulas In the special
https://en.wikipedia.org/wiki/USB%20drive
USB drive may refer to: A USB flash drive or "thumb drive", a USB-connected computer storage using semiconductor non-volatile random-access memory A USB external drive, a hard drive fitted with a USB interface Secure Digital, a non-volatile memory card format CompactFlash, a flash memory mass storage device Memory Stick, a removable flash memory card format
https://en.wikipedia.org/wiki/Talkman
Talkman (PSP-240) is a program developed by Sony Computer Entertainment for the Sony PlayStation Portable video game console. It is a voice-activated translation software application that operates in four languages Japanese, English, Korean, and Chinese (Mandarin). The name "Talkman" is a reference to Sony's Walkman line of portable audio products. It was released in Japan on November 17, 2005 and in America on August 5, 2008 (via the PlayStation Store) as Talkman Travel. In America, however, instead of receiving all the languages included in the Japanese version in one package, you have the option to buy a single pack for $2.99 a piece. Available packs are: Paris (French), Rome (Italian), and Tokyo (Japanese). The software is designed for travelers and entertainment, mostly containing slang and useful travel phrases. While originally sold in and designed for the Japanese market for Japanese users, its translation function operates between all four languages . In Japan, the software has proven popular with the middle-aged female demographic due to an interest in South Korean products, and Korean-language soap operas and movies; and as a fun English education aid for children . This product has also been officially released in Hong Kong with a Traditional Chinese packaging and manual. However, it does not seem that Sony is manufacturing any more of these for the Hong Kong market and most retailers that are sold out claims that it will no longer be restocked. Outside of pure translations, Talkman also lets players play games to test their fluency of a language. The program comes with a USB microphone included. This microphone draws power through two gold-colored contacts on the top of the PSP, one on each side of the mini-USB port. This is uncommon due to the ability for most USB products to draw power through USB. These proprietary contacts are similar to the gold-colored contacts on the bottom-right of the device, which are used for charging. Note: The Chotto Shot (aka "Go!Cam") has a built-in microphone that also can be used with the Talkman program. Furthermore, the PSP-3000 model and PSP Go have built-in microphones that work with this application, without the need for any external attachments. Talkman Euro Following the success of the Asian version of Talkman, a version designed for translating European languages was developed and released on June 16, 2006. Talkman Euro is available in two versions. The Japanese version contains support for English, Italian, Spanish, German, French, and Japanese, while the Chinese version contains support for Traditional Chinese instead of Japanese. The differences on the packaging (the Japanese flag as opposed to a flag with the word "mie" in Chinese) are minimal and hard to notice. Talkman UMD-only package Talkman is also released as a UMD-only package, so users who already have the USB mic or camera can choose to purchase this standalone version. The Sony PSP Headset and the built-in microphone o
https://en.wikipedia.org/wiki/Surprise%20Chef
Surprise Chef is an Australian cooking television show that was broadcast on the Seven Network from 2001 to 2003. The show revolved around chef Aristos Papandroulakis, who would surprise an unwitting Coles supermarket shopper with an offer to cook dinner for them in their own home. If taken up on the offer, Papandroulakis then set himself to cook a filling meal using only the ingredients available to him from their pantry, fridge or what groceries they had bought. He also set himself a "challenge ingredient"; in one episode this involved using a bottle of Coca-Cola as a marinade. In bookending segments, Papandroulakis was also joined by co-presenters Ian "Herbie" Hemphill and Flip Shelton, who gave tips on food preparation and meal ideas. Later, Greg Duncan Powell, Jon Fitzgerald and Ben Canaider joined the cast, giving advice on choosing wines, while Cindy Sargon replaced Shelton in season 3. See also Take Home Chef, a similar American series References External links Surprise Chef at the National Film and Sound Archive Seven Network original programming 2001 Australian television series debuts 2003 Australian television series endings Australian cooking television series
https://en.wikipedia.org/wiki/Macintosh%20II%20Repair%20and%20Upgrade%20Secrets
Macintosh II Repair and Upgrade Secrets is a 264-page hardcover do-it-yourself book written by Larry Pina that describes how to repair and upgrade a Macintosh II personal computer. The book was first published in 1991 and is now out of print. It came with a diskette. See also Larry Pina Computer books Macintosh internals Books by Larry Pina
https://en.wikipedia.org/wiki/Hayden%20Book%20Company
Hayden Book Company (abbreviated Hayden Book Co.) was an imprint of MacMillan Computer Publishing USA that published computing books, with a particular emphasis on the Macintosh platform and desktop design. Video games and educational software for home computers, such as Championship Golf, Sargon II, and Sargon III, were published as Hayden Software. References Book publishing companies of the United States Video game companies of the United States Video game publishers
https://en.wikipedia.org/wiki/Perspective%20cloning
In computer graphics, perspective cloning is a general cloning technique in which an object is removed from a picture with elements from other parts. What distinguishes cloning from perspective cloning is that perspective is automatically compensated for. Photoshop version CS2 and the GIMP 2.3 has a perspective cloning tool. External links Computer graphic techniques
https://en.wikipedia.org/wiki/Cray-4
The Cray-4 was intended to be Cray Computer Corporation's successor to the failed Cray-3 supercomputer. It was marketed to compete with the T90 from Cray Research. CCC went bankrupt in 1995 before any Cray-4 had been delivered. Design The earlier Cray-3 was the first major application of gallium arsenide (GaAs) semiconductors in computing. It was not considered a success, and only one Cray-3 was delivered. Seymour Cray moved on to the Cray-4 design, announcing the design in 1994. The Cray-4 was essentially a shrunk and sped-up version of the Cray-3, consisting of a number of vector processors attached to a fast memory. The Cray-3 supported from four to sixteen processors running at 474 MHz, while the Cray-4 scaled from four to sixty-four processors running at 1 GHz. The final packaging for the Cray-4 was intended to fit into , and was to be tested in the smaller one-CPU "tanks" from the Cray-3. A midrange system included 16 processors, 1,024 megawords (8192 MB) of memory and provided 32 gigaflops for $11 million. The local memory architecture used on the Cray-2 and Cray-3 was dropped, returning to the mass of B- and T- registers on earlier designs, owing to Seymour's lack of success using the local memory effectively. 1994 "Significant technical progress was made during 1994 on the CRAY-4, which takes advantage of technologies and manufacturing processes developed during the design and manufacture of the CRAY-3. The Company announced introduction of the CRAY-4 to the market on November 10, 1994. Several single processor CRAY-4 prototype systems, each with 64 megawords of memory, were undergoing diagnostic testing prior to the Company filing for bankruptcy. The Company began testing individual CRAY-4 modules at the start of 1994 and planned to be able to deliver a 4-processor CRAY-4 prototype system by approximately the end of the second quarter of 1995. Upon filing of bankruptcy, the Company stopped work on the CRAY-4." Legacy The processor with serial number 001 sold at auction for $37,500 on 22 September 2015. Manufactured in 1995, it is believed to be the only one in existence. Parts of CPU prototypes exist. Marketing brochures also exist. References External links 4 Vector supercomputers
https://en.wikipedia.org/wiki/1840s%20Atlantic%20hurricane%20seasons
This article encompasses the 1840–1849 Atlantic hurricane seasons. While data is not available for every storm that occurred, some parts of the coastline were populated enough to give data of hurricane occurrences. Each season was an ongoing event in the annual cycle of tropical cyclone formation in the Atlantic basin. Most tropical cyclone formation occurs between June 1 and November 30. 1840 Atlantic hurricane season Tropical Storm One June 19–23. In the middle of June, a tropical storm passed west of Lake Charles, Louisiana, accompanied by several days of heavy rain. Strong winds on June 21 damaged corn crops. Tropical Storm Two September 17–18 A tropical storm struck Galveston, Texas. Tropical Storm Three On an unspecified date in 1840, a hurricane reportedly caused severe flooding that destroyed entire villages at the mouth of the Rio Grande. Unclear whether these events are related to prior storm that struck Galveston. 1841 Atlantic hurricane season Tropical Storm One August 23–24. A tropical storm was reported off the southern U.S. Atlantic coast. Hurricane Two The Late Gale at St. Joseph. September 7–16. A strong tropical storm hit Barbados in early September, then traveled to the Florida Panhandle on September 14 and 15, and continued on to South Carolina. Hurricane Three September 25–27. A hurricane was reported off the Cape Hatteras coast that later traveled to Nova Scotia. Hurricane Four The October Gale of 1841. September 25-October 4. The hurricane was first reported near Barbados and later became an intense hurricane that remained offshore of the Carolinas in early October. It moved northeastward, entraining cold air into its circulation. It became an extratropical storm, and hit New England on October 3. It led to a storm of snow and sleet in Connecticut, bringing drifts of up to of snow in some areas. The storm wrecked the Georges Bank fishing fleet which drowned 81 fishermen and knocked down trees, tore roofs off houses and forced boats to go up on shore. The storm also destroyed a saltworks factory along Cape Cod, sending the economy to a slump. In 1842, a monument was erected to remember the sailors and fishermen lost at sea to the "October Gale" of 1841. Hurricane Five The Key West Hurricane of 1841. October 18–21. In October, a hurricane hit Cuba, crossing near Havana. After crossing the island, it passed by the Florida Keys on October 18 and 19. The hurricane eroded part of Key West, destroyed the keeper's house at Sand Key Light, and damaged the seawall and later headed towards Bermuda. Wrecked many ships in Lower Keys. 1842 Atlantic hurricane season The 1842 Atlantic hurricane season featured several maritime catastrophes in the Gulf of Mexico and along the U.S. East Coast, and produced one of the only known tropical cyclones to directly affect the Iberian Peninsula. As the season falls outside the scope of the Atlantic hurricane database, records of most storms in 1842 are scarce, and only approximate track
https://en.wikipedia.org/wiki/James%20Hendler
James Alexander Hendler (born April 2, 1957) is an artificial intelligence researcher at Rensselaer Polytechnic Institute, United States, and one of the originators of the Semantic Web. He is a Fellow of the National Academy of Public Administration. Education Hendler completed his Doctor of Philosophy degree at Brown University in 1986 with a thesis on automated planning and scheduling. He also has an MS (1981) in Cognitive Psychology from Southern Methodist University, a MSc (1983) from Brown University, and a BS (1978) from Yale University. Research Hendler's research interests are in the semantic web and artificial intelligence. Hendler held a longstanding position as professor at the University of Maryland where he was the Director of the Joint Institute for Knowledge Discovery and held joint appointments in the Department of Computer Science, the Institute for Advanced Computer Studies and the Institute for Systems Research. Hendler was the Director for Semantic Web and Agent Technology at the Maryland Information and Network Dynamics Laboratory. He is a Fellow of the American Association for Artificial Intelligence, the British Computer Society, the Institute of Electrical and Electronics Engineers, the AAAS and the Association for Computing Machinery and the National Academy of Public Administration (United States). Hendler was co-author, with Tim Berners-Lee and Ora Lassila, of the article "The Semantic Web" which appeared in Scientific American in 2001. On June 14, 2006, James A. Hendler was appointed senior constellation professor of the Tetherless World Constellation at Rensselaer Polytechnic Institute, and he became a professor at that institute starting on January 1, 2007. Hendler has appointments in Computer, Web and Cognitive Sciences, and served as the Dean for Information Technology and Web Science from 2009 to 2012. In 2012 he became the Head of the Computer Science Department at RPI and in 2013 he became the Director of the RPI Institute for Data Exploration and Applications. In 2017, he also became the Rensselaer lead of the joint RPI-IBM Center for Health Empowerment by Analytics, Learning and Semantics, (HEALS) a member of the IBM Artificial Intelligence Horizons Network. In 2019, Hendler was named Director of the RPI-IBM Artificial Intelligence Research Collaboration, a large joint project between IBM Research and Rensselaer Polytechnic Institute. In 2022, Hendler became the Founding Director of Rensselaer's Future of Computing Institute. Hendler helps lead the Tetherless World Constellation on increasing access to information at any time and place without the need for a "tether" to a specific computer or device. Researchers envision an increasingly web-accessible world in which personal digital assistants (PDAs), cameras, music-listening devices, cell phones, smartphones, laptops, and other technologies converge to offer the user interactive information and communication. Hendler is the former chair of the boar
https://en.wikipedia.org/wiki/Into%20the%20Labyrinth%20%28TV%20series%29
