source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/COinS | ContextObjects in Spans (COinS) is a method to embed bibliographic metadata in the HTML code of web pages. This allows bibliographic software to publish machine-readable bibliographic items and client reference management software to retrieve bibliographic metadata. The metadata can also be sent to an OpenURL resolver. This allows, for instance, searching for a copy of a book at a specific library.
History
In the late 1990s OpenURL was created at Ghent University as a framework to provide context-sensitive links. The OpenURL link server implementation called SFX was sold to Ex Libris Group which marketed it to libraries, shaping the idea of a "link resolver". The OpenURL framework was later standardized as ANSI/NISO Z39.88 in 2004 (revised 2010). A core part of OpenURL was the concept of "ContextObjects" as metadata to describe referenced resources.
In late 2004, Richard Cameron, the creator of CiteULike, drew attention to the need for a standard way of embedding metadata in HTML pages. In January 2005 Daniel Chudnov suggested the use of OpenURL. Embedding OpenURL ContextObjects in HTML had been proposed before by Herbert Van de Sompel and Oren Beit-Arie and a working paper by Chudnov and Jeremy Frumkin. Discussion of the latter on the GPS-PCS mailing list resulted in a draft specification for embedding OpenURLs in HTML, which later became COinS. A ContextObject is embedded in an HTML span element.
The adoption of COinS was pushed by various publications and implementations. The specification was OCOinS.info, which includes specific guides to implement COinS for journal articles and books.
Summary of the data model
From OpenURL 1.0 COinS borrows one of its serialization formats ("KEV") and some ContextObject metadata formats included in OpenURL implementation guidelines. The ContextObject implementation guidelines of COinS include four publication types (article with several subtypes, book, patent, and generic) and a couple of simple fields. However, the guidelines are not required part of COinS, so the standard does not provide a strict metadata model like Dublin Core or the Bibliographic Ontology.
Use in websites
The following websites make use of COinS:
Citebase
CiteULike
Copac
HubMed
Mendeley
Wikipedia
Wikivoyage (German branch)
WorldCat
Server-side applications
Some server-side applications embed COinS, including refbase.
Client tools
Client tools which can make use of COinS include:
BibDesk
Bookends (Mac)
Citavi
LibX
Mendeley
ResearchGate
Sente (Mac)
Zotero
See also
Info URI scheme
HTML Microdata
KBART
Microformat
RDFa
span
UnAPI
References
Further reading
(eLib.at Mirror)
(38 pages)
External links
Citation proposal – for a microformat for the same purpose
KEV implementation guidelines
Using COinS from Max Planck virtual Library
What are COinS? – from Online Computer Library Center
Library 2.0
Internet architecture
Microformats
Metadata publishing |
https://en.wikipedia.org/wiki/IIS%20Metabase | Prior to IIS 7, Microsoft's Internet Information Services stores its information in an internal database called the MetaBase. The metabase is an inheritable, hierarchical database that allows for configuration of HTTP/HTTPS, FTP, SMTP, and NNTP at the server, the site, or the folder or file level. Different versions of IIS use different formats; prior to IIS version 6 this was always a proprietary format, whereas with 6.0 and later the data is stored in XML files. The metabase consists of two files, MetaBase.xml and MBSchema.xml, stored in the %SystemRoot%\system32\inetsrv\ directory. The metabase periodically gets backed up to the MetaBack subdirectory.
When Internet Information Service starts, it reads the two metabase files to create an in-memory cache of the web server's configuration, which is referred to as the in-memory metabase. Changes to the IIS configuration via the IIS Manager or programmatic changes get written to the in-memory metabase, then are persisted to the on-disk MetaBase.xml file after a number of changes.
Internet Information Services' central metabase is eliminated in IIS version 7 in favor of a set of XML configuration files that are located centrally in the Machine.config and ApplicationHost.config files and within the web site's infrastructure using web.config files. This allows for synchronization of web sites across servers by including all configuration information within the web site's root directory.
Metabase administration
The IIS Manager interface, an MMC-based administration console, is the primary means of modifying the Metabase. IIS also optionally provides a web-based administration console. The XML files are human-readable, and when the Allow direct metabase edits feature is turned on (not recommended by Microsoft) it can be viewed and edited with simple text editing software like Notepad.
The Metabase is also programmable through several APIs - Admin Base Objects (ABO), Active Directory Services Interface (ADSI), Windows Management Instrumentation (WMI), and the .NET Framework's System.DirectoryServices and Microsoft.Web.Administration.
The Metabase can also be administered using the Metabase Explorer tool which is part of the Internet Information Services (IIS) 6.0 Resource Kit Tools
References
External links
An Introduction to the IIS Metabase
Metabase Configuration - IIS.net
Microsoft server technology |
https://en.wikipedia.org/wiki/The%20Real%20Seachange | The Real Seachange is an Australian reality television series on the Seven Network, narrated by actor John Howard.
The series follows families, couples and singles who leave the big cities behind in search of a better life. This phenomenon is known as a seachange. The title also references Howard's former role on the popular drama series SeaChange.
The first season aired in late 2006 and consisted of 13 episodes. A second season aired in 2008 and had 10 episodes.
See also
List of Australian television series
References
External links
Australian factual television series
Seven Network original programming
2006 Australian television series debuts |
https://en.wikipedia.org/wiki/Full%20virtualization | In computer science, full virtualization (fv) is a modern virtualization technique developed in late 1990s. It is different from simulation and emulation. Virtualization employs techniques that can create instances of a virtual environment, as opposed to simulation, which models the environment; and emulation, which replicates the target environment with certain kinds of virtual environments called emulation environments for virtual machines. Full virtualization requires that every salient feature of the hardware be reflected into one of several virtual machines – including the full instruction set, input/output operations, interrupts, memory access, and whatever other elements are used by the software that runs on the bare machine, and that is intended to run in a virtual machine. In such an environment, any software capable of execution on the raw hardware can be run in the virtual machine and, in particular, any operating systems. The obvious test of full virtualization is whether an operating system intended for stand-alone use can successfully run inside a virtual machine.
The cornerstone of full virtualization or type-1 virtualization is a hypervisor or Super Operating system that operates at a higher privilege level than the OS. This Hypervisor or Super OS requires two key features to provision and protect virtualized environments. These two features are:
OS-Independent Storage Management to provision resources for all supported Virtual Environments such as Linux, Microsoft Windows or embedded environments and to protect those environments from unauthorized access and,
Switching of Virtualized environments to allocate physical computing resources to Virtual Environments.
See Intel VT-x or AMD-V for a detailed description of privilege levels for Hypervisor, OS and User modes, VMCS, VM-Exit and VM-Entry. This virtualization is not to be confused with IBM Virtual Machine implementations of late 60's and early 70's as IBM systems architecture supported only two modes of Supervisor and Program which provided no security or separation of Virtual Machines.
Other forms of platform virtualization allow only certain or modified software to run within a virtual machine. The concept of full virtualization is well established in the literature, but it is not always referred to by this specific term; see platform virtualization for terminology.
An important example of Virtual Machines, not to be confused with Virtualization implemented by emulation was that provided by the control program of IBM's CP/CMS operating system. It was first demonstrated with IBM's CP-40 research system in 1967, then distributed via open source in CP/CMS in 1967–1972, and re-implemented in IBM's VM family from 1972 to the present. Each CP/CMS user was provided a simulated, stand-alone computer. Each such virtual machine had the complete capabilities of the underlying machine, and (for its user) the virtual machine was indistinguishable from a private system. This si |
https://en.wikipedia.org/wiki/Alliances%20%28Star%20Trek%3A%20Voyager%29 | "Alliances" is the 30th episode of American science fiction television series Star Trek: Voyager airing on the UPN network, the 14th episode in the second season.
The series follows the adventures of the Federation starship Voyager during its journey home to Earth, having been stranded tens of thousands of light-years away. In this episode, Captain Janeway tries to form alliances to help them on their way back.
The episode aired on UPN on January 22, 1996.
Plot
A Kazon attack takes the life of another Voyager crewman, this time the popular ex-Maquis soldier Kurt Bendera. Chakotay, a good friend of Bendera, delivers the eulogy and tells of a time Bendera rescued him from angry miners. After the funeral, Michael Jonas and Crewman Hogan tell Captain Janeway Voyager should change the way she operates to be more like a Maquis.
Chakotay voices the proposal of forming an alliance with one or two Kazon factions to secure peace, not to trade technology, but to offer protection from attacking forces and emergency supplies. In a following talk with Tuvok, he gives the example of peace formed by the unlikely alliance between the Federation and Klingons and how it helped stabilize the quadrant. Janeway opens up to the idea of an alliance and the officers decide to talk with Seska and her maje (leader), Cullah, about allying with her tribe. Meanwhile, Neelix decides to use some of his contacts to propose an alliance with a different tribe.
Initial attempts begin badly, as Cullah detests following orders from a woman. Janeway's rejection of Cullah's offer to trade crew also angers him. Meanwhile, Neelix is abducted before he is able to contact the maje. He is imprisoned with a number of aliens, including many women and children. These are the Trabe, who had been imprisoned because of a generations-long conflict between them and the Kazon. Neelix befriends the Trabe elder, who gets his assurance of help in any escape attempts. Other Trabe forces attack the Kazon stronghold and Neelix, keeping an eye out for the children, assists. They escape on pilfered Kazon merchant-vessels, which had, it was revealed, originally been constructed by the Trabe, along with all the other technology used by the Kazon.
Janeway learns about the past between the Trabe and the Kazon, and decides to pursue paths of an alliance with the Trabe in spite of the danger of the possibility of it rallying the Kazon together against them. They try to pre-empt their wrath by attempting to form peaceful negotiations. Seska finds it a great opportunity to learn the weaknesses of the other tribes and potentially use it to gain an edge against all other Kazon as well as Voyager and the Trabe. The Voyager crew learns someone is planning to disrupt the conference, but they cannot determine who. They decide that any Kazon who attempts to leave the conference would be the guilty party.
The Kazon also hear something is amiss, but all the maje attend, too frightened to be left out of an alliance. T |
https://en.wikipedia.org/wiki/Rudolph%20the%20Red-Nosed%20Reindeer%20and%20the%20Island%20of%20Misfit%20Toys | Rudolph the Red-Nosed Reindeer and the Island of Misfit Toys is a 2001 direct-to-video computer-animated Christmas adventure musical film directed by Bill Kowalchuk for GoodTimes Entertainment. It was released on VHS and DVD on October 30, 2001. The film takes place after the events of the original special (despite Rudolph and Clarice utilizing their young designs from that special). The film thus revisits classic characters like Yukon Cornelius, Hermey the elf (now a dentist), Abominable Snow Monster, and Rudolph the Red-Nosed Reindeer, who is now famous in the North Pole.
GoodTimes Entertainment, three years prior, had released Rudolph the Red-Nosed Reindeer: The Movie, which was set in a separate continuity with different supporting characters. Several key personnel were retained from that movie: Kathleen Barr, the voice of Rudolph; Michael Aschner, the head writer; and Bill Kowalchuk, the director. Golden Books Family Entertainment was likewise retained as the production company.
The voice cast includes Rick Moranis, Jamie Lee Curtis, and Richard Dreyfuss among others.
Plot
Rudolph, not satisfied with being a "novelty act" performing tricks with his nose, travels with Hermey to the Island of Misfit Toys to give King Moonracer a root canal dental treatment. A storm sends Rudolph and Hermey to Castaway Cove where Rudolph considers having his nose made more normal-looking by a hippopotamus named Queen Camilla, being warned that if he gets a normal nose, he won't be able to lead the sleigh anymore on foggy nights which could put Santa's deliveries in potential danger.
Meanwhile, the evil Toy Taker is stealing all of the toys from the island, including Santa's workshop (which made Santa cry), claiming that he's saving them from the inevitable fact that children eventually outgrow their toys and throw them away. Rudolph has a plan to foil the Toy Taker's by disguising themselves as toys.
The Toy Taker's blimp arrives and manages to steal them along with the Misfit Toys, all except for Bumble, who is too big to fit into the blimp so he follows on a floating iceberg. Rudolph tries to talk to a new misfit toy, a kite who is scared of heights and wakes him up from his hypnosis, but fails. The Toy Taker hears all the chatter, and realizing there are intruders, catches Rudolph, Clarice, Yukon, and Hermey.
They head back into the blimp, with Yukon chasing after the Toy Taker, Hermey piloting the blimp, and Rudolph and Clarice doing their best to wake up the toys from their hypnosis. Yukon finally chases the Toy Taker up to the top of the blimp. When a boomerang who doesn't come back swoops by Yukon, he loses his balance and falls. Rudolph and Clarice confront the Toy Taker, with Rudolph's nose blinding him during the confrontation.
The Toy Taker flees and parachutes his way down to Yukon's peppermint mine in hopes of escaping Rudolph and Clarice. Due to the holes in the blimp, Hermey loses control. Luckily, Bumble is there to save the blimp before |
https://en.wikipedia.org/wiki/Cody%20%28TV%20series%29 | Cody is a series of six Australian telemovies starring Gary Sweet that were made for the Seven Network in 1994 and 1995. Sweet played the title character Cody, an unconventional police detective, described by Screen Australia as a "larrikin cop, on the trail of crimes".
Plot
Cody (Gary Sweet) is a Sydney-based police detective, with Fiorelli (Robert Mammone) as his partner and Inspector Genevieve Simmonds (Heather Mitchell) as their superior. In September 1994 Sweet described the title character to Nicole Leedham of The Canberra Times as "kind of risky and dangerous and pretty ruthless ... [He] ain't that much fun, I mean he's fun to play, but he's not that much fun as a guy. He's not your barrel of laughs."
In the first episode, Cody: A Family Affair (1994), the detective investigates a diamond-smuggling gang and poses as a dealer. He also searches for a missing teenager.
In the second episode, Cody: The Tipoff (1994), Cody's childhood friend Mack (Gary Waddell) provides a tip about a burglary in progress. Mack later turns up dead and Cody investigates another friend, Jimmy Catter (Frankie J. Holden).
In the third episode, Cody: Bad Love (1994), the squad's investigation of art thefts leads to a gallery run by an attractive French artist, Claudia (Rebecca Rigg).
The fourth episode, Cody: The Burnout (1995), includes Stella (Alexandra Fowler).
In the fifth episode, Cody: The Wrong Stuff (1995), the squad hunts a drug dealer (Mark Owen-Taylor).
In the sixth episode, Cody: Fall from Grace (1995), an apparent suicide leads to Sam Wolfe (Bill Hunter).
Cast
Gary Sweet as Cody
Robert Mammone as Fiorelli
Heather Mitchell as Inspector Genevieve Simmonds (episodes 1–3)
Suzanne Gullabovska as Girl in Lift (The Tip-Off)
Episodes
Season One
Season Two
Home media
It was announced by Via Vision Entertainment in March 2019 that they would be releasing the Cody telemovies on DVD in two collections.
Awards and nominations
Gary Sweet was nominated for a Silver Logie as Most Popular Actor for the episode, Cody: The Burnout.
See also
List of Australian television series
AACTA Award for Best Telefeature, Mini Series or Short Run Series
References
1990s Australian drama television series
Seven Network original programming
1994 Australian television series debuts
1995 Australian television series endings
Television series by Endemol Australia |
https://en.wikipedia.org/wiki/Version | Version may refer to:
Computing
Software version, a set of numbers that identify a unique evolution of a computer program
VERSION (CONFIG.SYS directive), a configuration directive in FreeDOS
Music
Cover version
Dub version
Remix
Version (album), a 2007 album by Mark Ronson
Versions (Poison the Well album), 2007
Versions (Thievery Corporation album), 2006
Versions (MYMP album), 2005
Versions (Robby Krieger album), 1982
Versions (Zola Jesus album), 2013
Other
Version (eye)
External cephalic version
Versions of the Bible
Version (probability theory), a modification of a stochastic process
See also
Bible version debate
Version control, a component of software configuration management |
https://en.wikipedia.org/wiki/Hind%20%28video%20game%29 | Hind is combat flight simulation game released by Digital Integration in 1996 for MS-DOS compatible operating systems and Microsoft Windows. It is the successor to Apache.
The game features the Soviet military Mi-24V Hind-E helicopter. It came with a detailed 99 page printed manual explaining the basics of helicopter flight and control, along with the specific traits of the Mi-24 helicopter and its weaponry.
Gameplay
The game's graphics use Gouraud shading. Despite the primitive graphics, it has a realistic flight model. Many complex physics effects are modelled, including ground effect/vortex ring and retreating blade stall which culminate in the ability of a skilled pilot to succeed at autorotation in the case of all engine failure. Options are included to simplify the flight model for beginners.
The campaigns included in the game are based on real wars, but the missions involved are fictional.
Ground battles between individual soldiers can be seen taking place, since AI controlled infantry have been added. Soldiers can also be carried aboard the Hind helicopter and are a vital part of some missions.
If the player does nothing, an (almost) endless, semi-random war will be played out in each mission via a combination of scripted scenarios and very basic AI. The war can be passively watched using the features for zooming in on and moving between each active unit. It is possible to pass some missions this way, as the AI units on the players side are sometimes capable of achieving the objectives without help.
Game modes
From the main menu the player can choose single missions (playing either alone or in networked multiplayer), a campaign consisting of missions strung together or to undergo training at the Soviet airbase at Saratov. The training is very extensive and teaches the use of weapons and avionics systems, navigation, battle tactics etc.
Combat can take place in three locales: Kazakhstan, Korea or Afghanistan. The Campaign mode features video clips as well as a detailed briefing before each mission, complete with a mission description, a detailed map and the ability to choose the desired ordnance.
The flight itself can be in novice mode, stable mode and realistic mode.
It can be linked over IPX and analog modem networks with Apache Longbow, making it one of the first multiplayer, multisimulator games - something Digital Integration has trademarked as 'virtual battlefield'.
As with its predecessor, Apache Longbow, Hind has a cooperative multiplayer mode where two players can occupy the same helicopter, with one piloting the helicopter while the other manages weapons (as Weapons System Officer, or WSO).
Reception
The game received generally positive reviews. Both GameSpot and Next Generation said the selection of realism modes open up the game to players of all skill levels and inclinations. GameSpot reviewer Chet Thomas further praised the mission design for being appropriate to the intended uses of the real-world Hind, and comp |
https://en.wikipedia.org/wiki/Michigan%20Radio%20Network | The Michigan Radio Network (or MRN) was a satellite-distributed news service that provides actualities, newscasts, and talk shows to affiliates in Michigan. It was most recently owned by Learfield Communications and had headquarters in Lansing, Michigan. Over the years MRN had been around in various forms and names, and is a sister network to the Michigan Farm Radio Network.
History
The Michigan Radio Network can trace its roots to the Michigan Regional Network, the first radio network in Michigan.
The modern incarnation of the Michigan Radio Network began in 1970 with the formation of the Michigan Farm Radio Network (MFRN) in Milan. The network that came to be known as the Michigan Radio Network was first called the Michigan News Network (MNN). The MFRN and MNN were owned by a company called the Great Lakes Radio group, headed up by Jim Rayl.
The Michigan News Network split from the Great Lakes Radio group in the 1980s and moved to Caro. The MNN was bought by former Detroit Tiger Denny McLain and headquarters moved to Lansing. McLain, convicted of embezzlement and stealing from workers pensions, went bankrupt. The network was sold to back to Jim Rayl, still called the Michigan News Network, and now owned by Full Circle Broadcasting.
Full Circle sold the MNN to Grosse Pointe Farms based Saga Communications, headed by Ed Christian. The name of the network was changed to the Michigan Radio Network.
The Michigan Radio Network (MRN) and MFRN was sold to Learfield Communications in December, 2014.
In March 2016, it was announced that Learfield would end the Michigan Radio Network on March 31 due to financial reasons, and sell MRN's Lansing studios.
Programs
Michigan Radio Network News, hourly one and two-minute newscasts.
Michigan Radio Network Sports, morning and afternoon sports updates.
Capital Pressroom with Rob Baykian, a thirty-minute weekly public affairs program.
Outdoor Magazine with Mike Avery, a three-hour weekend program about hunting and fishing, originating from WSGW.
Special events
The Michigan Radio Network covered events related to the Michigan Legislature, including the annual State of the State address and election night coverage.
Affiliates
WAAM, Ann Arbor
WAGN (AM), Menominee
WAKV, Otsego
WATT, Cadillac
WATZ-FM, Alpena
WBCH (AM), Hastings
WBCK, Battle Creek
WBCM (FM), Boyne City
WBMI, West Branch
WBRN (AM), Big Rapids
WCBY, Cheboygan
WCCW-FM, Traverse City
WCCY, Houghton
WCSY-FM, South Haven
WDBC, Escanaba
WDMJ, Marquette
WGHN (AM), Grand Haven
WGLM, Greenville
WHTO, Iron Mountain
WHYB, Menominee
WIDL, Caro
WILS, Lansing
WIOS, Tawas City
WKHM (AM), Jackson
WKJC, Tawas City
WKYO, Caro
WLDN, Ludington
WMOM, Pentwater
WNBY (AM), Newberry
WNGE, Negaunee
WPHM, Port Huron
WQXO, Munising
WRCI, Three Rivers
WRGZ, Rogers City
WSAQ, Port Huron
WSGW (AM), Saginaw
WSOO, Sault Ste Marie
WTIQ, Manistique
WTKG, Grand Rapids
WUPY, Ontonagon
WXLA, Lansing
WZTK, Alpena
References
Defunct radio networks in the United States
Radio |
https://en.wikipedia.org/wiki/DVArchive | DVArchive is a program which allows users of the ReplayTV Personal Video Recorder (PVR) to stream shows recorded on networked ReplayTVs to their PC for archiving and/or viewing. It can also stream archived video from the PC back to a ReplayTV to be watched there, allowing the PC to act as an expandable video library. DVArchive appears on the network as just another ReplayTV PVR.
DVArchive is a Java program and works on a variety of platforms including Windows 98/2000/XP, Mac OS X and Linux. DVArchive is freely distributed for non-commercial use. The current version is 3.2, released 7/12/2006. DVArchive 3.2 requires Java 1.4.2 or higher.
DVArchive stores TV programs on the PC in the same slightly non-standard MPEG2 format used by the ReplayTV PVR. Users may wish to edit these files and burn them onto video DVDs. The Replay MPEG2 format is understood by a number of widely used MPEG editors. There are also several DVD authoring programs that directly support MPEG2 inputs and minimize reformatting in converting them into DVD outputs.
