source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/Unitarian%20Earth%20Spirit%20Network
The Unitarian Earth Spirit Network (UESN) is an association of Unitarian Universalists based in the U.K. that seeks to represent a Nature/Earth/Creation centred religious voice within the church. It was assisted by Jo Rogers as Secretary/Treasurer. The UESN provides a forum for this group and became a recognised, credible part of the British Unitarian movement. History The UESN was founded in 1990 by Rev. Peter Roberts. It began as a part of the British Unitarian sect known as the "Unitarian Pagan Network." This name was eventually changed because some members were unhappy with the negative associations they had for the term 'pagan'. For a while, it was known as the "Unitarian New Age Network" until the group settled on their current name, "Unitarian Earth Spirit Network." Affiliations In addition to its links to the main British Unitarian community, the organisation maintains ties to the U.S.-based Covenant of Unitarian Universalist Pagans, which serves a similar role of representing contemporary pagan spirituality in the American Unitarian community. UESN publishes a quarterly newsletter called File, which members receive with an annual subscription. See also Modern paganism in the United Kingdom References External links Unitarian Earth Spirit Network Web Site Unitarianism in the United Kingdom Modern pagan organisations based in the United Kingdom Christian organizations established in 1990 1990 establishments in the United Kingdom Modern pagan organizations established in the 1990s
https://en.wikipedia.org/wiki/Envision%20Schools
Envision Education is a Bay Area network of high performing charter schools, founded in June 2002 by Daniel McLaughlin and Bob Lenz, that currently runs five public middle and high Envision Schools in the San Francisco Bay Area. Established in 2002, the mission of Envision Education is to transform the lives of students – especially those who will be the first in their families to attend college – by preparing them for success in college, career and in life.  Envision accomplishes its mission through a nationally replicated Portfolio Defense assessment model, which authentically measures the most important things students need in order to succeed in college and career: academic content, leadership skills, and deeper learning competencies such as reflection and growth mindset.  Portfolio Defense gives students, particularly those who are historically underserved, the academic, social-emotional and leadership skills they need to get into college and persist until they earn a degree. Envision Education serves approximately 1,500 students in the San Francisco Bay Area: 70% are low-income; 94% from communities of color; and 75% first generation college bound.  From this population, 100% of graduates are accepted to 2- or 4-year colleges, with 77% accepted to 4-year institutions.  Envision graduates also persist in college once they enroll. Their college persistence rate is 87% from first to second year, compared to the national average of 74%. Envision also operates Envision Learning Partners, a coaching and training division working with schools across the country to adapt and adopt the Portfolio Defense model.  ELP works with more than 1,000 educators in 30+ school networks and reaching more than 200,000 students. One of the biggest problems facing underserved students is educational inequity.  Because of this inequity, poor students are far less likely to receive an education that will lift them out of poverty. Nationally, only 1 out of 10 low-income students earns a 4-year college degree by their mid-twenties, significantly limiting their income potential for their entire lives. In its schools and with its consulting partners, Envision Education strives to address this problem by giving disadvantaged students access to transformative schools where they are well prepared for future success. Investment The Bill & Melinda Gates Foundation helped launch the school network with a $3 million investment in 2003 to form an initial group of five charter schools. In 2006, the foundation invested another $6.9 million aimed at helping the program duplicate its arts and technology programs. Schools Current City Arts & Tech High School in San Francisco, opened in 2004 with an inaugural class of 100 freshmen. The school now has students in all four high school grades starting with the 2007-08 school year. CAT graduated its first class of Seniors in 2008. Envision Academy of Arts & Technology in Oakland, California, opened in 2007-08 school year with stu
https://en.wikipedia.org/wiki/Anthony%20James%20Barr
Anthony James Barr (born September 24, 1940), aka Tony Barr or Jim Barr, is an American programming language designer, software engineer and inventor. Among his notable contributions are the Statistical Analysis System (SAS), automated lumber yield optimization, and the Automated Classification of Medical Entities (ACME). Contributions Statistical Analysis System (SAS) Widely used internationally in science, government, industry, and academia, the SAS System was founded by Barr in 1966. In September 1966, in Athens, Georgia, he presented the conceptual ideas of SAS to members of the Committee on Statistical Software of the University Statisticians of the Southern Experiment Stations (USSES). Barr had earlier created an analysis-of-variance modeling language inspired by the notation of statistician Maurice Kendall. He developed it in assembly language on the IBM 1410, as a graduate student at North Carolina State University from 1962 to 1963. Dr. A. Grandage, author of IBM 650 analysis-of-variance programs, advised on some of the statistical computations. This was followed by a multiple regression program with a flexible input format and with algebraic transformation of variables, in 1963 to 1964. Drawing on those programs, along with his experience with structured data files, he created SAS, placing statistical procedures into a formatted file framework. Barr's experience with structured data files was gained while working on the Formatted File System, (see below). From 1966 to 1968, Barr developed the fundamental structure and language of SAS. In 1968, Barr began collaboration with others. Barr designed and implemented the programming language, data management, report writing, and systems areas of the evolving system. In 1976, SAS Institute, Inc. was incorporated by Anthony J. Barr, James H. Goodnight, John P. Sall, and Jane T. Helwig, with Barr holding the largest share (40%). He sold his shares in 1979. Automated Classification of Medical Entities (ACME) Barr created the ACME program for the National Center for Health Statistics from 1967 to 1969. Linking Loader for the IBM/360 In 1968, Barr pioneered a Compile and go system for IBM OS/360 marketed by University Computing Company. The use of the Loader cut typical program testing times by 25 percent. IBM did not offer the equivalent Loader for over 18 months after the Barr Loader was commercially available. IBM Workstation Simulators In 1971, Barr created the first non-IBM HASP terminal emulator. Marketed by the University Computing Company (UCC), the HASP emulator gave a significant performance increase over the IBM 2780 emulator he had developed for UCC in 1969. The emulators were developed on the PDP-8 minicomputer and allowed COPE terminals to communicate with the IBM/360 and IBM/370. In 1971, Barr also implemented the HASP workstation for M & M Computer Industries, Orange, California. Implemented on the Data General Nova minicomputer, the program became the Singe
https://en.wikipedia.org/wiki/Alien%20Nation%3A%20Dark%20Horizon
Alien Nation: Dark Horizon (original airdate: October 25, 1994) is a television film made as a continuation of the Alien Nation television series. Produced by the Fox Network, Alien Nation lasted a single season, ending in 1990 with a cliffhanger series finale. Dark Horizon was written to be the season opener for the second season, but when the series was unexpectedly canceled and looked like it might never return to television, the plot was published as a book. Finally, four years later (after a change in management at Fox), Alien Nation: Dark Horizon appeared as a television film to pick up where the television series left off. Alien Nation: Dark Horizon was written by Andrew Schneider and Diane Frolov, and was directed by Kenneth Johnson. Plot In a recapitulation of the series' cliffhanger, Alien Nation: Dark Horizon begins with Susan Francisco and her daughter Emily falling victim to a newly developed viral infection that was created by a group of human Purists to exterminate the Newcomer species. There is also a new sub-plot running parallel to this one, the story of Ahpossno, a Tenctonese Overseer who lands on Earth to find any surviving Tenctonese and bring them back into slavery. The idea of a signal sent into space by the surviving Overseers was explored in the Alien Nation episode "Contact". The series episode ended with contaminated flowers being delivered to the Francisco family and Cathy informing Matt that they have been hospitalized. Dark Horizon re-stages these events so that George Francisco is not present. Cast Main cast All of the original cast returned from the television series for the television movie. Additional cast References External links Action television films American science fiction action films Dark Horizon 1994 television films 1994 films 1990s science fiction action films Films directed by Kenneth Johnson (producer) Films based on television series American science fiction television films Films set in Los Angeles Films set in the future Television sequel films Television series reunion films Films set in 1999 Television films based on television series 20th Century Fox Television films 1990s American films
https://en.wikipedia.org/wiki/Average%20path%20length
Average path length, or average shortest path length is a concept in network topology that is defined as the average number of steps along the shortest paths for all possible pairs of network nodes. It is a measure of the efficiency of information or mass transport on a network. Concept Average path length is one of the three most robust measures of network topology, along with its clustering coefficient and its degree distribution. Some examples are: the average number of clicks which will lead you from one website to another, or the number of people you will have to communicate through, on an average, to contact a complete stranger. It should not be confused with the diameter of the network, which is defined as the longest geodesic, i.e., the longest shortest path between any two nodes in the network (see Distance (graph theory)). The average path length distinguishes an easily negotiable network from one, which is complicated and inefficient, with a shorter average path length being more desirable. However, the average path length is simply what the path length will most likely be. The network itself might have some very remotely connected nodes and many nodes, which are neighbors of each other. Definition Consider an unweighted directed graph with the set of vertices . Let , where denote the shortest distance between and . Assume that if cannot be reached from . Then, the average path length is: where is the number of vertices in . Applications In a real network like the Internet, a short average path length facilitates the quick transfer of information and reduces costs. The efficiency of mass transfer in a metabolic network can be judged by studying its average path length. A power grid network will have fewer losses if its average path length is minimized. Most real networks have a very short average path length leading to the concept of a small world where everyone is connected to everyone else through a very short path. As a result, most models of real networks are created with this condition in mind. One of the first models which tried to explain real networks was the random network model. It was later followed by the Watts and Strogatz model, and even later there were the scale-free networks starting with the BA model. All these models had one thing in common: they all predicted very short average path length. The average path lengths of some networks are listed in Table. The average path length depends on the system size but does not change drastically with it. Small world network theory predicts that the average path length changes proportionally to log n, where n is the number of nodes in the network. References Network theory Graph invariants
https://en.wikipedia.org/wiki/Mathematica%20%28disambiguation%29
Wolfram Mathematica is a computer algebra system and programming language. Mathematica may also refer to: Mathematica Inc. (1968–1986), a defunct research and software company Mathematica Inc., a policy research organization spun-off from the above company, formerly known as Mathematica Policy Research Philosophiæ Naturalis Principia Mathematica, Newton's book on the basic laws of physics Mathematica: A World of Numbers... and Beyond, interactive mathematics exhibit (1961) designed by Charles and Ray Eames Principia Mathematica, Whitehead and Russell's work on axiomatizing mathematics See also Mathematics (disambiguation)
https://en.wikipedia.org/wiki/CCNI
CCNI may refer to: Computational Center for Nanotechnology Innovations, supercomputing centre at the Rensselaer Polytechnic Institute, USA Charity Commission for Northern Ireland, government body regulating charities in Northern Ireland CCNI (gene), also known as Cyclin 1 CCNI S.A., Compañía Chilena de Navegación Interoceánica S.A. (Chilean Interoceanic navigation company) Comité consultatif national de l'immunisation (CCNI), French name of the National Advisory Committee on Immunization (NACI) of Canada
https://en.wikipedia.org/wiki/B.A.T.M.A.N.
The Better Approach to Mobile Ad-hoc Networking (B.A.T.M.A.N.) is a routing protocol for multi-hop mobile ad hoc networks which is under development by the German "Freifunk" community and intended to replace the Optimized Link State Routing Protocol (OLSR). B.A.T.M.A.N.'s crucial point is the decentralization of knowledge about the best route through the network — no single node has all the data. This technique eliminates the need to spread information about network changes to every node in the network. The individual node only saves information about the "direction" it received data from and sends its data accordingly. The data gets passed from node to node, and packets get individual, dynamically created routes. A network of collective intelligence is created. In early 2007, the B.A.T.M.A.N. developers started experimenting with the idea of routing on layer 2 (Ethernet layer) instead of layer 3. To differentiate from the layer 3 routing daemon, the suffix "adv" (for: advanced) was chosen. Instead of manipulating routing tables based on information exchanged via UDP/IP, it provides a virtual network interface and transparently transports Ethernet packets on its own. The batman-adv kernel module has been part of the official Linux kernel since 2.6.38. Operation B.A.T.M.A.N. has elements of classical routing protocols: It detects other B.A.T.M.A.N. nodes and finds the best way (route) to these. It also keeps track of new nodes and informs its neighbors about their existence. In static networks, network administrators or technicians decide which computer is reached via which way or cable. As radio networks undergo constant changes and low participation-thresholds are a vital part of the "Freifunk"-networks' foundation, this task has to be automated as much as possible. On a regular basis, every node sends out a broadcast, thereby informing all its neighbors about its existence. The neighbors then relay this message to their neighbors, and so on. This carries the information to every node in the network. In order to find the best route to a certain node, B.A.T.M.A.N. counts the originator-messages received and logs which neighbor the message came in through. Like distance-vector protocols, B.A.T.M.A.N. does not try to determine the entire route, but by using the originator-messages, only the packet's first step in the right direction. The data is handed to the next neighbor in that direction, which in turn uses the same mechanism. This process is repeated until the data reaches its destination. In addition to radio networks, B.A.T.M.A.N. can also be used with common wired cable connections, such as Ethernet. History The task was to create a protocol which was to be as easy, as small and as fast as possible. It seemed sensible to split the development in several phases and implement complex functions using an iterative process: Version one In the first phase, the routing algorithm was implemented and tested for its practicality and suitab
https://en.wikipedia.org/wiki/KCCV
KCCV (760 AM and 92.3 FM, Bott Radio Network) are radio stations broadcasting a Christian talk and teaching radio format to the Kansas City metropolitan area. Both stations are licensed to communities in Kansas, the AM station to Overland Park and the FM to Olathe. They are owned by the Bott Broadcasting Company. KCCV-AM-FM are the flagship stations for the Bott Radio Network. 760 KCCV's transmitter is off East Coal Mine Road in Kansas City, near Interstate 435. It is powered at 6,000 watts by day. But because AM 760 is a clear channel frequency, KCCV must reduce power at night to 200 watts to avoid interfering with Class A WJR Detroit. The transmitter for 92.3 KCCV-FM is in Olathe, off West 103rd Terrace. In addition to the main signal, 760 KCCV is also heard on two FM translators. K245CC 96.9 FM is licensed to Olathe, and K268CF 101.5 FM is licensed to Kansas City, Missouri. While all the Bott radio stations in the Kansas City radio market carry Christian talk and teaching programs, they are not fully simulcast. KCCV-FM 92.3 has a slightly different schedule than KCCV AM 760. The two translator stations at 96.9 and 101.5 simulcast AM 760. National religious leaders heard on KCCV and KCCV-FM include Chuck Swindoll, Jim Daly, Charles Stanley, John MacArthur, Alistair Begg and David Jeremiah. History The station that is today KCCV (AM) signed on the air in 1947 as KANS. It first broadcast at 1510 kHz and was licensed to Independence, Missouri. KANS was a daytimer, powered at 1,000 watts and required to go off the air at night. Richard Bott bought KANS in 1962, the first station in the Bott Radio Network. He switched it to a Christian radio format, calling it "Kansas City's Christian Voice." Bott said during a 55th anniversary broadcast in November 2017, that he felt a responsibility and calling to start a Christian radio station. KCCV-FM signed on the air on December 1, 1993. While it was not yet built, in 1992, the Bott Broadcasting Company bought the construction permit for $537,500. The plan was to have KCCV-FM air Christian programs around the clock, since the AM station was limited to daytime-only broadcasts. The call letters were chosen to represent "Kansas City's Christian Voice." In 1989, Bott Broadcasting was issued a construction permit to build a new AM station, licensed to Overland Park, at 760 kHz. KCCV (AM) went on the air in 1990, with Bott moving its programming from AM 1510 to AM 760. While 760 at first was also a daytime-only station, its lower position the AM dial and 6,000 watt transmitter gave it one of the best signals in the Kansas City radio market. A few years later, the Federal Communications Commission (FCC) granted KCCV permission to stay on the air at night, but with a reduced power of 200 watts. References External links CCV-FM Olathe, Kansas Moody Radio affiliate stations Radio stations established in 1989 Bott Radio Network stations CCV 1989 establishments in Kansas
https://en.wikipedia.org/wiki/Kotok-McCarthy
Kotok-McCarthy also known as A Chess Playing Program for the IBM 7090 Computer was the first computer program to play chess convincingly. It is also remembered because it played in and lost the first chess match between two computer programs. A pseudocode of the program is in Figure 11.15 of . Development Between 1959 and 1962, classmates Elwyn Berlekamp, Alan Kotok, Michael Lieberman, Charles Niessen and Robert A. Wagner wrote the program while students of John McCarthy at the Massachusetts Institute of Technology. Building on Alex Bernstein's landmark 1957 program created at IBM and on IBM 704 routines by McCarthy and Paul W. Abrahams, they added alpha-beta pruning to minmax at McCarthy's suggestion to improve the plausible move generator. They wrote in Fortran and FAP on scavenged computer time. After MIT received a 7090 from IBM, a single move took five to twenty minutes. By 1962 when they graduated, the program had completed fragments of four games at a level "comparable to an amateur with about 100 games experience". Kotok, at about age 20, published their work in MIT Artificial Intelligence Memo 41 and his bachelor's thesis. Match with ITEP In 1965, McCarthy, by then at Stanford University, visited the Soviet Union. A group using the M-2 computer at Alexander Kronrod’s laboratory at the Moscow Institute for Theoretical and Experimental Physics (ITEP) challenged him to a match. Kronrod considered Kotok-McCarthy to be the best program in the United States at the time. Although some of its faults were known in 1965 and were corrected in the Greenblatt program at MIT Project MAC, Kotok-McCarthy was no longer in development and was three years out of date. Georgy Adelson-Velsky, Vladimir Arlazarov, Bitman, Anatoly Uskov and Alexander Zhivotovsky won the correspondence match played by telegraph over nine months in 1966-1967. The Kotok-McCarthy program lost the match by a score of three to one and the first two games were played with a weak version. The ITEP group was advised by Russian chess master Alexander R. Bitman and three-time world champion Mikhail Botvinnik. According to the Computer History Museum, McCarthy "used an improved version" in 1967 but what improvements were made is unknown. Influence In 1967 Mac Hack VI by Richard Greenblatt with Donald E. Eastlake III became an honorary member of the United States Chess Federation when a person lost to it in tournament play in Massachusetts. Kronrod lost his directorship at ITEP and his professorship because of complaints from physics users that ITEP mathematics resources were being used for gaming. Mikhail Donskoy, Arlazarov and Uskov developed the ITEP program into Kaissa at the Institute of Control Sciences and in 1974, it became the world computer chess champion. Debate continued some forty years after the first test, about whether the Shannon Type A brute force approach, used by ITEP, is superior to the Type B selective strategy, used by Kotok-McCarthy. The success of programs suc
https://en.wikipedia.org/wiki/Time-sharing%20system%20evolution
This article covers the evolution of time-sharing systems, providing links to major early time-sharing operating systems, showing their subsequent evolution. The meaning of the term time-sharing has shifted from its original usage. From 1949 to 1960, time-sharing was used to refer to multiprogramming; it evolved to mean multi-user interactive computing. Time-sharing Time-sharing was first proposed in the mid- to late-1950s and first implemented in the early 1960s. The concept was born out of the realization that a single expensive computer could be efficiently utilized by enabling multiprogramming, and, later, by allowing multiple users simultaneous interactive access. In 1984, Christopher Strachey wrote he considered the change in the meaning of the term time-sharing to be a source of confusion and not what he meant when he wrote his original paper in 1959. Without time-sharing, an individual user would enter bursts of information followed by long pauses; but with a group of users working at the same time, the pauses of one user would be filled by the activity of the others. Similarly, small slices of time spent waiting for disk, tape, or network input could be granted to other users. Given an optimal group size, the overall process could be very efficient. Each user would use their own computer terminal, initially electromechanical teleprinters such as the Teletype Model 33 ASR or the Friden Flexowriter; from about 1970 these were progressively superseded by CRT-based units such as the DEC VT05, Datapoint 2200 and Lear Siegler ADM-3A. Terminals were initially linked to a nearby computer via current loop or serial cables, by conventional telegraph circuits provided by PTTs and over specialist digital leased lines such T1. Modems such as the Bell 103 and successors, allowed remote and higher-speed use over the analogue voice telephone network. Family tree of major systems See details and additional systems in the table below. Relationships shown here are for the purpose of grouping entries and do not reflect all influences. The Cambridge Multiple-Access System was the first time-sharing system developed outside the United States. System descriptions and relationships See also History of CP/CMS has many period details and sources. Timeline of operating systems Notes References History of software Time-sharing system evolution
https://en.wikipedia.org/wiki/Applied%20Data%20Research
Applied Data Research (ADR) was a large software vendor from the 1960s until the mid-1980s. ADR is often described as "the first independent software vendor". Founded in 1959, ADR was originally a contract development company. ADR eventually built a series of its own products. ADR's widely used major packages included: Autoflow for automatic flowcharting, which is often cited as one of the first commercial software applications; Roscoe, a remote job submission environment; MetaCOBOL, an extensible macro processor for the COBOL language; and The Librarian, for source-code management. The company's original office was in a small office building along U.S. Route 206 in Princeton Township, New Jersey. Later during the 1960s, they were part of a data center located on Route 206 across from Princeton Airport. The center was destroyed by fire in 1969 when a light plane crashed into it on approach to the airport, but there were no serious injuries among either the pilot or the workers in the building. In 1980, the company moved to a facility further along Route 206, that was just north of Princeton in Montgomery Township, New Jersey. First software patent ADR received the first patent issued for a computer program, a sorting system, on April 23, 1968. The program was developed by Martin Goetz. In this effort, ADR enlisted support of the Association of Data Processing Service Organizations (ADAPSO), which argued that being able to patent software innovations was vital to smaller companies being able to succeed in the market against larger companies, who would otherwise be able to imitate a product and bundle it as a free addition to their other offerings. ADR IBM lawsuit ADR instigated litigation in Federal Court against IBM with accusations that IBM was "retarding the growth of the independent software industry" and "monopolizing the software industry", leading to IBM's famous unbundling of software and services in 1969. Legal actions against IBM also had the support of ADAPSO. In 1970, ADR and Programmatics, a wholly owned subsidiary of ADR, received an out-of-court settlement of $1.4 million from IBM. IBM also agreed to serve as a supplier of Autoflow, which meant another potential $600,000 in revenues for ADR. The Librarian A popular ADR product was The Librarian, a version control system for IBM mainframe operating systems. In 1978, it was reported that The Librarian was in use at over 3,000 sites; by a decade later that number had doubled. Roscoe Roscoe (Remote OS Conversational Operating Environment, originally marketed as ROSCOE, was a software product for IBM Mainframes. It is a text editor and also provides some operating system functionality such as the ability to submit batch jobs similar to ISPF or XEDIT. The ability to support 200+ concurrent active users and still have low overhead is based on a Single address space architecture. The RPF (Roscoe Programming Facility) is a scripting language with string processing capabilit
