New Articles (Page 306)
To stay up to date you can also follow on Mastodon.
๐ Email Storm
An email storm (also called a reply allpocalypse) is a sudden spike of "reply all" messages on an email distribution list, usually caused by a controversial or misdirected message. Such storms can start when even one member of the distribution list replies to the entire list at the same time in response to an instigating message. When other members respond, pleading for the cessation of messages, asking to be removed from the list, or adding vitriol to the discussion this triggers a chain reaction of email messages. The sheer load of traffic generated by these storms can render the email servers inoperative, similar to a distributed denial-of-service attack.
Some email viruses also have the capacity to create email storms by sending copies of themselves to an infected user's contacts, including distribution lists, infecting the contacts in turn.
Discussed on
- "Email Storm" | 2017-08-04 | 69 Upvotes 23 Comments
๐ Petoskey stone
A Petoskey stone is a rock and a fossil, often pebble-shaped, that is composed of a fossilized rugose coral, Hexagonaria percarinata. Such stones were formed as a result of glaciation, in which sheets of ice plucked stones from the bedrock, grinding off their rough edges and depositing them in the northwestern (and some in the northeastern) portion of Michigan's lower peninsula. In those same areas of Michigan, complete fossilized coral colony heads can be found in the source rocks for the Petoskey stones.
Petoskey stones are found in the Gravel Point Formation of the Traverse Group. They are fragments of a coral reef that was originally deposited during the Devonian period. When dry, the stone resembles ordinary limestone but when wet or polished using lapidary techniques, the distinctive mottled pattern of the six-sided coral fossils emerges. It is sometimes made into decorative objects. Other forms of fossilized coral are also found in the same location.
In 1965, it was named the state stone of Michigan.
Discussed on
- "Petoskey stone" | 2017-07-24 | 113 Upvotes 35 Comments
๐ Sesame Credit
Zhima Credit (Chinese: ่้บปไฟก็จ; pinyin: Zhฤซma Xรฌnyรฒng), also known as Sesame Credit, is a private credit scoring and loyalty program system developed by Ant Financial Services Group (AFSG), an affiliate of the Chinese Alibaba Group. It uses data from Alibaba's services to compile its score. Customers receive a score based on a variety of factors based on social media interactions and purchases carried out on Alibaba Group websites or paid for using its affiliate Ant Financial's Alipay mobile wallet. The rewards of having a high score include easier access to loans from Ant Financial and having a more trustworthy profile on e-commerce sites within the Alibaba Group.
Discussed on
- "Sesame Credit" | 2017-07-11 | 13 Upvotes 3 Comments
๐ Survivorship bias โ Wikipedia
Survivorship bias or survival bias is the logical error of concentrating on the people or things that made it past some selection process and overlooking those that did not, typically because of their lack of visibility. This can lead to false conclusions in several different ways. It is a form of selection bias.
Survivorship bias can lead to overly optimistic beliefs because failures are ignored, such as when companies that no longer exist are excluded from analyses of financial performance. It can also lead to the false belief that the successes in a group have some special property, rather than just coincidence (correlation proves causality). For example, if three of the five students with the best college grades went to the same high school, that can lead one to believe that the high school must offer an excellent education. This could be true, but the question cannot be answered without looking at the grades of all the other students from that high school, not just the ones who "survived" the top-five selection process. Another example of a distinct mode of survivorship bias would be thinking that an incident was not as dangerous as it was because everyone you communicate with afterwards survived. Even if you knew that some people are dead, they wouldn't have their voice to add to the conversation, leading to bias in the conversation.
Discussed on
- "Survivorship bias โ Wikipedia" | 2017-07-11 | 14 Upvotes 1 Comments
๐ Sea Peoples
The Sea Peoples are a purported seafaring confederation that attacked ancient Egypt and other regions of the East Mediterranean prior to and during the Late Bronze Age collapse (1200โ900 BCE). Following the creation of the concept in the nineteenth century, it became one of the most famous chapters of Egyptian history, given its connection with, in the words of Wilhelm Max Mรผller: "the most important questions of ethnography and the primitive history of classic nations". Their origins undocumented, the various Sea Peoples have been proposed to have originated from places that include western Asia Minor, the Aegean, the Mediterranean islands and Southern Europe. Although the archaeological inscriptions do not include reference to a migration, the Sea Peoples are conjectured to have sailed around the eastern Mediterranean and invaded Anatolia, Syria, Phoenicia, Canaan, Cyprus and Egypt toward the end of the Bronze Age.
French Egyptologist Emmanuel de Rougรฉ first used the term peuples de la mer (literally "peoples of the sea") in 1855 in a description of reliefs on the Second Pylon at Medinet Habu documenting Year 8 of Ramesses III. Gaston Maspero, de Rougรฉ's successor at the Collรจge de France, subsequently popularized the term "Sea Peoples" โ and an associated migration-theory โ in the late 19th century. Since the early 1990s, his migration theory has been brought into question by a number of scholars.
The Sea Peoples remain unidentified in the eyes of most modern scholars and hypotheses regarding the origin of the various groups are the source of much speculation. Existing theories variously propose equating them with several Aegean tribes, raiders from Central Europe, scattered soldiers who turned to piracy or who had become refugees, and links with natural disasters such as earthquakes or climatic shifts.
