source
stringlengths 32
199
| text
stringlengths 26
3k
|
---|---|
https://en.wikipedia.org/wiki/Vectra
|
Vectra may refer to the following:
Opel Vectra car (Chevrolet Vectra, Holden Vectra, Vauxhall Vectra)
Opel Vectra GTS V8 DTM car
HP Vectra computer series by Hewlett-Packard
Vectra AI, a private company specializing in artificial intelligence
Vectra (plastic), a brand of polymer products
Global Vectra Helicorp Limited
See also
Vector (disambiguation)
|
https://en.wikipedia.org/wiki/Who%20shot%20J.R.%3F
|
"Who shot J.R.?" is an advertising catchphrase that American network CBS created in 1980 to promote the television series Dallas. It referred to the fictional mystery surrounding a murder attempt against arch-villain J.R. Ewing (Larry Hagman) in the show's third-season finale "A House Divided". The mystery and its catchphrase became a global phenomenon, with international odds-makers setting odds for the culprit. The mystery was not resolved until the fourth episode of the fourth season titled "Who Done It" which aired eight months later, with an estimated 83 million American viewers tuning in, one of the most watched television broadcasts of all time. The catchphrase has a strong legacy in pop culture and the format helped popularize the cliffhanger ending for television series.
Plot
In the final scene of the 1979–80 season, J.R. Ewing (Larry Hagman) hears a noise outside his office, walks out to the corridor to look, and is shot twice by an unseen assailant. The episode, titled "A House Divided", was broadcast on March 21, 1980, and was written by Rena Down and directed by Leonard Katzman. Viewers had to wait all summer to learn whether J.R. would survive, and which of his many enemies was responsible.
J.R. Ewing was a villain on the series who regularly double-crossed business associates, plotted against his own family, called his wife Sue Ellen (Linda Gray) a "slut", and had her committed to a sanatorium so he could take custody of their infant son John Ross. Essentially all the other characters on the show were suspects.
Ultimately, in the "Who Done It?" episode which aired on November 21, 1980, the person who pulled the trigger was revealed to be Kristin Shepard (Mary Crosby). Kristin was J.R.'s scheming sister-in-law and mistress who shot him in a fit of anger. J.R. did not press charges, as Kristin claimed she was pregnant with his child as a result of their affair.
Production
Hagman had begun Dallas as a secondary character, but by 1980 he was the star. Advised by friend Carroll O'Connor that the shooting had made him very valuable, Hagman demanded a raise. While negotiating with the actor, CBS prepared to replace him by having J.R. receive facial reconstructive surgery (despite having received the bullet in his stomach). Production for the 1980–81 season began in June 1980 without Hagman. He returned to work ten days later with a new contract that paid him $100,000 per episode and royalties from J.R. Ewing merchandise. Viewers had to wait an additional two months to find out the answer to the famous question, however, as a strike by the Writers Guild of America began in July that delayed the production of most new network shows by eight weeks. During the delay, CBS showed reruns of early Dallas episodes featuring J.R. Ewing, helping the show's many new fans better understand his character.
Marketing and reception
T-shirts printed with such references as "Who Shot J.R.?" and "I Shot J.R." became common over the summer. Several media
|
https://en.wikipedia.org/wiki/Ipsilon
|
Ipsilon may refer to:
Ipsilon Networks, a defunct company
The Greek letter upsilon
The Latin letter Y
The Fedora Project's Ipsilon IdP
See also
Upsilon (disambiguation)
Ypsilon (disambiguation)
|
https://en.wikipedia.org/wiki/Metadata%20discovery
|
In metadata, metadata discovery (also metadata harvesting) is the process of using automated tools to discover the semantics of a data element in data sets. This process usually ends with a set of mappings between the data source elements and a centralized metadata registry. Metadata discovery is also known as metadata scanning.
Data source formats for metadata discovery
Data sets may be in a variety of different forms including:
Relational databases
NoSQL databases
Spreadsheets
XML files
Web services
Software source code such as Fortran, Jovial, COBOL, Assembler, RPG, PL/1, EasyTrieve, Java, C# or C++ classes, and thousands of other software languages
Unstructured text documents such as Microsoft Word or PDF files
A taxonomy of metadata matching algorithms
There are distinct categories of automated metadata discovery:
Lexical matching
Exact match - where data element linkages are made based on the exact name of a column in a database, the name of an XML element or a label on a screen. For example, if a database column has the name "PersonBirthDate" and a data element in a metadata registry also has the name "PersonBirthDate", automated tools can infer that the column of a database has the same semantics (meaning) as the data element in the metadata registry.
Synonym match - where the discovery tool is not just given a single name but a set of synonym.
Pattern match - in this case the tools is given a set of lexical patterns that it can match. For example, the tools may search for "*gender*" or "*sex*"
Semantic matching
Semantic matching attempts to use semantics to associate target data with registered data elements.
Semantic similarity - In this algorithm that relies on a database of word conceptual nearness is used. For example, the WordNet system can rank how close words are conceptually to each other. For example, the terms "Person", "Individual" and "Human" may be highly similar concepts.
Statistical matching
Statistical matching uses statistics about data sources data itself to derive similarities with registered data elements.
Distinct value analysis - By analyzing all the distinct values in a column the similarity to a registered data element may be made. For example, if a column only has two distinct values of 'male' and 'female' this could be mapped to 'PersonGenderCode'.
Data distribution analysis - By analyzing the distribution of values within a single column and comparing this distribution with known data elements a semantic linkage could be inferred.
Vendors
The following vendors (listed in alphabetical order) provide metadata discovery and metadata mapping software and solutions
Atlan (see )
BigHand/Esquire Innovations (see )
IBM
Imperva
Talend
InfoLibrarian Corporation (see )
MindHARBOR Metadata Database application (see )
Octopai - a Cross-Platform Metadata Discovery and Management Automation (see )
Revelytix (see )
Silver Creek Systems (see )
Stratio (see Data reliability is the base of succes
|
https://en.wikipedia.org/wiki/The%20Real%20News%20Network
|
The Real News Network (TRNN) is an independent, nonprofit news organization based in Baltimore, MD that covers both national and international news.
History
TRNN was founded by documentary producer Paul Jay and Mishuk Munier in September 2003, with the goal of creating a news network that made complicated concepts accessible to the average person.
TRNN moved to Baltimore in June 2014, with the focus of telling stories about urban America, specifically focusing on the city's issues, including crime, education, and housing that are found throughout the United States. Communications executive John Duda became the organization's executive director in June 2020.
TRNN does not accept funding from advertising, governments, or corporations - it is sustained through donations from viewers and foundations, and has a small for-profit segment.
Content
TRNN produces five-to-seven minute news reports available online or video on demand.
In 2016, former Black Panther Marshall "Eddie" Conway became the host and producer of "Rattling the Bars," a weekly investigative program about prison systems in the US and abroad.
Independent journalist Michael Fox's podcast "Brazil on Fire" is a joint project of The Real News Network and NACLA.
Staff
Editor-in-Chief Maximillian Alvarez was formerly a temporary warehouse worker, an experience which he says impacts whose stories he covers and how.
Investigative reporters Taya Graham and Stephen Janis were some of the first journalists to cover the story of Anton Black, a 19 year old who died after being pinned to the ground by police in rural Maryland.
Pulitzer prize-winning journalist and author Chris Hedges records his weekly digital television show, The Chris Hedges Report, in cooperation with The Real News Network.
Peabody award-winning radio talk show and podcast host Marc Steiner records his weekly show, The Marc Steiner Show, in cooperation with The Real News Network.
Boston Globe climate reporter Dharna Noor previously led the climate team at TRNN.
See also
Alternative media
Citizen journalism
Independent media
Watchdog journalism
References
External links
2007 establishments in Ontario
2007 establishments in the United States
Alternative journalism organizations
American news websites
Broadcasting websites
Canadian news websites
Citizen journalism
Internet properties established in 2007
Internet television channels
Investigative journalism
Media analysis organizations and websites
News agencies based in Canada
News agencies based in the United States
Mass media in Baltimore
Mass media in Toronto
|
https://en.wikipedia.org/wiki/Proprietary%20file%20format
|
A proprietary file format is a file format of a company, organization, or individual that contains data that is ordered and stored according to a particular encoding-scheme, designed by the company or organization to be secret, such that the decoding and interpretation of this stored data is easily accomplished only with particular software or hardware that the company itself has developed. The specification of the data encoding format is not released, or underlies non-disclosure agreements. A proprietary format can also be a file format whose encoding is in fact published, but is restricted through licences such that only the company itself or licensees may use it. In contrast, an open format is a file format that is published and free to be used by everybody.
Proprietary formats are typically controlled by a company or organization for its own benefits, and the restriction of its use by others is ensured through patents or as trade secrets. It is thus intended to give the licence holder exclusive control of the technology to the (current or future) exclusion of others.
Typically such restrictions attempt to prevent reverse engineering, though reverse engineering of file formats for the purposes of interoperability is generally believed to be legal by those who practice it. Legal positions differ according to each country's laws related to, among other things, software patents.
Because control over a format may be exerted in varying ways and in varying degrees, and documentation of a format may deviate in many different ways from the ideal, there is not necessarily a clear black/white distinction between open and proprietary formats. Nor is there any universally recognized "bright line" separating the two. The lists of prominent formats below illustrate this point, distinguishing "open" (i.e. publicly documented) proprietary formats from "closed" (undocumented) proprietary formats and including a number of cases which are classed by some observers as open and by others as proprietary.
Privacy, ownership, risk and freedom
One of the contentious issues surrounding the use of proprietary formats is that of ownership of created content. If the information is stored in a way which the user's software provider tries to keep secret, the user may own the information by virtue of having created it, but they have no way to retrieve it except by using a version of the original software which produced the file. Without a standard file format or reverse engineered converters, users cannot share data with people using competing software. The fact that the user depends on a particular brand of software to retrieve the information stored in a proprietary format file increases barriers of entry for competing software and may contribute to vendor lock-in concept.
The issue of risk comes about because proprietary formats are less likely to be publicly documented and therefore less future proof. If the software firm owning right to that format stops making s
|
https://en.wikipedia.org/wiki/Night%20Sky%20Network
|
Night Sky Network is an educational effort sponsored by NASA to help educate the public through astronomy clubs across the United States.
See also
List of astronomical societies
External links
http://nightsky.jpl.nasa.gov/
Amateur astronomy organizations
|
https://en.wikipedia.org/wiki/Mean%20Machines
|
Mean Machines was a multi-format video game magazine published between 1990 and 1992 in the United Kingdom.
History
In the late 1980s Computer and Video Games (CVG) was largely covering the outgoing generation of 8-bit computers like the Commodore 64, ZX Spectrum, Amstrad CPC and the 16-bit Atari ST and Amiga. Julian Rignall built and launched a consoles-oriented section of the magazine called Mean Machines. The inaugural section was featured in the October 1987 issue of the magazine and largely covered games on 8-bit games systems like the Nintendo Entertainment System and Master System. It included features on newly emerging Japan-only consoles such as the PC Engine.
Over the ensuing months, CVG increased its coverage of consoles and started a 'Mean Machines Megaclub'. At the same time, a new import gaming marketplace started to emerge fueled by demand for these new consoles. Small retailers in Britain began importing consoles and games directly from Japan, modified them for the UK market and sold them on.
Rignall and newly hired designer Gary Harrod spent two weeks planning the design, editorial tone and style, and published Mean Machines Issue Zero: a 16-page test version of the magazine that to elicit feedback from potential advertisers and readers. Only ten of these magazines were published, although a mini version was reprinted and given away free with Issue 15 of the magazine. Another early attempt on covering the video game console market is Complete Guide to Consoles which lasted for four issues and one exclusively for the Sega gaming systems The Complete Guide to Sega.
The first issue covered the Sega Mega Drive, Sega Master System, Nintendo Entertainment System, Game Boy and Amstrad GX4000 consoles. Within a few months the Amstrad was taken off the market due to poor sales, and the Super Nintendo Entertainment System replaced it in the magazine's focus, making MM a mainly Sega and Nintendo only magazine. Coverage was also given to other machines like the NeoGeo and PC Engine.
Following the lead of parent magazine CVG, Mean Machines covered both domestic and imported releases, meaning that the magazine could review titles that were months away from UK release. At the time, import gaming was more popular than it is now, as increased territory lockouts and swifter UK release dates have made import gaming a relatively niche market.
Mean Machines Sega and Nintendo Magazine System
and As the UK video games market grew and matured, Sega and Nintendo emerged as the two dominant manufacturers. EMAP split the magazine in two, creating Mean Machines Sega and the officially endorsed Nintendo Magazine System.
After a successful launch, monthly sales of NMS dropped to a level just below the original Mean Machines at its peak, and the circulation of MMS began to decline, and at the end of 1993, EMAP Images launched the officially endorsed Sega Magazine, which competed with sales of its own independent Sega publication.
The magazine was p
|
https://en.wikipedia.org/wiki/WUOT
|
WUOT (91.9 FM) is the NPR member station in Knoxville, Tennessee. Owned by the University of Tennessee, it airs a mix of news, classical music and jazz, along with programming from NPR, American Public Media and Public Radio International. It primarily features classical music programming, but carries NPR news programs daily, as well as jazz music for ninety minutes every weeknight and all evening on Fridays and folk music Saturday evenings. Its studios are located in the Communications Building on the UT campus.
History
On June 2, 1949, the University of Tennessee filed with the Federal Communications Commission for a construction permit to build a new noncommercial FM radio station in Knoxville. The idea to bring the university a radio station had been a campaign plank of future U.S. senator Howard Baker's campaign platform for student body president at UTK. The FCC approved the application a month later, at which time the university announced that it was building studios on the ground floor of Ayres Hall and had bought equipment from defunct radio station WKPB. WKPB had been a commercial station on 93.3 FM owned by The Knoxville Journal that broadcast from October 15, 1947 to April 15, 1949; the Journal, citing the uncertainty created by the advent of television, shuttered the station and sold its equipment to the university and its records to the general public. For a total of $16,000, the university had the equipment it needed to set up its own radio station.
WUOT signed on October 27, 1949. The station's first regular programming schedule included broadcasts for five and a half hours a day, and it boasted two full-time staff. WUOT broadcast informational programs, classical music, and reports of student activities, and was entirely operated by students. The radio station's facilities also provided a home for the university's offering of 25 radio programs, which were heard in 1950 on 17 commercial radio stations in Tennessee. By 1956, the circulation of the university's productions had increased to 65 stations.
Originally broadcasting with 3,500 watts, the station was approved to increase power to 70,500 watts in 1955, with the station resuming operations from its new facilities on November 29. This was made possible when station WROL gave the university a higher-power antenna and a 10 kW transmitter worth $50,000; WUOT's transmitter facility was relocated to a parcel of university-owned land near the John Tarleton Institute. WROL had operated an FM station until 1951. A large crane was necessary to extend the tower a further . The increase brought WUOT to listeners in Bristol, Chattanooga, and as far away as Asheville, North Carolina, and Blue Ridge, Georgia. The WUOT transmitter was relocated to Sharp's Ridge in 1961. In 1968, the station boosted its power to the maximum 100,000 watts and began stereo broadcasts. In 1971, the station added additional hours of jazz music to its schedule in response to requests from inmates at the Brushy
|
https://en.wikipedia.org/wiki/Character%20Map%20%28Windows%29
|
Character Map is a utility included with Microsoft Windows operating systems and is used to view the characters in any installed font, to check what keyboard input (Alt code) is used to enter those characters, and to copy characters to the clipboard in lieu of typing them. Other operating systems have apps which do the same things that Character Map does; for example, Apple MacOS Character Viewer (formerly Character Palette).
Overview
The tool is usually useful for entering special characters. It can be opened via the command-line interface or Run command dialog using the 'charmap' command.
The Advanced view check box can be used to inspect the character sets in a font according to different encodings (code pages), including Unicode code ranges, to locate particular characters by their Unicode code point and to search for characters by their Unicode name. For Unicode fonts, the characters can be grouped by their Unicode subrange. Although the Unicode standard already extends character field to plane 16 and many codepoints of plane 1 are assigned with characters, this tool still only supports code points on plane 0 (between U+0000 and U+FFFF). Additionally, it does not display certain characters in that range for reasons unexplained.
With all versions of Windows the utility can be started by entering charmap in the Start / Run dialog box.
On Windows 2000, Windows XP, Windows Vista, and Windows 7, the utility is in All Programs → Accessories → System Tools → Character Map in the Start Menu. On Windows 10, the utility is in the Windows Accessories folder in the Start Menu. Beginning with Windows Vista, the user can also type the name of the utility in the Start Menu search box/Cortana.
A secondary character map program is accessible in a text field on Windows 10 computers, using the keyboard shortcut , or the key in Windows 10's virtual touch keyboard, which is mainly used for the purposes of using emoji, but also allows access to a smaller set of special characters.
The Windows NT series of operating systems from Workstation and Server 4.0 build 1381 and the Windows 9x-series from Windows 95 onwards also contain the character map, as do versions of Windows CE using a GUI based on these systems' explorer.exe, introduced with Windows 95. Another version of the character map is found in the Progman.exe-based Windows 3.11 and Windows NT 3.51.
Other operating systems
Other operating systems such as some Unix-Linux variants with GUIs, the HP-48 series graphing calculators and others also have a similar accessory.
The OS/2 analogue of the character map called the Characters Map is available from third parties for systems from OS/2 Warp 3 onwards to current ArcaOS versions. The MacOS version is included in the Font Book app, and is shown when viewing the "Repertoire" of a font. A Linux GNUstep character map application, "Charmap", is developed by GNU Savannah.
See also
gucharmap (GNOME Character Map)
BabelMap (includes tools for entering Chine
|
https://en.wikipedia.org/wiki/List%20of%20Azteca%20Am%C3%A9rica%20affiliates
|
The following is a list of affiliates for the American Spanish language television network Azteca América, which was in operation from July 28, 2001, to December 31, 2022. Operating under a name branding license arrangement with Azteca International Corporation, the network, and many of its affiliates, were owned by Innovate Corp. As of September 2019, the network had affiliation agreements with 75 television stations.
Stations are arranged in order by city of license.
Notes
References
Affiliates
Azteca America
|
https://en.wikipedia.org/wiki/Sun%20SPOT
|
Sun SPOT (Sun Small Programmable Object Technology) was a sensor node for a wireless sensor network developed by Sun Microsystems announced in 2007. The device used the IEEE 802.15.4 standard for its networking, and unlike other available sensor nodes, used the Squawk Java virtual machine.
After the acquisition of Sun Microsystems by Oracle Corporation, the SunSPOT platform was supported but its forum was shut down in 2012. A mirror of the old site is maintained for posterity.
Hardware
The completely assembled device fit in the palm of a hand.
Its first processor board included an ARM architecture 32 bit CPU with ARM920T core running at 180 MHz. It had 512 KB RAM and 4 MB flash memory. A 2.4 GHz IEEE 802.15.4 radio had an integrated antenna and a USB interface was included.
A sensor board included a three-axis accelerometer (with 2G and 6G range settings), temperature sensor, light sensor, 8 tri-color LEDs, analog and digital inputs, two momentary switches, and 4 high current output pins.