Into the Labyrinth is a British children's television series. It was produced by HTV for the ITV network between 1980 and 1982, the first series was not broadcast until May 1981. Three series, each consisting of seven 25-minute episodes, were produced and directed by Peter Graham Scott. The series was created by Scott along with Bob Baker, who had previously written several stories for Doctor Who. The first series only was later shown in the United States as part of "The Third Eye" science fiction series on Nickelodeon. It was also broadcast on ABC TV in Australia, TVE in Spain, RTÉ One and RTÉ Two as part of The Den in Ireland, ETB 1 and ETB 2 in Basque Country, TV2 in Malaysia and both RTV and ATV in Hong Kong. The series also reran on British satellite television and aired on The Children's Channel as part of one of its wrapper programmes Roustabout. Synopsis The series was based around a struggle between two timeless, feuding sorcerers - the noble Rothgo (Ron Moody) and the evil Belor (Pamela Salem). Each aimed to obtain possession of the Nidus, a magical object of limitless power. The Nidus actually belonged to Rothgo, but it was stolen by Belor who used her own magic to send it through time and space so that Rothgo would not be able to find it. Without the power of the Nidus, Rothgo would ultimately die. The first series followed a group of modern-day children (Phil, Helen and Terry) who find Rothgo, almost lifeless, in a labyrinthine cave. Rothgo sends the children through different periods of time to search for the Nidus, which is disguised as a different object in each time period and can only be seen in reflection. The children arrive at various points of history (the French Revolution, Ancient Greece, English Civil War, etc.), in which they find an earlier version of Rothgo himself, playing a character from each period. Together they search for the Nidus, but their attempts are constantly thwarted by Belor who also appears in each time period disguised as a character herself. Just as the children are about to retrieve the Nidus, Belor uses her magic to hurl it further through time (using her magical incantation "I deny you the Nidus!" as a bolt of lightning emanates from her fingertips). Belor cannot actually touch the Nidus whilst Rothgo still lives, and so she can only hope to deny him possession of the artefact until he eventually dies. At the end of the first series, the children locate the Nidus (now in the shape of a sword) and finally manage to outwit Belor and return the Nidus to Rothgo, who offered to share its power with Belor. She refused and was reduced to a lifeless skull. In the second series, Belor rises again from death with her own power source, the Albedo, with which she hopes to destroy Rothgo and take possession of the Nidus. However, during their battle, the two power sources collide leaving the Albedo destroyed and the Nidus split into five segments which scatter throughout time and space. As before, Rothgo enl
https://en.wikipedia.org/wiki/TOTP
TOTP may refer to: Top of the Pops, a British music chart television programme Time-based one-time password, algorithm in computer security See also Top of the Pops (disambiguation)
https://en.wikipedia.org/wiki/Yoigo
Xfera Móviles, S.A.U., d/b/a Yoigo, is the fourth-largest mobile network operator in Spain and a subsidiary of the Spanish telecommunications company Grupo MásMóvil. Yoigo has a licence and its own cellular network for GSM/2G, UMTS/3G and LTE/4G technologies, and a national roaming agreement for usage of the 2G, 3G and 4G networks of Orange and Movistar. Although it commercially launched in December 2006, the company was founded in 2000, and had a turbulent start. From its creation, it was owned primarily by TeliaSonera (now Telia Company), and since 21 June 2016 is now the sole property of Grupo MásMóvil, after the CNMC (regulator agency like Federal Communications Commission in Spain) authorised the purchase of 100% of its share capital. Its main competitors are Spain's other three companies with their own networks, Movistar, Vodafone, Orange, and MVNOs such as Tuenti, Lowi, Amena, and Simyo. History Originally the carrier was to be called Xfera, a name reflected in its currently registered name of Xfera Móviles, SA. It was formed in 2001 as a consortium to compete for a new UMTS licence in Spain, which it finally won. At the time, its main shareholders were the French company Vivendi, the Spanish construction company Grupo ACS and Scandinavian cell phone carrier Sonera (now Telia Company). After several technology and market problems in 2001, in common with the general launch delay suffered by UMTS technology throughout Europe, the company was at a standstill for several years. Its only operations during that time were the creation of its brand image, trying to achieve an agreement with an existing network operator to act as a backup for their newly created 3G network, and the setting up of a number of base stations so as to not lose their UMTS licence, which required them to maintain an active service prior to a qualifying date. As of June 2003 most of its investors were complaining about the huge amount of money they had lost in the yet-to-be-launched project, and in summer 2003 Vivendi —which faced problems of its own at that time— eventually left the group by selling its shares to the rest of the shareholders at the symbolic price of 1 €. In December 2003, with the backing of the remaining shareholders, the board of directors decided to make an additional investment of €135 million, and opened negotiations with Amena (now Orange España) and Vodafone Spain, in the hope of using a third party network as backup coverage while Xfera's own network was built. Further increasing operating costs, for legal reasons the company was obliged to keep a number of base stations operating from 2003 on, despite the fact that the company had no actual users. This was due to the terms of the licence Xfera had been awarded, and failure to comply with such terms would have put Xfera in a poor position to rebuild its network, or even to keep the licence. The remaining shareholders as of May 2005 were a number of Spanish companies with no previous experie
https://en.wikipedia.org/wiki/Systems%20management
Systems management refers to enterprise-wide administration of distributed systems including (and commonly in practice) computer systems. Systems management is strongly influenced by network management initiatives in telecommunications. The application performance management (APM) technologies are now a subset of Systems management. Maximum productivity can be achieved more efficiently through event correlation, system automation and predictive analysis which is now all part of APM. Centralized management has a time and effort trade-off that is related to the size of the company, the expertise of the IT staff, and the amount of technology being used: For a small business startup with ten computers, automated centralized processes may take more time to learn how to use and implement than just doing the management work manually on each computer. A very large business with thousands of similar employee computers may clearly be able to save time and money, by having IT staff learn to do systems management automation. A small branch office of a large corporation may have access to a central IT staff, with the experience to set up automated management of the systems in the branch office, without need for local staff in the branch office to do the work. Systems management may involve one or more of the following tasks: Hardware inventories. Server availability monitoring and metrics. Software inventory and installation. Anti-virus and anti-malware. User's activities monitoring. Capacity monitoring. Security management. Storage management. Network capacity and utilization monitoring. Anti-manipulation management Functions Functional groups are provided according to International Telecommunication Union Telecommunication Standardization Sector (ITU-T) Common management information protocol (X.700) standard. This framework is also known as Fault, Configuration, Accounting, Performance, Security (FCAPS). Fault management Troubleshooting, error logging and data recovery Configuration management Hardware and software inventory As we begin the process of automating the management of our technology, what equipment and resources do we have already? How can this inventorying information be gathered and updated automatically, without direct hands-on examination of each device, and without hand-documenting with a pen and notepad? What do we need to upgrade or repair? What can we consolidate to reduce complexity or reduce energy use? What resources would be better reused somewhere else? What commercial software are we using that is improperly licensed, and either needs to be removed or more licenses purchased? Provisioning What software will we need to use in the future? What training will need to be provided to use the software effectively? Software deployment What steps are necessary to install it on perhaps hundreds or thousands of computers? Package management How do we maintain and update the software we are using, possibly
https://en.wikipedia.org/wiki/Mnemonist
The title mnemonist refers to an individual with the ability to remember and recall unusually long lists of data, such as unfamiliar names, lists of numbers, entries in books, etc. Some mnemonists also memorize texts such as long poems, speeches, or even entire books of fiction or non-fiction. The term is derived from the term mnemonic, which refers to a strategy to support remembering (such as the method of loci or major system), but not all mnemonists report using mnemonics. Mnemonists may have superior innate ability to recall or remember, in addition to (or instead of) relying on techniques. Structure of mnemonic skills While the innateness of mnemonists' skills is debated, the methods that mnemonists use to memorize are well-documented. Many mnemonists have been studied in psychology labs over the last century, and most have been found to use mnemonic devices. Currently, all memory champions at the World Memory Championships have said that they use mnemonic strategies, such as the method of loci, to perform their memory feats. Skilled memory theory was proposed by K. Anders Ericsson and Bill Chase to explain the effectiveness of mnemonic devices in memory expertise. Generally, short-term memory has a capacity of seven items; however, in order to memorize long strings of unrelated information, this constraint must be overcome. Skilled memory theory involves three steps: meaningful encoding, retrieval structure, and speed-up. Encoding In encoding, information is encoded in terms of knowledge structures through meaningful associations. This may initially involve breaking down long lists into more manageable chunks that fall within the capacity of short term memory. Verbal reports of memory experts show a consistent grouping of three or four. A digit sequence 1-9-4-5, for example, can then be remembered as "the year World War Two ended". Luria reported that Solomon Shereshevsky used synesthesia to associate numbers and words as visual images or colors to encode the information presented to him, but Luria did not clearly distinguish between synesthesia and mnemonic techniques like the method of loci and number shapes. Other subjects studied have used previous knowledge such as racing times or historical information to encode new information. This is supported by studies that have shown that previous knowledge about a subject will increase one's ability to remember it. Chess experts, for example, can memorize more pieces of a chess game in progress than a novice chess player. However, while there is some correlation between memory expertise and general intelligence, as measured by either IQ or the general intelligence factor, the two are by no means identical. Many memory experts have been shown to be average to above-average by these two measures, but not exceptional. Retrieval The next step is to create a retrieval structure by which the associations can be recalled. It serves the function of storing retrieval cues without having to use sho
https://en.wikipedia.org/wiki/Itchy%20%26%20Scratchy%20Land
"Itchy & Scratchy Land" is the fourth episode of the sixth season of the American animated television series The Simpsons. It first aired on the Fox network in the United States on October 2, 1994. Wanting a perfect family vacation, the Simpson family visits Itchy & Scratchy Land. The episode was written by John Swartzwelder and directed by Wes Archer. Plot Bart and Lisa want to visit Itchy & Scratchy Land, an amusement park, but Marge has already planned a family vacation to a bird sanctuary. Bart and Lisa persuade their parents to visit the theme park by revealing it has areas for adults, including bars, bowling alleys and a rehab center. Marge dislikes Itchy & Scratchy Land's violent themes and attractions, but the family's trip goes well until Homer and Bart start assaulting the park's mascot performers, with Bart launching a stink bomb into one's Itchy suit, and Homer kicking another in the rear. Both are arrested by park security and locked in a detention cell. Marge lectures Bart and Homer after they are released from custody. Despite a park employee assuring the Simpsons the Itchy and Scratchy robots are programmed to only attack each other, they go rogue and start attacking humans. A worker refuses to allow the Simpsons to evacuate aboard a helicopter because of Bart and Homer's misdeeds. The power supply is cut, plunging the park into darkness. A horde of Itchy and Scratchy robots advances on the Simpsons. While frantically throwing things to repel them, Homer discovers a camera flash short-circuits the robots' systems and immobilizes them. The Simpsons grab dozens of cameras from a gift shop and defeat the entire Itchy & Scratchy army. Employees thank the Simpsons for saving the park. Despite their ordeal, they agree this was their best vacation ever, but Marge insists that none of them ever mention it again. Production "Itchy & Scratchy Land", written by the entire writing team but credited to John Swartzwelder, was a very difficult episode to produce. It involved creating an entirely new environment, which meant large amounts of writing and all new sets. At the time that the episode was produced, new, more stringent censorship laws had been put in place. As a result, the Fox network tried to stop the writers from including Itchy & Scratchy cartoons in episodes. In response, the writers created this episode, which they decided would be as violent as possible. The network threatened that if the episode was produced, they would cut the Itchy & Scratchy parts out themselves, but relented when showrunner David Mirkin threatened to tell the media. The writers nevertheless promised to try not to overdo the violence. Although the episode was quite difficult to animate, "Itchy & Scratchy Land" was "a dream come true" for the animators, as they enjoyed animating scenes filled with violence. Cultural references Much of Itchy & Scratchy Land parodies Disneyland. Euro Itchy & Scratchy Land is a parody of Disneyland Paris, then known as Eu
https://en.wikipedia.org/wiki/WQOM
