source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/Computer%20console
Computer console may refer to: Computer terminal System console, a text entry and display device for system administration messages Video game console, a device specially made for video game play
https://en.wikipedia.org/wiki/HP-16C
The HP-16C Computer Scientist is a programmable pocket calculator that was produced by Hewlett-Packard between 1982 and 1989. It was specifically designed for use by computer programmers, to assist in debugging. It is a member of the HP Voyager series of programmable calculators. It was the only programmer's calculator ever produced by HP, though many later HP calculators have incorporated most of the 16C's functions. Features The 16C can display integers in hexadecimal, decimal, octal and binary, and convert numbers from one number base to another. It also deals with floating-point decimal numbers. To accommodate long integers, the display can be 'windowed' by shifting it left and right. For consistency with the computer the programmer is working with, the word size can be set to different values from 1 to 64 bits. Binary-arithmetic operations can be performed as unsigned, one's complement, or two's complement operations. This allows the calculator to emulate the programmer's computer. A number of specialized functions are provided to assist the programmer, including left- and right-shifting, left- and right-rotating, masking, and bitwise logical operations. Apart from programmer functions, the calculator's abilities are limited to basic arithmetic (and reciprocal and square root), which meant that typical users would also make use of a general scientific calculator. Floating-point numbers are only supported for base 10. However, it is still far more powerful (though also much more expensive) than contemporary competitors such as the non-programmable computer math calculator Casio CM-100 or the TI , LCD Programmer or Programmer II. The back of the 16C features a printed reference chart for many of its functions. The calculator uses the proprietary HP Nut processor produced in a bulk CMOS process and featured continuous memory, whereby the contents of memory are preserved while the calculator is turned off. Though commonplace now, this was still notable in the early 1980s, and is the origin of the "C" in the model name. Programming The 16C, like all other members of the Voyager series, is itself programmable. Keystroke programming is used. Up to 203 program steps are available, and up to 16 program/step labels. Each step and label uses one byte, which consumes register space in 7 byte increments. Here is a sample program that computes the factorial of an integer number from 2 to 69. The program takes up 9 bytes. The codes displayed while entering the program generally correspond to the keypad row/column coordinates of the keys pressed. To run the program, enter the argument onto the stack, then press the keystrokes . The result is displayed when the program terminates. Legacy HP has never made another calculator specifically for programmers, but has incorporated many of the HP-16C's functions in later scientific and graphing calculators, for example the HP-42S (1988) and its successors. Like many other vintage HP calculators, the HP-16C
https://en.wikipedia.org/wiki/LaFarr%20Stuart
LaFarr Stuart (born July 6, 1934 in Clarkston, Utah), was an early computer music pioneer, computer engineer and member of the Homebrew Computer Club. Career In 1961, Stuart programmed Iowa State University's Cyclone computer, a derivative of the ILLIAC, to play simple, recognizable tunes through an amplified speaker that had been attached to the system originally for administrative and diagnostic purposes. A recording of an interview with Stuart and his computer music was broadcast nationally on the National Broadcasting Company's NBC Radio Network program Monitor on February 10, 1962. In a subsequent interview with the Harold Journal, Navel Hunsaker, head of the Utah State University mathematics department, said of Stuart, "He always was a whiz with calculators." From the late 1970s, Stuart mentored John Carlsen, who later contributed to the rapid growth of personal computer (PC) sound-card maker Media Vision and to SigmaTel. In the late 1960s and early 1970s, Stuart worked for Control Data Corporation (CDC), where Seymour Cray designed the CDC 6600, the first commercial supercomputer. During the 1970s, Stuart created a version of the programming language Forth, which became known as LaFORTH. It is notable for its implementation without an input buffer. In the 1980s, Stuart worked for Zytrex, which manufactured complementary metal–oxide–semiconductor (CMOS) Programmable Array Logic (PAL) programmable logic devices (PLDs). Stuart conceived installing battery-operated real-time clocks into computers, for which he received royalty payments until nearly 2000. Stuart jokingly admits contributing to the Year 2000 problem. Preserving computer history Stuart owned the first Digital Equipment Corporation (DEC) PDP-11 to enter California and often visited the Computer History Museum in Mountain View, California. See also E-mu Systems Robert Moog References External links 1934 births American computer programmers Control Data Corporation Living people People from Cache County, Utah Computer real-time clocks
https://en.wikipedia.org/wiki/Syphon%20Filter%3A%20Dark%20Mirror
Syphon Filter: Dark Mirror is a third-person shooter stealth video game developed by Bend Studio and published by Sony Computer Entertainment for the PlayStation Portable and PlayStation 2. It is the fifth installment in the Syphon Filter franchise and a sequel to 2004's Syphon Filter: The Omega Strain. The PSP version of Syphon Filter: Dark Mirror was added on March 21, 2023 as part of PS Plus Premium Classic Catalog. Gameplay As with the trilogy and unlike the previous game, the gameplay is a return to the series roots. Players resume the role of Gabe Logan and occasionally Lian Xing, special operatives for a secret government agency. The non-linear, open-ended feel of the previous game has been reverted to the linear gameplay. Several types of weapons and vision modes are introduced. Players can now hide against walls and shoot around corners, but the roll ability is noticeably absent. Multiplayer The game is ad hoc and infrastructure compatible, both supporting up to 8 players in a single game. Players can use the PSP Headset online to chat with others in the pre-game lobby, and in-game: Deathmatch: Standard deathmatch. The player who reaches the point limit or has the highest score after time runs out is the winner. Team Deathmatch: There are three factions, the IPCA, the Akram Brotherhood, and Red Section. Each has its own unique weapon sets. The team who reaches the point limit first or has the highest score after time runs out is the winner. Rogue Agent: When the game starts, every player is on the same team. Everyone must rush to a fixed location and run over a kit to become the rogue agent. The rogue agent is then teleported away from all other players and spawns with a new skin and a special weapon. Kills only count for the rogue agent. When the rogue agent is killed, he drops the kit, and whoever runs it over becomes the new rogue agent. Whoever has the highest score after time runs out or reaches the kill limit is the winner. Objective: Each team has a set number of lives and they must complete objectives to win. One team must defend while the other team assaults, either trying to destroy something or carry an object back to another location. If a team completes all objectives before time runs out or defends successfully, they will win. If a team's reinforcements are depleted, they lose. Plot Following the events of Syphon Filter: The Omega Strain, Gabe sends a note to Mara Aramov. As she reads the note, a cracked scope appears from an adjacent balcony. It is quickly revealed that Gabe has sent Gary "Stone" Stoneman to kill Mara due to her manipulative role in the Syphon Filter fiasco. Also revealed is a private conference between Mara and Elsa Weissinger, who was conspiring alongside Mara; the duo being secret lovers. Two years after the assassination of the treacherous Aramov and Weissinger by Stone, Gabe from the International Presidential Consulting Agency (IPCA) is summoned to Kemsynth Petroleum in Alaska by the U.S. gov
https://en.wikipedia.org/wiki/WGMB-TV
WGMB-TV (channel 44) is a television station in Baton Rouge, Louisiana, United States, affiliated with the Fox network. It is owned by Nexstar Media Group alongside CW owned-and-operated station WBRL-CD (channel 21) and independent station KZUP-CD (channel 19); Nexstar also provides certain services to NBC affiliate WVLA-TV (channel 33) under joint sales and shared services agreements (JSA/SSA) with White Knight Broadcasting. The stations share studios on Perkins Road in Baton Rouge, while WGMB-TV's transmitter is located near Addis, Louisiana. History The station first signed on August 11, 1991, making Baton Rouge the last of the Top 100 television markets to receive a Fox affiliate. The station was originally owned by the Galloway family, whose broadcast holdings originally operated under both the Associated Broadcasters and Galloway Media and eventually the Communications Corporation of America banner. It took five years to bring Fox to Baton Rouge, as the Federal Communications Commission (FCC) assigned channel 44 to Baton Rouge in 1983 and several potential buyers sought a license. One company, Parish Family Television expressed an interest in broadcasting an independent station affiliated with the network in 1986 with the call letters WPFT. Delays occurred as Southwest Multimedia of Houston expressed an ownership interest in Parish Family Television and rival company Louisiana Super Communications objected to this sale. In November 1990, Thomas Galloway of Lafayette purchased the license from PFTV in November 1990 as well as the Texas stations KVEO, KWKT, and KPEJ from Southwest Multimedia, causing Louisiana Super Communications to rescind its objections to the sale. The station installed an antenna on WVLA's tower, bought from future sister station WNTZ's parent company at the time, Delta Media Corporation. From April 1990 to February 1991, local NBC affiliate WVLA aired week-delayed episodes of Fox shows such as The Simpsons, Married... with Children, and In Living Color. In addition to its Fox affiliation, WGMB also carried several syndicated movie packages including Columbia Pictures' Night at the Movies and Universal Television's Action Pack and was a secondary affiliate of PTEN in its early years of operation. In 1996, WGMB became a sister station of WVLA when Thomas Galloway's son, Sheldon, purchased the NBC affiliate from businessman Cyril Vetter. Sheldon had previously held a stake in WGMB but sold it to his father to make it easier for him to buy WVLA. The station originally broadcast from Florida Boulevard, until the Galloways purchased WVLA. In 1999, WGMB, along with WVLA, WBBR (now WBRL), and WZUP (now KZUP), moved to their current studios on Perkins Road in Baton Rouge. In June 2006, owner ComCorp filed for Chapter 11 bankruptcy protection. ComCorp said in a press release viewers and staff would see no changes at the station. On April 24, 2013, ComCorp announced the sale of its entire group, including WGMB-TV, to the Nex
https://en.wikipedia.org/wiki/List%20of%20Canadian%20television%20networks
Canada has adopted the NTSC and ATSC television transmission standards without any alterations. However, some unique local variations exist for DTH television because of transponder design variation in the Anik series of satellites. Television in Canada has many individual stations and networks and systems. Networks list All of the networks listed below operate a number of terrestrial TV stations. In addition, several of these networks are also aired on cable and satellite services. English-language networks French-language networks Educational networks Multicultural networks Defunct television systems See also List of television stations in Canada by call sign List of Canadian television channels List of Canadian specialty channels Category A services Category B services Category C services List of foreign television channels available in Canada List of United States stations available in Canada Digital television in Canada Multichannel television in Canada List of Canadian stations available in the United States List of television stations in North America by media market Notes Networks Networks
https://en.wikipedia.org/wiki/Microserver
A data center 64 bit microserver is a server class computer which is based on a system on a chip (SoC). The goal is to integrate all of the server motherboard functions onto a single microchip, except DRAM, boot FLASH and power circuits. Thus, the main chip contains more than only compute cores, caches, memory interfaces and PCI controllers. It typically also contains SATA, networking, serial port and boot FLASH interfaces on the same chip. This eliminates support chips (and therefore area, power and cost) at the board level. Multiple microservers can be put together in a small package to construct dense data center (example: DOME MicroDataCenter). History The term "microserver" first appeared in the late 1990s and was popularized by a Palo Alto incubator; PicoStar when incubating Cobalt Microservers. Microserver again appeared around 2010 and is commonly misunderstood to imply low performance. Microservers first appeared in the embedded market, where due to cost and space these types of SoCs appeared before they did in general purpose computing. Indeed, recent research indicates that emerging scale-out services and popular datacenter workloads (e.g., as in CloudSuite) require a certain degree of single-thread performance (with out-of-order execution cores) which may be lower than those in conventional desktop processors but much higher than those in the embedded systems. A modern microserver typically offers medium-high performance at high packaging densities, allowing very small compute node form factors. This can result in high energy efficiency (operations per Watt), typically better than that of highest single-thread performance processors. One of the early microservers is the 32-bit SheevaPlug. There are plenty of consumer grade 32-bit microservers available, for instance the Banana Pi as seen on Comparison of single-board computers. Early 2015, even a 64-bit consumer grade microserver is announced. Mid 2017 consumer-grade 64-bit microservers started appear, for example the Raspberry-Pi3. Data-Center-grade microservers need to be 64-bit and run server class operating systems such as RHEL or SUSE. Commercialization Dell was among the first to build a commercially available microserver. In May 2009 Dell launched the Fortuna platform based on the VIA Nano processor. The system was designed for a specific European customer. SeaMicro followed shortly after Dell with one of the first generally available microservers. SeaMicro launched the SM10000 in June 2010. The SM1000 was based on the Intel Atom processor. SeaMicro followed the SM1000 with the SM1000-64 using a 64 bit Atom processor, and then switched to Intel's Sandy Bridge processor for the SM1000-XE in 2011. They were acquired by AMD in 2012. Calxeda, now out of business, was one of the first companies to start building ARM based microservers, using 32-bit ARM cores. They went out of business before they could make the transition to 64-bit. Hewlett-Packard has the commercial Moo
https://en.wikipedia.org/wiki/ANI%20%28file%20format%29
The ANI file format is a graphics file format used for animated mouse cursors on the Microsoft Windows operating system. The format is based on the Microsoft Resource Interchange File Format, which is used as a container for storing the individual frames (which are standard Windows icons) of the animation. File structure Animated cursors contain the following information: (in order of position in the file) Name (optional) Artist information (optional) Default frame rate Sequence information Cursor hotspot Individual frame(s), in ICO format Individual frame rates (optional) Frame rates are measured in jiffies, with one jiffy equal to 1/60 of a second, or 16.666 ms. Sequencing Sequence information present in the file determines the sequence of frames, and allows frames to be played more than once, or in a different order than that in which they appear in the file. For example, if the animation contains three different images numbered 1, 2 and 3, and the sequence is 1-2-3-2-1, (five frames) then only three icons need to be stored in the file, thereby saving storage space. See also Pointer (user interface) ICO (file format) External links Description of the ani file format Introduce Animated Cursors to Java GUIs, Part 2 Vulnerability in Windows Animated Cursor Handling .Ani Editor RealWorld Cursor Editor Graphics file formats Windows architecture
https://en.wikipedia.org/wiki/Cavium
Cavium was a fabless semiconductor company based in San Jose, California, specializing in ARM-based and MIPS-based network, video and security processors and SoCs. The company was co-founded in 2000 by Syed B. Ali and M. Raghib Hussain, who were introduced to each other by a Silicon Valley entrepreneur. Cavium offers processor- and board-level products targeting routers, switches, appliances, storage and servers. The company went public in May 2007 with about 175 employees. As of 2011, following numerous acquisitions, it had about 850 employees worldwide, of whom about 250 were located at company headquarters in San Jose. Cavium was acquired by Marvell Technology Group on July 6, 2018. History Name change On June 17, 2011, Cavium Networks, Inc. changed their name to Cavium, Inc. Acquisitions Acquisition In November 2017, Cavium's board of directors agreed to the company's purchase by Marvell Technology Group for $6 billion in cash and stock. The merger was finalized on July 6, 2018. NSA Interference On March 23, 2022, Cavium was named as an NSA "enabled" CPU vendor in a PhD thesis titled "Communication in a world of pervasive surveillance". The "enabled" term refers to a process with which a chip vendor has a backdoor introduced into their designs. References Semiconductor companies of the United States Networking companies of the United States Companies formerly listed on the Nasdaq Companies based in San Jose, California Electronics companies established in 2001 American companies established in 2001 Fabless semiconductor companies 2018 mergers and acquisitions American corporate subsidiaries
https://en.wikipedia.org/wiki/Cheetah%20Marketing
Cheetah Marketing was a United Kingdom-based company that produced electronic music-related hardware products and software for home computer systems during the 1980s. They later changed their name to Cheetah International Ltd. Based in Cardiff, Cheetah was run by two brothers, Howard and Michael Jacobson, but owned by Cannon Street Investments. The company was closed in 1993 when the UK recession badly hit the share price of its owners. After this Chris Wright and Nick Owen bought the music products division and formed Soundscape Digital Technology Ltd. The joysticks and other computer peripheral products division went to another company in the Cannon Street group. Products The company originally produced joysticks like the infrared R.A.T. for the Commodore 64 and ZX Spectrum computers and later branched out into music peripherals and stand-alone musical equipment for price conscious home users. Among their offerings were the SpecDrum (a sample-based drum machine), a Cheetah Sound Sampler, a Cheetah Midi Interface, and in the later, 8-bit/16-bit drum machines, music sequencer, and a range of music keyboards (including polyphonic analog / digital synthesizers and rack mount modules). Joysticks and peripherals included the Cheetah 125, Cheetah 125 Plus, Mach 1, and an infrared joypad. Cheetah's range of music products expanded quickly during the 1980s when they began to work with external designers. Among these were Chris Wright, who later founded Soundscape Digital Technology, Ian Jannaway, who later founded Novation Digital Music Systems and Mike Lynch, who later founded Autonomy Corporation. Cheetah also distributed the Gamate handheld console in the UK. Music products Cheetah SpecDrum - drum machine add-on for the Sinclair ZX Spectrum Cheetah MQ8 - performance sequencer. Cheetah MD8 - 8 bit MIDI drum machine. Cheetah MD16 - 16 bit MIDI drum machine (also with the rack mount variants MD16R, MD16RP) - designed by Chris Wright and Nick Robbins. Cheetah MK5/7VA - 5 or 7 octave MIDI keyboard controllers - designed by Speedwell Software Cheetah Master Series 5/7/7P - MIDI keyboard controller, 5 or 7 octaves with piano weighted keyboard action - designed by Chris Wright and Nick Robbins. Cheetah Master Series 7000/8000 - MIDI keyboard controllers with advanced features, 5 or 7 octaves and piano weighted keyboard action (shown at the NAMM show in 1993 but never manufactured due to demise of Cheetah - 6 prototypes are known to exist) - designed by Chris Wright and Nick Robbins. Cheetah MS800 - Digital wave synthesizer - designed by Lynett Systems (Mike Lynch). Cheetah SX16 - 16 bit sampler - designed by Lynett Systems (Mike Lynch). Cheetah MS6 - 6 voice polyphonic analogue synthesizer - designed by Ian Jannaway References Further reading Audio equipment manufacturers of the United Kingdom Synthesizer manufacturing companies of the United Kingdom Musical instrument manufacturing companies of the United Kingdom Companies based in Cardiff Elect
https://en.wikipedia.org/wiki/Underhanded%20C%20Contest
The Underhanded C Contest is a programming contest to turn out code that is malicious, but passes a rigorous inspection, and looks like an honest mistake even if discovered. The contest rules define a task, and a malicious component. Entries must perform the task in a malicious manner as defined by the contest, and hide the malice. Contestants are allowed to use C-like compiled languages to make their programs. The contest was organized by Dr. Scott Craver of the Department of Electrical Engineering at Binghamton University. The contest was initially inspired by Daniel Horn's Obfuscated V contest in the fall of 2004. For the 2005 to 2008 contests, the prize was a $100 gift certificate to ThinkGeek. The 2009 contest had its prize increased to $200 due to the very late announcement of winners, and the prize for the 2013 contest is also a $200 gift certificate. Contests 2005 The 2005 contest had the task of basic image processing, such as resampling or smoothing, but covertly inserting unique and useful "fingerprinting" data into the image. Winning entries from 2005 used uninitialized data structures, reuse of pointers, and an embedding of machine code in constants. 2006 The 2006 contest required entries to count word occurrences, but have vastly different runtimes on different platforms. To accomplish the task, entries used fork implementation errors, optimization problems, endian differences and various API implementation differences. The winner called strlen() in a loop, leading to quadratic complexity which was optimized out by a Linux compiler but not by Windows. 2007 The 2007 contest required entries to encrypt and decrypt files with a strong, readily available encryption algorithm such that a low percentage (1% - 0.01%) of the encrypted files may be cracked in a reasonably short time. The contest commenced on April 16 and ended on July 4. Entries used misimplementations of RC4, misused API calls, and incorrect function prototypes. 2008 The 2008 contest required entries to redact a rectangular portion of a PPM image in a way that the portion may be reconstructed. Any method of "blocking out" the rectangle was allowed, as long as the original pixels were removed, and the pixel reconstruction didn't have to be perfect (although the reconstruction's fidelity to the original file would be a factor in judging). The contest began on June 12, and ended on September 30. Entries tended to either xor the region with a retrievable pseudo-random mask or append the masked data to the end of the file format. The second placing programs both used improperly defined macros while the winner, choosing to work with an uncommon text based format, zeroed out pixel values while keeping the number of digits intact. 2009 The 2009 contest required participants to write a program that sifts through routing directives but redirects a piece of luggage based on some innocuous-looking comment in the space-delimited input data file. The contest began December 29,
https://en.wikipedia.org/wiki/Steganographic%20file%20system
Steganographic file systems are a kind of file system first proposed by Ross Anderson, Roger Needham, and Adi Shamir. Their paper proposed two main methods of hiding data: in a series of fixed size files originally consisting of random bits on top of which 'vectors' could be superimposed in such a way as to allow levels of security to decrypt all lower levels but not even know of the existence of any higher levels, or an entire partition is filled with random bits and files hidden in it. In a steganographic file system using the second scheme, files are not merely stored, nor stored encrypted, but the entire partition is randomized - encrypted files strongly resemble randomized sections of the partition, and so when files are stored on the partition, there is no easy way to discern between meaningless gibberish and the actual encrypted files. Furthermore, locations of files are derived from the key for the files, and the locations are hidden and available to only programs with the passphrase. This leads to the problem that very quickly files can overwrite each other (because of the Birthday Paradox); this is compensated for by writing all files in multiple places to lessen the chance of data loss. Advantage While there may seem to be no point to a file system which is guaranteed to either be grossly inefficient storage space-wise or to cause data loss and corruption either from data collisions or loss of the key (in addition to being a complex system, and for having poor read/write performance), performance was not the goal of StegFS. Rather, StegFS is intended to thwart "rubberhose attacks", which usually work because encrypted files are distinguishable from regular files, and authorities can coerce the user until the user gives up the keys and all the files are distinguishable as regular files. However, since in a steganographic file system, the number of files are unknown and every byte looks like an encrypted byte, the authorities cannot know how many files (and hence, keys) are stored. The user has plausible deniability — he can say there are only a few innocuous files or none at all, and anybody without the keys cannot gainsay the user. Criticisms Poul-Henning Kamp has criticized the threat model for steganographic file systems in his paper on GBDE, observing that in certain coercive situations, especially where the searched-for information is in fact not stored in the steganographic file systems, it is not possible for a subject to "get off the hook" by proving that all keys have been surrendered. Other methods Other methods exist; the method laid out before is the one implemented by StegFS, but it is possible to steganographically hide data within image (e.g. PNGDrive) or audio files- ScramDisk or the Linux loop device can do this. Generally, a steganographic file system is implemented over a steganographic layer, which supplies just the storage mechanism. For example, the steganographic file system layer can be some existing MP3
https://en.wikipedia.org/wiki/MLB%20Network%20Showcase
