Random Articles (Page 117)

Have a deep view into what people are curious about.

πŸ”— Royal Mail Rubber Band

πŸ”— Philately

A Royal Mail rubber band is a small red elastic loop used by the postal delivery service in the United Kingdom. In the course of its work, the Royal Mail consumes nearly one billion rubber bands per year to tie together bundles of letters at sorting offices. In the 2000s, complaints about Royal Mail rubber bands littering the streets of Britain gave rise to ongoing press interest in this minor cultural phenomenon. The Royal Mail no longer uses red rubber bands.

Discussed on

πŸ”— Norton's Dome

πŸ”— Mathematics πŸ”— Physics πŸ”— Philosophy

Norton's dome is a thought experiment that exhibits a non-deterministic system within the bounds of Newtonian mechanics. It was devised by John D. Norton in 2003. It is a special limiting case of a more general class of examples from 1997 due to Sanjay Bhat and Dennis Bernstein. The Norton's dome problem can be regarded as a problem in physics, mathematics, or philosophy.

Discussed on

πŸ”— Dreadful Sanctuary

πŸ”— Novels πŸ”— Novels/Science fiction

Dreadful Sanctuary is a science fiction novel by British author Eric Frank Russell. After its serialization in the American magazine Astounding Science Fiction in 1948, it was first published in book form in 1951 by Fantasy Press in an edition of 2,975 copies. Russell rewrote the novel for the first American paperback edition, published by Lancer Books in 1963. Editorial interference forced Russell to replace the original ending with a more tragic conclusion in this edition. A British hardcover was issued in 1953, with a paperback incorporating further "minor revisions" following in 1967. Italian translations of Dreadful Sanctuary were published in 1953 and 1986; a German translation appeared in 1971, and a French translation in 1978.

Partly inspired by Fortean ideas, the novel concerns an international conspiracy to prevent humanity from achieving space travel.

Discussed on

πŸ”— EURion constellation

πŸ”— Numismatics

The EURion constellation (also known as Omron rings or doughnuts) is a pattern of symbols incorporated into a number of banknote designs worldwide since about 1996. It is added to help imaging software detect the presence of a banknote in a digital image. Such software can then block the user from reproducing banknotes to prevent counterfeiting using colour photocopiers. According to research from 2004, the EURion constellation is used for colour photocopiers but probably not used in computer software. It has been reported that Adobe Photoshop will not allow editing of an image of a banknote, but in some versions this is believed to be due to a different, unknown digital watermark rather than the EURion constellation.

Discussed on

πŸ”— Light Characteristic

πŸ”— Transport πŸ”— Transport/Maritime πŸ”— Lighthouses

A light characteristic is all of the properties that make a particular navigational light identifiable. Graphical and textual descriptions of navigational light sequences and colours are displayed on nautical charts and in Light Lists with the chart symbol for a lighthouse, lightvessel, buoy or sea mark with a light on it. Different lights use different colours, frequencies and light patterns, so mariners can identify which light they are seeing.

Discussed on

πŸ”— The Seven Dangerous Western Values (2013)

πŸ”— China πŸ”— Politics

Document Number Nine (or Document No. 9), more properly the CommuniquΓ© on the Current State of the Ideological Sphere (also translated as the Briefing on the Current Situation in the Ideological Realm), is a confidential internal document widely circulated within the Communist Party of China in 2013 by the General Office of the Communist Party of China. The document was first circulated in July 2012. The document warns of seven dangerous Western values, allegedly including media freedom and judicial independence. Teaching on any of the seven topics is forbidden. There is an emphasis on controlling and preventing communication using the internet of ideas subversive to one party rule. The document was issued in the context of planned economic reforms and increased calls for political reform. It has been described as a critique of the "liberal ways of thinking".

The document was not made available to public by the Communist Party or any branches of the Chinese government, but in July 2013 was allegedly leaked by Chinese dissident journalist Gao Yu, who was in turn sentenced to a seven-year imprisonment for "leaking state secrets".