WQOM (1060 AM) is a radio station broadcasting Catholic radio programming in the Boston market. The station is owned by Holy Family Communications and is licensed to Natick, Massachusetts. History The station first began operation November 12, 1972, as WGTR, owned by John Garabedian. It was a full service daytime station for Natick and MetroWest, programming top-40 music. WGTR originally from a small tower in a residential area of Natick. However, Garabedian had long hoped to expand WGTR into Boston itself. In 1980, he won a construction permit to move to a five-tower setup in Ashland, operating at 25,000 watts during the day. This gave it adequate coverage of most of the Boston area. Plans called for WGTR to power down to 2,500 watts at night to protect KYW in Philadelphia and WBZ in Boston; the latter station operated at adjacent 1030 AM. Westinghouse Broadcasting, owner of both KYW and WBZ, complained that the Ashland site would not provide enough protection for those stations. As a result, WGTR was only allowed to operate at 1,700 watts at night. Meanwhile, as Garabedian turned his focus to FM radio station WGTF on Nantucket (now WEII) and, later, music video station WVJV-TV channel 66 in nearby Marlborough (now WUNI), 1060 would go through several formats: all-news, the Stardust adult-standards service (as WSTD), and talk (as WTTP). The station was sold to Satellite Radio Network in 1987, becoming WBIV, a Spanish language religious station. WBIV swapped ownership with the permit for WBMA in Dedham in 1994, eventually moving its programming to WBMA's facility on 890 AM (now WAMG) later that year. As WBMA at that time refused to allow WBIV's new owner, Family Radio, to remain at the Ashland site, 1060 would thus leave the air November 3, 1994, following a transitional period in which WBMA operated in the daylight hours and WBIV at night. Alex Langer bought the WBIV license in 1995, and leased it to Great Commission Broadcasting, who returned it to the air February 6, 1997, as WJLT, a 1,000-watt daytime-only religious station operating from WKOX (now WXKS)'s tower in Framingham. In 1999, Langer changed the call letters to WMEX, and the station announced a format swap with what had been WRPT (now WSRO), once again adopting a talk format. This took effect on-air January 24, 2000, accompanied by a power boost to 40,000 watts from Framingham. In 2001, Langer leased the station to asset manager Brad Bleidt, who changed the calls to WBIX and implemented a business talk format. Bleidt bought the station outright in 2003 for $13.8 million and poured most of his efforts into making WBIX a 24-hour operation once again. In 2004, WBIX began nighttime operations from its old site in Ashland, operating at 2,500 watts. However, soon after a party celebrating the launch of nighttime operations, Bleidt sent a taped confession to the Securities and Exchange Commission admitting that he had turned his asset management firm into a massive Pon
https://en.wikipedia.org/wiki/Realtime%20Games%20Software
Realtime Games Software Ltd. was a British computer game developer, founded in 1984 by three Leeds University students Ian Oliver, Andrew Onions, and Graeme Baird. Their first game, 3D Tank Duel, was a wireframe graphics game, in the style of Atari, Inc.'s Battlezone arcade game, for the ZX Spectrum. This was followed up with Starstrike 3D, a game based on Atari's Star Wars arcade game. Starfox was published in 1987, and Carrier Command was published in 1988. The company was also involved in porting Elite to IBM PC compatibles and Starglider to the ZX Spectrum. Realtime's early titles were self-published. Later games were published by Rainbird. Graeme Baird subsequently went to work for Psygnosis, while Ian Oliver founded Cross Products to produce game development systems for consoles, in a joint venture with Andy Craven of nearby Vektor Grafix. References Defunct video game companies of the United Kingdom Video game companies established in 1984
https://en.wikipedia.org/wiki/Real-time
Real-time or real time describes various operations in computing or other processes that must guarantee response times within a specified time (deadline), usually a relatively short time. A real-time process is generally one that happens in defined time steps of maximum duration and fast enough to affect the environment in which it occurs, such as inputs to a computing system. Examples of real-time operations include: Computing Real-time computing, hardware and software systems subject to a specified time constraint Real-time clock, a computer clock that keeps track of the current time Real-time Control System, a reference model architecture suitable for software-intensive, real-time computing Real-time Programming Language, a compiled database programming language which expresses work to be done by a particular time Applications Real-time computer graphics, sub-field of computer graphics focused on producing and analyzing images in real time Real-time camera system, for controlling cameras in a 3D virtual environment Real-time operating system, for running real-time software Real-time protection, protection enabled constantly, rather than by, say, a virus scan Real-time text, transmitted as it is being typed or produced Real time Java, for real-time programs in Java Real-time disk encryption, encrypting data as it is written to disk Real-time web, whereby information is sent to users as it becomes available Live streaming, continuously delivering multimedia in real time Collaborative real-time editor, simultaneous editing of a document by several users Real-time simulation, simulation able to run at the same rate as reality Real-time Blackhole List, a DNS blacklist Real-time Cmix, a music programming language Real Time AudioSuite, an audio plug-in for Pro Tools Other science and technology Real-time locating system, a system used to automatically identify and track the location of objects or people in real time Real-time gross settlement, an online system for settling financial transactions Real-time kinematic, a satellite navigation technique Real-time polymerase chain reaction, a laboratory technique which monitors target DNA during the PCR
https://en.wikipedia.org/wiki/SQL%20Plus
SQL Plus is the most basic Oracle Database utility, with a basic command-line interface, commonly used by users, administrators, and programmers. Command types SQL Plus understands five categories of text: SQL statements PL/SQL blocks SQL Plus internal commands, for example: environment control commands such as SET environment monitoring commands such as SHOW Comments External commands prefixed by the ! char Scripts can include all of these components. An Oracle programmer in the appropriately configured software environment can launch SQL Plus, for example, by entering: $ sqlplus scott/tiger where the Oracle user scott has the password tiger. SQL Plus then presents a prompt with the default form of: SQL> Interactive use can then start by entering a SQL statement (terminated by a semicolon), a PL/SQL block, or another command. For example: SQL> select 'Hello world' as example from dual; EXAMPLE -------------------------------- Hello world History The first version of SQL Plus was called UFI ("User Friendly Interface"). UFI appeared in Oracle database releases up to Version 4. After Oracle programmers had added new features to UFI, its name became Advanced UFI. The name "Advanced UFI" changed to "SQL Plus" with the release of the version 5 of Oracle. Usage Graphical interfaces from Oracle or third parties have diminished the proportion of Oracle database end-users who depend on the SQL Plus environment. Oracle shops typically continue to use SQL Plus scripts for batch updating or simple reports. Oracle Corporation's wrappers/gui-fications/replacements for SQL Plus include: Oracle SQL Plus Worksheet, a component of OEM iSQL Plus or iSQLPlus, a web-based utility SQL Worksheet, a component of Oracle SQL Developer SQL Workshop (part of Oracle Application Express) Oracle 11g Starting from Oracle database 11g, iSqlplus (web based) and sqlplus GUI no longer ship with Oracle database software. The command-line SQL Plus interface continues in use, mostly for non-interactive scripting or for administrative purposes. The Server Manager Command Line a replacement of SQL*DBA is obsolete and SQL Plus 8i and later allows the user to issue statements like and when connected as SYSDBA. Server Manager 7.1 introduced the command to replace . SQL Plus 8i and later allows the use of CONNECT / AS SYSDBA Compatibility Other vendors have made their software somewhat compatible with SQL Plus script commands or offer a SQL Plus mode of operation. Relevant products include TOAD from Quest Software. Integration Variables SQL Plus-internal variables, accessible within an SQL Plus session, include: user variables, displayable with the DEFINE command and referenceable with one or two cases of a prefixed character (default prefixes: '&' and '&&'). Oracle Corporation calls these variables "substitution variables". Programmers can use them anywhere in a SQL or PL/SQL statement or in SQL Plus commands. They can be populated by a litera
https://en.wikipedia.org/wiki/Cyberflora
The Cyberflora project is a project developed by the Media Lab at Massachusetts Institute of Technology. The project is part of the Anima Machina program at MIT - a program that was developed by Assistant Professor of Media Arts and Sciences and Director of the Robotic Life Group Cynthia Breazeal. The Cyberflora project allowed Breazeal and students involved in the media lab to investigate emotional intelligence in a breed of robots that combines both plant and animal characteristics. The Garden Breazeal's mechanical flower garden is composed of four "species" of robotic flora. Each species is an amalgamation of animal-like conduct and flower-like attributes that is put into a robotic representation that is fully aware of its surrounding environment and can respond to stimuli in a "life-like and distinct manner." Electromechanical systems hidden within the flowers' shells "allow petals to open and close and tentacles to reach or retreat in response to human movement." Soft music, varied throughout the exhibit, is played in the background as people interact with flora. The flowers in the garden use technologies such as capacitive sensing and thermal sensors to react to human hands and bodies elsewhere in the room. Design team Cynthia Breazeal - Project lead Jeff Lieberman - Design lead Ryan Kavanaugh - Graphic design Heather Knight - Undergraduate Blake Brasher - Undergraduate Dan McAnulty - Undergraduate Exhibits Cyberflora was debuted in April 2003 at the National Design Triennial which was hosted by the Cooper-Hewitt, National Design Museum in New York City, New York. The exhibit began on April 22, 2003, and ended on January 25, 2004. References National Design Triennial: Inside Design Now MIT Media Lab: Cyberflora External links Cyberflora Video installation in the National Design Triennial Massachusetts Institute of Technology Robotics projects 2003 in robotics
https://en.wikipedia.org/wiki/Frederic%20Parke
Frederic Ira Parke is an American computer graphics researcher and academic. He did early work on animated computer renderings of human faces. Parke graduated from the University of Utah with a BS degree in physics in 1965. He was then a graduate student of the University of Utah College of Engineering where he received his MS (1972) and PhD (1974) in computer science. In 1972, in a project partially financed by DARPA, Parke made the first 3D animation of a representation of a human face, his wife's face. This animation used a wireframe geometry overlaid with Gouraud shading that produces approximate renderings of curved surfaces. The technique was invented by Parke's Utah colleague Henri Gouraud. A Computer Animated Face In 1974, he created a more complex, parametric model of a human face, demonstrating various expressions and speech synchronization. Snippets of this animation, along with Ed Catmull's 1972 animation of his left hand, were used in the 1976 film Futureworld. Several of the faces also appeared in the music video of Miley Cyrus' 2013 song "We Can't Stop". He has worked at the New York Institute of Technology Computer Graphics Laboratory. Parke teaches at Texas A&M University in the Visualization Sciences program. References External links Homepage of Frederic I. Parke at Texas A&M University 1943 births Living people Computer graphics professionals Texas A&M University faculty University of Utah alumni New York Institute of Technology faculty Scientists from Salt Lake City
https://en.wikipedia.org/wiki/Samsung%20Notebook
Samsung Notebook, formerly known as Samsung Sens (삼성 센스), also marketed as Samsung Series (2011-2013), is a line of portable computers produced by Samsung Electronics. The Sens line was first launched in 1995 and lasted until 2013, exported overseas without the Sens branding, and replaced by Samsung Ativ. Ativ itself was also dropped in favor of Samsung Notebook. As of 2020, Samsung Notebook co-exists with the company's Galaxy Book line of laptops but is facing transition. History The SENS brand (Samsung Electronics Notebook System) started in 1995, a year after Samsung laptop business started with the SPC5800/5900 series in 1994 which initially had a 486 processor and later Pentium 75MHz. In 2001 the three-digit model name was replaced by a new lettered series: A, T, P, Q, V. The A series was equipped with a low-cost AMD Athlon processor. The M30 and M35 came with equipped JBL speakers. The first Intel Centrino platform computer was the X10. A large 17-inch screen model called M40 was released. The X20, X25 and X50 series were released with Intel Sonoma. Another 17 inch laptop, M70, was launched in 2005 featuring a high end graphics chip from Nvidia and a resolution of 1680 x 1050. Its screen could also be used separately. It weighed 5 kg. In 2006, the Sens Q35 was the first notebook PC with WiMAX. It was sold in South Korea and Russia. According to Gartner research, Samsung laptop sales amounted to 1.5 million units in 2007. Sales grew 77% in 2008, 116% in 2009 and 78% in 2010. In 2007 Samsung launched the first ultra mobile PC, the Samsung Q1. It had a 7 inch touchscreen and equipped with features such as WLAN, DMB and navigation. Its second generation was then launched based on Intel Ultra Mobile Platform. In 2007, Samsung created a 19 inch desktop-sized laptop, the Sens G25. For the export market, Samsung Electronics only sold laptops to a number of Western European countries as well as Russia and Ukraine, before expanding. In July 2008 Samsung introduced laptops with Intel Centrino 2 with a crystal black design. Models include Q210 (12.1"), Q310 (13.3"), R560 (15.4") and R710 (17"). In October 2008, Samsung announced its return to the United States and Canada laptop market, with the models being X360, X460, Q310, R610, and P460, and netbook NC1. In January 2011, the premium Samsung Sens 9 (known as Samsung Series 9 internationally) was introduced. It was remarkably sleek and thin, marking a departure from Samsung's previous laptops. It gained attention and was very well received as a result. Samsung Series 5, a mid-ranger, was later introduced and an entry-level Series 3 too. Chromebook variants of the 3 and 5 were also made. In 2012 the second generation Samsung Notebook Series 9 was released. Samsung Series 9, Series 7 Chronos, Series 7 Ultra, and Series 5 Chronos were changed to Ativ Book 9, Ativ Book 8, Ativ Book 7, and Ativ Book 6 with the change to ATIV branding. The Ativ name was abandoned in the domestic market in 2014 an
https://en.wikipedia.org/wiki/Electronic%20Systems
Electronic Systems may refer to: Electronics and related technologies Electrical element Electrical network Electronic system-level design and verification Organizations Goodrich Electronic Systems, a division of the Goodrich Corporation Marconi Electronic Systems, a former business of General Electric; now part of BAE Systems Northrop Grumman Electronic Systems Electronic Systems, a former business of Raytheon Electronic Systems Center, a unit of the United States Air Force located at Hanscom AFB See also Electronic Music Systems (disambiguation) Electronic System, a Belgian musical group
