You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
Trinitrotoluene Underwater Explosion
The development of computational techniques and computer hardware has an impact the analysis of short-term (fast-changing) processes, such as the impact of a non-contact underwater explosion pressure waves. A theory of underwater explosions, gas bubble formation and pressure waves are presented. The course of the pressure wave in time, and its propagation in the acoustic medium are presented. Entry presents empirical descriptions of non-contact pressure explosion waves. 
  • 1.8K
  • 28 Oct 2020
Topic Review
Java Persistence API
The Java Persistence API (JPA), in 2019 renamed to Jakarta Persistence, is a Java application programming interface specification that describes the management of relational data in applications using Java Platform, Standard Edition and Java Platform, Enterprise Edition/Jakarta EE. Persistence in this context covers three areas: The reference implementation for JPA is EclipseLink.
  • 1.8K
  • 14 Oct 2022
Topic Review
Cooking Mama
Cooking Mama (クッキング ママ, Kukkingu Mama) is a cookery simulation-styled minigame compilation video game for the Nintendo Wii, Nintendo DS, and iOS platforms, developed by Office Create and published by Taito, Majesco Entertainment, and 505 Games. It was awarded IGN's "Best Of E3" award for 2006. It was followed by a sequel for the DS, Cooking Mama 2: Dinner with Friends. Two games have been made for the Wii: Cooking Mama and Cooking Mama.
  • 1.8K
  • 19 Oct 2022
Topic Review
Economic History
Economic history is the academic study of economies or economic events of the past. Research is conducted using a combination of historical methods, statistical methods and the application of economic theory to historical situations and institutions. The field can encompass a wide variety of topics, including equality, finance, technology, labour, and business. It emphasizes historicizing the economy itself, analyzing it as a dynamic force and attempting to provide insights into the way it is structured and conceived. Using both quantitative data and qualitative sources, economic historians emphasize understanding the historical context in which major economic events take place. They often focus on the institutional dynamics of systems of production, labor, and capital, as well as the economy's impact on society, culture, and language. Scholars of the discipline may approach their analysis from the perspective of different schools of economic thought, such as mainstream economics, Marxian economics, the Chicago school of economics, and Keynesian economics. Economic history has several sub-disciplines. Historical methods are commonly applied in financial and business history, which overlap with areas of social history such as demographic and labor history. In the sub-discipline called New Economic History or cliometrics, economists use quantitative (econometric) methods. In history of capitalism, historians explain economic historical issues and processes from a historical point of view.
  • 1.8K
  • 21 Nov 2022
Topic Review
Wolfram Alpha
Wolfram Alpha (also styled WolframAlpha, and Wolfram|Alpha) is a computational knowledge engine or answer engine developed by Wolfram Alpha LLC, a subsidiary of Wolfram Research. It is an online service that answers factual queries directly by computing the answer from externally sourced "curated data", rather than providing a list of documents or web pages that might contain the answer as a search engine might. Wolfram Alpha, which was released on May 18, 2009, is based on Wolfram's earlier flagship product Wolfram Mathematica, a computational platform or toolkit that encompasses computer algebra, symbolic and numerical computation, visualization, and statistics capabilities. Additional data is gathered from both academic and commercial websites such as the CIA's The World Factbook, the United States Geological Survey, a Cornell University Library publication called All About Birds, Chambers Biographical Dictionary, Dow Jones, the Catalogue of Life, CrunchBase, Best Buy, the FAA and optionally a user's Facebook account.
  • 1.8K
  • 02 Nov 2022
Topic Review
Windows 2.0
Windows 2.0 is an obsoleted 16-bit Microsoft Windows GUI-based operating environment that was released on December 9, 1987, and the successor to Windows 1.0. This product's family includes Windows 2.0, a base edition for 8086 real mode, and Windows/386 2.0, an enhanced edition for i386 protected mode.
  • 1.8K
  • 08 Oct 2022
Topic Review
Intersection (Euclidean Geometry)
In geometry, an intersection is a point, line, or curve common to two or more objects (such as lines, curves, planes, and surfaces). The simplest case in Euclidean geometry is the intersection of two distinct lines, which either is one point or does not exist if the lines are parallel. Determination of the intersection of flats – linear geometric objects embedded in a higher-dimensional space – is a simple task of linear algebra, namely the solution of a system of linear equations. In general the determination of an intersection leads to non-linear equations, which can be solved numerically, for example using Newton iteration. Intersection problems between a line and a conic section (circle, ellipse, parabola, etc.) or a quadric (sphere, cylinder, hyperboloid, etc.) lead to quadratic equations that can be easily solved. Intersections between quadrics lead to quartic equations that can be solved algebraically.
