New Articles (Page 159)
To stay up to date you can also follow on Mastodon.
π BBS Door
A door in a bulletin board system (BBS) is an interface between the BBS software and an external application. The term is also used to refer to the external application, a computer program that runs outside of the main bulletin board program. Sometimes called external programs, doors are the most common way to add games, utilities, and other extensions to BBSes. Because BBSes typically depended on the telephone system, BBSes and door programs tended to be local in nature, unlike modern Internet games and applications.
From the 1990s on, most BBS software had the capability to "drop to" doors. Several standards were developed for passing connection and user information to doors; this was usually done with "dropfiles", small binary or text files dropped into known locations in the BBS's file system. Most doors were responsible for operating the serial port or other communications device directly until returning control to the BBS. Later development of FOSSIL drivers have allowed both BBSes and their doors to communicate without being responsible for direct operation of the communications hardware.
π List of commercial video games with available source code
This is a list of commercial video games with available source code. The source code of these commercially developed and distributed video games is available to the public or the games' communities.
Discussed on
- "List of commercial video games with available source code" | 2021-06-13 | 61 Upvotes 15 Comments
π Hague Invasion Act
The American Service-Members' Protection Act (ASPA, Title 2 of Pub.L.Β 107β206 (text) (pdf), H.R. 4775, 116Β Stat.Β 820, enacted August 2, 2002) is a United States federal law that aims "to protect United States military personnel and other elected and appointed officials of the United States government against criminal prosecution by an international criminal court to which the United States is not party." Introduced by U.S. Senator Jesse Helms (R-NC) and U.S. Representative Tom DeLay (R-TX) it was an amendment to the 2002 Supplemental Appropriations Act for Further Recovery From and Response to Terrorist Attacks on the United States (H.R. 4775). The amendment passed 75-19 (S.Amdt 3597.) The bill was signed into law by U.S. President George W. Bush on August 2, 2002.
Discussed on
- "The Hague Invasion Act" | 2022-05-19 | 13 Upvotes 10 Comments
- "Hague Invasion Act" | 2021-06-12 | 40 Upvotes 12 Comments
π Operation Legacy
Operation Legacy was a British Colonial Office (later Foreign Office) programme to destroy or hide files, to prevent them being inherited by its ex-colonies. It ran from the 1950s until the 1970s, when the decolonisation of the British Empire was at its height.
MI5 or Special Branch agents vetted all secret documents in the colonial administrations to find those that those that could embarrass the British governmentβfor instance by showing racial or religious bias. They identified 8,800 files to conceal from at least 23 countries and territories in the 1950s and 1960s, and destroyed them or sent them to the United Kingdom. Precise instructions were given for methods to be used for destruction, including burning and dumping at sea. Some of the files detailed torture methods used against opponents of the colonial administrations, such as during the Mau Mau Uprising.
As decolonisation progressed, British officials were keen to avoid a repeat of the embarrassment that had been caused by the overt burning of documents that took place in New Delhi in 1947, which had been covered by Indian news sources. On 3 May 1961, Iain Macleod, who was Secretary of State for the Colonies, wrote a telegram to all British embassies to advise them on the best way to retrieve and dispose of sensitive documents. To prevent post-colonial governments from ever learning about Operation Legacy, officials were required to dispatch "destruction certificates" to London. In some cases, as the handover date approached, the immolation task proved so huge that colonial administrators warned the Foreign Office that there was a danger of "celebrating Independence Day with smoke."
Academic study of the end of the British Empire has been assisted in recent years by the declassification of the migrated archives in the Foreign and Commonwealth Office (FCO) 141 series. After the UK government admitted in 2011 that it had secret documents related to the Mau Mau Uprising, it began to declassify documents and by November 2013 some 20,000 files had been declassified. These documents can now be accessed at the National Archives in Kew, London.
π The driest place on Earth has not seen rain for nearly 2M years
The McMurdo Dry Valleys are a row of largely snow-free valleys in Antarctica, located within Victoria Land west of McMurdo Sound. The Dry Valleys experience extremely low humidity and surrounding mountains prevent the flow of ice from nearby glaciers. The rocks here are granites and gneisses, and glacial tills dot this bedrock landscape, with loose gravel covering the ground. It is one of the driest places on Earth and has not seen rain for nearly 2 million years.
