New Articles (Page 246)
To stay up to date you can also follow on Mastodon.
π Posse Comitatus Act
The Posse Comitatus Act is a United States federal law (18 U.S.C.Β Β§Β 1385, original at 20Β Stat.Β 152) signed on June 18, 1878, by President Rutherford B. Hayes. The purpose of the act β in concert with the Insurrection Act of 1807 β is to limit the powers of the federal government in using federal military personnel to enforce domestic policies within the United States. It was passed as an amendment to an army appropriation bill following the end of Reconstruction and was updated in 1956 and 1981.
The act specifically applies only to the United States Army and, as amended in 1956, the United States Air Force. Although the act does not explicitly mention the United States Navy and the United States Marine Corps, the Department of the Navy has prescribed regulations that are generally construed to give the act force with respect to those services as well. The act does not prevent the Army National Guard or the Air National Guard under state authority from acting in a law enforcement capacity within its home state or in an adjacent state if invited by that state's governor. The United States Coast Guard (under the Department of Homeland Security) and United States Space Force (under the Department of the Air Force) are not covered by the Posse Comitatus Act either, primarily because although both are armed services, they also have maritime and space law enforcement missions respectively.
The title of the act comes from the legal concept of posse comitatus, the authority under which a county sheriff, or other law officer, conscripts any able-bodied person to assist in keeping the peace.
Discussed on
- "Posse Comitatus Act" | 2020-06-02 | 57 Upvotes 43 Comments
π Liquid Democracy
Liquid democracy is a form of delegative democracy whereby an electorate has the option of vesting voting power in delegates as well as voting directly themselves. Liquid democracy is a broad category of either already-existing or proposed popular-control apparatuses. Voters can either vote directly or delegate their vote to other participants; voters may also select different delegates for different issues. In other words, individual A of a society can delegate their power to another individual B β and withdraw such power again at any time.
Liquid democracy lies between direct and representative democracy. In direct democracy, participants must vote personally on all issues, while in representative democracy participants vote for representatives once in certain election cycles. Meanwhile, liquid democracy does not depend on representatives but rather on a weighted and transitory delegation of votes. Liquid democracy through elections can empower individuals to become sole interpreters of the interests of the nation. It allows for citizens to vote directly on policy issues, delegate their votes on one or multiple policy areas to delegates of their choosing, delegate votes to one or more people, delegated to them as a weighted voter, or get rid of their votes' delegations whenever they please.
Most of the available academic literature on liquid democracy is based on empirical research rather than on specific conceptualization or theories. Experiments have mostly been conducted on a local-level or exclusively through online platforms, however polity examples are listed below.
Discussed on
- "Liquid Democracy" | 2020-06-01 | 52 Upvotes 24 Comments
π Prowords
Procedure words or prowords are words or phrases limited to radio telephone procedure used to facilitate communication by conveying information in a condensed standard verbal format. Prowords are voice versions of the much older prosigns for Morse code first developed in the 1860s for Morse telegraphy, and their meaning is identical. The NATO communications manual ACP-125 contains the most formal and perhaps earliest modern (post-WW-II) glossary of procedure words, but its definitions have been adopted by many other organizations, including the United Nations Development Programme, the U.S. Coast Guard, the Rhode Island Department of Emergency Management, Civil Air Patrol, Military Auxiliary Radio System, and others.
Procedure words are one of several structured parts of radio voice procedures, including Brevity codes and Plain language radio checks. The vast majority of the brevity codes from the U.S. military's Multiservice tactical brevity code are inappropriate for any civilian use, owing to their focus on large weapons (missiles, etc.) and other war-related issues. However, a few are used frequently enough in media to be memorable, including ABORT, BOGEY, BANDIT, FEET WET, FEET DRY, NEGATIVE CONTACT, and NO JOY.
Discussed on
- "Prowords" | 2020-05-31 | 242 Upvotes 109 Comments
π Circle Packing
In geometry, circle packing is the study of the arrangement of circles (of equal or varying sizes) on a given surface such that no overlapping occurs and so that no circle can be enlarged without creating an overlap. The associated packing density, Ξ·, of an arrangement is the proportion of the surface covered by the circles. Generalisations can be made to higher dimensions β this is called sphere packing, which usually deals only with identical spheres.
While the circle has a relatively low maximum packing density of 0.9069 on the Euclidean plane, it does not have the lowest possible. The "worst" shape to pack onto a plane is not known, but the smoothed octagon has a packing density of about 0.902414, which is the lowest maximum packing density known of any centrally-symmetric convex shape. Packing densities of concave shapes such as star polygons can be arbitrarily small.
The branch of mathematics generally known as "circle packing" is concerned with the geometry and combinatorics of packings of arbitrarily-sized circles: these give rise to discrete analogs of conformal mapping, Riemann surfaces and the like.
