triplets
sequence
passage
stringlengths
0
32.9k
label
stringlengths
4
48
label_id
int64
0
1k
synonyms
sequence
__index_level_1__
int64
312
64.1k
__index_level_0__
int64
0
2.4k
[ "Wadōkaichin", "follows", "Fuhonsen" ]
null
null
null
null
6
[ "Pip (package manager)", "has use", "package management system" ]
pip (also known by Python 3's alias pip3) is a package-management system written in Python and is used to install and manage software packages. The Python Software Foundation recommends using pip for installing Python applications and its dependencies during deployment. Pip connects to an online repository of public packages, called the Python Package Index. Pip can be configured to connect to other package repositories (local or remote), provided that they comply to Python Enhancement Proposal 503.Most distributions of Python come with pip preinstalled. Python 2.7.9 and later (on the python2 series), and Python 3.4 and later include pip by default.
null
null
null
null
6
[ "Pip (package manager)", "replaces", "EasyInstall" ]
null
null
null
null
8
[ "Pip (package manager)", "influenced by", "Setuptools" ]
null
null
null
null
9
[ "Lasca", "influenced by", "English draughts" ]
Lasca (also called Laska or Laskers) is a draughts (or checkers) variant, invented by the second World Chess Champion Emanuel Lasker (1868–1941). Lasca is derived from English draughts (American checkers) and the Russian draughts game bashni (Towers).
null
null
null
null
5
[ "Lasca", "influenced by", "Bashni" ]
Lasca (also called Laska or Laskers) is a draughts (or checkers) variant, invented by the second World Chess Champion Emanuel Lasker (1868–1941). Lasca is derived from English draughts (American checkers) and the Russian draughts game bashni (Towers).History Emanuel Lasker became familiar with bashni in the 19th century while participating in chess tournaments in Moscow and St. Petersburg. According to contemporary memoirs, in Moscow Lasker stayed in the house of D. I. Sargin, a famous historian, researcher, and popularizer of board games. By the time he met Lasker, Sargin was regularly editing columns on draughts (towers) in several Russian newspapers and magazines. The mutual influence of these famous researchers on each other is quite obvious, since Sargin is the author of the fundamental work "The Antiquity of the games of checkers and chess", and Lasker's book "Board games of Nations" was repeatedly reprinted. Public presentation of a new kind of columns draughts was at that time done by a strong marketing company using the brand in the person of Lasker, the current world champion. In 1911, factory kits for the game of Lasca, including a game board, sets of draughts of four colors and a booklet describing the rules of the game, were widely sold in Europe and the United States.
null
null
null
null
6
[ "9wm", "has use", "window manager" ]
9wm is an open source stacking window manager for X11, written by David Hogan (dhog) in 1994 to emulate the Plan 9 Second Edition window manager, 8½. Many later minimalist window managers for X were either inspired by, or directly derived from, 9wm. 9wm takes only 0.4 MB in RAM.The README file in the 9wm source distribution describes it like so: 9wm is an X window manager which attempts to emulate the Plan 9 window manager 81⁄2 as far as possible within the constraints imposed by X. It provides a simple yet comfortable user interface, without garish decorations or title-bars. Or icons. And it's click-to-type.
null
null
null
null
3
[ "9wm", "influenced by", "8½" ]
9wm is an open source stacking window manager for X11, written by David Hogan (dhog) in 1994 to emulate the Plan 9 Second Edition window manager, 8½. Many later minimalist window managers for X were either inspired by, or directly derived from, 9wm. 9wm takes only 0.4 MB in RAM.The README file in the 9wm source distribution describes it like so: 9wm is an X window manager which attempts to emulate the Plan 9 window manager 81⁄2 as far as possible within the constraints imposed by X. It provides a simple yet comfortable user interface, without garish decorations or title-bars. Or icons. And it's click-to-type.
null
null
null
null
5
[ "Drow", "influenced by", "trow" ]
Creative origins The word "drow" originates from the Orcadian and Shetland dialects of Scots, an alternative form of "trow", which is a cognate with "troll". The Oxford English Dictionary gives no entry for "drow", but two of the citations under "trow" name it as an alternative form of the word. Trow/drow was used to refer to a wide variety of evil sprites. Everything about the Dungeons & Dragons drow was invented by Dungeons & Dragons co-creator Gary Gygax except for the basic concept of "dark elves". However, in the Prose Edda, Snorri Sturluson wrote about the black elves: "... the dark elves however live down below the ground. ... [and] are blacker than pitch.": 103 Gygax stated, "Drow are mentioned in Keightley's The Fairy Mythology, as I recall (it might have been The Secret Commonwealth—neither book is before me, and it is not all that important anyway), and as Dark Elves of evil nature, they served as an ideal basis for the creation of a unique new mythos designed especially for the AD&D game." The form "drow" can be found in neither work. Gygax later stated that he took the term from a listing in the Funk & Wagnall's Unexpurgated Dictionary, and no other source at all. "I wanted a most unusual race as the main power in the Underdark, so used the reference to 'dark elves' from the dictionary to create the Drow." There seems to be no work with this title. However, the following entry can be found in abridged editions of Funk & Wagnall's Standard Dictionary of the English Language, such as The Desk Standard Dictionary of the English Language: "[Scot.] In folk-lore, one of a race of underground elves represented as skillful workers in metal. Compare TROLL. [Variant of TROLL.] trow "
null
null
null
null
10
[ "Drow", "topic's main category", "Category:Drow" ]
null
null
null
null
14
[ "Wedding dress of Princess Charlotte of Wales", "owned by", "Princess Charlotte Augusta of Wales" ]
null
null
null
null
0
[ "Wedding dress of Princess Charlotte of Wales", "owned by", "Historic Royal Palaces" ]
The wedding dress of Princess Charlotte of Wales was worn at her wedding to Prince Leopold of Saxe-Coburg-Saalfeld on 2 May 1816 at Carlton House in London. Charlotte was the only child of George, Prince of Wales and Caroline of Brunswick; Leopold was the youngest son of Francis, Duke of Saxe-Coburg-Saalfeld and Countess Augusta Reuss of Ebersdorf. Princess Charlotte's wedding dress was a white and silver slip, covered with transparent silk net embroidered in silver lamé with shells and flowers. The sleeves were trimmed with Brussels lace, and the six-foot train was made with the same material as the slip and was fastened like a cloak with a diamond clasp. The dress reportedly cost £10,000 (equivalent to approximately £575,000 in 2017) to make, and was designed by the London dressmaker "Mrs. Triaud". The dress has been preserved, and now forms part of the collection owned by Historic Royal Palaces. It is the oldest such garment in the collection, and is now very fragile, owing to its age. Princess Charlotte paired the dress with earrings, pearls, and an armlet, a wedding gift from Prince Leopold.
