source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/MTV%20International | MTV International, also known as Music Television International and MTVI was the internet-based international version of MTV. The channel was a subsidiary of MTV Networks. The channel was broadcast on MySpace on MTV International's blog, and powered by YouTube.
Launched on August 17, 2006, the purpose of the channel was to give commercial-free music videos, once the original MTV had started concentrating on shows unrelated to music videos or music-related programming. MTV International also aired music-related specials and a few non-musical programs aimed at viewers in their teens and young adults.
History
MTV International's first music video to air was Paris Hilton's "Stars Are Blind". MTV International showed a variety of remixes and original versions of songs from internationally known artists and locally known artists from various countries, as well as live performances of songs. The channel allowed viewers to vote for their favorite videos. MTV International was the first MTV Network to be fully broadcast on the internet. MTV International played both old and new videos that are currently shown on other networks like MTV Hits and MTV Jams.
MTV International featured VJs and languages from different MTV channels around the globe. MTV International also showed music video specials such as "MTVI's Cool Christmas","MTV AVMA Week", "MTV VMAJ Week", and "MTV VMA Week" which played music videos based on subjects such as Christmas, Australia Video Music Awards, Video Music Awards Japan, MTV Video Music Awards. A goal of MTV International was breaking "the barrier that does not allow certain artists and music to countries like America".
The channel started to air more shows as its popularity grew. Some were uploaded without permission to Internet video website YouTube, which were later taken down due to copyright infringement. MTVI created an Anti-Copyright Videos Zone Only, since its parent company Viacom was suing YouTube and its owner Google for over 12,000 unauthorized videos on YouTube, uploaded since February 2, 2007. MTV International also made some changes to the channel; playlists were no longer on a separate page from the blog. MTV International relaunched on Saturday, May 6, 2007, at 3:14am GST/3:14pm DST. The channel on MySpace recovered after weeks of technical difficulties. All shows were planned to go back on schedule by May 12, 2007.
Music Television International shut down on June 22, 2007, after the channel was receiving few viewers. The channel still broadcast over YouTube after the shutdown but closed its YouTube channel shortly after. Some of the last music videos that MTVI showed on its channel were JYONGRI - "Possession", Hyori Lee - "10 Minutes", Plain White T's - "Hey There Delilah", and Michael Bublé - "Everything". Bhav Singh served as the Managing Director and Executive Vice President of the Emerging Markets of the MTVI.
Shows/programming
Pop Block
Rock Block (formerly known as MTV's Rock On!)
Drake & Josh
VH1 I |
https://en.wikipedia.org/wiki/Hope%20Williams%20Brady | Hope Williams Brady is a fictional character from Days of Our Lives, an American soap opera on the NBC network. Created by writer William J. Bell, she was portrayed by Kristian Alfonso on and off from April 1983 to the present day, most recently appearing in late April 2023. Hope is a member of the Horton family, the long-running core fictional family on Days. She is the mother of Shawn-Douglas Brady, Zack Brady, and Ciara Brady. Hope is one half of the supercouple Bo & Hope. She works as a cop for the Salem P.D. Hope was promoted to Commissioner of Salem P.D. in 2017.
Alfonso was nominated for a Daytime Emmy Award for Outstanding Younger Actress in a Drama Series (previously called Outstanding Ingenue) in 1985. She has also been nominated for eight Soap Opera Digest Awards and won four — two with co-star Peter Reckell (Bo Brady) for Favorite Couple (2001, 2003), Hottest Female Star (1999) and Favorite Newcomer (1984). She was also nominated for three Young Artist Awards (1984–86). In 2002, she and Reckell won a Special Fan Award (voted online) at the Daytime Emmys for Favorite Couple.
Casting
The character of Hope Williams was originated by child actor Kristina Osterhout from January 10 to August 27, 1974. Child actor Kimberly Weber took over the role from October 25, 1974, to April 29, 1975. Natasha Ryan was the child actor who played the young version of Hope the longest from June 4, 1975, through June 27, 1980. From May 11, 1981, until January 8, 1982, young adult actress Tammy Taylor played a teenaged Hope. Actress Kristian Alfonso assumed the role of Hope Williams on April 14, 1983, playing the role through April 20, 1987, reappearing from April 27 to August 3, 1990. She returned to the role on May 6, 1994. Alfonso's Hope appeared briefly as a patient of Drake Ramoray in season 6 episode 15 of the sitcom Friends (The One That Could Have Been, Part 1) on February 17, 2000.
In July 2020, Alfonso announced to Deadline Hollywood she would exit the role. In a statement, she said: "I feel blessed and honored to have been invited into people's homes for over three decades. However, it is now time for me to write my next chapter." In an interview with Entertainment Tonight, she discussed her exit and potential of a return, stating: "It's been a rollercoaster of emotions and I have no regrets. I don't plan on returning and popping in as others have done in the past. I think that chapter is closed and a new one needs to be started." Alfonso further disclosed that executive producers Ken Corday and Albert Alarr suggested that she take a four-to-five month break for storyline purposes, which also prompted her decision to exit. She exited the role during the October 14 episode.
In April 2022, it was announced Alfonso would reprise the role for the second chapter of Days of Our Lives: Beyond Salem, which was released on Peacock on July 11. In November of the same year, it was announced she would return to Days of Our Lives, returning during the Marc |
https://en.wikipedia.org/wiki/Gaylactic%20Network | The Gaylactic Network is a North American LGBT science fiction fandom organization. It has several affiliate chapters across the United States and Canada, with a membership of LGBT (lesbian, gay, bisexual, and transgender) people and friends, sharing an interest in science fiction, fantasy, horror, comics and role-playing games.
The Gaylactic Network oversees Gaylaxicon, an irregularly-held science fiction convention in various states. It also originated the Gaylactic Spectrum Awards, given annually for outstanding LGBT content in sci-fi, fantasy, and horror genre publications.
The Network is registered as a nonprofit organisation. Organizational records for the period 1986-2005 (bulk 1987-1991) are held by Brown University, and other universities mention it as a course resource
Purpose
The Gaylactic Network state on their website that their goals includes:
The promotion of science fiction, fantasy, and horror, and other related genres, across all media, with particular attention to works of interest to LGBT people.
To provide forums for LGBT people and their friends to share their interest in SF/F/H.
Highlighting the presence of LGBT elements within SF/F/H and within fandom.
Generarating interest in SF/F/H within the LGBT communities.
This is done via their affiliate chapters on a local scale, and nationally with the organisation of Gaylaxicon and (in the past) the Gaylactic Spectrum Awards and by online activities such as E-mail lists.
History and Affiliates
The Network sprang from the Boston-based Gaylaxian Science Fiction Society, an organization founded by Franklin Hummel (see Necronomicon: Providence) and assisted by John R Dumas began in 1986; Hummel was the group's first president. In 1987 Hummel then founded the Gaylactic Network (later called Gaylaxians International) as an umbrella organization for the many gay fandom clubs like the Gaylaxian Science Fiction Society that were forming locally in the United States
and abroad. The organization changed from an affiliate-based membership structure to an individual-based membership structure in 2000. The Board consists of a Speaker, Listener, Treasurer, Secretary, and four Board Members.
As the original group The Gaylaxian Science Fiction Society (GSFS) is the New England–based chapter of the Network, which organized the original convention and continues to be a driving force behind many of the Gaylaxicons. The Network is also registered as a non-profit organization.
Brown University maintains archives of the organization's old records, and other universities mentions it as a course resource
Since 1986, the Network has had up to 12 affiliate clubs. The affiliates are locally oriented, regionally based, autonomous clubs with their own leadership and membership. As of 2008, there are 9 affiliate chapters:
Gaylactic Outpost Atlanta, Atlanta, Georgia
Gaylactic Toronto Alliance, Toronto, ONT
Golden Gate Gaylaxians, San Francisco, California
Lambda Sci-Fi: DC Area Gaylaxia |
https://en.wikipedia.org/wiki/Maggie%20Horton | Maggie Horton Kiriakis is a fictional character from the American Peacock/NBC network soap opera Days of Our Lives played by actress Suzanne Rogers since 1973, the longest running role on the show, and one of the longest running in American soap operas.
The character was created by scriptwriter William J. Bell and producer Betty Corday as a romantic interest for original character Mickey Horton (John Clarke). For her work as Maggie, Rogers won the Daytime Emmy Award for Outstanding Supporting Actress in a Drama Series in 1979.
Maggie's storylines often focus on romance and family troubles. She is portrayed as a stoic, opinionated, and family-oriented woman who is generally loving and supportive, but occasionally interferes in her friends' and relatives' lives. A prominent storyline in 1984 included Maggie discovering that she had Myasthenia Gravis, which mirrored Rogers' real-life struggles with the disease. In 2003, Maggie was killed off in a "whodunnit?" murder storyline involving a serial killer. Rogers returned to the show in 2004 after producer James E. Reilly decided to have all the murder victims turn up alive on the island of Melaswen, or "New Salem" spelled backwards.
Maggie's most well-known relationship was her longtime marriage to original series character Mickey Horton. The characters met during Rogers' first episode in 1973, when Maggie cared for him while living on a farm. Following a series of experiences together, the pair grew extremely close, and their bond became central to both characters until Mickey's death in 2010. The character has been described as a "legend" and a television icon.
Creation and casting
Background
Introduced as Maggie Simmons, Maggie is one of the earliest characters created by scriptwriter William J. Bell and executive producer Betty Corday. The character was brought on as a potential love interest for original character Mickey Horton. Shortly after, the two were married, connecting her to the soap's core family. Maggie is the mother of Melissa Horton (whom she adopted), Summer Townsend, Daniel Jonas, Janice Barnes (whom she fostered), and Sarah Horton. She has six grandchildren: Nathan Horton (via Melissa), Mackenzie Horton and Victoria Kiriakis (via Sarah), Melanie Jonas, Holly Jonas, and Parker Jonas (all via Daniel).
Casting
Suzanne Rogers auditioned for the role on July 13, 1973, and garnered the attention of future daytime legend, Susan Flannery, who played Dr. Laura Horton. Maggie was introduced as a guest character in August 1973, by scriptwriter William J. Bell and executive producer Betty Corday. From the beginning, Bell considered the role ideal for Suzanne Rogers, a former Rockette from the Radio City Music Hall and Broadway chorus girl in such musicals as "Coco" and "Follies". Bell approached Rogers about taking the role of Maggie, and she agreed. She was immediately described by critics who gave reviews of the show as being one of the most energetic girls on daytime television. Th |
https://en.wikipedia.org/wiki/Kristen%20DiMera | Kristen Blake DiMera is a fictional character from Days of Our Lives, an American soap opera on the NBC network. The role was originally portrayed by Eileen Davidson. Davidson joined the cast of Days of Our Lives in 1993, and departed in 1998 after a five-year stint. After a 14-year absence, Davidson returned to the role of Kristen in the fall of 2012. Kristen and her brother Peter were raised by super villain Stefano DiMera at a very young age following the deaths of their parents; however, their mother Rachel was later revealed to be alive.
Davidson departed the series again in late 2013, although she made a brief appearance in early December 2013. She returned on July 28, 2014, for a twelve-week arc which concluded on November 6. She reprised the role again for an additional stint, which ran from April 14, to April 30, 2015. Davidson later reprised the role briefly on November 21, 2017. In 2018, Stacy Haiduk was cast in the role, appearing from August to October 2018 and for various stints since April 2019. Davidson reprised the role in September 2021 for the Peacock limited series, Days of Our Lives: Beyond Salem. Davidson later reprised the role in November and December 2021 on the main show, sharing the role with Haiduk. Davidson also portrayed the role for the Christmas television film, Days of Our Lives: A Very Salem Christmas in December 2021.
Davidson's performance has been met with critical acclaim, garnering a Daytime Emmy Award nomination for Outstanding Lead Actress in a Drama Series in 1998, before winning the award in 2014. Haiduk was nominated for Outstanding Supporting Actress in a Drama Series in 2022.
Casting
The role of Kristen DiMera was originally played by soap actress Eileen Davidson. Kristen was introduced on May 17, 1993. During Davidson's various runs on the soap, she also portrayed four other characters; Susan Banks (1996–98, 2014, 2017, 2021), Sister Mary Moira Banks (1997–98, 2017), Thomas Banks (1997) and Penelope Kent (1998). She also played Marlena Evans briefly in 1995 and 2021 when Marlena, who was possessed by the Devil, morphed to look like Kristen. Leslie Lunceford portrayed a young Kristen through flashbacks in 1996. Davidson originally departed the role of Kristen on April 24, 1998. Davidson's five roles earned her a Daytime Emmy nomination for Outstanding Lead Actress in 1998. After five years on Days, Davidson was re-introduced as Ashley Abbott in 1999 on The Young and the Restless, a role she originated from 1982 to 1988. She took over the role from Shari Shattuck, who had portrayed the character from 1996 to 1999. After Davidson's 2006 release from The Young and the Restless, rumors began to circulate that she would return to Days of Our Lives. This speculation was later debunked when it was announced that her Y&R alter-ego would crossover to its sister series The Bold and the Beautiful.
In May 2012, Davidson informed followers on her Twitter page that she had been let go from The Young and the |
https://en.wikipedia.org/wiki/Front%20and%20back%20office%20application | A front office application is any software that has a direct relation to customers. It provides functionality and data necessary to take orders, configure complex products and provide effective service and support to customers. It includes customer relationship management (CRM), sales force automation, customer support and field service. In turn, a back office application has no such direct relation. It provides functionality for internal operations such as enterprise resource planning (ERP), inventory control, manufacturing and all of the supply chain activities associated with procuring goods, services and raw materials. If an ERP system includes order entry and customer service capabilities, that system would bridge both back office and front office.
Examples
The software enabling the customer to order a product from a company is considered a front office application. If a salesperson is typing the order into the application, it is still considered a front office application even though the customer is not directly interacting with the software.
If the company uses different software to order the product from a manufacturer, it is considered a back office application.
See also
Front office
Back office
References
Business software |
https://en.wikipedia.org/wiki/Star%20Life%20%28Latin%20American%20TV%20channel%29 | Star Life (formerly known as Fox Life) was a pay television network in Latin America, launched by the Fox Networks Group in 2005. The network's scheduling varied with each version, ranging from traditional entertainment programming, including television series, sitcoms and films.
Star Life was operated by Disney Media Networks Latin America and The Walt Disney Company Latin America, both of which are owned by The Walt Disney Company.
History
During the first years of the launch, Fox Life had a varied programming grid that consisted of soap operas, comedies, dramas, films and cooking shows, which was considered the counterpart of the FX channel with aim of attracting a female audience.
On November 4, 2013, the channel was relaunched by merging it with the Utilísima channel, orienting the programming to the lifestyle with 70% original production and 30% acquired.
By then, the channel's programming was made up of series and films aimed at young and adult audiences, with productions that stood out in the leading roles.
On November 27, 2020, Disney announced that they would be renaming the Fox branded channels in Latin America to Star on February 22, 2021.
On January 10, 2022, it was announced that the Latin American version of Star Life would be shut down on March 31 along with several other networks in the region. A domestic version of Cinecanal was its direct replacement in Brazil.
Programming
In Latin America, the channel aired soaps. It aired Telefe and Record soap operas from Brazil and Argentina, respectively. The channel also featured mostly cooking shows and reality series on the Latin American service. When the current format was launched, it was with the exception of Brazil, where the channel aired, from 8 a.m. to 7 p.m., content from Utilisima and original shows for the local audience, as Bem Simples, and, from 7 p.m. to 8 a.m., reality series seen on the Fox Life service elsewhere in the region (most non-original cooking shows are not seen on the Brazilian service since the rights are held by GNT). On February 28, 2011, with the launch of the Bem Simples channel in Brazil, all Bem Simples/Utilisima content moved to that channel.
See also
Fox Life
References
External links
Fox Life
Television channels and stations established in 2005
Defunct television channels
Disney television networks
Latin American cable television networks
Spanish-language television stations
Portuguese-language television stations in Brazil
The Walt Disney Company Latin America
Television channels and stations disestablished in 2022 |
https://en.wikipedia.org/wiki/Blackstone%2C%20Providence%2C%20Rhode%20Island | {
"type": "ExternalData",
"service": "geoshape",
"ids": "Q4923386",
"properties": {
"title": "Blackstone",
"stroke": "#125123",
"stroke-width": 1,
"fill": "#2aaf4d"
}
}
Blackstone is a predominantly residential neighborhood in Providence, Rhode Island. It is in the northeast corner of the city and is bounded to the south and west by Lloyd Avenue and Hope Street respectively. It is one of six neighborhoods comprising the East Side of Providence.
History
Blackstone is one of the last parts of Providence to be developed, as the remoteness of its location and marshy land had precluded significant development before the late 19th century. It wasn't until construction of Blackstone Boulevard in 1894 as a means of reaching Swan Point Cemetery that the area saw extensive residential development.
The area was largely marshland, and the earliest road was Cat Swamp Lane followed the high ground. Several farms were located in the area during the 1700s, and a few farmhouses from that era remain. In the late 1700s, several burial grounds were established in the remote western part of the city. Several of these by 1847 and 1858 became consolidated into present-day Swan Point Cemetery.
Construction of Blackstone Boulevard
By the 1870s the cemetery was accessible by means of a public omnibus which journeyed by means of a winding zigzag road which ran along present-day North Main Street, Olney Street, Morris Avenue, Sessions Street, Cole Avenue, and Rochambeau. In 1886 the directors of Swan Point Cemetery hired landscape architect Horace Cleveland of Chicago to plan a road to improve access to the cemetery from the town of Providence. This road opened in 1894 as Blackstone Boulevard.
Blackstone Boulevard became a catalyst for development in the neighborhood, spurring construction of single family homes which were "architecturally distinctive" from the rest of the city. Between 1890 and 1923, property values along the Boulevard tripled, as the neighborhood became one of the most desirable and fashionable in the city. In the early 1900s, the Boulevard was redesigned to create the Blackstone Boulevard Park.
The 20th century saw institutional development in the form of Central Baptist Church, Temple Emanuel, and St. Sebastian's Roman Catholic Church.
Description
The Blackstone neighborhood comprises the northeast corner of the East Side of Providence, between the eastern ridge of the Moshassuck River Valley and the western bank of the Seekonk River. Blackstone is primarily residential, and made up of mainly of single-family dwellings. It is one of the city's most affluent neighborhoods.
Houses of Worship
Notable religious institutions in the area include Temple Emanu-El, St. Sebastian's Roman Catholic Church and the Community Church of Providence (formerly Central Baptist).
The Community Church began as an offshoot of the First Baptist Church in America. The congregation originally was known as the Second Baptist Church, then P |
https://en.wikipedia.org/wiki/NASCAR%20on%20TNT | NASCAR on TNT was the tagname for any NASCAR series race that had been broadcast on TNT by Turner Sports between 2001 and 2014. The network continued Turner's longstanding relationship with NASCAR that dated back to its initial association with TBS Superstation.
TNT's final race was the 2014 Camping World RV Sales 301 on July 13, 2014.
Coverage history
Prior to 2001
Prior to 2001, Turner Sports' home for NASCAR was TNT's sister station, TBS. Booth announcers/analysts included Ken Squier, Buddy Baker, and Dick Berggren. After TBS made a host/booth switch, Allen Bestwick became the lap-by-lap announcer with Baker and Berggren in the booth for TBS' 2000 coverage at Lowe's and Pocono while Squier moved to a host position, the same position he had held at CBS since the start of the 1998 NASCAR season.
TBS typically covered the Coca-Cola 600 and UAW-GM Quality 500 at Charlotte, the July race at Pocono, and several NASCAR Busch Series races. TBS aired side by side coverage during commercials during the 2000 UAW-GM Quality 500.
When NASCAR's new broadcasting rights contract was signed in 1999, which included Fox, FX, and NBC, TBS was to keep its rights to NASCAR by serving as NBC's cable partner. The deal was to begin with the 2001 NASCAR season.
However, Turner elected to move the race coverage to sister network TNT as part of its new branding and "We Know Drama" slogan. Also, TBS' coverage of Atlanta Braves baseball games, which were a staple of the channel lineup for years, often was aired on weekends afternoon or evening and would clash with NASCAR races.
2001–2006
TNT aired its first NASCAR Winston Cup Series race under the new contract at New Hampshire International Speedway in July 2001. Both networks shared the broadcast team of Allen Bestwick, Benny Parsons, and Wally Dallenbach Jr. in the booth and Bill Weber, Marty Snider, Dave Burns, and Matt Yocum on pit road, as well as both being produced with Turner Sports' graphical look. The only differences were the placement of the network's logo on the graphics package and different colored pit reporter fire suits. Also, Liz Allison, widow of former driver Davey Allison, worked as a reporter exclusively for TNT during the 2001 season.
TNT was treated as the secondary broadcaster, as far as broadcast rights are concerned, during its relationship with NBC because it is a cable rather than broadcast network (Turner produced all of NBC's telecasts as well). NBC's portion of broadcast included almost all of the prestigious races during their half of the year (with the exception of the Mountain Dew Southern 500 at Darlington, the fourth leg of NASCAR's Grand Slam, in 2001 and 2002, and the Chevy Rock & Roll 400 at Richmond from 2004 to 2006, when the race was the last race of the regular season under the season format). The idea was that ratings would most certainly be higher for NBC's coverage of a given race next to TNT's due to a broadcaster's penetration. TNT was given most of the Busch Series |
https://en.wikipedia.org/wiki/Maxdata | Maxdata is the name of two German information technology companies.
The original Maxdata was founded in 1987 by Holger Lampatz in Marl, North Rhine-Westphalia, as the Maxdata Computer GmbH. It began selling personal computers in 1990. Maxdata used its own name for B2B products while selling notebooks and displays for the customer market under the Belinea brand.
