Random Articles

Have a deep view into what people are curious about.

πŸ”— Mars Monolith

πŸ”— Solar System/Mars πŸ”— Solar System

The Mars monolith is a rectangular object (possibly a boulder) discovered on the surface of Mars. It is located near the bottom of a cliff, from which it likely fell. The Mars Reconnaissance Orbiter took pictures of it from orbit, roughly 180 miles (300Β km) away.

Around the same time, the Phobos monolith made international news.

πŸ”— Slide rule: One of the simplest forms of analog computer

πŸ”— Technology πŸ”— Computing πŸ”— Mathematics

A slide rule is a hand-operated mechanical calculator consisting of slidable rulers for evaluating mathematical operations such as multiplication, division, exponents, roots, logarithms, and trigonometry. It is one of the simplest analog computers.

Slide rules exist in a diverse range of styles and generally appear in a linear, circular or cylindrical form. Slide rules manufactured for specialized fields such as aviation or finance typically feature additional scales that aid in specialized calculations particular to those fields. The slide rule is closely related to nomograms used for application-specific computations. Though similar in name and appearance to a standard ruler, the slide rule is not meant to be used for measuring length or drawing straight lines. Nor is it designed for addition or subtraction, which is usually performed using other methods, like using an abacus. Maximum accuracy for standard linear slide rules is about three decimal significant digits, while scientific notation is used to keep track of the order of magnitude of results.

English mathematician and clergyman Reverend William Oughtred and others developed the slide rule in the 17th century based on the emerging work on logarithms by John Napier. It made calculations faster and less error-prone than evaluating on paper. Before the advent of the scientific pocket calculator, it was the most commonly used calculation tool in science and engineering. The slide rule's ease of use, ready availability, and low cost caused its use to continue to grow through the 1950s and 1960s, even as desktop electronic computers were gradually introduced. But after the handheld scientific calculator was introduced in 1972 and became inexpensive in the mid-1970s, slide rules became largely obsolete, so most suppliers departed the business.

In the United States, the slide rule is colloquially called a slipstick.

πŸ”— Debate between sheep and grain

πŸ”— Religion πŸ”— Ancient Near East πŸ”— Books πŸ”— Iraq πŸ”— Mythology πŸ”— Arab world

The "Debate between sheep and grain" or "Myth of cattle and grain" is a Sumerian creation myth, written on clay tablets in the mid to late 3rd millennium BCE.

Discussed on

πŸ”— Artificio de Juanelo

The Artificio de Juanelo ("Gianello's artifice") was the name of two devices built in Toledo in the 16th century by Juanelo Turriano. They were designed to supply the city with a source of readily available water by lifting it from the Tagus (Tajo) river to the AlcΓ‘zar. Now in ruins, the precise details of the operation of the devices are unknown, but at the time they were considered engineering wonders.

Discussed on

πŸ”— Peirce Quincuncial Projection

πŸ”— Geography πŸ”— Maps

The Peirce quincuncial projection is a conformal map projection developed by Charles Sanders Peirce in 1879. The projection has the distinctive property that it can be tiled ad infinitum on the plane, with edge-crossings being completely smooth except for four singular points per tile. The projection has seen use in digital photography for portraying 360Β° views. The description quincuncial refers to the arrangement of four quadrants of the globe around the center hemisphere in an overall square pattern. Typically the projection is oriented such that the north pole lies at the center.

Discussed on

πŸ”— How a Buffer Overflow Works

πŸ”— Computing πŸ”— Computer Security πŸ”— Computer Security/Computing πŸ”— Computing/Software

In information security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations.

Buffers are areas of memory set aside to hold data, often while moving it from one section of a program to another, or between programs. Buffer overflows can often be triggered by malformed inputs; if one assumes all inputs will be smaller than a certain size and the buffer is created to be that size, then an anomalous transaction that produces more data could cause it to write past the end of the buffer. If this overwrites adjacent data or executable code, this may result in erratic program behavior, including memory access errors, incorrect results, and crashes.

Exploiting the behavior of a buffer overflow is a well-known security exploit. On many systems, the memory layout of a program, or the system as a whole, is well defined. By sending in data designed to cause a buffer overflow, it is possible to write into areas known to hold executable code and replace it with malicious code, or to selectively overwrite data pertaining to the program's state, therefore causing behavior that was not intended by the original programmer. Buffers are widespread in operating system (OS) code, so it is possible to make attacks that perform privilege escalation and gain unlimited access to the computer's resources. The famed Morris worm in 1988 used this as one of its attack techniques.