https://en.wikipedia.org/wiki/Jukka%20Tapanim%C3%A4ki
Jukka Tapanimäki (11 August 1961 – 1 May 2000) was a Finnish game programmer from Tampere, Pirkanmaa. Tapanimäki wrote his games for the Commodore 64 computer, and many have been ported to other computer systems. Tapanimäki was a reviewer for MikroBitti and "C" computer magazines; and a freelance writer of advanced-level computer programming articles. He also published a book called C-64 Pelintekijän Opas (or "C-64 Game Maker's Guide") in 1990. Career choice Tapanimäki was originally interested in a career as a graphic designer for advertisements. After failing the entrance exams to the University of Art and Design Helsinki twice, he instead started studying literature in 1984. In summer 1985, he purchased a Commodore 64 computer. Although he had no previous experience with computers, Tapanimäki decided to become a game programmer after a few months. He quit his studies and went on welfare to be able to concentrate on programming. Tapanimäki spent 1986 experimenting. One of his finished programs was named Aikaetsivä, a Finnish language text adventure in the style of Infocom, which the Tamperean retailer Triosoft bought publishing rights to but did not release. The first successfully operating game written by Tapanimäki was Monolith, announced in the June–July 1986 issue of MikroBITTI. It was followed by Minidium, a Uridium-style shoot 'em up published in the January 1987 issue of C Magazine. The development of Minidium was extensively covered in the magazine. Early personal computer enthusiasts followed the development of Tapanimäki's career through his magazine articles. Commercial game successes Octapolis Tapanimäki's first commercial game was Octapolis (1987, published by English Software). Octapolis is a mix of the platform and shoot-'em-up genres. Tapanimäki had created Octapolis completely by himself, except for the music. Netherworld The next year (1988) Tapanimäki had his game Netherworld published. The working title of the game was Abyss Zone. In it, the player has to pilot a spaceship through a series of caves while collecting diamonds. The game was published by Hewson, which used Tapanimäki's face as cover art (without first asking for his permission). The game's music was composed by Jori Olkkonen. Zamzara That same year, Hewson published Zamzara on floppy disk for the Commodore 64. Zamzara is a single-player platform game where the player takes the role of an alien, whose mission is to escape a laboratory complex before a time bomb explodes. The bomb has a time limit of 15 minutes. Various enemies, both stationary and mobile, hinder the player's progress, requiring the player to shoot them in order to advance. The player character is armed with a gun and various additional weapons, which have a finite supply of ammunition. Many action game fans found Zamzara satisfying due to its various graphics styles. Some, however, complained about excessive difficulty. The music by Charles Deenen was generally praised. Moonfall In 1
https://en.wikipedia.org/wiki/Transparent%20Network%20Substrate
Transparent Network Substrate (TNS), a proprietary Oracle computer-networking technology, supports homogeneous peer-to-peer connectivity on top of other networking technologies such as TCP/IP, SDP and named pipes. TNS operates mainly for connection to Oracle databases. Protocol TNS uses a proprietary protocol. Some details have, however, been reverse engineered. See also Transparency (computing) Oracle Net Services Protocol stack References External links Oracle 8 Architecture and Concepts Oracle 9i Architecture of Oracle Net Services Oracle Corporation Network protocols Oracle software
https://en.wikipedia.org/wiki/KIIS%20106.5
KIIS 1065 (call sign: 2WFM) is a commercial FM radio station in Sydney, Australia, on a frequency of 106.5 MHz. KIIS 1065 is one of the flagship stations on ARN's KIIS Network. The station's headline show is The Kyle and Jackie O Show. History 2UW The station, now known as KIIS, began life as 2UW, commencing transmission on 13 February 1925 on 1125 kHz on the AM band. On 1 September 1935, the frequency changed to 1110 kHz and in 1978 changed again to 1107 kHz. 2UW was the home of many live radio plays and had studios for live programmes at Market Street in Sydney, near the intersection with George Street. The management of 2UW moved the station to 365 Kent Street Sydney although for a time they retained the Market Street live audience theatre that had been used for live plays. One of its early breakfast presenters, Russ Walkington, had a character known as Gerald the Grasshopper who pre-dated Sammy Sparrow who appeared on 2UE with Gary O'Callaghan. In 1935 it became the first radio station outside the United States (and thus the first in both the British Empire and the Southern Hemisphere) to broadcast 24 hours a day. During the 1940s and 1950s the format spread throughout the country and by the end of the 1960s, almost all commercial radio stations in Australia were broadcasting day-round. From the early 1960s, 2UW moved away from its older audience and actively pursued the youth market through the introduction of a Top 40 format in response to the music coming from the United States and Great Britain and to provide a vehicle for the up-and-coming Australian local rock scene. 2UW was one of the most innovative AM radio stations in Australia during the mid-1960s through to the early 1970s thanks to the programming of Ray Bean. Ray introduced the NEW2UW (spoken as "new U-W") '1110' men comprising announcers John Melouney (breakfast), John Thompson (morning), Tony McLaren (afternoon), Ward "Pally" Austin (drive time), Rod Christopher (early evening), and Jeff Hall (late nights and Dial A Hit on Saturday nights). They were later joined by 'Baby' John Burgess, Donnie Sutherland, Phil Hunter, Gary Stewart, Graham Sawyer and a range of others, including Malcolm T. Elliott, who took Top 40 radio to a new level as part of the NEW2UW format being broadcast from the Kent Street studios in Sydney. The '1110 men' also took their music to the streets with promotions in such places as beaches, parks and shopping centres. One of the most successful promotions was the NEW2UW studio at the Sydney Royal Easter Show at the old RAS showgrounds at Moore Park. This provided a unique opportunity for the radio station's stars to mingle with their listeners. In 1969 the NEW2UW managed to lure announcer John Laws from his drive time slot at 2UE and gave Laws his first morning programme in Sydney radio which was an immediate success, but also brought much confusion to the audience as the radio station went through a series of breakfast announcers and format changes
https://en.wikipedia.org/wiki/Old%20Roan%20railway%20station
Old Roan railway station is a railway station in Aintree village, Merseyside, England, about seven miles north-east of Liverpool, on the Ormskirk Branch of the Northern Line of the Merseyrail network. Location The station is located on Ormskirk Road, with the southbound platform accessible from Ormskirk Road and the northbound platform under the railway bridge on Copy Lane (which is actually in Netherton). Interchange with local bus services is available on both Ormskirk Road, Copy Lane and from the station's new bus terminus. Old Roan is a more convenient station for much of Aintree Village compared with Aintree. History The station was opened on 17 February 1936 by the London, Midland and Scottish Railway. The line was originally part of the Liverpool, Ormskirk and Preston Railway, until the railway was later absorbed by the Lancashire & Yorkshire Railway. Services ran from Ormskirk to Liverpool Exchange - the latter station closed in 1977 & now services run underground to Moorfields & continue on to Liverpool Central. Housing development on what had previously been farmland encouraged the London Midland And Scottish Railway, successor to the Lancashire and Yorkshire, to build a station at Old Roan in 1935, it being named after an adjacent public house. Although the lines on which Old Roan is situated ran parallel to those of the Cheshire Lines Committee's North Liverpool Extension Line, (running from Liverpool Central High Level to Southport Lord Street), there were no platforms on the CLC line, although a junction between the two routes did exist south of the station. Facilities The station is staffed, 15 minutes before the first train and 15 minutes after the last train. There is a booking office, payphone, toilet and live departure and arrival screens for passenger information. The station has a secure storage for 20 cycles. The station is fully accessible for wheelchair users with lift access to the platforms and step free access to the car park and booking office. Services Old Roan is served by electric trains between Liverpool Central and Ormskirk. There are trains every 15 minutes during Monday to Saturday daytime, and every 30 minutes during the evening and on Sundays. Gallery References External links Railway stations in the Metropolitan Borough of Sefton DfT Category E stations Former London, Midland and Scottish Railway stations Railway stations served by Merseyrail Railway stations in Great Britain opened in 1936
https://en.wikipedia.org/wiki/Embodied%20agent
In artificial intelligence, an embodied agent, also sometimes referred to as an interface agent, is an intelligent agent that interacts with the environment through a physical body within that environment. Agents that are represented graphically with a body, for example a human or a cartoon animal, are also called embodied agents, although they have only virtual, not physical, embodiment. A branch of artificial intelligence focuses on empowering such agents to interact autonomously with human beings and the environment. Mobile robots are one example of physically embodied agents; Ananova and Microsoft Agent are examples of graphically embodied agents. Embodied conversational agents are embodied agents (usually with a graphical front-end as opposed to a robotic body) that are capable of engaging in conversation with one another and with humans employing the same verbal and nonverbal means that humans do (such as gesture, facial expression, and so forth). Embodied conversational agents Embodied conversational agents are a form of intelligent user interface. Graphically embodied agents aim to unite gesture, facial expression and speech to enable face-to-face communication with users, providing a powerful means of human-computer interaction. Advantages Face-to-face communication allows communication protocols that give a much richer communication channel than other means of communicating. It enables pragmatic communication acts such as conversational turn-taking, facial expression of emotions, information structure and emphasis, visualisation and iconic gestures, and orientation in a three-dimensional environment. This communication takes place through both verbal and non-verbal channels such as gaze, gesture, spoken intonation and body posture. Research has found that users prefer a non-verbal visual indication of an embodied system's internal state to a verbal indication, demonstrating the value of additional non-verbal communication channels. As well as this, the face-to-face communication involved in interacting with an embodied agent can be conducted alongside another task without distracting the human participants, instead improving the enjoyment of such an interaction. Furthermore, the use of an embodied presentation agent results in improved recall of the presented information. Embodied agents also provide a social dimension to the interaction. Humans willingly ascribe social awareness to computers, and thus interaction with embodied agents follows social conventions, similar to human to human interactions. This social interaction both raises the believability and perceived trustworthiness of agents, and increases the user's engagement with the system. Rickenberg and Reeves found that the presence of an embodied agent on a website increased the level of user trust in that website, but also increased users' anxiety and affected their performance, as if they were being watched by a real human. Another effect of the social aspect of agents
https://en.wikipedia.org/wiki/RIPE%20NCC
RIPE NCC (Réseaux IP Européens Network Coordination Centre) is the regional Internet registry (RIR) for Europe, the Middle East and parts of Central Asia. Its headquarters are in Amsterdam, Netherlands, with a branch office in Dubai, UAE. A RIR oversees the allocation and registration of Internet number resources (IPv4 addresses, IPv6 addresses and autonomous system numbers) in a specific region. The RIPE NCC supports the technical and administrative coordination of the infrastructure of the Internet. It is a not-for-profit membership organisation with over 10,000 (as of March 2014) members located in over 76 countries in its service region. Any individual or organisation can become a member of the RIPE NCC. The membership consists mainly of Internet service providers (ISPs), telecommunication organisations, educational institutions, governments, regulatory agencies, and large corporations. The RIPE NCC also provides technical and administrative support to Réseaux IP Européens (RIPE), a forum open to all parties with an interest in the technical development of the Internet. History The RIPE NCC began its operations in April 1992 in Amsterdam, Netherlands. Initial funding was provided by the academic networks Réseaux Associés pour la Recherche Européenne (RARE) members, EARN, and EUnet. The RIPE NCC was formally established when the Dutch version of the Articles of Association was deposited with the Amsterdam Chamber of Commerce on 12 November 1997. The first RIPE NCC Activity Plan was published in May 1991. On 25 November 2019, RIPE NCC announced that it had made its “final /22 IPv4 allocation from the last remaining addresses in our available pool. We have now run out of IPv4 addresses.” RIPE NCC will continue to allocate IPv4 addresses, but only “from organisations that have gone out of business or are closed, or from networks that return addresses they no longer need. These addresses will be allocated to our members (LIRs) according to their position on a new waiting list ….” The announcement also called for support for the implementation of the IPv6 roll-out. Activities The RIPE NCC support technical coordination of the Internet infrastructure in its service region and beyond. It undertakes many activities in this area, including: Allocation and registration of Internet number resources (IP addresses and autonomous system numbers) The allocation of IP addresses is important for several reasons. Public addresses need to be unique; if duplicate internet addresses existed on a network, network traffic could be delivered to the wrong host. The RIRs make sure that public addresses are given to one organisation. The RIPE NCC does this for its own service region. Worldwide, IANA assigns blocks of addresses to the RIRs and they distribute these to end users via the LIRs (normally ISPs). Beside making sure that IP addresses and AS Numbers are only allocated to one user, the shortage of IPv4 addresses makes it important that the remaining ad