null
null
null
null
7
[ "Wedding dress of Princess Charlotte of Wales", "influenced by", "1795–1820 clothing" ]
null
null
null
null
9
[ "Wedding dress of Princess Charlotte of Wales", "influenced by", "slip dress" ]
null
null
null
null
13
[ "Mithra", "influenced by", "Mitra" ]
null
null
null
null
2
[ "Mithra", "different from", "Mitra" ]
null
null
null
null
3
[ "Mithra", "said to be the same as", "Mithras" ]
null
null
null
null
6
[ "Mithra", "said to be the same as", "Mitra" ]
null
null
null
null
8
[ "Oberon-2", "influenced by", "Oberon" ]
null
null
null
null
10
[ "SM-4", "influenced by", "PDP-11" ]
The SM-4 (CM-4) is a PDP-11/40 compatible system, manufactured in the Eastern Bloc in the 1980s. It was very popular in science and technology. They were manufactured in the Soviet Union, Bulgaria and Hungary, beginning in 1975.The standard configuration includes 128 or 256 KB core memory, tape puncher, two RK-05 removable 2.5 MB disks and two RK-05F fixed disks, two TU-10 drives and Videoton VDT-340 terminals (VT52 non-compatible). The SM-4 processor operates at 900,000 operations per second.The SM-series also includes the SM-3. The SM-3 lacks floating point processing, similar to DEC's PDP 11/40 and 11/34 models. In early production, ferrite core memory is used. It operates at 200,000 operations per second in register-to-register operation.Operating systems commonly used include:
null
null
null
null
2
[ "Sepoy", "influenced by", "Sipahi" ]
null
null
null
null
1
[ "Brainfuck", "different from", "Brain Fuck Scheduler" ]
null
null
null
null
5
[ "Brainfuck", "influenced by", "P′′" ]
History Müller designed Brainfuck with the goal of implementing the smallest possible compiler, inspired by the 1024-byte compiler for the FALSE programming language. Müller's original compiler was implemented in machine language and compiled to a binary with a size of 296 bytes. He uploaded the first Brainfuck compiler to Aminet in 1993. The program came with a "Readme" file, which briefly described the language, and challenged the reader "Who can program anything useful with it? :)". Müller also included an interpreter and some examples. A second version of the compiler used only 240 bytes.P′′ Except for its two I/O commands, Brainfuck is a minor variation of the formal programming language P′′ created by Corrado Böhm in 1964, which is explicitly based on the Turing machine. In fact, using six symbols equivalent to the respective Brainfuck commands +, -, <, >, [, ], Böhm provided an explicit program for each of the basic functions that together serve to compute any computable function. So the first "Brainfuck" programs appear in Böhm's 1964 paper – and they were sufficient to prove Turing completeness.
null
null
null
null
9
[ "Brainfuck", "influenced by", "FALSE" ]
History Müller designed Brainfuck with the goal of implementing the smallest possible compiler, inspired by the 1024-byte compiler for the FALSE programming language. Müller's original compiler was implemented in machine language and compiled to a binary with a size of 296 bytes. He uploaded the first Brainfuck compiler to Aminet in 1993. The program came with a "Readme" file, which briefly described the language, and challenged the reader "Who can program anything useful with it? :)". Müller also included an interpreter and some examples. A second version of the compiler used only 240 bytes.
null
null
null
null
11
[ "Armenakan Party", "followed by", "Armenian Democratic Liberal Party" ]
Merger into the Armenian Democratic Liberal Party After the Armenian genocide, the remnants of the Armenakans joined forces with the splinter faction of the Social Democrat Hunchakian Party known as Reorganized Hunchakian Party, the Armenian Constitutional Democratic Party, and the Popular Party, and founded the Armenian Democratic Liberal Party (Ռամկավար Ազատական Կուսակցութիւն (ՌԱԿ)) or Ramgavar Party) in Constantinople on October 1, 1921. The membership of the Armenakan Party was absorbed into the new party. The party went on to become one of the three traditional Armenian diaspora political groupings alongside the Armenian Revolutionary Federation and the Social Democrat Hunchakian Party.
null
null
null
null
3
[ "Armenakan Party", "influenced by", "Mekertich Portukalian" ]
The Armenakan Party (in Armenian Արմենական Կուսակցութիւն) was an Armenian political party established in Van, Ottoman Empire in 1885 by Mekertich Portukalian as an underground organization against the ruling system. It is considered the first Armenian political party. The party was founded in autumn 1885 journalist and teacher Mekertich Portukalian and nine of his disciples: Meguerditch Avetisian, M. Baroudjian, Panos Terlemezian, Grigor Adjemian, Grigor Adian, Grigor Beozikian, Rouben Chatavarian, Kevork Handjian and Garegin Manoukian. Portukalian, who was based in Marseille, kept in touch with the leaders and published a journal of political and social enlightenment, Armenia (1885-1923). Portukalian is also cited as the father of the Armenian Patriotic Society of Europe. After Mekertich Portukalian, the Armenians of Van continued developing the political principles of Armenian nationalism in secret. The party's aim soon became winning the right of Armenians to rule over themselves through revolutionary armed struggle and thus liberate Armenia from the Ottoman Empire. Its concept of revolution was distinctly limited in comparison with that of succeeding organisations; it viewed terrorism, agitation and militant demonstrations with disfavor, preferring instead to deploy Armenians trained in the use of arms as guerrillas against the Ottoman Empire. The party's main misconception was that enemies of the Ottoman Empire would intervene and rescue the Armenian people throughout the period 1885–1918. With the turn of the century, Armenakans established cells outside Van, in other towns in the province, as well as in Trabzon and Istanbul. The military structure was developed in Russian Transcaucasia, in Persia and in the United States. Activities in the Ottoman Empire:
null
null
null
null
5
[ "Armenakan Party", "significant person", "Mekertich Portukalian" ]
The Armenakan Party (in Armenian Արմենական Կուսակցութիւն) was an Armenian political party established in Van, Ottoman Empire in 1885 by Mekertich Portukalian as an underground organization against the ruling system. It is considered the first Armenian political party. The party was founded in autumn 1885 journalist and teacher Mekertich Portukalian and nine of his disciples: Meguerditch Avetisian, M. Baroudjian, Panos Terlemezian, Grigor Adjemian, Grigor Adian, Grigor Beozikian, Rouben Chatavarian, Kevork Handjian and Garegin Manoukian. Portukalian, who was based in Marseille, kept in touch with the leaders and published a journal of political and social enlightenment, Armenia (1885-1923). Portukalian is also cited as the father of the Armenian Patriotic Society of Europe. After Mekertich Portukalian, the Armenians of Van continued developing the political principles of Armenian nationalism in secret. The party's aim soon became winning the right of Armenians to rule over themselves through revolutionary armed struggle and thus liberate Armenia from the Ottoman Empire. Its concept of revolution was distinctly limited in comparison with that of succeeding organisations; it viewed terrorism, agitation and militant demonstrations with disfavor, preferring instead to deploy Armenians trained in the use of arms as guerrillas against the Ottoman Empire. The party's main misconception was that enemies of the Ottoman Empire would intervene and rescue the Armenian people throughout the period 1885–1918. With the turn of the century, Armenakans established cells outside Van, in other towns in the province, as well as in Trabzon and Istanbul. The military structure was developed in Russian Transcaucasia, in Persia and in the United States. Activities in the Ottoman Empire:
null
null
null
null
6
[ "Armenakan Party", "significant event", "Defense of Van" ]
null
null
null
null
10
[ "Cheerleader effect", "influenced by", "group of humans" ]