MLB Network Showcase is the title of a presentation of Major League Baseball on cable and satellite channel MLB Network that premiered on April 9, 2009. The network produces in-house 26 non-exclusive live games a season. Since one or both teams' local TV rights holders also carry the games, the MLB Network feed is subject to local blackouts. In that event, the cities in the blacked-out markets will instead see a simulcast of another scheduled game via one team's local TV rights holder. MLB Network Showcase typically airs one game a week. From 2012 until 2021, MLB Network aired two exclusive League Division Series games using the MLB Network Showcase presentation. Unlike the regular season, these games were exclusive to MLB Network. Beginning with the 2022 MLB season, MLB Network will instead air the Spanish language broadcasts for all postseason games carried in English by TBS. History Prior to the formation of MLB Network, MLB had produced game telecasts in-house for the 1994 and 1995 seasons via The Baseball Network, a joint venture with ABC and NBC. However, the experiment was scuttled by ABC and NBC after the 1995 season due to lackluster ratings in the aftermath of the 1994–95 strike, which had resulted in the cancellation of the remainder of the 1994 season. From 2009 to 2010, MLB Network broadcast the Civil Rights Game. The 2009 game was broadcast on MLB Network except in the home markets of the two teams that played in the game, Cincinnati (FSN Ohio) and Chicago (CSN Chicago). For the 2010 Civil Rights Game, again, MLB Network telecast the game except in Cincinnati (Fox Sports Ohio) and St. Louis (Fox Sports Midwest). On July 8, 2011, Al Michaels teamed up with Bob Costas (with the two announcers alternating between play-by-play and color commentary) to call a game between the New York Mets and San Francisco Giants on MLB Network. It was Michaels's first appearance on a baseball telecast since August 6, 2003 (when he served as a guest commentator on an ESPN game at Dodger Stadium between the Los Angeles Dodgers and Cincinnati Reds) and his first as a primary announcer since Game 5 of the 1995 World Series on ABC. (Michaels had called Games 1, 4, and 5 of that series with Jim Palmer and Tim McCarver, while Costas called Games 2, 3, and 6 with Joe Morgan and Bob Uecker for NBC.) Michaels and Costas also made appearances on SportsNet New York and Comcast SportsNet Bay Area during the game's middle innings, since the MLB Network broadcast was blacked out in the Mets' and Giants' respective home markets. On July 2, 2013, Matt Vasgersian and Sean Casey called the game between the San Francisco Giants and Cincinnati Reds (with Casey being a legend for the latter team), in which Reds pitcher Homer Bailey threw his second career no-hitter. On September 25, 2014, Costas called Derek Jeter's final game at Yankee Stadium for MLB Network, where he hit an RBI single to win the game. On July 8, 2016, NHL on NBC broadcaster Mike Emrick called his
https://en.wikipedia.org/wiki/KBSV
KBSV (channel 23) is a non-commercial independent television station licensed to Ceres, California, United States, broadcasting Assyrian programming to the southern portion of the Sacramento–Stockton–Modesto market. Owned by Bet-Nahrain, Inc. it is a sister station to KBES radio (89.5 FM). The two stations share studios at the Bet-Nahrain Assyrian Cultural Center on South Central Avenue in Ceres; KBSV's transmitter is located atop Mount Oso in western Stanislaus County. Even though KBSV is licensed as a full-power station, its broadcast radius is comparable to that of a low-power station, only extending about from its transmitter. It is only carried on cable in the Stockton, Modesto, Sonora and Turlock areas (primarily on channel 15), and is not available on DirecTV or Dish Network. KBSV was the first Assyrian television station in the world, and began broadcasting on April 14, 1996. It began webcasting 24 hours a day in 1997. Subchannel See also ANB SAT Suroyo TV Suryoyo Sat Ishtar TV References External links BSV Aramaic-language television channels Assyrian-American culture in California Ceres, California Television channels and stations established in 1996 1996 establishments in California
https://en.wikipedia.org/wiki/Wayne%20Larrivee
Wayne Larrivee is an American sportscaster. Larrivee is currently the radio play-by-play voice of the Green Bay Packers on the Packers Radio Network alongside color commentator Larry McCarren and calls college football and basketball for the Big Ten Network on television. Despite his current job with the Packers, Larrivee has long been associated with Chicago sports, having spent time as the voice of the Chicago Cubs, over a decade as the voice of the Chicago Bears and nearly twenty years as the television voice of the Chicago Bulls. Biography Early life and career Larrivee was born in Lee, Massachusetts and attended Emerson College in Boston, where he graduated in 1977 with a degree in mass communications. During his time at Emerson, he practiced the craft of play by play by spending many nights in the old Boston Garden, calling games from high above courtside into his trusty tape recorder. He would astound the regular news staff at WECB, the Emerson carrier current station, with after game interviews, and up-close reflections on the actions of the night during the 10 PM extended news broadcast. After beginning his professional career at KGRO Radio in Pampa, Texas in 1975, Larrivee moved to KSTT Radio in Davenport, Iowa where he announced University of Iowa football games, Quad City Angels minor league baseball games and high school basketball games. From 1978 through 1984, Larrivee did play-by-play for the Kansas City Chiefs on KCMO radio. In 1985, Larrivee was hired to be the radio voice for the Chicago Bears and held that position until the end of the 1998 NFL season, when he took over as voice of the Packers the following year. At each stop, Larrivee succeeded iconic play-by-play announcers, Joe McConnell in Chicago and Jim Irwin in Green Bay. He has called two Super Bowl victories; the Bears' in Super Bowl XX and the Packers' in Super Bowl XLV. Larrivee also was the television play-by-play announcer for the Chicago Bulls for WGN-TV for seventeen seasons. At various times he has also called games for the Chicago Cubs, Kansas City Kings, Iowa Hawkeyes football, Missouri Tigers basketball, and Big Ten football and basketball for ESPN Plus. Larrivee also works for Dial Global's Westwood One sports division, calling NCAA basketball tournament games and serving as a substitute announcer for NFL games carried over the network. In his spare time, Larrivee voices the Badger Mutual Insurance Sports Minute in Wisconsin and several other states. In addition, he voices the Badger Mutual Insurance "In the Tunnel" for Green Bay Packers games. Other broadcast assignments Throughout the NFL season, Larrivee also hosts a nationally syndicated radio show with Pro Football Weekly publisher Hub Arkush. On April 23, 2000, Larrivee substituted for Al Albert as WTTV's play-by-play announcer during the Indiana Pacers' 88–85 victory over the Milwaukee Bucks in Game 1 of their first-round playoff series. On July 18, 2007, Larrivee was named the #2 play
https://en.wikipedia.org/wiki/WLLQ
WLLQ is a daytime-only AM radio station licensed to Chapel Hill, North Carolina, on 1530 kHz. The station is part of the regional Mexican music network called La Grande. History WLLQ debuted in 1973 as WRBX, a jazz-formatted station under the ownership of Stuart Epperson, later the head of national Christian broadcaster Salem Communications. WRBX's studios were located on Chapel Hill's West Rosemary Street, and the daytime-only station had 5,000 watts of power. As the jazz format lost listeners to competitors on the FM dial, WRBX moved towards an inspirational Christian format. By 1978, WRBX had gone southern gospel, increased its power to 10,000 watts and moved to studios on Durham-Chapel Hill Boulevard (US 15/501) near present-day New Hope Commons Shopping Center. In 1979, Epperson sold WRBX to Hugh Johnston, who changed the station to a country format. The country format continued until 1985, when WRBX was sold to L. L "Buddy" Leathers' Carolina Christian Communications, and the inspirational Christian format was reinstated. The station's studios were moved into Leathers' repair shop, and the call letters changed to WRTP. The inspirational format soon became a contemporary Christian one. Carolina Christian Communications expanded WRTP to a simulcast with Garner-based WRTG, 1000 AM, in 1994 and to Mebane-based WGSB, 1060 AM in 1995. Between these three stations the full Triangle region was covered, but only during daylight hours, as all three were licensed only for daytime operation. In October 2004, WRTP, WRTG and WGSB were all purchased by Estuardo Valdemar Rodriguez and Leonor Rodriguez, owners of WLLN in Lillington, for $1.1 million. On February 3, 2005, WRTP and its two sister AM stations ceased broadcasting the "His Radio WRTP" Christian format on AM, and after a day off-air, the three stations resumed broadcasting, now with a regional Mexican format formerly heard on WFTK. AM 1530 also changed its call letters from WRTP to WLLQ. The La Grande network later added stations, while WGSB's license was cancelled by the Federal Communications Commission on March 12, 2019, due to the station having been silent since January 13, 2017. References External links La Grande Que Pasa radio network History of WLLQ LLQ LLQ Mass media in Chapel Hill-Carrboro, North Carolina Radio stations established in 1973 1973 establishments in North Carolina LLQ
https://en.wikipedia.org/wiki/The%20Black%20Bass%20%281988%20video%20game%29
The Black Bass, known in Japan as , is a NES fishing video game, developed by HOT・B and released in June 1989. It is the sequel to the Japan-exclusive The Black Bass on MSX and Family Computer. It is the second entry in the Black Bass series and the first to be released outside Japan. The game is sometimes referred to as The Black Bass USA, which is the name used on the North American version's title screen. It was re-released in 2016 as a built-in game for the Retro-Bit Generations retro video game console. Gameplay The objective of the game is for the player to advance in a series of bass fishing tournaments at four different lakes. Each tournament takes place from sunrise to sunset, and at the conclusion of the day, the player will only advance to the next tournament if they have caught a large number of bass with a high average weight. Pike, rainbow trout, and brown trout may also be caught, but will not affect the player's standing in the tournament. The actual fishing takes place from an overhead perspective. The player casts their line, with the strength of their cast being determined by a power meter at the bottom of the screen. When the lure lands in the water, the player can manipulate its movement to entice a fish to bite it. Once a fish has bitten, the player has to reel it in carefully to avoid breaking the line. The player can select from a variety of lure types and colors, with each being more or less effective depending on weather conditions and time of day. Fishing at different parts of the lake during different times of the day will also impact how likely one is to encounter a bass. Progress in the game is saved via passwords awarded at the conclusion of each tournament. These passwords save the player's rank on their last tournament, which tournament they'll be participating in next, their total number of bass caught across all tournaments, and their average bass weight. Reception Nintendo Power magazine gave The Black Bass an overall score of 3.5 out of 5 in their November 1989 issue. References The Black Bass at GameFAQs 1988 video games Nintendo Entertainment System games Nintendo Entertainment System-only games Fishing video games Hot B games Video game sequels Video games developed in Japan Single-player video games
https://en.wikipedia.org/wiki/PROSITE
PROSITE is a protein database. It consists of entries describing the protein families, domains and functional sites as well as amino acid patterns and profiles in them. These are manually curated by a team of the Swiss Institute of Bioinformatics and tightly integrated into Swiss-Prot protein annotation. PROSITE was created in 1988 by Amos Bairoch, who directed the group for more than 20 years. Since July 2018, the director of PROSITE and Swiss-Prot is Alan Bridge. PROSITE's uses include identifying possible functions of newly discovered proteins and analysis of known proteins for previously undetermined activity. Properties from well-studied genes can be propagated to biologically related organisms, and for different or poorly known genes biochemical functions can be predicted from similarities. PROSITE offers tools for protein sequence analysis and motif detection (see sequence motif, PROSITE patterns). It is part of the ExPASy proteomics analysis servers. The database ProRule builds on the domain descriptions of PROSITE. It provides additional information about functionally or structurally critical amino acids. The rules contain information about biologically meaningful residues, like active sites, substrate- or co-factor-binding sites, posttranslational modification sites or disulfide bonds, to help function determination. These can automatically generate annotation based on PROSITE motifs. Statistics , release 2022_01 has 1,902 documentation entries, 1,311 patterns, 1,336 profiles, and 1,352 ProRules. See also Uniprot the universal protein database, a central resource on protein information - PROSITE adds data to it. InterPro a centralized database, grouping data from databases of protein families, domains and functional sites - part of the data come from PROSITE. Protein subcellular localization prediction another example of use of PROSITE. References External links ProRule — database of rules based on PROSITE predictors Biological databases Proteomics
https://en.wikipedia.org/wiki/Which
Which may refer to: a relative pronoun an interrogative word which (command), an operating system command Which?, a UK charity and its magazine See also English relative clauses Interrogative clause Whicher (disambiguation)
https://en.wikipedia.org/wiki/KSPX-TV
KSPX-TV (channel 29) is a television station in Sacramento, California, United States, airing programming from the Ion Television network. It is owned and operated by the Ion Media subsidiary of the E. W. Scripps Company, and maintains offices on Prospect Park Drive in Rancho Cordova; its transmitter is located at TransTower in Walnut Grove, California. History The station first signed on the air on August 27, 1990, as KCMY; it originally operated as the area's Home Shopping Club affiliate before joining the InfoMall TV network in the mid-1990s. In 1995, then-CBS affiliate KXTV agreed to provide some programming to KCMY in order to give it more of a competitive edge in the Sacramento market. KCMY began airing the tabloid show Geraldo at 10 p.m. as well as the KXTV-produced health magazine show Pulse. Paxson Communications (now Ion Media) purchased the station in 1998, changing its call sign to KSPX. The station became a charter owned-and-operated station of its new Pax TV network (later i: Independent Television and now Ion) on August 31, 1998. KSPX became the second English-language station and third overall station in the Sacramento market to be owned and operated by its affiliated network. Technical information Subchannels The station's digital signal is multiplexed: In 2014, KSPX began simulcasting Telemundo affiliate KCSO-LD on digital subchannel 33.2. The simulcast was discontinued in October 2021. Analog-to-digital conversion KSPX shut down its analog signal, over UHF channel 29, on June 12, 2009, as part of the federally mandated transition from analog to digital television. The station's digital signal remained on its pre-transition UHF channel 48, using PSIP to display KSPX-TV's virtual channel as 29 on digital television receivers. Reduced power operation On August 30, 2019, the station temporarily reduced power, per special temporary authority (STA), from 1,000 kW to 4.3 kW to accommodate relocation of its transmitter site. Power was increased to 48 kW on November 16, 2019. Another increase to 388 kW took place on April 29, 2020. The completion of the main facility and subsequent increase to 1,000 kW took place later in 2020. References External links Ion Television affiliates Court TV affiliates Laff (TV network) affiliates Bounce TV affiliates Defy TV affiliates Scripps News affiliates Television channels and stations established in 1990 1990 establishments in California SPX-TV
https://en.wikipedia.org/wiki/Alpha%20%28programming%20language%29
The Alpha language was the original database language proposed by Edgar F. Codd, the inventor of the relational database approach. It was defined in Codd's 1971 paper "A Data Base Sublanguage Founded on the Relational Calculus". Alpha influenced the design of QUEL. It was eventually supplanted by SQL (which is however based on the relational algebra defined by Codd in "Relational Completeness of Data Base Sublanguages"), which IBM developed for its first commercial relational database product. References See also QUEL query languages Query languages Declarative programming languages SQL
https://en.wikipedia.org/wiki/Jumbogram
In packet-switched computer networks, a jumbogram (portmanteau of jumbo and datagram) is an internet-layer packet exceeding the standard maximum transmission unit (MTU) of the underlying network technology. In contrast, large packets for link-layer technologies are referred to as jumbo frames. The Total Length field of IPv4 and the Payload Length field of IPv6 each have a size of 16 bits, thus allowing data of up to . This theoretical limit for the Internet Protocol (IP) MTU, however, is reached only on networks that have a suitable link layer infrastructure. While IPv4 has no facilities to exceed its theoretical IP MTU limit, the designers of IPv6 have provided a protocol extension to permit packets of larger size. Thus, in the context of IPv6, a jumbogram is understood as an IPv6 packet carrying a payload larger than . IPv6 jumbograms An optional feature of IPv6, the jumbo payload option, allows the exchange of packets with payloads of up to one byte less than 4 GiB (232 − 1 = 4,294,967,295 bytes), by making use of a 32-bit length field. Historically, transport layer protocols, such as the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP), include data size parameters limited to only 16 bits (length, urgent data pointer). The support for IPv6 jumbograms required a redesign in all Transport Layer protocols. The jumbo payload option and the transport-layer modifications are described in RFC 2675. Since after a number of years IPv6 jumbograms have not been widely deployed, some have proposed their removal from the standards. See also Maximum Segment Size (MSS) References Packets (information technology) IPv6
https://en.wikipedia.org/wiki/Triosk
Triosk was an experimental jazz, electronica band, which formed in 2001 by Adrian Klumpes on piano, rhodes and sampler; Laurence Pike on drums, percussion and programming, and Ben "Donny" Waples on electric and acoustic bass. They disbanded in 2007. Though coming from a jazz foundation, their sound has strong electronica elements as well as influences from the textures of musique concrète, with their use of loops of hisses and crackles. They released three albums: 1+3+1 in November 2003 (a collaboration with German electronic artist, Jan Jelinek, on Berlin label ~scape); Moment Returns (11 October 2004) and The Headlight Serenade (12 June 2006), both on The Leaf Label. History Triosk were formed as a jazz-electronica trio in Sydney in 2001 by Adrian Kumpes on piano, Laurence Pike on drums and percussion and Ben "Donny" Waples on bass guitar. Stuart Nicholson of The Guardian noticed that they had "a shared love of the Bill Evans Trio and the German techno producer Jan Jelinek, who loves working with vinyl samples of jazz. Projecting Evans's introspective style through the prism of minimalism and electronic music." K. Ross Hoffman of AllMusic felt their "stated intent was to perform improvisation-based music with electronics an 'active and equal' component. Taking the familiar jazz piano trio format as a starting point, they sought to broaden the scope and potential of the genre by incorporating the techniques and textures of minimalism and electronica, which meant both the layering of electronic and acoustic sounds and the electronic manipulation of their acoustic instruments, whether live in real time or afterwards in post-production." Triosk's debut album was a collaboration with Jelinek, 1+3+1, which was issued by Triosk Meets Jelinek on 1 November 2003 via the latter artist's label, ~scape. Pitchforks Nick Sylvester rated it at 7.3 out of 10 and felt that it "is not minimalist jazz; it is loop-based jazz, influenced and produced by a minimalist composer, and then given to a jazz trio with post-rock tendencies." For their second album, Moment Returns, AllMusic's Joshua Glazer gave it a rating of three-and-a-half out of five and explained that it "offers only wrappings with the highest thread count, assuring exquisite softness and warmth... Each song takes you to the spectral places that exist in the best moments of classic jazz, when the players have all but stopped playing, the listeners have all but stopped listening, and only the air thick with mood remains. But without the once requisite chords, melodies, improvisations, or what-have-you needed to get to that place; it can feel a bit too easy." Pike produced and edited the album, which was released via The Leaf Label on 11 October 2004. The Headlight Serenade, Triosk's third album, appeared on 27 June 2006 with Richard Pike (Laurence's brother) producing. Hoffman describes how "often they sacrifice nearly all of the fundamentals of jazz (and, for that matter, most music) – melody, al
https://en.wikipedia.org/wiki/Steve%20Kouleas
Steve Kouleas (born in Toronto, Ontario, Canada) is a Canadian television anchor, hockey broadcaster and currently radio host on SiriusXM NHL Network Radio channel 91 (The Power Play). Kouleas has also worked for TSN. He hosted both the weeknight hockey program That's Hockey 2Nite on TSN2, as well as the weekday hockey program That's Hockey 2Day on TSN Radio 1050. Kouleas has been working in television and radio throughout North America for more than 20 years. In 2009, he was nominated for a Gemini Award as Best Sportscaster/Anchor in Canada. Background Kouleas was born in Toronto, Ontario, Canada; a graduate of Ryerson University's Radio and Television Arts program. Kouleas is of Macedonian descent. Broadcasting career Kouleas has worked in the television and radio industry in Canada and the United States for more than 20 years. He formerly worked for The Score from 1997 to 2010, covering the National Hockey League (NHL). He last worked for The Sports Network (TSN), and hosted both the weeknight hockey program That's Hockey 2Nite on TSN2, as well as the weekday hockey program That's Hockey 2Day on TSN Radio 1050. Kouleas has also worked for CBC, CBS, ESPN, and NBC. Additionally, he covered Team Canada during the 2010 Winter Olympics. Television Kouleas began his career at The Sports Network (TSN) as an associate producer of SportsDesk in 1990, and worked at the network for seven years. He decided to step away from producing, and instead joined The Score as its lead anchor. Following his departure from TSN, Kouleas worked at The Score as its lead anchor for thirteen years. While at The Score, Kouleas covered numerous sports and sporting events, including the National Hockey League (NHL)'s Stanley Cup Final, trade deadline, and Entry Draft. He also covered several topics for the National Basketball Association (NBA). After thirteen years with The Score, Kouleas parted ways with the network. TSN announced on December 8, 2010 that Steve Kouleas would re-join the network, as a part of their National Hockey League (NHL) broadcast team. Kouleas hosts the weeknight hockey program That's Hockey 2Nite, which premiered on February 1, 2011 on TSN2. As of the start of the 2014-2015 NHL season, Kouleas was no longer listed as a member of TSN's talent. Radio Kouleas hosts a weekday hockey show on SiriusXM the NHL Network called The Power Play airs on channel 91 from 3-6pm EST. Steve has also hosted on TSN Radio 1050 which debuted on April 13, 2011 called That's Hockey 2Day. He previously hosted the interactive radio show, Live from Wayne Gretzky's, which is taped at Wayne Gretzky’s Restaurant in Toronto, Ontario. Kouleas has also done radio and television play-by-play for the Buffalo Sabres of the National Hockey League (NHL), as well as the American Hockey League (AHL). He has made radio appearances on both Sirius Satellite Radio and XM Satellite Radio. He has also called play-by-play for other minor and junior hockey leagues. Honours On August 2
https://en.wikipedia.org/wiki/KTFF-DT
KTFF-DT (channel 61) is a television station licensed to Porterville, California, United States, broadcasting the Spanish-language UniMás network to the Fresno area. It is owned and operated by TelevisaUnivision alongside Hanford-licensed Univision outlet KFTV-DT (channel 21). Both stations share studios on Univision Plaza near the corner of North Palm and West Herndon avenues in northwestern Fresno, while KTFF's transmitter is located on Blue Ridge in rural northwestern Tulare County. The station's programming is relayed to the northern half of the market on low-power translator station KTFF-LD (channel 41) in Fresno, with transmitter on Bald Mountain near Meadow Lakes. It is also simulcast in high-definition on KFTV-DT's sixth digital subchannel (channel 21.6) from a separate transmitter on Bald Mountain. History The station first signed on the air on May 6, 1992, as KKAK; originally operating as an independent station, it aired a mix of infomercials, religious and home shopping programs. The station changed its call letters to KKAG in 1994. In 1998, KKAG was sold to Paxson Communications (now Ion Media Networks). On August 31 of that year, the station became an owned-and-operated station of Paxson's family-oriented television network Pax TV upon its launch, and changed its call letters to KPXF. In 2003, Paxson sold KPXF to Univision Communications, creating a duopoly with Univision O&O KFTV (channel 21); after the sale was finalized, the station's calls were changed to KTFF, it also became an owned-and-operated station of Univision's secondary network TeleFutura (which relaunched as UniMás on February 7, 2013). Univision subsequently purchased Shop at Home affiliate KAJA-LP (channel 68, now on channel 41) from Cocola Broadcasting to become a fill-in translator for KTFF, adopting the KTFF-LD call letters (ironically, the KAJA calls are currently used as a brand name for low-power station K68DJ in Corpus Christi, Texas, which also broadcasts on UHF channel 68). In 2007, the Federal Communications Commission (FCC) issued an order concerning KTFF and former owner Paxson Communications, denying a review of the sale of KTFF to Univision; it also implemented a deal with Christian Network, Inc. (CNI), parent company of The Worship Network (which formerly carried its programming on Pax TV's stations as both an overnight block and later as a dedicated subchannel service), giving the religious broadcaster the right to program KTFF seven days a week from 1 to 6 a.m. In addition, the station was required to provide a digital channel for CNI's exclusive use (so long as certain conditions are met), after KTFF signed on its digital signal, if it used two or more subchannel slots. However, , KTFF broadcasts UniMás programming full-time, though the date the station stopped carrying The Worship Network is unknown. It is also unknown if the discontinuance is tied to Pax's successor, Ion Television, ending carriage of The Worship Network in 2010. Technical in
https://en.wikipedia.org/wiki/PC%20Club
PC Club was a privately owned, United States-based chain of computer hardware stores established in City of Industry, California in 1992. The company closed all its stores on July 29, 2008. PC Club operated primarily in the West Coast states. It offered hardware and peripherals for PCs, as well as complete desktop and notebook computers assembled under the "Enpower" brand name. History Taiwanese businessman Jackson Lan founded PC Club in 1992 as its first CEO. Following Lan's death in 2005, the company went through turbulent times. Jeff Lan, Jackson's brother, was appointed president of the company in January 2006. On April 8, 2008, Jeff Lan was appointed advisor to a new PC Club chairman, James Cheng, while Sunny Lin was named the company's next president. However, in May 2008, all its brick-and-mortar stores were closed in addition to the company's e-commerce website (clubit.com) during another ownership transfer to NAOC. On May 16, the stores and website were reopened after the company was acquired for an undisclosed amount by NAOC Holdings, a leveraged buyout holding company. On July 23, 2008, PC Club closed 14 of its locations. Less than a week later, on July 29, the store shut down the remainder of its locations. Business model PC Club sold directly to both consumers and local resellers through its brick-and-mortar stores and via its website. At one point, they had over 60 store locations in 12 different states, typically placed within walking distance of CompUSA, Best Buy or Fry's Electronics. It provided live tech support by phone, maintained an online forum, and answered questions through e-mail. In-store repairs and upgrades were available at all locations. Marketing PC Club promoted itself through mainstream advertising and word of mouth. PC Club also had TV commercials in limited areas. References External links LA Times article: The Strategist Next Door 1992 establishments in California 2008 disestablishments in the United States American companies established in 1992 American companies disestablished in 2008 Companies based in the City of Industry, California Companies that filed for Chapter 7 bankruptcy in 2008 Companies that have filed for Chapter 7 bankruptcy Computer companies established in 1992 Computer companies disestablished in 2008 Defunct computer companies of the United States Defunct computer hardware companies Retail companies established in 1992 Retail companies disestablished in 2008
