New Articles (Page 31)
To stay up to date you can also follow on Mastodon.
🔗 Accuracy and Precision
Accuracy and precision are two measures of observational error. Accuracy is how close a given set of measurements (observations or readings) are to their true value. Precision is how close the measurements are to each other.
The International Organization for Standardization (ISO) defines a related measure: trueness, "the closeness of agreement between the arithmetic mean of a large number of test results and the true or accepted reference value."
While precision is a description of random errors (a measure of statistical variability), accuracy has two different definitions:
- More commonly, a description of systematic errors (a measure of statistical bias of a given measure of central tendency, such as the mean). In this definition of "accuracy", the concept is independent of "precision", so a particular set of data can be said to be accurate, precise, both, or neither. This concept corresponds to ISO's trueness.
- A combination of both precision and trueness, accounting for the two types of observational error (random and systematic), so that high accuracy requires both high precision and high trueness. This usage corresponds to ISO's definition of accuracy (trueness and precision).
🔗 Body Doubling
Body doubling or parallel working is a strategy used to initiate and complete tasks, such as household chores or writing and other computer tasks. It involves the physical presence, virtual presence through a phone call, videotelephony or social media presence, of someone with whom one shares their goals, which makes it more likely to achieve them. For some people, it works best to both do similar tasks, while for others, just being in the same (virtual) room is enough.
It was partially popularized by those with attention deficit hyperactivity disorder (ADHD) to help manage symptoms. Its usefulness has also been noted by those with autism, but efficacy is not clearly known as long term studies have not been conducted on the topic. In 2023, J. Russel Ramsay, professor of clinical psychiatry at the Perelman School of Medicine and co-director of the ADHD treatment and research program of the University of Pennsylvania, noted that, while extensive research on the strategy's effect on productivity doesn't exist, "the idea of externalizing motivation is a longstanding evidence-based mechanism for managing ADHD."
ADHD body doubling comes into play allowing individuals with ADHD to perform and complete tasks more easily and with less distractions, where otherwise they might struggle more. "ADHD body doubling is a productivity strategy used by individuals with ADHD to finish possibly annoying jobs while having another person beside them."
Body doubling is said to aid individuals with focus and productivity while working. Another person, known as a 'body double' sits alongside the individual with ADHD to help them focus while completing a certain task. The role of this individual is to not partake in the task but, more importantly, serve as a support system and create a welcoming environment that allows the individual to focus by reducing any distractions. The idea of body doubling allows for specific reminders to the individual to stay on task which helps alleviate the symptoms of ADHD.
Discussed on
- "Body Doubling" | 2025-03-29 | 66 Upvotes 16 Comments
🔗 Charlie Brown and Franz Stigler Incident
The Charlie Brown and Franz Stigler incident occurred on 20 December 1943, when, after a successful bomb run on Bremen, 2nd Lt Charles "Charlie" Brown's B-17 Flying Fortress (named "Ye Olde Pub") was severely damaged by German fighters. Luftwaffe pilot Franz Stigler had the opportunity to shoot down the crippled bomber but did not do so. After an extensive search by Brown, the two pilots met each other 50 years later and developed a friendship that lasted until Stigler's death in March 2008.
Discussed on
- "Charlie Brown and Franz Stigler incident (1943)" | 2025-03-27 | 66 Upvotes 7 Comments
- "Charlie Brown and Franz Stigler Incident" | 2016-06-05 | 103 Upvotes 25 Comments
- "Charlie Brown and Franz Stigler incident" | 2011-11-26 | 19 Upvotes 4 Comments
🔗 Argumentation Theory
Argumentation theory is the interdisciplinary study of how conclusions can be supported or undermined by premises through logical reasoning. With historical origins in logic, dialectic, and rhetoric, argumentation theory includes the arts and sciences of civil debate, dialogue, conversation, and persuasion. It studies rules of inference, logic, and procedural rules in both artificial and real-world settings.
Argumentation includes various forms of dialogue such as deliberation and negotiation which are concerned with collaborative decision-making procedures. It also encompasses eristic dialogue, the branch of social debate in which victory over an opponent is the primary goal, and didactic dialogue used for teaching. This discipline also studies the means by which people can express and rationally resolve or at least manage their disagreements.
Argumentation is a daily occurrence, such as in public debate, science, and law. For example in law, in courts by the judge, the parties and the prosecutor, in presenting and testing the validity of evidences. Also, argumentation scholars study the post hoc rationalizations by which organizational actors try to justify decisions they have made irrationally.
Argumentation is one of four rhetorical modes (also known as modes of discourse), along with exposition, description, and narration.
🔗 The Barnacle Goose Myth
The barnacle goose myth is a widely-reported historical misconception about the breeding habits of the barnacle goose (Branta leucopsis) and brant goose (Branta bernicla). One version of the myth is that these geese emerge fully formed from goose barnacles (Cirripedia). Other myths exist about how the barnacle goose supposedly emerges and grows from matter other than bird eggs.
The etymology of the term "barnacle" suggests Latin, Old English, and French roots. There are few references in pre-Christian books and manuscripts – some Roman or Greek. The main vector for the myth into modern times was monastic manuscripts and in particular the bestiary.