  • 1.8K
  • 31 Oct 2022
Topic Review
IBM Hexadecimal Floating Point
IBM System/360 computers, and subsequent machines based on that architecture (mainframes), support a hexadecimal floating-point format (HFP). In comparison to IEEE 754 floating-point, the IBM floating-point format has a longer significand, and a shorter exponent. All IBM floating-point formats have 7 bits of exponent with a bias of 64. The normalized range of representable numbers is from 16−65 to 1663 (approx. 5.39761 × 10−79 to 7.237005 × 1075). The number is represented as the following formula: (−1)sign × 0.significand × 16exponent−64.
  • 1.8K
  • 09 Oct 2022
Topic Review
Comparison of Mail Servers
This is a comparison of mail servers: mail transfer agents, mail delivery agents, and other computer software that provide e-mail services. Unix based mail servers are built using a number of components because a Unix style environment is, by default, a toolbox operating system. A stock Unix-like server already has internal mail, more traditional ones also come with a full MTA already part of the standard installation. To allow the server to send external emails, an MTA such as Sendmail, Postfix, or Exim is required. Mail is read either through direct access (shell login) or mailbox protocols like POP and IMAP. Unix based MTA software largely acts as enhancement or replacement of the respective system's "native" MTA. Windows servers do not natively implement email. Windows based MTAs therefore have to cover the whole set of email related functionality.
  • 1.8K
  • 11 Nov 2022
Topic Review
Inti
Inti is the ancient Incan sun god. He is revered as the national patron of the Inca state. Although most consider Inti the sun god, he is more appropriately viewed as a cluster of solar aspects, since the Inca divided his identity according to the stages of the sun. Worshiped as a patron deity of the Inca Empire, Pachacuti is often linked to the origin and expansion of the Inca Sun Cult. The most common story says that he is the son of Viracocha, the god of civilization.
  • 1.8K
  • 23 Nov 2022
Topic Review
Video Toaster
The NewTek Video Toaster is a combination of hardware and software for the editing and production of NTSC standard-definition video. The plug-in expansion card initially worked with the Amiga 2000 computer and provides a number of BNC connectors on the exposed rear edge that provide connectivity to common analog video sources like VHS VCRs. The related software tools support video switching, chroma keying, character generation, animation, and image manipulation. Together, the hardware and software provided, for a few thousand U.S. dollars, a video editing suite that rivaled the output of contemporary (i.e. early 1990s) professional systems costing ten times as much. It allowed small studios to produce high-quality material and resulted in a cottage industry for video production not unlike the success of the Macintosh in the desktop publishing (DTP) market only a few years earlier. The Video Toaster won the Emmy Award for Technical Achievement in 1993. Other parts of the original software package were spun off as stand-alone products, notably LightWave 3D, and achieved success on their own. As the Amiga platform lost market share and Commodore International went bankrupt in 1994 as a result of declining sales, the Video Toaster was moved to the Microsoft Windows platform where it is still available. The company also produces what is essentially a portable pre-packaged version of the Video Toaster along with all the computer hardware needed, as the TriCaster. These became all-digital units in 2014, ending production of the analog Video Toaster line.
  • 1.8K
  • 11 Oct 2022
Topic Review
Deep Packet Inspection
Deep packet inspection (DPI) is a type of data processing that inspects in detail the data being sent over a computer network, and may take actions such as alerting, blocking, re-routing, or logging it accordingly. Deep packet inspection is often used to baseline application behavior, analyze network usage, troubleshoot network performance, ensure that data is in the correct format, check for malicious code, eavesdropping, and internet censorship, among other purposes. There are multiple headers for IP packets; network equipment only needs to use the first of these (the IP header) for normal operation, but use of the second header (such as TCP or UDP) is normally considered to be shallow packet inspection (usually called stateful packet inspection) despite this definition. There are multiple ways to acquire packets for deep packet inspection. Using port mirroring (sometimes called Span Port) is a very common way, as well physically inserting a network tap which duplicates and sends the data stream to an analyzer tool for inspection. Deep Packet Inspection (and filtering) enables advanced network management, user service, and security functions as well as internet data mining, eavesdropping, and internet censorship. Although DPI has been used for Internet management for many years, some advocates of net neutrality fear that the technique may be used anticompetitively or to reduce the openness of the Internet. DPI is used in a wide range of applications, at the so-called "enterprise" level (corporations and larger institutions), in telecommunications service providers, and in governments.
  • 1.8K
  • 09 Nov 2022
Topic Review
Public Interest Registry
Public Interest Registry is a Reston, Virginia-based not-for-profit created by the Internet Society in 2002 to manage the .ORG top-level domain. It took over operation of .ORG in January 2003 and launched the .NGO and .ONG top-level domains in March 2015. In November 2019, it was announced the Public Interest Registry would be sold by the Internet Society to private equity investment firm Ethos Capital for 1.135 billion USD, but in April 2020, ICANN decided to reject the sale.