https://en.wikipedia.org/wiki/Natarsha%20Belling
Natarsha Belling (born 29 May 1963) is an Australian journalist and television presenter. Belling has previously worked at Network 10 as a television presenter, news presenter and reporter. She spent over two decades with the company until being made redundant in August 2020. Early life and education Belling was born and raised in Mudgee in the Orana region of New South Wales. She often visits the town with her family and has philanthropic connections with the region. She was a boarder at St Vincent's College, Potts Point in Sydney. Belling attended Charles Sturt University in Bathurst, New South Wales and graduated with a Bachelor of Arts (Communications) degree. Career Prior to joining Network 10, Belling was a reporter with Prime Television in Orange, New South Wales, and was a presenter with the Australian Broadcasting Corporation in Darwin. She then joined 10, originally as a medical reporter. Network 10 In 2007, Belling became the national presenter of 10 Morning News, replacing Tracey Spicer. She read the news on Wednesdays to Fridays (with Ron Wilson presenting on Mondays and Tuesdays). From May 2009 through to 2012, Belling presented the bulletin from Monday to Wednesday. Belling was also a fill-in co-host for Kim Watkins on Ten's former morning show 9am with David and Kim. Also in May 2009, Belling replaced Bill Woods on 10 Weekend News, upon returning from maternity leave. In October 2011, Matt Doran joined Belling on a revamped version of 10 News Weekend, along with former Sports Tonight weekend presenter Rob Canning and meteorologist Magdalena Roze. In late 2012, 10 Weekend News was returned to a solo presented bulletin with Belling in the role. Canning also resigned from the network after 12 years and Roze also eventually resigned. In mid-2013 Hermione Kitson replaced Belling on 10 Weekend News, as Belling was promoted to co-present the new Wake Up breakfast program. In mid-2014, Wake Up was axed and Belling took leave and wasn't given a permanent position again for some time, filling-in and having various guest roles. Belling returned to 10 Weekend News in 2015. Her final 10 Weekend News bulletin was on 16 December 2018. In 2010, Belling presented brief news updates on The Circle, headlining the latest news on Wednesdays, Thursdays and Fridays. In July 2012, Belling was appointed Thursday and Friday news presenter on Breakfast which, due to poor ratings, was cancelled in December 2012. In July 2013, Belling was appointed co-host of Network 10's new breakfast show Wake Up with Natasha Exelby and James Mathison. Within a short time the program lost about 50% of its audience share by November 2013 rated lower than Breakfast, the show Ten cancelled the year before because of low ratings. Belling was a regular fill in for Sarah Harris on Studio 10 and Carrie Bickmore on The Project. She also had a short stint hosting The Sunday Project until she was replaced by Chris Bath. Belling's major Studio 10 fill-in stints were w
https://en.wikipedia.org/wiki/Windows%20%28disambiguation%29
Microsoft Windows is an operating system developed by Microsoft. Windows may also refer to: The plural of window, an opening in an opaque surface through which light can pass Computing Window (computing), a visual display area in a graphical user interface (GUI) Windows key, a key on some computer keyboards Arts and entertainment Film and television Windows (film), a 1980 erotic thriller Windows (TV series), a 1955 American anthology series Music Windows (country-psych band), a Los Angeles band founded in 2018 "Windows" (composition), a 1966 jazz standard by Chick Corea "Windows", a 1982 song on Vinyl Confessions by Kansas Windows (Jon Lord album), 1974 Windows (Lee Konitz and Hal Galper album), 1975 Windows (O'Donel Levy album), 1976 Windows (Charlie Daniels album), 1982 Windows (Amanda Somerville album), 2008 See also X Window System (often mis-named "X Windows"), a graphical user interface for many operating systems, especially Unix and Linux variants OpenWindows, an implementation used in Solaris from 1989 to 2002 DECwindows, an implementation for VMS/OpenVMS Window (disambiguation) Windowing (disambiguation) Win-OS/2
https://en.wikipedia.org/wiki/Computer%20Warriors
Computer Warriors was a toy line made by Mattel from 1989 to 1990. The storyline behind the toys involves a top-secret government computer which unleashes evil Virus troops. These troops, led by Megahert, hide in everyday household objects and have the goal of world domination by taking control of computers. The government computer then produces antiviruses, the Computer Warriors, led by Romm to battle the Virus troops. The Computer Warriors tagline ran "Expect the unexpected!" Unlike many toylines of the time, Computer Warriors did not feature a tie-in animated series. There was only a single pilot episode, Computer Warriors: The Adventure Begins, which was syndicated on September 23, 1990, and later released on VHS. Directed by Bill Kroyer (who also co-wrote with Carl Macek) it featured his signature style of integrating wireframe CGI with traditional hand-drawn animation. Both the toyline and the series-pilot bore the alternate title "Computer Force" in Europe and the UK. Computer Warriors: The Adventure Begins At a government facility named Parallax, a massive supercomputer core suffers a power surge due to “human error” of one its operators. The surge triggers a core dump, which unleashes four A.I. programs that are transformed into dangerous Viruses, which are ejected into the Bitstream (an analog for the Internet). These Viruses are Megahert, the leader and dominant A.I.; Indexx, his advisor who has access to information data; Null, a dimwitted lackey who follows Megahert without question; Minus, an unstable minion who thirsts for power. These four seek to return to Parallax to use its systems to seize the Bitstream and use it to take over all the world's computers. In response, the Parallax Core Processing Unit generates four unique “anti-viral” programs, to stop the Viruses before they can do any damage. These "Computer Warriors" are Romm, the command program and leader; Skannar, who can track the Viruses trail through the Bitstream; Gridd, a diagnostic program with skills to keep himself and the others operating, and Micronn, a statistical program which has access to the data banks at Parallax, to aid their mission. Riding on Circuit Gliders, the Computer Warriors chase the Viruses down, but the Viruses manage to escape by use of a Telecom Port; which explodes after they damage it. Romm believes them neutralized, but the Viruses survived by being transported into the physical world outside of computers: in a suburban family's home. The Telecom Port is repaired by Parallax—after the CPU detects Indexx accessing one of its data banks—and the Warriors head back to transfer through it, ending up in the same house. Both the Viruses and Warriors soon learn they can scan and adapt camouflage shells that look like ordinary, everyday objects; which allow them to continue their battle to either capture or destroy the other side. Eventually, after some skirmishes, Romm uses the home computer's disc drive to capture the Viruses on CD-Rom dis
https://en.wikipedia.org/wiki/Electronic%20Vaccination%20Data%20System
The Electronic Vaccination Data System (EVDS) is a digital platform developed by the National Department of Health of the South African government to manage the country's COVID-19 vaccination program. Enrolment is currently available for everyone over the age of 12 and the platform can also generate a digital vaccine certificate. Proof of vaccination Physical COVID-19 vaccination cards refer to the physical record cards that are issued to individuals who have received COVID-19 vaccinations in South Africa. These cards serve as official documentation of an individual's vaccination history and contain important identifying information, such as the individual's name and ID number, as well as the details of the vaccinations they have received. In addition, these record cards are designed to provide space for documentation of up to three doses of any COVID-19 vaccine that an individual may receive. This is because some COVID-19 vaccines require more than one dose to provide full immunity. Digital In SA, the COVID-19 Vaccine Digital Certificates, which feature a QR code for verification purposes, are also known as eVaccine Cards or digital vaccine certificates, which are issued to individuals who have received COVID-19 vaccinations. These certificates serve as official proof of vaccination and are stored in a digital format that can be accessed and verified online. The COVID-19 digital vaccine certificate is accessible through the EVDS, and individuals can download and print a copy of their certificate for personal use. See also COVID-19 vaccination in South Africa References Government services portals
https://en.wikipedia.org/wiki/Zoo%20Vet
Zoo Vet and Zoo Vet: Endangered Animals are computer games designed by Legacy Games. Gameplay In the games, the player controls a veterinarian and has to cure animals using medical tools. There are minigames alongside the main game. Reception Zoo Vet: Endangered Animals received a rating of 6.5/10 from IGN. Reviewer Lucas M. Thomas praised the large amount of animals within the game and the "solid" treatment process. He criticized the graphics, additionally stating that the stylus's controls were "often inconsistent", writing that it interfered with the gameplay. References 2004 video games Legacy Games games Life simulation games Medical video games Single-player video games Video games developed in the United States Video games set in zoos Windows games Windows-only games External links Zoo Vet on MobyGames
https://en.wikipedia.org/wiki/Infoterra%20Ltd
Infoterra is a provider of geospatial products and services. They support applications such as flood risk analysis, network planning, humanitarian relief and geological mapping. One of Infoterra's main areas of expertise is data acquisition and processing. One of its projects is processing data for ESA's ERS-1, ERS-2 and Envisat satellites using recent and historical data. It was launched in January 2001 and is a wholly owned subsidiary of EADS Astrium. It has offices in Leicester, Farnborough and Newcastle upon Tyne in the UK, Toulouse in France, Friedrichshafen in Germany, Barcelona and Madrid in Spain, Budapest in Hungary and an office in China. It has recently merged with SPOT-image in France and EADS Astrium and they are now known as Astrium Services’ GEO-Information Division. See also EADS Astrium External links SPOT-Infoterra website Infoterra Ltd UK website Infoterra SGSA Spain Infoterra Group website References Airbus Defence and Space Companies based in Leicester Science and technology in Leicestershire
https://en.wikipedia.org/wiki/MathCast
MathCast is a graphical mathematics equation editor. With this computer application, a user can create equations in mathematical notation and use them in documents or web pages. Equations can be rendered into pictures or transformed into MathML. MathCast features a Rapid Mathline, Equation List Management, and XHTML authoring. MathCast is a free software application distributed under the GNU General Public License. External links MathCast home page Sourceforge project page Formula editors
https://en.wikipedia.org/wiki/DWKI
DWKI (95.1 FM), broadcasting as 95.1 Kiss FM, is a radio station owned and operated by DCG Radio-TV Network (formerly known as ConAmor Broadcasting Systems). The station's studio is located at 1022 DCG Tower 1, Maharlika Hi-Way, Brgy. Isabang, Tayabas. Its transmission facilities are located at Mount Banoy, Talumpok Silangan, Batangas City. History The station was signed on in 1989 as 95.1 KI FM, with an Adult Contemporary format. In the early 2000s, it rebranded as 95.1 Kiss FM, with a Classic hits format. In July 2015, the station transferred from its long-time former studios in Broadcast Village, Brgy. Ibabang Dupay, Lucena, to the newly inaugurated 1022 DCG Tower 1 in Tayabas. Over the recent years, it has evolved into a Full service station, airing talk during mornings & parts of the afternoon, but retaining its music format throughout the rest of the day. 95.1 Kiss FM is known to broadcast at a very powerful reach that its signal even extends to Makati in the north, Quezon City, Boracay in the south and Naga City, Camarines Sur in the southeast via unclear signal and due to same conflict frequency of RW 95.1 FM (an FM radio station in Pampanga). Thus, it is also called as "South Luzon's FM station" by some. It is also the only FM station broadcasting out of Lucena City to reach the entire Quezon province, given the latter's vast territory. References External links Kiss FM broadcast stream link Kiss FM discussion board where even the station owner responded to some of the messages Radio stations in Lucena, Philippines Oldies radio stations in the Philippines Radio stations established in 1986 1986 establishments in the Philippines
https://en.wikipedia.org/wiki/Enterprise%20encryption%20gateway
An enterprise encryption gateway (EEG) is a layer 2 encryption device, similar to VPN, that allows for strong authentication and encryption for data across a wireless medium. Unlike a residential gateway, an enterprise gateway typically has both an LAN and WLAN interface, where the EEG acts a bridge between the two. The client devices have client-side authentication/encryption software, and the EEGs are the encryption termination point in the network. Benefits of these devices include offloading the encryption duties from the access points. Autonomous access points are placed downstream from the EEGs and may act as an 802.1X authenticator. References Wireless networking hardware Encryption devices
https://en.wikipedia.org/wiki/Dynamic%20priority%20scheduling
Dynamic priority scheduling is a type of scheduling algorithm in which the priorities are calculated during the execution of the system. The goal of dynamic priority scheduling is to adapt to dynamically changing progress and to form an optimal configuration in a self-sustained manner. It can be very hard to produce well-defined policies to achieve the goal depending on the difficulty of a given problem. Earliest deadline first scheduling and Least slack time scheduling are examples of Dynamic priority scheduling algorithms. Optimal Schedulable Utilization The idea of real-time scheduling is to confine processor utilization under schedulable utilization of a certain scheduling algorithm, which is scaled from 0 to 1. Higher schedulable utilization means higher utilization of resource and the better the algorithm. In preemptible scheduling, dynamic priority scheduling such as earliest deadline first (EDF) provides the optimal schedulable utilization of 1 in contrast to less than 0.69 with fixed priority scheduling such as rate-monotonic (RM). In periodic real-time task model, a task's processor utilization is defined as execution time over period. Every set of periodic tasks with total processor utilization less or equal to the schedulable utilization of an algorithm can be feasibly scheduled by that algorithm. Unlike fixed priority, dynamic priority scheduling could dynamically prioritize task deadlines achieving optimal schedulable utilization in the preemptible case. See also Earliest deadline first scheduling Least slack time scheduling References Scheduling algorithms
https://en.wikipedia.org/wiki/Boston%20Natural%20Areas%20Network
The Boston Natural Areas Network (BNAN) was a non-profit organization based in Boston, in the U.S. state of Massachusetts founded in 1977 , which worked to identify and protect significant natural areas described as urban wilds and greenways in the metropolitan area. After 7 years of being an affiliate of The Trustees of Reservations, in December 2014 BNAN officially merged with the Trustees, and became part of the Trustees Boston Region. Mission The Boston Natural Areas Network worked to preserve, expand and improve urban open space through community organizing, acquisition, ownership, programming, development and management of special kinds of urban land–urban wilds, greenways and community gardens. In all of its endeavors, BNAN was guided by local citizens advocating for their open spaces and assisting them to preserve and shape their communities. History Originally named the Boston Natural Areas Fund, the organization was founded by a small group of citizens in response to a Boston Redevelopment Authority report titled Boston Urban Wilds. The report cited nearly 150 unprotected sites of natural beauty, undeveloped areas and under-developed areas, including community gardens, each of environmental significance, all of which faced encroachment form a rapid expansion in development taking place. Within five years, the organization, working with local neighborhood groups, had begun acquiring properties and setting in place protection from future development. See also Emerald Necklace South End Lower Roxbury Open Space Land Trust The Trustees of Reservations References External links The Boston Natural Areas Network website Community gardening in Massachusetts Urban agriculture Community building Environmental organizations based in Massachusetts Non-profit organizations based in Boston 1977 establishments in Massachusetts
https://en.wikipedia.org/wiki/Fiwix
Fiwix is an operating system kernel based on the UNIX architecture and fully focused on being POSIX compatible. It is designed and developed mainly as a hobbyist operating system, but it also serves for educational purposes. It runs on the i386 hardware platform and is compatible with a good base of existing GNU applications. It follows the System V Application Binary Interface and is also Linux 2.0 System Call ABI mostly compatible The FiwixOS 3.2 operating system is a Fiwix distribution. It uses the Fiwix kernel, includes the GNU toolchain (GCC, Binutils, Make), it uses Newlib v4.2.0 as its C standard library, and Ext2 as its primary file system. Features Features according to the official website include: GRUB Multiboot Specification v1 compliant. Full 32bit protected mode non-preemptive kernel. POSIX compliant (mostly). For i386 processors and higher. Process groups, sessions and job control. Interprocess communication with pipes and signals. UNIX System V IPC (semaphores, message queues and shared memory). BSD file locking mechanism (POSIX restricted to whole file and advisory only). Virtual memory management up to 4GB (1GB physical only and no swapping yet). Linux 2.0 ABI system calls compatibility (mostly). ELF-386 executable format support (statically and dynamically linked). Round Robin based scheduler algorithm (no priorities yet). VFS abstraction layer. Ext2 filesystem support with 1KB, 2KB and 4KB block sizes. Minix v1 and v2 filesystem support. Linux-like Proc filesystem support (read only). ISO9660 filesystem support with Rock Ridge extensions. RAMdisk device support. Initial RAMdisk (initrd) image support. SVGALib based applications support. PCI local bus support. Virtual consoles support (up to 12). Keyboard driver with Linux keymaps support. Frame buffer device support for VESA VBE 2.0+ compliant graphic cards. Serial port RS-232 driver support. Remote serial console support. QEMU Bochs-style debug console support. Basic implementation of a Pseudo-Random Number Generator. Floppy disk device driver and DMA management. IDE/ATA hard disk device driver. IDE/ATA ATAPI CD-ROM device driver. External links Hobbyist operating systems Unix variants
https://en.wikipedia.org/wiki/Terkel%20in%20Trouble
Terkel in Trouble () is a 2004 Danish adult computer-animated musical comedy film starring Anders Matthesen. It is the first Danish computer animated feature film. The film is an adaptation of Matthesen's 2001 comedy album Arne fortæller... Terkel i knibe. Anders Matthesen voices almost all characters in the film. Terkel in Trouble was well received, and was a financial success, earning 17.9 million DKK on a 10 million DKK budget and becoming the seventh highest grossing film in Denmark in 2004. It received multiple accolades, including the Audience Award at the 22nd Robert Awards. Terkel in Trouble has been dubbed into multiple languages, including Norwegian, Swedish, German, Italian and Ukrainian. An English dub of the film produced by Anvil Studios was released by Eureka Entertainment in the United Kingdom on 1 September 2006. On 3 February 2017, the film was released in the United States by distribution company Indican Pictures as The Trouble with Terkel, featuring an American cast. This version of the film received negative reviews. In 2019, a Danish stage show adaptation of the film premiered, called Terkel – The Motherfårking Musical. Anders Matthesen and director Thorbjørn Christoffersen would later collaborate on Checkered Ninja, a film featuring some of the characters from Terkel in Trouble. Plot Terkel is a Danish boy attending 6th grade at a secondary school together with his best friend Jason, who carries an iron pipe with him at all times. One day during recess, Terkel and Jason sit on a bench playing on their Game Boy. They are approached by a man in a green sweater who tells Terkel that he sat on a spider. Terkel shakes it off, saying his jeans can be easily washed. The man, named Gunnar (Justin in the UK dub, Dick Balsac in the US dub) introduces himself as the school's new substitute teacher and promptly leaves. Later during Terkel's Danish class, Gunnar walks in. He informs the class that the previous teacher, Yvonne, has been fatally run over by a car. The class cheers at the news, and Gunnar becomes the new class teacher. Terkel's parents Beate (Sheila in the UK dub) and Leon get married. During the wedding reception, two bullies from Terkel's school, Sten (Nigel in the English dubs) and Saki, manipulate Terkel into stealing beer for them. When Terkel's short-tempered, alcoholic and violent grand-uncle Stewart Stardust notices, he beats up the bullies. Sten and Saki blame Terkel, and proceed to bully him for it, for which Terkel receives little help. One day an overweight girl in the class, Fede Dorit ("Fat Doris") approaches Terkel with a love letter. Sten and Saki notice, and start teasing the two of them, calling them a couple. Terkel feels conflicted on whether to defend Dorit or to go along with the bullies. He goes with the latter, saying he would never "love that fat cow", and Dorit gets so upset that she commits suicide by jumping out the window on the fourth floor. After this incident, Sten and Saki become much c
https://en.wikipedia.org/wiki/Grandma%20Got%20Run%20Over%20by%20a%20Reindeer%20%28film%29
Grandma Got Run Over by a Reindeer is a 2000 animated Christmas television special directed by Phil Roman. The special was first released on home video in October, and then aired on The WB network on December 21, 2000. The title and story are based on the 1979 novelty song of the same name. The film subsequently airs on The CW (the successor to The WB) and AMC, and also aired on Cartoon Network, Boomerang, and Freeform. Plot Jake Spankenheimer's grandmother owns a small general store in the town of Cityville. The store happens to be the only piece of property not owned by Austin Bucks, the wealthiest man in town, whose corporation specializes in making Christmas easier and less involved for the town's busy residents. Grandma tells Austin that his method of trying to make Christmas easier is not really for the best and refuses to sell the store. Cousin Mel, who plans to sell the store anyway, sabotages Grandma's fruitcake by adding an ingredient with hopes that they won't sell. Jake and his grandparents are the only ones in the family to believe in Santa Claus, further supported by them witnessing the film's signature accident occurring. The next morning, Grandma is indeed missing and the police find an imprint of her in the snow, along with her belongings. Cousin Mel finds a letter that she quickly hides from the others. Nine months pass without Grandma and the store's business drops. During this time, Cousin Mel comes up with a new plan to sell the store to Austin by tricking Grandpa into giving her his power of attorney. When Jake objects, Austin agrees to give him another week in order to find Grandma before going through with the deal. Adamant in his belief that Santa ran over her, Jake emails Santa, and soon Quincy, Santa's head elf, comes to take Jake to the North Pole, explaining Santa took Grandma back to the North Pole for medical treatment, but she developed amnesia from the accident, and until receiving Jake's e-mail Santa had no idea of who she was. After Jake explains the situation, Santa, Quincy, and Grandma agree to go with him to stop the deal. When they arrive in Cityville, however, Cousin Mel and her attorney, I.M. Slime, quickly trick Grandma into going with them. After Santa explains to Austin what has happened, Jake and Quincy discover that Grandma has gone missing once again. Cousin Mel uses the opportunity to accuse Santa of being behind her disappearance and put him on trial for kidnapping, leaving the scene of an accident, and "sleighicular negligence". Cousin Mel and I.M. Slime then plot to sue him, believing that someone who can pay for billions of presents must be incredibly wealthy. Three months later, Daphne suspects that Cousin Mel may have been involved in Grandma's second disappearance, and Jake and Quincy follow her to a cabin in the woods where she and I.M. Slime are keeping Grandma out of sight. They rescue Grandma and find Santa's letter explaining what happened, that Cousin Mel had found at the site of
https://en.wikipedia.org/wiki/Idle%20scan
An idle scan is a TCP port scan method for determining what services are open on a target computer without leaving traces pointing back at oneself. This is accomplished by using packet spoofing to impersonate another computer (called a "zombie") so that the target believes it's being accessed by the zombie. The target will respond in different ways depending on whether the port is open, which can in turn be detected by querying the zombie. Overview This action can be done through common software network utilities such as nmap and hping. The attack involves sending forged packets to a specific machine target in an effort to find distinct characteristics of another zombie machine. The attack is sophisticated because there is no interaction between the attacker computer and the target: the attacker interacts only with the "zombie" computer. This exploit functions with two purposes, as a port scanner and a mapper of trusted IP relationships between machines. The target system interacts with the "zombie" computer and difference in behavior can be observed using different "zombies" with evidence of different privileges granted by the target to different computers. The overall intention behind the idle scan is to "check the port status while remaining completely invisible to the targeted host." Origins Discovered by Salvatore Sanfilippo (also known by his handle "Antirez") in 1998, the idle scan has been used by many black hat "hackers" to covertly identify open ports on a target computer in preparation for attacking it. Although it was originally named dumb scan, the term idle scan was coined in 1999, after the publication of a proof of concept 16-bit identification field (IPID) scanner named idlescan, by Filipe Almeida (aka LiquidK). This type of scan can also be referenced as zombie scan; all the nomenclatures are due to the nature of one of the computers involved in the attack. TCP/IP basics The design and operation of the Internet is based on the Internet Protocol Suite, commonly also called TCP/IP. IP is the primary protocol in the Internet Layer of the Internet Protocol Suite and has the task of delivering datagrams from the source host to the destination host solely based on their addresses. For this purpose, IP defines addressing methods and structures for datagram encapsulation. It is a connectionless protocol and relies on the transmission of packets. Every IP packet from a given source has an ID that uniquely identifies IP datagram. TCP provides reliable, ordered delivery of a stream of bytes from a program on one computer to another program on another computer. TCP is the protocol that major Internet applications rely on, such as the World Wide Web, e-mail, and file transfer. Each of these applications (web server, email server, FTP server) is called a network service. In this system, network services are identified using two components: a host address and a port number. There are 65536 distinct and usable port numbers per host. Mos
