Random Articles
Have a deep view into what people are curious about.
π List of video games considered the best
This is a list of video games that multiple video game journalists and critics have considered to be among the best of all time. The games listed here are included on at least six separate "best/greatest of all time" lists from different publications, as chosen by their editorial staffs.
Discussed on
- "List of video games considered the best" | 2021-03-07 | 38 Upvotes 12 Comments
π VinΔa symbols
The VinΔa symbols, sometimes known as the Danube script, VinΔa signs, VinΔa script, VinΔaβTurdaΘ script, Old European script, etc., are a set of symbols found on Neolithic era (6th to 5th millennia BC) artifacts from the VinΔa culture of Central Europe and Southeastern Europe. The vast majority of historians agree that those symbols are not a writing system, but private symbols or ornaments of some kind. A minority of historians claim that this is the earliest known writing system that has influenced other early writing systems.
Discussed on
- "VinΔa symbols" | 2015-03-25 | 27 Upvotes 2 Comments
π Hybrid Insect Micro-Electro-Mechanical Systems (Hi-MEMS)
Hybrid Insect Micro-Electro-Mechanical Systems (HI-MEMS) is a project of DARPA, a unit of the United States Department of Defense. Created in 2006, the unit's goal is the creation of tightly coupled machine-insect interfaces by placing micro-mechanical systems inside the insects during the early stages of metamorphosis. After implantation, the "insect cyborgs" could be controlled by sending electrical impulses to their muscles. The primary application is surveillance. The project was created with the ultimate goal of delivering an insect within 5 meters of a target located 100 meters away from its starting point. In 2008, a team from the University of Michigan demonstrated a cyborg unicorn beetle at an academic conference in Tucson, Arizona. The beetle was able to take off and land, turn left or right, and demonstrate other flight behaviors. Researchers at Cornell University demonstrated the successful implantation of electronic probes into tobacco hornworms in the pupal stage.
Discussed on
- "Hybrid Insect Micro-Electro-Mechanical Systems (Hi-MEMS)" | 2023-07-10 | 38 Upvotes 8 Comments
π Penal exception clause β prohibits slavery, except as a punishment for a crime
In the United States, the 13th Amendment to the Constitution states the following:
Section 1. Neither slavery nor involuntary servitude, except as a punishment for crime whereof the party shall have been duly convicted, shall exist within the United States, or any place subject to their jurisdiction.
This prohibits slavery and involuntary servitude, but leaves an exception for punishment for a crime of which one has been convicted. Various commentators have accused states of abusing this provision to re-establish systems similar to slavery, or of otherwise exploiting such labor in a manner unfair to local labor.
Starting in the late 2010s and extending into the mid-2020s, a movement emerged to repeal the exception clause from both the federal and state constitutions. As of February 2026, eight states had joined Rhode Island in repealing the exception clause from their state constitutions, while 26 states' constitutions make no mention of either slavery or involuntary servitude and 15 states retain an exception clause.
Discussed on
- "Penal exception clause β prohibits slavery, except as a punishment for a crime" | 2026-01-12 | 13 Upvotes 2 Comments
π Anti-Mask League of San Francisco
The Anti-Mask League of San Francisco was an organization formed to protest an ordinance which required people in San Francisco, California to wear masks during the 1918 influenza pandemic. The ordinance it protested lasted less than one month before being repealed. Due to the short period of the league's existence, its exact membership is difficult to determine; however, an estimated 4,000β5,000 citizens showed up to a meeting to protest the second ordinance in January 1919. Opposition to similar ordinances during the COVID-19 pandemic in the United States led to renewed interest in, and comparisons with, the Anti-Mask League.
Discussed on
- "Anti-Mask League of San Francisco" | 2020-11-22 | 55 Upvotes 65 Comments
π Crew resource management
Crew resource management or cockpit resource management (CRM) is a set of training procedures for use in environments where human error can have devastating effects. Used primarily for improving aviation safety, CRM focuses on interpersonal communication, leadership, and decision making in the cockpit of an airliner. Its pioneer was David Beaty, a former Royal Air Force pilot and later a BOAC pilot who wrote his seminal book The Human Factor in Aircraft Accidents in the late 1950s. Despite the considerable development of electronic aids since then, many principles he developed continue to prove effective today.
Crew resource management formally began with a National Transportation Safety Board (NTSB) recommendation made during their investigation of the 1978 United Airlines Flight 173 crash. The issues surrounding that crash included a DC-8 crew running out of fuel over Portland, Oregon while troubleshooting a landing gear problem.
The term "cockpit resource management" (later generalized to "crew resource management") was coined in 1979 by NASA psychologist John Lauber who had studied communication processes in cockpits for several years. While retaining a command hierarchy, the concept was intended to foster a less authoritarian cockpit culture, where co-pilots were encouraged to question captains if they observed them making mistakes.
