source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/Telecommunication%20%26%20Computer%20Industries%20Consortium
Telecommunication and Computer Industries Consortium (TCIC) Barnamenegar was established in 1995 in Tehran, Iran. TCIC first started with manufacturing personal computers (PCs), monitors, keyboards, mice, etc. This company was among the first three companies that brought the computer technology into Iran. TCIC then entered into the Telecom market and started manufacturing Pairgains (PCM) and different types of payphones such as: PSTN & GSM, Multimedia, and Indoor. In 2005, by selling more than 120,000 payphones, TCIC got 87% share of Iran's payphone market. In addition to the local market, this company has targeted the neighbor countries' markets. External links Company's website Computer companies of Iran
https://en.wikipedia.org/wiki/Bibliography%20of%20World%20War%20I
This list contains a selection of books on World War I, using APA style citations. Reference works Ellis, Robert, John, and Mike Cox. The World War I Databook: The Essential Facts and Figures for All the Combatants (2002) Encyclopædia Britannica (12th ed. 1922) comprises the 11th edition plus three new volumes 30–31–32 that cover events since 1911 with very thorough coverage of the war as well as every country and colony. partly online in ascii, with guide to article titles full text of vol 30 Abbe to English History scans of each page of vol 30–31–32 Herman, Gerald. The Pivotal Conflict: A Comprehensive Chronology of the First World War, 1914–1919 (1992) 824pp Higham, Robin and Dennis E. Showalter, eds. Researching World War I: A Handbook (2003), highly detailed historiography, stressing military themes; annotates over 1000 books Hirschfeld, Gerhard, Gerd Krumeich and Irina Renz, eds. Brill's Encyclopedia of the First World War. (2012) . 1105 pgs. (2 vol.) international scope: showcasing the work of recognized World War I experts from 15 countries google books link Horne, John, ed. (2012). A Companion to World War I. West Sussex: Wiley-Blackwell. March, Francis Andrew and Richard Joseph Beamish History of the World War: An Authentic Narrative of the World's Greatest War (1919), popular contemporary history. Paxson, Frederic Logan et al. War cyclopedia: a handbook for ready reference on the great war (1918) online edition Tucker, Spencer, ed. The Encyclopedia of World War I: A Political, Social, and Military History (5 vol 2005), online at eBook.com, the most detailed reference source; articles by specialists cover all aspects of the war Tucker, Spencer, ed. European Powers in the First World War: An Encyclopedia (1999) Winter, Jay, ed. (2014). The Cambridge History of the First World War (3 vol. Cambridge University Press, 2014) online review Atlases and maps Banks, Arthur (2001). A Military Atlas of the First World War. Barnsley: Leo Cooper reprinted by Pen & Sword. Bekers, Willem, and Ronald De Meyer. "War on scale: models for the First World War battlefront." in The intellectual response to the first world war: how the conflict impacted on ideas, methods and fields of enquiry (Sussex Academic Press, 2017) pp. 185–204. online Chasseaud, Peter. Mapping the first world war (HarperCollins UK, 2013). Espenhorst, Jürgen. "A good map is half the battle! The military cartography of the central powers in World War I." in History of military cartography (Springer, Cham, 2016) pp. 83–130. Espenhorst, Jürgen. "The Eye of the Army: German Aircraft and Aero Cartography in World War I." in History of Military Cartography (Springer, Cham, 2016) pp. 61–82. Esposito, Vincent J. The West Point Atlas of American Wars: 1900–1918 (1997) despite the title covers entire war; online maps from this atlas Gregory, Derek. "Gabriel's map: Cartography and corpography in modern war." in Geographies of knowledge and power (Springer, Dordrecht
https://en.wikipedia.org/wiki/Electron%20affinity%20%28data%20page%29
This page deals with the electron affinity as a property of isolated atoms or molecules (i.e. in the gas phase). Solid state electron affinities are not listed here. Elements Electron affinity can be defined in two equivalent ways. First, as the energy that is released by adding an electron to an isolated gaseous atom. The second (reverse) definition is that electron affinity is the energy required to remove an electron from a singly charged gaseous negative ion. The latter can be regarded as the ionization energy of the –1 ion or the zeroth ionization energy. Either convention can be used. Negative electron affinities can be used in those cases where electron capture requires energy, i.e. when capture can occur only if the impinging electron has a kinetic energy large enough to excite a resonance of the atom-plus-electron system. Conversely electron removal from the anion formed in this way releases energy, which is carried out by the freed electron as kinetic energy. Negative ions formed in these cases are always unstable. They may have lifetimes of the order of microseconds to milliseconds, and invariably autodetach after some time. Molecules The electron affinities Eea of some molecules are given in the table below, from the lightest to the heaviest. Many more have been listed by . The electron affinities of the radicals OH and SH are the most precisely known of all molecular electron affinities. Second and third electron affinity Bibliography . . Updated values can be found in the NIST chemistry webbook for around three dozen elements and close to 400 compounds. Specific molecules References See also Atomic physics Chemical properties Chemical element data pages
https://en.wikipedia.org/wiki/CIRSDIG
The Inter-University Centre for Research on the Sociology of Law, Information and Legal Institutions (CIRSDIG) is a network created in 1988 by the Universities of Messina and Macerata in Italy. Aims The center's stated aims are: to develop research activities in the sociology of law and studies on legal institutions, with particular focus on the aspects of communication and information law; to implement Ph.D. courses, awards, and scholarships (CIRSDIG is one of the promoting institutions of the Ph.D. courses on "Analysis and Theory of Political Institutions, Social and Communicative Changes" at the University of Messina, "Sociology of Legal and Political Institutions and Analysis of Administrative processes" and "Theory of Information and Communication" at the University of Macerata); to promote the exchange of information among scholars in a framework of cooperation with public and private institutions; to stimulate interdisciplinary approaches. Projects Over the years, CIRSDIG has carried out a number of scientific research projects, published a series of working papers, and organized several events, based around the empirical research conducted by the centre's scholars into law and communicative processes. The Centre has also developed studies on journalism and communication. Fields of research at the Center include the "journalistic construction of electoral campaigns", deviance, youth, and immigration. Recently, the Centre has produced a study in the field of education, "The Normative Impact of Legislation on Schooling and Education in Calabria", financed by the Local Government of Calabria. Other roles Apart from the research activities, CIRSDIG organizes seminars, conferences, and other similar events. In May 2001, an international conference on the new communicative and social codes was held at the University of Messina. Participants included Michel Maffesoli, Eric Landowski, Oscar Correas, and Roque Carrion-Wam. Presented papers were later published in two books. The Center also organised a conference on "Youth, Values and Liquid Society" in Messina in 2004, with participants from other Italian universities including Mario Morcellini, Valerio Pocar, Antonio La Spina, and Domenico Carzo. In 2006, CIRSDIG carried out a research project on the subject of usury and organized crime in Messina, which received coverage in the national press. Today, the Centre is focused principally on social change in Southern Italian society, which includes new studies on New Media, multiculturalism, and social protections. In May 2006, CIRSDIG began a new empirical study on "Cultural Consumption and Social Imaginaries: Gender Perspectives". References External links Official web site Law of Italy University of Messina University of Macerata
https://en.wikipedia.org/wiki/KHAR
KHAR (590 AM) is a commercial sports radio station in Anchorage, Alaska, United States. It features programming from the CBS Sports Radio network. Owned by Alpha Media, its studios are located in Anchorage (two blocks west of Dimond Center), and its transmitter is in the Bayshore neighborhood in South Anchorage. History KHAR went on the air in 1961. The station was founded by Willis "Bill" Harpel, who previously worked at KFQD and owned stations in Washington state. He founded Sourdough Broadcasters, and would launch KHAR-FM (now KBRJ) and KHAR-TV (now KYUR) prior to his accidental death in January 1968. His family, particularly widow Patricia and son Craig, would continue to run Sourdough Broadcasters for many more decades. During its earlier decades, KHAR, like many AM stations, aired a general format, including music and news. Notable aspects of early programming included broadcasting messages to Bush residents, a practice once fairly common among urban broadcasters in Alaska, but found on very few stations today. The station was also noted for carrying the commentaries of Ruben Gaines, a onetime poet laureate of Alaska known for creating the character "Chilkoot Charlie". KHAR programmed an adult standards format, or minor variations thereof, from at least the 1970s until 2013. The station's branding, Heart Radio 59, was also featured for decades. KHAR was one of very few commercial stations in Alaska whose format more or less remained intact during the era of broadcasting company consolidation which began in the 1990s. Resultant from that consolidation, KHAR was one of a number of Anchorage stations acquired by Morris Communications. It shared studios with its sister stations in the Morris Alaska building near the Dimond Center. On May 1, 2013, KHAR changed its format from adult standards to sports, with programming from CBS Sports Radio. Morris Communications sold KHAR and 32 other stations to Alpha Media LLC effective September 1, 2015, at a purchase price of $38.25 million. Translator KHAR is also broadcast on the following FM translator: See also List of radio stations in Alaska References External links FCC History Cards for KHAR 1961 establishments in Alaska Radio stations established in 1961 HAR Sports radio stations in the United States Alpha Media radio stations
https://en.wikipedia.org/wiki/KBYR%20%28AM%29
KBYR (700 kHz) is an American commercial AM radio station programming talk in Anchorage, Alaska. 700 AM is a North American clear-channel frequency. WLW in Cincinnati, Ohio is also a Class A station on this frequency. History Longtime Alaskan broadcaster Dick Lobdell identified KBYR as the source of the famous Alaskan blooper presented on Kermit Schaefer's blooper albums of an announcer declaring that he would be "taking a leak out the window" to determine how cold it was. KBYR was originally on 1240 kHz. It moved to 1270 in 1956 then to 700 in 1971. Translators In addition to the main station, KBYR is relayed by an additional 2 translators to widen its broadcast area. References External links FCC History Cards for KBYR KBYR history introduced by Rod Williams 1948 establishments in Alaska Radio stations established in 1948 BYR Talk radio stations in the United States
https://en.wikipedia.org/wiki/Space%20Fellowship
The Space Fellowship is an international news and information network dedicated to the development of the space industry. The organisation works to report and communicate space news and information to its valued community. Offering a unique and fresh approach, the International Space Fellowship works alongside leading space organisations with the goal of bringing space to the general public. Its online news service provides visitors with the latest news and updates from both inside and outside the space community. History In the early days the Space Fellowship was the Official X PRIZE Foundation web forum and a separate X PRIZE blog on Google's blogspot. On 12 July 2004 the X PRIZE Foundation web forum and the X PRIZE blog spot joined to form the X PRIZE News. On 18 October 2005 the X PRIZE News was renamed to the International Space Fellowship. Members Aerospace companies / Teams and prizes having their official forums listed on the Space Fellowship are: Armadillo Aerospace JP Aerospace Micro-Space Masten Space Systems Interorbital Systems Microlaunchers Cambridge University Spaceflight Epsilon vee Team Prometheus N-Prize See also Space advocacy References External links (archived in June 2019; spacefellowship.com now offline with message: "You can visit https://www.nasaspaceflight.com/ for recent Space News") Private spaceflight Commercial spaceflight Space access Space colonization Space organizations Space advocacy organizations Space tourism British news websites Organizations established in 2003
https://en.wikipedia.org/wiki/ColorCAM
ColorCAM was both a CAD and a computer-aided manufacturing (CAM) system for printed circuit boards (PCB). Introduced in 1983 by Lothar Klein, LKSoft, it was one of the first systems running on a personal computer instead of a workstation or mainframe, which was typically the case for all CAD applications at that time. ColorCAM was originally developed and marketed under the name LAYCAD and was running on computers from ELTEC in Mainz, Germany, and HEMA in Aalen, Germany, using the Motorola 6809 CPU, one of the most powerful 8/16-bit processors at that time. To be able to address more than the maximal 64 kilobytes of RAM available with a 16-bit address space, these computers had special hardware to superimpose a memory window in this 16-bit address space, from a bigger storage with up to 512 Kbyte RAM. The ELTEC computer had a 512×256 pixel memory mapped graphic while the HEMA computer had a 640×400 pixel graphic using the NEC 7220 graphics controller chip. Both computers used the FLEX (operating system). In 1984, ColorCAM was ported onto the newly introduced 16-bit IBM AT computer. At that time the only available colour graphics adapter (CGA) had a resolution of 320×200 pixels, not sufficient for a CAD application. So the HEMA graphics was turned into an external "graphic box" and connected with the IBM AT via the parallel port. A next major improvement was the introduction of an expansion board using the Hitachi ACRT graphics controller HD63484. With up to 1 megabyte of video RAM, it was possible to create a 1600×1200-pixel graphic with four bits/pixel and display it on a 1024×786 cathode ray tube (CRT) display. The processing power of the IBM-AT class of computers was too low to implement algorithms for the automatic routing of tracks on the PCB. Therefore, a solution using Maze runner concepts was realized on an expansion board using the INMOS Transputer to boost the processing power. ColorCAM itself was written in the Pascal programming language with only small parts in assembly language. On the CAM side, ColorCAM was optimized for running the milling and drilling machines from LPKF Laser & Electronics AG for the production of PCB prototypes. Support and sales of ColorCAM were discontinued in 1993. In total, more than 1000 licenses of ColorCAM were sold worldwide by LPKF Laser & Electronics AG within less than 10 years. External links LKSoft LPKF chronicle Computer-aided manufacturing software Electronic design automation software
https://en.wikipedia.org/wiki/Beyond%20Belief%3A%20Science%2C%20Religion%2C%20Reason%20and%20Survival
Beyond Belief: Science, Religion, Reason and Survival was the first gathering of The Science Network's annual Beyond Belief symposia, held from November 5–7, 2006, at the Salk Institute for Biological Studies in La Jolla, California. It was described by The New York Times, as "a free-for-all on science and religion", which seemed at times like "the founding convention for a political party built on a single plank: in a world dangerously charged with ideology, science needs to take on an evangelical role, vying with religion as teller of the greatest story ever told."<ref name = "nyt">[https://www.nytimes.com/2006/11/21/science/21belief.html?n=Top/Reference/Times%20Topics/People/T/Tyson,%20Neil%20DeGrasse&_r=2&pagewanted=all A Free-for-All on Science and Religion," George Johnson, The New York Times, Section F, Page 1, November 21, 2006]</ref> Conference goals and topics The event was conceived to challenge the efforts of the Templeton Foundation to reconcile science with religion, according to its underwriter Robert Zeps, who told an interviewer:I am not anti-Templeton in the sense of funding scientists to say mean things about religion. I simply believe that all study should be free of any particular agenda besides learning... Most take the position that the religious right are just nuts who are loud but frankly undeserving of a response... I believe that Bill Gates and Steve Jobs and pretty much all of the tech age wealth is firmly on the side of science and they need to step up and say so in a way that is heard by the anti-science lobby.Many conference participants leveled strong criticism at the activities of the Templeton Foundation, charging that it attempted to blur the line between science and religion, and that it funded "garbage research" aimed at showing a healing effect of prayer. The Templeton Foundation has funded numerous conferences intended to "smooth over the differences between science and religion" and portray them as metaphysically equivalent.New Scientist'' summed up the topics to be discussed as a list of three questions: Can science help us create a new rational narrative as poetic and powerful as those that have traditionally sustained societies? Can we treat religion as a natural phenomenon? Can we be good without God? And if not God, then what? The conference devoted its final session to "the negative effects of introducing religion into medicine". Speakers Steven Weinberg Lawrence Krauss Carolyn Porco Richard Dawkins Peter Atkins Sam Harris Michael Shermer Peter Turchin Neil deGrasse Tyson Terrence Sejnowski Joan Roughgarden Sean M. Carroll David Sloan Wilson John Allen Paulos David Brin David Albert Leon Lederman Roger Bingham Francisco Ayala Stuart Hameroff Vilayanur S. Ramachandran Paul Davies Jonathan Haidt Steven Nadler Patricia Churchland Susan Neiman George Koob Daniel Dennett Stuart Kauffman Loyal Rue Elizabeth Loftus Mahzarin Banaji Scott Atran Harold Kroto Charles
https://en.wikipedia.org/wiki/Construct%20%28python%20library%29
Construct is a Python library for the construction and deconstruction of data structures in a declarative fashion. In this context, construction, or building, refers to the process of converting (serializing) a programmatic object into a binary representation. Deconstruction, or parsing, refers to the opposite process of converting (deserializing) binary data into a programmatic object. Being declarative means that user code defines the data structure, instead of the convention of writing procedural code to accomplish the goal. Construct can work seamlessly with bit- and byte-level data granularity and various byte-ordering. Benefits Using declarative code has many benefits. For example, the same code that can parse can also build (symmetrical), debugging and testing are much simpler (provable to some extent), creating new constructs is easy (wrapping components), and many more. If one is familiar with the C (programming language), one can think of constructs as casting from char * to struct foo * and vice versa, rather than writing code that unpacks the data. Example The following example show how a TCP/IP protocol stack might be defined using Construct. Some code is omitted for brevity and simplicity. Also note that the following code is just Python code that creates objects. First, the Ethernet header (layer 2): ethernet = Struct( "destination" / Bytes(6), "source" / Bytes(6), "type" / Enum(Int16ub, IPv4=0x0800, ARP=0x0806, RARP=0x8035, X25=0x0805, IPX=0x8137, IPv6=0x86DD, ), ) Next, the IP header (layer 3): ip = Struct( "header" / BitStruct( "version" / Const(Nibble, 4), "header_length" / Nibble, ), "tos" / BitStruct( "precedence" / Bytes(3), "minimize_delay" / Flag, "high_throuput" / Flag, "high_reliability" / Flag, "minimize_cost" / Flag, Padding(1), ), "total_length" / Int16ub, # ... ) And finally, the TCP header (layer 4): tcp = Struct( "source" / Int16ub, "destination" / Int16ub, "seq" / Int32ub, "ack" / Int32ub, # ... ) Now define the hierarchy of the protocol stack. The following code "binds" each pair of adjacent protocols into a separate unit. Each such unit will "select" the proper next layer based on its contained protocol. layer4tcp = Struct( tcp, # ... payload ) layer3ip = Struct( ip, "next" / Switch(this.protocol, { "TCP" : layer4tcp, } ), ) layer2ethernet = Struct( ethernet, "next" / Switch(this.type, { "IP" : layer3ip, } ), ) At this point, the code can parse captured TCP/IP frames into "packet" objects and build these packet objects back into binary representation. tcpip_stack = layer2ethernet packet = tcpip_stack.parse(b"...raw captured packet...") raw_data = tcpip_stack.build(packet) Ports and spin-offs Perl Data::ParseBinary is a CPAN module
https://en.wikipedia.org/wiki/Watchlist%20%28NGO%29
The Watchlist on Children and Armed Conflict is a global network of local, national and international non-governmental organizations which strives to end violations against children in armed conflicts and to guarantee their rights. Together with its partners, Watchlist strategically collects and disseminates information on violations against children in conflicts in order to influence key decision-makers to create and implement programs and policies that effectively protect children. Watchlist's three main activities are Monitoring & Reporting, Advancing the Children and Armed Conflict Agenda and Strengthening Local Capacity. Monitoring & reporting Through its country reports, Watchlist provides information on violations against children in situations of armed conflict and makes practical recommendations to policy makers to ensure protection and assistance for children. Watchlist has published reports on the situation of children in Afghanistan, Angola, Burundi, Colombia, D.R. Congo, Liberia, OPT/Israel, Myanmar, Nepal, Sri Lanka, and Sudan. Watchlist strengthens field-level monitoring, reporting and response to violations against children by building partnerships, enhancing the technical capacity of local NGOs and linking local voices with international policy makers. Policy Advice Watchlist provides policy advice to high-level decision makers towards improving child protection programs and policies, with a focus on the UN Security Council and the UN-led Monitoring and Reporting Mechanism on Children and Armed Conflict (MRM). Watchlist has also published a series of policy papers and statements. External links http://www.watchlist.org/ Children's rights organizations Children in war Child-related organizations in the United States
https://en.wikipedia.org/wiki/%C3%96zalp%20Babao%C4%9Flu
Özalp Babaoğlu (born August 10, 1955, in Ankara, Turkey), is a Turkish computer scientist. He is currently professor of computer science at the University of Bologna, Italy. He received a Ph.D. in 1981 from the University of California at Berkeley. He is the recipient of 1982 Sakrison Memorial Award, 1989 UNIX International Recognition Award and 1993 USENIX Association Lifetime Achievement Award for his contributions to the UNIX system community and to Open Industry Standards. Before moving to Bologna in 1988, Babaoğlu was an associate professor in the Department of Computer Science at Cornell University. He has participated in several European research projects in distributed computing and complex systems. Babaoğlu is an ACM Fellow and has served as a resident fellow of the Institute of Advanced Studies at the University of Bologna and on the editorial boards for ACM Transactions on Computer Systems, ACM Transactions on Autonomous and Adaptive Systems and Springer-Verlag Distributed Computing. Babaoğlu is an avid cyclist and has a son and daughter. Research Areas Babaoğlu is the author of more than 100 peer-reviewed papers in a wide range of research topics, including: Operating Systems Performance Evaluation and Modeling Distributed Computing Byzantine Agreement Parallel Computing on Networks of Workstations Group Communication Systems Peer-to-Peer Systems. Babaoğlu has contributed to peer-to-peer computing through paradigms, algorithms, frameworks (Anthill) and a widely used open source simulation software package (PeerSim) Autonomic Computing and Self-Management Gossip-Based Aggregation Overlay Networks and Topology Management Decentralized Shape Formation Biology and Nature-Inspired Computing. As part of work on the EU-funded BISON Project, Babaoğlu and colleagues have developed a library of “design patterns” for distributed computing that draw inspiration from biological or natural processes. Game-Theoretic Techniques in Peer-to-Peer Systems Cloud Computing High-Performance Computing BSD Unix During his PhD work at UC Berkeley, Babaoğlu was one of the architects of “BSD Unix” which was a major factor in the rapid growth of the Internet through its built-in TCP/IP stack and has influenced numerous other modern operating systems including FreeBSD, NetBSD, and OpenBSD, Linux, Mac OS/X and iOS. With Bill Joy, the co-founder of Sun Microsystems, Babaoğlu implemented virtual memory in BSD on hardware lacking page reference bits. The Berkeley version of UNIX became the standard in education and research, garnering development support from DARPA, and was notable for introducing virtual memory and inter-networking using TCP/IP. BSD was widely distributed in source form so that others could learn from it and improve it; this style of software distribution has led to the open source movement, of which BSD is now recognized to be one of the earliest examples. References External links Ozalp Babaoglu's home page PeerSim BISON P