The region is one of the world's most extreme deserts, and includes many features including Lake Vida, a saline lake, and the Onyx River, a meltwater stream and Antarctica's longest river. Although no living organisms have been found in the permafrost here, endolithic photosynthetic bacteria have been found living in the relatively moist interior of rocks, and anaerobic bacteria, with a metabolism based on iron and sulfur, live under the Taylor Glacier.
Discussed on
- "The driest place on Earth has not seen rain for nearly 2M years" | 2021-06-11 | 18 Upvotes 1 Comments
π Trivialism
Trivialism (from Latin trivialisΒ 'found everywhere') is the logical theory that all statements (also known as propositions) are true and that all contradictions of the form "p and not p" (e.g. the ball is red and not red) are true. In accordance with this, a trivialist is a person who believes everything is true.
In classical logic, trivialism is in direct violation of Aristotle's law of noncontradiction. In philosophy, trivialism is considered by some to be the complete opposite of skepticism. Paraconsistent logics may use "the law of non-triviality" to abstain from trivialism in logical practices that involve true contradictions.
Theoretical arguments and anecdotes have been offered for trivialism to contrast it with theories such as modal realism, dialetheism and paraconsistent logics.
Discussed on
- "Trivialism" | 2021-06-07 | 28 Upvotes 12 Comments
π ST3000DM001
The ST3000DM001 is a hard disk drive released by Seagate Technology in 2011 as part of the Seagate Barracuda series. It has a capacity of 3 terabytes (TB) and a spindle speed of 7200Β RPM. This particular drive model was reported to have unusually high failure rates, approximately 5.7 times higher fail rates in comparison to other 3 TB drives.
Discussed on
- "ST3000DM001" | 2021-06-07 | 270 Upvotes 250 Comments
π Merkle Tree
In cryptography and computer science, a hash tree or Merkle tree is a tree in which every leaf node is labelled with the cryptographic hash of a data block, and every non-leaf node is labelled with the cryptographic hash of the labels of its child nodes. Hash trees allow efficient and secure verification of the contents of large data structures. Hash trees are a generalization of hash lists and hash chains.
Demonstrating that a leaf node is a part of a given binary hash tree requires computing a number of hashes proportional to the logarithm of the number of leaf nodes of the tree; this contrasts with hash lists, where the number is proportional to the number of leaf nodes itself.
The concept of hash trees is named after Ralph Merkle, who patented it in 1979.
Discussed on
- "Merkle Tree" | 2021-06-06 | 53 Upvotes 10 Comments
π Self-licking ice cream cone
In political jargon, a self-licking ice cream cone is a self-perpetuating system that has no purpose other than to sustain itself. The phrase appeared to have been first used in 1992, in On Self-Licking Ice Cream Cones, a paper by Pete Worden about NASA's bureaucracy. James A. Vedda described it as "Why do humans go into space? So we can go farther into space!"
Since then, the term has been used to describe the habit of government funded organisations and programs spending taxpayer money to lobby for more funding from the taxpayer. Other things compared have included financial bubbles, chatshows and reality television. In The Irish Times, Kevin Courtney observed that "many organisations are also stuck in limbo, destined to keep lurching on without ever achieving their stated goal. Thatβs because their real goal is simply to carry on regardless." The Cold War infrastructure has also been compared to a self-licking ice cream cone, given that expensive projects continued to be financed long after world communism had ceased to pose a viable threat.
Richard Hoggart used the term to describe certain United Nations programmes.
In sport, the Bowl Alliance was criticised using the term.
π Tall Poppy Syndrome
The tall poppy syndrome is the cultural phenomenon of jealous people holding back or directly attacking those who are perceived to be better than the norm, "cutting down the tall poppy". It describes a draw towards mediocrity.
Commonly in Australia and New Zealand, "Cutting down the tall poppy" is used to describe those who think too highly of themselves and it is seen by some as self-deprecating and by others as promoting modesty and egalitarianism.
Discussed on
- "Tall Poppy Syndrome" | 2021-06-05 | 40 Upvotes 10 Comments