The unit used a 3.7V rechargeable 750 mAh lithium-ion battery, had a 30 uA deep sleep mode, and battery management provided by software.
Software
The device's use of Java device drivers is unusual since Java is generally hardware-independent. Sun SPOT uses a small Java ME Squawk which ran directly on the processor without an operating system. Both the Squawk VM and the Sun SPOT code are open source.
Standard Java development environments such as NetBeans can be used to create SunSPOT applications.
The management and deployment of application are handled by ant scripts, which can be called from a development environment, command line, or the tool provided with the SPOT SDK, "solarium".
The nodes communicate using the IEEE 802.15.4 standard including the base-station approach to sensor networking. Protocols such as Zigbee can be built on 802.15.4.
Sun Labs reported implementations of RSA and elliptic curve cryptography (ECC) optimized for small embedded devices.
Availability
Sun Microsystems Laboratories started research on sensor networks around 2004. After some initial experience using "Motes" from Crossbow Technology, a project began under Roger Meike to design an integrated hardware and software system.
Sun sponsored a project at the Art Center College of Design called Autonomous Light Air Vessels in 2005.
The first limited-production run of Sun SPOT development kits were released April 2, 2007, after months of delays. This introduction kit included two Sun SPOT demo sensor boards, a Sun SPOT base station, the software development tools, and a USB cable. The software was compatible with Windows XP, Mac OS X 10.4, and common Linux distributions. Some demonstration code was provided.
A developer from Sun gave a demonstration in September 2007.
After investigating commercial use, Sun moved to focus on educational users.
The entire project, hardware, operating environment, Java virtual machine, drivers and applications, was available as open source
|
https://en.wikipedia.org/wiki/Extreme%20Networks
|
Extreme Networks is an American networking company based in Morrisville, North Carolina. Extreme Networks designs, develops, and manufactures wired and wireless network infrastructure equipment and develops the software for network management, policy, analytics, security and access controls.
History
Extreme Networks was established by co-founders Gordon Stitt, Herb Schneider, and Stephen Haddock in 1996 in California, United States, with its first offices located in Cupertino, which later moved to Santa Clara, and later to San Jose. Early investors included Norwest Venture Partners, AVI Capital Management, Trinity Ventures, and Kleiner Perkins Caufield & Byers. Gordon Stitt was a co-founder and served as chief executive officer until August 2006, when he retired and became chairman of the board of directors.
The initial public offering in April 1999 was listed on the NASDAQ stock exchange as ticker "EXTR."
In April 2013, Charles W. Berger (from ParAccel as it was acquired by Actian) replaced Oscar Rodriguez as CEO.
In November 2014, Extreme Networks was named the first Official Wi-Fi solutions provider of the NFL.
On April 19, 2015, Charles W. Berger resigned as CEO, and was replaced by Board Chairman Ed Meyercord.
In September 2020, analyst firm Omdia named Extreme Networks the fast-growing vendor in cloud-managed networking.
In November 2021, Extreme Networks was named a Leader in the 2021 Gartner Magic Quadrant for Wired and Wireless LAN Access Infrastructure for the fourth consecutive year by Gartner analysts.
Acquisitions
In October 1996, Extreme Networks acquired Mammoth Technology.
Extreme Networks acquired Optranet in February 2001 and Webstacks in March 2001. Extreme had invested in both companies, which were purchased for about $73 million and $74 million respectively.
On September 12, 2013, Extreme Networks announced it would acquire Enterasys Networks for about $180 million.
On October 31, 2016, Extreme Networks announced that it completed the acquisition of Zebra Technologies' wireless LAN business for about $55 million.
On March 7, 2017, Extreme Networks announced its intention to acquire Avaya's networking business in a transaction valued at $100 million. The acquisition officially closed on July 17, 2017. As part of this transaction, Extreme acquired customers, personnel, and technology assets from Avaya. Extreme has publicly stated that it expects to "generate over $200 million in additional annualized revenue" from the acquired networking assets from Avaya.
On March 29, 2017, Extreme Networks announced its intention to acquire Brocade's SRA (Switching, Routing, and Analytics) business from Broadcom for an undisclosed sum. The acquisition officially closed on October 30, 2017, and with it, Extreme acquires customer relationships, personnel, and technology assets from Brocade including the SLX, VDX, MLX, CES, CER, Workflow Composer, Automation Suites, and certain other Data Center related products. Extreme has public
|
https://en.wikipedia.org/wiki/John%20Wallace%20%28basketball%29
|
John Gilbert Wallace (born February 9, 1974) is an American former professional basketball player and current broadcaster on MSG Networks. He also hosts a live stream and podcast called "Power Forward w/ John Wallace" on SportsCastr. A 6' 8" forward, Wallace played seven seasons in the National Basketball Association (NBA), in addition to stints in Greece and Italy.
A 1992 graduate of Greece Athena High School in Rochester, New York, Wallace led Syracuse University to the NCAA championship game against the Kentucky Wildcats during his senior season in 1996. After his college graduation, Wallace was selected with the 18th pick in the 1996 NBA draft by the New York Knicks. He played seven seasons in the NBA with the Knicks, Toronto Raptors, Detroit Pistons, Phoenix Suns, and the Miami Heat.
Wallace is an executive board member of the Heavenly Productions Foundation, a 501c-3 charity based in Armonk, New York whose mission is to help children in need and in distress.
His son, John Wallace Jr., also attended Greece Athena High School and was a member of the varsity basketball team.
College career
Wallace began playing basketball as a freshman at Greece Athena High School in his hometown of Rochester, NY. As a high school junior, he began to draw attention from basketball programs and coaches in Central and Western New York, including from Syracuse University head coach Jim Boeheim. While Boeheim was recruiting Wallace, Syracuse's basketball program was being investigated by the NCAA. Two years of investigations culminated in the program losing one scholarship for both the 1993–94 and 1994–95 academic years, and a postseason ban for the 1992–93 season, As a high school senior, Wallace was named to the 1992 McDonald's All-American Team, alongside notable future NBA and college players Jason Kidd, Tony Delk, and Corliss Williamson.
Freshman year at Syracuse (1992–93)
In spite of the ongoing investigations, Wallace honored his letter of intend to attend Syracuse and arrived on campus in the fall of 1992. Wallace started all 29 games for the Orange as a freshman, averaging 11.1 points and 7.6 rebounds per game. The postseason ban prevented Syracuse from competing in the NCAA Tournament, but the team finished with a 20–9 record and advanced to the Big East Championship, losing to Seton Hall 103–70 in Madison Square Garden.
Sophomore year at Syracuse (1993–94)
Having been an "unsung hero" of the sanctioned '92–93 team, Wallace was a pivotal member of the '93–94 squad from the outset, a team that was ranked 20th entering the season. Wallace again started every game for the Orange and averaged 15.0 points and 9.0 rebounds per game.
Entering the 1994 Big East tournament, Syracuse was ranked 13th in the country and 2nd in the Big East, behind a Connecticut team led by freshman guard Ray Allen and first-team All-American forward Donyell Marshall. In spite of a 30-point performance from junior shooting guard Lawrence Moten, Syracuse was bounced from the
|
https://en.wikipedia.org/wiki/EcoTalk
|
EcoTalk, formerly TrashTalk, was a radio show on the Air America Radio network, hosted by Betsy Rosenberg. Rosenberg is a long-time radio journalist, she spent much of her career with CBS Radio, specifically the "environmental issues" reporter for CBS's San Francisco station KCBS-AM.
The show launched on Earth Day 1997 on KCBS radio. The focus was originally on waste reduction, hence the original name TrashTalk: Sound Solutions for a Healthier Planet and People. In 2004, it expanded to an hour-long interview show and rebranded as EcoTalk. Around this time it also moved to Air America, broadcasting on 40 stations across the United States, making it the first nationally-syndicated radio show about environmentalism.
In May 2007, owing to the restructuring of Air America and a lack of funding, EcoTalk had its final episode.
References
Air America (radio network)
American talk radio programs
Environmental radio programs
|
https://en.wikipedia.org/wiki/Denise
|
Denise may refer to:
Denise (given name), people with the given name Denise
Denise (computer chip), a video graphics chip from the Amiga computer
"Denise" (song), a 1963 song by Randy & the Rainbows
Denise, Mato Grosso, a municipality in Brazil
Denise, an 1885 play by Alexander Dumas fils
SP-350 Denise, a small submarine also known as the "Diving saucer"
A brand name of desogestrel
See also
Hurricane Denise, a list of tropical cyclones named Denise
Saint Denise (disambiguation)
Denice (disambiguation)
Denyse, a given name
|
https://en.wikipedia.org/wiki/Emotional%20isolation
|
Emotional isolation is a state of isolation where one may have a well-functioning social network but still feels emotionally separated from others.
Population-based research indicates that one in five middle-aged and elderly men (50–80 years) in Sweden are emotionally isolated (defined as having no one in whom one can confide). Of those who do have someone in whom they can confide, eight out of ten confide only in their partner. People who have no one in whom they can confide are less likely to feel alert and strong, calm, energetic and happy. Instead, they are more likely to feel depressed, sad, tired and worn out. Many people suffering from this kind of isolation have strong social networks, but lack a significant bond with their friends. While they can build superficial friendships, they are often not able to confide in many people. People who are isolated emotionally usually feel lonely and unable to relate to others.
In relationships
Emotional isolation can occur as a result of social isolation, or when a person lacks any close confidant or intimate partner. Even though social relationships are necessary for emotional well-being, they can trigger negative feelings and thoughts and emotional isolation can act as a defense mechanism to protect a person from emotional distress. When people are emotionally isolated, they keep their feelings completely to themselves, are unable to receive emotional support from others, feel "shut down" or numb, and are reluctant or unwilling to communicate with others, except perhaps for the most superficial matters. Emotional isolation can occur within an intimate relationship, particularly as a result of infidelity, abuse, or other trust issues. One or both partners may feel alone within the relationship, rather than supported and fulfilled. Identifying the source of the distress and working with a therapist to improve communication and rebuild trust can help couples re-establish their emotional bond.
Effects on the mind
Cacioppo and his team have found that the brains of lonely people react differently than those with strong social networks. The University of Chicago researchers showed lonely and non-lonely subjects photographs of people in both pleasant settings and unpleasant settings. When viewing the pleasant pictures, non-lonely subjects showed much more activity in a section of the brain known as the ventral striatum than the lonely subjects. The ventral striatum plays an important role in learning. It is also part of the brain's reward center, and can be stimulated by rewards like food and love. The lonely subjects displayed far less activity in this region while viewing pleasant pictures, and they also had less brain activity when shown the unpleasant pictures. When non-lonely subjects viewed the unpleasant pictures, they demonstrated activity in the temporoparietal junction, an area of the brain associated with empathy; the lonely subjects had a lesser response [source: University of Chicago].
|
https://en.wikipedia.org/wiki/Carlos%20Trillo
|
Carlos Trillo (May 1, 1943 – May 8, 2011) was an Argentine comic book writer, best known for writing the Cybersix comics.
Biography
Born in Buenos Aires, Trillo began a prolific career as writer at the age of 20, penning his first story for Patoruzú magazine. Trillo, together with Horacio Altuna, created the strip El Loco Chávez, which appeared every day at the back of the newspaper Clarín from July 26, 1975 to November 10, 1987. After that, the strip was replaced by El Negro Blanco, which he wrote for the artist Ernesto García Seijas until September 1993.
He participated in the creation of several comics including Cybersix in 1992, with Carlos Meglia, and the erotic Clara de noche and Cicca Dum Dum series with Jordi Bernet. He has also collaborated with Alberto Breccia and Alejandro Dolina.
In 1999, his work La grande arnaque (The Big Hoax) won the Prize for Scenario at the Angoulême International Comics Festival.
Trillo died in London on May 8, 2011, while on holiday with his wife.
Personal life
He married writer Ema Wolf; they had two children.
Bibliography
with Horacio Altuna
El Loco Chávez
Las puertitas del Sr. López
Merdichesky
El último recreo
Tragaperras
Charlie Moon
with Jordi Bernet
Clara de noche
Light & Bold
Ivan Piire
:es:Cicca Dum Dum
with Eduardo Risso
Video Noire
Fúlu
Boy Vampire
Borderline
Chicanos
with Domingo Roberto Mandrafina
Dragger
The Big Hoax
The Iguana
Historias mudas
El contorsionista
with Lucas Varela
El Síndrome Guastavino
El Cuerno Escarlata
Sasha Despierta
with Alberto Breccia
Un tal Daneri (1975-1977)
Nadie (1977-1978)
Buscavidas (1981-1984)
Others
Cybersix (with Carlos Meglia)
Alvar Mayor (1977–1982, with Enrique Breccia)
Sick Bird (with Juan Bobillo)
Awards
1978: e , Lucca, Italy, for Best International Author
1984: Barcelona International Comics Convention, Premio al mejor guionista del año
1996: , Lucca, Italy, for Best International Author
1999: Angoulême Festival, Prize for Scenario, for La grande anarque (The Big Hoax)
References
Sources
Carlos Trillo French albums Bedetheque
Carlos Trillo publications in English www.europeancomics.net
External links
Carlos Trillo profile and biography Tebeosfera
1943 births
2011 deaths
Writers from Buenos Aires
Argentine comics writers
Argentine erotica writers
|
https://en.wikipedia.org/wiki/SWAR
|
SIMD within a register (SWAR), also known by the name "packed SIMD" is a technique for performing parallel operations on data contained in a processor register. SIMD stands for single instruction, multiple data. Flynn's 1972 taxonomy categorises SWAR as "pipelined processing".
Many modern general-purpose computer processors have some provisions for SIMD, in the form of a group of registers and instructions to make use of them. SWAR refers to the use of those registers and instructions, as opposed to using specialized processing engines designed to be better at SIMD operations. It also refers to the use of SIMD with general-purpose registers and instructions that were not meant to do it at the time, by way of various novel software tricks.
SWAR architectures
A SWAR architecture is one that includes instructions explicitly intended to perform parallel operations across data that is stored in the independent subwords or fields of a register. A SWAR-capable architecture is one that includes a set of instructions that is sufficient to allow data stored in these fields to be treated independently even though the architecture does not include instructions that are explicitly intended for that purpose.
An early example of a SWAR architecture was the Intel Pentium with MMX, which implemented the MMX extension set. The Intel Pentium, by contrast, did not include such instructions, but could still act as a SWAR architecture through careful hand-coding or compiler techniques.
Early SWAR architectures include DEC Alpha , Hewlett-Packard's PA-RISC MAX, Silicon Graphics Incorporated's MIPS MDMX, and Sun's SPARC V9 VIS. Like MMX, many of the SWAR instruction sets are intended for faster video coding.
History of the SWAR programming model
Wesley A. Clark introduced partitioned subword data operations in the 1950s. This can be seen as a very early predecessor to SWAR. Leslie Lamport presented SWAR techniques in his paper titled "Multiple byte processing with full-word instructions" in 1975.
With the introduction of Intel's MMX multimedia instruction set extensions in 1996, desktop processors with SIMD parallel processing capabilities became common. Early on, these instructions could only be used via hand-written assembly code.
In the fall of 1996, Professor Hank Dietz was the instructor for the undergraduate Compiler Construction course at Purdue University's School of Electrical and Computer Engineering. For this course, he assigned a series of projects in which the students would build a simple compiler targeting MMX. The input language was a subset dialect of MasPar's MPL called NEMPL (Not Exactly MPL).
During the course of the semester, it became clear to the course teaching assistant, Randall (Randy) Fisher, that there were a number of issues with MMX that would make it difficult to build the back-end of the NEMPL compiler. For example, MMX has an instruction for multiplying 16-bit data but not multiplying 8-bit data. The NEMPL language did not
|
https://en.wikipedia.org/wiki/Geometric%20Description%20Language
|
In computer-aided design, Geometric Description Language (GDL) is the programming language of Archicad library parts. GSM is the file format of these CAD objects.
Area of usage
These objects are similar to blocks in AutoCAD, but unlike blocks, these are parametric, and the 2D and 3D features are connected, so in any view one can get the correct visualization (for example a side view on the section, top view on plan, and perspective in the 3D view). GDL scripts define an Archicad library part in its main roles, these are 3D model, 3D model projected to section/elevation or to 2D plan, 2D plan view, user interface display and behaviour and listing quantities.
All versions of the Archicad contain their own default libraries, also objects like furniture, windows, doors, trees, people, cars, construction elements, etc.
There are several commercial websites for selling high-detailed intelligent parametric objects, which are perhaps better and more variable than the default libraries, for example there are a lot of environmental objects like plants, people or garden elements, which are not included in the original software.
Licensing
GDL is a free technology (although Archicad itself is a commercial software), it is allowed and possible to develop GDL based object libraries using free tools like Graphisoft LP_XMLConverter and Graphisoft GDL Web Plug-In (Discontinued).
Technical information
The GDL programming language is BASIC-like. It has the same control flow statements and variable logic.
In 2D and 3D in GDL, all the model elements are linked to a local right-handed coordinate system. For placing an element in the desired position, you have to move the coordinate system to the desired position (and orientation), then generate the element itself. Every movement, rotation or stretching of the coordinate system is called a transformation. Transformations are stored in a stack, which can be extended by further transformations and can be cut by deleting one or more transformations from the top of it.
GDL maintains forward compatibility, which means that an Archicad library part will be readable with every subsequent Archicad program, but not necessarily with any earlier versions.
External links
GDL Center, GRAPHISOFT's GDL knowledge base and community center
GDL Cookbook 3
GDL Cookbook 4
Archicad GDL vs Revit Families
CAD file formats
Procedural programming languages
Dynamically typed programming languages
Domain-specific programming languages
|
https://en.wikipedia.org/wiki/Archicad
|
ArchiCAD is an architectural BIM CAD software for Mac and Windows developed by the Hungarian company Graphisoft. ArchiCAD offers computer aided solutions for common aspects of aesthetics and engineering during the design process of the built environment—buildings, interiors, urban areas, etc.
History
Development of Archicad started in 1982 for the Apple Lisa, the predecessor of the original Apple Macintosh. Following its launch in 1987, with Graphisoft's "Virtual Building" concept, Archicad became regarded by some as the first implementation of BIM. However, ArchiCAD founder Gábor Bojár has acknowledged to Jonathan Ingram in an open letter that Sonata "was more advanced in 1986 than ArchiCAD at that time", adding that it "surpassed already the matured definition of 'BIM' specified only about one and a half decade later". ArchiCAD has been recognized as the first CAD product on a personal computer able to create both 2D and 3D geometry, as well as the first commercial BIM product for personal computers and considered "revolutionary" for the ability to store large amounts of information within the 3D model.
