New Articles (Page 285)

To stay up to date you can also follow on Mastodon.

πŸ”— Memex

πŸ”— Computing πŸ”— Libraries

The memex (originally coined "at random", though sometimes said to be a portmanteau of "memory" and "index") is the name of the hypothetical proto-hypertext system that Vannevar Bush described in his 1945 The Atlantic Monthly article "As We May Think". Bush envisioned the memex as a device in which individuals would compress and store all of their books, records, and communications, "mechanized so that it may be consulted with exceeding speed and flexibility". The memex would provide an "enlarged intimate supplement to one's memory". The concept of the memex influenced the development of early hypertext systems (eventually leading to the creation of the World Wide Web) and personal knowledge base software. The hypothetical implementation depicted by Bush for the purpose of concrete illustration was based upon a document bookmark list of static microfilm pages and lacked a true hypertext system, where parts of pages would have internal structure beyond the common textual format. Early electronic hypertext systems were thus inspired by memex rather than modeled directly upon it.

Discussed on

  • "Memex" | 2022-05-08 | 12 Upvotes 2 Comments
  • "Memex" | 2013-03-15 | 61 Upvotes 16 Comments

πŸ”— Millennium Challenge 2002 - military simulation

πŸ”— Military history πŸ”— Military history/North American military history πŸ”— Military history/United States military history

Millennium Challenge 2002 (MC02) was a major war game exercise conducted by the United States Armed Forces in mid-2002. The exercise, which ran from 24 July to 15 August and cost US$250 million (equivalent to about $355M in 2019), involved both live exercises and computer simulations. MC02 was meant to be a test of future military "transformation"β€”a transition toward new technologies that enable network-centric warfare and provide more effective command and control of current and future weaponry and tactics. The simulated combatants were the United States, referred to as "Blue", and a fictitious state in the Persian Gulf, "Red", often characterized as Iran or Iraq.

Discussed on

πŸ”— James while John had had had ... had had had a better effect on the teacher

πŸ”— Linguistics πŸ”— Linguistics/Applied Linguistics

"James while John had had had had had had had had had had had a better effect on the teacher" is an English sentence used to demonstrate lexical ambiguity and the necessity of punctuation, which serves as a substitute for the intonation,stress, and pauses found in speech. In human information processing research, the sentence has been used to show how readers depend on punctuation to give sentences meaning, especially in the context of scanning across lines of text. The sentence is sometimes presented as a puzzle, where the solver must add the punctuation.

It refers to two students, James and John, required by an English test to describe a man who had suffered from a cold in the past. John writes "The man had a cold", which the teacher marks incorrect, while James writes the correct "The man had had a cold". Since James's answer was right, it had had a better effect on the teacher.

The sentence is much easier to understand with added punctuation and emphasis:

James, while John had had "had", had had "had had"; "had had" had had a better effect on the teacher.

In each of the five "had had" word pairs in the above sentence, the first of the pair is in the past perfect form. The italicized instances denote emphasis of intonation, focusing on the differences in the students' answers, then finally identifying the correct one.

πŸ”— Citizenship in a Republic

πŸ”— United States

Citizenship in a Republic is the title of a speech given by the former President of the United States, Theodore Roosevelt, at the Sorbonne in Paris, France on April 23, 1910.

One notable passage on page seven of the 35-page speech is referred to as "The Man in the Arena":

It is not the critic who counts; not the man who points out how the strong man stumbles, or where the doer of deeds could have done them better. The credit belongs to the man who is actually in the arena, whose face is marred by dust and sweat and blood; who strives valiantly; who errs, who comes short again and again, because there is no effort without error and shortcoming; but who does actually strive to do the deeds; who knows great enthusiasms, the great devotions; who spends himself in a worthy cause; who at the best knows in the end the triumph of high achievement, and who at the worst, if he fails, at least fails while daring greatly, so that his place shall never be with those cold and timid souls who neither know victory nor defeat.

Someone who is heavily involved in a situation that requires courage, skill, or tenacity (as opposed to someone sitting on the sidelines and watching), is sometimes referred to as "the man in the arena".

Discussed on

πŸ”— 2013 Shahbag Protest

πŸ”— Bangladesh

On 5 February 2013, protests began in Shahbag, Bangladesh following demands for capital punishment for Abdul Quader Mollah, who had been sentenced to life imprisonment, and for others convicted of war crimes by the International Crimes Tribunal of Bangladesh. On that day, the International Crimes Tribunal had sentenced Mollah to life in prison after he was convicted on five of six counts of war crimes. Later demands included banning the Bangladesh Jamaat-e-Islami party from politics including election and a boycott of institutions supporting (or affiliated with) the party.

Protesters considered Mollah's sentence too lenient, given his crimes. Bloggers and online activists called for additional protests at Shahbag. Tens of thousands of people joined the demonstration, which gave rise to protests across the country.

A counter-protest, questioning the validity of the tribunal and the protest movement and demanding release of those accused and convicted, was launched by Jamaat-e-Islami as its leaders were the majority of those first identified for trial. The Bangladesh Nationalist Party (BNP) initially expressed its support for Jamaat-e-Islami, a political ally. But, the BNP cautiously welcomed the Shahbag protest, while warning the government not to make political mileage from a movement demanding capital punishment for war criminals.