Origin The phrase was coined by the fictional character Barney Stinson (Neil Patrick Harris) in "Not a Father's Day", an episode of the television series How I Met Your Mother, first aired in November 2008. Barney points out to his friends a group of women that initially seem attractive, but who are all unattractive when examined individually. This point is made again by two other characters, Ted Mosby (Josh Radnor) and Robin Scherbatsky (Cobie Smulders), later in the episode, who note that some of Barney's friends also only seem attractive in a group. This occurrence may be explained by the processing of Barney's visual system, in which his brain automatically calculated a combined beauty level of that group of ladies. This overall impression then impacts his assessment of the specific female within that group, leading him to believe she is similar to the previously established better average attractiveness.Conditions for the effect to occur Bias in recalling. The cheerleader effect occurred only when participants were asked to rate the attractiveness after images were removed from their vision, suggesting that an initial perceptual encoding with the existence of photos while rated could not lead to the effect. Contrast effect. It was found that the cheerleader effect occurred when the target face was the most attractive face compared to other members in the group but not when it was the least attractive so that the comparison among faces is required.Studies and proposed explanations First study In 2014, the first research was reported by Drew Walker and Edward Vul. Across five studies, participants rated the attractiveness of male and female faces when shown in a group photo, and an individual photo, with the order of the photographs randomised. The cheerleader effect was quantified as the difference between the attractiveness ratings assigned in the experimental condition (in a group photo) and the control (in an isolated image) condition. It was found that participants consistently rated the person as more appealing in the group photograph compared to the individual picture. This effect occurs with male-only, female-only and mixed gender groups, and both small and large groups. In addition, the effect occurs to the same extent with various group sizes of four and 16 people. Participants in studies looked more at the attractive people than the unattractive people in the group. Drew Walker and Edward Vul proposed that this effect arises due to the interplay of three cognitive phenomena: The human visual system takes "ensemble representations" of faces in a group. This explanation was backed up by Timothy F. Brady and George A. Alvarez's findings in 2011.In the study, participants were displayed with 30 sets of circles, and circles of various sizes surrounded a tested circle. When asked to determine the tested circle's size, observers' memory of its size is biased by the mean size of all circles shown to them to estimate, showing that people do not encode visual images in memory independently. Perception of individuals is biased towards this average. People's visual systems subconsciously and automatically calculate the average facial impression so that any extreme is ruled out. "Attractive faces are only average." Results showed that composited faces were rated as more attractive and typical without extreme features. Humans develop this preference for "prototype" face from early life since they are easily identified, and individuals could extract social information from these most facelike stimuli to aid social interaction.When all three of these phenomena are taken together, researchers proposed that the cheerleader effect results from a "hierarchical encoding" and that the hierarchical structure of visual working memory makes observers summarize the group into an ensemble average. Specifically, the individual faces will seem more attractive in a group, as they appear more similar to the average group face, which is more attractive than members' faces.
null
null
null
null
4
[ "Creature Comforts", "influenced by", "Lip Synch" ]
null
null
null
null
10
[ "Creature Comforts", "based on", "Creature Comforts" ]
null
null
null
null
15
[ "Creature Comforts", "topic's main category", "Category:Creature Comforts" ]
null
null
null
null
18
[ "SAP HANA", "has use", "in-memory database" ]
SAP HANA (HochleistungsANalyseAnwendung or High-performance ANalytic Application) is an in-memory, column-oriented, relational database management system developed and marketed by SAP SE. Its primary function as the software running a database server is to store and retrieve data as requested by the applications. In addition, it performs advanced analytics (predictive analytics, spatial data processing, text analytics, text search, streaming analytics, graph data processing) and includes extract, transform, load (ETL) capabilities as well as an application server.Architecture Overview The key distinctions between HANA and previous generation SAP systems are that it is a column-oriented, in-memory database, that combines OLAP and OLTP operations into a single system; thus in general SAP HANA is an "online transaction and analytical processing" (OLTAP) system, also known as a hybrid transactional/analytical processing (HTAP). Storing data in main memory rather than on disk provides faster data access and, by extension, faster querying and processing. While storing data in-memory confers performance advantages, it is a more costly form of data storage. Observing data access patterns, up to 85% of data in an enterprise system may be infrequently accessed therefore it can be cost-effective to store frequently accessed, or "hot", data in-memory while the less frequently accessed "warm" data is stored on disk, an approach SAP have termed "Dynamic tiering".Column-oriented systems store all data for a single column in the same location, rather than storing all data for a single row in the same location (row-oriented systems). This can enable performance improvements for OLAP queries on large datasets and allows greater vertical compression of similar types of data in a single column. If the read times for column-stored data is fast enough, consolidated views of the data can be performed on the fly, removing the need for maintaining aggregate views and its associated data redundancy.Although row-oriented systems have traditionally been favored for OLTP, in-memory storage opens techniques to develop hybrid systems suitable for both OLAP and OLTP capabilities, removing the need to maintain separate systems for OLTP and OLAP operations.
null
null
null
null
6
[ "SAP HANA", "influenced by", "MaxDB" ]
History During the early development of SAP HANA, a number of technologies were developed or acquired by SAP SE. These included TREX search engine (in-memory column-oriented search engine), P*TIME (in-memory online transaction processing (OLTP) Platform acquired by SAP in 2005), and MaxDB with its in-memory liveCache engine.The first major demonstration of the platform was in 2011: teams from SAP SE, the Hasso Plattner Institute and Stanford University demonstrated an application architecture for real-time analytics and aggregation using the name HYRISE. Former SAP SE executive, Vishal Sikka, mentioned this architecture as "Hasso's New Architecture". Before the name "HANA" stabilized, people referred to this product as "New Database". The software was previously called "SAP High-Performance Analytic Appliance".A first research paper on HYRISE was published in November 2010. The research engine is later released open source in 2013, and was reengineered in 2016 to become HYRISE2 in 2017.The first product shipped in late November 2010. By mid-2011, the technology had attracted interest but more experienced business customers considered it to be "in early days". HANA support for SAP NetWeaver Business Warehouse (BW) was announced in September 2011 for availability by November.In 2012, SAP promoted aspects of cloud computing. In October 2012, SAP announced a platform as a service offering called the SAP HANA Cloud Platform and a variant called SAP HANA One that used a smaller amount of memory.In May 2013, a managed private cloud offering called the HANA Enterprise Cloud service was announced.In May 2013, Business Suite on HANA became available, enabling customers to run SAP Enterprise Resource Planning functions on the HANA platform.S/4HANA, released in 2015, written specifically for the HANA platform, combines functionality for ERP, CRM, SRM and others into a single HANA system. S/4HANA is intended to be a simplified business suite, replacing earlier generation ERP systems. While it is likely that SAP will focus its innovations on S/4HANA, some customers using non-HANA systems have raised concerns of being locked into SAP products. Since S/4HANA requires an SAP HANA system to run, customers running SAP business suite applications on hardware not certified by SAP would need to migrate to a SAP-certified HANA database should they choose the features offered by S/4HANA.Rather than versioning, the software utilizes service packs, referred to as Support Package Stacks (SPS), for updates. Support Package Stacks are released every 6 months.In November 2016 SAP announced SAP HANA 2, which offers enhancements to multiple areas such as database management and application management and includes two new cloud services: Text Analysis and Earth Observation Analysis. HANA customers can upgrade to HANA 2 from SPS10 and above. Customers running SPS9 and below must first upgrade to SPS12 before upgrading to HANA 2 SPS01.
