New Articles (Page 7)

To stay up to date you can also follow on Mastodon.

πŸ”— Nagle's Algorithm

πŸ”— Internet πŸ”— Computing πŸ”— Computing/Networking

Nagle's algorithm is a means of improving the efficiency of TCP/IP networks by reducing the number of packets that need to be sent over the network. It was defined by John Nagle while working for Ford Aerospace. It was published in 1984 as a Request for Comments (RFC) with title Congestion Control in IP/TCP Internetworks in RFCΒ 896.

The RFC describes what he called the "small-packet problem", where an application repeatedly emits data in small chunks, frequently only 1 byte in size. Since TCP packets have a 40-byte header (20 bytes for TCP, 20 bytes for IPv4), this results in a 41-byte packet for 1 byte of useful information, a huge overhead. This situation often occurs in Telnet sessions, where most keypresses generate a single byte of data that is transmitted immediately. Worse, over slow links, many such packets can be in transit at the same time, potentially leading to congestion collapse.

Nagle's algorithm works by combining a number of small outgoing messages and sending them all at once. Specifically, as long as there is a sent packet for which the sender has received no acknowledgment, the sender should keep buffering its output until it has a full packet's worth of output, thus allowing output to be sent all at once.

Discussed on

πŸ”— Elite Overproduction

πŸ”— Sociology

Elite overproduction is a concept developed by Peter Turchin, which describes the condition of a society which is producing too many potential elite-members relative to its ability to absorb them into the power structure. This, he hypothesizes, is a cause for social instability, as those left out of power feel aggrieved by their relatively low socioeconomic status.

Turchin said that this situation explained social disturbances during the late Roman empire and the French Wars of Religion, and predicted in 2010 that this situation would cause social unrest in the United States of America during the 2020s. According to Turchin and Jack Goldstone, periods of political instability have throughout human history been due to the purely self-interested behavior of the elite. When the economy faced a surge in the workforce, which exerted a downward pressure on wages, the elite generally kept much of the wealth generated to themselves, resisting taxation and income redistribution. In the face of intensifying competition, they also sought to restrict the window of opportunity, to preserve their power and status for their descendants. These actions exacerbated inequality, a key driver of sociopolitical turbulence due to the proneness of the relatively well-off to radicalism. Widespread progressive political beliefs among university graduates, for instance, can be due to widespread underemployment rather than from exposure to progressive ideas or experiences during their studies.

In the case of the United States, by the 2010s, it became clear that the cost of higher education has ballooned over the previous three to four decadesβ€”faster than inflation, in factβ€”thanks to growing demand. For this prediction, Turchin used current data and the structural-demographic theory, a mathematical model of how population changes affect the behavior of the state, the elite, and the commons, created by Jack Goldstone. Goldstone himself predicted using his model that in the twenty-first century, the United States would elect a national populist leader. Elite overproduction has been cited as a root cause of political tension in the U.S., as so many well-educated Millennials are either unemployed, underemployed, or otherwise not achieving the high status they expect. Even then, the nation continued to produce excess PhD holders before the COVID-19 pandemic hit, especially in the humanities and social sciences, for which employment prospects were dim. Moreover, according to projections by the U.S. Census Bureau, the share of people in their 20s continued to grow till the end of the 2010s, meaning the youth bulge would likely not fade away before the 2020s. As such the gap between the supply and demand in the labor market would likely not fall before then, and falling or stagnant wages generate sociopolitical stress.

In the United Kingdom, there was simply not enough working-class Britons disenchanted with the status quo to support the Brexit movement, which was also buoyed by many highly educated voters.

However, Turchin's model cannot foretell precisely how a crisis will unfold; it can only yield probabilities. Turchin likened this to the accumulation of deadwood in a forest over many years, paving the way for a cataclysmic forest fire later on. It is possible to predict a massive conflagration, but not what causes it.

Discussed on

πŸ”— Daemon (2006)

πŸ”— Novels

Daemon is a 2006 novel by Daniel Suarez about a distributed persistent computer application that begins to change the real world after its original programmer's death. The story was concluded in a sequel, Freedomβ„’, in 2010.

