New Articles (Page 254)

To stay up to date you can also follow on Mastodon.

πŸ”— Mechanical television

πŸ”— Television

Mechanical television or mechanical scan television is a television system that relies on a mechanical scanning device, such as a rotating disk with holes in it or a rotating mirror, to scan the scene and generate the video signal, and a similar mechanical device at the receiver to display the picture. This contrasts with modern television technology, which uses electronic scanning methods, for example electron beams in cathode ray tube (CRT) televisions, and liquid-crystal displays (LCD), to create and display the picture.

Mechanical-scanning methods were used in the earliest experimental television systems in the 1920s and 1930s. One of the first experimental wireless television transmissions was by John Logie Baird on November 25, 1925, in London. By 1928 many radio stations were broadcasting experimental television programs using mechanical systems. However the technology never produced images of sufficient quality to become popular with the public. Mechanical-scan systems were largely superseded by electronic-scan technology in the mid-1930s, which was used in the first commercially successful television broadcasts which began in the late 1930s in Great Britain.

A mechanical television receiver is also called a televisor in some countries.

Discussed on

πŸ”— Van Eck Phreaking

πŸ”— Espionage πŸ”— Internet πŸ”— Telecommunications πŸ”— Computer Security πŸ”— Computer Security/Computing

Van Eck phreaking (also known as Van Eck Radiation) is a form of eavesdropping in which special equipment is used to pick up side-band electromagnetic emissions from electronic devices that correlate to hidden signals or data for the purpose of recreating these signals or data in order to spy on the electronic device. Side-band electromagnetic radiation emissions are present in (and with the proper equipment, can be captured from) keyboards, computer displays, printers, and other electronic devices.

In 1985, Wim van Eck published the first unclassified technical analysis of the security risks of emanations from computer monitors. This paper caused some consternation in the security community, which had previously believed that such monitoring was a highly sophisticated attack available only to governments; van Eck successfully eavesdropped on a real system, at a range of hundreds of metres, using just $15 worth of equipment plus a television set.

As a consequence of this research, such emanations are sometimes called "van Eck radiation", and the eavesdropping technique van Eck phreaking. Government researchers were already aware of the danger, as Bell Labs had noted this vulnerability to secure teleprinter communications during World War II and was able to produce 75% of the plaintext being processed in a secure facility from a distance of 80 feet (24 metres). Additionally the NSA published Tempest Fundamentals, NSA-82-89, NACSIM 5000, National Security Agency (Classified) on February 1, 1982. In addition, the van Eck technique was successfully demonstrated to non-TEMPEST personnel in Korea during the Korean War in the 1950s.

While Phreaking is the process of exploiting telephone networks, it is used here because of its connection to eavesdropping. Van Eck phreaking of CRT displays is the process of eavesdropping on the contents of a CRT by detecting its electromagnetic emissions.

Discussed on

πŸ”— Capability Based Security

πŸ”— Computing πŸ”— Computer Security πŸ”— Computer Security/Computing

Capability-based security is a concept in the design of secure computing systems, one of the existing security models. A capability (known in some systems as a key) is a communicable, unforgeable token of authority. It refers to a value that references an object along with an associated set of access rights. A user program on a capability-based operating system must use a capability to access an object. Capability-based security refers to the principle of designing user programs such that they directly share capabilities with each other according to the principle of least privilege, and to the operating system infrastructure necessary to make such transactions efficient and secure. Capability-based security is to be contrasted with an approach that uses hierarchical protection domains.

Although most operating systems implement a facility which resembles capabilities, they typically do not provide enough support to allow for the exchange of capabilities among possibly mutually untrusting entities to be the primary means of granting and distributing access rights throughout the system. A capability-based system, in contrast, is designed with that goal in mind.

Capabilities as discussed in this article should not be confused with POSIX 1e/2c "Capabilities". The latter are coarse-grained privileges that cannot be transferred between processes.

