New Articles (Page 327)

To stay up to date you can also follow on Mastodon.

πŸ”— Unidirectional Network

A unidirectional network (also referred to as a unidirectional gateway or data diode) is a network appliance or device that allows data to travel in only one direction. Data diodes can be found most commonly in high security environments, such as defense, where they serve as connections between two or more networks of differing security classifications. Given the rise of industrial IoT and digitization, this technology can now be found at the industrial control level for such facilities as nuclear power plants, power generation and safety critical systems like railway networks.

After years of development the use of data diodes have increased creating two variations:

  • Data diode: Network appliance or device allowing raw data to travel only in one direction, used in guaranteeing information security or protection of critical digital systems, such as industrial control systems, from inbound cyber attacks.
  • Unidirectional gateway: Combination of hardware and software running in proxy computers in the source and destination networks. The hardware, a data diode, enforces physical unidirectionality and the software replicates databases and emulates protocol servers to handle bi-directional communication. The unidirectional gateway is capable of transferring multiple protocols and data types simultaneously. It contains a broader range of cybersecurity features like, secure boot, certificate management, data integrity, forward error correction (FEC), secure communication via TLS, among others. A unique characteristic is that data is transferred deterministically (to predetermined locations) with a protocol "break" that allows the data to be transferred through the data diode.

Data diodes are commonly found in high security military and government environments, and are now becoming widely spread in sectors like oil & gas, water/wastewater, airplanes (between flight control units and in-flight entertainment systems), manufacturing and cloud connectivity for industrial IoT. New regulations have increased demand and with increased capacity, major technology vendors have lowered the cost of the core technology.

Discussed on

πŸ”— Loglan – a predicate logic-based language for humans

πŸ”— Constructed languages

Loglan is a constructed language originally designed for linguistic research, particularly for investigating the Sapir–Whorf Hypothesis. The language was developed beginning in 1955 by Dr James Cooke Brown with the goal of making a language so different from natural languages that people learning it would think in a different way if the hypothesis were true. In 1960 Scientific American published an article introducing the language. Loglan is the first among, and the main inspiration for, the languages known as logical languages, which also includes Lojban.

Brown founded The Loglan Institute (TLI) to develop the language and other applications of it. He always considered the language an incomplete research project, and although he released many papers about its design, he continued to claim legal restrictions on its use. Because of this, a group of his followers later formed the Logical Language Group to create the language Lojban along the same principles, but with the intention to make it freely available and encourage its use as a real language.

Supporters of Lojban use the term Loglan as a generic term to refer to both their own language, and Brown's Loglan, referred to as "TLI Loglan" when in need of disambiguation. Although the non-trademarkability of the term Loglan was eventually upheld by the United States Patent and Trademark Office, many supporters and members of The Loglan Institute find this usage offensive, and reserve Loglan for the TLI version of the language.

Discussed on

πŸ”— Optical Tweezers

πŸ”— Physics πŸ”— Biophysics

Optical tweezers (originally called single-beam gradient force trap) are scientific instruments that use a highly focused laser beam to provide an attractive or repulsive force (typically on the order of piconewtons), depending on the relative refractive index between particle and surrounding medium; these forces can be used to physically hold and move microscopic objects, in a manner similar to tweezers. They are able to trap and manipulate small particles, whose size is typically in microns, including dielectric and absorbing particles. Optical tweezers have been particularly successful in studying a variety of biological systems in recent years.

Discussed on

πŸ”— Miller Columns

πŸ”— Apple Inc./Macintosh πŸ”— Apple Inc.

Miller columns (also known as cascading lists) are a browsing/visualization technique that can be applied to tree structures. The columns allow multiple levels of the hierarchy to be open at once, and provide a visual representation of the current location. It is closely related to techniques used earlier in the Smalltalk browser, but was independently invented by Mark S. Miller in 1980 at Yale University. The technique was then used at Project Xanadu, Datapoint, and NeXT.