Discussed on

πŸ”— World Chess Championship matches have not had an on-board checkmate since 1929

πŸ”— Chess

In 1929, a World Chess Championship was played between challenger Efim Bogoljubow and titleholder Alexander Alekhine. The match was held in Wiesbaden, Heidelberg and Berlin in Germany, and the Hague, Rotterdam and Amsterdam in the Netherlands, from September 6 to November 12. Alekhine retained his title.

πŸ”— Plugtest

πŸ”— Electronics

A plugtest or plugfest is an event based on a certain technical standard where the designers of electronic equipment or software test the interoperability of their products or designs with those of other manufacturers. It could be literally plugging company A's cable into company B's socket, or a more elaborate test resembling a realistic scenario.

The technical goal is twofold: check compliance with the standard, and test the effectiveness of the standard. The latter could be the case when the standard is ambiguous. A simplified example is: the width of a plug is prescribed, but vendors use different lengths.

Plugtests can be formal and have public test scores or informal and private. Besides helping vendors improve their interoperability, plugtests help create awareness about the standard and can improve transparency on compliance.

Discussed on

πŸ”— Warrant Canary

πŸ”— United States πŸ”— Internet πŸ”— Law πŸ”— Freedom of speech πŸ”— Law Enforcement πŸ”— United States/FBI

A warrant canary is a method by which a communications service provider aims to inform its users that the provider has been served with a government subpoena despite legal prohibitions on revealing the existence of the subpoena. The warrant canary typically informs users that there has not been a court-issued subpoena as of a particular date. If the canary is not updated for the period specified by the host or if the warning is removed, users are to assume that the host has been served with such a subpoena. The intention is to allow the provider to warn users of the existence of a subpoena passively, without technically violating the court order not to do so.

Some subpoenas, such as those covered under 18 U.S.C. Β§2709(c) of the USA Patriot Act, provide criminal penalties for disclosing the existence of the subpoena to any third party, including the service provider's users.

National Security Letters (NSL) originated in the 1986 Electronic Communications Privacy Act and originally targeted those suspected of being agents of a foreign power. Targeting agents of a foreign power was revised in 2001 under the Patriot Act to allow NSLs to target those who may have information deemed relevant to both counterintelligence activities directed against the United States and terrorism. The idea of using negative pronouncements to thwart the nondisclosure requirements of court orders and served secret warrants was first proposed by Steven Schear on the cypherpunks mailing list, mainly to uncover targeted individuals at ISPs. It was also suggested for and used by public libraries in 2002 in response to the USA Patriot Act, which could have forced librarians to disclose the circulation history of library patrons.

Discussed on

πŸ”— Rule of Three (Computer Programming)

πŸ”— Computing πŸ”— Computing/Software

Rule of three ("Three strikes and you refactor") is a code refactoring rule of thumb to decide when similar pieces of code should be refactored to avoid duplication. It states that two instances of similar code don't require refactoring, but when similar code is used three times, it should be extracted into a new procedure. The rule was popularised by Martin Fowler in Refactoring and attributed to Don Roberts.

Duplication is considered a bad practice in programming because it makes the code harder to maintain. When the rule encoded in a replicated piece of code changes, whoever maintains the code will have to change it in all places correctly.

However, choosing an appropriate design to avoid duplication might benefit from more examples to see patterns in. Attempting premature refactoring risks selecting a wrong abstraction, which can result in worse code as new requirements emerge and will eventually need to be refactored again.

The rule implies that the cost of maintenance certainly outweighs the cost of refactoring and potential bad design when there are three copies, and may or may not if there are only two copies.