https://en.wikipedia.org/wiki/Bromine%20trifluoride%20%28data%20page%29
This page provides supplementary chemical data on bromine trifluoride. Material Safety Data Sheet The handling of this chemical may require substantial safety precautions. It is highly recommended you obtain the Material Safety Datasheet (MSDS) for this chemical from a reliable source such as AirGas, and follow its directions. Structure and properties Thermodynamic properties Spectral data References Chemical data pages Chemical data pages cleanup
https://en.wikipedia.org/wiki/Bromine%20pentafluoride%20%28data%20page%29
This page provides supplementary chemical data on bromine pentafluoride. Material Safety Data Sheet The handling of this chemical may incur notable safety precautions. It is highly recommended that you seek the Material Safety Datasheet (MSDS) for this chemical from a reliable source such as Matheson Trigas, and follow its directions. Structure and properties Thermodynamic properties Spectral data References Chemical data pages Chemical data pages cleanup
https://en.wikipedia.org/wiki/Calcium%20hydroxide%20%28data%20page%29
This page provides supplementary chemical data on calcium hydroxide. Material Safety Data Sheet The handling of this chemical may incur notable safety precautions. It is highly recommend that you seek the Material Safety Datasheet (MSDS) for this chemical from a reliable source and follow its directions. SIRI Science Stuff Structure and properties Thermodynamic properties Spectral data References Chemical data pages Chemical data pages cleanup
https://en.wikipedia.org/wiki/X-Men%3A%20Wolverine%27s%20Rage
X-Men: Wolverine's Rage is a side-scrolling video game for the Game Boy Color. Wolverine's Rage follows the story of Wolverine as he chases down Lady Deathstrike, Sabretooth, and Cyber. Plot Lady Deathstrike discovers schematics allowing her to build a weapon that will melt Wolverine's adamantium skeleton. Lady Deathstrike decides to go ahead with the machine and Wolverine has to do whatever it takes to track her down and stop her. Gameplay Gameplay in Wolverine's Rage is relatively simple and repetitive. There are twenty levels in the game, grouped into chapters of five with a boss battle at the end of each one. If Wolverine is hurt he can regenerate his health back. The objective on most of the levels is to run through them before time runs out, battling enemies on the way. The player uses a password system in order to continue the game. Reception The game was met with mixed reviews, as GameRankings gave it 56%. References External links 2001 video games Game Boy Color games Action games Superhero video games Video games set in New York City Video games set in Tokyo Game Boy Color-only games Digital Eclipse games Single-player video games Activision games Video games developed in the United States
https://en.wikipedia.org/wiki/Nullary%20constructor
In computer programming, a nullary constructor is a constructor that takes no arguments. Also known as a 0-argument constructor, no-argument constructors or default constructor. Object-oriented constructors In object-oriented programming, a constructor is code that is run when an object is created. Default constructors of objects are usually nullary. Java example public class Example { protected int data; /* Nullary constructor */ public Example() { this(0); } /* Non-nullary constructor */ public Example(final int data) { this.data = data; } } Algebraic data types In algebraic data types, a constructor is one of many tags that wrap data. If a constructor does not take any data arguments, it is nullary. Haskell example -- nullary type constructor with two nullary data constructors data Bool = False | True -- non-nullary type constructor with one non-nullary data constructor data Point a = Point a a -- non-nullary type constructor with... data Maybe a = Nothing -- ...nullary data constructor | Just a -- ...unary data constructor References Method (computer programming) Articles with example Haskell code Articles with example Java code
https://en.wikipedia.org/wiki/A%20Man%20on%20Death%20Row
"A Man on Death Row" is the seventh episode of the first season of the television series, Bones. Originally aired on November 22, 2005, on FOX network, the episode is written by Noah Hawley and directed by David Jones. The plot focuses on Dr. Temperance Brennan and FBI Special Agent Seeley Booth's investigation into a seven-year-old murder, of which death-row prisoner Howard Epps is accused. Booth and Brennan are given a deadline to prove Epps' innocence or guilt before his imminent execution. Summary The episode opens with Dr. Temperance Brennan and Special Agent Seeley Booth arguing about Booth's refusal to approve Brennan's application to be allowed to carry a concealed weapon as she was formerly charged with a felony (despite not being convicted). In Booth's office, they meet Amy Morton, who tells Booth she is the new lawyer of death-row-inmate Howard Epps and asks for his help to prove the innocence of Epps, who is scheduled to be executed in 30 hours. Booth was the investigating officer in the murder case of April Wright, whom Epps is accused of killing. After visiting Epps in prison, Booth is unconvinced of Epps' innocence but asks Brennan to look over the case as a personal favor. With the help of Dr. Jack Hodgins and her assistant Zack Addy, Brennan examines the evidence of the case. They soon find incongruities in the evidence presented by the prosecution. After being sent by Brennan to photograph the surrounding area of the crime scene, Zack suddenly realizes the significance of the numbers that were found with the victim. They appeared to be a phone number but they actually correlated to the time and place of a meeting the victim had on the night of her murder. Hodgins determines the victim may have been moved from the crime scene before she was deposited at the place where she was found. Brennan declares that they need to exhume the body to determine where the victim was killed. Meanwhile, Booth visits the victim's family and their lawyer, David Ross, whom Booth finds suspicious. Based on the new evidence found from the exhumed body, the team is able to locate the original crime scene. In addition with a visual confirmation of the pubic hair to be of David Ross, the team begin to have doubts about the guilt of the inmate. However, the judge rules that the evidence is insufficient to postpone the execution. Booth interrogates Ross, who claims that the victim had run away after they had engaged in sexual intercourse and that he had waited for her to return for two hours before leaving the car park. After FBI Deputy Director Samuel Cullen agrees to grant the resources Booth and Brennan need to find the evidence they need from the marsh, they discover more bodies in the marsh, which convinces Booth that they had the right guy all along. Epps was the killer and he had manipulated his defense lawyer, Booth and Brennan to discover the remains of his other victims to prolong his life as the authorities must now open investigations into
https://en.wikipedia.org/wiki/The%20Girl%20in%20the%20Fridge
"The Girl in the Fridge" is the eighth episode of the first season of the television series, Bones. Originally aired on November 29, 2005 on FOX network, the episode is written by Dana Coen and directed by Sanford Bookstaver. The episode features FBI Special Agent Seeley Booth and Dr. Temperance Brennan's investigation into the human remains of a teenage girl found inside a refrigerator and a subplot concerning the relationship between Brennan and her former lover and professor, Michael Stires. Summary Dr. Brennan's former professor from Northwestern University, Dr. Michael Stires, drops by for a visit. The two also have a casual sexual relationship which Brennan assumes is not complicated. She also thinks that they have a healthy professional rivalry. Both these assumptions are tested in a new case that starts with the decayed remains found in an old refrigerator. The remains belong to Maggie Schilling, a 19-year-old dancer who was estranged from her family. She was briefly held for ransom 11 months earlier before the negotiations suddenly terminated. Dr. Jack Hodgins and Brennan's assistant, Zack Addy, determine that the victim had hyperparathyroidism, which is confirmed by the victim's former doctor. The doctor discloses to Booth and Brennan that his former office manager, Mary Costello, had supplied the victim with drugs. The investigation swiftly leads to two likely suspects, Mary Costello and her husband, when Booth sees their new refrigerator and later finds handcuffs in their basement that Brennan suspects may have caused the stress fractures on the victim's wrist. The twist in the tale occurs when Michael is recruited by the defense as an expert witness. The trial boils down to a contest between the cold factual style of Bones and the charming layman approach of Michael. The prosecution's jury consultant highlights this standoff as a "choice between reality and perception", and she goes on to state that perception wins cases. In the first few rounds, the expert witness for defense has the upper hand with his charming layman approach and his smear campaign against Brennan. Booth decides to bring out an emotional testimony from Brennan by asking the prosecution to bring up her missing parents and the reason for her being a forensic anthropologist. This breaks the proverbial ice between the jury and Brennan, leading to a conviction by the jury. Michael tries to reconcile with Brennan, who ignores him. Booth apologizes to Brennan for breaching her privacy but states that it was necessary for their case. Seeing Brennan's sadness, Angela Montenegro tries to invite her for a drink but Brennan declines. Booth brings Brennan to another crime scene, where he apologizes to her again. Brennan accepts his apology, saying that she would have done what he did in the same situation. Music The episode featured Hold Tight by Mark Geary. Production details In chronological order, "The Girl in the Fridge" was written and filmed after "The Man in the W
https://en.wikipedia.org/wiki/The%20Man%20in%20the%20Fallout%20Shelter
"The Man in the Fallout Shelter" is the ninth episode of the first season of the television series, Bones. Originally aired on December 13, 2005 on FOX network, the episode is written by Hart Hanson and directed by Greg Yaitanes. The plot features FBI Special Agent Seeley Booth, Dr. Temperance Brennan and the rest of her team being forced to remain at the Jeffersonian Institute over the Christmas holiday. Summary This is a holiday episode based on events happening on Christmas Eve. On December 23, Booth brings in the skeletal remains of a man found dead in a bomb shelter discovered recently. Everyone is in Christmas-Eve mode with a company party going on upstairs. Bones and the rest of the team start investigating the dead man's story when Zack triggers the bio-hazard alarm while cutting through the skeleton. The lab is shut down for containment and every one is under quarantine based on the discovery of a fungus causing Valley fever (even though it's not actually contagious). The prospect of spending the two mandatory quarantine days away from friends and family makes everyone morose. Booth develops a side-effect of euphoria due to drugs given to immunize them from the disease. The case, meanwhile, progresses into the discovery of a love affair between the dead man, Lionel Little, who worked as a lease inspector for a company called Silver Cloud Petroleum and had a coin collection, and his black cleaning lady (Ivy Gillespie) in the late 1950s. Due to the oppressive racial climate in the US, they planned to emigrate to France. Lionel tried to sell his valuable coin collection to a shifty con artist who murdered Lionel to procure the collection (worth approximately $8000 at the time). An emotional segment in the show occurs when everyone gets to meet their family and friends with Christmas carols crooning in the background. We find out that Booth has a 4-year-old son named Parker (because his mother didn’t marry him, his parental rights are vague), and that Billy Gibbons from ZZ Top is Angela's father. With everyone else in the lab celebrating Christmas with secret Santa gifts, Bones decides to track down Ivy and reveal the lethal mystery behind Lionel's disappearance to her. Bones does this on Angela's advice. Angela says that Bones must find Ivy so she can have the closure that Temperance herself never had (her parents disappeared when she was 15, and no information has been uncovered regarding their whereabouts). Bones, listening to her friend, goes to her office and starts making phone calls trying to locate Ivy Gillespie. Finally, on Christmas morning, she finds Ivy’s granddaughter who provides information to contact her. Bones asks Booth to look at the penny they found in Lionel’s pocket. She scanned it to find out that it was actually a bronze penny minted in 1943, unlike almost all pennies from that time that were made of zinc clad steel to conserve copper for World War II. Today, there are just 12 of them and it is worth over $100,0
https://en.wikipedia.org/wiki/Link%20Layer%20Topology%20Discovery
Link Layer Topology Discovery (LLTD) is a proprietary link layer protocol for network topology discovery and quality of service diagnostics. Microsoft developed it as part of the Windows Rally set of technologies. The LLTD protocol operates over both wired (such as Ethernet (IEEE 802.3) or power line communication) as well as wireless networks (such as IEEE 802.11). LLTD is included in Windows 7, Windows Vista and Windows 10. It is used by their Network Map feature to display a graphical representation of the local area network (LAN) or wireless LAN (WLAN), to which the computer is connected. Windows XP does not contain the LLTD protocol as a standard component and as a result, Windows XP computers do not appear on the Network Map unless the LLTD responder is installed on Windows XP computers. LLTD is available for download for 32-bit editions of Windows XP with Service Pack 2 (as a publicly released update) and for Windows XP with Service Pack 3 (as a hotfix by request). LLTD Responder was not released for Windows XP Professional x64 Edition. A 2006 fall update for the Xbox 360 enabled support for the LLTD protocol. Being a link layer (or OSI Layer 2) implementation, LLTD operates strictly on a given local network segment. It cannot discover devices across routers, an operation which would require Internet Protocol level routing. Link Layer Topology Discovery in Windows Vista consists of two components. The LLTD Mapper I/O component is the master module which controls the discovery process and generates the Network Map. Appropriate permissions for this may be configured with Group Policy settings. It can be allowed or disallowed for domains, and private and public networks. The Mapper sends discovery command packets onto the local network segment via a raw network interface socket. The second component of LLTD are the LLTD Responders which answer Mapper requests about their host and possibly other discovered network information. In addition to illustrating the layout of a network with representative icons for the hosts and interconnecting lines, each device icon may be explored to produce a popup information box summarizing important network and host parameters, such as MAC address and IP address (both IPv4 and IPv6). Icons are labeled with the hostnames (or first component of their fully qualified domain names), or a representative name of the function of the device, e.g., "gateway". If the device has reported the presence of a management Web interface, clicking on the icon will open a HTTP session to the host. The LLTD responder for Windows XP only supports reporting of IPv4 addresses and not IPv6. A royalty free Linux sample implementation of the LLTD responder is available from Microsoft as part of the Windows Rally Development Kit. Using LLTD specifications requires signing a Microsoft Windows Rally license agreement. There also exists a Perl implementation, using Net::Frame, available via CPAN. See also Windows Vista networking te
https://en.wikipedia.org/wiki/PTK%20Toolkit
PTK is a 2D rendering engine and SDK developed by Phelios, Inc., that allows computer programmers create downloadable games in C++ that are portable to Microsoft Windows and Mac OS X. It is currently used by about 60 downloadable games It is mainly known for powering breakaway casual hits from funpause and Big Fish Games, such as Azada, Atlantis, Atlantis Sky Patrol, Mystic Inn and Fairies. Design philosophy PTK was designed for programmers to enjoy basic-like ease of programming using the C++. It abstracts rendering, input and I/O and removes the need for directly setting up complex renderers such as DirectX or OpenGL. PTK uses a "2D in 3D" paradigm. While it is a 2D engine, it uses 3D acceleration for rendering, enabling very good, bicubic filtered rendering of scaled, rotated sprites and per-pixel alpha blending at no expense of computing time. A game such as Mystic Inn make extensive use of PTK's rendering capabilities. References External links PTK homepage at Phelios Inc Showcase of over 60 games using PTK Article on apple.com about game development environments, including PTK Icee.usm.edu Krysztofiak Patrice Notes Network: Trognon Patrice Linux: Jean-Yves Lamoureux Mac OS X HID programming: Matt Gray TrueType, Resource packing, optimization, bug fixes: Emmanuel Marty Computer libraries C++ libraries
https://en.wikipedia.org/wiki/Discovery%20Turbo
Discovery Turbo (previously known as Discovery Turbo MAX in Australia) is a pay television channel devoted to programming about transport. It is similar to Discovery Velocity and Motor Trend. It was also briefly available as an on-demand service in the US in the late 2000s. Feeds Discovery Turbo Latin America The channel launched in Latin America in 2005. Discovery Turbo UK It launched on 1 March 2007, replacing Discovery Wings and Discovery Kids. Discovery Turbo Asia Discovery Turbo launched in Southeast Asia on September 22, 2008, replacing Discovery Real Time. Discovery Turbo Asia ended its broadcast on July 7, 2014 as it has been rebranded to DMAX on the same day. Discovery Turbo India The channel launched on January 28, 2010. From March 1, 2021 the channel started to follow a timeshifted version of DMAX Asia's schedule. Discovery Turbo Australia In Australia, the channel first launched in 2008 on SelecTV, replacing Discovery Real Time which previously launched on 15 March 2007. The channel ceased being available in late 2010 following SelecTV's closure of its English service. A , named Discovery Turbo MAX, launch on 15 November 2009 on the Foxtel platform. At launch, the channel was also available on a two-hour delay, with the time shift channel called Discovery Turbo MAX +2. In May 2015, the channel rebranded as Discovery Turbo, seeing it change to a similar branding to that used by other Discovery Turbo channels around the world. Discovery Turbo New Zealand In New Zealand, the channel is known as Discovery Turbo, with similar branding and content to other Discovery Turbo channels around the world. It launched on 1 November 2015 on channel 75 exclusively to Sky Television. DTX in Europe In Europe, the channel is known as DTX (formerly known Discovery Turbo Xtra), with similar branding and content to other Discovery Turbo channels around the world. It launched on 17 September 2013 in Poland, replaced Discovery World, and later roll-out in Turkey and Eastern Europe. However, later in Poland, in second half of November 2016, DTX replaced Discovery Turbo Xtra. Warner Bros. Discovery EMEA has announced that DTX, along with Discovery Science, will cease broadcasting on 1 January 2024. Discovery Turbo Japan The channel launched on 30 January 2018. Programming UK and Ireland A Bike is Born A Racing Car is Born American Chopper Auto Trader Bangla Bangers Beetle Crisis British Biker Build-Off Campervan Crisis Car That Rocks with Brian Johnson Chasing Classic Cars Chop Shop: London Garage Desert Car Kings Fast N' Loud Fifth Gear The Garage The Great Biker Build-Off Inside West Coast Customs Martin Shaw: Aviators Monster Garage Overhaulin' Street Customs Thunder Races Warlock's Rising World's Toughest Drive Wreck Rescue Asia (2008–2014), Australia and New Zealand (2008-2019) Check out the Australian & NZ Discovery Website Airplane Repo American Chopper A Bike Is Born American Trucker All Gir
https://en.wikipedia.org/wiki/Excelsis%20Dei
"Excelsis Dei" is the eleventh episode of the second season of the science fiction television series The X-Files. It premiered in the United States on the Fox network on December 16, 1994. It was written by Paul Brown and directed by Stephen Surjik. The episode is a "Monster-of-the-Week" story, unconnected to the series' wider mythology. "Excelsis Dei" earned a Nielsen household rating of 8.9, being watched by 8.5 million households in its initial broadcast. The episode received mixed reviews from television critics; although some complimented the episode's effects, others were critical of the way the show handled rape. The show centers on FBI special agents Fox Mulder (David Duchovny) and Dana Scully (Gillian Anderson) who work on cases linked to the paranormal, called X-Files. Mulder is a believer in the paranormal, while the skeptical Scully has been assigned to debunk his work. In the episode Mulder and Scully are called in to investigate a claim of rape made by a nurse at a nursing home; the case falls into the purview of the X-Files because the assailant appears to have been a disembodied spirit. Surjik personally asked if he could direct the episode because he was a fan of the series; this was his only credit for the series. Filming the episode was difficult for the cast and crew due largely to the fact that the script arrived for the cast and crew to film only two days in advance. Other issues arose because of technical reasons; one scene required flooding a hallway with 3,300 gallons of water. Many of the scenes were filmed at Riverview Hospital, a mental health facility located in Coquitlam, British Columbia. Plot Agents Fox Mulder (David Duchovny) and Dana Scully (Gillian Anderson) are called to the Excelsis Dei private nursing home in Worcester, Massachusetts in order to investigate a nurse's claim that she was raped by an invisible entity. Severely bruised, Michelle Charters (Teryl Rothery) claims that she knows who was responsible and names the attacker as Hal Arden, an elderly resident of Excelsis Dei who suffers from Alzheimer's Disease. When questioned, Arden admits that he made sexual overtures to Michelle, but claims that it was harmless and that he is too elderly to have done anything. In turn, the hospital's administrator believes that Michelle has manufactured the rape allegation in order to extort money from the nursing home. As Mulder and Scully investigate, they discover that many of the facility's Alzheimer's patients have shown significant improvement over their condition, a development that is not medically possible. Their doctor, Grago, attributes the patients' improvement to regimen he has applied using Deprenyl, an experimental drug that has so far shown negligible affect in patient studies. Before Mulder and Scully can make much headway, Hal Arden dies unexpectedly while his roommate, Stan Phillips, stands by, complicating the investigation further. Worried about her father, Stan Phillips' daughter arrives to
https://en.wikipedia.org/wiki/The%20Woman%20at%20the%20Airport
"The Woman at the Airport" is the tenth episode of the first season of the television series, Bones. Originally aired on January 25, 2006 on Fox network, the episode is written by Teresa Lin and directed by Greg Yaitanes. While the series takes place mostly in Washington, D.C., this episode is also set in Los Angeles, California, featuring FBI Special Agent Seeley Booth and Dr. Temperance Brennan's investigation into a woman whose remains were found at several locations in the Los Angeles International Airport. Summary The well preserved remains of an Iron Age specimen piques the professional interest of everyone in the lab. While Dr. Brennan and Zach start working on it, Booth brings in another case, skeletal remains of a victim that are dispersed around Los Angeles airport. Booth triumphs over Brennan's refusal to join the investigation in favor of the more scholarly forensics by dangling the attraction of a high profile Hollywood case to Brennan's superior, Dr. Goodman. Initial investigation reveals that the bones were scattered by coyotes to everyone's mild surprise. The Special Agent in Los Angeles, Tricia Finn, pesters Brennan about the upcoming movie based on her novel and tries to promote her screenplay talents. The dead person turns out to be a high profile call girl with a penchant for plastic surgery for beautification. The pervasive bone restructuring of the face render facial reconstruction impossible. Brennan is also distressed by the culture of physical insecurity, leading to an industry of plastic surgery in the city. The circumstantial evidence points to two surgeons who operated on the dead woman. But the ending reveals that it was one of the call girl's colleagues, Leslie Snow, who murdered her out of jealousy. Meanwhile, a standoff between Dr. Hodgins and Dr. Goodman is resolved when Hodgins discovers that the intentions behind avoiding forensic investigations on the Iron Age skeleton is more out of deference to the well preserved body and less due to administrative jurisprudence. Music The episode featured the following music: Ooh La La - Goldfrapp Precious - Depeche Mode Show Your Style - Ferry Corsten Free Los Angeles - Baby I'm Slipping Away - Messy Cultural references In this episode, the call girl Booth interrogated mentions the murder victim's boyfriend, Nick, had a role as a terrorist in 24, another Fox produced drama. In reality, the only credited actors with the name Nick in 24 are Nick Jameson, who portrayed a Russian president, and Nick Offerman, who portrayed a racist that was arrested. When Temperance asks to drive the rental car in California, she says that she is an excellent driver, and Booth responds, "OK, Rain Man." Conception According to the writer of the episode, Teresa Lin, the main idea of the episode is "what makes up identity" and "how we are all, to some degree, caught up in the world of youth, beauty and perception." Lin expresses that many reality television shows have illustrated that
https://en.wikipedia.org/wiki/List%20of%20diplomatic%20missions%20of%20Antigua%20and%20Barbuda