Product overview
Archicad is a complete design suite with 2D and 3D drafting, visualization and other building information modeling functions for architects, designers and planners. A wide range of software applications are integrated in Archicad to cover most of the design needs of an architectural office:
2D modeling CAD software — drawing tools for creating accurate and detailed technical drawings
3D Modeling software — a 3D CAD interface specially developed for architects capable of creating various kind of building forms
Architectural rendering and Visualization software — a high performance rendering tool to produce photo-realistic pictures or videos
Desktop publishing software — with similar features to mainstream DTP software to compose printed materials using technical drawings pixel-based images and texts
Document management tool — a central data storage server with remote access, versioning tool with backup and restore features
Building Information Modeling software — not just a collection of the above-mentioned applications with an integrated user interface but a novel approach to building design called BIM
Features
Using parametric objects
Archicad allows the user to work with data-enhanced parametric objects, often called "smart objects" by users. This differs from the operational style of other CAD programs created in the 1980s. The product allows the user to create a "virtual building" with virtual structural elements like walls, slabs, roofs, doors, windows and furniture. A large variety of pre-designed, customizable objects come with the program.
Archicad software offers the flexibility to work with a 2D or 3D representation on the screen. Although the program's database stores data in three dimensions, 2D drawings can be exported at any time. Plans, elevations, and sections are generated from the 3D virtual buil
|
https://en.wikipedia.org/wiki/Apple%20Silentype
|
The Apple Silentype is Apple Computer, Inc.'s first printer, announced in 1979 and released in March 1980 for US$599, shortly after the Apple II Plus. The Silentype's firmware was written by Andy Hertzfeld, who later worked on the Apple Macintosh. The Silentype is a thermal printer, which uses a special paper and provides 80-column output. It was also compatible with the Apple III.
The Silentype's many dramatic advantages over other printers at the time, including silent operation, very small size, print speed and reliability, were especially well-suited for its use in the nascent point-of-sale and hospitality industries. The Silentype was the first printer to be used in any restaurant as a point-of-sale remote requisition printer to speed service. The broadening use of printers in the hospitality industry subsequently played a key role in the advancement of efficiency throughout the hospitality industry worldwide. The typical point-of-sale hospitality printer in use today, forty years later, is a thermal printer that still mimics the way the Silentype was used when it was introduced in 1980.
References
External links
MyOldMac.net – Apple Silentype printer information
Apple Inc. printers
Products introduced in 1980
Discontinued Apple Inc. products
|
https://en.wikipedia.org/wiki/Lemote
|
Jiangsu Lemote Tech Co., Ltd or Lemote () is a computer company established as a joint venture between the Jiangsu Menglan Group and the Chinese Institute of Computing Technology, involved in computer hardware and software products, services, and projects.
History
In June 2006, shortly after Institute of Computing Technology of the Chinese Academy of Sciences developed Loongson 2E they need a company to build end product, so the Jiangsu Menglan Group began a joint venture with the Institute of Computing Technology of the Chinese Academy of Sciences. The venture was named Jiangsu Lemote Tech Co., Ltd.
A computer was announced by Fuxin Zhang, an ICT researcher also a Lemote staff, who said the purpose of this project was to "provide everyone with a personal computer". The device is intended for low income groups and rural area students.
Hardware
Lemote builds small form factor computers including network computers and netbooks with Loongson Processors.
Netbook computers
The Yeeloong netbook computer is intended to be built on free software from the BIOS upwards, and for this reason is used and recommended by the founder of Free Software Foundation, Richard Stallman as of September 2008 and 23 January 2010.
The specifications are:
Loongson 3A laptop
Loongson insiders revealed a new model based on the Loongson 3A quad-core laptop has been developed and was expected to launch in August 2011. With a similar design to the MacBook Pro from Apple Inc., it will carry a Linux operating system by default.
In September 2011, Lemote announced the Yeeloong-8133 13.3" laptop featuring 900 MHz, quad-core Loongson-3A/2GQ CPU.
Desktop computers
Lynloong, all-in-one desktop computer, combined computer and monitor, without keyboard.
Myloong, desktop diskless network computer (NC), without monitor or keyboard.
Fuloong, see below.
Products in development
Hiloong, SOHO and family storage center.
Fuloong 2 series of small desktop computers
The Fuloong 2 series is a desktop computer that costs CN¥1,015, €100, US$131. It ships with two Linux distributions, Debian and Rays Linux, but any other distribution that has a mipsel port can be installed, e.g. Gentoo Linux.
Fuloong 2E
The reference hardware specifications as of 28 October 2006 are:
Dimensions: 18.8 × 14.5 cm
CPU: Loongson 2E 64-bit, integrated DDR controller, 64 KiB cache level
Clock speed: 667 MHz
Southbridge: VIA VT82C686B
DDR SDRAM: 256 MiB
Hard disk: IDE 40–60 GB
Video card: ATI Radeon 7000M (RV100) 16MB PCI
Network controller: Realtek 8139D, 10/100 Mbit/s
USB ports: 4
Power supply: external 12V 4A DC
Fuloong 2F
The Fuloong 2F computer was released on 30 June 2008, priced at CN¥1,800, about €163, $257.
The specifications are:
Dimensions: 19 × 14.5 × 3.7 cm
CPU: Loongson 2F, integrated DDR2 controller
Clock speed: 1 GHz
Southbridge: AMD CS5536
DDR2 SDRAM: 512MB
Hard disk: IDE 120 GB
Video card: XGA V2, 32MB video RAM, with VGA, DVI and S-video ports
Network controller: Ethernet
|
https://en.wikipedia.org/wiki/Power%20Macintosh%209500
|
The Power Macintosh 9500 (sold as Power Macintosh 9515 in Europe and Asia) is a personal computer designed, manufactured and sold by Apple Computer from June 1995 to February 1997. It is powered by a PowerPC 604 processor, a second-generation PowerPC chip which is faster than the PowerPC 601 chip used in the Power Macintosh 8100. The 180MP and models, introduced August 1996, use the enhanced PowerPC 604e processor.
MacWorld Magazine gave the 9500 a positive review, concluding that it is "not the second-generation Power Mac for the rest of us — it's too pricey .... but it is an excellent foundation for a high-end graphics workstation — for color publishing or media production. Its speed and expandability should also made it popular in the scientific and technical markets." Their benchmarks showed that the 9500 outperformed the Quadra 950 when running older Mac software in the Mac 68k emulator, posting speeds almost twice as fast as the Quadra 900.
The 9500 was replaced by the Power Macintosh 9600.
Hardware
The 9500 includes several technological firsts for Apple. The CPU is connected via a daughterboard, and so can be swapped easily. Available were single-processor cards ranging from 120 to 200 MHz, and a dual processor card with two 180 MHz CPUs. This is also the first Macintosh to use the PCI standard, with six PCI slots available -- one of which must be used for a graphics card. Infoworld's Anita Epler noted that "Because most multimedia developers don't use the onboard video found on previous Mac models, Apple wisely economized by simply leaving it out. Users can purchase their own PCI graphics card or opt for Apple's 64-bit accelerated PCI video board with 2 MB of VRAM as an optional accessory."
The 9500 is also the first computer from Apple to support 168-pin DIMM memory modules, and the 512 KB of on-board 128-bit-wide cache utilizes copy-back instead of write-through, offering faster speeds than prior Macintosh models, as well as the ability to install single modules. The logic board has a total of 12 memory slots; like the Power Macintosh 8100, installing memory requires removing the logic board from the case. When it was introduced, 64 MB DIMMs were the largest available on the market, making for a maximum memory limit of 768 MB. Companies like Advantage Memory were selling DIMMs of this size for $3,900 USD each. 128 MB DIMMs were introduced later in 1995, offering a theoretical limit of 1.5 GB memory, though System 7.5.2 is unable to use more than 1 GB of memory.
Some other firsts for a Macintosh include a regular 10BASE-T Ethernet port alongside the AAUI port, as well as support for the new SCSI-2 Fast standard, and a 4X CD-ROM.
The basic design of the logic board, called "Tsunami", was used by various Macintosh clone makers as a reference design and a modified version was used in the non-Macintosh Apple Network Server series.
Utilizing a third-party G4 CPU upgrade and the XPostFacto installation utility it is possible to ru
|
https://en.wikipedia.org/wiki/WMYS-LD
|
WMYS-LD (channel 69) is a low-power television station in South Bend, Indiana, United States, affiliated with MyNetworkTV. It is owned by Weigel Broadcasting (as the company's only MyNetworkTV affiliate), and is sister to ABC affiliate WBND-LD (channel 57) and CW affiliate WCWW-LD (channel 25). The stations share studios on Generations Drive (near the Indiana Toll Road) in northeastern South Bend, while WMYS-LD's transmitter is located just off the St. Joseph Valley Parkway on the city's south side.
Due to its low-power status, its broadcasting radius only covers the immediate South Bend area. Therefore, Weigel relies on paid television subscription carriage for all three of its South Bend television stations to reach the entire market.
History
The station first signed on the air on December 2, 1987, as W12BK, broadcasting on VHF channel 12; later that month, it moved to UHF channel 69, and accordingly changed its calls to W69BT. It originally operated as a translator of Chicago sister station WCIU-TV, which at the time was an independent station with Telemundo as a secondary affiliation. On October 18, 1995, W58BT (channel 58, now WBND-LD on channel 57) became the South Bend market's new ABC affiliate, after full-power WSJV (channel 28) ended its affiliation with that network to join Fox. Due to W58BT's low-power signal which could not reach the entire market, Weigel then converted W69BT into a translator of W58BT to reach areas that could not receive an adequate signal as Weigel campaigned the FCC to increase the station's signal radius, along with establishing its pay-TV coverage.
After several years, those efforts were successful. As most of the market could receive channel 57 without issue, in October 1999, channel 69 became an affiliate of The WB with its own schedule. The station's callsign was changed to WMWB-LP (standing for "Michiana's WB").
After Weigel purchased WYGN-LP (channel 25, now CW affiliate WCWW-LD) in 2002 from 3ABN, Weigel chose to move channel 69's schedule, call letters, and WB affiliation to that station, which was closer to the majority of the channels on the South Bend television dial. Channel 69 then adopted channel 25's former WRDY-LP call letters. It later changed its calls three more times: first to WAAT-LP in 2004, then briefly to WCWW-LP in March 2006. From 2002 until 2004, it was once again simulcasting ABC programming from WBND-LP; after that, it returned to being an independent station, with occasional programming from the Sportsman Channel.
In March 2006, Weigel reached an affiliation deal to affiliate channel 69 with MyNetworkTV, a network launched as a partnership between Fox Television Stations and Twentieth Television; in accordance to the new affiliation, it changed its calls to WMYT-LP before modifying it to WMYS-LP in April 2006. WMYS affiliated with MyNetworkTV when it launched on September 5, 2006. Until 2011, when MeTV launched on WBND-LD2, the station carried classic television series and retr
|
https://en.wikipedia.org/wiki/Transmission%20rate
|
Transmission rate can be:
In the context of computer data: Bit rate
|
https://en.wikipedia.org/wiki/MSAA
|
MSAA may refer to:
Science and technology
Multisample anti-aliasing, a type of anti-aliasing
Microsoft Active Accessibility, an application programming interface for user interface accessibility
Multifunctional serotonin agonist and antagonist; See Flibanserin
Other uses
Maharashtra State Angling Association, the controlling organisation of Powai Lake
See also
Managed software as a service (MSaaS), in software as a service
|
https://en.wikipedia.org/wiki/MASSCOMP
|
The Massachusetts Computer Corporation (MASSCOMP) was a computer manufacturer based in Westford, Massachusetts. Originally conceived by C. Forbes Dewey of MIT and inventor Chester Schuler, it was founded formally in 1981. Its target market was real-time computing, with a focus on high-speed data acquisition. Its major innovation was that it created the first widely available computer product which was able to sample analog signals at one million samples per second and store the resulting data to disk continuously. Given the technology available at the time—Motorola 68000 series CPUs of only a few megahertz in speed and slow disk drives—this product represented quite a technological achievement.
The MASSCOMP MC-500 is a 68000-based microcomputer running a real-time variant of the Unix operating system. For a small company, MASSCOMP incorporated a number of ambitious and innovative projects in addition to Real-Time Unix, including their own C and Fortran compiler, a block diagram language known as "Laboratory Workbench" that allowed visual programming of real time systems to connect real-time analog inputs and outputs to signal processing operations and interactive virtual instruments for data display, and their own high level graphics subsystem.
MASSCOMP grew to about $65 million in sales per year and ultimately purchased Concurrent Computer Corporation (a spinoff company that was part public but majority-owned by Perkin-Elmer) in 1988 in a "junk bond deal" and assumed the Concurrent name, with aim of becoming the number one vendor in the real-time computing market. The deal cost Masscomp $240 million. Perkin-Elmer sold this company as part of restructuring of their business due to low profits in the computer market.
References
External links
There is a MASSCOMP system at the Rhode Island Computer Museum
1981 establishments in Massachusetts
1988 mergers and acquisitions
1995 disestablishments in Massachusetts
1995 mergers and acquisitions
American companies established in 1981
American companies disestablished in 1995
Companies based in Massachusetts
Computer companies established in 1981
Computer companies disestablished in 1995
Defunct computer companies of the United States
|
https://en.wikipedia.org/wiki/National%20Number%20Group
|
The UK Public Switched Telephone Network is divided up by area into National Number Groups (NNG's), and then further divided up into dialling codes.
The structure of UK telephone numbers is a leading zero (replaced with +44 for international calls from outside the UK) followed by the NNG — a 2, 3, 4 or 5 digit dialling code (digits SA in the example below) to different geographic areas of the UK.
e.g.
Telephone number (020) 7811 8055 is part of the "London Area" and so has NNG 2078:
Telephone numbers in the United Kingdom
|
https://en.wikipedia.org/wiki/SMOP
|
SMOP or SMOPS may refer to:
Small matter of programming, a phrase in software development
School of Maritime Operations (SMOPS), of the Royal Navy; See HMS Mercury
Singapore Mathematical Olympiad for Primary Schools; See Hwa Chong Institution
Super Megaton Ohzumo Powers, a wrestling tag team comprising Ryota Hama and Akebono Tarō
|
https://en.wikipedia.org/wiki/Power%20Macintosh%204400
|
The Power Macintosh 4400 (sold as the Power Macintosh 7220 in some markets) is a personal computer designed, manufactured and sold by Apple Computer, Inc. from November 1996 to February 1998. It differs from prior desktop Macintosh models in that it was built with industry-standard components such as an IDE hard drive and an ATX-like power supply.
The 4400 was introduced to the market at a time when several Macintosh clones were available on the market, often at prices lower than Apple's. The "Tanzania" logic board in the 4400 was an Apple design but had only been used in clones up to this point. MacWEEK's review described the case as "Strange in the Apple brood; when compared with PCs it fits right in with the flock. It is contained in a stock desktop PC case fitted with Apple's distinctive curved nose piece. The back is industrial-looking, while bent sheet metal fills the case's insides, sharp edges and all. The IDE drive sits on end, while the Comm II slot (occupied with an Ethernet card) and two PCI slots reside in a riser card. For the first time, Apple has abandoned automatic switching in the power supply, a small cost savings at the expense of international users' convenience."
This was the only Power Macintosh to be designed with the goal of using low-cost manufacturing techniques; the 4400 was removed from Apple's lineup a few months after the Power Macintosh G3 Desktop went on sale, which was priced comparably to the 4400 but used Apple's Power Macintosh 7300 form factor instead.
Models
The initial 4400/160 model was only sold to the European market. Some of Apple's online literature referred to the machine as the "Performa 4400", owing to its entry-level position in the market, but no machine sold was labelled as such. (The Performa brand was formally retired a few months later.)
An updated 200 MHz 603e model was released in the United States in February 1997 as the Power Macintosh 4400/200. It was also available as a "PC Compatible" system with a 166 MHz DOS card containing 16 MB of RAM and a Cyrix 6x86 processor.
The Power Macintosh 4400 was sold as the Power Macintosh 7220 in Australia and Asia, where the number 4 is considered unlucky.
Introduced November 7, 1996:
Power Macintosh 4400/160: Sold in Europe; no L2 cache or Ethernet.
Introduced February 17, 1997:
The 200 MHz versions support a maximum RAM capacity of 160 MB, and have an updated PCI adapter card has two PCI slots and one Comm II slot, instead of three PCI slots.
Power Macintosh 4400/200: Sold worldwide, except the Far East.
Power Macintosh 7220/200: Sold in Far East countries, e.g. Japan and Australia.
Introduced April 4, 1997:
Power Macintosh 4400/200 PC Compatible: Same as the 4400/200 with the addition of the PC Compatibility card, which enables running MS-DOS and Windows 95.
Power Macintosh 7220/200 PC Compatible: Same as the 4400/200 PC Compatible, sold in Far East countries and Europe.
Timeline
References
External links
Lowendmac.com -
|
https://en.wikipedia.org/wiki/Breed%20to%20Breathe
|
Breed to Breathe is an EP by English extreme metal band Napalm Death, released in 1997 through Earache on CD.
Release
The album is printed as CD Extra and contains a data track which features the video clip for the song "Breed to Breathe" and other band-related content such as a discography and a band history. Due to the depiction of graphic material the video clip prompted the Freiwillige Selbstkontrolle der Filmwirtschaft, the German motion picture rating system organization, to ban it in Germany and even to obtain a court decision that declared the clip illegal. Many media around the world also refused to feature the clip.
Both bands that deliver a Napalm Death song on the sixth track are winners of a demo cover version competition that Napalm Death had launched in summer 1997 and limited to bands without a recording contract.
Track listing
Personnel
Napalm Death
Mark "Barney" Greenway – vocals
Jesse Pintado – guitar
Mitch Harris – guitar
Shane Embury – bass
Danny Herrera – drums
Technical personnel
Colin Richardson – production
Paul Siddens – recording
Andy Sneap – mixing
Tony Wooliscroft – band photograph
Antz White – design, layout
Graham Humphreys – design, layout
Scalp – multimedia construction
References
1997 EPs
Napalm Death EPs
Earache Records EPs
|
https://en.wikipedia.org/wiki/YouOS
|
YouOS was a web desktop and web integrated development environment, developed by Webshaka until June 2008.
From 2006 to 2008 YouOS replicated the desktop environment of a modern operating system on a webpage, using JavaScript to communicate with the remote server. This allowed users to save their current desktop state to return to later, much like the hibernation feature in many true operating systems, and for multiple users to collaborate using a single environment. YouOS featured built-in sharing of music, documents and other files. The software was in alpha stage, and was referred to as a "web operating system" by WebShaka.
An application programming interface and an IDE (integrated development environment) were in development.
Over 700 applications were created using this API.
In 2006, YouOS was listed on the 7th position of PC World's list of "The 20 Most Innovative Products of the Year".
YouOS was shut down on July 30, 2008 because the developers had not actively developed it since November 2006. They have since moved on to other projects.
The domain youos.com domain name was acquired by a German startup company, Dynacrowd, in May 2015. The project name YouOS now represents a mobile platform for hyperlocal interaction used to operate the German refugee assistance system AngelaApp.
Parent Company
Webshaka was a messaging company most notable for making YouOS. It was founded by Samuel Hsiung, Jeff Mullen, Srini Panguluri and Joseph Wong.