Programming languages commonly associated with buffer overflows include C and C++, which provide no built-in protection against accessing or overwriting data in any part of memory and do not automatically check that data written to an array (the built-in buffer type) is within the boundaries of that array. Bounds checking can prevent buffer overflows, but requires additional code and processing time. Modern operating systems use a variety of techniques to combat malicious buffer overflows, notably by randomizing the layout of memory, or deliberately leaving space between buffers and looking for actions that write into those areas ("canaries").

Discussed on

πŸ”— The deadliest school massacre in US history occurred in 1927

πŸ”— Crime πŸ”— Terrorism πŸ”— Schools πŸ”— Michigan

The Bath School disaster, also known as the Bath School massacre, was a series of violent attacks perpetrated by Andrew Kehoe on MayΒ 18, 1927, in Bath Township, Michigan. The attacks killed 38Β elementary schoolchildren and 6Β adults, and injured at least 58Β other people. Prior to his timed explosives going off at the Bath Consolidated School building, Kehoe had murdered his wife, Nellie Price Kehoe, and firebombed his farm. Arriving at the site of the school explosion, Kehoe died when he detonated explosives concealed in his truck.

Kehoe, the 55-year-old school board treasurer, was angered by increased taxes and his defeat in the April 5, 1926, election for township clerk. He was thought by locals to have planned his "murderous revenge" after that public defeat. Kehoe had a reputation for difficulty on the school board and in personal dealings. In addition, he was notified that his mortgage was going to be foreclosed upon in June 1926. For much of the next year until May 1927, Kehoe purchased explosives. He secretly hid them on his property and under the school.

On May 18, 1927, Kehoe then set off almost simultaneous explosions at his farmstead and at the Bath Consolidated School. His explosives destroyed the farm's buildings and ripped through the north wing of the Bath Consolidated School building. As rescuers began working at the school, Kehoe drove up to the schoolyard and detonated dynamite inside his shrapnel-filled truck. The truck explosion killed Kehoe and several others nearby. Bystanders were injured. During the rescue and recovery efforts, searchers discovered an additional 500Β pounds (230Β kg) of unexploded dynamite and pyrotol in the south wing of the school that was set to explode at the same time as the initial explosions in the north wing; Kehoe had apparently intended to destroy the entire school and kill everyone in it.

Discussed on

πŸ”— Doomsday rule

πŸ”— Time

The Doomsday rule is an algorithm of determination of the day of the week for a given date. It provides a perpetual calendar because the Gregorian calendar moves in cycles of 400 years. The algorithm for mental calculation was devised by John Conway in 1973, drawing inspiration from Lewis Carroll's perpetual calendar algorithm. It takes advantage of each year having a certain day of the week, called the doomsday, upon which certain easy-to-remember dates fall; for example, 4/4, 6/6, 8/8, 10/10, 12/12, and the last day of February all occur on the same day of the week in any year. Applying the Doomsday algorithm involves three steps: Determination of the anchor day for the century, calculation of the doomsday for the year from the anchor day, and selection of the closest date out of those that always fall on the doomsday, e.g., 4/4 and 6/6, and count of the number of days (modulo 7) between that date and the date in question to arrive at the day of the week. The technique applies to both the Gregorian calendar and the Julian calendar, although their doomsdays are usually different days of the week.

The algorithm is simple enough that it can be computed mentally. Conway can usually give the correct answer in under two seconds. To improve his speed, he practices his calendrical calculations on his computer, which is programmed to quiz him with random dates every time he logs on.

Discussed on

πŸ”— Electrodynamic Tether

πŸ”— Spaceflight πŸ”— Physics

Electrodynamic tethers (EDTs) are long conducting wires, such as one deployed from a tether satellite, which can operate on electromagnetic principles as generators, by converting their kinetic energy to electrical energy, or as motors, converting electrical energy to kinetic energy. Electric potential is generated across a conductive tether by its motion through a planet's magnetic field.

A number of missions have demonstrated electrodynamic tethers in space, most notably the TSS-1, TSS-1R, and Plasma Motor Generator (PMG) experiments.

Discussed on