This is a list of diplomatic missions of Antigua and Barbuda. Antigua and Barbuda's diplomatic network does not extend to any neighbouring Caribbean countries. Its embassy and mission to the European Union in Brussels and its embassy in Morocco is shared with other East Caribbean states. Africa Rabat (Embassy) Americas Toronto (Consulate-General) Havana (Embassy) Washington, D.C. (Embassy) Miami (Consulate-General) New York City (Consulate-General) Asia Amman (Embassy) Beirut (Embassy) Dubai (Economic Office) Europe Brussels (Embassy) Athens (Embassy) Madrid (Embassy) London (High Commission) Multilateral organisations New York (Permanent Mission) Gallery See also Foreign relations of Antigua and Barbuda List of diplomatic missions in Antigua and Barbuda References External links Government of Antigua and Barbuda Embassy of Antigua and Barbuda in Madrid - His Excellency Dr. Dario Item is the Head of Mission. Honorary Consulate General of Antigua and Barbuda in the Principality of Monaco Antigua & Barbuda Official Business Hub Diplomatic missions Antigua and Barbuda
https://en.wikipedia.org/wiki/Irresistible%20%28The%20X-Files%29
"Irresistible" is the thirteenth episode of the second season of the American science fiction television series The X-Files. It premiered on the Fox network on January 13, 1995. The episode was written by series creator Chris Carter, directed by David Nutter, and featured the first of two guest appearances by Nick Chinlund as the death fetishist killer Donnie Pfaster. The episode is a "Monster-of-the-Week" story, a stand-alone plot which is unconnected to the series' wider mythology. The episode was viewed by 8.8 million people upon its first broadcast, and received positive reviews, with much praise to Chinlund's performance as the antagonist. The show centers on FBI special agents Fox Mulder (David Duchovny) and Dana Scully (Gillian Anderson) who work on cases linked to the paranormal, called X-Files. In the episode, Mulder and Scully investigate a death fetishist who begins kidnapping and killing women to satisfy his obsession. Scully, still recovering from her earlier abduction, is soon overcome with posttraumatic stress disorder. "Irresistible" is one of the few in the series that was intended to have no paranormal elements to it. Initially, the script called for Donnie Pfaster to be a necrophiliac, but the idea was soon rejected by the Fox Broadcasting Company for being "unacceptable for broadcast standards". Pfaster was eventually brought back in the season seven episode "Orison", where his brief appearances in the guise of a demon were further explored. Plot In St. Paul, Minnesota, a funeral is held for a young girl. The ceremony is observed by Donnie Pfaster, the eerie assistant director for the funeral home. Later that night, as the girl's body is being stored for burial the following day, Pfaster's boss finds him cutting off the corpse's hair. Pfaster is promptly fired. Some time later, Fox Mulder and Dana Scully are summoned to Minneapolis by Moe Bocks, an FBI field agent who is investigating the exhumation and desecration of a body in a local cemetery. Mulder discounts Bocks' theory that this act is a variation of extraterrestrial cattle mutilation, and suggests they search for a human culprit. Scully is disturbed at the sight of the disheveled corpse. Two more bodies are found exhumed, with their hair cut and fingernails removed. Mulder develops a psychological profile of the criminal, believing him to be an escalating "death fetishist" who may resort to murder to satisfy his desires. Scully keeps her discomfort with the case to herself, and writes up a field report on necrophilia. Pfaster, who is behind the exhumations, proves Mulder's prediction correct when he brings a prostitute to his apartment. When the prostitute discovers a collection of funerary wreaths in Pfaster's bedroom, he kills her and removes her fingers. Later, Pfaster—having been hired as a frozen food delivery man—delivers to a low-security house of a woman with teenage daughters. In the bathroom, he steals some discarded hair from a brush found in the tras
https://en.wikipedia.org/wiki/Philip%20Price
Philip Price may also refer to: Philip Price (musician), American singer and songwriter Phillip Price (born 1966), Welsh golfer Philip Price (programmer), American computer programmer Phillip Price Jr. (born 1934), Pennsylvania politician Phil Price (sculptor) (born 1965), New Zealand sculptor Phil Price (rugby union) (born 1988), Welsh rugby union player Philip Price (c.1945–1972), British soldier killed in Belfast's Bloody Friday bombings Phil Price (Canadian football) (born 1949), Canadian football player
https://en.wikipedia.org/wiki/Die%20Hand%20Die%20Verletzt
"Die Hand Die Verletzt" is the fourteenth episode of the second season of the science fiction television series The X-Files. It premiered on the Fox network on January 27, 1995. It was written by Glen Morgan and James Wong, directed by Kim Manners, and featured guest appearances by Susan Blommaert, Dan Butler, and Heather McComb. The episode is a "Monster-of-the-Week" story, unconnected to the series' wider mythology. "Die Hand Die Verletzt" earned a Nielsen household rating of 10.7, being watched by 10.2 million households in its initial broadcast. The episode received positive reviews, with many critics praising its writing. The title translates from German as "the hand that wounds." The X-Files series centers on FBI special agents Fox Mulder (David Duchovny) and Dana Scully (Gillian Anderson) who work on cases linked to the paranormal, called X-Files. In this episode Mulder and Scully are called to Milford Haven, New Hampshire to investigate the death of a teenager who seems to have died during an occult ritual of some sort. As a result of their arrival in town a few of the local high school's faculty, who were raised as members of a secretive Satanic cult but whose zeal has waned, decide they should take steps to conceal their past activities. Matters are further complicated when the devil seems to have decided to personally interfere. "Die Hand Die Verletzt" uses the lapsed devil-worshipers as a way to parody insincere followers of mainstream religions. When confronted with proof of their religion's claims the school faculty members are mostly worried about how their obligations could impact their secular lives, several being either scared or annoyed by the prospect of having to become devout. This was the last episode written by Morgan and Wong before they left to create Space: Above and Beyond. They decided to add several in-jokes with The X-Files creative team. The episode has several scenes involving animals, each filmed with living creatures. In one such scene frogs rain from the sky. Actor Dan Butler has been quoted as being terrified of an anaconda used during one scene. Plot In the fictional town of Milford Haven, New Hampshire, a group of high school faculty members meet to discuss various social events. The adults initially appear to be socially conservative, debating the suitability of letting students perform Jesus Christ Superstar. However, when the group ends the meeting in a prayer, they recite a Satanic chant. Later, a group of students go out into the woods at night to play with black magic, an attempt to "score" on the part of the boys in the group. The experiment causes unexplainable things to happen, and all but one of the teenagers flee. The remaining teen's mutilated body is discovered the next day, leading Fox Mulder (David Duchovny) and Dana Scully (Gillian Anderson) to investigate. Locals—including the Satanists—claim that the teens have unleashed a demonic force with their rituals; a theory which is given valid
https://en.wikipedia.org/wiki/Quest%20Broadcasting
Quest Broadcasting Inc. is a Philippine radio network. Its corporate office is located at Unit 907, 9th floor, Paragon Plaza, EDSA cor. Reliance St., Mandaluyong. Quest operates a number of stations across the country under the Magic Nationwide network. History The company was established in 1986 as the SBS Radio Network Inc. (Sarao Broadcasting Systems), co-owned by the Sarao family (owner of Las Piñas-based Sarao Motors) and the Vera family (original owners of FBS Radio Network). In 1992, Luis and Leonida Vera's eldest son, Atty. Jose Luis Vera, took full control of the company and renamed it as Quest Broadcasting Inc. Radio stations Magic Nationwide stations Affiliate/Other stations Former stations Notes References Quest Broadcasting Mass media companies established in 1986 Philippine radio networks 1986 establishments in the Philippines Companies based in Mandaluyong Tiger 22 Media Corporation
https://en.wikipedia.org/wiki/Mircea%20Florian%20%28musician%29
Mircea Florian (; born December 5, 1949), also known as Florian din Transilvania, M. A. N. Florian, and FloriMAN, is a Romanian multi-instrumentalist musician, multimedia artist and computer scientist, based in Germany. Having started his musical career as a folk rock singer, in the late 1960s, he developed a fusion between Romanian folklore and Eastern music, especially Indian sound, moving into psychedelic music. He founded Ceata Melopoică ensemble, with whom he recorded a concept album. These and his solo acts earned him a cult following among rebellious youth, establishing his reputation as one of the most original contributors to Romanian pop music. Florian was also an early member of Cenaclul Flacăra, a traveling music and literature circle, but parted with it when it became increasingly nationalistic. Before 1980, Florian was turning his attention to electronic music and new wave. In parallel, like other artists on the Romanian folk scene, he was pursuing his interest in non-pop ventures, from experimental rock and minimal music to biomusic, and exhibiting his installation art. In 1986, Florian escaped Communist Romania, having by then been exposed to much communist censorship, and took up cultural and scientific projects in West Germany. Since the Romanian Revolution, he has made frequent returns, playing at numerous festivals and composing film scores. Biography Beginnings Born in Satu Mare, Mircea Florian began his musical education as a pianist and saxophonist, before turning to guitar, blockflute, mandolin and various other instruments. He first took classes at the Satu Mare Art School, and first became interested in performing arts while an avid spectator of the local Medrano Circus (the place where he also witnessed the first concert by a rock band). Florian then studied at the Eminescu High School, where he had musical appearances with the band (1965). A while after, he also gave his first one-man show, which included a dance routine. In parallel to state-run education, he took private courses in music and visual arts. Florian first came into contact with the burgeoning hippie movement of the West, and met Romanians who, despite facing tight scrutiny from the communist authorities, wanted to replicate it locally. In 2005, he stated that the fundamental difference was in the drug culture, which Romanians had little access to, adding: "In any case the manner in which the artistic act was supposed to be carried out here was different from what one could experience in the West. Romanian artists created for a tighter circle, of (proper) connoisseurs." Elsewhere, he also noted that hippie culture was essentially becoming more accessible to Romanians by the end of the 1960s: "I remember that, once a record came out, fresh off the Western market, no more than a week would pass before it got to Romania, brought over by some sailor or an acquaintance who had been visiting 'out on the outside', or through heaven knows what channels..."
https://en.wikipedia.org/wiki/Archaeological%20Recording%20Kit
Archaeological Recording Kit (ARK) is a web-based, open source software package for recording and disseminating archaeological data. ARK is primarily designed for recording excavations, but can also be used for archaeological surveys, palaeoenvironmental research and collections management. ARK is based on the LAMP stack and MapServer, and is free software released under the GNU GPL. It was developed by L-P Archaeology, a British commercial archaeology practice. The Fasti Online project was built using an ARK back-end, and demonstrates its usage beyond normal archaeological recording. References External links ARK Free science software Archaeological databases
https://en.wikipedia.org/wiki/Fitness%20model%20%28network%20theory%29
In complex network theory, the fitness model is a model of the evolution of a network: how the links between nodes change over time depends on the fitness of nodes. Fitter nodes attract more links at the expense of less fit nodes. It has been used to model the network structure of the World Wide Web. Description of the model The model is based on the idea of fitness, an inherent competitive factor that nodes may have, capable of affecting the network's evolution. According to this idea, the nodes' intrinsic ability to attract links in the network varies from node to node, the most efficient (or "fit") being able to gather more edges in the expense of others. In that sense, not all nodes are identical to each other, and they claim their degree increase according to the fitness they possess every time. The fitness factors of all the nodes composing the network may form a distribution ρ(η) characteristic of the system been studied. Ginestra Bianconi and Albert-László Barabási proposed a new model called Bianconi-Barabási model, a variant to the Barabási-Albert model (BA model), where the probability for a node to connect to another one is supplied with a term expressing the fitness of the node involved. The fitness parameter is time independent and is multiplicative to the probability Fitness model where fitnesses are not coupled to preferential attachment has been introduced by Caldarelli et al. Here a link is created between two vertices with a probability given by a linking function of the fitnesses of the vertices involved. The degree of a vertex i is given by: If is an invertible and increasing function of , then the probability distribution is given by As a result if the fitnesses are distributed as a power law, then also the node degree does. Less intuitively with a fast decaying probability distribution as together with a linking function of the kind with a constant and the Heavyside function, we also obtain scale-free networks. Such model has been successfully applied to describe trade between nations by using GDP as fitness for the various nodes and a linking function of the kind; Fitness model and the evolution of the Web The fitness model has been used to model the network structure of the World Wide Web. In a PNAS article, Kong et al. extended the fitness model to include random node deletion, a common phenomena in the Web. When the deletion rate of the web pages are accounted for, they found that the overall fitness distribution is exponential. Nonetheless, even this small variance in the fitness is amplified through the preferential attachment mechanism, leading to a heavy-tailed distribution of incoming links on the Web. See also Bose–Einstein condensation: a network theory approach References Network theory
https://en.wikipedia.org/wiki/Girvan%E2%80%93Newman%20algorithm
The Girvan–Newman algorithm (named after Michelle Girvan and Mark Newman) is a hierarchical method used to detect communities in complex systems. Edge betweenness and community structure The Girvan–Newman algorithm detects communities by progressively removing edges from the original network. The connected components of the remaining network are the communities. Instead of trying to construct a measure that tells us which edges are the most central to communities, the Girvan–Newman algorithm focuses on edges that are most likely "between" communities. Vertex betweenness is an indicator of highly central nodes in networks. For any node , vertex betweenness is defined as the fraction of shortest paths between pairs of nodes that run through it. It is relevant to models where the network modulates transfer of goods between known start and end points, under the assumption that such transfer seeks the shortest available route. The Girvan–Newman algorithm extends this definition to the case of edges, defining the "edge betweenness" of an edge as the number of shortest paths between pairs of nodes that run along it. If there is more than one shortest path between a pair of nodes, each path is assigned equal weight such that the total weight of all of the paths is equal to unity. If a network contains communities or groups that are only loosely connected by a few inter-group edges, then all shortest paths between different communities must go along one of these few edges. Thus, the edges connecting communities will have high edge betweenness (at least one of them). By removing these edges, the groups are separated from one another and so the underlying community structure of the network is revealed. The algorithm's steps for community detection are summarized below The betweenness of all existing edges in the network is calculated first. The edge(s) with the highest betweenness are removed. The betweenness of all edges affected by the removal is recalculated. Steps 2 and 3 are repeated until no edges remain. The fact that the only betweennesses being recalculated are only the ones which are affected by the removal, may lessen the running time of the process' simulation in computers. However, the betweenness centrality must be recalculated with each step, or severe errors occur. The reason is that the network adapts itself to the new conditions set after the edge removal. For instance, if two communities are connected by more than one edge, then there is no guarantee that all of these edges will have high betweenness. According to the method, we know that at least one of them will have, but nothing more than that is known. By recalculating betweennesses after the removal of each edge, it is ensured that at least one of the remaining edges between two communities will always have a high value. The end result of the Girvan–Newman algorithm is a dendrogram. As the Girvan–Newman algorithm runs, the dendrogram is produced from the top down (i.e. th
https://en.wikipedia.org/wiki/Mark%20Keane%20%28cognitive%20scientist%29
Mark T. Keane (Irish: Marcus Ó Cathain, born 3 July 1961, Dublin, Ireland) is a cognitive scientist and author of several books on human cognition and artificial intelligence, including Cognitive Psychology: A Student's Handbook (8 editions, with Michael Eysenck), Advances in the Psychology of Thinking (1992, with Ken Gilhooly), Novice Programming Environments (1992/2018, with Marc Eisenstadt and Tim Rajan), Advances in Case-Based Reasoning (1995, with J-P Haton and Michel Manago)., Case-Based Reasoning: Research & Development (2022, with N Wiratunga). Keane has been Chair of Computer Science at University College Dublin since 1997. In 2006, he was seconded to the newly established Science Foundation Ireland as Director of ICT, overseeing on a $700m research investment. He advised the Irish Government on its 3.7B euro Strategy for Science, Technology & Innovation (SSTI). From 2006–2007, he was Director General of Science Foundation Ireland before returning to University College Dublin where he was appointed VP of Innovation & Partnerships (2007-2009). Keane's research has been split between cognitive science and computer science. His cognitive science research has been in analogy, metaphor, conceptual combination and similarity. His computer science research has been in natural language processing, machine learning, case-based reasoning, text analytics and explainable artificial intelligence. He has been a PI in the Science Foundation Ireland funded Insight Centre for Data Analytics working on digital journalism and digital humanities. More recently, he was Deputy Director of the VistaMilk SFI Research Centre that is exploring precision agriculture in the dairy sector. References External links UCD Homepage SiliconRepublic.com article "The Keane Edge" https://scholar.google.com/citations?user=bBozfc4AAAAJ&hl=en VistaMilk Keane PI Eysenck & Keane (2020) UCD Appoints Keane as VP VistaMilk SFI Research Centre 1961 births Living people Scientists from Dublin (city) Academics of Cardiff University Academics of the Open University Academics of the University of London Alumni of University College Dublin Alumni of Trinity College Dublin Academics of Trinity College Dublin Academics of University College Dublin Natural language processing researchers Artificial intelligence researchers Science Foundation Ireland
https://en.wikipedia.org/wiki/Fuzzy%20routing
Fuzzy routing is the application of fuzzy logic to routing protocols, particularly in the context of ad-hoc wireless networks and in networks supporting multiple quality of service classes. It is currently the subject of research. See also Dynamic routing List of ad hoc routing protocols External links Hui Liu et al., An Adaptive Genetic Fuzzy Multi-path Routing Protocol for Wireless Ad Hoc Networks Runtong Zhang, A Fuzzy Routing Mechanism In Next-Generation Networks Routing protocols Fuzzy logic Wireless networking
https://en.wikipedia.org/wiki/Joe%20Martin%20%28All%20My%20Children%29
Joe Martin is a fictional character on the ABC Daytime and The Online Network soap opera All My Children. Ray MacDonnell played the character from the show's inception on January 5, 1970, until his retirement on January 5, 2010. He reprised his role for three episodes in March 2011, and again for two episodes in September 2011 for the show's ABC finale. The character is the longest running original character, the second being his former daughter-in-law Erica Kane. In 2005, MacDonnell received a Lifetime Achievement Award at the Daytime Emmys. MacDonnell's 2010 retirement was brought on by the production of the show moving from New York to Los Angeles. The character of Joe along with his longtime wife Ruth leave town and retire to Florida. MacDonnell reprised his role as Joe Martin on the Prospect Park's continuation of All My Children. Storylines Dr. Joe Martin, the head of one of the founding families in Pine Valley, was a widower raising two children, Jeff and Tara, when he met Ruth Brent, a nurse at the hospital where he worked. He fell hard for her but she married and had to resist his love and attraction. But Ruths alcoholic husband died in a car accident and Joe comforted her. The two fell in love and married in April 1972. The 1970s were a challenging time for the Martin marriage which was tested numerous times. Joes daughter Tara and Ruths son Phil married and had a troubled marriage which also caused rifts between Joe and Ruth. In 1976, Ruth had an affair with a younger man named David Thorton and he even asked her to run off with him. She accepted his proposal and made plans to divorce Joe but the night she was ask for her divorce Joe collapsed. Ruth realized her love for Joe was stronger than ever and broke it off with David. In 1978, the couple made plans to adopt a boy of their own named Tad, and the plans were thrown into trouble by the reappearance of Tad's biological father Ray Gardner. Ray threatened and blackmailed the Martins and when Joe refused to give into his demands, he attacked and raped Ruth in a parking lot. Ruth was left in a coma and nearly dead. Ray was sent to prison. Ruth survived the trauma. In 1979, the Martins had a surprise child of their own, Joey. In 1981, the Martins briefly separated over his feelings for a patient he was treating but the couple reconciled as always. When Charles Tyler, Chief of Staff, died, Joe assumed his position. His history at Pine Valley Hospital has been nearly impeccable, except for a brief time when he was forced to step down by allegations made by conniving David Hayward. Joe has survived a tornado that almost took Tad's life, had a massive heart attack brought on by a confrontation with Dimitri Marick, and dealt with all the problems that have affected his children. He is the patriarch of Pine Valley and usually the steady voice of reason. External links Joe Martin from soapcentral.com References All My Children characters Fictional physicians Television characters int
https://en.wikipedia.org/wiki/Michael%20Tomczyk
Michael S. Tomczyk is best known for his role in guiding the development and launch of the first microcomputer to sell one million units, as Product Manager of the VIC-20 from Commodore. His contributions are described in detail in his 1984 book, THE HOME COMPUTER WARS: An Insider's True Account of Commodore and Jack Tramiel. His role is also documented extensively in numerous interviews and articles. The VIC-20 was the first affordable, full-featured color computer and the first home computer to be sold in KMart and other mass market outlets. Michael joined Commodore in April 1980 as Assistant to the President (Commodore Founder Jack Tramiel who appointed him VIC-20 Product Manager). He has been called the "marketing father" of the home computer. Michael was also a pioneer in telecomputing, as co-designer of the Commodore VICModem, which he conceived and contracted while at Commodore. The VICModem was the first modem priced under $100 and the first modem to sell one million units. Michael is also an authority on nanotechnology. He is the author of the 2016 book, NANOINNOVATION: What Every Manager Needs to Know (Wiley, 2016) and in 2016 he served on the NNI Review Committee (National Academy of Sciences) which reviewed the billion-dollar US National Nanotechnology Initiative, to recommend changes and improvements to this initiative. He has also written book chapters and articles on the future of biosciences, gene therapy and medical innovations. During his career, he has studied and developed best practices and strategies for managing radical/disruptive innovations, as a product manager/technology developer, senior business executive, consultant and academic program manager. For 18 years (1995-2014) he provided managerial leadership in the study of best practices and strategies for managing innovation at The Wharton School, University of Pennsylvania; where he served as Managing Director of the Emerging Technologies Management Research Program (1994-2001), Mack Center for Technological Innovation (2001-2013) and Mack Institute for Innovation Management (2013-2014). He retired from the University of Pennsylvania in 2014 and served as Innovator in Residence in the ICE Center at Villanova University (2014-2017) where he hosted an annual event called the Innovation Update Day. Michael continues to be an innovation leader. He is currently Senior Advisor to FAMA Financial Holdings, a FinTech venture focused on developing mobile money platforms and applications. In Fall 2021 he became a founding director of a Fintech Ecosystem Development Corporation, a developer of global mobile payment services and digital banking innovations. He is co-moderator of the Commodore International Historical Society site on Facebook and is on the science advisory board at VIGAMUS in Rome. Education He holds an MBA. from UCLA and a BA from the University of Wisconsin–Oshkosh, where he received a Distinguished Alumni Award. He earned a master's degree in environmen
https://en.wikipedia.org/wiki/List%20of%20BSD%20operating%20systems