null
null
null
null
7
[ "SAP HANA", "influenced by", "TREX search engine" ]
History During the early development of SAP HANA, a number of technologies were developed or acquired by SAP SE. These included TREX search engine (in-memory column-oriented search engine), P*TIME (in-memory online transaction processing (OLTP) Platform acquired by SAP in 2005), and MaxDB with its in-memory liveCache engine.The first major demonstration of the platform was in 2011: teams from SAP SE, the Hasso Plattner Institute and Stanford University demonstrated an application architecture for real-time analytics and aggregation using the name HYRISE. Former SAP SE executive, Vishal Sikka, mentioned this architecture as "Hasso's New Architecture". Before the name "HANA" stabilized, people referred to this product as "New Database". The software was previously called "SAP High-Performance Analytic Appliance".A first research paper on HYRISE was published in November 2010. The research engine is later released open source in 2013, and was reengineered in 2016 to become HYRISE2 in 2017.The first product shipped in late November 2010. By mid-2011, the technology had attracted interest but more experienced business customers considered it to be "in early days". HANA support for SAP NetWeaver Business Warehouse (BW) was announced in September 2011 for availability by November.In 2012, SAP promoted aspects of cloud computing. In October 2012, SAP announced a platform as a service offering called the SAP HANA Cloud Platform and a variant called SAP HANA One that used a smaller amount of memory.In May 2013, a managed private cloud offering called the HANA Enterprise Cloud service was announced.In May 2013, Business Suite on HANA became available, enabling customers to run SAP Enterprise Resource Planning functions on the HANA platform.S/4HANA, released in 2015, written specifically for the HANA platform, combines functionality for ERP, CRM, SRM and others into a single HANA system. S/4HANA is intended to be a simplified business suite, replacing earlier generation ERP systems. While it is likely that SAP will focus its innovations on S/4HANA, some customers using non-HANA systems have raised concerns of being locked into SAP products. Since S/4HANA requires an SAP HANA system to run, customers running SAP business suite applications on hardware not certified by SAP would need to migrate to a SAP-certified HANA database should they choose the features offered by S/4HANA.Rather than versioning, the software utilizes service packs, referred to as Support Package Stacks (SPS), for updates. Support Package Stacks are released every 6 months.In November 2016 SAP announced SAP HANA 2, which offers enhancements to multiple areas such as database management and application management and includes two new cloud services: Text Analysis and Earth Observation Analysis. HANA customers can upgrade to HANA 2 from SPS10 and above. Customers running SPS9 and below must first upgrade to SPS12 before upgrading to HANA 2 SPS01.
null
null
null
null
11
[ "Cuneiform (programming language)", "influenced by", "Swift" ]
null
null
null
null
10
[ "Feminist literary criticism", "influenced by", "feminist theory" ]
Feminist literary criticism is literary criticism informed by feminist theory, or more broadly, by the politics of feminism. It uses the principles and ideology of feminism to critique the language of literature. This school of thought seeks to analyze and describe the ways in which literature portrays the narrative of male domination by exploring the economic, social, political, and psychological forces embedded within literature. This way of thinking and criticizing works can be said to have changed the way literary texts are viewed and studied, as well as changing and expanding the canon of what is commonly taught. It is used a lot in Greek myths.Traditionally, feminist literary criticism has sought to examine old texts within literary canon through a new lens. Specific goals of feminist criticism include both the development and discovery of female tradition of writing, and rediscovering of old texts, while also interpreting symbolism of women's writing so that it will not be lost or ignored by the male point of view and resisting sexism inherent in the majority of mainstream literature. These goals, along with the intent to analyze women writers and their writings from a female perspective, and increase awareness of the sexual politics of language and style were developed by Lisa Tuttle in the 1980s, and have since been adopted by a majority of feminist critics. The history of feminist literary criticism is extensive, from classic works of nineteenth-century female authors such as George Eliot and Margaret Fuller to cutting-edge theoretical work in women's studies and gender studies by "third-wave" authors. Before the 1970s—in the first and second waves of feminism—feminist literary criticism was concerned with women's authorship and the representation of women's condition within the literature; in particular the depiction of fictional female characters. In addition, feminist literary criticism is concerned with the exclusion of women from the literary canon, with theorists such as Lois Tyson suggesting that this is because the views of women authors are often not considered to be universal.Additionally, feminist criticism has been closely associated with the birth and growth of queer studies. Modern feminist literary theory seeks to understand both the literary portrayals and representation of both women and people in the queer community, expanding the role of a variety of identities and analysis within feminist literary criticism.Methods employed Feminist scholarship has developed a variety of ways to unpack literature in order to understand its essence through a feminist lens. Scholars under the camp known as Feminine Critique sought to divorce literary analysis away from abstract diction-based arguments and instead tailored their criticism to more "grounded" pieces of literature (plot, characters, etc.) and recognize the perceived implicit misogyny of the structure of the story itself. Others schools of thought such as gynocriticism—which is considered a 'female' perspective on women's writings—uses a historicist approach to literature by exposing exemplary female scholarship in literature and the ways in which their relation to gender structure relayed in their portrayal of both fiction and reality in their texts. Gynocriticism was introduced during the time of second wave feminism. Elaine Showalter suggests that feminist critique is an "ideological, righteous, angry, and admonitory search for the sins and errors of the past," and says gynocriticism enlists "the grace of imagination in a disinterested search for the essential difference of women's writing."More contemporary scholars attempt to understand the intersecting points of femininity and complicate our common assumptions about gender politics by accessing different categories of identity (race, class, sexual orientation, etc.) The ultimate goal of any of these tools is to uncover and expose patriarchal underlying tensions within novels and interrogate the ways in which our basic literary assumptions about such novels are contingent on female subordination. In this way, the accessibility of literature broadens to a far more inclusive and holistic population. Moreover, works that historically received little or no attention, given the historical constraints around female authorship in some cultures, are able to be heard in their original form and unabridged. This makes a broader collection of literature for all readers insofar as all great works of literature are given exposure without bias towards a gender influenced system.Women have also begun to employ anti-patriarchal themes to protest the historical censorship of literature written by women. The rise of decadent feminist literature in the 1990s was meant to directly challenge the sexual politics of the patriarchy. By employing a wide range of female sexual exploration and lesbian and queer identities by those like Rita Felski and Judith Bennet, women were able attract more attention about feminist topics in literature.Since the development of more complex conceptions of gender and subjectivity and third-wave feminism, feminist literary criticism has taken a variety of new routes, namely in the tradition of the Frankfurt School's critical theory, which analyzes how the dominant ideology of a subject influences societal understanding. It has also considered gender in the terms of Freudian and Lacanian psychoanalysis, as part of the deconstruction of existing relations of power, and as a concrete political investment. The more traditionally central feminist concern with the representation and politics of women's lives has continued to play an active role in criticism. More specifically, modern feminist criticism deals with those issues related to the perceived intentional and unintentional patriarchal programming within key aspects of society including education, politics and the work force. When looking at literature, modern feminist literary critics also seek ask how feminist, literary, and critical the critique practices are, with scholars such as Susan Lanser looking to improve both literature analysis and the analyzer's own practices to be more diverse.
null
null
null
null
3
[ "Liam McCarthy and John D. O'Callaghan", "participant of", "European Union Contest for Young Scientists" ]
Liam McCarthy (born 1995/96) and John D. O'Callaghan (born 1994/95) are Irish students from Kinsale, County Cork. They were the winners of the 45th Young Scientist and Technology Exhibition in 2009 at the ages of thirteen and fourteen respectively. Their win meant that their school, Kinsale Community School, became the first school in the country to be attended by multiple Young Scientist and Technology Exhibition winners after their fellow student Aisling Judge won the same award in 2006. McCarthy and O'Callaghan went on to be named EU Young Scientists of the Year in September 2009.
null
null
null
null
2
[ "Liam McCarthy and John D. O'Callaghan", "influenced by", "Aisling Judge" ]
Future plans, as of 2009 McCarthy and O'Callaghan wish to study and work in farming and science as, according to O'Callaghan, "the importance of the agriculture sector on the [Irish] economy is huge". They said their inspiration was 2006 winner and fellow student at Kinsale Community School, Aisling Judge.