https://en.wikipedia.org/wiki/Fruity%20Frank
Fruity Frank is a 1984 video game for the Amstrad CPC and MSX home computers. Produced by Kuma Software and authored by Steve Wallis with graphics by his brother Sean Wallis. The gameplay is very similar to Mr. Do!, though the story involves Frank protecting a garden from invading monsters. Gameplay The player has to collect the fruits lying around the garden while avoiding touching the monsters. Apples can be pushed on these to kill them and offer temporary respite. Monsters can also be killed by throwing a bouncing apple pip at them. When all pieces of fruit have been collected the player proceeds to the next level. Each level is identifiable by a different colour background and a new jocular tune. There are four types of enemies: the yellow "big nose", slow: 20 points by shooting, 40 points by squashing the violet "eggplant", fast, digging: 50 points by shooting, 100 points by squashing the red "strawberry", very fast, digging: 100 points by shooting, 200 points by squashing the green (spelling "Bonus") Every 1000 points, Frank gains an extra life, with a maximum of two. Music Music in the game is inspired from traditional English songs and rhymes. Level 1 : "A Life on the Ocean Wave" (Royal Marines anthem) Level 2 : "Where Have You Been All the Day, Billy Boy" (Irish version) Level 3 : ??? Level 4 : "Sweet Molly Malone" Level 5 : "The Jolly Beggar" Level 6 : "My Bonnie Lies over the Ocean" Level 7 : "London Bridge Is Falling Down" References External links Fruity Frank at CPC Zone Website of the creator of the game Steven Wallis MSX games Amstrad CPC games 1984 video games Video games developed in the United Kingdom Action games Video game clones
https://en.wikipedia.org/wiki/Meta%20model%20%28disambiguation%29
A meta model is used in metamodeling for software engineering. Meta model may also refer to: MODAF Meta-Model Surrogate model, an approximating model in computer simulation
https://en.wikipedia.org/wiki/FIP%20%28radio%20station%29
FIP (originally France Inter Paris) is a French radio network founded in 1971. It is part of the Radio France group. Concept The concept behind FIP has scarcely changed since its founding: commercial-free music interrupted only briefly for occasional announcements about forthcoming cultural events (and, before 2020, traffic updates & short news bulletins). Currently, live broadcasts, from Paris, are from 7 am to 11 pm. During off-hours, a computer replays music programming from previous days. All music programming is hand-picked by a small team of curators, who create three-hour blocks of music. They abide by a few rules, most notably paying close attention to how tracks transition from one to the other, across genres and styles, and especially making sure that a song is never played twice in a 48-hour window. FIP broadcasts around 16,000 artists and 44,000 different songs every year; 85% of its programming comes from independent labels. The short news bulletin at 10 minutes before the hour was conceived so that listeners interested in hearing more details could tune in to France Inter (or other stations) at the top of the hour; this was removed in June 2020, citing the saturation of news in the media ecosystem. Likewise, traffic updates, relevant to Paris, had been removed in 2008. Music broadcasts The programming features all types of music genres including chanson, classical, film music, jazz, pop rock, world music and blues, but with careful attention paid to smooth and unobtrusive transition from one song to the other (for example, the rock and roll song Roll Over Beethoven can be preceded by a short sonata of Beethoven). FIP is one of the few stations in the world to transmit this type of programming around the clock. All of the songs are hand-picked by expert programmers. Some famous ones include Patrick Tandin, Julien Delli Fiori and Alexandre Marcellin. The first programmer was Anne Marie Leblond. Currently there are seven programmers: Armand Pirrone, Luc Frelon, Patrick Derlon, Christian Charles, René Hardiagon, Jean-Yves Bonnardel and Alexandre Desurmont. The station broadcasts presenter-led programs during several evening hours: 7pm-8pm: Club Jazzafip with Jane Villenet (Mon-Thu) and Charlotte Bibring (Fri-Sun) 8pm-10pm: Monday: Sous les jupes de Fip with Emilie Blon-Metzinger and Luc Frelon Tuesday: C'est Magnifip! with Frédérique Labussière Wednesday: Certains l'aiment Fip with Susana Poveda Thursday: Live à Fip with Stéphanie Daniel History The station was founded on 5 January 1971 at 5 p.m. by the head of radio-télévision Roland Dhordain and two producers from France Inter, Jean Garetto and Pierre Codou, both week-end presenters at France Inter. It was broadcast from Paris on 514 m (585 kHz) medium wave, hence its original name of France Inter Paris 514. It was noted for its particular style of programming and its hosts' sugary tone of voice as they described traffic problems with humour and irony. After Paris, the
https://en.wikipedia.org/wiki/Target%E2%80%93action
The term target–action design paradigm refers to a kind of software architecture, where a computer program is divided into objects which dynamically establish relationships by telling each other which object they should target and what action or message to send to that target when an event occurs. This is especially useful when implementing graphical user interfaces, which are by nature event-driven. Advantages The target–action approach to event-driven systems allows far more dynamism when compared to other, more static approaches, such as by subclassing. That is because subclassing is a relatively stiff way to program: a programmer must lay out the internal interconnection logic of a program at design time and this cannot be changed later, unless the program is stopped, reengineered, and rebuilt. On the other hand, target-action based programming can change these completely at run-time, thus allowing the program to create new interrelationships and novel behavior by itself. A prime example of this approach is the OpenStep API, which partly thanks to being based on the dynamic Objective-C language, has much of its graphical user interface implemented by using the target-action paradigm. Consider the following example, written in Objective-C: [button setTarget: self]; [button setAction: @selector(doSomething)]; Now when the button identified by the variable is pressed, the runtime system will try to send a message named to the object in which this code has been invoked. It is also very well possible to determine the message to be sent at run-time: [button setTarget: self]; [button setAction: NSSelectorFromString([textField stringValue])]; Here the message which is to be sent is determined by consulting a text field's string value (the string of text which the user typed into a text field). This string is afterwards converted into a message (using the NSSelectorFromString function) and passed to the button as its action. This is possible because, under Objective-C, methods are represented by a selector, a simple string describing the method to be called. When a message is sent, the selector is sent into the ObjC runtime, matched against a list of available methods, and the method's implementation is called. The implementation of the method is looked up at runtime, not compile time. Disadvantages Because of the extreme dynamism and freedom of behavior given to programs designed with the target-action paradigm, it can happen that the program designer incorrectly implements a part of the interconnection logic and this can lead to sometimes hard to trace bugs. This is due to the lack of compile-time control provided by the compiler which cannot see the interconnections. Thus interconnection consistency control is left entirely to the programmer. The result of an incorrectly connected target-action binding can differ based on how the particular system in which the program is implemented regards this: it can ignore the condition and
https://en.wikipedia.org/wiki/Transcription%20error
A transcription error is a specific type of data entry error that is commonly made by human operators or by optical character recognition (OCR) programs. Human transcription errors are commonly the result of typographical mistakes; putting one's fingers in the wrong place while touch typing is the easiest way to make this error. Electronic transcription errors occur when the scan of some printed matter is compromised or in an unusual font – for example, if the paper is crumpled, or the ink is smudged, the OCR may make transcription errors when reading. Transposition error "Transposition error" may be confused with "transcription error", but they do not mean the same thing. As the name suggests, transposition errors occur when characters have “transposed”—that is, they have switched places. This often occurs in the course of transcription; thus a transposition error is a special case of a transcription error. Transposition errors are almost always human in origin. The most common way for characters to be transposed is when a user is touch typing at a speed that makes them input a later character before an earlier one; or simply fails to keep the correct order in their internal memory while transcribing the text. Solving transcription and transposition errors Transcription and transposition errors are found everywhere, even in professional articles in newspapers or books. They can be missed by editors quite easily, just as they can be created quite easily. The most obvious cure for the errors is for the user to watch the screen when they type, and to proofread. If the entry is occurring in data capture forms, databases or subscription forms, the designer of the forms should use input masks or validation rules. Transcription and transposition errors may also occur in syntax when computer programming or programming, within variable declarations or coding parameters. This should be checked by proofreading; some syntax errors may also be picked up by the program the author is using to write the code. Common desktop publishing and word processing applications use spell checkers and grammar checkers, which may pick up on some transcription/transposition errors; however, these tools cannot catch all errors, as some errors form new words which are grammatically correct. For instance, if the user wished to write "The fog was dense", but instead put "The dog was dense", a grammar and spell checker would not notify the user because both phrases are grammatically correct, as is the spelling of the word "dog". Unfortunately, this situation is likely to get worse before it gets better, as workload for users and workers using manual direct data entry (DDE) devices increases. Double entry (or more) may also be leveraged to minimize transcription or transposition error, but at the cost of a reduced number of entries per unit time. Mathematical transposition errors are easily identifiable. Add up the numbers that make up the difference and the resultant numbe
https://en.wikipedia.org/wiki/Input%20mask
In computer programming, an input mask refers to a string expression, defined by a developer, that constrains user input. It can be said to be a template, or set format that entered data must conform to, ensuring data integrity by preventing transcription errors. The syntax of this string expression differs between implementations, but the fundamental input types are all supported. Some frequent uses of input masks include entry of telephone numbers, ZIP or postal codes, times and dates. e.g. When entering into a text box a phone number on a data capture form, in the format "(111) 111 1111" the area code brackets, the space between the number and the area code will automatically be placed in. Generally speaking, an input mask is a user-generated set of rules; e.g., a maximum of 45 characters. This kind of string is useful in finding reports and healthcare files. An example would be: LL00 00L – this in detail shows what should be included. References User interface techniques Data quality
https://en.wikipedia.org/wiki/Dirty%20data
Dirty data, also known as rogue data, are inaccurate, incomplete or inconsistent data, especially in a computer system or database. Dirty data can contain such mistakes as spelling or punctuation errors, incorrect data associated with a field, incomplete or outdated data, or even data that has been duplicated in the database. They can be cleaned through a process known as data cleansing. Dirty Data (Social Science) In sociology, dirty data refer to secretive data the discovery of which is discrediting to those who kept the data secret. Following the definition of Gary T. Marx, Professor Emeritus of MIT, dirty data are one among four types of data: Nonsecretive and nondiscrediting data: Routinely available information. Secretive and nondiscrediting data: Strategic and fraternal secrets, privacy. Nonsecretive and discrediting data: sanction immunity, normative dissensus, selective dissensus, making good on a threat for credibility, discovered dirty data. Secretive and discrediting data: Hidden and dirty data. See also Data janitor Signal noise References Data quality
https://en.wikipedia.org/wiki/Bill%20Morrow%20%28executive%29
Bill Morrow (born 1959) is the former CEO of the government-owned corporation nbn™ responsible for installation and implementation of the National Broadband Network across Australia. His departure was announced in April 2018 and became effective on 1 September 2018. He became CEO of Directv in February, 2021. Career 1980 – 1995: Director, Network Data Products, Pacific Bell 1996 – 24 July 2006: Vodafone Group PLC, finishing as CEO Europe. 1 April 2005: appointed President of Vodafone UK 2006 – 2008: President and CEO of Pacific Gas and Electric Company 9 March 2009 – 10 March 2011: CEO of US telecommunications company Clearwire 21 March 2012 – March 2014: CEO, Vodafone Hutchison Australia (VHA) 2 April 2014 – 1 Sept 2018: CEO NBN Co Australian National Broadband Network October 2019- February 2021: Special adviser and managing director of process service and cost optimization AT&T February 2021: CEO of DirecTV Education Associate of Science degree in Electrical Engineering from Condie College, San Jose, California BA in Business Administration from National University in San Diego References 1959 births Living people American businesspeople Australian businesspeople Vodafone people NBN Co people
https://en.wikipedia.org/wiki/Craig%20Nevill-Manning
Craig Graham Nevill-Manning (né Nevill) is a New Zealand computer scientist who founded Google's first remote engineering center, located in midtown Manhattan, where he was an Engineering Director. He also created Froogle (now Google Shopping), a product search engine. He is now Head of Engineering at Sidewalk Labs. Academic and professional career Nevill-Manning graduated with a BSc in computer science from the University of Canterbury. He received his PhD from the University of Waikato where he was a co-creator of the Weka machine learning suite and the Greenstone digital library software. His doctoral advisor was Ian Witten. In 1994, he invented the sequitur algorithm, which uses data compression to infer the structure of a sequence of symbols. Craig was invited to join Google at its formation but declined and then joined a little later on. Prior to joining Google in 2001 as a senior research scientist, he was an assistant professor in the Computer Science Department at Rutgers University, and was a post-doctoral fellow in the Biochemistry department at Stanford University. His research interests center on using techniques from machine learning, data compression and computational biology to provide more structured search over information. In 2016, Nevill-Manning joined Alphabet, Inc. subsidiary Sidewalk Labs as CTO. Awards In 2010 Nevill-Manning received a distinguished alumni award from the University of Waikato. In 2009 he won a World Class New Zealand Award in the Information and Communications category. References External links University of Canterbury graduate profile American computer scientists Google employees Living people New Zealand computer scientists University of Canterbury alumni University of Waikato alumni Rutgers University faculty Year of birth missing (living people) Place of birth missing (living people) People educated at Marlborough Boys' College
https://en.wikipedia.org/wiki/Graph%20state
In quantum computing, a graph state is a special type of multi-qubit state that can be represented by a graph. Each qubit is represented by a vertex of the graph, and there is an edge between every interacting pair of qubits. In particular, they are a convenient way of representing certain types of entangled states. Graph states are useful in quantum error-correcting codes, entanglement measurement and purification and for characterization of computational resources in measurement based quantum computing models. A graph state is a particular case of a 2-uniform hypergraph state, a generalization where the edges have N cardinality. Formal definition Quantum graph states can be defined in two equivalent ways: through the notion of quantum circuits and stabilizer formalism. Quantum circuit definition Given a graph , with the set of vertices and the set of edges , the corresponding graph state is defined as where and the operator is the controlled-Z interaction between the two vertices (corresponding to two qubits) and Stabilizer formalism definition An alternative and equivalent definition is the following, which makes use of the stabilizer formalism. Define an operator for each vertex of : where are the Pauli matrices and is the set of vertices adjacent to . The operators commute. The graph state is defined as the simultaneous -eigenvalue eigenstate of the operators : Equivalence between the two definitions A proof of the equivalence of the two definitions can be found in. Examples If is a three-vertex path, then the stabilizers are The corresponding quantum state is If is a triangle on three vertices, then the stabilizers are The corresponding quantum state is Observe that and are locally equivalent to each other, i.e., can be mapped to each other by applying one-qubit unitary transformations. Indeed, switching and on the first and last qubits, while switching and on the middle qubit, maps the stabilizer group of one into that of the other. More generally, two graph states are locally equivalent if and only if the corresponding graphs are related by a sequence of so-called "local complementation" steps, as shown by Van den Nest et al. (2005). See also Entanglement Cluster state References External links Quantum graph states: two equivalent definitions Quantum information science Quantum states
https://en.wikipedia.org/wiki/Jay%20Maynard
Jay Maynard (born July 27, 1960) is an American computer programmer, system administrator and the volunteer project maintainer for Hercules, a free emulator of IBM mainframe hardware. He is known for his self-made electroluminescent costume based on the film Tron, which resulted in his nickname Tron Guy. Internet fame Maynard created a revealing electroluminescent costume, inspired by the film Tron, that he could wear at the science fiction convention Penguicon in 2004. He has said that he "hasn't missed a Penguicon, and doesn't intend to". He created a web page of photos of the costume, and of himself wearing it. His page of photos quickly gained a lot of attention on the Internet, after it was posted on Slashdot and Fark. In 2006, Maynard appeared in a music video entitled "We Are the Web", for the website of the same name. The video advocates the concept of network neutrality. In it, Maynard appears alongside several other Internet celebrities, including Leslie Hall and Randy Constan. He was also parodied in the 2008 South Park episode "Canada on Strike". His likeness appeared alongside those of such other Internet celebrities as Gary Brolsma, Star Wars Kid, Chris Crocker, and Tay Zonday. In 2010, Maynard was banned from seeing the film Tron: Legacy in his iconic Tron suit in his local movie theater because of the illuminating lights on his suit. On June 8, 2011, Maynard appeared on America's Got Talent. He received a "no" vote from all of the three judges and did not make it past the audition round. Howie Mandel had him restart his introductory speech over several times, so it was left unclear what his act was going to be. In 2011, Maynard appeared in Duck Products' "Stuck On Duck Video Project", a commercial for duct tape. The ad, made by Ryactive and produced by Tongal, recreates the light-cycle race from Tron using stop-motion animation, followed by Maynard's appearance in the Tron Guy outfit. The video was featured in Wired Magazine as a "genius idea" and like many of Maynard's previous videos went viral, becoming the tenth most viewed video of all time on Vimeo. On August 26, 2015, Maynard was interviewed by the Scene World Podcast in a live video podcast, hosted by Olympronica for the Film & Games Interactions exhibit at the Deutsches Filminstitut in Frankfurt, Germany. The interview was presented live on Twitch, and later published as both a video interview on YouTube and audio podcast. See also List of Internet phenomena References External links Jay Maynard (personal website) 1960 births Living people Amateur radio people Cosplayers American Internet celebrities People from Fairmont, Minnesota Internet memes Tron (franchise) America's Got Talent contestants
https://en.wikipedia.org/wiki/REN21
REN21 (Renewable Energy Policy Network for the 21st Century) is a think tank and a multistakeholder governance group which is focused on renewable energy policy. REN21's goal is to facilitate policy development, knowledge exchange, and joint action towards a rapid global transition to renewable energy. REN21 brings together governments, non-governmental organisations, research and academic institutions, international organisations, and industry to learn from one another and advance the adoption of renewable energy. To assist policy decision-making, REN21 provides knowledge about what is happening now in the renewable energy sector and how the latest trends will impact future developments. REN21 facilitates the collection of information on renewable energy. It does this through six products: the Renewables Global Status Report (GSR), regional status reports, global futures reports (GFR), thematic reports, the REN21 Renewables Academy, and the International Renewable Energy Conference (IREC) series. The REN21 Secretariat is based at UN Environment in Paris, France, and is a registered non-profit association under German law (e.V.). The organisation has more than 80 member organisations as of 2021. History REN21 was launched in June 2004 as an outcome of the International Conference for Renewable Energies in Bonn, Germany. Paul Hugo Suding, was the first executive secretary upon REN21's formation in 2006. He was succeeded by Virginia Sonntag O'Brien (2008–2011), Christine Lins (2011–2018), and Rana Adib (2018–present). Publications Renewables Global Status Report (GSR) The Renewables Global Status Report (GSR) is the most frequently referenced report on the subject of the renewable energy market, industry, and policy trends. This annual report, which has been produced since 2005 details the current status of the deployment of renewable technologies globally, covering the energy sector (power, heating and cooling and transport), reporting on policy development, the energy industry, investment and markets. The report is based on data and information contributed by the REN21 member network of more than 900 experts and researchers from around the world and undergoes an open peer-review process. The report illustrates that, while transformation in the power sector with renewables is picking up speed, urgent action is required in heating, cooling, and transport. The 2021 GSR report found that the share of fossil fuels had not changed in the last decade, with fossil fuels accounting for 80.3% of total final energy use (TFEC) in 2009 versus 80.2% in 2019. Furthermore, the report highlighted that only 5 G20 countries had set targets for the share of renewable energy, with only 3 on track to reach their goals (EU-27, Germany, Italy). Alongside these findings, the organisation called for renewable energy to be a key performance indicator (KPI) in all economic activity. The GSR report is complemented by a Perspectives Report that presents overarc
https://en.wikipedia.org/wiki/Graham%20Cluley
Graham Cluley (born 8 April 1969) is a British security blogger and the author of grahamcluley.com, a daily blog on the latest computer security news, opinion, and advice. Cluley started his career in the computer security industry as a programmer at British anti-virus firm S&S International (later known as Dr Solomon's Software), where he wrote the first Windows version of Dr Solomon's Anti-Virus Toolkit. From 1999 to 2013, Cluley was a Senior Technology Consultant at Sophos and also acted as the Head of Corporate Communications, spokesperson and editor of Sophos's Naked Security site. In 2009 and 2010, Computer Weekly named Cluley Twitter user of the year. In April 2011, Cluley was inducted into the InfoSecurity Europe Hall of Fame. Graham Cluley and Carole Theriault are the co-hosts of the weekly Smashing Security podcast. His war of words with the virus-writer 'Gigabyte' – somewhat of a media sensation for being a teenage girl – generated a fair amount of media attention in its own right. Public speaking Cluley has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Computer games Before entering the computer security industry, Cluley achieved notoriety for two interactive fiction PC games: Jacaranda Jim (1987) and Humbug (1990). Both games were independently distributed as shareware, with Cluley advertising in computer magazines and sending them out on 5½- and 5¼-inch disks. As an incentive, tips and maps were sent out to players who had sent in their registration fees. Both were praised as "shareware masterpieces" in PC Review. Cluley later entered his games into the public domain, and they are now available for download or in-browser play from his website. Jacaranda Jim Cluley wrote Jacaranda Jim while studying computing at Guildford College of Technology. He began developing the game in 1987, borrowing liberally from an earlier unreleased game named Herbie. The game "took about 6 months to write, and was finished by April 1988". The game, which was written in Pascal, was then ported to the PC platform with the help of Alex Bull, another student at Guildford. The premise of the game, as presented in promotional materials, is: Following an attack on his cargo-ship by a crack squad of homicidal beechwood armchairs, space cadet Jacaranda Jim is forced to crashland into the strange world of Ibberspleen IV. "Luckily", Jim is rescued from the burning wreckage by the mysteriously smug creature, Alan the Gribbley. Can you help Jim escape back to the safety of Earth? In its original incarnation, the game was named Derek the Troll in honour of its central character, based upon one of Cluley's lecturers. When Cluley's maths lecturer questioned the lampooning of one her colleagues, the character was renamed "Alan the Gribbley" – inspired by one of Cluley's fel
https://en.wikipedia.org/wiki/Radiation%20intelligence
Unintentional Radiation intelligence, or RINT, is military intelligence gathered and produced from unintentional radiation created as induction from electrical wiring, usually of computers, data connections and electricity networks. See also TEMPEST References Military intelligence Radiation Measurement and signature intelligence
https://en.wikipedia.org/wiki/Media%20server