Digital video recorders
Video software |
https://en.wikipedia.org/wiki/Random%20neural%20network | The random neural network (RNN) is a mathematical representation of an interconnected network of neurons or cells which exchange spiking signals. It was invented by Erol Gelenbe and is linked to the G-network model of queueing networks as well as to Gene Regulatory Network models. Each cell state is represented by an integer whose value rises when the cell receives an excitatory spike and drops when it receives an inhibitory spike. The spikes can originate outside the network itself, or they can come from other cells in the networks. Cells whose internal excitatory state has a positive value are allowed to send out spikes of either kind to other cells in the network according to specific cell-dependent spiking rates. The model has a mathematical solution in steady-state which provides the joint probability distribution of the network in terms of the individual probabilities that each cell is excited and able to send out spikes. Computing this solution is based on solving a set of non-linear algebraic equations whose parameters are related to the spiking rates of individual cells and their connectivity to other cells, as well as the arrival rates of spikes from outside the network. The RNN is a recurrent model, i.e. a neural network that is allowed to have complex feedback loops.
A highly energy-efficient implementation of random neural networks was demonstrated by Krishna Palem et al. using the Probabilistic CMOS or PCMOS technology and was shown to be c. 226–300 times more efficient in terms of Energy-Performance-Product.
RNNs are also related to artificial neural networks, which (like the random neural network) have gradient-based learning algorithms. The learning algorithm for an n-node random neural network that includes feedback loops (it is also a recurrent neural network) is of computational complexity O(n^3) (the number of computations is proportional to the cube of n, the number of neurons). The random neural network can also be used with other learning algorithms such as reinforcement learning. The RNN has been shown to be a universal approximator for bounded and continuous functions.
See also
Linear-nonlinear-Poisson cascade model
References and sources
References
Sources
E. Gelenbe, Random neural networks with negative and positive signals and product form solution, Neural Computation, vol. 1, no. 4, pp. 502–511, 1989.
E. Gelenbe, Stability of the random neural network model, Neural Computation, vol. 2, no. 2, pp. 239–247, 1990.
E. Gelenbe, A. Stafylopatis, and A. Likas, Associative memory operation of the random network model, in Proc. Int. Conf. Artificial Neural Networks, Helsinki, pp. 307–312, 1991.
E. Gelenbe, F. Batty, Minimum cost graph covering with the random neural network, Computer Science and Operations Research, O. Balci (ed.), New York, Pergamon, pp. 139–147, 1992.
E. Gelenbe, Learning in the recurrent random neural network, Neural Computation, vol. 5, no. 1, pp. 154–164, 1993.
E. Gelenbe, V. Koubi, F. Pekerg |
https://en.wikipedia.org/wiki/Indian%20Association%20for%20Research%20in%20Computing%20Science | The Indian Association for Research in Computing Science (IARCS) provides leadership in computing within India. Its members are leading researchers in Computer Science drawn from major institutions from all over the country. Madhavan Mukund is the President of the association as of 2016.
IARCS aims at promoting excellence in Computing. It does so by facilitating interaction amongst its members, acting as a bridge between Academia and Industry and finally by elevating the quality of Computer Science education within the country.
IARCS runs the hugely successful and the longest running conference in computer science in India; International Conference on Foundations of Software Technology and Theoretical Computer Science. The FSTTCS conference is in its 26th year. Since its inception in 1981, the conference (held in the month of December) has helped in nurturing and creating an environment for exchange of ideas amongst the research community in the country by attracting top scientists around the world to the conference.
IARCS recognizes the impact of computing science in school education. To actively promote good practices, it has become involved in the International Olympiad in Informatics (IOI). IARCS is involved in all aspects of training and selection of the young talent to represent the country at this prestigious Olympiad. It also recognizes a role for itself in correcting the biases in the current curriculum for computer science in the country. The national program is called Indian Computing Olympiad.
IARCS has also initiated a new program to teach the teachers as a way of spreading knowledge down to the grassroots level.
External links
Official website
Computer science organizations |
https://en.wikipedia.org/wiki/PDFedit | PDFedit is a free PDF editor for Unix-like operating systems (including Cygwin on top of Windows). It does not support editing protected or encrypted PDF files or word processor-style text manipulation, however.
PDFedit GUI is based on the Qt 3 toolkit and scripting engine (QSA), so every operation is scriptable. It also has the ability to be scripted in ECMAScript. Part of the program is also command line interface for PDF manipulation. Xpdf is used for low level processing.
PDF is a complex format designed for publishing output, not for any further modifications. PDFedit is a low-level tool for technical users that provides structured access to the internal structure of the PDF file. It may require familiarity with PDF specifications to be able to make substantial modifications.
See also
List of PDF software
References
External links
PDFedit on SourceForge
Free PDF software
PDF readers
Software that uses Qt
Technical communication tools
X Window programs |
https://en.wikipedia.org/wiki/Leeds%20College%20of%20Technology | Leeds College of Technology (formerly Kitson College) was a further education college in Leeds, in West Yorkshire, England. With a strong technical bias, the college supported the computing, engineering, social care and transport industries. In addition, the college was a national centre for print training and offered English language learning and teaching (ESOL). The Woodhouse Lane building was built in 1957 and opened in 1959, it was part of Leeds City College until June 2019 when the college closed after 60 years of activity and these facilities were moved to a brand new campus at Quarry Hill opposite the bus station.
It was founded in 1824 as part of the Leeds Mechanics' Institute, and in 1868 the college became the Leeds Institute of Science, Art and Literature, then the Branch College of Engineering and Science. It was renamed Kitson College in 1967 in honour of James Kitson, 1st Baron Airedale, and then Leeds College of Technology.
The college served more than 5,000 students each year.
On 1 April 2009, Leeds College of Technology merged with Leeds Thomas Danby and the Park Lane College to form the new Leeds City College. The site on Cookridge Street was then known as the Technology Campus of the new college. On 26 January 2016 it was announced that the Health and Social Care services was to move to a new Quarry Hill campus then being built next to West Yorkshire Playhouse, now Leeds Playhouse. The whole building closed in July 2019 and was demolished during the summer of 2021 to make way for student lets. Work began on the Quarry Hill Campus in September 2016 and the building opened in July 2019. West Yorkshire Consortium of Colleges operated from Technology Campus until 2018.
The Technology Campus has played its part in rock history. The Who's album Live at Leeds had two tracks re-recorded here and Pink Floyd's song "See Emily Play" was written here after a gig in the building when it was still known as Kitson College.
References
External links
Leeds City College – official website
QAA Review 2002
Educational institutions established in 1824
Further education colleges in Leeds |
https://en.wikipedia.org/wiki/IMDI | IMDI (ISLE Meta Data Initiative) is a metadata standard to describe multi-media and multi-modal language resources. The standard provides interoperability for browsable and searchable corpus structures and resource descriptions with help of specific tools. The project is partly based on existing conventions and standards in the Language Resource community.
The web-based Browsable Corpus at the Max Planck Institute for Psycholinguistics allows you to browse through IMDI corpora and search for language resources.
External links
Information about IMDI can be found at:
Max Planck Institute for Psycholinguistics IMDI webpage
Projects using IMDI:
The Max Planck Institute for Psycholinguistics IMDI Metadata Domain (Browsable Corpus)
CGN - The Spoken Dutch Corpus Project
DAM-LR - Distributed Access Management for Language Resources
DBD - Dutch Bilingualism Database
DOBES - Documentation of Endangered Languages
ECHO Case Study 4 - Sign Languages
ECHO WP2 - Infrastructure and Technology
INTERA WP2 - Integrated European language data repository Area
Metadata |
https://en.wikipedia.org/wiki/Materials%20database | A materials database is a database used to store experimental, computational, standards, or design data for materials in such a way that they can be retrieved efficiently by humans or computer programs.
Background
Fast access and exchange of materials data between research, design and manufacturing teams working on different sites worldwide, is a challenging issue to be addressed during the product cycle in materials engineering. Another important issue is safeguarding high investments made into materials research, meaning that experimental data must be properly conserved, easily be located and quickly be retrieved. Materials databases (MDBs) are powerful tools to address these problems.
The development of factual materials databases began significantly in the 1980s with a leading standardization role being taken by CODATA, ASTM E49 and the British Standards i.e. BSI AMT4/-/6.
Different types
Various categories of MDBs exist for different requirements, for example containing standards data on metallic alloys and plastics or more complex database applications needed for design analysis. MDBs are basic elements for establishing knowledge-based and expert systems.
Web enabled
With the emergence of the Internet, the capability of MDBs increased. Web-enabled MDBs provide a more centralized management and conservation of Materials data. Finding and accessing the required data is faster than to search for them in a traditional manner, e.g. from handbooks or Microsoft Excel files. In particular the dissemination of public research results has improved, as the data are accessible over the World Wide Web. A few web-enabled materials databases exist at present on the market.
References
Scientific databases |
https://en.wikipedia.org/wiki/Island%20City%20%281994%20film%29 | Island City is a science fiction television pilot movie that was aired by Prime Time Entertainment Network in 1994. The film was produced by Lee Rich Productions in association with Lorimar Television. It is the last TV film to be produced by Lorimar after the company shut down in 1993.
In the future, humanity develops a "fountain of youth" drug, but as many people around the world begin to take it, most begin to mutate into a barbaric proto-humanoid state. The few people immune to this side-effect of the drug band together and live in a futuristic city while the mutants live in the vast wasteland outside its gates. In an effort to save the human race and understand what went wrong, the city sends out research missions in fortified vehicles to bring back mutated humans for research, and to rescue healthy humans. The film focuses on one such squad of soldiers and scientists.
During one of their missions into the wasteland, the team comes under attack and one of their own is captured by the mutants. The rest of the movie, which was meant to serve as an introductory episode of a series, deals with the main characters coping with the loss of their friend and organizing a search-and-rescue mission, while secondary characters allow the viewer to explore various facets of life in the city.
The movie touches on many themes including genetic experimentation, virtual reality, and state-controlled marriages. Citizens of the city wear a colored crystal on their sternum based on the individual's genetic makeup, and can mate only with other citizens of the same color. Progeny resulting from people of two different colors would have the genetic mutation that, when combined with the "fountain of youth" drug, created the race of proto-humanoids.
Another plot line focuses on the morality of a "fountain of youth" drug. One of the lead female roles is married to a man who did not take the drug because he believed it immoral. Her husband has aged normally into his 60s or 70s while his wife remains physically and visually in her mid 30s.
The film features virtual reality goggles. The son of the missing soldier uses the goggles to study and do his history homework, and also to spend time fishing with his father. He also attempts to fulfill his sexual fantasies, but a parental block prevents his fantasy girl from removing her top.
Due to low ratings and the high costs associated with producing a sci-fi television show, no other episodes were filmed.
References
External links
Television series by Warner Bros. Television Studios
Prime Time Entertainment Network
Television pilots not picked up as a series
American science fiction television films
1994 television films
1994 films
Television films as pilots
Dystopian television
American dystopian films
1990s American films |
https://en.wikipedia.org/wiki/1942%3A%20The%20Pacific%20Air%20War | 1942: The Pacific Air War is combat flight simulation developed and published by MicroProse for the PC on the DOS operating system in 1994. It is based on the U.S. and Japanese Pacific War conflict from 1942 to 1945. An expansion pack, 1942: The Pacific Air War – Scenario, was released in 1995. A sequel, European Air War, was released in 1998. Tommo purchased the rights to 1942 and digitally publishes it through its Retroism brand in 2015.
Gameplay
This simulation features aerial combat, ground attack, and naval engagements in the Pacific Theater of Operations. The game can be played as a flight simulator or a wargame. A player can fight a single battle in mission mode or follow the war in tour of duty mode.
In tour of duty mode, a player manages his fleets and air bases on a strategic campaign map. When aircraft engages in battle, the player can jump into the cockpit of any aircraft in combat.
The game also features a fairly advanced recording and editing tool allowing the player to film a mission after its completion. The player can use any number of cameras and place them anywhere in the scene. Also the timeline can be scrubbed back and forth and edits can be customised.
Reception
Computer Gaming Worlds reviewer, an Air National Guard F-16 flight instructor, in August 1994 rated the game four stars out of five. Praising the graphics, frame rate, and virtual cockpit, he stated that the flight modeling forced him to use the same tactics as real pilots during the war, with better game balance than Aces of the Pacific. The reviewer concluded that MicroProse succeeded in creating a "serious flight sim" with "staying power to spare".
PC Gamer US presented 1942 with its 1994 "Best Simulation" award. The editors called it an essential component of flight-sim fan's library. 1942 was named the 71st best computer game ever by PC Gamer UK in 1997.
References
External links
1994 video games
DOS games
DOS-only games
MicroProse games
Multiplayer and single-player video games
Pacific War video games
Video games developed in the United States
Video games with expansion packs
World War II flight simulation video games
Tommo games |
https://en.wikipedia.org/wiki/Battles%20of%20Napoleon | Battles of Napoleon is a 1988 computer wargame by Chuck Kroegel and David Landrey published by Strategic Simulations. It was released for the Apple II, Commodore 64, and DOS.
Scenario disks
Designer David Landrey received permission from SSI to release expansion packs for Battles of Napoleon and, in 1994, the game itself from his company, Novastar Games.
Scenario disk #1
Austerlitz
Marengo
Utitsa
Redoubt
Scenario disk #2
Albuera
Medellin
Bridge Battle
Santon
New Orleans
Scenario disk #3
Camden
Cowpens
Kings Mountain
Hobkirk
Eutaw Springs
Scenario disk #4
Wagram
Smolensk
Eylau
Plancenoit
Bladensburg
The Hill
Waterloo (variant)
Leipzig (variant)
Scenario disk #5
Leipzig (variant)
Quatre Bras (variant)
Vimiero
Aspern-Essling
Podubno
Village
Retreat
Ligny
Scenario disk #6
Pyramids
Raab
Craonne
Corunna
Borodino (variant)
North
Jena
Wavre
Reception
Battles of Napoleon sold under 10,000 copies. Computer Gaming World gave it a glowing review, calling it "the game that can keep you satisfied, even addicted, for many years to come." The magazine in 1989 named it Wargame of the Year, in 1990 gave the game five out of five stars, in 1993 gave it three-plus stars, stating that "its play value and historical accuracy mandated its acquisition for anyone interested in the period". and in 1994 stated that the game "far outshines any Napoleonic game released since", with "a veritable cult following".
In 1996, Computer Gaming World declared Battles of Napoleon the 91st-best computer game ever released. The magazine's wargame columnist Terry Coleman named it his pick for the seventh-best computer wargame released by late 1996.
Reviews
Jeux & Stratégie #56
References
External links
1988 video games
Apple II games
Commodore 64 games
Computer wargames
DOS games
Napoleonic Wars video games
Strategic Simulations games
Video games developed in the United States |
https://en.wikipedia.org/wiki/Carole%20Goble | Carole Anne Goble, (born 10 April 1961) is a British academic who is Professor of Computer Science at the University of Manchester. She is principal investigator (PI) of the myGrid, BioCatalogue and myExperiment projects and co-leads the Information Management Group (IMG) with Norman Paton.
Education
Goble was educated at Maidstone School for Girls. Her academic career has been spent at the Department of Computer Science, where she gained her Bachelor of Science degree in computing and information systems from 1979 to 1982.
Research and career
Her current research interests include grid computing, the semantic grid, the Semantic Web, ontologies, e-Science, medical informatics, bioinformatics, and Research Objects. She applies advances in knowledge technologies and workflow systems to solve information management problems for life scientists and other scientific disciplines. She has successfully secured funding from the European Union, the Defense Advanced Research Projects Agency (DARPA) in the United States and UK funding agencies including the Engineering and Physical Sciences Research Council (EPSRC), Biotechnology and Biological Sciences Research Council (BBSRC), Economic and Social Research Council (ESRC), Medical Research Council (United Kingdom) (MRC), the Department of Health, the Open Middleware Infrastructure Institute and the Department of Trade and Industry.
Her work has been published in leading peer reviewed scientific journals including Nucleic Acids Research, Bioinformatics, IEEE Computer, the Journal of Biomedical Semantics, Briefings in Bioinformatics, Artificial Intelligence in Medicine, the Pacific Symposium on Biocomputing conference, the International Journal of Cooperative Information Systems, the Journal of Biomedical Informatics, Nature Genetics and Drug Discovery Today.
Goble joined the University of Manchester in 1985, and was appointed to a chair in 2000. She is an editorial board member of IEEE Internet Computing, GigaScience, and the International Journal of Web Services Research, and served as the editor-in-chief of Elsevier's Journal of Web Semantics from 2003 to 2008.
Goble serves on several committees, including the advisory committees of the Science and Technology Facilities Council Physical and Life Sciences advisory committee, the Netherlands Bioinformatics Centre and the European Grid Infrastructure committee.
She was appointed to the Biotechnology and Biological Sciences Research Council on 13 June 2013.
She has served on the Engineering and Physical Sciences Research Council Technical Opportunities Panel, the Semantic Web Science Association, the British Library's Content Strategy Advisory Board and the Research Councils UK e-Science Steering Committee. She co-founded Cerebra, an early spin-off company to exploit Semantic Web technologies, which has been sold.
Awards and honours
Goble was recipient of the first Jim Gray e-Science Award in December 2008. Tony Hey, corporate vice-president of Micros |
https://en.wikipedia.org/wiki/Hubert%20Davis%20%28filmmaker%29 | Hubert Davis is a Canadian filmmaker who was nominated for an Academy Award for Documentary Short Subject and an Emmy Award for Outstanding Cultural and Artistic Programming for his directorial debut in Hardwood, a short documentary exploring the life of his father, former Harlem Globetrotter Mel Davis. Davis was the first Afro-Canadian to be nominated for an Oscar.
Davis was awarded the Don Haig award for top emerging Canadian director at the 2007 Hot Docs Canadian International Documentary Festival.
Davis' 2009 project was his documentary Invisible City. In 2012, Davis completed work on the NFB short documentary The Portrait for the Diamond Jubilee of Elizabeth II.
Filmography
Hardwood (2006) - writer, editor, director
Aruba (2006) - editor, director, producer
Truth (2007) - writer, director
Stronger Than Love (2007) - director
Invisible City (2009) - editor, director, producer
Wapusk (2011) - director
The Portrait (2012) - director
Giants of Africa (2016) - director
Black Ice (2022) - director
Recognition
Awards and nominations
2004, Won Yorkton Film Festival's Golden Sheaf Award for Best Short Subject for Hardwood
2005, Nominated for an Academy Award for 'Best Documentary, Short Subjects' for Hardwood
2006, Won 'Panavision Grand Jury Award' at Palm Springs International ShortFest
2007, Won Don Haig award for 'Top Emerging Canadian Director' at Hot Docs Canadian International Documentary Festival.
2007, Won Yorkton Film Festival's Golden Sheaf Award for Best Short Subject for Stronger than Love
References
External links
Watch films by Hubert Davis at the National Film Board of Canada website
PBS Web page for Hardwood
Year of birth missing (living people)
Living people
Canadian documentary film directors
Black Canadian filmmakers |
https://en.wikipedia.org/wiki/HADES%20%28software%29 | HADES (Haskins Analysis Display and Experiment System) refers to a family of signal processing computer programs that was developed in the 1980s at Haskins Laboratories by Philip Rubin and colleagues to provide for the display and analysis of multiple channel physiological, speech, and other sampled data in an experimental context. Principal programmers over the years on this project included Vance Maverick , Mark Tiede , Marian Pressler, and Simon Levy . The most significant feature of HADES was the incorporation of a procedural language known as SPIEL (Signal Processing Interactive Editing Language) that provided for the creation and customization of specialized analysis procedures that can be stored as text files, edited, etc., and are similar to functions and subroutines in programming languages like C and Fortran. HADES was one of the earliest signal processing systems with an integrated language and, through the use of SPIEL, provided for automated procedural analysis of large datasets, usually speech data or multiple-channel physiological data acquired with specialized hardware such as the EMMA magnetometer system. Previous systems at the time included ILS from STI, Inc., and the MITSYN system designed by Bill Henke. HADES was written in C and implemented on VAX systems running VMS. Although HADES still finds limited use, its functionality was eventually replaced by commercial systems such as MATLAB.
Bibliography
Rubin, Philip E. (1995). HADES: A Case Study of the Development of a Signal Processing System. In R. Bennett, S. L. Greenspan & A. Syrdal (Eds.), Behavioral Aspects of Speech Technology: Theory and Applications. CRC Press, Boca Raton, 501–520.
Rubin, Philip E. and Löfqvist, Anders (1997). HADES (Haskins Analysis Display and Experiment System). Haskins Laboratories Technical Report, unpublished.
Numerical programming languages
Digital signal processing |
https://en.wikipedia.org/wiki/Adaptive%20algorithm | An adaptive algorithm is an algorithm that changes its behavior at the time it is run, based on information available and on a priori defined reward mechanism (or criterion). Such information could be the story of recently received data, information on the available computational resources, or other run-time acquired (or a priori known) information related to the environment in which it operates.
Among the most used adaptive algorithms is the Widrow-Hoff’s least mean squares (LMS), which represents a class of stochastic gradient-descent algorithms used in adaptive filtering and machine learning. In adaptive filtering the LMS is used to mimic a desired filter by finding the filter coefficients that relate to producing the least mean square of the error signal (difference between the desired and the actual signal).
For example, stable partition, using no additional memory is O(n lg n) but given O(n) memory, it can be O(n) in time. As implemented by the C++ Standard Library, stable_partition is adaptive and so it acquires as much memory as it can get (up to what it would need at most) and applies the algorithm using that available memory. Another example is adaptive sort, whose behavior changes upon the presortedness of its input.
An example of an adaptive algorithm in radar systems is the constant false alarm rate (CFAR) detector.
In machine learning and optimization, many algorithms are adaptive or have adaptive variants, which usually means that the algorithm parameters such as learning rate are automatically adjusted according to statistics about the optimisation thus far (e.g. the rate of convergence). Examples include adaptive simulated annealing, adaptive coordinate descent, adaptive quadrature, AdaBoost, Adagrad, Adadelta, RMSprop, and Adam.
In data compression, adaptive coding algorithms such as Adaptive Huffman coding or Prediction by partial matching can take a stream of data as input, and adapt their compression technique based on the symbols that they have already encountered.
In signal processing, the Adaptive Transform Acoustic Coding (ATRAC) codec used in MiniDisc recorders is called "adaptive" because the window length (the size of an audio "chunk") can change according to the nature of the sound being compressed, to try to achieve the best-sounding compression strategy.