https://en.wikipedia.org/wiki/UIMX
In computer software, UIM/X or UIMX, the User Interface Management System for X Window, is an interface builder for Motif originally developed by Visual Edge Software (later renamed to Actional Corporation). UIM/X supports object oriented GUI building in C and C++ for the major Unix platforms Solaris, HP-UX, AIX and IRIX (now discontinued), and, in its latest releases, Linux. UIM/X was purchased in 2005 from Bluestone Consulting, and now supported by Integrated Computer Solutions. References External links UIM/X Homepage UIMX reference at the IBM AIX Information Center comp.windows.ui-builders.uimx Newsgroup Integrated Computer Solutions Unix windowing system-related software X-based libraries
https://en.wikipedia.org/wiki/IJCAI%20Award%20for%20Research%20Excellence
The IJCAI Award for Research Excellence is a biannual award before given at the IJCAI conference to researcher in artificial intelligence as a recognition of excellence of their career. Beginning in 2016, the conference is held annually and so is the award. Laureates The recipients of this award have been: John McCarthy (1985) Allen Newell (1989) Marvin Minsky (1991) Raymond Reiter (1993) Herbert A. Simon (1995) Aravind Joshi (1997) Judea Pearl (1999) Donald Michie (2001) Nils Nilsson (2003) Geoffrey E. Hinton (2005) Alan Bundy (2007) Victor R. Lesser (2009) Robert Kowalski (2011) Hector Levesque (2013) Barbara Grosz (2015) for her pioneering research in Natural Language Processing and in theories and applications of Multiagent Collaboration. Michael I. Jordan (2016) for his groundbreaking and impactful research in both the theory and application of statistical machine learning. Andrew Barto (2017) for his pioneering work in the theory of reinforcement learning. Winners of also Turing Award John McCarthy (1971) Allen Newell (1975) Marvin Minsky (1969) Herbert A. Simon (1975) Judea Pearl (2011) Geoffrey Hinton (2018) See also List of computer science awards Turing Award References External links http://www.ijcai.org/awards/ Artificial intelligence competitions Computer science awards
https://en.wikipedia.org/wiki/Eureka%21%20%28video%20game%29
Eureka! is a video game for the Commodore 64 and ZX Spectrum computers, written by Ian Livingstone, developed by Novotrade for Andromeda Software and published by Domark in 1984. Gameplay Eureka! is a text adventure set in European history. It consists of five parts, each of which has to be loaded and played separately. The first four parts can be played in any order, but the fifth part can only be played after all the other parts have been completed. The parts are: Prehistoric Europe: Set in a valley somewhere in the Jurassic period. You have to escape from the valley and avoid hungry dinosaurs. Ancient Rome: Set in ancient Rome somewhere around the 1st or 2nd century BC. You have to escape from slavery and win a horse race at the Circus Maximus. Arthurian Britain: Set in medieval Britain during King Arthur's time. You have to foil the evil Mordred's plans. Wartime Germany: Set in Germany during World War II. You have to escape a prisoner of war camp back to your own country. Modern Caribbean: Set in the Caribbean in the 1980s. You finally confront your nemesis in his island-based stronghold and have to stop him from conquering the world. At the start of Modern Caribbean, the game asks questions from each of the first four parts. You have to answer every question correctly to start the fifth part of the game. The plots in Eureka! are somewhat clichéd and the parser is very simplistic, usually limited to one verb and one object per command. Some rooms in the game have pictures representing them and sometime small animations. Unusually for text adventures, Eureka! maintains RPG-style hit points for your character. These hit points are lowered when your character is injured or raised when he gets something to eat. If the hit points reach 0, your character dies. Another feature of the game, was the rooms that had a time limit, which meant the player had to act quickly to complete a task or to quickly exit the area. The main text adventure was also accompanied by "arcade game" versions of the five parts. These were very simple affairs, where your character ran around a Pac-Man-style maze avoiding enemies. Apart from the maze layout and the graphics, all five parts were pretty much identical. At the start of Arthurian Britain the wind blows a theme from Franz Liszt's Les Préludes. Prize challenge When the game was originally published, Domark promised a prize of £25,000 to the first player to solve the entire game before December 31, 1985. The prize was eventually won by Matthew Woodley, a teenager from the UK. Woodley would eventually go on to work for Domark. Reception Kath Bilgora reviewed Eureka! for White Dwarf #60, giving it an overall rating of 9 out of 10, and stated that "Without having seen the full package, my impression is that this should provide a sustained challenge for the experienced adventure gamer, and a complex and absorbing introduction to the complete novice." Sales figures About 50,000 copies of both versions of
https://en.wikipedia.org/wiki/Matrix%20Template%20Library
The Matrix Template Library (MTL) is a linear algebra library for C++ programs. The MTL uses template programming, which considerably reduces the code length. All matrices and vectors are available in all classical numerical formats: float, double, complex<float> or complex<double>. Furthermore, generic programming allows the usage of arbitrary types as long as they provide the necessary operations. For instance one can use arbitrary integer formats (e.g. unsigned short), types for interval arithmetic (e.g. boost::interval) from the Boost C++ Libraries, quaternions (e.g. boost::quaternion), types of higher precision (e.g. GNU Multi-Precision Library) and appropriate user-defined types. The MTL supports several implementations of dense matrices and sparse matrices. MTL2 has been developed by Jeremy Siek and Andrew Lumsdaine. The latest version, MTL4, is developed by Peter Gottschling and Andrew Lumsdaine. It contains most of MTL2's functionality and adds new optimization techniques as meta-tuning, e.g. loop unrolling of dynamically sized containers can be specified in the function call. Platform-independent performance scalability is reached by recursive data structures and algorithms. Generic applications can be written in a natural notation, e.g. v += A*q - w;, while the library dispatches to the appropriate algorithms: matrix vector products vs. matrix products vs. vector scalar products etcetera. The goal is to encapsulate performance issues inside the library and provide scientists an intuitive interface. MTL4 is used in different finite element and finite volume packages, e.g. the FEniCS Project. See also List of numerical libraries References External links MTL homepage MTL4 homepage C++ numerical libraries
https://en.wikipedia.org/wiki/Laning%20and%20Zierler%20system
The Laning and Zierler system (sometimes called "George" by its users) was the first operating algebraic compiler, that is, a system capable of accepting mathematical formulas in algebraic notation and producing equivalent machine code (the term compiler had not yet been invented and the system was referred to as "an interpretive program"). It was implemented in 1952 for the MIT WHIRLWIND by J. Halcombe Laning and Neal Zierler. It is preceded by non-algebraic compilers such as the UNIVAC A-0. Description The system accepted formulas in a more or less algebraic notation. It respected the standard rules for operator precedence, allowed nested parentheses, and used superscripts to indicate exponents. It was among the first programming systems to allow symbolic variable names and allocate storage automatically. The system also automated the following tasks: floating point computation, linkage to subroutines for the basic functions of analysis (sine, etc.) and printing, and arrays and indexing. The system accepted input on punched tape produced by a Friden Flexowriter. The character set in use at the Whirlwind installation included "upper-case" (superscript) digits and a hyphen, which were used to indicate array indices, function codes, and (integer) exponents. Like other programming notations of its time, the system accepted only single-letter variable names and multiplication was indicated by juxtaposition of operands. A raised dot was available to indicate multiplication explicitly (the character was created by filing off the lower half of a colon!) The system also included support for solution of linear differential equations via the Runge–Kutta method. The system was described in an 18-page typewritten manual written for people familiar with mathematics but perhaps unfamiliar with computers. It contains almost nothing in the way of an introduction to computer hardware. Sample program The following example, taken from page 11 of the system's manual, evaluates for using the Taylor series expansion. The implementation is not terribly efficient, and the system already includes in its subroutine library, but the example serves to give a flavor of the system's syntax. Note that division in the system is evaluated after multiplication: x = 0, 1 z = 1 - x2/2 + x4/2·3·4 - x6/2·3·4·5·6 + x8/2·3·4·5·6·7·8 - x10/2·3·4·5·6·7·8·9·10, PRINT x, z. x = x + .1, e = x - 1.05, CP 1, STOP Applications Few applications were written for the system. One documented application, authored by Laning and Zierler themselves, involved a problem in aeronautics. The problem required seven systems of differential equations to express, and had been given to the Whirlwind because it was too large for MIT's Differential Analyzer to handle. The authors, exploiting the Runge-Kutta feature of their programming system, produced a 97-statement program in two and half hours. The program ran successfully the first time. Influence on FORTRAN Som
https://en.wikipedia.org/wiki/GoodWeave%20International
GoodWeave International (formerly known as Rugmark) is a network of non-profit organizations dedicated to ending illegal child labour in the rug making industry. Founded in 1994 by children's rights activist and Nobel Peace Prize winner Kailash Satyarthi, it provides a certification program that allows companies that pass inspection to attach a logo certifying that their product is made without child labour. It is an example of a product-oriented multistakeholder governance group. Nina Smith, Executive Director of GoodWeave International explains: Media coverage Media outlets worldwide have given detailed coverage to Rugmark (now known as GoodWeave). For example, The PBS NewsHour reported, "GoodWeave offers a labeling system that guarantees that no child labor was used in making the rugs." According to the San Francisco Chronicle, the organization "has helped drastically reform the hand-knotted carpet industry in India, Nepal and Pakistan" The Guardian said, "GoodWeave's model centres on extensive monitoring and auditing at every stage of the supply chain," The Philadelphia Inquirer concluded, "Rugmark is not just a symbol of quality. Its appearance on imported hand-knotted rugs is intended as a signal to consumers that child labor was not used in the production process." Channel 4 News in Belfast observed, "Rugmark is the best scheme for ensuring that carpets are slave free". Responding to concern about violation of children’s rights during the 1980s, human rights organizations in Europe and India, along with UNICEF-India and the Indo-German Export Promotion Council, a German government agency, developed the program to provide assurance to consumers that the oriental carpets they were purchasing were made by adults rather than exploited children, and to provide for the long term educational and rehabilitation of children found working illegally on looms. The program was formally launched in India in the fall of 1994 and expanded into Nepal in 1996. Thereafter, negotiations with programs in Germany, Nepal, India, and the U.S. resulted in the formal creation of Rugmark International. An international constitution was adopted in May 1998. Goodweave standard Rugmark International re-branded the certification program and introduced the GoodWeave standard-based certification label in 2009. The organization was also re-branded as GoodWeave International. Certification requires assessment against three generic principles and sector-specific principles covering either carpets or home textiles as applicable. The generic standards are: Principle A1: No child labor is allowed Principle A2: No forced or bonded labor is allowed Principle A3: Conditions of work are documented and verifiable. Today the international network comprises producing country offices in India, Nepal and Afghanistan; and consumer country programs in the US, UK, and Germany. GoodWeave International is responsible for licensing throughout Europe and North America. References Exte
https://en.wikipedia.org/wiki/Jumo
Jumo was a social network service and website launched on November 30, 2010, to index charities so that people can find and evaluate them. Jumo was founded by Facebook co-founder Chris Hughes. On August 17, 2011, he announced Jumo was merging with the GOOD organization, providing a social engagement platform to complement their magazine content. Jumo reported raising $3.5 million in donations and sponsorships prior to its launch, including up to $750,000 from Omidyar Network. Acquisition On August 17, 2011, Jumo announced that it had been acquired by the GOOD, a collaborative magazine and event media company headquartered in Los Angeles, USA. The company blog states the purpose to be "to create a powerful online content and social engagement platform". One of the reasons behind that acquisition is believed to be that Jumo's platform was not receiving the level of user traffic it has anticipated to grow itself. Open source Two months after being acquired by GOOD, Jumo announced the release of their entire code base into the public domain on October 5, 2011. With this release, the company said that "the community will have access to functionality that enables users to create and curate content and actions around more than 250 issue areas, from human trafficking to childhood obesity". References American review websites Charity review websites
https://en.wikipedia.org/wiki/OSHEAN