It is unclear whether this document is official Chinese policy or just a faction within the party. However, The New York Times suggests that it "bears the unmistakable imprimatur of Xi Jinping". It is thought that Document No. 9 was issued by the Central Committee General Office, and would have required the approval of Mr. Xi and other top leaders. A severe crackdown against human rights lawyers, media outlets, academics, and other such independent thinkers has followed the document's publication.

Discussed on

πŸ”— Optacon

πŸ”— Disability

The Optacon (OPtical to TActile CONverter) is an electromechanical device that enables blind people to read printed material that has not been transcribed into Braille. The device consists of two parts: a scanner which the user runs over the material to be read, and a finger pad which translates the words into vibrations felt on the finger tips. The Optacon was conceived by John Linvill, a professor of Electrical Engineering at Stanford University, and developed with researchers at Stanford Research Institute (now SRI International). Telesensory Systems manufactured the device from 1971 until it was discontinued in 1996. Although effective once mastered, it was expensive and took many hours of training to reach competency. In 2005, TSI suddenly shut down. Employees were "walked out" of the building and lost accrued vacation time, medical insurance, and all benefits. Customers could not buy new machines or get existing machines fixed. Some work was done by other companies but no device with the versatility of the Optacon had been developed as of 2007. Many blind people continue to use their Optacons to this day. The Optacon offers capabilities that no other device offers including the ability to see a printed page or computer screen as it truly appears including drawings, typefaces, and specialized text layouts.

Discussed on

πŸ”— NeWS – Network Extensible Window System

πŸ”— Computing πŸ”— Computing/Software

NeWS (Network extensible Window System) is a discontinued windowing system developed by Sun Microsystems in the mid-1980s. Originally known as "SunDew", its primary authors were James Gosling and David S. H. Rosenthal. The NeWS interpreter was based on PostScript (as was the later Display PostScript, although the two projects were otherwise unrelated) extending it to allow interaction and multiple "contexts" to support windows. Like PostScript, NeWS could be used as a complete programming language, but unlike PostScript, NeWS could be used to make complete interactive programs with mouse support and a GUI.

Discussed on

πŸ”— Doorway Effect

πŸ”— Psychology

The 'doorway effect' or β€˜location updating effect’ is a replicable psychological phenomenon characterized by short-term memory loss when passing through a doorway or moving from one location to another. We tend to forget items of recent significance immediately after crossing a boundary and often forget what we were thinking about or planning on doing upon entering a different room. Research suggests that this phenomenon occurs both at literal boundaries (e.g., moving from one room to another via a door) and metaphorical boundaries (e.g., imagining traversing a doorway, or even when moving from one desktop window to another on a computer).

Memory is organized around specific events or episodes, such as attending a lecture or having a family meal, rather than being a continuous stream interrupted by sleep. This organization is called episodic memory, which involves receiving and storing information about events that are temporarily dated, along with their time and place relationships.

Numerous psychological studies have indicated that the external context, including the location where events occur, plays a significant role in how memories are separated. This context helps establish distinctions between different remembered events. Memories of events that happen in the environment we're currently in are easier to access compared to those from different places. As a result, when we experience spatial changes and move to a different location, it can act as a boundary marker that separates and categorizes our continuous flow of memories into distinct segments.

Discussed on

πŸ”— Mass Surveillance in the United States

πŸ”— United States/U.S. Government πŸ”— United States πŸ”— Human rights πŸ”— Mass surveillance πŸ”— Military history πŸ”— Military history/North American military history πŸ”— Military history/United States military history πŸ”— Freedom of speech πŸ”— Military history/Intelligence πŸ”— Law Enforcement

The practice of mass surveillance in the United States dates back to World War I wartime monitoring and censorship of international communications from, to, or which passed through the United States. After the First World War and the Second World War, the surveillance continued, via programs such as the Black Chamber and Project SHAMROCK. The formation and growth of federal law-enforcement and intelligence agencies such as the FBI, CIA, and NSA institutionalized surveillance used to also silence political dissent, as evidenced by COINTELPRO projects which targeted various organizations and individuals. During the Civil Rights Movement era, many individuals put under surveillance orders were first labelled as integrationists then deemed subversive. Other targeted individuals and groups included Native American activists, African American and Chicano liberation movement activists, and anti-war protesters.