https://en.wikipedia.org/wiki/Katie%20Logan
Katie Logan is a fictional character from The Bold and the Beautiful, an American soap opera on the CBS network. Portrayed by Nancy Sloan for much of her duration on the series, she is currently portrayed by Daytime Emmy Award winning actress, Heather Tom. She is the younger sister of Storm, Brooke and Donna Logan. The character is known for her relationship with Bill Spencer Jr. (Don Diamont). Casting She was played by actress Nancy Sloan in a contract role from March 23, 1987 to March 17, 1989, was recurring from June 7, 1989, December 22, 1989, May 21 to 24, 1990, June 3 to 8, 1991, September 6, 1994 to May 14, 1998, and continued to make guest appearances from October 19, 1999 to November 15, 1999, February 1 and 2, 2000, April 10, 2000, January 12 to 17, 2001, April 30 to May 8, 2003, and May 28 to June 1, 2004. In 2007, the role of Katie was recast with Heather Tom, who made her debut on August 30, 2007. Tom had previously held roles on The Young and the Restless (Victoria Newman) and One Life to Live (Kelly Cramer). In 2008, Tom signed a contract with the series to ensure her stay until sometime in 2011. On her acting technique, Tom said "Well, my method is really just putting myself in the middle of the moment; the middle of the situation." Character development In 2008, the show aired a controversial plot in which Katie was dying after being shot, and her brother Storm Logan (William deVry), who accidentally shot her, committed suicide to give her his heart. Tom says she wants to remind viewers of this event as much as she can; she told TV Guide, "I always make sure I wear a [prosthetic] chest scar whenever Katie's in something low-cut to remind people of that transplant story." Throughout her marriage to Bill Spencer Jr. (Don Diamont), the couple have endured multiple challenges, including all of Bill's plotting to kill someone. Tom said "even though Katie 'left him' at one point, she never walked out on him in the regard where she's not trying to come back; trying to find her way back." Describing her as the girl who doesn't cut and run, additionally stating "It would take a lot for her to walk away from this relationship - she feels like this is the man she loves, she understands who she's married to - she knows she didn't marry a boy scout." Katie is someone to "correct" Bill and "love" him through his wrongdoing, according to the actress. Bill nearly left his marriage to Katie for Steffy Forrester (Jacqueline MacInnes Wood), but Katie, a heart transplant recipient, had another heart attack when she learnt of the news. According to the actress, "The idea that Bill would cross the line with Steffy is totally foreign to Katie. She just doesn't believe it's possible." Explaining how it happened, Tom said "Taylor (Hunter Tylo) comes over and says, “Listen, your husband and my daughter are involved.” And Katie’s, like, “Your daughter is sick and needs help. She’s obsessed with my husband and she’s living in a fantasy world!” But it
https://en.wikipedia.org/wiki/John%20Gordon%20%28sportscaster%29
John "Gordo" Gordon (born July 7, 1940) is a retired Major League Baseball radio broadcaster who was best known as the play by play announcer for the Minnesota Twins on the Twins Radio Network and their Metro Affiliate KSTP 1500 AM. He is well known among Twins fans for his intense emotional style of play-calling, and for his trademark call of each Twins home run: "Touch 'em all, ___!" (including the name of the player who hit the home run). This was in marked contrast to the more calm, laid-back style of his longtime broadcast partner Herb Carneal. The two would alternate between play-by-play and commentary, often switching roles midway through games. Career Gordon was born John Gordon Gutowsky in Detroit, Michigan, and began his career in broadcasting with the class-A Spartanburg Phillies in 1965 after earning a degree from Indiana University. In 1970 he left Spartanburg to join the Baltimore Orioles' broadcast team, a job which he left in 1973 to accept a job as the head broadcaster at the University of Virginia where he called basketball and football games. In 1977 he joined the broadcast team for the New York Yankees' AAA affiliate, the Columbus Clippers, and in 1982 he moved up to the Yankees' major league broadcast crew, where he remained through 1986. Gordon joined the Twins' broadcast crew on WCCO 830 AM as Herb Carneal's partner in 1987, which ended up being a season in which the Twins would go on to defeat the St. Louis Cardinals in the 1987 World Series. He remained with the Twins and started broadcasting alongside former Twin Dan Gladden. His longtime partner Carneal died April 1, 2007, at the age of 83 due to congestive heart failure. Gordon announced that the 2011 season would be his last as play-by-play announcer for the Twins. The Twins held a ceremony before Gordon's last game to commemorate his years with the organization. At the end of the ceremony, Gordon's long-time broadcast partner Dan Gladden drove Gordon for a lap around the ballpark on a sidecar of a motorcycle. The Twins won Gordon's final game 1-0 on a walk-off hit by Trevor Plouffe. In 2016, he was elected to the Minnesota Twins Hall of Fame. Personal life John has a wife, Nancy, and two grown children. They make their home in Bloomington, MN and are very active supporters of the Fellowship of Christian Athletes. Honors Gordon was inducted into the South Atlantic League Hall of Fame for his work with the Spartanburg Phillies on June 19, 2001, and into the Pavek Museum of Broadcasting Hall of Fame in 2008. Filmography Gordon played fictional Twins broadcaster Wally Holland in the 1994 movie Little Big League. See also Minnesota Twins Herb Carneal External links John Gordon broadcaster biography Twins Radio Network Pavek Museum Hall of Fame References 1940 births Living people American radio sports announcers Baltimore Orioles announcers College basketball announcers in the United States College football announcers Indiana University alumni Major League B
https://en.wikipedia.org/wiki/KCBF
KCBF (820 AM) is a commercial radio station airing sports programming in Fairbanks, Alaska. KCBF obtains its programming from ESPN Radio. It signed on in 1948 as KFRB on 1290 kHz. It moved to 790 kHz in 1953 then to 900 kHz in 1954. It moved to its current frequency in 1981. KCBF is the exclusive radio home to University of Alaska Nanooks hockey. The station also serves coverage of the Nanooks' men's and select women's basketball games. It was also the former radio home of Fairbanks Grizzlies football. KCBF is also the Fairbanks radio affiliate for the NFL on Westwood One Sports and the NCAA radio network during the Final Four men's basketball tournament. References External links FCC History Cards for KCBF 820 Sports Website 1948 establishments in Alaska Radio stations established in 1948 CBF Sports radio stations in the United States ESPN Radio stations
https://en.wikipedia.org/wiki/Parkson
Parkson Holdings Berhad (doing business as Parkson; ; ) is an Asia based department store operator with an extensive network of 131 stores as of 2017, spanning approximately 2.1 million m2 of retail space across cities in Malaysia, China, Vietnam, Laos and formerly in Myanmar. International operations Malaysia Parkson opened its first store at Sungei Wang Plaza in 1987. Since then, new stores have been rolled out across the country at approximately two stores per annum over the past 27 years. Their first flagship store at Pavilion KL was opened in 2007. As of 29 July 2021, Parkson has 41 stores in Malaysia (38 Parkson, 3 Parkson Elite). Parkson is on a consolidation journey, which it had recently closed down its Maju Junction branch in Kuala Lumpur and then opened a branch in M Square Mall, a retail and lifestyle hub in Puchong, which was closed after 18 months of operation. China In 1994, Parkson opened its first department store in Beijing. Parkson is one of the first foreign department store chains to establish a presence in China. As of June 2015, Parkson has an extensive network of 60 stores covering 37 major cities in China. Vietnam The opening of Parkson Saigon Tourist Plaza on 29 June 2005 marked the entrance of Parkson as the first truly international department store to be opened in Ho Chi Minh City. On 2 January 2015, Parkson closed its store at Keangnam Landmark Tower, Hanoi, as the store has been loss-making since its opening in December 2011. Nevertheless, Parkson remains positive on the retail market in Vietnam, as evidenced by the opening of a new store in Danang on 11 January 2015. As of 3 January 2021, Parkson has 4 stores across 3 cities. On 28 April 2023, Parkson Retail Asia announced that Parkson Vietnam filed for bankruptcy due to financial pressure. Indonesia (formerly) Parkson entered the country by acquiring PT. Tozy Sentosa, the operator of Centro Department Store in 2011. Centro Department Store itself was developed by Suzy Darmawan Hutomo, master licensor holder for The Body Shop in Indonesia and sole daughter of Matahari founder, Hari Darmawan. Prior to the acquisition, Centro opened its first store at Plaza Semanggi, Jakarta in November 2003, followed by opening stores at Discovery Shopping Mall Bali, Plaza Ambarrukmo Jogjakarta, Margo City Depok, Mall of Indonesia Jakarta, and Summarecon Mall Serpong Tangerang. After the acquisition, the department store network has since expanded to a total of 11 stores under the Centro brand and two stores under the Parkson brand, leading to a total of 14 stores (including Kem Chicks supermarket at Pacific Place Jakarta. Parkson Gourmet Market at Bintaro CBD, opened on 3 November 2016 but closed sometime in 2017) as of 1 December 2020. The country's first Parkson store opened its door at Centre Point Mall, Medan on 28 November 2013. The second Parkson store at Lippo Mall Puri, Jakarta commenced operation on 27 June 2014 (closed in 2020 due to low sales and COVID-19 pandem
https://en.wikipedia.org/wiki/David%20Gries
David Gries (born April 26, 1939 in Flushing, Queens, New York) is an American computer scientist at Cornell University, United States mainly known for his books The Science of Programming (1981) and A Logical Approach to Discrete Math (1993, with Fred B. Schneider). He was Associate Dean for Undergraduate Programs at the Cornell University College of Engineering from 2003–2011. His research interests include programming methodology and related areas such as programming languages, related semantics, and logic. His son, Paul Gries, has been a co-author of an introductory textbook to computer programming using the language Python and is a teaching stream professor in the Department of Computer Science at the University of Toronto. Life Gries earned a Bachelor of Science (B.S.) from Queens College in 1960. He spent the next two years working as a programmer-mathematician for the U.S. Naval Weapons Laboratory, where he met his wife, Elaine. He earned a Master of Science (M.S.) in mathematics from the University of Illinois at Urbana-Champaign in 1963. While at Illinois, Gries worked with Manfred Paul and Ruediger Wiehle to write a full compiler for the language ALGOL 60 for the IBM 7090 mainframe computer. He earned his Dr. rer. nat. in 1966 from the TH München, studying under Friedrich L. Bauer and Josef Stoer. Gries is member emeritus of IFIP Working Group 2.3, whose aim is to increase programmers' ability to compose programs, and he edited Programming Methodology: a Collection of Articles by Members of IFIP WG2.3, which highlights the work of this group in its first ten years. Gries was an assistant professor at Stanford University from 1966–1969 and then became an associate professor at Cornell University in Ithaca, New York. He spent the next 30 years there, including time as chair of the computer science department from 1982–1987. By the late 1970s, a survey had Cornell as the fourth-ranked computer science program in the nation, with nationally visible faculty such as Juris Hartmanis, Gerard Salton, Robert L. Constable, Richard W. Conway, and Gries. Many of them, like Gries, were especially known for their work in theory-related areas. Gries was an advocate of treating formal methods in programming as a core computer science topic and teaching it to undergraduates, a stance that found large amounts of debate within the computer science education community. In any case, Gries' reputation as a teacher was such that around 700 students and fellow faculty members were in attendance for his final lecture, given to his "Programming and Data Structures" class, in May 2022. Cornell's computer science program maintained its prominence, placing sixth overall and third in theory in U.S. News & World Report Best Colleges Rankings for 2022. Gries had a Guggenheim Fellowship in 1984–1985. He spent 1999–2002 at the University of Georgia in Athens and returned to Cornell in January 2003. He is author, co-author, or editor of seven textbooks and 7
https://en.wikipedia.org/wiki/Institute%20of%20Cultural%20Affairs%20International
The Institute of Cultural Affairs International (ICA International) is a global network of national ICA organizations that carry out human development programming in their respective nations. ICA International is an international non-governmental organization (INGO) that works to influence development policy. By putting culture at the center of development, it seeks to provide the people the power to shape their own destiny. ICA International has a great mission to advocate for people and actualize the fundamental right of all people to define and shape their own future towards the goal of realizing sustainable solutions to human challenges. Objectives The strategic objectives of ICA International are: To facilitate the sharing of our experiences, values, and lessons at the global level, in order to influence international development policy. To develop and facilitate global partnerships. To address human development challenges. To coordinate programs and initiatives involving multiple member ICA organizations for global impact. Finally, to support member ICAs through training and capacity building initiatives and facilitate regular networking and interchange among member ICAs. Relationships ICA International maintains relationships with key international bodies and other international organisations, including: Special Consultative Status with the United Nations Economic and Social Council (ECOSOC); Liaison status with the Food and Agriculture Organisation of the United Nations (FAO); Working relation status with the World Health Organisation (WHO); Consultative Status with the United Nations Children’s Fund (UNICEF); Service on the Non Governmental Organisation Consultative Group for the International Fund of Agriculture Development (IFAD); and Membership in CIVICUS, the World Alliance for Citizen Participation. ICA International is a global network of national member organizations located in the following countries: Australia, Bangladesh, Belgium, Benin, Bosnia and Herzegovina, Canada, Chile, Côte d'Ivoire, Cameroon, Egypt, Ghana, Guatemala, India, Japan, Kenya, Malaysia, Nepal, Netherlands, Nigeria, Peru, South Africa, Taiwan, Tajikistan, Tanzania, Togo, Uganda, United States, Zambia, and Zimbabwe. ICA Nepal hosted the 8th global conference on human development in Kahtmnandu, Nepal in late 2012. In this occasion a book entitled 'Changing lives changing society' was released. In the 1970s and 1980s the Institute of Cultural Affairs established several thousand model villages, around the world, to demonstrate what is possible when people work together. The secretariat office is in Montreal, Quebec, Canada. References External links Official site Development charities based in Canada Community-building organizations
https://en.wikipedia.org/wiki/Anime%20Festival%20Wichita
Anime Festival Wichita (Anime Festival of Wichita or AFW) is an annual three-day anime convention held in June or August at the Hyatt Regency Wichita in Wichita, Kansas. Programming The convention typically offers an Anime Music Video contest, anime viewing rooms, costume contests, manga library, panels, tabletop gaming, vendors, and video gaming tournaments. The convention has 24-hour programming. History Anime Festival Wichita started in 2005 as a one-day event under the name Wichita Anime Festival. Voice actress Cassandra Hodges was scheduled to attend in 2011, but died prior to the convention. Anime Festival Wichita 2020 and 2021 was cancelled due to the COVID-19 pandemic. Event history References Other Related News Articles Let's Revisit The Blackwell Journal at Anime Festival Wichita 2019 Blackwell Journal-Tribune, Retrieved 30 June 2022 External links Anime Festival Wichita Website Anime conventions in the United States Recurring events established in 2005 2005 establishments in Kansas Annual events in Kansas Festivals in Kansas Culture of Wichita, Kansas Tourist attractions in Wichita, Kansas Conventions in Kansas
https://en.wikipedia.org/wiki/Data%20compression%20symmetry
Symmetry and asymmetry, in the context of data compression, refer to the time relation between compression and decompression for a given compression algorithm. If an algorithm takes the same time to compress a data archive as it does to decompress it, it is considered symmetrical. Note that compression and decompression, even for a symmetric algorithm, may not be perfectly symmetric in practice, depending on the devices the data is being copied to and from, and other factors such as latency and the fragmentation on the device. In turn, if the compression and decompression times of an algorithm are vastly different, it is considered asymmetrical. Examples Symmetric algorithms are typically used for media streaming protocols, as either the server taking too long to compress the data, or the client taking too long to decompress, would lead to delays in the viewing of the data. Asymmetrical algorithms wherein the compression is faster than the decompression can be useful for backing up or archiving data, as in these cases data is typically much more often stored than retrieved. References Further reading Data compression
https://en.wikipedia.org/wiki/ATM25
ATM25 is an ATM (Asynchronous Transfer Mode) version wherein data is transferred at 25.6 Mbit/s over Category 3 cable. ATM25 has no particular distinctions from other ATM versions. However, ATM25 chipsets are inexpensive in comparison to faster ATM chipsets, having the result of making ATM technology available for small office/home office environments. However, these networks no longer have much potential for expansion, as Ethernet has become the first choice in this domain. The WAN connection side of ATM25 systems often takes place over a fast DSL variant such as RADSL. DSL is often considered in this case, as its technology is based on an ATM core. In March 2001, Network World article put it this way: Classified mostly as a solution looking for a problem, 25M bit/sec ATM to the desktop failed before it really got rolling. While many folks thought the idea of providing all that bandwidth to user PCs was worthwhile, the idea of paying twice as much for the luxury compared with switched Ethernet didn't fly. References Networking standards Asynchronous Transfer Mode
https://en.wikipedia.org/wiki/ATTRIB
In computing, ATTRIB is a command in Intel ISIS-II, DOS, IBM OS/2, Microsoft Windows and ReactOS that allows the user to change various characteristics, or "attributes" of a computer file or directory. The command is also available in the EFI shell. History Several operating systems provided a set of modifiable file characteristics that could be accessed and changed through a low-level system call. For example, as of release MS-DOS 4.0, the first six bits of the file attribute byte indicated whether or not a file was read-only (as opposed to writeable), hidden, a system file, a volume label, a subdirectory, or if the file had been "archived" (with the bit being set if the file had changed since the last use of the BACKUP command). However, initial releases of the operating system did not provide user-level method for reading or changing these values. The initial version of the ATTRIB command for DOS was first included in version 3.0 of PC DOS, with functionality limited to changing the read-only attribute. Subsequent versions allowed the read-only, hidden, system and archive bits to be set. MS-DOS version 3.3 added the capability of recursive searching through subdirectories to display attributes of specified files. Digital Research DR DOS 6.0 and Datalight ROM-DOS also include an implementation of the command. The FreeDOS version was developed by Phil Brutsche and is licensed under the GPLv2. Uses Setting the read-only bit of a file provided only partial protection against inadvertent deletion: while commands such as del and erase would respect the attribute, other commands such as DELTREE did not. Changing the system attribute was not possible in early versions of Windows, thus requiring use of ATTRIB. Similarly, a system crash in early versions of Windows could lead to a situation where a temporary file had the read-only bit set and was additionally (and irrevocably) locked by the Windows OS; in this instance, booting into DOS (thus avoiding the Windows lock) and unsetting the read-only attribute with ATTRIB was the recommended way of deleting the file. Manipulating the archive bit allowed users to control which files were backed up using the BACKUP command. See also chattr, the equivalent on Unix and Linux cacls, the Windows NT access control list (ACL) utility List of DOS commands References Further reading External links attrib | Microsoft Docs Microsoft DOS ATTRIB command External DOS commands MSX-DOS commands OS/2 commands ReactOS commands Windows commands
https://en.wikipedia.org/wiki/Comment%20%28computer%20programming%29
In computer programming, a comment is a programmer-readable explanation or annotation in the source code of a computer program. They are added with the purpose of making the source code easier for humans to understand, and are generally ignored by compilers and interpreters. The syntax of comments in various programming languages varies considerably. Comments are sometimes also processed in various ways to generate documentation external to the source code itself by documentation generators, or used for integration with source code management systems and other kinds of external programming tools. The flexibility provided by comments allows for a wide degree of variability, but formal conventions for their use are commonly part of programming style guides. Overview Comments are generally formatted as either block comments (also called prologue comments or stream comments) or line comments (also called inline comments). Block comments delimit a region of source code which may span multiple lines or a part of a single line. This region is specified with a start delimiter and an end delimiter. Some programming languages (such as MATLAB) allow block comments to be recursively nested inside one another, but others (such as Java) do not. Line comments either start with a comment delimiter and continue until the end of the line, or in some cases, start at a specific column (character line offset) in the source code, and continue until the end of the line. Some programming languages employ both block and line comments with different comment delimiters. For example, C++ has block comments delimited by /* and */ that can span multiple lines and line comments delimited by //. Other languages support only one type of comment. For example, Ada comments are line comments: they start with -- and continue to the end of the line. Uses How best to make use of comments is subject to dispute; different commentators have offered varied and sometimes opposing viewpoints. There are many different ways of writing comments and many commentators offer conflicting advice. Planning and reviewing Comments can be used as a form of pseudocode to outline intention prior to writing the actual code. In this case it should explain the logic behind the code rather than the code itself. /* loop backwards through all elements returned by the server (they should be processed chronologically)*/ for (i = (numElementsReturned - 1); i >= 0; i--) { /* process each element's data */ updatePattern(i, returnedElements[i]); } If this type of comment is left in, it simplifies the review process by allowing a direct comparison of the code with the intended results. A common logical fallacy is that code that is easy to understand does what it's supposed to do. Code description Comments can be used to summarize code or to explain the programmer's intent. According to this school of thought, restating the code in plain English is considered superfluous; the need to re-expla
https://en.wikipedia.org/wiki/Hong%20Kong%20Golden
Hong Kong Golden may refer to: Hong Kong Golden FC, a football team now known as Xiangxue Sun Hei. Hong Kong Golden Forum an internet forum about computing.