Discussed on

πŸ”— Nihilistic Violent Extremism

πŸ”— Law Enforcement πŸ”— Crime and Criminal Biography

Nihilistic violent extremism (NVE), or nihilistic extremism, is a term used by law enforcement agencies to refer to extremism and violence lacking an ideological motivation, instead motivated by a misanthropic worldview and generalized hatred for society. It is closely associated with groups such as 764 and No Lives Matter. Despite nihilistic violent extremism's characterization as being unmotivated by genuine ideology, groups or individuals falling under this umbrella may adopt the aesthetics or tactics of, or have sympathies for, other extremist ideologies like neo-Nazism, the variant of Satanism associated with the Order of Nine Angles, and accelerationism. It is also closely associated with sexual misconduct, such as solicitation, production, or possession of child pornography, and sextortion, as well as general violence.

Discussed on

πŸ”— Trump Fake Electors Plot

πŸ”— United States/U.S. Government πŸ”— United States πŸ”— Politics πŸ”— Politics/American politics πŸ”— Conservatism πŸ”— Elections and Referendums πŸ”— United States/U.S. presidential elections πŸ”— United States/U.S. history πŸ”— United States/Presidents of the United States

The Trump fake electors plot was an attempt by U.S. president Donald Trump and associates to have him remain in power after losing the 2020 United States presidential election. After the results of the election determined Trump had lost, he, his associates, and Republican Party officials in seven battleground states – Arizona, Georgia, Michigan, Nevada, New Mexico, Pennsylvania, and Wisconsin – devised a scheme to submit fraudulent certificates of ascertainment to falsely claim Trump had won the Electoral College vote in crucial states. The plot was one of Trump and his associates' attempts to overturn the 2020 United States presidential election.

The intent of the scheme was to pass the illegitimate certificates to then-Vice President Mike Pence in the hope he would count the fake electoral college ballots, rather than the authentic certificates, and thus overturn Joe Biden's victory. This scheme was defended by a fringe legal theory developed by Trump attorneys Kenneth Chesebro and John Eastman, detailed in the Eastman memos, which claimed a vice president has the constitutional discretion to swap official electors with an alternate slate during the certification process, thus changing the outcome of the electoral college vote and the overall winner of the presidential race. The scheme came to be known as the Pence Card.

By June 2024, dozens of Republican state officials and Trump associates had been indicted in four states for their alleged involvement. The federal Smith special counsel investigation investigated Trump's role in the events. According to testimony, Trump was aware of the fake electors scheme, and knew that Eastman's plan for Pence to obstruct the certification of electoral votes was a violation of the Electoral Count Act.

Trump's personal attorney, Rudy Giuliani, a "central figure" in the plot, coordinated the scheme across the seven states. In a conference call on January 2, 2021, Trump, Eastman, and Giuliani spoke to some 300 Republican state legislators in an effort to persuade them to convene special legislative sessions to replace legitimate Biden electors with fake Trump electors based on unfounded allegations of election fraud. Trump pressured the Justice Department to falsely announce it had found election fraud, and he attempted to install a new acting attorney general who had drafted a letter falsely asserting such election fraud had been found, in an attempt to persuade the Georgia legislature to convene and reconsider its Biden electoral votes.

Trump and Eastman asked Republican National Committee chair Ronna McDaniel to enlist the committee's assistance in gathering fake "contingent" electors. A senator's chief of staff tried to pass a list of fraudulent electors to Pence minutes before the vice president was to certify the election. The scheme was investigated by the January 6 committee and the Justice Department. The January 6 committee's final report identified lawyer Kenneth Chesebro as the plot's original architect. On October 20, 2023, Chesebro pleaded guilty in the state of Georgia to conspiring to file a false document and was sentenced to five years of probation.

Discussed on

πŸ”— PL/0

πŸ”— Computing

PL/0 is a programming language, intended as an educational programming language, that is similar to but much simpler than Pascal, a general-purpose programming language. It serves as an example of how to construct a compiler. It was originally introduced in the book, Algorithms + Data Structures = Programs, by Niklaus Wirth in 1976. It features quite limited language constructs: there are no real numbers, very few basic arithmetic operations and no control-flow constructs other than "if" and "while" blocks. While these limitations make writing real applications in this language impractical, it helps the compiler remain compact and simple.

Discussed on

  • "PL/0" | 2026-02-22 | 73 Upvotes 16 Comments