In 1997, Maxdata was majority-owned by , itself a fully-owned subsidiary of the Metro AG. In 2003, the company was restructured as the Maxdata AG and listed in the Prime Standard. Maxdata filed insolvency proceedings at the Local Court in Essen on Wednesday, 25 June 2008. It had 1000 employees at the time of closure. The Belinea brand was sold to Brunen IT Group while the Maxdata name was sold to S&T.
The Maxdata Computer AG, a fully-owned Swiss subsidiary of the Maxdata AG, was taken over by Brunen IT as Belinea AG before being sold to S&T and re-named Maxdata (Schweiz) AG. In 2016, S&T stopped the production of computers and notebooks.
S&T founded a new Maxdata Deutschland GmbH in 2014 in Mendig as a fully-owned subsidiary but in 2016 it was renamed to S&T Deutschland GmbH.
Products
Its product lines included servers, desktop computers, notebooks and the Belinea series of monitors.
References
Companies based in North Rhine-Westphalia
Defunct computer hardware companies
German brands
Defunct technology companies of Germany
Technology companies disestablished in 2008 |
https://en.wikipedia.org/wiki/Larceny%20%28Scheme%20implementation%29 | Larceny is an implementation of the Scheme programming language built around the Twobit optimizing compiler. Larceny offers several back-ends able to target native x86 and ARMv7 code. Petit Larceny is also available and emits C source code, which can then be further compiled to native code with an ordinary C compiler.
Older versions (<0.98) included support for the SPARC architecture in Larceny, and for Microsoft's Common Language Runtime via Common Larceny.
Larceny supports all major Scheme standards (R5RS, IEEE/ANSI, R6RS, and R7RS. The Larceny software is open source and available online.
References
External links
Scheme (programming language) compilers
Scheme (programming language) interpreters
Scheme (programming language) implementations
R6RS Scheme
Free compilers and interpreters |
https://en.wikipedia.org/wiki/Transparent%20Stained-Glass%20Windows | Transparent Stained-Glass Windows () is the third novel in the Labyrinth trilogy of cyberpunk novels written by Russian science fiction writer Sergey Lukyanenko. Originally published online, the story features two endings, both of which are included when it was printed in the Atomic Dream anthology. Unlike the first two novels, Transparent Stained-Glass Windows is told from the point of view of a young female MVD operative who is sent to an isolated area of Deeptown, a virtual city created by Microsoft and IBM, to inspect the first virtual prison and locate any possible breakouts into Deeptown. She soon finds out that the prison is used by the Russian government to secretly conduct experiments on inmates. Throughout the story, she keeps referring to a jigsaw puzzle she began to complete during her childhood but never finished (one piece was missing).
Characters
Karina - young female in early 20s. Works as a virtual operative for Department of Justice. Sent to investigate a possible breakout from a virtual prison.
Chingis - hacker-turned-businessman. Appears to be involved in the prison breakout but seems to be more concerned with stopping and exposing the experiments conducted by prison staff. After the events of the second novel, he apparently comes to terms with his acquired diver abilities.
Anton Stekov (also known as Bastard) - one of the inmates in the virtual prison. Suspected of breaking out into Deeptown. Appears to be working with Chingis towards the same goal.. Apparently, he was born Anton Steklov but lost his passport. When he was issued a new one, the database lost one of the letters due to a glitch.
Lieutenant Colonel Arkadiy Tomilin - virtual prison warden. In charge of the experiments conducted on prisoners. Courteous but suspicious of Karina. Believes she is not MVD but FSB.
References
Cyberpunk novels
Novels by Sergey Lukyanenko
2002 science fiction novels
AST (publisher) books
2002 Russian novels |
https://en.wikipedia.org/wiki/St%20Thomas%27s%20Community%20Network | St Thomas's Community Network is a community facility which serves the St Thomas's parish of Dudley, West Midlands, England.
The opportunity for a large community centre in the Kates Hill area was on the horizon in October 1988, when Dudley council confirmed that the Blue Coat School on Beechwood Road (a building which had started life in 1929 as Rosland Secondary School) would be merging with The Dudley School in the town centre with effect from September 1989 to form Castle High School, and that the Beechwood Road buildings would close in July 1990 after a year as the Castle High annexe.
The dream of a community centre for one of the most deprived areas of Dudley became reality in 1991, when St Thomas's Community Network opened at Beechwood Road.
It offers youth club facilities to children and teenagers, as well as educational support to young people who require assistance with literacy, numeracy or English as a second language. A qualified tutor is employed for these sessions. This education support was a particularly important asset in the St Thomas's area, as it has a larger percentage of Asian residents.
Despite campaigns by local residents, the centre closed in September 2015 and was demolished just over a year later.
External links
http://www.connexions-bc.co.uk/choices/wbl_detail.aspx?VenueID=165
Dudley
Charities based in the West Midlands (county) |
https://en.wikipedia.org/wiki/Irwin%20Magnetic%20Systems | Irwin Magnetic Systems, Inc., also known as Irwin Magnetics, was a computer storage manufacturer founded in 1979 and based in Ann Arbor, Michigan. At its height, the company employed 600 people in Ann Arbor. The company's primary product lines were magnetic tape data storage systems, most popularly the proprietary AccuTrak format. This format was widely adopted by Compaq, Hewlett-Packard and other OEM manufacturers; it was also incorporated into IBM Personal System/2 (PS/2) personal computers as an option. In 1989, the company was acquired by Cipher Data Products for US$77 million. Cipher was in turn acquired by Archive Corporation a year later. Archive maintained Irwin as an independent brand for a while after the acquisition.
Notable products
EzTape – backup and restore software
AccuTrak Plus – 120-MB and 250-MB tape drives
References
1979 establishments in Michigan
1989 disestablishments in Michigan
1989 mergers and acquisitions
American companies established in 1979
American companies disestablished in 1989
Companies based in Ann Arbor, Michigan
Computer companies established in 1979
Computer companies disestablished in 1989
Defunct computer companies of the United States
Defunct computer hardware companies |
https://en.wikipedia.org/wiki/Robert%20Trappl | Robert Trappl (born 16 January 1939, in Vienna) is an Austrian scientist and head of the Austrian Research Institute for Artificial Intelligence in Vienna, which was founded in 1984. He is known for his work in the field of cybernetics and artificial intelligence.
Biography
In the 1960s, Trappl received in Vienna a degree in electrical engineering, a degree in sociology from the Institute of Advanced Studies (Vienna), and a PhD in psychology, with a minor in astronomy.
Since the 1970s, Trappl has been working at the Medical University of Vienna, Austria. Since the 1980s he has been the director of the Austrian Research Institute for Artificial Intelligence and later until 2006 he also was head of the Institute of Medical Cybernetics and Artificial Intelligence at the Medical University of Vienna. Besides his work at the university he has advised several national and international companies and organizations.
In the 1970s, Trappl was President of the Austrian Society for Cybernetic Studies. In this position, he co-founded in 1980 the International Federation for Systems Research of which he became vice-president and from 1986 to 1988 president.
Trappl is also editor-in-chief of the scientific journals Applied Artificial Intelligence and Cybernetics and Systems, and a member of the editorial boards of several other journals.
Publications
Trappl has published over 180 articles and cooperated in some 34 books. A selection:
1992. Advanced Topics in Artificial Intelligence, Heidelberg/New York: Springer.
1997. Creating Personalities for Synthetic Actors, Heidelberg/New York: Springer.
2001. (eds)Multi-Agent Systems and Applications, Heidelberg/New York: Springer.
2003. Emotions in Humans and Artifacts, MIT Press.
2004. Agent Culture. Human-Agent Interaction in a Multicultural World, Lawrence Erlbaum.
2005. Wissenschaft und Medizin, 3rd ed., Vienna: Facultas.
2006. Cybernetics and Systems 2006, 2 vols. Vienna: ASCS.
2006. Programming for Peace: Computer-Aided Methods for International Conflict Resolution and Prevention, Dordrecht, NL: Springer, .
References
External links
Trappl's homepage at the Austrian Research Institute for Artificial Intelligence (OFAI)
1939 births
People in information technology
Cyberneticists
Living people
Scientists from Vienna |
https://en.wikipedia.org/wiki/Ernst%20Guillemin | Ernst Adolph Guillemin (May 8, 1898 – April 1, 1970) was an American electrical engineer and computer scientist at the Massachusetts Institute of Technology who spent his career extending the art and science of linear network analysis and synthesis. His nephew Victor Guillemin is a math professor at MIT, his nephew Robert Charles Guillemin was a sidewalk artist, his great-niece Karen Guillemin is a biology professor at the University of Oregon, and his granddaughter Mary Elizabeth Meyerand is a Medical Physics Professor at the University of Wisconsin-Madison.
Biography
Guillemin was born in 1898, in Milwaukee, and received his B.S. (1922) and S.M. (1924) degrees in electrical engineering from the University of Wisconsin–Madison and MIT, respectively. He then attended the University of Munich, under Arnold Sommerfeld, on a Saltonstall Traveling Fellowship. He was granted his doctorate in 1926, whereupon he returned to MIT as an instructor, becoming Assistant Professor in 1928, Associate Professor in 1936, and Professor in Electrical Communications in 1944. In 1960, he was appointed to the MIT Edwin Sibley Webster Chair of Electrical Engineering, a title he held until his retirement in 1963.
On the invitation of Edward L. Bowles in 1928, Guillemin was invited to assist in the development of a communications option for undergraduate students. In this effort, he revised and expanded a subject that included communication transmission lines, telephone repeaters, balancing networks, and filter theory. Thus began his lifelong career of developing and refining linear, lumped, finite, passive, and bilateral networks in the sphere of teaching.
Guillemin was appointed consultant to the Microwave Committee of the National Defense Research Committee in 1940. As such, he spent about half of his time consulting with groups in the MIT Radiation Laboratory. He took over administrative responsibility of the Communications Option in the MIT Department of Electrical Engineering, in 1941.
During his career, Guillemin influenced many undergraduate and graduate students who went on to contribute greatly in industry and academia; included in the list are his graduate students Robert Fano and Thomas Stockham. His professional contributions were recognized internationally with numerous honors and awards.
Memberships
Fellow of the American Academy of Arts and Sciences (1955)
Fellow of the American Institute of Electrical Engineers
Fellow of the Institute of Radio Engineers
Foreign Fellow of the British Royal Society of Arts
Honors
1948 – President's Certificate of Merit for his outstanding contributions during World War II
1961 – IRE Medal of Honor from the Institute of Radio Engineers
1962 – American Institute of Electrical Engineers Education Medal
1960 - Appointed the first Edwin Sibley Webster Professor
Publications
Ernst A. Guillemin has written several books:
1931. Communication Networks (Wiley)
1935. Communication Networks: Vol. II The Classical Theo |
https://en.wikipedia.org/wiki/NEPTUNE | The NEPTUNE Ocean Observatory project is part of Ocean Networks Canada which is a University of Victoria initiative. NEPTUNE is the world's first regional-scale underwater ocean observatory that plugs directly into the Internet. NEPTUNE is the largest installation on the Ocean Networks Canada network of ocean observatories. Since December 2009, it has allowed people to "surf" the seafloor while ocean scientists run deep-water experiments from labs and universities around the world. Along with its sister project, VENUS, NEPTUNE offers a unique approach to ocean science. Traditionally, ocean scientists have relied on infrequent ship cruises or space-based satellites to carry out their research, while the NEPTUNE project uses a remotely operated crawler.
Overview
NEPTUNE is an acronym for North-East Pacific Time-series Undersea Networked Experiments. The North-East Pacific is home to the Juan de Fuca plate—smallest of Earth's 12 tectonic plates. Its small size and close proximity to the coast gives NEPTUNE Canada a unique opportunity to observe tectonic processes. NEPTUNE Canada is built to provide continuous observations for 25 years. The time-series data gathered will allow scientists to study long-term changes over the life of the project. Instruments comprising the undersea observatory will operate at depths ranging from 17 to 2,660 m. Hundreds of instruments have been connected to the Internet by way of shielded cables carrying both power and fibre-optic communication lines. A database will archive and provide networked access to all archived data. Taking advantage of this platform, scientists collaborating with NEPTUNE are expected to conduct thousands of unique experiments over the life of the project.
Status
In 2007, NEPTUNE Canada laid approximately 800 km of power transmission and fibre optic communication cables over the northern part of the Juan de Fuca tectonic plate off the west coast of Vancouver Island in British Columbia. The University of Victoria hosts both the NEPTUNE Canada and VENUS projects along with the Data Management and Archiving System that is responsible for all data processing, from data acquisition to archiving to providing near real-time web access.
The NEPTUNE project was selected as one of the five most significant science projects of the year in 2008 from The Economist.
In June 2008, the NEPTUNE project received and successfully tested the world's first "Internet-operated deep sea crawler", created by a team of ocean scientists at Bremen's Jacobs University, will help researchers measure conditions such as temperature, salinity, methane content and sediment characteristics at the seafloor. The crawler "crawls" on dual tractor treads, which allow a full range of forward, backward and turning movement. Including its titanium frame, drive motors, sealed electronics chambers, wiring, lights, HD video camera, and sensors, the unit's out-of-water weight is 275 kg. With syntactic foam flotation blocks attached, th |
https://en.wikipedia.org/wiki/Recursive%20join | The recursive join is an operation used in relational databases, also sometimes called a "fixed-point join". It is a compound operation that involves repeating the join operation, typically accumulating more records each time, until a repetition makes no change to the results (as compared to the results of the previous iteration).
For example, if a database of family relationships is to be searched, and the record for each person has "mother" and "father" fields, a recursive join would be one way to retrieve all of a person's known ancestors: first the person's direct parents' records would be retrieved, then the parents' information would be used to retrieve the grandparents' records, and so on until no new records are being found.
In this example, as in many real cases, the repetition involves only a single database table, and so is more specifically a "recursive self-join".
Recursive joins can be very time-consuming unless optimized through indexing, the addition of extra key fields, or other techniques. Graph traversals come at a lower cost than the method of recursive joins.
Recursive joins are highly characteristic of hierarchical data, and therefore become a serious issue with XML data. In XML, operations such as determining whether one element contains another are extremely common, and the recursive join is perhaps the most obvious way to implement them when the XML data is stored in a relational database.
The standard way to define recursive joins in the SQL:1999 standard is by way of recursive common table expressions. Database management systems that support recursive CTEs include Microsoft SQL Server, Oracle, PostgreSQL and others.
See also
Join
Hierarchical and recursive queries in SQL
Database theory
Relational model
References |
https://en.wikipedia.org/wiki/Bulletin%20board%20%28disambiguation%29 | A bulletin board is a surface intended for the posting of public messages.
Bulletin board may also refer to:
Bulletin board system, a computer server running software that allows users to connect to the system using a terminal program
List of bulletin board systems
Bulletin Board (album), an album by The Partridge Family
See also
Bulletin (disambiguation)
Internet forum
BBCode or Bulletin Board Code |
https://en.wikipedia.org/wiki/Peer-to-peer%20banking | Peer-to-peer banking is a term used in the blockchain banking industry and designates an act of value transfer without the need for an intermediary such as a bank.
Peer-to-peer banking is an online system that allows individual members to complete financial transactions with one another by using an auction-style process that lets members offer loans for a specific amount and at a specific rate.
Definition in the traditional banking
Buyers have the option to look for an amount and rate of interest that meet their needs. All members are categorized by their risk level. Members can browse for other people based on various demographic information.
Since P2P banking does not use third-party banking institution intermediaries the rates and terms are often much more favourable for the members.
Unlike conventional banking where the spread between deposit rates and lending rates is consumed to finance the bank's administrative and logistic expenses, both lenders and borrowers get to save on such costs while paying certain commissions to the P2P portal provider and/or the credit rating agency.
P2P banking and financing have been proposed as a method to accelerate the development of renewable energy projects while more equitably distributing the return on investment. These concepts have now been instituted by Energy in Common and Kiva in their green funds.
Old models
The following two pictures show the difference between the peer to peer banking approach and the normal way with a financial institute.
See also
LendingClub
Peer-to-peer
Social peer-to-peer processes
Peer-to-peer lending
References
Banking
Peer-to-peer |
https://en.wikipedia.org/wiki/Kim%20Hughes%20%28broadcaster%29 | Kim Hughes is a Canadian radio personality and arts and entertainment journalist, who most recently hosted programming on XM Satellite Radio's The Verge.
Hughes was most widely known for her work at 102.1 The Edge (CFNY-FM) in Toronto, Ontario, as host of the nightly live music magazine Live in Toronto from 1992 to 1999. Canadian Musician described her as "one of the best-known music radio personalities in Canada", and the Toronto Star referred to her as "one of the Toronto pop-music industry's most respected and influential figures". She was seen in the industry as an unusually intelligent interviewer, and was credited for introducing to wider audiences bands that did not neatly fit into her radio station's format. After the station's move to new studios at the Eaton Centre in 1996, she interviewed bands and had them perform in a glass-enclosed studio at street level, where fans could watch.
She served as freelance music reviewer for CBC Newsworld's On the Arts, alongside novelist David Gilmour. Concurrent with her work as radio host, Hughes was music editor at Toronto-based alternative news weekly Now. In 1999 she continued in her role at NOW Magazine, but was replaced by George Stroumboulopoulos at 102.1 The Edge.
Her work has been widely published, appearing in the Toronto Star, The Globe and Mail, Billboard, Salon, the National Post, Utne Reader and others. In 2001, Hughes was recruited by Seattle online merchant Amazon.com to oversee the launch of its Canadian arm, Amazon.ca. Hughes now works as Amazon.ca's music content editor and continues to write reviews of books and music for Amazon.com and Amazon.ca, as well as the Star, Report on Business Magazine and others. She joined The Verge in 2005. Additionally, Hughes also served as editor-in-chief overseeing content for online dating giant Lavalife.com and their publication, Click.Lavalife.com. For several years, Hughes maintained two blogs (film and music) for Sympatico.ca as well as writing freelance for myriad digital and print publications.
Hughes currently freelances for multiple print and digital clients including The Grid, Elevate Magazine, Massey Hall/Roy Thomson Hall (where she also voices podcasts), MSN, online magazine Samaritan and others while retaining links to the music industry via artist bios.
References
Canadian radio personalities
Mass media people from Toronto
Living people
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Rose%20Medical%20Center | Rose Medical Center is a part of HCA Healthcare's HealthONE network. It is colloquially known as Denver's "Baby Hospital," but also provides comprehensive women's care, orthopedics and total joint replacement, heart and vascular care, weight-loss treatment, cancer care, surgical services, internal medicine and emergency care. An acute care hospital with 422 licensed beds, Rose cares for more than 160,000 patients annually with a team of 1,300 full-time employees, 100 volunteers and more than 1,200 physicians. Ryan Tobin is the President and chief executive officer.
Rose Medical Center was founded in 1945 by a group of Jewish community leaders who wanted to create a hospital that was free of discrimination. Following a national fundraising campaign, the new hospital was named in honor of Denver prominent figure Major General Maurice Rose, one of the highest-ranking members of the military to die in the field of combat. The cornerstone of the main building of the hospital was laid by General Dwight D. Eisenhower on August 31, 1948, and General Rose Memorial Hospital opened for patients in March 1949. Rose gave credentials to the first African American physician in the state of Colorado.
Awards and recognition
In 2017, Rose Medical Center became a Magnet® designated hospital. The Magnet program designates organizations worldwide where nursing leaders successfully align their nursing strategic goals to improve the organization's patient outcomes. Rose has been recognized 12 times as one of the nation's 100 Top Hospitals® by IBM Watson Health and has earned the Healthgrades 2019 Patient Safety Excellence Award™ and the Healthgrades 2019 Outstanding Patient Experience Award™ for five years running. Rose is among the top 2% of eligible hospitals in the nation to receive both awards. Rose also has earned Straight As from the Leapfrog Group recognizing patient safety since the program began –an achievement earned by less than 1% of hospitals surveyed nationwide. U.S. News & World Report ranked Rose #4 in Colorado and Denver Metro for Best Hospital and as ‘High Performing’ in Seven Adult Procedures and Conditions for 2018–19. Its employees have named Rose a Denver Post Top Workplace each year from 2014–present.
Medical programs
Bariatrics
Rose Medical Center has an extensive bariatric surgery program, combining clinical excellence with educational efforts. The program is a Bariatric Center of Excellence, as designated by the American Society for Metabolic and Bariatric Surgery.
Rose Babies
Rose Medical birthing facility reports over 4,000 births a year. Famous births include Ashley Bush. Rose Babies established its place in local memory in 1984 with a television ad featuring images of babies born at Rose floating through the clouds. The advertising campaign was revived in the late 1990s as the hospital's 50th anniversary approached and today, as the hospital approaches its 70th anniversary, the program is recognizing many generations of Rose Babies.
|
https://en.wikipedia.org/wiki/Spyforce | Spyforce is an Australian television series that aired from 1971 to 1973 on Nine Network. The series was based upon the adventures of Australian Military Intelligence operatives in the South West Pacific during World War II. It was produced by Nine Network in conjunction with Paramount Pictures.
The series centres on the action and adventures of lead actor Jack Thompson's character Erskine, and his main support character, Peter Sumner's Gunthar Haber. It was the first lead role for Jack Thompson. The two are part of an elite unit of special operatives, the Special Intelligence Unit, and their adventures are loosely based upon those of the real Services Reconnaissance Department who often operated behind Japanese-held lines during the war.
Unlike most previous war films, Spyforce deliberately steered away from the notion that the United States was solely responsible for Japan's defeat, and highlights the important role Australian forces played in the defeat of the Imperial Japanese Army. Producer Roger Mirams was also careful to avoid stereotypes of the genre, and tired formulas for the battle scenes.