There are a number of Unix-like operating systems under active development, descended from the Berkeley Software Distribution (BSD) series of UNIX variants developed (originally by Bill Joy) at the University of California, Berkeley, Department of Electrical Engineering and Computer Science. there were four major BSD operating systems, and an increasing number of other OSs derived from these, that add or remove certain features but generally remain compatible with their originating OS—and so are not really forks of them. This is a list of those that have been active since 2014, and their websites. FreeBSD-based FreeBSD is a free Unix-like operating system descended from AT&T UNIX via the Berkeley Software Distribution (BSD). FreeBSD currently has more than 200 active developers and thousands of contributors. Other notable derivatives include DragonFly BSD, which was forked from FreeBSD 4.8, and Apple Inc.'s macOS, with its Darwin base including a large amount of code derived from FreeBSD. Active Discontinued DragonFly BSD-based NetBSD-based NetBSD is a freely redistributable, open source version of the Unix-derivative Berkeley Software Distribution (BSD) computer operating system. It was the second open source BSD descendant to be formally released, after 386BSD, and continues to be actively developed. Noted for its portability and quality of design and implementation, it is often used in embedded systems and as a starting point for the porting of other operating systems to new computer architectures. OpenBSD-based OpenBSD is a Unix-like computer operating system descended from Berkeley Software Distribution (BSD), a Unix derivative developed at the University of California, Berkeley. It was forked from NetBSD in 1995. OpenBSD includes a number of security features absent or optional in other operating systems and has a tradition of developers auditing the source code for software bugs and security problems. Historic BSD BSD was originally derived from Unix, using the complete source code for Sixth Edition Unix for the PDP-11 from Bell Labs as a starting point for the First Berkeley Software Distribution, or 1BSD. A series of updated versions for the PDP-11 followed (the 2.xBSD releases). A 32-bit version for the VAX platform was released as 3BSD, and the 4.xBSD series added many new features, including TCP/IP networking. For many years, the primary developer and project leader was Bill Joy, who was a graduate student at the time; funding for this project was provided by DARPA. DARPA was interested in obtaining a programming platform and programmer's interface which would provide a robust, general purpose, time-sharing computing platform which would not become obsolete every time computing hardware was or is replaced. Such an operating system would allow US Department of Defense software, especially for intricate, long-term finance and logistics operations, to be quickly ported to new hardware as it became available. As time went on,
https://en.wikipedia.org/wiki/Mark%20B.%20Gerstein
Mark Bender Gerstein is an American scientist working in bioinformatics and Data Science. , he is co-director of the Yale Computational Biology and Bioinformatics program. Mark Gerstein is Albert L. Williams Professor of Biomedical Informatics, Professor of Molecular Biophysics & Biochemistry , Professor of Statistics & Data Science, and Professor of Computer Science at Yale University. In 2018, Gerstein was named co-director of the Yale Center for Biomedical Data Science. Education After graduating from Harvard College summa cum laude with a Bachelor of Arts in physics in 1989, Gerstein did a PhD co-supervised by Ruth Lynden-Bell at the University of Cambridge and Cyrus Chothia at the Laboratory of Molecular Biology on conformational change in proteins, graduating in 1993. He then went on to postdoctoral research in bioinformatics at Stanford University from 1993 to 1996 supervised by Nobel-laureate Michael Levitt. Research Gerstein does research in the field of bioinformatics. This involves applying a range of computational approaches to problems in molecular biology, including data mining and machine learning, molecular simulation, and database design. His research group has a number of foci including annotating the human genome, personal genomics, cancer genomics, building tools in support of genome technologies (such as next-generation sequencing), analyzing molecular networks, and simulating macromolecular motions. Notable databases and tools that the group has developed include the Database of Macromolecular Motions, which categorizes macromolecular conformational change; tYNA, which helps analyze molecular networks; PubNet, which analyzes publication networks; PeakSeq, which identifies regions in the genome bound by particular transcription factors; and CNVnator, which categorizes block variants in the genome. Gerstein has also written extensively on how general issues in data science impact on genomics—in particular, in relation to privacy and to structuring scientific communication. Gerstein's work has been published in peer reviewed scientific journals and non-scientific publications in more popular forums. His work has been highly cited, with an H greater than 100. He serves on a number of editorial and advisory boards, including those of PLoS Computational Biology, Genome Research, Genome Biology, and Molecular Systems Biology. He has been quoted in the New York Times, including on the front page, and in other major newspapers. Awards and honors In addition to a W. M. Keck Foundation Distinguished Young Scholars award, Gerstein has received awards from the US Navy, IBM, Pharmaceutical Research and Manufacturers of America, and the Donaghue Foundation. He is a Fellow of the AAAS. Other awards include a Herchel-Smith Scholarship supporting his doctoral work at Emmanuel College, Cambridge and a Damon Runyon Cancer Research Foundation Postdoctoral Fellowship. He is a contributor to a number of scientific consortia including ENCO
https://en.wikipedia.org/wiki/Copying%20mechanism
In the study of scale-free networks, a copying mechanism is a process by which such a network can form and grow, by means of repeated steps in which nodes are duplicated with mutations from existing nodes. Several variations have been studied. In the general copying model, a growing network starts as a small initial graph and, at each time step, a new vertex is added with a given number k of new outgoing edges. As a result of a stochastic selection, the neighbors of the new vertex are either chosen randomly among the existing vertices, or one existing vertex is randomly selected and k of its neighbors are "copied" as heads of the new edges. Motivation Copying mechanisms for modeling growth of the World Wide Web are motivated by the following intuition: Some web page authors will note an interesting but novel commonality between certain pages, and will link to pages exhibiting this commonality; pages created with this motivation are modeled by a random choice among existing pages. Most authors, on the other hand, will be interested in certain already-represented topics, and will collect together links to pages about these topics. Pages created in this way can be modeled by node copying. Those are the growth and preferential attachment properties of the networks. Description For the simple case, nodes are never deleted. At each step we create a new node with a single edge emanating from it. Let u be a page chosen uniformly at random from the pages in existence before this step. (I) With probability , the only parameter of the model, the new edge points to u. (II) With probability , the new edge points to the destination of u's (sole) out-link; the new node attains its edge by copying. The second process increases the probability of high-degree nodes' receiving new incoming edges. In fact, since u is selected randomly, the probability that a webpage with degree will receive a new hyperlink is proportional with , indicating that the copying mechanism effectively amounts to a linear preferential attachment. Kumar et al. prove that the expectation of the incoming degree distribution is , thus follows a power-law with an exponent which varies between 2 (for ) and (for ). Above is the linear growth copying model. Since the web is currently growing exponentially, there is the exponential growth copying model. At each step a new epoch of vertices arrives whose size is a constant fraction of the current graph. Each of these vertices may link only to vertices from previous epochs. The evolving models above are by no means complete. They can be extended in several ways. First of all, the tails in the models are either static, chosen uniformly from the new vertices, or chosen from the existing vertices proportional to their out-degrees. This process could be made more sophisticated to account for the observed deviations of the out-degree distribution from the power-law distribution. Similarly, the models can be extended to include death processes
https://en.wikipedia.org/wiki/Grand%20Cru%20%28cipher%29
In cryptography, Grand Cru is a block cipher invented in 2000 by Johan Borst. It was submitted to the NESSIE project, but was not selected. Grand Cru is a 10-round substitution–permutation network based largely on Rijndael (or AES). It replaces a number of Rijndael's unkeyed operations with key-dependent ones, in a way consistent with the security purposes of each operation. The intent is to produce a cipher at least as secure as Rijndael, and perhaps much more secure. The block size and key size are both 128 bits, and the key schedule is the same as Rijndael's. Grand Cru is designed on the principle of multiple layered security. It is equivalent to a chain of 4 subciphers with independent keys, such that if 3 of the keys are known, the remaining cipher should still be secure. References Block ciphers
https://en.wikipedia.org/wiki/Interactive%20Data%20Corporation
ICE Data Services (formerly known as Interactive Data) was an American 1960s-founded Time-sharing services company that later became known for providing financial market data (financial data vendor), analytics and related solutions to financial institutions, active traders and individual investors. The company's businesses supply real-time market data, time-sensitive pricing, evaluations and reference data for securities trading, including hard-to-value instruments. The company was acquired by and folded into Intercontinental Exchange in December 2015. Products Interactive Data provided evaluation services, reference data, pricing services, derivatives services, Fair Value Information Services, low latency market data, trading infrastructure services, fixed income analytics, Web-based solutions, desktop solutions, the eSignal suite of products, and environmental, social and corporate governance (ESG) data including quantitative ESG risk indicators for individual companies and sectors (current figures as well as historical data for the past two years) provided by RepRisk, a global business intelligence provider specialized in ESG risk analytics and metrics. History Timesharing services Founded in 1968 as a Waltham, Massachusetts-based time-sharing company, Interactive Data Corporation was acquired by Chase Manhattan Bank in 1974. Like competitor National CSS (NCSS), their time-sharing service was based on IBM's CP/CMS Time-sharing software for the IBM System 360 Model 67. IDC focused on the financial industry, while NCSS had a broader client base. In 1984, Chase expanded IDC by purchasing Western Union's Telstat Systems division. Data services In 2002 Interactive bought Merrill Lynch's securities pricing service. Interactive Data became known as a supplier of financial market data and related offerings, "including data bases used for economic forecasting." Acquisitions have contributed to Interactive Data's growth, enabling the company to deliver an increasing range of services, while expanding into adjacent markets and extending its reach geographically. Later on, Pearson PLC owned 61% of the company. In 2010 the company announced the completion of its acquisition by two private equity firms, Warburg Pincus and Silver Lake Partners. In 2015, Intercontinental Exchange announced the acquisition of Interactive Data Corporation from Warburg Pincus and Silver Lake Partners. References Financial services companies established in 1968 Privately held companies based in Massachusetts Financial data vendors Warburg Pincus companies Silver Lake (investment firm) companies 1968 establishments in Massachusetts American companies established in 1968 Financial services companies based in Massachusetts
https://en.wikipedia.org/wiki/Greenhouse%20Mafia
"Greenhouse Mafia" is the title of a TV program aired by Australian network ABC on the 13 February 2006 episode of its weekly current affairs program Four Corners. The program says the term greenhouse mafia is the "in house" name used by Australia’s carbon lobby for itself. The program featured former Liberal Party member Guy Pearse and Four Corners host Janine Cohen, while others concerned about the influence exerted by the fossil fuel lobby also participated. The report was based on a thesis Pearse wrote at the Australian National University between 1999 and 2005 regarding the response of Australian business to global warming. According to the program, lobby groups representing the coal, car, oil, and aluminium industries have wielded their power to prevent Australia from reducing its greenhouse gas emissions, which were already among the highest per capita in the world in 1990. Research by Pearse According to the research of Pearse, lobby groups representing the largest fossil fuel producing or consuming industries referred to themselves as the 'Greenhouse Mafia.' These groups are represented in Canberra by the Australian Industry Greenhouse Network (AIGN). AIGN members told Pearse in recorded interviews how they routinely gained access to what should be confidential information concerning government policy on energy and transport. Pearse cited recorded interviews with AIGN members and said that lobbyists had written cabinet submissions, ministerial briefings, and costings in two departments on at least half a dozen occasions over a decade. According to Pearse, the consequence of the "Greenhouse Mafia" having this access is that those within groups lobbying for unrestricted greenhouse gas emissions have been able to ensure that government ministers hear mostly matching advice from their own departmental officials. Pearse says that this influence is entrenched to such an extent that fossil fuel industry lobby groups have actually been writing Australia's greenhouse policy at least since the Kyoto Protocol in 1998, and probably even before John Howard became Prime Minister in 1996. Four Corners program The "Greenhouse Mafia" episode of Four Corners begins by reviewing the evidence Pearse assembled during his PhD research, and questions a political science academic, a senior federal bureaucrat, the Federal Environment Minister and a representative of the industry peak body, the Australian Industry Greenhouse Network, about their responses to Pearse's allegations. The episode then moves onto a series of interviews with climate scientists who currently or formerly worked for CSIRO. One of these scientists, the former CSIRO Climate Director and Chief of Atmospheric Research, Dr Graeme Pearman, alleges that scientists at CSIRO were instructed by management that they were not permitted to speak publicly on the policy implications of climate change, and that he had been repeatedly censored in the years immediately preceding his forced redundancy fr
https://en.wikipedia.org/wiki/Database%20of%20Molecular%20Motions
The Database of Macromolecular Motions is a bioinformatics database and software-as-a-service tool that attempts to categorize macromolecular motions, sometimes also known as conformational change. It was originally developed by Mark B. Gerstein, Werner Krebs, and Nat Echols in the Molecular Biophysics & Biochemistry Department at Yale University. Discussion Since its introduction in the late 1990s, peer-reviewed papers on the database have received thousands of citations. The database has been mentioned in news articles in major scientific journals, book chapters, and elsewhere. Users can search the database for a particular motion by either protein name or Protein Data Bank ID number. Typically, however, users will enter the database via the Protein Data Bank, which often provides a hyperlink to the molmovdb entry for proteins found in both databases. The database includes a web-based tool (the Morph server) which allows non-experts to animate and visualize certain types of protein conformational change through the generation of short movies. This system uses molecular modelling techniques to interpolate the structural changes between two different protein conformers and to generate a set of intermediate structures. A hyperlink pointing to the morph results is then emailed to the user. The Morph Server was originally primarily a research tool rather than general molecular animation tool, and thus offered only limited user control over rendering, animation parameters, color, and point of view, and the original methods sometimes required a fair amount of CPU time to completion. Since their initial introduction in 1996, the database and associated morph server have undergone development to try to address some of these shortcomings as well as add new features, such as Normal Mode Analysis. Other research grounds have subsequently developed alternative systems, such as MovieMaker from the University of Alberta. Commercialization Bioinformatics vendor DNASTAR has incorporated morphs from the database into its commercial Protean3D product. The connection between DNASTAR and the authors of the database, if any, is not immediately clear. See also Database of protein conformational diversity Notes References External links The Database of Macromolecular Motions (molmovdb) MovieMaker from the University of Alberta Biological databases Cloud applications Biophysics Protein classification
https://en.wikipedia.org/wiki/Autopsy%20%28House%29
"Autopsy" is the second episode of the second season of House, which premiered on the Fox network on September 20, 2005. Andie, a nine-year-old terminal cancer patient, experiences hallucinations, leading House and his team to conduct an autopsy on a live patient. Plot House and his team struggle to find the cause of hallucinations that Andie (Sasha Pieterse) is seeing. She is a nine-year-old girl with terminal cancer (alveolar rhabdomyosarcoma), but tests reveal that her cancer is in remission, meaning that the hallucinations are unrelated to her cancer. Meanwhile, House questions Andie's motives for her bravery, suggesting it may itself be a symptom of a problem in her amygdala. House discovers a benign tumor in her heart, which is surgically removed, but it does not account for the hallucinations. House deduces that there must be a clot which the cancer deployed prior to removal. He suggests employing therapeutic hypothermia to discover the clot, which does not show on an angiograph: Cooling her body temperature down to 21°C will stop her heart, effectively making her clinically dead. Then the doctors will remove 2-3 liters of blood and discover the clot when the blood is pumped back in. House compares this procedure to "performing an autopsy on a living person." The blood removal and temperature can not be held for more than 60 seconds or she will suffer permanent damage. Wilson calls it a "lottery shot", but finding the clot will give her an additional year to live. In a tense moment Foreman finds the clot, which only appeared for a fraction of a second, and with his direction the surgery is successful. Andie tells Chase that she went to a cancer camp and has never kissed a boy in her life and she doesn't know if she will be walking out of the hospital. She asks Chase to kiss her. He is hesitant at first and says no but she keeps begging him to do it. Finally he kisses her and later he tells the team and House. They are surprised. Wilson confronts House about the placement of the blood clot – it was not in her amygdala. House concedes he was wrong about Andie's bravery being a symptom of her clot, but replies to Wilson saying the girl is dead anyway. Wilson states that Andie could outlive him. When Andie is leaving the hospital she hugs each of the staff, finally reaching House, who stands and looks awkward as she hugs him. Andie tells House, "It's sunny outside, you should go for a walk." As House is leaving the hospital he stands and admires some motorcycles. He asks the salesman if he can take one for a test ride. The episode ends with House riding the motorcycle down a long stretch of empty road. Clinic patient House sees Brad (Randall Park), a clinic patient who managed to mutilate himself trying to remove his own foreskin with a box cutter knife, in an attempt to please his new girlfriend. House refers him to a plastic surgeon. Reception Accolades Lawrence Kaplow won the 2006 Writers Guild of America award for Episodic Drama fo
https://en.wikipedia.org/wiki/Parramatta%20River%20ferry%20services
Parramatta River ferry services connect suburbs along the Parramatta River in Sydney with Circular Quay by commuter ferry. The services are numbered F3 and form part of the Sydney Ferries network. History Regular ferry services between Sydney and Parramatta began 2 June 1831, with the first steam ferry named Surprise. Early ferry services between Sydney Cove and Parramatta used paddle steamers. Due to silting and pollution of the river, Sydney Ferries services on the Parramatta River ceased to serve the wharves west of Meadowbank in 1928. Meanwhile, changes in the design of ferries meant that the deep-hulled vessels were unable to go further upstream than the Meadowbank bridge. However, following dredging work and the introduction of the RiverCat catamarans, the State Transit Authority was able to resume services to Rydalmere and Parramatta in December 1993. At one time, the New South Wales Government was keen to make extensive use of ferry transport to Sydney Olympic Park for the 2000 Summer Olympics. Although the Sydney Olympic Park ferry wharf was built and opened on 22 September 1997, at the western tip of Homebush Bay, its distance from the Olympic facilities meant that Olympic spectators were largely encouraged to use buses and trains. Wharves [ { "type": "ExternalData", "service": "page", "title": "Circular Quay ferry wharf.map" }, { "type": "ExternalData", "service": "page", "title": "F3 & F4 shared wharves.map" }, { "type": "ExternalData", "service": "page", "title": "Cockatoo Island ferry wharf.map" }, { "type": "ExternalData", "service": "page", "title": "Balmain ferry wharf.map" }, { "type": "ExternalData", "service": "page", "title": "F3 Parramatta River ferry stops.map" } ] Circular Quay Circular Quay is a major Sydney transport hub, with a large ferry, rail and bus interchange. The Cahill Expressway is a prominent feature of the quay, running from the east, over the elevated railway station to join the Sydney Harbour Bridge in the west. Sydney Cove was the site of the initial landing of the First Fleet in Port Jackson. Circular Quay was originally mainly used for shipping and slowly developed into a transport, leisure and recreational centre. Sydney Ferries services use wharves 2, 3, 4 and 5 at Circular Quay. Each wharf has ticket vending machines and ticket barriers, and is wheelchair-accessible. Barangaroo Barangaroo ferry wharf serves Darling Harbour. The wharf is wheelchair-accessible. Balmain Balmain ferry wharf serves the suburb of Balmain and is located on Thames Street. Balmain is only served by F3 ferries during peak hours and F8 at all times. Cockatoo Island Cockatoo Island ferry wharf serves Cockatoo Island. The wharf is wheelchair-accessible. Drummoyne Drummoyne ferry wharf serves the suburb of Drummoyne and is located on Wolseley Street. The wharf is wheelchair-accessible. Huntleys Point Huntleys Point ferry wharf serves the suburb of Gladesville and is located on Huntleys Poin
https://en.wikipedia.org/wiki/Anne-Marie%20Green
Anne-Marie Green (born September 21, 1971) is a New York City-based news anchor for American television network CBS. A Toronto native, Green earned a Bachelor of Arts degree in English from the University of Toronto and has a graduate degree in journalism from Humber College. Green began her career as a reporter for CKVR-TV in Barrie and at Rogers Cable News in Mississauga, both located in Ontario. She was a news anchor in Toronto beginning in June 2001 with CITY-TV and also anchored at CablePulse 24, a 24-hour cable news channel servicing the greater Toronto area. Green joined KYW-TV (CBS 3) in October 2004 as a general assignment reporter and also a co-anchor for Sunday morning newscasts alongside Ben Simoneau. In October 2012, she became a substitute anchor for CBS News' Up to the Minute. She was subsequently named the anchor for the CBS News early morning news broadcast CBS Morning News from New York City effective January 21, 2013. Green is married to Philadelphia community activist Algernong Allen. See also New Yorkers in journalism References External links Green's bio from CBS 3 website American television news anchors Canadian expatriate journalists in the United States CBS News people Canadian television journalists Canadian women television journalists University of Toronto alumni Humber College alumni Journalists from Toronto 1971 births Living people
https://en.wikipedia.org/wiki/DXMJ-TV
DXMJ-TV (channel 5) is a television station in Metro Davao, Philippines, serving as the Mindanao flagship of the GMA network. It is owned and operated by the network's namesake corporate parent alongside GTV outlet DXRA-TV (channel 27). Both stations share studios and transmitters at the GMA Complex, Broadcast Ave., Shrine Hills, Brgy. Matina Crossing, Davao City. History In 1965, DXSS-TV began broadcasting on channel 7. It was owned by the Southern Broadcasting Network and affiliated with the Republic Broadcasting System, GMA's predecessor, While followed by the establishment of provincial stations of ABS Channel 4 (owned by ABS-CBN's predecessor Alto Broadcasting System). DXSS-TV shut down on September 21, 1972, following the declaration of martial law by then-President Ferdinand Marcos by the virtue of Proclamation 1081. In 1974, DXSS-TV returned to the air; the network also began its first local newscast of News at Seven Davao during the same year. It also launched its Cebuano drama series Goot da Wanderpol, which was syndicated from its co-owned station in Cebu from 1980 to 1985. On April 30, 1992, following the network's expansion of coverage, DXSS-TV was integrated into the Rainbow Satellite Network nationwide satellite broadcast to bring live broadcasts of national and foreign programming from Manila-based DZBB-TV, the network's flagship TV station, to viewers in the Davao region, with added opt-outs to serve local audiences. In late 1998, GMA acquired the channel 5 frequency, having transferred its transmitter from its original site in Tagum, Davao del Norte to Shrine Hills. Channel 5 relaunched as a GMA station with the call sign DXMJ-TV. A year later, GMA restored local programming with the return of a local newscast, known as Testigo: GMA Super Balita, covering the Davao City area. Also, GMA's television operation in Davao then moved to the Amesco Building, which had already been housing the GMA radio stations. It would remain there until relocating to Shrine Hills, Matina, in 2008. GMA Davao started conducting digital test broadcasts on UHF channel 37 in 2018, covering Metro Davao and the provinces of Davao del Norte and Davao del Sur, as well as several parts of Davao de Oro. Local programming GMA Davao currently produces two news programs on weekdays that are broadcast throughout Mindanao: One Mindanao, a local evening newscast begun in 2017, and At Home with GMA Regional TV, a morning program started in 2020. In addition, GMA Davao produces annual coverage of the Kadayawan Festival. Previous efforts at local news programming—morning show Una Ka BAI, the newscast 24 Oras Davao (previously Testigo), and a local edition of the Isyu Ngayon news magazine—were scrapped in 2015 and 2016, respectively, as part of retrenchment in GMA's regional news operations. Biyaheng DO30, focused primarily on Davao city government issues. However, the program ended on December 25, 2022. Digital television Digital channels Area of coverage P
