Topic Review
Diaspora
Diaspora is a free personal web server that implements a distributed social networking service. Installations of the software form nodes (termed "pods") which make up the distributed Diaspora social network. The project was founded by Dan Grippi, Maxwell Salzberg, Raphael Sofaer and Ilya Zhitomirskiy, students at New York University's Courant Institute of Mathematical Sciences. The group received crowdfunding in excess of $200,000 via Kickstarter. A consumer alpha version was released on 23 November 2010. Konrad Lawson, blogging for the Chronicle of Higher Education, suggested Diaspora in July 2011 as an alternative to corporately produced software.
  • 875
  • 09 Nov 2022
Topic Review
2D Filters
Two dimensional filters have seen substantial development effort due to their importance and high applicability across several domains. In the 2-D case the situation is quite different from the 1-D case, because the multi-dimensional polynomials cannot in general be factored. This means that an arbitrary transfer function cannot generally be manipulated into a form required by a particular implementation. The input-output relationship of a 2-D IIR filter obeys a constant-coefficient linear partial difference equation from which the value of an output sample can be computed using the input samples and previously computed output samples. Because the values of the output samples are fed back, the 2-D filter, like its 1-D counterpart, can be unstable.
  • 873
  • 26 Oct 2022
Topic Review
Nominet UK
Nominet UK is the .uk domain name registry in the United Kingdom , which was founded by Dr Willie Black and five others on 14 May 1996 when its predecessor, the "Naming Committee" was unable to deal with the volume of registrations then being sought under the .uk domain. Nominet is a non-profit company limited by guarantee. It has members who act as shareholders, but without the right to participate in the profits of the company. Anyone can become a member, but most members are internet service providers who are also registrars. As one of the first professional ccTLD operators, Nominet became the model for many other operators worldwide. Customers wishing to register a domain do not approach Nominet directly but register the domain via a domain registrar – a business entity authorised by Nominet to register and manage .uk domains on behalf of customers. Registrars for .uk domains were formerly known as "tagholders". As of 2019, the .uk register held over 12,000,000 .uk domain names, making it the fourth largest ccTLD in the world. Nominet also deals with disputes about registrations of .uk domain names, via its Dispute Resolution Service (DRS) which is similar to the UDRP system used for generic Top Level Domain Names, but with certain innovations such as a free mediation service. Nominet, which operates the .uk domain, has launched a charitable foundation, the Nominet Trust, funded with Nominet grants.
  • 872
  • 23 Nov 2022
Biography
Carole Goble
Carole Anne Goble, CBE FREng (born 10 April 1961) is a British academic who is Professor of Computer Science at the University of Manchester.[1] She is Principal Investigator (PI) of the myGrid,[2] BioCatalogue[3] and myExperiment[4] projects and co-leads the Information Management Group (IMG) with Norman Paton.[5] Goble was educated at Maidstone Grammar School for Girls.[6] Her academic care
  • 870
  • 23 Nov 2022
Topic Review
Technology Roadmap
A technology roadmap is a flexible planning schedule to support strategic and long-range planning, by matching short-term and long-term goals with specific technology solutions. It is a plan that applies to a new product or process and may include using technology forecasting or technology scouting to identify suitable emerging technologies. It is a known technique to help manage the fuzzy front-end of innovation. It is also expected that roadmapping techniques may help companies to survive in turbulent environments and help them to plan in a more holistic way to include non-financial goals and drive towards a more sustainable development. Here roadmaps can be combined with other corporate foresight methods to facilitate systemic change. Developing a roadmap has three major uses. It helps reach a consensus about a set of needs and the technologies required to satisfy those needs, it provides a mechanism to help forecast technology developments, and it provides a framework to help plan and coordinate technology developments. It may also be used as an analysis tool to map the development and emergence from new industries.
  • 869
  • 29 Nov 2022
Topic Review
Discipline (Academia)
An academic discipline or academic field is a subdivision of knowledge that is taught and researched at the college or university level. Disciplines are defined (in part), and recognized by the academic journals in which research is published, and the learned societies and academic departments or faculties within colleges and universities to which their practitioners belong. It includes language, art and cultural studies and other scientific disciplines. It incorporates expertise, people, projects, communities, challenges, studies, inquiry, research areas, and facilities that are strongly associated with a given scholastic subject area or college department. For example, the branches of science are commonly referred to as the scientific disciplines, e.g. physics, chemistry, and biology. Individuals associated with academic disciplines are commonly referred to as experts or specialists. Others, who may have studied liberal arts or systems theory rather than concentrating in a specific academic discipline, are classified as generalists. While academic disciplines in and of themselves are more or less focused practices, scholarly approaches such as multidisciplinarity/interdisciplinarity, transdisciplinarity, and cross-disciplinarity integrate aspects from multiple academic disciplines, therefore addressing any problems that may arise from narrow concentration within specialized fields of study. For example, professionals may encounter trouble communicating across academic disciplines because of differences in language, specified concepts or methodology. Some researchers believe that academic disciplines may, in the future, be replaced by what is known as Mode 2 or "post-academic science", which involves the acquisition of cross-disciplinary knowledge through collaboration of specialists from various academic disciplines.
