source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/Applicon
Applicon, Incorporated was one of the first manufacturers of Computer Aided Design and Manufacturing (CAD/CAM) systems. It was co-founded in 1969 in Bedford, Massachusetts by four founders working at the MIT Lincoln Lab: Fontaine Richardson who earned a Ph.D. degree in computer science from the University of Illinois in 1968, Gary Hornbuckle who had received a Ph.D. from University of California, Berkeley, and Richard N. Spann and Harry Lee who received degrees from Massachusetts Institute of Technology. Gary Hornbuckle was President of Applicon until it was sold to Schlumberger. During the 1970s and early 1980s, the company had its headquarters and R&D facility in Burlington, Massachusetts, while its manufacturing facility was in Billerica, Massachusetts. Applicon was acquired by Schlumberger in 1980, at which point Richardson and Hornbuckle left the company. At the time, Applicon had over $100 million in annual revenue. In 1986 Schlumberger management combined its Applicon division with another entity which it had acquired, Manufacturing Data Systems, Inc. (MDSI), to create the Schlumberger CAD/CAM division, siting its main office in Ann Arbor, Michigan. In 1993, Schlumberger sold this division to Gore Enterprises, and in turn Gore sold it in 1999 to UGS Corp., a 1996 spin-off of Electronic Data Systems, which was later acquired by Siemens AG. Early systems Early Applicon products (circa 1970s) ran on DEC PDP-11 minicomputers. Applicon modified the DEC operating system, which was then a single-user OS, to one of the world's first multi-user operating systems. One of DEC's first multi-user OS was created with help from Applicon. (DEC's first multi-user DEC operating system was reportedly its RSTS-11 (Resource Sharing Time Sharing), which had been created for the educational marketplace). Another Applicon innovation was the ability to input commands using drawn character recognition. (See Patent 4560830). Early CAD provided a stylus and tablet instead of a mouse for a user interface. The tablet was mapped to the screen i.e. the top-left and bottom-right of the screen and the tablet were mapped to the same points. Applicon provided the ability to train the system to interpret characters drawn on the tablet and to associate them with commands to the system. For example, drawing the symbol for alpha could mean "execute". Commands could consist of more than one symbol, for example two dots could be interpreted as "move relative" which would move the currently selected items by the distance between points p1 and p2 where the dots indicate the location of the points. The character recognition worked only because multiple symbol shapes were mapped to each command. 2 and Z would be nearly indistinguishable by the system. To tell the difference, multiple strokes would be required. ".2" ".Z" might be mapped to "2" while "/2" and "/Z" would be mapped to "Z" Any error a user made drawing a command sketch could trigger a command the user was not expectin
https://en.wikipedia.org/wiki/Joe%20Mangel
Joe Mangel is a fictional character from the Australian Network Ten soap opera Neighbours, played by Mark Little. He debuted on-screen in the episode airing on 8 August 1988. Joe left in 1991 when Little departed the serial. In 2005 Little agreed to reprise the role as part of Neighbours' twentieth anniversary celebrations and remained for four months. Joe's storylines included his bad relationship with his mother, being widowed, life as a single parent and a custody battle to keep his child. Joe is deemed a stereotype Australian man and a likable rogue character. Little returned to Neighbours in 2022 to celebrate the show's final episode. Casting Actor Mark Little joined the cast of Neighbours in 1988. He took up the offer to play Joe Mangel, after being blacklisted from various work opportunities due to his strong ties to the union and the "overtly political nature" of his solo theatre shows. The role was originally intended to last for three months. Of how he approached the part, Little wrote "I committed myself to the task. And I made the idea more palatable by deciding that I would treat it as a pop art experiment, after all, no one was watching. Little did I know that I would be dabbling with similar themes as Mary Shelley's Frankenstein. Like Dr. Frankenstein, I was about to create a pop monster. The wild man, Joe Mangel". Little's contract was later extended. Development Characterisation On Joe's arrival it became apparent that he was nothing like his mother Nell Mangel (Vivean Gray). Joe has been described as an "unreconstructed oaf who likes drinking beer", he is green fingered and loves gardening and also acts brutish. He also has a love for betting and likes to keep up with the status quo. Many of Joe's traits annoyed other residents, with Nell and Dorothy Burke (Maggie Dence) constantly trying to make Joe behave himself and change his ways. He would often clash with his niece Jane Harris (Annie Jones) who also hated Joe's love for loud music, football and beer drinking. When his son Toby (Ben Guerens) came to live with him he had a hard time adjusting to fatherhood and saw it as a chore at first, later he began to realise Toby's clever potential, he became proud and transformed into a good father. Through his relationship with Kerry Bishop (Linda Hartley-Clark), Joe was portrayed as being the complete opposite of her, he remained acting out his blunt and sometimes selfish ways, however, he truly loved her. Little has branded Joe as a "massive character" within the serial, also stating that viewers still have enormous affection for him due to his storylines. In an interview with the newspaper Derby Telegraph, Little described his persona and links to the British public stating: "He was a single dad, struggling to get along, a bit of a battler. He appealed to the English psyche and became a bit of a folk hero". He also spoke about Joe still representing the old Australian archetype when he returned in 2005. Little described this c
https://en.wikipedia.org/wiki/Doug%20Lea
Douglas S. Lea is a professor of computer science and current head of the computer science department at State University of New York at Oswego, where he specializes in concurrent programming and the design of concurrent data structures. He was on the Executive Committee of the Java Community Process and chaired JSR 166, which added concurrency utilities to the Java programming language (see Java concurrency). On October 22, 2010, Doug Lea notified the Java Community Process Executive Committee he would not stand for reelection. Lea was re-elected as an at-large member for the 2012 OpenJDK governing board. Publications He wrote Concurrent Programming in Java: Design Principles and Patterns, one of the first books about the subject. It is currently in its second edition. He is also the author of dlmalloc, a widely used public-domain implementation of malloc. Awards In 2010, he won the senior Dahl-Nygaard Prize. In 2013, he became a Fellow of the Association for Computing Machinery. Bibliography Concurrent Programming in Java: Design Principles and Patterns, first edition: 1997; second edition: , 1999 Java Concurrency in Practice, , 2006 (co-authored with Joshua Bloch, Brian Goetz, Tim Peierls, Joseph Bowbeer, and David Holmes) References External links Doug Lea's home page Concurrent Programming in Java: Design Principles and Patterns Java Community Process Executive Committee JSR 166: Concurrency Utilities American computer scientists American computer programmers Year of birth missing (living people) Living people State University of New York at Oswego faculty Fellows of the Association for Computing Machinery Dahl–Nygaard Prize
https://en.wikipedia.org/wiki/TIM-011
TIM 011 is an educational or personal computer for school microcomputer developed by Mihajlo Pupin Institute of Serbia in 1987. There were about 1200 TIM-011 computers in Serbian schools in the starting from 1987 and in 1990s. It were based on CP/M with Hitachi HD64180, Z80A enhanced CPU with MMU , 256KB RAM standard, 3.5" floppy drives and integrated 512 X 256 green-screen monitors with 4 levels of intensity. Reference literature Dragoljub Milićević, Dušan Hristović (Ed): "Računari TIM" (TIM Computers), Naučna knjiga, Belgrade 1990. D.B.Vujaklija, N.Markovic (Ed): "50 Years of Computing in Serbia (50 godina računarstva u Srbiji- Hronika digitalnih decenija)", DIS, IMP and PC-Press, Belgrade 2011. References Z80-based home computers Personal computers Microcomputers Mihajlo Pupin Institute
https://en.wikipedia.org/wiki/Kingston%20Technology
Kingston Technology Corporation is an American multinational computer technology corporation that develops, manufactures, sells and supports flash memory products, other computer-related memory products, as well as the HyperX gaming division (now owned by HP). Headquartered in Fountain Valley, California, United States, Kingston Technology employs more than 3,000 employees worldwide as of Q1 2016. The company has manufacturing and logistics facilities in the United States, United Kingdom, Ireland, Taiwan, and China. It is the largest independent producer of DRAM memory modules, owning approximately 68% of the third-party worldwide DRAM module market share in 2017, according to DRAMeXchange. In 2018 the company generated $7.5 billion in revenue and made #53 on the Forbes Lists of "America's Largest Private Companies 2019." Kingston serves an international network of distributors, resellers, retailers and OEM customers on six continents. The company also provides contract manufacturing and supply chain management services for semiconductor manufacturers and system OEMs. History Kingston Technology was founded on October 17, 1987, in response to a severe shortage of 1Mbit surface-mount memory chips, Chinese immigrant John Tu designed a new single in-line memory module (SIMM) that used readily available, older-technology through-hole components. In 1990 the company branched out into its first non-memory product line, processor upgrades. By 1992, the firm was ranked #1 by Inc. as the fastest-growing privately held company in America. The company expanded into networking and storage product lines, and introduced DataTraveler and DataPak portable products. In September 1994, Kingston became ISO 9000 certified on its first assessment attempt. In 1995, Kingston opened a branch office in Munich, Germany to provide technical support and marketing capabilities for its European distributors and customers. In October 1995, the company joined the "Billion-Dollar Club". After the company's 1995 sales exceeded $1.3 billion, ads ran thanking the employees ("Thanks a Billion!") with each individual employee-name in The Wall Street Journal, The Orange County Register and The Los Angeles Times. Ads also appeared in trade publications and The Wall Street Journal thanking the company's suppliers and distributors. On August 15, 1996 SoftBank Corporation of Japan acquired 80 percent of Kingston for a total of $1.8 billion. In November of the same year, Kingston and Toshiba co-marketed memory upgrades for Toshiba PCs - the first time that a PC OEM and a memory manufacturer had teamed up to create a co-branded module. In 1999, Tu and Sun eventually bought back the 80 percent of Kingston owned by Softbank for $450 million. On December 14, 1996 John Tu and David Sun allocated $71.5 million for employee bonuses as a result of the acquisition, averaging $130,000 for each of the company's 550 workers. Kingston announced a 49% increase in unit sales for its memory module
https://en.wikipedia.org/wiki/Capital%20Radio%20Network
Capital Radio Network is an Australian radio company, which owns stations in Canberra, Goulburn, Cooma, the Snowy Mountains, Gippsland and Perth. The company is a subsidiary of Blyton Group, with Kevin James Blyton as managing director for both. The company first acquired 2XL (now XLFM) in the Snowy Mountains, as well as 2CC and 2CA in Canberra - the latter two offloaded from parent companies Australian Radio Network and Austereo respectively in order for them to launch joint-venture stations 104.7 and Mix 106.3. In February 2015, Capital Radio Network acquired Gippsland-based 3GG. With the exception of XLFM, Snow FM and 3GG, all stations are operated as a 50/50 joint-venture with Grant Broadcasters. Owned and Operated Stations Canberra 2CC Talking Canberra 1206 2CC - 1206AM and DAB+ 2cc.net.au 2CA Forever Classic 2CA - 1053 AM and DAB+ KIX Country Radio 97.5FM and DAB+ My Canberra Digital DAB+ Snow FM, relayed on DAB+ Cooma/Jindabyne/Snowy Mountains XLFM 96.1FM Cooma 107.3FM Jindabyne 98.7FM Perisher Valley 92.1FM Thredbo 92.5FM Bombala 92.5FM Charlotte Pass Snow FM 97.7 FM, Cooma 94.7FM Jindabyne 101.9FM Perisher 92.9FM Thredbo 91.7FM Bombala 91.7FM Charlotte Pass DAB+ Canberra KIX Country Radio - Cooma 87.6FM, Jindabyne 88.0FM Gippsland 3GG 531 AM Goulburn GNFM 107.7 FM Eagle FM 93.5 FM KIX Country Radio 100.7FM Perth 6iX 1080 AM, 105.7FM & DAB+ KIX Country Radio DAB+ My Perth Digital DAB+ X Digital DAB+ Networks Some Capital Radio Network stations broadcast identical formats and programming in the networks below: Former Stations In the 1990s, Kevin Blyton held a 40% stake in Newcastle's NXFM. Outside of buying and selling stations in the same stations/territories as current stations, he has also held stations in Tasmania and Queenstown, New Zealand. Notes References External links 2CC 2CA 2GN 3GG EagleFM XLFM SnowFM 6iX My Perth Digital My Canberra Digital X Digital Australian radio networks
https://en.wikipedia.org/wiki/WREV
WREV (1220 AM), the format of which is known as La Grande, is a radio station in Reidsville, North Carolina broadcasting music and news in Spanish. It is part of a five-station network. Station history Prior to purchase by Que Pasa Media, WREV broadcast a country music format and aired several community-oriented talk shows. The call letters refer to the local newspaper, The Reidsville Review. WWMO, now WJMH, was co-owned with the station. References External links REV REV Radio stations established in 1948 1948 establishments in North Carolina Reidsville, North Carolina Spanish-language radio stations in North Carolina
https://en.wikipedia.org/wiki/SDI-12
SDI-12 (Serial Digital Interface at 1200 baud) is an asynchronous serial communications protocol for intelligent sensors that monitor environment data. These instruments are typically low-power (12 volts), are used at remote locations, and usually communicate with a data logger or other data acquisition device. The protocol follows a client-server configuration whereby a data logger (SDI-12 recorder) requests data from the intelligent sensors (SDI-12 sensors), each identified with a unique address. History The first version of SDI-12 was released in 1988. It was designed by a coalition which included the U.S. Geological Survey's Hydrologic Instrumentation Facility (HIF) and a group of private companies. The SDI-12 Specification is maintained by a non-profit corporation called the SDI-12 Support Group. The most recent upgrade (Version 1.4) was made in July 2016. The most recent version of the SDI-12 Specification (still version 1.4, with clarifications), was released on January 30, 2021. Versions Version 1.0 was released in 1988. Version 1.1 was released in 1994. It was a rewriting and clarification of the version 1.0 specification under contract by Michael Jablonski's NR Systems (dba Natural Resources Consulting) and Campbell Scientific. Version 1.2 was released in April 1996. It defines: Concurrent measurement command (aC!) Address query command (?!) Change address command (aAb!) Continuous measurement command (aR[0-9]!) Version 1.3 was released in April 2000 and defines: Cyclic Redundancy Check (CRC) for data validation Electrical interface characteristics such as number of conductors, voltage logic levels and transitions, and line impedance. Communications protocol such as means of establishing contact with a specific address (sensor), the measurement command set, sensor response behavior, byte frame format and allowed characters. Timing requirements such as length of the break condition used to awaken sensors, minimum time between messages and length of time before a sensor enters a low-power state. Version 1.4 was released in July 2016 and defines: High volume commands (aHA! for ASCII and aHB! for binary format) which allow up to 999 parameters to be returned from a sensor. Metadata Commands (aIM!) which provide meta data information about the measurement, such as the parameter name and units. Advantages The specification document describes a number of advantages including Interchangeability of sensors without reprogramming of data acquisition devices Power is supplied to sensors through the interface Ability to implement self-calibration algorithms within the sensor itself and use low-cost EEPROMs for information storage Applicability of training in SDI-12 to a variety of sensors and data recorders The SDI-12 Specification is in the public domain. Drawbacks Specific electrical interface (serial data line, ground line, and 12-volt line) Baud rate limited to 1200 Details Communication occurs over a single dat
https://en.wikipedia.org/wiki/Block%20matrix%20pseudoinverse
In mathematics, a block matrix pseudoinverse is a formula for the pseudoinverse of a partitioned matrix. This is useful for decomposing or approximating many algorithms updating parameters in signal processing, which are based on the least squares method. Derivation Consider a column-wise partitioned matrix: If the above matrix is full column rank, the Moore–Penrose inverse matrices of it and its transpose are This computation of the pseudoinverse requires (n + p)-square matrix inversion and does not take advantage of the block form. To reduce computational costs to n- and p-square matrix inversions and to introduce parallelism, treating the blocks separately, one derives where orthogonal projection matrices are defined by The above formulas are not necessarily valid if does not have full rank – for example, if , then Application to least squares problems Given the same matrices as above, we consider the following least squares problems, which appear as multiple objective optimizations or constrained problems in signal processing. Eventually, we can implement a parallel algorithm for least squares based on the following results. Column-wise partitioning in over-determined least squares Suppose a solution solves an over-determined system: Using the block matrix pseudoinverse, we have Therefore, we have a decomposed solution: Row-wise partitioning in under-determined least squares Suppose a solution solves an under-determined system: The minimum-norm solution is given by Using the block matrix pseudoinverse, we have Comments on matrix inversion Instead of , we need to calculate directly or indirectly In a dense and small system, we can use singular value decomposition, QR decomposition, or Cholesky decomposition to replace the matrix inversions with numerical routines. In a large system, we may employ iterative methods such as Krylov subspace methods. Considering parallel algorithms, we can compute and in parallel. Then, we finish to compute and also in parallel. See also References External links The Matrix Reference Manual by Mike Brookes Linear Algebra Glossary by John Burkardt The Matrix Cookbook by Kaare Brandt Petersen Lecture 8: Least-norm solutions of undetermined equations by Stephen P. Boyd Numerical linear algebra Matrix theory
https://en.wikipedia.org/wiki/Supernova%20Cosmology%20Project
The Supernova Cosmology Project is one of two research teams that determined the likelihood of an accelerating universe and therefore a positive cosmological constant, using data from the redshift of Type Ia supernovae. The project is headed by Saul Perlmutter at Lawrence Berkeley National Laboratory, with members from Australia, Chile, France, Portugal, Spain, Sweden, the United Kingdom, and the United States. This discovery was named "Breakthrough of the Year for 1998" by Science Magazine and, along with the High-z Supernova Search Team, the project team won the 2007 Gruber Prize in Cosmology and the 2015 Breakthrough Prize in Fundamental Physics. In 2011, Perlmutter was awarded the Nobel Prize in Physics for this work, alongside Adam Riess and Brian P. Schmidt from the High-z team. Findings Both the Super Cosmology Project and the High-Z Supernova Search Team, another team who was doing the same research, expected to find that the universe is either expanding then contracting as one way to explain the expanding universe idea or the universe must be expanding at a slow rate that will slow over time. However, in January 1998, the Supernova Cosmology project presented evidence that the expansion of the universe is not slowing at all and is in reality accelerating, citing Einstein's previously dismissed cosmological constant, Λ, which potentially includes up to 70% of the universe's total mass-energy density. Theory validation In order to determine what was happening to the universe, the researchers had to measure the speed of astronomical objects that are travelling away from us as well as how far away these objects actually are. In order to do any of this, the researchers had to find a standard light source that was bright enough to be seen with our telescopes due to the large distances away these objects would be. They chose to use Type Ia Supernovae, exploding stars, as their standard light source. Methods Type Ia supernovae are very bright standard candles, which makes it possible to calculate their distance to earth from the observed luminosity. Type Ia supernovae are rare in most galaxies, only occurring about two or three times in a thousand years. Before the Supernova Cosmology Project, it was difficult to find supernovae due to lesser telescopes. However, by scanning the night sky over individual periods of three weeks astronomers were able to find up to two dozen per session, giving them enough supernovae observations to conduct their study. Project members The team members are: Saul Perlmutter, Lawrence Berkeley National Laboratory Gregory Aldering, Lawrence Berkeley National Laboratory Brian J. Boyle, Australia Telescope National Facility Shane Burns, Colorado College Patricia G. Castro, Instituto Superior Técnico, Lisbon Warrick Couch, Swinburne University of Technology Susana Deustua, American Astronomical Society Richard Ellis, California Institute of Technology Sebastien Fabbro, Instituto Superior Técnico, Lisbon
https://en.wikipedia.org/wiki/Star%20FM%20%28Australia%29
Star FM was an Australian radio network, consisting of Top 40/CHR formatted stations in New South Wales, Victoria and South Australia. The brand was created by DMG Regional Radio in 1999, with the network being sold to Southern Cross Austereo. Programming The network's stations are aimed at the under-35 section of the market, playing Top 40 and popular music. For most stations, the only local program heard on these stations is the breakfast programme, with Alo Baker's Workday networked from the Gold Coast Media Centre, and drive/nights programming coming from Southern Cross Austereo's metropolitan stations Fox FM in Melbourne and 2Day FM in Sydney. In 2007, Star FM changed its major positioning statement from "Todays Best Music" to "Your HIT Music Station". The positioning statement was changed again in June 2011 to "Your #1 HIT Music Station" and following the Southern Cross Media/Austereo merger and became "Fresh & First" in 2013 until recently it was changed again to "Hits & Old Skool" On 15 December 2016, all stations that are a part of the Hit Network were rebranded as Hit, meaning that the Star FM and Hot FM brandings ceased to exist. Stations New South Wales 2AAY 104.9 MHz Albury 2CSF 105.5 MHz Coffs Harbour 2DBO 93.5 MHz Dubbo 2GZF 105.9 MHz Orange 2RGF 99.7 MHz Griffith 2ROX 105.1 MHz Kempsey/102.3 MHz Port Macquarie 2WZD 93.1 MHz Wagga Wagga Victoria 3BDG 91.9 MHz Bendigo 3MDA 99.5 MHz Mildura 3SEA 94.3 MHz and 97.9 MHz Gippsland (formerly Sea FM) 3SUN 96.9 MHz Shepparton (formerly Sun FM) South Australia 5SEF 96.1 MHz Mount Gambier References External links Star FM Wild Revolution Contemporary hit radio stations in Australia Defunct Australian radio networks Southern Cross Media Group 1999 establishments in Australia