References
External links
YouOS web site
Web desktops
|
https://en.wikipedia.org/wiki/World%20Chess%20Network
|
The World Chess Network (WCN) was a commercial Internet chess server devoted to the play and discussion of chess that launched in 1997 and closed ten years later in 2007 when it was bought by Internet Chess Club and merged with Chess Live to form World Chess Live. As a typical chess server, the network provided basic services such as the conduction of live chess games over the Internet between two human players. Chess tournaments were occasionally conducted by the service, including a select few matches between known chess Grandmasters where spectators could watch the game in real-time. During its heyday, the network was frequented by professional chess players including notable Grandmasters like Elena Donaldson, Susan Polgar, Larry Christiansen and Larry Evans.
Overview
The World Chess Network provided a number of services to its subscribers. Besides the facilitation of online chess games, it also provided members with a method of conducting online chess tournaments. The network used the Elo rating system for rating its players. The World Chess Network also conducted professional grandmaster tournaments, allowing spectators to watch these matches live, with professional commentaries. It also advertised itself as a venue for real-world chess players seeking to improve their playing skills. The network facilitated private chess lessons from professional players, usually via arrangement with the professional player with an additional cost. It also provided a service called Banter Chess; With this service, spectators watched two Masters play a game while explaining their moves and thoughts out loud, allowing the spectators to learn how high-ranked players conduct their games. Lectures about playing chess professionally were also given by the many Masters on the site.
For players not currently playing games, the network offered regular chat channels so that players could schedule or discuss games, among other things.
The interface used by the website was the a proprietary chess software called Mgichess. The software has arrangements to try to detect players using the assistance of chess programs. It does this by detecting changes in window input focus, based on information on the activities being undertaken on the computer that the program is able to detect.
History
The World Chess Network was originally created as an Internet chess server by Master Games International, Inc. with the support of chess philanthropist Dato Tan Chin Nam. It was home to many recognized chess Grandmasters and International Masters such as Susan Polgar, Larry Christiansen and Larry Evans.
In the 1999 policy board meeting of the United States Chess Federation, a proposal was made for a strategic alliance between the World Chess Network and the USCF.
On 29 May 2007, WCN was bought by the Internet Chess Club. It was then merged with Chess Live, another Internet chess server acquired by Internet Chess Club from GamesParlor. The result of the acquisition and merger was the
|
https://en.wikipedia.org/wiki/GOD%20TV
|
GOD TV is a word of faith Christian media network that started in the United Kingdom. The network's main offices are located in Plymouth, England, UK, and Orlando, Florida, US. Regional offices are situated in India, Sri Lanka, South Africa, Kenya, Ghana and Australia.
GOD TV's original productions have won awards from the Christian Broadcasting Council of the UK. Its schedule has five regional variations: USA; UK & Europe; Africa; Asia and Australasia each with local programming.
History
GOD TV was founded by Rory and Wendy Alec in England in 1995 as the Christian Channel Europe, the Continent's first daily Christian television network. It started broadcasting on 1 October and was on air for three hours each day, broadcasting between 4am and 7am. This increased to seven hours (4am to 11am) in 1997 and 24-hours in 1999. The 'GOD' logo appeared in 1997 and the Christian Channel was rebranded as the GOD Channel. The GOD Channel became part of the Dream Family Network, later known as GOD Digital and then GOD TV in 2002. The same year GOD TV's broadcast uplink was moved to Israel. This provided for international expansion via satellite and GOD TV was launched across Africa and Asia with new offices in Cape Town and Chennai.
In 2003 a GOD TV office was established in the US in Orlando, FL and in 2005 GOD TV launched across Australia and New Zealand. GOD TV launched on DIRECTV, America's largest satellite platform in 2006 and opened a new office in Colombo, Sri Lanka in 2008. GOD TV also expanded into China during 2008. Further offices were opened in Nairobi and Melbourne in 2009.
Rory Alec was the network's CEO from 1995 to 2014, when GOD TV announced his resignation due to "moral failure." The couple divorced in 2015. Wendy Alec attributed the end of their marriage to Satan leading her husband to have an affair. Wendy Alec took over as president and CEO, a position she held for two years, before appointing Ward Simpson.
Communications scholar Pradip N. Thomas places the history of GOD TV into the larger context of a neo-imperialist project within Christian fundamentalism, comparing GOD TV's Christian Zionist messages to Franklin Graham's travel to wartime Baghdad, which Graham presented as a triumph of Christianity over Islam. Thomas notes that in India, GOD TV provides a platform for a "closing of ranks" among different Indian Christian groups, allowing an expression of Christian unity which is partly a reaction against Hindu nationalism.
In 2014, the network can reach 262 million homes worldwide including 93 million homes in India and employs 200 people with Ward Simpson as president and CEO
Programming
Much of GOD TV's programming caters to a youth audience. The network aims to air 'relevant youth programming' that comprises series and events from leading youth ministries and featuring bands such as Leeland, Switchfoot, Rend Collective, Jars of Clay, Guvna B and Newworldson.
GOD TV publishes content by Exodus International and Focus on
|
https://en.wikipedia.org/wiki/Composite%20application
|
In computing, a composite application is a software application built by combining multiple existing functions into a new application. The technical concept can be compared to mashups. However, composite applications use business sources (e.g., existing modules or even Web services ) of information, while mashups usually rely on web-based, and often free, sources.
It is wrong to assume that composite applications are by definition part of a service-oriented architecture (SOA). Composite applications can be built using any technology or architecture.
A composite application consists of functionality drawn from several different sources. The components may be individual selected functions from within other applications, or entire systems whose outputs have been packaged as business functions, modules, or web services.
Composite applications often incorporate orchestration of "local" application logic to control how the composed functions interact with each other to produce the new, derived functionality. For composite applications that are based on SOA, WS-CAF is a Web services standard for composite applications.
See also
Web 2.0
Composite Application Service Assembly (CASA)
Enterprise service bus (ESB)
Service-oriented architecture (SOA)
Service component architecture (SCA)
Mashup (web application hybrid)
External links
Composite application guidance from patterns & practices
NetBeans SOA Composite Application Project Home
camelse
Running Apache Camel in OpenESB
eclipse sirius - Free and GPL eclipse tool to build your own arbitrary complex military grade modeling tools on one hour
eclipse SCA Tools - Gnu free composite tool
Free GPL obeodesigner made with eclipse sirius
References
Web services
Service-oriented (business computing)
|
https://en.wikipedia.org/wiki/MLB%2006%3A%20The%20Show
|
MLB 06: The Show is a baseball video game for PlayStation 2 and PlayStation Portable. The game was produced by Sony Computer Entertainment, primarily by SCE's San Diego Studio, which was formerly known as 989 Sports. It is the first game in the MLB: The Show franchise.
Marketing
The game's marketing campaign consisted primarily of an extensive television advertising campaign with humorous 'spots' featuring MLB players with actors. David Ortiz of the Boston Red Sox was featured on the game cover. Ortiz, Don Zimmer, and Dave Campbell also appeared in TV spots advertising the game.
Gameplay
In-game rosters
The game does not feature any MLB player who is not a member of the Major League Baseball Players Association. However, there are some fictional players in the game that are similar to these missing players, most notably 'Reggie Stocker', a fictional player standing in for Barry Bonds, a play on the name Bonds, as in security bonds, and Stocker, as in stock broker, two money related names.
Game modes
"The Show" mode
MLB 06: The Show features a career mode which is one of the game's unique features. This is known as "The Show" mode, giving the game its name.
In this mode, the user creates a player and attempts to take him to Major League stardom. The game features officially licensed Double-A and Triple-A baseball leagues and teams from the 2006 season. By performing well, users can eventually guide their player to the major leagues.
A unique aspect of the game mode is the user's controlling only one chosen player during gameplay, as opposed to the entire team. For example, if a player is pitching in a certain game, the gameplay will simulate half-innings in which the user's team is hitting. Also, a user-controlled starting pitcher's schedule will be simulated for all games in which the user does not pitch.
Season mode
MLB 06: The Show also features a Season mode in which users can carry one team through an entire 162-game season, and into the playoffs if the team performs well enough. Users can pick from the thirty current Major League Baseball teams and have the options to change team rosters, review scouting reports for opposing teams, and view statistics and standings. In this setting, all players on a team are user-controlled during gameplay, unlike "The Show" mode.
Franchise mode
Also featured in MLB 06: The Show is Franchise mode, where in addition to multiple 162-game seasons, users control every part of the team, such as hiring coaches and setting prices. Users can sign free agents, deal with player contracts, and achieve franchise goals unique to each team. This setting is similar to Season Mode, as all players on a team are user-controlled during gameplay, unlike "The Show" mode.
Home Run Derby
The game also features Home Run Derby, a mode based on the event taking place every year on the night before the MLB All-Star Game. Users are allowed to play as any position player and can select between 2 and 10 players from a
|
https://en.wikipedia.org/wiki/Semantic%20technology
|
The ultimate goal of semantic technology is to help machines understand data. To enable the encoding of semantics with the data, well-known technologies are RDF (Resource Description Framework) and OWL (Web Ontology Language). These technologies formally represent the meaning involved in information. For example, ontology can describe concepts, relationships between things, and categories of things. These embedded semantics with the data offer significant advantages such as reasoning over data and dealing with heterogeneous data sources.
Overview
In software, semantic technology encodes meanings separately from data and content files, and separately from application code. This enables machines as well as people to understand, share and reason with them at execution time. With semantic technologies, adding, changing and implementing new relationships or interconnecting programs in a different way can be just as simple as changing the external model that these programs share.
With traditional information technology, on the other hand, meanings and relationships must be predefined and "hard wired" into data formats and the application program code at design time. This means that when something changes, previously unexchanged information needs to be exchanged, or two programs need to interoperate in a new way, the humans must get involved.
Off-line, the parties must define and communicate between them the knowledge needed to make the change, and then recode the data structures and program logic to accommodate it, and then apply these changes to the database and the application. Then, and only then, can they implement the changes.
Semantic technologies are "meaning-centered". They involve but are not limited to the following areas of application:
encoding/decoding of semantic representation,
knowledge graphs of entities and their interrelationships,
auto-recognition of topics and concepts,
information and meaning extraction,
semantic data integration, and
taxonomies/classification.
Given a question, semantic technologies can directly search topics, concepts, associations that span a vast number of sources.
Semantic technologies provide an abstraction layer above existing IT technologies that enables bridging and interconnection of data, content, and processes. Second, from the portal perspective, semantic technologies can be thought of as a new level of depth that provides far more intelligent, capable, relevant, and responsive interaction than with information technologies alone. Semantic technologies would often leverage natural language processing and machine learning in order to extract topics, concepts, and associations between concepts in text.
See also
Knowledge graph
Metadata
Ontologyalso known as a knowledge graph in a generalized term
Resource Description Framework
Schema.orga set of schemas for structured data markup on web pages
Semantic heterogeneity
Semantic integration
Semantic matching
Semantic Web
Web Ontolo
|
https://en.wikipedia.org/wiki/ZYPAD
|
The ZYPAD is a PDA designed to be worn on a user's wrist like a bracer and offers interface port features similar to laptop computer. It was developed by Parvus, a military contractor, and Eurotech. It is arguable whether it qualifies as a watch, but it is referred to as a "Wrist Worn PC". It ships with Linux kernel 2.6 and also supports Windows CE 5.0, and can sense motion, allowing such possibilities of use such as going into standby mode when a user lowers his/her arm. It can determine its position by dead reckoning as well as via GPS. It supports Bluetooth, IrDA, and WiFi.
The ZYPAD debuted in 2006 and the ZYPAD WL 1000 was the first marketed device, followed by the WL 1100. Initial retail prices were set to be around $2000. The Zypad WR1100 debuted in 2008 and features housing made out of high strength fiberglass-reinforced nylon-magnesium alloy and a biometric fingerprint scanner.
Notes and references
External links
Pic of WWPC
WWPC Home Page
Smartwatches
Embedded Linux
|
https://en.wikipedia.org/wiki/Graphics%20library
|
A graphics library is a program library designed to aid in rendering computer graphics to a monitor. This typically involves providing optimized versions of functions that handle common rendering tasks. This can be done purely in software and running on the CPU, common in embedded systems, or being hardware accelerated by a GPU, more common in PCs. By employing these functions, a program can assemble an image to be output to a monitor. This relieves the programmer of the task of creating and optimizing these functions, and allows them to focus on building the graphics program. Graphics libraries are mainly used in video games and simulations.
The use of graphics libraries in connection with video production systems, such as Pixar RenderMan, is not covered here.
Some APIs use Graphics Library (GL) in their name, notably OpenGL and WebGL.
Examples
Allegro
ANGLE
Cairo (graphics)
DFPSR https://dawoodoz.com/dfpsr.html — GUI toolkit and software renderer
DirectX — a library created by Microsoft, to run under Windows operating systems and 'Direct' Xbox
Display PostScript
emWin — an Embedded Graphics Library
FLTK — GUI Toolkit and Graphics Library
GTK — a GUI toolkit
Mesa 3D — a library that implements OpenGL and Vulkan
Qt — cross-platform application framework
Quartz (graphics layer)
SFML
SIGIL — Sound, Input, and Graphics Integration Library
Simple DirectMedia Layer (SDL)
Skia Graphics Library
X Window System
See also
Anti-Grain Geometry
Software development kit (SDK)
OpenGL ES
Graphical Widget toolkit graphical control elements drawn on bitmap displays
References
hu:Grafikus programkönyvtár
|
https://en.wikipedia.org/wiki/Smush
|
Smush is an American game show which aired on the USA Network on December 3, 2001, to June 21, 2002. Hosted by Ken Ober and Lisa Dergan, the show features contestants competing to form a portmanteau given clues.
Gameplay
The show, set in a basement party atmosphere, featured four contestants trying to "smush" the answers to clues together to create a portmanteau. For example, the clue "A New England state + 'Flying Circus' man" would result in an answer of "Vermonty Python," formed by combining "Vermont" and "Monty Python". Smushes did not have to use the exact spelling of both words. For example, "Belly Lafghanistan" could be a combination of "belly laugh" and "Afghanistan".
Rounds 1 and 2
The host read toss-up sets of clues whose answers had to be smushed together. A correct buzz-in answer scored points, while a miss gave the opponents a chance to steal. Round 1 used pairs of clues worth one point each; the clues were read aloud during the first part of the round, then both read and presented visually near its end.
Questions in Round 2 were worth two points each. Most of these were asked as "Smush Tri's," with three answers to be smushed together, but some involved participation by stage crew members and had only two clues. The final question was a "Smush Quad," requiring four answers and awarding three points.
The lowest scorer at the end of each round was eliminated from the game.
Round 3 (Smush Chain)
The host read seven toss-up clues, one at a time; after each one, a contestant had to buzz in and smush together the answers to all clues up to that point in order to score. The answer to the first clue was always a standalone word or phrase and was not smushed with anything else. An example of a completed chain might be "Leap Yeardrum Major Tommy Thompson Twin Cities," by combining "Leap Year," "Ear Drum," "Drum Major," "Major Tom," "Tommy Thompson," "Thompson Twins," and "twin cities." The first clue was worth one point, the second clue was worth two points, and so on up to seven for the last clue. The high scorer at the end of this round won the game and advanced to the Money Round.
Money Round
The hostess wrote a word or phrase on a mirror with lipstick, which served as one half of five smushes that the champion had to solve in 45 seconds. The host read one clue at a time, whose answer had to be smushed onto either the beginning or ending of the given word. (For example, given the word "inbred" and the clue "Tom Sawyer's partner and star of his own Mark Twain book," the correct answer would be "Huckleberry Finbred," obtained by smushing "Huckleberry Finn" ahead of "inbred.") The champion could pass on a clue and return to it after playing through all five if time allowed, but a miss put the clue out of play. He/she won $8,000 for solving all five smushes before time ran out, or $1,000 per correct answer otherwise.
Critical reception
Noel Holston of Newsday gave the show a mostly-positive review. He praised the show for increasing th
|
https://en.wikipedia.org/wiki/BOOPSI
|
BOOPSI (Basic Object Oriented Programming System for Intuition) is an object-oriented programming system for AmigaOS. It extends the AmigaOS windowing environment (Intuition) with an object-oriented subsystem allowing a hierarchy of object classes in which every class defines a single GUI widget or interface event.
BOOPSI made it easier for developers to create their own system of widgets and create standardized graphical user interfaces. Magic User Interface and ReAction are examples of complete widget toolkits built on BOOPSI. Both toolkits have become popular with Amiga software programmers to generate and maintain graphical user interfaces.
The object-oriented design brings advantages such as straightforward coupling of objects with other objects. For example, a programmer may link a numerical input field and a sliding control, where if the user adjusts the sliding control the numerical value in the input field changes automatically.
BOOPSI was officially introduced with AmigaOS 2.0 and was further extended in later releases.
References
The Amiga ROM Kernel Reference Manual: Libraries, published by Addison Wesley, (1991),
External links
How it works BOOPSI at Codewiz.org
functioning of BOOPSI at The Flux Research Group, University of Utah.
Amiga APIs
Amiga software
AmigaOS 4 software
MorphOS
MorphOS software
Widget toolkits
|
https://en.wikipedia.org/wiki/Adaptive%20partition%20scheduler
|
Adaptive partition schedulers are a relatively new type of partition scheduler, which in turn is a kind of scheduling algorithm, pioneered with the most recent version of the QNX operating system. Adaptive partitioning, or AP, allows the real-time system designer to request that a percentage of processing resources be reserved for a particular partition (group of threads and/or processes making up a subsystem). The operating system's priority-driven pre-emptive scheduler will behave in the same way that a non-AP system would until the system is overloaded (i.e. system-wide there is more computation to perform than the processor is capable of sustaining over the long term). During overload, the AP scheduler enforces hard limits on total run-time for the subsystems within a partition, as dictated by the allocated percentage of processor bandwidth for the particular partition.
If the system is not overloaded, a partition that is allocated (for example) 10% of the processor bandwidth, can, in fact, use more than 10%, as it will borrow from the spare budget of other partitions (but will be required to pay it back later). This is very useful for the non real-time subsystems that experience variable load, since these subsystems can make use of spare budget from hard real-time partitions in order to make more forward progress than they would in a fixed partition scheduler such as ARINC-653 , but without impacting the hard real-time subsystems' deadlines.
QNX Neutrino 6.3.2 and newer versions have this feature.
External links
Adaptive Partitioning Scheduler page at QNX.com
"A Survey of Task Schedulers" for an overview of schedulers, including partition schedulers.
Processor scheduling algorithms
|
https://en.wikipedia.org/wiki/Capsa%20%28software%29
|
Capsa is the name for a family of packet analyzers developed by Colasoft for network administrators to monitor, troubleshoot and analyze wired & wireless networks. The company provides a free edition for individuals, but paid licenses are available for businesses and enterprises. The software includes Ethernet packet analysis, diagnostics and a security monitoring system.
References
External links
Colasoft Official website
Colasoft Official Blog
Colasoft Capsa FAQ
- lists Colasoft Capsa Free edition
Network analyzers
|
https://en.wikipedia.org/wiki/Pintos
|
Pintos is computer software, a simple instructional operating system framework for the x86 instruction set architecture. It supports kernel threads, loading and running user programs, and a file system, but it implements all of these in a very simple way.