Synopsis
Spyforce was designed by Roger Mirams to be a wartime espionage action adventure in the format of a weekly, hour-long television mini-film. It was very much intended to highlight the important role played by Australian forces in achieving victory in World War II, but also remain exciting and compelling. Despite being based upon a war setting, character development played a key role in Spyforce. The way the main characters interact and change over time was carefully scripted by Mirams.
Unlike many previous war films, particularly American ones, Spyforce does not portray the protagonists as invincible, who always win an easy victory. Indeed, their human failings are made clear, and their plans do not always come to fruition. It does not dwell on torture by Japanese soldiers, or portray Australians as perfect.
The protagonists are members of a secretive special elite unit known as the Special Intelligence Unit, headed by Colonel Cato, who is only responsible directly to the Prime Minister of Australia. Cato's unit is responsible for sabotage and covert operations, often behind enemy lines, against Japanese forces in the South West Pacific during World War II.
Colonel Cato recruits both Erskine and Gunther Haber into the Special Intelligence Unit as civilian operatives due to their intimate knowledge of the South West Pacific and New Guinea. Both are reluctant at first, so Cato fabricates false evidence against them to coerce them into co-operating.
Although some episodes were filmed on location in New Guinea, Thailand, Hong Kong, Macau and also in Changi Prison in Singapore, most of the filming was done in the Australian bushland surrounding Sydney. Several ideal Sydney locations, such as Middle Head Fortifications were also used.
The narration during the opening credit sequence stated:
Early in 1942 the Japanese Army swept through the |
https://en.wikipedia.org/wiki/Alexander%20Brudno | Alexander L'vovich Brudno () (10 January 1918 – 1 December 2009) was a Russian computer scientist, best known for fully describing the alpha-beta pruning algorithm. From 1991 until his death he lived in Israel.
Biography
Brudno developed the "mathematics/machine interface" for the M-2 computer constructed in 1952 at the Krzhizhanovskii laboratory of the Institute of Energy of the Russian Academy of Sciences in the Soviet Union. He was a great friend of Alexander Kronrod.
Brudno's work on alpha-beta pruning was published in 1963 in Russian and English.
The algorithm was used in computer chess program written by Vladimir Arlazarov and others at the Institute for Theoretical and Experimental Physics (ITEF or ITEP). According to Monty Newborn and the Computer History Museum, the algorithm was used later in Kaissa the world computer chess champion in 1974.
In 1980, Brudno became a founder and scientific director of the first Russian school for young programmers УПЦ ВТ. He was the scientific director of the first Russian programming Olympiads for the students, and published a book of problems from these competitions.
Brudno – Kronrod seminar
In 1959 Brudno and Alexander Kronrod organized seminar devoted to the presentation of different works in areas of system programming, programming of games (including chess), and artificial intelligence. Many well known results were presented and discussed at this seminar, including: Gauss–Kronrod quadrature formula, AVL trees, computer chess, Pattern recognition (M. Bongard :ru:Бонгард, Михаил Моисеевич, P. Kunin and others), Method of Four Russians and others.
In 1963 Brudno published his work on alpha-beta pruning. The key intuition was that a player could avoid evaluating certain moves that were clearly inferior to one already considered.
In the following game tree vertices represent positions and edges represent moves. The position's valuations are in the brackets
.
A
/ \a
?
/ \
D(1) E(?)
Assume that "whites" should make a move in position A and then "blacks" could make their own move. ‘Whites" should find better strategy to maximize their win (Minimax strategy).
After evaluating AB and CD, it is easy to see that the best move for "whites’ is AB and it is not necessary to check move CE as the overall value of vertex C will be no better than 1. This is unchanged if B, D, E are trees and not leaves. Such considerations, taken on all levels of the game tree, are known as alpha-better pruning. It has been used in different game programming applications even before Brudno's work; Brudno's contribution was the formalization of the algorithm and analysis of its speedup.
In 1959 Brudno's work on alpha-beta pruning was motivated by an analysis of the card game where two players are dealt n cards each, with values 1...2n, and one player is chosen to go first. Each player puts down one card, with the larger card taking the trick, and the taker going first in the nex |
https://en.wikipedia.org/wiki/VCN%20ExecuVision | VCN ExecuVision, a combination graphics program and file manager, was the first presentation program for the personal computer, created by Visual Communications Network, Inc. and published by Prentice-Hall, Inc. for the IBM PC in 1984. The program's pre-loaded graphics library and its separate additions make the VCN ExecuVision the first professional digital clip art library. Featuring ten different typefaces, 64 color schemes, clip art, animation options, the ability to import images and the ability to draw freehand using a mouse, this program allowed users to manipulate graphics and text built with business data presentation in mind but could be used for all visual communication purposes. The program's capabilities were expanded with the release of six supplemental graphics libraries sold as individual floppy disks, which were to be joined by four more said to be in production but were ultimately never released. All of these functions required PC DOS 1.01, 128KB RAM, two disk drives, a color monitor and color graphics adapter to operate, as well as either an IBM dot-matrix or Hewlett-Packard printer to print visuals created within the program.
VCN ExecuVision gained popularity quickly following its release as it enabled businesses to create presentation slides and data visualizations quickly and easily, and was relatively cheaper than having to rely on an art department to produce all professional visual media. The benefits of this software program were first discussed in the journal of Institute of Electrical and Electronics Engineers in March 1984. In addition to the benefits of VCN ExecuVision, the journal published images created by the software, illustrating the new emerging software available for personal computers at that time.
References
Presentation software
Technical communication tools
Proprietary software |
https://en.wikipedia.org/wiki/East%20Walnut%20Hills%2C%20Cincinnati | East Walnut Hills is a neighborhood on the Southeast side of Cincinnati, Ohio. The population was 4,103 at the 2020 census.
Demographics
Source - City of Cincinnati Statistical Database
History
Founded in 1867 as the incorporated Village of Woodburn, East Walnut Hills is known as the home to many prominent Cincinnatians. Initially developed by combining a small German Catholic community and the suburban estates of Cincinnati businessmen, the village was annexed into Cincinnati by 1873.
Historic architecture and former residents
The neighborhood includes a historic district between the O'Bryonville business district (Evanston) and the DeSales Corner, home to mansions with large setbacks, as well as Annwood Park on Madison Road and the Bettman Preserve, an urban nature preserve. Large estates line William Howard Taft Road, with views of the Ohio River and Downtown Cincinnati. Many older homes in the areas surrounding St. Ursula Academy are being subdivided and converted into condominiums. East Walnut Hills is home to the historic Saint Francis De Sales Catholic Church and School, at the intersection of Madison Road and Woodburn Avenue and Purcell Marian High School. East Walnut Hills' historic homes demonstrate several architectural styles. Examples of the Romantic period, Colonial Revival, Tudor Revival, Queen Ann, Romanesque, Italian Revival, and English Country Revival can be seen. The homes of East Walnut Hills are often featured in local historic home and garden tours.
Formerly known as Madisonville Pike in the early 1850s, Madison Road is the site of the earliest development in the neighborhood. The historic John S. Baker House was designed by Cincinnati Architect James Keys Wilson. Other prominent East Walnut Hills residents are William W. Scarborough, grocery merchant, Joshua Hall Bates, a Union general who built his home in 1858, and Civil War veteran and heir to a liquor baron Charles Dexter.
The neighborhood is known as an urban forest because of the number of large trees. There is also a bird sanctuary between Wold Ave and Dexter Place.
See also
John S. Baker House, located in East Walnut Hills
References
External links
Official Neighborhood Site
Neighborhoods in Cincinnati
Former municipalities in Ohio |
https://en.wikipedia.org/wiki/Operation%20Tremor | Operation Tremor was a joint operation between British Transport Police, Lancashire Constabulary and Network Rail to combat thieves who had been stealing copper boilers, cables and piping from train tracks, which could disable signalling equipment and safety devices. Some of the wire was used to carry information for automatic signalling and safety equipment.
The police circulated pictures of known thieves to scrap metal merchants and taxi drivers after a dramatic rise in thefts from railway property and homes. Part of the blame was put on the rise in price of copper which had tripled in the three years leading to 2006.
Equipment used in targeting offenders included CCTV and Automatic number-plate recognition (ANPR).
See also
British Transport Police
Route Crime
External links
Railway thieves risking their lives. www.trackoff.org (accessed:21/12/2006
British Transport Police
British Transport Police Special Constabulary website
BBC Crimefighters: British Transport Police
References
British Transport Police
Metal theft
Tremor |
https://en.wikipedia.org/wiki/Jon%20Sciambi | Jon "Boog" Sciambi () is an American sportscaster for ESPN and the Marquee Sports Network, and has been the everyday play-by-play announcer for the Chicago Cubs TV broadcasts on Marquee since 2021. He has worked extensively as a baseball play-by-play announcer, calling games for ESPN television and on ESPN Radio. Sciambi's nickname, "Boog," was given to him owing to his physical resemblance to former major league player Boog Powell.
Early life
Born in Philadelphia, Sciambi grew up on Roosevelt Island in New York City. He is a graduate of Regis High School in New York City and Boston College.
Career
As Sciambi attended Boston College, he began his sportscasting experience on WZBC, the school's 1000-watt FM radio station broadcasting to the Greater Boston area. Classmates and fellow broadcasters at WZBC included Joe Tessitore and Bob Wischusen, both of whom also went on to become successful sports announcers.
Sciambi was an announcer with the Florida Marlins from 1997 to 2004.
Sciambi was the play-by-play announcer for the Atlanta Braves on SportSouth and FSN South from to . He was paired with Joe Simpson. Late in the 2009 season, it was announced that Sciambi would be leaving the Braves and joining ESPN's Major League Baseball and college basketball coverage full-time.
He formerly worked in South Florida sports radio on 790 The Ticket. Sciambi left the radio show on April 4, 2008, to focus on broadcasting for the Atlanta Braves. Prior to being on 790, Sciambi was a talk show host on WQAM for several years.
On January 4, 2021, Marquee Sports Network named Sciambi as play-by-play announcer for its Chicago Cubs telecasts following the resignation of the former play-by-play announcer, Len Kasper. He also continues to call regular-season and postseason games on ESPN Radio; in October 2022, it was announced that Sciambi will take over as the lead announcer for ESPN Radio's postseason coverage in the 2023 season, replacing Dan Shulman.
Sciambi succeeded Matt Vasgersian and took over the main play-by-play calls for the MLB: The Show video game series starting with MLB The Show 22. He did play-by-play calls for MLB The Show 23 along with former MLB player Chris Singleton.
Philanthropy
Sciambi has been involved in funding research of and direct care for victims of ALS, also known as Lou Gehrig's Disease. In 2006, Sciambi founded Project Main St. with Tim Sheehy, a friend who later died from the disease.
References
External links
Baseball Prospectus Chat with Jon Sciambi
ESPN bio
https://projectmainst.org/about-us/
Living people
American people of Italian descent
American radio sports announcers
American television sports announcers
Atlanta Braves announcers
Boston College alumni
Chicago Cubs announcers
College basketball announcers in the United States
ESPN people
Florida Marlins announcers
Major League Baseball broadcasters
People from Roosevelt Island
Regis High School (New York City) alumni
Sportspeople from New York City
Sportspeople from |
https://en.wikipedia.org/wiki/FaceGen | FaceGen is a 3D face-generating 3D modeling middleware produced by Singular Inversions.
Approach
Although FaceGen generates conventional 3D mesh data, it uses a "parameterized" approach to defining the properties that make up a face, and by using a fixed set of parameters it is able to morph and modify a face model independently of output resolution. FaceGen 3.3 allows the user to randomize, tween, normalize and exaggerate faces, and also includes algorithms for adjusting apparent age, ethnicity and gender. It also allows limited parametric control of facial expressions, and includes a set of phoneme expressions for the animation of characters with "speaking" roles.
FaceGen can also generate 3D models from front and side images of a face, or by analyzing a single photograph.
Free versions
Free demo versions of FaceGen Artist, FaceGen 3D Print and FaceGen Modeller can be downloaded from the company's website. These allow the user to create, edit, load and save files in the program's proprietary ".fg" format. The free version features the same functionality of the paid version, except that a logo is placed on the forehead of models that are generated and only a few additional assets like hairstyles and beards are provided.
External links
FaceGen official homepage
Discovery Channel interview
https://www.researchgate.net
Anatomical simulation
Windows graphics-related software
3D imaging |
https://en.wikipedia.org/wiki/Datastorm%20Technologies | Datastorm Technologies, Inc., was a computer software company that existed from 1986 until 1996. Bruce Barkelew and Thomas Smith founded the company to develop and publish ProComm, a general purpose communications program for personal computers.
ProComm flourished in the pre-World Wide Web world, when personal computers used modems to connect over telephone lines with other individual computers, online services such as CompuServe, bulletin board systems (BBSs), Telnet and Gopher sites, and the like. Datastorm was the first company to grow from a shareware publisher into a large commercial software publisher. ProComm 2.4.3 for MS-DOS is still available as shareware.
History
The death of Andrew Fluegelman, creator of PC-Talk, left a gap in the offerings of dial-up communications and terminal emulation software. Bruce Barkelew and Tom Smith, computer science students at the University of Missouri, formed PIL Software Systems in 1985 to develop ProComm. They distributed the program as shareware through bulletin board systems.
Based on the program's popularity, Barkelew and Smith founded Datastorm Technologies Inc. in 1986 to build a full-fledged company around the product. The founders chose Columbia, Missouri, as the company's headquarters because of the relatively low cost of living and to tap into the pool of programmers graduating from the University of Missouri's computer science department. Datastorm financed its growth by reinvesting its earnings rather than through outside investors. In 1992, they were ranked 376 in the Inc. 500.
The company produced a combination 16/32-bit Procomm Plus for Windows, which included an early web browser called Web Zeppelin. Procomm Plus for Windows supported the remote imaging protocol (RIP) graphic terminal language. This enabled display of higher-resolution images than the ANSI escape codes that most bulletin board systems used at the time. In November 1993, the data transmission program reached the number one ranking on PC Magazine's list of top retail software.
In 1995, Datastorm sued Excalibur Communications over software infringement. Datastorm became the first company to sue a vendor for infringement of its software using the shareware model.
Datastorm grew through 40 consecutive profitable quarters, then was acquired by Quarterdeck in 1996 for over US$70 million. Quarterdeck was later purchased by Symantec. Support for the last release of Procomm, version 4.8, was discontinued in 2002.
Awards
1989: BYTE "Distinction" Award
1992: Dvorak PC Telecommunications Excellence Award
1997: Shareware Industry Awards Shareware Hall of Fame
References
Defunct software companies of the United States
Communication software
Terminal emulators
Companies based in Columbia, Missouri
Software companies established in 1986
Software companies disestablished in 1996
1986 establishments in Missouri
1996 disestablishments in Missouri |
https://en.wikipedia.org/wiki/Bally%20Sports%20North | Bally Sports North is an American regional sports network owned by Diamond Sports Group, and operates as a Bally Sports affiliate. The channel broadcasts coverage of sporting events involving teams located in the Upper Midwest region, with a focus on professional and collegiate sports teams based in Minnesota.
The network maintains production studios and offices located in downtown Minneapolis, which are shared with production and office operations of Bally Sports Wisconsin, which formerly served as a subfeed of Fox Sports North until it was spun off into a separate channel in 2006.
Bally Sports North is available on cable providers throughout Minnesota, western Wisconsin, northern Iowa, North Dakota, and South Dakota; it is available nationwide on satellite via DirecTV.
History
Origins
The channel originated sometime in 1982 as WCCO II, a local cable channel owned by Midwest Radio and Television (later Midwest Communications), and created as a project by CBS affiliate WCCO-TV (channel 4, now an owned-and-operated station of the network) that broadcast a slate of local and general entertainment programming. On March 1, 1989, it was relaunched as the Midwest Sports Channel. It was also the same year that the network would acquire rights to Twins broadcasts.
MSC's main draws in its early days were games from the Minnesota Twins and Minnesota North Stars. The channel also served as an affiliate of SportsChannel America, filling much of its broadcast day with a mix of national programs and paid programming from the channel, and incorporated sports news tickers provided by the channel. MSC was largely considered a premium channel until the early 1990s, and did not even have full cable coverage in the Minneapolis–St. Paul metropolitan area until it was added by Continental Cablevision's St. Paul system on its expanded basic cable lineup in 1994.
During the North Stars' 1991 Stanley Cup Playoff run, Midwest Sports Channel declined to exercise an option to carry the North Stars' home games (as the SportsChannel America package which MSC carried did not include rights to in-market home games). Instead the North Stars cut a revenue-sharing deal with a group of 11 cable companies to televise the games as a pay-per-view events at a then very expensive price of $12.95 a game.
The following season the North Stars parted ways with Midwest Sports Channel and instead signed a new contract with Prime Sports Midwest to televise 17 games out-of-market while in-market viewers would be offered the games on pay-per-view through the same revenue sharing agreement with local cable operators that was used for the previous season's playoffs. The price for these games were $9.95 each with an option to purchase the entire package at a reduced rate. Additionally, 25 games were televised on KMSP-TV.
Ownership changes and affiliation with FSN
In 1992, CBS acquired the Midwest Sports Channel, through its purchase of Midwest Communications (which it previously had 47% o |
https://en.wikipedia.org/wiki/China%20Economic%20Databases | The China Economic Databases (CED) () is a project of the China Studies Center at National Chengchi University, Taiwan. It collects and publishes information on China's economic development to support scholarly research. The CED is available in Chinese and English.
Mission
The CED is designed for scholars, students and those interested in the study and development of the Economy of China. Anyone is able to add information to the platform by submitting relevant material.
History
The CED is sponsored by the Center for China Studies in National Chengchi University, in Taiwan, and is supported by the Taiwan Ministry of Education. The project was launched in December 2003 and is currently directed by Dr. Chen-yuan Tung, a professor at the Graduate Institute of Development Studies, National Chengchi University.
Databases
Currently there are ten databases:
1. China Economic Literature Index Database
The China Economic Literature Database (CELD) currently collects data from 47 Chinese periodicals and 22 English sources. Additionally, online databases such as SSCI and EconLit are used to keep the database up-to-date. Information in the CELD range in topics including macroeconomics, capital investment, regional development, economical reform, trade between Taiwan and Mainland China, Chinese foreign trade, Renminbi exchange, economical globalization, financial policy and financial reform. A search function is also available to ease your data collecting. Currently, the CELD has approximately 3,000 papers as of July 2007.
2. China Economic Experts Database
3. China Economic Books Database
The China Economic Books Database (CEBD) main purpose is to form a comprehensive listing of all books on the topic of China's economy. The CEBD includes titles from all over the world including both English and Chinese (traditional and simplified) titles. Subjects of the books in the CEBD include China's economic globalization, regional economy, international trade, RMB exchange rate, and domestic economic development, financial market, industry development, commerce, investment, and overall economic policy evaluation and analysis. Every book in the CEBD is listed with relevant search info such as the author/editor's name(s), publisher, publication date, ISBN, key word(s), and classification. A full listing of the CEBD data sources can be found at .
4. China Economic Websites Database
The China Economic Websites Database collects relevant websites and categorizes them into easy use according to various aspects of China's economy.
5. China Economic Government Reports Database
The China Economic Policy Reports Database (CEPRD) is a platform that holds economic policy reports and Chinese government white papers. The database currently lists all reports since 2000, in both English and Chinese. The range of content included national development plans, agricultural policy, monetary policy, system reform policy, financial market supervision policy, commercial and investm |
https://en.wikipedia.org/wiki/SAG-AFTRA%20Foundation | The SAG-AFTRA Foundation (formerly the Screen Actors Guild Foundation) is an American organization that provides assistance and educational programming to the professionals of SAG-AFTRA. It also provides children’s literacy programs to the public. Founded in 1985, it relies solely on support from grants, corporate sponsorships and individuals to maintain its programs.
The Foundation contributes to the advancement of literacy through Storyline Online presenting digital videos featuring professional actors reading children’s books. Supplemental activities for each book are developed by an early literacy specialist. Together, the videos and related curriculum strengthen comprehension, verbal and written skills of English. Available twenty-four hours a day, seven days a week, free of charge.
Actor Courtney B. Vance is the current President of the SAG-AFTRA Foundation.
References
External links
SAG-AFTRA Foundation website
Educational foundations in the United States
Companies established in 1985 |
https://en.wikipedia.org/wiki/JoAnn%20Alfano | JoAnn Alfano is an American television producer.
Career
Alfano replaced Suzanne Daniels as Executive Vice President Entertainment at Lifetime Networks in late 2008.
Prior to starting TV Tray Entertainment in June 2007, Alfano was President of Broadway Video Television, where she developed and executive produced NBC's 30 Rock and the ABC series Sons and Daughters.
Alfano rose through the ranks at NBC, from New York-based publicist to become Senior Vice President of Drama Development, and then Senior Vice President of Comedy Development. She was also Vice President of Prime Time Series for NBC Studios. Before that, Alfano was Director of Current Comedy for NBC Entertainment. She had previously been Director, NBC Media Relations and Primetime Series.
Before joining Lifetime, Alfano was president of her production company, TV Tray Entertainment, which had a first look deal at NBC Universal Media Studios.
Productions
30 Rock (executive producer)
To Love and Die (executive producer)
Sons & Daughters
Thick and Thin
Tales of the City
Will and Grace
Queer as Folk
Project Runway
The Tracy Morgan Show
Awards and nominations
Alfano was among those who shared the Emmy Award for Outstanding Comedy Series in 2007, and she was among those nominated for the Emmy Award for Outstanding Reality Competition Program in 2011.