null
null
null
null
3
[ "Cariño (band)", "influenced by", "La Casa Azul" ]
Artistry Cariño's sound has been described as pop, indie pop, and pop-punk. They have stated that they were influenced by musical groups such as Juniper Moon, La Casa Azul and Los Fresones Rebeldes.
null
null
null
null
4
[ "Cariño (band)", "influenced by", "Juniper Moon" ]
Artistry Cariño's sound has been described as pop, indie pop, and pop-punk. They have stated that they were influenced by musical groups such as Juniper Moon, La Casa Azul and Los Fresones Rebeldes.
null
null
null
null
5
[ "Cariño (band)", "influenced by", "Los Fresones Rebeldes" ]
Artistry Cariño's sound has been described as pop, indie pop, and pop-punk. They have stated that they were influenced by musical groups such as Juniper Moon, La Casa Azul and Los Fresones Rebeldes.
null
null
null
null
6
[ "Mitra", "said to be the same as", "Mithras" ]
The name Mithra was adopted by the Greeks and Romans as Mithras, chief figure in the mystery religion of Mithraism. At first identified with the Sun-god Helios by the Greeks, the syncretic Mithra-Helios was transformed into the figure Mithras during the 2nd century BC, probably at Pergamon. This new cult was taken to Rome around the 1st century BC and was dispersed throughout the Roman Empire. Popular among the Roman military, Mithraism was spread as far north as Hadrian's Wall and the Germanic Limes.
null
null
null
null
0
[ "Mitra", "different from", "mitre" ]
null
null
null
null
3
[ "Mitra", "different from", "Mitra" ]
null
null
null
null
6
[ "Mitra", "said to be the same as", "Mithra" ]
null
null
null
null
14
[ "Mitra", "influenced by", "Mithra" ]
null
null
null
null
15
[ "Telemachus", "significant person", "Athena" ]
Odyssey In Homer's Odyssey, Telemachus, under the instructions of Athena (who accompanies him during the quest), spends the first four books trying to gain knowledge of his father, Odysseus, who left for Troy when Telemachus was still an infant. At the outset of Telemachus' journey, Odysseus had been absent from his home at Ithaca for twenty years due to the Trojan War and the intervention of Poseidon. During his absence, Odysseus' house has been occupied by hordes of suitors seeking the hand of Penelope. Telemachus first visits Nestor and is well received by the old man who regales him with stories of his father's glory. Telemachus then departs with Nestor's son Peisistratus, who accompanies him to the halls of Menelaus and his wife Helen. Whilst there, Telemachus is again treated as an honored guest as Menelaus and Helen tell complementary yet contradictory stories of his father's exploits at Troy. Telemachus also learns from Menelaus that his father was last seen stranded on Ogygia.Telemachus focuses on his father's return to Ithaca in Book XV. He visits Eumaeus, the swineherd, who happens to be hosting a disguised Odysseus. After Odysseus reveals himself to Telemachus due to Athena's advice, the two men plan the downfall of the suitors. Telemachus then returns to the palace to keep an eye on the suitors and to await his father as the beggar.When Penelope challenges the suitors to string Odysseus' bow and shoot an arrow through the handle-holes of twelve axe heads, Telemachus is the first to attempt the task. He would have completed the task, nearly stringing the bow on his fourth attempt; however, Odysseus subtly stops him before he can finish his attempt. Following the suitors' failure at this task, Odysseus reveals himself and he and Telemachus bring swift and bloody death to the suitors.
null
null
null
null
1
[ "Telemachus", "influenced by", "Mentes" ]
null
null
null
null
18
[ "Center for Open Science", "founded by", "Brian Nosek" ]
The Center for Open Science is a non-profit technology organization based in Charlottesville, Virginia with a mission to "increase the openness, integrity, and reproducibility of scientific research." Brian Nosek and Jeffrey Spies founded the organization in January 2013, funded mainly by the Laura and John Arnold Foundation and others.The organization began with work in reproducibility of psychology research, with the large-scale initiative Reproducibility Project: Psychology. A second reproducibility project for cancer biology research has also been started through a partnership with Science Exchange. In March 2017, the Center published a detailed strategic plan. Brian Nosek posted a letter outlining the history of the Center and future directions.In 2020, the Center received a grant from Fast Grants to promote the publication of COVID-19 research on the platform.In 2021, the Center for Open Science was honored with the Einstein Foundation Award for Promoting Quality in Research in the institutional category for their contribution to fostering research integrity and to improving transparency and accessibility.
null
null
null
null
12
[ "Center for Open Science", "influenced by", "Open Science Framework" ]
Open Science Framework Reproducibility project The Open Science Framework (OSF) is an open source software project that facilitates open collaboration in science research. The framework was initially used to work on a project in the reproducibility of psychology research, but has subsequently become multidisciplinary. The current reproducibility aspect of the project is a crowdsourced empirical investigation of the reproducibility of a variety of studies from psychological literature, sampling from three major journals: Journal of Personality and Social Psychology, Psychological Science, and Journal of Experimental Psychology: Learning, Memory, and Cognition. Scientists from all over the world volunteer to replicate a study of their choosing from these journals, and follow a structured protocol for designing and conducting a high-powered replication of the key effect. The results were published in 2015.
null
null
null
null
18
[ "Blovel", "influenced by", "blog post" ]
Blovel (a portmanteau of blog and novel) is a novel created from serialized blog posts. This differs from a blook, which is a published book that has been made from, or inspired by, blog content. With a blovel, the story is created in and for the blog. It may later become a blook, should the author or a publisher choose to combine the posts into a single publication, but it is primarily a work of fiction created using the technology of an internet blog. Various writers contemplating blovels have laid out some criteria for blovels:
null
null
null
null
2
[ "ReFLEX", "influenced by", "FLEX" ]
ReFLEX is a wireless protocol developed by Motorola, used for two-way paging, messaging, and low-bandwidth data. It is based on the FLEX one-way paging protocol, adding capabilities for multiple forward channels, multiple return channels, and roaming. It originally came in two variants, ReFLEX25 and ReFLEX50. ReFLEX50 was originally developed to support a messaging service launched by MTEL in the mid 1990s, while ReFLEX25 was developed several years later to provide an upgrade path for traditional one-way paging carriers. The 50 and 25 signified 50 kHz and 25kHz channel spacing, although in reality both variants supported flexible channel configurations. The two variants were unified into a single protocol with version 2.7, which was released simply as ReFLEX 2.7. Devices compliant with ReFLEX 2.7 are backwards compatible with both ReFLEX25 and ReFLEX50 networks, with several new features to improve roaming, performance, and interoperability between different networks. ReFLEX systems support forward channel speeds of 1600, 3200, and 6400 bits per second, and return channel speeds of 800, 1600, 6400, and 9600 bits per second. Like FLEX, ReFLEX is synchronous, based on 1.875 second frames and 4-level FSK modulation. The Motorola PageWriter released in 1996 was one of the first devices to use the ReFLEX network protocol. Although ReFLEX now has limited viability in the commercial market, it is finding new uses in Automatic Meter Reading, public safety, and low cost/bandwidth M2M applications.
