WRQT

WRQT (95.7 FM, 95.7 The Rock) is a radio station broadcasting an Active Rock format. Licensed to La Crosse, Wisconsin, United States, the station serves the La Crosse area. The station is currently owned by Mid-West Family Broadcasting.[1] The station no longer broadcasts in HD Radio.[2]

WRQT
CityLa Crosse, Wisconsin
Broadcast areaLa Crosse Metropolitan Area
Caledonia, Wisconsin
Frequency95.7 MHz
Branding95.7 The Rock
SloganLa Crosse's Rock Station
Programming
FormatActive Rock
Ownership
OwnerMid-West Family Broadcasting
(Family Radio, Inc.)
Sister stationsWIZM-FM, WKTY, WIZM (AM), KCLH, KQYB
History
First air dateAugust 7, 1972 (first license granted)
Former call signsWSPL-FM (1979-?)
WSPL (?-1996)
WTRV (1996-1998)
Technical information
Facility ID36208
ClassC2
ERP50,000 watts
HAAT150 m (492 ft)
Links
WebcastListen Live
Website957therock.com

History

The station went on the air as WSPL-FM on 1979-07-30. On 1980-01-29, the station changed its call sign to WSPL, on 1996-03-06 to WTRV, on 1998-04-01 to the current 95-7 The Rock WRQT,[3]

gollark: Anyone know where I can find a large dataset of privacy policies, for neural network training?
gollark: <@498244879894315027> Firstly, you could probably try and just use some existing packet capture tool for this. Secondly, seriously what are you doing?! I don't think trying to replay IP or Ethernet packets (whatever gets sent to the network card) has any chance of working to meddle with a higher-level service.
gollark: I suspect it's whatever you're doing to bptr after each broadcast. That looks dubious and the log says it's a "loadprohibited" error, which sounds like something memory.
gollark: I don't think this affects *me* very badly, since my configured disk encryption all runs in software without any weird TPM interaction, I don't use "secure" boot, and it seems like this would need physical access or unrealistically good timing, but it's still not very good.
gollark: I wonder if AMD's PSP has similar holes. In any case, they should really just not be sticking subprocessors with closed-source non-user-modifiable firmware and root access into every CPU.

References


This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.