  • 1.8K
  • 05 Dec 2022
Topic Review
Graphics Environment Manager
GEM (for Graphics Environment Manager) was an operating environment created by Digital Research (DRI) for use with the DOS operating system on Intel 8088 and Motorola 68000 microprocessors. GEM is known primarily as the graphical user interface (GUI) for the Atari ST series of computers, and was also supplied with a series of IBM PC-compatible computers from Amstrad. It also was available for standard IBM PC, at the time when the 6 MHz IBM PC AT (and the very concept of a GUI) was brand new. It was the core for a small number of DOS programs, the most notable being Ventura Publisher. It was ported to a number of other computers that previously lacked graphical interfaces, but never gained popularity on those platforms. DRI also produced X/GEM for their FlexOS real-time operating system with adaptations for OS/2 Presentation Manager and the X Window System under preparation as well.
  • 1.8K
  • 20 Oct 2022
Topic Review
Intel Active Management Technology
Intel Active Management Technology (AMT) is hardware and firmware for remote out-of-band management of select business computers, running on the Intel Management Engine, a microprocessor subsystem not exposed to the user, in order to monitor, maintain, update, upgrade and repair them. Out-of-band (OOB) or hardware-based management is different from software-based (or in-band) management and software management agents. Hardware-based management works at a different level from software applications, and uses a communication channel (through the TCP/IP stack) that is different from software-based communication (which is through the software stack in the operating system). Hardware-based management does not depend on the presence of an OS or locally installed management agent. Hardware-based management has been available on Intel/AMD based computers in the past, but it has largely been limited to auto-configuration using DHCP or BOOTP for dynamic IP address allocation and diskless workstations, as well as wake-on-LAN (WOL) for remotely powering on systems. AMT is not intended to be used by itself; it is intended to be used with a software management application. It gives a management application (and thus, the system administrator who uses it) access to the PC down the wire, in order to remotely do tasks that are difficult or sometimes impossible when working on a PC that does not have remote functionalities built into it. AMT is designed into a service processor located on the motherboard, and uses TLS-secured communication and strong encryption to provide additional security. AMT is built into PCs with Intel vPro technology and is based on the Intel Management Engine (ME). AMT has moved towards increasing support for DMTF Desktop and mobile Architecture for System Hardware (DASH) standards and AMT Release 5.1 and later releases are an implementation of DASH version 1.0/1.1 standards for out-of-band management. AMT provides similar functionality to IPMI, although AMT is designed for client computing systems as compared with the typically server-based IPMI. Currently, AMT is available in desktops, servers, ultrabooks, tablets, and laptops with Intel Core vPro processor family, including Intel Core i5, Core i7, Core i9 and Intel Xeon E3-1000, Xeon E, Xeon W-1000 product family. Intel confirmed a Remote Elevation of Privilege bug (CVE-2017-5689, SA-00075) in its Management Technology on May 1, 2017. Every Intel platform with either Intel Standard Manageability, Active Management Technology, or Small Business Technology, from Nehalem in 2008 to Kaby Lake in 2017 has a remotely exploitable security hole in the ME. Some manufacturers, like Purism and System76 are already selling hardware with Intel Management Engine disabled to prevent the remote exploit. Additional major security flaws in the ME affecting a very large number of computers incorporating Management Engine, Trusted Execution Engine, and Server Platform Services firmware, from Skylake in 2015 to Coffee Lake in 2017, were confirmed by Intel on November 20, 2017 (SA-00086).
  • 1.8K
  • 31 Oct 2022
Topic Review
Catholic Encyclopedia
File:Catholic Encyclopedia, volume 1.djvu The Catholic Encyclopedia: An International Work of Reference on the Constitution, Doctrine, Discipline, and History of the Catholic Church, also referred to as the Old Catholic Encyclopedia and the Original Catholic Encyclopedia, is an English-language encyclopedia published in the United States and designed to serve the Roman Catholic Church. The first volume appeared in March 1907 and the last three volumes appeared in 1912, followed by a master index volume in 1914 and later supplementary volumes. It was designed "to give its readers full and authoritative information on the entire cycle of Catholic interests, action and doctrine". The Catholic Encyclopedia was published by the Robert Appleton Company (RAC), a publishing company incorporated at New York in February 1905 for the express purpose of publishing the encyclopedia. The five members of the encyclopedia's Editorial Board also served as the directors of the company. In 1912 the company's name was changed to The Encyclopedia Press. Publication of the encyclopedia's volumes was the sole business conducted by the company during the project's lifetime.