https://en.wikipedia.org/wiki/Hot%20FM%20%28Australian%20radio%20network%29
Hot FM was a radio network broadcasting to Queensland and Western Australia. Owned and operated by Southern Cross Austereo, the stations broadcast a mix of local and networked programming. On 15 December 2016, the stations were merged into the Hit Network. History The first Hot FM branded station was launched in Townsville by Rural Press in 1994. This was followed by successive launches in Mackay and Cairns, before a sale to DMG Regional Radio saw the brand expand throughout Queensland and into Western Australia. In 2004, Hot FM and its heritage sister stations - including the RadioWest network in Western Australia - were sold to Macquarie Regional RadioWorks. In 2005, following DMG's purchase of an FM radio licence in Brisbane, Hot 91.1 Sunshine Coast was sold to A Investments, and later to Prime Media Group. Under DMG's ownership, network stations broadcast a variety of local and networked programming, from network hubs based in Townsville, Bunbury, Albury and the Gold Coast. Following the merger of Southern Cross Media with Austereo in February 2011, the Hot FM network - along with regional counterparts Sea FM and Star FM - became more closely aligned with the Today Network, including networking programming from 2DayFM Sydney and Fox FM Melbourne. On 15 December 2016, as part of a national brand consolidation by parent company Southern Cross Austereo, the stations were merged into the Hit Network. List of stations As of 14 December 2016, the Hot FM network comprised 8 stations: Hot FM Cairns Hot FM Central Queensland Hot FM Charters Towers (Owned & operated by Resonate Broadcasting) Hot FM Mackay Hot FM Mount Isa Hot FM Queensland Hot FM Townsville Hot FM Western Australia References Defunct Australian radio networks Southern Cross Media Group Radio stations established in 1994 Radio stations disestablished in 2016
https://en.wikipedia.org/wiki/Anne%20Dudek
Anne Louise Dudek (born March 22, 1975) is an American actress. She is known for portraying Tiffany Wilson in the 2004 film White Chicks, Danielle Brooks in the USA Network television series Covert Affairs, Dr. Amber Volakis on the Fox series House, Lura Grant on the HBO series Big Love, and Francine Hanson on the AMC series Mad Men. She has also starred in the British television series The Book Group. Early life Dudek was born in Boston, Massachusetts, and grew up in Newton, Massachusetts. Her father was an architect. She graduated from Newton North High School and attended Northwestern University. Career From the mid-1990s (while at Northwestern University) through 2001, Dudek appeared in various theater productions and on Broadway. She made her Broadway debut in Wrong Mountain in 2000. She won the Connecticut Critics Circle Award for outstanding performance in The Glass Menagerie. After success on Broadway, she made the jump to television. Her first starring role on television came when she was cast as the lead in the British comedy drama The Book Group. The show aired on Channel 4 in the United Kingdom to rave reviews. In her native United States, Dudek has since guest starred on other TV shows, including Desperate Housewives (as Karl Mayer's girlfriend in Season 1), How I Met Your Mother (as 'Nathalie', Ted's Krav Maga-trained ex-girlfriend), Friends (as 'Precious', Mike Hannigan's girlfriend), ER (as a mother who accidentally shot her son), Charmed, Bones (as Seeley Booth's lawyer girlfriend), Numb3rs, and Six Feet Under. She also played Lucinda Barry in the pilot episode of Psych, and a teacher who has a sexual relationship with one of her students (based on the case of Debra Lafave) on Law & Order: Criminal Intent. In both Friends and How I Met Your Mother, her character was dumped on her birthday. Dudek appeared in several episodes of the HBO series Big Love as a child bride. Dudek had a role on House (recurring from season 4 onwards) as Amber Volakis, one of 40 physicians under consideration by Dr. House for permanent positions on his team. Her character, nicknamed "Cutthroat Bitch" by House, continued to the end of season 4 but was killed off in the two-part season finale, "House's Head" and "Wilson's Heart". She would later reappear as a hallucination by House in the season 5 episode "Saviors", appearing in this form for the remainder of the season. Dudek later appeared in Mad Men as next-door neighbor Francine Hanson, and on Big Love as one of antagonist Alby Grant's wives, both recurring roles. In 2010, she joined the cast of Covert Affairs. She played Anthony Hopkins' character's daughter in the 2003 film The Human Stain, and cruise line heir Tiffany Wilson in the 2004 comedy film White Chicks. In 2012, she played an ISS astronaut in one episode of the TV show Touch. She also reprised her role as Amber Volakis for the House series finale "Everybody Dies". In 2015, Dudek played villainess Dawn Lin in an episode of NCIS: New
https://en.wikipedia.org/wiki/Database%20security
Database security concerns the use of a broad range of information security controls to protect databases (potentially including the data, the database applications or stored functions, the database systems, the database servers and the associated network links) against compromises of their confidentiality, integrity and availability. It involves various types or categories of controls, such as technical, procedural/administrative and physical. Security risks to database systems include, for example: Unauthorized or unintended activity or misuse by authorized database users, database administrators, or network/systems managers, or by unauthorized users or hackers (e.g. inappropriate access to sensitive data, metadata or functions within databases, or inappropriate changes to the database programs, structures or security configurations); Malware infections causing incidents such as unauthorized access, leakage or disclosure of personal or proprietary data, deletion of or damage to the data or programs, interruption or denial of authorized access to the database, attacks on other systems and the unanticipated failure of database services; Overloads, performance constraints and capacity issues resulting in the inability of authorized users to use databases as intended; Physical damage to database servers caused by computer room fires or floods, overheating, lightning, accidental liquid spills, static discharge, electronic breakdowns/equipment failures and obsolescence; Design flaws and programming bugs in databases and the associated programs and systems, creating various security vulnerabilities (e.g. unauthorized privilege escalation), data loss/corruption, performance degradation etc.; Data corruption and/or loss caused by the entry of invalid data or commands, mistakes in database or system administration processes, sabotage/criminal damage etc. Ross J. Anderson has often said that by their nature large databases will never be free of abuse by breaches of security; if a large system is designed for ease of access it becomes insecure; if made watertight it becomes impossible to use. This is sometimes known as Anderson's Rule. Many layers and types of information security control are appropriate to databases, including: Access control Auditing Authentication Encryption Integrity controls Backups Application security Database Security applying Statistical Method Databases have been largely secured against hackers through network security measures such as firewalls, and network-based intrusion detection systems. While network security controls remain valuable in this regard, securing the database systems themselves, and the programs/functions and data within them, has arguably become more critical as networks are increasingly opened to wider access, in particular access from the Internet. Furthermore, system, program, function and data access controls, along with the associated user identification, authentication and rights management fu
https://en.wikipedia.org/wiki/And-inverter%20graph
An and-inverter graph (AIG) is a directed, acyclic graph that represents a structural implementation of the logical functionality of a circuit or network. An AIG consists of two-input nodes representing logical conjunction, terminal nodes labeled with variable names, and edges optionally containing markers indicating logical negation. This representation of a logic function is rarely structurally efficient for large circuits, but is an efficient representation for manipulation of boolean functions. Typically, the abstract graph is represented as a data structure in software. Conversion from the network of logic gates to AIGs is fast and scalable. It only requires that every gate be expressed in terms of AND gates and inverters. This conversion does not lead to unpredictable increase in memory use and runtime. This makes the AIG an efficient representation in comparison with either the binary decision diagram (BDD) or the "sum-of-product" (ΣoΠ) form, that is, the canonical form in Boolean algebra known as the disjunctive normal form (DNF). The BDD and DNF may also be viewed as circuits, but they involve formal constraints that deprive them of scalability. For example, ΣoΠs are circuits with at most two levels while BDDs are canonical, that is, they require that input variables be evaluated in the same order on all paths. Circuits composed of simple gates, including AIGs, are an "ancient" research topic. The interest in AIGs started with Alan Turing's seminal 1948 paper on neural networks, in which he described a randomized trainable network of NAND gates. Interest continued through the late 1950s and continued in the 1970s when various local transformations have been developed. These transformations were implemented in several logic synthesis and verification systems, such as Darringer et al. and Smith et al., which reduce circuits to improve area and delay during synthesis, or to speed up formal equivalence checking. Several important techniques were discovered early at IBM, such as combining and reusing multi-input logic expressions and subexpressions, now known as structural hashing. Recently there has been a renewed interest in AIGs as a functional representation for a variety of tasks in synthesis and verification. That is because representations popular in the 1990s (such as BDDs) have reached their limits of scalability in many of their applications. Another important development was the recent emergence of much more efficient boolean satisfiability (SAT) solvers. When coupled with AIGs as the circuit representation, they lead to remarkable speedups in solving a wide variety of boolean problems. AIGs found successful use in diverse EDA applications. A well-tuned combination of AIGs and boolean satisfiability made an impact on formal verification, including both model checking and equivalence checking. Another recent work shows that efficient circuit compression techniques can be developed using AIGs. There is a growing understan
https://en.wikipedia.org/wiki/Thoroughbred%20Racing%20on%20NBC
Thoroughbred Racing on NBC is the de facto title for a series of horse races events whose broadcasts are produced by NBC Sports, the sports division of the NBC television network in the United States. NBC's relationship with the Triple Crown of Thoroughbred Racing dates back to 1949 when the NBC Red Network carried the first radio broadcast of the Kentucky Derby. , race coverage is helmed by, among others, host Mike Tirico, along with analysts Randy Moss and Jerry Bailey, handicappers Eddie Olczyk and Britney Eurton, reporters Kenny Rice, Donna Barton Brothers, Ahmed Fareed and Nick Luck and track announcer Larry Collmus. History Kentucky Derby NBC's relationship with the races that comprise the Triple Crown thoroughbred racing series began in 1949, when the NBC Red Network carried the first radio broadcast of the Kentucky Derby. One week after ESPN signed the Breeders' Cup deal, NBC struck a five-year broadcasting deals with Churchill Downs and Magna Entertainment Corporation, the backers of the Kentucky Derby and Preakness Stakes; NBC renewed its agreement with Churchill Downs in 2010, in a five-year deal through 2015. Breeders' Cup NBC gained the broadcast rights to the Breeders' Cup from its inception in 1984. The network ran the race until 2005, when ESPN signed an eight-year television contract to broadcast the race starting in 2006. In 2012, NBC regained the broadcast rights for the Breeders' Cup. Most races are shown on the NBC Sports Network, while the Classic is broadcast on the main network. NBC subsequently announced plans to also broadcast select races from the Breeders' Cup Challenge series throughout the year. In 2016, nine telecasts were made covering 16 "Win and You're In" races. The Triple Crown In October 1999, NBC Sports won the rights to broadcast the three races in the Triple Crown series (the Kentucky Derby, Preakness Stakes and Belmont Stakes) beginning with the 2001 races. NBC loses the Belmont Stakes On October 4, 2004, citing a dispute about profits accrued from the deal, the New York Racing Association agreed to move the broadcast rights to the Belmont Stakes to ABC/ESPN starting with the 2006 race. NBC retained rights to the Kentucky Derby and Preakness Stakes. Some believe the move was a result of the New York Racing Association's decision to break ranks with the other two tracks on a television contract. NBC Sports continued to broadcast the Kentucky Derby and Preakness Stakes rights until 2010. Triple Crown Productions was formed in 1986 with ABC; prior to that, the individual racing associations reached their own deals with television networks. Prior to the change, on May 21, 2005, Visa, Inc. officially withdrew its sponsorship of the Triple Crown, effective with the 2006 races; this relieved the company from paying the US$5,000,000 bonus to the owner of the horse that wins the Triple Crown. Sponsorship of the races was taken over by Triple Crown Productions in 2006. NBC reassembles The Triple Crown On Feb
https://en.wikipedia.org/wiki/Origination%20%28telephony%29
Origination in VOIP telephony refers to calls that originate in the PSTN public switched telephone network and are carried to their destination over the Internet. A VOIP call is initiated between two points, the initiation point is known as originator and the destination point is known as terminator. An Internet Telephony Service Provider (ITSP) involved in the origination of telephone calls usually offers either or both of “PC to Phone calls” and “Phone to Phone calls”. The two major business models for VOIP Originator are “Prepaid” and “Postpaid”. Hardware requirements for VoIP origination are simple. The only hardware needed is a gateway that takes calls off the Internet and delivers them onto PSTN lines. All VoIP originators require a call termination arrangement with a terminator called VoIP terminator. Introduction An ITSP (Internet Telephony Service Provider) involved in the origination of telephone calls usually offers either or both of: • PC to Phone calls • Phone to Phone calls The two major business models are: • Prepaid • Postpaid Hardware requirements Hardware requirements for VoIP origination are simple. The only hardware needed is a gateway that takes calls off the Internet and delivers them onto PSTN lines. A gateway therefore has two types of Interfaces. 1. An Ethernet interface that connects the gateway to the Internet. 2. One or more telephony interfaces taking analog or digital phone lines. An analog line can take one phone call at a time while a digital line can take more. A T1 line takes 24 calls and supports 1.5 Mbits while an E1 line takes 30 calls and supports 2Mbits simultaneously. A typical digital gateway has 4 T1s or 4 E1s Flow of Call A gatekeeper is an application that receives the registration requests and calls from a dialer. When a user signs into the dialer, the request goes to the gatekeeper. The gatekeeper asks the Radius server to see if the username and password are correct and valid. The Radius server queries the database and sends a yes/no reply to the gatekeeper. If authenticated, the user can then make phone calls from the dialer. When the user dials a phone number in the dialer, the request again goes to the gatekeeper, gatekeeper again asks the Radius server if the user is allowed to make this call and has enough money to initiate it. The Radius server asks the billing server for the maximum duration of call can be allowed to this user based on the amount of money remaining in his account or prepaid card. The billing solution looks up the destination of the call, finds the appropriate rate based on the peak/ off peak hours and the type of the customer and informs the Radius server exact duration in seconds that the user can call to this destination. The same info is returned by the Radius server to the gatekeeper and the gatekeeper informs the dialer the IP address of the destination gateway that can deliver the voice call to the destination. Given this information, the call is i
https://en.wikipedia.org/wiki/PC%20Paintbrush
PC Paintbrush was a graphics editing software created by the ZSoft Corporation in 1984 for computers running the MS-DOS operating system. History It was originally developed as a response to the first paintbrush program for the IBM PC, PCPaint, which had been released the prior year by Mouse Systems, the company responsible for bringing the mouse to the IBM PC for the first time. In 1984, Mouse Systems had released PCPaint to compete with Apple Paint on the Apple II computer and was already positioned to compete with MacPaint on Apple Computer's new Macintosh platform. Unlike MacPaint, PCPaint enabled users to work in color. When Paintbrush was released the following year, PCPaint had already added 16-color support for the PC's 64-color Enhanced Graphics Adapter (EGA), and Paintbrush followed with the PC's advantage of EGA support as well. (The EGA supported 64 colors, of which any 16 could be on the screen at a time in normal use.) Also following the lead of Mouse Systems and PCPaint, one of the first pieces of software on the PC to use a computer mouse pointing device, the earliest versions of Paintbrush were distributed by Microsoft, with a mouse included. Both Microsoft and their competitor, Mouse Systems, bundled their mice with Mouse Systems' PCPaint in 1984. At Christmas 1984, amidst record sales volumes in the home computer market, Microsoft had created a "sidecar" bundle for the PCjr, complete with their mouse, but with their competitor's product, PCPaint. With the release of Paintbrush the following year, Microsoft no longer needed to sell the software of their competitor in the PC mouse hardware market in order to have the same market advantage. Microsoft's mechanical mice outsold Mouse Systems' optical mice after a few years, but PCPaint outsold Paintbrush until the late 1980s. Unlike most other applications before and since, Paintbrush version numbers were recorded with Roman numerals (ex: PC Paintbrush II, PC Paintbrush IV ). Along with the release of Paintbrush, ZSoft, following in the footsteps of PCPaint's Pictor PIC format, the first popular image format for the PC, created the PCX image format. Version history The first version of PC Paintbrush released in 1984 only allowed the use of a limited EGA 16-color palette. PC Paintbrush II was released in 1985. PC Paintbrush 3.10 was released in 1986. PC Paintbrush Plus 1.20 was released in 1987. In 1987 a Microsoft licensed version was released as Microsoft Paintbrush 2.0. It supported saving images in PCX or GX1 file formats. It featured adjustable palettes, different aspect ratios, fifteen fonts and supported printers, amongst other options. A Windows 1 and 2 version, named PC Paintbrush 1.05 for Microsoft Windows was released the same year. A version called Publisher's Paintbrush allowed import of images via TWAIN-based capture devices like hand-held and flatbed scanners. PC Paintbrush III was released in 1988, allowing 256 colors and extended SVGA resolution
https://en.wikipedia.org/wiki/Differential%20inheritance
Differential inheritance is a common inheritance model used by prototype-based programming languages such as JavaScript, Io and NewtonScript. It operates on the principle that most objects are derived from other, more general objects, and only differ in a few small aspects; while usually maintaining a list of pointers internally to other objects which the object differs from. An analogy To think of differential inheritance, you think in terms of what is different. So for instance, when trying to describe to someone how Dumbo looks, you could tell them in terms of elephants: Think of an elephant. Now Dumbo is a lot shorter, has big ears, no tusks, a little pink bow and can fly. Using this method, you don't need to go on and on about what makes up an elephant, you only need to describe the differences; anything not explicitly different can be safely assumed to be the same. See also Single inheritance External links from MDN Web Docs Prototype-based programming
https://en.wikipedia.org/wiki/RC%20algorithm
The RC algorithms are a set of symmetric-key encryption algorithms invented by Ron Rivest. The "RC" may stand for either Rivest's cipher or, more informally, Ron's code. Despite the similarity in their names, the algorithms are for the most part unrelated. There have been six RC algorithms so far: RC1 was never published. RC2 was a 64-bit block cipher developed in 1987. RC3 was broken before ever being used. RC4 is a stream cipher. RC5 is a 32/64/128-bit block cipher developed in 1994. RC6, a 128-bit block cipher based heavily on RC5, was an AES finalist developed in 1997. References Cryptographic algorithms
https://en.wikipedia.org/wiki/Supertalk%20Mississippi
Telesouth Communications Inc, also known as SuperTalk Mississippi Media, is an American, commercial radio network based in Jackson, Mississippi. Its stations across Mississippi broadcast either a music format, or conservative news / talk and sports under the SuperTalk brand. The network's talk stations carry a mix of syndicated national shows, its programming, and material produced at the individual stations. Sports schedules are matched to teams based in local markets. History In 1979, Steve Davenport was hired to manage the Love Communications owned Mississippi Agriculture and News Network in Jackson, Mississippi. Shortly afterwards it was purchased by Baton Rouge-based Interstate Communications and merged with Louisiana Network Inc. Soon, production of news reports and short features for Mississippi radio stations evolved to include longer lifestyle, and sports phone-in programs. The firm began broadcasting live football and basketball from the University of Southern Mississippi in 1984 and went on to take sports broadcast franchises for the University of Mississippi and University of Southern Mississippi. As well as programming for Mississippi and Louisiana, the South Carolina News Network was also produced from Jackson until 2008. Following disagreement over a $25,000 annual franchise fee for the Ole Miss Rebels, Steve Davenport and his business partners the Hanley family of Hazlehurst agreed to purchase Interstate Communications' Mississippi market business, Mississippi Networks Inc, for $300,000 in 1985. Davenport bought out the Hanley's stake in 2008. Amid financial turmoil in 1988, Telesouth sold its newly acquired Biloxi radio station. However, it went on to buy radio stations, eventually covering all 82 counties of Mississippi. In 1995, the business name was changed to Telesouth Communications Inc, and in 1997 current flagship WFMN (Flora) and WTCD (Indianola) stations were purchased and converted to pioneer a "SuperTalk" conservative talk show format. Jackson State Tigers football was added to the sport broadcast roster in 1998, and the Southern Urban News Network established to produce news features for radio stations in urban markets across Mississippi. The Urban News Network was merged with the firm's Mississippi News Network in 2011. Telesouth began to divest college sports broadcast franchises from 2011, and to purchase music radio stations. The franchise agreement with Ole Miss had been renewed in 2007 guaranteeing a minimum fee of $27 million over ten years and substantial investment by the broadcaster in facilities at Vaught–Hemingway Stadium, including a $6 million jumbotron. The agreement was taken over by Learfield in 2012. The franchise fee, payable by Telesouth to the University of Mississippi, for its final year of Ole Miss Rebels football was $3 million. Purchases included Biloxi music stations from Alpha Media in 2018. Between 2013 and 2018, sport, and then feel-good and lifestyle programming, were added to