null
null
null
null
0
[ "YMODEM", "influenced by", "XMODEM" ]
YMODEM is a file transfer protocol used between microcomputers connected together using modems. It was primarily used to transfer files to and from bulletin board systems. YMODEM was developed by Chuck Forsberg as an expansion of XMODEM and was first implemented in his CP/M YAM program. Initially also known as YAM, it was formally given the name "YMODEM" in 1985 by Ward Christensen, author of the original XMODEM. YMODEM extended XMODEM in three ways, combining features found in other extended XMODEM varieties. Like XMODEM-CRC, YMODEM replaced the 8-bit checksum with a 16-bit cyclic redundancy check (CRC), but made it the default form of correction instead of optional. From TeLink it added the "block 0" header that sent the filename and size, which allowed batch transfers (multiple files in a single session) and eliminated the need to add padding at the end of the file. Finally, YMODEM allowed the block size to be increased from the original 128 bytes of data to 1024, as in XMODEM-1k, which greatly improved throughput on faster modems. Forsberg built the standard with all of these features as runtime options, allowing a single protocol driver to fall back to XMODEM-CRC or even XMODEM when connecting to non-YAM systems. He believed that programmers would want to implement as many of these features as possible on any given platform. He was dismayed to find that the majority of implementations were actually providing nothing more than 1k block size with CRC-16, failing to implement the "block 0" while continuing to use the YMODEM name. The result was the release of many mutually incompatible YMODEM implementations, and the use of the name YMODEM Batch to clearly indicate those versions that did support the complete standard.
null
null
null
null
2
[ "React Native", "influenced by", "React" ]
History In 2012 Mark Zuckerberg commented, "The biggest mistake we made as a company was betting too much on HTML as opposed to native". Using HTML5 for Facebook's mobile version resulted in an unstable application that retrieved data slowly. He promised Facebook would soon deliver a better mobile experience. Inside Facebook, Jordan Walke found a way to generate UI elements for iOS from a background JavaScript thread, which became the basis for the React web framework. They decided to organize an internal Hackathon to perfect this prototype in order to be able to build native apps with this technology.In 2015, after months of development, Facebook released the first version for the React JavaScript Configuration. During a technical talk, Christopher Chedeau explained that Facebook was already using React Native in production for its Group App and its Ads Manager App.
null
null
null
null
9
[ "React Native", "different from", "React" ]
React Native is an open-source UI software framework created by Meta Platforms, Inc. It is used to develop applications for Android: §Chapter 1 , Android TV, iOS: §Chapter 1 , macOS, tvOS, Web, Windows and UWP by enabling developers to use the React framework along with native platform capabilities. It is used to develop the Android and iOS applications at Facebook, Microsoft, and Shopify. It is also being used to develop virtual reality applications at Oculus.
null
null
null
null
10
[ "Next.js", "influenced by", "React" ]
null
null
null
null
22
[ "Consumer Reports", "main subject", "consumer education" ]
null
null
null
null
4
[ "Consumer Reports", "main subject", "advocacy" ]
Consumer Reports (CR), formerly Consumers Union (CU), is an American nonprofit consumer organization dedicated to independent product testing, investigative journalism, consumer-oriented research, public education, and consumer advocacy.Founded in 1936, CR was created to serve as a source of information that consumers could use to help assess the safety and performance of products. Since that time, CR has continued its testing and analysis of products and services, and attempted to advocate for the consumer in legislative and rule-making areas. Among the reforms in which CR played a role were the advent of seat belt laws, exposure of the dangers of cigarettes, and more recently, the enhancement of consumer finance protection and the increase of consumer access to quality health care. The organization has also expanded its reach to a suite of digital platforms. Consumer Reports Advocacy frequently supports environmental causes, including heightened regulations on auto manufacturers.The organization's headquarters, including its 50 testing labs, are located in Yonkers, New York, while its automotive testing track is in East Haddam, Connecticut. CR is funded by subscriptions to its magazine and website, as well as through independent grants and donations. Marta L. Tellado is the current CEO of Consumer Reports. She joined the organization in 2014, following her work with the Ford Foundation, with the goal of expanding its engagement and advocacy efforts.Consumer Reports' flagship website and magazine publishes reviews and comparisons of consumer products and services based on reporting and results from its in-house testing laboratory and survey research center. CR accepts no advertising, pays for all the products it tests, and as a nonprofit organization has no shareholders. It also publishes general and targeted product/service buying guides.Advocacy and campaigns Consumer Reports has hundreds of thousands of online advocates who take action and write letters to policymakers about the issues its advocates take on. This group continues to grow as Consumer Reports expands its reach, with 6 million paid members who have access to online tools like a car recall tracker and personalized content. An additional base of online members join for free and received guidance on a range of products (i.e. gas grills, washing machines) at no charge. CR has also launched several advocacy websites, including HearUsNow.org, which helps consumers with telecommunications policy matters. In March 2005, CR campaign PrescriptionforChange.org released "Drugs I Need", an animated short with a song from the Austin Lounge Lizards, that was featured by The New York Times, JibJab, BoingBoing, and hundreds of blogs. On Earth Day 2005, CR launched GreenerChoices.org, a web-based initiative meant to "inform, engage, and empower consumers about environmentally friendly products and practices." Consumer Reports was a sponsor of the Safe Patient Project, whose goal was to help consumers find the best quality of health care by promoting the public disclosure of hospital-acquired infection rates and medical errors. The US Centers for Disease Control states that about 2 million patients annually (about 1 in 20) will acquire an infection while being treated in a hospital for an unrelated health care problem, resulting in 99,000 deaths and as much as $45 billion in excess hospital costs.The campaign has worked in every state calling for legislation requiring hospitals to disclose infection rates to the public. The Safe Patient Project also works on medical devices, prescription drugs, and physician accountability. GreenerChoices.org offers an "accessible, reliable, and practical source of information on buying 'greener' products that have minimal environmental impact and meet personal needs." The site contains many articles about different products, rating them on how "green" they are. It also focuses on electronics and appliance recycling and reuse, as well as conservation and global warming prevention. Funding for Consumer Reports has recently been provided by USPIRG Education Fund, the Kentucky Equal Justice Center and the California Pan-Ethnic Health Network among other advocacy organizations.In recent years, the organization has been vocal on key issues, including championing consumer choice and industry competition in the debate against the Sprint T-Mobile merger, advocating for consumer preference to leave net neutrality protections in place, exposing how data is used to engage in racial discrimination when determining consumer pricing offers, and advocating for stronger privacy laws in the wake of Cambridge Analytica.
null
null
null
null
10
[ "Consumer Reports", "main subject", "survey" ]
null
null
null
null
11
[ "Consumer Reports", "influenced by", "Consumers' Research" ]
History Consumer Reports' predecessor, Consumers' Research, was founded in 1926. In 1936, Consumer Reports was founded by Arthur Kallet, Colston Warne, and others who felt that the established Consumers' Research organization was not aggressive enough. Kallet, an engineer and director of Consumers' Research, had a falling out with F.J. Schlink and started his own organization with Amherst College economics professor Colston Warne. In part due to actions of Consumers' Research, the House Un-American Activities Committee placed Consumers Union on a list of subversive organizations, only to remove it in 1954. Prominent consumer advocate Ralph Nader was on the board of directors, but left in 1975 due to a "division of philosophy" with new Executive Director Rhoda Karpatkin. Nader wanted Consumer Reports to focus on policy and product advocacy, while Karpatkin focused on product testing. Karpatkin was appointed executive director in 1974 and retired as president in the early 2000s.Consumer Reports has helped start several consumer groups and publications, in 1960 helping create global consumer group Consumers International and in 1974 providing financial assistance to Consumers' Checkbook which is considered akin to Consumer Reports for local services in the seven metropolitan areas they serve. At the start of 2009, Consumer Reports acquired The Consumerist blog from Gawker Media for approximately $600,000. Prior to 2012, the organization did business as Consumers Union. The reason for the name change was that the name of "Consumer Reports" was more familiar to the public than the name of "Consumers Union".Consumer Reports spent $200,000 on lobbying in 2015.The Consumerist was subsequently closed in December 2017, when its content was folded into the Consumer Reports website.