Pintos is currently used by multiple institutions, including UT Austin, UC Berkeley and Imperial College London, as an academic aid in Operating Systems class curriculums.
History
It was created at Stanford University by Ben Pfaff in 2004. It originated as a replacement for Not Another Completely Heuristic Operating System (Nachos), a similar system originally developed at UC Berkeley by Thomas E. Anderson, and was designed along similar lines.
Comparison to Nachos
Like Nachos, Pintos is intended to introduce undergraduates to concepts in operating system design and implementation by requiring them to implement significant portions of a real operating system, including thread and memory management and file system access. Pintos also teaches students valuable debugging skills.
Unlike Nachos, Pintos can run on actual x86 hardware, though it is often run atop an x86 emulator, such as Bochs or QEMU. Nachos, by contrast, runs as a user process on a host operating system, and targets the MIPS architecture (Nachos code must run atop a MIPS simulator). Pintos and its accompanying assignments are also written in the programming language C instead of C++ (used for original Nachos) or Java (used for Nachos 5.0j).
References
External links
Free software operating systems
X86 operating systems
Educational operating systems
Software using the BSD license
2004 software
|
https://en.wikipedia.org/wiki/The%20Marc%20Maron%20Show
|
The Marc Maron Show was a late night radio show produced in affiliation with the Air America Radio network and hosted by comedian Marc Maron. The show originated from KTLK 1150 AM in Los Angeles, California. The show was less politically focused and more comedic than the other weekday programs on Air America. It featured interviews (both political and showbusiness), live comedy, and extensive banter between Maron and Jim Earl, Maron's co-host, who provides humorous introductions after each commercial break and plays several of the recurring characters in the show's skits.
Format
The content of the show was a wide mix. Political segments and interviews similar to those on other shows on Air America were a regular fixture, with a slight focus away from the "topics of the day" towards a more general feel for the political landscape, and especially environmental, health-related chemical issues and religion. Also featured were interviews with authors, directors and writers, often of political or satirical works, and appearances by comics. The website of the show described it as having "a laid-back performance and interview style reminiscent of the Late Show with David Letterman or Late Night with Conan O'Brien, with an emphasis on culture and comedy". Comedy skits were a regular feature, with a variety of re-occurring skits and occasional one-off bits.
The show's inception came about following the ending of Morning Sedition, Air America's original "morning drive" show. Maron's contract for the show was not renewed, so he moved back from New York to Los Angeles (where he lives). There KTLK set up The Marc Maron Show, since it had become evident following outcries to Air America by a small but committed fan base that there was an audience for his style of radio. As such, it shared many common characters and themes with Morning Sedition. In addition to Jim Earl also moving to Los Angeles to join the show and bringing all of his segments (Mort Mortensen's Weekly Remembrance, Cardinal Milf Milfington's Rapture Watch, War on Brains, etc.), the show also features Kent Jones's Lawton Smalls character occasionally. Maron's "Short Order News" is a similar vehicle for topical jokes to the "Morning Sedition Cliff Notes" from Morning Sedition.
The show launched on February 28, 2006, and was broadcast "Live" from the Marc Graue Voice Over Studios in Burbank, California, until July 13, 2006, originally aired live only on KTLK. From its beginning the show was part of Air America's paid podcasting service. The show was officially scheduled from 1AM - 3AM ET. Due to contractual issues at KTLK, the show was frequently delayed by Los Angeles Clippers broadcasts and postgame shows during the basketball season. As of April 10, 2006, the show moved to being pre-recorded between 5PM - 7PM PT. Syndication by Air America was scheduled to start on April 17, 2006, but changes in the AAR management team delayed that event. Talks between Maron and AAR managemen
|
https://en.wikipedia.org/wiki/Juszkowo%20railway%20station
|
Juszkowo is a non-operational railway station in Juszkowo (Pomeranian Voivodeship), Poland.
Lines crossing the station
References
Juszkowo article at Polish stations database, URL accessed at 17 March 2006
Railway stations in Pomeranian Voivodeship
Disused railway stations in Pomeranian Voivodeship
Gdańsk County
|
https://en.wikipedia.org/wiki/Straszyn%20Pr%C4%99dzieszyn%20railway%20station
|
Straszyn Prędzieszyn is a non-operational railway station in Straszyn, Pomeranian Voivodeship, Poland.
Lines crossing the station
References
Straszyn Prędzieszyn article at Polish stations database, URL accessed at 17 March 2006
Railway stations in Pomeranian Voivodeship
Disused railway stations in Pomeranian Voivodeship
Gdańsk County
|
https://en.wikipedia.org/wiki/Goszyn%20railway%20station
|
Goszyn is a non-operational railway station in Goszyn (Pomeranian Voivodeship), Poland.
Lines crossing the station
References
Goszyn article at Polish stations database , URL accessed at 17 March 2006
Railway stations in Pomeranian Voivodeship
Disused railway stations in Pomeranian Voivodeship
Gdańsk County
|
https://en.wikipedia.org/wiki/Marcus%20Hutter
|
Marcus Hutter (born April 14, 1967 in Munich) is a professor and artificial intelligence researcher. A Senior Scientist at DeepMind, he is researching the mathematical foundations of artificial general intelligence. He is on leave from his professorship at the ANU College of Engineering and Computer Science of the Australian National University in Canberra, Australia. Hutter studied physics and computer science at the Technical University of Munich. In 2000 he joined Jürgen Schmidhuber's group at the Istituto Dalle Molle di Studi sull'Intelligenza Artificiale (Dalle Molle Institute for Artificial Intelligence Research) in Manno, Switzerland. He developed a mathematical theory of artificial general intelligence. His book Universal Artificial Intelligence: Sequential Decisions Based on Algorithmic Probability was published by Springer in 2005.
Research
Starting in 2000, Hutter developed and published a mathematical theory of artificial general intelligence, AIXI, based on idealised intelligent agents and reward-motivated reinforcement learning.
In 2005, Hutter and Legg published an intelligence test for artificial intelligence devices.
In 2009, Hutter developed and published the theory of feature reinforcement learning.
In 2014, Lattimore and Hutter published an asymptotically optimal extension of the AIXI agent.
Hutter Prize
In 2006, Hutter announced the Hutter Prize for Lossless Compression of Human Knowledge, with a total of €50,000 in prize money. In 2020, Hutter raised the prize money for the Hutter Prize to €500,000.
See also
Solomonoff induction
Published works
References
Living people
Machine learning researchers
Artificial intelligence researchers
German computer scientists
Technical University of Munich alumni
Academic staff of the Australian National University
1967 births
|
https://en.wikipedia.org/wiki/Trafikmagasinet
|
Trafikmagasinet (The Traffic magazine) was a Swedish TV-show about traffic and motoring, broadcast on the Swedish public service network SVT from 1978 to 2003. Aside from reviewing new cars (which were graded by awarding "steering wheels"), Trafikmagasinet featured news, educational content, and consumer reports. The show was created by Carl Ingemar Perstad who also hosted the show until 2002. Christer Glenning co-hosted the show and was responsible for car testing until his death in 1998.
History
Trafikmagasinet launched on March 15, 1978. The show was an immediate success and its ratings were higher than many popular entertainment shows. Internationally, the show was a pioneer. The type of road tests first introduced in Trafikmagasinet became very popular and used by motor journalists in several countries.
Beside the TV-audience, journalists and car industry looked upon Trafikmagasinet with high confidence. In 1987 Carl-Ingemar Perstad received an award from the Swedish Royal Automobile Club for his contribution to enhance and improve the level of Swedish road and traffic safety.
An important event in the show's history was when a Škoda failed miserably in a road test, flipping over while turning in 30 km/h. History repeated itself in 1997, when Trafikmagasinet together with the car magazine Teknikens Värld overturned the new Mercedes-Benz A-Class during testing. Mercedes-Benz initially claimed that the car had been manipulated and threatened to sue the journalists, but finally had to admit that the car was unsafe during sharp turns at high speed. The A-Class was re-released with Electronic Stability Control, and the episode gave some fame to the expression moose test - this due to Mercedes-Benz' initial attempt to ridicule the failed test and claim that it was only of interest to Swedes.
During the 1990s and onward new co-hosts joined Trafikmagasinet. Sofia Lindahl was followed by Bodil Karlsson and later Veronica Marklund. When Christer Glenning died in 1998, Staffan Borglund replaced him as car tester.
During its last year, Trafikmagasinet left the studio-based concept. The show was one of many that were axed when SVT were forced to make major budget-cuts in 2003.
References
External links
SVT official site
Sveriges Television original programming
Automotive television series
|
https://en.wikipedia.org/wiki/Bielkowo%20railway%20station
|
Bielkowo is a non-operational PKP railway station in Bielkowo (Pomeranian Voivodeship), Poland.
Lines crossing the station
References
Bielkowo article at Polish stations database, URL accessed at 17 March 2006
Railway stations in Pomeranian Voivodeship
Disused railway stations in Pomeranian Voivodeship
Gdańsk County
|
https://en.wikipedia.org/wiki/%C5%81apino%20railway%20station
|
Łapino is a non-operational PKP railway station in Łapino (Pomeranian Voivodeship), Poland.
Lines crossing the station
References
Łapino article at Polish stations database, URL accessed at 17 March 2006
Railway stations in Pomeranian Voivodeship
Disused railway stations in Pomeranian Voivodeship
Gdańsk County
Railway stations in Poland opened in 1886
|
https://en.wikipedia.org/wiki/Niest%C4%99powo%20railway%20station
|
Niestępowo is a non-operational PKP railway station in Niestępowo (Pomeranian Voivodeship), Poland.
Lines crossing the station
References
Niestępowo article at Polish stations database, URL accessed at 17 March 2006
Railway stations in Pomeranian Voivodeship
Disused railway stations in Pomeranian Voivodeship
Kartuzy County
|
https://en.wikipedia.org/wiki/Stara%20Pi%C5%82a%20railway%20station
|
Stara Piła is a PKP railway station in Stara Piła (Pomeranian Voivodeship), Poland.
Lines crossing the station
References
Stara Piła article at Polish stations database, URL accessed at 17 March 2006
Railway stations in Poland opened in 1886
Railway stations in Pomeranian Voivodeship
Kartuzy County
|
https://en.wikipedia.org/wiki/Le%C5%BAno%20railway%20station
|
Leźno is a non-operational PKP railway station in Leźno (Pomeranian Voivodeship), Poland.
Lines crossing the station
References
Leźno article at Polish stations database. Retrieved 20 April 2014.
Railway stations in Pomeranian Voivodeship
Disused railway stations in Pomeranian Voivodeship
Kartuzy County
|
https://en.wikipedia.org/wiki/Kokoszki%20railway%20station
|
Kokoszki is a PKP railway station in Kokoszki (Pomeranian Voivodeship), Poland.
Lines crossing the station
References
Kokoszki article at Polish stations database, URL accessed at 17 March 2006
Railway stations in Gdańsk
Railway stations in Poland opened in 1914
|
https://en.wikipedia.org/wiki/Kie%C5%82pinek%20railway%20station
|
Kiełpinek is a non-operational PKP railway station in Kiełpinek (Pomeranian Voivodeship), Poland.
Lines crossing the station
References
Kiełpinek article at Polish stations database, URL accessed at 17 March 2006
Railway stations in Gdańsk
Disused railway stations in Pomeranian Voivodeship
|
https://en.wikipedia.org/wiki/%C5%BBukowo%20Zachodnie%20railway%20station
|
Żukowo Zachodnie is a non-operational PKP railway station in Żukowo (Pomeranian Voivodeship), Poland.
Lines crossing the station
References
Żukowo Zachodnie article at Polish stations database, URL accessed at 17 March 2006
Railway stations in Pomeranian Voivodeship
Disused railway stations in Pomeranian Voivodeship
Kartuzy County
|
https://en.wikipedia.org/wiki/Machine-check%20exception
|
A machine check exception (MCE) is a type of computer error that occurs when a problem involving the computer's hardware is detected. With most mass-market personal computers, an MCE indicates faulty or misconfigured hardware.
The nature and causes of MCEs can vary by architecture and generation of system. In some designs, an MCE is always an unrecoverable error, that halts the machine, requiring a reboot. In other architectures, some MCEs may be non-fatal, such as for single-bit errors corrected by ECC memory. On some architectures, such as PowerPC, certain software bugs can cause MCEs, such as an invalid memory access. On other architectures, such as x86, MCEs typically originate from hardware only.
Reporting
IBM mainframe operating systems
IBM System/360 Operating System (OS/360) records input/output errors in a dataset called SYS1.LOGREC. Since then IBM has coined the term error recording data set (ERDS) for successor versions that allow the installation to choose the name and for operating systems not derived from OS/360.
OS/360
In OS/360, the installation can choose several levels of support for handling machine checks. The most sophisticated, Machine Check Handler (MCH), records failure data on SYS1.LOGREC and attempts recovery. The installation can print those data using the Environmental Record Editing and Printing Program (EREP) service aid or the stand-alone version SEREP. The MCH can handle memory failures in refreshable nucleus control sections by reading a fresh copy from SYS1.ASRLIB and can handle memory errors in SVC transient areas by reading a fresh copy of the SVC module from SYS1.SVCLIB.
z/OS
In z/OS the installation can either use an ERDS or can define a z/OS System Logger log stream to hold the error data. As with OS/360, the installation uses EREP to print those data; SEREP is no longer available. The MCH is no longer optional, and handles many more failure modes than the OS/360 MCH.
Microsoft Windows
On Microsoft Windows platforms, in the event of an unrecoverable MCEs, the system generates a BugCheck — also called a STOP error, or a Blue Screen of Death.
More recent versions of Windows use the Windows Hardware Error Architecture (WHEA), and generate STOP code 0x124, WHEA_UNCORRECTABLE_ERROR. The four parameters (in parentheses) will vary, but the first is always 0x0 for an MCE. Example:
STOP: 0x00000124 (0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000)
Older versions of Windows use the Machine Check Architecture, with STOP code 0x9C, MACHINE_CHECK_EXCEPTION. Example:
STOP: 0x0000009C (0x00000030, 0x00000002, 0x00000001, 0x80003CBA)
Linux
On Linux, the kernel writes messages about MCEs to the kernel message log and the system console. When the MCEs are not fatal, they will also typically be copied to the system log and/or systemd journal. For some systems, ECC and other correctable errors may be reported through MCE facilities.
Example:
CPU 0: Machine
|
https://en.wikipedia.org/wiki/Cheney%27s%20algorithm
|
Cheney's algorithm, first described in a 1970 ACM paper by C.J. Cheney, is a stop and copy method of tracing garbage collection in computer software systems. In this scheme, the heap is divided into two equal halves, only one of which is in use at any one time. Garbage collection is performed by copying live objects from one semispace (the from-space) to the other (the to-space), which then becomes the new heap. The entire old heap is then discarded in one piece. It is an improvement on the previous stop-and-copy technique.
Cheney's algorithm reclaims items as follows:
Object references on the stack. Object references on the stack are checked. One of the two following actions is taken for each object reference that points to an object in from-space:
If the object has not yet been moved to the to-space, this is done by creating an identical copy in the to-space, and then replacing the from-space version with a forwarding pointer to the to-space copy. Then update the object reference to refer to the new version in to-space.
If the object has already been moved to the to-space, simply update the reference from the forwarding pointer in from-space.
Objects in the to-space. The garbage collector examines all object references in the objects that have been migrated to the to-space, and performs one of the above two actions on the referenced objects.
Once all to-space references have been examined and updated, garbage collection is complete.
The algorithm needs no stack and only two pointers outside of the from-space and to-space: a pointer to the beginning of free space in the to-space, and a pointer to the next word in to-space that needs to be examined. The data between the two pointers represents work remaining for it to do (those objects are gray in the tri-color terminology, see later).
The forwarding pointer (sometimes called a "broken heart") is used only during the garbage collection process; when a reference to an object already in to-space (thus having a forwarding pointer in from-space) is found, the reference can be updated quickly simply by updating its pointer to match the forwarding pointer.
Because the strategy is to exhaust all live references, and then all references in referenced objects, this is known as a breadth-first list copying garbage collection scheme.
Sample algorithm
initialize() =
tospace = N/2
fromspace = 0
allocPtr = fromspace
scanPtr = whatever -- only used during collection
allocate(n) =
If allocPtr + n > fromspace + N/2
collect()
EndIf
If allocPtr + n > fromspace + N/2
fail “insufficient memory”
EndIf
o = allocPtr
allocPtr = allocPtr + n
return o
collect() =
swap(fromspace, tospace)
allocPtr = fromspace
scanPtr = fromspace
-- scan every root you've got
ForEach root in the stack -- or elsewhere
root = copy(root)
EndForEach
-- scan objects in the to-space (including objects added by this loop)
Whil
|
https://en.wikipedia.org/wiki/Cyber%20City%20Oedo%20808
|
is a 1990 cyberpunk original video animation series created by Madhouse and directed by Yoshiaki Kawajiri. Set in the year 2808 in the city of Oedo (Tokyo), it tells the story of three criminals who are enlisted into fighting crime in exchange for reducing their sentences to the point where they are able to earn their freedom. The three criminals are Sengoku Shunsuke, an anti-social maverick, Gogl, a mohawk wearing hacker, and Benten, an androgynous bishōnen.
The UK release of the OVA includes a completely new score by Rory McFarlane.
Plot
To combat computerised crime more effectively, the Cyber Police unit of the future Japanese city of Oedo has restarted the feudal practice of hōmen (放免), employing hardened criminals with a history of hi-tech offences and other crimes such as murder as officers themselves.
Three such criminals are Sengoku, Goggles, and Benten, who are serving their 300-or-more year sentences in an orbital penitentiary. For duty served, each criminal will receive a reduction in their prison time. Desperate to get away from the boredom and monotony of jail life, they half-heartedly agree to the deal. They answer to police chief Juso Hasegawa, who keeps them in check with explosive collars that they wear around their necks. Hasegawa has the ability to blow their collars remotely, and they will also explode if they fail to complete their missions within an allocated time period. Each one is also armed with a jitte (the traditional weapon and symbol of authority of the ancient Edo Police), although they also have access to more powerful weaponry.
Although there are no specifics to what kind of society the series is based in, it is presented as very high-tech but with a rather dystopian feel. In the first episode, a man under pressure confesses to a murder (which he did commit) and which is responsible for the present crisis. This is enough for Hasegawa to order Sengoku to execute him without charge or trial. When Sengoku fails to obey orders, his sentence is increased.
Episode list
Cast
Related media
Video game
is a graphic adventure game released on March 15, 1991 for the PC-Engine CD-ROM² by Nippon Computer System exclusively in Japan. The storyline is completely original and not an adaptation of any episode.