https://en.wikipedia.org/wiki/RealJukebox
RealJukebox was a computer program released by RealNetworks that allowed users to organise their digital music. It was first released in May 1999. By late 2001 the functionality of the program had been integrated into the Real's core media player program, RealPlayer. Versions RealJukebox came in two flavors. Basic and Plus. The basic player had the ability to rip music, but its ability was limited to 96kbit/s for MP3 Music. It also disabled several features such as advanced automatic playlists, crossfading, format conversion, jewel case label printing, equalizer functionality, and had a limitation on the number of discs that could be burned. The program did display advertising and has the ability to be removed if one pays a registration fee to remove the advertising and other program limitations. References Windows media players
https://en.wikipedia.org/wiki/Realizer
Realizer may refer to: For its use in mathematics see Order dimension CA-Realizer, the programming language similar to Visual Basic created by Computer Associates
https://en.wikipedia.org/wiki/Bird%E2%80%93Meertens%20formalism
The Bird–Meertens formalism (BMF) is a calculus for deriving programs from program specifications (in a functional programming setting) by a process of equational reasoning. It was devised by Richard Bird and Lambert Meertens as part of their work within IFIP Working Group 2.1. It is sometimes referred to in publications as BMF, as a nod to Backus–Naur form. Facetiously it is also referred to as Squiggol, as a nod to ALGOL, which was also in the remit of WG 2.1, and because of the "squiggly" symbols it uses. A less-used variant name, but actually the first one suggested, is SQUIGOL. Basic examples and notations Map is a well-known second-order function that applies a given function to every element of a list; in BMF, it is written : Likewise, reduce is a function that collapses a list into a single value by repeated application of a binary operator. It is written / in BMF. Taking as a suitable binary operator with neutral element e, we have Using those two operators and the primitives (as the usual addition), and (for list concatenation), we can easily express the sum of all elements of a list, and the flatten function, as and , in point-free style. We have: Similarly, writing for functional composition and for conjunction, it is easy to write a function testing that all elements of a list satisfy a predicate p, simply as : Bird (1989) transforms inefficient easy-to-understand expressions ("specifications") into efficient involved expressions ("programs") by algebraic manipulation. For example, the specification "" is an almost literal translation of the maximum segment sum problem, but running that functional program on a list of size will take time in general. From this, Bird computes an equivalent functional program that runs in time , and is in fact a functional version of Kadane's algorithm. The derivation is shown in the picture, with computational complexities given in blue, and law applications indicated in red. Example instances of the laws can be opened by clicking on [show]; they use lists of integer numbers, addition, minus, and multiplication. The notation in Bird's paper differs from that used above: , , and correspond to , , and a generalized version of above, respectively, while and compute a list of all prefixes and suffixes of its arguments, respectively. As above, function composition is denoted by "", which has lowest binding precedence. In the example instances, lists are colored by nesting depth; in some cases, new operations are defined ad hoc (grey boxes). The homomorphism lemma and its applications to parallel implementations A function h on lists is called a list homomorphism if there exists an associative binary operator and neutral element such that the following holds: The homomorphism lemma states that h is a homomorphism if and only if there exists an operator and a function f such that . A point of great interest for this lemma is its application to the derivation of highly parallel impl
https://en.wikipedia.org/wiki/Narus%20Inc.
Narus Inc. was a software company and vendor of big data analytics for cybersecurity. History In 1997, Ori Cohen, Vice President of Business and Technology Development for VDONet, founded Narus with Stas Khirman in Israel. Presently, they are employed with Deutsche Telekom AG and are not members of Narus' executive team. In 2010, Narus became a subsidiary of Boeing, located in Sunnyvale, California. In 2015, Narus was sold to Symantec. Here are some of the key events in Narus's history: 1997: Narus is founded. 2001: Narus's products are used to track the September 11th terrorist attacks. 2004: Narus's products are used to track the spread of the Stuxnet worm. 2014: Narus is acquired by Boeing. 2015: Boeing's Phantom Works Intelligence & Analytics business is formed. Narus was a pioneer in the field of big data analytics for cybersecurity. The company's products helped to protect organizations from a variety of cyber threats. Narus's products are no longer available, but Boeing's Phantom Works Intelligence & Analytics business continues to offer cybersecurity solutions. Management In 2004, Narus employed former Deputy Director of the National Security Agency, William Crowell as a director. From the Press Release announcing this: Narus software Narus software primarily captures various computer network traffic in real-time and analyzes results. Before 9/11 Narus built carrier-grade tools to analyze IP network traffic for billing purposes, to prevent what Narus called "revenue leakage". Post-9/11 Narus added more "semantic monitoring abilities" for surveillance. Mobile Narus provided Telecom Egypt with deep packet inspection equipment, a content-filtering technology that allows network managers to inspect, track and target content from users of the Internet and mobile phones, as it passes through routers. The national telecommunications authorities of both Pakistan and Saudi Arabia are global Narus customers. Controversies AT&T wiretapping room Narus supplied the software and hardware used at AT&T wiretapping rooms, according to whistleblowers Thomas Drake, and Mark Klein. See also Carnivore (software) Communications Assistance For Law Enforcement Act Computer surveillance ECHELON Hepting vs. AT&T, the 2006 lawsuit in which the Electronic Frontier Foundation alleges AT&T allowed the NSA to tap the entirety of its clients' Internet and voice over IP communications using Narus equipment. Lincoln (surveillance) Room 641A SIGINT Total Information Awareness Verint Systems References External links Wired News article Wired News article (AT&T whistleblower Mark Klein discusses Narus STA 6400) Frontline Flash Video "Spying on the Home Front" TV documentary originally aired on PBS 15 May 2007 with a section entitled "The NSA's Eavesdropping at AT&T" with the story of Mark Klein exposing NSA wiretapping with a secure room and Narus STA 6400 at an AT&T facility in San Francisco, CA Software companies established in 1997 Softwar
https://en.wikipedia.org/wiki/Sequential%20estimation
In statistics, sequential estimation refers to estimation methods in sequential analysis where the sample size is not fixed in advance. Instead, data is evaluated as it is collected, and further sampling is stopped in accordance with a predefined stopping rule as soon as significant results are observed. The generic version is called the optimal Bayesian estimator, which is the theoretical underpinning for every sequential estimator (but cannot be instantiated directly). It includes a Markov process for the state propagation and measurement process for each state, which yields some typical statistical independence relations. The Markov process describes the propagation of a probability distribution over discrete time instances and the measurement is the information one has about each time instant, which is usually less informative than the state. Only the observed sequence will, together with the models, accumulate the information of all measurements and the corresponding Markov process to yield better estimates. From that, the Kalman filter (and its variants), the particle filter, the histogram filter and others can be derived. It depends on the models, which one to use and requires experience to choose the right one. In most cases, the goal is to estimate the state sequence from the measurements. In other cases, one can use the description to estimate the parameters of a noise process for example. One can also accumulate the unmodeled statistical behavior of the states projected in the measurement space (called innovation sequence, which naturally includes the orthogonality principle in its derivations to yield an independence relation and therefore can be also cast into a Hilbert space representation, which makes it very intuitive) over time and compare it with a threshold, which then corresponds to the aforementioned stopping criterion. One difficulty is to setup the initial conditions for the probabilistic models, which is in most cases done by experience, data sheets or precise measurements with a different setup. The statistical behaviour of the heuristic/sampling methods (e.g. particle filter or histogram filter) depends on many parameters and implementation details and should not be used in safety critical applications (since it is very hard to yield theoretical guarantees or do proper testing), unless one has a very good reason. If there is a dependence of each state on an overall entity (e.g. a map or simply an overall state variable), one typically uses SLAM (simultaneous localization and mapping) techniques, which include the sequential estimator as a special case (when the overall state variable has just one state). It will estimate the state sequence and the overall entity. There are also none-causal variants, that have all measurements at the same time, batches of measurements or revert the state evolution to go backwards again. These are then, however, not real time capable (except one uses a really big buffer, that lowers t
https://en.wikipedia.org/wiki/Code%20audit
A software code audit is a comprehensive analysis of source code in a programming project with the intent of discovering bugs, security breaches or violations of programming conventions. It is an integral part of the defensive programming paradigm, which attempts to reduce errors before the software is released. C and C++ source code is the most common code to be audited since many higher-level languages, such as Python, have fewer potentially vulnerable functions (e.g., functions that do not check bounds). Guidelines When auditing software, every critical component should be audited separately and together with the entire program. It is a good idea to search for high-risk vulnerabilities first and work down to low-risk vulnerabilities. Vulnerabilities in between high-risk and low-risk generally exist depending on the situation and how the source code in question is being used. Application penetration testing tries to identify vulnerabilities in software by launching as many known attack techniques as possible on likely access points in an attempt to bring down the application. This is a common auditing method and can be used to find out if any specific vulnerabilities exist, but not where they are in the source code. Some claim that end-of-cycle audit methods tend to overwhelm developers, ultimately leaving the team with a long list of known problems, but little actual improvement; in these cases, an in-line auditing approach is recommended as an alternative. High-risk vulnerabilities Some common high-risk vulnerabilities may exist due to the use of: Non-bounds-checking functions (e.g., strcpy, sprintf, vsprintf, and sscanf) that could lead to a buffer overflow vulnerability Pointer manipulation of buffers that may interfere with later bounds checking, e.g.: if ((bytesread = net_read(buf,len)) > 0) buf += bytesread; Calls like execve(), execution pipes, system() and similar things, especially when called with non-static arguments Input validation, e.g. (in SQL): statement := "SELECT * FROM users WHERE name = '" + userName + "';" is an example of a SQL injection vulnerability File inclusion functions, e.g. (in PHP): include($page . '.php'); is an example of a Remote File Inclusion vulnerability For libraries that may be linked with malicious code, returning the reference to the internal mutable data structure (record, array). Malicious code may try to modify the structure or retain the reference to observe the future changes. Low-risk vulnerabilities The following is a list of low-risk vulnerabilities that should be found when auditing code, but do not produce a high risk situation. Client-side code vulnerabilities that do not affect the server side (e.g., cross-site scripting) Username enumeration Directory traversal Sensitive API keys Tools Source code auditing tools generally look for common vulnerabilities and only work for specific programming languages. Such automated tools could be used to save time, but should not be
https://en.wikipedia.org/wiki/Infralec
Infralec was a short-lived electricity distribution subsidiary in the United Kingdom. Infralec was established in February 2000 by Hyder to operate the Welsh electricity distribution network previously operated under the SWALEC brand, when the rest of Hyder was sold to British Energy. In 2001, Hyder was purchased by Western Power Distribution who sold off most parts of the organisation but kept Infralec, which was rebranded as WPD South Wales. References Electric power companies of the United Kingdom Energy in Wales Defunct companies of the United Kingdom Energy companies established in 2000 Technology companies disestablished in 2001 2001 mergers and acquisitions
https://en.wikipedia.org/wiki/Refresh
Refresh may refer to: Refresh rate, the rate at which a display illuminates Meta refresh, an HTML tag Memory refresh, reading and writing to the same area of computer memory Refreshable braille display, a device for blind computer users USS Refresh (AM-287), an Admirable-class minesweeper built for the U.S. Navy during World War II Refresh (EP), mini album by South Korean girl group CLC Refresh FM, Christian radio station in South and Central Manchester, England Refresh UK, a brewing business started in 2000
https://en.wikipedia.org/wiki/Read%E2%80%93write%20memory
Read–write memory, or RWM is a type of computer memory that can be easily written to as well as read from using electrical signaling normally associated with running a software, and without any other physical processes. The related storage type RAM means something different; it refers to memory that can access any memory location in a constant amount of time. The term might also refer to memory locations having both read and write permissions. In modern computer systems using memory segmentation, each segment has a length and set of permissions associated with it. Types Read–write memory is composed of either volatile or non-volatile types of storage. Volatile memory is usually in the form of a microchip or other hardware that requires an external power source to enable data to persist. Non-volatile memory is considered static, or storage-type memory. This means that you can write data to it, and that information will persist even in the absence of a power source. Typically read-write speeds are limited to its bandwidth or have mechanical limitations of either rotation speeds and arm movement delays for storage types such as Cloud Storage, Hard Disk Drive or CD-RWs, DVD-RWs, SD cards, Solid State Drive, SRAM, and DRAM, or other integrated circuitry. History San Francisco in 1956, IBM was the first company to develop and sell the first commercial Hard Disk Drive (HDD). The drive was the Model 350 disk storage unit, which was 3.75 Megabytes of data storage capacity and had fifty 24-inch diameter disks stacked on a spindle and sold to Zellerbach paper. See also Read-mostly memory (RMM) Random-access memory (RAM) References Footnotes Computer memory
https://en.wikipedia.org/wiki/Pecom%2032
Pecom 32 is an educational and/or home computer developed by Elektronska Industrija Niš of Serbia in 1985. A few games and programs exist for the system. Specifications CPU: CDP 1802B 5V7 clocking at 2.813 MHz ROM: 16 KB with BASIC 3, optional 16 KB upgrade containing enhanced editor and assembler Primary memory: 36 KB (32 KB available to user) Secondary storage: cassette tape Display: 8-colours, text mode 24 lines with 40 characters each; pseudo-graphics 240 x 216 mode using user-defined characters Sound: 8 octaves plus effects (probably AY-3-8912) I/O ports: cassette tape storage, composite and RF video, RS-232 and expansion connector See also Pecom 64 References Home computers EI Niš
https://en.wikipedia.org/wiki/Pecom%2064
Pecom 64 was an educational and/or home computer developed by Elektronska Industrija Niš of Serbia in 1985. Specifications CPU: CDP 1802B 5V7 running at 2.813 MHz ROM: 16 KB, with optional 16 KB upgrade containing enhanced editor and assembler RAM: 32 KB Secondary storage: cassette tape VIS: (Video Interface System) CDP1869 / CDP1870 Text modes: 40 columns x 24 lines Character set: 128 Programmable characters Character size: 6x9 pixels Graphics modes: None, but the character-set was re programmable (semigraphics) to simulate a 240x216 High Resolution display Colours: A total of 8 foreground colours are available (with a limited choice of 4 per character and 1 per line of that character) and 8 background colours (defined for the whole screen). Sound: 2 channels: one for tone generation with a span of 8 octaves, and 1 for special effect/white noise. Volume programmable in 16 steps. I/O ports:cassette tape storage, composite and RF video, RS-232 and expansion connector Power supply: 220V AC, 0.02 A, 4.5 W (built-in transformer) See also Pecom 32 Very similar HW and BASIC as used in the Comx-35 External links Old-Computers.com Retrospec.sgn.net - games in audio format Emma 02 including Pecom 64 Emulator Home computers EI Niš
https://en.wikipedia.org/wiki/Lola%208
Lola 8 is a computer developed by Ivo Lola Ribar Institute of SR Serbia in 1982 and announced for release in 1985. As the manufacturer's focus was CNC equipment, Lola 8 was built out of components they used for CNC machines. Originally likely designed as the industrial controller, the computer initially had a keyboard completely orthogonally laid out rectangular key caps. This was possibly done as a result of using standard CNC keyboard components that need to minimize the entry of environmental dirt into the system. Later designs (model "8A") used standard keyboard arrangement and were available in a number of schools as educational computers. Specifications CPU: Intel 8085 ROM: 16 KB containing BASIC, 24 KB on Lola 8A RAM: 6 KB, 16KB on Lola 8A Storage: cassette tape Graphics: 320x200 on Lola 8A Sound: AY-3-8912 on Lola 8A I/O ports: cassette tape interface, composite and RF video out, audio and expansion connector References Personal computers
https://en.wikipedia.org/wiki/Atomicity
Atomicity may refer to: Chemistry Atomicity (chemistry), the total number of atoms present in 1 molecule of a substance Valence (chemistry), sometimes referred to as atomicity Computing Atomicity (database systems), a property of database transactions which are guaranteed to either completely occur, or have no effects Atomicity (programming), an operation appears to occur at a single instant between its invocation and its response Atomicity, a property of an S-expression, in a symbolic language like Lisp Mathematics Atomicity, an element of orthogonality in a component-based system Atomicity, in order theory; see Atom (order theory) See also Atom (disambiguation)
https://en.wikipedia.org/wiki/Gold%20key%20%28DEC%29
The Gold key is a computer keyboard key used as a prefix to invoke a variety of single-key editing and formatting functions. Usually located in the top-left position of the numeric keypad on platforms such as the VT100, it is the signature element of a consistent user interface implemented by Digital Equipment Corporation (DEC) across multiple product lines. It is used within WPS, EDT, and many other common VAX programs. The key, typically located as the upper leftmost key on the numeric keypad on different terminals, was not necessarily colored gold. Some DEC terminals would include keyboards where the gold key was labeled PF1, as on the VT100 and VT200, or was colored blue, as on the VT52. On some keyboards, the normal function of a key would be labeled on the lower portion of the key, while its alternate function activated with the GOLD key would be labeled above it. Usage The Gold Key is used to invoke single-key functions which may be located on either the main keyboard or the numeric keypad. For example, on the WPS-8 word processing system, the main keyboard key is marked "CENTR", in gold lettering, on its front surface; the keystrokes invoke that word processing function to center the current line of text. The Gold key is a prefix key, not a modifier key. A modifier key would be pressed and held while a second key is pressed; the Gold key is pressed and released before a second key is pressed and released. In that sense, DEC and compatible software uses the Gold key in the same way that Emacs uses the escape key. Origins The base model VT50 terminal was equipped with a main keyboard only, and so had no Gold key. The model VT50H added a numeric keypad, including three unlabeled keys whose functions would be determined by whatever program was running. Located at the top left of the keypad, these were later named "PF" keys, and by convention, the first of them, , became the Gold key. The VT50H numeric keypad was of limited usefulness in editing because, from the perspective of the computer receiving its input, most of the keypad's keys were indistinguishable from their equivalents on the main keyboard. The VT52 terminal added an alternate keypad mode in which all keypad keys would send distinct character codes. In his introduction to a 1990 DEC oral history presentation, Robert Everett, Fellow of the Computer History Museum, credited John T. (Jack) Gilmore with "designing Digital's gold keyboard interface". Classic software Software using Gold key keyboard functions was developed across multiple generations of DEC computers. PDP-8 processors ran the WPS-8 word processing software package on several models of one- and two-user dedicated "word station" systems. PDP-11 processors running RT-11 used the KED/KEX editors. VAXen running VMS used the EDT editor, initially with either the VT52 or the VT100 (which have slightly different keypads). Alpha AXP RISC processors running OpenVMS also used EDT, often with later-model terminal
https://en.wikipedia.org/wiki/IBM%20Secure%20Blue
Secure Blue is a type of computer hardware designed by IBM that enables data encryption to be built into a microprocessor. It can be added to existing processors, and encrypts and decrypts data as it passes through them, without requiring any power from the processors themselves. Possible uses of the technology are to protect data on stolen devices and enforcement of digital rights management (DRM). See also Disk encryption hardware References External links Official Announcement http://arquivo.pt/wayback/20091227112644/http://domino.research.ibm.com/comm/research_projects.nsf/pages/spt.index.html SecureBlue
https://en.wikipedia.org/wiki/Euro.nm