null
null
null
null
12
[ "Consumer Reports", "main subject", "product testing" ]
null
null
null
null
14
[ "Consumer Reports", "different from", "China Consumer Reports" ]
null
null
null
null
15
[ "Consumer Reports", "main subject", "consumer protection" ]
null
null
null
null
16
[ "Steelman language requirements", "influenced by", "ALGOL 68" ]
null
null
null
null
0
[ "Prolog", "different from", "prologue" ]
null
null
null
null
5
[ "Prolog", "influenced by", "Planner" ]
null
null
null
null
8
[ "Prolog", "topic's main category", "Category:Prolog programming language family" ]
null
null
null
null
14
[ "Cocaine (song)", "performer", "J.J. Cale" ]
null
null
null
null
3
[ "Cocaine (song)", "lyrics by", "J.J. Cale" ]
null
null
null
null
4
[ "Cocaine (song)", "performer", "Eric Clapton" ]
Charts Eric Clapton version Glyn Johns produced the Clapton recording, which was released on the 1977 album Slowhand. It was also released as the B-side for "Lay Down Sally". A live version of "Cocaine" from the album Just One Night charted on the Billboard Hot 100 as the B-side of "Tulsa Time", which was a No. 30 hit in 1980. "Cocaine" was one of several of Cale's songs recorded by Clapton, including "After Midnight" and "Travelin' Light". AllMusic critic Richard Gilliam called it "among [Clapton's] most enduringly popular hits" and noted that "even for an artist like Clapton with a huge body of high-quality work, 'Cocaine' ranks among his best."Clapton described "Cocaine" as an anti-drug song intended to warn listeners about its addictiveness and deadliness. He called the song "quite cleverly anti-cocaine", noting: It's no good to write a deliberate anti-drug song and hope that it will catch. Because the general thing is that people will be upset by that. It would disturb them to have someone else shoving something down their throat. So the best thing to do is offer something that seems ambiguous—that on study or on reflection actually can be seen to be "anti"—which the song "Cocaine" is actually an anti-cocaine song. If you study it or look at it with a little bit of thought ... from a distance ... or as it goes by ... it just sounds like a song about cocaine. But actually, it is quite cleverly anti-cocaine. Because of its ambiguous message, Clapton did not perform the song in many of his concerts; over the years, he has added the lyrics 'that dirty cocaine' in live shows to underline the anti-drug message of the song. A live version of the song does appear on Clapton's 1982 hits compilation Time Pieces.
null
null
null
null
5
[ "Cocaine (song)", "influenced by", "Sunshine of Your Love" ]
null
null
null
null
8
[ "Cocaine (song)", "different from", "Cocaine Blues" ]
null
null
null
null
9
[ "IBM 701", "influenced by", "Whirlwind" ]
null
null
null
null
3
[ "Hellerau", "influenced by", "Lebensreform" ]
null
null
null
null
3
[ "Hellerau", "topic's main category", "Category:Hellerau" ]
null
null
null
null
4
[ "Aubrey–Maturin series", "main subject", "naval warfare" ]
null
null
null
null
9
[ "Aubrey–Maturin series", "influenced by", "Horatio Hornblower" ]
Series Novels in order of first publication Master and Commander (1969) Post Captain (1972) HMS Surprise (1973) The Mauritius Command (1977) Desolation Island (1978) The Fortune of War (1979) The Surgeon's Mate (1980) The Ionian Mission (1981) Treason's Harbour (1983) The Far Side of the World (1984) The Reverse of the Medal (1986) The Letter of Marque (1988) The Thirteen-Gun Salute (1989) The Nutmeg of Consolation (1991) Clarissa Oakes (1992) – (The Truelove in the US) The Wine-Dark Sea (1993) The Commodore (1995) The Yellow Admiral (1996) The Hundred Days (1998) Blue at the Mizzen (1999) The Final Unfinished Voyage of Jack Aubrey (2004) – (21 in the US)
null
null
null
null
12
[ "Aubrey–Maturin series", "topic's main category", "Category:Aubrey–Maturin series" ]
null
null
null
null
16
[ "Aubrey–Maturin series", "main subject", "military intelligence" ]
null
null
null
null
34
[ "Integer BASIC", "influenced by", "HP Time-Shared BASIC" ]
null
null
null
null
0
[ "Daomu Biji", "main subject", "archaeology" ]
null
null
null
null
3
[ "Daomu Biji", "influenced by", "Ghost Blows Out the Light" ]
Daomu Biji (simplified Chinese: 盗墓笔记; traditional Chinese: 盜墓筆記; pinyin: Dàomù bǐjì) variously translated as Grave Robbers’ Chronicles, Grave Robbery Note and The Lost Tomb, is a novel series about the grave-robbing adventures of Wu Xie, a young man hailing from a family that had been tomb-raiders for centuries. The series was written by Xu Lei (Chinese: 徐磊), better known by his pen-name Nan Pai San Shu (南派三叔). It was first serialized online at Qidian China (simplified Chinese: 起点中文网; traditional Chinese: 起點中文網; lit. 'Starting Point Chinese Net'), a Chinese website for publishing, writing and reading novels, as a fanwork of Ghost Blows Out the Light originally. Written over a span of five years and published as nine separate novels, it is one of the most popular novel series in China from 2007 with several million fans and over 20 million copies sold. The author has also written two sequels, Zang Hai Hua (Chinese: 藏海花), Sha Hai (Chinese: 沙海), which continued the leading character's story, neither of which were finished at the time of the author's announcement to retire from writing on March 22, 2013. The author returned to writing in 2019 with another sequel, Reboot: Thunder at the Distant Sea (Chinese: 重启之极海听雷). Along with Ghost Blows Out the Light, Daomu has contributed greatly to creating a craze and subsequent market in the Greater China area for novels focusing on grave-robbing that also deal with the supernatural.
null
null
null
null
13
[ "Virginia Sterilization Act of 1924", "significant event", "Buck v. Bell" ]
null
null
null
null
0
[ "Virginia Sterilization Act of 1924", "influenced by", "Harry H. Laughlin" ]
Historical background Laughlin's Model Eugenical Sterilization Law During the early 20th century, Harry H. Laughlin, director of the Eugenics Record Office at Cold Spring Harbor, New York, became concerned that states were not enforcing their eugenics laws. In 1922, he published his book, Eugenical Sterilization in the United States, which included a "MODEL EUGENICAL STERILIZATION LAW" in Chapter XV.By 1924, 15 states had enacted similar legislation; however, unlike Virginia, many or most or all of those states failed to rigidly enforce their laws requiring specific qualities in all persons seeking to marry. Forced sterilization, however, was much more common. By 1956, twenty-four states had laws providing for involuntary sterilization on their books. These states collectively reported having forcibly sterilized 59,000 people over the preceding 50 years.Virginia implemented Laughlin's "Model Eugenical Sterilization Law" with little modification two years after it was published.