https://en.wikipedia.org/wiki/National%20Center%20for%20High-Performance%20Computing
The National Center for High-Performance Computing (NCHC; ) is one of ten national-level research laboratories under National Applied Research Laboratories (NARL), headquartered at Hsinchu Science and Industrial Park, Hsinchu City, Taiwan. The NCHC is Taiwan's primary facility for high performance computing (HPC) resources including large-scale computational science and engineering, cluster and grid computing, middleware development, visualization and virtual reality, data storage, networking, and HPC-related training. The NCHC is also responsible for the operation of the 20 Gbit/s Taiwan Advanced Research and Education Network (TWAREN), the national education and research network of Taiwan. The NCHC supports academia and industry with hardware and software, advanced research and application development, and professional training. Its Free Software Lab developed and maintains the free disk cloning utility Clonezilla. History The research center was opened in 1993. In November 2018 the National Center for High-Performance Computing owned supercomputer Taiwania 2 debuted at number 20 on the top500 list of fastest supercomputers. List of supercomputers Formosa 4 Formosa 5 ALPS Taiwania (supercomputer) Taiwania 2 Taiwania 3 Branches Hsinchu HQ Taichung Tainan See also Ministry of Science and Technology (Republic of China) Taiwan Semiconductor Research Institute Industrial Technology Research Institute Taiwania (supercomputer) Taiwania 3 (supercomputer) References External links 1993 establishments in Taiwan Research institutes in Taiwan Supercomputer sites Internet mirror services
https://en.wikipedia.org/wiki/Aziza%20Abdel-Halim
Aziza Abdel-Halim () is an Egyptian-Australian academic, teacher, and founder of the Muslim Women's National Network Australia (MWNNA). Early life and education Abdel-Halim was born in Egypt, and grew up in Alexandria during World War II. Her parents were educated, and Abdel-Halim gained a university education. Abdel-Halim was involved in political causes such as marching for Egyptian independence from colonial Britain, joining the Young Egypt Party, and supporting an independent Palestine. Abdel-Halim's uncle was arrested for criticising President Gamal Abdel Nasser's policies, and physically and psychologically traumatised while in jail. Abdel-Halim migrated to Australia in 1970 with her husband and two children. In 1973 Abdel-Halim began wearing a hijab as a sign of solidarity with other Muslim women and because she wanted to make the statement "I am a Muslim woman. If you want to know about Islam, ask me." Career In Australia Abdel-Halim and her husband taught English, Arabic, English as a Second Language (ESL) and Muslim scripture. She was one of the founders of the Islamic Egyptian Society, and its first vice-president. Abdel-Halim and her husband organised events and projects to support and empower Muslim women and represent their views to media and government organisations, forming the Muslim Women's National Network Australia where Abdel-Halim was president for many years and is currently listed as an Advisor. Abdel-Halim writes on aspects of Islam and the role of women. In 1977 she wrote a chapter in a book discussing the role of women in different religions, Deliver Us from Eve. Abdel-Halim was involved in campaigns to save the multicultural TV channel SBS, to change official forms to use the term 'given name' rather than 'Christian name,' and to let women to wear their hijab for their driver's licence photos. Abdel-Halim was a member of John Howard's Muslim Community Reference Group, where she led the Muslim Women sub-group, to advise the government on issues pertaining to Muslims. She has been described by The Australian as "Australia's most prominent female Muslim leader". She has additionally held the roles of Chairperson of the Women Movement South-East Asia and the Pacific, Vice President of the Regional Islamic Dawah Council of South-East Asia and the Pacific (RISEAP), and board member of the Council for Australian-Arab Relations. Abdel-Halim wrote Did You Know: Refuting Interpretations Concerning The Position of Women in Islam, and Muslim's interaction with non-Muslims, published in 2008 by the Muslim Women's National Network Australia, and funded by the Department of Immigration and Citizenship as part of the "National Action Plan to Build on Social Cohesion, Harmony and Security". The book aims to address the "misinterpretation and misapplication of Islam as it affects the role, position and rights of Muslim Australian women." It has been distributed across Australia through schools, universities, public libraries, mi
https://en.wikipedia.org/wiki/Philos%20Laboratories
Philos Laboratories (also known as Philos Laboratories Software Developer Ltd. or Philos Labs and later Philos Entertainment, Inc) was a Hungarian computer software development company known for working with producer Ubisoft and CDV Software Entertainment. The company was founded in 1995 by John (Zsolt) Vamosi, working mostly on making graphics for advertisements. In 1997, several developers of the game Perihelion: The Prophecy were hired, and they started making their first title, what would become Theocracy. It was eventually disbanded in 2004, amid lawsuits of software piracy and much debated financial ventures. Released titles Theocracy (2000) Tim7 (2001) Rebels: Prison Escape (2003) References External links Antal Ruttmayer of Philos Labs Interview (Eurogamer) Escape from Alcatraz Q&A (Gamespot) Companies disestablished in 2004 Defunct video game companies of Hungary Software companies established in 1995 Video game development companies
https://en.wikipedia.org/wiki/Wrangle
Wrangle or similar may refer to: Wrangle, Lincolnshire, a village in England Wrangle, a historical name for the card game Russian Bank Data wrangling See also Wrangler (disambiguation) Wrangel (disambiguation) Rangel (disambiguation) Rangle, stones fed to hawks to aid in digestion
https://en.wikipedia.org/wiki/Billy%20%26%20Mandy%27s%20Big%20Boogey%20Adventure
Billy & Mandy's Big Boogey Adventure is a 2007 made-for-television animated adventure fantasy comedy film produced by Cartoon Network Studios, and is the first made-for-television film based on the animated series The Grim Adventures of Billy & Mandy, the second being Billy & Mandy: Wrath of the Spider Queen. Big Boogey Adventure premiered in the United States on March 30, 2007, and in the UK on February 14, 2007, and was released on DVD in the U.S. on April 3, 2007. The events of the film take place during the sixth and final season of The Grim Adventures of Billy & Mandy. Plot In the future (in about two weeks), in a dystopian Endsville, an evil being known as the "Lord of Horror" orders robotic duplicates, Billybot and Mandroid, to go back in time to eliminate Billy and Mandy and prevent them from reaching a powerful hand-like artifact in the Lord of Horror's possession before his past self does. Billy and Irwin of this time hope their past selves can stop the Lord of Horror's evil plans. Two weeks prior, Grim is sued for dereliction of duty and misuse of his abilities by his old rival, the Boogey Man, the former having failed to reap General Skarr (who had accidentally created a hole in his chest) thanks to an intervention from Billy and Mandy. Grim and the children are set to be exiled by the Underworld Court and placed in the custody of Boogey, with Grim being stripped of his job and powers and Numbuh 3 of Codename: Kids Next Door becoming his court-appointed replacement. Boogey reveals it was part of his plan to steal Horror's Hand, an artifact capable of bringing people's deepest fears to life and transforming anyone who conquers their fear into the scariest and most powerful being in existence; Boogey himself believes that with its power, children will fear him once again. The group eventually escapes and plans to obtain the hand for themselves for various reasons. Both groups eventually reach where the hand is held, where they meet Horror the Ancient, a living statue and source of the Hand, having channeled his fears within it and cutting it off in an attempt to make himself brave. To obtain the hand, the two rivaling groups must embark on a race across the Cannibal Run - the most dangerous section of the River Styx - as well as facing their worst fears. Grim and the children win and scrape to obtain the hand. Billy, Irwin and Mandy are easily subdued by their respective worst nightmares, leaving Grim to claim the hand unaffected, revealing he goes through his worst nightmare every day — being forced to live with Billy and Mandy. The hand however is almost immediately stolen by Boogey. Believing he has won, Boogey turns out to be incapable of facing his worst fear, realizing that he is not at all scary; he subsequently suffers a series of humiliating accidents, after which Grim reveals he had actually turned the hand's power off right after he picked it up, meaning Boogey wasn't ever scary at all. Mistaking Fred Fredburger's commen
https://en.wikipedia.org/wiki/Copenhagen%20Airport%2C%20Kastrup%20Station
Copenhagen Airport, Kastrup Station () is a railway station in Tårnby, Denmark, served by DSB’s regional trains including the Øresundtrain network. The nearby Lufthavnen metro station is served by the Copenhagen Metro’s line M2. The station opened on 27 September 1998, and was subsequently reconstructed and reopened on 28 September 2007, with a connection to the Copenhagen Metro opening the following month. The stations take their names from Copenhagen Airport, to which they are connected. It is linked to Ørestad station on the M1 line by DSB regional trains. It is located in fare zone 4. The airport's railway station is the closest to the check-in and arrival area in Terminal 3. It is located below ground under Terminal 3. It is served by the following types of trains: Local trains between Copenhagen Central Station and Malmö Central Station. These trains also stop at Tårnby and Ørestad en route to Copenhagen, and at Hyllie and Triangeln en route to Malmö. To Copenhagen every 10 minutes, and to Malmö every 20 minutes. Regional trains on Zealand and southern Sweden. Connects to Klampenborg, Helsingør, Lund, Helsingborg, Landskrona and Hässleholm. Intercity trains to the rest of Denmark including Odense, Fredericia, Aarhus, Esbjerg and Aalborg. Intercity trains in southern Sweden connects to Gothenburg, Kalmar and Karlskrona (see Øresundståg). High-speed X 2000 trains to Stockholm. Temporarily from 4 January 2016 to 4 May 2017, Sweden required train and bus transport companies entering Sweden to perform full identity check of every passenger, because of the European migrant crisis. For that reason the Southern platform was used only for departures to Sweden, with border checks at openings in fence erected along the platform. All arrivals and all departures to Denmark used the Northern platform. Only the regional trains towards Helsingør and Sweden used Copenhagen Airport station, all other trains did not go here during this period. There is a decision to build platforms at the two tracks north of the existing station, so far used for freight trains. Lufthavnen (‘Airport’) metro station is located slightly further off than the railway station, at the far end of Terminal 3 on the level 2. The metro connects to Nørreport Station and Vanløse station. Services See also List of railway stations in Denmark References External links Lufthavnen (Airport) on www.m.dk Information about the extension to the airport on www.m.dk Airport railway stations in Denmark Railway stations opened in 2007 Øresund Line Railway stations located underground in Copenhagen Transit centers in Denmark Railway stations in Denmark opened in the 2000s
https://en.wikipedia.org/wiki/Daniel%20G.%20Bobrow
Daniel Gureasko Bobrow (29 November 1935 – 20 March 2017) was an American computer scientist who created an oft-cited artificial intelligence program STUDENT, with which he earned his PhD., worked at BBN Technologies (BBN), then was a Research Fellow in the Intelligent Systems Laboratory of the Palo Alto Research Center. Born in New York City, he earned his BS from RPI in 1957, SM from Harvard in 1958, and PhD in Mathematics from MIT under the supervision of Marvin Minsky in 1964. At BBN, he was a developer of TENEX. Bobrow was the president of the American Association for Artificial Intelligence (AAAI), chair of the Cognitive Science Society, Editor-in-chief of the journal Artificial Intelligence. He shared the 1992 ACM Software System Award with five other PARC scientists (Richard R. Burton, L. Peter Deutsch, Ronald Kaplan, Larry Masinter, and Warren Teitelman) for his work on Interlisp. He was an ACM Fellow and a AAAI fellow. Further reading Rusty Bobrow (Daniel's brother), "Danny Bobrow: A Personal Recollection", AI Magazine 38:4:85-86 (2017) full text References 1935 births 2017 deaths American computer scientists Harvard University alumni Fellows of the Association for the Advancement of Artificial Intelligence Massachusetts Institute of Technology School of Science alumni Rensselaer Polytechnic Institute alumni Scientists at PARC (company) Fellows of the Association for Computing Machinery Presidents of the Association for the Advancement of Artificial Intelligence Lisp (programming language) people
https://en.wikipedia.org/wiki/Hitwise
Hitwise is a division of Connexity, that measures behavior across desktop, tablet and smartphone devices. The service provides data on trends in visitor and search behavior, visitor and website profiling and measures website market share. In 2006 Hitwise was valued at £180m and was subsequently acquired by Experian for $240m on 19 April 2007. In 2015 Hitwise was acquired by Digital marketing company, Connexity, in a combined worth $47 Million on 14 December 2015. History Hitwise was founded in 1997 in Melbourne by Adrian Giles and Andrew Barlow. Adrian Giles acted as Managing Director from 1997 to 2000. Andrew Barlow acted as Chairman and Joint-Managing Director from 1997 to 2000. It launched the "competitive intelligence" service in 2000; a service that allows subscription access to Hitwise's reports. In 2001 Hitwise launched in New Zealand, Hong Kong, United Kingdom and Singapore. In 2003 Hitwise launched in the United States. In 2006 Hitwise purchased HitDynamics, a bid management and web analytics platform. In 2009 Hitwise launched in Canada and Brazil. In 2010 Hitwise launched in France and India. Acquisitions Hitwise was acquired by Experian in 2007. Hitwise was acquired by Connexity in 2015. Hitwise closed in 2020. Awards 2003: Australian Entrepreneur of the Year Awards Finalist – Adrian Giles (founder) 2004: UK Revolution Awards – Winner Most Innovative UK Digital Business 2002–2006: Deloitte Fast 50 See also Competitors in the internet market research space include Nielsen, Alexa, comScore, Netcraft, Quantcast, SimilarWeb and Spyfu. References Market research companies of Australia Market research companies of the United States 1997 establishments in Australia Companies established in 1997
https://en.wikipedia.org/wiki/Cyn.in
Cyn.in is an open-source enterprise collaborative software built on top of Plone a content management system written in the Python programming language which is a layer above Zope. Cyn.in is developed by Cynapse a company founded by Apurva Roy Choudhury and Dhiraj Gupta which is based in India. Cyn.in enables its users to store, retrieve and organize files and rich content in a collaborative, multiuser environment. Cyn.in comes in three flavors. Cyn.in Community Edition is released under the GNU General Public License version 3 based on open standards and is completely "free" to use. Cyn.in Enterprise Editions are commercially supported, certified and tested by Cynapse. The on-premises appliance is designed towards businesses who want to install the software on their infrastructure behind their firewall. With the On-Demand Service, Cynapse hosts the software for businesses to use, in secure cloud servers. History Cyn.in was developed and released in late 2006 as a closed source Enterprise Bliki software, based on the .NET Framework as a SaaS offering by Cynapse. In 2008, June, Cynapse, the company behind Cyn.in, released a new version of Cyn.in and open sourced the project. This release was built on the popular open source Plone - Zope - Python framework. With this release Cynapse's intention was to expand its focus into the enterprise collaboration domain. While the new release still supported Blogs and Wikis, Cyn.in had evolved to include enterprise collaboration tools including file repositories, event calendars, image galleries and more. The company decided to discontinue using the Bliki terminology and Cyn.in is called a Collaboration software Concepts Application convergence The cyn.in collaborative information management system attempts to bring together the core concepts of: Personal information management Organization-wide knowledge and document management Information and file collaboration Knowledge transfer Content publishing Spaces Information can be made available in four different location namespaces, called Personal Space, Shared Space, Intranet Space and Web Space within the cyn.in application. Each Space has distinct authorization and functionality rules, for example, the Intranet Space of a cyn.in site may only be accessed by members of it, in contrast to the Web Space, where public Internet access is allowed. Notes Information and files in cyn.in are stored together in a common container format called a Note. A user can create any number of Notes in the system, however a Note can only reside in one Space at a time. Taxonomy and categorization Notes can have one or more SlashTags. SlashTags is the name given to the hierarchical tagging system used in cyn.in to categorize Notes and is used for creation of navigation trees and dynamic pop-out menus. SlashTags offer taxonomical advantages when compared to traditional folder based systems because they enable: direct navigational access to each Note multiple presences of the
https://en.wikipedia.org/wiki/Network%20DVR
Network DVR (NDVR), or network personal video recorder (NPVR), or remote storage digital video recorder (RS-DVR) is a network-based digital video recorder (DVR) stored at the provider's central location rather than at the consumer's private home. Traditionally, media content was stored in a subscriber's set-top box hard drive, but with NDVR the service provider owns a large number of servers, on which the subscribers' media content is stored. The term RS-DVR is used by Cablevision for their version of this technology. Overview NDVR is a consumer service where real-time broadcast television is captured in the network on a server allowing the end user to access the recorded programs at will, rather than being tied to the broadcast schedule. The NDVR system provides time-shifted viewing of broadcast programs, allowing subscribers to record and watch programs at their convenience, without the requirement of a local PVR device. It can be considered as a "PVR that is built into the network". NDVR subscribers can choose from the programmes available in the network-based library, when they want, without needing yet another device or remote control. However, many people would still prefer to have their own PVR device, as it would allow them to choose exactly what they want to record. Local PVR bypasses the strict rights and licensing regulations, as well as other limitations, that often prevent the network itself from providing "on demand" access to certain programmes. In contrast, RS-DVR (Remote Storage Digital Video Recorder) refers to a service where a subscriber can record a program and store it on the network. A stored program is only available to the person who recorded it. Should any two persons record the same program, it must for legal reasons be recorded and stored as separate copies. Essentially implementing a traditional DVR with network based storage. In Greece, On Telecoms offers an NPVR service to all subscribers in their basic package with all the programming of all major national Greek TV channels for the last 72 hours. The user has to sign in their contract that they agree that the company will record national programming of the last 72 hours for them so that they can get around any legal implications (like the ones mentioned in the NPVR article) as this service would work like a personal PVR. Cablevision litigation in the U.S. After Cablevision announced the RS-DVR in March 2006, several content providers including 20th Century Fox, Universal Studios, and Walt Disney sued Cablevision in federal district court. The content providers sought a permanent injunction that would effectively prevent Cablevision from implementing the system. The content providers prevailed at the district court level, and Cablevision appealed. On August 5, 2008, the 2nd U.S. Circuit Court of Appeals, in Cartoon Network, LP v. CSC Holdings, Inc., reversed the lower court decision that found the use of RS-DVRs in violation of copyright law. It agre
https://en.wikipedia.org/wiki/Core%20banking
Core banking is a banking service provided by a group of networked bank branches where customers may access their bank account and perform basic transactions from any of the member branch offices. Core banking is often associated with retail banking and many banks treat the retail customers as their core banking customers. Businesses are usually managed via the corporate banking division of the institution. Core banking covers basic depositing and lending of money. Core banking functions will include transaction accounts, loans, mortgages and payments. Banks make these services available across multiple channels like automated teller machines, Internet banking, mobile banking and branches. Banking software and network technology allows a bank to centralise its record keeping and allow access from any location. History Core banking became possible with the advent of computer and telecommunication technology that allowed information to be shared between bank branches quickly and efficiently. Before the 1970s it used to take at least a day for a transaction to reflect in the real account because each branch had their local servers, and the data from the server in each branch was sent in a batch to the servers in the data center only at the end of the day (EOD). Over the following 30 years most banks moved to core banking applications to support their operations creating a Centralized Online Real-time Exchange (or Environment) (CORE). This meant that all the bank's branches could access applications from centralized data centers. Deposits made were reflected immediately on the bank's servers, and the customer could withdraw the deposited money from any of the bank's branches. Software Advancements in Internet and information technology reduced manual work in banks and increased efficiency. Computer software is developed to perform core operations of banking like recording of transactions, passbook maintenance, interest calculations on loans and deposits, customer records, the balance of payments, and withdrawal. This software is installed at different branches of the bank and then interconnected by means of computer networks based on telephones, satellite and the Internet. Gartner defines a core banking system as a back-end system that processes daily banking transactions, and posts updates to accounts and other financial records. Core banking systems typically include deposit, loan, and credit-processing capabilities, with interfaces to general ledger systems and reporting tools. Core banking applications are often one of the largest single expenses for banks and legacy software is a major issue in terms of allocating resources. Spending on these systems is based on a combination of service-oriented architecture and supporting technologies. Many banks implement custom applications for core banking. Others implement or customize commercial independent software vendor packages. Systems integrators implement these core banking packages at b
https://en.wikipedia.org/wiki/Icarus%20Project
The Icarus Project (2002-2020) was a network of peer-support groups and media projects with the stated aim of changing the social stigmas regarding mental health. History In 2002, Sascha Altman DuBrul wrote an article published in the San Francisco Bay Guardian about his experiences being diagnosed with bipolar disorder. He founded the Icarus Project with Jacks McNamara, an artist and writer. The Project sought to create spaces where people could talk freely about their lived experiences in regards to their mental health. Years later, musician-activist Bonfire Madigan Shive and counsellor/activist Will Hall became key members in The Icarus Project's administration and development. The Icarus Project's "Mission" The Icarus Project's stated aims were to provide a "support network and education project by and for people who experience the world in ways that are often diagnosed as mental illness." The responsibilities of the group are to gather people locally for support, and access to alternatives to mainstream medical diagnosis and treatment. The Project advocates self-determination and caution when approaching psychiatric care. It encourages alternatives to the medical model that is accepted by mental health professionals. In 2005, Journalist Jennifer Itzenson noted that while the Icarus Project may accept those with a wide range of "perspectives" on mental health issues, there is also "an edge of militancy within the group," particularly among those who reject medication. Itzenson also writes that's the group's questioning of medical care is "misguided" and that rejecting medication is a "potentially fatal choice" for those with bipolar disorder. While Icarus Project staff have described their expertise in social activism, herbalism, and labour organizing; none of them are licensed medical or mental health professionals. The Icarus Project advisory board members describe their members as educators, artists, activists, writers, healers, community organizers, and other creative types. Some members of the group identify as Latinx, queer, trans, people of colour or mixed race, and trauma survivors. Structure / funding The Icarus Project was under the fiscal sponsorship of FJC, a non-profit 501(c)3 umbrella organization arm of an investment firm, based in New York City. The Icarus Project formerly got the bulk of its money from foundation grants, including the Ittleson Foundation, but it also had many individual donors. Publications Educational materials published by The Icarus Project have been published in Spanish, German, French, Italian, Japanese, Greek, and Bosnian/Croatian. Some of these publications are listed below: Navigating the Space Between Brilliance and Madness; A Reader and Roadmap of Bipolar Worlds (2004) Friends Make the Best Medicine: A Guide to Creating Community Mental Health Support Networks. (2006) Through the Labyrinth; A Harm Reduction Guide to Coming Off Psychiatric Drugs (2009) Mindful Occupation: Rising Up witho
https://en.wikipedia.org/wiki/Robert%20Stevens%20%28scientist%29