The formation of the international UKUSA surveillance agreement of 1946 evolved into the ECHELON collaboration by 1955 of five English-speaking nations, also known as the Five Eyes, and focused on interception of electronic communications, with substantial increases in domestic surveillance capabilities.

Following the September 11th attacks of 2001, domestic and international mass surveillance capabilities grew immensely. Contemporary mass surveillance relies upon annual presidential executive orders declaring a continued State of National Emergency, first signed by George W. Bush on September 14, 2001 and then continued on an annual basis by President Barack Obama, and upon several subsequent national security Acts including the USA PATRIOT Act and FISA Amendment Act's PRISM surveillance program. Critics and political dissenters currently describe the effects of these acts, orders, and resulting database network of Fusion centers as forming a veritable American police state that simply institutionalized the illegal COINTELPRO tactics used to assassinate dissenters and leaders from the 1950s onwards.

Additional surveillance agencies, such as the DHS and the position of Director of National Intelligence have exponentially escalated mass surveillance since 2001. A series of media reports in 2013 revealed more recent programs and techniques employed by the US intelligence community. Advances in computer and information technology allow the creation of huge national databases that facilitate mass surveillance in the United States by DHS managed Fusion centers, the CIA's Terrorist Threat Integration Center (TTIC) program, and the FBI's TSDB.

Mass surveillance databases are also cited as responsible for profiling Latino Americans and contributing to "self-deportation" techniques, or physical deportations by way of the DHS's ICEGang national database.

After World War I, the US Army and State Department established the Black Chamber, also known as the Cipher Bureau, which began operations in 1919. The Black Chamber was headed by Herbert O. Yardley, who had been a leader in the Army's Military Intelligence program. Regarded as a precursor to the National Security Agency, it conducted peacetime decryption of material including diplomatic communications until 1929.

In the advent of World War II, the Office of Censorship was established. The wartime agency monitored "communications by mail, cable, radio, or other means of transmission passing between the United States and any foreign country". This included the 350,000 overseas cables and telegrams and 25,000 international telephone calls made each week. "Every letter that crossed international or U.S. territorial borders from December 1941 to August 1945 was subject to being opened and scoured for details."

With the end of World War II, Project SHAMROCK was established in 1945. The organization was created to accumulate telegraphic data entering and exiting from the United States. Major communication companies such as Western Union, RCA Global and ITT World Communications actively aided the project, allowing American intelligence officials to gain access to international message traffic. Under the project, and many subsequent programs, no precedent had been established for judicial authorisation, and no warrants were issued for surveillance activities. The project was terminated in 1975.

In 1952, President Harry S. Truman established the National Security Agency (NSA) in 1952 for the purposes of collecting, processing, and monitoring intelligence data. The existence of NSA was not known to people as the memorandum by President Truman was classified.

When the Citizens' Commission to Investigate the FBI published stolen FBI documents revealing abuse of intelligence programs in 1971, Senator Frank Church began an investigation into the programs that become known as the Church Committee. The committee sought to investigate intelligence abuses throughout the 1970s. Following a report provided by the committee outlining egregious abuse, in 1976 Congress established the Senate Select Committee on Intelligence. It would later be joined by the Foreign Intelligence Surveillance Court in 1978. The institutions worked to limit the power of the agencies, ensuring that surveillance activities remained within the rule of law.

Following the attacks of September 11, 2001, Congress passed The Patriot Act to strengthen security and intelligence efforts. The act granted the President broad powers on the war against terror, including the power to bypass the FISA Court for surveillance orders in cases of national security. Additionally, mass surveillance activities were conducted alongside various other surveillance programs under the head of President's Surveillance Program. Under pressure from the public, the warrantless wiretapping program was allegedly ended in January 2007.

Many details about the surveillance activities conducted in the United States were revealed in the disclosure by Edward Snowden in June 2013. Regarded as one of the biggest media leaks in the United States, it presented extensive details about the surveillance programs of the NSA, that involved interception of internet data and telephonic calls from over a billion users, across various countries.

Discussed on