https://en.wikipedia.org/wiki/Caddy%20%28hardware%29
In computer hardware, a caddy is a container used to hold some medium, such as a CD-ROM. If the medium is a hard disk drive, the caddy is also referred to as a disk enclosure. Its functionality is similar to that of the 3.5" floppy disk's jacket. The purpose of a disk caddy is to protect the disk from damage when handling; its use dates back to at least the Capacitance Electronic Disc in 1981, and they were used in initial versions of Blu-ray Discs, though as a cost-saving measure newer versions use hard-coating technology to prevent scratches and do not need a caddy. Caddies may be an integral part of the medium, as in some DVD-RAM discs, or separately attached. Examples Caddies date at least to the Capacitance Electronic Disc, which used a caddy from 1981 to protect the grooves of the disc. While caddies have become obsolete, some websites still sell them, although they have become quite expensive. Cartridges In addition to caddies that serve purely a storage purpose, there are also ones that are designed to be loaded directly for data access, usually via a shutter. Some early CD-ROM drives used a mechanism where CDs had to be inserted into special cartridges, somewhat similar in appearance to a jewel case. Although the idea behind this—a tougher plastic shell to protect the disc from damage—was sound, it did not gain wide acceptance among disc manufacturers. Consumers also eschewed the intended and pricey use, which required each disc to be protected with a caddy for its full useful life, preferring to only buy one caddy and transfer the discs between their traditional storage jewel cases and the caddy when in use, then the reverse when finished. Drives that used the caddy format required "bare" discs to be placed into a caddy before use, making them less convenient to use. Drives that worked this way were referred to as caddy drives or caddy load(ing), but from about 1994 most computer manufacturers moved to tray-loading, or slot-loading drives. The same system is still available for more recent formats such as DVD-RAMs but is not common. The PlayStation Portable, UMD disc is a similar concept, using a small proprietary DVD-type disc, in a fixed unopenable caddy as both a copy protection and damage prevention measure. The MiniDisc is a similar concept again, using a small proprietary Magneto-optical type disc instead, also in a fixed unopenable caddy. References Computer storage media
https://en.wikipedia.org/wiki/Comparison%20of%20disk%20encryption%20software
This is a technical feature comparison of different disk encryption software. Background information Operating systems Features Hidden containers: Whether hidden containers (an encrypted container (A) within another encrypted container (B) so the existence of container A can not be established) can be created for deniable encryption. Note that some modes of operation like CBC with a plain IV can be more prone to watermarking attacks than others. Pre-boot authentication: Whether authentication can be required before booting the computer, thus allowing one to encrypt the boot disk. Single sign-on: Whether credentials provided during pre-boot authentication will automatically log the user into the host operating system, thus preventing password fatigue and reducing the need to remember multiple passwords. Custom authentication: Whether custom authentication mechanisms can be implemented with third-party applications. Multiple keys: Whether an encrypted volume can have more than one active key. Passphrase strengthening: Whether key strengthening is used with plain text passwords to frustrate dictionary attacks, usually using PBKDF2. Hardware acceleration: Whether dedicated cryptographic accelerator expansion cards can be taken advantage of. Trusted Platform Module: Whether the implementation can use a TPM cryptoprocessor. Filesystems: What filesystems are supported. Two-factor authentication: Whether optional security tokens (hardware security modules, such as Aladdin eToken and smart cards) are supported (for example using PKCS#11) Layering Whole disk: Whether the whole physical disk or logical volume can be encrypted, including the partition tables and master boot record. Note that this does not imply that the encrypted disk can be used as the boot disk itself; refer to pre-boot authentication in the features comparison table. Partition: Whether individual disk partitions can be encrypted. File: Whether the encrypted container can be stored in a file (usually implemented as encrypted loop devices). Swap space: Whether the swap space (called a "pagefile" on Windows) can be encrypted individually/explicitly. Hibernation file: Whether the hibernation file is encrypted (if hibernation is supported). Modes of operation Different modes of operation supported by the software. Note that an encrypted volume can only use one mode of operation. CBC with predictable IVs: The CBC (cipher block chaining) mode where initialization vectors are statically derived from the sector number and are not secret; this means that IVs are re-used when overwriting a sector and the vectors can easily be guessed by an attacker, leading to watermarking attacks. CBC with secret IVs: The CBC mode where initialization vectors are statically derived from the encryption key and sector number. The IVs are secret, but they are re-used with overwrites. Methods for this include ESSIV and encrypted sector numbers (CGD). CBC with random per-sector keys: The CBC mode
https://en.wikipedia.org/wiki/Opera%20Soft
Opera Soft was a Spanish computer game developer of the Golden Era of Spanish Software of the 1980s. It released many games for the ZX Spectrum, Amstrad CPC and similar computers in the mid-1980s, but its games were not as popular on the PC. Founded in 1986, the company obtained success with its title Livingstone, supongo (Livingstone, I Presume) in the same year. The game is based on the 19th-century explorer Dr. Livingstone. Within Spain, one of their most popular games was La Abadía del Crimen (The Abbey of Crime), based on Umberto Eco's novel The Name of the Rose. Like many other Spanish software companies of the time, Opera Soft did not adapt to the generational change and went out of business in the early 1990s with the emergence of 16-bit video games. Opera Sports Opera created a division to develop sports videogames called Opera Sports. Notable games Cosa Nostra (1986) (1986 - José Antonio Morales Ortega / Carlos A. Díaz de Castro) The Last Mission (1987) La abadía del crimen (1988 - Paco Menéndez / Juan Delcán) Goody (1988 - Gonzo Suárez / Carlos A. Díaz de Castro) Sol negro (1988 - Gonzo Suárez / Carlos A. Díaz de Castro / Juan Giménez López) Mutan Zone (1989) Solo (1989) Trigger (1989) Corsarios (1989) Gonzzalezz (1989) Guillermo Tell (1989) Ulises (1989) (1989 - Gonzo Suárez / Carlos A. Díaz de Castro / Alfonso Azpiri) (1989 - José Antonio Morales Ortega and José Ramón Fernández Maquieira / Carlos A. Díaz de Castro) Mithos (1990) Mundial de Fútbol (1990) Golden Basket (1990 - Eduardo Bellver Castaño and José Vicente Pons Alonso / Queral y J. Alberto Ochoa Fernández) Ángel Nieto Pole 500 (1990) , also known as Boxing Simulation (1990 - Juan Carlos García, Kostandin Igor Ruiz, J. Alberto Ochoa Fernández, Miguel Kruskritz) Soviet (1990) Rescate en el golfo (1990) Sirwood (1990) La Pulga 2 (1991) Jai Alai (1991) Olympic Games '92 (1992) '' (1992) Legacy A video game called Speakerman was released in 2019 with art style and game world heavily inspired by Goody and Livingstone Supongo, citing those Opera Soft games as direct inspirations. References External links (Archived) Opera Soft profile at Home of The Underdogs (Archived) History of Opera Soft (Archived) Interview with Opera Soft at msdox.com (Archived) The Golden Age of Spanish Software II: Opera Soft Defunct video game companies of Spain Video game companies established in 1987 Video game companies disestablished in 1992 Video game development companies 1987 establishments in Spain
https://en.wikipedia.org/wiki/Key%20wrap
In cryptography, key wrap constructions are a class of symmetric encryption algorithms designed to encapsulate (encrypt) cryptographic key material. The Key Wrap algorithms are intended for applications such as protecting keys while in untrusted storage or transmitting keys over untrusted communications networks. The constructions are typically built from standard primitives such as block ciphers and cryptographic hash functions. Key Wrap may be considered as a form of key encapsulation algorithm, although it should not be confused with the more commonly known asymmetric (public-key) key encapsulation algorithms (e.g., PSEC-KEM). Key Wrap algorithms can be used in a similar application: to securely transport a session key by encrypting it under a long-term encryption key. Background In the late 1990s, the National Institute of Standards and Technology (NIST) posed the "Key Wrap" problem: to develop secure and efficient cipher-based key encryption algorithms. The resulting algorithms would be formally evaluated by NIST, and eventually approved for use in NIST-certified cryptographic modules. NIST did not precisely define the security goals of the resulting algorithm, and left further refinement to the algorithm developers. Based on the resulting algorithms, the design requirements appear to be (1) confidentiality, (2) integrity protection (authentication), (3) efficiency, (4) use of standard (approved) underlying primitives such as the Advanced Encryption Standard (AES) and the Secure Hash Algorithm (SHA-1), and (5) consideration of additional circumstances (e.g., resilience to operator error, low-quality random number generators). Goals (3) and (5) are particularly important, given that many widely deployed authenticated encryption algorithms (e.g., AES-CCM) are already sufficient to accomplish the remaining goals. Several constructions have been proposed. These include: AES Key Wrap Specification (November 2001, ) Implemented by the WebCrypto subtle API. American Standards Committee ANSX9.102, which defines four algorithms: AESKW (a variant of the AES Key Wrap Specification) TDKW (similar to AESKW, built from Triple DES rather than AES). AKW1 (TDES, two rounds of CBC) AKW2 (TDES, CBC then CBC-MAC) Each of the proposed algorithms can be considered as a form of authenticated encryption algorithm providing confidentiality for highly entropic messages such as cryptographic keys. The AES Key Wrap Specification, AESKW, TDKW, and AKW1 are intended to maintain confidentiality under adaptive chosen ciphertext attacks, while the AKW2 algorithm is designed to be secure only under known-plaintext (or weaker) attacks. (The stated goal of AKW2 is for use in legacy systems and computationally limited devices where use of the other algorithms would be impractical.) AESKW, TDKW and AKW2 also provide the ability to authenticate cleartext "header", an associated block of data that is not encrypted. Rogaway and Shrimpton evaluated the desig
https://en.wikipedia.org/wiki/Vishwambhar%20Dayalu%20Tripathi
Vishwambhar Dayalu Tripathi (5 October 1899 – 18 November 1959) was an Indian lawyer and politician. References External links Kamat Research Database Unnao District Gallery of Indian Autographs 1.     Bal Ganga Dhar Tripathi, "Mere Da", Apraje Purusharth Ke Dhani Jan Nayak Pandit Vishwambhar Dayalu Tripathi Smriti Granth (Unnao, Uttar Pradesh: Vishwambhar Dayalu Tripathi Smarak Samiti, 2008), pp. 257–258. Indian National Congress politicians People from Uttar Pradesh People from Unnao district 1899 births 1959 deaths Members of the Constituent Assembly of India India MPs 1952–1957 India MPs 1957–1962 Lok Sabha members from Uttar Pradesh
https://en.wikipedia.org/wiki/Openmoko
Openmoko is a discontinued project to create a family of open source mobile phones, including the hardware specification, the operating system (Openmoko Linux), and actual smartphone development implementation like the Neo 1973 and Neo FreeRunner. The whole project was sponsored by Openmoko Inc. The first sub-project was Openmoko Linux, a Linux-based operating system designed for mobile phones, built using free software. The second sub-project was developing hardware devices on which Openmoko Linux runs. The first device released was the Neo 1973, in 2007, which was followed up by the Neo FreeRunner on 25 June 2008. On 2 April 2009, Openmoko suspended development of their third device, codenamed GTA03, to focus on the FreeRunner. In 2010, development of the GTA03 was continued by Golden Delicious Computers under the new codename GTA04, which includes major hardware revision, and the first unit was shipped on 10 October 2011. Unlike most other mobile phone platforms, these phones are designed to provide end users with the ability to modify the operating system and software stack. Other Openmoko-supported phones are also available. History Project Openmoko was announced 7 November 2006 by its founders First International Computer (FIC). The Initial core team for Openmoko project included Werner Almesberger, Michael Lauer, Sean Moss-Pultz and Harald Welte. Etymology The name Openmoko is an acronym for Open Mobile Kommunikations. The codename for the phone product series, GTA, is an abbreviation of "GSM-TI-AGPS" which indicates the main components of the phone. Software Originally Openmoko Inc. developed its own operating system for the phones, which was called Openmoko Linux or Om. It uses the Linux kernel, together with a graphical user environment built using the X.Org Server. The OpenEmbedded build framework and opkg package system were used to create and maintain software packages. The initial version named Om 2007 used the GTK+ toolkit and the Matchbox window manager. Om 2008, which was released in August 2008, added support for the Qt toolkit and Enlightenment 17. Despite continuous improvements both of these versions did not reach a stable state. As a result, Openmoko started developing Om 2009, which had the goal of providing a stable environment based on the middleware from freesmartphone.org, a project that was financed by Openmoko. However, this version was not finished either, and in April 2009 Openmoko cancelled the development of software. This task was taken over by several efforts of the community. Several groups have created modified versions of the original software or ported other systems to work on the phones. Among others, the Openmoko phones now support Android, Debian, Gentoo, Qt Extended Improved, QtMoko, and SHR. Openmoko Inc. based hardware Openmoko hardware aspires to the term open-source hardware although in various areas the availability of cell phone components and legal requirements prevent full conforma
https://en.wikipedia.org/wiki/KVIM-LP
KVIM-LP (92.7 FM) was a non-commercial low power FM radio station airing religious programming in Juneau, Alaska. KVIM had one live show called "Rush Hour" hosted by Adam Weed and David Easaw. "Rush Hour" ran every Wednesday from 5:00PM to 6:00PM. Owners Calvary Fellowship surrendered the station's license to the Federal Communications Commission (FCC) on April 7, 2016; the FCC cancelled the license on April 29, 2016. External links VIM-LP VIM-LP Radio stations established in 2006 2006 establishments in Alaska Defunct radio stations in the United States Radio stations disestablished in 2016 2016 disestablishments in Alaska Defunct religious radio stations in the United States VIM-LP
https://en.wikipedia.org/wiki/Von%20Neumann%20universal%20constructor
John von Neumann's universal constructor is a self-replicating machine in a cellular automaton (CA) environment. It was designed in the 1940s, without the use of a computer. The fundamental details of the machine were published in von Neumann's book Theory of Self-Reproducing Automata, completed in 1966 by Arthur W. Burks after von Neumann's death. While typically not as well known as von Neumann's other work, it is regarded as foundational for automata theory, complex systems, and artificial life. Indeed, Nobel Laureate Sydney Brenner considered Von Neumann's work on self-reproducing automata (together with Turing's work on computing machines) central to biological theory as well, allowing us to "discipline our thoughts about machines, both natural and artificial." Von Neumann's goal, as specified in his lectures at the University of Illinois in 1949, was to design a machine whose complexity could grow automatically akin to biological organisms under natural selection. He asked what is the threshold of complexity that must be crossed for machines to be able to evolve. His answer was to specify an abstract machine which, when run, would replicate itself. In his design, the self-replicating machine consists of three parts: a "description" of ('blueprint' or program for) itself, a universal constructor mechanism that can read any description and construct the machine (sans description) encoded in that description, and a universal copy machine that can make copies of any description. After the universal constructor has been used to construct a new machine encoded in the description, the copy machine is used to create a copy of that description, and this copy is passed on to the new machine, resulting in a working replication of the original machine that can keep on reproducing. Some machines will do this backwards, copying the description and then building a machine. Crucially, the self-reproducing machine can evolve by accumulating mutations of the description, not the machine itself, thus gaining the ability to grow in complexity. To define his machine in more detail, von Neumann invented the concept of a cellular automaton. The one he used consists of a two-dimensional grid of cells, each of which can be in one of 29 states at any point in time. At each timestep, each cell updates its state depending on the states of the surrounding cells at the prior timestep. The rules governing these updates are identical for all cells. The universal constructor is a certain pattern of cell states in this cellular automaton. It contains one line of cells that serve as the description (akin to Turing's tape), encoding a sequence of instructions that serve as a 'blueprint' for the machine. The machine reads these instructions one by one and performs the corresponding actions. The instructions direct the machine to use its 'construction arm' (another automaton that functions like an Operating System) to build a copy of the machine, without the description tape
https://en.wikipedia.org/wiki/Key%20encapsulation%20mechanism
In cryptographic protocols, a key encapsulation mechanism (KEM) or key encapsulation method is used to secure symmetric key material for transmission using asymmetric (public-key) algorithms. It is commonly used in hybrid cryptosystems. In practice, public key systems are clumsy to use in transmitting long messages. Instead they are often used to exchange symmetric keys, which are relatively short. The symmetric key is then used to encrypt the longer message. The traditional approach to sending a symmetric key with public key systems is to first generate a random symmetric key and then encrypt it using the chosen public key algorithm. The recipient then decrypts the public key message to recover the symmetric key. As the symmetric key is generally short, padding is required for full security and proofs of security for padding schemes are often less than complete. KEMs simplify the process by generating a random element in the finite group underlying the public key system and deriving the symmetric key by hashing that element, eliminating the need for padding. Example using RSA encryption Using the same notation employed in the RSA system article, say Alice has transmitted her public key to Bob, while keeping her private key secret, as usual. Bob then wishes to send symmetric key M to Alice. M might be a 128 or 256-bit AES key, for example. Note that the public key is typically 2048-bits or even longer, thus much larger than typical symmetric keys. If is small enough that , then the encryption can be quickly broken using ordinary integer arithmetic. To avoid such potential weakness, Bob first turns M into a larger integer by using an agreed-upon reversible protocol known as a padding scheme, such as OAEP. He then computes the ciphertext corresponding to: Alice can recover from by using her private key exponent by the following computation: Given , she recovers the original message M by reversing the padding scheme. With KEM the process is simplified as follows: Instead of generating a random symmetric key M, Bob first generates a random with . He derives his symmetric key M by , where is a key derivation function, such as a cryptographic hash. He then computes the ciphertext corresponding to : Alice then recovers from by using her private key exponent by the same method as above: Given , she can recover the symmetric key M by . The KEM eliminates the complexity of the padding scheme and the proofs needed to show the padding is secure. Note that while M can be calculated from in the KEM approach, the reverse is not possible, assuming the key derivation function is one-way. An attacker who somehow recovers M cannot get the plaintext . With the padding approach, he can. Thus KEM is said to encapsulate the key. Note that if the same is used to encapsulate keys for or more recipients, and the receivers share the same exponent , but different and , then one can recover via the Chinese remainder theorem. Thu
https://en.wikipedia.org/wiki/KDLL
KDLL is a non-commercial radio station in Kenai, Alaska, broadcasting on 91.9 FM. The station airs public radio programming from the National Public Radio network and the BBC World Service. KDLL also airs some locally originated programming. External links KDLL's Website DLL NPR member stations DLL Radio stations established in 1972
https://en.wikipedia.org/wiki/Video%20wall
A video wall is a special multi-monitor setup that consists of multiple computer monitors, video projectors, or television sets tiled together contiguously or overlapped in order to form one large screen. Typical display technologies include LCD panels, Direct View LED arrays, blended projection screens, Laser Phosphor Displays, and rear projection cubes. Jumbotron technology was also previously used. Diamond Vision was historically similar to Jumbotron in that they both used cathode-ray tube (CRT) technology, but with slight differences between the two. Early Diamond vision displays used separate flood gun CRTs, one per subpixel. Later Diamond vision displays and all Jumbotrons used field-replaceable modules containing several flood gun CRTs each, one per subpixel, that had common connections shared across all CRTs in a module; the module was connected through a single weather-sealed connector. Screens specifically designed for use in video walls usually have narrow bezels in order to minimize the gap between active display areas, and are built with long-term serviceability in mind. Such screens often contain the hardware necessary to stack similar screens together, along with connections to daisy chain power, video, and command signals between screens. A command signal may, for example, power all screens in the video wall on or off, or calibrate the brightness of a single screen after bulb replacement (in Projection-based screens). Reasons for using a video wall instead of a single large screen can include the ability to customize tile layouts, greater screen area per unit cost, and greater pixel density per unit cost, due to the economics of manufacturing single screens which are unusual in shape, size, or resolution. Video walls are sometimes found in control rooms, stadiums, and other large public venues. Examples include the video wall in Oakland International Airport's baggage claim, where patrons are expected to observe the display at long distances, and the 100 screen video wall at McCarran International Airport, which serves as an advertising platform for the 40 million passengers passing through airport annually. Video walls can also benefit smaller venues when patrons may view the screens both up close and at a distance, respectively necessitating both high pixel density and large size. For example, the 100-inch video wall located in the main lobby of the Lafayette Library and Learning Center has enough size for the distant passerby to view photos while also providing the nearby observer enough resolution to read about upcoming events. Simple video walls can be driven from multi-monitor video cards, however more complex arrangements may require specialized video processors, specifically designed to manage and drive large video walls. Software-based video wall technology that uses ordinary PCs, displays and networking equipment can also be used for video wall deployments. The largest video wall as of 2013 was located at the