  • 869
  • 24 Nov 2022
Topic Review
Delphi
Delphi is a general-purpose programming language and a software product that uses the Delphi dialect of the Object Pascal programming language and provides an integrated development environment (IDE) for rapid application development of desktop, mobile, web, and console software, currently developed and maintained by Embarcadero Technologies. Delphi's compilers generate native code for Microsoft Windows, macOS, iOS, Android and Linux (x64). Delphi includes a code editor, a visual designer, an integrated debugger, a source code control component, and support for third-party plugins. The code editor features Code Insight (code completion), Error Insight (real-time error-checking), and refactoring. The visual forms designer has the option of using either the Visual Component Library (VCL) for pure Windows development or the FireMonkey (FMX) framework for cross-platform development. Database support is a key feature and is provided by FireDAC (Database Access Components). Delphi is known for its fast compilation speed, native code, and developer productivity. Delphi was originally developed by Borland as a rapid application development tool for Windows as the successor of Turbo Pascal. Delphi added full object-oriented programming to the existing language, and the language has grown to support generics, anonymous methods, closures, and native Component Object Model (COM) support. Delphi and its C++ counterpart, C++Builder, are interoperable and jointly sold under the name RAD Studio. There are Professional, Enterprise, and Architect editions, with the higher editions having more features at a higher price. There is also a free-of-charge Community edition, with most of the features of Professional, but restricted to users and companies with low revenue.
  • 867
  • 24 Oct 2022
Topic Review
Panjab Digital Library
The Panjab Digital Library is a voluntary organization digitizing and preserving the cultural heritage of Panjab since 2003. With over 45 million digitized pages, it is the biggest resource of digital material on Panjab. There are many historically significant documents stored and made available online. Its scope covers Sikh and Punjabi culture. The library funded by The Nanakshahi Trust was launched online in August 2009. Its base office is located at Chandigarh, India. The library's mission is to locate, digitize, preserve, collect and make accessible the accumulated wisdom of the Panjab region, without distinction as to script, language, religion, nationality, or other physical condition.
  • 866
  • 03 Nov 2022
Topic Review
Getmac
As the next version of Windows NT after Windows 2000, as well as the successor to Windows Me, Windows XP introduced many new features but it also removed some others.
  • 864
  • 26 Oct 2022
Topic Review
XCore Architecture
The XCore Architecture is a 32-bit RISC microprocessor architecture designed by XMOS. The architecture is designed to be used in multi-core processors for embedded systems. Each XCore executes up to eight concurrent threads, each thread having its own register set, and the architecture directly supports inter-thread and inter-core communication and various forms of thread scheduling. Two versions of the XCore architecture exist: the XS1 architecture and the XS2 architecture. Processors with the XS1 architecture include the XCore XS1-G4 and XCore XS1-L1. Processors with the XS2 architecture include xCORE-200. The architecture encodes instructions compactly, using 16 bits for frequently used instructions (with up to three operands) and 32 bits for less frequently used instructions (with up to 6 operands). Almost all instructions execute in a single cycle, and the architecture is event-driven in order to decouple the timings that a program needs to make from the execution speed of the program. A program will normally perform its computations and then wait for an event (e.g. a message, time, or external I/O event) before continuing.
  • 858
  • 24 Nov 2022
Topic Review
Local Zeta-Function
In number theory, the local zeta function Z(V, s) (sometimes called the congruent zeta function) is defined as where Nm is the number of points of V defined over the mth cyclotomic field extension Fqm of Fq, and V is a non-singular n-dimensional projective algebraic variety over the field Fq with q elements. By the variable transformation u = q−s, then it is defined by as the formal power series of the variable [math]\displaystyle{ u }[/math]. Equivalently, the local zeta function sometimes is defined as follows: In other word, the local zeta function Z(V, u) with coefficients in the finite field Fq is defined as a function whose logarithmic derivative generates the numbers Nm of the solutions of equation, defining V, in the m degree extension Fqm.
  • 857
  • 21 Oct 2022
Topic Review
Operational Technology
Operational technology (OT) is hardware and software that detects or causes a change, through the direct monitoring and/or control of industrial equipment, assets, processes and events. The term has become established to demonstrate the technological and functional differences between traditional information technology (IT) systems and industrial control systems environment, the so-called "IT in the non-carpeted areas".