Euro.nm is a pan-European network of regulated markets dedicated to growth companies. Formed on March 1, 1996 by the European Association of European Emerging Exchanges, members of this market network include Euronext Amsterdam, Euronext Paris, Euronext Brussels, Deutsche Börse AG, and Borsa Italiana. These growth markets share harmonious admission, trading and disclosure rules, access to all Euro.nm markets through cross-membership of financial intermediaries, a common infrastructure for the dissemination of market information, trading, and delivery, and joint marketing agreements to promote companies internationally. The Nasdaq Stock Market is the model for Euro.nm. References Stock exchanges in Europe
https://en.wikipedia.org/wiki/Metal%20Max%20%28video%20game%29
is a role-playing video game developed by Crea-Tech and Data East and published by Data East for the Famicom. It is the first game in the Metal Max series. Metal Max is set in a futuristic post-apocalyptic world, where the surviving humans cluster in underground villages and ruins while "monster hunters" fight the monsters and outlaws outside. The game got a sequel, Metal Max 2, and was remade for the Super Famicom as Metal Max Returns. A direct sequel Metal Saga: Season of Steel was published in 2006 for Nintendo DS. Gameplay Metal Max was an early example of an open-ended and non-linear role-playing video game. It lacked a predetermined story path, but the player was instead given the choice of which missions to follow in whatever order while being able to visit any place in the game world. The ending can be determined by the player, who can alter the ending through their actions, complete the game at almost any time, and can continue playing the game even after the ending. The gameplay is classic RPG fare: the characters travel from town to town, having random encounters on the way, upgrading items and tanks as they go. The object is to become a well-known and respected hunter by defeating the monsters with bounties on their heads, which can be done in any order the player pleases. There is a surprisingly rich storyline, but as it is not forced on the player it must be actively sought out. A large part of the game is customizing tanks: tank parts can be bought or found, and the parts, as well as the tank itself, can all be modified. The player uses a BS-Controller (BS-Con), a personal computer system, to track data about things such as towns, tanks, bounties and experience points. Combat is turn-based. There are a large number of miscellaneous items, weapons and upgrades, most with unique or uncommon capabilities. The character classes, such as a mechanic or soldier, could be chosen for the player characters, who would fight in turn-based battles either on foot or using tanks. The player could create tanks, customize and make a variety of modifications to them, remodel and enhance each part, strengthen the defense, repair damaged parts, and give them more shells. Tank A unique characteristic of Metal Max is the Vehicle system. In this game, each character can ride a vehicle and there are 8 different vehicles that can be collected. A vehicle protects the driver from physical damage and can be equipped with weapons. Each vehicle has their own exclusive chassis. A vehicle's loading capacity is decided by the maximum power of the equipped engine. All parts besides plate armor have a certain weight so if the vehicle becomes overloaded or the engine is damaged, it will be unable to move. Every vehicle can be equipped with a C-Unit (Computer-Unit), a fire control system that affects the hit rate of equipped weapons. The above two are necessary for vehicles so if one of these becomes broken or unequipped, the vehicle will be unable to move by
https://en.wikipedia.org/wiki/Metal%20Max
is a role-playing video game series created by Hiroshi Miyaoka and his studio Crea-Tech. The first title was developed by Crea-Tech in collaboration with Data East, and was published by Data East in 1991. Due to the bankruptcy of Data East and trademark problems, some titles were released by Success co. under the title . Since the trademark issue was resolved by Enterbrain, some games in the series have been released under the title Metal Max again. Set in a post-apocalyptic open world, the games in the Metal Max series are turn-based, nonlinear, vehicle combat, role-playing video games. There have been six Metal Max games and five Metal Saga games, in addition to remakes of several Metal Max titles. Notable installments in the series released for NES, Super NES, PlayStation 2, Nintendo DS and Nintendo 3DS; the series has had mobile and browser releases as well. Most titles only saw release in Japan, the first Metal Saga being the only console title that was localized for English markets. Some related manga and soundtracks were also released. The most recent mainline entry to the series is the 2018 PlayStation Vita and PlayStation 4 game, Metal Max Xeno, which received a remake in 2020 titled Metal Max Xeno: Reborn for Microsoft Windows, Nintendo Switch, and PlayStation 4. The plot of the series is based on multiple different apocalypse scenarios, the games occurring after the apocalypse has already begun. Most of the Metal Max titles feature open world gameplay, one of the key features of which being that players are given the ability to end the game at any time and complete quests in whatever order. Titles Games The first Metal Max title was released in 1991 for the Japanese Famicom, with a Super Famicom remake titled Metal Max Returns coming in 1995. The second title, Metal Max 2, was released in 1993 for the Super Famicom. Metal Max 2 and Metal Max Returns were planned to be ported to the Game Boy Advance and were scheduled to be released in 2003, under the titles Metal Max 2 Kai and Metal Max Returns Kai, respectively, although Metal Max Returns Kai was later cancelled. Metal Max 2 had an enhanced remake in 2011 for the Nintendo DS titled Metal Max 2: Reloaded, using the engine from Metal Max 3. All Famicom and Super Famicom titles were re-released for the Japanese Wii Virtual Console, and the original Famicom Metal Max was released for Nintendo 3DS Virtual Console. After Metal Max Returns, there were several cancelled games. Rumours arose about a PlayStation game Metal Max 3: Heart of Gold. In 1999, an official announcement was made for a Dreamcast entry titled Metal Max: Wild Eyes, but was cancelled. Due to the trademark trouble, four new games were released under the title Metal Saga. The first title Metal Saga: Chain of Sandstorm was released for PlayStation 2 in 2005 in Japan, and re-released in the next year with a cheaper price. The game was also released in North America in 2006 with a simple title Metal Saga; this is the on
https://en.wikipedia.org/wiki/Ivo%20Lola%20Ribar%20Institute
Ivo Lola Ribar Institute () is a Serbian manufacturer of heavy machine tools, robotics, industrial equipment and industrial computers, headquartered in Belgrade, Serbia. History Ivo Lola Ribar Institute was founded in 1963 by decree of the Government of Serbia. It has been named after People's Hero of Yugoslavia Ivo Lola Ribar, the youngest son of Ivan Ribar. In current form, the institute operates since 31 December 1985. During the 1980s, it was one of the leading technology institutes in former Yugoslavia. See also Lola 8 – computer developed by Ivo Lola Ribar Institute PA512 and LPA512 – industrial controllers developed by ILR History of computer hardware in Yugoslavia List of computer systems from Yugoslavia References External links Ivo Lola Ribar Institute Coil Wrapping Machine Machine manufacturers Companies based in Belgrade Computer hardware companies Computer companies of Serbia 1963 establishments in Serbia Electronics companies established in 1963
https://en.wikipedia.org/wiki/Reference%20model
A reference model—in systems, enterprise, and software engineering—is an abstract framework or domain-specific ontology consisting of an interlinked set of clearly defined concepts produced by an expert or body of experts to encourage clear communication. A reference model can represent the component parts of any consistent idea, from business functions to system components, as long as it represents a complete set. This frame of reference can then be used to communicate ideas clearly among members of the same community. Reference models are often illustrated as a set of concepts with some indication of the relationships between the concepts. Overview According to OASIS (Organization for the Advancement of Structured Information Standards) a reference model is "an abstract framework for understanding significant relationships among the entities of some environment, and for the development of consistent standards or specifications supporting that environment. A reference model is based on a small number of unifying concepts and may be used as a basis for education and explaining standards to a non-specialist. A reference model is not directly tied to any standards, technologies or other concrete implementation details, but it does seek to provide a common semantics that can be used unambiguously across and between different implementations." There are a number of concepts rolled up into that of a 'reference model.' Each of these concepts is important: Abstract: a reference model is abstract. It provides information about environments of a certain kind. A reference model describes the type or kind of entities that may occur in such an environment, not the particular entities that actually do occur in a specific environment. For example, when describing the architecture of a particular house (which is a specific environment of a certain kind), an actual exterior wall may have dimensions and materials, but the concept of a wall (type of entity) is part of the reference model. One must understand the concept of a wall in order to build a house that has walls. Entities and relationships: A reference model describes both types of entities (things that exist) and their relationships (how they connect, interact with one another, and exhibit joint properties). A list of entity types, by itself, doesn't provide enough information to serve as a reference model. Within an environment: A reference model does not attempt to describe "all things." A reference model is used to clarify "things within an environment" or a problem space. To be useful, a reference model should include a clear description of the problem that it solves, and the concerns of the stakeholders who need to see the problem get solved. Technology agnostic: A reference model's usefulness is limited if it makes assumptions about the technology or platforms in place in a particular computing environment. A reference model typically is intended to promote understanding a class
https://en.wikipedia.org/wiki/Classmates.com
classmates.com is a social networking service. It was founded on November 17, 1995 by Randy Conrads as Classmates Online, Inc. It originally sought to help users find class members and colleagues from kindergarten, primary school, high school, college, workplaces, and the U.S. military. In 2010, CEO Mark Goldston described the transition of the website "to increasingly focus on nostalgic content" such as "high school yearbooks, movie trailers, music tracks, and photographic images". To this end, and to appeal more to older users, the website name was changed to Memory Lane, which included a website redesign. This change was short-lived, however. Classmates dropped the Memory Lane brand in 2011. Corporate information United Online, Inc. (Nasdaq: UNTD) acquired Classmates Online in 2004 and owned and operated the company as part of its Classmates Media Corporation subsidiary until 2015. Classmates Media operated online social networking and loyalty marketing services under the Classmates.com and MyPoints brands, respectively. Classmates Media also operated the following international sites designed to enable users to connect with old friends: StayFriends.de (Germany) StayFriends.se (Sweden) StayFriends.at (Austria) Trombi.com (France) In May 2016, the StayFriends sites were sold to Ströer. In August 2015, Classmates was acquired from United Online by PeopleConnect Holdings, Inc., a portfolio company of H.I.G. Capital, for $30 million. Classmates is now operated as a division of PeopleConnect, which also owns Intelius. Classmates Media Corporation's business model is based on user-generated content and revenue from paid subscriptions and advertising sales. Users and ranking among other social networking sites The only time Classmates appeared on Hitwise's top 10 list of social networking websites was June 2009, when it appeared tenth with 0.45% market share. In early 2008, Nielsen Online had ranked Classmates as number three in unique monthly visitors (U.S. home, work) among social networking sites. As of June 30, 2008, Classmates Media had more than 50 million members, but only 3.8 million paying subscribers. In 2006, television program The View mentioned Classmates.com as having more than 40 million members in the United States and Canada. According to the Online Publishers Association Paid Content U.S. Market Spending Report, Classmates.com was Number 4 among the Top 25 Web Destinations Ranked by Consumer Content Revenue in both 2002 and 2003 (the last years that individual site rankings were broken out). As more users have moved to Facebook, the site has fallen in popularity. Classmates.com was one of the first social networks. However, its habit of continuously charging customers with small fees prevented it from reaching the scale and popularity of later social sites. As of 2015 (the year the company turned 20), Classmates had over 70 million current members. Privacy Classmates.com members use real names, not screen names (al
https://en.wikipedia.org/wiki/Password%20manager
A password manager is a computer program that allows users to store and manage their passwords for local applications or online services such as web applications, online shops or social media. Password managers can generate passwords and fill online forms. Password managers may exist as a mix of: computer applications, mobile applications, or as web browser extensions. A password manager may assist in generating passwords, storing passwords, usually in an encrypted database. Aside from passwords, these applications may also store data such as credit card information, addresses, and frequent flyer information. The main purpose of password managers is to alleviate a cyber-security phenomenon known as password fatigue, where an end-user can become overwhelmed from remembering multiple passwords for multiple services and which password is used for what service. Password managers typically require a user to create and remember one "master" password to unlock and access all information stored in the application. Password managers may choose to integrate multi-factor authentication through fingerprints, or through facial recognition software. Although, this is not required to use the application/browser extension. Password managers may be installed on a computer or mobile device as an application or as a browser extension. History The first password manager software designed to securely store passwords was Password Safe created by Bruce Schneier, which was released as a free utility on September 5, 1997. Designed for Microsoft Windows 95, Password Safe used Schneier's Blowfish algorithm to encrypt passwords and other sensitive data. Although Password Safe was released as a free utility, due to U.S. cryptography export restrictions in place at the time, only U.S. and Canadian citizens and permanent residents were initially allowed to download it. Criticisms Vulnerabilities Some applications store passwords as an unencrypted file, leaving the passwords easily accessible to malware or people attempted to steal personal information. Some password managers require a user-selected master password or passphrase to form the key used to encrypt passwords stored for the application to read. The security of this approach depends on the strength of the chosen password (which may be guessed through malware), and also that the passphrase itself is never stored locally where a malicious program or individual could read it. A compromised master password renders all of the protected passwords vulnerable, meaning that a single point of entry can compromise the confidentiality of sensitive information. As with password authentication techniques, key logging or acoustic cryptanalysis may be used to guess or copy the "master password". Some password managers attempt to use virtual keyboards to reduce this risk – though this is still vulnerable to key loggers that take the keystrokes and send what key was pressed to the person/people trying to access confiden
https://en.wikipedia.org/wiki/CAS2%20%28disambiguation%29
CAS2 is an airport code for Moose Lake (Lodge) Airport. CAS2 may refer to: Double compare-and-swap, in computers, machine level instruction CAS Latency, Column Access Strobe, a timing associated with some kinds of computer memory cas2, CRISPR-associated protein 2
https://en.wikipedia.org/wiki/Zooko%27s%20triangle
Zooko's triangle is a trilemma of three properties that some people consider desirable for names of participants in a network protocol: Human-meaningful: Meaningful and memorable (low-entropy) names are provided to the users. Secure: The amount of damage a malicious entity can inflict on the system should be as low as possible. Decentralized: Names correctly resolve to their respective entities without the use of a central authority or service. Overview Zooko Wilcox-O'Hearn conjectured that no single kind of name can achieve more than two. For example: DNSSec offers a human-meaningful, secure naming scheme, but is not decentralized as it relies on trusted root-servers; .onion addresses and bitcoin addresses are secure and decentralized but not human-meaningful; and I2P uses name translation services which are secure (as they run locally) and provide human-meaningful names - but fail to provide unique entities when used globally in a decentralised network without authorities. Solutions Several systems that exhibit all three properties of Zooko's triangle include: Computer scientist Nick Szabo's paper "Secure Property Titles with Owner Authority" illustrated that all three properties can be achieved up to the limits of Byzantine fault tolerance. Activist Aaron Swartz described a naming system based on Bitcoin employing Bitcoin's distributed blockchain as a proof-of-work to establish consensus of domain name ownership. These systems remain vulnerable to Sybil attack, but are secure under Byzantine assumptions. Theoretician Curtis Yarvin implemented a decentralized version of IP addresses in Urbit that hash to four-syllable, human-readable names. Several platforms implement refutations of Zooko's conjecture, including: Twister (which use Swartz' system with a bitcoin-like system), Blockstack (separate blockchain), Namecoin (separate blockchain), LBRY (separate blockchain - content discovery, ownership, and peer-to-peer file-sharing), Monero, OpenAlias, Ethereum Name Service, and the Handshake Protocol. See also Petname GNU Name System CAP theorem Notes References External links Zooko Wilcox-O'Hearn, Names: Decentralized, Secure, Human-Meaningful: Choose Two – the essay highlighting this difficulty Marc Stiegler, An Introduction to Petname Systems – a clear introduction Nick Szabo, Secure Property Titles – argues that all three properties can be achieved up to the limits of Byzantine fault tolerance. Bob Wyman, The Persistence of Identity (Updating Zooko's Pyramid) Paul Crowley, Squaring Zooko's Triangle Aaron Swartz, Squaring the Triangle using a technique from Bitcoin Secure communication Decentralization
https://en.wikipedia.org/wiki/KMVS
KMVS may refer to: KMVS (FM), a radio station (89.3 FM) licensed to serve Moss Beach, California, United States a radio station in the computer game The Movies
https://en.wikipedia.org/wiki/Hardware-assisted%20virtualization
In computing, hardware-assisted virtualization is a platform virtualization approach that enables efficient full virtualization using help from hardware capabilities, primarily from the host processors. A full virtualization is used to emulate a complete hardware environment, or virtual machine, in which an unmodified guest operating system (using the same instruction set as the host machine) effectively executes in complete isolation. Hardware-assisted virtualization was added to x86 processors (Intel VT-x, AMD-V or VIA VT) in 2005, 2006 and 2010 (respectively). Hardware-assisted virtualization is also known as accelerated virtualization; Xen calls it hardware virtual machine (HVM), and Virtual Iron calls it native virtualization. History Hardware-assisted virtualization first appeared on the IBM System/370 in 1972, for use with VM/370, the first virtual machine operating system. With the increasing demand for high-definition computer graphics (e.g. CAD), virtualization of mainframes lost some attention in the late 1970s, when the upcoming minicomputers fostered resource allocation through distributed computing, encompassing the commoditization of microcomputers. IBM offers hardware virtualization for its IBM Power Systems hardware for AIX, Linux and IBM i, and for its IBM Z mainframes. IBM refers to its specific form of hardware virtualization as "logical partition", or more commonly as LPAR. The increase in compute capacity per x86 server (and in particular the substantial increase in modern networks' bandwidths) rekindled interest in data-center based computing which is based on virtualization techniques. The primary driver was the potential for server consolidation: virtualization allowed a single server to cost-efficiently consolidate compute power on multiple underutilized dedicated servers. The most visible hallmark of a return to the roots of computing is cloud computing, which is a synonym for data center based computing (or mainframe-like computing) through high bandwidth networks. It is closely connected to virtualization. The initial implementation x86 architecture did not meet the Popek and Goldberg virtualization requirements to achieve "classical virtualization": equivalence: a program running under the virtual machine monitor (VMM) should exhibit a behavior essentially identical to that demonstrated when running on an equivalent machine directly resource control (also called safety): the VMM must be in complete control of the virtualized resources efficiency: a statistically dominant fraction of machine instructions must be executed without VMM intervention This made it difficult to implement a virtual machine monitor for this type of processor. Specific limitations included the inability to trap on some privileged instructions. To compensate for these architectural limitations, designers have accomplished virtualization of the x86 architecture through two methods: full virtualization or paravirtualization. Both
https://en.wikipedia.org/wiki/Claro%20Puerto%20Rico