References
External links
American television producers
American women television producers
Living people
Year of birth missing (living people)
Place of birth missing (living people)
Primetime Emmy Award winners
LGBT television producers
21st-century American women |
https://en.wikipedia.org/wiki/Pseudonymization | Pseudonymization is a data management and de-identification procedure by which personally identifiable information fields within a data record are replaced by one or more artificial identifiers, or pseudonyms. A single pseudonym for each replaced field or collection of replaced fields makes the data record less identifiable while remaining suitable for data analysis and data processing.
Pseudonymization (or pseudonymisation, the spelling under European guidelines) is one way to comply with the European Union's new General Data Protection Regulation (GDPR) demands for secure data storage of personal information. Pseudonymized data can be restored to its original state with the addition of information which allows individuals to be re-identified. In contrast, anonymization is intended to prevent re-identification of individuals within the dataset.
Impact of Schrems II Ruling
The European Data Protection Supervisor (EDPS) on 9 December 2021 highlighted pseudonymization as the top technical supplementary measure for Schrems II compliance. Less than two weeks later, the EU Commission highlighted pseudonymization as an essential element of the equivalency decision for South Korea, which is the status that was lost by the United States under the Schrems II ruling by the Court of Justice of the European Union (CJEU).
The importance of GDPR-compliant pseudonymization increased dramatically in June 2021 when the European Data Protection Board (EDPB) and the European Commission highlighted GDPR-compliant Pseudonymisation as the state-of-the-art technical supplementary measure for the ongoing lawful use of EU personal data when using third country (i.e., non-EU) cloud processors or remote service providers under the "Schrems II" ruling by the CJEU. Under the GDPR and final EDPB Schrems II Guidance, the term pseudonymization requires a new protected “state” of data, producing a protected outcome that:
(1) Protects direct, indirect, and quasi-identifiers, together with characteristics and behaviors;
(2) Protects at the record and data set level versus only the field level so that the protection travels wherever the data goes, including when it is in use; and
(3) Protects against unauthorized re-identification via the Mosaic Effect by generating high entropy (uncertainty) levels by dynamically assigning different tokens at different times for various purposes.
The combination of these protections is necessary to prevent the re-identification of data subjects without the use of additional information kept separately, as required under GDPR Article 4(5) and as further underscored by paragraph 85(4) of the final EDPB Schrems II guidance. GDPR-compliant pseudonymization requires that data is “anonymous” in the strictest EU sense of the word – globally anonymous – but for - the additional information held separately and made available under controlled conditions as authorized by the data controller for permitted re-identification of individual data subjects.
|
https://en.wikipedia.org/wiki/GOLD%20%28parser%29 | GOLD is a free parsing system that is designed to support multiple programming languages.
Design
The system uses a DFA for lexical analysis and the LALR algorithm for parsing. Both of these algorithms are state machines that use tables to determine actions. GOLD is designed around the principle of logically separating the process of generating the LALR and DFA parse tables from the actual implementation of the parsing algorithms themselves. This allows parsers to be implemented in different programming languages while maintaining the same grammars and development process.
The GOLD system consists of three logical components, the "Builder", the "Engine", and a "Compiled Grammar Table" file definition which functions as an intermediary between the Builder and the Engine.
Builder
The Builder is the primary component and main application of the system. The Builder is used to analyze the syntax of a language (specified as a grammar) and construct LALR and DFA tables. During this process, any ambiguities in the grammar will be reported. This is essentially the same task that is performed by compiler-compilers such as YACC and ANTLR.
Once the LALR and DFA parse tables are successfully constructed, the Builder can save this data into a Compiled Grammar Table file. This allows the information to be reopened later by the Builder or used in one of the Engines. Currently, the Builder component is only available for Windows 32-bit operating systems.
Some of the features of the Builder are:
Freeware license
State browsing
Integrated testing
Test multiple files wizard
Generate webpages (including hyperlinked syntax charts)
Generate skeleton programs using templates
Export grammars to YACC
Export tables to XML or formatted text
Compiled Grammar Table file
The Compiled Grammar Table file is used to store table information generated by the Builder.
Engines
Unlike the Builder, which only runs on a single platform, the Engine component is written for a specific programming language and/or development platform. The Engine implements the LALR and DFA algorithms. Since different programming languages use different approaches to designing programs, each implementation of the Engine will vary. As a result, an implementation of the Engine written for Visual Basic 6 will differ greatly from one written for ANSI C.
Currently, Engines for GOLD have been implemented for the following programming languages / platforms. New Engines can be implemented using the source code for the existing Engines as the starting point.
Assembly - Intel x86
ANSI C
C#
D
Delphi
Java
Pascal
Python
Visual Basic
Visual Basic .NET
Visual C++
Grammars
GOLD grammars are based directly on Backus–Naur form, regular expressions, and set notation.
The following grammar defines the syntax for a minimal general-purpose programming language called "Simple".
"Name" = 'Simple'
"Author" = 'Devin Cook'
"Version" = '2.1'
"About" = 'This is a very simple g |
https://en.wikipedia.org/wiki/Contextual%20design | Contextual design (CD) is a user-centered design process developed by Hugh Beyer and Karen Holtzblatt. It incorporates ethnographic methods for gathering data relevant to the product via field studies, rationalizing workflows, and designing human–computer interfaces. In practice, this means that researchers aggregate data from customers in the field where people are living and applying these findings into a final product. Contextual design can be seen as an alternative to engineering and feature driven models of creating new systems.
Process overview
The contextual design process consists of the following top-level steps: contextual inquiry, interpretation, data consolidation, visioning, storyboarding, user environment design, and prototyping.
Collecting data – contextual inquiry
Contextual inquiry is a field data collection technique used to capture detailed information about how users of a product interact with the product in their normal work environment. This information is captured by both observations of user behavior and conversations with the user while she or he works. A key aspect of the technique is to partner with the user, letting their work and the issues they encounter guide the interview. Key takeaways from the technique are to learn what users actually do, why they do it that way, latent needs, desires, and core values.
Interpretation
Data from each interview is analyzed and key issues and insights are captured. Detailed work models are also created in order to understand the different aspects of the work that matter for design. Contextual design consists of five work models which are used to model the work tasks and details of the working environment. These work models are:
Flow model – represents the coordination, communication, interaction, roles, and responsibilities of the people in a certain work practice
Sequence model – represents the steps users go through to accomplish a certain activity, including breakdowns
Cultural model – represents the norms, influences, and pressures that are present in the work environment
Artifact model – represents the documents or other physical things that are created while working or are used to support the work. Artifacts often have a structure or styling that could represent the user's way of structuring the work
Physical model – represents the physical environment where the work tasks are accomplished; often, there are multiple physical models representing, e.g., office layout, network topology, or the layout of tools on a computer display.
Data consolidation
Data from individual customer interviews are analyzed in order to reveal patterns and the structure across distinct interviews. Models of the same type can be consolidated together (but not generalized—detail must be maintained). Another method of processing the observations is making an affinity diagram ("wall"), as described by Beyer & Holtzblatt:
A single observation is written on each piece of paper.
Individual n |
https://en.wikipedia.org/wiki/Moving%20%28British%20TV%20series%29 | Moving is a British sitcom that aired on ITV in 1985. It stars Penelope Keith and was written by Stanley Price. It was made for the ITV network by Thames Television.
Background
Stanley Price adapted Moving from a comedy play of the same name he had written. The play had enjoyed a successful run in London. Unusually for a sitcom, Moving was recorded without a studio audience. The six episodes were later edited into a 90-minute programme and shown on 2 September 1987.
Cast
Penelope Keith — Sarah Gladwyn
Ronald Pickup - Frank Gladwyn
Prunella Gee - Liz Ford
David Ashford - Bill Lomax
Eliza Hunt - Beryl Fearnley
Roger Lloyd-Pack - Jimmy Ryan
Natalie Slater - Eileen Lewis
Barbara Wilshere - Jane Gladwyn
Plot
Now that their children have grown up and left home, Sarah and Frank Gladwyn are alone in their large family home. However, when they decide to move Sarah insists on selling it to "the right person". However, things soon start to go wrong and their daughter Jane also returns from college. Meanwhile, Sarah's sister Liz Ford is taking Valium.
Episodes
Episode One (9 January 1985)
Episode Two (16 January 1985)
Episode Three (23 January 1985)
Episode Four (30 January 1985)
Episode Five (6 February 1985)
Episode Six (13 February 1985)
References
Sources
Mark Lewisohn, "Radio Times Guide to TV Comedy", BBC Worldwide Ltd, 2003
British TV Comedy Guide for Moving
External links
1985 British television series debuts
1985 British television series endings
1980s British sitcoms
ITV sitcoms
Television series by Fremantle (company)
Television shows produced by Thames Television
English-language television shows |
https://en.wikipedia.org/wiki/Transposition-driven%20scheduling | Transposition driven scheduling (TDS) is a load balancing algorithm for parallel computing. It was developed at the Vrije Universiteit in Amsterdam, The Netherlands as an algorithm to solve puzzles. The algorithm provides near-linear speedup with some problems and scales extremely well. It was published about by John Romein, Aske Plaat, Henri Bal and Jonathan Schaeffer.
Transposition based puzzle solving
In a puzzle, all possible plays can be represented in a tree with board positions corresponding to the nodes, moves corresponding to the edges, the initial position as the root of the tree and the solutions as leaves. Cycles in a path, i.e. moves that yield a position that is already encountered higher up in the tree, are left out of the tree because they can never lead to an optimal solution.
In most puzzles, different ordering of actions can lead to the same position of the puzzle. In puzzles where previous actions do not influence the solution, you need to only evaluate this position once to get a solution for both paths. To avoid evaluating the same position more than once (and thus wasting computation cycles), programs written to solve these kinds of puzzles use transposition tables. A transposition is a puzzle state that can be reached by different paths but has the same solution. Every time such a program starts evaluating a position, it first looks up in a table if the position has already been evaluated. If it has, the solution is taken from the table instead of calculated, saving large amounts of time.
However, in parallel computing, this approach has a serious drawback. To make full use of the advantages of transposition lookups, all computers in the network have to communicate their solutions to the other computers one way or the other, or you run the risk of redundantly solving some positions. This incurs a severe communication overhead, meaning that a lot of all computers' time is spent communicating with the others instead of solving the problem.
Transposition driven scheduling
The traditional setup
To solve this drawback, an approach has been taken that integrates solving the problem and load balancing. To begin, a function is defined that assigns a unique value to every board position. Every computer in the network is assigned a range of board positions for which it holds authority. Every computer has its own transposition table and a job queue. Whenever a computer is done with its current job it fetches a new job from the queue. It then computes all possible distinct positions that can be reached from the current position in one action. This is all traditional transposition based problem solving. However, in the traditional method, the computer would now, for every position just computed, ask the computer that holds authority over that position if it has a solution for it. If not, the computer computes the solution recursively and forwards the solution to the computer whose authority it falls under. This is what causes a |
https://en.wikipedia.org/wiki/Warnock%20algorithm | The Warnock algorithm is a hidden surface algorithm invented by John Warnock that is typically used in the field of computer graphics.
It solves the problem of rendering a complicated image by recursive subdivision of a scene until areas are obtained that are trivial to compute. In other words, if the scene is simple enough to compute efficiently then it is rendered; otherwise it is divided into smaller parts which are likewise tested for simplicity.
This is a divide and conquer algorithm with run-time of , where n is the number of polygons and p is the number of pixels in the viewport.
The inputs are a list of polygons and a viewport. The best case is that if the list of polygons is simple, then draw the polygons in the viewport. Simple is defined as one polygon (then the polygon or its part is drawn in appropriate part of a viewport) or a viewport that is one pixel in size (then that pixel gets a color of the polygon closest to the observer). The continuous step is to split the viewport into 4 equally sized quadrants and to recursively call the algorithm for each quadrant, with a polygon list modified such that it only contains polygons that are visible in that quadrant.
Warnock expressed his algorithm in words and pictures, rather than software code, as the core of his PhD thesis, which also described protocols for shading oblique surfaces and other features that are now the core of 3-dimensional computer graphics. The entire thesis was only 26 pages from Introduction to Bibliography.
References
External links
A summary of the Warnock Algorithm
Computer graphics algorithms |
https://en.wikipedia.org/wiki/List%20of%20shield%20bug%20species%20of%20Korea | This is a list of shield bug species recorded in Korea, including both the Korean Peninsula and adjacent islands.
Species on this list have been:
included in a standard database of Korean insects, such as that published by the National Institute of Agricultural Science and Technology,
included in published field guides, or
reported to be present in Korea in a peer-reviewed scholarly publication.
Superfamily Pentatomoidea
Family Acanthosomatidae
Genus Acanthosoma:
Acanthosoma crassicaudum (굵은가위뿔노린재, gulgeun-gawippulnorinjae)
Acanthosoma denticaudum (등빨간뿔노린재, deungppalganppulnorinjae)
Acanthosoma forficula (녹색가위뿔노린재, noksaekgawippulnorinjae)
Acanthosoma haemorrhoidale (뿔노린재, ppulnorinjae)
Acanthosoma labiduroides (긴가위뿔노린재, gin-gawippul norinjae)
Acanthosoma spinicolle (붉은가위뿔노린재, bulgeungawippul norinjae)
Genus Dichobothrium:
Dichobothrium nubilum (남방뿔노린재, nambangppul norinjae)
Genus Elasmostethus:
Elasmostethus humeralis (얼룩뿔노린재, eollukppul norinjae)
Genus Elasmucha:
Elasmucha dorsalis (꼬마뿔노린재, kkomappul norinjae)
Elasmucha ferrugata (뾰족침뿔노린재, ppyojokchim norinjae)
Elasmucha fieberi (알락꼬마뿔노린재, allakkomappul norinjae)
Elasmucha putoni (푸토니뿔노린재, putonippul norinjae)
Elasmucha amurensis (극동꼬마뿔노린재, geukdongkkomappul norinjae)
Elasmucha signoreti (등검은뿔노린재, deunggeomeunppul norinjae)
Genus Sastragala:
Sastragala scutellata (노랑무늬뿔노린재, norangmunuippul norinjae)
Sastragala esakii (에사키뿔노린재, esakippul norinjae)
Family Dinidoridae
Genus Megymenum:
Megymenum gracilicorne (톱날노린재, tomnal norinjae)
Family Scutelleridae
Eurygaster testudinaria (도토리노린재, dotorinorinjae)
Poecilocoris lewisi (광대노린재, gwangdaenorinjae)
Poecilocoris splendidulus (큰광대노린재, keun-gwangdaenorinjae)
Family Cydnidae
Adomerus triguttulus (삼점땅노린재, samjeom ttangnorinjae)
Adrisa magna (장수땅노린재, jangsu ttangnorinjae)
Aethus nigrita (둥근땅노린재, dunggeun ttangnorinjae)
Canthophorus niveimarginatus (흰테두리땅노린재, huinteduri ttangnorinjae)
Geotomus palliditarsis (북쪽애땅노린재, bukjjok aettangnorinjae)
Geotomus pygmaeus (애땅노린재, aettangnorinjae)
Macroscytus japonensis (땅노린재, ttangnorinjae)
Family Pentatomidae
Acrocorisellus serraticollis (청동노린재, cheongdong norinjae)
Aelia fieberi (메추리노린재, mechuri norinjae)
Antheminia varicornis (나비노린재, nabi norinjae)
Arma chinensis (중국갈색주둥이노린재, junggukgansaekjudungi norinjae)
Arma custos (갈색주둥이노린재, galsaekjudungi norinjae)
Brachynem ishiharai (이시하라노린재, isihara norinjae)
Carbula humerigera (참가시노린재, chamgasi norinjae)
Carbula putoni (가시노린재, gasi norinjae)
Carpocoris purpureipennis (홍보라노린재, hongbo norinjae)
Carpocoris seidenstueckeri (알락홍보라노린재, allakhongbo norinjae)
Chlorochroa juniperina (향노린재, hyangnorinjae)
Dalpada cinctipes (다리무늬두흰점노린재, darimunuiduhuinjeom norinjae)
Dinorhynchus dybowskyi (왕주둥이노린재, wangjudungi norinjae)
Dolycoris baccarum - Sloe Bug (알락수염노린재, allaksuyeom norinjae)
Dybowskyi areticulata (빈대붙이, bindaebuchi)
Eurydema dominulus (홍비단노린재, hongbidan norinjae)
Eurydema rugosa (비단노린재, bidan norinjae)
Eurydema gebleri (북쪽비단노린재, bukjjokbidan norinjae)
Eysarcoris ann |
https://en.wikipedia.org/wiki/Frontal%20solver | A frontal solver is an approach to solving sparse linear systems which is used extensively in finite element analysis. Algorithms of this kind are variants of Gauss elimination that automatically avoids a large number of operations involving zero terms due to the fact that the matrix is only sparse. The development of frontal solvers is usually considered as dating back to work by Bruce Irons.
A frontal solver builds a LU or Cholesky decomposition of a sparse matrix.
Frontal solvers start with one or a few diagonal entries of the matrix, then consider all of those diagonal entries that are coupled to the first set via off-diagonal entries, and so on. In the finite element context, these consecutive sets form "fronts" that march through the domain (and consequently through the matrix, if one were to permute rows and columns of the matrix in such a way that the diagonal entries are ordered by the wave they are part of). Processing the front involves dense matrix operations, which use the CPU efficiently.
Given that the elements of the matrix are only needed as the front marches through the matrix, it is possible (but not necessary) to provide matrix elements only as needed. For example, for matrices arising from the finite element method, one can structure the "assembly" of element matrices by assembling the matrix and eliminating equations only on a subset of elements at a time. This subset is called the front and it is essentially the transition region between the part of the system already finished and the part not touched yet. In this context, the whole sparse matrix is never created explicitly, though the decomposition of the matrix is stored. This approach was mainly used historically, when computers had little memory; in such implementations, only the front is in memory, while the factors in the decomposition are written into files. The element matrices are read from files or created as needed and discarded. More modern implementations, running on computers with more memory, no longer use this approach and instead store both the original matrix and its decomposition entirely in memory.
A variation of frontal solvers is the multifrontal method that originates in work of Duff and Reid. It is an improvement of the frontal solver that uses several independent fronts at the same time. The fronts can be worked on by different processors, which enables parallel computing.
See for a monograph exposition.
See also
MUMPS
Skyline matrix
Banded matrix
References
Numerical linear algebra
Numerical software |
https://en.wikipedia.org/wiki/PhpSQLiteAdmin | phpSQLiteAdmin is a name of two independent web applications, written in PHP, for managing SQLite databases.
phpSQLiteAdmin is a web-based client which leverages PHP scripting and the SQLite file-database system to provide a simple way for users to create databases, create tables, and query their own data using non-industry-standard SQLite syntax.
External links
(inactive since Nov 2009)
(inactive since Dec 2006)
(actively developed alternative)
Free software programmed in PHP
Database administration tools |
https://en.wikipedia.org/wiki/VENUS | VENUS - (Victoria Experimental Network Under the Sea) is one of two principal cabled seafloor observatories operated by Ocean Networks Canada at the University of Victoria, British Columbia, Canada.
The VENUS cabled ocean observatory is designed to provide new ways of studying the ocean. Since its launch in 2006, it has enabled scientists to run and monitor various ocean experiments out of the convenience of their desktops. The aim of VENUS is to study coastal oceans in two sites near Victoria and Vancouver, British Columbia. The first site of the VENUS seafloor network, operational since February 2006, is located in Saanich Inlet at 100m. The second site is located in the deeper waters of the Strait of Georgia and links instrument arrays deployed at depths varying from 100 to 300 meters.
VENUS uses Internet, telecommunication technology, and a network of about 50 kilometers of fiber optic cables at a maximum depth of 300 meters to create a permanent link to cameras and other monitoring instruments on the seafloor. The VENUS observatory has scores of sensors that measure such parameters as temperature, salinity, and pressure of the water 24 hours a day. The seafloor instruments provide oceanographers, marine biologists, and geologists with real-time ocean data. "The VENUS observatory represents a steep change for the world of marine science and oceanography, which will help improve the way marine scientists observe ocean life in the future," said Phil Hart, Director of Engineering at Global Marine. Ship-based ocean research methods provide a snapshot view only, whereas the VENUS observatory can be like a continuous film, which will allow more reliable long term observation.
The data, including images and audio, are processed and made available to researchers and the public through the VENUS website. The goal of the project is to not only provide valuable information to advance research, but also to allow everyone from graduate school students to curious parents to log on and view the ocean up close.
The facility is funded by the federal and provincial governments of Canada, as well as private industry. VENUS is designed to provide continuous observations for 20–25 years.
See also
NEPTUNE Canada, a sister observatory to VENUS, also operated by Ocean Networks Canada.
MARS, a similar MBARI cabled-based oceanography observatory.
SATURN, Science and Technology University Research Network, a coastal margin, or river-to-ocean, testbed observatory for the United States Pacific Northwest, a project of the National Science Foundation Science and Technology Center for Coastal Margin Observation and Prediction.