See also
Adaptation (computer science)
Adaptive filter
Adaptive grammar
Adaptive optimization
References
Algorithms |
https://en.wikipedia.org/wiki/Pointman | Pointman is a TV movie pilot and TV series on the Prime Time Entertainment Network in 1994 to 1995. The main character was framed and convicted of fraud while he was an investment banker. Eventually cleared, Constantine 'Connie' Harper helps others while running a coastal resort. The hotel, pool and marina scenes in the Pilot episode were filmed at the South Shore Harbour Resort & Conference Center and adjacent South Shore Harbour Marina in League City, Texas. The series was filmed in Jacksonville, Florida.
TV movie
In this TV movie, the main character, Constantine Nicholas 'Connie' Harper (Jack Scalia), is framed and sent to prison for fraud and assaulting the trial's prosecuting attorney. After serving his time and granted his release, a former cellmate requests that Connie protect the cellmate's sister, Rosie (Roxann Dawson), an aspiring clothing designer, who is being threatened by a diamond broker as Harper was put on "the list", a collection of people to go to for last resort assistance. At first Connie is reluctant to help, but he eventually agrees to protect Rosie from the diamond broker.
TV series
Pointman was greenlighted for a series and ran for two seasons of 13 then 9 episodes. In the series, Constantine "Connie" Harper, the main character, sets up shop as an owner of a Florida beach resort (Jacksonville, Florida and its beach suburbs), Spanish Pete's, while aiding people in need with the use of "the list" and former jailmates.
Cast
Jack Scalia as Constantine 'Connie' Harper
Episodes
Season 1 (1995)
Season 2 (1995)
References
External links
First-run syndicated television programs in the United States
Television series by Warner Bros. Television Studios
Prime Time Entertainment Network
1995 American television series debuts
1995 American television series endings
Television shows set in Florida
Films directed by Robert Ellis Miller
Vigilante television series |
https://en.wikipedia.org/wiki/Phase%20One%20Media%20Pro | Phase One Media Pro (formerly Microsoft Expression Media and iView Media Pro) was a commercial digital asset management cataloging program for Microsoft Windows and Apple OS X operating systems. It was the next version of iView MediaPro which Microsoft acquired in June 2006, and sold again in May 2010 to Phase One, which also makes the Capture One raw converter software. The software was aimed at professionals and photo enthusiasts who needed a photo manager which made it easier to manage photo and video assets, especially very large resolution image files and libraries with many items.
Features
Media Pro makes it possible to catalog and sort images and other media files. The user is able to organize and categorize without being limited to assets' actual folder locations, add metadata including IPTC annotations, and locate assets which may spread over multiple folder and drive locations, including offline discs. As well as cataloging, Media Pro can print (into formats like contact sheets and lists), build web galleries, convert to other formats and build slideshows.
Supported formats
Media Pro supports photo and video files from more than 100 different cameras and is built to manage large photo libraries (especially very large raw, tiff and jpeg files). It is also capable of handling audio, DTP, font, text and HTML files.
Although Media Pro is primarily used to catalog photographic images, it is capable of indexing and converting many additional classes of files. This includes the most popular formats of audio and video files, which can be organized, played in the catalog itself, and converted to derivative file types. This capability makes Media Pro useful for photographers and other media professionals who need to create, manage and make use of different media types.
History and releases
The original predecessor of Phase One Media Pro is iView, a Macintosh-only shareware gallery application originally from Script Software, a company that later changed its name to Plum Amazing. iView went through multiple updates and name changes, being ported to Microsoft Windows, and culminating in a version 3.0 release as iView MediaPro. On 27 June 2007, Microsoft acquired iView Multimedia. Eventually , Microsoft released Microsoft Expression Media, which replaced iView MediaPro 3.
Microsoft Expression Media was released to manufacturing along with other Expression products on 30 April 2007. The RTM news was announced at Microsoft's MIX 07 conference for web developers and designers. In September 2007, Microsoft released Expression Media Service Pack 1 for Windows and OS X which adds support for HD Photo. Expression Media 2 was released in May 2008 as part of Expression Studio 2. Expression Media 2 Service Pack 1 was released in October 2008. The latest version is Expression Media 2 Service Pack 2, which requires SP1 to be installed.
Expression Media, however, did not last. On 23 July 2009, Expression Studio 3 was released, but left out Expression |
https://en.wikipedia.org/wiki/Barab%C3%A1si%E2%80%93Albert%20model | The Barabási–Albert (BA) model is an algorithm for generating random scale-free networks using a preferential attachment mechanism. Several natural and human-made systems, including the Internet, the World Wide Web, citation networks, and some social networks are thought to be approximately scale-free and certainly contain few nodes (called hubs) with unusually high degree as compared to the other nodes of the network. The BA model tries to explain the existence of such nodes in real networks. The algorithm is named for its inventors Albert-László Barabási and Réka Albert.
Concepts
Many observed networks (at least approximately) fall into the class of scale-free networks, meaning that they have power-law (or scale-free) degree distributions, while random graph models such as the Erdős–Rényi (ER) model and the Watts–Strogatz (WS) model do not exhibit power laws. The Barabási–Albert model is one of several proposed models that generate scale-free networks. It incorporates two important general concepts: growth and preferential attachment. Both growth and preferential attachment exist widely in real networks.
Growth means that the number of nodes in the network increases over time.
Preferential attachment means that the more connected a node is, the more likely it is to receive new links. Nodes with a higher degree have a stronger ability to grab links added to the network. Intuitively, the preferential attachment can be understood if we think in terms of social networks connecting people. Here a link from A to B means that person A "knows" or "is acquainted with" person B. Heavily linked nodes represent well-known people with lots of relations. When a newcomer enters the community, they are more likely to become acquainted with one of those more visible people rather than with a relative unknown. The BA model was proposed by assuming that in the World Wide Web, new pages link preferentially to hubs, i.e. very well known sites such as Google, rather than to pages that hardly anyone knows. If someone selects a new page to link to by randomly choosing an existing link, the probability of selecting a particular page would be proportional to its degree. The BA model claims that this explains the preferential attachment probability rule.
Later, the Bianconi–Barabási model works to address this issue by introducing a "fitness" parameter.
Preferential attachment is an example of a positive feedback cycle where initially random variations (one node initially having more links or having started accumulating links earlier than another) are automatically reinforced, thus greatly magnifying differences. This is also sometimes called the Matthew effect, "the rich get richer". See also autocatalysis.
Algorithm
The only parameter in the BA model is , a positive integer. The network initializes with a network of nodes.
At each step, add one new node, then sample existing vertices from the network, with a probability that is proportional to the number of |
https://en.wikipedia.org/wiki/Community%20structure | In the study of complex networks, a network is said to have community structure if the nodes of the network can be easily grouped into (potentially overlapping) sets of nodes such that each set of nodes is densely connected internally. In the particular case of non-overlapping community finding, this implies that the network divides naturally into groups of nodes with dense connections internally and sparser connections between groups. But overlapping communities are also allowed. The more general definition is based on the principle that pairs of nodes are more likely to be connected if they are both members of the same community(ies), and less likely to be connected if they do not share communities. A related but different problem is community search, where the goal is to find a community that a certain vertex belongs to.
Properties
In the study of networks, such as computer and information networks, social networks and biological networks, a number of different characteristics have been found to occur commonly, including the small-world property, heavy-tailed degree distributions, and clustering, among others. Another common characteristic is community structure.
In the context of networks, community structure refers to the occurrence of groups of nodes in a network that are more densely connected internally than with the rest of the network, as shown in the example image to the right. This inhomogeneity of connections suggests that the network has certain natural divisions within it.
Communities are often defined in terms of the partition of the set of vertices, that is each node is put into one and only one community, just as in the figure. This is a useful simplification and most community detection methods find this type of community structure. However, in some cases a better representation could be one where vertices are in more than one community. This might happen in a social network where each vertex represents a person, and the communities represent the different groups of friends: one community for family, another community for co-workers, one for friends in the same sports club, and so on. The use of cliques for community detection discussed below is just one example of how such overlapping community structure can be found.
Some networks may not have any meaningful community structure. Many basic network models, for example, such as the random graph and the Barabási–Albert model, do not display community structure.
Importance
Community structures are quite common in real networks. Social networks include community groups (the origin of the term, in fact) based on common location, interests, occupation, etc.
Finding an underlying community structure in a network, if it exists, is important for a number of reasons. Communities allow us to create a large scale map of a network since individual communities act like meta-nodes in the network which makes its study easier.
Individual communities also shed light on the function o |
https://en.wikipedia.org/wiki/Hierarchical%20clustering%20of%20networks | Hierarchical clustering is one method for finding community structures in a network. The technique arranges the network into a hierarchy of groups according to a specified weight function. The data can then be represented in a tree structure known as a dendrogram. Hierarchical clustering can either be agglomerative or divisive depending on whether one proceeds through the algorithm by adding links to or removing links from the network, respectively. One divisive technique is the Girvan–Newman algorithm.
Algorithm
In the hierarchical clustering algorithm, a weight is first assigned to each pair of vertices in the network. The weight, which can vary depending on implementation (see section below), is intended to indicate how closely related the vertices are. Then, starting with all the nodes in the network disconnected, begin pairing nodes from highest to lowest weight between the pairs (in the divisive case, start from the original network and remove links from lowest to highest weight). As links are added, connected subsets begin to form. These represent the network's community structures.
The components at each iterative step are always a subset of other structures. Hence, the subsets can be represented using a tree diagram, or dendrogram. Horizontal slices of the tree at a given level indicate the communities that exist above and below a value of the weight.
Weights
There are many possible weights for use in hierarchical clustering algorithms. The specific weight used is dictated by the data as well as considerations for computational speed. Additionally, the communities found in the network are highly dependent on the choice of weighting function. Hence, when compared to real-world data with a known community structure, the various weighting techniques have been met with varying degrees of success.
Two weights that have been used previously with varying success are the number of node-independent paths between each pair of vertices and the total number of paths between vertices weighted by the length of the path. One disadvantage of these weights, however, is that both weighting schemes tend to separate single peripheral vertices from their rightful communities because of the small number of paths going to these vertices. For this reason, their use in hierarchical clustering techniques is far from optimal.
Edge betweenness centrality has been used successfully as a weight in the Girvan–Newman algorithm. This technique is similar to a divisive hierarchical clustering algorithm, except the weights are recalculated with each step.
The change in modularity of the network with the addition of a node has also been used successfully as a weight. This method provides a computationally less-costly alternative to the Girvan-Newman algorithm while yielding similar results.
See also
Network topology
Numerical taxonomy
Tree structure
References
Graph algorithms
Network analysis |
https://en.wikipedia.org/wiki/Cyberian%20Outpost | Cyberian Outpost was an online vendor of discount computer hardware and software that operated the website outpost.com. After its IPO in 1998, it reached a peak market capitalization of $1 billion, but, after the bursting of the dot-com bubble, its stock price fell rapidly and the company was acquired by Fry's Electronics in 2001 for $21 million.
The company received publicity for its controversial advertisements including one in which gerbils were shot out of a cannon, one where wolves attack a high school marching band, and one where children in daycare are being tattooed with "outpost.com" on their foreheads.
History
Cyberian Outpost was founded in 1995 by Darryl Peck.
Cyberian Outpost was one of the earliest successful online-only retailers. Unlike many large retailers of the time, the company marketed directly to expert consumers instead of businesses and specialized in hard-to-find Macintosh products in a market saturated with Microsoft-compatible products. Outpost.com marketed its products around the world and offered its website in 11 languages and sold to customers in 140 countries.
The company expanded rapidly, taking advantage of the booming Internet. Revenue increased from $1.9 million in the year ended February 29, 1996 to $22.7 million in the year ended February 28, 1998.
In 1997, Money Magazine rated the site as "Best Site for Computer Equipment". Outpost.com raised $2.7 million in venture capital in 1997, at which point the site had 25,000 visitors per day and 1.3 million customers. The company secured another $22 million in financing in 1998, and raised another $70 million from its initial public offering. Outpost.com opened a warehouse in Ohio that could guarantee next-morning domestic delivery and worldwide delivery within 48 hours. Outpost provided next-day shipping on all orders, regardless of size, up until 2001.
After the dot-com bubble burst, the company fell on hard times. In 2001, the company entered into a merger agreement with PC Connection but then terminated that merger agreement and the company was sold to Fry's Electronics for $21 million including the repayment of $13 million in debt from PC Connection. At that time, the company had 1.4 million customers and 4 million visitors per month to its website.
Marketing
Outpost.com forged marketing partnerships with major Internet portals, such as AOL, CNet, and Lycos in which Outpost.com was featured on these websites.
Outpost.com hired Cliff Freeman to produce TV ads. His agency had created the "Pizza Pizza" campaign for Little Caesars and the "Where's the Beef?" campaigns for Wendy's International. Outpost.com adopted a zealous and controversial marketing program which included a Super Bowl ad in which fake gerbils were shot out of a cannon at the company logo, followed later by an ad that featured a high school marching band being attacked by a pack of ravenous wolves, and another ad portraying pre-school toddlers being tattooed with 'Outpost.com' across their |
https://en.wikipedia.org/wiki/Storage%20model | Data management
A storage model is a model that captures key physical aspects of data structure in a data store. On the other hand, a data model is a model that captures key logical aspects of data structure in a database. The physical storage can be a local disk, a removable media, or storage accessible via the network.
References |
https://en.wikipedia.org/wiki/Yakov%20Rekhter | Yakov Rekhter is a well-known network protocol designer and software programmer. He was heavily involved in internet protocol development, and its predecessors, from their early stages.
Dr. Rekhter was one of the leading architects and a major software developer of the NSFNET Backbone Phase II. He co-designed the Border Gateway Protocol (BGP), the core routing protocol of the Internet. He was also one of the lead designers of Tag Switching (of which MPLS is one form), BGP/MPLS based VPNs, and MPLS Traffic Engineering. Among his most recent activities is the work on MPLS Multicast, Multicast in VPLS, and Multicast in BGP/MPLS VPNs (aka 2547 VPNs). His other contributions to contemporary Internet technology include: GMPLS, Classless Inter-Domain Routing (CIDR) and IP address allocation for private Internets.
He is the author or co-author of more than 80 IETF RFCs, and numerous papers and articles on TCP/IP and the Internet. His recent books include: MPLS: Technology and Applications (Morgan Kaufmann, 2000) and Switching in IP Networks: IP Switching, Tag Switching and Related Technologies (Morgan Kaufmann, 1998).
Rekhter joined Juniper Networks in December 2000, where he was a Juniper Fellow. Prior to joining Juniper, Yakov worked at Cisco Systems, where he was a Cisco Fellow. Prior to joining Cisco in 1995, he worked at IBM T.J. Watson Research Center.
He retired from Juniper Networks and the industry in January 2015.
Napkin Story
In January 1989 at the 12th IETF meeting in Austin, Texas, Yakov Rekhter and Kirk Lougheed sat down at a table to design what ultimately became the Border Gateway Protocol (BGP). The initial BGP design was recorded on a napkin rumored to have been heavily spattered with ketchup. The design on the napkin was expanded to three hand-written sheets of paper from which the first interoperable BGP implementation was quickly developed. A photocopy of these 3 sheets of paper now hangs on the wall of a routing protocol development area at Cisco Systems in Milpitas, California.
References
People in information technology
Living people
Year of birth missing (living people)
Internet pioneers |
https://en.wikipedia.org/wiki/First%20Business | First Business (full name First Business News) is a nationally syndicated financial news and analysis television program, produced by First Business Network LLC, a subsidiary of Weigel Broadcasting, in Chicago. Anchor Angela Miles, reporters Chuck Coppola and Bill Moller, and executive producer Harvey Moshman brought viewers commentary from the floors of the Chicago Mercantile Exchange and the Chicago Board Options Exchange, as well as from their studios in the West Loop. The program covered the financial and economic markets including equities, futures, options, commodities, foreign exchange, and geo-political news.
The program, which typically aired before local and national morning news timeslots, had been marginalized as those shows began to start earlier (as early as 4:00 a.m.), with First Business often moved to lower-rated and lower-viewed graveyard slots. The program's cancellation ended 47 years of Weigel Broadcasting and their flagship station WCIU-TV (channel 26) carrying and originating business-focused programming from Chicago.
Syndication
As of the fall 2011 season, the program was carried daily on more than 100 US broadcast stations and in outlets across 46 foreign countries, with affiliates across all the major networks, as well as independent stations. Air times varied, though the timeslots for the show in the majority of markets was 4:00am through 7:00am leading into early morning national newscasts or local morning newscasts. The only requirement the show enforced was that the program must air before the NYSE opening bell at 9:30am ET (except for Alaska or Hawaii, where time zones necessitated a post-opening bell airing). The show was syndicated by Weigel Broadcasting and sold by Edward. E. Finch & Company.
History
The First Business program was originally launched in 1989 by BizNet, the broadcast division of the United States Chamber of Commerce in Washington, D.C. From its inception through its BizNet years with the Chamber, the First Business program production team was led by BizNet News Director Densil Allen.
The production of First Business was later taken over from BizNet by CONUS Communications, a joint venture of Viacom and Hubbard Broadcasting also responsible for All News Channel, who would produce the program until 2003. Barton Eckert hosted the program from CONUS' bureau in Washington, with his anchor segments being fed via satellite to Hubbard in St. Paul, Minnesota, where news packages acquired from CONUS' local member stations nationwide and other sources would be inserted into the program along with Eckert's anchor segments fed in from Washington, with the finished program being delivered via satellite to local stations from St. Paul very weekday. During this era, the program also aired weekday mornings at 6:30 AM on the USA Network; at the time CONUS produced short USA Update news briefs for the network.
In 2003, Weigel Broadcasting took over the program and moved the show to Chicago. With the loss of a |
https://en.wikipedia.org/wiki/Andy%20Rathbone | Andy Rathbone is the author of a number of For Dummies books about Microsoft Windows as well as other computing books.
Biography
Rathbone was born in San Diego, California. He attended San Diego State University, majoring in comparative literature, and graduated in 1986. He lives in San Diego, California.
The character of shy teenager Mark "The Rat" Ratner, who has a crush on Jennifer Jason Leigh's character in the movie Fast Times at Ridgemont High, was modeled on Rathbone after writer Cameron Crowe befriended him during Crowe's research for the original book at San Diego's Clairemont High School. Rathbone's portrayal in the film was featured in an article titled "Geek God" published in the March 13, 1995, issue of People Weekly magazine.
Career
Before becoming an author, Rathbone was a reporter for the La Jolla Light newspaper, was an editor at ComputorEdge Magazine, and has freelanced for PC World, ComputerWorld and CompuServe.
In 1992, he wrote his first For Dummies book, Windows For Dummies, which was a New York Times bestseller. Since then, he has published some 50 computer books. His latest book is Windows 11 For Dummies (2021). Several of his For Dummies books have made USA Today's bestseller list.
References
External links
Andy Rathbone's official site
Datamation, review of Windows 7, May 18, 2009
American technology writers
Living people
Writers from San Diego
People in information technology
San Diego State University alumni
20th-century American non-fiction writers
21st-century American non-fiction writers
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Vuze | Vuze (previously Azureus) is a BitTorrent client used to transfer files via the BitTorrent protocol. Vuze is written in Java, and uses the Azureus Engine. In addition to downloading data linked to .torrent files, Azureus allows users to view, publish and share original DVD and HD quality video content. Content is presented through channels and categories containing TV shows, music videos, movies, video games, series and others. Additionally, if users prefer to publish their original content, they may earn money from it.
Azureus was first released in June 2003 at SourceForge.net, mostly to experiment with the Standard Widget Toolkit from Eclipse. It later became one of the most popular BitTorrent clients. The Azureus software was released under the GNU General Public License, and remains as a free software application. It was among the most popular BitTorrent clients. However, the Vuze software added in more recent versions is proprietary and users are required to accept these more restrictive license terms.
Features
Bridging between I2P and the clearnet
Vuze is the only client that makes clearnet torrents available on I2P and vice versa. It has a plugin that connects to the I2P network. If the user adds a torrent from I2P, it will be seeded on both I2P and the clearnet, and if a user adds a torrent from the clearnet, it will be seeded on both the clearnet and I2P. For this reason, torrents previously published only on I2P are made available to the entire Internet, and users of I2P can download any torrent on the Internet while maintaining the anonymity of I2P.
History
Azureus
Azureus was first released in June 2003 at SourceForge.net. The blue poison dart frog (Dendrobates azureus) was chosen as the logo and name of the brand by co-creator Tyler Pitchford. This choice was due to Latin names of poison dart frogs being used as codenames for his development projects.
Vuze
In 2006 Vuze was released as an attempt to transform the client into a "social" client by a group of the original developers forming Azureus Inc., shortly to be renamed Vuze, Inc. A Vuze-free version of Azureus was released along with Vuze during the beta period. The releases used version numbers 3.0, while the Vuze-free versions continued with the 2.5 release numbers. In addition, some developers voiced opposition to the idea of completely transforming the client. Starting with an unknown version, Vuze was coupled with Azureus. Soon after, "NoVuze" modified versions were released on The Pirate Bay, and as of September 15, 2008, are available for versions up to 3.1.1.0. On June 16, 2008, the developers of Azureus/Vuze decided to stop releasing versions named Azureus, and complete the name change with the release of version 3.1. The client engine however, remains unchanged as Azureus.
License change
Up to version 2.5.0.4, Azureus was distributed under the GNU General Public License (GPL); beginning with the version 3 distribution, the license presented upon install |
https://en.wikipedia.org/wiki/Memory%20ordering | Memory ordering describes the order of accesses to computer memory by a CPU. The term can refer either to the memory ordering generated by the compiler during compile time, or to the memory ordering generated by a CPU during runtime.
In modern microprocessors, memory ordering characterizes the CPU's ability to reorder memory operations – it is a type of out-of-order execution. Memory reordering can be used to fully utilize the bus-bandwidth of different types of memory such as caches and memory banks.
On most modern uniprocessors memory operations are not executed in the order specified by the program code. In single threaded programs all operations appear to have been executed in the order specified, with all out-of-order execution hidden to the programmer – however in multi-threaded environments (or when interfacing with other hardware via memory buses) this can lead to problems. To avoid problems, memory barriers can be used in these cases.
Compile-time memory ordering
Most programming languages have some notion of a thread of execution which executes statements in a defined order. Traditional compilers translate high-level expressions to a sequence of low-level instructions relative to a program counter at the underlying machine level.