Robert David Stevens (born 1965) is a professor of bio-health informatics. and former Head of Department of Computer Science at The University of Manchester Education Stevens gained his Bachelor of Science degree in biochemistry from the University of Bristol in 1986, a Master of Science degree in bioinformatics in 1991 and a DPhil in Computer Science in 1996, both from the University of York. Career and research Stevens current research interests are the construction of biological ontologies, such as the Gene Ontology, and the reconciliation of semantic heterogeneity in bioinformatics. This research has been funded by the Engineering and Physical Sciences Research Council (EPSRC), Biotechnology and Biological Sciences Research Council (BBSRC) and the European Union. Stevens has been Principal investigator for a range of research projects including Ondex, ComparaGrid, SWAT (Semantic Web Authoring Tool) and the Ontogenesis Network. Stevens served as Program Chair and co-organiser for the International Conference on Biomedical Ontology (ICBO) 2012 and co-founded the UK Ontology Network. He has also participated in the Health care and Life Sciences Interest Group (HCLSIG) of the World Wide Web Consortium (W3C). Stevens is currently on the editorial board of the Journal of Biomedical Semantics. Stevens started as a lecturer, then became a senior lecturer, Reader and became a Professor in August 2013. Stevens has taught on several undergraduate and postgraduate courses on software engineering, databases, bioinformatics and runs introductory and advanced courses on the Web Ontology Language. He has been the main doctoral advisor to five successful PhD students and co-supervised several others. Since July 2016 he has served as Head of Department of Computer Science at The University of Manchester. References |- Alumni of the University of York Alumni of the University of Bristol Academics of the University of Manchester People associated with the Department of Computer Science, University of Manchester Living people 1965 births
https://en.wikipedia.org/wiki/Armen%20Sarkissian
Armen Vardani Sarkissian (;) (born 23 June 1953) is an Armenian politician, physicist, investor, businessman, and computer scientist who served as the 4th president of Armenia from 2018 to 2022. He also served as Prime Minister of Armenia from 1996 to 1997. Sarkissian has the distinction of being one of the longest serving ambassadors of any country to the United Kingdom, a role to which he was first appointed in 1992-1996, before returning in 1998 and 2013. He was also Armenia’s maiden ambassador to the Vatican, the European Union, NATO, Holland, Luxembourg and Belgium, and served as “Senior Ambassador” to Europe. Sarkissian served as the first chairman of the Global Council on Energy Security at the World Economic Forum, with which he has had a long association. He has authored numerous scientific articles and is a highly sought after speaker and commentator on international affairs. His op-eds and essays appear in leading publications such as the Times, the Financial Times, the Daily Telegraph, Time magazine, Newsweek, Hollywood Reporter and the Wall Street Journal. In October 2022, Sarkissian announced that he was working on a new book titled The Small States Club: How Small Smart States can Save the World, to be published by Hurst Publishers. . In January 2023, The Small States Club was listed alongside forthcoming books by Martin Wolf and Peter Frankopan as one of the “15 books to look forward to in 2023” by the Diplomatic Courier. Education and early career Sarkissian graduated from the Yerevan State University Department of Theoretical Physics and Mathematics. He is an Honorary Doctor of the National Academy of Sciences of Armenia and member of the National Competitiveness Council of Armenia. From 1976 to 1984, he was assistant and later associate professor of Physics at Yerevan State University. In 1984, he became a visiting research fellow and visiting professor at the University of Cambridge. where he worked alongside Stephen Hawking and Lord Martin Rees. In 1988, he established and subsequently became the Head of the Department of Computer Modeling of Complex Systems at the Yerevan State University. Sarkissian was one of the co-creators of the 1991 Tetris spinoff game Wordtris. Later packaged with Tetris as Tetris Gold, it was for a period the most popular videogame in the world by sales. In an article in the Hollywood Reporter in March 2023, Sarkissian detailed the tense and dramatic events surrounding the creation of Wordtris and its sale to Spectrum Holobyte. In April, he appeared on a podcast alongside Henk Rogers, the co-founder of Tetris, and Alexey Pajitnov, the creator of the game whom he had last seen in the Soviet Union. Political, diplomatic, business career In November 1991, Sarkissian established the Armenian Embassy in London, the first Armenian diplomatic mission in the West. In addition to his diplomatic mission in the UK, he went on to become Senior Ambassador to Europe, and ambassador to NATO, to Belgium
https://en.wikipedia.org/wiki/WLKJ
WLKJ is a radio station in Johnstown, Pennsylvania, located at 105.7 MHz. WLKJ broadcasts the K-LOVE Network, and is owned by EMF Broadcasting. History For many years, this station was known as WZGO, and had broadcast a country music format for much of its existence, including a simulcast of WFGY in Altoona for many years. It had been the FM sister station to AM 1470 in Portage, but maintained separate studios and offices in downtown Johnstown. See also Other K-LOVE stations in Pennsylvania include: WKPA, State College, PA WKVP, Philadelphia, PA WLKE, Altoona, PA WLKA, Scranton, PA WPKV, Pittsburgh, PA W269AS, Harrisburg, PA External links K-Love radio stations Radio stations established in 1992 1992 establishments in Pennsylvania Educational Media Foundation radio stations LKJ
https://en.wikipedia.org/wiki/San%20Diego%20County%E2%80%93Imperial%20County%20Regional%20Communications%20System
The San Diego County–Imperial County Regional Communications System, known locally as the RCS, provides wireless 800 MHz voice (radio) and data communications—on separate networks—to over 200 local, county, state, and federal public safety and public service agencies in San Diego County, California and Imperial County, California. The day-to-day operations are managed by the Wireless Services Division of the San Diego County Sheriff's Department. The RCS voice network is a Project 25 Phase II 800 MHz trunked, simulcast system. It currently is mixed Phase I and Phase II digital communications and digital encryption capable. In the near future it will be full Phase II TDMA modulation. The RCS data network is provided to the County of San Diego Sheriffs Department only, and uses the Motorola 700 MHz conventional High Performance Data system. It provide wireless data access to computerized applications, such as computer aided dispatch (CAD), automated law enforcement databases, and unit messaging. History Timeline of notable events December 8, 1992 − San Diego County Board of Supervisors approved the RCS business plan March 7, 1995 − Governing bodies signed the Participating Agency Agreement March 5, 1996 − San Diego County Board authorized contract with Motorola & financing of remaining RCS components December 1996 − Construction of 43 radio repeater sites began May 1998 − Participating agencies began using the RCS December 1999 − San Diego County portion of the project completed March 5, 2001 − Santana High School shooting March 22, 2001 − Granite Hills High School shooting October 25, 2003 − Cedar Fire and Paradise Fire June, 2017 − FCC mandated 800MHz re-banding begins on the RCS, with the Northeast Cell being the first. Member agencies Counties San Diego Imperial Cities San Diego County Carlsbad Chula Vista Coronado Del Mar El Cajon Encinitas Escondido Imperial Beach La Mesa Lemon Grove National City Port of San Diego Poway Oceanside San Marcos Santee Solana Beach Vista Imperial County Brawley Calexico Calipatria El Centro Holtville Imperial Westmorland See also Motorola Trunked Radio Trunked radio system References San Diego County-Imperial County Regional Communications System Overview Radio Reference External links San Diego County-Imperial County Regional Communications System San Diego County Sheriff's Department San Diego County Sheriff's Department Wireless Services Division San Diego County Sheriff's Department Communications Center Government of Imperial County, California Government of San Diego County, California Trunked radio systems
https://en.wikipedia.org/wiki/R%2B%2B
R++ is a rule-based programming language based on C++, described as follows: The R++ extension permits rules to be defined as members of C++ classes. The programming system of the invention takes the classes with rules defined using R++ and generates C++ code from them in which the machinery required for the rules is implemented completely as C++ data members and functions of the classes involved in the rules. R++ was developed by Bell Labs in the 1990s, but due to the Bell System divestiture that split the legal rights to the work developed at the Laboratories between AT&T and Lucent, did not see immediate commercial development while the two companies disputed ownership. References External links R++ current website in Bell Labs C++ programming language family
https://en.wikipedia.org/wiki/KGNX
KGNX (89.7 FM) is a radio station licensed to serve Ballwin, Missouri, United States. The station is owned by Missouri River Christian Broadcasting, Inc., and airs religious programming as an affiliate of The Good News Voice and a member of the Moody Broadcasting Network. Programming KGNX airs a variety of Christian Talk and Teaching programs including; Back to the Bible, Focus on the Family, Grace to You with John MacArthur, Revive our Hearts with Nancy Leigh DeMoss, Insight for Living with Chuck Swindoll, Truth for Life with Alistair Begg, In the Market with Janet Parshall, Love Worth Finding with Adrian Rogers, Turning Point with David Jeremiah, Joni & Friends, and Unshackled!. KGNX also airs Christian music overnight. The YMCA years From the station's sign-on in 1978 until September 2008, this station was owned by West County Family YMCA, a branch of the YMCA of Greater St. Louis, and served the western St Louis, Missouri, area. The station was assigned the KYMC call letters by the Federal Communications Commission in 1978 and was granted its initial license to cover on June 19, 1980. KYMC was the only radio station owned by a YMCA in the United States. Programming KYMC took to the air waves in the Winter-Spring of 1978 as "KLMA" 89.9 FM. During the construction permit phase and early months or weeks of broadcasting it was determined that the call letters KLMA were already being used, so the call sign was changed to KYMC. The initial sign on frequency was 89.9 FM and the initial transmitter power was 10 watts, on a horizontal polarized loop antenna about 40 to 50 feet up on the small self-supporting tower. In the days before deregulation, drop-in FM signals, and crowding on the FM dial, this signal power put out a reliable 8- to 15-mile signal from the transmitter site on a hill at 224 West Clayton Road, on a small tower behind Don Kohn's Wildwood TV repair retail store. Donald Kohn was the chief engineer, equipment supplier, studio builder, and driving force behind putting KYMC on the air. Initial programming on KY-90 and KYMC was originally known consisted of typical mass appeal popular music (top 40, rock, disco, and country-rock) with some specialty shows featuring jazz music and country-rock music. Specialty programs also included local high school sports play-by-play (Parkway West and Lafayette High School). The youthful disc jockeys and announcers and board operators all came from Parkway West and Lafayette High school, and to a lesser degree from Parkway Central and Parkway North. Typical top 40/pop music (similar to KSLQ, KXOK, WLS, KSD or KIRL) was the dominant music format for the first 5 to 10 years of KYMC's broadcast history. When automation came to KYMC, in the late 1980s the format changed to an adult contemporary format borrowed from 55 KSD's music library, utilizing the old KSD control board in the studios and the stereo music stream was changed to a lower quality monaural FM. High school student broadcast staff involve
https://en.wikipedia.org/wiki/Superbase%20%28database%29
Superbase is an end-user desktop database program that started on the Commodore 64 and was ported from that to various operating systems over the course of more than 20 years. It also has generally included a programming language to automate database-oriented tasks, and with later versions included WYSIWYG form and report designers as well as more sophisticated programming capabilities. History It was originally created in 1983 by Precision Software for the Commodore 64 and 128 and later the Amiga and Atari ST. In 1989, it was the first database management system to run on a Windows computer. Precision Software, a UK-based company, was the original creator of the product Superbase. Superbase was and still is used by a large number of people on various platforms. It was often used only as an end-user database but a very large number of applications were built throughout industry, government, and academia and these were often of significant complexity. Some of these applications continue in use to the current day, mostly in small businesses. The initial versions were text mode only, but with the release of the Amiga version, Superbase became the first product to use the now common VCR control panel for browsing through records. It also supported a number of different media formats, including images, sounds, and video. Superbase was often referred to as the multimedia database in early years, when such features were uncommon. The Amiga version also featured an internal language and the capability to generate front end "masks" for queries and reports, years before Microsoft Access. This version was a huge success and that resulted in a version being created for a number of platforms using the same approach. Eventually a Microsoft Windows version was released and a couple of years later the company was sold by its founders to Software Publishing Corporation. SPC sold off the non-Windows versions of the product and after releasing version 2 and in the late alpha stages of version 3, sold the product to a company called Computer Concepts Corporation. This relatively unknown company created a subsidiary called Superbase, Inc. and after finishing off the late stage alpha of version 3 and launching it as Superbase 95, eventually appeared to have lost interest in the product, at which point it was bought by a small group of former customers and brought back to the UK. This company, Superbase Developers plc, continued to extend and support the product through Superbase Classic. The Amiga version was sold to Mr. Hardware Computers. Joe Rothman developed and renamed the program to SBase Pro 4. Mr Hardware Computers and SBase Pro 4 were sold to Russ Norrby who put out version 1.36n being the newest version. A new, next-generation rewrite of the product initially called Superbase Next Generation (SBNG) which included a new object oriented programming language called SIMPOL was begun in 1999-2000. It had primarily been an alpha product; although it was bil
https://en.wikipedia.org/wiki/EGML
EGML may stand for: Damyns Hall Aerodrome (ICAO code), an operational general aviation aerodrome in East London, England Extended Game Maker Language, the programming language used in G-java
https://en.wikipedia.org/wiki/QuickTime%20for%20Java
QuickTime for Java or QTJ is a software library that allows software written in the Java programming language to provide multimedia functionality, by making calls into the native QuickTime library. In practice, it allows Java applications on Mac OS, Mac OS X and Microsoft Windows to support the capture, editing, playback, and export of many different media formats and codecs. QTJ has been deprecated by Apple. History Owen W. Linzmayer, in Apple Confidential 2.0, traces QuickTime for Java's genesis back to Kaleida Labs, a spin-off company created by Apple Computer and IBM, noting that it and some Unicode text classes were the only Mac software salvaged from the four-year, $150 million disaster. Ported to the Mac OS, it was developed under the code-name "Biscotti", and first released as a public beta in 1999. Later versions were installed by default with Mac OS and Mac OS X, and were an optional part of the QuickTime install for Windows. QTJ 6.1 In 2003, Apple issued a Java 1.4.1 implementation that broke any QTJ applications that tried to run under 1.4.1 on Mac OS X. The underlying problem was Apple's move from Carbon to Cocoa for their AWT implementation, and the removal of a Java-to-native library called "JDirect" that QTJ relied on. QTJ applications could still run under Java 1.3.1, but apps that did not specify the version of Java they required, or that needed 1.4 features, were rendered unusable. Later that year, Apple released a new version of QTJ that dealt with the incompatibilities, by offering a compatible but scaled-down version of the GUI classes. This 6.1 version of QTJ also radically changed the API, so that instead of having developers create GUI components and associate Movies or other renderable objects with them, the developers now needed to start with the Movie and request a suitable component from a factory. The new version also neglected to provide a component to show a visual preview of the input from a capture device, such as a webcam or camcorder. Design QTJ lays an object-oriented API on top of the native C-based QuickTime library. It does this by associating common structs and the functions that work with them into classes. For example, the Movie struct is the basis of the class quicktime.std.movies.Movie, with functions like NewMovieFromFile and GetMovieTrackCount becoming the instance methods fromFile() and getTrackCount() respectively. The result is more like a genuine object-oriented API than other C-to-Java adaptations (such as JOGL, which dumps the OpenGL header files into classes with thousands of static methods). The Cocoa-based QTKit is a similar attempt to put an object-oriented layer atop the procedural QuickTime library, using Objective-C. Apple's use of the top-level package name quicktime violates the Java Language's Specification convention that packages use a reverse-domain-name scheme, such as com.apple.quicktime. However, as Apple owns the "QuickTime" trademark, there is no reali
https://en.wikipedia.org/wiki/Research%20Machines%20380Z
The Research Machines 380Z (often called the RML 380Z or RM 380Z) was an early 8-bit microcomputer produced by Research Machines in Oxford, England, from 1977 to 1985. Description The 380Z used a Z80 microprocessor (hence the name) with up to 56 KB of user RAM. When fitted with an optional floppy disk drive the system ran the CP/M operating system. The basic system came with a text-only monochrome video card, which could be enhanced with a 320×192 high-resolution graphics board. Aided by a British government subsidy to schools for half of the price the 380Z was sold mainly to educational institutions in the United Kingdom, with some also sold to industry. In 1979 a dual 8-inch disk system with 56 KB of memory cost £3266, and a 16 KB cassette-based system cost £965 (excluding VAT). Hardware Architecture The 380Z was packaged in a large, black, 19-inch rack-mount, rectangular metal case containing the power supply, a number of printed circuit boards and the optional 5¼-inch floppy disk drives. The front panel had a pair of strong carrying handles, a keyswitch and a reset button. The keyswitch controlled power and also enabled the reset button. The keyboard was separate and came in a tough metal case. Early versions were contained in a light blue metal case with a white front and had only a cassette interface or 8-inch floppy drives; only a small number of these were made. An optional 8-bit ASCII paper tape punch/reader was also used, as this was a common storage medium at the time - where previous use of a computer had been limited to a teletype machine connected to mainframe by telephone. The system used a passive bus architecture with no motherboard – all electronics were contained on a number of cards interconnected by ribbon cable. The only microprocessor offered was a 4 MHz Z80A. Memory Memory was fitted in up to four banks of RAM, each of either 4 KB (4 × 1024 bytes) or 16 KB, although not every permutation was permitted. Typical configurations were 16 KB for cassette-based systems and 32, 48 or 64 KB of memory on disk-based systems. Main memory was not used by the text or graphics video cards, although memory on the video cards was bank switched into a dedicated 1.5 KB address block. The 380Z was also fitted with up to 6 KB of firmware, known as COS. On systems fitted with less than 64 KB of RAM the COS reserved 1 KB of system RAM, leaving the rest available to the user. On the 64 KB RAM system a total of 56 KB was available to the user, with the remainder used by COS or inaccessible because of the firmware ROM, video card, and memory-mapped I/O. Video COS 3.4 (see below) and earlier systems came with a basic video card providing a 40×24 text-only monochrome display. Composite video output was provided for an external monitor, and an internal RF modulator provided a separate output to drive a television set. Later systems were supplied with an enhanced video card that was software-switchable between 40×24 and 80×24 character modes
https://en.wikipedia.org/wiki/4K%20%28computer%20virus%29
4k is a computer virus which infects COM files and EXE files. The virus was one of the first file infectors to employ stealth tactics. Infected systems will hang, after September 22 every year, which is also the date of birth of Bilbo Baggins, a character from The Lord of the Rings. The code was intended to display the message Frodo Lives, but hangs in all known variants. This virus was spread without the aid of the Internet. It was ported between systems by floppy disks. History It first appeared in October 1989. The first U.S. specimen was contracted in Dallas, TX, and quarantined with verification given by antivirus professionals. Reporters and TV crews recorded this in the local area news in August 1990. Its trail led from Dallas back to New York City via a professional at a software firm creating software for lawyers. Virus firms had been tracking it previously in London a month or two before getting calls from New York. No specimens were quarantined or properly recorded in New York. Raymond Glath of Phoenix, AZ, was the developer and owner of the Vi-Spy product which continued production until mid-release of Windows 95. Reports to McAfee antivirus and Vi-Spy antivirus firms resulted in only one product properly detecting the virus, Vi-Spy. Operation The virus added itself to the system in a way which defied normal infection processes. Because of this, it was able to infect a system without using system subroutines, which is what most antivirus products were watching. This is why the virus received the additional name 'stealth'. The infection process used a mathematical algorithm to determine the letters E-X-E & C-O-M. When a file was opened by the OS, the virus checked the extension of the file, and sometimes, other extension letters would be identified as a program file causing the virus to infect a data file and obviously corrupting its contents. Because the virus appended itself to a file, while hiding the increase in file length, the system could cross-link files and diagnostics on the disks would report allocation errors. This would damage programs and data alike. The description of the problems found while trying correct the 'stupid-looking errors' would cause most computer professionals to erase the system and start over. A few days later the problems would arise again. Diagnostic disks and writable installation disks used to fix the computer would commonly be infected with the virus and this would aid in the spread. References DOS file viruses
https://en.wikipedia.org/wiki/Eliza%20%28computer%20virus%29
Eliza is a computer virus discovered in December 1991. It infects COM files including COMMAND.COM. It has been reported that it is defective, yet destroys the .EXE files it creates. The .COM files are not deleted. To avoid detection, it does not alter the dates of files it infects, but increases their length by 1,193 or 1,194 bytes. It is also found in later versions of Windows. DOS Strain One of the forms of Eliza attacks the MS-DOS operating system by reproducing itself into COM and .EXE files. However, the virus has a bug that causes it to delete only .EXE files. Because it is defective and easy to track, it has been considered a minimal threat. Windows NT/2000/XP/Vista/7 Strain It is unknown whether the same person developed the Windows strain, which is much more damaging and is considered a legitimate threat. One site reports that it does the following: Remotely controls the computer Wastes system resources and CPU usage Tracks Internet activity and keystrokes, allowing the hacker to record/steal passwords, credit card numbers, etc. The virus can be removed with an antivirus program, or by rebooting in Safe Mode and manually removing the infected files. References DOS file viruses
https://en.wikipedia.org/wiki/Guy%20Aoki
Guy Aoki (born May 12, 1962) is an American civil rights activist. He is the leader of the Media Action Network for Asian Americans (MANAA), which he co-founded in 1992. He is also a contributing columnist for the Rafu Shimpo, and debates publicly on Asian American issues. Media appearances During the 1980s, Aoki was part of the production staff for the American Top 40 radio program. In 2017 Aoki appeared in "One Nation, Under Comedy", the fourth episode of CNN's documentary program The History of Comedy. Views on positive media developments Aoki has praised Harold and Kumar Go to White Castle and its sequel for using Asian actors in leading roles as "relatable..regular guys.” Aoki has also praised the 1950s television comedy Bachelor Father for prominently featuring Asian actors and storylines, including "feisty" comedian Sammee Tong and Victor Sen Yung, the scheming "Uncle Charlie," "a slick, Americanized character. I thought it was great that way back in the ’50s, audiences saw a Chinese American who acted just like anyone else." Campaigns against media Aoki is concerned with negative portrayals of Asians in the media and has launched several organized campaigns to highlight his views. Los Angeles riots and Nightline During the 1992 Los Angeles riots, which targeted Korean-American merchants for destruction, Aoki became frustrated with early coverage by ABC News Nightline. Ted Koppel interviewed Black leaders about the Black/Korean conflict. The opinions shared about Korean-Americans, and the lack of Korean American interview subjects drew criticism from Aoki, who stated that the episode was not responsible journalism. Later episodes included the Korean-American perspective. Rising Sun Aoki and MANAA protested the 1993 film Rising Sun before, during, and after release. Aoki was concerned that the villainous behavior on the part of the Japanese antagonists in the film would promote negative stereotypes of Asian Americans, observing that Internment of Japanese Americans began with media demonization. Sarah Silverman controversy In July 2001, Aoki became embroiled in a public controversy stemming from his objection to a joke told by comedian Sarah Silverman, which involved her use of the ethnic slur "chink", in an interview on the July 11, 2001 episode of Late Night with Conan O'Brien. In the interview, Silverman explained that a friend had advised her on how to avoid jury duty by writing a racial slur on the selection form, "something really inappropriate, like, 'I hate chinks'." However, Silverman said that she ultimately decided that she did not want to be thought of as a racist and instead wrote, "I love chinks." The Associated Press quoted Aoki: "There is no excuse for something like this to have made the air. The term is the most offensive possible reference to a person of Chinese descent." NBC and Conan O'Brien issued an apology, but Silverman did not, insisting later on the July 26, 2001 episode of Politically Incorrect that she
https://en.wikipedia.org/wiki/Stardent%20Inc.