Music
{{Infobox album
| name = Cyber City Oedo 808
| type = Soundtrack
| artist = Rory McFarlane
| cover = 417X0KCKQFL.jpg
| alt =
| released = 30 January 1995
| recorded =
| venue =
| studio =
| genre = Alternative rockSynthwaveAmbientProgressive
| length = 46:56
| label = Demon Records (out of print)DSCD-808| producer = Rory McFarlane
| prev_title =
| prev_year =
| next_title =
| next_year =
}}
The original British VHS release (also televised on Channel 4 circa 1995) features a more rock-centric 23 track score composed by Rory McFarlane not present on the US or Japanese versions. McFarlane's score combined metal, electronica and ambient styles. It has bee
|
https://en.wikipedia.org/wiki/PlayStation%20Network
|
PlayStation Network (PSN) is a digital media entertainment service provided by Sony Interactive Entertainment. Launched in November 2006, PSN was originally conceived for the PlayStation video game consoles, but soon extended to encompass smartphones, tablets, Blu-ray players and high-definition televisions. This service is the account for PlayStation consoles, accounts can store games and other content.
As of April 2016, over 110 million users have been documented, with 106 million of them active monthly as of the end of March 2022. PlayStation Network's services are dedicated to an online marketplace (PlayStation Store), a premium subscription service for enhanced gaming and social features (PlayStation Plus), music streaming (PlayStation Music, based on Spotify), TV streaming (PlayStation Vue), and formerly a cloud gaming service (PlayStation Now; folded into PlayStation Plus Premium in June 2022). The service is available in 73 territories.
History
Launched in the year 2000, Sony's second home console, the PlayStation 2, had rudimentary online features in select games via its online network. It required a network adaptor, which was available as an add-on for original models and integrated into the hardware on slimline models. However, Sony provided no unified service for the system, so support for network features was specific to each game and third-party server, and there was no interoperability of cross-game presence. Five years later during the development stage for its third home console, the PlayStation 3, Sony expressed their intent to build upon the functionality of its predecessor by creating a new interconnected service that keeps users constantly in touch with a "PlayStation World" network. In March 2006, Sony officially introduced its unified online service, tentatively named "PlayStation Network Platform". A list of supporting features was announced at the Tokyo Game Show later the same year.
Sony launched an optional premium subscription service on top of the free PSN service in June 2010. Known as PlayStation Plus, the system provides access to exclusive content, complementary games, regular store discounts, and early access to forthcoming games.
Following a security intrusion, the PlayStation Network had a temporary suspension of operation which began on April 20, 2011 and affected 77 million registered accounts. Lasting 23 days, this outage was the longest amount of time the PSN had been offline since its inception in 2006. Sony reported that user data had been obtained during the intrusion. In June 2011, Sony launched a "Welcome Back" program following the outage, allowing all PSN subscribers who joined prior to April 20 to download two free PlayStation 3 titles and two free PlayStation Portable games. Users also received 30 free days of PlayStation Plus, while users who were already subscribed before the outage got 60 free days. After the disruption, Sony changed the PlayStation Network's license agreement to legally bar
|
https://en.wikipedia.org/wiki/STAR%20%28software%29
|
STAR Reading, STAR Early Literacy and STAR Math are standardized, computer-adaptive assessments created by Renaissance Learning, Inc., for use in K–12 education. Each is a "Tier 2" assessment of a skill (reading practice, math practice, and early literacy, respectively) that can be used any number of times due to item-bank technology. These assessments fall somewhere between progress monitoring tools ("Tier 1") and high-stakes tests.
Original meaning
STAR, as an acronym, used to mean "Standardized Test for the Assessment of Reading". This meaning is no longer maintained, as the company has created STAR assessments for skills in domains other than reading. STAR Reading, the first STAR assessment, was originally just "STAR." Since the creation of STAR Math, the original STAR has been renamed to STAR Reading. Confusion may also arise with California's STAR (Standardized Testing and Reporting) or the Supplementary Tests of Achievement in Reading published by the New Zealand Council for Educational Research, but these are not the same assessments.
Purpose
The purpose of the STAR assessments is to provide information to teachers about student growth and achievement in grades 1–12. Students take the assessment and it is scored automatically by the software. Teachers and administrators are able to view and print a number of reports at the individual, classroom, and grade level in order to monitor progress. Teachers can then tailor instruction to individuals and to high-stakes testing requirements.
STAR assessments
Each assessment provides estimates of students' skills and comparisons of students' abilities to national norms. Each is intended to aid with developing curriculum and instruction by providing feedback about student, classroom, and grade level progress. The software reports grade equivalents, percentile ranks, and normal curve equivalents.
Each assessment is standardized and highly correlated to other assessments. Thus, the results predict achievement on other standardized tests. For more on the reliability and validity of these assessments, see below.
All STAR products were available as stand-alone and network software, but now the company strongly advertises the web-based Renaissance Place version.
STAR Reading
The purpose of STAR Reading is to assess students' reading skills. The assessment provides an approximate measure of each students' reading level. The company claims that students can complete the assessment in less than 10 minutes.
STAR Early Literacy
The purpose of STAR Early Literacy is to assess students' early literacy skills in preparation for reading. SEL identifies student reading levels (e.g. Emergent Reader) and provides student performance results for pre-K through third grade students. The company claims that students can complete the assessment in less than 10 minutes.
STAR Math
The purpose of STAR Math is to assess students' mathematics skills. The assessment provides an approximate measure of each students' math
|
https://en.wikipedia.org/wiki/EKA1
|
EKA1 (EPOC Kernel Architecture 1) is the first-generation kernel for the operating system Symbian OS. EKA1 originated in the earlier operating system EPOC. It offers preemptive computer multitasking and memory protection, but no real-time computing guarantees, and a single-threaded device driver model. It was largely been superseded by EKA2.
Much of EKA1 was developed by a single software engineer, Colly Myers, when he was working for Psion Software in the early 1990s. Myers went on to act as CEO for Symbian Ltd., when it was formed to license this kernel and associated operating system to mobile phone makers. He is now CEO of Issuebits Ltd.
See also
Psion (company)
Operating system kernels
Symbian OS
Microkernels
Computer-related introductions in 1989
|
https://en.wikipedia.org/wiki/EKA2
|
EKA2 (EPOC Kernel Architecture 2) is the second-generation Symbian platform real-time operating system kernel, which originated in the earlier operating system EPOC.
EKA2 began with a proprietary software license. In October 2009, it was released as free and open-source software under an Eclipse Public License. In April 2011, it was reverted to a proprietary license.
Like its predecessor, EKA1, it has preemptive multithreading and full memory protection. The main differences are:
Real-time guarantees: each application programming interface (API) call is fast, but more importantly, time-bound
Multiple threads inside the kernel, and outside
Pluggable memory models, allowing better support for later generations of ARM instruction set architecture.
A nanokernel which provides the most basic OS facilities upon which other personality layers can be built
The user interface of EKA2 is almost fully compatible with EKA1. EKA1 was not used after Symbian OS version 8.1, and was superseded in 2005.
The main advantage of EKA2 was its ability to run full telephone signalling protocol stacks. Previously, on Symbian phones, these had to run on a separate central processing unit (CPU). Such signalling stacks are very complex and rewriting them to work natively on Symbian OS is typically not an option. EKA2 thus allows personality layers to emulate the basic primitives of other operating systems, thus allowing existing signalling stacks to run largely unchanged.
Real-time guarantees are a prerequisite of signalling stacks, and also help with multimedia tasks. However, as with any RTOS, a full analysis of all threads is needed before any real-time guarantees can be offered to anything except the highest-priority thread; because higher priority threads may prevent lower-priority threads from running. Any multimedia task is likely to involve graphics, storage and/or networking activity, all of which are more likely to disrupt the stream than the kernel is.
Inside the kernel, EKA1 only allowed one thread (plus a null idle thread). EKA2 allows many threads. This makes it much easier to write device drivers that involve complex finite-state machines, such as those for SD card memory sticks or USB flash drives. Interrupts are handled with an interrupt service routine, which may request an immediate deferred function call (called as soon as the interrupts are processed), or a deferred function call, which is queued to run on a kernel thread. Either may in turn communicate with user-side threads.
Power management in EKA2 was largely unchanged from EKA1. The exact scheme varies between phones, but generally the null thread puts the CPU and peripherals to sleep, after having requested a wake-up whenever the next timer is due to expire.
EKA2 runs on ARM architecture CPUs and the WINS emulator. Unofficial ports exist for other CPUs. On the emulator, EKA2 provides somewhat better emulation than EKA1, more so for the APIs which Symbian OS uses to represent processe
|
https://en.wikipedia.org/wiki/Resource%20%28Java%29
|
In the Java programming language a resource is a piece of data that can be accessed by the code of an application.
An application can access its resources through uniform resource locators, like web resources, but the
resources are usually contained within the JAR file(s) of the application.
A resource bundle is a set of key and value pairs, stored as a resource, that is commonly used to allow the localization of an application. For this purpose different resource bundles with a
common set of keys are used to store translations for the messages and user interface texts of an application.
References
Java (programming language)
|
https://en.wikipedia.org/wiki/DES%20Challenges
|
The DES Challenges were a series of brute force attack contests created by RSA Security to highlight the lack of security provided by the Data Encryption Standard.
The Contests
The first challenge began in 1997 and was solved in 96 days by the DESCHALL Project.
DES Challenge II-1 was solved by distributed.net in 39 days in early 1998. The plaintext message being solved for was "The secret message is: Many hands make light work."
DES Challenge II-2 was solved in just 56 hours in July 1998, by the Electronic Frontier Foundation (EFF), with their purpose-built Deep Crack machine. EFF won $10,000 for their success, although their machine cost $250,000 to build. The contest demonstrated how quickly a rich corporation or government agency, having built a similar machine, could decrypt ciphertext encrypted with DES. The text was revealed to be "The secret message is: It's time for those 128-, 192-, and 256-bit keys."
DES Challenge III was a joint effort between distributed.net and Deep Crack. The key was found in just 22 hours 15 minutes in January 1999, and the plaintext was "See you in Rome (second AES Conference, March 22-23, 1999)".
Reaction
After the DES had been shown to be breakable, FBI director Louis Freeh told Congress, "That is not going to make a difference in a kidnapping case. It is not going to make a difference in a national security case. We don't have the technology or the brute force capability to get to this information."
It was not until special purpose hardware brought the time down below 24 hours that both industry and federal authorities had to admit that the DES was no longer viable. Although the National Institute of Standards and Technology started work on what became the Advanced Encryption Standard in 1997, they continued to endorse the DES as late as October 1999, with FIPS 46-3. However, Triple DES was preferred.
See also
RSA Factoring Challenge
RSA Secret-Key Challenge
References
Cryptography contests
Data Encryption Standard
Recurring events established in 1997
|
https://en.wikipedia.org/wiki/ZOPL
|
ZOPL is a programming language created by Geac Computer Corporation in the early 1970s for use on their mainframe computer systems used in libraries and banking institutions. It had similarities to C and Pascal. It also was in many respects similar to (and, perhaps, derived from) BCPL.
ZOPL stood for "Version Z, Our Programming Language".
Language constructs
ZOPL was a fairly low-level programming language, with some interesting and unusual features. Variable could be declared as DCL or BDCL types. DCL variables started at the top of memory, location 0. BDCL started further down the memory stack. There was no concept of other types, such as integer or character. In effect you were declaring an area of memory with a name. For example, if you declared:
DCL Fred (10)
DCL Alice (20)
then you had declared two lumps of memory, Fred and Alice. Fred starts at memory location 0 and has 10 bytes of memory (each byte of 8 bits). Alice started at position 9 and has 20 bytes of memory. You could put data into Fred by assigning Fred a value. But you could also do so using the address of Fred, using an offset if required. So $Fred+3 would be at address 2 in memory (i.e. the 3rd word in memory). You could put information into Alice in the same way, but also by using Fred with an offset greater than 9 - because Alice starts immediately after Fred. There was nothing to stop you from putting data into Alice by referencing Fred with a suitable offset.
Similarly, variables passed as parameters to functions or subroutines were actually being passed as addresses. You could retrieve data from Fred or Alice by using the contents of an address (|$Fred+3, for example).
It was a very versatile language, though one had to be careful in its use, for obvious reasons.
Later use
ZOPL is still in use at CGI Group (formerly known as RealTime Datapro), who ported it to VAX/VMS and Unix in the 1980s, and to Windows in 1998. by 2010 it had been ported to run on Windows XP/2000/2003 and Red Hat Linux. The RTM (formerly ZUG) language compiler and runtime framework are written in ZOPL.
Outside of CGI, ZOPL has not been in general use since the late 1980s, although there is still one known working system where it is found embedded in programs written in the KARL programming language.
Not to be confused with ...
Psion used their own language called OPL, which was nothing like Geac's OPL. Geac did, however, at a later date use Psion Organiser devices in conjunction with their library management systems, which is where a long-standing confusion may have originated. They used the Psion Organiser hand-held devices because these used the same microprocessor that was used in the Epson device used previously. The Organiser could be used with a barcode reader, used for scanning the barcodes on books and on borrowers' library cards. However, at the time that the Organiser was being evaluated for use in mobile libraries it could not read Codabar - which was the barco
|
https://en.wikipedia.org/wiki/Brick%20%28electronics%29
|
A brick (or bricked device) is a mobile device, game console, router, computer or other consumer electronic device that is no longer functional due to corrupted firmware, a hardware problem, or other damage. The term analogizes the device to a brick's modern technological usefulness.
Cause and prevention
Bricking a device is most often a result of interrupting an attempt to update the device. Many devices have an update procedure which must not be interrupted before completion; if interrupted by a power failure, user intervention, or any other reason, the existing firmware may be partially overwritten and unusable. The risk of corruption can be minimized by taking all possible precautions against interruption.
Installing firmware with errors, or for a different revision of the hardware, or installing firmware incompetently patched such as DVD firmware which only plays DVDs sold in a particular region, can also cause bricking.
Devices can also be bricked by malware (malicious software) and sometimes by running software not intentionally harmful but with errors that cause damage.
Some devices include a backup copy of their firmware, stored in fixed ROM or writable non-volatile memory, which is not normally accessible to processes that could corrupt it. Should the firmware become corrupted, the device can copy from the backup memory to its main memory, restoring the firmware.
Types
Bricking is classified into two types, hard and soft, depending on the device's ability to function.
Hard brick
Hard bricked devices generally show few or no signs of life. A hard bricked device does not power on or show any vendor logo; the screen remains turned off or blank. Some of the major reasons for hard bricking include installing firmware not intended for the device, severe physical damage, interrupting a firmware flashing procedure, or following a flashing procedure incorrectly.
In the case of Android devices, some kernel bugs have been known that affect the /data partition in the eMMC chip, which becomes corrupted during certain operations such as wiping and flashing.
Recovering from a hard brick is generally considered difficult and requires the use of a more direct programming interface to the device; such an interface often exists, as there must be a way to program the initial firmware during the manufacturing process. However, additional tools or connections may be needed, such as low-level programming devices. Hardware hard brick recoveries are also considered difficult and require electrical knowledge to find and fix hardware issues. For example, an overloaded capacitor in a circuit may explode, thus stopping the flow of electricity and bricking the device. More complex examples involve permanent damage to integrated circuits and processors. Fixing such hardware bricks involve replacing these components entirely or fixing them by either bypassing if the circuit allows or other methods.
Most devices can be hard bricked in a variety of ways. Resolu
|
https://en.wikipedia.org/wiki/Cybernary
|
Cybernary is a comic book series created by comic book artist Nick Manabat with writer Steve Gerber and published by American company Wildstorm Productions in 1995. It tells the story of Katrina Cupertino, a cybernetic anti-heroine carrying the consciousness of Yamiko Gamorra.
Publication history
Cybernary began as a backup story to Jim Lee's run on Deathblow, but Manabat's work on the series was cut short with his untimely demise due to a longtime illness. Gerber continued the storyline through a 1995 mini-series with art by Jeff Rebner and Richard Friend. On this post-Manabat series, Gerber remarked, "The artist, unfortunately, had no feel for the kind of cyber-civilization we were trying to portray. I admit, I lost interest a couple of issues into the series."
A second Cybernary, based on Yamiko Gamorra herself, was created in a short story written by Tommy Yune for the Wildstorm Thunderbook that overlapped with some of the events of The Authority. The story was continued by Joe Harris for a six-part Cybernary 2.0 limited series that started in 2001.
Fictional character biography
Katrina's story takes place in the Wildstorm Universe on the fictional post-apocalyptic island of Gamorra. She is a member of the American colony. Her parents die in a suspicious accident and Katrina opts for a life on the street. With her 'street smarts' and low-level telepathy, she prospered in the criminal circles. She teams up with a male partner named Cisco. During one mission, there were mistakes and Vandalla, one of Gamorra's main scientists, ends up with custody of Cisco. Her rescue attempt seemingly works, but Cisco is not truly freed and Katrina herself is vastly altered. While her outside looks like a very carefully made nympho-droid, her insides are built for killing. Not only that, her mind also contains the consciousness of Kaizen Gamorra's lost daughter Yamiko. Intended as a present for Kaizen himself, she instead escapes and helps overthrow him.
Cybernary spends some time dimension-hopping with Savant's unofficial super-hero team called Savant Garde. There she fought side by side with Savant herself, Mr. Majestic, the cat-girl Sheba, and many other heroes, some of whom resembled Cybernary herself. Cicsco becomes part of the team, but he is now the large cyborg known as Met-L. Also joining the team is the murderous mercenary Innuendo, who helps out the heroes despite his own dark nature.
After the World's End event, the Yamiko-Cybernary is able to make her way to the now floating island of Gamorra, trying to enact vengeance over her long lost father. However Kaizen Gamorra convinces her to join forces, taking her place at his side as the heiress of the ruined world that Gamorra intends to rule. As her first mission, Cybernary is sent to capture the last free stronghold on Earth, the ruins of the former Carrier. After having subdued Hawksmoore and taken him to Gamorra to be tortured by her father, her prisoner eventually escaped into the city itse
|
https://en.wikipedia.org/wiki/Agda%20%28programming%20language%29
|
Agda is a dependently typed functional programming language originally developed by Ulf Norell at Chalmers University of Technology with implementation described in his PhD thesis. The original Agda system was developed at Chalmers by Catarina Coquand in 1999. The current version, originally known as Agda 2, is a full rewrite, which should be considered a new language that shares a name and tradition.
Agda is also a proof assistant based on the propositions-as-types paradigm, but unlike Coq, has no separate tactics language, and proofs are written in a functional programming style. The language has ordinary programming constructs such as data types, pattern matching, records, let expressions and modules, and a Haskell-like syntax. The system has Emacs, Atom, and VS Code interfaces but can also be run in batch mode from the command line.
Agda is based on Zhaohui Luo's unified theory of dependent types (UTT), a type theory similar to Martin-Löf type theory.
Agda is named after the Swedish song "Hönan Agda", written by Cornelis Vreeswijk, which is about a hen named Agda. This alludes to the name of the theorem prover Coq, which was named after Thierry Coquand, Catarina Coquand's husband.
Features
Inductive types
The main way of defining data types in Agda is via inductive data types which are similar to algebraic data types in non-dependently typed programming languages.
Here is a definition of Peano numbers in Agda:
data ℕ : Set where
zero : ℕ
suc : ℕ → ℕ
Basically, it means that there are two ways to construct a value of type , representing a natural number. To begin, zero is a natural number, and if n is a natural number, then suc n, standing for the successor of n, is a natural number too.