https://en.wikipedia.org/wiki/New%20York%20County%20Medical%20Society
The New York County Medical Society is a professional membership organization for physicians who live or work in the borough of Manhattan. As such, it is part of the larger network of medical organizations which includes the American Medical Association and the Medical Society of the State of New York. According to its website, the mission of the NYCMS is ... to proactively identify and respond to the evolving needs of its members; to strive for the achievement of the highest standards of medical practice and quality of care by providing extended medical education and supporting advances in medical science; to champion the integrity of the patient-physician relationship; to improve public health through education initiatives and targeted community service efforts; and to serve as a strong advocate for both members and patients by working aggressively for enactment of supportive and enabling medical legislation. The NYCMS was formed in 1806. It is operated and overseen by a board of directors and a board of trustees, and maintains several standing committees with specific areas of interest, including membership, medical credentialing, public health, and workmen's compensation, and has an advisory committee for young practitioners. Notable members Galen Hunter Daniel Levy Maduro Peixotto Isabella M. Pettet References External links New York County Medical Society home page Medical associations based in the United States Organizations based in Manhattan Medical and health organizations based in New York City
https://en.wikipedia.org/wiki/Tsunkatse
"Tsunkatse" is the fifteenth episode of the sixth season of the American science fiction television series Star Trek: Voyager. The episode first aired on the UPN network on February 9, 2000. Directed by Mike Vejar, it was developed from a story by Gannon Kenney and turned into a teleplay by Robert Doherty. The episode featured Dwayne "The Rock" Johnson in a guest role as a Pendari fighter, and former Star Trek: Deep Space Nine actors J. G. Hertzler and Jeffrey Combs. Set in the 24th century, the series follows the adventures of the Starfleet and Maquis crew of the starship USS Voyager after they were stranded in the Delta Quadrant far from the rest of the Federation. In this episode, Seven of Nine (Jeri Ryan) is abducted, along with Tuvok (Tim Russ), while on a survey mission and forced by her captors to fight in an arena for the entertainment of others. The episode had originally been called "Arena". The crossover between Voyager and the UPN wrestling show WWF Smackdown was described as a "clever marketing ploy" by Russ, but received a negative fan reaction on broadcast. However, it received the highest ratings of the season having been watched by 4.1 percent of all Nielsen households during sweeps month. It received mixed reviews by critics, with praise reserved for Combs and Hertzler. The fight scenes were praised by Black Belt magazine. Plot The crew are granted shore leave on an alien planet. Commander Chakotay (Robert Beltran) and Lt. B'Elanna Torres (Roxann Dawson) attend a mixed martial arts ring sport called "Tsunkatse," while Captain Kathryn Janeway (Kate Mulgrew) visits a neighboring system in the Delta Flyer. Following the match, Seven of Nine (Jeri Ryan) and Lt. Cmdr Tuvok (Tim Russ) ask Chakotay if they can study a micro-nebula on an away mission. He grants them permission, telling them that they can spend their shore leave in whatever manner they choose. Seven and Tuvok depart in a shuttle, but are captured by an alien vessel en route and Tuvok is injured. Seven is brought to Penk (Jeffrey Combs) who blackmails her into fighting in the Tsunkatse matches or else Tuvok will be refused medical treatment. Chakotay invites other crew members to join him at the next Tsunkatse match. These include Neelix (Ethan Phillips), who is forced to restrict his activities following an allergic reaction to a homeopathic medical treatment. They arrive at the bout and Chakotay explains the rules of the fight to Neelix. The first challenger walks out, a Pendari man (Dwayne "The Rock" Johnson), and the Voyager crew are surprised when he is followed by Seven. As the two circle each other, Chakotay contacts Torres on the ship and updates her on the match, ordering her to transport Seven back to Voyager. Torres discovers that Seven is not on the planet's surface, and the fight is actually a holographic projection. Seven is defeated by the Pendari and later wakes up in the fighter's barracks where a Hirogen (J. G. Hertzler) is healing her with a derma
https://en.wikipedia.org/wiki/Bruce%20Tate
Bruce A. Tate is an American author on the topic of the Java, Ruby, and Elixir programming languages and other computer software. He is also the CTO of icanmakeitbetter.com and the editor of Elixir books for the Pragmatic Bookshelf. Works Adopting Elixir Better, Faster, Lighter Java Beyond Java: A Glimpse at the Future of Programming Languages Bitter EJB, co-authored a critical analysis of Java EJBs Bitter Java, a critical analysis of Java Deploying Rails Applications From Java to Ruby: Things Every Manager Should Know Programming Phoenix Rails: Up and Running Seven Languages in Seven Weeks Seven More Languages in Seven Weeks References External links Review of Tate's book Beyond Java Weblog Amazon book review and listings Tursiops electronicus: Stimulated tutoring of a language trained dolphin interview in the free Prolog chapter of Seven Languages in Seven Weeks. American non-fiction writers Living people Year of birth missing (living people)
https://en.wikipedia.org/wiki/Exanet
Exanet, Ltd. was an Israeli software company that provided scalable network-attached storage software solutions to partners. Exanet software was hardware independent. Their clustered NAS software storage solution provided single-file system scalability, and was compatible with Linux, Mac, and Windows operating systems. After the company went into temporary receivership, on February 19, 2010 Exanet's intellectual property was acquired by Dell. History Exanet was founded in 2000 by Giora Yaron and Yossi Ben-Shoshan, and raised $30 million in two rounds of venture capital funding. In 2003, ExaStore started shipping its first products. In January 2006, Exanet joined the Intel Storage Community. In November 2006, Exanet introduced ExaStore-ICM, providing automated data storage and delivery services. In March 2008, Exanet introduced its "solution" products: ExaStore Clustered NAS system and ExaStore Clustered NAS Server. Exanet was headquartered in Israel with offices in the USA, UK, Germany, France, Ukraine, and Japan. Investors included Eitan Wertheimer's Microdent Ltd., Evergreen Venture Partners, Coral Group, and LTG Development Capital. On December 12, 2009, Exanet went into temporary receivership, after failing to secure an additional round of financing. The company had an estimated 80 employees. Acquisition by Dell In February 2010 the company IP was acquired by Dell Inc. for $12 million. Dell continued development of the NAS capability, which was marketed as the Dell Fluid File System or FluidFS. This product comes as an appliance, where the controller running the software is a Dell PowerEdge server and the storage can be any of the three Dell storage product-lines: Dell PowerVault, EqualLogic or Compellent using iSCSI or Fibre Channel connections. Products Exanet was an OEM provider of enterprise storage software called ExaStore. ExaStore had the following components: ExaStore software Intel-based servers (nodes) Standard Gigabit Ethernet or 10 Gigabit Ethernet networking components Fibre Channel attached disk array storage ExaSearch ExaSearch is a search engine, which integrates with Exanet’s scalable, ExaStore, network attached storage (NAS) software, allowing customers to turn stored data into accessible information. ExaSearch includes a search engine capable of searching multiple sources: file servers, email systems, groupware, databases and employee directories. It can process unstructured data and queries, and allows immediate access to newly generated content through real-time indexing. The product is designed to integrate with ExaStore software resulting in a clustered NAS solution combined with enterprise-class search capabilities. References External links Exanet Ltd. Software companies of Israel Defunct companies of Israel Defunct computer companies of Israel Dell acquisitions
https://en.wikipedia.org/wiki/Nine%20Guide
The Nine Guide was a television datacast channel provided by the Nine Network to digital television viewers in Australia. It began broadcasting on 21 August 2001, in Sydney broadcasting 24 hours a day. The channel expanded to fellow Nine Network stations in Melbourne and Brisbane in 2002. The Guide was modified for state-based programming and program promotions. The Nine Guide was shut down on Thursday, 13 November 2008, replaced by a full-screen simulcast of Channel Nine in preparation for the launch of multichannel GO!. Features The Nine Guide featured a television guide for programming on Channel Nine for the following twelve hours, including information on the availability of native high-definition, ratings classification and availability of closed captions. Realtime weather information was also available for select Australian and New Zealand cities as well as realtime date and time information. Live Preview A live 16:9 video preview of Channel Nine was available on the top left of the screen. The live video preview was also accompanied by 'Now on' and 'Coming Up' program information to the left of the live video preview. Advertising The Nine Guide advertised new and prime time television programs from Channel Nine via a small billboard loop on the bottom left. The advertising contained program information including the program title and Channel Nine broadcast time. The times were modified for local markets where the times differed from the network schedule. Identity The Nine Guide's onair look has been changed several times since its launch in August 2001. The channel initially had a blue colour scheme with white text, and a smaller 16:9 preview of Channel Nine. A few years later, the Nine Guide had a revamp of its on-air presentation. The design had a daily colour scheme, alternating every twenty-four hours. The channel featured a similar sized 16:9 ratio preview of Channel Nine, and a National Nine News and weather slide at the top. On 30 January 2006 coinciding with the relaunch of Channel Nine's new logo and revamp on its on-air identity, the guide revamped with a new look and a larger 16:9 ratio preview of Channel Nine. The Nine Guide then relaunched with a revamp again on 21 January 2007 coinciding with the revamp of Channel Nine's branding of its on-air identity. The guide now featured a similar sized 16:9 ratio preview of Channel Nine. The previous on-air identity of the Nine Guide launched on 1 December 2007 along with the new slogan: . The guide featured a similar sized 16:9 ratio preview of Channel Nine. See also Seven Guide Ten Guide Nine Network Television channels and stations established in 2001 Television channels and stations disestablished in 2008 English-language television stations in Australia Digital terrestrial television in Australia Defunct television channels in Australia
https://en.wikipedia.org/wiki/Routing%20loop
A routing loop is a common problem with various types of networks, particularly computer networks. They are formed when an error occurs in the operation of the routing algorithm, and as a result, in a group of nodes, the path to a particular destination forms a loop. In the simplest version, a routing loop of size two, node A thinks that the path to some destination (call it C) is through its neighbouring node, node B. At the same time, node B thinks that the path to C starts at node A. Thus, whenever traffic for C arrives at either A or B, it will loop endlessly between A and B, unless some mechanism exists to prevent that behaviour. How a routing loop can form For example, in this illustration, node A is transmitting data to node C via node B. If the link between nodes B and C goes down and B has not yet informed node A about the breakage, node A transmits the data to node B assuming that the link A-B-C is operational and of lowest cost. Node B knows of the broken link and tries to reach node C via node A, thus sending the original data back to node A. Furthermore, node A receives the data that it originated back from node B and consults its routing table. Node A's routing table will say that it can reach node C via node B (because it still has not been informed of the break) thus sending its data back to node B creating an infinite loop. This routing loop problem is also called a two-node loop. How a routing loop can persist Consider now what happens if both the link from A to C and the link from B to C vanish at the same time (this can happen if node C has crashed). A believes that C is still reachable through B, and B believes that C is reachable through A. In a simple reachability protocol, such as EGP, the routing loop will persist forever. In a naive distance-vector protocol, such as the routing information protocol, the loop will persist until the metrics for C reach infinity (the maximum number of routers that a packet can traverse in RIP is 15. The value 16 is considered infinity and the packet is discarded). Prevention and mitigations In a link-state routing protocol, such as OSPF or IS-IS, a routing loop disappears as soon as the new network topology is flooded to all the routers within the routing area. Assuming a sufficiently reliable network, this happens within a few seconds. Newer distance-vector routing protocols like EIGRP, DSDV, and Babel have built-in loop prevention: they use algorithms that assure that routing loops can never happen, not even transiently. Older routing protocols like RIP and IGRP do not implement the newest forms of loop prevention and only implement mitigations such as split horizon, route poisoning, and holddown timers. See also Switching loop References Routing
https://en.wikipedia.org/wiki/Left-to-right%20mark
The left-to-right mark (LRM) is a control character (an invisible formatting character) used in computerized typesetting (including word processing in a program like Microsoft Word) of text containing a mix of left-to-right scripts (such as Latin and Cyrillic) and right-to-left scripts (such as Arabic, Syriac, and Hebrew). It is used to set the way adjacent characters are grouped with respect to text direction. Unicode In Unicode, the LRM character is encoded at . In UTF-8 it is E2 80 8E. Usage is prescribed in the Unicode Bidi (bidirectional) algorithm. Example of use in HTML Suppose the writer wishes to use some English text (a left-to-right script) into a paragraph written in Arabic or Hebrew (a right-to-left script) with non-alphabetic characters to the right of the English text. For example, the writer wants to translate, "The language C++ is a programming language used..." into Arabic. Without an LRM control character, the result looks like this: لغة C++ هي لغة برمجة تستخدم... With an LRM entered in the HTML after the ++, it looks like this, as the writer intends: لغة C++‎ هي لغة برمجة تستخدم... In the first example, without an LRM control character, a web browser will render the ++ on the left of the "C" because the browser recognizes that the paragraph is in a right-to-left text (Arabic) and applies punctuation, which is neutral as to its direction, according to the direction of the adjacent text. The LRM control character causes the punctuation to be adjacent to only left-to-right text – the "C" and the LRM – and position as if it were in left-to-right text, i.e., to the right of the preceding text. Some software requires using the HTML code &#8206; or &lrm; instead of the invisible Unicode control character itself . Using the invisible control character directly could also make copy editing difficult. See also Right-to-left mark Bidirectional text References External links Unicode standard annex #9: The bidirectional algorithm Unicode character (U+200E) Control characters Digital typography Unicode formatting code points
https://en.wikipedia.org/wiki/Right-to-left%20mark
‏The right-to-left mark (RLM) is a non-printing character used in the computerized typesetting of bi-directional text containing a mix of left-to-right scripts (such as Latin and Cyrillic) and right-to-left scripts (such as Arabic, Syriac, and Hebrew). RLM is used to change the way adjacent characters are grouped with respect to text direction. However, for Arabic script, Arabic letter mark may be a better choice. Unicode In Unicode, the RLM character is encoded at . In UTF-8 it is E2 80 8F. Usage is prescribed in the Unicode Bidi (bidirectional) Algorithm. Example of use in HTML Suppose the writer wishes to inject a run of Arabic or Hebrew (i.e. right-to-left) text into an English paragraph, with an exclamation point at the end of the run on the left hand side. "I enjoyed staying -- really! -- at his house." With the "really!" in Hebrew‏, the sentence renders as follows: I enjoyed staying -- באמת! -- at his house. (Note that in a computer's memory, the order of the Hebrew characters is ‭ב,א,מ,ת‬.) With an RLM added after the exclamation mark, it renders as follows: I enjoyed staying -- באמת!‏ -- at his house. (Standards-compliant browsers will render the exclamation mark on the right in the first example, and on the left in the second.) This happens because the browser recognizes that the paragraph is in a LTR script (Latin), and applies punctuation, which is neutral as to its direction, in coordination with the surrounding (left-to-right) text. The RLM causes the punctuation to be surrounded by only RTL text—the Hebrew and the RLM—and hence be positioned as if it were in right-to-left text, i.e., to the left of the preceding text. See also Arabic letter mark Left-to-right mark Bidirectional text References External links Unicode standard annex #9: The bidirectional algorithm Unicode character (U+200F) Control characters Digital typography Unicode formatting code points
https://en.wikipedia.org/wiki/Early%20Bloomer
Early Bloomer is a 2003 American computer-animated short film produced by Sony Pictures Imageworks. It was created and directed by Kevin J. Johnson. It was the studio's second short film after The ChubbChubbs!. Plot The 3-minute film is following a tadpole who grows legs before the other tadpoles and is teased for it until the others unexpectedly grow legs too. He unexpectedly grows arms, which marks the end of the film. Release Early Bloomer was theatrically released on May 9, 2003 along with Daddy Day Care. On December 2, 2003, the short was also released as special feature on the Daddy Day Care DVD. References External links 2003 short films 2003 films 2003 animated films 2003 computer-animated films Columbia Pictures short films Columbia Pictures animated short films Animated films about frogs Films scored by Mark Mancina Animated films without speech 2000s English-language films 2000s American films
https://en.wikipedia.org/wiki/Spirit%20Folk%20%28Star%20Trek%3A%20Voyager%29
"Spirit Folk" is the 137th episode of the American science fiction television series Star Trek: Voyager airing on the UPN network. It is the 17th episode of the sixth season. Set in the science fiction universe of Star Trek, the titular USS Voyager spacecraft is stranded on the other side of the Galaxy as Earth and the United Federation of Planets. In this installment, the crew go on an adventure in the holodeck, but things go wrong. Some of the music in this episode by Jay Chattaway was nominated for an Emmy. Plot The crew continues to enjoy the Fair Haven holodeck program. After Lt. Tom Paris's suggestion, the holoprogram is set to run continuously, but over time, the strain put on the holotechnology begins to cause problems. The hologram characters gradually realise that the visitors can change their world at will (normally, holograms' programming makes them oblivious to non-in-world aspects). Frightened, the villagers begin to suspect that the crew are spirit folk that have come to destroy Fair Haven. Captain Janeway manages to elude her companion, Michael the barkeeper, but nevertheless asks Tom and Ensign Harry Kim to figure out the problem with the Fair Haven program. The two establish that the subroutines that make holograms unaware of anything outside their program have malfunctioned due to prolonged operation. When Tom and Harry enter the program to repair it, they are captured and held hostage by the holograms, who try to make Tom and Harry spill secrets about the spirit folks. The Doctor, in the role of the village priest, enters the holodeck using his mobile emitter to avoid being influenced by the damaged holoprogram. However the emitter is confiscated and he is held captive with Tom and Harry. Michael, determined to find "Katie" (Janeway), puts the emitter on. Janeway, thinking that it is the Doctor, orders him transported to the bridge. Janeway can no longer deceive Michael. She explains that her crew are on a spaceship and on a long journey. They enjoy the occasional visit to peaceful Fair Haven. They afterwards reenter the holodeck and convince the other characters that the crew has no hostile intentions. Continuity This story arc is begun in Season Six episode of Fair Haven, the first Voyager episode featuring the town. Reception Some of the music in this episode, by composer Jay Chattaway, was nominated for an Emmy award. In 2016, it was suggested viewing for Saint Patrick's Day due to its Irish content. Den of Geek in 2016 made ranking of all 23 episodes written by Bryan Fuller for Star Trek up to that time, and placed this episode very last, remarking "“Spirit Folk” was pretty much just another episode where the holodeck malfunctions". In 2017, this episode was rated the 10th worst episode of the Star Trek franchise up to that time, by Screen Rant. In 2018, CBR included this episode on a ranking of episodes of Star Trek, they stated were "So Bad They Must Be Seen" and noted it had not been received well by audiences
https://en.wikipedia.org/wiki/KVAK-FM
KVAK-FM is a commercial adult contemporary/classic rock radio station in Valdez, Alaska, broadcasting on 93.3FM. KVAK-FM obtains its programming from Dial Global Networks. External links 93.3 KVAK-FM official website VAK-FM Mainstream adult contemporary radio stations in the United States Classic rock radio stations in the United States Radio stations established in 1999 1999 establishments in Alaska
https://en.wikipedia.org/wiki/Okay%20Ka%2C%20Fairy%20Ko%21
Okay Ka, Fairy Ko! () is a Philippine television fantasy situational comedy series broadcast by Intercontinental Broadcasting Corporation, ABS-CBN and GMA Network. Directed by Bert de Leon, it stars Vic Sotto, Charito Solis and Alice Dixson. It premiered on November 26, 1987 and concluded on April 3, 1997. Cast and characters Lead cast Vic Sotto as Vicente "Enteng" Kabisote Jr. Alice Dixson, Tweetie de Leon, Roderick Paulate and Dawn Zulueta as Chlorateam "Faye" Kabisote Charito Solis as Ina Magenta Bayani Casimiro Sr. as Vicente "Edad" Kabisote Sr. Supporting cast Aiza Seguerra as Aiza Kabisote Ruby Rodriguez as Amy Jinky Oda as Bale Larry Silva as Pipoy Bayani Casimiro Jr. as Prinsipe ng Kahilingan "Prinsipe K" Debraliz Valasote as Yaya Engkantada "Yaya E" Oyo Boy Sotto and CJ Ramos as Benokadzar "Benok" Kabisote Luz Fernandez as Luka and Lucring Tetchie Agbayani as Muñita Spencer Reyes as Spencer Maribeth Bichara as Betchay Oscar Obligacion as Laviokh Richie D'Horsie as Richie Odette Khan as Satana Chucky Robles Films Awards and nominations References External links Enteng Kabisote 1987 Philippine television series debuts 1997 Philippine television series endings ABS-CBN original programming Filipino-language television shows GMA Network original programming Intercontinental Broadcasting Corporation original programming M-Zet Productions films Philippine comedy television series Television series by M-Zet Productions
https://en.wikipedia.org/wiki/Severity%20%28video%20game%29