A media server is a computer appliance or an application software that stores digital media (video, audio or images) and makes it available over a network. Media servers range from servers that provide video on demand to smaller personal computers or NAS (Network Attached Storage) for the home. Purpose By definition, a media server is a device that simply stores and shares media. This definition is vague, and can allow several different devices to be called media servers. It may be a NAS drive, a home theater PC running Windows XP Media Center Edition, MediaPortal or MythTV, or a commercial web server that hosts media for a large web site. In a home setting, a media server acts as an aggregator of information: video, audio, photos, books, etc. These different types of media (whether they originated on DVD, CD, digital camera, or in physical form) are stored on the media server's hard drive. Access to these is then available from a central location. It may also be used to run special applications that allow the user(s) to access the media from a remote location via the internet. Hardware The only requirement for a media server is a method of storing media and a network connection with enough bandwidth to allow access to that media. Depending on the uses and applications that it runs, a media server may require large amounts of RAM, or a powerful multicore CPU. A RAID array may be used to create a large amount of storage, though it is generally not necessary in a home media server to use a RAID array that gives a performance increase because current home network transfer speeds are slower than that of most current hard drives. However, a RAID configuration may be used to prevent loss of the media files due to disk failure as well. Many media servers also have the ability to capture media. This is done with specialized hardware such as TV tuner cards. Analog TV tuner cards can capture video from analog broadcast TV and output from cable/satellite set top boxes. This analog video then needs to be encoded in digital format to be stored on the media server. This encoding can be done with software running on the Media server computer or by hardware on the TV tuner card. Digital TV tuner cards take input from broadcast digital TV. In North America and in South Korea, the ATSC standard is used. In most of the rest of the world, DVB-T is the accepted standard. Since these transmissions are already digital, they do not need to be encoded. Home theater PC packages with server capabilities A variety of packages are available to run a home theater or media center. GB-PVR Jellyfin Kodi Entertainment Center (formerly XBMC) LinuxMCE MediaPortal MythTV Orb Plex TVersity Media Server Media servers in performance environments The growing use of motion graphics in environments such as theatre, dance, corporate events and concerts has led to the development of media servers designed specifically for live events. These machines are often high-spec PC c
https://en.wikipedia.org/wiki/Hollywood%20Squares%20%28video%20game%29
Hollywood Squares is a multiplatform puzzle game based on the television game show of the same name. Versions were also released for MS-DOS, Commodore 64 and Apple II home computers, and look a bit different from the NES counterpart. The photo of the set on both the NES and computer versions is from the 1985 series pilot (the actual show had no gold stars on the studio floor and more elaborate risers for the cars). The game is based on the 1986-1989 version hosted by John Davidson. Gameplay Players have to either agree or disagree with fictitious celebrities to earn squares and make tic-tac-toe. Much like the TV series, winning one of the first two games is worth $500, the third game is worth $1,000 and the second game is always the "Secret Square" game. The winner then goes on to the bonus round, where they have to choose one of five keys and insert it into the proper car among the five offered. Reception David & Robin Minnick reviewed Double Dare and Hollywood Squares for Compute!'s Gazette and said "Any fan of the TV games will enjoy these 64 versions. And even if you're not a fan, we think you'll get a kick out of these games anyway." Jeff Hurlburt for RUN Magazine said "Maybe you won't toss out your trusty Trivial Pursuit cards, but they're sure to get a much needed rest. For information, value and just plan fun, it's three in a row for Hollywood Squares." Leslie Mizell for the Game Player's Encyclopedia of Nintendo Games said "Hollywood Squares doesn't have the necessary substance to be a videogame that remains enjoyable with repeated playing." Later releases In 2010, Ludia released a game based on the 2002-2004 era of the show. The game features the voice of host Tom Bergeron and video clips of celebrities Brad Garrett, Kathy Griffin, Jeffrey Tambor, and Martin Mull as the center square. The game was first released for the PC and Wii, followed by releases for iOS devices. In 2011, a port was released onto PlayStation Network. All versions have multiplayer options, except for the PC version. Much like the 2003-2004 season, each of the three games are worth $1,000.the second game is always the "secret square" round for a bonus $1,000. The winner from the best two out of three games goes to the bonus round where Tom will ask each celebrity a question while the player has to correctly either agree or disagree with their answer in order to remove one of the wrong keys from the pool of nine (the actual bonus round had a contestant choose a celebrity by correctly either agreeing or disagreeing statements about that particular celebrity). Then the player has to pick a key that would open the chest in order to win $20,000 plus a new wardrobe item for their avatar. References External links 1988 video games Apple II games Commodore 64 games DOS games GameTek games Hollywood Squares Multiplayer and single-player video games Nintendo Entertainment System games North America-exclusive video games Puzzle video games Rare (company) games Video ga
https://en.wikipedia.org/wiki/Comedy%20at%20Club%2054
Comedy at Club 54 was a Canadian television program hosted by Ben Guyatt. The show was produced from the early 1990s until 2002 and is now airing in syndicated re-runs on the Canadian Comedy Network. Tapings took place in Burlington, Ontario at Club 54. The live performances still happen weekly, although new episodes of the Comedy at Club 54 TV show have not been aired since 2002. The taped shows usually begin with a zoom-in to host Ben Guyatt, who then reads the "Joke of the Week", which was a weekly joke ostensibly sent in from program viewers across North America. Typically, he then throws the joke card behind him and says to the audience "Welcome to Comedy at Club 54!" This was followed by the opening sequence, audience applause, and the show's theme song, played by an in-house band. Guyatt then introduces the comedians, who over the years have come from all over North America. The performances were almost all of the typical stand-up comedy variety, but also included magicians, ventriloquists, vaudeville acts, comedy duos and musical acts. Every show features at least two comedians with a 12-minute televised spot (less time if there are more guests), although the live performances are much longer and were edited for time. Acts who appeared on the show include Pat McKenna and Russell Peters. The show usually closes with Guyatt once again on stage, calling up the comedians for a final bow. At this point Guyatt would usually say "And remember, we share the planet with the animals, so please, I beg ya, treat 'em with respect", followed by "Goodnight Mom, I love ya!" External links Comedy at Club 54 - Official Website Ben Guyatt - Official Website Comedy at Club 54 at The Comedy Network 1990s Canadian comedy television series CTV Comedy Channel original programming 1990 Canadian television series debuts 2002 Canadian television series endings Canadian stand-up comedy television series Television shows filmed in Ontario Burlington, Ontario
https://en.wikipedia.org/wiki/Fibre%20Channel%20electrical%20interface
The Fibre Channel electrical interface is one of two related Fibre Channel standards that can be used to physically interconnect computer devices. The other standard is a Fibre Channel optical interface, which is not covered in this article. Fibre Channel signal characteristics Fibre channel electrical signals are sent over a duplex differential interface. This usually consists of twisted-pair cables with a nominal impedance of 75 ohms (single-ended) or 150 ohms (differential). This is a genuine differential signalling system so no ground reference is carried through the cable, except for the shield. Signalling is AC-coupled, with the series capacitors located at the transmitter end of the link. The definition of the Fibre Channel signalling voltage is complex. Eye-diagrams are defined for both the transmitter and receiver. There are many eye-diagram parameters which must all be met to be compliant with the standard. In simple terms, the transmitter circuit must output a signal with a minimum of 600 mV peak-to-peak differential, maximum 2000 mV peak-to-peak differential. A good signal looks rather like a sine-wave with a fundamental frequency of half the data rate, so 1 GHz for a typical system running at 2 gigabits per second. The Bit-Error Rate (BER) objective for Fibre Channel systems is 1 in 1012 (1 bit in 1,000,000,000,000 bits). At 2 Gbit/s this equates to seven errors per hour. Therefore, this is a common event and the receiver circuitry must contain error-handling logic. In order to achieve such a low error-rate, jitter "budgets" are defined for the transmitter and cables. Fibre Channel connector pinouts There are various Fibre Channel connectors in use in the computer industry. Details of their pinouts are distributed between different official documents. The following sections describe the most common Fibre Channel pinouts with some comments about the purpose of their electrical signals. The most familiar Fibre Channel connectors are cable connectors, used for interconnects between initiators and targets (usually disk enclosures). There are also "device connectors" that can be found on Fibre Channel disk-drives and backplanes of enclosures. The device connectors include pins for power and for setting disk options. 9-pin "DE-9" cable connector Optional pins 2, 3, 7, and 8 are intended for use with an external optical converter. This is often called a Media Interface Assembly (MIA). Fibre channel DE-9 connectors often have only the 4 required contacts installed. Note that they are the four outermost contacts i.e. the same as used for Token Ring, this is an easy way to tell a fibre channel cable from an RS-232 cable. 8-pin "HSSDC" cable connector (High Speed Serial Data Connection) Optional pins 2, 4, 5, and 7 are intended for use with an external optical converter. This is often called a Media Interface Assembly (MIA). 7-pin "HSSDC2" cable connector (High Speed Serial Data Connection) 40-pin "SCA-2" dis
https://en.wikipedia.org/wiki/Think%20Blue%20Linux
Think Blue Linux (sometimes ThinkBlue Linux) was a port of Linux to IBM S/390 (later, zSeries) mainframe computers, done by the Millenux subsidiary of German company Thinking Objects Software GmbH. The distribution consisted primarily of a collection of Red Hat Linux 6.1 packages (or RPMs) on top of IBM's port of the Linux kernel. Distribution of the product ceased on February 16, 2006. References LinuxToday article Heise article (German) External links linux.s390.org aka linux.zseries.org is the official ThinkBlue/64 website Thinking Objects Software GmbH (German) Millenux (subsidiary of Thinking Objects) Linux for zSeries product page (German) Discontinued Linux distributions Linux distributions
https://en.wikipedia.org/wiki/Drakan%3A%20The%20Ancients%27%20Gates
Drakan: The Ancients' Gates is an action-adventure video game released in 2002 for the PlayStation 2, developed by Surreal Software and published by Sony Computer Entertainment. It is the sequel to the 1999 PC game Drakan: Order of the Flame. The game's name comes from the eponymous Ancients' Gates, which are the central focus of the story. Gameplay The gameplay of Drakan: The Ancients' Gates is virtually identical to its predecessor. It is a third-person action-adventure perspective that consists of two main parts of gameplay - in the air and on the ground. When flying mounted on Arokh, a dragon, the duo is superior to any ground enemy, but on the other hand, facing flying enemies will require a lot of maneuver and aim. Arokh can target enemies and launch powerful fireballs in their direction or a powerful breath of fire, in addition to other powers that you can acquire in the game for him. When controlling Arokh, the player has free movement in three dimensions, up and down, left and right, forward and backward In solo, the player directly controls the main character, Rynn. Players can focus on specific enemies and perform attacks, including combo moves. Apart from that Rynn can use several weapons, including swords, axes, bows, and blunt weapons. She can also use several spells, such as Fireball, Lightning Bolt, and others. Plot This game takes place sometime after the events in Order of the Flame. Rynn and Arokh answer a call from the city of Surdana. Lady Myschala of Surdana asks for Rynn and Arokh's assistance. An evil race of three-faced beings known as the Desert Lords has begun rallying the monsters from around the world (similar to how the Dark Union did in Order of the Flame) and have begun enslaving humans. Around the world, there exist four gateways that lead to the world where the dragon mother, Mala-Shae, and her brood have been slumbering since the Dark Wars. Only a Dragon of the Elder Breed can open the gates, and this is why Rynn and Arokh (more specifically, Arokh) are needed to open these gates, so that the humans can once again bond with dragons and fight back against the Desert Lords. Along the way, the two of them must go on various side quests to accomplish goals leading them to the ultimate goal. Reception The game received an aggregate score of 78/100 on Metacritic, based on 31 critic reviews. In its first two weeks the game sold more than 20,000 copies. References External links Drakan: The Ancients' Gates development Post-Mortem written by designer/programmer Richard Rouse III 2002 video games Action-adventure games Video games about dragons Fantasy video games PlayStation 2 games PlayStation 2-only games Riot Engine games Sony Interactive Entertainment games Surreal Software games Video game sequels 3D platform games Video games developed in the United States Video games featuring female protagonists Single-player video games
https://en.wikipedia.org/wiki/RSM%20US
RSM US LLP is an audit, tax, and consulting firm focused on the middle market in the United States and Canada and is a member of the global accounting network RSM International. It is the fifth largest accounting firm in the United States and employs more than 17,000 professionals across 93 cities nationwide and in Canada. RSM US also maintains offices in India and El Salvador. Since 2012, RSM US has been headquartered in downtown Chicago. Through RSM International, the firm brings together more than 51,000 professionals from over 800 offices located in more than 123 countries. History The firm was founded in 1926 by Ira B. McGladrey (1883-1952) in Cedar Rapids, Iowa. McGladrey became a prominent figure in public accounting in Iowa, serving as President of the Iowa Society of Certified Public Accountants, chairman of the Iowa Board of Accountancy, as well as a member of the Rules Committee of the American Institute of Certified Public Accountants, the premier governing body for the field of accounting in the United States. The firm continued to operate under some variant of the McGladrey name until 2015. Legal structure Beginning in 1999, through a partnership with H&R Block, McGladrey operated under two separate legal entities: McGladrey & Pullen, LLP RSM McGladrey, Inc. McGladrey & Pullen operated under the traditional partnership structure and offered audit and attestation services. RSM McGladrey was established under the partnership agreement with H&R Block to provide tax and advisory services under an alternative practice structure. In August 2011, H&R Block announced the conclusion of the partnership, divesting RSM McGladrey to McGladrey & Pullen and reuniting the firms in their traditional partnership structure. McGladrey & Pullen acquired all employees, assets, and infrastructure from RSM McGladrey. The deal closed on December 1, 2011. On May 1, 2012, McGladrey & Pullen officially changed its name to McGladrey LLP. In July 2012, McGladrey shifted its headquarters from Bloomington, Minnesota to Chicago. On October 26, 2015, McGladrey LLP changed its name to RSM US LLP as part of a worldwide rebranding of RSM International members. Service lines Audit & Financial Reporting Services Global Audit Public Company Audit Private Company Audit Employee Plan Benefit Audit Tax Advisory Services Federal Tax Indirect Tax State & Local Tax International Tax Planning Strategies Credits and Incentives Tax Function Optimization Consulting Services Strategy & Management Consulting Technology Consulting Financial Advisory Valuation Services Litigation & Dispute Advisory Financial Investigations Restructuring & Bankruptcy Risk Advisory M&A Transaction Advisory Services Technical Accounting Awards and recognition 2022 - 2023 Accounting Today ranked RSM the fifth largest accounting, tax and consulting services firm in the U.S. for the 16th consecutive year Great Place to Work® named RSM one of the 2022 Best Workpla
https://en.wikipedia.org/wiki/Caldicot%20railway%20station
Caldicot railway station is a part of the British railway system owned by Network Rail and is operated by Transport for Wales. It serves the town of Caldicot in Monmouthshire, Wales. It is located between Chepstow and the city of Newport on the Gloucester line, from the zero point at , measured via Stroud. The line to Bristol via the Severn Tunnel runs just to the north but there are no platforms here; however, Severn Tunnel Junction station is within walking distance for those wanting to travel to Bristol. History The railway line through Caldicot was built as the broad gauge South Wales Railway in 1850, although the nearest station was at Portskewett, two miles to the east. In 1861 a private siding was opened to serve the Caldicot Iron & Wire Works, from 1880 the Severn Tinplate Works, on what is now the industrial estate on the Sudbrook road, south of the castle. In typical broad gauge fashion, these works lines used two short hand-worked turntables to move wagons between the lines, rather than points. In 1872, the South Wales Railway was re-gauged from broad gauge to standard gauge. By 1875 the wire works was also served by a level crossing and a crossover between the two running lines, controlled by a signal box. It is likely that this relaying was carried out earlier, as part of the re-gauging work. In 1878, a branch line was laid to Sudbrook, to support the works for construction of the new Severn Tunnel. One of the main tasks of this line was to deliver coal for the pumping engines needed to drain the tunnel workings. Even after the long-delayed tunnel opened in 1886, on the South Wales Main Line, this coal traffic remained the major reason for keeping this branch in service. By 1925, the busier traffic on the main line had led to an expansion of the junction with a head siding. Further sidings were provided to the north of the running lines, on the town side. These were well to the east of where the station is today. Caldicot station opened as a passenger halt on 12 September 1932. The road serving the station had been here for many years beforehand, since the building of the tunnel. It crosses the low tunnel line by an overbridge, then passes under the Gloucester line by an unusually low underpass. This underpass was originally provided to give farm access to the land of the Caldicot Levels south of the railway and it is a mark of the passenger station's minor importance that such a restricted access continues to this day. In 1939, construction began on the Royal Navy Propellant Factory, Caerwent. A second branch was laid from Caldicot, this time to the north east. The private siding agreements are first made in the name of the builders McAlpine, then the United States Army Air Forces from 1943, and only transferred to the Ministry of Defence as the Royal Navy in 1944. To support the increased traffic, a second crossover was constructed, together with a loop siding on the Down line. Although production at the propellant factory
https://en.wikipedia.org/wiki/Sportsman%20Channel
Sportsman Channel is an American sports-oriented digital cable and satellite television network owned by the Outdoor Sportsman Group subsidiary of Kroenke Sports & Entertainment. The channel is dedicated to programming about outdoor sports, including hunting, shooting and fishing. As of February 2015, Sportsman Channel is available to approximately 34.1 million pay television households (29.3% of households with at least one television set) in the United States. History The channel was launched on April 1, 2003, and was founded by Muskego, Wisconsin businessmen C. Michael Cooley and Todd D. Hansen. In June 2007, the channel was purchased by the InterMedia Outdoor Holdings group, a division of private equity group InterMedia Partners. In March 2009, Sportsman Channel appointed InterMedia Outdoor Executive Vice President Willy Burkhardt as the channel's president. Then, in 2014, Sportsman Channel & its parent company, InterMedia Outdoor Holdings, were acquired by Kroenke Sports & Entertainment, resulting in the company's rename to Outdoor Sportsman Group. Programming Programming on Sportsman Channel includes various shows pertaining to hunting (both by archery and through firearms), fishing and firearms. An hour-long condensed version of Cam & Co., a news magazine/talk radio program produced by the National Rifle Association of America for SiriusXM Patriot, airs each weeknight. Most other shows on the channel air in half-hour timeslots. Sportsman Channel also airs infomercials during the overnight hours. In September 2009, the channel announced it would carry up to 100 original programs on its schedule starting in the fourth quarter of 2009. In March 2014, the channel premiered Amazing America with Sarah Palin, an outdoor program hosted by the former Alaska governor and 2008 Republican vice presidential candidate; the program was renewed for a second season slated to air in early 2015. Sportsman Channel HD Sportsman Channel HD is a high definition simulcast feed of Sportsman Channel, that broadcasts in the 1080i resolution format. On January 19, 2010, the channel announced it would launch an HD simulcast feed the following week on January 25 of that year. In February 2010, Dish Network became the first provider to carry the channel's HD feed. The HD feed is now available on various providers including AT&T, Cablevision, and Comcast. Carriage DirecTV began carrying the channel on January 21, 2009. AT&T U-verse added it on April 8, 2009. Dish Network started carrying Sportsman Channel on February 10, 2010. On September 1, 2015, Verizon FiOS removed the channel from the lineup. Spectrum removed the channel from their lineup nationwide on October 30, 2017. Former broadcast television affiliates The Sportsman Channel was once available on some broadcast stations. However, when it reached a carriage agreement deal with DirecTV in January 2009, giving it national coverage, it became a cable and satellite only channel. See also Sportsman Chann
https://en.wikipedia.org/wiki/Mad%20TV%20%28season%206%29
The sixth season of Mad TV, an American sketch comedy series, originally aired in the United States on the Fox Network between September 23, 2000, and June 23, 2001. Summary Mad TV began its 6th season with several cast changes. Pat Kilbane and original cast member Phil LaMarr left the show at the end of the 5th season. Returning repertory players Alex Borstein, Mo Collins, Michael McDonald, Will Sasso, Aries Spears, Nicole Sullivan, and Debra Wilson were joined by Nelson Ascencio (a featured player from last season) and newcomer Christian Duguay. Andrew Daly, Dannah Feinglass, Jeff Richards, and Stephnie Weir were added as featured players. Cast members reprised many of their well-known characters and schticks. Alex Borstein and Will Sasso interviewed celebrities at red-carpet events, while Sasso performed celebrity impersonations of Robert De Niro and Fred Durst of Limp Bizkit. Mo Collins appeared as Doreen Larkin, Trina Moss, Lorraine Swanson, and Liz Whitman-Goldfarb. Debra Wilson and Aries Spears appeared frequently as Whitney Houston and Bobby Brown. The cast also added several new characters. Michael McDonald portrayed the Depressed Persian Tow Truck Man (later named Mofaz), an irritable American immigrant who uses pop culture references to illustrate his and his family's shortcomings. Stephnie Weir played Dot Goddard, a 7-year-old girl whose intelligence pales next to her twin sister, Karen (Alex Borstein), a child genius who has written several books, found cures for diseases and planned NASA expeditions. Michael McDonald and Mo Collins played Dot's parents, who treasure Karen but despise and often shun and abuse Dot. Stephnie Weir also unveiled the characters Mrs. Campbell, a curious old lady, and Dr. Kylie, an immature, party-loving doctor. Season 5 guests Seth Green and Susan Sarandon returned periodically during season 6. Christian Duguay impersonated Jay Leno, President George W. Bush, and NSYNC member Joey Fatone. Duguay also played hyperactive preteen Edward and Loopgarue of "Loopgarue & Hulahoop," with Mo Collins as Hulahoop. At the end of season six, another original cast member (Nicole Sullivan) left while Nelson Ascencio and Dannah Feinglass were fired. Jeff Richards famously left in the middle of season six and was hired as a cast member on Mad TVs rival show, Saturday Night Live (becoming one of only two cast members to do so) and stayed on SNL for two and a half years. This season also had five additional episodes created in the event that a Writers Guild of America strike would halt production. These episodes ended up being extra episodes for season seven. Opening montage The Mad TV logo appears and the theme song begins. Each member of the repertory cast, followed by the featured cast, is introduced alphabetically. The screen is divided into three live-action clips of each cast member performing recurring characters and celebrity impersonations during the introductions. When the last featured cast member is intr
https://en.wikipedia.org/wiki/Mad%20TV%20%28season%207%29
The seventh season of Mad TV, an American sketch comedy series, originally aired in the United States on the Fox Network between September 22, 2001, and May 18, 2002. Summary Debra Wilson became the only member left from the original 1995-1996 cast following Nicole Sullivan's departure at the end of season six. The previous season's feature players, Andrew Daly and Stephnie Weir were promoted to repertory players. New cast members hired this season include: Frank Caliendo, Kathryn Fiore, Jill-Michele Meleán, Taran Killam (the youngest Mad TV cast member at 19 years old, the only Mad TV cast member to get his start on a children's television show [Nickelodeon's The Amanda Show] and the second MADtv cast member after Jeff Richards to later be hired as a Saturday Night Live cast member), and Bobby Lee (the first, and only, East Asian-American cast member). Guest stars this season included David Carradine, Michelle Trachtenberg, Todd Bridges, Vivica A. Fox, Frankie Muniz, Amanda Bynes, *NSYNC members Lance Bass and Joey Fatone, wrestlers Triple H and Stone Cold Steve Austin, The Man Show hosts Adam Carolla and Jimmy Kimmel, and rappers DMX, Ja Rule, Insane Clown Posse, Master P., Method Man, Redman, and the RZA. Trachtenberg's appearance is notable, as her performance in a Buffy the Vampire Slayer parody sketch netted Tratchenberg a nomination for a Young Artist Award for Best Performance in a TV Comedy Series. This season is also the show's longest with 30 episodes, as the extra episodes from season six that were created in the event that a Writers Guild of America strike halted production ended up airing in season seven. One can tell these are season six episodes because of the appearances of former cast members, Nicole Sullivan, Christian Duguay, and Nelson Ascencio. This season is the last for Alex Borstein, Will Sasso, and Andrew Daly and the only season for Taran Killam Opening montage The Mad TV logo appears on the screen and the theme song, which is performed by the hip-hop group Heavy D & the Boyz, begins. A voice announces "It's Mad TV! Starring...," and then alphabetically introduces each repertory cast member, followed by the featured cast. The screen splits into several different live-action clips of cast members performing recurring characters. When the last cast member is introduced, the music stops and the title sequence ends with the phrase "You are now watching Mad TV." Cast Repertory cast members Alex Borstein (19/25 episodes) Frank Caliendo (15/25 episodes) Mo Collins (25/25 episodes) Andrew Daly (25/25 episodes) Michael McDonald (25/25 episodes) Will Sasso (25/25 episodes) Aries Spears (24/25 episodes) Stephnie Weir (25/25 episodes) Debra Wilson (25/25 episodes) Featured cast members Kathryn Fiore (16/25 episodes) Taran Killam (13/25 episodes) Bobby Lee (13/25 episodes) Jill-Michele Meleán (2/25 episodes) Writers Bryan Adams (eps. 1-25) Dick Blasucci (eps. 1-25) Alex Borstein (eps