References
External links
Ocean Networks Canada website
Center for Coastal Margin Observation and Prediction official website
Pacific Ocean
Underwater work
Research projects |
https://en.wikipedia.org/wiki/List%20of%20minor%20planets%3A%20144001%E2%80%93145000 |
144001–144100
|-bgcolor=#fefefe
| 144001 || || — || January 13, 2004 || Anderson Mesa || LONEOS || FLO || align=right data-sort-value="0.98" | 980 m ||
|-id=002 bgcolor=#fefefe
| 144002 || || — || January 13, 2004 || Anderson Mesa || LONEOS || — || align=right | 2.0 km ||
|-id=003 bgcolor=#E9E9E9
| 144003 || || — || January 15, 2004 || Kitt Peak || Spacewatch || — || align=right | 3.1 km ||
|-id=004 bgcolor=#fefefe
| 144004 || || — || January 13, 2004 || Anderson Mesa || LONEOS || FLO || align=right | 1.1 km ||
|-id=005 bgcolor=#fefefe
| 144005 || || — || January 13, 2004 || Palomar || NEAT || NYS || align=right | 1.2 km ||
|-id=006 bgcolor=#E9E9E9
| 144006 || || — || January 14, 2004 || Palomar || NEAT || — || align=right | 1.9 km ||
|-id=007 bgcolor=#E9E9E9
| 144007 || || — || January 14, 2004 || Palomar || NEAT || AER || align=right | 5.5 km ||
|-id=008 bgcolor=#fefefe
| 144008 || || — || January 15, 2004 || Kitt Peak || Spacewatch || — || align=right | 1.3 km ||
|-id=009 bgcolor=#E9E9E9
| 144009 || || — || January 13, 2004 || Anderson Mesa || LONEOS || — || align=right | 2.2 km ||
|-id=010 bgcolor=#E9E9E9
| 144010 || || — || January 15, 2004 || Kitt Peak || Spacewatch || — || align=right | 2.5 km ||
|-id=011 bgcolor=#fefefe
| 144011 || || — || January 16, 2004 || Palomar || NEAT || NYS || align=right data-sort-value="0.77" | 770 m ||
|-id=012 bgcolor=#fefefe
| 144012 || || — || January 16, 2004 || Palomar || NEAT || V || align=right | 1.5 km ||
|-id=013 bgcolor=#E9E9E9
| 144013 || || — || January 16, 2004 || Palomar || NEAT || — || align=right | 2.5 km ||
|-id=014 bgcolor=#fefefe
| 144014 || || — || January 16, 2004 || Palomar || NEAT || MAS || align=right | 1.3 km ||
|-id=015 bgcolor=#E9E9E9
| 144015 || || — || January 16, 2004 || Kitt Peak || Spacewatch || HEN || align=right | 1.5 km ||
|-id=016 bgcolor=#fefefe
| 144016 || || — || January 17, 2004 || Kitt Peak || Spacewatch || — || align=right | 1.3 km ||
|-id=017 bgcolor=#fefefe
| 144017 || || — || January 16, 2004 || Palomar || NEAT || MAS || align=right | 1.4 km ||
|-id=018 bgcolor=#E9E9E9
| 144018 || || — || January 17, 2004 || Haleakala || NEAT || — || align=right | 5.1 km ||
|-id=019 bgcolor=#fefefe
| 144019 || || — || January 17, 2004 || Palomar || NEAT || — || align=right | 1.2 km ||
|-id=020 bgcolor=#d6d6d6
| 144020 || || — || January 17, 2004 || Palomar || NEAT || — || align=right | 3.8 km ||
|-id=021 bgcolor=#fefefe
| 144021 || || — || January 17, 2004 || Palomar || NEAT || — || align=right | 1.4 km ||
|-id=022 bgcolor=#fefefe
| 144022 || || — || January 17, 2004 || Palomar || NEAT || — || align=right | 1.1 km ||
|-id=023 bgcolor=#fefefe
| 144023 || || — || January 17, 2004 || Palomar || NEAT || — || align=right | 1.0 km ||
|-id=024 bgcolor=#E9E9E9
| 144024 || || — || January 17, 2004 || Palomar || NEAT || — || align=right | 2.2 km ||
|-id=025 bgcolor=#E9E9E9
| 144025 || || — || January 16, 2004 || Kitt Peak || Spacewatch || — |
https://en.wikipedia.org/wiki/Pedro%20de%20Paz | Pedro de Paz (born 26 October 1969 in Madrid) is a Spanish writer.
After working in computing for more than 15 years, de Paz decided in 2002 to try a career in literature. His first novel, El hombre que mató a Durruti (2004), won the José Saramago Novel Competition . The novel was translated into English and published by ChristieBooks in its Read and Noir series. De Paz' literary output is mainly in the field of police and crime novels. He also writes articles and short stories, some of them published in various anthologies and magazines.
Bibliography
In Spanish
El documento Saldaña (Ed. Planeta, 2008; Círculo de Lectores, 2009), ;
"Mala Suerte", in: La lista negra (Ed. Salto de Página, 2009) Collective anthology of short stories.
Muñecas tras el cristal (Ed. El Tercer Nombre, 2006),
"Revenge Blues", in: La vida es un bar (Ed. Amargord, 2006) Collective anthology of short stories.
El hombre que mató a Durruti (Ed. Germanía, 2004), .
In English
The man who killed Durruti (Ed. ChristieBooks, 2005)
External links
Writer's page
1969 births
Living people
Writers from Madrid
Spanish male writers |
https://en.wikipedia.org/wiki/Lehmer%27s%20GCD%20algorithm | Lehmer's GCD algorithm, named after Derrick Henry Lehmer, is a fast GCD algorithm, an improvement on the simpler but slower Euclidean algorithm. It is mainly used for big integers that have a representation as a string of digits relative to some chosen numeral system base, say β = 1000 or β = 232.
Algorithm
Lehmer noted that most of the quotients from each step of the division part of the standard algorithm are small. (For example, Knuth observed that the quotients 1, 2, and 3 comprise 67.7% of all quotients.) Those small quotients can be identified from only a few leading digits. Thus the algorithm starts by splitting off those leading digits and computing the sequence of quotients as long as it is correct.
Say we want to obtain the GCD of the two integers a and b. Let a ≥ b.
If b contains only one digit (in the chosen base, say β = 1000 or β = 232), use some other method, such as the Euclidean algorithm, to obtain the result.
If a and b differ in the length of digits, perform a division so that a and b are equal in length, with length equal to m.
Outer loop: Iterate until one of a or b is zero:
Decrease m by one. Let x be the leading (most significant) digit in a, x = a div β m and y the leading digit in b, y = b div β m.
Initialize a 2 by 3 matrix
to an extended identity matrix
and perform the euclidean algorithm simultaneously on the pairs (x + A, y + C) and (x + B, y + D), until the quotients differ. That is, iterate as an inner loop:
Compute the quotients w1 of the long divisions of (x + A) by (y + C) and w2 of (x + B) by (y + D) respectively. Also let w be the (not computed) quotient from the current long division in the chain of long divisions of the euclidean algorithm.
If w1 ≠ w2, then break out of the inner iteration. Else set w to w1 (or w2).
Replace the current matrix
with the matrix product
according to the matrix formulation of the extended euclidean algorithm.
If B ≠ 0, go to the start of the inner loop.
If B = 0, we have reached a deadlock; perform a normal step of the euclidean algorithm with a and b, and restart the outer loop.
Set a to aA + bB and b to Ca + Db (again simultaneously). This applies the steps of the euclidean algorithm that were performed on the leading digits in compressed form to the long integers a and b. If b ≠ 0 go to the start of the outer loop.
References
Kapil Paranjape, Lehmer's Algorithm
Number theoretic algorithms |
https://en.wikipedia.org/wiki/Investigative%20Data%20Warehouse | Investigative Data Warehouse (IDW) is a searchable database operated by the FBI. It was created in 2004. Much of the nature and scope of the database is classified. The database is a centralization of multiple federal and state databases, including criminal records from various law enforcement agencies, the U.S. Department of the Treasury's Financial Crimes Enforcement Network (FinCEN), and public records databases. According to Michael Morehart's testimony before the House Committee on Financial Services in 2006, the "IDW is a centralized, web-enabled, closed system repository for intelligence and investigative data. This system, maintained by the FBI, allows appropriately trained and authorized personnel throughout the country to query for information of relevance to investigative and intelligence matters."Morehart 2005, op. cit.
Overview
The size of the database appears to be growing rapidly. In 2004, according to a government solicitation for bids to manage the project, it was approximately 10TB in size. In 2005, according to one FBI official, the IDW contained approximately 100 million documents. In 2006 it contained more than 560 million documents and was accessible by more than 12,000 individuals. According to the FBI's website, as of August 22, 2007, the database contained 700 million records from 53 databases and was accessible by 13,000 individuals around the world.
, the FBI is the subject of a lawsuit brought by the EFF (Electronic Frontier Foundation) because of a lack of public notice describing the database and the criteria for including personal information, as required by the Privacy Act of 1974. The lawsuits are a result of two Freedom of Information Act requests filed by the EFF in 2006.
It was built in part by Chiliad corporation, the FBI Office of the Chief Technology Officer, and others. Companies listed on the FOIA files include Northrop Grumman and others.
Purpose
Investigative Data Warehouse–Secret (IDW-S) "provides data and data processing/analysis services to FBI agents and analysts as they perform counter-terrorism, counter-intelligence, and law enforcement missions". The core subsystem supports the Counter-Terrorism Division (CTD), the Special Event Unit, and via DOCLAB-S, the Joint Intelligence Committee Investigation (JICI) and IntelPlus.
According to a 2005 email, "IDW will also be used for criminal and other authorized non-CT investigations as it evolves." (CT being counter terrorism)
Subsystems
Within the system, there were subsystems named IDW-S Core, SPT, and DOCLAB-S
The special projects team (SPT):
allows for the rapid import of new specialized data sources. These data sources are not made available to the general IDW users but instead are provided to a small group of users who have a demonstrated "need-to-know". The SPT System is similar in function to the IDW-S system, with the main difference is a different set of data sources. The SPT System allows its users to access not only the sta |
https://en.wikipedia.org/wiki/Roads%20in%20Portugal | Roads in Portugal are defined by the Plano Rodoviário Nacional (PRN, ), which describes the existing and planned network of Portuguese roads. The present plan in force is the 2000 National Road Plan (PRN 2000), approved in 1998. It replaced PRN 1985, which itself had replaced PRN 1945.
The Portuguese road infrastructure was considered the best in Europe and the second best in the world by the World Economic Forum in its Global Competitiveness Report for 2014–2015. In the 2017–2018 report, it was considered to 8th best in the world. Nevertheless, all of these data were obtained through nothing more than an opinion survey of selected business executives.
The scenic road between Peso da Régua and Pinhão, in Trás-os-Montes region, was considered the world's best driving road, according to the Avis Driving Index. This road is a section of the N 222 which follows the Douro Valley.
History of road classification in Portugal
First road plans
The first road plans in Portugal date back from 1843 and 1848, and were based on 18th century plans which prioritized connections between Lisbon and strategic points of the country, and as a support for fluvial routes. The planned network was classified in 1850 into estradas (roads) and caminhos (paths), with the estradas being classified as 1st and 2nd class. Caminhos were routes of merely local interest.
In 1862, the existing and planned roads were classified as 1st class roads or estradas reais (royal roads), 2nd class roads or estradas distritais (district roads), and estradas municipais (municipal roads). The estradas reais were those with direct or indirect (via railways, for instance) origin in Lisbon and were managed by the State. The estradas distritais were managed by the districts while estradas municipais were managed by the municipalities.
With the abolition of the monarchy in 1910, the estradas reais were renamed estradas nacionais (national roads).
In 1913, the Law of 22 February established a commission to study a new classification of the roads and propose guidelines to establish that classification. However, despite these efforts, many routes were not clearly classified and the condition of most roads was chaotic. Widespread use of the automobile in the 1920s created new pressure for reforming the Portuguese road network.
In 1926, under the Ditadura Nacional regime, a provisional General Plan of National Roads of 1st and 2nd class was established by Decree 12,100 of 31 July 1926, according to what was previewed by the Law of 22 February 1913. Both the 1st and 2nd class roads would be designated estradas nacionais, with the term estrada distrital disappearing. They were designated EN xx-x (for estradas nacionais followed by the number of the road and its class). This plan established 23 roads of 1st class (designated EN 1-1ª to EN 23-1ª) and 112 roads of 2nd class (designated EN 1-2ª to EN 112-2ª). The definite General Plan of National Roads was approved by Decree No. 16,075 of 30 Septembe |
https://en.wikipedia.org/wiki/Concept%20%28generic%20programming%29 | In generic programming, a concept is a description of supported operations on a type, including syntax and semantics. In this way, concepts are related to abstract types but concepts do not require a subtype relationship.
Language use
The term was in use as early as 1998 for STL, as this was one of the first libraries that extensively used templates. The term concept (and its popularization) is credited to Alexander Stepanov, the primary designer of the STL.
In the C++ 1998 standard, the Concept term was introduced to name just a simple description of the requirements for particular type, usually being a template parameter. It was not encoded in the language explicitly – the concept was expressed only by what operations are attempted on objects of that type and what is expected to work (that is, to compile correctly). There was a proposal to add concepts as an explicit language feature in C++11, though it was rejected as "not ready". C++20 eventually accepted the refined design of concept.
As generics in Java and C# have some similarities to C++'s templates, the role of concepts there is played by interfaces. However, there is one important difference between concepts and interfaces: when a template parameter is required to implement a particular interface, the matching type can only be a class that implements (explicitly) that interface. Concepts bring more flexibility because they can be satisfied in two ways:
explicitly defined as satisfied by using a concept map (defined separately to the type itself, unlike interfaces)
implicitly defined for "auto concepts", which can be used also for built in types and other types that were not predestined for this use
But the C# language has several constructs where the used type does not need to explicitly implement a defined interface, it is only required to match the respective pattern (however, these patterns are not called concepts). E.g. the foreach iteration statement allows the iterated object to be of any type, as long as it implements an appropriate GetEnumerator method. (Compare with the using statement which requires the resource to implement the System.IDisposable interface.)
The Nim programming language implements concepts as a series of arbitrary compile-time boolean predicates.
Another language implementing something very similar to concepts is Haskell, where the feature is called type classes.
Examples
Total ordering
The Total ordering concept describes the semantics of the < operator.
A type is totally ordered when < is a binary predicate and satisfies the following properties:
anti-reflexive: !(a < a) for any value a.
transitive: If a < b and b < c then a < c.
anti-symmetric: If a < b then !(b < a).
total: If a != b then a < b or b < a.
Many algorithms rely on these properties to function properly.
For example the min function can be safely defined on Totally Ordered types:
// requires: T satisfies Totally Ordered
template <typename T>
T min(T a, T b) {
// < is def |
https://en.wikipedia.org/wiki/C2k | C2K (formerly known as Classroom 2000) is a Northern Ireland-wide information and communications network operated on behalf of the Education Authority in the province. After the separation of the education and library boards the C2k project has been overseen by the Education Authority Northern Ireland. Since its creation the project has been funded by the European Union, through its Building Sustainable Prosperity programme, and the Department of Education. The C2k contract is currently fulfilled by Capita Technology and Software Solutions.
C2k is responsible for providing all schools in Northern Ireland with internet and other services to support the Northern Irish Curriculum.
Some schools use their own systems, called School or Legacy.
Over the next few years, it will be replaced with EdIS (Education Information Solutions).
References
External links
C2k - Official website
C2k Partners - Organisations and companies responsible for delivering the service.
Slemish College - an example of a C2k hosted website
Educational organisations based in Northern Ireland
Information technology organisations based in the United Kingdom |
https://en.wikipedia.org/wiki/Lavastorm%20Analytics | Lavastorm is a global analytics software company based in Massachusetts. The company's products are most often used by business analysts looking to take on more responsibility for data preparation and to build advanced analytics, or by IT groups who are looking for more agile ways to provision governed data to business analysts.
History
The company was founded as JLM Technologies in 1993 by Justin and LeAnn Lindsey with a group of engineers from the Massachusetts Institute of Technology. Early locations in Massachusetts included Cambridge, Allston, and Waltham. The name was changed to Lavastorm in May 1999.
The company's initial focus was developing high performance Internet systems and applications, especially web sites. High-profile successes included Monster.com, the employment website; FamilySearch the free genealogy website sponsored by the Church of Jesus Christ of Latter-day Saints; EdgarWatch, the first on-Web system delivering SEC filing documents in real-time.
V. Miller Newton was the CEO of Monster.com when it hired Lavastorm to redesign its web site and infrastructure; in 1999, he moved over to the role of CEO for Lavastorm until 2003. Lindsey stayed on as Chief Solutions Officer. In September 1999 and June 2000, Lavastorm raised US$55 million in venture capital funding from partnerships including Hummer Winblad Venture Partners, Oak Investment Partners, Lehman Brothers, Reuters Venture Capital, and Intel. In 18 months, the company expanded from 20 employees to over 200, opening a Silicon Valley office in San Jose, California, and acquiring PixelDance, a web design company in Watertown, Massachusetts.
In the latter half of 2000 and 2001, as the dot-com bubble burst, Lavastorm reinvented itself. It laid off employees, and split off its Internet engineering services in San Jose, California, selling them to management. The Massachusetts operation, now only 20 employees, focused on making software for telecommunications revenue assurance after doing a project with Verizon Communications. In 2001 Lavastorm introduced the Revenue Assurance and Intercarrier Cost Management products. Drew Rockwell, a former executive at Verizon, was hired in 2002, and Newton left in 2003. Lindsey went to work for Hewlett-Packard, and later became the Chief Technology Officer for the Federal Bureau of Investigation and United States Department of Justice.
In July 2005, Lavastorm was bought by Martin Dawes Systems, a United Kingdom-based company specializing in billing and customer relationship management (CRM) software for the communications industry. Combined company annual revenues were expected to be US$35 million.
In February 2006, Lavastorm merged with Visual Wireless, a Sweden-based revenue assurance and fraud detection software company. The combined customer list includes BellSouth, Comcast, TeliaSonera, Telstra and Vodafone. Drew Rockwell, Lavastorm CEO, continued as head of the merged company. Lavastorm kept its name, but also became the Martin |
https://en.wikipedia.org/wiki/AIXM | The Aeronautical Information Exchange Model (AIXM) is designed to enable the management and distribution of Aeronautical Information Services (AIS) data in digital format. AIXM is based on Geography Markup Language (GML) and is one of the GML Application Schemas which is applicable for the Aeronautical domain. It was developed by the US Federal Aviation Administration (FAA), the US National Geospatial Intelligence Agency (NGA) and the European Organisation for the Safety of Air Navigation (EUROCONTROL).The current version is AIXM 5.1.1.
Model
AIXM has two main components:
The Aeronautical Information Conceptual Model
The AIXM XML Schema
The Aeronautical Information Conceptual Model
The Aeronautical Information Conceptual Model (AICM) is a conceptual model of the aeronautical domain. It describes the features and their properties (attributes and associations) within the domain. Therefore, it can be used as the logical basis for Aeronautical Information Management databases and AIXM.
The model is designed using the Unified Modelling Language (UML).
AIXM XML Schema
The AIXM XML Schema is an exchange model for aeronautical data and a concrete implementation of AICM. It is an implementation of the Conceptual Model as an XML schema. Therefore, it can be used to send aeronautical information to others in the form of XML encoded data, enabling systems to exchange aeronautical information.
Purpose
The aim of AIXM is to allow for the management and distribution of AIS data in a digital format. This includes information such as airport area data, airspace structures, organisations and units, points and navaids, procedures, routes and flying restrictions. Current versions are also designed to be able to manage and distribute the full timeline of aeronautical data, including temporary updates. These features form a key part of the EUROCONTROL backed move from AIS to Aeronautical Information Management (AIM), the transition from using data based on paper documentation and telex messages to using solely digital data.
History
Development of AIXM was initially started in order to facilitate the development of the European AIS Database (EAD). The development of AICM was started in 1996, with an initial release in 1997, which allowed for the development of the AIXM XML Schema. Initial developments were “SQL-based”, with development moving to XML in 1999. The first version of the schema was released in 1999 as AICM/AIXM 2.1 with further development leading to an updated version, AICM/AIXM 3.3 in 2002. This then allowed the EAD to begin operations in 2003.
After this, EUROCONTROL began a partnership with the FAA and the US National Geospatial Intelligence Agency in order to further develop AIXM for international usage and cover global civilian and military needs. The AIXM Change Control Board (ACCB) was set up to allow for international states and industries to participate in the development of AIXM. In 2004 AIXM 4.0 was released with an update (4.5) in 20 |
https://en.wikipedia.org/wiki/C2K | The acronym C2K may refer to:
Classroom 2000 - a Northern Ireland-wide information and communications network
Coast To Kosciuszko - ultramarathon run from sea level in mainland Australia |
https://en.wikipedia.org/wiki/Payment%20Card%20Industry%20Data%20Security%20Standard | The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard used to handle credit cards from major card brands. The standard is administered by the Payment Card Industry Security Standards Council, and its use is mandated by the card brands. It was created to better control cardholder data and reduce credit card fraud. Validation of compliance is performed annually or quarterly with a method suited to the volume of transactions:
Self-assessment questionnaire (SAQ)
Firm-specific Internal Security Assessor (ISA)
External Qualified Security Assessor (QSA)
History
The major card brands had five different security programs:
Visa's Cardholder Information Security Program
Mastercard's Site Data Protection
American Express's Data Security Operating Policy
Discover's Information Security and Compliance
JCB's Data Security Program
The intentions of each were roughly similar: to create an additional level of protection for card issuers by ensuring that merchants meet minimum levels of security when they store, process, and transmit cardholder data. To address interoperability problems among the existing standards, the combined effort by the principal credit-card organizations resulted in the release of version 1.0 of PCI DSS in December 2004. PCI DSS has been implemented and followed worldwide.