Severity is a cancelled first-person shooter video game that was being developed by Escalation Studios for Microsoft Windows, PlayStation 3, and Xbox 360. Funded by the Cyberathlete Professional League (CPL), the game was set to include a blend of different first-person shooter gameplay styles, separating them as individual game modes, as well as cross-platform multiplayer. Severity was announced by game developer John Romero at the 2006 CPL Championship Finals. Despite the CPL announcing that it would be ceasing tournament operations on March 13, 2008, and then being acquired by an investment group based in the United Arab Emirates on August 25, 2008, Escalation Studios managing director Tom Mustaine confirmed on that the game was still in development, however, it was not the primary focus of the studio at the given time. In an interview from October 28, 2009, CPL founder Angel Munoz confirmed that production on Severity had ended, stating that they had not found a publisher and thus additional funds for the game. References Cancelled PlayStation 3 games Cancelled Windows games Cancelled Xbox 360 games First-person shooters
https://en.wikipedia.org/wiki/KSTK
KSTK is a non-commercial radio station in Wrangell, Alaska, broadcasting on 101.7 FM. The station airs public radio programming from the National Public Radio network and the BBC World Service. The station also airs some locally originated programming. KSTK is a member of CoastAlaska. Translators External links KSTK official website STK STK NPR member stations Radio stations established in 1973 1973 establishments in Alaska
https://en.wikipedia.org/wiki/KRBD
KRBD is a non-commercial radio station in Ketchikan, Alaska, broadcasting on 105.3 FM. The station airs public radio programming from the National Public Radio network, the BBC World Service, and is a member of CoastAlaska. KRBD also airs some locally originated programming. As with many radio stations, the name is an abbreviation. In this case, RBD is short for "Rainbird," which is one of the mascots of Ketchikan. (Ketchikan averages about 160 inches of rainfall each year.) The station's first broadcast, on May 22, 1976, opened with the song, "The Fool," by Quicksilver Messenger Service on volunteer Tom Miller's show, "Odds and Ends." At that time, the station had seven licensed volunteers, each one covering a day of the week, and each one responsible for recruiting more volunteers. At first, the station operated out of a single apartment space on the first floor of the 10-story Marine View Building. Its 10-watt transmitter broadcast mostly to listeners within a few miles of Ketchikan's West End neighborhood. The community licensee was conceived of and built by volunteers. Soon after it went on the air, the station hired a manager/engineer, Bob Kern, of Ketchikan. KRBD continued to grow along with the State of Alaska's oil wealth. Within a few years, the station moved up to the Marine View's 10th floor, where it occupied two large apartment spaces. As it continued to grow, KRBD increased power to its current 3,400 watts and moved to a downtown Ketchikan location at 716 Totem Way, overlooking Ketchikan Creek. At one point in the 1980s, the station had 10 employees and was able to send them to various training opportunities in and outside of Alaska. Its volunteer crew also grew, numbering as many as 90 in its heyday in the 1980s. KRBD is notable for having a sizable group of youth and teens comprise a portion of the volunteer body. When the state's budget declined due to lower oil prices, and later due to declining oil production, so did KRBD's. By 2007, the station had about four employees and a much reduced volunteer corp. Throughout its history, volunteers have played an important role in operating the station, especially in producing its varied music programming. In the early 1990s, the station moved yet again, when it purchased the building at 123 Stedman Street, a few doors down the street from Totem Way. In 2010, KRBD moved to a fifth location known as "The Rock Pit" on Copper Ridge Lane. Translators References External links 1976 establishments in Alaska RBD Buildings and structures in Ketchikan Gateway Borough, Alaska Ketchikan, Alaska NPR member stations Radio stations established in 1976 RBD
https://en.wikipedia.org/wiki/KSRM
KSRM (920 AM) is a commercial radio station programming talk in Soldotna, Alaska, broadcasting to the Kenai, Alaska, area. References External links SRM Talk radio stations in the United States Radio stations established in 1967
https://en.wikipedia.org/wiki/KWVV-FM
KWVV-FM (103.5 FM, "K-Wave") is a commercial alternative rock music radio station in Homer, Alaska. KWVV-FM produces its programming in-house. Translators K236CC in Seward-Woodrow, Alaska, broadcasting on 95.1 FM. K292ED in Kachemak City, Alaska, broadcasting on 106.3 FM. K281BA in Delta Junction-Fort Greely, Alaska, broadcasting on 104.1 FM. K285DU in Homer, Alaska, broadcasting on 104.9 FM. K285EF in Kenai, Alaska, broadcasting on 104.9 FM. K285AA in Kodiak, Alaska, broadcasting on 104.9 FM. K283AB in Soldotna, Alaska, broadcasting on 104.5 FM. External links K-Wave 103.5 Facebook WVV-FM Alternative rock radio stations in the United States Radio stations established in 1966 1966 establishments in Alaska
https://en.wikipedia.org/wiki/Westwood%20One
Westwood One is an American radio network owned by Cumulus Media. The company syndicates talk, music, and sports programming. The company takes its name from an earlier network also named Westwood One, a company founded in 1978. The company was, at various times, managed by CBS Radio, the radio arm of CBS Corporation and Viacom. It was later purchased by the private equity firm The Gores Group before merging with Dial Global in 2011. In December 2013, Dial Global was, in turn, acquired by Cumulus Media. Prior to the sale's completion, Dial Global re-assumed the Westwood One name. After the completion of the purchase, Westwood One was merged into the Cumulus Media Networks division (the former ABC Radio Networks). Content syndicated by Westwood One includes talk shows, music programs and 24-hour formats. It is particularly prominent in sports radio, distributing the CBS Sports Radio network and holding various play-by-play rights, including the National Football League's main radio package. History Dial Global was founded as X Radio Networks, a division of Excelsior Radio Networks. It merged with Dial Communications and Global Media in 2006, from which it derived the Dial Global name. Dial Global initially specialized in syndicated weekend music programs of various types. In 2007 it acquired the former Transtar Radio Networks from the original Westwood One. Triton Media Group, a subsidiary of Oaktree Capital Management, purchased Excelsior in early 2008, and soon bought two of its three main competitors: Waitt Radio Networks and Jones Radio Networks. Triton used the Dial Global name for all of its programming and later bought the remainder of Westwood One in 2011, folding it into its Dial Global subsidiary. Dial Global began exhibiting signs of financial distress in late 2012, a possible side effect of its numerous acquisitions. On November 15 of that year, Dial Global announced a disappointing third quarter that it attributed in part to the financial impact of its exposure to the controversy surrounding a certain controversial talk personality, which was widely assumed to be a veiled reference to Rush Limbaugh in the wake of the Rush Limbaugh–Sandra Fluke controversy (although Limbaugh has no direct association with Dial Global). It simultaneously announced that it had filed for delisting from NASDAQ. At the time of the announcement, Dial Global stock was trading at $2.00 a share; by mid-January 2013, DG's stock was trading at .30 a share. In a SEC 8-K filing dated January 15, 2013, DG announced that it had extended a loan waiver agreement with certain lenders. On August 29, 2013, Cumulus Broadcasting announced its intent to acquire Dial Global for $260 million, and merge it into its existing Cumulus Media Networks division. To fund the sale, Cumulus sold 53 radio stations to Townsquare Media (a radio broadcasting company owned by Oaktree), and traded 15 more stations to Townsquare in exchange for a cluster in Fresno, California formerly own
https://en.wikipedia.org/wiki/Single-instance%20storage
Single-instance storage (SIS) is a system's ability to take multiple copies of content and replace them by a single shared copy. It is a means to eliminate data duplication and to increase efficiency. SIS is frequently implemented in file systems, e-mail server software, data backup, and other storage-related computer software. Single-instance storage is a simple variant of data deduplication. While data deduplication may work at a segment or sub-block level, single-instance storage works at the whole-file level and eliminates redundant copies of entire files or e-mail messages. Concept In the case of an e-mail server, single-instance storage would mean that a single copy of a message is held within its database while individual mailboxes access the content through a reference pointer. However, there is a common misconception that the primary benefit of single-instance storage in mail servers is a reduction in disk space requirements. The truth is that its primary benefit is to greatly enhance delivery efficiency of messages sent to large distribution lists. In a mail server scenario disk space savings from single-instance storage are transient and drop off very quickly over time. When used in conjunction with backup software, single-instance storage can reduce the quantity of archive media required since it avoids storing duplicate copies of the same file. Often identical files are installed on multiple computers, for example operating system files. With single-instance storage, only one copy of a file is written to the backup media therefore reducing space. This becomes more important when the storage is offsite and on cloud storage such as Amazon S3. In such cases, it has been reported that deduplication can help reduce the costs of storage, costs of bandwidth and backup windows by up to 10:1. Novell GroupWise was built on single-instance storage, which accounts for its large capacity. ISO CD/DVD image files can be optimized to use SIS to reduce the size of a CD/DVD compilation (if there are enough duplicated files) to make it fit into smaller media. SIS is related to system wide file duplication search and multiple file instance detection tools such as the P2P application BearShare (5.n Versions and below) but differs in that SIS reduces storage utilization automatically and creates and retains symbolic linkages, whereas Bearshare allows for manual deletion of duplicates and associated user-level file system, Windows Explorer type of icon links. Microsoft SIS was introduced with the Remote Installation Services feature of Windows 2000 Server. A typical server might hold ten or more unique installation configurations (perhaps with different device drivers or software suites) but perhaps only 20% of the data may be unique between configurations. Microsoft states that "SIS works by searching a hard disk volume to identify duplicate files. When SIS finds identical files, it saves one copy of the file to a central repository, called th
https://en.wikipedia.org/wiki/Great%20Trail
The Great Trail (also called the Great Path) was a network of footpaths created by Algonquian and Iroquoian-speaking indigenous peoples prior to the arrival of European colonists in North America. It connected the areas of New England and eastern Canada, and the mid-Atlantic regions to each other and to the Great Lakes region. Many major highways in the Northeastern United States were later constructed to follow the routes established thousands of years ago by Native Americans moving along these trails. Although some sections of the trail have been called "warpaths", such as the so-called "Great Indian Warpath" through Chillicothe, Ohio, the primary purposes for these roads was peaceful trade, hunting, and gathering of natural resources along their routes. Some sources describe the Great Trail as beginning at one point or another. However, as there was a gradation between local trails used by few people and more major routes used by many, identifying a point at which the Great Trail begins or ends is an arbitrary matter. The Great Trail system connected with the Overland Trail, which led west, as well as other trails to other parts of the continent. One part of the Great Trail system stretched from Passamaquoddy territory in northernmost New England through the Lakes Region of New Hampshire and down to the Shawmut Peninsula in Massachusetts. From there it connected to the region of the Wampanoag of Cape Cod, and over to the territory of the Nipmuck and other tribes around Lake Chaubunagungamaug before connecting to areas of present-day Connecticut and points farther south. Another part of the Great Trail system in New England was later followed by Massachusetts Route 2; it leads from Boston to upstate New York. The section now known as the Mohawk Trail (used by tribes such as the Mohawk and Pocomtuc) leads from the Connecticut River valley through the Berkshires and Mohawk Trail State Forest into the area of present-day Albany, New York, the state capital. From here, the Great Trail system connected all parts of the territories where the Five Nations of the Iroquois Confederacy lived. In northern New Jersey, the portion of the Great Trail much-used by the Lenape included choice places to cross the Passaic River and to pass through the valleys among the Watchung Mountains, notably at Hobart Gap. As the Dutch colonists advanced beyond the proximity of the Hudson River, the new settlers found these paths crucial to their movement. New Jersey Route 24 generally follows a branch of the trail in this area. A more southern part of the Great Trail system went from Delaware across Pennsylvania to Oldtown, Maryland, and then to the Ohio River below present-day Pittsburgh. It crossed Columbiana County to Bolivar and Sandusky, and continued west. The part of the Great Trail used by Colonial American troops during Pontiac's Rebellion has been improved as U.S. Route 23. As with the Native Americans' burning underbrush to clear land for cultivating cr
https://en.wikipedia.org/wiki/Randy%20Katz
Randy Howard Katz is a distinguished professor emeritus at University of California, Berkeley of the electrical engineering and computer science department. Biography Katz was born in Brooklyn, New York in 1955. He was first exposed to computers in Canarsie High School's well equipped laboratory. After graduating in 1973, Katz received an A.B. from Cornell University (May 1976), where he was a Cornell College Scholar majoring in Computer Science and Mathematics, an M.S. from UC Berkeley (June 1978), under the direction of Larry Rowe, and a Ph.D., from UC Berkeley (June 1980), under the direction of Eugene Wong. He was a member of the Ingres Project. After working at BBN and CCA in Cambridge, Massachusetts, Katz was an assistant professor in the Computer Sciences Department at the University of Wisconsin-Madison from 1981 to 1983. In 1983, he joined the Electrical Engineering and Computer Science Department at the University of California, Berkeley. He was promoted to associate professor in 1985 and full professor in 1988. He was appointed the United Microelectronics Corporation Distinguished Professor in EECS in 1996. From 1996 to 1999, he served as chair of the EECS Department, the first computer scientist to do so. In 2015, he served as chair of the Department's Computer Science Division. In 2018, he was appointed Berkeley's vice chancellor for research. He retired from the university in December 2021. Katz is a fellow of the Association for Computing Machinery (ACM), Institute of Electrical and Electronics Engineers (IEEE) for contributions to computer system design, engineering education, and government service, the American Academy of Arts and Sciences (AAAS), and the American Association for the Advancement of Science (AAAS). He is also a member of the National Academy of Engineering (2000) for "contributions to high-performance input/output systems, engineering education, and government service". He has published over 350 refereed technical papers, book chapters, and books. His textbook, Contemporary Logic Design, has sold over 85,000 copies, and has been used at over 200 colleges and universities. His academic recognitions include the Computer Science Division's Diane S. McEntyre Award for Excellence in Teaching Award, the Jim and Donna Gray Faculty Award for Excellence in Undergraduate Teaching, the Berkeley Academic Senate Distinguished Teaching Award, the ASEE Frederic E. Terman Award, the IEEE James H. Mulligan Jr. Education Medal, the ACM Karl V. Karlstrom Outstanding Educator Award, the ACM Sigmobile Outstanding Contributor Award, the IEEE Reynolds Johnson Information Storage Award, the Outstanding Alumni Award of the Computer Science Division, the CRA Distinguished Service Award, the United States Department of the Air Force Decoration for Exceptional Civilian Service, and the Pingat Bakti Masyarakat of the Government of Singapore. Katz, along with David A. Patterson and Garth Gibson, developed the redundant array of inexpens
https://en.wikipedia.org/wiki/Tech%20noir
Tech-noir (also known as cyber noir, future noir and science fiction noir) is a hybrid genre of fiction, particularly film, combining film noir and science fiction, epitomized by Ridley Scott's Blade Runner (1982) and James Cameron's The Terminator (1984). The tech-noir presents "technology as a destructive and dystopian force that threatens every aspect of our reality". Origins Cameron coined the term in The Terminator, using it as the name of a nightclub, but also to invoke associations with both the film noir genre and with futuristic sci-fi. Precursors The word noir, from film noir, is the French term (literally "black film" or "dark film") for American black-and-white films of the 1940s and 1950s, which always seemed to be set at night in an urban landscape, with a suitably dark subject-matter, although the treatment is often sexy and glamorous as well as stylised and violent. The genre was informed by a slew of crime novels, with Raymond Chandler's The Big Sleep and Farewell, My Lovely being notable examples. Being often typified by crime thrillers with a private detective hero and a succession of attractive, deadly heroines, the classic noir style may also be called "detective noir". From this derive various related and subverted terms, such as neo-noir (resurgence of the form in 1960s and 1970s America); the Cold War noir (exploiting the tension and paranoia of the nuclear age); blaxploitation films, which some called black noir; Nordic noir, set in the stark landscape and apparently bland social environment of the Scandinavian countries, yet revealing a dark legacy of cruel misogyny, brutal sexual repression, and murder. From the same source comes cyber noir, also called tech noir, which may deal with intrigues and criminal enterprises in either the real world of computers and high technology, or in the virtual landscapes of a techno-generated underworld – and sometimes both. Science fiction noir Beginning in the 1960s, the most significant trend in film noir crossovers or hybrids has involved science fiction. In Jean-Luc Godard's Alphaville (1965), Lemmy Caution is the name of the old-school private eye in the city of tomorrow. The Groundstar Conspiracy (1972) centers on another implacable investigator and an amnesiac named Welles. Soylent Green (1973), the first major American example, portrays a dystopian, near-future world via a self-evidently noir detection plot; starring Charlton Heston (the lead in Touch of Evil), it also features classic noir standbys Joseph Cotten, Edward G. Robinson, and Whit Bissell. The movie was directed by Richard Fleischer, who two decades before had directed several strong B noirs, including Armored Car Robbery (1950) and The Narrow Margin (1952). Cyber noir Cyber noir, also called tech noir, deals either with dark shenanigans in the world of computers and hi-tech supernerds; or the virtual landscapes of a techno-generated underworld; or both. The term is a portmanteau that describes the conjunc
https://en.wikipedia.org/wiki/KCUK
KCUK is a non-commercial radio station in Chevak, Alaska, broadcasting on 88.1 FM. It includes local programming, plus programming from National Public Radio and Native Voice One. External links KCUK official website 1987 establishments in Alaska CUK Buildings and structures in Kusilvak Census Area, Alaska Native American radio NPR member stations Radio stations established in 1987
https://en.wikipedia.org/wiki/KRUP
KRUP is a commercial radio station programming talk in Dillingham, Alaska, broadcasting on 99.1 FM. External links Country radio stations in the United States RUP Talk radio stations in the United States Radio stations established in 1990 1990 establishments in Alaska
https://en.wikipedia.org/wiki/Future%20GPX%20Cyber%20Formula%20SIN
is a 1998 Japanese original video animation (OVA) series. It is the fourth and last arc of the Future GPX Cyber Formula 2 OVA series. The story focuses on Bleed Kaga as he struggles to settle the score with Hayato Kazami. Synopsis Hayato Kazami and his exclusive race machine, Asurada, finished the Cyber Formula World Grand Prix XVI in 2021 successfully by defending his champion title. After the end of the Grand Prix, Kazami's racing team, Sugo Grand Prix, announces the contract of sponsorship with GIO Motors Inc., thus becoming Sugo GIO Grand Prix. Meanwhile, Aoi ZIP Formula prepares its return to the Grand Prix after a year of a disgraceful super license suspension. However, Kyoko Aoi, the re-instated owner of Aoi ZIP Formula, receives a grim news from the executive officers of Aoi Motors that they would allow the team to join the Grand Prix with the outdated machine, Ex-Superion Z/A 10, and that the team will disband after the 2022 season unless a champion title is secured, as the officers fear that the rival group GIO's success in CF would greatly damage the already ruined reputation of the company. Bleed Kaga, not knowing this desperate situation coming towards him, returns to Japan to prepare for a test run and waited for the moment to challenge his arch-rival, Hayato Kazami. After the end of the Grand Prix, Kaga retired from CF and sent his farewell messages to both Nagumo, who congratulated him for winning the race and thanking him on behalf of his brother and Kyoko, who resigned the ownership of the team and hopes to find the great driver who can replace him, respectively. Along with Grey and Phill, Kaga left Japan and headed back to the United States, he discarded his name of Bleed and assumed his real name, Jotaro. References External links Future GPX Cyber Formula SIN at official Future GPX Cyber Formula website 1998 anime OVAs Fiction set in 2022 Medialink Sunrise (company)
https://en.wikipedia.org/wiki/WKVN
WKVN (95.3 FM) is a radio station broadcasting the K-Love network. Licensed to Morganfield, Kentucky, United States, the station serves the Evansville area. The station is currently owned by the Educational Media Foundation and broadcasts out of Rocklin, California. History The station was first licensed on August 4, 1967, and held the call sign WMSK-FM. On 2006-11-01, the station changed its call sign to WEZG. On 2009-02-29, the call sign was changed again to reflect the new format and ownership. References External links K-Love radio stations Educational Media Foundation radio stations 1967 establishments in Kentucky KVN Radio stations established in 1967 Morganfield, Kentucky
https://en.wikipedia.org/wiki/IS-41
IS-41, also known as ANSI-41, is a mobile, cellular telecommunications system standard to support mobility management by enabling the networking of switches. ANSI-41 is the standard now approved for use as the network-side companion to the wireless-side AMPS (analog), IS-136 (Digital AMPS), cdmaOne, and CDMA2000 networks. It competes with GSM MAP, but the two will eventually merge to support worldwide roaming. IS-41 facilitates inter-switch operations like handoff and roaming authentication. IS-41 evolved through revisions 0, A, B, C, D, and E with increasingly robust and distributed call processing between switches and their roamer databases. To describe IS-41 messaging requires special terminology to designate the telephone call's originating and terminating switch, called an MSC (anchor-MSC, candidate-MSC, homing-MSC, serving MSC and target MSC) and databases called VLR and HLR. For handoffs the messaging is between switches. For roaming and authentication, the messaging would include an HLR and a VLR. In both cases, the PSTN may be needed to carry messaging. References Mobile telecommunications standards
https://en.wikipedia.org/wiki/Entertainment%20Network%20India%20Limited
