New Articles (Page 4)

To stay up to date you can also follow on Mastodon.

πŸ”— Buffalo buffalo Buffalo buffalo buffalo buffalo Buffalo buffalo

πŸ”— Linguistics πŸ”— New York (state) πŸ”— New York (state)/Western New York

"Buffalo buffalo Buffalo buffalo buffalo buffalo Buffalo buffalo" is a grammatically correct sentence in American English, often presented as an example of how homonyms and homophones can be used to create complicated linguistic constructs through lexical ambiguity. It has been discussed in literature in various forms since 1967, when it appeared in Dmitri Borgmann's Beyond Language: Adventures in Word and Thought.

The sentence employs three distinct meanings of the word buffalo:

  • as a proper noun to refer to a specific place named Buffalo, the city of Buffalo, New York, being the most notable;
  • as a verb (uncommon in regular usage) to buffalo, meaning "to bully, harass, or intimidate" or "to baffle"; and
  • as a noun to refer to the animal, bison (often called buffalo in North America). The plural is also buffalo.

An expanded form of the sentence which preserves the original word order is: "Buffalo bison, that other Buffalo bison bully, also bully Buffalo bison."

πŸ”— Kangina

πŸ”— Food and drink πŸ”— Afghanistan πŸ”— Asia

Kangina (Dari: Ϊ©Ω†Ϊ―ΫŒΩ†Ω‡, lit. 'treasure'), also called Gangina, is the traditional Afghan technique of preserving fresh fruit, particularly grapes, in airtight discs formed from mud and straw. The centuries-old technique is indigenous to Afghanistan's rural center and north, where remote communities that cannot import fresh fruit eat kangina-preserved fresh grapes throughout the winter, and merchants use kangina to safely store and transport grapes for sale at market. Grapes preserved using kangina in modern Afghanistan are typically of the thick-skinned Taifi or Kishmishi varieties, which are harvested later in the season and remain fresh in the mud vessels for up to six months.

The method, a form of passive controlled-atmosphere storage, works by sealing fruit in the clay-rich mud, restricting flow of air, moisture and microbes, much as a plastic bag would. Discs are formed from two bowl-shaped pieces, which are sculpted from mud and straw, and baked in the sun before being filled with up to 1–2 kilograms (2.2–4.4Β lb) of un-bruised fruit and sealed with more mud. They are kept dry and cool, away from direct sunlight. Gradual permeation of gas through the clay barrier allows oxygen to enter the container, keeping the grapes alive, while the elevated concentration of carbon dioxide inside the package inhibits the grapes' metabolism and prevents the growth of fungus. The grapes are prevented from drying out, and the mud absorbs liquid which would otherwise lead to bacterial and fungal growth.

The practice of storing grapes in mud and straw has been recorded as far back as the 12th century: in his Book of Agriculture, Sevillan agronomist Ibn al-'Awwam noted layering grapes with straw in mud-sealed glass containers or "cowpat bowls" as an extant technique of preservation in Andalusia.

Kangina are inexpensive, eco-friendly, and effective vessels for the preservation of fresh fruit. A 2023 study found kangina and polystyrene foam boxes to be the most effective vessels for preserving grapes. The containers are, however, heavy, unwieldy, and prone to absorbing moisture.

Discussed on

πŸ”— Room 641A

πŸ”— United States/U.S. Government πŸ”— United States πŸ”— Mass surveillance πŸ”— Espionage πŸ”— California πŸ”— California/San Francisco Bay Area πŸ”— Telecommunications

Room 641A is a telecommunication interception facility operated by AT&T for the U.S. National Security Agency, as part of its warrantless surveillance program as authorized by the Patriot Act. The facility commenced operations in 2003 and its purpose was publicly revealed in 2006.

Discussed on

πŸ”— 1997 Kyl–Bingaman Amendment prohibits high res satellite imagery of Israel

πŸ”— United States/U.S. Government πŸ”— United States

The Kyl–Bingaman Amendment (Public Law 104-201, Section 1064) is a United States law. It was put into force by the Military Defense National Defense Authorization Act for 1997.

The Kyl–Bingaman Amendment (KBA) prohibits US authorities from granting a license for collecting or disseminating high resolution satellite imagery of Israel at a higher resolution than is available from other commercial sources, that is, from companies outside of the United States. An exception exists if this is done by a US federal agency, or if it is done in order to abolish the secrecy of such recordings.

U.S. law mandates U.S. government censorship of American commercial satellite images of no country in the world besides that of Israel. The largest and most important global sources of commercial satellite imagery, such as Maxar Technologies, Capella, and Umbra, and the largest and widely-used online resources, such as Google and Bing, are American and this makes KBA a powerful instrument of U.S. government suppression of information. For example, as a result of KBA, images on internet platforms such as Google Earth have been deliberately blurred.

πŸ”— Nagle's Algorithm

πŸ”— Internet πŸ”— Computing πŸ”— Computing/Networking

Nagle's algorithm is a means of improving the efficiency of TCP/IP networks by reducing the number of packets that need to be sent over the network. It was defined by John Nagle while working for Ford Aerospace. It was published in 1984 as a Request for Comments (RFC) with title Congestion Control in IP/TCP Internetworks in RFCΒ 896.

The RFC describes what he called the "small-packet problem", where an application repeatedly emits data in small chunks, frequently only 1 byte in size. Since TCP packets have a 40-byte header (20 bytes for TCP, 20 bytes for IPv4), this results in a 41-byte packet for 1 byte of useful information, a huge overhead. This situation often occurs in Telnet sessions, where most keypresses generate a single byte of data that is transmitted immediately. Worse, over slow links, many such packets can be in transit at the same time, potentially leading to congestion collapse.