Discussed on

πŸ”— Atari Punk Console

πŸ”— Electronic music

The Atari Punk Console (commonly shortened to APC) is a popular circuit that utilizes two 555 timer ICs or a single 556 dual timer IC. The original circuit, called a "Sound Synthesizer", was published in a Radio Shack booklet: "Engineer's Notebook: Integrated Circuit Applications" in 1980 and later called "Stepped Tone Generator" in "Engineer's Mini-Notebook - 555 Circuits" by its designer, Forrest M. Mims III (Siliconcepts, 1984). It was named "Atari Punk Console" (APC) by Kaustic Machines crew because its "low-fi" sounds resemble classic Atari console games from the 1980s, with a square wave output similar to the Atari 2600. Kaustic Machines added a -4db line level output with volume control to the circuit which was originally designed to drive a small 8-ohm speaker.

The Atari Punk console is an astable square wave oscillator driving a monostable oscillator that creates a single (square) pulse. There are two controls, one for the frequency of the oscillator and one to control the pulse width. The controls are usually potentiometers but the circuit can also be controlled by light, temperature, pressure etc. by replacing a potentiometer with a suitable sensor (e.g., photoresistor for light sensitivity). Most of the time there is also a power switch (often a toggle switch) and a volume knob.

The circuit is a simple DIY noisemaker circuit that is relatively inexpensive and easy to build, easily adaptable and is configurable in many ways. It has been built into a wide variety of cases. Its flexibility has led to wide scale popularity among electronics enthusiasts. It is often suggested as a good circuit to build for beginners.

Discussed on

πŸ”— Casting out nines

πŸ”— Mathematics

The expression "casting out nines" may refer to any one of three arithmetical procedures:

  • Adding the decimal digits of a positive whole number, while optionally ignoring any 9s or digits which sum to a multiple of 9. The result of this procedure is a number which is smaller than the original whenever the original has more than one digit, leaves the same remainder as the original after division by nine, and may be obtained from the original by subtracting a multiple of 9 from it. The name of the procedure derives from this latter property.
  • Repeated application of this procedure to the results obtained from previous applications until a single-digit number is obtained. This single-digit number is called the "digital root" of the original. If a number is divisible by 9, its digital root is 9. Otherwise, its digital root is the remainder it leaves after being divided by 9.
  • A sanity test in which the above-mentioned procedures are used to check for errors in arithmetical calculations. The test is carried out by applying the same sequence of arithmetical operations to the digital roots of the operands as are applied to the operands themselves. If no mistakes are made in the calculations, the digital roots of the two resultants should be the same. If they are different, therefore, one or more mistakes must have been made in the calculations.

Discussed on

πŸ”— Chicago Tunnel and Reservoir Plan

πŸ”— Environment πŸ”— Urban studies and planning πŸ”— Chicago πŸ”— Illinois

The Tunnel and Reservoir Plan (abbreviated TARP and more commonly known as the Deep Tunnel Project or the Chicago Deep Tunnel) is a large civil engineering project that aims to reduce flooding in the metropolitan Chicago area, and to reduce the harmful effects of flushing raw sewage into Lake Michigan by diverting storm water and sewage into temporary holding reservoirs. The megaproject is one of the largest civil engineering projects ever undertaken in terms of scope, cost and timeframe. Commissioned in the mid-1970s, the project is managed by the Metropolitan Water Reclamation District of Greater Chicago. Completion of the system is not anticipated until 2029, but substantial portions of the system have already opened and are currently operational. Across 30 years of construction, over $3 billion has been spent on the project.

Discussed on

πŸ”— Sand Cat

πŸ”— Africa πŸ”— Cats πŸ”— Mammals πŸ”— Africa/Western Sahara

The sand cat (Felis margarita), also known as the sand dune cat, is the only cat living chiefly in true deserts. This small cat is widely distributed in the deserts of North Africa, the Middle East and Central Asia. Starting in 2002, it was listed as near threatened on the IUCN Red List because the population was considered fragmented and small with a declining trend. It was downlisted to least concern in 2016.