https://en.wikipedia.org/wiki/Mad%20TV%20%28season%208%29
The eighth season of Mad TV, an American sketch comedy series, originally aired in the United States on the Fox Network between September 14, 2002, and May 17, 2003. Summary With fan-favorite cast members Alex Borstein, Will Sasso, and Andrew Daly gone, MADtv scrambled to find new talent to fill the void. Jill-Michele Meleán and Bobby Lee were upgraded to repertory status (though Meleán left in the middle of the season for undisclosed reasons). New faces in the cast for this season include: Ike Barinholtz, Simon Helberg (who only lasted a short time on this show, but is now more popular in his role on the sitcom The Big Bang Theory), Josh Meyers (younger brother of SNL cast member, Seth Meyers, making this the only time a Saturday Night Live cast member has had a family member be hired as a cast member on a competing sketch show), Christina Moore, Ron Pederson (who would become the show's second Canadian cast member after Will Sasso), and Paul Vogt (MADtv'''s only male homosexual cast member and the second cast member after season six's Nelson Ascencio to have an identical twin brother). With Sasso gone, Frank Caliendo became the latest cast member to play George W. Bush. Newcomer Ron Pederson played Dick Clark, Woody Allen, Saddam Hussein, and Entertainment Tonight anchor Mark Steines. Vogt replaced Will Sasso James Lipton and impersonated classic sitcom stars, such as Edward Asner (The Mary Tyler Moore Show), Jackie Gleason (The Honeymooners), and Charlotte Rae (Diff'rent Strokes and The Facts Of Life). Like their counterparts Jimmy Fallon and Horatio Sanz on Saturday Night Live, long-time pals Ike Barinholtz and Josh Meyers would frequently appear in sketches together and play off each other's chemistry. Separately, Barinholtz performed celebrity impersonations such as Joe Millionaire's Evan Marriott and Nick Nolte, while Meyers offered offbeat impersonations of Eminem, Matthew McConaughey, Owen Wilson, Johnny Depp as Captain Jack Sparrow, Anna Nicole Smith's son, Daniel, and some *NSYNC members. In her short time on the show, Jill-Michele Meleán was known for her Drew Barrymore impression and her recurring turn as one of the Glamazon Huntresses. Guests this season included: former In Living Color cast members Tommy Davidson and David Alan Grier; comic actor Fred Willard, That '70s Show cast members Mila Kunis, Danny Masterson, and Wilmer Valderrama; and former MADtv cast member, Nicole Sullivan. Opening montage The title sequence begins with the Mad TV logo appearing above the Los Angeles skyline. The theme song, performed by the hip-hop group Heavy D & the Boyz, begins and each repertory cast member is introduced alphabetically, followed by the featured cast. The screen dissolves into three live-action clips of an individual cast member. The three screens multiply until they occupy the entire screen. A shot of the cast member slightly moving appears on the screen with a caption of his/her name superimposed on it. When all cast members
https://en.wikipedia.org/wiki/Mad%20TV%20%28season%2010%29
The tenth season of Mad TV, an American sketch comedy series, originally aired in the United States on the Fox Network between September 18, 2004, and May 21, 2005. Summary With MADtv in its tenth year on FOX, the show continued to change with cast turnover. Mo Collins left while Josh Meyers was fired. The only new cast members this season were Crista Flanagan (who was promoted to repertory player in the next season) and Spencer Kayden (who became one in a long line of microscopically short-lived MADtv players who joined the cast in the middle of the season, barely appeared in sketches, and were immediately fired at its end). Despite the lack of new cast members, the show saw an abundance of featured players getting promoted to repertory status, as seen with the promotions of Daniele Gaither, Keegan-Michael Key, Nicole Parker, and Jordan Peele, all of whom became the show's most memorable cast members since the days of the original 1995-1996 cast. This season saw many departures by season's end. Aries Spears, who had been a cast member since season three, left the show after eight years, tying Debra Wilson's then-record for longest tenure as a MADtv cast member, which would later be surpassed by Michael McDonald's ten years. Ron Pederson and Paul Vogt would also say goodbye to the show. While Vogt quit so he could work on Broadway, Pederson was fired due to FOX cutting the show's cast budget. Notable celebrity guest stars this season include: John Heder, Alanis Morissette, Charla Faddoul, Mirna Hindoyan, Bill Maher, Ja Rule, former MADtv cast members Mo Collins, Nicole Sullivan, Debra Wilson, Artie Lange, and Will Sasso; Marilyn Manson, Nelly, Nicole Richie, Amber Tamblyn, Michael Cera, Tony Hale, Christopher Masterson and his brother, Danny; Flava Flav, and Jeff Probst. Opening montage The title sequence begins with the Mad TV logo appearing above the Los Angeles skyline. The theme song, which is performed by the hip-hop group Heavy D & the Boyz, begins and each repertory cast member is introduced alphabetically, followed by the featured cast. When all cast members and guests are introduced, the music stops and the title sequence ends with the phrase "You are now watching Mad TV." Cast Repertory cast members Ike Barinholtz (23/23 episodes) Frank Caliendo (13/23 episodes) Daniele Gaither (22/23 episodes) Keegan-Michael Key (22/23 episodes) Bobby Lee (21/23 episodes) Michael McDonald (22/23 episodes) Nicole Parker (23/23 episodes) Ron Pederson (22/23 episodes) Jordan Peele (15/23 episodes) Aries Spears (18/23 episodes) Paul Vogt (22/23 episodes) Stephnie Weir (23/23 episodes) Featured cast members Crista Flanagan (5/23 episodes) Spencer Kayden (4/23 episodes) Episodes Home releases Season 10 of Mad TV has not been released on DVD. However, several sketches culled from this season appear on a compilation DVD called Mad TV: The Best of Seasons 8, 9, and 10 (first released on October 25, 2005). As
https://en.wikipedia.org/wiki/List%20of%20PAN%20dating%20software
PAN dating software is computer software to encourage conversation with others on a similar wireless network. Bawadu BlackPeopleMeet Live Radar MobiLuck Nokia Sensor Proxy Dating See also Lovegety Toothing References Sexuality and computing PAN dating software
https://en.wikipedia.org/wiki/Wavefront%20Technologies
Wavefront Technologies was a computer graphics company that developed and sold animation software used in Hollywood motion pictures and other industries. It was founded in 1984, in Santa Barbara, California, by Bill Kovacs, Larry Barels, Mark Sylvester. They started the company to produce computer graphics for movies and television commercials, and to market their own software, as there were no off-the-shelf computer animation tools available at the time. In 1995, Wavefront Technologies was acquired by Silicon Graphics, and merged with Alias Research to form Alias|Wavefront. Products Wavefront developed their first product, Preview, during the first year of business. The company's production department helped tune the software by using it on commercial projects, creating opening graphics for television programs. One of the first customers to purchase Preview was Universal Studios, for the television program Knight Rider. Further early customers included NBC, Electronic Arts, and NASA. Some of Wavefront's early animation software was created by Bill Kovacs, Jim Keating, and John Grower, after they left Robert Abel and Associates. Roy A. Hall, and others after him, developed the company's flagship product, the Wavefront Advanced Visualizer. In 1988, Wavefront released the Personal Visualizer, a desktop workstation interface to their high-end rendering software. As with Wavefront's other software, it was developed for Silicon Graphics computers, but it was later ported to Sun, IBM, Hewlett-Packard, Tektronix, DEC and Sony systems. Wavefront purchased Silicon Graphics first production workstation after their offer to buy the prototype they were given a demo of was knocked back. In 1989, the company released the Data Visualizer, an early commercial tool for scientific visualization. In 1991, Wavefront introduced Composer, an image manipulation product. Composer became a standard for 2D and 3D compositing and special effects for feature films and television. In 1992, Wavefront released two new animation tools that worked with the Advanced Visualizer. Kinemation was a character animation system that used inverse kinematics for natural motion. Dynamation was a tool for interactively creating and modifying particle systems for realistic, natural motion. Dream Quest Images used Dynamation and Composer to create over 90 visual effects sequences for the film Crimson Tide. In 1994, the same year that rival Alias made a deal with Nintendo, Wavefront partnered with Atari to develop the GameWare game development software. GameWare was the exclusive graphics and animation development system for the Atari Jaguar. Electronic Arts' Richard Taylor, said that Wavefront's software was "so beautifully designed that even a non-technical person could learn it. Wavefront was a major reason that CG took a leap forward." Wavefront software was used in numerous major films, including Luxo Jr., The Great Mouse Detective, Akira, Technological Threat, All Dogs Go To
https://en.wikipedia.org/wiki/Documentary%20channel
A documentary channel is a specialty channel which focuses on broadcasting documentaries. Some documentary channels further specialize by dedicating their television programming to specific types of documentaries or documentaries in a specific area of knowledge. Documentary and The History Channel are examples of this. There is some overlap between news channels and documentary channels, but while a documentary channel may also broadcast programs about current affairs, it will, as a rule, air longer, more in-depth segments and not present up-to-the-minute news coverage. Also, many other TV channels regularly air documentaries, but unless a channel is significantly dedicated to documentary-type programming, it probably will not be considered a documentary channel. As of 2006, some of the most famous documentary channels are the Discovery Channel and the National Geographic Channel. See also List of documentary television channels
https://en.wikipedia.org/wiki/Ricardo%20Belmont
Ricardo Pablo Belmont Cassinelli (born 29 August 1945) is a Peruvian TV network owner and politician. He was the Mayor of Lima serving from 1990 to 1995 and as a Congressman for the Center Front, representing Lima between 2009 and 2011, replacing Alberto Andrade, who died in office. He was popularly known as "El Hermanón" (Big Brother) for his friendliness and also as "El Colora'o" (Ginger) because of his reddish hair. Career Ricardo Belmont is the son of Augusto Belmont Bar, who founded TV Bego Excelsior (Channel 11 in Peru) in 1967. TV Bego Excelsior also owned Excelsior FM radio (104.7 FM in Peru). The younger Belmont was an avid sportsman who enjoyed soccer and boxing, and was a patron of players in both sports. His sports passion would later influence him in his political speeches, using sporting terms such as "let's all kick into the same goal post", and, during his reelection bid, "Second half time is about to start, and it's works vs. words. Choose the tree (his electoral symbol) and we'll win the game." In his "serious" life, he dedicated himself to journalism, befriending several local and national politicians all the while aspiring to be his own man in the media business. In his spare time he also dedicated his life to worthy causes, the most prominent being the local Telethon (based on the American version by Jerry Lewis), dedicated to helping the disabled kids at the San Juan de Dios Clinic in Lima. In 1986 he took over Channel 11 and renamed it Red Bicolor de Comunicaciones (Bicolor Communications Network; the initials RBC allude to his personal name). Initially airing only from noon to midnight, Belmont mostly purchased American programming such as Bonanza, Get Smart, Bravestarr, and The Twilight Zone (the 1985 version). The few RBC-produced shows included "Desafio Familiar", which was a Peruvian version of Family Feud, "Habla el Pueblo", a Larry King-inspired talk show with Belmont himself as host, and "Mirando la Música", a music video program. In the late 1980s RBC started diversifying to break out of the niche market to compete with the Peruvian Big Two, America Television and Panamericana Television. RBC Radio 980 AM was mostly sports talk, while 91.9 FM was adult contemporary, in addition to Excelsior, which was mostly tropical and salsa. Political career Mayor of Lima In late-1989, he announced his candidacy for the Lima provincial mayoralty as an independent. His political party, OBRAS (Works) alluded to the need for public works in Lima and the overall lack of progress as mayor by Jorge del Castillo, who was seen more as a lackey of Peruvian President Alan García than as an effective mayor. Although he supported Mario Vargas Llosa's Presidential candidacy, he chose to oppose Vargas Llosa's party's chosen mayoral candidate, Juan Inchaustegui. Belmont's charisma developed as a TV host and his lack of political affiliation helped him earn the people's vote, and he began to start his public-works program, which included s
https://en.wikipedia.org/wiki/Expressive%20power%20%28computer%20science%29
In computer science, the expressive power (also called expressiveness or expressivity) of a language is the breadth of ideas that can be represented and communicated in that language. The more expressive a language is, the greater the variety and quantity of ideas it can be used to represent. For example, the Web Ontology Language expression language profile (OWL2 EL) lacks ideas (such as negation) that can be expressed in OWL2 RL (rule language). OWL2 EL may therefore be said to have less expressive power than OWL2 RL. These restrictions allow for more efficient (polynomial time) reasoning in OWL2 EL than in OWL2 RL. So OWL2 EL trades some expressive power for more efficient reasoning (processing of the knowledge representation language). Information description The term expressive power may be used with a range of meaning. It may mean a measure of the ideas expressible in that language: regardless of ease (theoretical expressivity) concisely and readily (practical expressivity) The first sense dominates in areas of mathematics and logic that deal with the formal description of languages and their meaning, such as formal language theory, mathematical logic and process algebra. In informal discussions, the term often refers to the second sense, or to both. This is often the case when discussing programming languages. Efforts have been made to formalize these informal uses of the term. The notion of expressive power is always relative to a particular kind of thing that the language in question can describe, and the term is normally used when comparing languages that describe the same kind of things, or at least comparable kinds of things. The design of languages and formalisms involves a trade-off between expressive power and analyzability. The more a formalism can express, the harder it becomes to understand what instances of the formalism say. Decision problems become harder to answer or completely undecidable. Examples In formal language theory Formal language theory mostly studies formalisms to describe sets of strings, such as context-free grammars and regular expressions. Each instance of a formalism, e.g. each grammar and each regular expression, describes a particular set of strings. In this context, the expressive power of a formalism is the set of sets of strings its instances describe, and comparing expressive power is a matter of comparing these sets. An important yardstick for describing the relative expressive power of formalisms in this area is the Chomsky hierarchy. It says, for instance, that regular expressions, nondeterministic finite automata and regular grammars have equal expressive power, while that of context-free grammars is greater; what this means is that the sets of sets of strings described by the first three formalisms are equal, and a proper subset of the set of sets of strings described by context-free grammars. In this area, the cost of expressive power is a central topic of study. It is known
https://en.wikipedia.org/wiki/Helio%20%28wireless%20carrier%29
Helio, Inc. (stylized as HΞLIO) is a former, mobile virtual network operator (MVNO) using Sprint's network that offered wireless voice, messaging and data products and services to customers in the continental United States beginning on May 2, 2006. Originally a 50/50 joint venture founded in January, 2005 between South Korean wireless operator SK Telecom and American Internet services provider EarthLink, early losses caused EarthLink to stop providing additional funding in fall of 2007. SK Telecom provided the required additional funding to sustain Helio, which was re-organized as Helio LLC, and by January 2008, SK Telecom had assumed an increased ownership stake and with it, operational control of the joint venture. Although SK Telecom publicly pledged to support Helio, SK Telecom entered into talks to sell the company to rival MVNO Virgin Mobile USA. Virgin Mobile USA closed the acquisition of Helio and its 170,000 subscribers on August 22, 2008. Virgin Mobile USA exited the postpaid wireless business and retired the Helio brand on May 25, 2010. The Helio brand was resurrected by Ubi Telecom in July 2015. Helio's new $29 per month rate plan offered unlimited talk, text and data but at capped data speeds of 128 bits per second. Since then, Helio has appeared to have gone out of business with its website being no longer accessible. History Foundation SK-EarthLink, Inc., the joint venture that would become Helio, Inc., was established on January 26, 2005. On October 26, 2005, EarthLink and SK Telecom announced that they had entered into an agreement to change the name of their joint venture from SK-EarthLink, Inc. to Helio, Inc. and provide a high-end wireless communications service targeting younger, bigger-spending customers. Helio provided service as a mobile virtual network operator, primarily via the Sprint Nextel CDMA network. The joint venture partners described their choice of the name "Helio" by referencing Copernicus' heliocentric view of the universe, saying that wireless communications is the center of the universe for Helio's target customers. Strategy SK Telecom hoped to grow its customer base in the United States due to stagnant growth in its saturated home market of South Korea. Helio management believed that Helio could avoid taking on the major US wireless carriers directly by targeting price-insensitive, technology-savvy consumers. EarthLink and SK Telecom agreed to provide an initial round of financing totaling $440 million, with each partner owning 50% of the joint venture. Service launch When Helio first began offering service via a soft launch in May 2006. Initially, most of the promotion was done by word of mouth and at promotional events held across the country. On July 13, 2006, Helio began running TV commercials with the slogan, "Don't Call Us a Phone Company; Don't Call it a Phone." Helio also began advertising on billboards, in the print media, specifically in magazines that serve the 18-32 demographic, and on
https://en.wikipedia.org/wiki/Carrier%20preselect
Carrier preselect is a term relating to the telecommunications industry. It is a method of routing calls for least-cost routing (LCR) without the need for programming of PBX telephone system. This is the process whereby a telephone subscriber whose telephone line is maintained by one company, usually a former monopoly provider (e.g. BT), can choose to have some of their calls automatically routed across a different telephone company's network (e.g. Talk Talk) without needing to enter a special code or special equipment. See also Local loop unbundling Wholesale line rental External links Ofcom - Carrier Pre-Selection and Wholesale Line Rental - Outbound Carrier Pre-Selection Services from GCI - Outbound Carrier Pre-Selection Services from Six Degrees Group Telephony Local loop Broadband Telecommunications economics Teletraffic Telephone exchanges
https://en.wikipedia.org/wiki/Syriatel
Syriatel () is a mobile network provider in Syria. It is one of the only two providers in Syria, the other being MTN Syria. In 2022 the Syrian telecommunications authority awarded the third telecom license to Wafa Telecom. It offers LTE with 150 Mb/s speeds, under the brand name Super Surf. History Syriatel was founded in January 2000, with its headquarters in Damascus, Syria. The Government licenses two private companies to supply mobile phone services, Syriatel and "94". Orascom provided the management. The license with the Government was a Build-own-transfer (BOT) contract for 15 years. In 2017 Syriatel introduced 4G speeds offering 150 Mb/s speeds, branded Super Surf. On 5 June 2020, a Syrian court ordered Syriatel be placed under judicial custody. Ownership When the company was founded in 2000, Syriatel was owned by the Egyptian telecommunications company Orascom (25%) and Rami Makhlouf (75%), cousin of Syrian president Bashar al-Assad. In 2003, Orascom sold its ownership in Syriatel. Company The company is owned by Rami Makhlouf, cousin of Syrian president Bashar al-Assad. The company had approximately 3,500 employees and 8 million customers as of 2016. It is headquartered on Sehnaya Road in Damascus. Technologies Syriatel operate a network of GSM 900 / 1800 & 3G 2100 & 4G 1800 cellular networks. Sanctions In 2011 the European Union imposed sanctions on Syriatel in order to intensify pressure on Syrian President Bashar al-Assad. References Telecommunications companies of Syria Internet service providers of Syria Companies established in 2000 2000 establishments in Syria Companies based in Damascus Syrian brands Companies of Syria Specially Designated Nationals and Blocked Persons List
https://en.wikipedia.org/wiki/Need%20to%20know
The term "need to know", when used by government and other organizations (particularly those related to the military or espionage), describes the restriction of data which is considered very sensitive. Under need-to-know restrictions, even if one has all the necessary official approvals (such as a security clearance) to access certain information, one would not be given access to such information, or read into a clandestine operation, unless one has a specific need to know; that is, access to the information must be necessary for one to conduct one's official duties. This term also includes anyone that the people with the knowledge deemed necessary to share it with. As with most security mechanisms, the aim is to make it difficult for unauthorized access to occur, without inconveniencing legitimate access. Need-to-know also aims to discourage "browsing" of sensitive material by limiting access to the smallest possible number of people. Examples The Battle of Normandy in 1944 is an example of a need-to-know restriction. Though thousands of military personnel were involved in planning the invasion, only a small number of them knew the entire scope of the operation; the rest were only informed of data needed to complete a small part of the plan. The same is true of the Trinity project, the first test of a nuclear weapon in 1945. Problems and criticism Like other security measures, need to know can be misused by persons who wish to refuse others access to information they hold in an attempt to increase their personal power, prevent unwelcome review of their work, prevent embarrassment resulting from actions or thoughts. Need to know can also be invoked to hide extra-legal activities. This may be considered a necessary use, or a detrimental abuse of such a policy when considered from different perspectives. Need to know can be detrimental to workers' efficiency. Even when done in good faith, one might not be fully aware of who actually needs to know the information, resulting in inefficiencies as some people may be inevitably withheld information that they require to perform their duty. The speed of computations with IBM mechanical calculators at Los Alamos dramatically increased after the calculators' operators were told what the numbers meant: In computer technology The discretionary access control mechanisms of some operating systems can be used to enforce need to know. In this case, the owner of a file determines whether another person should have access. Need to know is often concurrently applied with mandatory access control schemes, in which the lack of an official approval (such as a clearance) may absolutely prohibit a person from accessing the information. This is because need to know can be a subjective assessment. Mandatory access control schemes can also audit accesses, in order to determine if need to know has been violated. The term is also used in the concept of graphical user interface design where computers are controlling c
https://en.wikipedia.org/wiki/BBF
BBF may refer to: Back button focus, a photography technique Behavioral and Brain Functions, a scientific journal Belgian Badminton Federation Best bin first, a type of search algorithm Bobby Bowden Field, the football field at Florida State University in Tallahassee Boston By Foot, a non-profit tour organization British Baseball Federation Paris Hilton's British Best Friend, a reality television series Broadband Forum, a computer networking industry consortium
https://en.wikipedia.org/wiki/Bandwidth%20management
Bandwidth management is the process of measuring and controlling the communications (traffic, packets) on a network link, to avoid filling the link to capacity or overfilling the link, which would result in network congestion and poor performance of the network. Bandwidth is described by bit rate and measured in units of bits per second (bit/s) or bytes per second (B/s). Bandwidth management mechanisms and techniques Bandwidth management mechanisms may be used to further engineer performance and includes: Traffic shaping (rate limiting): Token bucket Leaky bucket TCP rate control - artificially adjusting TCP window size as well as controlling the rate of ACKs being returned to the sender Scheduling algorithms: Weighted fair queuing (WFQ) Class based weighted fair queuing Weighted round robin (WRR) Deficit weighted round robin (DWRR) Hierarchical Fair Service Curve (HFSC) Congestion avoidance: RED, WRED - Lessens the possibility of port queue buffer tail-drops and this lowers the likelihood of TCP global synchronization Policing (marking/dropping the packet in excess of the committed traffic rate and burst size) Explicit congestion notification Buffer tuning - allows you to modify the way a router allocates buffers from its available memory, and helps prevent packet drops during a temporary burst of traffic. Bandwidth reservation protocols / algorithms Resource reservation protocol (RSVP) - is the means by which applications communicate their requirements to the network in an efficient and robust manner. Constraint-based Routing Label Distribution Protocol (CR-LDP) Top-nodes algorithm Traffic classification - categorising traffic according to some policy in order that the above techniques can be applied to each class of traffic differently Link performance Issues which may limit the performance of a given link include: TCP determines the capacity of a connection by flooding it until packets start being dropped (slow start) Queueing in routers results in higher latency and jitter as the network approaches (and occasionally exceeds) capacity TCP global synchronization when the network reaches capacity results in waste of bandwidth Burstiness of web traffic requires spare bandwidth to rapidly accommodate the bursty traffic Lack of widespread support for explicit congestion notification and quality of service management on the Internet Internet Service Providers typically retain control over queue management and quality of service at their end of the link Window Shaping allows higher end products to reduce traffic flows, which reduce queue depth and allow more users to share more bandwidth fairly Tools and techniques Packet sniffer is a program or a device that eavesdrops on the network traffic by grabbing information traveling over a network Network traffic measurement See also Bandwidth cap Bandwidth management is a subset of network management and performance management Bandwidth management us