Nagle's algorithm works by combining a number of small outgoing messages and sending them all at once. Specifically, as long as there is a sent packet for which the sender has received no acknowledgment, the sender should keep buffering its output until it has a full packet's worth of output, thus allowing output to be sent all at once.

Discussed on

πŸ”— Elite Overproduction

πŸ”— Sociology

Elite overproduction is a concept developed by Peter Turchin, which describes the condition of a society which is producing too many potential elite-members relative to its ability to absorb them into the power structure. This, he hypothesizes, is a cause for social instability, as those left out of power feel aggrieved by their relatively low socioeconomic status.

Turchin said that this situation explained social disturbances during the late Roman empire and the French Wars of Religion, and predicted in 2010 that this situation would cause social unrest in the United States of America during the 2020s. According to Turchin and Jack Goldstone, periods of political instability have throughout human history been due to the purely self-interested behavior of the elite. When the economy faced a surge in the workforce, which exerted a downward pressure on wages, the elite generally kept much of the wealth generated to themselves, resisting taxation and income redistribution. In the face of intensifying competition, they also sought to restrict the window of opportunity, to preserve their power and status for their descendants. These actions exacerbated inequality, a key driver of sociopolitical turbulence due to the proneness of the relatively well-off to radicalism. Widespread progressive political beliefs among university graduates, for instance, can be due to widespread underemployment rather than from exposure to progressive ideas or experiences during their studies.

In the case of the United States, by the 2010s, it became clear that the cost of higher education has ballooned over the previous three to four decadesβ€”faster than inflation, in factβ€”thanks to growing demand. For this prediction, Turchin used current data and the structural-demographic theory, a mathematical model of how population changes affect the behavior of the state, the elite, and the commons, created by Jack Goldstone. Goldstone himself predicted using his model that in the twenty-first century, the United States would elect a national populist leader. Elite overproduction has been cited as a root cause of political tension in the U.S., as so many well-educated Millennials are either unemployed, underemployed, or otherwise not achieving the high status they expect. Even then, the nation continued to produce excess PhD holders before the COVID-19 pandemic hit, especially in the humanities and social sciences, for which employment prospects were dim. Moreover, according to projections by the U.S. Census Bureau, the share of people in their 20s continued to grow till the end of the 2010s, meaning the youth bulge would likely not fade away before the 2020s. As such the gap between the supply and demand in the labor market would likely not fall before then, and falling or stagnant wages generate sociopolitical stress.

In the United Kingdom, there was simply not enough working-class Britons disenchanted with the status quo to support the Brexit movement, which was also buoyed by many highly educated voters.

However, Turchin's model cannot foretell precisely how a crisis will unfold; it can only yield probabilities. Turchin likened this to the accumulation of deadwood in a forest over many years, paving the way for a cataclysmic forest fire later on. It is possible to predict a massive conflagration, but not what causes it.

Discussed on

πŸ”— Daemon (2006)

πŸ”— Novels

Daemon is a 2006 novel by Daniel Suarez about a distributed persistent computer application that begins to change the real world after its original programmer's death. The story was concluded in a sequel, Freedomβ„’, in 2010.

Discussed on

πŸ”— World Chess Championship matches have not had an on-board checkmate since 1929

πŸ”— Chess

In 1929, a World Chess Championship was played between challenger Efim Bogoljubow and titleholder Alexander Alekhine. The match was held in Wiesbaden, Heidelberg and Berlin in Germany, and the Hague, Rotterdam and Amsterdam in the Netherlands, from September 6 to November 12. Alekhine retained his title.

πŸ”— Plugtest

πŸ”— Electronics

A plugtest or plugfest is an event based on a certain technical standard where the designers of electronic equipment or software test the interoperability of their products or designs with those of other manufacturers. It could be literally plugging company A's cable into company B's socket, or a more elaborate test resembling a realistic scenario.

The technical goal is twofold: check compliance with the standard, and test the effectiveness of the standard. The latter could be the case when the standard is ambiguous. A simplified example is: the width of a plug is prescribed, but vendors use different lengths.

Plugtests can be formal and have public test scores or informal and private. Besides helping vendors improve their interoperability, plugtests help create awareness about the standard and can improve transparency on compliance.

Discussed on

πŸ”— Warrant Canary

πŸ”— United States πŸ”— Internet πŸ”— Law πŸ”— Freedom of speech πŸ”— Law Enforcement πŸ”— United States/FBI

A warrant canary is a method by which a communications service provider aims to inform its users that the provider has been served with a government subpoena despite legal prohibitions on revealing the existence of the subpoena. The warrant canary typically informs users that there has not been a court-issued subpoena as of a particular date. If the canary is not updated for the period specified by the host or if the warning is removed, users are to assume that the host has been served with such a subpoena. The intention is to allow the provider to warn users of the existence of a subpoena passively, without technically violating the court order not to do so.

Some subpoenas, such as those covered under 18 U.S.C. Β§2709(c) of the USA Patriot Act, provide criminal penalties for disclosing the existence of the subpoena to any third party, including the service provider's users.

National Security Letters (NSL) originated in the 1986 Electronic Communications Privacy Act and originally targeted those suspected of being agents of a foreign power. Targeting agents of a foreign power was revised in 2001 under the Patriot Act to allow NSLs to target those who may have information deemed relevant to both counterintelligence activities directed against the United States and terrorism. The idea of using negative pronouncements to thwart the nondisclosure requirements of court orders and served secret warrants was first proposed by Steven Schear on the cypherpunks mailing list, mainly to uncover targeted individuals at ISPs. It was also suggested for and used by public libraries in 2002 in response to the USA Patriot Act, which could have forced librarians to disclose the circulation history of library patrons.

Discussed on