Execution effects are visible at two levels: within the program code at a high level, and at the machine level as viewed by other threads or processing elements in concurrent programming, or during debugging when using a hardware debugging aid with access to the machine state (some support for this is often built directly into the CPU or microcontroller as functionally independent circuitry apart from the execution core which continues to operate even when the core itself is halted for static inspection of its execution state). Compile-time memory order concerns itself with the former, and does not concern itself with these other views.
General issues of program order
Program-order effects of expression evaluation
During compilation, hardware instructions are often generated at a finer granularity than specified in the high-level code. The primary observable effect in a procedural programming is assignment of a new value to a named variable.
sum = a + b + c;
print(sum);
The print statement follows the statement which assigns to the variable sum, and thus when the print statement references the computed variable sum it references this result as an observable effect of the prior execution sequence. As defined by the rules of program sequence, when the print function call references sum, the value of sum must be that of the most recently executed assignment to the variable sum (in this case the immediately previous statement).
At the machine level, few machines can add three numbers together in a single instruction, and so the compiler will have to translate this expression into two addition operations. If the semantics of the program language restrict the compiler into translating the expre |
https://en.wikipedia.org/wiki/ISRO%20Telemetry%2C%20Tracking%20and%20Command%20Network | The Indian Space Research Organisation (ISRO), over the years, has established a comprehensive global network of ground stations to provide Telemetry, Tracking and Command (TTC) support to satellite and launch vehicle missions. These facilities are grouped under ISRO Telemetry, Tracking and Command Network (ISTRAC) with its headquarters at Bangalore, India.
Facilities
ISTRAC has several facilities as of November 2013:
ISTRAC facilities in Bangalore consist of TTC ground station (BLR) with full redundancy multi-mission Spacecraft Control Center to carry out and control spacecraft operations and co-ordinate with the network stations. Computer facility with distributed architecture providing independent processors for communications handling, dedicated processors to provide real-time displays for individual spacecraft missions and off-line processors for carrying out spacecraft data archival, analysis and orbit determination.
Communication Control facility to establish links between SCC and ISTRAC network stations as well as control centers of other participating external space agencies and data receptions stations through dedicated voice, data and TTY links.
Mission
The mission of the ISTRAC includes:
Tracking, commanding and housekeeping data acquisition as well as health analysis and control, orbit and attitude determination and network co-ordination support to all low Earth orbit satellite missions of ISRO throughout their mission life.
Telemetry data acquisition support for ISRO launch vehicle missions from liftoff until satellite acquisition and down range tracking support for monitoring and determining the satellite injection parameters.
Coordinating between spacecraft and launch vehicle teams, supporting ground stations right from planning till the completion of mission for the national and international satellite missions.
Telemetry, tracking and command support for the International satellite launch projects.
Ground Stations
ISTRAC has the following TTC ground stations:
India
Hyderabad
Bangalore, also hosts the Indian Spacecraft Control Centre
Lucknow
Port Blair
Sriharikota
Thiruvananthapuram
Bharti research station (AGEOS)
Global Stations
Port Louis, Mauritius
Bear Lakes, Russia (Медвежьи Озера, Medvezhi Ozera), operating the RT-64 antenna
Biak, Indonesia
Brunei
Svalbard, Norway
Troll, Antarctica
Vietnam
Gatun Lake, Panama
São Tomé and Príncipe, West Africa
See also
Indian Deep Space Network
European Space Tracking
NASA Deep Space Network
Near Earth Network
Space Network
References
External links
ISRO Telemetry, Tracking and Command Network (ISTRAC) - Official Website
Indian Space Research Organisation facilities
Year of establishment missing |
https://en.wikipedia.org/wiki/Nord%20Programming%20Language | Nord Programming Language (NPL), is a procedural programming language by the Norwegian minicomputer manufacturer Norsk Data. It shipped as a standard component of the operating system Sintran III.
The language was also used to implement Sintran III: the core and file system of which are written in NPL, as was the NPL compiler, and some core applications early on, until the release of high-level programming language named PLANC. Then, the linker and other software were rewritten in PLANC.
The NPL compiler was also special in that it did not emit object code as most compilers do. Instead it emitted an intermediate representation, in the form of assembly language code, which then had to be assembled using the Norsk Data Assembler.
The registers of the CPU were available in NPL as predefined variables. Thus could be written:
X + T =: A
and the compiler would emit:
COPY SX DA
RADD ST DA
Functions could be declared with multiple entry points:
FUNC FUN1, FUN2
FUN1: T := 1
FUN2:
code here
END
FUN1 could be called to set T to 1 before falling into FUN2 or T could be set to something else and call FUN2. If T register specified which file handle to write to, then either FUN1 could be called to always output to terminal or T could be specified to handle a file in T and call FUN2 to output to that file.
Procedural programming languages
Norsk Data software |
https://en.wikipedia.org/wiki/Norsk%20Data%20Assembler | MAC was a Macro assembler for computers of the NORD-1, NORD-10, and ND-100 lines from Norsk Data.
Limitations
The assembler had several snags which today would be considered exotic or strange.
Identifier length
Like many assemblers MAC placed a limit on the length of variable names, however, rather than simply disallowing names greater than the maximum length it only kept the last five letters of an identifier, ignoring the first part of the name. The reason for keeping the last 5 was so that variables such as MY_ARRAY1 and MY_ARRAY2 would be distinguishable. The result was that the internal storage of some names was very strange and some times hard to understand as the names would be identical to names such as RRAY1 and RRAY2 respectively. This behavior caused some programmers to adopt the practice of writing only the last five letters of a name in their program code as the assembler would ignore the rest anyway. Because of the difficulty faced by a human reader in understanding what was meant by the name, the code became much more difficult to understand. This resulted in less code reuse on the system.
Translation to machine code
Another peculiarity was that the assembler worked by adding together the "values" of all the symbols in an instruction to form the actual machine code. For example to copy the contents of the X register to the A register you would write:
COPY SX DA
Internally the assembler had a numerical value for "COPY", another value for "SX", and a third value for "DA". Adding them together yielded the actual machine instruction. However, if the programmer made a mistake and typed in (notice that both registers are "source" registers):
COPY SX SA
the machine would not do what was really intended by the programmer, nor would it throw an error. Instead the assembler would accept the program but it would not be translated into a COPY instruction. The SX + SA part would most likely result in either the value of some third register or would overflow so that the operation part of the instruction was modified changing it from copy to some other unintended operation.
Standard call library
Another issue for assembler programmers in general is the list of so-called monitor (MON) calls. The MON instruction is equivalent to the INT instruction found in Intel CPUs. However, while they originally had a nice set of functions to write to a file, read from a file, etc.; it quickly devolved into an ad hoc set of functions. An example being a function originally designed to output 8 bytes stored in 4 of the registers (A, D, T and X). Soon someone, having the bytes in some other registers, made a new function to output from those registers. This left the programmer with a veritable forest of output functions all doing almost the same thing. In the latter days of SINTRAN the problem then was to find available codes for these system calls as all 256 of them had already been taken by several such near identical functions. Thus, the extended m |
https://en.wikipedia.org/wiki/Configware/Software-Co-Compilation | Software/Configware Co-Compilation is used for reconfigurable computing to generate the code for both, an instruction-stream-based microprocessor and a reconfigurable accelerator interfaced to it. Such a co-compiler (see figure) has a partitioner which accepts input from a high level language source, such as, for instance a programming language, or the output from tools like MATLAB, and automatically partitions it into parallelizable parts suitable for the reconfigurable accelerator and the rest for running on the microprocessor. By loop transformations the partitioner converts the parallelizable parts into a configware source, which is compiled by a Configware Compiler generating configware code for the configuration of the reconfigurable accelerator like, for instance an FPGA, or a coarse-grained reconfigurable array, and flowware code for organizing the data streams going from and to the accelerator.
Further reading
1995 J. Becker, et al.: A Novel Two-Level Hardware/Software Co-Design Framework; Journal of the Brazilian Computer Society, Special Issue on Electronic Design Automation, Dec. 1995
1995 J. Becker, et al.: A Profiling-driven Hardware/Software Partitioning of High-Level Language Specifications; Workshop on Logic and Architecture Synthesis, Grenoble, France, Dec. 1995
1996 J. Becker, et al.: CoDe-X: A Novel Two-Level Hardware/Software Co-Design Framework; 9th International Conference on VLSI Design, Bangalore, India, Jan. 1996
External links
Juergen Becker: A Partitioning Compiler for Computers with Xputer-based Accelerators; Ph. D. thesis, 1995
Compilers
Reconfigurable computing |
https://en.wikipedia.org/wiki/Rail%20transport%20in%20the%20Isle%20of%20Man | The Isle of Man has a rich transport heritage and boasts the largest narrow-gauge railway network in the British Isles with several historic railways and tramways still in operation. These operate largely to what is known as "Manx Standard Gauge" ( narrow gauge) and together they comprise about of Victorian railways and tramways. The Isle of Man Railway Museum in Port Erin allows people to find out more about the history of the Manx railways, and was until 1998 accompanied by a similar museum in Ramsey, which was dedicated to the history of the electric line, but this was closed and converted into a youth club. The steam railway to the south of the island, electric to the north and mountain line to the summit of Snaefell, the island's only mountain, are all government-owned, and operated under the title Isle of Man Railways, as a division of the island's Department of Infrastructure. The lines at Groudle Glen and Curraghs Wildlife Park are both privately owned but open to the public.
Lines
The lines listed in the table are or have been open to the general public. Most of the major lines had/have "Manx Standard Gauge" of .
There have been various other railways on the Isle of Man that have never been open for public transport, such as those in the various mines around the island. Among these are/were:
Glenfaba
Glenfaba Brickworks Tramway
Knockaloe branch line, owned by the IMR, for Knockaloe Internment Camp internees and supplies
Peel Harbour Tramway, construction railway, , steam locomotives, built 1864 or 1865 and dismantled 1873.
Incline railway connecting to the Peel Harbour Tramway, self-acting incline.
Corrin's Hill, horse-drawn construction railway connecting a stone quarry to the incline railway.
Garff
A second Laxey Mine tramway, , horsedrawn, on the lower washing floor, constructed around 1865 and lasted until at least 1918
Middle
Douglas Breakwater Crane Railway
Douglas Holiday Camp
A construction railway to the Injebreck Reservoir, , built 1899, length from Hillberry to the Reservoir, worked with steam locomotives.
Rushen
Port Erin Breakwater Railway, a construction line for the Port Erin Breakwater. , steam traction, built 1864.
About fifty other minor tramways, in the various mines, quarries and sand pits, or on RAF gunnery lines, existed on the island.
See also
Isle of Man
List of heritage railways
British narrow gauge railways
Mountain railway
Transport in the Isle of Man
Sodor
References |
https://en.wikipedia.org/wiki/Overland%20Telegraph%20Company | The Overland Telegraph Company was one of the organizations responsible for constructing the telegraph line which resulted in the first transcontinental telegraph network in the United States. The company built the section of line between Fort Churchill, Nevada Territory (where it connected to existing telegraph networks in California) and Salt Lake City, Utah Territory.
The first messages between California and the Utah Territory were sent via the new line on the evening of October 24, 1861, completing the transcontinental network. (The section of line between the eastern United States and Salt Lake City had been completed by the Pacific Telegraph Company a few days prior.) Soon after the line's completion, the Overland Telegraph Company was absorbed into the California State Telegraph Company, which itself became a part of the Western Union Telegraph Company in 1867.
History
Organization
The Pacific Telegraph Act of 1860 called for the facilitation of telegraphic communication between the east and west coasts of the United States. A contract for construction of the telegraph line, as authorized by the act, was awarded to Hiram Sibley of the Western Union Telegraph Company. Sibley and the Western Union would organize (and receive help from) other telegraph companies to build the line.
The California State Telegraph Company had recently consolidated all the existing telegraph companies in California, and was tasked with building the section of transcontinental telegraph line from their existing infrastructure in California and Nevada Territory towards Salt Lake City (where it would meet the line being constructed by the Pacific Telegraph Company). To oversee the construction, the California State Telegraph Company's interests incorporated the Overland Telegraph Company in April 1861. The following month, the Overland Telegraph Company was officially organized with Horace W. Carpentier as president, James Gamble as Superintendent
and James Street as General Agent.
Construction and operation
Construction started on June 20, 1861 at Fort Churchill and simultaneously from Salt Lake in July. James Gamble—who was managing the work—wrote, "The line was first measured and staked off; the hole-diggers followed; then came the pole-setters, and next the wire party." Between three and eight miles of line were strung per day. The older telegraph line (originally built by the Placerville and Humboldt Telegraph Company) between Placerville, California and Fort Churchill was also replaced.
Once the line had been completed to Salt Lake City, the first messages were sent on the evening of October 24, 1861. At 5:13 pm (Salt Lake City time), James Street sent the first message to California from Utah Territory. It was addressed to company president Horace Carpentier, advising him the line was complete and to go to the nearby telegraph office. Less than two hours later, Brigham Young, President of the Church of Jesus Christ of Latter-day Saints, sent the next |
https://en.wikipedia.org/wiki/North%20American%20Computer%20Chess%20Championship | The North American Computer Chess Championship was a computer chess championship held from 1970 to 1994. It was organised by the Association for Computing Machinery and by Monty Newborn, Professor of Computer Science at McGill University. It was one of the first computer chess tournaments. The 14th NACCC was also the World Computer Chess Championship.
The event was canceled in 1995 as Deep Blue was preparing for the first match against world chess champion Garry Kasparov, and never resumed.
References
External links
ACM COMPUTER CHESS by Bill Wall
Computer chess competitions
Recurring events established in 1970 |
https://en.wikipedia.org/wiki/Shrinkage%20%28statistics%29 | In statistics, shrinkage is the reduction in the effects of sampling variation. In regression analysis, a fitted relationship appears to perform less well on a new data set than on the data set used for fitting. In particular the value of the coefficient of determination 'shrinks'. This idea is complementary to overfitting and, separately, to the standard adjustment made in the coefficient of determination to compensate for the subjunctive effects of further sampling, like controlling for the potential of new explanatory terms improving the model by chance: that is, the adjustment formula itself provides "shrinkage." But the adjustment formula yields an artificial shrinkage.
A shrinkage estimator is an estimator that, either explicitly or implicitly, incorporates the effects of shrinkage. In loose terms this means that a naive or raw estimate is improved by combining it with other information. The term relates to the notion that the improved estimate is made closer to the value supplied by the 'other information' than the raw estimate. In this sense, shrinkage is used to regularize ill-posed inference problems.
Shrinkage is implicit in Bayesian inference and penalized likelihood inference, and explicit in James–Stein-type inference. In contrast, simple types of maximum-likelihood and least-squares estimation procedures do not include shrinkage effects, although they can be used within shrinkage estimation schemes.
Description
Many standard estimators can be improved, in terms of mean squared error (MSE), by shrinking them towards zero (or any other finite constant value). In other words, the improvement in the estimate from the corresponding reduction in the width of the confidence interval can outweigh the worsening of the estimate introduced by biasing the estimate towards zero (see bias-variance tradeoff).
Assume that the expected value of the raw estimate is not zero and consider other estimators obtained by multiplying the raw estimate by a certain parameter. A value for this parameter can be specified so as to minimize the MSE of the new estimate. For this value of the parameter, the new estimate will have a smaller MSE than the raw one. Thus it has been improved. An effect here may be to convert an unbiased raw estimate to an improved biased one.
Examples
A well-known example arises in the estimation of the population variance by sample variance. For a sample size of n, the use of a divisor n − 1 in the usual formula (Bessel's correction) gives an unbiased estimator, while other divisors have lower MSE, at the expense of bias. The optimal choice of divisor (weighting of shrinkage) depends on the excess kurtosis of the population, as discussed at mean squared error: variance, but one can always do better (in terms of MSE) than the unbiased estimator; for the normal distribution a divisor of n + 1 gives one which has the minimum mean squared error.
Methods
Types of regression that involve shrinkage estimates include ridge regression |
https://en.wikipedia.org/wiki/Archive%20bit | The archive bit is a file attribute used by CP/M, Microsoft operating systems, OS/2, and AmigaOS. It is used to indicate whether or not the file has been backed up (archived).
Usage
In Windows and OS/2, when a file is created or modified, the archive bit is set (i.e. turned on), and when the file has been backed up, the archive bit is cleared (i.e. turned off). Thus, the meaning of the archive bit is "this file has not been archived". In CP/M, the meaning is inverted: creating or modifying a file clears the archive bit, and the bit is set when the file is backed up.
Backup software may provide the option to do a full backup while clearing archive bits – that is, to back up all files regardless of their archive bit status, and to clear the archive bit for all files processed by the backup. This allows for the creation of an initial full backup that will be supplemented by incremental backups in the future. Later, the incremental backup task uses the archive bit to distinguish which files have already been backed up, and selects only the new or modified files for backup.
The operating system never clears the archive bit unless explicitly told to do so by the user. Even when a user explicitly tells the operating system to copy a file for the purpose of archiving it, the archive bit will still not be cleared. A specific command for clearing or setting the bit must be executed. On the other hand, whenever a file with a clear archive bit is modified (edited), or copied or moved to a new location, the operating system will set the archive bit on the target file. Typically on a file system that has never been formally backed up, nearly all of the files will have their archive bits set, as there are few applications that make use of archive bits without the user's request.
In MS-DOS as well as nearly all versions of Windows, status of the archive bit can be viewed or changed with the attrib command-line utility, or by viewing the properties of a file with the Windows shell or Windows Explorer. The archive bit's status can also be viewed or changed with the GetFileAttributes, GetFileAttributesEx, and SetFileAttributes Windows APIs. The archive bit can be set or cleared with the attributes property in VBScript or JScript.
The archive bit is a file attribute and not part of the file itself, so the contents of the file remain unchanged when the status of the archive bit changes.
Alternatives
Relying on the archive bit for backing up files can be unreliable if multiple backup programs are setting and clearing the archive bit on the same volume. Another possibility is to use the timestamp of the last change to the file or directory. This is typically the technique used in UNIX-like operating systems.
See also
File system
File attribute
Glossary of backup terms
References
Computer archives
Computer file systems
Metadata |
https://en.wikipedia.org/wiki/Computed%20Corpuscle%20Sectioning | Computed Corpuscle Sectioning is a general method for determining the volume, profile area, and perimeter of a slab section of any computer-modeled three-dimensional object in any orientation and at any position. It was originally developed as a model of cell nuclei in a tissue section in conjunction with the Reference Curve Method for correcting ploidy measurements by image analysis in a tissue section, but it is useful for evaluating any algorithm that corrects ploidy measurements for the effect of sectioning. Computed Corpuscle Sectioning has obvious pertinence to stereology, but has not been exploited in that field. The patents on this method (U.S. Patent numbers 5,918,038, 6,035,258, and 6,603,869) are no longer in force.
References
Freed JA. Possibility of correcting image cytometric DNA (ploidy) measurements in tissue sections: Insights from computed corpuscle sectioning and the reference curve method. Analyt Quant Cytol Histol 19(5):376-386, 1997.
Freed JA. Improved correction of quantitative nuclear DNA (ploidy) measurements in tissue sections. Analyt Quant Cytol Histol 21(2):103-112, 1999.
Freed JA. Conceptual comparison of two computer models of corpuscle sectioning and of two algorithms for correction of ploidy measurements in tissue sections. Analyt Quant Cytol Histol 22(1): 17-25, 2000.
"A general method for determining the volume and profile area of a sectioned corpuscle", U.S. Pat. No. 5,918,038 issued 6/29/99 to Jeffrey A. Freed.
"Method for correction of quantitative DNA measurements in a tissue section", U.S. Pat. No. 6,035,258 issued 3/7/00 to Jeffrey A. Freed.
“Use of perimeter measurements to improve ploidy measurements in a tissue section”, U.S. Pat. No. 6,603,869 issued 8/5/03 to Jeffrey A. Freed.
3D computer graphics
Medical imaging |
https://en.wikipedia.org/wiki/Scriptella | Scriptella is an open source ETL (Extract-Transform-Load) and script execution tool written in Java. It allows the use of SQL or another scripting language suitable for the data source to perform required transformations. Scriptella does not offer any graphical user interface.
Typical use
Database migration.
Database creation/update scripts.
Cross-database ETL operations, import/export.
Alternative for Ant <sql> task.
Automated database schema upgrade.
Features
Simple XML syntax for scripts. Add dynamics to your existing SQL scripts by creating a thin wrapper XML file: <!DOCTYPE etl SYSTEM "http://scriptella.javaforge.com/dtd/etl.dtd">
<etl>
<connection driver="$driver" url="$url" user="$user" password="$password"/>
<script>
<include href="PATH_TO_YOUR_SCRIPT.sql"/>
-- And/or directly insert SQL statements here
</script>
</etl>
Support for multiple datasources (or multiple connections to a single database) in an ETL file.
Support for many useful JDBC features, e.g. parameters in SQL including file blobs and JDBC escaping.
Performance. Performance and low memory usage are one of the primary goals.
Support for evaluated expressions and properties (JEXL syntax)
Support for cross-database ETL scripts by using <dialect> elements
Transactional execution
Error handling via <onerror> elements
Conditional scripts/queries execution (similar to Ant if/unless attributes but more powerful)
Easy-to-Use as a standalone tool or Ant task, without deployment or installation.
Easy-To-Run ETL files directly from Java code.
Built-in adapters for popular databases for a tight integration. Support for any database with JDBC/ODBC compliant driver.
Service Provider Interface (SPI) for interoperability with non-JDBC DataSources and integration with scripting languages. Out of the box support for JSR 223 (Scripting for the Java Platform) compatible languages.
Built-In CSV, TEXT, XML, LDAP, Lucene, Velocity, JEXL and Janino providers. Integration with Java EE, Spring Framework, JMX and JNDI for enterprise ready scripts.
External links
Extract, transform, load tools
Data warehousing products
Data management |
https://en.wikipedia.org/wiki/AIDS%20%28aeronautics%29 | AIDS (Aircraft Integrated Data System) was the precursor to current aircraft systems such as ACMS (Aircraft Condition Monitoring System) and ACMF (Aircraft Condition Monitoring Function) that allow the airline to utilise parameter values that exist on the aircraft buses.
The original Airbus A320 was equipped with an AIDS system. This included an AIDS print button which, when programmed over the MCDU, allows paper data reports, DAR recordings, or ACARS transmissions of a select amount of parameters to be printed.