Claro Puerto Rico is one of the largest telecommunications services company in Puerto Rico. It is headquartered in Guaynabo, Puerto Rico, and has operated for almost a century offering voice, data, long distance, broadband, directory publishing and wireless services for the island residents and businesses. It was founded by the Behn brothers, Sosthenes and Hernan. Originally, Puerto Rico Telephone Company eventually spawned ITT Corporation, which was founded by Sosthenes Behn. The company was a public corporation of the government of Puerto Rico for many years until the majority stakes were acquired by GTE in the mid-1990s. It was a subsidiary of Verizon Communications until it was fully acquired by América Móvil in 2007. Present Day On April 3, 2006, Verizon Communications announced it had agreed to sell its stakes in Telecomunicaciones de Puerto Rico, Inc. (TELPRI) and their sole ownership of the main Dominican telephone company Verizon Dominicana, now Claro República Dominicana, to América Móvil of Mexico. On December 31, 2006, Verizon and América Móvil completed Verizon Dominicana ownership transfer into Mexican hands. After another three months and various litigations upon the Federal Communications Commission, which had advise from the Puerto Rico Telecommunications Board, on March 30, 2007 TELPRI assets were completely acquired by América Móvil. The purchase was closed after an agreement to purchase from Popular, Inc., the government of Puerto Rico and the telephone company employee stock ownership program, the remaining stocks of TELPRI at the same price as Verizon. Currently, América Móvil is the 100% owner of the company and has rebranded the wireless arm of the company -formerly Verizon Wireless- under their international Claro brand. As of February 2011 America Móvil has rebranded its wireline (fixed line), broadband DSL, television and dial-up services as Claro. The only services that, for now, remain branded as Claro - Puerto Rico Telephone are business, government or corporate. Effective March 2013, all Claro Puerto Rico have been rebranded. Services to business, government and enterprises are now offered under the Claro Empresas brand. Relationship with Verizon Wireless Until 2014, Claro continued to offer a CDMA network for Verizon Wireless customers as well as legacy Claro customers. The CDMA network appeared as "Extended Network" coverage on Verizon - meaning the majority of Verizon customers were able use it at no extra charge. Prepaid providers like Page Plus Cellular however had to pay roaming in Puerto Rico. Data access for Verizon customers was at full speed. However, Claro deployed EV-DO before launching its GSM/UMTS network. As a result, Claro had the slowest CDMA coverage on Verizon Wireless at sub-3G 1xRTT speeds, peaking at 144-230 kbit/speed. Roaming customers would not access the EV-DO local network. Data, like voice, was Extended Network coverage which had per-KB roaming charges on some older plans. As of
https://en.wikipedia.org/wiki/Computer%20user%20satisfaction
Computer user satisfaction (and closely related concepts such as system satisfaction, user satisfaction, computer system satisfaction, end user computing satisfaction) is the attitude of a user to the computer system they employ in the context of their work environments. Doll and Torkzadeh's (1988) definition of user satisfaction is, the opinion of the user about a specific computer application, which they use. In a broader sense, the definition of user satisfaction can be extended to user satisfaction with any computer-based electronic appliance. However, scholars distinguish between user satisfaction and usability as part of Human-Computer Interaction. Successful organisations have systems in place which they believe help maximise profits and minimise overheads. It is therefore desirable that all their systems succeed and remain successful; and this includes their computer-based systems. According to key scholars such as DeLone and McLean (2002), user satisfaction is a key measure of computer system success, if not synonymous with it. However, the development of techniques for defining and measuring user satisfaction have been ad hoc and open to question. The term Computer User Satisfaction is abbreviated to user satisfaction in this article. The CUS and the UIS Bailey and Pearson's (1983) 39‑Factor Computer User Satisfaction (CUS) questionnaire and its derivative, the User Information Satisfaction (UIS) short-form of Baroudi, Olson and Ives are typical of instruments which one might term as 'factor-based'. They consist of lists of factors, each of which the respondent is asked to rate on one or more multiple point scales. Bailey and Pearson's CUS asked for five ratings for each of 39 factors. The first four scales were for quality ratings and the fifth was an importance rating. From the fifth rating of each factor, they found that their sample of users rated as most important: accuracy, reliability, timeliness, relevancy and confidence in the system. The factors of least importance were found to be feelings of control, volume of output, vendor support, degree of training, and organisational position of EDP (the electronic data processing, or computing department). However, the CUS requires 39 x 5 = 195 individual seven‑point scale responses. Ives, Olson and Baroudi (1983), amongst others, thought that so many responses could result in errors of attrition. This means, the respondent's failure to return the questionnaire or the increasing carelessness of the respondent as they fill in a long form. In psychometrics, such errors not only result in reduced sample sizes but can also distort the results, as those who return long questionnaires, properly completed, may have differing psychological traits from those who do not. Ives, et al. thus developed the UIS. This only requires the respondent to rate 13 factors, and so remains in significant use at the present time. Two seven‑point scales are provided per factor (each for a quality),
https://en.wikipedia.org/wiki/Cognitive%20metaphor
Cognitive metaphor refers to certain kinds of metaphors. The same as a Conceptual metaphor in cognitive science An approach to an Interface metaphor in computing
https://en.wikipedia.org/wiki/AIBR.%20Asociaci%C3%B3n%20de%20Antrop%C3%B3logos%20Iberoamericanos%20en%20Red
The association AIBR (Network of Iberoamerican Anthropologists, from the Spanish Antropólogos Iberoamericanos en Red) started in 1996 with the creation of the portal El Rincón del Antropólogo (The Anthropologist Corner), that brought together the team of one of the first portals of anthropology in the Spanish-speaking world. The association has become a network that connects more than 7,000 anthropologist of Spain, Portugal and all the Latin American countries. Creation of AIBR and AIBR. Revista de Antropología Iberoamericana In November 2002 the association was legally constituted and recognized by the Minister of the Interior of Spain. Since 2001, AIBR publishes the scientific journal AIBR. Revista de Antropología Iberoamericana ('Journal of Iberoamerican Anthropology') every four months electronically and in paper. Objectives of AIBR The basic objectives of AIBR are: To promote the different activities related to anthropology, as well as to spread the themes related to the fields of anthropology. To promote and support the exchange of ideas and opportunities among the well-known professionals of this discipline or those who are interested in Anthropology. To develop communication between related institutions, both Spanish and foreign. In general, all the activities related to the development and promotion of topics related to Anthropology. AIBR Annual International Conference of Anthropology On July 7–10, 2015 the association held in Madrid (Spain) its first international conference under the global theme "The human being: cultures, origins, and destiny", with over 800 delegates. The meeting was presented by anthropologist Didier Fassin (Institute for Advanced Study in Princeton), and closed with a lecture by Aurora González Echevarria (Autonomous University of Barcelona). The Second AIBR International Conference took place in Barcelona (http://2016.aibr.org) in September 2016, under the global theme the "Identity: Bridges, Thresholds, and Barriers".. This edition opened with a plenary conference by Arturo Escobar (University of North Carolina at Chapel Hill), and continued with further lectures by Tim Ingold (University of Aberdeen), Verena Stolcke (Autonomous University of Barcelona) and Manuel Delgado (University of Barcelona). The Third AIBR International Conference of Anthropology took place in Puerto Vallarta, Mexico (http://2017.aibr.org) in November 2017, and was the first edition of the AIBR Conference to take place across the Atlantic. The global theme was "Travels, crossings, displacements", and began with an inaugural lecture by Marc Augé (École des Hautes Études en Sciences Sociales, EHESS). The Fourth AIBR International Conference of Anthropology took place in Granada (http://2018.aibr.org), under the general theme "Dialogues, Encounters and Stories from the Souths". This edition began with a plenary session by Nigel Barley and closed with a closing plenary session by Paul Stoller (West Chester University, Pennsylvania)
https://en.wikipedia.org/wiki/Haunting%20of%20Cassie%20Palmer
The Haunting of Cassie Palmer is a British television drama for children produced in 1981 by TVS (Television South) for the ITV network and first broadcast on 26 February 1982. The series was based on a novel by Vivien Alcock. In the United States, it was aired on Nickelodeon as part of the series The Third Eye. The show was part of the launch programming for TVS which started broadcasting on 1 January 1982. Nickelodeon had also recently launched when it added The Third Eye series to its live-action line up. The Third Eye was a sci-fi/supernatural anthology that included Into the Labyrinth, The Haunting of Cassie Palmer, Children of the Stones and Under the Mountain. Later The Witches and the Grinnygog was added. Plot This is a story of 13-year-old Cassie Palmer who lives with her mother, older brother, and sister. Cassie's mother is an eccentric "psychic" (medium). After some of her clients are incensed to discover her mother has tricked a woman into thinking that she is communicating with her deceased husband by brushing her face with a feather, the clients threaten to prosecute her. Mrs. Palmer pleads with them not to as such an action would render her homeless. Mrs. Palmer explains to Cassie that her powers are only intermittent, and as result she sometimes has to embellish the reading to produce results her clients will be happy with. Mrs. Palmer explains that Cassie, being seventh child of a seventh child, would develop great psychic powers as she reached maturity. However, Cassie has no wish to be a psychic. Unfortunately, these abilities have already manifested and Cassie is simply unaware of them. Desperate to protect her mother from charges of fraud, Cassie goes to a cemetery to try to call up a spirit Charlotte Webb who died as a small child. Instead a dark figure appears from behind a tombstone. He tells her his name is Deverill and wants to know why she's summoned him. Cassie runs away. Cassie eventually tells her mother, who soon is gravely concerned for their safety. Deverill appears to Cassie several more times, but aside from Cassie and her mother, no one can see or hear him. Unsure of Deverill's intent, she invites him to her house so that her mother can find out what his motives are. He complies but vanishes before her mother can discern if he is a sinister or benevolent entity. Eventually the Palmers have to sell their house and move to another town as a result of poor business and the bad reputation acquired from the clients who accused Mrs. Palmer of fraud. Deverill reveals to Cassie that when he was alive he buried a small treasure in the floorboards of a house in town. Cassie finds the treasure and is able to use it to purchase a new home for herself, and her mother and two older siblings to start a new life. In exchange for this good deed, Mr. Deverill is able to leave this plane of existence for the great beyond. Cassie had freed his restless spirit of an eternity of darkness and torment. Her psychic powers apparen
https://en.wikipedia.org/wiki/ICLP
ICLP can stand for: The International Chinese Language Program, an institute for Chinese language instruction located in Taiwan. The International Conference on Logic Programming.
https://en.wikipedia.org/wiki/Long-tailed%20dunnart
The long-tailed dunnart (Sminthopsis longicaudata) is an Australian dunnart that, like the little long-tailed dunnart, has a tail longer than its body. It is also one of the larger dunnarts at a length from snout to tail of 260–306 mm of which head to anus is 80–96 mm and tail 180–210 mm long. Hind foot size is 18 mm, ear length of 21 mm and with a weight of 15-20 g. Distribution and habitat In Western Australia it is known from the Pilbara and eastern coast to the NE goldfields and Gibson desert (Young Ranges) south to the Nullarbor Plain, to central Northern Territory and western South Australia. Its habitat includes Acacia, rocky screes with hummock grass and shrubs, and tall open shrubland and woodlands. Social organisation and breeding A nocturnal species, this marsupial has great agility for jumping. When breeding during October–November, it burrows a hole under logs and makes its nests out of grass. The litter is of up to 6 joeys. It is locally considered to be endangered, but the IUCN Red List indicates that it is of least concern. Diet It eats invertebrates like ants, beetles and centipedes. References Australian National Parks & Wildlife Service - Australian Endangered Species - mammals Australian National Parks & Wildlife Service - Resource Kit: Endangered Species External links Long Tailed Dunnart by Matthew Australian Biological Resources Study Long-tailed Dunnart Greeting Card Sminthopsis longicaudata (long-tailed dunnart) Northern Territory Dasyuromorphs Mammals of Western Australia Mammals of the Northern Territory Marsupials of Australia Mammals described in 1909 Taxa named by Walter Baldwin Spencer
https://en.wikipedia.org/wiki/GEB%20Network
GEB Network (formerly known as Golden Eagle Broadcasting) is a digital satellite television network, which airs primarily Christian and family programming. Oral Roberts founded it in 1996. GEB is owned by Oral Roberts University and is headquartered in Tulsa, Oklahoma. History On January 24, 1996, KWMJ TV 53 Tulsa began airing with 24-hour programming. The launch of KWMJ included programs such as Oral Roberts's Chronicles of Faith, which was a 30-minute program showing footage from his tent crusades and the Oral Roberts University Chapel. The first live chapel aired on January 26, 1996. On November 1, 1998, Golden Eagle Broadcasting was picked up by stations and viewers across the country and the world via television and the internet. By November 29, 1999, KWMJ became KGEB, the flagship affiliate of Golden Eagle Broadcasting. In 2003, KGEB became the digital channel, KGEB-DT. Programming GEB provides Christian and what it describes as family-friendly programming, with programs such as: The 700 Club Adventures in Dry Gulch Andrew Wommack Being Your Best With Trey Johnson Campmeeting Christ the Healer Creflo Dollar – Changing Your World Christian Music Countdown David Jeremiah David Lombardi Deborah Sweetin Donkey Ollie Drenda: With Drenda Keesee Dr. Robert Jeffress - Pathway to Victory Gary Keesee: Fixing the Money Thing Hellen Thomas In Touch With Charles Stanley International Fellowship of Christians and Jews Life Today with James Robison Jerusalem Dateline The Jewish Jesus Jewish Voice with Jonathan Bernis Joel Osteen John Muratori Joseph Prince Joyce Meyer Enjoying Everyday Life K.I.C.K.S. Club Les Feldick Lift Up Jesus With Dudley Rutherford Love a Child Manna-Fest with Perry Stone Dr. Maureen Anderson Mark Hankins NASA X Pastor Robert Morris Ministries ORU Chapel ORU Commencement (Annually) Sarah Ann Speaks Tips Sid Roth's It's Supernatural Super Book That You Might Have Life with Dr. Lynn Hiles The Gospel Truth with Andrew Wommack The Word For Living Throne Room Prayer Today With Marilyn and Sarah Marilyn Hickey Victory with Pastor Paul World Impact with Billy Wilson Original programming GEB Network also airs original programming. Through the years, the network has partnered with Oral Roberts University to air several university specials. Since 2008, ORU men's basketball games have been featured on the network. From 2011 to 2013, The Gathering at ORU aired on GEB with special appearances from pastors and ministry leaders including Dr. Steve Munsey, Clifton Taulbert, and Psalmist Judy Jacobs. The ORU Christmas Joy's concert experience aired on GEB in 2011 and 2012. Another ministry special, ORU Ignite, featuring Dr. Charles Stanley, Billy Wilson, Mark Rutland, Jentezen Franklin, and more aired in summer 2013. In 2010, GEB partnered with Empowered21 to produce and air their inaugural global conference, which was recorded in the Mabee Center. In wake of the Moore, Oklahoma, tornado, GEB a
https://en.wikipedia.org/wiki/Freight%20interline%20system
The freight interline system is a system of relations between trucking companies, rail, and airline networks. Interline freight is cargo that moves between different transportation companies on its journey from origin to consignee. An interline exchange is a contractual transfer of goods from one company to another. A shipment may be prepaid or collect. If it is collect, then each carrier that ships the freight assumes responsibility for the cargo, adds its charges to the customer's bill, advances money to the previous carrier, transports the freight, and delivers it to the next carrier. The final carrier, the company which delivers the freight to its final destination, is responsible for collecting the money from the consignee before delivery. A prepaid situation would be similar with the exception that each carrier would each take out its own portion of the freight rate as it handles the freight. Also, the final carrier would not have to collect any monies, but would still receive its own portion. In a sequence of carriers transporting a particular cargo, each company is called an intermodal company. Often each company has discretion about when to interline the freight to another company. During an interline shipment there are intermediate entities assisting in the coordination of the transport, including customs brokers and logistics firms. Sometimes a freight forwarder will come between two carriers to act as an agent. Also, the freight will go through clearances and currency exchanges. A long interline system might include many companies. For example, a small air carrier might assume responsibility for the freight from the customer, then transfer it to a rail company, which puts it on a truck to an international airport, where a major air carrier might fly the freight overseas. At another international airport the freight may be transferred to another rail company, which transports the cargo to a hub near the consignee. A trucking company then might collect the freight and deliver it directly to the consignee. References External links Canada Revenue Agency's sales tax information for freight carriers Freight transport
https://en.wikipedia.org/wiki/Kinga%20Philipps
Kinga Philipps (born August 16, 1976) is a Polish American actress and journalist. She has been a correspondent for a variety of networks including: USA Network, AMC, Food Network, Current TV, Fox Sports, SyFy, National Geographic Channel and Travel Channel. Early life Philipps was born Kinga Szpakiewicz in Warsaw, Poland and grew up in Bartlesville, Oklahoma, United States. She is a graduate of Oklahoma State University. Career In her acting career she has guest starred on a number of television shows including: The West Wing, Cold Case, According to Jim, Eleventh Hour, NCIS: Los Angeles, Perception and Scandal. She has also appeared in several films including: Tomcats, Torque, 20 Feet Below,: The Darkness Descending and several Lifetime films. She can be seen as Austin Powers's mother in the 2002 film Austin Powers in Goldmember where, in a flashback, she and an infant Powers are blown up by enemy agents in the family car. Philipps was one of the original hosts of Current TV, the network started by Al Gore. She originally hosted Google Current, a daily comedic look at what the world is searching for online. She then went on to host Yahoo Current Driver and Yahoo Current Traveler, two shows that resulted from Current's partnership with Yahoo. Additionally, Philipps covered hard news for Current's Vanguard division and did various in studio coverage for the network. When Current won an Emmy in 2007 for Best Interactive Television Service, Philipps covered the event with a pod titled "Kinga Goes to the Emmys." In 2011, Philipps joined Syfy on their new show Legend Quest. Legend Quest is a fast-paced action-adventure series, which follows symbologist and archeological explorer Ashley Cowie as he travels the world with his field producer (Philipps) and their team in search of some of history's greatest and most mysterious artifacts. On July 4, 2012, the National Geographic Channel series America's Lost Treasures premiered, hosted by Kinga Philipps and Curt Doussett. The 10-part series developed by Thom Beers and Original Productions travels the country looking for hidden links to America's past. In 2013, she starred in 20 Feet Below: The Darkness Descending. Kinga won Best Actress for her role in the film at the 2013 Action On Film International Film Festival. Since 2013 Kinga has been working with Travel Channel hosting the series The Wild Side With Kinga Philipps and Real. She also contributes to Travel Channel's yearly special, The Trip. In 2015 Travel Channel's Real: Malibu won a silver Telly Award. Kinga is the co-owner of Rebel Belle Productions creating inspiring scripted and unscripted content in the space of adventure travel, history, anthropology and cuisine. As a travel writer Kinga regularly contributes to outlets like Wandermelon, The Wayward Post and Real Clear Life. Kinga hosts the new television series Finding Adventure on Very Local on Roku and Fire T.V. References External links Official Website of Legend Qu
https://en.wikipedia.org/wiki/Software%20adoption
In computing, adoption means the transfer (conversion) between an old system and a target system in an organization (or more broadly, by anyone). If a company works with an old software system, it may want to use a new system which is more efficient, has more work capacity, etc. So then a new system needs to be adopted, after which it can be used by users. There are several adoption strategies that can be used to implement a system in an organization. The main strategies are big bang adoption, parallel adoption and phased adoption. "Big bang" is a metaphor for the cosmological theory of the same name, in which the start of the cosmos happened at one moment in time. This is also the case with the big bang adoption approach, in which the new system is supposed to be adopted wholesale on one date. In the case of parallel adoption, the old and the new system are run in parallel initially, so that all the users can get used to the new system, but still can do their work using the old system if they want to or need to do so. Phased adoption means that the adoption happens in several phases, so that after each phase the system is a little closer to being fully adopted by the organization. Selecting an adoption strategy The adoption strategy has to be selected before adoption begins, and is chosen based on the goals to be achieved and on the type of system to be implemented. The three types of adoption, Big Bang, parallel adoption and phased adoption, range from an instant switch to a strategy where users progressively start using the new system over a certain period of time (which can be weeks, months or even years). The actual selection is done by prioritizing the goals to be achieved and then matching a strategy against it (Eason, 1988). Eason defines the following goals: Possible requirement of a “critical mass” to make the system work. If a large critical mass is, or might be, needed for the system to work effectively (e.g. due to network effects), a big bang strategy might be the answer. (Rogers, 1995) Need for risk control, if risk is involved. Minimising risk to the ongoing operation of the organization can be very important. Parallel and phased introductions might help to control these risks, depending on the situation. Need for facilitation of the change. The organization has to be ready for the changeover. Socio-technical preparations such as training sessions and ready-made scenarios must be clear. Pace of change If the new system is designed to deal with new requirements, such as business process reengineering, the speed at which the organization is changing over to the new processes or attempting to meet other new requirements. Local design needs The system might need to be adjusted to the users needs. In this case, the chosen strategy must provide the opportunity to do so. Table Eason Matrix The actual selection of adoption strategy depends on far more factors then these goals, but they create a window to choose one of the types. Ot
https://en.wikipedia.org/wiki/Finite%20map
A finite map can be one of the following: In computer science, finite map is a synonym for an associative array. A finite map in algebraic geometry is a regular map such that the preimage of any point is a finite set, plus a closedness property.