Discussed on
- "Circle Packing" | 2020-05-30 | 98 Upvotes 30 Comments
π Utah Data Center
The Utah Data Center (UDC), also known as the Intelligence Community Comprehensive National Cybersecurity Initiative Data Center, is a data storage facility for the United States Intelligence Community that is designed to store data estimated to be on the order of exabytes or larger. Its purpose is to support the Comprehensive National Cybersecurity Initiative (CNCI), though its precise mission is classified. The National Security Agency (NSA) leads operations at the facility as the executive agent for the Director of National Intelligence. It is located at Camp Williams near Bluffdale, Utah, between Utah Lake and Great Salt Lake and was completed in May 2019 at a cost of $1.5 billion.
The Utah Data Center, code-named Bumblehive, is the first Intelligence Community Comprehensive National Cyber-security Initiative (IC CNCI) data center designed to support the US intelligence community. The "massive data repository" is designed to cope with the large increase in digital data that has accompanied the rise of the global internet.
Discussed on
- "Utah Data Center" | 2020-05-29 | 40 Upvotes 19 Comments
- "Utah Data Center" | 2013-06-07 | 161 Upvotes 33 Comments
π 1989 California Medfly Attack
In 1989, a sudden invasion of Mediterranean fruit flies (Ceratitis capitata, "medflies") appeared in California and began devastating crops. Scientists were puzzled and said that the sudden appearance of the insects "defies logic", and some speculated "biological terrorists" were responsible. Analysis suggested that an outside hand played a role in the dense infestation.
A person or group calling itself "The Breeders" took responsibility for the bioterrorist attack, as financial retaliation for the environmental damage caused by the state's Malathion aerial spraying; the group's members were never identified. Subsequently, three months after "The Breeders" announced the medfly release, the state ended its decade-long Malathion program and sought alternate ways to handle destructive insects.
Discussed on
- "1989 California Medfly Attack" | 2020-05-29 | 213 Upvotes 99 Comments
π Variolation
Variolation or inoculation was the method first used to immunize an individual against smallpox (Variola) with material taken from a patient or a recently variolated individual, in the hope that a mild, but protective, infection would result. The procedure was most commonly carried out by inserting/rubbing powdered smallpox scabs or fluid from pustules into superficial scratches made in the skin. The patient would develop pustules identical to those caused by naturally occurring smallpox, usually producing a less severe disease than naturally acquired smallpox. Eventually, after about two to four weeks, these symptoms would subside, indicating successful recovery and immunity. The method was first used in China and the Middle East before it was introduced into England and North America in the 1720s in the face of some opposition. The method is no longer used today. It was replaced by smallpox vaccine, a safer alternative. This in turn led to the development of the many vaccines now available against other diseases.
Discussed on
- "Variolation" | 2020-05-27 | 104 Upvotes 117 Comments
π Underwater Basket Weaving
Underwater basket weaving is an idiom referring pejoratively to supposedly useless or absurd college or university courses and often generally to refer to a perceived decline in educational standards.
The term also serves as an intentionally humorous generic answer to questions about an academic degree. It is also used to humorously refer to any non-academic elective course, specifically one that does not count towards any graduation requirements.
Discussed on
- "Underwater Basket Weaving" | 2020-05-25 | 19 Upvotes 4 Comments
π Duffs Device
In the C programming language, Duff's device is a way of manually implementing loop unrolling by interleaving two syntactic constructs of C: the do-while loop and a switch statement. Its discovery is credited to Tom Duff in November 1983, when Duff was working for Lucasfilm and used it to speed up a real-time animation program.
Loop unrolling attempts to reduce the overhead of conditional branching needed to check whether a loop is done, by executing a batch of loop bodies per iteration. To handle cases where the number of iterations is not divisible by the unrolled-loop increments, a common technique among assembly language programmers is to jump directly into the middle of the unrolled loop body to handle the remainder. Duff implemented this technique in C by using C's case label fall-through feature to jump into the unrolled body.
Discussed on
- "Duff's Device" | 2020-05-25 | 145 Upvotes 59 Comments
- "Duffs Device" | 2016-10-21 | 19 Upvotes 4 Comments
- "Duff's device: do + switch fall-through = loop unrolling" | 2009-08-13 | 16 Upvotes 11 Comments
π Skid Row
Skid Row is a neighborhood in Downtown Los Angeles. The area is also known as Central City East.
As of a 2019 count, the population of the district was 4,757. Skid Row contains one of the largest stable populations (about 2,783) of homeless people in the United States and has been known for its condensed homeless population since the 1930s. Its long history of police raids, targeted city initiatives, and homelessness advocacy make it one of the most notable districts in Los Angeles.
Covering fifty city blocks (2.71 sq mi) immediately east of downtown Los Angeles, Skid Row is bordered by Third Street to the north, Seventh Street to the south, Alameda Street to the east, and Main Street to the west.
Discussed on
- "Skid Row" | 2020-05-25 | 54 Upvotes 31 Comments