The Ocean State Higher Education Economic Development and Administrative Network (OSHEAN, pronounced "ocean") is a non-profit coalition of colleges, universities, K-12 school, libraries, hospitals, government agencies and other non-profit organizations, providing Internet-based technology for its member institutions and the communities they serve. OSHEAN is a member of the Rhode Island technology community, regularly contributing expertise and resources to a wide range of initiatives, from school enrichment activities to community forums on technology-related issues in the public interest. OSHEAN regularly pursues opportunities for local, regional and national collaboration and plays a national leadership role in professional education for IT professionals and policy development in the information technology arena. OSHEAN is building a communications infrastructure for Rhode Island's institutions of higher education, state and federal government agencies, non-profit research organizations, workforce development initiatives, and economic development efforts. History OSHEAN, Inc. is a consortium of non-profit organizations tasked with the creation of an Internet communications network. The organization collaboratively delivers and maintains a secure communications infrastructure for Rhode Island's research, education, health care and public service communities. OSHEAN was founded in 1999 through a collaboration by RINET (Rhode Island Network for Educational Technology – K-12), the University of Rhode Island and Brown University. The consortium of non-profit organizations, now totaling 28, was originally formed to bring an Internet2 point-of-presence to Rhode Island. Initially several institutions of higher education in Rhode Island formed the OSHEAN membership. In September 2001 the consortium expanded into the health care community after Lifespan became OSHEAN's 11th member. OSHEAN further branched out to state government in October 2005 when the Rhode Island Department of Administration, now the RI Division of Information Technology, joined the consortium. OSHEAN reached beyond the borders of Rhode Island for the first time in 2002 to welcome Wheaton College as its 13th member. In 2011, OSHEAN merged with RINET (Rhode Island Network for Educational Technology) and began to directly service pK-12 and libraries across Rhode Island. In 2021, OSHEAN completed an upgrade of their Layer 2 network architecture to enable 100G backbone connections, EVPN, and segment routing. Today, OSHEAN delivers an Internet-based communication infrastructure consisting of network, cloud, and security services. Technologies include ultra-broadband access to the Internet and Internet2, managed firewall, business continuity planning, disaster recovery, emergency preparedness, Cisco Umbrella, vulnerability assessment, SD-WAN, web content filtering, VoIP, and private cloud connections to most major providers. External links OSHEAN Website Non-profit organization
https://en.wikipedia.org/wiki/Davis%E2%80%93Putnam%20algorithm
The Davis–Putnam algorithm was developed by Martin Davis and Hilary Putnam for checking the validity of a first-order logic formula using a resolution-based decision procedure for propositional logic. Since the set of valid first-order formulas is recursively enumerable but not recursive, there exists no general algorithm to solve this problem. Therefore, the Davis–Putnam algorithm only terminates on valid formulas. Today, the term "Davis–Putnam algorithm" is often used synonymously with the resolution-based propositional decision procedure (Davis–Putnam procedure) that is actually only one of the steps of the original algorithm. Overview The procedure is based on Herbrand's theorem, which implies that an unsatisfiable formula has an unsatisfiable ground instance, and on the fact that a formula is valid if and only if its negation is unsatisfiable. Taken together, these facts imply that to prove the validity of φ it is enough to prove that a ground instance of ¬φ is unsatisfiable. If φ is not valid, then the search for an unsatisfiable ground instance will not terminate. The procedure for checking validity of a formula φ roughly consists of these three parts: put the formula ¬φ in prenex form and eliminate quantifiers generate all propositional ground instances, one by one check if each instance is satisfiable. If some instance is unsatisfiable, then return that φ is valid. Else continue checking. The last part is a SAT solver based on resolution (as seen on the illustration), with an eager use of unit propagation and pure literal elimination (elimination of clauses with variables that occur only positively or only negatively in the formula). Input: A set of clauses Φ. Output: A Truth Value: true if Φ can be satisfied, false otherwise. function DP-SAT(Φ) repeat // unit propagation: while Φ contains a unit clause {l} do for every clause c in Φ that contains l do Φ ← remove-from-formula(c, Φ); for every clause c in Φ that contains ¬l do Φ ← remove-from-formula(c, Φ); Φ ← add-to-formula(c \ {¬l}, Φ); // eliminate clauses not in normal form: for every clause c in Φ that contains both a literal l and its negation ¬l do Φ ← remove-from-formula(c, Φ); // pure literal elimination: while there is a literal l all of which occurrences in Φ have the same polarity do for every clause c in Φ that contains l do Φ ← remove-from-formula(c, Φ); // stopping conditions: if Φ is empty then return true; if Φ contains an empty clause then return false; // Davis-Putnam procedure: pick a literal l that occurs with both polarities in Φ for every clause c in Φ containing l and every clause n in Φ containing its negation ¬l do // resolve c with n: r ← (c \ {l}) ∪ (n \ {¬l}); Φ ← add-to-fo
https://en.wikipedia.org/wiki/Technology%20integration
Editing technology is the use of technology tools in general content areas in education in order to allow students to apply computer and technology skills to learning and problem-solving. Generally speaking, the curriculum drives the use of technology and not vice versa. Technology integration is defined as the use of technology to enhance and support the educational environment. Technology integration in the classroom can also support classroom instruction by creating opportunities for students to complete assignments on the computer rather than with normal pencil and paper. In a larger sense, technology integration can also refer to the use of an integration platform and application programming interface (API) in the management of a school, to integrate disparate SaaS (Software As A Service) applications, databases, and programs used by an educational institution so that their data can be shared in real-time across all systems on campus, thus supporting students' education by improving data quality and access for faculty and staff. "Curriculum integration with the use of technology involves the infusion of technology as a tool to enhance the learning in a content area or multidisciplinary setting... Effective technology integration is achieved when students can select technology tools to help them obtain information on time, analyze and synthesize it, and present it professionally to an authentic audience. Technology should become an integral part of how the classroom functions—as accessible as all other classroom tools. The focus in each lesson or unit is the curriculum outcome, not the technology." Integrating technology with standard curriculum can not only give students a sense of power but also allows for more advanced learning among broad topics. However, these technologies require infrastructure, continual maintenance, and repair – one determining element, among many, in how these technologies can be used for curricula purposes and whether they will succeed. Examples of the infrastructure required to operate and support technology integration in schools include at the basic level electricity, Internet service providers, routers, modems, and personnel to maintain the network, beyond the initial cost of the hardware and software. Standard education curricula with an integration of technology can provide tools for advanced learning among a broad range of topics. Integration of information and communication technology is often closely monitored and evaluated due to the current climate of accountability, outcome-based education, and standardization in assessment. Technology integration can in some instances, be problematic. A high ratio of students to technological devices has been shown to impede or slow learning and task completion. In some, instances dyadic peer interaction centered on integrated technology has proven to develop a more cooperative sense of social relations. Success or failure of technology integration largely depends o
https://en.wikipedia.org/wiki/WTCN-CD
WTCN-CD (channel 43) is a low-power, Class A television station licensed to Palm Beach, Florida, United States, serving the West Palm Beach area as an affiliate of MyNetworkTV. It is owned by Sinclair Broadcast Group alongside CBS affiliate WPEC (channel 12), CW affiliate WTVX (channel 34), and Class A TBD owned-and-operated station WWHB-CD (channel 48). The stations share studios on Fairfield Drive in Mangonia Park (with a West Palm Beach postal address), while WTCN-CD's transmitter is located southwest of Hobe Sound, Florida. Due to WTCN's low-power status, the station's directional antenna pattern prevents it from reaching Vero Beach (to the north) and Boca Raton (to the south). In order to expand the broadcasting radius, WTCN is simulcast in standard definition on WTVX's third digital subchannel (34.3) from a transmitter southwest of Palm City. WTCN-CD brands as My 15 after the cable channel position on most West Palm Beach area cable providers. History WTCN began as W19AQ (known on-air as WAQ), a station that began broadcasting as channel 19 in West Palm Beach in October 1988. The original owner was Palm Beach Broadcasting, led by William B. O'Donnell. WAQ had hoped to become an ABC affiliate when WPEC dropped ABC for CBS at the end of 1988, but instead the affiliation went to WPBF. According to the Sun-Sentinel, WAQ's initial programming consisted of "morning cartoons (Beverly Hills Teens); old, public domain (and often silent) movies (Bachelor in Paradise, The Pickwick Papers); vintage TV series (The Man from U.N.C.L.E.); sports (Notre Dame football, Florida Marlins baseball); and music (Hit Video USA, which ran from 1 to 6 a.m.)." The station later carried Howard Stern's original syndicated television program, and tape-delayed races from the Palm Beach Kennel Club. The station struggled to pay its bills and after declaring bankruptcy in 1991, the license was transferred from the O'Donnell family's company, Palm Beach Broadcasting, to Main Street TV of Carle Place, New York. In 1996, Adelphia Cable removed WAQ from its channel lineup because of "continuing problems with the picture quality", and once again the station filed for bankruptcy. By this point the station was airing home shopping programming, old black and white movies, a local bowling show, and The Cliff Dunn Show, which was simulcast on local radio station WPBR. The loss of cable caused station revenue to drop from $303,315 in 1995 to only $24,995 in 1996. Station advertising rates dropped from $95 for a 30-second spot to as low as $5. After losing nearly $7 million in 1996, the station changed call letters to WINQ-LP and its studios were moved to the suburb of Lake Park. The station was sold to William B. Turner in 1999 for $875,000 including $175,000 in debt. Martin County businessman Bill Brothers purchased the station for an undisclosed price in 2001. The station then changed its callsign to WWHB-CA and WTCN-CA on August 1, 2002 and January 15, 2003 respectively. In
https://en.wikipedia.org/wiki/Flock%20%28web%20browser%29
Flock is a discontinued web browser that specialized in providing social networking and Web 2.0 facilities built into its user interface. Earlier versions of Flock used the Gecko HTML rendering engine by Mozilla. Version 2.6.2, released on January 27, 2011, was the last version based on Mozilla Firefox. Starting with version 3, Flock was based on Chromium and so used the WebKit rendering engine. Flock was available as a free download, and supported Microsoft Windows, Mac OS X and, at one time, Linux as well. Support for Flock was discontinued in April 2011. History Flock was the successor to Round Two, who raised money from Bessemer Venture Partners, Catamount Ventures, Shasta Ventures and other angel investors. Bart Decrem and Geoffrey Arone co-founded the company. Flock raised $15 million in a fourth round of funding led by Fidelity Ventures on May 22, 2008, for an estimated total of $30 million, according to CNET. The company's previous investors, Bessemer Venture Partners, Catamount Ventures, and Shasta Ventures, also participated in the round. In January 2011, Flock Inc. was acquired by Zynga. The browser has been discontinued, with support ending April 26, 2011. Features Flock 2.5 integrated social networking and media services including MySpace, Facebook, YouTube, Twitter, Flickr, Blogger, Gmail, Yahoo! Mail, etc. When logging into any of the supported social services, Flock could track updates from friends: profiles, uploaded photos, and more. Flock 2.5 added Twitter Search functionality, multi-casting of status updates to multiple services, and the introduction of instant messaging via Facebook Chat in the browser. Other features include: Native sharing of text, links, photos and videos A "Media Bar" showing preview of online videos and photos as well as subscription to photo and video feeds A feed reader supporting Atom, RSS, and Media RSS feeds A blog editor and reader, allowing direct posting into any designated blog A Webkit-mail component allowing users to check supported web-based email off site, compose new messages, and drag-and-drop pictures and videos from the "Media Bar" or webclipboard into a new email message Support for third-party add-ons, including a number of Firefox extensions Reception Download.com rated it 5 out of 5 Ranked no. 6 on PC World's list of the 100 best products of 2008 In December 2007, Flock won the Mashable Open Web Awards for Applications and Widgets and in March 2008, Flock won the South By Southwest Web Award for Community. CNET gave the Mac OS X version of Flock 1.0 the title of "Best Mac Software of 2007". PC World's Harry McCracken reviewed Flock as his "New Favorite Web Browser". In February 2008, AOL announced that it would discontinue support for the Netscape browser, and recommended Flock and Firefox as alternative browsers to its userbase of Netscape 9 users. For the Netscape 8 userbase, AOL recommended only the Flock browser to its users. In March 2008, Flock announced that
https://en.wikipedia.org/wiki/WVAH-TV