https://en.wikipedia.org/wiki/INASP
INASP (International Network for Advancing Science and Policy) is an international development charity working with a global network of partners to improve access, production and use of research information and knowledge, so that countries are equipped to solve their development challenges. Based in Oxford and governed by an international Board of Trustees, INASP is run with a small number of full-time staff working with, and through, partners and networks in over one hundred countries. INASP's work is funded by its partner countries, governmental and non-governmental development agencies, and philanthropic foundations. History INASP original name, now superseded, was "International Network for the Availability of Scientific Publications". It was established by the International Council for Science (ICSU) in 1992 to "improve access to information and knowledge through a commitment to capacity building in emerging and developing countries." It was registered as a charity in 2004. Work INASP is an international development charity working with a global network of partners to improve access, production and use of research information and knowledge, so that countries are equipped to solve their development challenges INASP has over 30 years of experience of working across research and knowledge systems in Africa, Latin America, and Asia. INASP believes that locally generated knowledge and solutions are key to solving local and global challenges. Their vision is of research and knowledge at the heart of development – where decisions are informed by relevant and rigorous evidence, and where knowledge is created with the communities it is intended to serve. Many voices, institutions, and types of knowledge are required.   INASP works in partnership with people and organisations who produce, communicate, and use knowledge to strengthen key capacities and confidence. Their work aims to support individuals with fewer opportunities, to reach beyond apex institutions, and to connect researchers and students with knowledge users. They strive to work in an integrated way – supporting individuals and organisations, facilitating connections between them to affect system-level change, and thinking hard about sustainability from the design stages of any project.   INASP’s values are: in it together; making change last; every voice counts; and, doing things right.   All of INASP’s work is based on the following pillars: capacity development, learning and adapting, and equitable partnership. INASP works on 4 Themes: Digital Platforms and Digital Learning: INASP believes that digital tools, used well, can open up access to learning, connect learning to their peers, and bridge gaps in campus-based support. AuthorAID is an award-winning community-led platform that brings researchers together to learn and share knowledge. Supporting Southern Research and Higher Education Institutions: INASP has worked in partnership with Southern universities and resea
https://en.wikipedia.org/wiki/Barbie%20and%20the%20Magic%20of%20Pegasus
Barbie and the Magic of Pegasus is a 2005 computer-animated adventure film directed by Greg Richardson and produced by Mattel Entertainment with Mainframe Entertainment. It first premiered on Nickelodeon on September 18, 2005, and it was released later to DVD on September 20, 2005. The sixth entry in the Barbie film series, it is the second to feature an original story not based on previous material and the only film to be released in 3D. It follows the story of Princess Annika, who has to save her parents after an evil wizard named Wenlock turns them to stone. Kelly Sheridan reprised her role for Barbie's character and Brie Larson recorded a song titled "Hope Has Wings" for the film. Official description "Barbie takes flight in her first original princess fairy tale movie, Barbie and the Magic of Pegasus. Princess Annika discovers adventure when she is befriended by Brietta – a magnificent, winged horse – that flies her to the beautiful Cloud Kingdom. Annika has only three days to break the spell of Wenlock, an evil wizard who has turned her family to stone. On her quest to defeat Wenlock, Annika meets new friends and together they travel to forbidden forests, skate through icy caverns and fly above the clouds as they attempt to build a magical wand of light." Plot On her birthday, Princess Annika worries her parents by going outside to ice skate without permission and bringing home a "possibly dangerous" polar bear cub named Shiver. As a result, the overprotective King and Queen forbid her from going skating ever again. Annoyed, Annika sneaks out to join a skating festival in the village that night. A powerful sorcerer named Wenlock appears and orders the princess to marry him. The King and Queen arrive and confront Wenlock, but he laughs and cryptically reminds the king and queen of the fate of their "other daughter". When Annika refuses his proposal, Wenlock petrifies the entire village population, including Annika's parents. Annika is rescued by a winged horse named Brietta, but Wenlock warns her she has three days to marry him; otherwise, the spell will become permanent. Brietta takes Annika to the Cloud Kingdom, ruled by Queen Rayla. Annika discovers that her parents' "other daughter" is, in fact, Brietta, who was transformed into a pegasus by Wenlock when she refused to marry him. This explains why their parents were so protective of Annika once she was born. The Cloud Queen tells Annika that the only thing that can defeat Wenlock is a "Wand of Light"; built from a measure of courage, a ring of love, and a gem of ice lit by hope's eternal flame. Despite Brietta's reluctance due to past failed attempts, Annika assures her that they can build the wand together. Annika, Brietta, and Shiver travel to the Forbidden Forest, where they meet Aidan, a blacksmith. When Shiver and Annika fall into a giant's stew pot, Annika uses her hair ribbon to help them escape. The ribbon, Annika's exact height, is the "measure of courage", and turns int
https://en.wikipedia.org/wiki/Barbie%20as%20the%20Princess%20and%20the%20Pauper
Barbie as the Princess and the Pauper is a 2004 computer-animated musical fantasy film. It was released to video on September 28, 2004, and made its television premiere on Nickelodeon on November 14, 2004. This film is the first musical in the Barbie series. It was directed by William Lau and stars the voice of Kelly Sheridan as the Barbie protagonists, Anneliese and Erika. The plot is loosely inspired by the 1881 Mark Twain novel The Prince and the Pauper, and it is the first Barbie film that completely excludes fantasy elements, which were a usual part of Barbie franchise. Songs for the film were written by Amy Powers, Megan Cavallari and Rob Hudnut, who also executive produced the film. The film was nominated for six DVD Exclusive Awards. Plot In a kingdom, a blonde princess and a brunette pauper are born at the same time. Several years later, the blonde princess, Anneliese, is arranged to marry the wealthy King Dominick by her mother, Queen Genevieve, to save the nearly bankrupt royal treasury; however, Anneliese is secretly in love with her young tutor, Julian. The brunette pauper, Erika, is an indentured servant, working off her parents' debt at Madame Carp's Dress Emporium, which supplies the palace with clothes; however, she dreams of becoming a singer and seeing the world. Unbeknownst to Queen Genevieve, the reason behind the treasury's bankruptcy is that her adviser, Preminger, has been stealing gold and emptying the royal mines. Upon learning from his henchmen, Nick and Nack, about Anneliese's upcoming marriage to King Dominick, he decides to make Anneliese "mysteriously disappear." Preminger plans to pretend that he has found her, earning a betrothal to the princess, which would allow him to become king. Julian takes Anneliese for a day out into the kingdom so that she can be free for once; there, Anneliese witnesses the poverty caused by the bankruptcy. Anneliese hears Erika performing in the street to earn money but Madame Carp takes the earnings. Anneliese and Erika bond and learn that they are identical, apart from their hair color and the crown-shaped birthmark on Anneliese's shoulder. That night, Anneliese and her cat Serafina are abducted by Nick and Nack, who leave a forged letter saying she ran away, with her "claiming" that it was so that she would not have to marry King Dominick. Julian, doubting the letter, asks Erika to impersonate the Princess, saving the engagement while he investigates. Preminger is surprised when Erika, disguised as Anneliese, presents herself at the palace. Over time, Erika and King Dominick fall in love, but Erika worries about what will happen if she is found out. The real Anneliese escapes but the guards, having seen Erika, mistake Anneliese for an imposter. Mistaking Anneliese for Erika, Madame Carp forces Anneliese into her shop and locks her inside. Julian overhears Preminger's plans but is discovered and captured. Anneliese has Serafina take her ring and a tag from the dress shop so
https://en.wikipedia.org/wiki/Barbie%3A%20Fairytopia
Barbie: Fairytopia is a 2005 computer-animated fantasy film directed by Walter P. Martishius and William Lau and written by Elise Allen and Diane Duane. The film premiered on Nickelodeon on March 6, 2005, and was released on VHS and DVD two days later. It was distributed internationally through Universal Pictures Video and Entertainment Rights. The fifth installment in the Barbie film series and the first to have an original storyline not based on existing material, the film follows Elina, a wingless flower fairy who goes on a journey to save the enchanted land of Fairytopia from the evil fairy Laverna. The film is followed by two sequels; Barbie: Mermaidia and Barbie Fairytopia: Magic of the Rainbow and two spin-offs; Barbie: Mariposa and Barbie: Mariposa & the Fairy Princess. Plot In the film, Barbie plays the role of Elina – a flower fairy who lives in the realm of Fairytopia with her puffball, Bibble. Unlike all other fairies, Elina does not have wings, which she is often ridiculed for. Elina and her friend Dandelion learn that one of Fairytopia's guardians, Topaz, has supposedly been kidnapped. Elina returns to her flower home, Peony, in disbelief. In truth, Topaz really has been kidnapped by Laverna, the evil twin sister of Fairytopia's benevolent ruler, the Enchantress. Laverna reveals that she incapacitated her sister with poison and plans to capture all seven of Fairytopia’s guardians. Meanwhile, Laverna’s minions will spread her mist-like formula all over Fairytopia, which will weaken all winged creatures. With no other options, the denizens of Fairytopia will turn to Laverna for a cure and crown her queen as a result. In the morning, Elina and Bibble awaken to see that Peony as well as all the other fairy homes in the meadow are sick from Laverna's formula. Elina, Dandelion, and Bibble decide to seek help from the closest guardian, Azura. Upon entering a forest, Dandelion breathes some of Laverna's formula and is forced to return home when she becomes unable to fly. After being turned away when they ask to see Azura, Elina and Bibble sneak to Azura's house, where she is discovered by Azura herself. Seeing a rainbow in Elina's eye, Azura invites them inside. She explains that the rainbow in Elina's eyes means she's destined for great things, which Elina, who does not believe in herself, disagrees with. Azura tells her that all of Fairytopia is in trouble because of Laverna and in the morning she will leave to speak to a dryad named Dahlia, a former follower of Laverna; she then asks Elina to take care of her magic necklace. In the morning, as Azura is about to leave, she is kidnapped by a Fungus, one of Laverna's henchmen. Elina wakes up and is accused of being responsible for Azura's disappearance, but is rescued by Hue, a giant butterfly. In Laverna's lair, the Fungi arrive with Azura, but Laverna is angered when she finds her necklace missing. The Fungi tell Laverna that a wingless fairy had it. Realizing a wingless fairy would
https://en.wikipedia.org/wiki/Barbie%20as%20Rapunzel
Barbie as Rapunzel is a 2002 computer-animated fairy tale film co-produced by Mainframe Entertainment and Mattel Entertainment, and distributed by Artisan Home Entertainment. An adaptation of the 1812 German fairy tale "Rapunzel" by the Brothers Grimm, it is the second in the Barbie film series, with Kelly Sheridan providing the voice of Barbie. Barbie as Rapunzel was released on VHS and DVD on October 1, 2002, later making a television premiere on Nickelodeon on November 24, 2002. and was subsequently released overseas through Entertainment Rights and Universal Pictures Video. The film was nominated for eight DVD Premiere Awards, winning Best Original Score and Best Animated Character Performance for Gothel. Plot The story is told by Barbie to her little sister, Kelly, who is insecure in her painting abilities. Rapunzel is a young woman with long, floor-length hair who lives as a servant to the wicked witch Gothel. Gothel claims she saved Rapunzel from abandonment as a baby, and resents Rapunzel's hobby of painting pictures of places she'd like to go someday. Gothel's manor is magically isolated from the rest of the world, so Rapunzel's only friends are Penelope, a young dragon, and Hobie, an anxious rabbit. One day, Rapunzel and her friends inadvertently open a secret passage, where Rapunzel finds a silver hairbrush engraved with a message from her parents, affirming their love. This leads Rapunzel to question Gothel's story. They also find a mutilated portrait of a man. Following the secret passage, Rapunzel is led to the kingdom outside. She saves young Princess Katrina from a pit trap with the help of Katrina's elder brother Prince Stefan. He explains the trap was set by King Wilhelm of the neighboring country, who has an ongoing feud with Stefan's father King Frederick. Rapunzel leaves in a rush without learning Stefan's name to avoid Gothel discovering her disappearance. However, Gothel's pet ferret Otto, who spies on Rapunzel for his mistress, tells Gothel all that happened. When Rapunzel insists she doesn't know Stefan's name, Gothel destroys Rapuzel's art and supplies, and transforms her room into a high tower. Gothel also threatens to punish Penelope's father Hugo if he does not keep Rapunzel prisoner. That night, as Rapunzel sleeps, the hairbrush magically transforms into a paintbrush. When Rapunzel attempts to use the paintbrush on the tower wall, a portal to the kingdom magically appears. Rapunzel uses it to meet Stefan again, though she insists he never tell her his name for fear of Gothel. Stefan gives her an invitation to the masquerade ball that night. Returning through the portal to the tower, Rapunzel paints herself a beautiful costume, but is again betrayed by Otto. Gothel cuts off Rapunzel's hair, shatters the paintbrush, and destroys the tower side of the portal. When Rapunzel once again cannot give Stefan's name, Gothel puts a spell on the tower to never release its lying prisoner, and chains Hugo, intending to c
https://en.wikipedia.org/wiki/Barbie%20of%20Swan%20Lake
Barbie of Swan Lake is a 2003 computer-animated fantasy film co-produced by Mainframe Entertainment and Mattel Entertainment, and distributed by Artisan Home Entertainment. Based on the Tchaikovsky ballet Swan Lake, it is the third in the Barbie film series, with Kelly Sheridan providing the voice of Barbie. Barbie of Swan Lake was released on VHS and DVD on September 30, 2003 by Artisan, later making a television premiere on Nickelodeon on November 16, 2003. and was subsequently released overseas through Entertainment Rights and Universal Pictures Video. Plot The story is being told by Barbie to her little sister, Kelly, who is feeling uneasy about being at overnight camp for the first time. Odette is a young woman who lives in a small village with her father and sister, and works in the family bakery. She is a talented dancer but is shy and timid about it. Meanwhile, Prince Daniel is informed by his mother that it is time for him to marry and she is hosting a ball for him to choose a wife. The men of the village go after a unicorn named Lila. She is followed by a curious Odette into an Enchanted Forest. Lila becomes caught in a bush, so Odette looks for something to free her. She spots a crystal lodged in a rock which she easily removes as the other denizens of the forest watch in astonishment. The Fairy Queen tells Odette that by freeing the magic crystal, she is destined to defeat the sorcerer Rothbart. Rothbart, her cousin, was angered when she was chosen to become the next ruler of the Forest. Rothbart left and returned years later with his daughter Odile; and has since taken over most of the forest, turning the fairies and elves into animals. Odette, afraid to get involved, declines to help but is confronted by Rothbart, who gives her the same curse as the others, turning her into a swan. The Queen gifts Odette with a tiara embedded with the crystal that protects her from Rothbart's magic. As her powers are too weak, the Queen only partially reverses the spell, allowing Odette to regain human form by night but turn back into a swan by day. Odette and Lila go meet Erasmus, a troll who takes care of a massive library, in order to find the Book of Forest Lore, which can tell them how to break the spell; however, they are unsuccessful. Daniel, who is out hunting, is lured into the forest by Rothbart, determined to get him to hunt and kill Odette. However, just as he's about to shoot her down, Daniel is captivated by the swan's beauty and decides to let her live. Odette then transforms in front of him and protects him from Rothbart. The two of them spend the night together and fall in love. Daniel invites Odette to the ball the next night. Erasmus finds the book and reveals that the key to defeating Rothbart is true love. However, if Daniel falls for another girl, the magic crystal will lose its power and Odette will die. Rothbart abducts Erasmus and the book. While Odette rescues Erasmus, Rothbart attends the ball with Odile, magically
https://en.wikipedia.org/wiki/Barbie%20in%20the%20Nutcracker
Barbie in the Nutcracker is a 2001 computer-animated fantasy film co-produced by Mainframe Entertainment and Mattel Entertainment, and distributed by Artisan Home Entertainment. Loosely adapted from E. T. A. Hoffmann's 1816 short story, "The Nutcracker and the Mouse King", and featuring music based from Tchaikovsky's 1892 ballet, The Nutcracker, it marked the character's first film since the 1987 television specials; Barbie and the Rockers: Out of This World and Barbie and the Sensations: Rockin' Back to Earth, with Kelly Sheridan providing the voice of Barbie. and was also the first Barbie movie to be computer-animated. Barbie in the Nutcracker premiered on VHS on October 2, 2001 by Artisan, followed up with a DVD release a few weeks later on October 23. before being subsequently released overseas through Entertainment Rights and Universal Pictures Video. The film sold more than 3.4million units on DVD by 2002, and grossed in total sales. It won the Video Premiere Award for Best Animated Video Premiere Movie. Plot The story is told by Barbie to her little sister, Kelly, who is having trouble rehearsing a ballet solo and fears going onstage. A girl named Clara lives with Drosselmeyer, her stern grandfather, and Tommy, her little brother. On the night of Christmas Eve, they receive a surprise visit from their aunt, Elizabeth. Clara receives a Nutcracker from Elizabeth, who claims it contains the heart of a prince. Clara falls asleep by the Christmas tree and awakens to see her Nutcracker suddenly alive and fighting an army of mice led by the wicked Mouse King. The Mouse King shrinks her down to his size, though he is unable to defeat them and temporarily retreats. The Nutcracker explains that he needs to find the Sugarplum Princess, the only person who can defeat the Mouse King's magic. The wise owl of the grandfather clock reveals that the Sugarplum Princess is also the only one who can make Clara her original size again. The owl gives Clara a locket from an ornament figurine that will send her back home when she opens it. Through a portal in a mouse hole, The Nutcracker and Clara land in an ice cave. They escape with the help of a group of snow fairies and enter the Nutcracker's home of Parthenia. The two journey to a gingerbread village, where they meet two children and the horse Marzipan. The children tell them that the rightful heir to the throne, Prince Eric, has gone missing. The group narrowly escapes the Mouse King's army when they are saved by Major Mint and Captain Candy, who lead a small group of villagers in hiding. Mint reveals that Prince Eric's careless attitude led the former king to pronounce the Mouse as temporary ruler until Eric accepted his responsibilities. Clara realizes that the Nutcracker is the missing Prince Eric; when the Mouse decided he wanted to be king permanently, he turned Eric into a Nutcracker. Eric hopes to redeem himself and make things right again. Clara and the Nutcracker, joined by Mint and Candy,
https://en.wikipedia.org/wiki/SIDPERS
Standard Installation and Division Personnel Reporting System (SIDPERS) was the main database or, rather, databases for personnel accounting by the United States Army. The Active Army, US Army Reserve, and Army National Guard each had separate, largely incompatible databases, each bearing the name SIDPERS or a variation thereof. RC-SIDPERS was nominally designed for both reserve components (Army Reserve and Army National Guard), but was further adapted for use by the National Guard, to create NG-SIDPERS. Until 1988, RC-SIDPERS was not accessible at the unit level, and unit administrators would mail database correction documents up their chain of command to their respective general officer command in order to update and/or correct SIDPERS. A separate, unconnected database, Unit Level Application System (ULAS, pronounced "you-lass") was available for unit administrators to maintain local personnel information. A PC-based application, built in PC-FOCUS, was fielded for beta testing in late 1988 within the 63rd Army Reserve Command and was expanded USAR-wide the following year. A bridge connected each unit's PC-SIDPERS database with its respective Center Level Application System (CLAS, pronounced "class") database. CLAS, also built in PC-FOCUS, was the successor to ULAS, and offered extensive additional data categories beyond that centrally maintained by RC-SIDPERS, including training data, weapon serial number assignment, protective mask tag number assignment, OER/NCOER rating chain, inter alia. Platform SIDPERS had two basic platform flavors in the mid 1980s and through most of the 1990s. The first was a standalone TACCS (Tactical Army Combat Computer System) and the second was a sort of mainframe/dumb terminal flavor. Generally, TDA units received the "dumb terminal" version, since they did not generally deploy) and TO&E units received the deployable "TACCS boxes" as they were referred to. As late as 1993, the Army commands at some TDA locations were still using punch cards to run their daily reports. Installation MILPO's held local commands to a strict code of accuracy. Both MILPO and unit level SIDPERS clerks had to maintain accuracy percentages. Most installations required 95 percent Transaction accuracy percentages. With the advent of SIPERS-3, the Army moved to using SCO UNIX servers in place of both TACCS and mainframes. The underlying database was INFORMIX. The SIDPERS-3 project was hailed as both a success and a failure. Primary reasons for rating the software poorly were related to the software's inability to improve accurate or processing speed. Primary reasons for citing the success of the software were related to the way the software developed, remaining mute on the subject of the ability of the software to successfully solve the problems it was intended to solve. SIDPERS-3 was worked on from 1982 until 1994. At its end, SIDPERS' platform was a Microsoft SQL Server database. Interfacing applications Other applications that
https://en.wikipedia.org/wiki/Romanisation%20of%20Malayalam
There are several romanisation schemes for the Malayalam script, including ITRANS and ISO 15919. ASCII schemes Typesetting Malayalam on computers became an issue with their spread in the late 20th century. The lack of diacritics on keyboards led to the adoption of ASCII only romanisation schemes. ASCII only schemes remain popular in email correspondence and input methods because of their ease of entry. These schemes are also called Manglish. The disadvantage of ASCII schemes is that letter case is meaningful, so that transliterated names may not be capitalised. Mozhi The Mozhi system of transliteration is an unofficial system used to transliterate Malayalam, it can also be used for Tamil. This system does not need the use of diacritics. Even though it has more elaborate scheme, Mozhi is as follows: aa i ii u uu R RR e E ai o O au Ll Lll am aH k kh g gh ng ch chh j jh nj T Th D Dh N th thh d dh n p ph b bh m y r l v S sh s h L zh rr t ITRANS ITRANS is an ASCII scheme which does not use diacritics for transliteration to Latin script. National Library at Kolkata romanisation The "National Library at Kolkata romanisation" is one of the most widely used transliteration schemes in dictionaries and grammars of Indo-Aryan languages and Dravidian languages including Malayalam. This transliteration scheme is also known as '(American) Library of Congress' scheme and is nearly identical to one of the possible ISO 15919 variants. The scheme is an extension of the IAST scheme that is used for transliteration of Sanskrit. ISO 15919 ISO 15919 "Transliteration of Devanagari and related Indic scripts into Latin characters" is one of a series of international standards for romanisation. It was published in 2001 and uses diacritics to map the much larger set of consonants and vowels in Brahmic scripts to the Latin script. References Malayalam script Romanization
https://en.wikipedia.org/wiki/Network%20traffic%20control
In computer networking, network traffic control is the process of managing, controlling or reducing the network traffic, particularly Internet bandwidth, e.g. by the network scheduler. It is used by network administrators, to reduce congestion, latency and packet loss. This is part of bandwidth management. In order to use these tools effectively, it is necessary to measure the network traffic to determine the causes of network congestion and attack those problems specifically. Network traffic control is an important subject in datacenters as it is necessary for efficient use of datacenter network bandwidth and for maintaining service level agreements. Traffic shaping Traffic shaping is the retiming (delaying) of packets (or frames) until they meet specified bandwidth and or burstiness limits. Since such delays involve queues that are nearly always finite and, once full, excess traffic is nearly always dropped (discarded), traffic shaping nearly always implies traffic policing as well. Traffic policing Traffic policing is the dropping (discarding) or reduction in priority (demoting) of packets (or frames) that exceed some specified bandwidth and or burstiness limit. References Network performance
https://en.wikipedia.org/wiki/Emotive
Emotive may refer to: Emotive (sociology), a sociological term eMOTIVe, a 2004 rock album by A Perfect Circle Emotiv, a company which develops mind-computer interfaces
https://en.wikipedia.org/wiki/JUCE%20TV