  • 854
  • 09 Nov 2022
Topic Review
Personally Identifiable Information
Personal information, described in United States legal fields as either personally identifiable information (PII), or sensitive personal information (SPI), as used in information security and privacy laws, is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context. The abbreviation PII is widely accepted in the U.S. context, but the phrase it abbreviates has four common variants based on personal / personally, and identifiable / identifying. Not all are equivalent, and for legal purposes the effective definitions vary depending on the jurisdiction and the purposes for which the term is being used. (In other countries with privacy protection laws derived from the OECD privacy principles, the term used is more often "personal information", which may be somewhat broader: in Australia's Privacy Act 1988 (Cth) "personal information" also includes information from which the person's identity is "reasonably ascertainable", potentially covering some information not covered by PII.) Under European and other data protection regimes, which centre primarily around the General Data Protection Regulation, the term "personal data" is significantly broader, and determines the scope of the regulatory regime. NIST Special Publication 800-122 defines PII as "any information about an individual maintained by an agency, including (1) any information that can be used to distinguish or trace an individual's identity, such as name, social security number, date and place of birth, mother's maiden name, or biometric records; and (2) any other information that is linked or linkable to an individual, such as medical, educational, financial, and employment information." So, for example, a user's IP address is not classed as PII on its own, but is classified as linked PII. The concept of PII has become prevalent as information technology and the Internet have made it easier to collect PII leading to a profitable market in collecting and reselling PII. PII can also be exploited by criminals to stalk or steal the identity of a person, or to aid in the planning of criminal acts. As a response to these threats, many website privacy policies specifically address the gathering of PII, and lawmakers have enacted a series of legislation to limit the distribution and accessibility of PII. However, PII is a legal concept, not a technical concept, and as noted, it is not utilised in all jurisdictions. Because of the versatility and power of modern re-identification algorithms, the absence of PII data does not mean that the remaining data does not identify individuals. While some attributes may not be uniquely identifying on their own, any attribute can be potentially identifying in combination with others. These attributes have been referred to as quasi-identifiers or pseudo-identifiers. While such data may not constitute PII in the United States, it is highly likely to remain personal data under European data protection law.
  • 853
  • 03 Nov 2022
Topic Review
Network Function Virtualization
Network function virtualization (NFV) is an emerging technology that is becoming increasingly important due to its many advantages. NFV transforms legacy hardware-based network infrastructure into software-based virtualized networks. This transformation increases the flexibility and scalability of networks, at the same time reducing the time for the creation of new networks. However, the attack surface of the network increases, which requires the definition of a clear map of where attacks may happen.
  • 851
  • 30 May 2022
Topic Review
Yuktibhāṣā
Yuktibhāṣā (Malayalam: യുക്തിഭാഷ, lit. 'Rationale'), also known as Gaṇita-yukti-bhāṣā:xxi and Gaṇitanyāyasaṅgraha (Compendium of Astronomical Rationale), is a major treatise on mathematics and astronomy, written by the India n astronomer Jyesthadeva of the Kerala school of mathematics around 1530. The treatise, written in Malayalam, is a consolidation of the discoveries by Madhava of Sangamagrama, Nilakantha Somayaji, Parameshvara, Jyeshtadeva, Achyuta Pisharati, and other astronomer-mathematicians of the Kerala school. It also exists in a Sanskrit version, with unclear author and date, composed as a rough translation of the Malayalam original. The work contains proofs and derivations of the theorems that it presents. Modern historians used to assert, based on the works of Indian mathematics that first became available, that early Indian scholars in astronomy and computation lacked in proofs, but Yuktibhāṣā demonstrates otherwise. Some of its important topics include the infinite series expansions of functions; power series, including of π and π/4; trigonometric series of sine, cosine, and arctangent; Taylor series, including second and third order approximations of sine and cosine; radii, diameters and circumferences; and tests of convergence. Yuktibhāṣā mainly gives rationale for the results in Nilakantha's Tantra Samgraha. It is considered an early text on the ideas of calculus, predating Newton and Leibniz by centuries. The treatise was largely unnoticed outside India, as it was written in the local language of Malayalam. In modern times, due to wider international cooperation in mathematics, the wider world has taken notice of the work. For example, both Oxford University and the Royal Society of Great Britain have given attribution to pioneering mathematical theorems of Indian origin that predate their Western counterparts.