While at Datapoint, Miller generalized the technique to browse directed graphs with labeled nodes and arcs. In all cases, the technique is appropriate for structures with high degree (large fanout). For low-degree structures, outline editors or graph viewers are more effective.

Discussed on

πŸ”— Bloom's 2 sigma problem

πŸ”— Psychology πŸ”— Education

Bloom's 2 sigma problem refers to an educational phenomenon observed by educational psychologist Benjamin Bloom and initially reported in 1984 in the journal Educational Researcher. Bloom found that the average student tutored one-to-one using mastery learning techniques performed two standard deviations better than students who learn via conventional instructional methods β€” that is, "the average tutored student was above 98% of the students in the control class". Additionally, the variation of the students' achievement changed: "about 90% of the tutored students ... attained the level of summative achievement reached by only the highest 20%" of the control class. Bloom's graduate students J. Anania and A. J. Burke conducted studies of this effect at different grade levels and in different schools, observing students with "great differences in cognitive achievement, attitudes, and academic self-concept".

Discussed on

πŸ”— Crew resource management

πŸ”— Aviation πŸ”— Disaster management

Crew resource management or cockpit resource management (CRM) is a set of training procedures for use in environments where human error can have devastating effects. Used primarily for improving aviation safety, CRM focuses on interpersonal communication, leadership, and decision making in the cockpit of an airliner. Its pioneer was David Beaty, a former Royal Air Force pilot and later a BOAC pilot who wrote his seminal book The Human Factor in Aircraft Accidents in the late 1950s. Despite the considerable development of electronic aids since then, many principles he developed continue to prove effective today.

Crew resource management formally began with a National Transportation Safety Board (NTSB) recommendation made during their investigation of the 1978 United Airlines Flight 173 crash. The issues surrounding that crash included a DC-8 crew running out of fuel over Portland, Oregon while troubleshooting a landing gear problem.

The term "cockpit resource management" (later generalized to "crew resource management") was coined in 1979 by NASA psychologist John Lauber who had studied communication processes in cockpits for several years. While retaining a command hierarchy, the concept was intended to foster a less authoritarian cockpit culture, where co-pilots were encouraged to question captains if they observed them making mistakes.

Crew resource management grew out of the 1977 Tenerife airport disaster where two Boeing 747 aircraft collided on the runway killing 583 people. A few weeks later, NASA held a workshop on the topic, endorsing this innovative training. United Airlines was the first airline to provide CRM training for its cockpit crews in 1981. By the 1990s, it had become a global standard.

United Airlines additionally trained their flight attendants to use CRM in conjunction with the pilots to provide another layer of enhanced communication and teamwork. Studies have shown that by both work groups using CRM together, communication barriers are reduced and problems can be solved more efficiently, leading to increased safety. CRM training concepts have been modified for application to a wide range of activities where people must make dangerous time-critical decisions. These arenas include air traffic control, ship handling, firefighting, and medical operating rooms.

Discussed on

πŸ”— Poka-yoke

πŸ”— Business πŸ”— Engineering πŸ”— Japan πŸ”— Japan/Science and technology πŸ”— Japan/Business and economy

Poka-yoke (ポカヨケ, [poka yoke]) is a Japanese term that means "mistake-proofing" or "inadvertent error prevention". A poka-yoke is any mechanism in any process that helps an equipment operator avoid (yokeru) mistakes (poka). Its purpose is to eliminate product defects by preventing, correcting, or drawing attention to human errors as they occur. The concept was formalised, and the term adopted, by Shigeo Shingo as part of the Toyota Production System. It was originally described as baka-yoke, but as this means "fool-proofing" (or "idiot-proofing") the name was changed to the milder poka-yoke.

Discussed on

πŸ”— Lambda lifting

πŸ”— Computing

Lambda lifting is a meta-process that restructures a computer program so that functions are defined independently of each other in a global scope. An individual "lift" transforms a local function into a global function. It is a two step process, consisting of;

  • Eliminating free variables in the function by adding parameters.
  • Moving functions from a restricted scope to broader or global scope.