The Payment Card Industry Security Standards Council (PCI SSC) was then formed, and these companies aligned their policies to create the PCI DSS. MasterCard, American Express, Visa, JCB International and Discover Financial Services established the PCI SSC in September 2006 as an administrative and governing entity which mandates the evolution and development of the PCI DSS. Independent private organizations can participate in PCI development after they register. Each participating organization joins a SIG (Special Interest Group) and contributes to activities mandated by the group. The following versions of the PCI DSS have been made available:
Requirements
The PCI DSS has twelve requirements for compliance, organized into six related groups known as control objectives:
Build and maintain a secure network and systems
Protect cardholder data
Maintain a vulnerability management program
Implement strong access-control measures
Regularly monitor and test networks
Maintain an information security policy
Each PCI DSS version has divided these six requirement groups differently, but the twelve requirements have not changed since the inception of the standard. Each requirement and sub-requirement is divided into three sections:
PCI DSS requirements: Define the requirement. The PCI DSS endorsement is made when the requirement is implemented.
Testing: The processes and methodologies carried out by the assessor for the confirmation of proper implementation.
Guidance: Explains the purpose of the requirement and the corresponding content, which can assist in its proper definition.
In version 3.2.1 of the PCI DSS, the twelve req |
https://en.wikipedia.org/wiki/Multipurpose%20Transaction%20Protocol | Multipurpose Transaction Protocol (MTP) software is a proprietary transport protocol (OSI Layer 4) developed and marketed by Data Expedition, Inc. (DEI). DEI claims that MTP offers superior performance and reliability when compared to the Transmission Control Protocol (TCP) transport protocol.
General
MTP is implemented using the User Datagram Protocol (UDP) packet format. It uses proprietary flow-control and error-correction algorithms to achieve reliable delivery of data and avoid network flooding.
Compatibility
Because MTP/IP uses proprietary algorithms, compatible software must be installed on both ends of a communication path. Use of the UDP packet format permits compatibility with standard Internet Protocol (IP) network hardware and software. MTP/IP applications may use any available UDP port number.
MTP and the applications which use it have been implemented for several operating systems, including versions of Microsoft Windows, macOS, iOS, Linux, FreeBSD, and Solaris. Hardware platforms include variants of x86 and ARM.
Availability
MTP/IP is marketed by Data Expedition, Inc. Trial versions of applications which use MTP/IP are available on the company's website.
See also
Internet protocol suite
Micro Transport Protocol (µTP)
QUIC (Quick UDP Internet Connections)
Stream Control Transmission Protocol (SCTP UDP Encapsulation; RFC 6951)
References
External links
Forbes -- "Faster Flow, Secure Clouds And Spin Funding", February 2019
The Broadcast Bridge -- "Field Report: Maximizing the Technology You Already Have", September 2017
Enterprise Tech -- "TCP/IP Outdated for Big Data Transport, Quiet Company Says", April 2017
Silicon Angle -- "Data Expedition brings its FTP data transfer alternative to the cloud", April 2017
Packet Pushers -- "Introducing Data Expedition And MTP/IP", April 2017
Norman Transcript -- "Local Startup Company Nets Emmy", August 2014
Variety -- "NATAS Announces Technology and Engineering Emmy Recipients", August 2014
US Patent 7158479
US Patent 7313627
US Patent 7404003
US Patent 7630315
US Patent 8014289
Internet protocols
Transport layer protocols |
https://en.wikipedia.org/wiki/Mathsci | Mathsci may refer to
Mathematical sciences
Mathematics and Science High School at Clover Hill
MathSciNet, a database of the American Mathematical Society containing data for Mathematical Reviews and Current Mathematical Publications |
https://en.wikipedia.org/wiki/DataTreasury | DataTreasury, located in Plano, Texas, United States, develops, acquires and licenses technology for secure check image capture and storage. As of 2010 the company had 2 employees, about 1000 shareholders and had generated over $350 million in licensing revenue in the previous four years.
The company has a patent portfolio relating to these technologies, which it enforces. Several banks have settled, and in 2010 U.S. Bank, Viewpointe (a company set up by some major banks and I.B.M. to store and retrieve digital images of checks for large banks) Clearing House Payments Company and its subsidiary, SVPCo, were found guilty of infringing DataTreasury's patents.
There has been controversy concerning the company. In 2004, The New York Times characterized DataTreasury as "a company whose only business, other than one client, appears to be suing other companies." The banking industry has accused DataTreasury's lawyers of patent trolling and DataTreasury themselves of abusing the patent system by buying the patents they are enforcing. The US Senate version of the Patent Reform Act of 2007 (which was never enacted) contained an amendment, lobbied for by banks, tailored to protect banks from DataTreasury infringement litigation. On the other hand, in 2010, just after DataTreasury won their first lawsuit, Claudio Ballard, who founded the company, was named inventor of the year.
Company foundation and early years
Claudio Ballard founded DataTreasury in 1998 in Melville, New York, to market technology that processes electronic checks and other documents and related payment-processing tools utilizing patents prosecuted and filed prior to DataTreasury's founding. Patents were issued in 1999 and 2000.
According to Ballard, DataTreasury had as many as 100 employees, but almost went out of business in late 2001.
In 2002, DataTreasury licensed their first imaging system, eImageVault, to Bank Hapoalim of Israel.
According to a 2010 article in the Minneapolis Star Tribune, DataTreasury said that in its early days, "DataTreasury discussed a joint venture with Chase Manhattan Bank, now known as JPMorgan Chase. But according to the company, JPMorgan Chase instead helped start up competitors, Small Value Payments Co. (SVPCO) and Viewpointe Archive Services, which now process most of the nation's checks."
Patent infringement suits
Ballard patents
In 2002, DataTreasury sued 56 banks and other companies, including JPMorgan Chase and First Data, for infringing the Ballard patents.
In 2003, the U.S. Congress passed the Check Clearing for the 21st Century Act, known as "Check 21". The act allows banks to take digital images of checks, exchange those images with other banks, and destroy the original paper copies.
By December 2004, two companies that DataTreasury had sued had settled. Affiliated Computer Services, a large information technology supplier, paid $50,000, and the RDM Corporation, a small Canadian company that sells hardware and software for payment pro |
https://en.wikipedia.org/wiki/Pjet%C3%ABr%20Dungu | Pjetër Dungu (1908–1989) was an Albanian piano accompanist and composer-arranger of urban folk music. He is known in the history of the music of Albania as the first compiler of Albanian folk songs.
Dungu was born in Shkodër, where he took music lessons from composer Martin Gjoka. He played oboe and trumpet, while studying piano and harmony.
In the 1930s, Dungu gained a reputation as a piano accompanist for urban lyric song, reaching a height around the end of the decade. In 1940, Dungu published Lyra Shqiptare (Albanian Lyra), the first collection of 50 folk melodies. The compilation was published by Instituto Geografico De Agostini, Novara, in Italy. This volume, with the preface by Prof. Kristaq Antoniu, contains; 19 folk songs from Shkodra, 15 folk songs from Korça, 7 folk songs from Kosovo, 5 folk songs from Berat, 2 folk songs from Elbasan, 1 folk song from Durres and 1 folk song from Vlorë. In 1942, he accompanied tenor Kristaq Antoniu on the piano for eight songs recorded for the Columbia Recording Company in Italy. Dungu also conducted an orchestra for seven of Antoniu's recordings.
Other composer-arrangers in Albanian lyric folk music in this period, include Lola Gjoka and Kristo Kono.
References
1908 births
1989 deaths
Musicians from Shkodër
Albanian musicians
Accompanists
20th-century pianists
20th-century Albanian musicians |
https://en.wikipedia.org/wiki/Kevin%20Metheny | Kevin Metheny (June 6, 1954 – October 3, 2014) was an American radio and cable network executive who began his career as on-air talent and went on to direct programming and audience research at many radio stations and in a number of broadcast conglomerates. During the 1980s, Metheny helped develop cable entertainment networks MTV and VH1 as vice-president in charge of Music Programming and Production; he later served as vice-president of VH1 before returning to broadcast radio. Metheny received fame for his reputation as the nemesis of Howard Stern; earning him the nickname “Pig Virus.”
Career
Metheny became weekend air talent at album rock KWHP-FM in Edmond, Oklahoma in 1970. The next year, he moved to WKY in Oklahoma City, serving as weekend and fill-in talent during his senior year at John Marshall High School. Pat O'Day, general manager of KJR/KISW-FM, hired Metheny as evening talent at KJR. Following O'Day's 1975 departure, Metheny left KJR and became afternoon drive talent/music director at WNOE-FM, New Orleans, where he was promoted to Program Director. He next served as Program Director of KDEO in El Cajon, California, changing the AM album rock station to Top-40 KMJC, also known as "Majic 91".
Metheny became Director of Radio Audience Measurement (RAM) Research for DPS/Cyberdynamics, working closely with its initial RAM client Fairbanks Broadcasting's Adult Contemporary WIBG in Philadelphia. He accepted the position of Program Director at WIBG (later known as WZZD, now WNTP). He went on to be named Program Director of Hearst Corporation's Top-40 WXKX, Pittsburgh, then of WEFM in Chicago, followed by KSLQ-FM in St. Louis.
Metheny was named Program Director of The National Broadcasting Company's WNBC (NYC) in 1980. Around 1984, he accepted a position at Warner Amex Satellite Entertainment Company as Director of MTV Programming. Metheny led a management team secretly developing VH1 as a response to a challenge to MTV by Ted Turner's Cable Music Channel. He was subsequently promoted to vice-president of MTV/VH1 Music Programming and Production, and then to vice-president of VH1. After MTV Networks was acquired by Viacom in 1986, Metheny became Program Director of KTKS (Dallas). He subsequently moved to Savannah as Vice President/General Manager at WSOK/WAEV-FM. He accepted the Operations Director position of Bedford Broadcasting's San Francisco Oldies and Adult Standards stations KFRC-AM-FM followed by Oldies KQQL (Minneapolis).
Metheny then moved to Jacksonville, Florida, where he combined programming and marketing operations of WQIK-FM and News/Talk WJGR with newly acquired Urban properties WSOL-FM, WJBT, and WZAZ. This followed the deregulation of the broadcast industry by the FCC, allowing for unlimited national ownership and larger local station portfolios.
Metheny was transferred to head programming for Jacor Communications' Cleveland area radio group, consolidating operations at their combined six Cleveland stations, WAKS, WGA |
https://en.wikipedia.org/wiki/Alarm%20filtering | Alarm filtering, in the context of IT network management, is the method by which an alarm system reports the origin of a system failure, rather than a list of systems failed.
Example
Depending on the way a network is set up, the failure of one device (be it software or hardware) may cause another to fail. In this situation, a non-filtering alarm system will report both the original failure and the other device that failed. With alarm filtering, the alarm system is able to report the original failure with more priority than the subsequent failure, allowing a technician or repairman to concentrate on the cause of the issue, rather than wasting time trying to repair the wrong device.
References
Network management |
https://en.wikipedia.org/wiki/Parallels%20Desktop%20for%20Mac | Parallels Desktop for Mac is software providing hardware virtualization for Macintosh computers with Intel processors, and since version 16.5 also for Apple silicon-based Macintosh computers. It is developed by Parallels, since 2018 a subsidiary of Corel.
History
Released on June 15, 2006, it was the first software product to bring mainstream virtualization to Macintosh computers utilizing the Apple–Intel architecture (earlier software products ran PC software in an emulated environment).
Its name initially was 'Parallels Workstation for Mac OS X', which was consistent with the company's corresponding Linux and Windows products. This name was not well received within the Mac community, where some felt that the name, particularly the term “workstation,” evoked the aesthetics of a Windows product. Parallels agreed: “Since we've got a great Mac product, we should make it look and sound like a Mac product...”, it was therefore renamed ‘Parallels Desktop for Mac’.
On January 10, 2007, Parallels Desktop 3.0 for Mac was awarded “Best in Show” at MacWorld 2007.
Technical
Parallels Desktop for Mac is a hardware emulation virtualization software, using hypervisor technology that works by mapping the host computer's hardware resources directly to the virtual machine's resources. Each virtual machine thus operates identically to a standalone computer, with virtually all the resources of a physical computer. Because all guest virtual machines use the same hardware drivers irrespective of the actual hardware on the host computer, virtual machine instances are highly portable between computers. For example, a running virtual machine can be stopped, copied to another physical computer, and restarted.
Parallels Desktop for Mac is able to virtualize a full set of standard PC hardware, including
A virtualized CPU of the same type as the host's physical processor,
ACPI compliance system,
A generic motherboard compatible with the Intel i965 chipset,
Up to 64 GB of RAM for guest virtual machines,
Up to 2 GB of video RAM (VRAM),
VGA and SVGA video adapter with VESA 3.0 support and OpenGL and DirectX 10.1 acceleration,
A 1.44 MB floppy drive, which can be mapped to a physical drive or to an image file,
Up to four IDE devices. This includes virtual hard drives ranging in size from 20 MB to 2 TB each and CD/DVD-ROM drives. Virtual CD/DVD-ROM drives can be mapped to either physical drives or ISO image files.
DVD/CD-ROM “pass-through” access,
Up to four serial ports that can be mapped to a pipe or to an output file,
Up to three bi-directional parallel ports, each of which can be mapped to a real port, to a real printer, or to an output file,
An Ethernet virtual network card compatible with Realtek RTL8029(AS), capable of up to 16 network interface connections,
Up to eight USB 2.0 devices and two USB 1.1 devices,
An AC'97-compatible sound card.
A 104-key Windows enhanced keyboard and a PS/2 wheel mouse.
Version history
Version 2.5
The first official r |
https://en.wikipedia.org/wiki/HKCS | HKCS may refer to:
Hong Kong Computer Society
Hong Kong Correctional Services |
https://en.wikipedia.org/wiki/Benzene%20%28data%20page%29 | This page provides supplementary chemical data on benzene.
Material Safety Data Sheet
The handling of this chemical may incur notable safety precautions. It is highly recommended to seek the Material Safety Datasheet (MSDS) for this chemical from a reliable source such as SIRI, and follow its directions. MSDS for benzene is available at AMOCO.
Structure and properties
Thermodynamic properties
Vapor pressure of liquid
Table data obtained from CRC Handbook of Chemistry and Physics 44th ed. Note: (s) notation indicates equilibrium temperature of vapor over solid, otherwise value is equilibrium temperature of vapor over liquid.
Distillation data
Spectral data
Safety data
Material Safety Data Sheet for benzene:
References
Chemical data pages
Data page
Chemical data pages cleanup |
https://en.wikipedia.org/wiki/GSM%20procedures | GSM procedures are sets of steps performed by the GSM network and devices on it in order for the network to function. GSM (Global System for Mobile Communications) is a set of standards for cell phone networks established by the European Telecommunications Standards Institute and first used in 1991. Its procedures refers to the steps a GSM network takes to communicate with cell phones and other mobile devices on the network.
IMSI attach refers to the procedure used when a mobile device or mobile station joins a GSM network when it turns on and IMSI detach refers to the procedure used to leave or disconnect from a network when the device is turned off.
IMSI attach
In a GSM network, when a Mobile Station (MS) is switched ON, the International Mobile Subscriber Identity (IMSI) attach procedure is executed. This procedure is required for the Mobile Switching Center (MSC) and Visitor Location Register (VLR) to register the MS in the network. If the MS has changed Location area (LA) while it was powered off, then the IMSI attach procedure will lead to a Location update.
When the MS is switched on, it searches for a mobile network to connect to. Once the MS identifies its desired network, it sends a message to the network to indicate that it has entered into an idle state. The Visitor Location Register (VLR) checks its database to determine whether there is an existing record of the particular subscriber.
If no record is found, the VLR communicates with the subscriber's Home Location Register (HLR) and obtains a copy of the subscription information. The obtained information is stored in the database of the VLR. Then an acknowledge message is sent to the MS.
Steps for IMSI attach procedure are as follows:
The MS will send a Channel Request message to the BSS (base station subsystem) on the RACH (random access channel).
The BSS responds on the AGCH (access grant channel) with an Immediate Assignment message and assigns an SDCCH to the MS.
The MS immediately switches to the assigned SDCCH (stand-alone dedicated control channel) and sends a Location Update Request to the BSS. The MS will send either an IMSI or a TMSI (Temporary Mobile Subscriber Identity) to the BSS.
The BSS will acknowledge the message. This acknowledgement only tells the MS that the BTS has received the message, it does not indicate the location update has been processed.
The BSS forwards the Location Update Request to the MSC/VLR.
The MSC/VLR forwards the IMSI to the HLR and requests verification of the IMSI as well as Authentication Triplets (RAND, Kc, SRES).
The HLR will forward the IMSI to the Authentication Center (AuC) and request authentication triplets.
The AuC generates the triplets and sends them along with the IMSI, back to the HLR.
The HLR validates the IMSI by ensuring it is allowed on the network and is allowed subscriber services. It then forwards the IMSI and Triplets to the MSC/VLR.
The MSC/VLR stores the SRES and the Kc and forwards the RAND to the BSS |
https://en.wikipedia.org/wiki/Geometry%20of%20interaction | The Geometry of Interaction (GoI) was introduced by Jean-Yves Girard shortly after his work on linear logic. In linear logic, proofs can be seen as various kinds of networks as opposed to the flat tree structures of sequent calculus. To distinguish the real proof nets from all the possible networks, Girard devised a criterion involving trips in the network. Trips can in fact be seen as some kind of operator acting on the proof. Drawing from this observation, Girard described directly this operator from the proof and has given a formula, the so-called execution formula, encoding the process of cut elimination at the level of operators.
One of the first significant applications of GoI was a better analysis of Lamping's algorithm for optimal reduction for the lambda calculus. GoI had a strong influence on game semantics for linear logic and PCF.
GoI has been applied to deep compiler optimisation for lambda calculi. A bounded version of GoI dubbed the Geometry of Synthesis has been used to compile higher-order programming languages directly into static circuits.
References
Further reading
GoI tutorial given at Siena 07 by Laurent Regnier, in the Linear Logic workshop,
Proof theory
Philosophical logic
Logic in computer science
Semantics
Linear logic |
https://en.wikipedia.org/wiki/SCM%20%28Scheme%20implementation%29 | SCM is a programming language, a dialect of the language Scheme.
Language
It is written in the language C, by Aubrey Jaffer, the author of the SLIB Scheme library and the JACAL interactive computer algebra (symbolic mathematics) program. It conforms to the standards R4RS, R5RS, and IEEE P1178. It is free and open-source software released under a GNU Lesser General Public License (LGPL).
SCM runs on many different operating systems such as AmigaOS (also emulation), Linux, Atari-ST, macOS (SCM Mac), DOS, OS/2, NOS/VE, Unicos, VMS, Unix, and similar systems.
SCM includes Hobbit, a Scheme-to-C compiler written originally in 2002 by Tanel Tammet. It generates C files which binaries can be dynamically or statically linked with an SCM executable. SCM includes linkable modules for SLIB features like sequence comparison, arrays, records, and byte-number conversions, and modules for Portable Operating System Interface (POSIX) system calls and network sockets, Readline, curses, and Xlib.
On some platforms, SCM supports unexec (developed for Emacs and bash), which dumps an executable image from a running SCM. This results in a fast startup for SCM.
SCM developed from Scheme In One Defun (SIOD) in about 1990. GNU Guile developed from SCM in 1993.
References
External links
SCM project page on Savannah
Scheme (programming language) interpreters
Scheme (programming language) compilers
Scheme (programming language) implementations |
https://en.wikipedia.org/wiki/VMware%20Fusion | VMware Fusion is a software hypervisor developed by VMware for macOS systems. It allows Macs with Intel or the Apple M series of chips to run virtual machines with guest operating systems, such as Microsoft Windows, Linux, or macOS, within the host macOS operating system.
Overview
VMware Fusion can virtualize a multitude of operating systems, including many older versions of macOS, which allows users to run older Mac software that can no longer be run under the current version of macOS, such as 32-bit and PowerPC applications.
History
VMware Fusion, which uses a combination of paravirtualization and hardware virtualization made possible by the Mac transition to Intel processors in 2006, marked VMware's first entry into Macintosh-based x86 virtualization. VMware Fusion uses Intel VT present in the Intel Core microarchitecture platform. Much of the underlying technology in VMware Fusion is inherited from other VMware products, such as VMware Workstation, allowing VMware Fusion to offer features such as 64-bit and SMP support. VMware Fusion 1.0 was released on August 6, 2007, exactly one year after being announced.
Along with the Mac transition to Apple silicon in 2020, VMware announced plans for Fusion to support the new M-series platform and ARM architecture, releasing a tech preview for M1 chips in September 2021. In November 2022, VMware Fusion 13 was released, allowing ARM virtualization on Apple Silicon chips. Coinciding with the release, VMware implemented support for TPM 2.0 and OpenGL 4.3, along with improvements to VMware Tools on Windows 11. VMware Fusion 13 retains support for Intel Macs, distributing the software as a universal binary.
System requirements
Most Macs launched in 2015 or later with Apple Silicon or Intel processors for VMware Fusion 13, most Macs launched in 2012 or later for VMware Fusion 12, most Macs launched in 2011 or later for VMware Fusion 11, any x86-64 capable Intel Mac for VMware Fusion 8
macOS Monterey or later for VMware Fusion 13, macOS Catalina or later for VMware Fusion 12, Mac OS X 10.11 El Capitan or later for VMware Fusion 11, Mac OS X 10.9 Mavericks or later for VMware Fusion 8
Operating system installation media for virtual machines
Version history
See also
Desktop virtualization
Hardware virtualization
VMware Workstation
VMware Workstation Player
References
Further reading
External links
Fusion
Virtualization software
MacOS software |
https://en.wikipedia.org/wiki/Dynamic%20Trunking%20Protocol | The Dynamic Trunking Protocol (DTP) is a proprietary networking protocol developed by Cisco Systems for the purpose of negotiating trunking on a link between two VLAN-aware switches, and for negotiating the type of trunking encapsulation to be used. It works on Layer 2 of the OSI model. VLAN trunks formed using DTP may utilize either IEEE 802.1Q or Cisco ISL trunking protocols.