Crew resource management grew out of the 1977 Tenerife airport disaster where two Boeing 747 aircraft collided on the runway killing 583 people. A few weeks later, NASA held a workshop on the topic, endorsing this innovative training. United Airlines was the first airline to provide CRM training for its cockpit crews in 1981. By the 1990s, it had become a global standard.
United Airlines additionally trained their flight attendants to use CRM in conjunction with the pilots to provide another layer of enhanced communication and teamwork. Studies have shown that by both work groups using CRM together, communication barriers are reduced and problems can be solved more efficiently, leading to increased safety. CRM training concepts have been modified for application to a wide range of activities where people must make dangerous time-critical decisions. These arenas include air traffic control, ship handling, firefighting, and medical operating rooms.
Discussed on
- "Crew resource management" | 2018-09-30 | 39 Upvotes 10 Comments
π Unum, a Better Number Format
Unums (universal numbers) are a family of number formats and arithmetic for implementing real numbers on a computer, proposed by John L. Gustafson in 2015. They are designed as an alternative to the ubiquitous IEEE 754 floating-point standard. The latest version is known as posits.
Discussed on
- "Unum, a Better Number Format" | 2023-09-21 | 11 Upvotes 3 Comments
π Deniable Encryption
In cryptography and steganography, plausibly deniable encryption describes encryption techniques where the existence of an encrypted file or message is deniable in the sense that an adversary cannot prove that the plaintext data exists.
The users may convincingly deny that a given piece of data is encrypted, or that they are able to decrypt a given piece of encrypted data, or that some specific encrypted data exists. Such denials may or may not be genuine. For example, it may be impossible to prove that the data is encrypted without the cooperation of the users. If the data is encrypted, the users genuinely may not be able to decrypt it. Deniable encryption serves to undermine an attacker's confidence either that data is encrypted, or that the person in possession of it can decrypt it and provide the associated plaintext.
In their pivotal 1996 paper, Ran Canetti, Cynthia Dwork, Moni Naor, and Rafail Ostrovsky introduced the concept of deniable encryption, a cryptographic breakthrough that ensures privacy even under coercion. This concept allows encrypted communication participants to plausibly deny the true content of their messages. Their work lays the foundational principles of deniable encryption, illustrating its critical role in protecting privacy against forced disclosures. This research has become a cornerstone for future advancements in cryptography, emphasizing the importance of deniable encryption in maintaining communication security. The notion of deniable encryption was used by Julian Assange and Ralf Weinmann in the Rubberhose filesystem.
π Chiastic Structure
Chiastic structure, or chiastic pattern, is a literary technique in narrative motifs and other textual passages. An example of chiastic structure would be two ideas, A and B, together with variants A' and B', being presented as A,B,B',A'. Chiastic structures that involve more components are sometimes called "ring structures", "ring compositions", or, in cases of very ambitious chiasmus, "onion-ring compositions". These may be regarded as chiasmus scaled up from words and clauses to larger segments of text.
These often symmetrical patterns are commonly found in ancient literature such as the epic poetry of the Iliad and the Odyssey. Classicist Bruno Gentili describes this technique as "the cyclical, circular, or 'ring' pattern (ring composition). Here the idea that introduced a compositional section is repeated at its conclusion, so that the whole passage is framed by material of identical content". Meanwhile, in classical prose, scholars often find chiastic narrative techniques in the Histories of Herodotus:
"Herodotus frequently uses ring composition or 'epic regression' as a way of supplying background information for something discussed in the narrative. First an event is mentioned briefly, then its precedents are reviewed in reverse chronological order as far back as necessary; at that point the narrative reverses itself and moves forward in chronological order until the event in the main narrative line is reached again."
Various chiastic structures are also seen in the Hebrew Bible, the New Testament, the Book of Mormon, and the Quran.
Discussed on
- "Chiastic Structure" | 2021-09-13 | 41 Upvotes 12 Comments
π Crypto-Anarchism
Crypto-anarchism (or crypto-anarchy) is a political ideology focusing on protection of privacy, political freedom and economic freedom, the adherents of which use cryptographic software for confidentiality and security while sending and receiving information over computer networks.
By using cryptographic software, the association between the identity of a certain user or organization and the pseudonym they use is made difficult to find, unless the user reveals the association. It is difficult to say which country's laws will be ignored, as even the location of a certain participant is unknown. However, participants may in theory voluntarily create new laws using smart contracts or, if the user is pseudonymous, depend on online reputation.
Discussed on
- "Crypto-Anarchism" | 2021-02-27 | 74 Upvotes 46 Comments