https://en.wikipedia.org/wiki/Tom%20Dine
Thomas A. Dine (born 29 February 1940, Cincinnati, Ohio) served as a senior policy advisor at Israel Policy Forum (IPF), assisting with policy, programming, and development decision-making in the Washington office. Dine had served as chief executive officer of the Jewish Community Federation of San Francisco, president of Radio Free Europe/Radio Liberty in Prague, and as Assistant Administrator for Europe and the New Independent States of Eurasia at USAID. Most notably, he was the executive director of the American Israel Public Affairs Committee (AIPAC) from 1980 through 1993. Alhurra, a US-based public Arabic-language TV channel, has hired Tom Dine as a consultant. Early life Dine was educated at Colgate University (B.A.) in 1962, the University of California in Los Angeles (M.A.) and Johns Hopkins University (M.A.). Dine was also a Peace Corps volunteer in the Philippines from 1962 through 1964. He was also a Senior Analyst for the United States Senate Special Committee on National Emergencies and Delegated Powers from 1973 through 1974. Following this, he worked for the Senate Budget Committee in 1975 through 1978. In 1979 through 1980, he was an advisor to Senator Edmund Muskie on the nuclear weapons policy and the Strategic Arms Limitation Talks, as well as a defense and foreign policy advisor to Senator Edward M. Kennedy. Career Dine came to prominence as Executive Director of AIPAC in 1980 through 1993. His work with AIPAC involved extensive lobbying across the US Administration and the Congress. He played a main role, for example, in lobbying different branches of the US government in early 1986 over a US arms deal with Saudi Arabia. In 1993 through 1997, he worked for the U.S. Agency for International Development, as the Assistant Administrator for Europe and the New Independent States (NIS). Subsequently, he was the longest serving director of Radio Free Europe (based in Prague). He left this position in November 2005 to become Chief Executive Officer of the Jewish Community Federation of San Francisco. In April 2013, Dine was one of 100 prominent American Jews who sent a letter to Israeli Prime Minister Benjamin Netanyahu urging him to "work closely" with Secretary of State John Kerry "to devise pragmatic initiatives, consistent with Israel's security needs, which would represent Israel's readiness to make painful territorial sacrifices for the sake of peace." Dine is a member of Prague Society for International Cooperation, a respected NGO whose main goals are networking and the development of a new generation of responsible, well-informed leaders and thinkers. Personal life Dine is married, and has two children. He is also the brother of the pop artist Jim Dine. References External links Jewish Community Federation biography Radio Free Europe biography Israel Policy Forum biography Living people Colgate University alumni University of California, Los Angeles alumni People of the United States Agency for International De
https://en.wikipedia.org/wiki/GNOME%20Commander
GNOME Commander is a 'two panel' graphical file manager for GNOME. It is built using the GTK+ toolkit and GVfs. Features GNOME MIME types Network support through FTP, SFTP, SAMBA and WebDAV Context menu with bound the right click of mouse User defined context menu Quick device access buttons with automatic mounting and unmounting Latest accessed folder history Folder bookmarks Plugin support Python scripting Fast file viewer for text and images Meta data support for Exif, IPTC, ID3, Vorbis, FLAC, APE, PDF, OLE2 and ODF tags Tools for advanced renaming of files, searching, quick file name search in current directory, symlinking, comparing directories. User defined keyboard shortcuts Integrated command line User interface The Gnome Commander is one of the file managers with two separate panels, based on the split-view interface of Norton Commander. This allows the simultaneous view of a source and destination directory for copying and moving files or directories. This also makes comparing directories very convenient. The number of windows on the desktop is thereby reduced. In Gnome Commander the two panels can be arranged either horizontally or vertically. The Gnome Commander is seamlessly integrated into the Gnome desktop environment and can therefore serve as an alternative to the default file manager Nautilus which offers a so-called spatial view, where the content of each directory is displayed in a new window. Only the keyboard is required to work with Gnome Commander, which makes working processes much faster. Using the mouse is still an option. Keyboard shortcuts and the behavior of certain mouse buttons are freely configurable. Since Gnome Commander supports GVfs, allowing access to network interfaces such as FTP, SMB, WebDAV and SSH. There is a bookmark system for folders and a built-in file viewer for text and image documents. An integrated command line enables commands directly as input to a terminal. The integrated Archive Manager plugin supports numerous data compression file formats such as ZIP files. Furthermore, a support for metadata systems such as Exif, IPTC and ID3-Tags for audio and video files, and other documents (e.g. pdf) is integrated. This metadata can be used for example by means of an extended tool for renaming files. It is possible to define actions depending on certain file extensions and to start these actions via a pop-up menu by right-clicking on the file. Platforms GNOME Commander is developed for the Linux platform. Packages are available for several Linux distributions. See also Comparison of file managers Notes External links GNOME Commander sources at ftp.gnome.org Debian packages Ubuntu packages Mandriva packages SuSe packages Fedora packages Gentoo ebuild for GNOME Commander Orthodox file managers Free file managers GNOME Applications File managers that use GTK
https://en.wikipedia.org/wiki/Mac%20gaming
Mac gaming refers to the use of video games on Macintosh personal computers. In the 1990s, Apple computers did not attract the same level of video game development as Microsoft Windows computers due to the high popularity of Microsoft Windows and, for 3D gaming, Microsoft's DirectX technology. In recent years, the introduction of Mac OS X and support for Intel processors has eased porting of many games, including 3D games through use of OpenGL and more recently Apple's own Metal API. Virtualization technology and Boot Camp also permit the use of Windows and its games on Macintosh computers. Today, a growing number of popular games run natively on macOS, though as of early 2019, a majority still require the use of Microsoft Windows. macOS Catalina (and later) eliminated support for 32-bit games, including those compatible with older versions of macOS. Early game development on the Mac Prior to the release of the Macintosh 128K, the first Macintosh computer, marketing executives at Apple feared that including a game in the finished operating system would aggravate the impression that the graphical user interface made the Mac toy-like. More critically, the limited amount of RAM in the original Macintosh meant that fitting a game into the operating system would be very difficult. Eventually, Andy Hertzfeld created a Desk Accessory called Puzzle that occupied only 600 bytes of memory. This was deemed small enough to be safely included in the operating system, and it shipped with the Mac when released in 1984. With Puzzle—the first computer game specifically for a mouse—the Macintosh became the first computer with a game in its ROM, and it would remain a part of the Mac OS for the next ten years, until being replaced in 1994 with Jigsaw, a jigsaw puzzle game included as part of System 7.5. During the development of the Mac, a chess game similar to Archon based on Alice in Wonderland was shown to the development team. The game was written by Steve Capps for the Apple Lisa computer, but could be easily ported to the Macintosh. The completed game was shown at the Mac's launch and released a few months later under the title Through the Looking Glass, but Apple failed to put much marketing effort into ensuring its success and the game was not a top seller. By the mid-1980s most computer companies avoided the term "home computer" because of its association with the image of, as Compute! wrote, "a low-powered, low-end machine primarily suited for playing games". Apple's John Sculley, for example, denied that his company sold home computers; rather, he said, Apple sold "computers for use in the home". In 1990 the company reportedly refused to support joysticks on its low-cost Macintosh LC and IIsi computers to prevent customers from considering them as "game machine"s. Apart from a developer discount on Apple hardware, support for games developers was minimal. Game development on the Macintosh nonetheless continued, with titles such as Dark Castle (1986),
https://en.wikipedia.org/wiki/PM2
The Parallel Multithreaded Machine (PM2) is a software for parallel networking of computers. PM2 is an open-source distributed multithreaded programming environment designed to support efficiently distributed programs with a highly irregular behavior (e.g. branch and bound search, computation on sparse matrices, etc.) on distributed architectures. It is distributed under the GPL. PM2 adheres to the SPMD (Single Program Multiple Data) programming model, in a way very similar to the PVM and MPI communication libraries. The user writes a single program text, a copy of which is launched by a specific load command on each processing node of the current configuration. It is up to the programmer to include branching so as to differentiate between the processing nodes. This way it allows a network of heterogeneous machines to be used as a single distributed parallel processor. It is primarily designed for medium-size clusters of commodity processing nodes interconnected by high-performance networks, but nothing prevents the use on massively parallel MIMD machines at one end of the spectrum, or as a support for metacomputing over the Internet on the other end. It supports heterogeneous networking configurations, such as sets of interconnected clusters. Distinguishing features of PM2 include its priority driven scheduling policy, its thread migration mechanisms and its ability to ease the development of various load balancing policies. It can manage several hundreds of threads on each available physical processor. The PM2 interface provides functionalities for the management of this high degree of parallelism and for dynamic load balancing. The thread management subsystem of PM2 is called Marcel (named after Marcel Proust) and its communication subsystem Madeleine, a French sweet that supposedly played a central role in the life of Marcel Proust. PM2 features an additional functionality to provide threads with a uniform access to data, whatever their physical location. It is called DSM-PM2. PM2 runs on most Unix platforms. Development history PM2 is developed at LaBRI (Laboratoire Bordelais de Recherche en Informatique), a research laboratory located in Bordeaux, France, jointly supported by the INRIA, the CNRS, and the University of Bordeaux. Before that, PM2 was developed at LIP (Laboratoire de l'Informatique du Parallélisme), a research laboratory located at the ENS Lyon (Ecole Normale Supérieure de Lyon), France, jointly supported by the INRIA, the CNRS and the University Claude Bernard Lyon. PM2 was originally designed by Raymond Namyst and Jean-François Méhaut at LIFL, University of Lille, France. See also PVM Distributed Computing Parallel Computing References This article was originally based on material from the Getting Started with PM2 article, Copyright © March 2006 Team Runtime The Way the Cookie Crumbles/How much did Proust know about madeleines? By Edmund Levin, May 11, 2005 Free computer programming tools
https://en.wikipedia.org/wiki/Kurau%20Phantom%20Memory
Kurau Phantom Memory (stylized as KURAU Phantom Memory) is a Japanese science fiction anime series, produced by Bones and Media Factory, which was broadcast in Japan by the anime television networks Animax and TV Asahi from June to December 2004. Set primarily in the year 2110, it explores themes such as inter-familial relationships and ethics in science. The series was licensed by A.D. Vision for North American localization for $960,000 since the first episode aired, and the first DVD was released on April 10, 2007. In 2008, the series was transferred from A.D. Vision to Funimation Entertainment, along with over 30 other titles. Plot In the year 2100, Dr. Amami is a scientist working in the field of alternative energy, who at the beginning of the series is on the verge of a major breakthrough in the area of "Rynax energy". His daughter Kurau accompanies him to the lab on her twelfth birthday, where an experiment goes horribly wrong and she is struck by a bolt of this energy, which disperses her into lights. When she reforms, it is found that her body has been taken over by two Rynax, who are actually sentient life forms and not just a form of energy. However, one of the Rynax is too weak to awaken. The awakened Rynax takes on Kurau's name and identity, and though her newfound superhuman abilities make her a subject of interest for scientists, Kurau manages to live a relatively normal life. Ten years later, the second Rynax awakens and emerges as a twelve-year-old girl, whom Kurau names Christmas. The two look and interact very much like sisters. Rynax Originally believed to be a form of energy, Rynax are actually binary life forms that exist in Pairs. These beings are made up of pure energy and are channeled from an alternate dimension, and not generated as Dr. Amami believed. This channeling proves very traumatic for the Rynax, and often results in nearly immediate death. A Rynax that has fused with a human is known as a Ryna sapien. However, fusing with a human is often dangerous, and the usual outcome is a slow, agonizing death for both human and Rynax. Kurau proves to be extremely fortunate, as the human and Rynax components of her identity live together in a symbiotic relationship. The Rynax also give her special abilities, such as amazing strength and agility, and the ability to fly, pass through solid objects and generate enough radiation to disintegrate objects instantly. Other humans who have been merged with Rynax prove to be dangerous and destructive people, resulting in pursuit of the GPO (police force) and termination of both Rynax and human. Kurau and her Pair are pursued by the GPO under the belief that they, too, are a threat to the world. Kurau vows to protect her Pair, while at the same time trying to escape detection and live a peaceful life. Characters – A mysterious young woman employed as an "Agent": A freelance operative who takes any job that is potentially too dangerous or illegal to involve normal private eyes o
https://en.wikipedia.org/wiki/The%20Cycles%3A%20International%20Grand%20Prix%20Racing
The Cycles: International Grand Prix Racing is a 1989 computer game developed by Distinctive Software and published by Accolade. It has similarities to Grand Prix Circuit, except it is a motorcycle racing sim. The game includes all the tracks of 1989 Grand Prix motorcycle racing season. Laguna Seca and Goiania circuits are not available when you choose 125cc bike. It was released for the Amiga, Commodore 64, MS-DOS, Amstrad CPC and ZX Spectrum. Gameplay More like a simulation than an arcade game, unlike Sega's Hang-On and Super Hang-On, the player has no time limit to clear races. If the player crashes, they are out of the race. To win each race, the player must get through the finish lines. The player can change the number of laps for a race. The game has several modes which it can be played in: Championship: Choose a bike, not a track. If the player is qualified for race, they can proceed to it. Practice: The player chooses their bike and track. Single Race: Player chooses a bike and track. If the player is qualified for race, they can proceed to it. External links 1989 video games Accolade (company) games Amiga games Commodore 64 games DOS games Amstrad CPC games ZX Spectrum games Racing video games Video games developed in Canada Distinctive Software games Single-player video games
https://en.wikipedia.org/wiki/NOW.com
NOW.com (Network of the World) was an online TV/broadband network operated by PCCW Limited. Service The network broadcast news and other programmes in primarily in English, Cantonese, Mandarin, as well as select channels in other languages: German Hindi Italian Japanese Korean Portuguese Russian Spanish Channels offered include: Business - now Business news Entertainment - Star World, BBC Prime Music - MTV Southeast Asia Channel V Indian - STAR Plus Movies - HBO, MGM, Cinemax, Star Movies Infotainment - Discovery, Animal Planet, CCTV4, CCTV9 News - CNN International, BBC, Bloomberg News, * Sports - Golf Channel, ESPN TV Channel History NOW was formed by Hong Kong's Richard Li in Hong Kong in 2003. It offers broadband entertainment portal and pay-per channel television service. External links NOW.com Broadband TV NOW.com - Wireless Broadband UK NOW.com Hong Kong Television stations in Hong Kong Television websites
https://en.wikipedia.org/wiki/Rebecca%20Chan
Rebecca Chan Sau Chu (born October 20, 1958) is a Hong Kong actress best known for her works with the television network TVB such as hit series War and Beauty where she played the main villain. She joined TVB in 1979, when she competed at the Miss Hong Kong 1979 pageant. She finished as a top 10 semifinalist. She left TVB in 1990, rejoined in 1995 and left again in July 2020. Filmography Variety show (TVB) 1981: Sports World TVB 1983: Enjoy Yourself Tonight (EYT) 1989: 10 Anniversary of Guangzhou Chinese New Year Celebration References External links 1958 births Living people TVB veteran actors Hong Kong television actresses Hong Kong film actresses 20th-century Hong Kong actresses 21st-century Hong Kong actresses Alumni of St. Paul's Co-educational College
https://en.wikipedia.org/wiki/S-algol
S-algol (St Andrews Algol) is a computer programming language derivative of ALGOL 60 developed at the University of St Andrews in 1979 by Ron Morrison and Tony Davie. The language is a modification of ALGOL to contain orthogonal data types that Morrison created for his PhD thesis. Morrison would go on to become professor at the university and head of the department of computer science. The S-algol language was used for teaching at the university at an undergraduate level until 1999. It was also the language taught for several years in the 1980s at a local school in St. Andrews, Madras College. The computer science text Recursive Descent Compiling describes a recursive descent compiler for S-algol, implemented in S-algol. PS-algol is a persistent derivative of S-algol. It was developed around 1981 at the University of Edinburgh and of St Andrews. It supports database ability by providing for longevity of data in the form of a persistent heap that survives termination of PS-algol programs. History and implementations Ron Morrison's 1979 PhD thesis, On the Development of Algol, describes the design and implementation of the S-algol language. The technical report defining the language, The S-algol Reference Manual (1979, 1988), thanks several people for their help, including David Turner for discussions on language design around 1975. The 1981 computer science text Recursive Descent Compiling describes the compiler implementation and bootstrapping process, and the 1982 book An Introduction to Programming with S-algol uses the language to teach computer programming. The first S-algol implementation was on a PDP-11/40 computer running the Unix operating system. Due to the small 64 kilobyte address space available on the PDP-11, an interpreted bytecode implementation was chosen. A single-pass, recursive descent compiler written in S-algol translated S-algol source into S-code, a bytecode for a stack-based abstract machine tailored for S-algol. The S-code was then executed by an interpreter. The S-algol implementation had many similarities with work on earlier Pascal compilers. The technique of using a recursive descent compiler to produce code for an abstract machine was well known, with the Pascal P compiler being a famous example from the early 1970s. The S-algol compiler was written using the stepwise refinement process described by Urs Amman for the development of a Pascal compiler and championed by the inventor of Pascal, Niklaus Wirth. Reflecting the memory organization of the PDP-11 as 32K 16-bit words, the S-code instruction encoding was designed so that each bytecode consisted of one word. The initial bootstrap was performed by writing an S-algol compiler in Algol W on the IBM/360 that produced S-code, and using it to compile the compiler written in S-algol to S-code. The resulting S-code file was copied to the PDP-11 and executed on an S-code interpreter written for the PDP-11, making it self-hosting. The self-hosted S-algol comp
https://en.wikipedia.org/wiki/Computer%20Memories%2C%20Inc.