References
Aircraft recorders |
https://en.wikipedia.org/wiki/Victory%20Run | is a 1987 racing game released for the PC Engine/TurboGrafx-16, and also available on the Nintendo Wii's Virtual Console and on PlayStation Network. The game depicts the Paris-Dakar Rally, one of the earliest to do so. One of the unique features at the time of release of Victory Run was that the car's parts degraded as they are used and/or abused. Degraded parts could be replaced, but only if the player has the correct type of spare part. The player can acquire up to 20 spare parts before the first race, but cannot acquire any more spare parts after starting the first race.
Reception
Computer and Video Games rated the PC Engine version 80% in 1989.
IGN rated the Virtual Console version 6.5 out of 10 in 2006.
External links
References
1987 video games
Dakar Rally
Hudson Soft games
Off-road racing video games
TurboGrafx-16 games
Video games developed in Japan
Video games scored by Takeaki Kunimoto
Virtual Console games
Virtual Console games for Wii U
PlayStation Network games |
https://en.wikipedia.org/wiki/Metrical%20task%20system | Task systems are mathematical objects used to model the set of possible configuration of online algorithms. They were introduced by Borodin, Linial and Saks (1992) to model a variety of online problems. A task system determines a set of states and costs to change states. Task systems obtain as input a sequence of requests such that each request assigns processing times to the states. The objective of an online algorithm for task systems is to create a schedule that minimizes the overall cost incurred due to processing the tasks with respect to the states and due to the cost to change states.
If the cost function to change states is a metric, the task system is a metrical task system (MTS). This is the most common type of task systems.
Metrical task systems generalize online problems such as paging, list accessing, and the k-server problem (in finite spaces).
Formal Definition
A task system is a pair where is a set of states and is a distance function. If is a metric, is a metrical task system. An input to the task system is a sequence such that for each , is a vector of non-negative entries that determine the processing costs for the states when processing the th task.
An algorithm for the task system produces a schedule that determines the sequence of states. For instance, means that the th task is run in state . The processing cost of a schedule is
The objective of the algorithm is to find a schedule such that the cost is minimized.
Known Results
As usual for online problems, the most common measure to analyze algorithms for metrical task systems is the competitive analysis, where the performance of an online algorithm is compared to the performance of an optimal offline algorithm. For deterministic online algorithms, there is a tight bound on the competitive ratio due to Borodin et al. (1992).
For randomized online algorithms, the competitive ratio is lower bounded by and upper bounded by . The lower bound is due to Bartal et al. (2006,2005). The upper bound is due to Bubeck, Cohen, Lee and Lee (2018) who improved upon a result of Fiat and Mendel (2003).
There are many results for various types of restricted metrics.
See also
Adversary model
Competitive analysis
K-server problem
Online algorithm
Page replacement algorithm
Real-time computing
References
Online algorithms |
https://en.wikipedia.org/wiki/Morgan%20Kaufmann%20Publishers | Morgan Kaufmann Publishers is a Burlington, Massachusetts (San Francisco, California until 2008) based publisher specializing in computer science and engineering content.
Since 1984, Morgan Kaufmann has published content on information technology, computer architecture, data management, computer networking, computer systems, human computer interaction, computer graphics, multimedia information and systems, artificial intelligence, computer security, and software engineering. Morgan Kaufmann's audience includes the research and development communities, information technology (IS/IT) managers, and students in professional degree programs.
The company was founded in 1984 by publishers Michael B. Morgan and William Kaufmann and computer scientist Nils Nilsson. It was held privately until 1998, when it was acquired by Harcourt General and became an imprint of the Academic Press, a subsidiary of Harcourt. Harcourt was acquired by Reed Elsevier in 2001; Morgan Kaufmann is now an imprint of the Science and Technology division of Elsevier.
Notable authors
Adrian Farrel
Michael L. Scott
References
External links
Elsevier imprints
Computer book publishing companies
Publishing companies established in 1984 |
https://en.wikipedia.org/wiki/Speculative%20multithreading | Thread Level Speculation (TLS), also known as Speculative Multithreading, or Speculative Parallelization, is a technique to speculatively execute a section of computer code that is anticipated to be executed later in parallel with the normal execution on a separate independent thread. Such a speculative thread may need to make assumptions about the values of input variables. If these prove to be invalid, then the portions of the speculative thread that rely on these input variables will need to be discarded and squashed. If the assumptions are correct the program can complete in a shorter time provided the thread was able to be scheduled efficiently.
Description
TLS extracts threads from serial code and executes them speculatively in parallel with a safe thread. The speculative thread will need to be discarded or re-run if its presumptions on the input state prove to be invalid. It is a dynamic (runtime) parallelization technique that can uncover parallelism that static (compile-time) parallelization techniques may fail to exploit because at compile time thread independence cannot be guaranteed. For the technique to achieve the goal of reducing overall execute time, there must be available CPU resource that can be efficiently executed in parallel with the main safe thread.
TLS assumes optimistically that a given portion of code (generally loops) can be safely executed in parallel. To do so, it divides the iteration space into chunks that are executed in parallel by different threads. A hardware or software monitor ensures that sequential semantics are kept (in other words, that the execution progresses as if the loop were executing sequentially). If a dependence violation appears, the speculative framework may choose to stop the entire parallel execution and restart it; to stop and restart the offending threads and all their successors, in order to be fed with correct data; or to stop exclusively the offending thread and its successors that have consumed incorrect data from it.
References
Further reading
Concurrency control
Parallel computing
Programming language implementation
Instruction processing
Speculative execution |
https://en.wikipedia.org/wiki/Screened%20subnet | In network security a screened subnet refers to the use of one or more logical screening routers as a firewall to define three separate subnets: an external router (sometimes called an access router), that separates the external network from a perimeter network, and an internal router (sometimes called a choke router) that separates the perimeter network from the internal network. The perimeter network, also called a border network or demilitarized zone (DMZ), is intended for hosting servers (sometimes called bastion hosts) that are accessible from or have access to both the internal and external networks. The purpose of a screened subnet or DMZ is to establish a network with heightened security that is situated between an external and presumed hostile network, such as the Internet or an extranet, and an internal network.
A screened subnet is an essential concept for e-commerce or any entity that has a presence in the World Wide Web or is using electronic payment systems or other network services because of the prevalence of hackers, advanced persistent threats, computer worms, botnets, and other threats to networked information systems.
Physical separation of routers
By separating the firewall system into two separate component routers it achieves greater potential throughput by reducing the computational load of each router. As each component router of the screened subnet firewall needs to implement only one general task, each router has a less complex configuration. A screened subnet or DMZ can also be achieved by a single firewall device with three network interfaces.
Relationship to DMZ
The term demilitarized zone in military context refers to an area in which treaties or agreements between contending groups forbid military installations and activities, often along an established frontier or boundary between two or more military powers or alliances. The similarity to network security is that the screened network (DMZ) has reduced fortifications because it has intended points of ingress from the external network which is presumed to be hostile.
It appears that the term demilitarized zone (DMZ) was popularized as a sales and marketing term sometime after the development of screened routers and firewalls. It is often used as a synonym but may have once had a different meaning.
"There are a number of terms that are used, such as bastion hosts, screened subnets, DMZ, or perimeter networks that can be confusing, especially when used together." ... "Another term that may often causes confusion is the DMZ (demilitarized zone), as opposed to a screened subnet. A true DMZ is a network that contains hosts accessible from the internet with only the exterior, or boarder, router between them. These hosts are not protected by a screening router." ... "A screened subnet may also be a collection of hosts on a subnet, but these are located behind a screening router. The term DMZ may be used by a vendor to mean either, so it is best to verify which they |
https://en.wikipedia.org/wiki/Lou%20Schizas | Lou Schizas is best known for his work as an equities analyst for the Canadian specialty channel BNN: Business News Network (formerly Report on Business Television) since its launch in September 1999 until August 24, 2007. Schizas claims on his website Happy Capitalism that he analyzed over 16,000 stocks during his time with BNN. He was also a daily contributor to national network CTV’s morning flagship program, Canada AM.
Schizas was an on-air radio personality on Corus Entertainment radio stations AM640 (CFMJ) in Toronto and AM980 (CINW) in London until September 2018 when Corus tried to terminate its relationship with him with an offer of 1 month after 18 years of outstanding business and market analysis. Schizas retained a labour lawyer and successfully settled on 15 months of working notice. This involved working for the Corus station in Hamilton and London. His last day with Corus was December 10 2019.
Schizas taught finance at the Sheridan College Institute of Technology and Advanced Learning. He was a contributor to globeinvestor.com
Before joining BNN, Schizas was a financial adviser based in Calgary where he sold tax-sheltered investments. He has also written a financial column for the Calgary Sun, hosted a radio program called The Money Manager on AM 1060 CKMX and performed media relations work for community groups.
Schizas holds a Bachelor of Arts in Economics from the University of Western Ontario and did graduate work at the State University of New York at Stony Brook. He also holds Canadian Investment Manager (CIM) designation, and is a Fellow of the Canadian Securities Institute.
Although Schizas is a Canadian citizen, he grew up in New York City. He is the son of a Greek-American father and a French-Canadian mother.
On Thursday August 31, 2017 Mr. Schizas became the first business analyst to provide regular bitcoin quotes on radio during his hourly reports on Talk Radio AM640
External links
Happy Capitalism website
References
American emigrants to Canada
Canadian television journalists
Canadian people of Greek descent
Journalists from New York City
Living people
University of Western Ontario alumni
Stony Brook University alumni
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Canonsburg%20Hospital | Canonsburg Hospital, part of the Allegheny Health Network of Pittsburgh, United States, is a community hospital located just outside Canonsburg, Pennsylvania in North Strabane Township.
History
20th century
It was founded in 1904, when, according to the Pittsburgh Post-Gazette, “the Women's Shakespeare Club of Canonsburg solicited donations of ‘linens, supplies, a hen and brood of chickens and a generous supply of fruit’ for what turned out to be an ambitious if not unusual project for a literary club. ... [But], as history records, this Women's Shakespeare Club's project ended well and proved to be much ado about something pretty special: medical care. For what the Women's Shakespeare Club of Canonsburg started [was] Canonsburg General Hospital.”
The club raised $2,000 to help buy a house on Barr Street in Canonsburg, which served as the hospital for 10 years. They also formed the Canonsburg General Hospital Association to oversee the hospital’s operations. The hospital opened at its original Barr Street location on Oct. 17, 1904, and the first patient was a woman who was “traveling with her husband in a horse and carriage from the village of Midland in Chartiers to Canonsburg when the berserk horse sent them flying.”
The following year, the hospital opened a nursing school, which remained in operation until 1960. In 1913, the hospital board agreed to construct a new hospital building, also on Barr Street, which grew to 54 beds by 1930. The “new” Barr Street hospital eventually named its dining room after Perry Como, the famous singer who born in Canonsburg in 1912.
By the late 1970s, Canonsburg Hospital had outgrown its red-brick Barr Street home, and in 1979 the hospital applied to the Pennsylvania Department of Health to build a new hospital. At the time in Pennsylvania, new hospital construction had to be approved by the state through a “certificate of need.” The application for a certificate of need was initially rejected by the state on the grounds that existing hospitals in the area had enough capacity to handle projected patient volume, but Canonsburg-area residents lobbied then-Pennsylvania Gov. Dick Thornburgh with “more than 5,000 letters [and] 2,000 mail-grams demanding the department approve the project.”
In 1981, the Health Department issued a certificate of need, and a new hospital was built in North Strabane Township, just outside of Canonsburg borough. The new $15.8 million hospital opened May 14, 1983, on 31 acres; the former Barr Street hospital is now a personal care and retirement home.
21st century
In 2000, Canonsburg Hospital joined the former West Penn Allegheny Health System. In 2013, it became a part of Allegheny Health Network. The current 104-bed inpatient facility has undergone several expansions since its 1983 opening: In 1996, a new ambulatory care center was opened; in 2003, the physical therapy department was enlarged; in 2006, the emergency department was expanded to accommodate increased patient volume; |
https://en.wikipedia.org/wiki/Unity%20%28Star%20Trek%3A%20Voyager%29 | "Unity" is the 17th episode of the third season of the American science fiction television series Star Trek: Voyager, the 59th episode overall. The episode first aired on the UPN network on February 12, 1997, as part of sweeps week. It was written by producer Kenneth Biller, and is the second episode to be directed by cast member Robert Duncan McNeill. It marked the first major appearance of the Borg in Voyager, which were kicked off with a teaser ending in the prior episode.
Set in the 24th century, the series follows the adventures of the Starfleet and Maquis crew of the starship USS Voyager after they were stranded in the Delta Quadrant far from the rest of the Federation. In this episode, while on an away mission, Chakotay is taken in by a group of former Borg who seek help from the crew of Voyager to reactivate their neural link. The ex-Borg force Chakotay to reactivate a Borg cube (a large Borg spaceship), but, in their new-found "Co-operative", the ex-Borg make the cube self-destruct, saving Voyager.
Biller was influenced by the story of the Tower of Babel in writing the episode, and also considered the dissolution of the Soviet Union to be an influence. The crew re-used the make-up and costumes of the Borg designed for the film Star Trek: First Contact, but sets were not re-used. A new fully computer generated Borg cube was created for "Unity", and the storyline of the episode was intended as a hint to those in the later two-part episode "Scorpion". According to Nielsen ratings, it received a 5.4/8 percent share of the audience on first broadcast. "Unity" was received positively by critics, with praise directed at McNeill's direction as well as Biller's plot.
Plot
Commander Chakotay (Robert Beltran) and Ensign Kaplan (Susan Patterson) hear a distress call while scouting ahead for Voyager in a shuttlecraft. They land the vessel but come under fire from hostile aliens, killing Kaplan and injuring Chakotay. He wakes in a room with a woman called Riley Frazier (Lori Hallier). She informs him that she is part of a group of survivors on the planet from a variety of races. There are other groups nearby, including those that attacked him. She calls her group a "Co-operative".
Meanwhile, the USS Voyager discovers a derelict Borg cube and Captain Kathryn Janeway (Kate Mulgrew) decides that an investigation is required in order to learn more about the Borg's technology. An away team boards the cube, discovering that either an accident or another species disabled the vessel. They take a Borg drone back onto Voyager, where the Doctor (Robert Picardo) accidentally revives it.
After being told by Frazier to remain where he is, Chakotay breaks out of his room where he sees that all the people around him on the alien planet possess Borg implant technology in their bodies. Frazier explains that an electro-kinetic storm broke their link with the Borg hive mind. Instead, the separated drones settled on a nearby planet. Because the connection between t |
https://en.wikipedia.org/wiki/Jeremy%20Smith%20%28Australian%20musician%29 | Jeremy Stuart Smith is an Australian rock musician; he was a founding member of Hunters & Collectors on French horn, guitars, keyboards, programming, and backing vocals (1981–1998). Smith worked on Ghostwriters's 1996 album, Second Skin.
Biography
Jeremy Smith is a Melbourne-based musician; he was a member of Hunters & Collectors on French horn, guitars, keyboards, programming, and backing vocals (1981–1998) and worked on Ghostwriters's 1996 album, Second Skin.
He provided percussion elements for some Midnight Oil tracks and recorded horns on their album, Redneck Wonderland. Smith also played on their album Scream In Blue. He also composed the theme music for Wolf Blass, an Australian winery.
References
General
Note: Archived [on-line] copy has limited functionality.
Note: [on-line] version established at White Room Electronic Publishing Pty Ltd in 2007 and was expanded from the 2002 edition.
Specific
Australian rock guitarists
Year of birth missing (living people)
Living people
Musicians from Melbourne
Hunters & Collectors members |
https://en.wikipedia.org/wiki/WWIII%20Music/AMC | WWIII Music was a record label created by American Music Corp in 2001 for death metal albums. AMC titles were distributed by the Innovative Distribution Network collection of labels controlled by Alliance Entertainment.
WWIII launched in 2001 with an ambitious plan of 30 albums in a year. It distributed albums by bands such as Prototype. They have also released sampler albums such as: World War III Sampler 2001 which includes songs by bands like Hate, Imagika, Prototype and others.
References
Heavy metal record labels |
https://en.wikipedia.org/wiki/MSC%20Cyberport | MSC Cyberport Johor is a public-private partnership spearheaded by the State Government of Johor, Malaysia to create a Global Information and Communication Technology (ICT) Business Hub for ICT companies from around the world within the Iskandar Malaysia. It is part with the MSC Malaysia initiative of the Government of Malaysia.
See also
List of technology centers
Multimedia Super Corridor
Notes and references
External links
MSC Malaysia
Iskandar Malaysia
http://www.mdv.com.my/cms/content.jsp?id=com.tms.cms.article.Article_913d9d9e-a9fef549-4d93e300-fa8a1655
https://web.archive.org/web/20110718004746/http://www.mscmalaysia.my/main_art.php?parentID=12073056649982&artID=12082571684963&CategoryID=3&p_artID=513
Johor Bahru
High-technology business districts in Malaysia
Information technology places
MSC Malaysia
Science and technology in Malaysia
2006 establishments in Malaysia |
https://en.wikipedia.org/wiki/Fun%20Factory%20%28TV%20series%29 | Fun Factory was a children's programme on the satellite television channel Sky Channel (later to become Sky One) that ran from 1985 to 1994. It continued as a programming block without a host up until 1994.
Original Programme
It was originally hosted by Mr P, who was later replaced by Andy Sheldon, Snoot the seal and Crocker the crocodile. The programme included cartoons such as:
Ghostbusters
Transformers
He-Man and the Masters of the Universe
Jem
Inspector Gadget
M.A.S.K.
Jayce and the Wheeled Warriors
Lady Lovely Locks
The Care Bears
BlackStar
The Family-Ness
Denver, the Last Dinosaur
Barrier Reef
Ivanhoe
Emily
The Toothbrush Family
SuperTed
Police Academy
C.O.P.S.
Roger Ramjet
Starcom: The U.S. Space Force
The Challenge of the GoBots
Choppy and the Princess
The Get Along Gang
Second Incarnation
After Sky Channel's renaming to Sky One in 1989, the Fun Factory name was used for a weekend block programming strand showing nothing but animated series, notably without any live-action presenters in-between the programmes - just animated interstitials. This version of the Fun Factory lasted from 1991 to September 1994, when it was replaced with The DJ Kat Show weekend spin-off, KTV. A partial list of series shown on the Sky One-era Fun Factory include:
Barbie
Barbie and the Rockers (UK Title: Barbie and The Rock Stars)
Beverly Hills Teens
BraveStarr
Charlie Brown
Dick Tracy
Fat Albert and the Cosby Kids
Inspector Gadget
Jayce and the Wheeled Warriors
The Little Mermaid
The Marvel Superheroes
M.A.S.K.
Mrs. Pepperpot
My Little Pony
My Little Pony Tales
The New Adventures of Superman
Peter Pan
The Plastic Man Comedy/Adventure Show
Pole Position
Police Academy
Silverhawks
Super Jem (Super Jem – Series 2: Super Jem Duo (Jem – Series 5: Super Jem Duo))
Star Trek: The Animated Series
Teenage Mutant Hero Turtles
Transformers
Visionaries: Knights of the Magical Light
References
External links
1985 British television series debuts
1994 British television series endings
1980s British children's television series
1990s British children's television series
Sky UK original programming
British television shows featuring puppetry
English-language television shows |
https://en.wikipedia.org/wiki/The%20Edge%20%28TV%20series%29 | The Edge was a American sketch comedy television series created by David Mirkin that aired on the Fox Network for a single season from September 19, 1992 to May 2, 1993.
Synopsis
The series features an ensemble cast headed by comedian Julie Brown. The other cast members were Jennifer Aniston, Tom Kenny, Wayne Knight, Carol Rosenthal, James Stephens III, and Jill Talley. Other regulars of the series included Rick Overton, Paul Feig, and Alan Ruck.
The show features sketches that would revolve around original characters such as gun-toting All-American family and a cowboy known as Cracklin' Crotch. The series would also skewer pop culture. One notable episode spoofed TV sweeps by promising ratings-grabbing events such as a birth, a wedding and a death.
The series also features a running gag in which the entire cast would get killed off in various ways in each episode before the first sketch. One episode featured the cast getting hit by a bus; another had the set falling apart and crushing them; others involved explosions, decapitations, immolation, hangings, and impalement by arrows; one episode had the troupe being sucked into a vortex. In addition to sketches, Bill Plympton cartoons were used as bumpers between the sketches.
Guest appearances were made on the Illustrated Sports parody by Kim Walker and Shari Shattuck.
Cast
Main
Julie Brown
Jennifer Aniston
Tom Kenny
Wayne Knight
Carol Rosenthal
James Stephens III
Jill Talley
Supporting
Edd Hall
Rick Overton
Alan Ruck
Paul Feig
Production
The show was created by David Mirkin and Julie Brown; the two were in a relationship at the time. It was developed for NBC following the failure of the pilot The Julie Show. NBC passed on the show, but it was picked up by Fox. The Edge was canceled at the end of the 1992–93 U.S. television season by Fox.
Music was provided by Steve Hampton (theme song composer), Stephen Graziano, B.C. Smith, and Christopher Tyng among others. Edd Hall provided the show's voiceovers.
Controversy
Producer Aaron Spelling threatened to sue the show over its lampoons of his TV show Beverly Hills 90210. He objected to its "completely tasteless" humor, which included an impersonation of his daughter, an actress on the show, Tori Spelling exclaiming "I can do that because it's Daddy's show." The show's production company TriStar Television refused to apologise, while Mirkin responded: "The thing about these parodies is they don't hurt a show. It's only cross-promotion. The viewers who like the show always come back the next week. What's upsetting to me is it shows absolutely that Mr. Spelling has no sense of humor."
According to the Pittsburgh Post-Gazette, executive producer Mirkin was "forced off the show" due to this negative reaction of Spelling and others. However, in 2012, Mirkin stated that he in fact left the series after refusing to accept a substantially reduced budget. The show's producers, Sony, failed to persuade him to stay, but he returned to the serie |
https://en.wikipedia.org/wiki/Hiroshima%20Home%20Television | , a.k.a. is a television station in Hiroshima. It is a network station of ANN. It is broadcast in Hiroshima Prefecture.
History
On September 18, 1964, the station makes a license request as Setonaikai Broadcasting (unrelated to the current TV station of the same name).
December 1, 1970: The station commenced operating as an affiliate of Nippon Educational Television (NET TV, current TV Asahi). The original abbreviation was UHT (UHF Hiroshima-Home Television).
April 1, 1974: The station joins ANN.
October 1, 1975: TV Shin-Hiroshima System (TSS) starts broadcasting. Fuji TV network programming migrates to the new station.