Here is a definition of the "less than or equal" relation between two natural numbers:
data _≤_ : ℕ → ℕ → Set where
z≤n : {n : ℕ} → zero ≤ n
s≤s : {n m : ℕ} → n ≤ m → suc n ≤ suc m
The first constructor, z≤n, corresponds to the axiom that zero is less than or equal to any natural number. The second constructor, s≤s, corresponds to an inference rule, allowing to turn a proof of n ≤ m into a proof of suc n ≤ suc m. So the value s≤s {zero} {suc zero} (z≤n {suc zero}) is a proof that one (the successor of zero), is less than or equal to two (the successor of one). The parameters provided in curly brackets may be omitted if they can be inferred.
Dependently typed pattern matching
In core type theory, induction and recursion principles are used to prove theorems about inductive types. In Agda, dependently typed pattern matching is used instead. For example, natural number addition can be defined like this:
add zero n = n
add (suc m) n = suc (add m n)
This way of writing recursive functions/inductive proofs is more natural than applying raw induction principles. In Agda, dependently typed pattern matching is a primitive of the language; the core language lacks the induction/recursion principles that pattern matching translates to.
Metavaria
|
https://en.wikipedia.org/wiki/Glitter%20%28TV%20series%29
|
Glitter is an American drama television series broadcast by the ABC network from September 13 to December 25, 1984.
The series was produced by Aaron Spelling and was set behind the scenes of a top entertainment magazine titled Glitter, and attempted to combine the urgency of journalism and business politics with the glamorous lifestyles of the rich and famous featured in the pages of the magazine. The leading cast members were David Birney, Morgan Brittany, Christopher Mayer, Dianne Kay, and Arthur Hill.
The format of the series was similar to two other popular ABC shows, which were also produced by Aaron Spelling; The Love Boat and Hotel, in that each week it featured high-profile guest appearances from famous celebrities, including Ginger Rogers and Cyd Charisse. Unlike the other shows, Glitter was not a ratings success. It was scheduled on Thursday nights against Simon & Simon, Cheers, and Night Court, which were all among the top-20 most-watched programs at that time. The first three episodes aired in September 1984, and then the show was taken off the air (though was still in production) until December 1984, when three more episodes were shown. Ratings did not improve and the series was cancelled. The remaining eight episodes were shown during December 1985 as part of ABC's late-night line-up.
Despite its lack of success in the US, Glitter was sold internationally. It was shown in the UK on BBC1 in the summer of 1985 (though not all episodes were shown).
Cast
David Birney as Sam Dillon
Morgan Brittany as Kate Simpson
Dianne Kay as Jennifer Douglas
Dorian Harewood as Earl Tobin
Christopher Mayer as Pete Bozak
Melinda Culea as Terry Randolph
Timothy Patrick Murphy as Chip Craddock
Tracy Nelson as Angela Timini
Arte Johnson as Clive Richlin
Barbara Sharma as Shelley Sealy
Arthur Hill as Charles Hardwick
Episodes
External links
(pilot)
(series)
1984 American television series debuts
1984 American television series endings
American television soap operas
American primetime television soap operas
American Broadcasting Company original programming
Television series by CBS Studios
Television series by Spelling Television
English-language television shows
Television shows set in New York City
|
https://en.wikipedia.org/wiki/Nick%20Manabat
|
Nicholas Anthony Manabat (2 September 1972 – 5 November 1995) was a Filipino comic book artist, best known for co-creating Cybernary.
Early life
Manabat was born in British Hong Kong. He was raised and educated in Brisbane, Australia from 1983 to 1990.
Career
Manabat co-created Cybernary with writer Steve Gerber in 1992 for Wildstorm Productions. His illustration technique was marked by bold use of blacks in a heavy metal style. Cybernary was launched as a back-up story to Jim Lee's hugely successful Deathblow comic series.
Death
Manabat died after losing his battle with Hodgkin's lymphoma in 1995.
References
External links
2005 Tribute to Nick Manabat
Comic Vine Entry for Nick Manabat
Nick Manabat in Philippine Comics
1972 births
1995 deaths
Filipino comics artists
Kapampangan people
20th-century Filipino male artists
Deaths from Hodgkin lymphoma
Deaths from cancer in the Philippines
Hong Kong emigrants to the Philippines
|
https://en.wikipedia.org/wiki/Agda
|
Agda may refer to:
Agda (programming language), the programming language and theorem prover
Agda (Golgafrinchan), the character in The Hitchhiker's Guide to the Galaxy by Douglas Adams
Liten Agda, the heroine of a Swedish legend
Agda Montelius, a Swedish feminist
Agda Persdotter, a Swedish royal mistress of the 16th-century
Agda Rössel, a Swedish politician
Agda Östlund, a Swedish politician
Dayan Agda, a Filipino politician
|
https://en.wikipedia.org/wiki/Finder%20of%20Lost%20Loves
|
Finder of Lost Loves is an American drama series aired by the ABC network during the 1984–1985 season.
Synopsis
After Cary Maxwell's (Anthony Franciosa) wife Kate dies, he decides to set up a private detective agency specializing in reuniting clients with a former loved one. The leading cast members were Franciosa, Deborah Adair, Anne Jeffreys, Richard Kantor, and Larry "Flash" Jenkins. Similar to The Love Boat (another Aaron Spelling production), the series featured various weekly guest stars. The series was canceled after 23 episodes.
The series' theme song, "Finder of Lost Loves", was performed by Dionne Warwick and Luther Vandross and written by Burt Bacharach and Carole Bayer Sager. It was an Adult Contemporary chart hit in 1985. The TV version was sung by Dionne Warwick and Luther Vandross.
Cast
Anthony Franciosa as Cary Maxwell
Deborah Adair as Daisy Lloyd
Anne Jeffreys as Rita Hargrove
Larry "Flash" Jenkins as Lyman Whittaker
Richard Kantor as Brian Fletcher
Guest stars
Melissa Sue Anderson
Mackenzie Astin
Lew Ayres
Patricia Barry
Christine Belford
Pamela Bellwood
Susan Blakely
Tom Bosley
Macdonald Carey
Jack Coleman
Cathy Lee Crosby
Mary Crosby
Colleen Dewhurst
Joyce DeWitt
Buddy Ebsen
Samantha Eggar
Mel Ferrer
Anne Francis
Beverly Garland
Harold Gould
Robert Goulet
Michael Gross
Florence Henderson
Bo Hopkins
John James
Lance Kerwin
Kim Lankford
Hope Lange
Kay Lenz
Carol Lynley
Kevin McCarthy
Leigh McCloskey
Lee Meriwether
Vera Miles
Michael Nader
Leslie Nielsen
Lois Nettleton
Heather O'Rourke
Barret Oliver
Donna Pescow
Paul Peterson
Michelle Phillips
Lindsay Price
Robert Reed
Tony Roberts
Esther Rolle
Dick Sargent
Peter Scolari
Connie Sellecca
Ted Shackelford
Jan Smithers
Vic Tayback
Lauren Tewes
Gordon Thomson
Dick Van Patten
Dee Wallace
Marcia Wallace
Cassie Yates
Episodes
References
External links
Finder of Lost Loves on the Web
1980s American drama television series
1984 American television series debuts
1985 American television series endings
American Broadcasting Company original programming
Television series by CBS Studios
Television series by Spelling Television
English-language television shows
Television shows set in New York City
|
https://en.wikipedia.org/wiki/S.T.U.N.%20Runner
|
S.T.U.N. Runner (Spread Tunnel Underground Network Runner) is 3D racing/shooter game released in arcades by Atari Games in 1989. The player pilots a futuristic vehicle which can exceed 900 mph, through various tunnels and courses with changing environments, hazards and enemies. S.T.U.N. Runner uses polygonal graphics for the vehicles and track, and is based on an evolution of Atari's Hard Drivin' hardware. The custom cabinet was designed to resemble the craft that the player pilots in-game.
The arcade game was released in Europe by Jaleco, and in Japan by Namco and Sega. Home ports were released for the Atari ST, Amiga, Commodore 64, Amstrad CPC, and ZX Spectrum. An Atari Lynx version was published by Atari Corporation in 1991.
Gameplay
The final goal is to reach the "Ultimate Challenge", an endless race filled with surprises, where the player must simply get as far as possible in the allotted time. Markers on the Ultimate Challenge course show the names of the five players who have traveled the farthest, who are tracked independently of the game's traditional high score table.
Twin triggers fire laser cannons mounted atop the craft, and the Start buttons double as the triggers for the Shockwave "smart bomb" weapon.
Development
The game immediately began as a remake of Atari's Tunnel Hunt.
The Lynx version was programmed by D. Scott Williamson, an employee of Atari who went on to form the development group Solid Software.
Reception
Commodore User reviewed the arcade game, giving it a 90% rating.
Legacy
S.T.U.N. Runner is included in Midway Arcade Treasures 3 for the PlayStation 2, Xbox, and GameCube. It was also released for Microsoft Windows as part of Midway Arcade Treasures Deluxe Edition in 2006.
References
Game info, Midway Arcade Treasures 3
Manual, Midway Arcade Treasures 3
External links
S.T.U.N. Runner at the Arcade History database
1989 video games
Amiga games
Amstrad CPC games
Arcade video games
Atari arcade games
Atari Lynx games
Atari ST games
Commodore 64 games
DOS games
Science fiction racing games
Namco arcade games
Sega arcade games
Vehicular combat games
Video games developed in the United States
ZX Spectrum games
Jaleco games
|
https://en.wikipedia.org/wiki/6N1P
|
The 6N1P () is a Russian-made miniature 9-pin medium gain double triode vacuum tube intended for use as a line audio amplifier and cathode driver.
Basic data:
Uf = 6.3 V, If = 600 mA
μ = 35
Ia = 7.5 mA
S = 4.35 mA/V
Pa = 2.2 W
The 6N1P has similar ratings to the 6DJ8 and in the past was sometimes rebranded as such, however differences between the two types (the 6N1P requires almost twice the filament current and has only one third the S value) mean they are not directly interchangeable. The S is about 4.35 ma/V, the 6DJ8/ECC88 has a S of 12.5 ma/V and a gain of 33 and a lower internal resistance. However, the 6N1P is typically more linear for a given load. It is therefore inaccurate to say that these two tubes are identical.
The correct Russian equivalent to the 6DJ8/ECC88 is the 6N23P, the latter has a S of 12.5 mA/V and a gain of 33.
The closest western equivalent to the 6N1P is the well known 6BQ7A. A ruggedized/extended ratings version of the tube is designated 6N1P-EV (). It has currently found a use as a driver tube in hi-fi tube amplifiers (such as Audio Research models VS55 and VS110) because of its excellent low distortion and low noise characteristics. The tube is manufactured by the "Voskhod" plant in Kaluga, Russia (see ) and is distributed in the West under the Sovtek and Svetlana brand names.
See also
6DJ8
6N2P
6N3P
References
- 6N1P datasheet and specifications.
- 6N1P detailed datasheet in Russian
External links
Svetlana - 6N1P Russian manufacturer.
- 6N1P and 6N2P usage notes.
- Russian/Soviet tube manufacturers and their logos.
- Audio Research VS55 amplifier.
Vacuum tubes
ru:Двойные триоды
|
https://en.wikipedia.org/wiki/Canmore%20%28database%29
|
Canmore is an online database of information on over 320,000 archaeological sites, monuments, and buildings in Scotland. It was begun by the Royal Commission on the Ancient and Historical Monuments of Scotland. Historic Environment Scotland has maintained it since 2015. The Canmore database is part of the National Record of the Historic Environment (NRHE), formerly the National Monuments Record of Scotland (NMRS), and contains around 1.3 million catalogue entries. It includes marine monuments and designated official wreck sites (those that fall under the Protection of Wrecks Act), such as the wreck of .
References
External links
Archaeology of Scotland
Architecture in Scotland
Canmore
Archives in Scotland
Databases in Scotland
Architecture databases
Archaeological databases
|
https://en.wikipedia.org/wiki/Godannar
|
is a Japanese anime television series created by Yasuchika Nagaoka, Anime International Company and Project Godannar, which consists of IMAGICA Entertainment, Taki Corporation, KlockWorx, NTT Data Contents Planing, Sojitz and Oriental Light and Magic. The series is produced by AIC and OLM, with Nagaoka serving as director and Hiroyuki Kawasaki as its main scriptwriter. The first season aired in Japan from October 1 to December 24, 2003, on AT-X. A second season later aired from April 5 to June 29, 2004. Both seasons were licensed by ADV Films for North America, but was licensed by Sentai Filmworks in 2013.
Plot
In 2042, alien threats known as the are defeated during a battle in Japan when robot pilot Goh Saruwatari defeats the alien "boss" with his robot, the Dannar, and saves his future fiancée, Anna Aoi.
The Mimetic Beasts return after five years on Goh and Anna's wedding day. Goh and Dannar are called to action, leaving Anna at the altar.
As Goh struggles in his battle against the Mimetic Beasts, Anna stumbles upon a sealed robot called Neo Okusaer. She is able to activate and pilot the Neo Okusaer to save her fiancé by merging it with the Dannar to activate the Godannar's Twin Drive.
Over the course of the series, humanity is threatened by the Insania virus, which is spread by the Mimetic Beasts. All of humanity is infected, but as the virus is stimulated by human hormones, especially those released in great quantities during combat, the virus only adversely affects robot pilots since they come into close contact with the beasts on a regular basis: The virus has the effect of transforming human males into Mimetic Beasts, while females are immune unless they naturally generate large amounts of male hormones.
Second season
The pilots of Dannar Base struggle to balance the need to fight the Mimetic Beasts with the increasing danger of further infection by the Insania virus. Eventually, it is discovered that Mira, Goh's former combat partner and lover who was trapped inside a Mimetic beast for five years, is the source of the vaccine humanity needs.
Characters
Dannar Base
It is a robot base from Japan.
Goh, the male protagonist, initially rescues Anna in a battle with the Mimetic Beasts. Over the course of five years, Goh and Anna developed a deep love for each other and plan to marry. However, when the Mimetic Beasts return, he experiences conflicting emotions towards other women, such as when Mira reawakens and Shizuru is killed. Despite these feelings, when Anna leaves Dannar Base due to her guilt and jealousy towards Mira, Goh chooses to remain loyal to her and sets aside his emotions for Mira. Throughout battles with the Mimetic Beasts, Goh contracts the Insania virus, eventually resulting in his body being encased in a cocoon, waiting to emerge as a Beast. To reverse this transformation, Goh is placed in suspended animation for seven years and is later cured with a vaccine made from Mira and Morimoto's son's DNA.
/
Anna is the fem
|
https://en.wikipedia.org/wiki/Xpress%203200
|
The Xpress 3200 is a revision of the Xpress 200 computer chipset released by ATI. The chipset supports AMD64 processors for Socket 939 and Socket AM2.
History of the Xpress 3200 chipset
The Radeon Xpress chipset was designed by ATI to enter the realm of the desktop arena, especially the AMD Socket 939 platform where ATI's rival, Nvidia, had a clear market advantage. The Xpress 200 was launched with the Crossfire edition of the chipset considered as the high end of the chipset. However, rolling delays with the Crossfire Master Cards forced ATI to launch the Socket 939 platform while the Intel platform was scrapped due to time constraints. Reviews painted the Xpress 200 Crossfire as a board that could match Nvidia's nForce 4 SLI. With the release of the nForce 4 16x SLI, ATI changed strategy and announced the RD580 chipset.
The RD580's difference from the Xpress 200 chipset is the 40 PCI Express lanes within the Northbridge. ATI said that having 2 chipsets with 20 PCI Express lanes would slow down data transfers when the chipset is working with multi-GPU configurations. They said that having all the PCI Express lanes within the Northbridge would be more efficient and have less bottlenecking as compared to the nForce 4 16x SLI. The RD580 was called the Radeon Xpress 3200 and was released on March 1, 2006. The chipset is also configured for the new Socket AM2, and many motherboard manufacturers decided to skip the Socket 939 RD580 and begin R&D on the Socket AM2 RD580.
With the launch of the Socket AM2, ATI also announced the release of their SB600 southbridge, compatible with the RD580 northbridge. Originally, the SB450/SB460 was highly flawed in the USB design and lacking in cutting edge features as compared to Nvidia's counterpart, which resulted in low sales. The ULi 1575 Southbridge was the other preferred Southbridge until Nvidia took over ULi.
With the final acquisition of ATI, AMD renamed all ATI chipsets for the AMD platform. The Xpress 3200 Crossfire chipsets for AMD platform (Socket AM2) were renamed as the AMD 580X Crossfire chipset.
Common features
Support for up to 40 PCI Express lanes within Northbridge. 32 PCI Express lanes dedicated for two 16x PCI Express slots. 4 PCI Express lanes for interconnection with Northbridge and Southbridge (A-Link II). Other PCI Express lanes configured by the manufacturer.
Compatible with either ATI's SB450/SB460/SB600 or ULI's M1573/M1575 Southbridge.
Support for up to 8 USB 2.0 ports.
Support for 4 SATA and 4 PATA drives. The SATA can be formed into RAID 0, 1 or 0+1 if used with the SB450/SB460 Southbridge. Support for 4 SATA and 4 PATA drives and the SATA can be formed into a RAID of 0, 1, 1+0, 5 or JBOD if used with the ULI M1575 Southbridge. Support for 4 SATA and 2 PATA drives if used with the SB600. RAID support in the SB600 is still a standard 0, 1 or 1+0.
AC97 High Definition audio with either Realtek ALC882/ALC882D/ALC888/ALC883, SoundBlaster Live! 24-bit or Analog Devices AD1986A.
|
https://en.wikipedia.org/wiki/WEON-LP
|
WEON-LP (channel 60) was a low-power television station in Frederiksted, Saint Croix, serving as the Fox affiliate for the United States Virgin Islands. Owned by Caribbean Broadcasting Network, it was a sister station to WVGN-LD (channel 19), WVXF (channel 17), and WVGN.
WEON-LP had a construction permit for its digital signal on channel 42.
The station's license was canceled by the Federal Communications Commission (FCC) on February 20, 2013, as it had not broadcast since December 31, 2011. Fox programming has since shifted to LKK's WVXF-DT2, where it is carried in high definition.
External links
Caribbean Broadcasting Network
EON-LP
Defunct television stations in the United States
Television channels and stations established in 2005
2005 establishments in the United States Virgin Islands
Television channels and stations disestablished in 2013
2013 disestablishments in the United States Virgin Islands
EON-LP
|
https://en.wikipedia.org/wiki/Apple%20II%20peripheral%20cards
|
The Apple II line of computers supported a number of Apple II peripheral cards. In an era before plug and play USB or Bluetooth connections, these were expansion cards that plugged into slots on the motherboard. They added to and extended the functionality of the base motherboard when paired with specialized software that enabled the computer to read the input/output of the devices on the other side of the cable (the peripheral) or to take advantage of chips on the board - as was the case with memory expansion cards.