Entertainment Network India Limited (ENIL) (, ) is a subsidiary of Times Infotainment Media Limited, the holding company promoted by Bennett, Coleman & Company Limited- the flagship company of the Times of India Group, was incorporated in 1999. Times Infotainment is promoted by Bennett, Coleman & Company Limited, better known as the Times of India Group, which was incorporated in 1999. ENIL is the only listed company in the otherwise privately held Times of India Group. It is listed on Bombay Stock Exchange of India Limited and the National Stock Exchange of India Limited. History The company was formed in June 1999 post the first phase of licensing. The Information Broadcasting Ministry offered 108 frequency across 40 cities and ENIL got the maximum of them. It started its operations with the launch of its services in Indore on 4 October 2001. The company simultaneously started operations in seven more cities. In the second phase the company got 25 more frequencies. That took the count of total number of stations to 32. Brand Mirchi and "Its Hot!" the tag line The tag line of the brand is "Its Hot!" Mirchi is a Hindi word for chilly. While all other radio brands were in English, ENIL came up with a Hindi brand name. The brand name Mirchi was coined by Mr. Vineet Jain (Chairman, Times Group). Business segment ENIL cater to Radio Broadcasting Segment, Out of Home and Experiential Marketing Segment Radio broadcasting segment This segment operates with the brand name of 'Radio Mirchi'. Before Radio Mirchi, the Times of India Group provided private FM service along with the Government of India under the brand name of Times FM. GOI did not renew the contract with private player post that. They operated in Delhi, Calcutta, Chennai and Goa from 1993-1998. It has been consistently rated as the No. 1 FM radio channel. It has a large pan India presence with 32 stations across 14 states. The channel reaches to more than 41 Million listeners (as per IRS Q4, 2010, last week recall) across stations. Experiential marketing segment Experiential marketing segment is carried under the brand name 360 Degree. Alternative Brand Solution (India) Limited, a subsidiary of ENIL, is the organisation which looks after this segment. They have organised many popular event properties. One of them being Spell Bee - India Spells. This year was the third edition of the event, and they engaged with more than three lakh across 25 cities. Out of Home This segment provides Digital Screens, Large Formats, Street Furniture etc. They won a 20-year advertising contract with New Delhi Airport, Terminal 3. Financials Digital innovations ENIL with tie up with Bharti Airtel ltd have launched Mirchi Mobile. Under this service Airtel customers could tune into Radio Mirchi channels of different cities. This service allowed customers to tune into 12 stations of Radio Mirchi. This service was later extended to Reliance and BSNL customers also. Radio Mirchi can also be heard onli
https://en.wikipedia.org/wiki/Kantar%20Group
Kantar Group is a global data, insights, and consulting company based in London, England. It was founded in 1992, and has approximately 30,000 employees in over 90 countries working in various research disciplines, including brand guidance, brand strategy, social media monitoring, advertising effectiveness, consumer and shopper behaviour, and public opinion. Kantar has been majority owned by Bain Capital Private Equity since July 2019, when WPP sold a 60% stake of the company for $3.1 billion, at a valuation of $4.0 billion. History Leadership On 24 October 2018 it was announced that the WPP board approved the plans to sell Kantar Group. In Dec 2019, Eric Salama stepped down as the CEO of Kantar Group. Eric Salama has been with Kantar since it was bought by WPP in 1988. In January 2020, Ian Griffiths (former CFO and COO at ITV) was named Chief Financial Officer of Kantar, while Adam Crozier was appointed chairman. In October 2020, Kantar announced the appointment of Alexis Nasard as chief executive officer, effective 30 December 2020. Nasard subsequently stepped down as CEO of Kantar on 27 April 2021. In July 2021, Chris Jansen was appointed to replace Alexis Nasard as CEO, effective 1 November 2021. Office locations Kantar has offices in 90 markets, including the UK & Ireland, North America, India, Spain, France, Italy, China and Brazil. The global headquarters is located at London. Operations In April 2019, Kantar unified all its legacy brands, such as Kantar TNS, Kantar Millward Brown, Kantar Media and Kantar Worldpanel, to create one brand. Kantar Insights By 2019, Kantar merged the operations of IMRB, Millward Brown and TNS, and Kantar's parent company WPP merged its media and advertising subsidiary GroupM with Kantar to form a global Insights division. Following similar exercises across the globe, Kantar reduced the sub brands from 18 to 9 by 2019 Kantar Consulting Kantar Consulting was formerly Kantar Vermeer, Kantar Added Value, Kantar Retail and Kantar Futures, and was a marketing and sales consultancy. Kantar Retail Kantar Retail was headquartered in London and has over 400 employees and offices in 15 markets around the globe. In 2014, Kantar Retail under WPP Group acquired Italian SaaS company XTEL, which later became Kantar XTEL division. Kantar Media Kantar Media (now Kantar's Media division) offers a range of media insights and audience measurement services through the analysis of print, radio, TV, internet, cinema, mobile, social and outdoor media worldwide. Kantar Media was formed from WPP Group's acquisition of TNS Media and KMR Group in 2010. Kantar Media became Kantar's re branded insight, media evaluation and audience measurement company. In 2014, Kantar Media acquired a majority stake in the issued share capital of Precise Media Group Holdings Limited ("Precise") in a £70 Million deal. In the same year, Kantar Media acquired IBOPE Media, the main TV audience and ad investment measurement company in Brazil. Kan
https://en.wikipedia.org/wiki/Habeas%20data
Habeas data is a writ and constitutional remedy available in certain nations. The literal translation from Latin of habeas data is "[we command] you have the data," or "you [the data subject] have the data." The remedy varies from country to country, but in general, it is designed to protect, by means of an individual complaint presented to a constitutional court, the data, image, privacy, honour, information self-determination and freedom of information of a person. Habeas data can be sought by any citizen against any manual or automated data register to find out what information is held about his or her person. That person can request the rectification, update or the destruction of the personal data held. The legal nature of the individual complaint of habeas data is that of voluntary jurisdiction, which means that the person whose privacy is being compromised can be the only one to present it. The courts do not have any power to initiate the process by themselves. History Habeas data is an individual complaint filed before a constitutional court and related to the privacy of personal data. The first such complaint is the habeas corpus (which is roughly translated as "[we command] you have the body"). Other individual complaints include the writ of mandamus (USA), amparo (Spain, Mexico and Argentina), and respondeat superior (Taiwan). The habeas data writ itself has a very short history, but its origins can be traced to certain European legal mechanisms that protected individual privacy. In particular, certain German constitutional rights can be identified as the direct progenitors of the habeas data right. In particular, the right to information self-determination was created by the German constitutional tribunal by interpretation of the existing rights of human dignity and personality. This is a right to know what type of data are stored in manual and automatic databases about an individual, and it implies that there must be transparency on the gathering and processing of such data. The other direct predecessor of the habeas data right is the Council of Europe's 108th Convention on Data Protection of 1981. The purpose of the convention is to secure the privacy of the individual regarding the automated processing of personal data. To achieve this, several rights are given to the individual, including a right to access their personal data held in an automated database. The first country to implement habeas data was Brazil. In 1988, the Brazilian legislature voted to introduce a new constitution, which included a novel right never seen before: the habeas data individual complaint. It is expressed as a full constitutional right under article 5, LXXII, of the constitution. Following the Brazilian example, Colombia incorporated the habeas data right to its new constitution in 1991. After that, many countries followed suit and adopted the new legal tool in their respective constitutions: Paraguay in 1992, Peru in 1993, Argentina in 1994, and Ec
https://en.wikipedia.org/wiki/Ultra%201
The Ultra 1 is a family of Sun Microsystems workstations based on the 64-bit UltraSPARC microprocessor. It was the first model in the Ultra series of Sun computers, which succeeded the SPARCstation series. It launched in November 1995 alongside the MP-capable Ultra 2 and shipped with Solaris 2.5. It is capable of running other operating systems such as Linux and BSD. Specifications The Ultra 1 was available in a variety of specifications. The Ultra 1 Creator3D 170E launched with a list price of - along with the Ultra 1 Model 140, and Ultra 1 Creator 170E. CPU Three different CPU speeds were available: 143 MHz (Model 140), 167 MHz (Model 170) and 200 MHz (Model 200). Models Model numbers with an E suffix (Sun service code A12, code-named Electron) had two instead of three SBus slots, and added a UPA slot to allow the use of an optional Creator framebuffer. In addition, the E models had Wide SCSI and Fast Ethernet interfaces, in place of the narrow SCSI and 10BASE-T Ethernet of the standard Ultra 1 (service code A11, code-named Neutron). Memory The Ultra 1 uses 200-pin 5V ECC 60 ns SIMMs in pairs, the same memory used in the SPARCstation 20. Similar Machines Similar Sun machines were the Netra i 1 servers which had the same chassis and the UltraServer 1/Ultra Enterprise 1 servers . See also Ultra series References External links Ultra 1 Series Reference Manual Ultra 1 Series Service Manual Ultra 1 Creator Series Reference Manual Ultra 1 Creator Series Service Manual Workstations Product Library Documentation Sun workstations SPARC microprocessor products
https://en.wikipedia.org/wiki/The%20Missing%20Ring
The Missing Ring is a role-playing video game written by Terry Romine for the Apple II and published in 1982 by Datamost. The Missing Ring is a fantasy adventure with a similar premise to the Dungeons & Dragons role-playing game series: a band of adventurers, which may include humans, elves, dwarves or wizards, enters an enchanted palace to seek treasure and slay enemies. The ultimate objective is to find a wizard's ancient ring. Gameplay Before play begins, the player selects an adventuring party to send into the map. The party may include up to five characters drawn from the following nine classes: Fighter with Sword Wizard Elf with Bow Dwarf with Ax Fighter with Ax Elf with Sword Dwarf with Hammer Fighter with Bow Cleric The player may also visit the merchant and spend gold to equip the characters with such things as healing potions. Once the party is assembled, the player selects one of ten different maps to explore and play begins. Though one player can control all the characters, the game can also be played with multiple players, each controlling a single character in the party. Characters appear as small, white silhouettes, and move through rooms rendered as perspective line drawings. A header at the top of the screen indicates the room being shown, and a footer gives details about the active character, including his level, health and experience. Two complete sets of controls are arranged at either end of the keyboard, allowing two people to play simultaneously without having to trade off. Reception In 1984, Softline readers named the game the eighth-worst Apple program of 1983. References 1982 video games Apple II games Apple II-only games Datamost games Multiplayer and single-player video games Video games developed in the United States
https://en.wikipedia.org/wiki/Money%20Munchers
Money Munchers (appearing on the title screen as Money Muncher) is an Apple II maze game published by Datamost in 1982. It was written by Bob Bishop after he retired from Apple Computer in 1981. Gameplay In Money Munchers, the player guides a small figure through a randomly generated maze, picking up the dollar signs and avoiding the deadly "Money Munchers": creatures that attempt devour the money before you can collect it. The goal is to clear each level of money to advance to the next. The second level adds deadly spiders, while the third adds snakes. Reception Creative Computing wrote, "When we first got Money munchers, some of us were heard to mutter, 'Not another maze game.' When the mutterers went away, our play-testing panel was left with the game. Soon after, they were heard to say, 'No, it is not just another maze game'." References External links 1982 video games Apple II games Apple II-only games Datamost games Maze games Video games developed in the United States Single-player video games
https://en.wikipedia.org/wiki/Link%20time
In computer science, link time refers to the period of time, during the creation of a computer program, in which a linker is being applied to that program. Link time occurs after compile time and before runtime (when a program is executed). It is common to speak of link time operations (the operations performed by a linker) or link time requirements (programming language requirements that must be met by compiled source code for it to be successfully linked). Link time operations The operations performed at link time usually include fixing up the addresses of externally referenced objects and functions, various kinds of cross module checks (e.g. type checks on externally visible identifiers and in some languages instantiation of templates). Some optimizing compilers delay code generation until link time because it is here that information about a complete program is available to them. Resolving external variables in a program is also done at link time. The link-time optimization (LTO), when enabled, occurs at link time. Link time requirements The definition of a programming language may specify link time requirements that source code must meet to be successfully compiled (e.g. the maximum number of characters in an externally visible identifier that must be considered significant). Exceptions In some programming languages it may be necessary for some compilation and linking to occur at runtime. See also Program lifecycle phase Compile time Runtime (program lifecycle phase) References Compiler construction
https://en.wikipedia.org/wiki/Aztec%20%28video%20game%29
Aztec is an action-adventure game developed by Paul Stephenson for the Apple II and published by Datamost in 1982. It was ported to the Atari 8-bit family and Commodore 64. In Aztec, the player enters and explores the recently discovered "Tomb of Quetzalcoatl" in Mexico in search of a jade idol. Gameplay The tomb's levels contain traps, dangerous animals, Aztec guards, and other hazards. Equipped with a machete, pistol, and dynamite, the goal is to recover a jade idol and escape. Aztec generates a random dungeon for each new game. Before beginning play, the game prompts for a difficulty level from one to eight. Increasing the difficulty boosts the number and aggressiveness of the enemies and increases the reward for retrieving the idol. The shorter the time to obtain the idol, the higher the reward. Higher difficulty levels begin the countdown higher. If too much time elapses, the idol is reported as damaged. The interior of the tomb is shown from the side with three floors and steps connecting the levels and floors. Piles of debris and chests can be searched, giving a pistol, ammunition, machete, dynamite, health potions, the remains of the Professor Von Forster, or the idol. Dynamite sticks serve as both a weapon or to blow up walls and floors. It's possible to break a staircase which is necessary to leave the tomb or to blow up the player's character. More dangerous foes may capture the player or confiscate items and lead the player into a pit. Enemies can also cause the player to fall to the next level. Some rooms contain pits with traps. If the player dies, play resumes from the last level. Reception Softline in 1983 called Aztec "no ordinary arcade or adventure game", stating that "the controls, game design, and animation are good examples of the state of the art in Apple arcades". Video magazine described the game as "a 'must buy' for Apple-ites", praising its variety, challenge, and its "straightforward system that uses single keystrokes" to communicate orders. Tom Jones reviewed the game for Computer Gaming World, and stated that "When Aztec's few faults are balanced against some of the best action graphics and general designs now available, the latter definitely win hands down." Electronic Games called the game's user interface "remarkably clean and logical", stating that because of the random dungeons "excitement remains keen through game after game". Aztec received a Certificate of Merit in the category of "Best Computer Adventure" at the 5th annual Arcade Awards. References External links Atari version manual page 1page 2 1982 video games Action-adventure games Apple II games Atari 8-bit family games Commodore 64 games FM-7 games Datamost games Aztecs in fiction NEC PC-8801 games Sharp X1 games Video games developed in the United States Video games set in Mexico Video games based on Native American mythology Single-player video games
https://en.wikipedia.org/wiki/MPAN%20%28TV%20channel%29
MPAN, short for "Montana Public Affairs Network", is a full-time television channel available on Montana cable systems, along with the DT5 digital subchannel on the member stations of the Montana PBS state network. The service commenced in January 2007. MPAN covers both houses of the Montana State Legislature, as well as other hearings staged in the Montana State Capitol at Helena. The service was first introduced in 2001 as TVMT (Television Montana). When it was introduced, it was only a part-time service, offering only Legislature coverage on local Government-access television (GATV) cable channels in Montana. The network was renamed to Montana Public Affairs Network on November 1st, 2018. MPAN is available to 350,000 cable television customers across Montana. The channel does not have edited content. References External links MPAN official website Television stations in Montana Commercial-free television networks Television networks in the United States Montana Legislature Legislature broadcasters in the United States
https://en.wikipedia.org/wiki/BT%20Mobile
BT Mobile is a mobile virtual network operator (MVNO) provided by BT Consumer; a division of BT Group in the United Kingdom that was launched in March 2015. It uses the EE network via an MVNO agreement signed in March 2014 as well as using the spectrum BT won in the 2013 4G auction. EE is now owned by BT following a successful acquisition that was officially completed on 29 January 2016. BT Mobile operates alongside BT Business Mobile which is provided by the BT Business and Public Sector division. BT Mobile launched as a SIM-only service and had more than 400,000 customers . BT Mobile stopped accepting new consumer customers in October 2023, as part of plans by the BT Group to make EE the main brand of the consumer business. Products SIM-only plans BT Mobile is a fully fledged mobile service with handsets and sim only offers four 12-month contract plans as of 7 November 2020: BT Mobile 500MB Plan – 500MB of data, 500 minutes and unlimited texts BT Mobile 10GB Plan – 10GB of data, 1000 minutes and unlimited texts BT Mobile 16GB Plan – 16GB of data, unlimited minutes and texts BT Mobile 20GB Plan – 20GB of data, unlimited minutes and texts BT Mobile 30GB Plan – 30GB of data, unlimited minutes and texts BT Mobile 100GB – 100GB of data, unlimited minutes and texts Anyone living in a BT Broadband home is eligible for a £5 monthly discount on all BT Mobile plans - each account holder can have up to five discounted plans but there's no limit to the number of people in a house that can take up the offer. Features TNT Sports Subscribers to BT Mobile can watch TNT Sports through the dedicated mobile streaming app. However, watching BT Sport via television still requires a paid subscription. BT Wi-Fi Subscribers to BT Mobile have unlimited access to BT Wi-Fi, regardless of the data allowance in their contract. Connection to BT Wi-Fi can be made through an internet browser or the dedicated BT Wi-Fi application. BT Mobile App The BT Mobile app allows subscribers to keep on top of their contract allowance, allowing them to see their minutes, texts and remaining data allowance. The app also shows out-of-contract spending, details of the subscribers' contract and information on data roaming. Services Network BT Mobile offers 4G as standard to all customers at no extra cost and in order to benefit from 4G speeds, a 4G-ready phone is required. However, customers in areas with no 4G coverage or without a 4G-ready phone will still be able to connect via the 3G and 2G networks. Coverage As BT Mobile uses the EE network, its 4G network reaches more than 95% of the UK population while its 3G network reaches 98% and 2G network reaches 99%, . Extra Speed 4G On 3 February 2016, BT announced a new add-on service called Extra Speed 4G for BT Mobile customers, allowing them to access even faster upload and download speeds than standard 4G, provided they are in an Extra Speed 4G area. The speeds can reach a maximum of up to 60Mbit/s and the service cost
https://en.wikipedia.org/wiki/Caret%20%28disambiguation%29
Caret may refer to: A caret is a free-standing character used in computing. Caret (proofreading), the proofreader's insertion symbols Circumflex, the diacritic in â, ê, î, ô, û. Other CARET Brain Mapping Software Caret (surname), people with the surname Caret Caret or insertion point, a blinking vertical bar indicating where typed text will be inserted when using a cursor (user interface) Caret navigation (or caret browsing), a blinking vertical bar in a text field CARET, the beta-Carotene and Retinol Efficacy Trial See also Philip L. Carret Carrot (disambiguation) Karat (disambiguation) (includes Karet)
https://en.wikipedia.org/wiki/Tharolian%20Tunnels
Tharolian Tunnels is a fixed shooter for the Apple II family of computers programmed by Rod Nelsen and published by Datamost in 1982. The game is similar to Space Invaders. Premise Softdisk magazine, issue 76, gives this brief description of game's premise: "Free the planet Tharolia from rule by maniacal machines." Similar in style to Space Invaders and Datamost's Cavern Creatures, the game puts you in control of a single armed spacecraft pitted against numerous waves of attacking aliens. Gameplay The player first selects from three levels of difficulty—1) Pilot, 2) Captain, or 3) Commander—and then faces the first challenge, an attack by a slowly descending formation of aliens. This level closely parallels Space Invaders, with the aliens methodically sweeping from side to side, firing at the player, dropping slightly on each pass, and increasing in speed as their numbers dwindle. Unlike Space Invaders, the player has no protective barriers and must also dodge fiery meteors. Subsequent levels throw different challenges at the player, such as carefully navigating down narrow, winding tunnels, dodging and attacking oncoming aliens and passing through pulsing energy barriers. Players begin with three ships, each of which begins with a supply of fuel that it steadily consumes. The game ends when the last ship is destroyed. References Apple II games Apple II-only games 1982 video games Datamost games Fixed shooters Video game clones Video games developed in the United States Single-player video games
https://en.wikipedia.org/wiki/Normality%20test