November 14, 1985: Bilingual sound multiplex broadcasts start. Some programs shown are available in English.
April 1, 1986: New corporate identity. Along with it, the main abbreviation changed to HOME.
2000: The station's mascot, Pol Pol, was created upon the station's 30th anniversary celebrations, tie-in merchandise was also released.
2006: Digital terrestrial broadcasts commence.
July 24, 2011: Analog terrestrial broadcasts conclude.
January 2013: Full ratings for the previous year confirm that Hiroshima Home Television became a ratings leader in the prefecture.
References
External links
Official website of Hiroshima Home TV
All-Nippon News Network
Mass media in Hiroshima
Companies based in Hiroshima Prefecture
Television stations in Japan
Television channels and stations established in 1970 |
https://en.wikipedia.org/wiki/Sami%20Lukis | Sami Lukis (born 8 April 1970) is an Australian television and radio personality.
Lukis has appeared on the Nine Network as weather presenter on Today, and for Network Ten on the children's educational program Totally Wild. She also worked in radio as a breakfast news reader and presenter for Nova 96.9 on the Merrick and Rosso show, as well as a guest presenter of the Seven Network program The Morning Show with Larry Emdur
Early life
Before starting her media career, Lukis graduated from Queensland University of Technology with a Bachelor of Business Communication, majoring in Film and Television with a minor in Journalism. Lukis was awarded the Federation of Radio Broadcasters Prize for the most outstanding student in broadcast journalism.
Career
In August 2009, Lukis was appointed newsreader for the Grill Team breakfast radio program airing on Triple M Sydney, though from December 2010 Lukis parted ways from Triple M and was replaced by Rachel Corbett as being the breakfast newsreader from January 2011.
In November 2011, Lukis appeared on Ant and Becks' show on Mix FM, filling in for Becks. In April 2012, Anthony Toohey (aka Becks) left Mix FM and Lukis was announced as his replacement working alongside Ant Simpson.
In 2013, Lukis was appointed co-host of Mix 106.5's breakfast show with Yumi Stynes.
In October 2014, Lukis started working for Fox Sports (Australia) as a news reader.
In 2022, Lukis began a Podcast called And Just Like That...They're Back about the Sex and the City Sequel TV Show "And Just Like That". It is a weekly podcast with a different guest each week, usually a Super fan of the Show. Lukis also hosts Sex and the City tours around New York City.
In July 2023, Lukis joined the Sunshine Coast’s 91.1 Hot FM for a two-month stint while Ash Gierke is on maternity leave until September 1.
Personal life
In 2018, Lukis came out as sapiosexual.
References
External links
Sami Lukis - Grill Team - Triple M Sydney
Greater Union Cinebuzz Show
Living people
1970 births
Mass media people from Brisbane
Australian radio presenters
Australian television presenters
Australian women radio presenters
Australian women television presenters
Queensland University of Technology alumni
Sapiosexual people |
https://en.wikipedia.org/wiki/Hiroshima%20Telecasting | Hiroshima Telecasting Co., Ltd. (HTV, 広島テレビ放送株式会社, callsign: JONX-TV) is a TV station in Hiroshima. It is affiliated with Nippon News Network and Nippon Television Network System. It is broadcast in Hiroshima Prefecture.
History
HTV began broadcasting on September 1, 1962 as a primary affiliate of both NNN and FNN and a secondary affiliate of Nihon Educational Television. It remained affiliated with NET until 1970, when Hiroshima Home Television signed on and took over the NET (later ANN) affiliation. On October 1, 1975, TV Shinhiroshima began operations as an FNN affiliate, leaving HTV as an affiliate of NNN. The station began broadcasting in digital in November 2005, and would cease operations on its analog signal on July 24, 2011.
External links
Official website of Hiroshima TV
1962 establishments in Japan
Mass media in Hiroshima
Companies based in Hiroshima Prefecture
Television stations in Japan
Nippon News Network
Television channels and stations established in 1962 |
https://en.wikipedia.org/wiki/ABC%20Canberra%20%28TV%20station%29 | ABC Television in the ACT comprises national and local programming on the ABC television network in the Australian Capital Territory, which includes the capital city of Australia, Canberra, and broadcasts on a number of channels under the ABC call sign. There is some local programming from the Canberra studio, most notably the nightly 7PM News, presented by James Glenday and Adrienne Francis.
ABC was the historic name of the Australian Broadcasting Corporation's television station in Canberra which launched in 1962, with the "C" in the call sign standing for Canberra. It was also referred to as ABC 3 (not to be confused with the ABC Me children's channel launched in 2009).
History
The station began broadcasting as ABC-3 on 18 December 1962, soon before prime minister Robert Menzies officially opened the new station at a special reception at Hotel Canberra. The "C" in the call sign stands for Canberra.
Unusually, the station commenced transmission before a local television studio was able to be constructed, with initial transmission of ABC-3 being a direct relay of ABN-2 in Sydney. The station opened at 3pm on 18 December 1962 with a test card and music, followed by Kindergarten Playtime at 4:45pm. ABC-3's main transmitter was constructed at Black Mountain.
ABC-3 began broadcasting local programs on 3 June 1963 from a temporary studio in the existing 2CN/2CY building in Civic. Mervyn Edie was the first person to read the local news on ABC-3.
New ABC studios were constructed in Northbourne Avenue in Dickson. Local ABC radio services commenced broadcasting from the new facility on 3 August 1964. ABC-3 commenced television programs from the new studios on 8 October 1964 when the local news became the first program to be broadcast. The new studios were officially opened by Postmaster General Alan Hulme on 22 October 1964. ABC chairman James Ralph Darling and senator John Gorton also spoke at the event.
Local television programs to be broadcast from the ABC-3 studios in the station's early years included Southern Gardener, Canberra Week, Studio 11, Canberra Camera along with local news, sport and weather.
For 22 years, ABC-3's local news was a brief five minute bulletin which went to air each night at 6:55pm. This ended on 15 February 1985 as the station prepared to produce a new 10-minute bulletin which was expected to go to air at approximately 7:20pm each night towards the end of the ABC's new national news program The National hosted by Richard Morecroft and Geraldine Doogue. When The National ended and state based news bulletins were reinstated on 9 December 1985, local news continued to be provided in a brief segment during the New South Wales edition of ABC News until a dedicated 30 minute local news bulletin commenced in Canberra in February 1989, read by Janet Wilson.
When Wilson left in late 1989, she was replaced with Claudia Emery. Emery continued to present the bulletin until August 1991 when local news production was entirel |
https://en.wikipedia.org/wiki/Xplane | X-plane may refer to:
X-planes, a series of US experimental aircraft
X-Plane (simulator), a flight simulator for personal computers |
https://en.wikipedia.org/wiki/European%20Spatial%20Development%20Planning | The European Spatial Development Planning or ESDP-Network seeks to promote education, research and professional training in spatial planning across European countries, in collaboration with many partners in other regions of the world. To this purpose it considers planning as a process and a change agenda.
Presently coordinated by Frank Moulaert at Global Urban Research Unit, Newcastle University, the network coordinates a number of student and staff mobility programmes involving various partner institutions in a number of European countries. The existing structure is a merger of the Spatial Development Planning network established by Louis Albrechts at the University of Leuven, Belgium in 1987 and that built around the European Town planning by Richard Williams at Newcastle University in the 1990s. The overlaps between both networks shows a natural basis for their integration.
Aims and objectives
The basic aims of the network revolve around the need to promote the Planning practices across Europe, interdisciplinary interactions, and identification of successful planning experiences.
Three kinds of staff and students exchanges are supported under the banner of the network:
General ERASMUS programme mobility;
Short Intensive Programmes; and,
a comprehensive Postgraduate Certificate in European Spatial Development and Planning.
Apart from this the network scholars are also engaged in wider interdisciplinary research through various programmes funded by European Commission and respective national institutions.
The network also holds regular scholarly events that generally address the evolution of planning aspects since the inception of the network.
Participating institutions
:
Katholieke Universiteit Leuven, Leuven
:
University of Lille, Lille
François Rabelais University, Tours
:
University of Bremen, Bremen
:
Harokopio University, Athens
:
Università degli Studi di Milano-Bicocca, Milan
Università Mediterranea di Reggio Calabria, Reggio Calabria
Politecnico di Torino, Turin
Università di Roma La Sapienza, Rome
Università degli Studi di Napoli Fredrico-II, Naples
:
University of Aveiro, Aveiro
:
Slovenská technická univerzita v Bratislave, Bratislava
:
University of the Basque Country, Bilbao
:
KTH Royal Institute of Technology, Stockholm
Blekinge Tekniska Högskola, Blekinge
:
Middle East Technical University, Ankara
:
University of Newcastle upon Tyne, Newcastle upon Tyne, England
Cardiff University, Wales
See also
Global Urban Research Unit
ESPRID
European research networks |
https://en.wikipedia.org/wiki/Cadcorp | Cadcorp Limited is a British owned and run company established in 1991. Cadcorp has its headquarters in Stevenage, Hertfordshire, U.K. Cadcorp has a network of distributors and value added resellers (VARs) around the world.
Cadcorp is an ISO 9001:2000 and ISO/IEC 27001:2005 certified company, a Microsoft SQL Server Spatial Partner, an Ordnance Survey Licensed Developer Partner, and a corporate member of the Association for Geographic Information in the UK.
History
Cadcorp's first product was a Microsoft Windows-based CAD system called Wincad. All rights to the product were sold in 1994. Wincad development and maintenance, carried out latterly by Informatix Inc, Japan, through their UK subsidiary under the brand name MicroGDS, was stopped in March 2013. After selling Wincad, Cadcorp moved on to developing geographic information system (GIS) software. The first version of Cadcorp SIS – Spatial Information System ("Cadcorp SIS") was released in 1995.
The leadership team successfully completed a management buyout of the company in May 2015.
Market
Cadcorp SIS has applications in the following UK markets
Government (local, municipal and central)
Emergency Services
Land and Property
Insurance
Oil and Gas
Utilities
Maritime
Environment
National Mapping Agencies
Products
In July 2020, Cadcorp SIS continued its support for data items of the Ordnance Survey (OS). Cadcorp SIS links directly to the Ordnance Survey Data Hub. It has dedicated guides for linking to the OS Features API, the OS Maps API and the OS Vector Tile API. Both the OS Maps API and the OS Vector Tile API are used in the British National Grid and the coordinate database structures for "Web Mercator".
Open geospatial consortium
Cadcorp has been a member of the Open Geospatial Consortium (OGC) since 1997. In 2004, Cadcorp's technical director, Martin Daly was awarded the OGC Kenneth G. Gardels Award, made annually to an individual who has made outstanding contributions to advancing the OGC vision of geographic information fully integrated into the world's information systems.
Several versions of the Cadcorp SIS product suite are certified OGC compliant in the categories of:
Simple Features for OLE/COM
Grid Coverage Service
Coordinate Transformation Service
Web Map Service
Web Feature Service
Cadcorp SIS also implements support for:
Web Map Context Documents
Geography Markup Language
Simple Features
Web Coverage Service
Product overview
Cadcorp SIS is available in different forms:
desktop
server
web mapping
cloud hosting
developer tools
specialised applications
GIS data management tool
In February 2020, Cadcorp SIS ETL (Extract, Transform, Load) is the newest contribution to a broad variety of vertical technologies unique to Cadcorp.
In May 2020, Cadcorp also expanded its cloud services to include SIS Desktop, with the increasing growth of cloud computing technologies.
References
External links
Cadcorp website
GIS companies
Software companies o |
https://en.wikipedia.org/wiki/Perceptual%20Evaluation%20of%20Audio%20Quality | Perceptual Evaluation of Audio Quality (PEAQ) is a standardized algorithm for objectively measuring perceived audio quality, developed in 1994-1998 by a joint venture of experts within Task Group 6Q of the International Telecommunication Union's Radiocommunication Sector (ITU-R). It was originally released as ITU-R Recommendation BS.1387 in 1998 and last updated in 2023. It utilizes software to simulate perceptual properties of the human ear and then integrates multiple model output variables into a single metric.
PEAQ characterizes the perceived audio quality as subjects would do in a listening test according to ITU-R BS.1116. PEAQ results principally model mean opinion scores that cover a scale from 1 (bad) to 5 (excellent). The Subjective Difference Grade (SDG), which measures the degree of compression damage (impairment) is defined as the difference between the opinion scores of tested version and the reference (source). The SDG typically ranges from 0 (no perceived impairment) to -4 (terrible impairment). The Objective Difference Grade (ODG) is the actual output of the algorithm, designed to match SDG.
Motivation
The need to conserve bandwidth has led to developments in the compression of the audio data to be transmitted. Various encoding methods remove both redundancy and perceptual irrelevancy in the audio signal so that the bit rate required to encode the signal is significantly reduced. They take into account knowledge of human auditory perception and typically achieve a reduced bit rate by ignoring audio information that is not likely to be heard by most listeners. Traditional audio measurements like frequency response based on sinusoidal sweeps, S/N, THD+N do not necessarily correlate well with the audio codec quality. A psychoacoustic model must be used to predict how the information is masked by louder audio content adjacent in time and frequency.
Since subjective listening tests are time-consuming, expensive and impractical for everyday use, it was beneficial to substitute listening tests with objective, computer-based methods. Steered by the ITU-R Task Group 6Q, a group of leading sound quality experts developed a new objective model for sound quality: PEAQ. These contributors were:
OPTICOM GmbH, Erlangen, Germany
the Fraunhofer Institute for Integrated Circuits, IIS-A, Erlangen, Germany
Deutsche Telekom Berkom, Berlin, Germany
the University of Berlin, Berlin, Germany
the Institut für Rundfunktechnik, IRT, Munich, Germany
KPN Research, Dr. Neher Laboratorium, Leidschendam, The Netherlands
Centre commun d'études de télévision et télécommunications, France
Communications Research Centre, CRC, Ottawa, Canada
Principles
In perceptual coding it is fundamental to determine the level of noise that can be introduced into a signal before it becomes audible. Because the human auditory system is highly non-linear, noise levels vary with time and frequency characteristics of the audio signal. Psychoacoustic studies can deliver t |
https://en.wikipedia.org/wiki/BlueLink | BlueLink may refer to:
BlueLink (software), suite of campaign management mobile apps designed to register, organize, and mobilize liberal voters
BlueLink Information Network, a virtual network of Bulgarian non-governmental organizations and activists |
https://en.wikipedia.org/wiki/Mondair | Mondair was a charter airline based in Agadir, Morocco. It was wholly owned by Moroccan private investors. The company was founded in 2002 and disestablished in 2004.
Code data
ICAO Code: MMA
Callsign: Mondair
Services
Mondair operated passenger charters from Agadir to Paris, as well as serving leisure destinations in Morocco, including Marrakech and Oujda.
Fleet
2 Boeing 737-300
References
Defunct airlines of Morocco
Airlines established in 2002
Airlines disestablished in 2004
2002 establishments in Morocco
2004 disestablishments in Morocco
Agadir |
https://en.wikipedia.org/wiki/The%20Clinic%20%28TV%20series%29 | The Clinic is an Irish primetime television medical drama series produced by Parallel Film Productions for RTÉ. It debuted on RTÉ One in 2003 to positive reviews and proved to be one of the network's most popular shows. The drama ran for seven seasons between September 2003 and November 2009. The last episode aired on RTÉ One on Sunday 15 November 2009 and on YLE1 in Finland on Wednesday 25 November 2009.
Premise
The drama centred on the staff of the Clarence Street Clinic in the affluent Dublin 4 area of Dublin, Ireland.
Clarence Street Clinic is a multi-disciplinary health centre which allows for an equally diverse cast. The last season, season 7 began airing on Irish television from on 27 September 2009.
Story
The first two seasons consist of eight episodes; all subsequent seasons run for ten episodes.
Seasons 1 and 2
In a Clinic where the healers often need healing more than the patients themselves. resident owners Cathy and Ed Costello try to patch up their troubled marriage while working side by side. Dan Woodhouse, the slick plastic surgeon with a shadowy past, struggles with his addictions to women and drugs. Physiotherapist Keelin Geraghty is tormented by her one-night stand with a married man. Long serving receptionist Fiona develops an obsession with her boss that seems to be leading her to ruination. Resident counsellor, Patrick, is struggling to stay off the booze as his interests in Cathy extend beyond the professional.
As tensions run high, can Cathy and Ed's marriage survive the pressures of running the Clinic? And will the professional and personal frailties of their staff endanger their happiness and their success?
Season 3
Tensions between Cathy and Ed culminated at the end of series 2 when Cathy discovered Ed's infidelity with Physiotherapist Keelin. When Ed found out that Cathy was thinking of doing business with Plastic Surgeon, Dan Woodhouse behind his back, he decided their marriage was over and left.
Dan is delighted that Ed is now gone and the way is clear for him to move in on the Clinic. Cathy is heart broken but picks herself back up starting a burgeoning relationship with Dan. It takes a personal tragedy and a discovery that Dan is back to his old ways to make Cathy wake up and fight for control of the Clinic. Brendan decides to pursue his dreams of travelling leaving Clodagh who is shocked to discover her life is a lie. Richard the new GP finds it difficult to cope with his tragic personal life as Daisy's partying finally catches up with her. To top it all off the Clinic is put in peril when they discover that Alex isn't really who he said he was.
Cathy and Dan are at a standoff at the end of the series with Cathy hoping to push Dan out of the Clinic. Will Dan resort to anything to keep hold of his addiction, the Clinic, even if it means blackmailing Cathy?
Season 4
Cathy and Dan are still at loggerheads at the start of series 4 waiting for Cathy's father, Paul O’Callaghan's will to be read. Cathy is convinc |
https://en.wikipedia.org/wiki/False%20Mirrors | False Mirrors () is the second novel in the Labyrinth trilogy of cyberpunk novels written by Russian science fiction writer Sergey Lukyanenko. The novel takes place two years after Labyrinth of Reflections.
Plot summary
Former diver Leonid is a virtual mover. His relationship with his wife Vicka is strained. Due to deep psychosis, he has trouble distinguishing reality from the deep. Unlike Leonid, Vicka (a former diver) managed to let go of Deeptown and rarely ventures there. Additionally, an upgraded deep-program includes a built-in mandatory 24-hour timer. Leonid finds out that a hacker broke into a small development company and was attacked by its security forces. One of the virus weapons used on him killed the hacker in real life. Leonid contacts his old hacker friend Maniac, who now lives and works in the US, and asks him if he knows the dead hacker. Maniac gives him a real-life Moscow address of a former acquaintance. Leonid goes there and finds himself in a luxurious apartment of a rich businessman named Chingiz. Another inhabitant of the giant two-story apartment is a hacker named Bastard and amateur hacker teenager Pat — Chingiz's protégé. Bastard explains that he was hired to hack the development company by a man calling himself the Dark Diver, who managed to retain his diver abilities. Bastard asked a 17-year-old hacker to help him break into the company and steal certain files. Apparently, the weapon use a modified deep-program to cause cardiac arrest, which can only be reversed by immediate CPR. When Bastard reveals that the hacker's name was Roma, Leonid realizes that the dead hacker was a former diver. Leonid asks Chingiz for a virus pack, as he goes to search for the files Roma stole.
In Deeptown, he encounters a colleague of his from the delivery company, who informs him that he has a letter from Roma to be delivered to the mythical Temple of Diver-in-the-Deep. The letter can only be opened at destination, but Leonid doubts the place exists. He contacts several former divers and asks them for the location. The only one who responds is Dick (AKA Crazy Tosser), security chief of the popular Deeptown game "Labyrinth of Death". He informs Leonid that out of all divers, only three (Dick included) agreed to create the Temple as a monument to the lost diver community. Each hid their entrance at a familiar place. By now, only Dick's entrance exists, but it can only be accessed from the last level of the new "Labyrinth". At the same time, Dick offers Leonid a job at the company. Two years ago, Gunslinger (one of Leonid's avatars) shocked the "Labyrinth" as a master player. Dick believes that Leonid can still show the players a thing or two to promote the game as the legendary figure. Leonid responds that he will think about it, as he has other things on his mind. He tries out the new "Labyrinth" only to find out that the new game is impossible to beat without a good team. He returns to Chingiz's apartment (in Deeptown), which looks exac |
https://en.wikipedia.org/wiki/Chan%27s%20algorithm | In computational geometry, Chan's algorithm, named after Timothy M. Chan, is an optimal output-sensitive algorithm to compute the convex hull of a set of points, in 2- or 3-dimensional space.
The algorithm takes time, where is the number of vertices of the output (the convex hull). In the planar case, the algorithm combines an algorithm (Graham scan, for example) with Jarvis march (), in order to obtain an optimal time. Chan's algorithm is notable because it is much simpler than the Kirkpatrick–Seidel algorithm, and it naturally extends to 3-dimensional space. This paradigm has been independently developed by Frank Nielsen in his Ph.D. thesis.
Algorithm
Overview
A single pass of the algorithm requires a parameter which is between 0 and (number of points of our set ). Ideally, but , the number of vertices in the output convex hull, is not known at the start. Multiple passes with increasing values of are done which then terminates when (see below on choosing parameter ).
The algorithm starts by arbitrarily partitioning the set of points into subsets with at most points each; notice that .
For each subset , it computes the convex hull, , using an algorithm (for example, Graham scan), where is the number of points in the subset. As there are subsets of points each, this phase takes time.
During the second phase, Jarvis's march is executed, making use of the precomputed (mini) convex hulls, . At each step in this Jarvis's march algorithm, we have a point in the convex hull (at the beginning, may be the point in with the lowest y coordinate, which is guaranteed to be in the convex hull of ), and need to find a point such that all other points of are to the right of the line , where the notation simply means that the next point, that is , is determined as a function of and . The convex hull of the set , , is known and contains at most points (listed in a clockwise or counter-clockwise order), which allows to compute in time by binary search. Hence, the computation of for all the subsets can be done in time. Then, we can determine using the same technique as normally used in Jarvis's march, but only considering the points (i.e. the points in the mini convex hulls) instead of the whole set . For those points, one iteration of Jarvis's march is which is negligible compared to the computation for all subsets. Jarvis's march completes when the process has been repeated times (because, in the way Jarvis march works, after at most iterations of its outermost loop, where is the number of points in the convex hull of , we must have found the convex hull), hence the second phase takes time, equivalent to time if is close to (see below the description of a strategy to choose such that this is the case).
By running the two phases described above, the convex hull of points is computed in time.