Owing to long hairs covering the soles of its feet, the sand cat is well adapted to the extremes of a desert environment and tolerant of extremely hot and cold temperatures. It inhabits both sandy and stony deserts, in areas far from water sources.

Discussed on

πŸ”— The Pip

πŸ”— Russia πŸ”— Russia/mass media in Russia πŸ”— Radio Stations

The Pip is the nickname given by radio listeners to a shortwave radio station that broadcasts on the frequency 5448Β kHz by day, and 3756Β kHz during the night. It broadcasts short, repeated beeps at a rate of around 50 per minute, for 24 hours per day. The beep signal is occasionally interrupted by voice messages in Russian. The Pip has been active since around 1985, when its distinctive beeping sound was first recorded by listeners.

The station is commonly referred to as "The Pip" among English-speaking radio listeners. In Russia, it is known as Капля (Kaplya) "the drop". While its official name or callsign is not known, some of the voice transmissions begin with the code 8S1Shch (Cyrillic: 8Π‘1Π©), which is generally considered to be the name of the station. However, this code may not be a callsign, but instead serve some other purpose. Radioscanner.ru identifies the owner of this station as a North-Caucasian military district communication center with callsign "Akacia" (ex-72nd communication center, Russian "72 ΡƒΠ·Π΅Π» связи ΡˆΡ‚Π°Π±Π° Π‘ΠšΠ’Πž").

Discussed on

πŸ”— Williams tube – cathode ray tube used as computer memory

πŸ”— Electronics

The Williams tube, or the Williams–Kilburn tube after inventors Freddie Williams and Tom Kilburn, is an early form of computer memory. It was the first random-access digital storage device, and was used successfully in several early computers.

The Williams tube works by displaying a grid of dots on a cathode ray tube (CRT). Due to the way CRTs work, this creates a small charge of static electricity over each dot. The charge at the location of each of the dots is read by a thin metal sheet just in front of the display. Since the display faded over time, it was periodically refreshed. It cycles faster than earlier acoustic delay line memory, at the speed of the electrons inside the vacuum tube, rather than at the speed of sound. However, the system was adversely affected by any nearby electrical fields, and required constant alignment to keep operational. Williams–Kilburn tubes were used primarily on high-speed computer designs.

Williams and Kilburn applied for British patents on 11 December 1946, and 2 October 1947, followed by United States patent applications on 10 December 1947, and 16 May 1949.

Discussed on

πŸ”— Human-based computation games

πŸ”— Video games πŸ”— Computer science πŸ”— Science

A human-based computation game or game with a purpose (GWAP) is a human-based computation technique of outsourcing steps within a computational process to humans in an entertaining way (gamification).

Luis von Ahn first proposed the idea of "human algorithm games", or games with a purpose (GWAPs), in order to harness human time and energy for addressing problems that computers cannot yet tackle on their own. He believes that human intellect is an important resource and contribution to the enhancement of computer processing and human computer interaction. He argues that games constitute a general mechanism for using brainpower to solve open computational problems. In this technique, human brains are compared to processors in a distributed system, each performing a small task of a massive computation. However, humans require an incentive to become part of a collective computation. Online games are used as a means to encourage participation in the process.

The tasks presented in these games are usually trivial for humans, but difficult for computers. These tasks include labeling images, transcribing ancient texts, common sense or human experience based activities, and more. Human-based computation games motivate people through entertainment rather than an interest in solving computation problems. This makes GWAPs more appealing to a larger audience. GWAPs can be used to help build the semantic web, annotate and classify collected data, crowdsource general knowledge, and improving other general computer processes. GWAPs have a vast range of applications in variety of areas such as security, computer vision, Internet accessibility, adult content filtering, and Internet search. In applications such as these, games with a purpose have lowered the cost of annotating data and increased the level of human participation.

Discussed on