WVAH-TV (channel 11) is a television station licensed to Charleston, West Virginia, United States, serving the Charleston–Huntington market as an affiliate of the digital multicast network Catchy Comedy. It is owned by Cunningham Broadcasting, which maintains a local marketing agreement (LMA) with Sinclair Broadcast Group, owner of dual ABC/Fox affiliate WCHS-TV (channel 8, also licensed to Charleston), for the provision of certain services. However, Sinclair effectively owns WVAH-TV as the majority of Cunningham's stock is owned by the family of deceased group founder Julian Smith. Both stations share studios on Piedmont Road in Charleston, while WVAH-TV's transmitter is located atop Coal Mountain, south of Scott Depot, West Virginia. History The station began airing an analog signal on UHF channel 23 on September 19, 1982, with an Elvis Presley movie marathon. It was owned by the newly created Meridian Communications based out of Pittsburgh, which won the license after the West Virginia Legislature forced West Virginia Public Broadcasting to withdraw its own application for the channel. It was the first independent station in West Virginia, as well as the first new commercial station in the market since what is now WOWK-TV (channel 13) signed-on in 1955, and the first commercial UHF station in the state since WKNA-TV in Charleston went off-the-air in 1955. Studios were located on Mount Vernon Road in Teays Valley, an unincorporated area halfway between Huntington and Charleston, though its mailing address said Hurricane (the two areas share a ZIP code). It became a charter Fox affiliate on October 9, 1986. Act III Broadcasting bought the station in 1987, along with WRGT-TV in Dayton, Ohio, from Meridian Communications, in a two-station group deal. Soon after buying control, Act III applied to move the station to the VHF band. Despite broadcasting from a tower with the maximum five million watts of power, WVAH had considerable difficulty penetrating the market. The Charleston–Huntington market covers 61 counties in Central West Virginia, Eastern Kentucky, and Southern Ohio. Most of this area is a very rugged dissected plateau, and as a result, UHF stations usually do not get good reception in this kind of terrain. Some areas of the market were among the few where cable television still wasn't available. As a result, WVAH was permitted to switch to VHF channel 11 on April 11, 1988, barely two years after Fox's launch. This marked the first time that any station in the United States signed off as a UHF station, and return to the air as a VHF station. However, the station was short-spaced to WPXI in Pittsburgh and WJHL-TV in Johnson City, Tennessee. It then had to conform its signal to protect WJHL. As a result, it did not provide a clear over-the-air signal to the southwestern part of the market. On January 16, 1995, WVAH began airing UPN programming during overnight hours. However, the station could not clear the entire schedule and dropped
https://en.wikipedia.org/wiki/World%20Classical%20Network
The World Classical Network (WCN) is an internet-delivery classical radio broadcasting service owned by CCB Media in Hyannis, Massachusetts. The service has been in existence since February 1998, when it was owned and operated by Charles River Broadcasting. It filled a void left by the demise of the U. S. version of Classic FM, the classical music satellite service of SW Networks. Stations WCN programming is carried on Cape Cod Broadcasting's WFCC-FM, licensed to Chatham, Massachusetts. WFCC is the WCN flagship station. The service is also syndicated, with the following affiliates: WCRI-FM/95.9 ("Classical 95.9") Block Island, Rhode Island WSCS/90.9 ("Classical 90.9") New London, New Hampshire Hosts Current hosts on the World Classical Network include Mark Calder, Don Spencer, and Larry King. Longtime classical announcer Steve Murphy joined the WCN as morning host on September 16, 2008. References External links Old official website New official website Internet radio stations in the United States Classical music radio stations in the United States
https://en.wikipedia.org/wiki/Dave%20McGinnis
David McGinnis (born August 7, 1951) is a former National Football League (NFL) coach and college player who is the color commentator for the Tennessee Titans Radio Network. He was assistant head coach of the St. Louis/Los Angeles Rams from 2012 to 2016 and head coach of the Arizona Cardinals from 2000 to 2003. Biography McGinnis graduated from Snyder High School in Snyder, Texas. He was a three-year starter as a defensive back at Texas Christian University, where he graduated in 1973 with a degree in business management. McGinnis spent 13 years coaching in college football, at Texas Christian University (1973–74, '82), Missouri (1975–77), Indiana State (1978, 1980–81) and Kansas State (1983–85). From 1986 to 1995, McGinnis was the linebackers coach for the Chicago Bears and defensive coordinator for the Arizona Cardinals from 1996 to 2000. McGinnis was the assistant head coach/linebackers coach for the Tennessee Titans in 2004. In 2017, he replaced Frank Wycheck as the color analyst on the Tennessee Titans Radio Network. Chicago Bears controversy In 1999, while McGinnis was coaching for the Cardinals, he interviewed for the head coach position with the Chicago Bears. On Thursday, January 22, Bears team president Mike McCaskey prematurely organized a news conference to announce McGinnis as the 12th head coach of the Bears. The news came as a surprise to McGinnis, who had not reached terms on a contract. The Bears postponed the news conference and Bears chairman Ed McCaskey issued an apology to McGinnis. Upset that the news had reached his family, friends, Cardinals team owner Bill Bidwill and head coach Vince Tobin, McGinnis declined the position and removed his name from consideration. Head coaching record References Living people American football safeties TCU Horned Frogs football players Chicago Bears coaches Arizona Cardinals coaches Tennessee Titans coaches Kansas State Wildcats football coaches 1951 births People from Independence, Kansas Arizona Cardinals head coaches St. Louis Rams coaches National Football League defensive coordinators National Football League announcers Tennessee Titans announcers
https://en.wikipedia.org/wiki/Clarendon%2C%20New%20South%20Wales
Clarendon is a suburb of Sydney, in the state of New South Wales, Australia. Clarendon railway station is on the Richmond branch of the North Shore & Western Line of the Sydney Trains network. It is also home to Hawkesbury Racecourse and the Hawkesbury Show Ground. It borders the RAAF Base Richmond, a Royal Australian Air Force base at Richmond which was established in 1923. The air base is currently the home to the RAAF's transport squadrons. During the Vietnam War logistic support and medical evacuations were supplied by the Hercules from RAAF Richmond. References Suburbs of Sydney City of Hawkesbury
https://en.wikipedia.org/wiki/Virgin%20Plus
Virgin Plus is a provider of postpaid and prepaid wireless voice, text and data communications services throughout Canada. They also offer home Internet and TV services in select areas of Ontario and Quebec. Launched as Virgin Mobile Canada on March 1, 2005, as a joint venture between Virgin Group and BCE Inc., BCE took sole ownership on July 1, 2009, when it closed a deal to purchase the stake it did not already own. Virgin Plus calls its customers 'Members' and offers a Member Benefits program, which provides its customers with special offers, discounts, and VIP experiences. History 2003–2004: Pre-launch The VirginMobile.ca domain name was registered by Virgin Enterprises Limited on July 4, 2003, with the Canadian Internet Registration Authority. When accessed, it displayed a domain parking page until June 14, 2004, when it was replaced with an announcement. There were also links to information about the company, related news articles, and career opportunities. Virgin Mobile claimed: "we work like maniacs to bring you Canada’s most awesome mobile phone company." 2005–2007: Launch Virgin Mobile launched in Canada on March 1, 2005, as a mobile virtual network operator (MVNO) using the Bell Mobility network. At the time, Virgin Mobile was operating solely as a prepaid service. The company's website showcased several feature phones it offered, and advertised itself as a "no catch" mobile operator. Virgin Mobile Canada was the first mobile carrier in Canada to launch without a system access fee. The company's “no catch” campaign at launch featured cheeky advertisements likening existing Canadian mobile carriers as “the catch”, and Virgin Mobile Canada as the cure to unclear contracts and undesirable hidden fees. Sir Richard Branson helped create excitement at launch by zip-lining from a high-rise building into Yonge-Dundas Square in a superhero costume, and drove a monster truck over three cars symbolizing “The Big Three” mobile carriers in Canada – Rogers, Telus, and Bell. Since its launch, Virgin Mobile has used edgy and controversial advertising, leading to demands for an apology, requests to cease and desist the advertising, and even boycotts. This marketing technique is still used by Virgin Mobile Canada to this day. 2008: Postpaid services In February 2008, Virgin Mobile Canada launched postpaid wireless service. To promote and encourage Canadians to consider the new postpaid service, the company released a new slogan, "It's Better to Be a Member". At launch, this was known as 'myPlan', and the company offered a multitude of options, including the ability to set one's own timeframe for unlimited calling, as opposed to the windows generally offered by competing mobile companies. Since then, postpaid plans have become a popular choice for new and existing Members, and plans continue to evolve in the highly competitive telecom market. 2009–2010: Acquisition by Bell Mobility, brand re-positioning, HSPA+ and SuperTab On July 1, 2009, Bel
https://en.wikipedia.org/wiki/Intellivision%20World%20Series%20Baseball
Intellivision World Series Major League Baseball is a baseball video game (1983) designed by Don Daglow and Eddie Dombrower, and published by Mattel for the Intellivision Entertainment Computer System. IWSB was one of the first sports video games to use multiple camera angles and present a three-dimensional (as opposed to two-dimensional) perspective. It was also the first statistics-based baseball simulation game on a video game console; all prior console baseball games were arcade-style recreations of the sport. The game's full formal title (due to licensing requirements) was Intellivision World Series Major League Baseball. It was typically shortened to World Series Baseball in use to differentiate it from the prior Mattel baseball game. Gameplay Intellivision World Series Baseball displayed the batter and pitcher from a "center field camera" view. One player chose the pitch type, while the player batting chose when to swing when to take a pitch, and whether or not to bunt. Once the ball was hit, the game switched to a "press box camera" view, where the defensive player could control the fielders and the batting player controlled the baserunners. When runners were on base an inset window displayed them, and the batting player could lengthen or shorten their lead and attempt to steal. The game was originally written with a simplified version of Daglow's 1971 mainframe baseball statistical simulation program, so that the MLBPA license could be acquired by Mattel and the game would accurately simulate the play of real Major League Baseball players. For economic reasons in mid-1983, Mattel withdrew from this plan at the last minute, and the designers were forced to replace actual players with the names of the Blue Sky Rangers Intellivision game design team. Intellivision World Series Baseball is also notable for the following innovations: In-game play by play announcers, presented via Intellivoice Stadium background music, created by Dave Warhol (who also worked on Earl Weaver Baseball at EA) Save/load in a baseball game (through a RAM chip on the cartridge) Lineups based on real player stats and skin colour (although names were changed) History 1980-1981 In the early 1980s, video games were based on models established either by coin-op games' scrolling playfields, or board games' static background images. The screen was either a stable field on which characters moved or a top-down (sometimes angled) display that scrolled horizontally, vertically or both ways across a larger virtual image. These restrictions were created by the limited memory size of early video game consoles, where a single screen would use up much of the RAM storage space available in a machine, and small video game cartridges that held only 4K (later 8K or 16K) of ROM memory. Daglow was one of the original five in-house Intellivision programmers at Mattel in 1980, and had written the first known computer baseball game, Baseball on a PDP-10 mainframe computer at Pom
https://en.wikipedia.org/wiki/Midrand%20Graduate%20Institute
Eduvos that is formerly Pearson Institute of Higher Education and Midrand Graduate Institute and Computer Training Institute (CTI) is a South African private higher education institution that is headquartered in Midrand, Gauteng Province and that has 12 campuses across South Africa. It offers bachelor's degrees in commerce, information technology, law, social sciences, creative arts, communications and bio sciences. It is also offers a number of postgraduate qualifications including Bachelor of Arts Honours in Graphic Design, Bachelor of Science Honours in Information Technology and a Bachelor of Commerce Honours in Business Management. History Eduvos was the new name given to a combination of Midrand Graduate Institute and CTI. Midrand Graduate Institute was first known as Midrand Campus, later known as Midrand University. Established in 1989, it soon attained acceptance as a private university-level, degree-conferring institution - one of the first of its kind in southern Africa. It formed a partnership with CTI Education Group in 2006. CTI started as the Computer Training College in 1979. The main approach was to offer degrees at various remote campuses nationwide and conferred by Midrand. Qualifications are offered at 12 campuses in South Africa. Pearson Education acquired a 75% shareholding in Midrand Graduate Institute during 2011, which grew to 100% in 2013. It then became known as the Pearson Institute of Higher Education (officially using that name from 27 July 2016). . As the Pearson Institute of Higher Education it grew to 12 campuses in South Africa and was taken over and established a new identity. It is now simply known as Eduvos, and the branch specifically as Eduvos Midrand. Eduvos derives its name from a combination of "Edu" and "Vos" meaning you in various languages alluding to their tag line - your education Accreditation and affiliations Eduvos is registered with the Department of Education (South Africa) as a Higher Education Institution (No.2001/HE07/008) in accordance with the Higher Education Act, and its bachelor's degrees are accredited by the Council on Higher Education's Higher Education Quality Committee. All of Eduvos qualifications are registered on the National Qualifications Framework by the South African Qualifications Authority. A number of qualifications are also accredited by local, international, professional, and industry bodies such as the Association of Chartered Certified Accountants in the UK. However, it is not registered with the Health Professions Council of South Africa, though it is with the Design Education Forum of Southern Africa, the Chartered Institute of Management Accountants, the Midrand Tourism Association, the Computer Society of South Africa and the Information Technology Association. Midrand Graduate Institute was an official licensee for tuition support of UNISA until this practice was stopped for all educational institutions around 2010. Research Indaba The Research Indaba is a
https://en.wikipedia.org/wiki/Golisano%20College%20of%20Computing%20and%20Information%20Sciences