null
null
null
null
1
[ "Virginia Sterilization Act of 1924", "main subject", "eugenics" ]
null
null
null
null
5
[ "Virginia Sterilization Act of 1924", "applies to jurisdiction", "Virginia" ]
null
null
null
null
7
[ "D-Bus", "has use", "RPC" ]
null
null
null
null
2
[ "D-Bus", "has use", "Distributed object communication" ]
null
null
null
null
9
[ "D-Bus", "used by", "desktop application" ]
null
null
null
null
11
[ "D-Bus", "has use", "inter-process communication" ]
Communications model D-Bus was conceived as a generic, high-level inter-process communication system. To accomplish such goals, D-Bus communications are based on the exchange of messages between processes instead of "raw bytes". D-Bus messages are high-level discrete items that a process can send through the bus to another connected process. Messages have a well-defined structure (even the types of the data carried in their payload are defined), allowing the bus to validate them and to reject any ill-formed message. In this regard, D-Bus is closer to an RPC mechanism than to a classic IPC mechanism, with its own type definition system and its own marshaling. The bus supports two modes of interchanging messages between a client and a service process:
null
null
null
null
13
[ "D-Bus", "influenced by", "DCOP" ]
History and adoption D-Bus was started in 2002 by Havoc Pennington, Alex Larsson (Red Hat) and Anders Carlsson. The version 1.0—considered API stable—was released in November 2006. Heavily influenced by the DCOP system used by versions 2 and 3 of KDE, D-Bus has replaced DCOP in the KDE 4 release. An implementation of D-Bus supports most POSIX operating systems, and a port for Windows exists. It is used by Qt 4 and later by GNOME. In GNOME it has gradually replaced most parts of the earlier Bonobo mechanism. It is also used by Xfce. One of the earlier adopters was the (nowadays deprecated) Hardware Abstraction Layer. HAL used D-Bus to export information about hardware that has been added to or removed from the computer.The usage of D-Bus is steadily expanding beyond the initial scope of desktop environments to cover an increasing amount of system services. For instance, the NetworkManager network daemon, BlueZ bluetooth stack and PulseAudio sound server use D-Bus to provide part or all of their services. systemd uses the D-Bus wire protocol for communication between systemctl and systemd, and is also promoting traditional system daemons to D-Bus services, such as logind. Another heavy user of D-Bus is Polkit, whose policy authority daemon is implemented as a service connected to the system bus.
null
null
null
null
16
[ "D-Bus", "topic's main category", "Category:D-Bus" ]
null
null
null
null
17
[ "HotSpot (virtual machine)", "has use", "Java Virtual Machine" ]
null
null
null
null
7
[ "HotSpot (virtual machine)", "influenced by", "Strongtalk" ]
History The Java HotSpot Performance Engine was released on April 27, 1999, built on technologies from an implementation of the programming language Smalltalk named Strongtalk, originally developed by Longview Technologies, which traded as Animorphic. The Longview virtual machine was based on the Self virtual machine, with an interpreter replacing the fast-and-dumb first compiler. When Sun cancelled the Self project, two key people, Urs Hölzle and Lars Bak left Sun to start Longview. In 1997, Sun Microsystems purchased Animorphic.Shortly after acquiring Animorphic, Sun decided to write a new just-in-time (JIT) compiler for the Java virtual machine. This new compiler would give rise to the name HotSpot, derived from the software's behavior: as it runs Java bytecode, as with the Self VM, HotSpot continually analyzes the program's performance for hot spots which are executed often or repeatedly. These are then targeted for optimizing, leading to high-performance execution with a minimum of overhead for less performance-critical code. In one report, the JVM beat some C++ or C code in some benchmarks.Initially available as an add-on for Java 1.2, HotSpot became the default Sun JVM in Java 1.3.
null
null
null
null
8
[ "HotSpot (virtual machine)", "different from", "Hot spot" ]
null
null
null
null
9
[ "United States Army Special Forces", "influenced by", "British Commandos" ]
null
null
null
null
6
[ "Scots law", "applies to jurisdiction", "Scotland" ]
Scots law (Scottish Gaelic: Lagh na h-Alba) is the legal system of Scotland. It is a hybrid or mixed legal system containing civil law and common law elements, that traces its roots to a number of different historical sources. Together with English law and Northern Ireland law, it is one of the three legal systems of the United Kingdom. Early Scots law before the 12th century consisted of the different legal traditions of the various cultural groups who inhabited the country at the time, the Gaels in most of the country, with the Britons and Anglo-Saxons in some districts south of the Forth and with the Norse in the islands and north of the River Oykel. The introduction of feudalism from the 12th century and the expansion of the Kingdom of Scotland established the modern roots of Scots law, which was gradually influenced by other, especially Anglo-Norman and continental legal traditions. Although there was some indirect Roman law influence on Scots law, the direct influence of Roman law was slight up until around the 15th century. After this time, Roman law was often adopted in argument in court, in an adapted form, where there was no native Scots rule to settle a dispute; and Roman law was in this way partially received into Scots law.Sources Legislation The Parliament of the United Kingdom has the power to pass statutes on any issue for Scotland, although under the Sewel convention it will not do so in devolved matters without the Scottish Parliament's consent. The Human Rights Act 1998, the Scotland Act 1998 and the European Communities Act 1972 have special status in the law of Scotland. Modern statutes will specify that they apply to Scotland and may also include special wording to take into consideration unique elements of the legal system. Statutes must receive royal assent from the King before becoming law, however this is now only a formal procedure and is automatic. Legislation of the Parliament of the United Kingdom is not subject to revocation by the courts as the Parliament is said to have supreme legal authority; however, application of legislation is subject to judicial review and also in practice, the Parliament will tend not to create legislation which contradicts the Human Rights Act 1998 or European law, although it is technically free to do so. The degree to which the Parliament has surrendered this sovereignty is a matter of controversy with arguments generally concerning what the relationship should be between the United Kingdom and the European Union. Acts of the United Kingdom Parliament also regularly delegate powers to Ministers of the Crown or other bodies to produce legislation in the form of statutory instruments. This delegated legislation has legal effect in Scotland so far as the specific provisions of the statutory instrument are duly authorised by the powers of the Act, a question which can be subjected to judicial review. The Scottish Parliament is a devolved unicameral legislature that has the power to pass statutes only affecting Scotland on matters within its legislative competence. Legislation passed by the Scottish Parliament must also comply with the Human Rights Act 1998 and European law, otherwise the Court of Session or High Court of Justiciary have the authority to strike down the legislation as ultra vires. There have been a number of high-profile examples of challenges to Scottish Parliament legislation on these grounds, including against the Protection of Wild Mammals (Scotland) Act 2002 where an interest group unsuccessfully claimed the ban on fox hunting violated their human rights. Legislation passed by the Scottish Parliament also requires royal assent which, like with the Parliament of the United Kingdom, is automatically granted.Legislation passed by the pre-1707 Parliament of Scotland still has legal effect in Scotland, though the number of statutes that have not been repealed is limited. Examples include the Royal Mines Act 1424, which makes gold and silver mines the property of the King, and the Leases Act 1449, which is still relied on today in property law cases.Legislation which forms part of the law of Scotland should not be confused with a civil code as it does not attempt to comprehensively detail the law. Legislation forms only one of a number of sources.
null
null
null
null
0
[ "Scots law", "influenced by", "Roman-Dutch law" ]
null
null
null
null
2
[ "Scots law", "topic's main category", "Category:Scots law" ]
null
null
null
null
4