The term "lambda lifting" was first introduced by Thomas Johnsson around 1982 and was historically considered as a mechanism for implementing functional programming languages. It is used in conjunction with other techniques in some modern compilers.

Lambda lifting is not the same as closure conversion. It requires all call sites to be adjusted (adding extra arguments to calls) and does not introduce a closure for the lifted lambda expression. In contrast, closure conversion does not require call sites to be adjusted but does introduce a closure for the lambda expression mapping free variables to values.

The technique may be used on individual functions, in code refactoring, to make a function usable outside the scope in which it was written. Lambda lifts may also be repeated, in order to transform the program. Repeated lifts may be used to convert a program written in lambda calculus into a set of recursive functions, without lambdas. This demonstrates the equivalence of programs written in lambda calculus and programs written as functions. However it does not demonstrate the soundness of lambda calculus for deduction, as the eta reduction used in lambda lifting is the step that introduces cardinality problems into the lambda calculus, because it removes the value from the variable, without first checking that there is only one value that satisfies the conditions on the variable (see Curry's paradox).

Lambda lifting is expensive on processing time for the compiler. An efficient implementation of lambda lifting is O ( n 2 ) {\displaystyle O(n^{2})} on processing time for the compiler.

In the untyped lambda calculus, where the basic types are functions, lifting may change the result of beta reduction of a lambda expression. The resulting functions will have the same meaning, in a mathematical sense, but are not regarded as the same function in the untyped lambda calculus. See also intensional versus extensional equality.

The reverse operation to lambda lifting is lambda dropping.

Lambda dropping may make the compilation of programs quicker for the compiler, and may also increase the efficiency of the resulting program, by reducing the number of parameters, and reducing the size of stack frames. However it makes a function harder to re-use. A dropped function is tied to its context, and can only be used in a different context if it is first lifted.

Discussed on

πŸ”— Braess’s paradox

πŸ”— Mathematics πŸ”— Economics πŸ”— Politics πŸ”— Urban studies and planning πŸ”— Organizations πŸ”— Game theory

Braess' paradox is the observation that adding one or more roads to a road network can slow down overall traffic flow through it. The paradox was postulated in 1968 by German mathematician Dietrich Braess, who noticed that adding a road to a particular congested road traffic network would increase overall journey time.

The paradox may have analogies in electrical power grids and biological systems. It has been suggested that in theory, the improvement of a malfunctioning network could be accomplished by removing certain parts of it. The paradox has been used to explain instances of improved traffic flow when existing major roads are closed.

Discussed on

πŸ”— Theory of the Portuguese discovery of Australia

πŸ”— Australia πŸ”— Portugal πŸ”— Australia/Australian maritime history πŸ”— Australia/History of exploration

The theory of Portuguese discovery of Australia claims that early Portuguese navigators were the first Europeans to sight Australia between 1521 and 1524, well before the arrival of Dutch navigator Willem Janszoon in 1606 on board the Duyfken who is generally considered to be the first European discoverer. This is based on the following elements:

  • The Dieppe maps, a group of 16th-century French world maps, which depict a large landmass between Indonesia and Antarctica. Labelled as Java la Grande, this land mass carries French, Portuguese, and Gallicized Portuguese placenames, and has been interpreted by some as corresponding to Australia's northwestern and eastern coasts.
  • The presence of Portuguese colonies in Southeast Asia from the early 16th century, particularly Portuguese Timor – approximately 650 kilometres from the Australian coast – c. 1513–1516.
  • Various antiquities found on Australian coastlines, claimed to be relics of early Portuguese voyages to Australia, which are more commonly regarded as evidence of Makassan visit of Northern Australia.

Precedence of Australia's discovery has also been claimed for China (Admiral Zheng), France, Spain, and even Phoenicia.

Discussed on