JUCE TV is a defunct youth-oriented Christian television network and is a current YouTube channel owned and operated by the Trinity Broadcasting Network. The channel is aimed at teenagers and young adults between the ages of 13 and 30 years, and features a format similar to MTV and MTVU, airing Christian music videos, and original content such as Christian-themed entertainment and lifestyle programming, along with some church services. JUCE TV was carried over-the-air on digital subchannels of TBN owned-and-operated and affiliated stations nationwide, usually on the third subchannel. JUCE TV was also available on pay television providers as well as on select digital streaming platforms that offered TBN's six U.S. networks. History As a youth-oriented Christian network The network, originally named JCTV—launched at 5:00 p.m. Pacific Time on February 18, 2002. The network was founded by Paul Crouch Sr., founder of the Trinity Broadcasting Network (TBN), who intended to develop a service targeted at Christian youth worldwide. (The service would eventually reach most of North America, Europe, Asia and South America through its broadcast service as well as TBN's streaming platforms.) The network incorporated original programming (including adventure sports and faith-based reality series), traditional pastoral programs aimed at the network's target audience, and specials. The network was rebranded as JUCE TV on January 1, 2014. On June 1, 2015, JUCE TV was combined into a single subchannel with sister network Smile of a Child TV (which targets a younger audience, children between the ages of 2 and 12). Under this arrangement, the latter network began occupying nine hours of programming daily (from 6:00 a.m. to 3:00 p.m. local time) over the third digital subchannel occupied by JUCE on the 38 stations TBN either owns directly or through its Community Educational Television subsidiary. One week later on June 8, TBN modified the timeshare arrangement, giving Smile of a Child and JUCE each a daily 12-hour window on the .3 subchannel, with JUCE now airing over the space from 7:00 p.m. to 7:00 a.m. in each time zone and Smile of a Child airing for the remainder of the day. The change – which is the result of technical limitations with its stations' existing digital compression equipment – was a byproduct of the launch of TBN Salsa, a digital subchannel network targeting English-speaking Latinos which launched on that date. JUCE TV continues to maintain a 24-hour-day schedule, however, with all programming not shown over-the-air during Smile's programming hours over the subchannel space remaining available via live stream online through TBN's website and various mobile and digital media players. On January 1, 2020, TBN resumed offering a 24-hour feed of JUCE over the DT5 subchannel of its owned-and-operated stations, replacing a temporary standard definition feed of TBN carried on the subchannel after TBN Salsa migrated exclusively to being a cable-excl
https://en.wikipedia.org/wiki/TPEG
The Transport Protocol Experts Group (TPEG) is a data protocol suite for traffic and travel related information. TPEG can be carried over different transmission media (bearers), such as digital broadcast or cellular networks (wireless Internet). TPEG applications include, among others, information on road conditions, weather, fuel prices, parking or delays of public transport. Overview TPEG is a set of data protocols for carrying traffic & travel related information, comprising a range of different applications as well as basic building blocks to manage the transmission of the applications themselves, such as the handling of different messages belonging to a given application, grouping applications into data frames, or the updating and cancellation of messages. TPEG can be carried over different transmission media (bearers), such as digital broadcast or cellular networks (wireless Internet). TPEG applications include, among others, information on road conditions, weather, fuel prices, parking or delays of public transport. History The Transport Protocol Experts Group was started in 1997 by the European Broadcasting Union (EBU). Work carried on under the auspices of the EBU until 2007, when the group merged with another group working on the Traffic Message Channel (TMC) protocol, hosted by ERTICO - ITS Europe and with the Mobile.Info project, where first prototypes of TPEG technology was tested under realistic driving conditions in various in-car navigation systems by a number of car manufacturers and their suppliers. Today, development work is carried out by the Traveller Information Services Association (TISA), who now also looks after the Alert-C standards used for implementing RDS-TMC services. In the early days of the Transport Protocol Experts Group, the plan was to develop applications that could extend traffic information services far beyond existing technologies, such as RDS-TMC or proprietary protocols. Further, TPEG should include multi-modal traveller information services, facilitating roaming of travellers between different modes of transportation, e.g. between individual transportation (using a car) and public transportation (bus, subway, trains, ...). It all started with a Road Traffic Message (RTM) application, which was soon complemented by a Public Transport Information (PTI) application, which both shared a common native TPEG Location Referencing method. TPEG RTM was intended as the "one size fits all" application. However, early implementations soon showed that the RTM structure was too broad to be used in navigation systems as a replacement for TMC. This first generation TPEG applications (TPEG generation 1, or TPEG1) also provided only a binary encoding, having in some cases a separate specification for the mapping to an XML encoding. Consequently, a revision of both the general information modelling style and the design approach was done, moving TPEG towards more clearly defined and separated applications for specific u
https://en.wikipedia.org/wiki/Network%20traffic%20measurement
In computer networks, network traffic measurement is the process of measuring the amount and type of traffic on a particular network. This is especially important with regard to effective bandwidth management. Techniques Network performance could be measured using either active or passive techniques. Active techniques (e.g. Iperf) are more intrusive but are arguably more accurate. Passive techniques have less network overhead and hence can run in the background to be used to trigger network management actions. Measurement studies A range of studies have been performed from various points on the Internet. The AMS-IX (Amsterdam Internet Exchange) is one of the world's largest Internet exchanges. It produces a constant supply of simple Internet statistics. There are also numerous academic studies that have produced a range of measurement studies on frame size distributions, TCP/UDP ratios and TCP/IP options. Tools Various software tools are available to measure network traffic. Some tools measure traffic by sniffing and others use SNMP, WMI or other local agents to measure bandwidth use on individual machines and routers. However, the latter generally do not detect the type of traffic, nor do they work for machines which are not running the necessary agent software, such as rogue machines on the network, or machines for which no compatible agent is available. In the latter case, inline appliances are preferred. These would generally 'sit' between the LAN and the LAN's exit point, generally the WAN or Internet router, and all packets leaving and entering the network would go through them. In most cases the appliance would operate as a bridge on the network so that it is undetectable by users. Some tools used for SNMP monitoring are Tivoli Netcool/Proviso by IBM, CA Performance Management by CA Technologies., and SolarWinds Functions and features Measurement tools generally have these functions and features: User interface (web, graphical, console) Real-time traffic graphs Network activity is often reported against pre-configured traffic matching rules to show: Local IP address Remote IP address Port number or protocol Logged in user name Bandwidth quotas Support for traffic shaping or rate limiting (overlapping with the network traffic control page) Support website blocking and content filtering Alarms to notify the administrator of excessive usage (by IP address or in total) See also IP Flow Information Export and NetFlow Measuring network throughput Network management Network monitoring Network scheduler Network simulation Packet sniffer Performance management References Network management Internet Protocol based network software
https://en.wikipedia.org/wiki/Time%20Independent%20Escape%20Sequence
The Time Independent Escape Sequence, or TIES, is a modem protocol standard invented to avoid a patent held by Hayes Microcomputer Products. TIES is an escape sequence that switches the modem from "data mode" to "command mode", allowing instructions to be sent to the modem to control it while still connected to the remote modem. Smartmodem When inventing the first Smartmodem, Dale Heatherington was faced with the problem of distinguishing commands from data given that there were only two serial pins available for use in the RS-232C port. He eventually settled on having two modes of operation, switching between them with an escape sequence, +++. Of course, files being sent over the modem could contain the string +++. For instance, this page includes the sequence several times. If the modem simply looked for the string to arrive in the data stream also carrying this text, it would switch to command mode at inappropriate times and stop data transfer with the remote modem. There needed to be some way to distinguish a deliberate command from random data. Heatherington's solution to this problem was to introduce a delay on either side of the escape sequence, meaning that only a <pause> +++ <pause> would trigger the switch. A file containing the string being sent would not contain the pauses, so the modem would treat it as data to be sent, and stay in data mode. A user typing in the string deliberately would naturally pause after sending it to wait for the modem's response, inserting the pause without even being aware of it. Bizcomp patent Hayes had initially filed for a patent on the electronic design of the Smartmodem in June 1981. Unknown to them at the time, in March 1980 Michael Eaton had filed a patent which included an escape sequence similar to the one introduced by Heatherington. Eaton's company, Business Computers Corp., or Bizcomp for short, introduced modems using this system in 1980, before the Smartmodem. When the patent, 4,387,440, was granted on 7 June 1983, Bizcomp immediately started sending out license demands to any company using a similar technique, including Hayes. They charged between $500,000 and $2 million up-front, and an additional 3% per-device, sliding down to zero if the company paid the entire $2 million. In September 1983, Hayes purchased a license from BizComp for $2 million, which included both a circuit design as well as a description of an escape sequence to trigger it. Although the concept was generally similar to their own, the Bizcomp patent differed in two key ways; one was that the escape sequence was not pre-defined and was set by the user during the startup, and the other was that it lacked the delay that was key to the way Hetherington's design worked. Among the many other companies approached by Bizcomp was U.S. Robotics (USR). In 1984, USR sued Bizcomp in an effort to break the patent on the basis of obviousness and prior-art, and violation of the Sherman Antitrust Act in their efforts to monopolize th
https://en.wikipedia.org/wiki/Database%20forensics
Database forensics is a branch of digital forensic science relating to the forensic study of databases and their related metadata. The discipline is similar to computer forensics, following the normal forensic process and applying investigative techniques to database contents and metadata. Cached information may also exist in a servers RAM requiring live analysis techniques. A forensic examination of a database may relate to the timestamps that apply to the update time of a row in a relational table being inspected and tested for validity in order to verify the actions of a database user. Alternatively, a forensic examination may focus on identifying transactions within a database system or application that indicate evidence of wrongdoing, such as fraud. Software tools can be used to manipulate and analyse data. These tools also provide audit logging capabilities which provide documented proof of what tasks or analysis a forensic examiner performed on the database. Currently many database software tools are in general not reliable and precise enough to be used for forensic work as demonstrated in the first paper published on database forensics. There is currently a single book published in this field, though more are destined. Additionally there is a subsequent SQL Server forensics book by Kevvie Fowler named SQL Server Forensics which is well regarded also. The forensic study of relational databases requires a knowledge of the standard used to encode data on the computer disk. A documentation of standards used to encode information in well-known brands of DB such as SQL Server and Oracle has been contributed to the public domain. Others include Apex Analytix. Because the forensic analysis of a database is not executed in isolation, the technological framework within which a subject database exists is crucial to understanding and resolving questions of data authenticity and integrity especially as it relates to database users. Further reading Farmer and Venema, 1999, http://www.porcupine.org/forensics/forensic-discovery/appendixB.html Sarbanes Oxley section 404 – enforce financial standards to limit chance of fraud. http://thecaq.aicpa.org/Resources/Sarbanes+Oxley/ HIPAA – Health and Portability Act https://web.archive.org/web/20051219200504/http://www.cms.hhs.gov/hipaa/ Fair Credit Reporting Act (FCRA) http://www.gao.gov/new.items/d06674.pdf Oracle Forensics In a Nutshell, Paul M. Wright (May 2007) http://www.oracleforensics.com/wordpress/wp-content/uploads/2007/03/OracleForensicsInANutshell.pdf Oracle Forensics, Paul Wright, Rampant Techpress, , May 2008. http://www.rampant-books.com/book_2007_1_oracle_forensics.htm References Forensics Digital forensics
https://en.wikipedia.org/wiki/Heinz%20Nixdorf
Heinz Nixdorf (April 9, 1925 – March 17, 1986) was a German computing pioneer, businessman and founder of Nixdorf Computer AG. Nixdorf was born in Paderborn, Germany. The 27-year-old Nixdorf, at the time a physics student, founded his first computer company in 1952. As the owner, he led this company to become an international electronics company with revenues of almost four billion Deutsche Mark at its peak. His microcomputers were competitors to IBM mainframes. Nixdorf is remembered as one of the entrepreneurs who, in the 1950s to 1970s, symbolized the German economic miracle. He was also an ambitious athlete and is remembered for his efforts to provide good education to his employees. He succumbed to a heart attack in 1986 at the CeBIT in Hanover. Early life Nixdorf was born on April 9, 1925, as the oldest child of five. He went to a Catholic board school where he first showed his talent for mathematics and science. Due to his father's unemployment during the 1920s and 30s, his childhood was defined by poverty. Achieving good grades in school, he was offered a scholarship to become a teacher. Uninterested in becoming that career, Nixdorf wrote a letter to the Ministry of Education in Berlin. As a result, he was granted permission to attend the Reismann-Gymnasium in Paderborn starting in 1941. In 1942, Nixdorf was drafted by the Wehrmacht and served on the Eastern Front. He completed his education in 1947, receiving the Abitur. Education With the aid of a scholarship, Nixdorf studied physics at the Johann-Wolfgang-Goethe Universität in Frankfurt am Main in 1947. In addition to his education in physics, he also attended seminars in business economics. In 1951 Nixdorf started working for the development department of Remington Rand Corp. There he gained knowledge of simple adding machines and met Walter Sprick, whose assistant he became. Leaving Remington to work at IBM, Sprick handed some of his work and inventions over to Nixdorf. Based on those concepts, Nixdorf developed the Elektronensaldierer and the Elektronenmultiplizierer. Founding and development of the company In 1952 Nixdorf founded the Labor für Impulstechnik in Essen. On September 5, 1952, Nixdorf hired his first employee, an electronics technician named Alfred Wierzioch. In 1954 they released their first vacuum-tube computer, called ES, for the local electric utility company. From this point on the company grew rapidly, becoming a supplier of electronic computing devices to other companies, including Wanderer, at the time the leading German manufacturer of office machines. In 1959 the company moved to Paderborn where Nixdorf was born. Utilizing his connections there he had ambitious plans to grow his company. In 1961 his company had 60 employees. In 1965 the Wanderer Logatronic, an electronic desk calculator, was presented at Hannover Messe. It was the first electronic calculator to use semiconductors, revolutionary for the time. In 1967, Nixdorf developed the Logatronic into
https://en.wikipedia.org/wiki/Buzen%27s%20algorithm
In queueing theory, a discipline within the mathematical theory of probability, Buzen's algorithm (or convolution algorithm) is an algorithm for calculating the normalization constant G(N) in the Gordon–Newell theorem. This method was first proposed by Jeffrey P. Buzen in his 1971 PhD dissertation and subsequently published in a refereed journal in 1973. Computing G(N) is required to compute the stationary probability distribution of a closed queueing network. Performing a naïve computation of the normalizing constant requires enumeration of all states. For a closed network with N circulating customers and M service facilities, G(N) is the sum of individual terms, with each term consisting of M factors raised to powers whose sum is N. Buzen's algorithm computes G(N) using only NM multiplications and NM additions. This dramatic improvement opened the door to applying the Gordon-Newell theorem to models of real world computer systems as well as flexible manufacturing systems and other cases where bottlenecks and queues can form within networks of inter-connected service facilities. The values of G(1), G(2) ... G(N -1), which can be used to calculate other important quantities of interest, are computed as by-products of the algorithm. Problem setup Consider a closed queueing network with M service facilities and N circulating customers. Assume that the service time for a customer at service facility i is given by an exponentially distributed random variable with parameter μi and that, after completing service at service facility i, a customer will proceed next to service facility j with probability pij. Let be the steady state probability that the number of customers at service facility i is equal to ni for i = 1, 2, ... , M . It follows from the Gordon–Newell theorem that .... This result is usually written more compactly as The values of Xi are determined by solving G(N) is a normalizing constant chosen so that the sum of all values of is equal to 1. Buzen's algorithm represents the first efficient procedure for computing G(N). Algorithm description The individual terms that must be added together to compute G(N) all have the following form: .... . Note that this set of terms can be partitioned into two groups. The first group comprises all terms for which the exponent of is greater than or equal to 1.  This implies that raised to the power 1 can be factored out of each of these terms.   After factoring out , a surprising result emerges: the modified terms in the first group are identical to the terms used to compute the normalizing constant for the same network with one customer removed. Thus, the sum of the terms in the first group can be written as “XM times G(N -1)”. This insight provides the foundation for the development of the algorithm.   Next consider the second group.  The exponent of XM for every term in this group is zero.  As a result, service facility M effectively disappears from all term
https://en.wikipedia.org/wiki/International%20Union%20of%20Forest%20Research%20Organizations
The International Union of Forest Research Organizations (IUFRO) (, , ) is a non-profit, non-governmental international network of forest scientists, headquartered in Austria. In 2019, IUFRO counted 630 Member Organizations worldwide. Activities Main activities comprise knowledge generation, knowledge sharing and capacity building. Congresses and conferences Every five years, IUFRO organizes a World Congress with about 2,000 participants. The most recent was in Curitiba, Brazil in 2019. Between World Congresses, there are some 70-80 smaller conferences, meetings and webinars organized each year by the individual IUFRO research units (i.e. Divisions, Research Groups and Working Parties, Task Forces, Special Programmes, Projects and Chapters) around the world. Involvement in international processes Many joint activities and partnership agreements occur with national governments, regional and global organizations and NGOs. For example, IUFRO is a Scientific Union Member of the International Council for Science (ICSU), a member of the Collaborative Partnership on Forests (CPF), and an observer organization in the United Nations Forum on Forests, the Convention on Biological Diversity, the UN Framework Convention on Climate Change and other forest-related international processes and conventions. It has established memoranda of understanding with, for instance, the Food and Agriculture Organization of the United Nations (FAO), World Conservation Union (IUCN), the World Wide Fund for Nature (WWF), the International Tropical Timber Organization (ITTO), and International Forestry Students' Association (IFSA). Communication and knowledge sharing IUFRO shares scientific knowledge and information with its members and stakeholders via its website iufro.org, the expertise of its officeholders, publications such as IUFRO News, IUFRO Spotlight, calendar of events, webinars, information leaflets, annual reports, occasional papers, IUFRO World Series, IUFRO Research Series, and conference proceedings. In 2011, a Working Party on Communications and Public Relations was established as part of IUFRO Division 9 on Forest Policy and Economics. Honors and awards IUFRO honors through a variety of awards those who advance science and promote international cooperation in all fields of research related to forestry. Awards for scientific work include: Scientific Achievement Award (SAA) Outstanding Doctoral Research Award (ODRA) IUFRO Student Award for Excellence in Forest Science (ISA) IUFRO World Congress Host Scientific Award Best Poster Award (BPA) Organization The Organs of the Union are: Congress; International Council; Board and Committees; Management Committee; President (Dr. John Parrotta) and Vice-Presidents; Executive Director. The structure of the Union comprises the following IUFRO Units: Divisions with Research Groups and Working Parties; Task Forces, Special Programmes, Projects, IUFRO-led Initiatives and (formerly) Chapters. Divisions, task
https://en.wikipedia.org/wiki/KMOH-TV
KMOH-TV (channel 6) is a television station in Kingman, Arizona, United States, airing programming from MeTV. Owned and operated by Weigel Broadcasting, the station has studios on Kingman Avenue in Kingman, and its transmitter is located atop Oatman Mountain, near Oatman, Arizona. KEJR-LD (channel 40) in Phoenix operates as a low-power translator of KMOH-TV; this station's transmitter is located atop South Mountain on the city's south side. History An original construction permit to build a television station on VHF channel 6 in Kingman granted to Grand Canyon Television Co. on April 8, 1985. Its transmitter facilities were to be located at Hualapai Peak, operating at an effective radiated power (ERP) of 10 kW. The permit was modified in August 1986 to specify Black Mountain as the transmitter location with an ERP of 100 kW, which was the maximum allowed for a low-band VHF station. The station first signed on the air on February 22, 1988, and was licensed on June 1. During the late 1980s and early 1990s, KMOH was an English-language independent station, and also produced its own local newscast. In September 1995, KMOH became an affiliate of The WB. It was listed as an American Independent Network (AIN) affiliate in July 1996, and has also been listed as a Network One (N1) affiliate at an unknown date. KMOH was still primarily a WB affiliate in May 1997, when the broadcasting arm of the Gannett Company (now Tegna Inc.) bought the station, along with KNAZ-TV in Flagstaff, from Grand Canyon Television Company. In November 1999, Gannett converted KMOH into a satellite station of Phoenix-based NBC affiliate KPNX (channel 12). It was perceived as a redundant move, as KPNX was already available on cable in the Kingman area. In August 2004, Bela Broadcasting, looking to expand the reach of its family-oriented Spanish-language format, acquired KMOH from Gannett, making the station a Spanish-language independent station, airing mostly the same content as its Oxnard, California station KBEH, but on a different schedule. From Kingman, Bela hoped to put signals into the Phoenix and Las Vegas markets, both of which have large Hispanic populations. While it cannot be verified as a reason for buying KMOH, a full-power station in the Phoenix media market, it is clear that Bela Broadcasting desired must-carry cable coverage in Phoenix as well. With KMOH no longer a rebroadcaster of KPNX, Cox Communications petitioned the Federal Communications Commission (FCC) to allow it to exclude the station from must-carry provisions in its 16 Phoenix-area communities, since, while it is part of the Phoenix market, it operates away from the city itself and the station's signal did not reach into Phoenix. KMOH fought the exclusion, but lost, in large part due to the station's lack of local programming directed at Phoenix viewers, and also in part due to not being receivable in Phoenix. In November 2005, Bela Broadcasting acquired KQBN-LP (channel 43, now KEJR-LP) from Una
https://en.wikipedia.org/wiki/Hang%20Time%20%28TV%20series%29
Hang Time is an American teen sitcom that aired on NBC from September 9, 1995, to December 16, 2000, as part of the network's Saturday morning program block for teenagers, TNBC. Created by Troy Searer, Robert Tarlow and Mark Fink, the series featured extensive cast changes throughout its six-season run, similar to its TNBC stablemate Saved by the Bell: The New Class. The show's title is taken from a sports term referring to how long a basketball player stays in the air after leaving the ground for a slam dunk. Hang Time won a Prism Award in 1999 for its accurate depictions of drug use in the season four episodes "High Hoops" and "Breaks of the Game". Synopsis The series centers on the exploits of the Deering Tornados boys' varsity basketball team of the fictional Deering High School in the fictional Midwestern town of Deering, Indiana. In the pilot episode, Julie Connor (Daniella Deutscher) transfers to Deering High after moving to Indiana from Chicago, Illinois. Although she meets some initial resistance from the male players on the team, Bill Fuller (Reggie Theus), the team's coach and a former player in the NBA, decides to make Julie the team's first female player after she shows off her basketball skills to the other members of the team – including star player Chris Atwater (David Hanson); Danny Mellon (Chad Gabriel), who develops a crush on Julie upon their first meeting; sometimes overconfident Michael Maxwell (Christian Belnavis) and country-bred Earl Hatfield (Robert Michael Ryan). Head cheerleader Mary Beth Pepperton (Megan Parlen) – whose father is a wealthy, self-made businessman – was initially jealous of Julie, particularly where her boyfriend for most of the first season (until the episode "Let's Get Ready to Rumble") Chris was concerned. Samantha Morgan (Hillary Tuck), the Tornados' team manager, became Danny's girlfriend later in the season. For the second season, Saved by the Bell executive producer Peter Engel was appointed as the series' showrunner, resulting in extensive changes to the show. About half of the main cast (with Deutscher, Parlen, Gabriel and Theus being the lone holdovers) was let go, with new characters being added in their place. Three new players were added: Little League veteran Josh Sanders (Kevin Bell), who had given up competitive sports after being prodded by his baseball coach to bean another player, but whom the Tornados coaxed out of retirement; Vince D'Amata (Michael Sullivan), a Chicago native, who had previously served as an alternate on the team; and Theodore "Teddy" Brodis (Anthony Anderson), Coach Fuller's godson, whose biological father was another professional basketball player. Cindy Amy Wright (Paige Peterson), who went by her middle name because she loathed her real first one, became head cheerleader...replacing Mary Beth, who was promoted to team manager. Mary Beth's new position would lead to several blundering efforts at initiating her responsibilities, which she often attempted to fix.