Discussed on
- "Sea Peoples" | 2023-08-08 | 33 Upvotes 3 Comments
- "Sea Peoples" | 2017-07-10 | 69 Upvotes 23 Comments
๐ Chinese room argument
The Chinese room argument holds that a digital computer executing a program cannot be shown to have a "mind", "understanding" or "consciousness", regardless of how intelligently or human-like the program may make the computer behave. The argument was first presented by philosopher John Searle in his paper, "Minds, Brains, and Programs", published in Behavioral and Brain Sciences in 1980. It has been widely discussed in the years since. The centerpiece of the argument is a thought experiment known as the Chinese room.
The argument is directed against the philosophical positions of functionalism and computationalism, which hold that the mind may be viewed as an information-processing system operating on formal symbols. Specifically, the argument is intended to refute a position Searle calls strong AI: "The appropriately programmed computer with the right inputs and outputs would thereby have a mind in exactly the same sense human beings have minds."
Although it was originally presented in reaction to the statements of artificial intelligence (AI) researchers, it is not an argument against the behavioural goals of AI research, because it does not limit the amount of intelligence a machine can display. The argument applies only to digital computers running programs and does not apply to machines in general.
Discussed on
- "Chinese room argument" | 2017-07-04 | 11 Upvotes 9 Comments
๐ Northeast blackout of 2003
The Northeast blackout of 2003 was a widespread power outage throughout parts of the Northeastern and Midwestern United States, and the Canadian province of Ontario on August 14โ28, 2003, beginning just after 4:10ย p.m. EDT.
Some power was restored by 11 p.m. Most did not get their power back until two days later. In other areas, it took nearly a week or two for power to be restored. At the time, it was the world's second most widespread blackout in history, after the 1999 Southern Brazil blackout. The outage, which was much more widespread than the Northeast blackout of 1965, affected an estimated 10 million people in southern and central Ontario, and 45 million people in eight U.S. states.
The blackout's proximate cause was a software bug in the alarm system at the control room of FirstEnergy, an Akron, Ohioโbased company, which rendered operators unaware of the need to redistribute load after overloaded transmission lines drooped into foliage. What should have been a manageable local blackout cascaded into the collapse of the entire Northeast region.
Discussed on
- "Northeast blackout of 2003" | 2017-07-02 | 28 Upvotes 13 Comments
๐ Subutai โ Primary military strategist of Genghis Khan
Subutai (Classical Mongolian: Sรผbรผgรคtรคi or Sรผbรผ'รคtรคi; Tuvan: ะกาฏะฑัะดัะน, [sybษหdษj]; Modern Mongolian: ะกาฏะฑััะดัะน, Sรผbeedei. [sสbeหหdษ]; Chinese: ้ไธๅฐ 1175โ1248) was an Uriankhai general, and the primary military strategist of Genghis Khan and รgedei Khan. He directed more than 20 campaigns in which he conquered 32 nations and won 65 pitched battles, during which he conquered or overran more territory than any other commander in history. He gained victory by means of imaginative and sophisticated strategies and routinely coordinated movements of armies that were hundreds of kilometers away from each other. He is also remembered for devising the campaign that destroyed the armies of Hungary and Poland within two days of each other, by forces over 500 kilometers apart.
Discussed on
- "Subutai โ Primary military strategist of Genghis Khan" | 2017-06-14 | 84 Upvotes 22 Comments
๐ Computational sociology
Computational sociology is a branch of sociology that uses computationally intensive methods to analyze and model social phenomena. Using computer simulations, artificial intelligence, complex statistical methods, and analytic approaches like social network analysis, computational sociology develops and tests theories of complex social processes through bottom-up modeling of social interactions.
It involves the understanding of social agents, the interaction among these agents, and the effect of these interactions on the social aggregate. Although the subject matter and methodologies in social science differ from those in natural science or computer science, several of the approaches used in contemporary social simulation originated from fields such as physics and artificial intelligence. Some of the approaches that originated in this field have been imported into the natural sciences, such as measures of network centrality from the fields of social network analysis and network science.
In relevant literature, computational sociology is often related to the study of social complexity. Social complexity concepts such as complex systems, non-linear interconnection among macro and micro process, and emergence, have entered the vocabulary of computational sociology. A practical and well-known example is the construction of a computational model in the form of an "artificial society", by which researchers can analyze the structure of a social system.
Discussed on
- "Computational sociology" | 2017-06-12 | 97 Upvotes 23 Comments
๐ Feynman sprinkler
A Feynman sprinkler, also referred to as a Feynman inverse sprinkler or as a reverse sprinkler, is a sprinkler-like device which is submerged in a tank and made to suck in the surrounding fluid. The question of how such a device would turn was the subject of an intense and remarkably long-lived debate.
A regular sprinkler has nozzles arranged at angles on a freely rotating wheel such that when water is pumped out of them, the resulting jets cause the wheel to rotate; both a Catherine wheel and the aeolipile ("Hero's engine") work on the same principle. A "reverse" or "inverse" sprinkler would operate by aspirating the surrounding fluid instead. The problem is now commonly associated with theoretical physicist Richard Feynman, who mentions it in his bestselling memoirs Surely You're Joking, Mr. Feynman! The problem did not originate with Feynman, nor did he publish a solution to it.
Discussed on
- "Feynman sprinkler" | 2017-06-11 | 27 Upvotes 6 Comments
- "Feynman sprinkler" | 2015-06-13 | 42 Upvotes 3 Comments