Computer Memories, Inc. (CMI) was a Chatsworth, California manufacturer of hard disk drives during the early 1980s. CMI made basic stepper motor-based drives, with low cost in mind. History The company was founded in 1979 by Raymond Brooke, Abraham Brand, James Willets and James Quackenbush all formerly of Pertec Computer Corporation, with initial seed money from Raymond Brooke and Abraham Brand and investors Irwin Rubin, Frederic Heim and Marshall Butler. It was incorporated August 6, 1979. Initially the company offered three 5 1/4" disk drives with a capacity of 5, 10 or 15 megabytes (unformatted). Early investors in the company included Intel Corporation. The company made an initial public offering on August 23, 1983 of approximately 2,000,000 shares of common stock. August 1984 they secured a major contract as sole producer of 20-megabyte hard drives for the base model of the IBM PC/AT. Unfortunately, the Singapore-manufactured CM6000 drives proved highly unreliable. Dealers reported failure rates as high as 25 to 30 percent. Part of the problem was high demand for the PC/AT; IBM increased its order from 90,000 units in 1984 to 240,000 in 1985, and manufacturing quality suffered. Second, the design of the disk drive subsystem itself was flawed. At the same time, Quantum Corporation sued CMI for patent infringement relating to the servo mechanism in the entire CM6600 line of drives. Instead of putting the tracking grating on the head arm and driving the arm directly from a voice coil, like the Quantum designs, CMI made a composite motor that would bolt to the drive in place of the usual stepper motor, with the voice coil on the bottom and the tracking mechanism on top (similar to DC servo motors used in process controls and robotics). CMI connected the motor to the arm with a metal-band pulley, the same mechanism they used on their stepper-motor drives. Since the feedback system was behind the pulley, it had to compensate for slack in the arm, one of several things the CMI firmware didn't take account of. In late 1985 IBM announced that it would no longer use CMI drives after its contract expired at the end of the year. CMI released a "patent-free" 7600 series of drives in 1986, but never recovered from the IBM incident. On July 2, 1986, they announced their departure from hard disk production and marketing—95% of their business. Attempts were made in 1987 to sell the remainder of the company to movie producer Hemdale Film Corporation and to animated television program producer DIC Animation City; however, both deals fell through. In 1988 the shell corporation, still traded publicly, was acquired by Paul and Natalie Koether of Far Hills, New Jersey who used it as an investment vehicle; in 1992 it was renamed American Holdings, Inc. In 1995 it was renamed Pure World, Inc. after its largest subsidiary, a supplier of kava and other botanical products. Finally, on June 6, 2005, it was acquired by Naturex, S.A., a French competitor. Reference
https://en.wikipedia.org/wiki/TIM-001
TIM-001 was an application development microcomputer developed by Mihajlo Pupin Institute (Serbia) in 1983/84. See also Mihajlo Pupin Institute Literature Dragoljub Milićević, Dušan Hristović (Ed): Računari TIM, Naučna knjiga, Belgrade 1990. In Serbian. Dušan Hristović: Razvoj računarstva u Srbiji (Computing in Serbia), Phlogiston journal, No 18/19, pp. 89-105, Museum MNT-SANU, Belgrade 2010/2011. In Serbian. D.B.Vujaklija, N.Markovic (Ed): 50 Years of computing in Serbia, pp.37-44, DIS, IMP and PC-Press, Belgrade 2011. Mihajlo Pupin Institute Computing by computer model IBM PC compatibles
https://en.wikipedia.org/wiki/Varsity%20TV
Varsity TV was an American television network. It was owned by Varsity Media Group, Inc. The network was launched in 1999. In March 2006, Verizon FiOS added the channel on the lineup. On January 15, 2009, the channel shut down and ceased operations. References Television channels and stations established in 1999 Television channels and stations disestablished in 2009 Defunct television networks in the United States 1999 establishments in the United States
https://en.wikipedia.org/wiki/Iskra%20Delta%20800
Iskra Delta 800 was a PDP-11/34-compatible computer developed by Iskra Delta in 1984. Specifications CPU: J11 RAM: Up to 4 MiB addressable ROM: 4 KiB Operating system: Delta/M (somewhat modified RSX-11M) External links Old-computers.com article Computer-related introductions in 1984 PDP-11
https://en.wikipedia.org/wiki/Iskra%20Delta%20Partner
Iskra Delta Partner was a computer developed by Iskra Delta in 1983. Specifications Text mode: 26 lines with 80 or 132 characters each Character set: YUSCII I/O ports: three RS-232C, one used to connect printer (1200-4800 bit/s) and two general-purpose (300-9600 bit/s) References External links Old-Computer.com article Microcomputers
https://en.wikipedia.org/wiki/Gorenje%20Dialog
Dialog was a microcomputer system developed by Gorenje in 1980s. It was based on the 8-bit 4 MHz Zilog Z-80A microprocessor. The primary operating system was FEDOS (CP/M 2.2 compatible), developed by Computer Structures and Systems Laboratory (Faculty of Electrical Engineering, University of Ljubljana) and Gorenje. There were 3 variants of the Dialog microcomputer system, distinguished only by minor changed: home, laboratory and personal (PC) (in Slovene: hišni, laboratorijski, osebni). Three types of external memory can be connected with Dialog: cassette recorder, floppy drive (5,25" and 8") and hard drive. The home variant of Dialog used resident FEBASIC (a variant of BASIC). References Mikroračunalnik DIALOG, Tehnično navodilo-uporaba, Gorenje procesna oprema. FEBASIC, priročnik za uporabnike sistema DIALOG, T. Žitko, Ljubljana, 1985. Microcomputers Gorenje
https://en.wikipedia.org/wiki/Iskradata%201680
Iskradata 1680 was a computer developed by Iskradata in 1979. References Microcomputers
https://en.wikipedia.org/wiki/Galeb%20%28computer%29
Galeb () was an 8-bit computer developed by the PEL Varaždin company in Yugoslavia in the early 1980s. A grand total of 250 were produced by the end of the summer of 1984, before being replaced with the Orao. Galeb was designed by Miroslav Kocjan and inspired by Compukit UK101, Ohio Scientific Superboard and Superboard II computers. These machines appeared in the UK and USA in 1979 and were less expensive than Apple II, Commodore PET and/or TRS-80 computers. Galeb's codename YU 101 was chosen to resemble Compukit's UK101. Galeb was very similar to computers that inspired it: Specifications: CPU: MOS Technology 6502 ROM: 16 KB (with modified Microsoft BASIC interpreter and Machine code monitor) RAM: 9 KB (expandable to 64 KB) Keyboard: 59-key QWERTZ I/O ports: composite video and RF TV out, cassette tape interface (DIN-5), RS-232 (D-25), edge expansion connector Sound: Internal speaker; single-channel, 5 octaves Graphics: monochrome, 96×48 pixels Text mode: 48x16 characters Price: 90,000 dinars (in 1984) Emulation of this machine is supported by MESS since 2008 (version 0.124), along with dedicated emulators. References Computer-related introductions in 1981 Personal computers
https://en.wikipedia.org/wiki/Orao%20%28computer%29
Orao (en. Eagle) was an 8-bit computer developed by PEL Varaždin in 1984. Its marketing and distribution was done by Velebit Informatika. It was used as a standard primary school and secondary school computer in the former Yugoslavia (Croatia and Vojvodina) from 1985 to 1991. Orao (code named YU102) was designed by Miroslav Kocijan to supersede Galeb (code named YU101). The goal was to make a better computer, yet with less components, easier to produce and less expensive. The initial version, dubbed Orao MR102, was succeeded by Orao 64 and Orao+. History The chief designer of Orao was Miroslav Kocijan, who previously constructed the basic motherboard for Galeb (working name YU101). Galeb was inspired by computers Compukit UK101, Ohio Scientific Superboard and Ohio Scientific Superboard II which appeared in the United Kingdom and the United States in 1979 and were cheaper than the Apple II, Commodore PET and TRS-80. Driven by the challenge of Anthony Madidi, Miroslav Kocijan began to develop a computer that is supposed to be more advanced than the Galeb with fewer components, easier to produce, better graphics, performance and a more affordable price. The working title of the new project was YU102. Miroslav Kocijan managed to gather around him a group of people who helped in the development of electronic components and software. Kocijan had the idea to commercialize Orao, and was able to convince Rajko Ivanusic, director of PEL Varaždin, to support the idea. In the market of the former Yugoslavia, where the purchase of home computers were disabled due to high tariffs and due to the low purchasing power of citizens and schools computers were unattainable, the idea of mass-produced home computers made sense. Serial production and price The price of Orao was originally set to be around 55.000 Yugoslav dinars, however the price rose to 80.000 dinars. The production began in the summer of 1984. Since the only imported components were integrated circuits which were hard to acquire in Yugoslavia because of strict monetary politics, PEL Varaždin itself financed the imports of these components, which enabled a cheaper final product. Occasional problems that occurred in the serial production were related to the construction of certain external parts and overheating. Lack of supported software Since the Orao was not compatible with any home computer of the time, its software offering was scarce due to the lack of software companies whose products supported the platform. Lack of capabilities That was one of the most common sentences related to 8-bit school computer. Result of that statement is chapter above. Architecture The graphics were controlled by a special circuit, not by the main processor as it was the case in many other home computers because Kocijan's intention was to create a graphical computer similar to Xerox Alto, or Macintosh, and as such, he had it utilize bitmap graphics. The resolution was 256x256 dots, for up to 196,608 bits of VRAM
https://en.wikipedia.org/wiki/Ivel%20Ultra
The Ivel Ultra was an 8-bit Croatian Apple II compatible computer designed by Branimir Makanec and developed by Ivasim Electronika in the 1984s. It was produced in two different versions: the first version has a brown case and ran from 1984 to 1986, the second has a white case and ran from 1987 to 1990. The machine was equipped with one or two 5.25" floppy disk drives. It came with an Apple I compatible BASIC language. The operating system, called IDOS, is compatible with Apple DOS 3.3. The Ivel Ultra could be equipped with a second Zilog Z80 processor, in order to offer compatibility with the CP/M operating system. Specifications CPU: MOS Technology 6502 at 1 MHz ROM: 12 KB (BASIC language interpreter and machine language monitor) RAM: 64 KB Graphic mode: 280 x 192 pixels, 6 colors Text mode: 40 x 24 Operating system: IDOS, compatible with Apple DOS 3.3, CP/M (with an added Z80 CPU) References Personal computers
https://en.wikipedia.org/wiki/Ivel%20Z3
Ivel Z3 was an Apple IIe compatible computer developed by Ivasim in 1980s. References Personal computers
https://en.wikipedia.org/wiki/CER-2
CER model 22 was an early digital computer developed by Mihajlo Pupin Institute in Yugoslavia in the 1960s. CER-2 was a prototype computer model (in 1963) only, for the early digital computers CER-20 or CER-22. See also CER Computers Mihajlo Pupin Institute CER computers Mihajlo Pupin Institute
https://en.wikipedia.org/wiki/CER-202
CER ( – Digital Electronic Computer) model 202 is an early digital computer developed by Mihajlo Pupin Institute (Serbia) in the 1960s. See also CER Computers Mihajlo Pupin Institute References One-of-a-kind computers CER computers
https://en.wikipedia.org/wiki/Ron%20Morrison
Ron Morrison was the head of School of the computer science department of the University of St. Andrews where he worked on programming languages, inventing S-algol, and coinventing PS-algol and Napier88. He had graduated from St. Andrews with a Doctor of Philosophy (Ph.D.) in 1979. He is also heavily involved with local athletics, coaching the University Cross-Country team, and young, up and coming local athletes. He is a Fellow of the Royal Society of Edinburgh, and the current President of Scottish Athletics. He retired from St. Andrews in January 2008. Selected publications Coaching and officiating Morrison has coached many athletes, including Andrew Lemoncello and Derek Rae. He received the Endurance Official of the Year award at British Athletics 16th annual Officials Conference in April 2019. References External links , St. Andrews Keynes Without Debt Scottish Athletics staff page Year of birth missing (living people) Living people
https://en.wikipedia.org/wiki/Far%20Hills%20Country%20Day%20School
Far Hills Country Day School (FHCDS) is a private, co-educational Preschool-Grade 8 school located in Far Hills, New Jersey. The school is situated on a campus that include learning gardens, computer labs, media centers, a performing arts center, a large athletics center including a climbing wall, outdoor fields, tennis courts, ropes challenge course, meadows, a pond, and woodlands. Academics The school's curriculum provides an education in English literature, English language, mathematics, science, and Latin. Far Hills Country Day School challenges students to cerebrate independently and achieve confidently. The school’s shared growth mindset contributes to its experiential, student-centered approach to learning, its welcoming community of families, and its focus on developing individual strengths. Athletics All students participate in physical education between pre-kindergarten and fourth grade and in the interscholastic athletics program between fifth and eighth grade. The athletic program includes basketball, cross-country, cross-fit, fencing, field hockey, ice hockey, lacrosse, soccer, tennis, track, and volleyball. While the fifth grade participates in some sports, they do not compete against other schools. Testing assessments ERB Testing begins in third through eighth grade to benchmark students’ academic progress against other independent school students. In fourth and seventh grade, the Writing Assessment Program is used to provide a comprehensive and direct analysis of students' writing ability benchmarked against other independent school students. Upper School Students also take the SSAT, a standardized test used for secondary independent school admissions. Popular culture When alumna Christine Todd Whitman appeared on Celebrity Jeopardy! in 2004, one of the beneficiaries was Far Hills Country Day School. Notable alumni Nicholas F. Brady (born 1930), former United States Secretary of the Treasury who also briefly represented New Jersey in the United States Senate. Steve Forbes (born 1947), editor-in-chief of Forbes. Asher Grodman (born 1987), actor and producer who stars in the CBS series Ghosts Christine Todd Whitman (born 1947), former Governor of New Jersey. Frederica von Stade (born 1945), mezzo-soprano. References External links School website Data for Far Hills Country Day School, National Center for Education Statistics Far Hills, New Jersey Schools in Somerset County, New Jersey Educational institutions established in 1929 Private elementary schools in New Jersey Private middle schools in New Jersey New Jersey Association of Independent Schools 1929 establishments in New Jersey
https://en.wikipedia.org/wiki/LPA512
LPA512 (Serbian ЛПА512) was an industrial programmable logic controller—a small (438 x 286 x 278 mm), portable computer developed by the Ivo Lola Ribar Institute of Serbia in 1986 as an enhancement to its prior product, PA512. It was first deployed in the Maribor car factory. References Portable computers Industrial automation
https://en.wikipedia.org/wiki/PA512
PA512 (Serbian ПА512) was an industrial programmable logic controller - a portable, computer developed by Ivo Lola Ribar Institute of Serbia in 1980. Six years later, an enhancement product was made, LPA512. Portable computers Industrial automation
https://en.wikipedia.org/wiki/Conflict%20Archive%20on%20the%20Internet
CAIN (Conflict Archive on the Internet) is a database containing information about Conflict and Politics in Northern Ireland from 1968 to the present. The project began in 1996, with the website launching in 1997. The project is based within Ulster University at its Magee campus. The archive chronicles important events during the Troubles, stretching from 1968 until the present day. The name is an allusion to the Biblical Cain, who murdered his brother Abel. CAIN is affiliated with the Northern Ireland Social and Political Archive (ARK), which consists of a number of websites devoted to providing informational material related to Northern Ireland's political process and history. The institutions of higher learning that created CAIN, in addition to Ulster University, were the Queen's University, which worked in concert with the Linen Hall Library. Other important contributors to this project's inception and development were the Center for the Study of Conflict, Educational Services, and INCORE, which stands for the Initiative on Conflict Resolution and Ethnicity. The site includes the Sutton Index of Deaths, containing information on every death which occurred as a result of the conflict. The information is taken from Malcolm Sutton's book Bear in Mind These Dead, the title of which is taken from a poem by John Hewitt. Sutton's original book listed deaths from 1969 until 1993, since updated until 2001. The information can be viewed chronologically, alphabetically and a full search functionality is included. Information can also be crosstabulated by the status of the victim, the organisation responsible and several other variables. Dr Martin Melaugh, the director of the project, has produced draft lists of further deaths related to the conflict from 2002 to date. Funding In addition to funding from Ulster University, CAIN is also bankrolled to a large extent by Atlantic Philanthropies. In 1998 CAIN was directly funded through the Department of Education for Northern Ireland and the Central Community Relations Unit. Its first donor, however, was the Electronic Libraries Programme of the Higher Education Funding Councils. Users According to its official website CAIN is specifically targeting the higher education sector in the United Kingdom, although it claims that over two-thirds of its users come from outside of Great Britain and Ireland, dividing them into three categories: One third from Britain and Ireland; One third from the United States of America; One third from the rest of the world. History Although originally conceived as a website focusing exclusively on sectarian conflict in Northern Ireland, with particular emphasis on the violent aspects of these disputes, CAIN eventually expanded to encompass a much broader overview of politics and culture in Northern Ireland, including key historical events. References External links Databases in Northern Ireland History websites of the United Kingdom Ulster University Websites of Nort
https://en.wikipedia.org/wiki/Iskra%20Delta
Iskra Delta was a computer manufacturer from Slovenia, and one of the biggest computer producers in SFR Yugoslavia that saw its own end with the breakup of the country. It started in 1974 as Elektrotehna, the Ljubljana representative of Digital Equipment Corporation, a USA minicomputer manufacturer with an office in Belgrade. It began assembling PDP-11 minicomputers in Ljubljana from DEC processors and Ampex disks in 1978. Rapid expansion over all major Yugoslav Republics. It had a joint venture with Energoinvest, Sarajevo. Video terminals' assembly was in Paka, Slovenj Gradec. Forced merger with Iskra and Gorenje computer divisions resulted in Iskra-Delta's enlargement to 2,000 employees. Delays with microcomputer technology and freer import brought its collapse in 1988. Iskra Delta's bankruptcy proceedings began on February 5, 1990 and were completed in February 2021, after 31 years. See also Iskra Delta 800 Iskra Delta Partner Triglav Iskradata 1680 History of computer hardware in the SFRY References External links "iskra-delta club" Computer companies of Yugoslavia Computer companies of Slovenia
https://en.wikipedia.org/wiki/Comparison%20of%20BSD%20operating%20systems
There are a number of Unix-like operating systems based on or descended from the Berkeley Software Distribution (BSD) series of Unix variant options. The three most notable descendants in current use are FreeBSD, OpenBSD, and NetBSD, which are all derived from 386BSD and 4.4BSD-Lite, by various routes. Both NetBSD and FreeBSD started life in 1993, initially derived from 386BSD, but in 1994 migrated to a 4.4BSD-Lite code base. OpenBSD was forked from NetBSD in 1995. Other notable derivatives include DragonFly BSD, which was forked from FreeBSD 4.8, and Apple Inc.'s iOS and macOS, with its Darwin base including a large amount of code derived from FreeBSD. Most of the current BSD operating systems are open source and available for download, free of charge, under the BSD License, the most notable exceptions being macOS and iOS. They also generally use a monolithic kernel architecture, apart from macOS, iOS, and DragonFly BSD which feature hybrid kernels. The various open source BSD projects generally develop the kernel and userland programs and libraries together, the source code being managed using a single central source repository. In the past, BSD was also used as a basis for several proprietary versions of UNIX, such as Sun's SunOS, Sequent's Dynix, NeXT's NeXTSTEP, DEC's Ultrix and OSF/1 AXP (which became the now discontinued Tru64 UNIX). Parts of NeXT's software became the foundation for macOS which, together with iOS, is among the most commercially successful BSD variants in the general market. Aims and philosophies FreeBSD FreeBSD aims to make an operating system usable for any purpose. It is intended to run a wide variety of applications, be easy to use, contain cutting edge features, and be highly scalable on very high load network servers. FreeBSD is free software, and the project prefers the FreeBSD license. However, they sometimes accept non-disclosure agreements (NDAs) and include a limited number of nonfree hardware abstraction layer (HAL) modules for specific device drivers in their source tree, to support the hardware of companies who do not provide purely libre drivers (such as HALs to program software-defined radios so that vendors do not share their nonfree algorithms). To maintain a high level of quality and provide good support for "production quality commercial off-the-shelf (COTS) workstation, server, and high-end embedded systems", FreeBSD focuses on a narrow set of architectures. A significant focus of development since 2000 has been fine-grained locking and SMP scalability. From 2007 on, most of the kernel was fine-locked and scaling improvements started to be seen. Other recent work includes Common Criteria security functionality, such as mandatory access control and security event audit support. Derivatives: TrueNAS/FreeNAS – a network-attached storage (NAS) operating system based on FreeBSD. FuryBSD – a FreeBSD-based operating system, founded after Project Trident decided to build on Void Linux instead of TrueOS.