DTP should not be confused with VTP, as they serve different purposes. VTP communicates VLAN existence information between switches. DTP aids with trunk port establishment. Neither protocol transmits the data frames that trunks carry.
Switch port modes
The following switch port mode settings exist:
Access — Puts the Ethernet port into permanent nontrunking mode and negotiates to convert the link into a nontrunk link. The Ethernet port becomes a nontrunk port even if the neighboring port does not agree to the change.
Trunk — Puts the Ethernet port into permanent trunking mode and negotiates to convert the link into a trunk link. The port becomes a trunk port even if the neighboring port does not agree to the change.
Dynamic Auto — Makes the Ethernet port willing to convert the link to a trunk link. The port becomes a trunk port if the neighboring port is set to trunk or dynamic desirable mode. This is the default mode for some switchports.
Dynamic Desirable — Makes the port actively attempt to convert the link to a trunk link. The port becomes a trunk port if the neighboring Ethernet port is set to trunk, dynamic desirable or dynamic auto mode.
No-negotiate — Disables DTP. The port will not send out DTP frames or be affected by any incoming DTP frames. If you want to set a trunk between two switches when DTP is disabled, you must manually configure trunking using the (switchport mode trunk) command on both sides.
The configured switch port mode setting is referred to as the port's trunking administrative mode. The current behavior of a given port after negotiating with the neighboring port is referred to as the port's trunking operational mode.
See also
GARP VLAN Registration Protocol
Multiple VLAN Registration Protocol
References
External links
Disabling Dynamic Trunking Protocol (DTP). Stretch, Jeremy. Retrieved 1 June 2016.
Cisco protocols
Ethernet |
https://en.wikipedia.org/wiki/Etheric%20Networks | Etheric Networks is an Internet Service Provider based in San Mateo, California serving the San Francisco Bay Area. It specializes in high-speed Internet access using wireless technologies. Fixed wireless towers using ISM and U-NII band transmissions connect end users to its fiber optic backbone.
History
In March 2003, Etheric Networks launches ISP service via its first generation broadband fixed wireless local loop WLL access network, via the Qwest co-location center in Sunnyvale and Black Mountain, a communication tower complex at 2,800 feet above sea level, overlooking Silicon Valley and the Peninsula.
References
External links
SVBJ on Etheric, Silicon Valley Business Journal
Companies based in Redwood City, California
Companies established in 2000
Internet service providers of the United States |
https://en.wikipedia.org/wiki/Virtual%20newscaster | A virtual newscaster, or also called a virtual host, virtual presenter, virtual teleprompter or virtual anchor is a computer-generated character created for the purpose of reading forth news from a website. While Ananova is often credited to be the first virtual newscaster on the web, it went off-line in 2004. Delta Seven, created by Bruce C. Pippin, uses Microsoft Agent technology to deliver real-time changes in news, weather, sports and stock market quotes in less than seven minutes.
Advantages of having such a character on a website include that it has a more familiar effect on viewers. Also, as newscasters are typically coupled with an audio reading of any article they are featured on, visually impaired or illiterate persons can benefit from this method of information delivery.
External links
Delta Seven
Computer animation |
https://en.wikipedia.org/wiki/Rippling | In computer science, more particularly in automated theorem proving, rippling refers to a group of meta-level heuristics, developed primarily in the Mathematical Reasoning Group in the School of Informatics at the University of Edinburgh, and most commonly used to guide inductive proofs in automated theorem proving systems. Rippling may be viewed as a restricted form of rewrite system, where special object level annotations are used to ensure fertilization upon the completion of rewriting, with a measure decreasing requirement ensuring termination for any set of rewrite rules and expression.
History
Raymond Aubin was the first person to use the term "rippling out" whilst working on his 1976 PhD thesis at the University of Edinburgh. He recognised a common pattern of movement during the rewriting stage of inductive proofs. Alan Bundy later turned this concept on its head by defining rippling to be this pattern of movement, rather than a side effect.
Since then, "rippling sideways", "rippling in" and "rippling past" were coined, so the term was generalised to rippling. Rippling continues to be developed at Edinburgh, and elsewhere, as of 2007.
Rippling has been applied to many problems traditionally viewed as being hard in the inductive theorem proving community, including Bledsoe's limit theorems and a proof of the Gordon microprocessor, a miniature computer developed by Michael J. C. Gordon and his team at Cambridge.
Overview
Very often, when attempting to prove a proposition, we are given a source expression and a target expression, which differ only by the inclusion of a few extra syntactic elements.
This is especially true in inductive proofs, where the given expression is taken to be the inductive hypothesis, and the target expression the inductive conclusion. Usually, the differences between the hypothesis and conclusion are only minor, perhaps the inclusion of a successor function (e.g., +1) around the induction variable.
At the start of rippling the differences between the two expressions, known as wave-fronts in rippling parlance, are identified. Typically these differences prevent the completion of the proof and need to be "moved away". The target expression is annotated to distinguish the wavefronts (differences) and skeleton (common structure) between the two expressions. Special rules, called wave rules, can then be used in a terminating fashion to manipulate the target expression until the source expression can be used to complete the proof.
Example
We aim to show that the addition of natural numbers is commutative. This is an elementary property, and the proof is by routine induction. Nevertheless, the search space for finding such a proof may become quite large.
Typically, the base case of any inductive proof is solved by methods other than rippling. For this reason, we will concentrate on the step case.
Our step case takes the following form, where we have chosen to use x as the induction variable:
We may also possess |
https://en.wikipedia.org/wiki/CMNH | The acronym CMNH may refer to:
Carnegie Museum of Natural History in Pennsylvania
Cleveland Museum of Natural History in Ohio
Children's Miracle Network Hospitals, an international non-profit organization |
https://en.wikipedia.org/wiki/KGBT-FM | KGBT-FM (98.5 MHz) is an American radio station in McAllen, Texas, owned by Latino Media Network; under a local marketing agreement, it is programmed by former owner TelevisaUnivision's Uforia Audio Network, which offers a Regional Mexican music format until giving full operations to the station and its sister stations KGBT and KBTQ to the owner in the spring of 2023. The station has had a Regional Mexican format since 1997. It is a sister to KGBT and a former sister of KGBT-TV. Its studios are located in McAllen, Texas, while its transmitter is located in La Feria, Texas.
History
The 98.5 frequency went on the air October 4, 1966, as the Rio Broadcasting Company's KQXX (though the permit was known as KABG-FM before going on the air). KQXX maintained studios in the Casa de Palmas Hotel in McAllen. One of the founders was Ed Gomez, a local radio and TV personality who went on to be elected a Hidalgo County judge. The station changed formats from country to Spanish.
In 1980, Bravo Broadcasting bought KQXX and increased its power to the present 100,000 watts. A new Rio Broadcasting Company acquired the station in 1990. Tichenor acquired the station in 1996 and rechristened it as KGBT-FM on January 20, 1997.
References
External links
FCC History Cards for KGBT-FM
FCC FM Query Results for KGBT-FM
Regional Mexican radio stations in the United States
GBT-FM
Mass media in McAllen, Texas
Radio stations established in 1966
1966 establishments in Texas |
https://en.wikipedia.org/wiki/Osborne%20Executive | The Osborne Executive is the successor of the already commercially successful Osborne 1 portable computer by Osborne Computer Corporation. The Executive consists of a collection of the good features from the Osborne 1 and fixes some of its predecessor's perceived flaws.
The Osborne Executive, like the Osborne 1, comes with application software. The WordStar word processor, SuperCalc spreadsheet, and the CBASIC and MBASIC programming languages—all software packages that were the leading applications in their respective niches at the time—had a retail value of more than US$2,495.
The disk drives and built-in 7-inch amber CRT are covered by the keyboard when snapped on to the main case for transportation. Like the Osborne 1, the Executive can be supported by the keyboard at a convenient viewing angle. The Executive includes a cooling fan, unlike the Osborne 1, and a tiny air filter for it.
Software
The operating system is CP/M version 3.0, aka CP/M Plus. A complete listing of the ROM BIOS is available in the Osborne technical manual. Unlike version 2.2, this edition of CP/M supports bank switching memory; this allows compatible programs to use more RAM. An alternative OS, the UCSD p-System is also included.
Compatibility
The CP/M BIOS of the Executive can automatically detect and use single-sided disks formatted in the following systems:
Osborne 1
IBM PC running CP/M-86
DEC VT180
Xerox 820
Commodore 128
Many CP/M systems of the time cannot read diskettes formatted for any other brand (sometimes, for other models of the same brand) without using third-party special purpose interchange software. This built-in feature provides a useful amount of flexibility in exchanging data with other systems.
The Executive can also emulate certain models of computer terminal (which is useful for dial-up access to remote systems):
VT100
ADM-3A
Hazeltine
Hewlett-Packard
Use
The Osborne Executive was useful for presentations and projects at client sites. Unlike static presentations, the portable computer could provide on-the-spot answers to numeric questions when working with consulting clients. This laid the groundwork for the kind of 'show me the money' ROI or TCO presentations commonplace today.
A number of Executives have custom ROMs which were personalized when booted; name plates were also etched onto the casing.
The Executive was only produced in limited numbers compared to the predecessor Osborne 1, before the company filed for Chapter 11 bankruptcy. The financial problems of the Osborne company were aggravated by early announcement of the Executive, which cut into sales of the Osborne 1. This so-called Osborne effect has become proverbial as a mistake that can be made by companies trading in high-technology products.
The company had announced yet another successor product, the Osborne Vixen, but went out of business before the Vixen could be established. An Osborne Executive II, using an 8088 processor, and providing MS-DOS and IBM PC |
https://en.wikipedia.org/wiki/The%20One%20Where%20No%20One%20Proposes | "The One Where No One Proposes" is the first episode of Friends ninth season. It first aired on the NBC network in the United States on September 26, 2002.
Plot
At the end of season eight, hours after giving birth to her and Ross's daughter Emma, Rachel accidentally thinks Joey proposed to her, and says yes. Throughout the episode, Joey tries to tell her the truth before Ross finds out but keeps getting interrupted. Meanwhile, Monica asks Rachel if she really wants to marry Joey. She admits that she does not want to marry him; she only said yes out of fear of raising Emma alone.
When Phoebe sees Rachel with the ring which actually belonged to Ross's grandmother, she thinks Ross proposed. She confronts Ross who denies proposing to Rachel, but later thinks he might have. He decides to meet Rachel to put an end to the confusion. Joey comes in and Ross and Joey then end up arguing and Rachel realises that no one actually proposed. Joey leaves and Ross tries to see if he can start things up again with Rachel. Then he sees that Rachel is wearing the ring and asks her if she said yes when she thought Joey proposed. Rachel does not know what to answer and the episode ends in a cliffhanger.
Monica and Chandler continue their attempts to make a baby of their own, and use a utility closet in the hospital, where they are caught by Monica's father, Jack. When he proceeds to show them sex moves that guarantee conception, the couple are visibly freaked out.
Reception
In the original broadcast, the episode was viewed by 25.5 million viewers. Sam Ashurst from Digital Spy ranked it #219 on their ranking of the 236 Friends episodes. Telegraph & Argus ranked it #210 on their ranking of all 236 Friends episodes.
References
2002 American television episodes
Friends (season 9) episodes |
https://en.wikipedia.org/wiki/Mailwasher | Mailwasher is an email filtering software for Windows that can detect and delete spam from a user's email when it is on the mail server, before being downloaded to the user's computer.
Mailwasher was developed by the New Zealandbased company Firetrust. It uses a combination of user defined filters, spam databases and Bayesian filtering. The filter works on a small portion of each email, and then allows unwanted emails to be directly deleted from the user's POP3 inbox, without downloading them to the email client on the user's computer. This approach is intended to prevent the downloading of spam and other messages infected with malware.
There are two versions of the program. The free version can access only a single mail account and does not contain the Bayesian learning filter. The Pro version can access multiple accounts and has additional features.
References
Article on Mailwasher Free by PC World
Article on Mailwasher Pro by PC World
External links
Mailwasher (free version)
Mailwasher Pro
Official User Assistance Forum
Spam filtering |
https://en.wikipedia.org/wiki/The%20Specials%20%28Shania%20Twain%20video%29 | The Specials is a DVD released by Shania Twain on November 20, 2001 in North America. It consists of two network specials that aired during the Come on Over era. The first concert is called Winter Break and was filmed at Miami's Bayfront Park Amphittheater for 10,000 people, and included footage of Twain in her hometown of Timmins, Ontario. It aired on CBS in March 1999. Elton John, Backstreet Boys and Leahy are all special guests during the show. The music video and cover for Twain's single Rock This Country! was taken from this show. The second special, entitled Come on Over, aired on November 25, 1999 and followed a Dallas Cowboys game at the Texas Stadium, in Dallas, for a crowd of 40,000 people.
Setlists
Certifications and sales
References
Shania Twain video albums
2001 video albums |
https://en.wikipedia.org/wiki/BSNL%20Broadband | BSNL Broadband (formerly DataOne) is an Indian wireline broadband operator, a division of Bharat Sanchar Nigam Limited which is under the ownership of Department of Telecommunications under Ministry of Communications of the Government of India. It provides both wired and wireless broadband services as well as many value-added services. BSNL Broadband launched its services on 14 January 2005 as Data One.
BSNL is commissioning a multi-gigabit, multi-protocol, IP infrastructure through National Internet Backbone-II (NIB-II), that provides services through the same backbone and broadband access network. The broadband service is available on digital subscriber line technology (on the same wire that is used for old telephone service), spanning 198 cities.
The services that are supported include always-on broadband access to the Internet for residential and business customers, content-based services, video multicasting, video-on-demand and interactive gaming, audio. In addition, video conferencing, IP telephony, distance learning, messaging, multi-site MPLS VPNs with Quality of Service (QoS) guarantees. The subscribers are able to access the above services through Subscriber Service Selection System (SSSS) portal.
The service is given through Multiprotocol Label Switching (MPLS) based IP infrastructure. Layer 1 of the network consists of a high-speed backbone composed of 24 core routers connected with high-speed 2.0 Gbit/s(STM-16) links.
References
External links
Official BSNL Broadband site
Current BSNL Account Admin site
Internet service providers of India
Broadband |
https://en.wikipedia.org/wiki/Music%20Control | Music Control was a nightly, chart-oriented, network radio show, presented by Kevin Hughes. It was broadcast in the UK from 2001 to 2008 by GCap Media across 'The One Network' to 39 different radio stations.
Music Control was an interactive radio show, where listeners could have their say on the show’s new music, review albums and gigs and discuss various topics via phone, text, email, message board, and social networking platforms.
Unsigned bands were given the opportunity to upload their music to the website, resulting in air play for the bands.
Features
Brand New
Each evening Kevin Hughes played a brand new song, this was usually the song's first play on the Network and was often a first radio play in the UK. Listeners were invited to contact the show to give their opinion of the track.
Celebrity Interviews
Each night Kevin spoke to celebrities, usually from the music industry but guests also included TV and movie stars. Guests included Nelly, Usher, The Zutons, The Jonas Brothers, The Feeling, Chris Brown, OneRepublic, The Hoosiers, Thirty Seconds to Mars, Mary J. Blige, Justin Lee Collins, Martin Freeman, Chad Kroeger, Dannii Minogue, Girls Aloud, Kylie Minogue, Leona Lewis, Dave Grohl, Natasha Bedingfield and will.i.am.
Kevin was also one of the first presenters on UK commercial radio to play and interview Adele. Adele visited the Bristol studios to record a live session for the show in 2007.
Music Control Minute
The Music Control minute was a fast and furious nightly competition giving listeners 60 seconds to answer as many topical and show biz questions as they could in order to win iTunes downloads.
Uploaded
Uploaded was the part of the show, which gave unsigned artists the chance to get their music showcased on the radio. Bands could upload their music through the website and a band was featured each evening on the show.
Uploaded Album
Throughout 2008 Music Control gave unsigned bands the chance to appear on the Music Control virtual album. Each week four bands were put up to the listener vote through the website. The winning band then goes through to a monthly final. At the end of the year all the monthly winners won a spot on the album.
Competitions
Each week a different competition was run across the week, giving listeners an opportunity to win prizes which could be anything from albums and signed artwork to holidays.
Most Wanted
Kevin’s review of what’s hot right now in the world of music, DVD, movies, TV and games.
Tune of the Week
Each week Kevin supported a song, which he thought was going to be a hit; often Kevin would speak to the artist at some point during the week about the new single.
Previous Features
The Music Control Chart - formerly known as The Core Control Chart, the Music Control Chart counted down the top 10 most requested and voted for songs during the day leading up to the show. It lasted approximately one hour at the beginning of each show. After 2007, however, the chart was no longe |
https://en.wikipedia.org/wiki/Pacific%20Symposium%20on%20Biocomputing | The Pacific Symposium on Biocomputing (PSB) is an annual multidisciplinary scientific meeting co-founded in 1996 by Dr. Teri Klein, Dr. Lawrence Hunter and Sharon Surles. The conference is to presentation and discuss research in the theory and application of computational methods for biology. Papers and presentations are peer reviewed and published.
PSB brings together researchers from the US and the Asian Pacific nations, to exchange research results and address open issues in all aspects of computational biology. PSB is a forum for the presentation of work in databases, algorithms, interfaces, visualization, modeling, and other computational methods, as applied to biological problems, with emphasis on applications in data-rich areas of molecular biology.
The PSB aims for "critical mass" in sub-disciplines within biocomputing. For that reason, it is the only meeting whose sessions are defined dynamically each year in response to specific proposals. PSB sessions are organized by leaders in the emerging areas and targeted to provide a forum for publication and discussion of research in biocomputing's topics.
Since 2017 the Research Parasite Award has been announced and presented annually at the Symposium to recognize scientists who study previously-published data in ways not anticipated by the researchers who first generated it. An endowment for the award and sponsorship has been provided for the Junior Parasite award winner to attend the symposium and presentation.
References
External links
Pacific Symposium on Biocomputing web site
Biology conferences
Computer science conferences |
https://en.wikipedia.org/wiki/SPY | SPY is a three-letter acronym that may refer to:
SPDR S&P 500 Trust ETF, NYSE symbol
SPY or MOWAG SPY, a military vehicle
SPY ACT (Securely Protect Yourself Against Cyber Trespass), a 2005 US proposed cyber-security regulation
See also
Spy (disambiguation)
AN/SPY-1 and AN/SPY-3, U.S. Navy radars |
https://en.wikipedia.org/wiki/Performance%20prediction | In computer science, performance prediction means to estimate the execution time or other performance factors (such as cache misses) of a program on a given computer. It is being widely used for computer architects to evaluate new computer designs, for compiler writers to explore new optimizations, and also for advanced developers to tune their programs.
There are many approaches to predict program 's performance on computers. They can be roughly divided into three major categories:
simulation-based prediction
profile-based prediction
analytical modeling
Simulation-based prediction
Performance data can be directly obtained from computer simulators, within which each instruction of the target program is actually dynamically executed given a particular input data set. Simulators can predict program's performance very accurately, but takes considerable time to handle large programs. Examples include the PACE and Wisconsin Wind Tunnel simulators as well as the more recent WARPP simulation toolkit, which attempts to significantly reduce the time required for parallel system simulation.
Another approach, based on trace-based simulation does not run every instruction, but runs a trace file which store important program events only. This approach loses some flexibility and accuracy compared to cycle-accurate simulation mentioned above but can be much faster. The generation of traces often consumes considerable amounts of storage space and can severely impact the runtime of applications if large amount of data are recorded during execution.
Profile-based prediction
The classic approach of performance prediction treats a program as a set of basic blocks connected by execution path. Thus the execution time of the whole program is the sum of execution time of each basic block multiplied by its execution frequency, as shown in the following formula:
The execution frequencies of basic blocks are generated from a profiler, which is why this method is called profile-based prediction. The execution time of a basic block is usually obtained from a simple instruction scheduler.
Classic profile-based prediction worked well for early single-issue, in-order execution processors, but fails to accurately predict the performance of modern processors. The major reason is that modern processors can issue and execute several instructions at the same time, sometimes out of the original order and cross the boundary of basic blocks.
References
Software optimization |
https://en.wikipedia.org/wiki/Micro%20Electronics%2C%20Inc. | Micro Electronics, Inc. (MEI) is an American privately owned corporation headquartered in Hilliard, Ohio. Founded in 1979 by John Baker, it serves as the parent company of the computer retailer Micro Center, its online division Micro Center Online, and its brand iPSG, which houses PowerSpec PC, WinBook, and Inland(including Inland Premium for high-end SSDs).
References
Consumer electronics retailers in the United States
Consumer electronics retailers
Consumer electronics
Computer companies of the United States
Home computer hardware companies
American companies established in 1979
Computer companies established in 1979
Electronics companies established in 1979
Retail companies established in 1979
Online retailers of the United States
Privately held companies based in Ohio
1979 establishments in Ohio
Companies based in the Columbus, Ohio metropolitan area |
https://en.wikipedia.org/wiki/VIRVE | VIRVE (short for "Viranomaisradioverkko", government official radio network) is the Finnish authorities' telecommunications network. It is based on the Terrestrial Trunked Radio (TETRA) standard. It is one of few nationwide TETRA networks in the world.
History
The VIRVE network was created for the authorities to have their own nationwide and secure radio network. The planning of the network began in the early 1990s, when analog authority networks were deemed to be expensive to keep up and the demands for authority communications had grown. In 1995 the Finnish government decided to invest €134 million for a new shared authority network. Construction of the network began in 1998 and the network became nationwide in 2002. Today there are over 60,000 users and about 1,300 base stations in the whole country.