During the protests, Ahmed Rajib Haider was killed outside his house. On 1 March, five students of North South University were arrested who 'confessed' involvement in Rajib's killing. On 27 February 2013, the tribunal convicted Delwar Hossain Sayeedi of war crimes and sentenced him to death. Jamaat followers protested and there were violent clashes with police. About 60 people were killed in the confrontations; most were Jamaat-Shibir activists, and others were police and civilians.

Discussed on

πŸ”— Universal Disk Format

πŸ”— Computing πŸ”— Microsoft Windows πŸ”— Microsoft Windows/Computing πŸ”— Software πŸ”— Software/Computing πŸ”— Microsoft

Universal Disk Format (UDF) is a profile of the specification known as ISO/IEC 13346 and ECMA-167 and is an open vendor-neutral file system for computer data storage for a broad range of media. In practice, it has been most widely used for DVDs and newer optical disc formats, supplanting ISO 9660. Due to its design, it is very well suited to incremental updates on both recordable and (re)writable optical media. UDF is developed and maintained by the Optical Storage Technology Association (OSTA).

Normally, authoring software will master a UDF file system in a batch process and write it to optical media in a single pass. But when packet writing to rewritable media, such as CD-RW, UDF allows files to be created, deleted and changed on-disc just as a general-purpose filesystem would on removable media like floppy disks and flash drives. This is also possible on write-once media, such as CD-R, but in that case the space occupied by the deleted files cannot be reclaimed (and instead becomes inaccessible).

Multi-session mastering is also possible in UDF, though some implementations may be unable to read disks with multiple sessions.

Discussed on

πŸ”— Y Combinator cofounder was convicted under CFAA in 1990

πŸ”— Biography πŸ”— Computing πŸ”— Business πŸ”— Biography/science and academia πŸ”— New York (state) πŸ”— Criminal Biography πŸ”— Computing/Computer Security πŸ”— New Jersey πŸ”— New York (state)/Cornell University πŸ”— Computing/Networking

Robert Tappan Morris (born November 8, 1965) is an American computer scientist and entrepreneur. He is best known for creating the Morris worm in 1988, considered the first computer worm on the Internet.

Morris was prosecuted for releasing the worm, and became the first person convicted under the then-new Computer Fraud and Abuse Act. He went on to co-found the online store Viaweb, one of the first web-based applications, and later the funding firm Y Combinatorβ€”both with Paul Graham.

He later joined the faculty in the department of Electrical Engineering and Computer Science at the Massachusetts Institute of Technology, where he received tenure in 2006. He was elected to the National Academy of Engineering in 2019.


Discussed on

πŸ”— Andreas Raab passed away

πŸ”— Computer science

The Squeak programming language is a dialect of Smalltalk. It is object-oriented, class-based, and reflective.

It was derived directly from Smalltalk-80 by a group at Apple Computer that included some of the original Smalltalk-80 developers. Its development was continued by the same group at Walt Disney Imagineering, where it was intended for use in internal Disney projects. Later on the group moved on to be supported by HP labs, SAP Labs and most recently Y Combinator.

Squeak is cross-platform. Programs produced on one platform run bit-identical on all other platforms, and versions are available for many platforms including the obvious Windows/macOS/linux versions. The Squeak system includes code for generating a new version of the virtual machine (VM) on which it runs. It also includes a VM simulator written in Squeak. For these reasons, it is easily ported.

Discussed on

πŸ”— Wikipedia entry for Aaron Swartz-founded PAC was deleted the day he died

πŸ”— Internet

Demand Progress is an internet activist-related entity encompassing a 501(c)4 arm sponsored by the 1630 Fund and a 501(c)3 arm sponsored by the New Venture Fund. It specializes in online-intensive and other grassroots activism to support Internet freedom, civil liberties, transparency, and human rights, and in opposition to censorship and corporate control of government. The organization was founded through a petition in opposition to the Combating Online Infringement and Counterfeits Act, sparking the movement that eventually defeated COICA's successor bills, the Stop Online Piracy Act and the PROTECT IP Act, two highly controversial pieces of United States legislation.

The organization has continued to fight for such causes in the wake of the successful shelving of these two acts. Demand Progress has also played key roles in forwarding the passage of net neutrality rules, blocking expansion of the Computer Fraud and Abuse Act, under which co-founder Aaron Swartz was indicted, and other key legislative efforts. Estimated membership numbers in early 2015 weigh in at over two million. As of late 2013, the organization encompasses the Demand Progress, Rootstrikers and Watchdog.net wings/brands.

πŸ”— Judy arrays are patented

πŸ”— Computing

In computer science, a Judy array is a data structure implementing a type of associative array with high performance and low memory usage. Unlike most other key-value stores, Judy arrays use no hashing, leverage compression on their keys (which may be integers or strings), and can efficiently represent sparse data, that is, they may have large ranges of unassigned indices without greatly increasing memory usage or processing time. They are designed to remain efficient even on structures with sizes in the peta-element range, with performance scaling on the order of O(log n). Roughly speaking, Judy arrays are highly optimized 256-ary radix trees.

Judy trees are usually faster than AVL trees, B-trees, hash tables and skip lists because they are highly optimized to maximize usage of the CPU cache. In addition, they require no tree balancing and no hashing algorithm is used.

The Judy array was invented by Douglas Baskins and named after his sister.

Discussed on