The myth owes its long-standing popularity to an early ignorance of the migration patterns of geese. Early medieval discussions of the nature of living organisms were often based on myths or genuine ignorance of what is now known about phenomena such as bird migration. It was not until the late 19th century that bird migration research showed that such geese migrate northwards to nest and breed in Greenland or northern Scandinavia.
Discussed on
- "The Barnacle Goose Myth" | 2025-03-21 | 36 Upvotes 12 Comments
🔗 CueCat
The CueCat, styled :CueCat with a leading colon, is a cat-shaped handheld barcode reader that was given away free to Internet users starting in 2000 by the now-defunct Digital Convergence Corporation. The CueCat was named CUE for the unique bar code which the device scanned and CAT as a play on "Keystroke Automation Technology" and it enabled a user to open a link to an Internet URL by scanning a barcode — called a "cue" by Digital Convergence — appearing in an article or catalog or on some other printed matter. In this way, a user could be directed to a web page containing related information without having to enter a URL. The company asserted that the ability of the device to direct users to a specific URL, rather than a domain name, was valuable. In addition, television broadcasters could use an audio tone in programs or commercials that, if a TV was connected to a computer via an audio cable, acted as a web address shortcut.
The CueCat connected to computers using the PS/2 keyboard port and USB, and communicated to desktop "CRQ" software running on Windows 32-bit and Mac OS 9 operating systems. Users of this software were required to register with their ZIP code, gender, and email address. This registration process enabled the device to deliver relevant content to a single or multiple users in a household.
By year-end 2001, Codes could no longer be generated for the device or scanned with the device. However, third-party software can decode the lightweight encryption in the device.
🔗 The Indiana Pi Bill
The Indiana Pi Bill is the popular name for bill #246 of the 1897 sitting of the Indiana General Assembly, one of the most notorious attempts to establish mathematical truth by legislative fiat. Despite its name, the main result claimed by the bill is a method to square the circle, rather than to establish a certain value for the mathematical constant π, the ratio of the circumference of a circle to its diameter. The bill, written by the crank Edward J. Goodwin, does imply various incorrect values of π, such as 3.2. The bill never became law, due to the intervention of Professor C. A. Waldo of Purdue University, who happened to be present in the legislature on the day it went up for a vote.
The impossibility of squaring the circle using only compass and straightedge constructions, suspected since ancient times, was rigorously proven in 1882 by Ferdinand von Lindemann. Better approximations of π than those implied by the bill have been known since ancient times.
Discussed on
- "Indiana Pi Bill" | 2025-03-19 | 12 Upvotes 3 Comments
- "In 1897, an Indiana bill was going to redefine Pi" | 2013-10-17 | 34 Upvotes 13 Comments
🔗 Deniable Encryption
In cryptography and steganography, plausibly deniable encryption describes encryption techniques where the existence of an encrypted file or message is deniable in the sense that an adversary cannot prove that the plaintext data exists.
The users may convincingly deny that a given piece of data is encrypted, or that they are able to decrypt a given piece of encrypted data, or that some specific encrypted data exists. Such denials may or may not be genuine. For example, it may be impossible to prove that the data is encrypted without the cooperation of the users. If the data is encrypted, the users genuinely may not be able to decrypt it. Deniable encryption serves to undermine an attacker's confidence either that data is encrypted, or that the person in possession of it can decrypt it and provide the associated plaintext.
In their pivotal 1996 paper, Ran Canetti, Cynthia Dwork, Moni Naor, and Rafail Ostrovsky introduced the concept of deniable encryption, a cryptographic breakthrough that ensures privacy even under coercion. This concept allows encrypted communication participants to plausibly deny the true content of their messages. Their work lays the foundational principles of deniable encryption, illustrating its critical role in protecting privacy against forced disclosures. This research has become a cornerstone for future advancements in cryptography, emphasizing the importance of deniable encryption in maintaining communication security. The notion of deniable encryption was used by Julian Assange and Ralf Weinmann in the Rubberhose filesystem.
🔗 Toroidal Propeller
A toroidal propeller is a type of propeller that is ring-shaped with each blade forming a closed loop. The propellers are significantly quieter at audible frequency ranges, between 20Â Hz and 20Â kHz, while generating comparable thrust to traditional propellers. In practice, toroidal propellers reduce noise pollution in both aviation and maritime transport.
Discussed on
- "Toroidal Propeller" | 2025-03-17 | 23 Upvotes 11 Comments
🔗 Compound File Binary Format
Compound File Binary Format (CFBF), also called Compound File, Compound Document format, or Composite Document File V2 (CDF), is a compound document file format for storing numerous files and streams within a single file on a disk. CFBF is developed by Microsoft and is an implementation of Microsoft COM Structured Storage. The file format is used for storing storage objects and stream objects in a hierarchical structure within a single file.
Microsoft has opened the format for use by others and it is now used in a variety of programs from Microsoft Word and Microsoft Access to Business Objects. It also forms the basis of the Advanced Authoring Format.
Discussed on
- "Compound File Binary Format" | 2025-03-17 | 23 Upvotes 2 Comments