The B. Thomas Golisano College of Computing and Information Sciences is one of the largest colleges at the Rochester Institute of Technology (RIT), and is home to the institute's computing education and research facilities. Golisano College is home to RIT's computer science, cybersecurity, information sciences and technologies, and software engineering departments, and to the Ph.D. program in computing and information sciences, and the School of Interactive Games & Media. Golisano College is housed in a 125,000 square foot facility, opened in 2003 on RIT's campus in Rochester, New York. In 2020, the facility added an additional 52,000 square foot building, which joins the original Golisano College on all three floors and houses the ESL Global Cybersecurity Institute. History In 1972, RIT began offering one of its first computer science programs. Originally named computer systems, the program offered students the opportunity to earn a bachelor of technology degree. In 1996, RIT introduced an undergraduate program in software engineering, one of the first programs of its kind. Later, in 2003, the software engineering program would become one of the first such programs to receive ABET accreditation. In the late 1990s, the dean of RIT's College of Applied Science and Technology, made a proposition to create a new college that would focus on the growing fields of computer science, information technology and software engineering. In February 2001, B. Thomas Golisano, chairman and CEO of Paychex, donated $14 million to fund the college's creation. The college was founded on July 1, 2001 and officially opened in May 2003. The first dean of the college was Jorge Díaz Herrera. In 2005, former President Bill Clinton visited the college following an invitation from B. Thomas Golisano. He toured the facilities and gave a speech to students. Also in 2005, the college established nation's first lab for social computing as part of a new research initiative, the Center for Advancing the Study of Cyberinfrastructure. In addition, McAfee donated more than $1 million in technology to the college to be used as part of a new master's degree program in computer security and information assurance.On July 1, 2009, in recognition of the growing fields of game design and development, the School of Interactive Games & Media was founded. The school has since become a national leader in game design and development education having been ranked 4th in the nation in undergraduate and graduate game design and development education by the Princeton Review. In 2012, Andrew Sears became the second dean of the college. In 2012, the college introduced its computing security department, dedicated to the increasing importance of protecting computing devices and computer data. In 2015, Anne Haake was named interim dean of the college, and Andrew Sears became dean of the College of Information Sciences and Technology at Penn State. In 2022, Matt Huenerfauth became dean of the colle
https://en.wikipedia.org/wiki/WWNL
WWNL (1080 AM) is a commercial radio station in Pittsburgh, Pennsylvania, USA. It broadcasts a Christian talk and teaching radio format and is owned by Steel City Radio, Inc. Programming is supplied by the Wilkins Radio Network. WWNL features local and national religious leaders, including Charles Stanley, John MacArthur, David Jeremiah and Michael Youssef. WWNL is a brokered programming station, where hosts pay for time slots on WWNL and may seek donations to their ministries during their shows. By day, WWNL is powered at 50,000 watts, the maximum permitted for AM radio stations. Because AM 1080 is a clear channel frequency reserved for Class A stations KRLD Dallas and WTIC Hartford, WWNL is a daytimer, required to sign off the air at night. During critical hours, WWNL is powered at 25,000 watts. It uses a directional antenna at all times. The transmitter, with a four-tower array, is off Lah Road in Gibsonia, Pennsylvania. History WILY and WEEP In 1947, the station signed on the air, using WILY as its call sign. It primarily served Pittsburgh's African American audience in the 1950s. In 1957, it became WEEP, a Top 40 station, before switching to the call letters WYRE in 1961 and then back to WEEP. Country music Unable to compete with KQV in the Top 40 format, WEEP changed to country music in 1965, in which it enjoyed its greatest success. Most large cities in the north did not have a radio station playing country and western music, so WEEP was alone in the format for many years. Based on WEEP's good ratings, the owners switched WEEP-FM (now WDSY-FM) to country music as well, a first such FM station in Pittsburgh. Other than a one-year period with a talk radio format in 1976, WEEP broadcast a country format for almost 30 years. By the 1980s, WEEP and WDSY simulcast part of the day, before WEEP changed to an oldies format on December 15, 1986. In September 1990, it adopted an all-business news and talk format. In February 1992, the call letters were changed to WDSY and the station became a full time simulcast of WDSY-FM's country format. This was short-lived with the AM station going back to the WEEP call letters and affiliating with the Satellite Music Network's "Real Country" format delivered via satellite in September 1992. It returned to a full-time simulcast of the FM station in March 1995, again as WDSY. Gospel and Christian radio In April 1997, WDSY was sold and changed formats to urban gospel as WPGR. In July 1999, the format moved to 1510. Following two months of simulcasting, 1080 changed to a Christian radio format, using the WWNL call sign. Starting as a music-based station, WWNL has added more talk and paid programming in recent years, affiliated with the Wilkins Radio Network. History of call letters The call letters WWNL were previously assigned to an AM station in Newport, Kentucky. It initially broadcast on 1110 kHz but moved to 740 kHz in 1948. References External links FCC History Cards for WWNL WNL WNL American Bask
https://en.wikipedia.org/wiki/TVR%20Cultural
TVR Cultural () is the cultural channel of Romania's government-funded television network Televiziunea Română (TVR). It provides cultural news, documentaries about the arts, as well as various shows, musicals and theatrical pieces. It was closed in September 2012 and restarted in December 2022. History TVR Cultural began transmission in 2002. It was modelled on the Franco-German TV channel Arte and other European channels focused on cultural and artistic programming. Due to a financial crisis, TVR president Claudiu Săftoiu decided to end TVR Cultural broadcasts in the summer of 2012. There was widespread criticism of this decision, which came at a time when other public broadcasters in the Central and Eastern Europe, including Poland's Telewizja Polska and the Czech Republic's Česká televize, were expanding their cultural output. TVR Cultural started rebroadcasting again in 2022, ten years after its closure, following an internal vote within TVR. On September 7, 2022, Romania's National Audiovisual Council granted a license to restart broadcasting. On December 1, 2022, to coincide with Romania's National Day, TVR Cultural relaunched its broadcasts with the stated aim of "[creating] bridges between tradition and modernity, between conservatism and progressivism, between rural and urban, between peripheral and central." The first day of broadcasts included debates on cultural topics, interviews with Romanian cultural figures (including Daniel Jiga, the director of the Romanian National Opera), and a rebroadcast of a 1978 staging of Victor Ion Popa's play "Take, Ianke and Cadîr". Under new TVR president Dan-Cristian Turturică, the relaunched TVR Cultural aims to bring focus to young artists from Romania and Moldova, to showcase minority cultures in Romania, to document the state of culture during Romania's communist period, and to rebroadcast archival programming alongside new concerts, plays, and other cultural events. Its regular segment, the "Cultural Journal" ("Jurnal Cultural"), hosted by Bogdan Stănescu, covers current affairs in the field of arts and culture in Romania and abroad. Unlike its pre-2012 feed (which was available only in SD), the relaunched channel is now available in both SD and HD feeds. The SD feed is only available on digital terrestrial television in Romania at channel 5. See also Arte Mezzo TVP Kultura References External links TVR Cultural ID - Soprano & Tatoo TVR Cultural Cultural Television channels and stations established in 2002 Television channels and stations disestablished in 2012 2002 establishments in Romania 2012 disestablishments in Romania 2022 establishments in Romania Television channels and stations established in 2022
https://en.wikipedia.org/wiki/Auckland%20Peering%20Exchange
The Auckland Peering Exchange (APE) is an Ethernet-based neutral peering point running over the CityLink metropolitan network in Auckland, New Zealand. It is part of CityLink's ExchangeNET group of peering exchanges. The Auckland Peering Exchange was established to allow entities connected to the APE switches in Auckland to send traffic directly to and from each other rather than via their ISP. This activity is known as peering. This provides improvements in speed as traffic travels directly between the parties and reduces load on the network by reducing the need for traffic to be duplicated through one or more intermediate ISP routers. In some cases this also avoids traffic being routed "out of town", or incurring ISP's traffic charges. The Auckland Peering Exchange provides two route servers which contain routing details for each of the participants. This simplifies peering enormously for most exchange users. APE grew out of discussions on the NZNOG mailing list. The Auckland Sky Tower was agreed to be a sensible meeting place, since it was already equipped as a telehousing facility, it is a good high-point for wireless access, and it is a neutral point to meet. Initially, participant equipment and the CityLink switches were mainly located on the 48th floor of the Sky Tower. This deck is air-conditioned and enclosed with low-attenuation glass, allowing point-to-point radio shots back to base without needing weatherproofing and resource consent for external antennas. CityLink have also extended APE's L2 LAN outside of the Sky Tower so it is possible to connect to APE at a number of locations in the Auckland CBD without having a circuit into the Sky Tower. See also List of Internet exchange points References External links Auckland Peering Exchange Internet exchange points in New Zealand Economy of Auckland
https://en.wikipedia.org/wiki/Zero%20wait%20state
Zero wait state is a feature of a processor or computer architecture in which the processor does not have to wait to perform memory access. Non-zero wait state describes the situation when a processor operates at a higher frequency than the memory, it has a wait state during which the processor is idle. Computer memory
https://en.wikipedia.org/wiki/Dancing%20Links
In computer science, dancing links (DLX) is a technique for adding and deleting a node from a circular doubly linked list. It is particularly useful for efficiently implementing backtracking algorithms, such as Knuth's Algorithm X for the exact cover problem. Algorithm X is a recursive, nondeterministic, depth-first, backtracking algorithm that finds all solutions to the exact cover problem. Some of the better-known exact cover problems include tiling, the n queens problem, and Sudoku. The name dancing links, which was suggested by Donald Knuth, stems from the way the algorithm works, as iterations of the algorithm cause the links to "dance" with partner links so as to resemble an "exquisitely choreographed dance." Knuth credits Hiroshi Hitotsumatsu and Kōhei Noshita with having invented the idea in 1979, but it is his paper which has popularized it. Implementation As the remainder of this article discusses the details of an implementation technique for Algorithm X, the reader is strongly encouraged to read the Algorithm X article first. Main ideas The idea of DLX is based on the observation that in a circular doubly linked list of nodes, x.left.right ← x.right; x.right.left ← x.left; will remove node x from the list, while x.left.right ← x; x.right.left ← x; will restore x'''s position in the list, assuming that x.right and x.left have been left unmodified. This works regardless of the number of elements in the list, even if that number is 1. Knuth observed that a naive implementation of his Algorithm X would spend an inordinate amount of time searching for 1's. When selecting a column, the entire matrix had to be searched for 1's. When selecting a row, an entire column had to be searched for 1's. After selecting a row, that row and a number of columns had to be searched for 1's. To improve this search time from complexity O(n) to O(1), Knuth implemented a sparse matrix where only 1's are stored. At all times, each node in the matrix will point to the adjacent nodes to the left and right (1's in the same row), above and below (1's in the same column), and the header for its column (described below). Each row and column in the matrix will consist of a circular doubly-linked list of nodes. Header Each column will have a special node known as the "column header," which will be included in the column list, and will form a special row ("control row") consisting of all the columns which still exist in the matrix. Finally, each column header may optionally track the number of nodes in its column, so that locating a column with the lowest number of nodes is of complexity O(n) rather than O(n×m) where n is the number of columns and m'' is the number of rows. Selecting a column with a low node count is a heuristic which improves performance in some cases, but is not essential to the algorithm. Exploring In Algorithm X, rows and columns are regularly eliminated from and restored to the matrix. Eliminations are determined by selecting a c
https://en.wikipedia.org/wiki/Ikasucon
Ikasucon was an annual three-day anime convention held during July at the Grand Wayne Convention Center in Fort Wayne, Indiana. The name of the convention has no particular meaning. Programming The convention typically offered anime improv, anime music video contest, chess, costume competitions, game shows, gaming tournaments, formal dance, karaoke, original animation contest, panels, rave, vendors, workshops, and video screenings. History Ikasucon was previously held in the Cincinnati, Ohio area until moving to Fort Wayne, Indiana in 2007 for better facilities. Ikasucon last gave an update postponing a possible 2019 Ikasucon convention after becoming inactive in 2017. Event history References External links Ikasucon on Facebook Inactive anime conventions Recurring events established in 2003 2003 establishments in Ohio Annual events in Indiana Festivals in Indiana Culture of Fort Wayne, Indiana Conventions in Indiana
https://en.wikipedia.org/wiki/Art%20Angel
Art Angel is a Philippine television informative show broadcast by GMA Network. Originally hosted by Pia Arcangel, Tonipet Gaba and Krystal Reyes. It premiered on April 17, 2004. In 2010, Arcangel and Reyes left the show and were replaced by Roxanne Barcelo on June 19, 2010. The show concluded on May 14, 2011 with a total of 370 episodes. It was replaced by Sabadabadog! in its timeslot. Accolades References External links 2004 Philippine television series debuts 2011 Philippine television series endings Angels in television Filipino-language television shows GMA Integrated News and Public Affairs shows GMA Network original programming Philippine children's television series Television series about art