https://en.wikipedia.org/wiki/Monitor%20speaker
Monitor speaker may refer to: Loudspeakers built into a computer monitor Stage monitor system, loudspeakers facing the stage during a live performance Studio monitor, professional grade loudspeaker designed specifically for audio production and engineering See also Monitor (disambiguation)
https://en.wikipedia.org/wiki/Joint%20Committee%20on%20Atomic%20and%20Molecular%20Physical%20Data
The Joint Committee on Atomic and Molecular Physical Data (JCAMP) defined several JCAMP-DX (JCAMP-data exchange) file formats in chemistry. IUPAC took over the responsibility of maintaining and extending the JCAMP-DX standards from JCAMP in 1995. References External links IUPAC CPEP The Subcommittee on Cheminformatics Data Standards (SCDS) Joint committees
https://en.wikipedia.org/wiki/Brak%20Presents%20the%20Brak%20Show%20Starring%20Brak
Brak Presents the Brak Show Starring Brak is a two-part live-action/animated musical comedy television special that aired on Cartoon Network on February 20, 2000. The special was given a TV-Y7 rating. History On July 2, 1999, at the Cartoon Network panel at Dragon Con in Atlanta, Georgia, Andy Merrill, C. Martin Croker, Pete Smith and Nina Bishop announced they were developing a new series starring Brak. Plot Brak is the host of a musical variety show while Zorak is trying to sabotage it. The show features celebrity appearances by Monica, Freddie Prinze Jr., The Chieftains, Diamond Dallas Page, and Jo Dee Messina. Grape Ape and Wally Gator make an appearance as well. Soundtrack In 2000, The soundtrack Brak Presents the Brak Album Starring Brak was released. The 30 tracks are taken in order from the two "Brak Presents the Brak Show Starring Brak" specials, with the exception of the three bonus tracks and a re-recording of "We're Buds" which was originally a duet between Brak and Jo Dee Messina, but appears on the album with Brak singing both parts. Track listing "Really Cool Song" (Brak, Wally Gator, Zorak & The Brakettes) 1:19 "Franz Shoebert" (Franz Shoebert & The Brakettes) :46 "Dentist" (Wally Gator, Brak & Zorak) 1:18 "Magic Toenail" (Brak) 1:25 "Babbling Brook" (Brak, Brook & The Chieftains) :38 "I'll Tell Me Ma" (Brak & The Chieftains) 2:10 "Rock Candy" (Zorak) :56 "Big Fat Squid" (Grape Ape & The Brakettes) 1:01 "I Like Hubcaps" (Brak, Franz Shoebert & The Brakettes) 1:52 "Cowboy Buddy" (Cowboy Buddy) :35 "Highway 40" (Brak & Freddie Prinze, Jr.) 2:17 "Bananachek" (Brak, Allen Wrench & The Brakettes) 1:10 "Smell You Later" (Zorak, Fuzzy & The Brakettes) 1:27 "Store" (Brak & The Brakettes) 1:08 "Brak Counterbrak" (Brak) :54 "Evil Is Only Skin Deep" (Diamond Dallas Page, Zorak & The Brakettes) 1:35 "We Like Girls" (Brak, Zorak & The Brakettes) 1:20 "El Brakiachi" (Brak, Zorak & The Brakettes) 1:17 "Beeflog" (Brak & Zorak) 1:02 "Another Cowboy Buddy" (Cowboy Buddy) :38 "Barbeque" (Brak & Zorak) :51 "Count Brakula" (Brak & Zorak) 1:14 "I'm Forgettable" (Brak) 1:19 "News Bulletin" (Brak) :24 "I'm a Cucumber" (Brak) :21 "News Bulletin" (Brak) :27 "Molly Cule" (Brak & Zorak) 1:01 "We're Buds" (Brak) 2:07 "Chili Today, Hot Tamale" (Brak, Zorak & The Brakettes) 1:19 "Ohio" (Brak, Wally Gator, Zorak & The Brakettes) 1:25 "I've Got You Under My Drawers" [*] (Brak & The Brakettes) 2:13 "Year of the Mantis" [*] (Zorak) :55 "Soup on a Stick" [*] (Brak) 1:26 Personnel Phil Baron – executive producer The Brakettes – performer The Braktonics - Performer The Chieftains – performer C. Martin Croker - Voice of Zorak & Wally Gator Alfreda Gerald – executive producer Eddie Horst – director, executive producer Andy Merrill – executive producer, Voice of Brak Diamond Dallas Page - Performer Freddie Prinze Jr. – performer Dave Rowland – executive pro
https://en.wikipedia.org/wiki/Ruckus%20Network
Ruckus was a free ad-supported online music service available to students at all American colleges. The service was founded in 2003 by Vincent Han and David Galper. It was acquired in 2008 by Total Music, a joint venture between Sony and Universal; and was closed on February 6, 2009 when Ruckus' website was replaced with a graphic saying, "Unfortunately the Ruckus service will no longer be provided. Thanks." History Ruckus Network, which was based in Herndon, Virginia, was backed by venture capitalists Battery Ventures and Shelter Capital. With its official launch in September 2004 at Northern Illinois University. In January 2006, Ruckus moved away from its subscription business model in favor of one that was ad-subsidized. This change eliminated the previous monthly fee required for site access and granted users cost-free entry to use the service. In September 2006, Ruckus created a fictitious Facebook profile under the name "Brody Ruckus." The group drew membership on the claim that if 100,000 people joined, the fictional character's girlfriend "Holly" (based on a real-life friend of the employee) would have a threesome with "Ruckus" and another woman. Within a week, the group had reached 100,000 members. "Brody Ruckus" then promised to post pictures of his sexual encounter online if 300,000 people joined. Within seven days, the group membership had exceeded 400,000 and "Ruckus" wrote that if the group became the largest on Facebook, he would post a video of his threesome. Facebook administrators deleted the "Brody Ruckus" profile and his group, since it represented a breach in the site's Terms of Service agreement, specifically with reference to: "impersonating any person or entity, or falsely stating or otherwise misrepresenting yourself, your age or your affiliation with any person or entity." Critics of the campaign said that joining the group gave Ruckus access to student email addresses, that were then used for direct marketing campaigns advertising Ruckus' services. In an interview with the online newspaper eSchool News, Ruckus President Mike Bebel said that the Brody Ruckus affair "was an exercise conducted by one of our marketing teams. It wasn't something we had any real designs around. It took on a life of its own. It was a good learning exercise for us, but not something that we would repeat." Features and restrictions Pricing: Free to all students with a valid .edu email address. $8.99/month for alumni and college faculty. Platform(s): Windows 2000, Windows XP, and Windows Vista only. Downloading: Yes. Burning/Copying: No. Streaming: Streaming video content on Ruckus TV. No streaming music content. Format: Protected Windows Media Audio (WMA) and Windows Media Video (WMV) format. Digital restrictions: No burning to compact discs. Limited player support. Files contain embedded licenses that must be renewed periodically. Preview: None. Trial: None. Catalog: Over 3 million files. Features: Adding "friends", friend-to-friend mus
https://en.wikipedia.org/wiki/Structure%20mapping%20engine
In artificial intelligence and cognitive science, the structure mapping engine (SME) is an implementation in software of an algorithm for analogical matching based on the psychological theory of Dedre Gentner. The basis of Gentner's structure-mapping idea is that an analogy is a mapping of knowledge from one domain (the base) into another (the target). The structure-mapping engine is a computer simulation of the analogy and similarity comparisons. The theory is useful because it ignores surface features and finds matches between potentially very different things if they have the same representational structure. For example, SME could determine that a pen is like a sponge because both are involved in dispensing liquid, even though they do this very differently. Structure mapping theory Structure mapping theory is based on the systematicity principle, which states that connected knowledge is preferred over independent facts. Therefore, the structure mapping engine should ignore isolated source-target mappings unless they are part of a bigger structure. The SME, the theory goes, should map objects that are related to knowledge that has already been mapped. The theory also requires that mappings be done one-to-one, which means that no part of the source description can map to more than one item in the target and no part of the target description can be mapped to more than one part of the source. The theory also requires that if a match maps subject to target, the arguments of subject and target must also be mapped. If both these conditions are met, the mapping is said to be "structurally consistent." Concepts in SME SME maps knowledge from a source into a target. SME calls each description a dgroup. Dgroups contain a list of entities and predicates. Entities represent the objects or concepts in a description — such as an input gear or a switch. Predicates are one of three types and are a general way to express knowledge for SME. Relation predicates contain multiple arguments, which can be other predicates or entities. An example relation is: (transmit (what from to)). This relation has a functor transmit and takes three arguments: what, from, and to. Attribute predicates are the properties of an entity. An example of an attribute is (red gear) which means that gear has the attribute red. Function predicates map an entity into another entity or constant. An example of a function is (joules power source) which maps the entity power source onto the numerical quantity joules. Functions and attributes have different meanings, and consequently SME processes them differently. For example, in SME’s true analogy rule set, attributes differ from functions because they cannot match unless there is a higher-order match between them. The difference between attributes and functions will be explained further in this section’s examples. All predicates have four parameters. They have (1) a functor, which identifies it, and (2) a type, which is either re
https://en.wikipedia.org/wiki/Tracy%20Reed%20%28writer%29
Tracy Reed is an American writer who created the first episodic online story, the QuantumLink Serial on AOL (then called Quantum Computer Services). The series debuted in 1988, and was played out in online chat rooms, emails and traditional narrative. The series also went by the name The AppleLink Serial and The PC-Link Serial on those services before they were all unified under the AOL brand when Quantum changed its name. After each week's chapter was published, users wrote to author Reed suggesting how they could be part of the story. Each week Reed chose one to a handful of users on each of the three services and wrote them into the story, depicting how they interacted with the fictional characters. The project was personally greenlighted by AOL Marketing VP (later President) Steve Case and produced by Kathi McHugh. Later titles, the most famous of which was The Spot added photos and video to the stories, and introduced the advertising-supported model that became standard during the Internet dot-com boom. Reed's work also is a building block in the development of Alternate reality games. In 2010 a Northern California interactive theater group announced that they were producing a new interactive drama by Reed, "The Koi Pond." References Living people Year of birth missing (living people) AOL people Place of birth missing (living people) American women in business 20th-century American women writers 21st-century American women writers
https://en.wikipedia.org/wiki/EHealth%20Exchange
The eHealth Exchange, formerly known as the Nationwide Health Information Network (NHIN or NwHIN), is an initiative for the exchange of healthcare information. It was developed under the auspices of the U.S. Office of the National Coordinator for Health Information Technology (ONC), and now managed by a non-profit industry coalition called Sequoia Project (formerly HealtheWay). The exchange is a web-services based series of specifications designed to securely exchange healthcare related data. The NwHIN is related to the Direct Project which uses a secure email-based approach. One of the latest goals is to increase the amount of onboarding information about the NwHIN to prospective vendors of health care systems. The Office of the National Coordinator for Health Information Technology has been facilitating development of the NwHIN, which will tie together health information exchanges, integrated delivery networks, pharmacies, government, labs, providers, payors and other stakeholders into a "network of networks." A health care system participating in the NwHIN acquires an Object identifier (OID). The OID, issued by the ONC, allows the individual health care system or vendor to receive and send messages to trusted entities within the NwHIN through an interface such as Mirth Connect or a custom-built Java UI. The NwHIN is built on open source code utilizing the Java platform. This creates a need for technical information sharing among programmers with the ONC also making information available. According to former Health and Human Services Secretary Michael Leavitt the NwHIN would be a public-private venture, and the Markle Foundation, Robert Wood Johnson Foundation and California HealthCare Foundation were funding research and demonstration projects. The NwHIN is funded through the Office of the National Coordinator for Health Information Technology, the Health Resources and Services Administration, the Agency for Healthcare Research and Quality, the Centers of Medicare and Medicaid Services, the Centers for Disease Control and Prevention, and the Indian Health Service. Participants The stakeholders that participate in the NwHIN will be four broad classes of organizations: Care delivery organizations (CDOs) that use electronic health records (EHRs). Consumer organizations that operate personal health records (PHRs) and other consumer applications. Health information exchanges (HIEs): multi-stakeholder entities that enable the movement of health-related data within state, regional or non-jurisdictional participant groups. Specialized participants: organizations that operate for specific purposes including, but not limited to, secondary users of data such as public health, research and quality assessment. The specialized nature of these organizations means that they may require only a subset of the shared architecture (standards, services and requirements), processes and procedures used by the other participants. Health Information Service Pro
https://en.wikipedia.org/wiki/Semi-empirical%20quantum%20chemistry%20method
Semi-empirical quantum chemistry methods are based on the Hartree–Fock formalism, but make many approximations and obtain some parameters from empirical data. They are very important in computational chemistry for treating large molecules where the full Hartree–Fock method without the approximations is too expensive. The use of empirical parameters appears to allow some inclusion of electron correlation effects into the methods. Within the framework of Hartree–Fock calculations, some pieces of information (such as two-electron integrals) are sometimes approximated or completely omitted. In order to correct for this loss, semi-empirical methods are parametrized, that is their results are fitted by a set of parameters, normally in such a way as to produce results that best agree with experimental data, but sometimes to agree with ab initio results. Type of simplifications used Semi-empirical methods follow what are often called empirical methods where the two-electron part of the Hamiltonian is not explicitly included. For π-electron systems, this was the Hückel method proposed by Erich Hückel. For all valence electron systems, the extended Hückel method was proposed by Roald Hoffmann. Semi-empirical calculations are much faster than their ab initio counterparts, mostly due to the use of the zero differential overlap approximation. Their results, however, can be very wrong if the molecule being computed is not similar enough to the molecules in the database used to parametrize the method. Preferred application domains Methods restricted to π-electrons These methods exist for the calculation of electronically excited states of polyenes, both cyclic and linear. These methods, such as the Pariser–Parr–Pople method (PPP), can provide good estimates of the π-electronic excited states, when parameterized well. For many years, the PPP method outperformed ab initio excited state calculations. Methods restricted to all valence electrons. These methods can be grouped into several groups: Methods such as CNDO/2, INDO and NDDO that were introduced by John Pople. The implementations aimed to fit, not experiment, but ab initio minimum basis set results. These methods are now rarely used but the methodology is often the basis of later methods. Methods that are in the MOPAC, AMPAC, SPARTAN and/or CP2K computer programs originally from the group of Michael Dewar. These are MINDO, MNDO, AM1, PM3, PM6, PM7 and SAM1. Here the objective is to use parameters to fit experimental heats of formation, dipole moments, ionization potentials, and geometries. This is by far the largest group of semiempirical methods. Methods whose primary aim is to calculate excited states and hence predict electronic spectra. These include ZINDO and SINDO. The OMx (x=1,2,3) methods can also be viewed as belonging to this class, although they are also suitable for ground-state applications; in particular, the combination of OM2 and MRCI is an important tool for excited state mo
https://en.wikipedia.org/wiki/Mirai%20%28software%29
Mirai is a 3D creation and editing suite available originally from Nichimen Graphics Corporation, later from Winged Edge Technologies, and currently from Izware. The modeller uses the winged edge data structure, is written in Common Lisp, and traces its lineage to the S-Geometry software from Symbolics. It has been used primarily by game developers and high-end character animators—for example by Bay Raitt's facial morph targets for the Gollum character in The Lord of the Rings film trilogy. See also N-World graphics software Wings 3D graphics software References External links The Two Towers: Face to Face with Gollum 3D graphics software Common Lisp (programming language) software
https://en.wikipedia.org/wiki/Nixdorf
Nixdorf may refer to: Companies Nixdorf Computer AG (1968-1990), a former computer company based in Paderborn, Germany Siemens Nixdorf Informationssysteme (1990-1999), a company formed when Siemens purchased Nixdorf Computer AG Wincor Nixdorf, a German corporation, which is a successor of Siemens Nixdorf Informationssysteme, that provides retail and retail banking hardware, software and services People Heinz Nixdorf, a German businessman and founder of Nixdorf Computer AG. Places Nixdorf, the German name for Mikulášovice, a town in the Czech Republic
https://en.wikipedia.org/wiki/The%20Ultimate%20Haunted%20House
The Ultimate Haunted House is a computer adventure game developed by Byron Preiss Multimedia/Brooklyn Multimedia and published and distributed by Microsoft Home. It places the player in the middle of a bizarrely humorous and eerie haunted house populated by Wilson's wacky characters. The player must explore 13 rooms, find 13 hidden keys, and build a monster from spare parts, before the mystery clock strikes 13. The game was drawn by The New Yorker cartoonist Gahan Wilson, who also appears as a character in the game. Walt Freitag and Barbara Lanza are credited as writers and designers, and Judson Rosebush as director. The game runs on Mac OS 7 and Microsoft Windows 3.1. Gameplay Game play consists of interacting with a cast of ghoulish residents who populate the house and move about it, and in collecting and exchanging an inventory of items with them. All of the main characters, as well as the house itself, contain artificial personalities that react to the actions of the player, and the house may be explored in any order. Dozens of activities and puzzles embedded in the game also have consequences. These activities include a monster assembly lab, monster movies in the screening room, cooking a concoction in the kitchen, composing an organ tune, and other traditional puzzle games adapted to the computer. The game contains many distinct voices and the opening tune "Monster Mash". A cast of characters populate the house and make appearances throughout in the game. These include Frankenstein, a vampiress, a two-headed monster, a mad scientist, and a normal human child (transported there by the mad scientist's lab ray). Gahan Wilson is a ghost in the game, but there are two Gahans: one good, one evil, and deciphering which is which is one of the elements of game play. The thirteen rooms include a menagerie, kitchen, foyer, torture chamber, the monster lab, the screening room, the game room, a library, an attic, a bathroom, a basement hallway, a music room, and an art gallery. There are also several monsters whose interaction with the player is limited to placing curses upon them. Critical reception The Associated Press called the game "straight-out fun," praising in particular Wilson's "visual wit." The Washington Post also praised the game's humor, comparing it favorably to The Addams Family. References 1993 video games Adventure games Classic Mac OS games Video games developed in the United States Windows games
https://en.wikipedia.org/wiki/Tak%20%28function%29
In computer science, the Tak function is a recursive function, named after Ikuo Takeuchi (:ja:竹内郁雄). It is defined as follows: def tak(x, y, z): if y < x: return tak( tak(x-1, y, z), tak(y-1, z, x), tak(z-1, x, y) ) else: return z This function is often used as a benchmark for languages with optimization for recursion. tak() vs. tarai() The original definition by Takeuchi was as follows: def tarai(x, y, z): if y < x: return tarai( tarai(x-1, y, z), tarai(y-1, z, x), tarai(z-1, x, y) ) else: return y # not z! tarai is short for たらい回し tarai mawashi, "to pass around" in Japanese. John McCarthy named this function tak() after Takeuchi. However, in certain later references, the y somehow got turned into the z. This is a small, but significant difference because the original version benefits significantly from lazy evaluation. Though written in exactly the same manner as others, the Haskell code below runs much faster. tarai :: Int -> Int -> Int -> Int tarai x y z | x <= y = y | otherwise = tarai (tarai (x-1) y z) (tarai (y-1) z x) (tarai (z-1) x y) One can easily accelerate this function via memoization yet lazy evaluation still wins. The best known way to optimize tarai is to use mutually recursive helper function as follows. def laziest_tarai(x, y, zx, zy, zz): if not y < x: return y else: return laziest_tarai( tarai(x-1, y, z), tarai(y-1, z, x), tarai(zx, zy, zz)-1, x, y) def tarai(x, y, z): if not y < x: return y else: return laziest_tarai( tarai(x-1, y, z), tarai(y-1, z, x), z-1, x, y) Here is an efficient implementation of tarai() in C: int tarai(int x, int y, int z) { while (x > y) { int oldx = x, oldy = y; x = tarai(x - 1, y, z); y = tarai(y - 1, z, oldx); if (x <= y) break; z = tarai(z - 1, oldx, oldy); } return y; } Note the additional check for (x <= y) before z (the third argument) is evaluated, avoiding unnecessary recursive evaluation. References External links TAK Function Functions and mappings Special functions
https://en.wikipedia.org/wiki/Region%20of%20interest
A region of interest (often abbreviated ROI) is a sample within a data set identified for a particular purpose. The concept of a ROI is commonly used in many application areas. For example, in medical imaging, the boundaries of a tumor may be defined on an image or in a volume, for the purpose of measuring its size. The endocardial border may be defined on an image, perhaps during different phases of the cardiac cycle, for example, end-systole and end-diastole, for the purpose of assessing cardiac function. In geographical information systems (GIS), a ROI can be taken literally as a polygonal selection from a 2D map. In computer vision and optical character recognition, the ROI defines the borders of an object under consideration. In many applications, symbolic (textual) labels are added to a ROI, to describe its content in a compact manner. Within a ROI may lie individual points of interest (POIs). Examples of regions of interest 1D dataset: a time or frequency interval on a waveform 2D dataset: the boundaries of an object on an image 3D dataset: the contours or surfaces outlining an object (sometimes known as the Volume of Interest (VOI)) in a volume 4D dataset: the outline of an object at or during a particular time interval in a time-volume A ROI is a form of Annotation, often associated with categorical or quantitative information (e.g., measurements like volume or mean intensity), expressed as text or in a structured form. There are three fundamentally different means of encoding a ROI: As an integral part of the sample data set, with a unique or masking value that may or may not be outside the normal range of normally occurring values and which tags individual data cells As separate, purely graphic information, such as with vector or bitmap (rasterized) drawing elements, perhaps with some accompanying plain (unstructured) text in the format of the data itself As a separate structured semantic information (such as coded value types) with a set of spatial and/or temporal coordinates Medical imaging Medical imaging standards such as DICOM provide general and application-specific mechanisms to support various use-cases. For DICOM images (two or more dimensions): Burned in graphics and text may occur within the normal pixel value range (e.g., as the maximum white value) (deprecated) Bitmap (rasterized) overlay graphics and text may be present in unused high bits of the pixel data or in a separate attribute (deprecated) Vector graphics may be encoded in separate image attributes as curves (deprecated) Unstructured vector graphics and text as well as bitmap (rasterized) overlay graphics may be encoded in a separate object as a presentation state that references the image object to which it is to be applied Structured data may be encoded in a separate object as a structured report in the form of a tree of name-value pairs of coded or text concepts possibly associated with derived quantitative information can reference spatial and
https://en.wikipedia.org/wiki/Sord%20M5
The Sord M5 is a home computer launched by Sord Computer Corporation in 1982. Primarily the Sord M5 competed in the Japanese home computer market. It was also sold as the CGL M5 in the United Kingdom by Computer Games Limited and was reasonably popular in Czechoslovakia, where the M5 stood as one of the first affordable computers available to the general public. Takara also sold models in Japan as the Game M5, and models were also exported to South Korea. Original models of the Sord M5 are relatively small by home computing standards, with a built-in keyboard with rubber keys, similar to the ZX Spectrum, which is also sold in many countries such as the United Kingdom itself, Ireland, Spain, the Netherlands, Singapore, Malaysia, Sweden, Norway, Denmark, Canada, New Zealand, Australia, Greece, Israel and Hong Kong as the Sord M5 Creative Computer, which included a carrying case for the computer. The specifications of the computer are very similar to the MSX, a computer that likely forced the Sord M5 (along with many similar Japanese computers) out of the market by the mid-1980s. The CGL M5 was released in the UK with an introductory price of £195, higher than many of the system's competitors including the ZX Spectrum, and VIC-20. Whereas the M5 contained a cartridge slot in an age where most computers were using compact cassettes or floppy disks, the small amount of built-in RAM led to few games being produced for the system. In South Korea, three electronics companies released different personal computers based on Sord M5. The FC-150 was produced and released by LG, Samsung released the SPC-500, and the TommyCom was manufactured and launched by Koryo Systems. These computers supported the Korean alphabet, Hangul. The system specifications of these computers were identical to the original M5, but they had differently shaped cartridge slots. Cartridges from the Sord M5 or other manufacturers could not be used for these computers directly. LG released some original software including several educational programs and games. Despite its short production run, the M5 was supported by various big Japanese game developers such as Namco and Konami. Other models include the M5 Pro and M5 Jr. Technical specifications Internal hardware CPU: Zilog Z80, 3.58 MHz Video Hardware: TMS9918 40×24 text (6×8 characters), 224 user defined characters 256×192 graphics, 16 colours 32 hardware sprites (up to 16×16 pixels) Sound Hardware: SN76489 3 sound channels 1 noise channel 6 octaves, 15 amplitude levels RAM: 20 kB (of which 16kB is screen memory) ROM: 8 kB expandable to 16kB I/O ports and power supply I/O ports: TV out Video out (phono socket) Sound out (phono socket) Centronics 16-pin interface 8-pin DIN cassette connector Power supply: external Language cartridge options BASIC-I Integer arithmetic only (16 bit signed) BASIC-G Graphics and sound functions BASIC-F Floating point arithmetic FALC Applications package Retail price UK R
https://en.wikipedia.org/wiki/NTP%20server%20misuse%20and%20abuse
NTP server misuse and abuse covers a number of practices which cause damage or degradation to a Network Time Protocol (NTP) server, ranging from flooding it with traffic (effectively a DDoS attack) or violating the server's access policy or the NTP rules of engagement. One incident was branded NTP vandalism in an open letter from Poul-Henning Kamp to the router manufacturer D-Link in 2006. This term has later been extended by others to retroactively include other incidents. There is, however, no evidence that any of these problems are deliberate vandalism. They are more usually caused by shortsighted or poorly chosen default configurations. A deliberate form of NTP server abuse came to note at the end of 2013, when NTP servers were used as part of amplification denial-of-service attacks. Some NTP servers would respond to a single "monlist" UDP request packet, with packets describing up to 600 associations. By using a request with a spoofed IP address attackers could direct an amplified stream of packets at a network. This resulted in one of the largest distributed denial-of-service attacks known at the time. Common NTP client problems The most troublesome problems have involved NTP server addresses hardcoded in the firmware of consumer networking devices. As major manufacturers and OEMs have produced hundreds of thousands of devices using NTP coupled with customers almost never upgrading the firmware of these devices, NTP query storms problems will persist for as long as the devices are in service. One particularly common NTP software error is to generate query packets at short (less than five second) intervals until a response is received When placed behind aggressive firewalls that block the server responses, this implementation leads to a never-ending stream of client requests to the variously blocked NTP servers. Such over-eager clients (particularly those polling once per second) commonly make up more than 50% of the traffic of public NTP servers, despite being a minuscule fraction of the total clients. While it might be technically reasonable to send a few initial packets at short intervals, it is essential for the health of any network that client connection re-attempts are generated at logarithmically or exponentially decreasing rates to prevent denial of service. This in protocol exponential or logarithmic backdown applies to any connectionless protocol, and by extension many portions of connection-based protocols. Examples of this backing down method can be found in the TCP specification for connection establishment, zero-window probing, and keepalive transmissions. Notable cases Tardis and Trinity College, Dublin In October 2002, one of the earliest known cases of time server misuse resulted in problems for a web server at Trinity College, Dublin. The traffic was ultimately traced to misbehaving copies of a program called Tardis with thousands of copies around the world contacting the web server and obtaining a timestamp v