https://en.wikipedia.org/wiki/Westpark%20Foundries
Westpark Foundries, founded 2001, is a United States movies, television and web content development corporation. In 2003, Westpark began to move into handheld device programming and licensed content representation. In 2004, Westpark began to represent programming in the IPTV sector. In 2019, Westpark began producing and collaborating in the production of Augmented Reality, Virtual Reality, Extended Reality, and Mixed Reality content. Designing experiences for mobile devices, VR Headsets, also including geo located interactive activation's and messaging campaigns. Westpark Foundries has represented the work of over 300 filmmakers ranging from Oscar nominated directors to home movies. They are actively involved in mobile content distribution, IPTV distribution, producer's representation, and other aspects of traditional film sales and home video distribution. Entertainment companies of the United States Entertainment companies established in 2001
https://en.wikipedia.org/wiki/Vancouver%20Community%20Network
Vancouver Community Network (VCN) is a community-owned provider of free internet access, technical support, and web hosting services to individuals and nonprofit organizations in Vancouver, British Columbia. It developed StreetMessenger, a communication service for the homeless. History The organization was founded as Vancouver FreeNet by Brian Campbell and others. Revenue Canada initially rejected VCN's application status as a charitable organization, which would have allowed it to receive tax-deductible contributions. VCN appealed this decision, and in 1997, the Federal Court of Appeal ruled that providing free internet service was a charitable tax purpose. See also Chebucto Community Network Free-Net Wireless community network Community informatics National Capital Freenet References External links 1993 establishments in British Columbia Bulletin board systems Community networks Free web hosting services Information technology charities Internet service providers of Canada Non-profit organizations based in Vancouver Web hosting
https://en.wikipedia.org/wiki/Scheduler%20activations
Scheduler activations are a threading mechanism that, when implemented in an operating system's process scheduler, provide kernel-level thread functionality with user-level thread flexibility and performance. This mechanism uses a so-called "N:M" strategy that maps some N number of application threads onto some M number of kernel entities, or "virtual processors." This is a compromise between kernel-level ("1:1") and user-level ("N:1") threading. In general, "N:M" threading systems are more complex to implement than either kernel or user threads, because both changes to kernel and user-space code are required. Scheduler activations were proposed by Anderson, Bershad, Lazowska, and Levy in Scheduler Activations: Effective Kernel Support for the User-Level Management of Parallelism in 1991. Support was implemented in the NetBSD kernel by Nathan Williams but has since been abandoned in favor of 1:1 threading. FreeBSD had a similar threading implementation called Kernel Scheduled Entities which is also being retired in favor of 1:1 threading. Scheduler activations were also implemented as a patch for the Linux kernel by Vincent Danjean: Linux Activations, the user-level part being done in the Marcel thread library. References Threads (computing)
https://en.wikipedia.org/wiki/AMD%20Next%20Generation%20Microarchitecture
AMD Next Generation Microarchitecture may refer to: AMD Accelerated Processing Unit, a computer APU brand (formerly known as AMD Fusion) AMD Bobcat (processor), a computer processor architecture AMD Bulldozer (processor), a computer processor architecture, due in 2011
https://en.wikipedia.org/wiki/Jindalee
Jindalee may refer to: Jindalee, New South Wales Jindalee, Queensland Jindalee, Western Australia Jindalee Operational Radar Network See also Jindalee Lady, 1990 film
https://en.wikipedia.org/wiki/Debug%20menu
A debug menu or debug mode is a user interface implemented in a computer program that allows the user to view and/or manipulate the program's internal state for the purpose of debugging. Some games format their debug menu as an in-game location, referred to as a debug room (distinct from the developer's room type of Easter egg). Debug menus and rooms are used during software development for ease of testing and are usually made inaccessible or otherwise hidden from the end user. Compared to the normal user interfaces, debug menus usually are unpolished and not user-friendly, intended only to be used by the software's developers. They are often cryptic and may allow for destructive actions such as erasing data without warning. In video games Debug menus are often of interest to video game players as they can be used to cheat, access unused content, or change the game configuration beyond what is normally allowed. Some game developers will reveal methods to access these menus as bonus features, while others may lock them out of the final version entirely such that they can only be accessed by modifying the program. The Cutting Room Floor (TCRF) is a website dedicated to researching and documenting hidden content in video games, including debugging material. In December 2013, Edge described the website as "the biggest and most organised" of its kind, and by that time it had 3712 articles. In other software Debugging functions can be found in many other programs and consumer electronics as well. For example, many TVs and DVD players contain hidden menus that can be used to change settings that aren't accessible through the normal menus. Many cell phones also contain debug menus, usually used to test out functions of the phone to make sure they are working. For example, the hidden menu of the Samsung Galaxy S III has test functions for the vibrator, proximity sensor, sound, and other basic aspects of the phone. References Debugging Video game development
https://en.wikipedia.org/wiki/WWF
WWF may refer to: Computing and games WWF (file format), a campaign for unprintable PDF documents Windows Workflow Foundation, a software component of the .NET Framework Words with Friends, a mobile computer game franchise Non-profit organizations World Wide Fund for Nature or World Wildlife Fund, a conservation group World Water Forum, an international forum for water issues Working Women's Forum, a training, trade and credit union in India Waterside Workers' Federation of Australia, a defunct Australian trade union Other uses Welded wire fabric or welded wire mesh, a reinforcing material used in poured concrete slabs Wiscasset, Waterville and Farmington Railway, a former 2-foot-gauge railroad in Maine, United States WWE (formerly WWF), an American wrestling promotion
https://en.wikipedia.org/wiki/Mary%20Ferrell
Mary Elizabeth McHughes Ferrell (26 October 1922 – 20 February 2004) was an American historian and independent researcher who created a large database on the John F. Kennedy assassination. Life and career Born in Memphis, Tennessee, she married Hubert Afton "Buck" Ferrell in 1940 and had four children. In 1957 the family moved to Dallas, Texas, where Ferrell found work as a legal secretary. She began collecting materials on the Kennedy assassination immediately after the event. Her assassination database was originally written on over 40,000 cards and included details of over 8,200 people involved in the case. These data were eventually entered into a computer. Ferrell also created a four-volume set of chronologies, covering all aspects of the assassination. Ferrell died in Dallas. Foundation The Mary Ferrell Foundation, located in Ipswich, Massachusetts, is a non-profit. Topics include the 1960s assassinations, the Watergate scandal, and post-Watergate intelligence abuse. References External links Mary Ferrell biography via Mary Ferrell Foundation Photo of Mary Ferrell Mary Ferrell web site 1922 births 2004 deaths Researchers of the assassination of John F. Kennedy 20th-century American historians American women historians 20th-century American women writers
https://en.wikipedia.org/wiki/CL2
CL2 may refer to: Chlorine gas, Cl2 CAS latency 2, a rating of computer memory Google Calendar, a time-management web application (from a URL fragment used in early versions) Only Built 4 Cuban Linx II, a musical album by American hip-hop artist Raekwon Class 2 rated cables, in the National Electrical Code LPHN2, a human gene that encodes the Latrophilin-2 protein
https://en.wikipedia.org/wiki/ShotCode
ShotCode is a circular barcode created by High Energy Magic of Cambridge University. It uses a dartboard-like circle, with a bullseye in the centre and datacircles surrounding it. The technology reads databits from these datacircles by measuring the angle and distance from the bullseye for each. ShotCodes are designed to be read with a regular camera (including those found on mobile phones and webcams) without the need to purchase other specialised hardware. ShotCodes differ from matrix barcodes in that they do not store regular data - rather, they store a look up number consisting of 40 bits of data. This needs to link to a server that holds information regarding a mapped URL which the reading device can connect to in order to download said data. History ShotCode was created in 1999 at the University of Cambridge when researching a low cost vision based method to track locations and developed TRIPCode as a result. It has been used to track printed TRIPCode paperbadges in realtime with webcams. After that in Cambridge it had another research use; to read barcodes with mobile phone cams, and they used TRIPCode in a round barcode which was named SpotCode. High Energy Magic was founded in 2003 to commercialise research from the University of Cambridge Computer Laboratory and Laboratory for Communications Engineering. Least Bango.net, a mobile company used SpotCode 2004 in their ads. In 2005 High Energy Magic Ltd. sold the entire SpotCode IPR to OP3. Afterwards the name was changed from SpotCode to ShotCode. Heineken was the first company to officially use the ShotCode technology. ShotCode's software The software used to read a ShotCode captured by a mobile camera is called ‘ShotReader’. It is lightweight and is only around 17kB. It ‘reads’ the camera’s picture of a ShotCode in real time and prompts the browsers to navigate to a particular site. The last website update was from 2007, suggesting that updates for phones based on Android and iPhone will not be available. See also QR Code Semacode SPARQCode External links Using visual tags to bypass Bluetooth device discovery, Mobile Computing and Communications Review, Volume 9, Number 1, 2005 (by SpotCode people) SpotCode in action videos from University of Cambridge RoBCode Generator https://github.com/rbur004/svg_rob_code Custom QR Code Barcodes Computer-related introductions in 1999
https://en.wikipedia.org/wiki/Kostas%20Tsalikidis
Kostas Tsalikidis (Κώστας Τσαλικίδης; July 23, 1966 – March 9, 2005) was Vodafone Greece's Network Planning Manager when he died at the age of 39 during the Greek wiretapping case of 2004/05 by the US National Security Agency, in what appeared to be a suicide, but later was found to be a murder. The incident, which Vodafone Greece was involved in, was one of the biggest political scandals of recent Greek history—tapping mobile phones of members of the cabinet, the Prime Minister, and hundreds of others. The authorities and the media strongly feel that Tsalikidis's death was associated with his position in the company. Background Kostas Tsalikidis was born on July 23, 1966. He worked for Vodafone Greece for almost 11 years, beginning as Switching Planning and Technology Manager. From 2001 until his death, he was responsible for all planning activities for the GSM, GPRS and UMTS Vodafone Panafon Core Network (Design, Architecture, Dimensioning, Ordering, Rollout, Interconnect, Optimisation). He was also responsible for all technology issues of the Core Network (GSM, GPRS functionalities implementation and Roadmap), and liaison with Vodafone Global regarding Vodafone Networks Evolution road-maps. Tsalikidis received his diploma from the National Technical University of Athens (NTUA), Department of Electrical and Computer Engineering. His specialization was in Telecommunications and dissertation topic on “Air Interface Measurements Collection for Mobile Telephony Systems.” He has attended seminars at the Athens University, on Management and Business Administration, technical seminars on Telecommunications, GSM Systems, Data Networks, Transport Techniques, and a number of Skills Development seminars on Team Work, Team Building, Communication Skills, Project Management and Negotiation capabilities. As a person he was a warm, giving, honest and sharing human being. He was in an 8-year relationship to Sarra and planning to get married in June – three months after he died. They were a cheerful couple who loved travelling in their spare time all over Greece and abroad. Some of Kostas’ hobbies were to collect vintage rock records from the 60’s and 70’s and children’s toys from the same epoch. Timeline of events according to the press March 4, 2005 Vodafone discovers (as per company statements) foreign “interception” software in its network. Vodafone Greece doesn’t formally take the position that Ericsson installed before the Olympic games a “legal interception” software, which was subsequently locked and shut down. March 5, 2005 Vodafone decides to remove the foreign interception software without finding the culprits of the wire tapping. Thus, according to many experts the culprits can no longer be traced. Mr. Koronias, CEO of Vodafone Greece, claimed before the Parliamentary Committee on Transparency that no one had asked him to reactivate the illegal software in order to trace the phones that intercepted the conversations in question. The company
https://en.wikipedia.org/wiki/WDJO
WDJO is an AM radio station in Cincinnati, Ohio that airs an oldies format. The station is the Cincinnati affiliate for the Ohio State Sports Network. WDJO 99.5, 107.9 FM & 1480 AM (as it is branded) is owned by Robert T. Nolan, through licensee Mustang Media, Inc. The station operates at 4,500 watts during the day and 300 watts at night. The station was long known as WCIN, called "The Pulse of the City", and provided programming for the African-American community of the tri-state area until May 17, 2007, except for a brief time in the 1990s, when it broadcast classical music. In 2019 the station became the main radio broadcaster of FC Cincinnati matches. History The station was established in 1953 as WCIN. During the 1960s, WCIN became a highly regarded soul music station featuring a variety of African-American personalities. In 1995, then-owner J4 Broadcasting Network bought radio stations in Norfolk, Virginia; New Bern, North Carolina; and Myrtle Beach, South Carolina; and began distributing its "Classic Oldies" format of 50s-70s R&B, jazz and blues to those stations. J4 owner and president John C. Thomas hoped to expand to more stations. Allen Guess served as morning host, Marsha Robinson did afternoons, and Jim Morris handled evenings. In January 2006, the station was placed up for auction to settle a $954,679 judgment against J4 Broadcasting and owner John Thomas. On May 15, Bob Cox of St. Louis, Missouri was appointed successor receiver by the federal district court. Two days later, after a stunt in which the station broadcast nothing but a simulated heartbeat and on the hourly station ID, listeners would hear: "You asked for it, and prayed for it... Coming soon", the station switched to a smooth jazz format. WCIN's programming was delivered via satellite from Jones Radio Networks until September 30, 2008, when it switched over to Broadcast Architecture's newer Smooth Jazz Network. It was one of the few AM stations in the United States featuring smooth jazz, and is the first station with the format in Cincinnati since WVAE 94.9 FM dropped it in 1999 to become WMOJ. In May 2009, the station dropped smooth jazz and switched to a simulcast of then-sister station WDJO's oldies format, in preparation of picking up that station's format and call letters. The new WDJO was soon purchased by Alchemy Broadcasting. The company retained the smooth jazz programming as an online streaming station . In 2011, WDJO became the Cincinnati affiliate the Ohio State Buckeyes Radio Network, airing OSU football and men's basketball games and coaches' shows. Alchemy Broadcasting sold WDJO to Robert T. Nolan's Mustang Media, Inc. in a transaction that closed on April 6, 2015. References External links Oldies 1480 Cincinnati Enquirer: WCIN to be sold FCC History Cards for WDJO Radio stations established in 1953 DJO Oldies radio stations in the United States