In statistics, normality tests are used to determine if a data set is well-modeled by a normal distribution and to compute how likely it is for a random variable underlying the data set to be normally distributed. More precisely, the tests are a form of model selection, and can be interpreted several ways, depending on one's interpretations of probability: In descriptive statistics terms, one measures a goodness of fit of a normal model to the data – if the fit is poor then the data are not well modeled in that respect by a normal distribution, without making a judgment on any underlying variable. In frequentist statistics statistical hypothesis testing, data are tested against the null hypothesis that it is normally distributed. In Bayesian statistics, one does not "test normality" per se, but rather computes the likelihood that the data come from a normal distribution with given parameters μ,σ (for all μ,σ), and compares that with the likelihood that the data come from other distributions under consideration, most simply using a Bayes factor (giving the relative likelihood of seeing the data given different models), or more finely taking a prior distribution on possible models and parameters and computing a posterior distribution given the computed likelihoods. A normality test is used to determine whether sample data has been drawn from a normally distributed population (within some tolerance). A number of statistical tests, such as the Student's t-test and the one-way and two-way ANOVA, require a normally distributed sample population. Graphical methods An informal approach to testing normality is to compare a histogram of the sample data to a normal probability curve. The empirical distribution of the data (the histogram) should be bell-shaped and resemble the normal distribution. This might be difficult to see if the sample is small. In this case one might proceed by regressing the data against the quantiles of a normal distribution with the same mean and variance as the sample. Lack of fit to the regression line suggests a departure from normality (see Anderson Darling coefficient and minitab). A graphical tool for assessing normality is the normal probability plot, a quantile-quantile plot (QQ plot) of the standardized data against the standard normal distribution. Here the correlation between the sample data and normal quantiles (a measure of the goodness of fit) measures how well the data are modeled by a normal distribution. For normal data the points plotted in the QQ plot should fall approximately on a straight line, indicating high positive correlation. These plots are easy to interpret and also have the benefit that outliers are easily identified. Back-of-the-envelope test Simple back-of-the-envelope test takes the sample maximum and minimum and computes their z-score, or more properly t-statistic (number of sample standard deviations that a sample is above or below the sample mean), and compares it to the 68–95–99.7 rule
https://en.wikipedia.org/wiki/Masao%20Takiyama
is a Japanese anime producer and production designer who is currently the president and representative director of the Japanese anime satellite television network AK Holdings, Animax, Kids Station, AXN and Mystery Channel. Each subsidiaries of Sony Pictures Entertainment Japan. Biography A noted anime producer and production designer, Takiyama first began his career in anime with Fuji Creative Corporation, a subsidiary of Fuji Television, where he was influential for producing numerous noted anime series and licensing them for release across several overseas and international markets, including Europe. He first joined Sony Pictures Entertainment Japan in 1998, being influential in launching Animax, which became the first ever television network dedicated solely to anime. He also produced the acclaimed Satoshi Kon-directed films Tokyo Godfathers and Paprika, and has sat on numerous well-known summits on Japanese animation. In addition to his management and production responsibilities, Takiyama has also sat on the panels of numerous Animax events. He has received a bachelor of arts degree of the Department of Literature of Kokugakuin University in 1973. Productions Anime television series Serendipity Monogatari: Pyua-tō no Nakama-tachi (1983) Time Travel Tondekeman (1989) Ningyo Hime Marina no Bōken (1991) Ashita e Free Kick (1992) Jura Tripper (1995) Kogepan (2001) Hungry Heart: Wild Striker (2002–03) Ultra Maniac (2003) Aishiteruze Baby (2004) Gallery Fake (2005) Jinzō Konchū Kabuto Borg VXV (2006–2007) Jūsō Kikō Dancouga Nova (2007) Persona: Trinity Soul (2008) Kurozuka (2008) Viper's Creed (2009) Live-action series Ultra Q: Dark Fantasy (2004) OVA Key the Metal Idol (1994) Ultra Maniac (2002) Films The Lawnmower Man (1992) Screamers (1995) Metropolis (2001) Tokyo Godfathers (2003) Steamboy (2004) Paprika (2006) Resident Evil: Degeneration (2008) References External links Takiyama Masao Takiyama Masao Takiyama Masao Takiyama Masao Takiyama Masao Takiyama Masao Year of birth missing (living people)
https://en.wikipedia.org/wiki/KDLG%20%28AM%29
KDLG is a non-commercial, public and community radio station in Dillingham, Alaska, broadcasting on 670 AM. Station programming includes a mix of nationally available NPR shows, Alaska Public Radio Network and local news, and music. It came on the air in 1975. KDLG is a Class A station broadcasting on the clear-channel frequency of 670 kHz. Like most public broadcasters, the station seeks contributions from listeners via annual fund-drives but, unlike most, does not give those contributors a direct vote on the management or programming of the station. The broadcasting license and management is entirely held by the Dillingham Public School District. The station features services unique to the community, such as radio programs like Open Line, a call-in show; Bristol Bay Messenger, a messaging service for listeners in remote areas; the Trading Post, an on-air classifieds of items for sale or trade; and Economic Opportunities, which lists job openings by private employers and fishermen — as well as syndicated programs such as the weekly Pink Floyd show "Floydian Slip." Programming is repeated on co-owned KIGG in Igiugig and KTOG in Togiak, and on KNSA in Unalakleet, a station owned by Unalakleet Broadcasting: External links DLG DLG NPR member stations Radio stations established in 1976 1976 establishments in Alaska
https://en.wikipedia.org/wiki/KUCB%20%28FM%29
KUCB is a non-commercial radio station in Unalaska, Alaska, broadcasting on 89.7 FM. It signed on in October 2008 to replace KIAL 1450 AM. KUCB generally broadcasts local programming, plus programming from National Public Radio, Native Voice One and Alaska Public Radio. The KIAL radio and television stations were formerly owned by the municipality of Unalaska; due to municipal cutbacks they now operate as an independent non-profit organization dependent largely on individual donors. Shortly after its sell-off, KIAL, which only broadcast at 50 watts, moved to the FM dial as KUCB, with a stronger signal. Television KUCB also operates KUCB-LP a 10-watt low-powered television station on channel 8. The majority of the channel's schedule consists of a community bulletin board, although several hours of locally produced programs are also shown. While some sources identify the station as K08IW, FCC records indicate that a station with these calls became KIAL-LP on August 5, 2005, with KUCB-LP assigned on August 15, 2008, to Unalaska Community Broadcasting Inc. in Dutch Harbor, Alaska to replace the KIAL-LP calls. As of 2022, the station is silent. References External links KUCB FM 89.7 / KUCB Channel 8 TV website Current status of KUCB-LP in the FCC database KUCB-LP 8 on RECnet broadcast query UCB Aleutians West Census Area, Alaska Non-profit organizations based in Alaska NPR member stations Radio stations established in 2005 UCB UCB Unalaska, Alaska
https://en.wikipedia.org/wiki/Hardware%20functionality%20scan
A hardware functionality scan (HFS) is conducted in order to verify that a certain device is really what it claims to be. It is patented by Microsoft. Some operating systems only send copy protected content, such as movies, to an output device, such as the screen, if that device is able to protect the content from being tapped in an unprotected format. This mechanism can be circumvented by letting fake hardware claiming to be a trusted device. HFS prevents this by letting the device perform certain tasks which are hard to emulate. Problems In order to support open-source drivers, a hardware manufacturer has to reveal some details about their product, but HFS requires this information to be kept secret. The problem with generic drivers is that the HFS requires individual drivers for each variant of a product to make them distinguishable, drivers have to account for implementation details instead of using abstract functionality models. A hardware manufacturer has to have their product's HFS fingerprint listed in the database of trusted hardware in order to make it work under newer Windows operating systems. Thus, Microsoft dictates the conditions under which a device is accepted. The manufacturer may be required to implement certain DRM-features, for which they have to pay a royalty to its respective inventor. References Digital rights management systems Proprietary hardware
https://en.wikipedia.org/wiki/KUHB-FM
KUHB-FM is a non-commercial radio station in St. Paul, Alaska, broadcasting on 91.9 FM. The station airs public radio programming from the National Public Radio network and the BBC World Service. KUHB also airs some locally originated programming. KUHB carries daily news programming from KMXT in Kodiak and from the Alaska Public Radio Network. KUHB also airs Pacifica's Democracy Now program in the mornings. See also List of community radio stations in the United States External links KUHB official website KUHB Facebook Page UHB-FM KUHB-FM UHB-FM Radio stations established in 1986 1986 establishments in Alaska Community radio stations in the United States Saint Paul Island (Alaska) Radio stations established in 1984
https://en.wikipedia.org/wiki/Paco%20Nathan
Paco Nathan (born 1962) is an American computer scientist and early engineer of the World Wide Web. Nathan is also an author and performance art show producer who established much of his career in Austin, Texas. Early life Paco Nathan was brought up in San Luis Obispo, California. He studied mathematics and computer science at Stanford University, specializing in user interface design and artificial intelligence, with Douglas Lenat as graduate advisor. He received a teaching fellowship during 1984–1986, under the direction of Stuart Reges, to create a course called CS1E, as a peer-teaching introduction to using the Internet, informally called "PCs for Poets". It has since grown to become the popular Residential Computing program on campus. Career Nathan collaborated with Robby Garner and the Italian researcher Luigi Caputo, President of Alma Research Centre, on one of the first web chatterbots, named Barry DeFacto, in 1995. The three have worked together on several related projects, including the JFRED open source project for developing Java-based chat bots. They used JFRED in BBC Television's "Tomorrow's World MegaLab Experiment" and attained a 17% Turing percentage during what was the largest online Turing test at the time. He was a co-founder (with Jon Lebkowsky) and president of FringeWare, Inc., and the editor of FringeWare Review. FringeWare, founded in 1992, was one of the early commercial sites on the Internet. It experimented with mixing subcultural analysis and ecommerce, hence the name "fringe" plus "ware". Through work at FringeWare in support of small press publishers and fringe subcultures, Nathan also helped produce a series of performance art shows during 1997–1999, including events for Robert Anton Wilson, Survival Research Laboratories, Church of the Subgenius, RTMark, and Negativland. FringeWare was later used as a pattern for part of the organization of the Viridian design movement. Nathan has written for several other publications including O'Reilly Net, Wired, Whole Earth Review, Mondo 2000, and was a contributing editor for Boing Boing during the early 1990s. His first article for Mondo 2000 about the IBVA brainwave interface system was credited as inspiration for the song Hi-Tech Hippies by Yellow Magic Orchestra. Other popular writings have included a parody (nEurorAncid) of the cyberpunk novel Neuromancer, and court-room reporting on behalf of a newly launched Wired during the federal trial of Steve Jackson Games v. US Secret Service. More recent work has focused on applying aspects of systems theory for computer network applications. Nathan led an engineering team at Symbiot to develop software for monitoring and visualizing risk metrics of complex network security systems. That work received an Apple Design Award in 2004, was cited as a source for the United Nations UNCTAD Information Economy Report in 2005, and spun off as an open source project called OpenSIMS. During his period at Symbiot, Nathan helped pi
https://en.wikipedia.org/wiki/KTKN
KTKN (930 AM) is an American commercial radio station airing talk and hot adult contemporary music programming in Ketchikan, Alaska. It is owned and operated by Alaska Broadcast Communications. The studios are at 526 Stedman Street in Ketchikan, with sister station KGTW and next door from its other sister station KFMJ. KTKN programming is also heard on 97.5 FM from translator K248AI; the station holds a permit for a second translator facility. History The current KTKN license, which dates to 1942, is the successor of the first station to operate in Ketchikan. KGBU KGBU was granted its first license to operate on July 29, 1926. It was owned by Roy Thornton, with the licensee soon changed to the Alaska Radio Service Company. As part of General Order 40 in 1928, it relocated from 610 to 900 kilohertz. A fire on December 26, 1931, destroyed the station and its two transmitters. KGBU affiliated with the Mutual Broadcasting System in November 1940 and was its first affiliate in the territory, receiving Mutual programs from the network's affiliates in Seattle and Tacoma. Alongside Mutual came the Don Lee Network hookup, giving the West Coast regional network its 33rd outlet. It was the first time any Alaska radio station had been affiliated with one of the major networks. In early 1942, KGBU went off the air permanently. Its owners, Mr. and Mrs. Jim Britton, turned over the property to a local bank, saying that wartime conditions had caused the withdrawal of national advertising accounts and made it impossible to continue. KTKN at wartime On July 17, 1942, Edwin A. Kraft applied to the Federal Communications Commission for a new radio station to be located in Ketchikan and using the facilities, including studio, of KGBU, which the station's creditors were to sell to him. Kraft owned radio station KINY in Juneau and the Seattle-based Northwest Radio Advertising Company. The FCC granted the application on August 18. Ketchikan's new radio station debuted in a time of turmoil. In July 1942, the Board of War Communications by order took control of all civilian communications facilities in Alaska, including the three remaining radio stations in the territory. Additionally, a wartime freeze order meant that the FCC only authorized six new radio stations all year, just one of them requiring new equipment. Regular programs over KTKN began on November 14, 1942. Through the Office of War Information, KTKN aired transcriptions of network programs flown to Alaska by military planes for the benefit of soldiers stationed there. The OWI purchased eight hours of air time a day on the territory's four stations in this endeavor. Later in the war, KTKN and KINY presented programs produced by Army, Navy and Coast Guard combat forces. Peacetime expansion After the war, Kraft became a key player in Alaska radio, and KTKN along with him. The Kraft stations were two of the three charter members of Alaska's first state network, the Alaska Broadcasting System, which wa
https://en.wikipedia.org/wiki/Emancipation%20and%20Liberation
Emancipation and Liberation is a journal produced by the Republican Communist Network, a former platform of the Scottish Socialist Party. It was established in Spring 2002. Since its establishment, the journal has hosted a number of debates within the left. The longest running has been the debate in response to Neil Davidson's Discovering the Scottish Revolution 1692–1746. Starting in Issue 5, Autumn 2003 with Allan Armstrong's Broadswords and Bayonets. Challenging left nationalist and left unionism in the SSP the debate continued through to Issue 10, Summer 2005 with Caught Between the Covenant and the Clans. Other information Emancipation and Liberation is part of the Republic Of Letters. References External links 2002 establishments in Scotland Political magazines published in the United Kingdom Quarterly magazines published in the United Kingdom Magazines established in 2002 Mass media in Dundee
https://en.wikipedia.org/wiki/Mobile%20porn
Mobile porn, also known as mobile adult content, mobile erotica or cellphone adult content, is pornography transmitted over mobile telecommunications networks for consumption on mobile devices (mainly mobile phones, tablets and smartphones). History Just like the internet and pay TV, the adult entertainment industry was one of the first forms of mass media to embrace mobile devices as a new means to distribute content. During 2002, Private Media Group became the first adult media company to employ a dedicated mobile specialist. This initiative led to the industry's first adult SMS services, erotic mobile content distribution and mobile internet (WAP) site, called "Private Mobile", offering a small range of videos directly to their consumers. This service was intended for the increasing range of Private consumers using feature phones in Europe with colour screens. From the mid-2000s onwards, many mobile network operators eventually deployed age verification systems and industry-regulated explicitness grading levels that gradually allowed mobile erotica to be legally purchased through gated mobile operator portal communities only by consenting adults. With the onset of smartphones in 2007 and portable tablet computers thereafter, more and more consumers in developed markets have since left these gated mobile operator communities and now browse the internet on their mobile and apps instead for their mobile erotica. Widespread adoption of Apple's iPhone was initially expected to encourage growth in the mobile erotica industry. Following the release of the original iPhone in 2007, the search term "iPhone Porn" spiked considerably in popularity. with 37% of iPhone users watching video on their iPhone However, Apple chairman Steve Jobs made it clear that no adult content would ever be sold from Apple's App Store, and thousands of adult apps have been banned on the App Store. However, Apple's ban on adult apps has been criticized as being impractical and ineffective. Other companies in the mobile and video industries situated themselves to take advantage of this trend. Google built a new phone system called Google Play that supports any application within reasonable decency guidelines. Since then, dedicated adult-only app stores like MiKandi and other mobile internet publishers have benefited from this gap in the market instead. Following its inception in 2002, the mobile erotica business was expected to grow to a market value of $2.3 billion within its first eight years. North America The North American mobile erotica market differs from Europe in that carriers were slow to allow adult sites to use their subscriber payment mechanisms such as SMS, slowing market growth. Alternate business models involve offering free videos in the 'tube' style of websites with advertising funding. For the cost of viewing an ad, users can get free video clips. Verizon Wireless and Sprint Nextel Corporation announced as late as 2008 that they would allow some
https://en.wikipedia.org/wiki/Computational%20logic
Computational logic is the use of logic to perform or reason about computation. It bears a similar relationship to computer science and engineering as mathematical logic bears to mathematics and as philosophical logic bears to philosophy. It is synonymous with "logic in computer science". The term “computational logic” came to prominence with the founding of the ACM Transactions on Computational Logic in 2000. However, the term was introduced much earlier, by J.A. Robinson in 1970. The expression is used in the second paragraph with a footnote claiming that "computational logic" is "surely a better phrase than 'theorem proving', for the branch of artificial intelligence which deals with how to make machines do deduction efficiently". In 1972 the Metamathematics Unit at the University of Edinburgh was renamed “The Department of Computational Logic” in the School of Artificial Intelligence. The term was then used by Robert S. Boyer and J Strother Moore, who worked in the Department in the early 1970s, to describe their work on program verification and automated reasoning. They also founded Computational Logic Inc. Computational logic has also come to be associated with logic programming, because much of the early work in logic programming in the early 1970s also took place in the Department of Computational Logic in Edinburgh. It was reused in the early 1990s to describe work on extensions of logic programming in the EU Basic Research Project "Compulog" and in the associated Network of Excellence. Krzysztof Apt, who was the co-ordinator of the Basic Research Project Compulog-II, reused and generalized the term when he founded the ACM Transactions on Computational Logic in 2000 and became its first Editor-in-Chief. See also Logic programming Automated theorem proving Type theory Formal verification References Further reading Logic in computer science Computational fields of study
https://en.wikipedia.org/wiki/Scaly-tailed%20possum
The scaly-tailed possum (Wyulda squamicaudata) is found in northwestern Australia, where it is restricted to the Kimberley. They are light grey over most of the body and have relatively short ears and muzzle. The mostly hairless tail is able to curl around the branches of trees as the possum forages for food, its grasp is aided by rasp-ilke scales and is strong enough to hold its own weight. The species favours complex rocky terrain with dense thickets of vines and the fruiting trees that provide much of their diet. Taxonomy The new species was presented to the Royal Society of Western Australia in 1918 by the biologist Wilfred Backhouse Alexander, while he was employed by the Western Australian Museum, and published in the society's journal in the same year. The description was accompanied by a reproduction of a painting by George Pitt Morison, and two photographs of the specimen's skull were also included. The holotype was reported to have been collected in the Kimberley region at Violet Valley Station, and forwarded to Walter Kingsmill who presented the specimen to the Perth Zoological Gardens. Alexander assigned the species to a new genus of the phalangerid family, Wyulda, deriving the name from an indigenous word used by the people at Lyons River for the local and common possum; the pronunciation provided by the author is "weeoolda". Aside from scaly-tailed possum, the recorded names for the species include ilangurra and yilangal (the latter by the Wunambal people of Mitchell Plateau). The describing author proposed the common name scaly-tailed opossum, but gave an alternative as scaly tailed phalanger if the use of the term for the American marsupial opossum was considered inappropriate. As the common name implies, its distinguishing feature is a hairless, scaly tail. Description An arboreal species of the Phalangeridae family with short ears and muzzle, and a body with a stocky build. The total length of the head and body is 300 to 390 millimetres, the distinctive tail is 300 millimetres, and their weight ranges from 1.3 to 2.0 kilograms. The coloration of the pelage is light grey with brown flecking over the upper parts, becoming a rufous colour toward the base of tail and over the rump; an indistinct mid-line extends along the back of the possum, from the tail to between the eyes. The fur at the underside is creamy white. A densely furred region extends a short distance over the base of the tail, which is otherwise naked. Wyulda squamicaudata is distinguished by rasp-like scales over the surface of their strongly prehensile tail. Wyulda squamicaudata is a slow growing species, the rate of increase in skull length for juveniles is 0.26 mm per day. The weight when the female reaches a reproductive age at two years old is 1.1 kg. less than the weight range of fully mature individuals. There is no difference in weight between genders and is not known to be seasonally variable. The species has been allied within the family Phalangeri
https://en.wikipedia.org/wiki/List%20of%20online%20databases