Choosing the parameter
If an arbitrary value is chosen for , it may happen that . In that case, after steps in the secon |
https://en.wikipedia.org/wiki/Nefteyugansk%20United%20Airline%20Transportation%20Company | Nefteyugansk United Airline Transportation Company is an airline based in Nefteyugansk, Khanty–Mansi Autonomous Okrug, Russia. Its main base is Nefteyugansk Airport.
Code data
ICAO Code: NFT
Callsign: Nefteavia
History
The airline was established and started operations in 1975. It was formerly named Nefteyugansk United Aviation Squadron.
Fleet
The Nefteyugansk Air Enterprise fleet includes the following aircraft (at March 2007):
5 Kamov Ka-32T
12 Mil Mi-8T
8 Mil Mi-17
External links
Nefteyugansk Air Enterprise
References
Airlines of Russia
Former Aeroflot divisions
Airlines established in 1975
Companies based in Khanty-Mansi Autonomous Okrug |
https://en.wikipedia.org/wiki/ABQ | ABC Television in Brisbane comprises national programming on the ABC television network in or from Brisbane, Queensland which broadcasts on a number of channels under the ABC call sign. There is some local programming from the Brisbane studio.
ABQ was the historic name for the Australian Broadcasting Corporation's television station in Brisbane, which began broadcasting on 2 November 1959 as the third television station in Queensland and Brisbane. with the "Q" in the call sign standing for Queensland.
ABC Television in Brisbane is based at purpose-built headquarters on the South Bank. The station is received throughout the state through a number of relay transmitters.
History
ABC Television started broadcasting from Brisbane on 2 November 1959, with the "Q" in the call sign standing for Queensland.
Available by satellite transmission on the now defunct Optus Aurora free-to-view platform during the 2000s, ABC's digital channels have been available via the Viewer Access Satellite Television (VAST) network since 2010.
For many years, the station was based at studios in the inner-western suburb of Toowong, with a transmitter at Mount Coot-tha. In December 2006, the Toowong studios were closed after an unacceptably high rate of breast cancer has been observed at the facility. An independent study examined 10 cases of breast cancer reported at the studios, and found the incidence rate was 11 times higher than the general working community. led to the closure of the site in December 2006, TV and radio operations were moved to alternative locations around the city.
Staff worked from several sites around Brisbane, with ABC Radio based in nearby Lissner Street in Toowong, ABC News staff working from Network Ten's Mount Coot-tha studios, ABC Innovation and Online staff working at QUT Kelvin Grove, and other staff based in other locations, including Coronation Drive and West End. On 10 January 2012, ABC Brisbane moved into new purpose-built accommodation in South Bank.
The analogue signal for Brisbane/Gold Coast/Sunshine Coast was shut off on May 28, 2013.
ABC Television in Brisbane today
All ABC operations are located in the South Bank building. there is a large number of transmitters broadcasting a number of ABC channels throughout Queensland.
Programming
ABC Television in Brisbane schedule largely consists of national programming with opt-outs for news and current affairs, rugby league and state election coverage.
Local programming
ABC News Queensland is presented by Matt Wordsworth (Monday - Thursday) and Jessica van Vonderen (Friday – Sunday). Weather is presented by Jenny Woodward (Monday – Friday) and Craig Zonca (Sunday). Finance is presented by Alan Kohler in Melbourne.
Past presenters of the bulletin have included Rod Young and Andrew Lofthouse, both of whom went on to read the flagship 6:00 pm bulletins on Seven and Nine respectively. The pair opposed each other in this timeslot between mid-2009 and late-2012, during which the |
https://en.wikipedia.org/wiki/ABS%20%28TV%20station%29 | ABC Television in South Australia comprises national and local programming on the ABC television network in the Australian state of South Australia, headquartered in Adelaide.
ABS or ABS-2 was the historic call sign and name of the Australian Broadcasting Corporation's television station in Adelaide, with the "S" standing for South Australia.
History
ABS began broadcasting on 11 March 1960 from studios in the suburb of Collinswood. The station's transmitter is located at Mount Lofty, and is augmented by a series of relay transmitters located throughout the state.
ABS commenced digital television transmission in January 2001, broadcasting on VHF Channel 12 while maintaining analogue transmission on VHF Channel 2. The analogue signal for ABS was shut off at 9am on Tuesday, 2 April 2013, making Adelaide the first state capital to make the permanent switch, with Canberra being the first city to do so in 2012.
In November 2014, current managing director Mark Scott announced at a meeting held at ABC's Ultimo headquarters in Sydney that due to a cut of over from the ABC budget a major restructuring would occur. In an email to staff, Scott said:"[We will] close our Adelaide television production studio and wind down remaining television production in smaller states. The economics of the television sector make it difficult to maintain small-scale operations. It is more economically efficient to base production (outside news and current affairs) in Sydney and Melbourne. TV’s aim is to work with the independent sector on programming that better reflects local diversity. To demonstrate accountability, the ABC will deliver detailed annual reports on its local production, including dollars invested and programs made."
Programs produced in the Adelaide studios
The following programs were produced in the Adelaide studios of ABC Television:
Couch Potato
Talking Heads
Behind the News
Poh's Kitchen
News on 3
ABC Television in South Australia today
there is a large number of transmitters broadcasting a number of ABC channels.
Local programming
Only the local edition of ABC News continues to be broadcast from Adelaide. ABC News South Australia is presented by Jessica Harmsen from Monday to Thursday. and Richard Davies or Candice Prosser from Friday to Sunday The weeknight bulletins also incorporate a national finance segment presented by Alan Kohler in Melbourne. Weekend bulletins feature local sport bulletins presented by Neil Cross.
Relay stations
The following stations relayed ABS throughout South Australia:
Notes:
1. HAAT estimated from http://www.itu.int/SRTM3/ using EHAAT.
2. ABCS was on VHF channel 7 from its 1973 sign-on until sometime in the 1980s.
3. Analogue transmissions ceased as of 15 December 2010 as part of the national shutdown of analogue television.
See also
History of the Australian Broadcasting Corporation
Television broadcasting in Australia
References
Television stations in Adelaide
Television channels and stations established |
https://en.wikipedia.org/wiki/Network%20Aviation | Network Aviation is an airline based at Perth Airport, operating regular scheduled and air charter services in support of "fly-in fly-out" mining operations throughout Western Australia. In partnership with subsidiary engineering provider Network Turbine Solutions, Network Aviation operates over 50 flights a week on behalf of mining companies to facilitate crew changes at remote sites.
History
After assisting to establish Skippers Aviation, Lindsay Evans founded Network in 1998. Originally operating a mix of smaller aircraft types such as Cessna 441 Conquest IIs, Cessna 310s and Beechcraft Super King Airs, in partnership with key clients Network grew into larger types and commenced operating Embraer Brasilias in 2000 and Fokker 100s in 2008.
In February 2011, Network Aviation was purchased by Qantas. Network retains its current management, employees and operating structure, with the business to be aligned with Qantas' operations, standards and processes. With the purchase, Qantas stated it was looking at significantly growing Network's fleet and operations. On taking over Network, Qantas announced that it was purchasing ten Fokker 100 aircraft for the company.
In May 2014 Network Aviation received approval to operate three weekly services from Perth to Exmouth, Western Australia with Fokker 100s.
In March 2015 QantasLink ceased its scheduled turboprop aircraft operations in Western Australia. Network Aviation took over services to Geraldton and some services to Exmouth. On 31 July 2015, Qantas announced that the Fokker 100 aircraft would be progressively repainted in QantasLink colours.
In September 2016 Network Aviation became an affiliate member of the oneworld airline alliance.
Destinations
Network Aviation operates regular services to fixed schedules from Perth Airport to the following destinations in Western Australia:. The airline also operates a number of charters to select destinations to facilitate "Fly-In, Fly-Out" working rosters on mining sites.
Northern Territory
Darwin
Western Australia
Exmouth (Learmonth Airport)
Goldfields–Esperance region
Carosue Dam
Kalgoorlie
Kimberley region
Broome
Koolan Island
Mid West region
Geraldton
Pilbara region
Boolgeeda
Buttbreak iron ore mine
Christmas Creek mine (Graeme Rowley Aerodrome)
Cloudbreak mine (Fortescue Dave Forrest Airport)
Iron Bridge mine
Eliwana mine
Karratha
Newman
Onslow
Paraburdoo
Port Hedland
Roy Hill Mine (Ginbata Airport)
Solomon Hub iron ore mine (Solomon Airport}
Wodgina mine
West Angelas mine
South West region
Busselton
Fleet
Current fleet
As of August 2023 the Network Aviation fleet consists of the following aircraft:
Formerly operated
Network Aviation formerly also operated the following types of aircraft:
Beechcraft 200 Super King Air
Cessna 310
Cessna 441 Conquest II
Embraer EMB-120ER Brasilia
See also
List of airlines of Australia
References
External links
Network Aviation
Network Becomes QantasLink
Airlines established in 1998
Australian companies |
https://en.wikipedia.org/wiki/Graphic%20Adventure%20Creator | Graphic Adventure Creator (often shortened to GAC) is a game creation system/programming language for adventure games published by Incentive Software, originally written on the Amstrad CPC by Sean Ellis, and then ported to other platforms by, amongst others, Brendan Kelly (Spectrum), Dave Kirby (BBC, Electron) and "The Kid" (Malcolm Hellon) (C64). The pictures in the demo adventure, Ransom, were made by Pete James and the box cover art by Pete Carter.
GAC was released in 1985 for the Amstrad CPC and in 1986 for the ZX Spectrum, Commodore 64 and BBC Micro. A simplified version without graphics, called just the Adventure Creator, was also released for the Acorn Electron in 1987. GAC was ported to the Atari ST in 1988 as ST Adventure Creator (STAC) by the original author.
GAC had a more advanced parser than The Quill, allowing commands like GET THE LAMP THEN LIGHT IT, and a built-in graphics editor. Over 300 titles were written using GAC. It also came with a built in text compressor.
Reception
GAC was well received, earning a Zzap! Gold Medal Award. Your Sinclair reviewed the ZX Spectrum version giving it a 9/10 score. The ST version reached number 18 on the bestsellers chart on August 1988.
References
External links
1985 software
Text adventure game engines
Graphic Adventure Creator, The
ZX Spectrum software |
https://en.wikipedia.org/wiki/Dianne%20Buckner | Dianne Buckner is a Canadian television presenter, best known as a host of business-oriented programming, such as Venture and Dragons' Den, on CBC Television and CBC News Network.
Buckner has also been a guest anchor on CBC news programs such as CBC News: Sunday, Midday and As It Happens, and has served as a back-up anchor on CBC News Network. She previously worked for CTV, where she hosted the consumer awareness program Live It Up! and was a reporter for Canada AM and CTV National News.
She became host of Venture in 1997, succeeding Robert Scully.
She has been a four-time Gemini Award nominee, receiving nods for Best Host or Interviewer in a News Information Program or Series at the 19th Gemini Awards in 2004, Best News Information Series as a producer of Venture at the 20th Gemini Awards in 2005, Best Reality Program or Series as a producer of Venture's "The Big Switcheroo" at the 21st Gemini Awards in 2006, and Best Lifestyle/Practical Information Segment for Fortune Hunters at the 23rd Gemini Awards in 2008.
References
External list
Canadian television reporters and correspondents
Living people
Canadian women television journalists
Toronto Metropolitan University alumni
Canadian business and financial journalists
Women business and financial journalists
Year of birth missing (living people)
Canadian television news anchors |
https://en.wikipedia.org/wiki/Lazy%20jack | Lazy jacks (or lazyjacks) are a type of rigging which can be applied to a fore-and-aft rigged sail to assist in sail handling during reefing and furling. They consist of a network of cordage which is rigged to a point on the mast and to a series of points on either side of the boom; these lines form a cradle which helps to guide the sail onto the boom when it is lowered, reducing the crew needed to secure the sail. Lazy jacks are most commonly associated with Bermuda rigged sails, although they can be used with gaff rigged sails and with club-footed jibs. Blocks and rings may be part of some lazyjacks.
The oyster dredging sailboats of the Chesapeake Bay, bugeyes and skipjacks, were invariably equipped with lazy jacks, as their huge sail plans, combined with the changeable conditions on the bay, made it necessary to be able to reef quickly and with a small crew. Of late they have been revived as a feature of pleasure yachts as an alternative to roller reefing and furling. The latter methods can distort the sail, and are not compatible with battens in the reefed or furled portion of the sail. Lazy jacks are also cheaper, and can be easily applied after-market. However, they are not without disadvantages. The extra lines provide something else for the sail to foul upon when it is being raised, particularly if it is battened, and the lines and the connections between them can chafe and beat upon the sail, shortening its life and making unwanted noise. Also, unlike the roller systems, some crew member(s) must be on deck to secure the sail.
It is generally claimed that the name has its origins in the colloquial reference to British sailors as "Jack tars". "Lazy jacks" would therefore point to reduction of manpower and effort that lazy jacks provide.
References
Sailing rigs and rigging |
https://en.wikipedia.org/wiki/History%20Line%3A%201914-1918 | History Line: 1914-1918 (released in North America by Strategic Simulations as Great War: 1914-1918) is a turn-based tactics computer game released in 1992 by the German team Blue Byte. The storyline takes the player through various battles of the First World War. It uses the software engine based on the better known Battle Isle '93.
Plot
The storyline takes the player through various battles of World War I. The player can choose to play either the French or German side. The game starts in August 1914, with Germany invading France. As during the real war, the open greenfields of the first battles, dominated by cavalry, are gradually replaced by terrain filled with trenches and bunkers; as the number of tanks, artillery and aeroplanes increases the cavalry and infantry troops become less effective. New units become available as the game progresses, such as A7V or Mark IV tanks.
The game includes a lot of information about the period: after each mission, historical facts about two months of wartime are displayed. The game was designed to be educational, starting with an animation depicting the Western Front in 1916, and a sequence showing the assassination of Archduke Franz Ferdinand of Austria, heir to the throne of the Austro-Hungarian Empire, whose assassination in Sarajevo precipitated the Austrian declaration of war against Serbia which triggered World War I. After completing each map the player receives information about the course of the war (the game is linear - it is impossible to change history). The information includes text and illustrations taken from contemporary newspapers, both on key historical events and on trivial domestic news such as sporting events. There are also some animations, such as a zeppelin on a bombing raid London Bridge.
Gameplay
The game uses a software engine very similar to the better known Battle Isle '93 game. It is played on a hexagonal grid for a map. Both players act simultaneously on a split screen, each showing a part of a larger map. The turns are also divided into move and attack (order) phases. While one player moves his units, the other commands his own troops to carry out his actions.
The objective is to capture the enemy's headquarters building (while guarding your own); the victory can also be achieved by annihilating every unit the enemy controls. The maps have various features - different terrain types, as well as depots (to repair units) and factories (to produce) as buildings. Captured building may contain 'free' units. The units gain experience, although this experience isn't carried over from mission to mission in campaign mode.
In addition to the 24 single-player campaign maps, there are 12 two-player maps.
The AI is relatively weak, relying on mass frontal assaults. After the player survives the first few turns and the AI's overwhelming numbers using protected artillery and terrain advantage, the computer is usually unable to mount a proper defense.
Cultural influences
The designers |
https://en.wikipedia.org/wiki/Aluminium%20sulfate%20%28data%20page%29 | This page provides supplementary chemical data on aluminium sulfate.
Material Safety Data Sheet
The handling of this chemical may incur notable safety precautions. It is highly recommend that you seek the Material Safety Datasheet (MSDS) for this chemical from a reliable source and follow its directions.
ScienceLab.com
Structure and properties
Thermodynamic properties
Spectral data
References
Chemical data pages
Chemical data pages cleanup |
https://en.wikipedia.org/wiki/Oniguruma | by K. Kosako is a BSD licensed regular expression library that supports a variety of character encodings. The Ruby programming language, in version 1.9, as well as PHP's multi-byte string module (since PHP5), use Oniguruma as their regular expression engine. It is also used in products such as Atom, EDK2 UEFI, GyazMail, Take Command Console, Tera Term, TextMate and SubEthaEdit.
There is also a forked Oniguruma version called "Onigmo" (Oniguruma-mod) which includes some features introduced in Perl 5.10+. Ruby since version 2.0 has also switched to it and features have been backported from ruby to Onigmo. Take Command Console since version 20 has also switched to Onigmo.
See also
Comparison of regular expression engines
References
External links
Archive of Oniguruma Homepage as of August 7, 2015
Regular expressions
Software using the BSD license |
https://en.wikipedia.org/wiki/Peter%20Junger | Peter D. Junger (1933 – November 2006) was a computer law professor and Internet activist, most famous for having fought against the U.S. government's regulations of and export controls on encryption software.
The case, Junger v. Daley (6th Cir. 2000), held that computer source code is protected by the First Amendment. The US government prohibited publication of encryption software on the Internet, arguing that encryption software was a "munition" subject to export controls. Junger filed suit in 1996 challenging the regulations.
Junger also did significant legal theoretical work on the interplay between intellectual property, computer law, and the First Amendment. He defined himself as a "First Amendment absolutist."
Biography
Junger grew up in Wyoming, graduating from Harvard University in 1955 and Harvard Law School in 1958. From January 1959 to December 1960 he was an enlisted man in the U.S. Army serving in West Germany. After practicing law from 1961 to 1970, he accepted a faculty position at Case Western Reserve University's School of Law. He retired and was Professor of Law Emeritus in 2001.
Junger was also a practicing Buddhist, president of his local Buddhist Temple from 2003 to 2006.
Peter Junger died in November, 2006, at the age of 73 at his home in Cleveland. He was survived by his mother, Genevieve Junger (born 1901).
References and notes
External links
Peter D. Junger's website
Peter Junger's blog ("Samsara's Blog")
1933 births
2006 deaths
Free speech activists
Internet activists
Computer law scholars
Computer law activists
Cryptography law
Cypherpunks
First Amendment scholars
American legal scholars
Harvard Law School alumni
Case Western Reserve University faculty
Harvard College alumni |
https://en.wikipedia.org/wiki/Gell%C3%A9rt%20Hill%20Cave | The Gellért Hill Cave () is part of a network of caves within Gellért Hill in Budapest, Hungary. The cave is also referred to as "Saint Ivan's Cave" (Szent Iván-barlang), regarding a hermit who lived there and is believed to have used the natural thermal water of a muddy lake next to the cave to heal the sick. It is likely that this same water fed the pools of the old Sáros fürdő ("Muddy Baths"), now called Gellért Baths.
Background
In the 19th century the cave was inhabited by a poor family who built a small house of sun dried bricks in the great opening. The mouth of the cave was closed off with a planking and it was used as a peasant courtyard. This situation was recorded on a painting by Mihály Mayr (made sometime in the 1860s) and a photograph by György Klösz in 1877.
The first modern entrance for the caves was constructed in the 1920s by a group of Pauline monks who have been inspired by similar rock constructions during a pilgrimage in Lourdes, France. Kálmán Lux, professor at the Technical University, Budapest was the architect in charge. After its consecration in 1926, it served as a chapel (Sziklatemplom English: Cave Church) and monastery until 1951. During this time, it also served as a field hospital for the army of Nazi Germany during World War II.
In 1945, the Soviet Red Army captured Budapest. For six years, the cave continued its religious functions, but in 1951, the State Protection Authority raided the chapel as part of increasing action against the Catholic Church. As a result of the raid, the cave was sealed, the monastery's superior, Ferenc Vezér, was condemned to death, and the remaining brothers were imprisoned for upwards of ten years.
As the Iron Curtain disintegrated, the chapel reopened on 27 August 1989 with the destruction of the thick concrete wall that had sealed the cave. By 1992, the Chapel had been restored and the Pauline Order had returned to the cave. Today, the monks continue to perform religious functions within, though the cave is also a common tourist attraction. The church is complemented by a mysterious monastery carved into the rock and decorated with striking neo-gothic turrets. The walls of the cave are formed of natural rock. The church features many rooms, worthy of attention is the one in which all the ornaments have been carved in hardwood by a faithful follower of the Pauline Order. The terrace in front of the entrance is proudly guarded by the statue of Saint Stephen standing besides his horse.
Notes
External links
Budapest Tourism Office
Fortean Times
Buildings and structures in Budapest
Roman Catholic churches in Budapest
Caves of Hungary
Tourist attractions in Budapest
Cave churches |
https://en.wikipedia.org/wiki/Barium%20nitrate%20%28data%20page%29 | This page provides supplementary chemical data on barium nitrate.
Material Safety Data Sheet
The handling of this chemical may incur notable safety precautions. It is highly recommend that you seek the Material Safety Datasheet (MSDS) for this chemical from a reliable source and follow its directions.
SIRI
MSDS from BARIUM AND CHEMICALS INC in the SDSdata.org database
Science Stuff
Structure and properties
Thermodynamic properties
Spectral data
References
Chemical data pages
Chemical data pages cleanup |
https://en.wikipedia.org/wiki/Boron%20trioxide%20%28data%20page%29 | This page provides supplementary chemical data on boron trioxide.
Material Safety Data Sheet
MSDS from SIRI
Structure and properties
Thermodynamic properties
Spectral data
References
Chemical data pages
Chemical data pages cleanup |
https://en.wikipedia.org/wiki/Computer%3A%20A%20History%20of%20the%20Information%20Machine | Computer: A History of the Information Machine is a history of computing written by Martin Campbell-Kelly and William Aspray first published in 1996. It follows the history of "information machines" from Charles Babbage's difference engine through Herman Hollerith's tabulating machines to the invention of the modern electronic digital computer. A revised 2nd edition published in 2004 included new material on the Internet and World Wide Web, while the updated 3rd edition published in 2013 includes contributions from historians Nathan Ensmenger and Jeffrey Yost. The 3rd edition extends the story to include recent phenomena such as social networking and revises the discussion of early history to reflect new insights from the literature.
Chapters
Part One - Before the Computer
When Computers were People
The Mechanical Office
Babbage's Dream comes True
Part Two - Creating the Computer
Inventing the Computer
The Computer Becomes a Business Machine
The Maturing of the Mainframe: The Rise of IBM
Part Three - Innovation and Expansion
Real Time: Reaping the Whirlwind
Software
New Modes of Computing
Part Four - Getting Personal
The Shaping of the Personal Computer
Broadening the Appeal
The Internet
Quotes
During the second half of the 1980s, the joys of 'surfing the net,' began to excite the interest of people beyond the professional computer-using communities ... However, the existing computer networks were largely in government, higher education and business. They were not a free good and were not open to hobbyists or private firms that did not have access to a host computer. To fill this gap, a number of firms such as CompuServe, Prodigy, GEnie, and America Online sprang up to provide low cost network access ... While these networks gave access to Internet for e-mail (typically on a pay-per-message basis), they did not give the ordinary citizen access to the full range of the Internet, or to the glories of gopherspace or the World Wide Web. In a country whose Constitution enshrines freedom of information, most of its citizens were effectively locked out of the library of the future. The Internet was no longer a technical issue, but a political one. (1996:298).