Technology
The technology for VIRVE has been developed by Nokia and the construction was overseen by the Ministry of Internal Affairs. The Terrestrial Trunked Radio-based system uses the frequency band of 380–400 megahertz, which is lower than GSM. Due to the lower frequency band fewer base stations are needed. Unlike its analog counterparts, Digital VIRVE is encrypted though it suffers the same backdoor security issue all Tetra have in common, and it has unified all previous authority networks into one network. The network makes it possible to transfer pictures and the same digital services as the GSM network. Furthermore, the network has a group call service that enables fast and efficient communication in a group of users. The expected number of clients in the network is 50,000. In July 2009 the number was 31,000. The power of the base stations is set to 25 watts, in vehicular devices it is 10 watts and in portable devices 0.5–3 watts.
The network is separated into groups that can be modified in according to the needs of the operation at hand. The network is used by security officials: the police, rescue services, customs, border guard, social- and health department and the Finnish Defence Forces. Authorities can also allow access to the network for other personnel separately for a limited amount of time, under contract or limited to certain events.
VIRVE is controlled and upheld by Suomen Erillisverkot Oy (State Security Networks Ltd.), which is owned by the State of Finland in whole.
The current TETRA-based network will be replaced by 4G/5G-based network starting in 2022 and current TETRA-based network is estimated to be available until 2025. Procurement process has started in spring 2019.
External links
State Security Networks Ltd.
Public safety networks |
https://en.wikipedia.org/wiki/Christian%20Family%20Radio | Christian Family Radio is a network of Christian radio stations based in Bowling Green, Kentucky. The network is owned by Christian Family Media Ministries, Inc., a non-profit organization that is funded by listener contributions and underwriting grants from businesses.
CFR operates its flagship station, WCVK, out of its Bowling Green facilities. It also operates WJVK, a full-power repeater station in Owensboro, Kentucky, and WZVK, also a full-power repeater in Glasgow, Kentucky, both of which simulcasts the WCVK signal.
External links
Official web site
American radio networks |
https://en.wikipedia.org/wiki/Evergreen%20%28software%29 | Evergreen is an open-source integrated library system (ILS), initially developed by the Georgia Public Library Service for Public Information Network for Electronic Services (PINES), a statewide resource-sharing consortium with over 270 member libraries.
Beyond PINES, the Evergreen ILS is deployed worldwide in approximately 1,800 libraries, and is used to power a number of statewide consortial catalogs.
In 2007, the original Evergreen development team formed a commercial company around the software, Equinox Software, which provides custom support, development, migration, training, and consultation for Evergreen. Equinox Software was later supplanted by the Equinox Open Library Initiative, a non-profit. As of 2014, several more companies and groups also provide support and related services for Evergreen.
History
Evergreen was developed by the Georgia Public Library Service (GPLS) to support 252 public libraries in the Public Information Network for Electronic Services (PINES) consortium. Development began in June 2004 when state librarian Lamar Veatch announced in an open letter that after reviewing options available, GPLS decided to develop its own library automation system. GPLS believed it could develop a system customized to fit its needs better at a lower cost than the fees currently being paid. Programmers in the GPLS developed the project for two years, and PINES successfully completed the transition to Evergreen on September 5, 2006. In the next two years, the PINES consortium increased to over 270 libraries and five other systems in the United States and Canada implemented Evergreen.
The software started receiving contributions from other libraries and developers in 2007. 2009 saw the first Evergreen International Conference. In 2012, the community joined the Software Freedom Conservancy and formed an oversight board. In 2019 the Evergreen Community elected an Evergreen Project board as part of their transition to a stand-alone non-profit organization.
Other Evergreen implementations in North America:
Beauregard Parish Library (Louisiana, 6 branches)
BC Libraries Cooperative - Sitka (consortium of 92 multitype libraries, 150+ branches in BC and Manitoba)
Consortium Of Ohio Libraries COOL (13 libraries)
CW MARS (Massachusetts, 155 libraries)
Evergreen Indiana (129 libraries)
Kenton County Public Library (Kentucky, 3 libraries)
King County Library System (Washington, 50 libraries)
Library of Virginia (Evergreen Virginia) (10 libraries)
Maine Balsam (10 libraries)
Mohawk College Library (3 libraries)
NC Cardinal (North Carolina, 216 libraries)
Missouri Evergreen (52 Libraries districts, 133 service locations)
Niagara Libraries (Ontario, 11 libraries),
North of Boston Library Exchange (NOBLE) (Massachusetts, 28 libraries)
North Texas Library Consortium (rural area outside Fort Worth, 17 libraries),
PaILS is the Pennsylvania Integrated Library System (ILS), over 100 libraries,
Pioneer Library System (Upstate New Y |
https://en.wikipedia.org/wiki/Juli%C3%A1n%20Trujillo%20Largacha | Julián Trujillo Largacha (January 28, 1828 – July 18, 1883) was a Colombian lawyer, statesman, General of the Army and President of Colombia from 1878 to 1880.
Biographic data
Trujillo was born in Popayán, Cauca, on January 28, 1828. He died in Bogotá, Cundinamarca, on July 18, 1883.
Early life
Trujillo studied jurisprudence and graduated as a lawyer in 1849.
Private life
Trujillo married Doña Dolores Thorny Carvajal, with whom he had 7 children.
Military career
In 1875, Trujillo enlisted in the army to defend the government of President Aquileo Parra against the conservative revolt. He participated in the battle of "Los Chancos", where the national army defeated the conservative upraise. He was ascended to the rank of General. Later, Trujillo leads the government’s forces in the successful seizure of Manizales, mayor stronghold of the conservative army. He is ascended to the rank of Great General.
Political career
After Trujillo’s military victory in the seizure of Manizales, and the granting of amnesty to the conservative opponents, he was appointed as Military and Civilian Chief of the city of Manizales. In 1877, he was designated as President of the State of Antioquia, to replace the defeated and deposed Silverio Arango.
The Presidency
In March 1877, Trujillo was nominated as candidate for the liberal party by General Tomás Cipriano de Mosquera and Manuel Murillo Toro, one month before his arrival to the city of Medellín. This nomination was to honor the desires of General Rafael Núñez, who had expressed his wishes in a letter to General Fernando Ponce, dated October 28, 1876, in which he stated that General Trujillo was the most qualified to be President of Colombia. Both wings of the liberal party, radicals and independents, united in support for the candidacy of Trujillo. He was elected president without opposition from the conservative party, who had been defeated in the war and decided not to take part in this presidential election.
References
External links
Julián Trujillo Largacha biography (in Spanish)
1828 births
1883 deaths
People from Popayán
Colombian people of Spanish descent
Colombian Liberal Party politicians
Presidents of Colombia
Presidential Designates of Colombia
Colombian generals
Ambassadors of Colombia to Ecuador |
https://en.wikipedia.org/wiki/Efika | Efika is a line of power efficient ARM architecture and Power ISA based computers manufactured by Genesi.
In Esperanto efika means "efficacious, effective, or efficient".
EfikaPPC
The EfikaPPC, sometimes also referred to as EFIKA 5200B, was based on a 400 MHz Freescale MPC5200B System-on-a-Chip and includes 44-pin 2.5" IDE, USB, serial port, stereo audio in/out, 100 Mbit/s Ethernet, 33/66 MHz PCI port and 128 MB DDR RAM. EFIKA uses an Open Firmware based CHRP compliant firmware with a special x86/BIOS emulator providing support for standard graphics cards on an AGP riser slot. The motherboard had a non-standard form factor, 118 mm × 153 mm × 38 mm small.
Due to its small size, Restriction of Hazardous Substances Directive (RoHS) compliance and energy efficient nature (drawing less than 20 Watts with a harddrive and a graphics card, typically less than 10 Watts during most usage scenarios), the Efika was marketed as environmentally friendly.
An Efika computer could run a variety of operating systems including Linux (Gentoo, openSUSE, Debian and CRUX PPC), MorphOS, AROS, OpenSolaris and QNX. It was sometimes called EFIKA5K2, since it used the PowerPC e300 based MPC5200B processor.
On September 10, 2007, Genesi announced it discontinued the 5200B and was developing a new product based on the Freescale MPC5121e.
It would feature on-board PowerVR MBX video.
Efika MX
In August 2009, the Efika MX Open Client was announced which used the Freescale i.MX515 ARM system-on-a-chip.
The CPU core ran at 800 MHz, Wi-Fi (802.11 b/g/n) and 512 MB of DDR2 SDRAM were included.
The Efika MX Smartbook (small laptop computer) was announced in August 2010.
It featured a 1024×600 resolution screen, 16 GB of SSD and 512 MB of DDR2 RAM.
It required a maximum operating power consumption of 12 watts (average power consumption around 6 W), and came with software based on Ubuntu 10.10 "Maverick Meerkat" release of Linux.
Other Linux distributions are known to work properly on the platform. The drivers and software developed specifically for the platform is available on the company public git at GitHub
The Open Client product was also renamed the Efika MX Smarttop. In Europe, the Efika MX Smartbook is marketed as Efika MX Netbook due to trademark disputes.
See also
Pegasos
Open Desktop Workstation
mobileGT
References
External links
Pegasos Support Forum & Community
EFIKA: First Impressions – Pegasos.org
EFIKA public presentation at EBV Tech Trends 2006 – http://www.ppcnux.de/
Gentoo's EFIKA page
CRUX PPC's EFIKA HowTo
openSUSE's EFIKA page
PowerPC mainboards |
https://en.wikipedia.org/wiki/Berkeley%20Institute | Berkeley Institute may refer to:
Berkeley Institute (New York) 1886-1956
The Berkeley Institute, a public senior high school established in Pembroke Parish, Bermuda in 1897
Berkeley Institute for Data Science part of University of California, Berkeley |
https://en.wikipedia.org/wiki/Orientattus%20bicuspidatus | Orientattus bicuspidatus, synonym Evarcha bicuspidata, is a jumping spider found only in Vietnam. It was originally placed in the genus Evarcha, but was transferred to Orientattus in 2020.
The spider is 3.6 mm long. Males are dark brown, with a darker area around the eyes. They are covered with dark brown and white hairs. Two pairs of yellowish brown transverse bands are seen on the thoracic area. The legs are dark brown with yellowish brown rings.
Name
The species name is derived from Latin, bi "two" and cuspidata "sharp ended", referring to the two-pronged retrolateral tibial apophysis, now considered a feature of the genus Orientattus.
References
Salticidae
Endemic fauna of Vietnam
Spiders of Asia
Spiders described in 2003 |
https://en.wikipedia.org/wiki/Interdisciplinary%20Centre%20for%20Mathematical%20and%20Computational%20Modelling | Interdisciplinary Centre for Mathematical and Computational Modelling (ICM) is a supercomputing and research data centre at the University of Warsaw in Poland.
See also
Open access in Poland
References
Organizations established in 1993
University of Warsaw
Supercomputer sites |
https://en.wikipedia.org/wiki/Self-certifying%20File%20System | In computing, Self-certifying File System (SFS) is a global and decentralized, distributed file system for Unix-like operating systems, while also providing transparent encryption of communications as well as authentication. It aims to be the universal distributed file system by providing uniform access to any available server, however, the usefulness of SFS is limited by the low deployment of SFS clients. It was developed in the June 2000 doctoral thesis of David Mazières.
Implementation
The SFS client daemon implements the Sun's Network File System (NFS) protocol for communicating with the operating system, and thus can work on any operating system that supports NFS, including Windows. The client manages connections to remote file systems as necessary, acting as a kind of protocol translation layer. The SFS server works similarly to other distributed file system servers, by exposing an existing disk file system over the network, over the specific SFS protocol. On Unix-like systems, SFS file systems can usually be found at . When an SFS file system is first accessed through this path, a connection to the server is made and the directory is created ("automounted").
Differences
The primary motivation behind the file system is to address the shortcomings of hardwired, administratively configured distributed file systems in larger organizations, and various remote file transfer protocols. It is designed to operate securely between separate administrative realms. For example, with SFS, one could store all their files on a single remote server, and access the same files securely and transparently from any location as if they were stored locally, without any special privileges or administrative cooperation (other than running the SFS client daemon). Available file systems will be found at the same path regardless of physical location, and are implicitly authenticated by their path names — as they include the public-key fingerprint of the server (hence why it is called "self-certifying").
In addition to the new perspective, SFS also addresses some commonly raised limitations of other distributed file systems. For example, NFS and SMB clients have to rely on the server for file system security policies, and NFS servers have to rely on the client computer for authentication. This often complicates security, as one compromised computer could breach the security of the entire organization. The NFS and SMB protocols also do not by themselves provide confidentiality (encryption) or tamper resistance from other computers on the network, without encapsulation layers such as IPsec.
Unlike Coda and AFS, SFS does not provide local caching of remote files and thus is more dependent on network reliability, latency and bandwidth.
See also
Clustered file system
Network File System (protocol)
Coda (file system)
Andrew File System
References
External links
archive of SFS official web site (archive.org)*
Network file systems
Userspace file systems
Dis |
https://en.wikipedia.org/wiki/8000%20Plus | 8000 Plus (renamed PCW Plus early in 1992) was a monthly British magazine dedicated to the Amstrad PCW range of microcomputers. It was one of the earliest magazines from Future plc, and ran for just over ten years, the first issue being dated October 1986 and the last (as PCW Plus) being issue 124, dated Christmas 1996.
Science fiction writer David Langford wrote a regular column for 8000/PCW Plus, which ran (albeit not continuously) for the magazine's entire lifespan.
References
External links
8000 Plus Magazine, Magazine Collection at the Internet Archive
1986 establishments in the United Kingdom
1996 disestablishments in the United Kingdom
Amstrad magazines
Defunct computer magazines published in the United Kingdom
Home computer magazines
Magazines established in 1986
Magazines disestablished in 1996
Mass media in Somerset
Monthly magazines published in the United Kingdom |
https://en.wikipedia.org/wiki/Logbook%20of%20The%20World | Logbook of the World (LoTW) is a web-accessed database provided by the American Radio Relay League (ARRL) to implement a contact verification service among amateur radio operators. Using LoTW, radio amateurs (hams) can claim and verify contacts (QSOs) made with other amateurs, generally for claiming credit for operating awards, such as DXCC. This kind of verification formerly required exchange of paper QSL cards and submission to ARRL, a slow and somewhat expensive process. LoTW began operation in 2003.
Confirmation process
The LoTW system emphasizes secure authentication using cryptographic key distribution. An amateur's computer-based logbook, in ADIF or Cabrillo format, must be "signed" using a key obtained from ARRL. (Logbook data includes callsigns and locations of stations, contact time, frequency, and operating mode.) ARRL assigns such keys to amateurs who appear in the U.S. FCC licensing database or to non-US amateurs who provide alternate proof of identity.
Once a log file has been signed using ARRL's "TrustedQSL" (or equivalent) program, it is uploaded to the ARRL server and entered in the database.
Log records in the LoTW database are automatically compared so that when a contact at a particular time, operating mode, and frequency band is claimed by both participating amateurs (who both must have submitted their logs), a "QSL" (confirmation) is declared for a later award claim, e.g., for contacts with all U.S. states or 100 different countries. The matching process is blind, meaning that none of the two stations can see pending confirmations for him before he uploads a matching record. The LoTW QSL is purely electronic; there is no paper confirmation. However, a participant may print out a record of each confirmed contact, complete with its LOTW record number.
A LoTW-registered amateur may log into the LoTW website to view his or her logged QSOs and the verified QSL matches. When the amateur has a sufficient number of LoTW and/or traditional paper QSLs, he or she may apply for an ARRL award. As of January 2012, LoTW credit may be used for credit for awards issued by the ARRL and by CQ Magazine. The ARRL does not recognize other web-based QSL systems, such as eQSL, for awards credit.
Statistics
As of (May 26, 2022) the LoTW server provided the following information:
Software
All registered LoTW users have access to the main user data site: lotw.arrl.org. The TrustedQSL software for certificate management and logbook signing is available through the main LoTW information site: www.arrl.org/logbook-of-the-world. Versions of this software are available for many versions of Windows, Macintosh, and Linux operating systems.
Programmers' information and source code are available at trustedqsl.sourceforge.net, in particular the 2001 design specification.
LoTW functions are integrated into a number of amateur radio logging software packages, simplifying the signing and upload process.
References
External links
eQSL.cc Posit |
https://en.wikipedia.org/wiki/Showbiz%20Moms%20%26%20Dads | Showbiz Moms & Dads is an American reality television series which premiered on April 13, 2004, on the Bravo cable network. The series featured children and their parents who aspired to success in entertainment.
The network subsequently aired several similar shows, including Showdog Moms & Dads and Sports Kids Moms & Dads.
Cast
The reality series followed these families:
The Barrons: Jordan, a 14-year-old aspiring actress and her mother.
The Klingensmiths: Shane, a 13-year-old aspiring singer and actor and his mother.
The Moseley-Stephens: Jordan, an 8-year-old actress and her mother.
The Nutters: A family of seven aspiring child and teenage actors. The children and their parents later appeared on The Oprah Winfrey Show and the father, Duncan Nutter, was a contestant on Battle of the Network Reality Stars.
The Tyes: Emily, a 4-year-old beauty pageant contestant and her mother.
References
External links
2000s American reality television series
2004 American television series debuts
2004 American television series endings
Bravo (American TV network) original programming |
https://en.wikipedia.org/wiki/Apple%20File%20Exchange | Apple File Exchange (AFE) is a utility program for Apple Macintosh computers. It was included on the Apple "Tidbits" or "Install 2" disk in system versions 7.0 through 7.1. In System 7.5 (released in 1994), it was replaced by PC Exchange.
Apple File Exchange could read floppy disks from DOS/Windows and ProDOS (Apple II) systems, as well as disks from Macs.
This utility enabled Macs to read PC disks, but only if they were inserted after launching Apple File Exchange. If Apple File Exchange was not launched while inserting PC-formatted floppy, the Mac would complain that the disk inserted "was not a Macintosh disk" and requested initialisation.
Apple File Exchange was a file content translator, in contrast to the File System Translator of Apple GS/OS which just translated the file system between different computers' storage formats. AFE could convert data files produced by one program for use in another, e.g. between AppleWorks and ClarisWorks.
Bugs
A high-density diskette in DOS format formatted as a 720K disk would not function correctly; the Mac assumed that any high-density disk has been formatted as an HD disk. To solve this problem, a user could cover the square hole with a piece of tape opposite the write-protect tab, and re-insert the disk. (This square hole identifies the disk as a high-density disk.) Covering the square hole will make it appear to disk drive as a DD disk.
References
External links
Apple File Exchange on WikiMac, the Mac wiki
File Exchange
Apple Inc. file systems
Compatibility layers |
https://en.wikipedia.org/wiki/Intra-frame%20coding | Intra-frame coding is a data compression technique used within a video frame, enabling smaller file sizes and lower bitrates, with little or no loss in quality. Since neighboring pixels within an image are often very similar, rather than storing each pixel independently, the frame image is divided into blocks and the typically minor difference between each pixel can be encoded using fewer bits.
Intra-frame prediction exploits spatial redundancy, i.e. correlation among pixels within one frame, by calculating prediction values through extrapolation from already coded pixels for effective delta coding. It is one of the two classes of predictive coding methods in video coding. Its counterpart is inter-frame prediction which exploits temporal redundancy. Temporally independently coded so-called intra frames use only intra coding. The temporally coded predicted frames (e.g. MPEG's P- and B-frames) may use intra- as well as inter-frame prediction.
Usually only few of the spatially closest known samples are used for the extrapolation. Formats that operate sample by sample like Portable Network Graphics (PNG) can usually use one of four adjacent pixels (above, above left, above right, left) or some function of them like e.g. their average. Block-based (frequency transform) formats prefill whole blocks with prediction values extrapolated from usually one or two straight lines of pixels that run along their top and left borders.
The term intra-frame coding refers to the fact that the various lossless and lossy compression techniques are performed relative to information that is contained only within the current frame, and not relative to any other frame in the video sequence. In other words, no temporal processing is performed outside of the current picture or frame. Non-intra coding techniques are extensions to these basics. It turns out that this block diagram is very similar to that of a JPEG still image video encoder, with only slight implementation detail differences.
Inter frame has been specified by the CCITT in 1988–1990 by H.261 for the first time. H.261 was meant for teleconferencing and ISDN telephoning.
Coding process
Data is usually read from a video camera or a video card in the YCbCr data format (often informally called YUV for brevity). The coding process varies greatly depending on which type of encoder is used (e.g., JPEG or H.264), but the most common steps usually include: partitioning into macroblocks, transformation (e.g., using a DCT or wavelet), quantization and entropy encoding.
Applications
It is used in codecs like ProRes: a group of pictures codec without inter frames.
See also
Video compression
I-Frame Delay
Inter frame
Group of pictures application of frame types
Motion compensation
External links
http://www.cs.cf.ac.uk/Dave/Multimedia/node248.html
MPEG
Video compression |
https://en.wikipedia.org/wiki/KSKA | KSKA (91.1 FM) is a non-commercial radio station in Anchorage, Alaska, United States. The station airs public radio programming from the NPR network and the BBC World Service. KSKA also airs some locally originated programming.
Translators
KSKA makes use of broadcast translators to increase the coverage of the main station on 91.1 MHz.
References
External links
KSKA official website
Radio Coqui program website
1978 establishments in Alaska
SKA
KSKA (FM)
Radio stations established in 1978
SKA |
https://en.wikipedia.org/wiki/ZES | ZES may stand for:
ZENworks Endpoint Security Management, a computing-security product
Zollinger–Ellison syndrome, a disease of the digestive system
ZES (television channel), a Belgian television channel |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.