Stardent Computer, Inc. was a manufacturer of graphics supercomputer workstations in the late 1980s. The company was formed in 1989 when Ardent Computer Corporation (formerly Dana Computer, Inc.) and Stellar Computer Inc. merged. History Stellar Computer Stellar Computer was founded in 1985 in Newton, Massachusetts, and headed by William Poduska, who had previously founded Prime Computer and Apollo Computer. This company aimed to produce a workstation system with enough performance to be a serious threat to the Titan, and at a lower price. Ardent responded by starting work on a new desktop system called Stiletto, which featured two MIPS R3000s (paired with two R3010 FPUs) and four i860s for graphics processing (the i860s replaced the vector units). Their first product was demonstrated in March 1988. An investment from Japanese company Mitsui and others was announced in June 1988, bringing the total capital raised to $48 million. Ardent Computer Corporation At almost the same time, in November 1985, Allen H. Michels and Matthew Sanders III co-founded Dana Computer, Inc. in Sunnyvale, California. The company sought to produce a desktop multiprocessing supercomputer dedicated to graphics that could support up to four processor units. Each processor unit consisted initially of a MIPS R2000 CPU, and later a R3000, connected to a custom vector processor. The vector unit held 8,192 64-bit registers that could be used in any way from 8,192 one-word to thirty-two 256-word registers. This compares to modern SIMD systems which allow for perhaps eight to sixteen 128-bit registers with a small variety of addressing schemes. Their goal was to release their Titan supercomputer in July 1987 at a $50,000 price point. By late 1986, however, it became clear that this was unrealistic. A second round of funding came from Kubota Corporation, a Japanese heavy industries company, which had cash to spare and was looking for new opportunities. Kubota agreed not only to fund the completion of the Titan but also to provide production facilities in Japan. By the time it was finally ready for testing in February 1988, the performance leadership position of Titan had been eroded and the price had risen to $80,000. Ardent software ran on Unix System V Release 3 with proprietary support for the four-way SMP and the vector processor. The compiler was based on the Convex Fortran (and C) compiler. Their significant graphics system for visualization was DORE (Dynamic Object Rendering Environment). In December 1987, Dana changed its name to Ardent Computer after learning about a local disk drive company called Dana Computer. Gordon Bell, who had been architect of the VAX computer, was VP of Engineering and an early member of Ardent. Michels had considered working with Poduska, but founded Convergent Technologies instead, before Ardent. Japan-based Kubota Corporation became a major investor, owning up to 44% of Ardent. After some delay, a product was introduced in 1988. Form
https://en.wikipedia.org/wiki/Z%20Channel%20%28disambiguation%29
Z Channel is one of the first pay cable stations in the United States. Z Channel may also refer to: Z (TV channel), a French-language Canadian TV network sometimes called Z Channel (Fr. Canal Z) Z-channel (information theory), a communications channel used in coding theory and information theory Z Channel: A Magnificent Obsession, a 2004 documentary about the pay cable station See also Channel Z (disambiguation) Z Music Television
https://en.wikipedia.org/wiki/Z-channel%20%28information%20theory%29
In coding theory and information theory, a Z-channel or binary asymmetric channel is a communications channel used to model the behaviour of some data storage systems. Definition A Z-channel is a channel with binary input and binary output, where each 0 bit is transmitted correctly, but each 1 bit has probability p of being transmitted incorrectly as a 0, and probability 1–p of being transmitted correctly as a 1. In other words, if X and Y are the random variables describing the probability distributions of the input and the output of the channel, respectively, then the crossovers of the channel are characterized by the conditional probabilities: Capacity The channel capacity of the Z-channel with the crossover 1 → 0 probability p, when the input random variable X is distributed according to the Bernoulli distribution with probability for the occurrence of 0, is given by the following equation: where for the binary entropy function . This capacity is obtained when the input variable X has Bernoulli distribution with probability of having value 0 and of value 1, where: For small p, the capacity is approximated by as compared to the capacity of the binary symmetric channel with crossover probability p. {| class="toccolours collapsible collapsed" width="80%" style="text-align:left" !Calculation |- | To find the maximum we differentiate And we see the maximum is attained for yielding the following value of as a function of p |} For any p, (i.e. more 0s should be transmitted than 1s) because transmitting a 1 introduces noise. As , the limiting value of is . Bounds on the size of an asymmetric-error-correcting code Define the following distance function on the words of length n transmitted via a Z-channel Define the sphere of radius t around a word of length n as the set of all the words at distance t or less from , in other words, A code of length n is said to be t-asymmetric-error-correcting if for any two codewords , one has . Denote by the maximum number of codewords in a t-asymmetric-error-correcting code of length n. The Varshamov bound. For n≥1 and t≥1, The constant-weight code bound. For n > 2t ≥ 2, let the sequence B0, B1, ..., Bn-2t-1 be defined as for . Then Notes References Coding theory Information theory Inequalities
https://en.wikipedia.org/wiki/Sussman%20anomaly
The Sussman anomaly is a problem in artificial intelligence, first described by Gerald Sussman, that illustrates a weakness of noninterleaved planning algorithms, which were prominent in the early 1970s. Most modern planning systems are not restricted to noninterleaved planning and thus can handle this anomaly. While the significance/value of the problem is now a historical one, it is still useful for explaining why planning is non-trivial. In the problem, three blocks (labeled A, B, and C) rest on a table. The agent must stack the blocks such that A is atop B, which in turn is atop C. However, it may only move one block at a time. The problem starts with B on the table, C atop A, and A on the table: However, noninterleaved planners typically separate the goal (stack A atop B atop C) into subgoals, such as: get A atop B get B atop C Suppose the planner starts by pursuing Goal 1. The straightforward solution is to move C out of the way, then move A atop B. But while this sequence accomplishes Goal 1, the agent cannot now pursue Goal 2 without undoing Goal 1, since both A and B must be moved atop C: If instead the planner starts with Goal 2, the most efficient solution is to move B. But again, the planner cannot pursue Goal 1 without undoing Goal 2: The problem was first identified by Sussman as a part of his PhD research. Sussman (and his supervisor, Marvin Minsky) believed that intelligence requires a list of exceptions or tricks, and developed a modular planning system for "debugging" plans. See also STRIPS Automated planning Greedy algorithm Sources G.J. Sussman (1975) A Computer Model of Skill Acquisition Elsevier Science Inc. New York, NY, USA. Book version of his PhD thesis. Automated planning and scheduling 1975 introductions
https://en.wikipedia.org/wiki/Mantracker
Mantracker is a Canadian reality television series created by Ihor Macijiwsky and produced by Bonterra Productions. It premiered in Canada in April 2006 on the Outdoor Life Network. In the United States, the show aired on the Science Channel. In South Africa, it airs on the History Channel and in the UK on Extreme Sports Channel and Blaze. The episodes of the first six seasons feature Terry Grant, an expert tracker called the "Mantracker", who pursues two individuals in the remote Canadian or American wilderness. The pursued, referred to as "Prey", must elude capture while attempting to reach a finish line within thirty-six hours. In season 7, Chad Savage Lenz replaces Terry Grant as the Mantracker. Format The object of Mantracker is for the Prey to reach a finish line some 17 to 60 kilometres away without getting caught by the Mantracker in a pre-determined time (usually 36 hours). The Mantracker's goal is to catch the Prey before they reach the finish line, within the designated time. There is no prize for succeeding, other than "bragging rights" and personal satisfaction. Each episode features a two-person team of Prey who usually (but not always) have a pre-existing relationship. The Prey have varying wilderness survival skills and physical fitness levels. The only items provided to the Prey are a map (that includes the location of the finish line) and a compass for navigation. The Prey carries the gear they consider necessary to complete the challenge. The Prey determine for themselves how to avoid capture. The Mantracker does not meet the team before the chase or know their destination. Traveling on horseback and aided by a local guide (known as the "Sidekick"), the Mantracker relies on his tracking skills, though some equipment (such as regular and infrared binoculars) is sometimes used. The Prey is given a head start, usually about 2 kilometres, although in more rugged terrain that distance may be greater. The chase is started by a flare gun fired from the Prey's position. The Prey head towards the finish, using the terrain to hide their location. The Mantracker and his Sidekick ride to where they believe the Prey began and attempt to determine the direction in which they are headed. The Prey travel through the terrain, often going off-trail and "bushwhacking" through dense brush, over hills, rocky ground, and rivers and lakes to reach the finish line and to escape the Mantracker. The race often includes overnight camping. There is no pre-set stopping point on day one or starting time on day two. Although the Prey commonly travel on foot, they can use other transportation modes. For example, in one episode the Prey hitchhiked for a short distance. In another episode, the Prey used rock climbing gear to scale down a steep cliff. Unless time runs out, the race ends when the Prey successfully arrive at the finish line or if the Mantracker or the Sidekick captures them. To capture the Prey, the Mantracker or the Sidekick must tag or som
https://en.wikipedia.org/wiki/List%20of%20diplomatic%20missions%20of%20Nigeria
This is a list of diplomatic missions of Nigeria. Nigeria, the most populous African country, has a moderately large network of diplomatic missions. The country has significant influence in Africa and in various multilateral fora, including the Organisation of Islamic Cooperation, OPEC, the Commonwealth, and the African Union. Nigeria first started sending twelve diplomatic personnel overseas to serve in British missions from 1957. Three years later upon independence the country had its own foreign ministry, headed by Foreign Minister Jaja Wachukwu. Now the Nigerian foreign ministry has over 2,000 officers. Current missions Africa Americas Asia Europe Oceania Multilateral organisations Food and Agriculture Organization Rome (Permanent Mission) Gallery Closed missions Americas Asia Europe See also Foreign relations of Nigeria List of diplomatic missions in Nigeria Visa policy of Nigeria Explanatory notes References Nigerian Embassies and High Commissions Diplomatic missions Nigeria
https://en.wikipedia.org/wiki/Software%20portability
A computer program is said to be portable if there is very low effort required to make it run on different platforms. The pre-requirement for portability is the generalized abstraction between the application logic and system interfaces. When software with the same functionality is produced for several computing platforms, portability is the key issue for development cost reduction. Strategies for portability Software portability may involve: Transferring installed program files to another computer of basically the same architecture. Reinstalling a program from distribution files on another computer of basically the same architecture. Building executable programs for different platforms from source code; this is what is usually understood by "porting". Similar systems When operating systems of the same family are installed on two computers with processors with similar instruction sets it is often possible to transfer the files implementing program files between them. In the simplest case, the file or files may simply be copied from one machine to the other. However, in many cases, the software is installed on a computer in a way which depends upon its detailed hardware, software, and setup, with device drivers for particular devices, using installed operating system and supporting software components, and using different drives or directories. In some cases, software, usually described as "portable software", is specifically designed to run on different computers with compatible operating systems and processors, without any machine-dependent installation. Porting is no more than transferring specified directories and their contents. Software installed on portable mass storage devices such as USB sticks can be used on any compatible computer on simply plugging the storage device in, and stores all configuration information on the removable device. Hardware- and software-specific information is often stored in configuration files in specified locations (e.g. the registry on machines running Microsoft Windows). Software which is not portable in this sense will have to be transferred with modifications to support the environment on the destination machine. Different processors As of 2011 the majority of desktop and laptop computers used microprocessors compatible with the 32- and 64-bit x86 instruction sets. Smaller portable devices use processors with different and incompatible instruction sets, such as ARM. The difference between larger and smaller devices is such that detailed software operation is different; an application designed to display suitably on a large screen cannot simply be ported to a pocket-sized smartphone with a tiny screen even if the functionality is similar. Web applications are required to be processor independent, so portability can be achieved by using web programming techniques, writing in JavaScript. Such a program can run in a common web browser. Such web applications must, for security reasons, have limited
https://en.wikipedia.org/wiki/List%20of%20Eve%20%28American%20TV%20series%29%20episodes
Eve is an American television sitcom that was broadcast on United Paramount Network (UPN) from September 15, 2003, to May 11, 2006. A total of 66 episodes of Eve were broadcast over three seasons. Created by Meg DeLoatch, the series follows Miami fashion designer Shelly Williams (Eve) through her relationship with physical therapist J.T. Hunter (Jason George). DeLoatch described the sitcom as "focus[ing] on one relationship and follow[ing] all of the ups and downs in it" and its purpose as "showing the male and female points of view". Shelly and J.T. often turn to their two close friends for advice about the opposite gender, love, and relationships. Shelly frequently looks for advice from former model Rita Lefleur (Ali Landry) and married friend Janie Egins (Natalie Desselle-Reid), while J.T. finds support in his best friend Donovan Brink (Sean Maguire) and IRS worker Nick Dalaney (Brian Hooks). Even though Shelly and J.T.'s relationship is the recurrent storyline, the series does explore the relationships of its supporting cast; Donovan and Rita date each other, and the extremely picky Nick attempts to find the perfect partner. Critical response to Eve was mixed; some critics praised its inclusion as part of UPN's line-up of black sitcoms, while others felt Eve lacked charisma and the series was inferior to other sitcoms. Despite mixed reviews, Eve received various nominations for her performance, and the series was nominated for the Teen Choice Award for Choice Breakout TV Show during the 2004 Teen Choice Awards. Despite its high ratings among young African-American women, the show was canceled as a result of UPN's merger with the WB Television Network (The WB) to form The CW in 2006. Its removal, along with a majority of UPN's other programs, garnered negative attention from media commentators, who argued that it was an example of whitewashing. Eve has not been made available on Blu-ray or DVD, but it was released on the iTunes Store, Amazon Video, and HBO Max. Series overview Episodes Season 1 (2003–04) The first season introduces the six main characters: Shelly, J.T., Rita, Janie, Nick, and Donovan. Shelly runs the fashion boutique DivaStyle with her friends Janie and Rita. She pursues a relationship with J.T. only to discover he is afraid of commitment and exhibits some chauvinistic behavior. Their relationship is frequently tested by misunderstandings. Nick wants to find his ideal partner, but his attempts are typically thwarted as he is extremely picky about women. Even though his relationship with a woman named Dani appears to be successful, they break up in the spring. Donovan finds himself romantically attracted to Rita, but he resists the temptation because of his fear that it would ruin their friendship. <onlyinclude> Season 2 (2004–05) Shelly and J.T. break up at the beginning of the second season but continue a friends with benefits relationship. After discovering that she is bankrupt, Rita moves in with Janie to save money.
https://en.wikipedia.org/wiki/Runge%E2%80%93Kutta%E2%80%93Fehlberg%20method
In mathematics, the Runge–Kutta–Fehlberg method (or Fehlberg method) is an algorithm in numerical analysis for the numerical solution of ordinary differential equations. It was developed by the German mathematician Erwin Fehlberg and is based on the large class of Runge–Kutta methods. The novelty of Fehlberg's method is that it is an embedded method from the Runge–Kutta family, meaning that identical function evaluations are used in conjunction with each other to create methods of varying order and similar error constants. The method presented in Fehlberg's 1969 paper has been dubbed the RKF45 method, and is a method of order O(h4) with an error estimator of order O(h5). By performing one extra calculation, the error in the solution can be estimated and controlled by using the higher-order embedded method that allows for an adaptive stepsize to be determined automatically. Butcher tableau for Fehlberg's 4(5) method Any Runge–Kutta method is uniquely identified by its Butcher tableau. The embedded pair proposed by Fehlberg The first row of coefficients at the bottom of the table gives the fifth-order accurate method, and the second row gives the fourth-order accurate method. Implementing an RK4(5) Algorithm The coefficients found by Fehlberg for Formula 1 (derivation with his parameter α2=1/3) are given in the table below, using array indexing of base 1 instead of base 0 to be compatible with most computer languages: The coefficients in the below table do not work. Fehlberg outlines a solution to solving a system of n differential equations of the form: to iterative solve for where h is an adaptive stepsize to be determined algorithmically: The solution is the weighted average of six increments, where each increment is the product of the size of the interval, , and an estimated slope specified by function f on the right-hand side of the differential equation. Then the weighted average is: The estimate of the truncation error is: At the completion of the step, a new stepsize is calculated: If , then replace with and repeat the step. If , then the step is completed. Replace with for the next step. The coefficients found by Fehlberg for Formula 2 (derivation with his parameter α2 = 3/8) are given in the table below, using array indexing of base 1 instead of base 0 to be compatible with most computer languages: In another table in Fehlberg, coefficients for an RKF4(5) derived by D. Sarafyan are given: See also List of Runge–Kutta methods Numerical methods for ordinary differential equations Runge–Kutta methods Notes References Fehlberg, Erwin (1968) Classical fifth-, sixth-, seventh-, and eighth-order Runge-Kutta formulas with stepsize control. NASA Technical Report 287. https://ntrs.nasa.gov/api/citations/19680027281/downloads/19680027281.pdf Fehlberg, Erwin (1969) Low-order classical Runge-Kutta formulas with stepsize control and their application to some heat transfer problems. Vol. 315. National aeronautics and
https://en.wikipedia.org/wiki/Great%20Food%20Live
Great Food Live, formerly Good Food Live, was a British magazine programme hosted by Jeni Barnett and broadcast on UKTVFood part of the UKTV Network between 2001 and 2007. Jeni Barnett was joined every day by a chef co-host. The first co-hosts were Simon Rimmer, Paul Hollywood, Ed Baines and Paul Merrett, and later included Antony Worrall Thompson, Brian Turner, Sophie Grigson and Alan Coxon. Guest chefs demonstrated recipes, there were phone-ins, celebrity guests, and features on wine & spirits, new products and speciality foods. GFL was produced by independent production company, Prospect Pictures, its Editor was Elaine Bancroft, and Deputy Editor, Nikki Cooper. The show was taken off the air on 6 April 2007 and a new show called Market Kitchen followed from 16 April 2007, featuring Tana Ramsay, Tom Parker Bowles, Rachel Allen, Matthew Fort and Matt Tebbutt. External links UKTVFood Food reality television series British cooking television shows
https://en.wikipedia.org/wiki/Mosgortrans
Mosgortrans () is a state-owned company operating bus and electrical bus networks in Moscow and the Moscow Oblast. See also Mostransavto Trams in Moscow References External links Official site of the company Bus companies of Russia Transport in Moscow Service companies of the Soviet Union Transport in the Soviet Union Intermodal transport authorities Companies based in Moscow Unitary Enterprises of Russia