The revised second edition ends, somewhat ominously:
The Internet is simply too important for its continued existence to be imperiled by an antisocial and lawless minority. (2004:279)
Reviews
According to Michael Mahoney's 1998 review in IEEE Annals of the History of Computing, Campbell-Kelly and Aspray's account is "a highly readable, broad-brush picture of the development of computing, or rather of the computer industry, from its beginning to the present" which "sets a new standard for the history of computing."
In his review in Technology and Culture, Robert Seidel writes that "Computer is a readable and comprehensive history intended to acquaint novices with a growing historical literature as well as to provide an overview of that history from Charles Babbage through Bi |
https://en.wikipedia.org/wiki/Real%20Gay | Real Gay is a 2005 gay-themed "reunion show" hosted by Kim Coles. Airing on the LGBT network Logo, Real Gay featured cast members from a number of different reality television series discussing their experiences being openly gay in the spotlight of national television.
Participants
Among those appearing on Real Gay were:
Chip Arndt from The Amazing Race 4
Lynn Warren and Alex Ali from The Amazing Race 7
Will Wikle from Big Brother 5
William Hernandez from The Real World: Philadelphia
Genesis Moss from The Real World: Boston
Ebony Haith from America's Next Top Model
James Getzlaff from Boy Meets Boy
Scout Cloud Lee from Survivor: Vanuatu
Coby Archa from Survivor: Palau
Jim Verraros from American Idol
Brandon Kindle and Ryan Pacchiano from Showdog Moms & Dads
Sophia Pasquis from Road Rules: The Quest
Michelle Deighton from America's Next Top Model, Cycle 4
External links
at the Wayback Machine
2005 television specials
LGBT-related television specials
Logo TV original programming |
https://en.wikipedia.org/wiki/Shaman%20King%3A%20Master%20of%20Spirits | Shaman King: Master of Spirits is a Metroidvania video game developed by Konami Computer Entertainment Japan and published by Konami. This is the first Shaman King game that was developed for the Game Boy Advance in America. It was developed to accompany the English dub by 4kids Entertainment.
Story
On his quest to advance in the Shaman Tournament and defeat Hao, Yoh and his friends run into a man named Magister, who plans on resurrecting the demon king Mephias. With the help of his friends and their Guardian Ghosts, Yoh must stop Magister at all costs.
General Information
Shaman King: Master of Spirits, much like the anime and manga it is based on, is centered on Yoh Asakura and his battles to become Shaman King.
The story within the game plays like a "Side story", referring to elements within the story of both the manga and anime while not conforming to any particular continuity. In it, Yoh's goal is to stop the Guardian of Demons from being resurrected by a gang of rogue shaman.
The game itself, while not having fatal flaws, does have its critics in response to its simplicity and overuse of map exploration, a surprising lack and simplicity in the move set for Yoh and the lack of health pickups in the areas (Health can only be recovered by spending money to buy health items, finding/receiving them through spirit ability or making use of spirits with healing potential - Tokageroh, Mash and the Spirit of Fire).
References
Other Links
2004 video games
Game Boy Advance games
Game Boy Advance-only games
Kodansha franchises
Konami franchises
Konami games
Master Of Spirits
Side-scrolling video games
Video games developed in Japan
Single-player video games |
https://en.wikipedia.org/wiki/Android | Android most commonly refers to:
Android (robot), a humanoid robot or synthetic organism designed to imitate a human
Android (operating system), a mobile operating system primarily developed by Google
Android may also refer to:
Science and technology
The Android mascot, the mascot of the Android operating system
Android (drug), a brand name for the synthetic hormone methyltestosterone
Arts and entertainment
Film
Android (film), a 1982 film directed by Aaron Lipstadt
Android, the Russian title for the 2013 film App
Music
The Androids, an Australian rock band
"Android" (TVXQ song), 2012
"Android", a song by Green Day from the album Kerplunk
"Android", a song on The Prodigy's What Evil Lurks EP
Games
Android (board game), published by Fantasy Flight Games
Other uses in arts and entertainment
Amazo, DC Comics character aka The Android
The Android (novel), by K. A. Applegate
Android 18, Dragon Ball manga character
Android 17, Dragon Ball manga character, brother of Android 18
See also
Androyd, a brand name of oxymetholone
Gynoid
Cyborg
Robot
Droid (disambiguation)
Metalman (disambiguation)
Robotman (disambiguation) |
https://en.wikipedia.org/wiki/Chugoku%20Communication%20Network | Chugoku Communication Network (Hiroshima P-station) is a Japanese local FM radio station in Naka-ku, Hiroshima.
The station was found on May 20, 1987 and aired on May 1, 2000.
External links
Hiroshima P-station
Mass media in Hiroshima
Radio stations in Japan
Companies based in Hiroshima Prefecture
Radio stations established in 1987 |
https://en.wikipedia.org/wiki/Earthquake%20warning%20system | An earthquake warning system or earthquake alarm system is a system of accelerometers, seismometers, communication, computers, and alarms that is devised for notifying adjoining regions of a substantial earthquake while it is in progress. This is not the same as earthquake prediction, which is currently incapable of producing decisive event warnings.
Time lag and wave projection
An earthquake is caused by the release of stored elastic strain energy during rapid sliding along a fault. The sliding starts at some location and progresses away from the hypocenter in each direction along the fault surface. The speed of the progression of this fault tear is slower than, and distinct from the speed of the resultant pressure and shear waves, with the pressure wave traveling faster than the shear wave. The pressure waves generate an abrupt shock. The shear waves generate periodic motion (at about 1 Hz) that is the most destructive to structures, particularly buildings that have a similar resonant period. Typically, these buildings are around eight floors in height. These waves will be strongest at the ends of the slippage, and may project destructive waves well beyond the fault failure. The intensity of such remote effects are highly dependent upon local soils conditions within the region and these effects are considered in constructing a model of the region that determines appropriate responses to specific events.
Transit safety
Such systems are currently implemented to determine appropriate real-time response to an event by the train operator in urban rail systems such as BART (Bay Area Rapid Transit) and LA Metro. The appropriate response is dependent on the warning time, the local right-of-way conditions and the current speed of the train.
Deployment
As of 2016, Japan and Taiwan have comprehensive, nationwide earthquake early warning systems. Other countries and regions have limited deployment of earthquake warning systems, including Mexico (the Mexican Seismic Alert System covers areas of central and southern Mexico including Mexico City and Oaxaca), limited regions of Romania (the Basarab bridge in Bucharest), and parts of the United States. The earliest automated earthquake pre-detection systems were installed in the 1990s; for instance, in California, the Calistoga fire station's system which automatically triggers a citywide siren to alert the entire area's residents of an earthquake. Some California fire departments use their warning systems to automatically open overhead doors of fire stations before the earthquake can disable them. While many of these efforts are governmental, several private companies also manufacture earthquake early warning systems to protect infrastructure such as elevators, gas lines and fire stations.
Canada
In 2009, an early warning system called ShakeAlarm was installed and commissioned in Vancouver, British Columbia, Canada. It was placed to protect a piece of critical transportation infrastructure called the Geo |
https://en.wikipedia.org/wiki/Good%20Guys%2C%20Bad%20Guys | Good Guys, Bad Guys was an Australian comedy/drama TV series that screened on the Nine Network between 1997 and 1998, with a telemovie and twenty-six episodes produced. The crime-themed show was set in Melbourne.
The program and its lead character Elvis Maginnis were written for Marcus Graham, a former star of the soap opera E Street (TV series). Maginnis is disgraced former cop, tainted by his criminal family and framed for corruption. Elvis owns "K for Kleen" drycleaning, managed by Stella Kinsella (Alison Whyte, of the ABC current affairs satire series Frontline) and Reuben Zeus who has Tourette syndrome (Travis McMahon, most recently of Last Man Standing).
Elvis's attempts at a straight life are constantly compromised by the demands of his eccentric family, while Stella's attempts at making "K-for-Kleen" turn a profit are frustrated by Elvis's soft heart.
The program was filmed in Melbourne, predominantly around the inner-city "bohemian" suburbs of St. Kilda, Fitzroy and Carlton. The film style incorporated local colour - Melbourne trams, landmarks like Smith Street's Cobra cane furniture shop, and the Builder's Arms Hotel as Elvis's local - and a soundtrack of the then-latest Australian music, matched to the action. The Good Guys, Bad Guys soundtrack CD features Regurgitator, The Fauves, Nick Cave and the Bad Seeds, The Whitlams, The Avalanches, Spiderbait, The Cruel Sea , Rebecca's Empire and The Mavis's among others.
Cast
Main cast
Marcus Graham - Elvis Maginnis
Alison Whyte - Stella Kinsella
Travis McMahon - Reuben Zeus
Guest cast
Good Guys, Bad Guys guest starred many Australian actors, including Zoe Carides, Samuel Johnson, Belinda Giblin, Nadine Garner, Sophie Lee, Vince Colosimo, Annie Jones, Claudia Black, Red Symons, Magda Szubanski, Sonia Todd, Jane Hall, John Waters, Frankie J. Holden, Bruce Spence, John McTernan, Nicholas Bell, Ben Mendelsohn, Norman Hancock, Lisa Hensley, Grant Piro, Mary Coustas and Petra Yared.
Awards
In 1997, the show won 'Best Mini-Series or Telefeature' at the AFI Awards. In 1998, cast member Alison Whyte was nominated for 'Most Outstanding Actress' at the Logie Awards for her role in the show.
International broadcasts
In 1997 and 1998, the series was shown on Russian television channels TV Tsentr and Stolitsa.
Home media
In 2007 Force Australia released season one of Good Guys, Bad Guys on DVD. Then Force Australia stopped operating and was taken over by Beyond Home Entertainment who released season two of Good Guys, Bad Guys on DVD in September 2007.
See also
List of Australian television series
References
External links
Good Guys, Bad Guys at the National Film and Sound Archive
Good Guys, Bad Guys at Australian Screen Online
Nine Network original programming
1990s Australian drama television series
1997 Australian television series debuts
1998 Australian television series endings
Television series by Beyond Television Productions |
https://en.wikipedia.org/wiki/Valley%20Metro%20Rail | Valley Metro Rail (styled as METRO) is a light rail line serving the cities of Phoenix, Tempe, and Mesa in Arizona, USA. The network, which is part of the Valley Metro public transit system, began operations on December 27, 2008. In , the system had a ridership of , or about per weekday as of .
In the years since it opened in 2008, the system has undergone four expansions (including the Tempe Streetcar), with at least three more scheduled. Furthermore, extensions are planned into West Phoenix at Desert Sky Mall and to South Phoenix at Baseline Road, all of which were expanded as a direct result of obtaining funding under the Proposition 104 sales tax increase.
Cost and infrastructure
The expected construction cost for the initial was $1.4 billion, or $70 million per mile. In 2008, Valley Metro estimated the train would cost $184 million to operate over the following five years with fares covering $44 million (24%) of the operation costs and tax subsidies covering the remaining costs.
Trains operate on city streets in a "center reservation", similar to the Red Line of the METRORail light rail system in Houston, the surface sections of the MBTA subway's Green Line in Boston, and some surface sections of the Muni Metro in San Francisco and TRAX in Salt Lake City. Some parts of the line, such as the bridge over Tempe Town Lake (near State Route 202), have no contact with other traffic. The vehicles used are rated for a maximum speed of , and have to complete the route in just over 90 minutes, including station stops. The system is powered by an overhead catenary that supplies power at .
History
Numerous plans preceded the implementation of light rail. The Phoenix Street Railway provided streetcar service from 1887 to 1948. Historic vehicles may be seen at the Phoenix Trolley Museum, with Car #116 celebrating her 80th birthday on December 25, 2008, just days before the opening of modern rail service. In 1989, the ValTrans elevated rail proposal was turned down by voters in a referendum due to cost and feasibility concerns. Subsequent initiatives during the 1990s failed over similar reasons.
Metro was created by the Transit 2000 Regional Transportation Plan (RTP), also called the Transit 2000 plan, which involved a 0.5 per cent sales tax, and was approved by Phoenix voters in 2000. Transit 2000 aimed at improving the local bus service (considered unacceptably inadequate compared to other major US cities) and the formation of bus rapid transit and light rail, among other things, which was seen as a more affordable approach. It used the route placing and color designations from the 1989 ValTrans plan.
Construction on the new light rail line began in March 2005. In March 2008, cracks in the system's rails were discovered. The cause of the cracks was determined to be improper use of plasma cutting torches by contractors. The affected track was repaired by May at a cost of $600,000 with still no word on which parties will be held financially resp |
https://en.wikipedia.org/wiki/Classmate%20PC | The Classmate PC, formerly known as Eduwise, is Intel's entry into the market for low-cost personal computers for children in the developing world. It is in some respects similar to the One Laptop Per Child (OLPC) trade association's Children's Machine (XO), which has a similar target market. Although made for profit, the Classmate PC is considered an Information and Communication Technologies for Development project (ICT4D). Introduced in 2006, the device falls into the then popular category of netbooks.
Intel's World Ahead Program was established May 2006. The program designed a platform for low cost laptops that third party manufacturers could use to produce low cost machines under their own respective brands. Many orders were cancelled in 2009.
The Classmate PC is a reference design by Intel. Intel did not build the subnotebooks, but produced the chips that power them. The reference design was used by original equipment manufacturers (OEMs) worldwide to build their own branded Classmate PC.
Classmate PC (Clamshell, first generation)
The reference hardware specifications as of September 28, 2006 are:
Customized mini chassis 245 mm × 196 mm × 44 mm
CPU: Intel Celeron M mobile processor (915GMS + ICH6-M)
CPU clock speed 900 MHz (with 32 KB L1 cache, no L2 cache, and 400 MHz FSB)
800 × 480 7-inch diagonal LCD, LVDS Interface, LED B/L
256 MB of DDR2 RAM
1 GB/2 GB flash memory (connected via USB)
10/100 Mbit/s Ethernet
Realtek WLAN 802.11b/g with antenna (connected via USB)
Intel GMS915 integrated graphics chip (8 MB shared memory)
Built in microphone
Built in stereo speakers
Stereo 2 channel audio, jacks for external stereo speakers and microphones, Line-out, and Mic-in
Integrated keyboard with hot keys
Cycle touch pad with left and right buttons
Customized Note Taker with wireless pen
TPM1.2 (Trusted Platform Module from Infineon Technologies or Nuvoton) used for the Intel anti-theft technology feature (discontinued in 2015)
Power source:
4-cell Li-ion battery with adapter – approximately 3.5 hours usage
6-cell Li-ion battery option – approximately 5 hours usage
There was a consumer model called MiLeap X, build by HCL Infosystems, India.
Second generation (Convertible)
The successor of the original Classmate design was announced in April British 2008 and reviewed. Later on, different photos of the successor leaked. Photos of Classmate PC 3 as a tablet PC are available. The second generation Classmate was unveiled on 3 April 2008 at Intel's Developer Forum. Significant upgrades include:
Available 30 GB PATA hard disk drive (in addition to 1, 2, and 4 GB SSD).
Built-in webcam
Available 9" LCD (the 7" LCD is still available)
Up to 512 MB RAM
802.11s (mesh networking, currently only usable on Linux-based Classmates)
Available 6-cell battery for up to 6.5 hours usage
Touchscreen – pen and on-screen soft keyboard
Tablet mode – simple user-interface shell; quick launcher for tablet mode
Enhanced software – easier netw |
https://en.wikipedia.org/wiki/IBM%207080 | The IBM 7080 was a variable word length BCD transistor computer in the IBM 700/7000 series commercial architecture line, introduced in August 1961, that provided an upgrade path from the vacuum tube IBM 705 computer.
The 7080 weighed about .
After the introduction of the IBM 7070, in June 1960, as an upgrade path for both the IBM 650 and IBM 705 computers, IBM realized that it was so incompatible with the 705 that few users of that system wanted to upgrade to the 7070. That prompted the development of the 7080, which was fully compatible with all models of the 705 and added many improvements.
IBM 705 compatibility modes
For backward compatibility with the IBM 705 the machine had two switches on the operator's control panel, 705 I-II and 40K memory, that selected the mode the machine started in.
705 I mode — 20,000 characters (705 I-II On, 40K memory Off)
Indirect addressing is disabled
Communication channels are disabled
705 II mode — 40,000 characters (705 I-II On, 40K memory On)
Indirect addressing is disabled
Communication channels are disabled
705 III mode — 40,000 characters (705 I-II Off, 40K memory On)
Indirect addressing is enabled
Communication channels are enabled
705 III mode — 80,000 characters (705 I-II Off, 40K memory Off)
Indirect addressing is enabled
Communication channels are enabled
Software can then command the 7080 to enter full 7080 mode from any 705 startup mode.
7080 mode — 160,000 characters
Indirect addressing is disabled
Communication channels are enabled
Regardless of mode, the 7080 operates at full 7080 speed.
The 7080 system included the IBM 7305 Central Storage and I/O Control unit, the IBM 7102 Arithmetic and Logical unit, the IBM 7302 Core Storage unit, the IBM 7153 Console Control unit, and the IBM 7804 Power unit.
The IBM 7622 Signal Control unit could be added to the system to convert transistor signal levels to levels usable with first generation equipment, allowing all 705 peripherals, including punched card input/output with the IBM 7502 card reader, line printers and the IBM 727 magnetic tape drives, to be used on the 7080. Second generation IBM 729 magnetic tape drives connected to the CPU via the IBM 7621 Tape Control.
References
External links
IBM 7080 documents on Bitsavers.org
Dave Pitts' IBM 7090 support – Includes a cross assembler for the IBM 705/7080
BIRTH OF AN UNWANTED IBM COMPUTER Computer History Vignettes By Bob Bemer IBM 7070 connection to IBM 7080
7080
7 7080
Variable word length computers
Computer-related introductions in 1961 |
https://en.wikipedia.org/wiki/Peter%20Rigby | Sir Peter Rigby DL (born 29 September 1943) is a British entrepreneur. He is chairman and chief executive of Rigby Group PLC, and is one of Britain's richest people.
Career
Specialist Computer Centres
Peter Rigby founded SCC (Specialist Computer Centres) in 1975 with an initial cash investment of just £2,000. Rigby has maintained control of the company over 40 years of sustained growth and has seen SCC's turnover rise to £2.038 billion (2005).
In May 2012, a company press release claimed that turnover to year end March 2012, had risen to £2.75billion, a 10% rise on the previous yearly period. Peter Rigby claims that if SCC were a public company, turnover would be as much as £14 billion.
SCC is now the largest privately owned technology company in Europe.
His sons, James Rigby (SCC CEO) and Steven Rigby (European GM) are both directors on the board of Rigby Group, while Peter Rigby is chairman and group CEO.
Other activities
In April 2010 Rigby's Patriot Aviation Group bought Coventry Airport, with a view to moving from freight-only to serving business passengers and helicopters. In June 2013 it bought Exeter International Airport. In June 2014 it bought Norwich International Airport, and in December 2017, Bournemouth Airport.
Rigby also owns the luxury hotel group Eden Hotel Collection, of which Mallory Court in Leamington was named "Most Excellent Hotel in the United Kingdom and Ireland" for 2009 by magazine Condé Nast Johansens.
Wealth
In 2010, the Sunday Times Rich List estimates Rigby to be worth £430m, based on his corporate investments. This ranked him as the 158th richest person in Britain. Although his net worth has increased through the acquisition of European IT companies, his position on the rich list has slipped from a peak of 61st in 2003.
The Birmingham Post also publishes a rich list of residents of the West Midlands; Rigby was at number 11 in 2017 with an estimated net worth of £850 million.
Honours
In 2000 Rigby was appointed Deputy Lieutenant of the West Midlands. He was knighted in the 2002 Birthday Honours "for services to information technology and to business in the West Midlands".
Notes
External links
SCC Group Homepage
Q&A with Sir Peter Rigby
Businesspeople in information technology
Businesspeople awarded knighthoods
English businesspeople
Knights Bachelor
1943 births
Living people
British chief executives
British chairpersons of corporations
Deputy Lieutenants of the West Midlands (county) |
https://en.wikipedia.org/wiki/Amy%20Briggs | Amy Ruth Briggs (born 1962) is an American video game implementor known for creating Plundered Hearts, an interactive fiction computer game published by Infocom in 1987.
Early life
At one point in her youth, Briggs was a babysitter of Ron Gilbert, who went on to design the pirate-themed adventure game Monkey Island. A Minnesota native, she graduated from Macalester College in 1984 with a B.A. in English, specializing in British literature.
Career
Already a fan of Infocom's games, Briggs joined the company in 1985 as a game tester. Working long hours playtesting games and learning the ZIL programming language, she quickly rose to the rank of implementor.
Briggs's literary background led her to write the company's only romance-genre text adventure. She also chose an explicitly female lead character, again unique for Infocom (other lead characters were either of unspecified gender, male, or allowed a choice of sex). She explained these choices by saying, "C. S. Lewis said he had to write The Chronicles of Narnia because they were books he wanted to read, and nobody else had written them yet. Plundered Hearts was a game I wanted to play."
Although Plundered Hearts was her only published text adventure, Briggs worked as a writer and editor on a number of other Infocom projects: she did a major rewrite of Quarterstaff, and helped to design "The Flathead Calendar", the main feelie included with Zork Zero. She was also briefly lead implementor on Milliways, the never-completed sequel to The Hitchhiker's Guide to the Galaxy. After Infocom was shut down in 1989, she returned to Minnesota where she attended graduate school, eventually earning a Ph.D. in cognitive psychology from the University of Minnesota. Then she went to work for 3M as a human factors engineer.
See also
List of electronic literature authors, critics, and works
Digital poetry
E-book#History
Electronic literature
Hypertext fiction
Interactive fiction
Literatronica
References
External links
Interview footage for documentary Get Lamp
Living people
1962 births
People from Minnesota
American video game designers
Video game programmers
Infocom
Interactive fiction writers
University of Minnesota College of Liberal Arts alumni
Women video game developers
Macalester College alumni
American women game designers
21st-century American women
Electronic literature writers |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.