All Apple II models except the Apple IIc had at least seven 50-pin expansion slots, labeled Slots 1 though 7. These slots could hold printed circuit board cards with double-sided edge connectors, 25 "fingers" on each side, with 100 mil (0.1 inch) spacing between centers. Slot 3 in an Apple IIe that has an 80-column card fitted (which is usually the case) and Slots 1 through 6 in a normally configured Apple IIgs are "virtually" filled with on-board devices which means that the physical slots cannot be used at all, or only with certain specific cards, unless the conflicting "virtual" device is disabled.
In addition to the seven standard expansion slots, the following computers contained additional, largely special-purpose expansion slots:
Apple II and Apple II Plus: Slot 0 (50-pin, for the firmware card or the 16 kB Apple II Language Card)
Apple IIe: Auxiliary Slot (60-pin; primarily for 80-column display and memory expansion)
Apple IIgs: Memory Expansion Slot (40-pin)
Perhaps the most common cards found on early Apple II systems were the Disk II Controller Card, which allowed users of earlier Apple IIs to use the Apple Disk II, a 5¼ inch, 140 kB floppy disk drive; and the Apple 16K Language Card, which increased the base memory of late-model Apple II and standard Apple II Plus units from 48 kB to 64 kB. The Z-80 SoftCard, making the computer compatible with CP/M software, was also very popular.
Both Apple and dozens of third-party vendors created hundreds of cards for the Apple II series of computers. These additional slots afforded great opportunities for expansion. In the 2000s, long after the last Apple IIe came off Apple's assembly line in 1993, a handful of manufacturers continue to market peripherals and expansion cards for Apple II computers, not counting students, hobbyists, and other Apple II users who continue to push the original machine to its limits.
Categories
Apple II cards can be broadly divided into the following categories:
50-pin standard slots
Serial cards (RS-232 serial interface)
Parallel cards (Centronics/IEEE 1284 parallel interface)
Multifunction I/O cards
Internal modems
80-column (or more) text cards (e.g., Videx)
PAL color graphics cards (required for color graphics in early European Apples)
RGB cards
Floppy disk controllers
Hard disk controllers
Network adapters
Co-processor cards
Memory expansion cards
Accelerators
Realtime clock cards
Music and sound cards
Miscellaneous car
|
https://en.wikipedia.org/wiki/MarketWatch
|
MarketWatch is a website that provides financial information, business news, analysis, and stock market data. Along with The Wall Street Journal and Barron's, it is a subsidiary of Dow Jones & Company, a property of News Corp.
History
The company was conceived as DBC Online by Data Broadcasting Corp. in the fall of 1995. The marketwatch.com domain name was registered on July 30, 1997. The website launched on October 30, 1997, as a 50/50 joint venture between DBC and CBS News run by Larry Kramer and with Thom Calandra as editor-in-chief.
In 1999, the company hired David Callaway and in 2003, Callaway became editor-in-chief. In January 1999, during the dot-com bubble, the company became a public company via an initial public offering. After pricing at $17 per share, the stock traded as high as $130 per share on its first day of trading, giving it a market capitalization of over $1 billion despite only $7 million in annual revenues. In June 2000, the company formed a joint venture with the Financial Times with Peter Bale as managing editor.
In January 2004, Calandra resigned amidst allegations of insider trading. In January 2005, Dow Jones & Company acquired the company for $528 million, or $18 per share.
In May 2016, MarketWatch hired Dan Shar as general manager In October 2020, MarketWatch announced that it would become a paywalled subscription-based publication, in order to "raise the ambitions of our journalism". Mark DeCambre was named editor in chief on March 21, 2022.
See also
List of assets owned by News Corp
References
External links
1999 initial public offerings
2005 mergers and acquisitions
Dot-com bubble
Dow Jones & Company
Economics websites
Internet properties established in 1997
Mass media companies of the United States
|
https://en.wikipedia.org/wiki/Acronis%20Cyber%20Protect%20Home%20Office
|
Acronis Cyber Protect Home Office (previously known as Acronis True Image) is a software package produced by Acronis International GmbH that aims to protect the system from ransomware and allows users to backup and restore files or entire systems from a backup archive, which was previously created using the software. Since 2020, Acronis Cyber Protect Home Office includes malware and Zoom protection (though the ability to use such features depends on the subscription purchased). The software is used by technicians to deploy operating systems to computers and by academics to help restore computers following analysis of how viruses infect computers.
Features
Backup
Acronis can create two types of backup archives: (1) file backups (which consist of user-specified files and directories (but not the metadata of the disk or partition)) and (2) full system images (which consist of files, directories and disk metadata). The software can create full disk backup archives of several file systems including: NTFS (Windows); FAT32 (Windows 9x and removable media); Macintoish systems (HFS+ and APFS) and Linux systems (ext2, ext3, ext4; ReiserFS, and Linux Swap). Acronis falls back to using sector-by-sector copy when a non-supported filesystem is backed up. Acronis has an agent that can be installed within the operating system, which allows backups to be performed in the background while the computer is being used.
Local backup
Acronis can back up a computer, selected disks or selected files to a local location specified by the user. The software can perform full, differential and incremental backups. Full creates a new backup archive every time and backs up everything specified by the user. Differential backups only backup the changes made since the latest full backup and incremental only backs up the changes made since the last incremental backup. Incremental backups are a chain and loss of any one of the incremental backups renders the entire backup useless. Prior to Acronis True Image 2020, incremental backups were stored individually in separate tib files which made them difficult to manage. Since 2020, Acronis stores backups in a single archive file with a tibx extension.
Cloud backup (subscription users only)
Users can specify to store their backup archives in Acronis's data centers around the globe. Users who subscribe to the software for a year rather than buying a copy of the software receive cloud storage which can be used to store cloud-based backups. As of 2019, premium users receive 1 terabyte of cloud space.
Recovery and restoration
Acronis Cyber Protect Home Office allows users to restore files from a full disk or a file-based archive using either a preinstallation media with Acronis on it or from within the user interface of the program. If protected system files are restored (e.g. restoring an entire system to an earlier state), the system restarts to perform the recovery operation.
Users may also mount a backup archive, which allows
|
https://en.wikipedia.org/wiki/Protomatter
|
The term protomatter may reference:
in programming, a Java logging framework
in cosmology, a theoretical primordial plasma, ylem, in the Big-Bang generation of matter
in fiction, a substance featuring in the list of Star Trek materials
|
https://en.wikipedia.org/wiki/Peter%20Bauer
|
Peter Bauer may refer to:
Peter Thomas Bauer (1915–2002), Hungarian-born British development economist
Peter Bauer (computer specialist) (born 1957), American computer graphics professional
Peter Matthew Bauer, American multi-instrumentalist, singer and songwriter
|
https://en.wikipedia.org/wiki/Apple%20II%20serial%20cards
|
Apple II serial cards primarily used the serial RS-232 protocol. They most often were used for communicating with printers, Modems, and less often for computer to computer data transfer. They could be programmed to interface with any number of external devices which were RS-232 compatible. Most serial cards had speed ranges starting from 110 bit/s up to 19,200 bit/s, however some could be modified to go much faster. The most popular and widely used of these cards was Apple Computer's Super Serial Card, a solid design that was often copied for maximum software compatibility of the end product.
Apple II Communications Card (Apple Computer)
The Apple II Communications Card is the original serial card from Apple Computer. Released in 1978 for $225, it was designed to work with modems utilizing acoustic couplers. It offered speeds of 110 and 300 bit/s but with a simple hardware modification (described in the manual accompanying the card) one could change this to 300 and 1200 bit/s, or 1200 and 4800 bit/s.
Apple II Serial Interface Card (Apple Computer)
The Apple II Serial Interface Card was released by Apple Computer shortly after the Communications Card, in August 1978. Designed for printing, this card had ROM revisions, P8 and P8A. The P8A ROM supported handshaking, whereas the earlier P8 ROM didn't. The P8A ROM revision was not compatible with some printers that worked under the original P8 ROM.
Serial Pro (Applied Engineering)
The Serial Pro serial interface card from Applied Engineering was compatible with the Apple Super Serial Card. Unlike the Apple SSC, which used a jumper block to select printer mode or modem mode, the Serial Pro board had two connectors to which the card's ribbon cable could be connected, one for use with a printer and one for use with a modem.
The Serial Pro was a multifunction card which included a ProDOS and DOS 3.3 compatible clock/calendar, freeing up an extra slot for those with highly populated machines. This card was unique in the sense that it did not use "Phantom Slots" to achieve this functionality. Previous multifunction cards required that a secondary function be "mapped" to a different slot in the computer's memory, rendering that slot unusable.
If used with a dot-matrix printer, the Serial Pro offered several screen-print variations. It could print either HiRes page (or both in a single dump) normally, or print page one rotated or inverted.
The Serial Pro utilized the MOS Technology 6551 ACIA chip and offered serial baud rates from 50 bit/s to 19,200 bit/s. The lifespan of the card's battery (which retained configuration information and powered the clock chip when the computer was powered off) was touted as 20 years. The card retailed for $139 during the late 1980s.
Super Serial Card (Apple Computer)
Apple Computer's Super Serial Card, sometimes abbreviated as "SSC", is the most well known communication card made for the Apple II. Apple called it "Super" because it was able to function as b
|
https://en.wikipedia.org/wiki/WxSQLite3
|
wxSQLite3 is a C++ wrapper around the public domain SQLite 3.x database and is specifically designed for use in programs based on the wxWidgets library.
wxSQLite3 does not try to hide the underlying database, in contrary almost all special features of the current SQLite version 3.41.1 are supported, like for example the creation of user defined scalar or aggregate functions. Since SQLite stores strings in UTF-8 encoding, the wxSQLite3 methods provide automatic conversion between wxStrings and UTF-8 strings. This works best for the Unicode builds of wxWidgets. In ANSI builds the current locale conversion object (wxConvCurrent) is used for conversion to/from UTF-8. Special care has to be taken if external administration tools are used to modify the database contents, since not all of these tools operate in Unicode resp. UTF-8 mode.
Since version 1.7.0 optional support for key based database encryption (128-bit AES) is included. Starting with version 1.9.6 of wxSQLite3 the encryption extension is compatible with the SQLite amalgamation source and includes the extension functions module. Support for 256-bit AES encryption has been added in version 1.9.8.
Since version 3.5.0 the SQLite library is an integrated part of wxSQLite3.
Since version 4.0.0 wxSQLite3 supports to select the encryption scheme at runtime. In addition to the wxSQLite3 legacy schemes, AES-128 bit and AES-256 bit, three other encryption schemes, namely sqleet (aka ChaCha20 - Poly1305), SQLCipher (aka AES-256 bit - SHA-1/SHA256/SHA512 - all SQLCipher variants from version 1 up to version 4 supported), and System.Data.SQLite (aka RC4) can be selected.
Since version 4.6.0 wxSQLite3 uses a separate implementation of the encryption extension, namely SQLite3 Multiple Ciphers, because the formerly used SQLITE_HAS_CODEC interface was removed from SQLite in February 2020.
See also
Guayadeque Music Player – a free music player that employs wxSQLite3
SQLite
WxWidgets
References
External links
Library for SQLite3 in Node.js based on wxSQLite3 resp SQLite3MultipleCiphers
Java JDBC driver for SQLite with encryption support based on wxSQLite3 resp SQLite3MultipleCiphers
wxWidgets
Relational database management systems
Software that uses wxWidgets
WxWidgets
|
https://en.wikipedia.org/wiki/Prokowo%20railway%20station
|
Prokowo is a non-operational PKP railway station in Prokowo (Pomeranian Voivodeship), Poland.
Lines crossing the station
References
Prokowo article at Polish stations database, URL accessed at 18 March 2006
Railway stations in Pomeranian Voivodeship
Disused railway stations in Pomeranian Voivodeship
Kartuzy County
|
https://en.wikipedia.org/wiki/Garcz%20railway%20station
|
Garcz is a disused PKP railway station in Garcz (Pomeranian Voivodeship), Poland.
Lines crossing the station
References
Garcz article at Polish stations database , URL accessed at 18 March 2006
Railway stations in Pomeranian Voivodeship
Kartuzy County
Disused railway stations in Pomeranian Voivodeship
|
https://en.wikipedia.org/wiki/Miechucino%20railway%20station
|
Miechucino is a non-operational PKP railway station in Miechucino (Pomeranian Voivodeship), Poland.
Lines crossing the station
References
Miechucino article at Polish stations database, URL accessed at 18 March 2006
Railway stations in Pomeranian Voivodeship
Disused railway stations in Pomeranian Voivodeship
Kartuzy County
|
https://en.wikipedia.org/wiki/Mojusz%20railway%20station
|
Mojusz is a non-operational PKP railway station in Mojusz (Pomeranian Voivodeship), Poland.
Lines crossing the station
References
Mojusz article at Polish stations database, URL accessed at 18 March 2006
Railway stations in Pomeranian Voivodeship
Disused railway stations in Pomeranian Voivodeship
Kartuzy County
|
https://en.wikipedia.org/wiki/Strip%20%28Unix%29
|
In Unix, Plan 9, and Unix-like operating systems, the strip program removes information from executable binary programs and object files that is not essential or required for normal and correct execution, thus potentially resulting in better performance and sometimes significantly less disk space usage. The resulting file is a stripped binary.
Details
The information removed may consist of debugging and symbol information; however, the standard leaves the scope of the changes to the binary up to the implementer of the stripping program.
Furthermore, the use of strip can improve the security of the binary against reverse engineering as it would be comparatively more difficult to analyze a binary without the extra information that would otherwise be removed.
The effect of strip can be achieved directly by the linker. For instance, in GNU Compiler Collection this option is "-s".
The GNU Project ships an implementation of strip as part of the GNU Binutils package. strip has been ported to other operating systems including Microsoft Windows.
See also
Dead code elimination
Executable compression
List of Unix commands
Strings (Unix)
Debug symbol
Symbol table
References
External links
Unix programming tools
Unix SUS2008 utilities
Plan 9 commands
|
https://en.wikipedia.org/wiki/Niepoczo%C5%82owice%20railway%20station
|
Niepoczołowice is a non-operational PKP railway station in Niepoczołowice (Pomeranian Voivodeship), Poland.
Lines crossing the station
References
Niepoczołowice article at Polish stations database, URL accessed at 18 March 2006
Railway stations in Pomeranian Voivodeship
Disused railway stations in Pomeranian Voivodeship
Wejherowo County
|
https://en.wikipedia.org/wiki/K%C4%99trzyno%20railway%20station
|
Kętrzyno is a non-operational PKP railway station in Kętrzyno (Pomeranian Voivodeship), Poland.
References
Kętrzyno article at Polish stations database, URL accessed at 18 March 2006
Railway stations in Pomeranian Voivodeship
Disused railway stations in Pomeranian Voivodeship
Wejherowo County
|
https://en.wikipedia.org/wiki/Roz%C5%82azino%20railway%20station
|
Rozłazino is a non-operational PKP railway station in Rozłazino (Pomeranian Voivodeship), Poland.
Lines crossing the station
References
Rozłazino article at Polish stations database, URL accessed at 18 March 2006
Railway stations in Pomeranian Voivodeship
Disused railway stations in Pomeranian Voivodeship
Wejherowo County
|
https://en.wikipedia.org/wiki/Cyber%20Trance%20Presents%20Ayu%20Trance
|
Cyber Trance Presents Ayu Trance is a remix album by Ayumi Hamasaki that contains remixes in the trance genre. The album was released on September 27, 2001.
On October 8, 2021, the album was rereleased as Cyber Trance Presents Ayu Trance -COMPLETE EDITION- on music streaming services to celebrate the 20th anniversary of its release. This edition contains previously unreleased remix versions.
Tracklisting (2001 Version)
Depend on You "Svenson & Gielen Mix"
M "Above & Beyond Mix"
Trauma "Jam X & De Leon's DuMonde remix"
Unite! "Airwave remix"
Surreal "Marc et Claude remix"
Audience "Darren Tate remix"
Fly High "Voodoo & Serano remix"
Immature "Koglin & Heath remix"
Evolution "Goldenscan remix"
Kanariya "Ferry Corsten's system F remix"
Appears "Armin Van Buuren's Rising Star remix"
Boys & Girls "Push remix"
Unite! "Moogwai remix"
A Song for XX "Ferry Corsten Chilled Mix"
Chart positions
Total Sales: 302,000 (Japan)
Cyber Trance presents Ayu Trance 2 is a remix album by Japanese recording artist Ayumi Hamasaki. It was released the same day as Hamasaki's 28th single "Voyage".
Information
The album is a sequel of Ayu Trance, and the songs of the album are in non-stop format. Half of the songs had been previously unreleased at the time of the release of the album, and it premiered remixes from the album I am... and from the then-unreleased album Rainbow. The other half were songs had been included in the first Ayu Trance album, like the remixes of Above & Beyond, Armin van Buuren, Push and Voodoo & Serano.
The versions used in this album were club/extended versions. Remix versions of "Free & Easy", "I am..." and "Daybreak" have been only included in this album. The radio edit versions of remixes of "Independent", "Hanabi", "July 1st" were later included in Ayu Trance. However, with the exception of the extended club version of the Lange remix of "Hanabi" -which was released only through promotional vinyls at the time of this album's release- all other original extended versions of these remixes remain unreleased.
Tracklisting (2021 Version)
"Independent" "D-Nation remix"
"Hanabi" "Lange remix"
"M" "Above & Beyond Remix"
"July 1st" "Flip & Fill remix"
"Dearest" ~Rank 1 remix~
"Free & Easy" "Minimalistix remix"
"Unite!" "Airwave remix"
"Connected" "Ferry Corsten System F Mix"
"Fly High" "Voodoo & Serano remix"
"Audience" "Darren Tate remix"
"Trauma" "JamX & De Leon's DuMonde Dub Mix"
"Boys & Girls" "Push remix"
"I am..." "Ramon Zenker remix"
"Appears" "Armin van Buuren's Sunset Dub"
"Depend on You" "Svenson & Gielen remix"
"Daybreak" "Orion Too remix"
Chart positions
Total Sales: 237,800 (Japan)
External links
CYBER trance presents ayu trance 2 information at Avex Network.
CYBER trance presents ayu trance 2 information at Oricon.
Ayumi Hamasaki remix albums
2001 remix albums
2002 remix albums
Trance remix albums
|
https://en.wikipedia.org/wiki/L%C4%99bork%20Nowy%20%C5%9Awiat%20railway%20station
|
Lębork Nowy Świat is a PKP railway station in Lębork (Pomeranian Voivodeship), Poland.
Lines crossing the station
See also
Lębork
References
Lębork Nowy Świat article at Polish Stations Database, URL accessed at 18 March 2006
Lebork Nowy Swiat
Lębork County
|
https://en.wikipedia.org/wiki/Nowa%20Wie%C5%9B%20L%C4%99borska%20railway%20station
|
Nowa Wieś Lęborska is a PKP railway station in Nowa Wieś Lęborska (Pomeranian Voivodeship), Poland.
Lines crossing the station
References
Nowa Wieś Lęborska article at Polish Stations Database, URL accessed at 18 March 2006
Railway stations in Pomeranian Voivodeship
Lębork County
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.