This is a list of online databases accessible via the Internet. A Abandoned & Little-Known Airfields Academic OneFile Acronym Finder Aeiou Encyclopedia Airiti Inc Airliners.net All Media Guide Allgame (down) Allmovie Allmusic American National Corpus Animal Diversity Web Animal Genome Size Database Animator.ru Arachne ArchINFORM Archive site ArtCyclopedia Amazon.com Aviation Safety Reporting System B Bank of English Beilstein database BiblioPage.com Bibliotek.dk Big Cartoon DataBase Big Comic Book DataBase Bioinformatic Harvester BoardGameGeek C CAMPUS Catholic-Hierarchy.org CellarTracker ChEBI Chemical Abstracts Service Chessgames.com China Pollution Map Database CIDOB Foundation Cinema and Science CiteSeer ClassRanked.com Collection of Computer Science Bibliographies Comic book price guide Comics Buyer's Guide Credo Reference Croatian National Corpus Current Biography D DBLP DIALOG Dictionary of Canadian Biography Discogs Displayespecification E Earth Human STR Allele Frequencies Database ELDIS EMBASE Encyclopedia Astronautica Encyclopedia Mythica English Short Title Catalogue Entrez Everyone's a Critic F Factiva Facts on File Fashion Model Directory Filmarchives online Filmweb Find a Grave FINDbase (the Frequency of INherited Disorders database) FishBase Flags of the World Flora Europaea Fragrantica G Gallica GameRankings GeneNetwork GeoNames Gesamtkatalog der Wiegendrucke Getty Thesaurus of Geographic Names Golm Metabolome Database Google Grand Comics Database Gsmarena H Hong Kong Movie DataBase Hoover's HotPads.com I IGDB (Internet Games Database) IMDb (Internet Movie Database) INDUCKS IndexMaster Informit (database) Inorganic Crystal Structure Database Interment.net Internet Archive Internet Broadway Database Internet Movie Cars Database Internet Movie Firearms Database Internet Off-Broadway Database Internet Public Library Internet Speculative Fiction Database Internet Theatre Database ISBNdb.com J Jewish Virtual Library Jointly Administered Knowledge Environment JSTOR K Kdo byl kdo Killer List of Videogames Kimovil L Lattes Lesson Planet LexisNexis The Literary Encyclopedia M Media Bias/Fact Check MedlinePlus Metacritic Metropolitan Travel Survey Archive MICAD Mindat.org MobyGames Movie Review Query Engine Moviemistakes.com MovieTome MSDSonline MusicBrainz MyAnimeList MySql N Names Database NEO CANDO Newsknowledge Nichigai WHO NNDB O Omniglot On-Line Encyclopedia of Integer Sequences Open Source Vulnerability Database P Paradisec PHI-base Philosophy Research Index Plant DNA C-values Database Plants for a Future Price guide ProBiS ProQuest Proteomics Identifications Database Psephos PsycINFO PubChem PubMed Central Q Questia – defunct R Rate Your Music REBASE Restriction Enzyme Database RedLightGreen Reptile Database Roller Coaster DataBase Roud Folk Song Ind
https://en.wikipedia.org/wiki/Dot%20plot%20%28statistics%29
A dot chart or dot plot is a statistical chart consisting of data points plotted on a fairly simple scale, typically using filled in circles. There are two common, yet very different, versions of the dot chart. The first has been used in hand-drawn (pre-computer era) graphs to depict distributions going back to 1884. The other version is described by William S. Cleveland as an alternative to the bar chart, in which dots are used to depict the quantitative values (e.g. counts) associated with categorical variables. Of a distribution The dot plot as a representation of a distribution consists of group of data points plotted on a simple scale. Dot plots are used for continuous, quantitative, univariate data. Data points may be labelled if there are few of them. Dot plots are one of the simplest statistical plots, and are suitable for small to moderate sized data sets. They are useful for highlighting clusters and gaps, as well as outliers. Their other advantage is the conservation of numerical information. When dealing with larger data sets (around 20–30 or more data points) the related stemplot, box plot or histogram may be more efficient, as dot plots may become too cluttered after this point. Dot plots may be distinguished from histograms in that dots are not spaced uniformly along the horizontal axis. Although the plot appears to be simple, its computation and the statistical theory underlying it are not simple. The algorithm for computing a dot plot is closely related to kernel density estimation. The size chosen for the dots affects the appearance of the plot. Choice of dot size is equivalent to choosing the bandwidth for a kernel density estimate. In the R programming language this type of plot is also referred to as a stripchart or stripplot. Cleveland dot plots Dot plot may also refer to plots of points that each belong to one of several categories. They are an alternative to bar charts or pie charts, and look somewhat like a horizontal bar chart where the bars are replaced by a dots at the values associated with each category. Compared to (vertical) bar charts and pie charts, Cleveland argues that dot plots allow more accurate interpretation of the graph by readers by making the labels easier to read, reducing non-data ink (or graph clutter) and supporting table look-up. Dot Chart in process mapping The term Dot chart is also used in the area of process mapping. This is a simplified flowchart process flow chart in which columns are tasks, rows are roles, and dots that are inserted at the intersection of tasks and roles represent a sequence of steps. In other words, it is an extensive RACI table with additional information about the sequence of steps in the process.Example of tool for dot chart process mapping See also Data and information visualization Scatter plot References Other references Wild, C. and Seber, G. (2000) Chance Encounters: A First Course in Data Analysis and Inference John Wiley and Sons. External links
https://en.wikipedia.org/wiki/KRAW
KRAW was a non-commercial radio station in Sterling, Alaska, broadcasting to the Kenai, Alaska, area on 90.1 FM. KRAW signed on as KWMD on July 26, 2003, programming a non-commercial modern rock format. KRAW ceased continuous broadcast on August 2, 2004, pending FCC approval of technical changes between several Alaska Educational Radio System (AERS) stations including a change in frequency. However, KRAW has periodically broadcast for short periods to maintain the license. On March 10, 2008, AERS filed with the FCC for alternative technical changes. KRAW's license expired on May 18, 2013, due to the station having been dark for more than a year. The FCC deleted the KRAW call sign from their database on February 5, 2014. References External links Query the FCC's FM station database for KRAW RAW Country radio stations in the United States Radio stations established in 2003 Defunct radio stations in the United States Radio stations disestablished in 2014 2003 establishments in Alaska 2014 disestablishments in Alaska RAW
https://en.wikipedia.org/wiki/List%20of%20Billboard%20Hot%20100%20number%20ones%20of%202007
The Billboard Hot 100 is a chart that ranks the best-performing singles of the United States. Published by Billboard magazine, the data are compiled by Nielsen SoundScan based collectively on each single's weekly physical and digital sales, and airplay. In 2007, 17 singles reached the top spot on the chart. An 18th single, Beyoncé's "Irreplaceable", began a run at the top in 2006 which continued into 2007. In 2007, eight acts achieved their first US number-one single, either as a lead artist or featured guest: Mims, Avril Lavigne, Maroon 5, T-Pain, Yung Joc, Plain White T's, Sean Kingston, and Soulja Boy Tell 'Em. Producer Timbaland earned his first number-one single as lead artist with "Give It to Me"; he had previously appeared as featured guest on singer Nelly Furtado's number-one single "Promiscuous". T-Pain, Justin Timberlake, Nelly Furtado and Fergie each earned two number-one singles, either as a lead artist or featured guest. Three number-one singles tied for the longest run on the chart in 2007: Beyoncé's "Irreplaceable", Rihanna's "Umbrella", and Soulja Boy Tell 'Em's "Crank That (Soulja Boy)" all topped the chart for seven weeks; the last of these was non-consecutive. However, "Irreplaceable", which started its peak position in three issues the previous year, is credited to by Billboard magazine as 2006's longest-running single. To this effect, "Umbrella" and "Crank That (Soulja Boy)" are the longest-running singles of 2007. Other singles with extended chart runs include singer Alicia Keys' "No One" which stayed at number one for five straight weeks. "Irreplaceable" is the best-performing single of the calendar year, topping the Year-End Hot 100 singles of 2007 for seven consecutive weeks. Band Maroon 5's "Makes Me Wonder" is noted for its jump from 64th to 1st place on the Billboard Hot 100, making it the largest leap of 2007. "Umbrella", which occupied the top slot for seven of summer's thirteen weeks, has been credited by the music press as 2007's Song of the Summer. Chart history Number-one artists See also 2007 in music List of Billboard number-one singles Billboard Year-End Hot 100 singles of 2007 References Additional sources Fred Bronson's Billboard Book of Number 1 Hits, 5th Edition () Joel Whitburn's Top Pop Singles 1955-2008, 12 Edition () Joel Whitburn Presents the Billboard Hot 100 Charts: The 2000s () Additional information obtained can be verified within Billboards online archive services and print editions of the magazine. United States Hot 100 2007
https://en.wikipedia.org/wiki/List%20of%20Billboard%20200%20number-one%20albums%20of%202007
The highest-selling albums and EPs in the United States are ranked in the Billboard 200, published by Billboard magazine. The data are compiled by Nielsen Soundscan based on each album's weekly physical and digital sales. In 2007, there were 37 albums that reached peak position, in 52 issues of the magazine. Noël, a Christmas album by American singer-songwriter Josh Groban, was the longest-running album of 2007, topping the chart for four consecutive weeks in December. Its four-week consecutive run gained Noël the credit as the first Christmas album to have achieved the feat in the chart's 51-year history. Following Groban's appearance at The Oprah Winfrey Show, sales of the album logged at 405,000, fueling the album to peak at number one and becoming Groban's best sales week ever. Noël is the only Christmas-themed record to have topped the Billboard 200 since American saxophonist Kenny G's 1994 Miracles: The Holiday Album. Noël had accumulated sales of nearly 2.8 million copies by the end of the year, becoming the best-selling album of 2007. Canadian singer Avril Lavigne scored her second number-one album The Best Damn Thing. High School Musical 2, the soundtrack to the Disney Channel film of the same name, spent four straight weeks at the top spot. The soundtrack's first-week sale of 615,000 copies made it one of the albums with biggest debut figures of 2007. The soundtrack sold over 2.7 million units in 2008, becoming the second-best-selling album. High School Musical 2 is one of the two soundtrack albums to have reached number one on the chart, the other being Dreamgirls: Music from the Motion Picture. Linkin Park's Minutes To Midnight becomes the band's third number-one album. The album sells over 620,000 copies in its first week, becoming the third highest first week album sales for 2007. The album eventually sells over 2 million copies during the year, becoming the seventh best-selling album of the year. American singer Alicia Keys' As I Am also topped the chart for four weeks, although they were non-consecutive. It debuted on the Billboard 200 for selling 742,000 copies, the highest figure achieved for a solo female artist since Norah Jones' Feels Like Home moved one million copies in 2004. Rapper Kanye West's Graduation took the distinction as the album with the highest sales in a week, netting over 957,000 units. It is the best sales week by any album since rapper 50 Cent's The Massacre opened with over 1.1 million copies in March 2005. Rock band The Eagles landed atop the chart with Long Road out of Eden, which sold 711,000 copies, the band's first studio album in 30 years. Sold through retailers Wal-Mart, Sam's Club and the band's web site, it marked the first time Billboard magazine allowed exclusive albums to appear on the Billboard 200. Rapper Jay-Z produced his 10th number-one album, American Gangster, placing him second, tying with Elvis Presley, in the acts with the most number-one albums in the history of Billboard 200, only
https://en.wikipedia.org/wiki/Turkish%20State%20Meteorological%20Service
Turkish State Meteorological Service () is the Turkish government bureau commissioned with producing the meteorological and climatic data pertaining to Turkey. It is responsible to the Ministry of Environment and Forestry. History The first meteorological organizations in Turkey was Rasâdât-i Cevviwas organization that was established on November 12, 1925. In the following years, in accordance with the law No 3127, it was requested to form a single meteorological service working on a regular. On May 15, 1957, with the order No. 6967 it was attached to the Ministry of Agriculture. On January 8, 1986, the Service took its current name with the law No 3524. External links Official website of the Service References Governmental meteorological agencies in Europe Governmental meteorological agencies in Asia Meteorological Organizations based in Ankara Ministry of Agriculture and Forestry (Turkey)
https://en.wikipedia.org/wiki/High%20Performance%20Computing%20Act%20of%201991
The High Performance Computing Act of 1991 (HPCA) is an Act of Congress promulgated in the 102nd United States Congress as (Pub.L. 102–194) on December 9, 1991. Often referred to as the Gore Bill, it was created and introduced by then Senator Al Gore, and led to the development of the National Information Infrastructure and the funding of the National Research and Education Network (NREN). The funding allocation was approximately $600 million. Background The act built on prior U.S. efforts of developing a national networking infrastructure, starting with the technological foundation of the ARPANET in the 1960s and continuing through the funding of the National Science Foundation Network (NSFnet) in the 1980s. The renewed effort became known in popular language as building the Information superhighway. It also included the High-Performance Computing and Communications Initiative and spurred many significant technological developments, such as the Mosaic web browser, and the creation of a high-speed fiber optic computer network. Development and passage Senator Al Gore developed the Act after hearing the 1988 report Toward a National Research Network submitted to Congress by a group chaired by UCLA professor of computer science Leonard Kleinrock, one of the creators of the ARPANET, which is regarded as the earliest precursor network of the Internet. The bill was enacted on December 9, 1991, and led to the National Information Infrastructure (NII) which Gore referred to as the "Information superhighway". President George H. W. Bush predicted that the Act would help "unlock the secrets of DNA," open up foreign markets to free trade, and a promise of cooperation between government, academia, and industry. Results The Gore Bill helped fund the National Center for Supercomputing Applications at the University of Illinois, where a team of programmers, including Netscape founder Marc Andreessen, created the Mosaic Web browser in 1993, the commercial Internet's technological springboard credited as beginning the Internet boom of the 1990s. Andreessen later remarked that 'If it had been left to private industry, it wouldn't have happened ... at least, not until years later.' Gore reiterated the role of government financing in American success in a 1996 speech when he, as vice president, said, "That's how it has worked in America. Government has supplied the initial flicker—and individuals and companies have provided the creativity and innovation that kindled that spark into a blaze of progress and productivity that's the envy of the world." CNN interview Following a 1999 CNN interview, then-Vice President Gore became the subject of some controversy and ridicule when his claim that he "took the initiative in creating the Internet" was widely quoted out of context or misquoted, with comedians and the popular media taking his expression as a claim that he had personally invented the Internet. George W. Bush, Gore's opponent in the 2000 presidential ele
https://en.wikipedia.org/wiki/HPCA
HPCA may refer to: High Performance Computing Act of 1991, a U.S. act of Congress Himachal Pradesh Cricket Association, a sports body in India HPCA (gene), which encodes the protein hippocalcin
https://en.wikipedia.org/wiki/TV%20Gazeta
Rede Gazeta (), also known as TV Gazeta or only Gazeta (in English, (the) Gazette Network) is a Brazilian television network based in São Paulo. History TV Gazeta was founded in 1970 in São Paulo. It is part of Cásper Líbero Foundation. It was one of the first Brazilian TV stations to broadcast in color in 1970, together with RecordTV, Rede Bandeirantes, Rede Globo, Rede Tupi and TV Cultura. In 1993 it merged with CNT (Central Nacional de Televisão, National Central Television), and its São Paulo local station became known CNT/Gazeta. In 2000, the partnership ended, and TV Gazeta turned into Rede Gazeta (Portuguese for Gazeta Network). Both networks are currently independent television networks. Programs Shows Nossa Noite com Rinaldi Faria Festa do Mallandro (1998-2002) Programa Ligação (1997-2001) Other programs 5 Discos A Máquina (2012-2016) Amor Concreto Cozinha Amiga Edição Extra Festa Sertaneja Gazeta Esportiva Hoje Tem (2011-2016) Jornal da Gazeta Jornal da Gazeta Edição das 10 LBF - Brazilian Women's Basketball League Mesa Redonda Mulheres O Mochileiro (2014-2015) Os Impedidos (2013) Ouça! (2015) Revista da Cidade Sempre Bela Todo Seu''''(2004-2019) Vem Comigo Você Bonita External links Official website Television networks in Brazil Mass media companies based in São Paulo Portuguese-language television networks Television channels and stations established in 1970
https://en.wikipedia.org/wiki/Chand%20sitara
Chand sitara is a popular reality television program patterned after American Idol; it airs on the Ariana TV satellite network and is dedicated to Afghan Music. "Chand Sitara" stands for "How Many Stars?" The program consists of music videos sent to the show by musicians. People then call in or email how many stars the song deserves and the winner is displayed a week later. The program is hosted by Naim Arzo and Omar Bakhtari (aka DJ Mast). The show airs on Tuesday nights from 7:30 to 10:00 pm Pacific time. Afghan television series
https://en.wikipedia.org/wiki/WRYT
WRYT is a radio station broadcasting out of Edwardsville, Illinois with a Catholic format. It broadcasts on AM frequency 1080 kHz and is part of the Covenant Network. Because WRYT shares the same frequency as "clear channel" station KRLD in Dallas/Fort Worth, Texas, the station broadcast during the daytime hours only until April 9, 2014. WRYT's studios are located on Hampton Avenue in St. Louis, while its transmitter is located near Edwardsville. History WRYT went on the air November 9, 1987, but while the station promoted itself as WRYT in local media, its callsign was legally WHRC (standing for original owners Horizon Radio Corporation) until February 4, 1988, when it exchanged call letters with TV channel 46 in Norwell, Massachusetts, which founder Bob Howe also owned. As a commercial station, WRYT broadcast adult standards music and news programming aimed at listeners in Edwardsville and Madison County, Illinois. The station was sold in 1992 to the Hometown Broadcasting Company, owned by Tom Lauher, of Creve Coeur, Missouri. Five years later, he sold the station to Covenant founder Tony Holman, whom he found "more serious and interested and less on a fishing expedition". Covenant Network began operating WRYT, its first station on May 1, 1997. References External links The Covenant Network WRYT / KHOJ Programming Schedule Catholic radio stations RYT Radio stations established in 1987 1987 establishments in Illinois
https://en.wikipedia.org/wiki/WIHM%20%28AM%29
WIHM (1410 AM) is a radio station broadcasting a Catholic format. Licensed to Taylorville, Illinois, United States, the station is currently owned by the Covenant Network. Programming of WIHM can also be heard on WOLG (95.9 FM) in Carlinville. 1410 AM was the original frequency of Taylorville's primary local station, WTIM, which broadcast at that frequency from its sign-on in 1952 until 1997 when it moved to 97.3 FM (now WRAN; WTIM is now heard on 870 AM). In 1998, 1410 was acquired by Covenant Network as its second station and received new WIHM call letters. References External links IHM Catholic radio stations Radio stations established in 1952 1952 establishments in Illinois
https://en.wikipedia.org/wiki/Pana
Pana or PANA may refer to: Pana (mythology), a god in Inuit religion PANA, in telecommunications, a Plain ANAlog loop Alarm circuit Protocol for carrying Authentication for Network Access, a network access authentication protocol Pana, used for PanaPress of Pan African NewsAgency Another name for punch marked coins used in India until the third century Panam (money) or fanam, modern obsolete currencies of India Pana, the term for a snow knife in Inuktitut Pana language, a language spoken in the Central African Republic Pa Na language, a language spoken in Hunan, China Pana language (Gur), a language spoken in Burkina Faso and Mali Pana Wave or Pana Wave Laboratory, a Japanese new religious group "Pana" (song), a 2016 single by Tekno People Paná (footballer), Angolan footballer Places Pana, Burkina Faso, a village in Balé Province, Burkina Faso Pana, Gabon Pana, Tibet Pana, Illinois, United States Pana, Ontario, Canada Paňa, a village in Nitra District, Slovakia Pana, Indonesia Pa-na, Burma Other uses Pana, a slang term for St Patrick's Street in Cork, Ireland See also Panna (disambiguation) Panar (disambiguation) Panam (disambiguation) Fanam (disambiguation)
https://en.wikipedia.org/wiki/Oregon%20Performance%20Reporting%20Information%20System
The Performance Reporting and Information System (PRISM) is a data system which collects and disseminates performance measurement data for individuals receiving workforce services from the U.S. state of Oregon government. To help inform decision-making of educators, administrators, and policy makers for program and service delivery, PRISM produces information about the effectiveness of workforce system programs and services. A suite of user-friendly reporting tools provides easy access for anyone who is interested in learning about the results that Oregon's workforce system produces for its customers. How PRISM Works Oregon's workforce system delivers a wide variety of services including job placement and training for youth and adults, and employment-related services for targeted populations. The workforce system also serves employers by providing job listings, applicant screening, and labor market information. In order to measure workforce system performance, PRISM collects and analyzes a wealth of administrative and demographic data from workforce and education partners. Workforce data include Temporary Assistance for Needy Families (TANF), Vocational Rehabilitation, SNAP (Food Stamps), Title I (Youth, Adults, and Dislocated Workers), Employment Services, Unemployment Insurance, and Trade Act (provides assistance to individuals who become totally or partially unemployed due to the impact of international trade). The PRISM Education partners provide a wealth of education and training data for students from kindergarten through higher education. The results of this analysis are published as a set of performance measures that describe how successfully workforce system customers find jobs, keep jobs, and improve their earning power through training and education. PRISM also measures how satisfied customers are with the services they receive. PRISM works by matching information about customers' workforce program participation against quarterly Unemployment Insurance wage records, data from Oregon's education system, and feedback obtained through customer satisfaction surveys. This information is combined into 12 performance measures that describe customer outcomes and experiences after they have received workforce and education services. Five of these measures relate to customers' employment and earnings; five summarize participant education and skill gain; two gauge customer satisfaction among businesses and individuals. PRISM was established by the Oregon Legislative Assembly by passage of the 2001 law S.B. 400 (ORS 657.734) which took effect in 2002. The system is governed by a steering committee comprising representative of the three cooperating agencies as mandated by the law, Oregon Employment Department, Oregon Higher Education Coordinating Commission and Oregon Department of Human Services, but remains otherwise independent of the represented agencies. References Performance Reporting Information System, Oregon 2002 establishments