  • 851
  • 21 Nov 2022
Topic Review
Inventory (Library)
Inventories are the one method that libraries use to determine whether some items in their collection are in need of preservation or conservation activities. A modern inventory might involve examining item by item with a barcode scanner and a laptop, with the objective of adjusting bibliographic and item records in theirs and OCLC's WorldCat databases. Using a laptop and handheld bar code reader will “reduce human error and inconsistencies, while helping to maintain staff concentration and enthusiasm for the project”. Print materials in the digital age, though dramatically decreased in size compared to e-print materials, are still valuable components of a library's collection. Increasing print material's accessibility, and reducing user frustration, make the inventory process an effective tool in improving library service quality. “When library users are unable to find materials in the expected locations, they lose confidence in the library catalog as well as in the library itself”. Missing or mislabeled books have a direct impact on the quality of library services. Maintaining the stacks through inventories and shelf reading can mitigate staff time lost searching for missing or mislabeled items. Libraries have thousands of books; large academic libraries may have millions of books;. Doing an annual (or less frequent) physical inventory with the laying on of hands on each individual item may not be practical for several reasons. It may not be financially feasible, employees required may not have extra time to devote to such an inventory, and there are no financial rewards for the Library for completing an inventory. Problems that are discovered (books in need of repurchase, rebinding, repair, or digitization) may require solutions that are expensive and labor-intensive. Because of these restraints, inventories may not take place for decades, if ever, at large academic institutions. By contrast, complete inventories are often a regular part of the school library media specialist's job at K-12 institutions, where inventory may be a legal requirement that shows that the libraries are accountable for the money they have spent throughout the year. Checking for lost books and materials can be similarly compared to auditing. However, there are alternative options to performing a complete inventory, such as performing a selective inventory. Selective inventory can be performed by circumstance or by data prediction. Physical space is a premium in libraries. Inventorying mini collections before relocating them to their new location presents the library with an opportunity to perform a selective inventory project. An alternative to opportunistic selective inventory projects is Kohl's (1982) assertion that circulation statistics, book search statistics, and ILL statistics can be useful tools in identifying areas as possible selective inventory areas. He writes, “areas in need of an inventory can be identified through the use of predictive data”. Once the objectives for accuracy and methods of measuring have been established “the criteria need to be quantified. An overall measure of the inventory accuracy should be maintained as a management key performance indicator”.
  • 850
  • 01 Nov 2022
Topic Review
Forensic Serology
Forensic serology is the detection, identification, classification, and study of various bodily fluids such as blood, semen, saliva, and urine, and their relationship to a crime scene. A forensic serologist may also be involved in DNA analysis and bloodstain pattern analysis. Serology testing begins with presumptive tests which gives the analyst an indication that a specific bodily fluid may be present, but cannot completely confirm its presence. Following the presumptive tests, confirmatory tests are done on the same sample to confirm what the unknown substance actually is.
  • 849
  • 25 Oct 2022
Topic Review
Zermelo's Theorem (Game Theory)
In game theory, Zermelo's theorem is a theorem about finite two-person games of perfect information in which the players move alternately and in which chance does not affect the decision making process. It says that if the game cannot end in a draw, then one of the two players must have a winning strategy (i.e. can force a win). An alternate statement is that for a game meeting all of these conditions except the condition that a draw is now possible, then either the first-player can force a win, or the second-player can force a win, or both players can force a draw. The theorem is named after Ernst Zermelo, a German mathematician and logician, who proved the theorem for the example game of chess in 1913.
  • 846
  • 15 Nov 2022
Topic Review
Heterogeneous Relation
In mathematics, a heterogeneous relation is a binary relation, a subset of a Cartesian product A × B, where A and B are distinct sets. The prefix hetero is from the Greek ἕτερος (heteros, "other, another, different"). A heterogeneous relation has been called a rectangular relation, suggesting that it does not have the square-symmetry of a homogeneous relation on a set where A = B. Commenting on the development of binary relations beyond homogeneous relations, researchers wrote, "...a variant of the theory has evolved that treats relations from the very beginning as heterogeneous or rectangular, i.e. as relations where the normal case is that they are relations between different sets." Developments in algebraic logic have facilitated usage of binary relations. The calculus of relations includes the algebra of sets, extended by composition of relations and the use of converse relations. The inclusion R ⊆ S, meaning that aRb implies aSb, sets the scene in a lattice of relations. But since [math]\displaystyle{ P \subseteq Q \equiv (P \cap \bar{Q} = \varnothing ) \equiv (P \cap Q = P), }[/math] the inclusion symbol is superfluous. Nevertheless, composition of relations and manipulation of the operators according to Schröder rules, provides a calculus to work in the power set of A × B. In contrast to homogeneous relations, the composition of relations operation is only a partial function. The necessity of matching range to domain of composed relations has led to the suggestion that the study of heterogeneous relations is a chapter of category theory as in the category of sets, except that the morphisms of this category are relations. The objects of the category Rel are sets, and the relation-morphisms compose as required in a category.
  • 846
  • 21 Nov 2022
Topic Review
Windows 2.0
Windows 2.0 is an obsoleted 16-bit Microsoft Windows GUI-based operating environment that was released on December 9, 1987, and the successor to Windows 1.0. This product's family includes Windows 2.0, a base edition for 8086 real mode, and Windows/386 2.0, an enhanced edition for i386 protected mode.
  • 844
  • 08 Oct 2022
  • Page
  • of
  • 47
ScholarVision Creations