  • 1.8K
  • 28 Nov 2022
Topic Review
Social Engineering (Security)
In the context of information security, social engineering is the psychological manipulation of people into performing actions or divulging confidential information. This differs from social engineering within the social sciences, which does not concern the divulging of confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme. It has also been defined as "any act that influences a person to take an action that may or may not be in their best interests." An example of social engineering is the use of the "forgot password" function on most websites which require login. An improperly-secured password-recovery system can be used to grant a malicious attacker full access to a user's account, while the original user will lose access to the account.
  • 1.8K
  • 08 Nov 2022
Topic Review
FAO Country Profiles
The FAO Country Profiles are a multilingual web portal which repackages the Food and Agriculture Organization of the United Nations (FAO) information archive on its global activities in agriculture and food security in a single area and catalogues it exclusively by country and thematic areas. The organization aims to offer decision-makers, researchers and project formulators around the world a fast and reliable way to access country-specific information on national food security situations without the need to search individual databases and systems. It aids FAO's database by providing a simple interface containing interactive maps and charts.
  • 1.8K
  • 09 Nov 2022
Topic Review
Wave Race 64
Wave Race 64 is a racing video game developed by Nintendo EAD and published by Nintendo. It was released for the Nintendo 64 in 1996 and is a follow-up to the 1992 Game Boy title Wave Race. Most of the game involves the player racing on a Jet Ski on a variety of courses while successfully manoeuvring the vehicle around various buoys. A multiplayer mode where two players can compete against each other on a chosen course is also included. The game supports the Controller Pak, which allows players to transfer saved data from one game cartridge to another. Originally referred to as "F-Zero on water", the game was intended to feature high-speed boats with transforming capabilities, but these were ultimately replaced with Jet Skis as producer Shigeru Miyamoto felt that the game would not be differentiated enough from other titles on other systems. Wave Race 64 received acclaim from critics, who praised the game's satisfying controls and dynamic watery environments. The game is credited for helping Nintendo effectively make its paradigmatic leap from the 16-bit 2D graphics of the Super Nintendo Entertainment System to the Nintendo 64's 3D capabilities. It was re-released for the Wii and Wii U's Virtual Console in 2007 and 2016, respectively. A sequel, Wave Race, was released in 2001.
  • 1.7K
  • 13 Oct 2022
Topic Review
Argument Technology
Argument technology is a sub-field of artificial intelligence that focuses on applying computational techniques to the creation, identification, analysis, navigation, evaluation and visualisation of arguments and debates. In the 1980s and 1990s, philosophical theories of arguments in general, and argumentation theory in particular, were leveraged to handle key computational challenges, such as modeling non-monotonic and defeasible reasoning and designing robust coordination protocols for multi-agent systems. At the same time, mechanisms for computing semantics of Argumentation frameworks were introduced as a way of providing a calculus of opposition for computing what it is reasonable to believe in the context of conflicting arguments. With these foundations in place, the area was kick-started by a workshop held in the Scottish Highlands in 2000, the result of which was a book coauthored by philosophers of argument, rhetoricians, legal scholars and AI researchers. Since then, the area has been supported by various dedicated events such as the International Workshop on Computational Models of Natural Argument (CMNA) which has run annually since 2001; the International Workshop on Argument in Multi Agent Systems (ArgMAS) annually since 2004; the Workshop on Argument Mining, annually since 2014, and the Conference on Computational Models of Argument (COMMA), biennially since 2006. Since 2010, the field has also had its own journal, Argument & Computation, which was published by Taylor & Francis until 2016 and since then by IOS Press. One of the challenges that argument technology faced was a lack of standardisation in the representation and underlying conception of argument in machine readable terms. Many different software tools for manual argument analysis, in particular, developed idiosyncratic and ad hoc ways of representing arguments which reflected differing underlying ways of conceiving of argumentative structure. This lack of standardisation also meant that there was no interchange between tools or between research projects, and little re-use of data resources that were often expensive to create. To tackle this problem, the Argument Interchange Format set out to establish a common standard that captured the minimal common features of argumentation which could then be extended in different settings. Since about 2018, argument technology has been growing rapidly, with, for example, IBM's Grand Challenge, Project Debater, results for which were published in Nature in March 2021; German research funder, DFG's nationwide research programme on Robust Argumentation Machines, RATIO, begun in 2019; and UK nationwide deployment of The Evidence Toolkit by the BBC in 2019. A 2021 video narrated by Stephen Fry provides a summary of the societal motivations for work in argument technology. Argument technology has applications in a variety of domains, including education, healthcare, policy making, political science, intelligence analysis and risk management and has a variety of sub-fields, methodologies and technologies.
  • 1.7K
  • 08 Oct 2022
  • Page
  • of
  • 47
Academic Video Service