Random Articles (Page 176)

Have a deep view into what people are curious about.

๐Ÿ”— Form Constant

๐Ÿ”— Medicine ๐Ÿ”— Psychoactive and Recreational Drugs

A form constant is one of several geometric patterns which are recurringly observed during hypnagogia, hallucinations and altered states of consciousness.

Discussed on

๐Ÿ”— Whistler (Radio)

๐Ÿ”— Physics ๐Ÿ”— Meteorology ๐Ÿ”— Radio

A whistler is a very low frequency or VLF electromagnetic (radio) wave generated by lightning. Frequencies of terrestrial whistlers are 1ย kHz to 30ย kHz, with a maximum amplitude usually at 3ย kHz to 5ย kHz. Although they are electromagnetic waves, they occur at audio frequencies, and can be converted to audio using a suitable receiver. They are produced by lightning strikes (mostly intracloud and return-path) where the impulse travels along the Earth's magnetic field lines from one hemisphere to the other. They undergo dispersion of several kHz due to the slower velocity of the lower frequencies through the plasma environments of the ionosphere and magnetosphere. Thus they are perceived as a descending tone which can last for a few seconds. The study of whistlers categorizes them into Pure Note, Diffuse, 2-Hop, and Echo Train types.

Voyager 1 and 2 spacecraft detected whistler-like activity in the vicinity of Jupiter known as "Jovian Whistlers", implying the presence of lightning there.

Discussed on

๐Ÿ”— Feminism in Japan

๐Ÿ”— Women ๐Ÿ”— Women's History ๐Ÿ”— Japan ๐Ÿ”— Japan/History ๐Ÿ”— Japan/Culture ๐Ÿ”— Japan/Law and government ๐Ÿ”— Feminism

Feminism in Japan began with women's rights movements that date back to antiquity. The movement started to gain momentum after Western thinking was brought into Japan during the Meiji Restoration in 1868. Japanese feminism differs from Western feminism in that less emphasis is placed on individual autonomy.

Prior to the late 19th century, Japanese women were bound by the traditional patriarchal system where senior male members of the family maintain their authority in the household. After the reforms brought by Meiji Restoration, women's status in Japanese society also went through series of changes. Trafficking of women was restricted, women were allowed to request divorces, and both boys and girls were required to receive elementary education. Further changes to women's status came about in the aftermath of World War II. Women received the right to vote, and a section of the new constitution drafted in 1946 was dedicated to guarantee gender equality.

In 1970, in the wake of the antiโ€“Vietnam War movements, a new women's liberation movement called ลซman ribu (woman lib) emerged in Japan from the New Left and radical student movements in the late 1960s. This movement was in sync with radical feminist movements in the United States and elsewhere, catalyzing a resurgence of feminist activism through the 1970s and beyond. The activists forwarded a comprehensive critique of the male-dominated nature of modern Japan, arguing for a fundamental change of the political-economic system and culture of the society. What distinguished them from previous feminist movements was their emphasis on sexual liberation (ๆ€งใฎ่งฃๆ”พ, sei no kaihล). They did not aim for equality with men, but rather focused on calling for men's liberation from the oppressive aspects of a patriarchal and capitalist system.

In 1979, the Convention on the Elimination of All Forms of Discrimination Against Women was adopted by the United Nations General Assembly. The Japanese government ratified it in 1985.

Discussed on

๐Ÿ”— The Hacker Crackdown: Law and Disorder on the Electronic Frontier

๐Ÿ”— Books ๐Ÿ”— Computer Security ๐Ÿ”— Computer Security/Computing

The Hacker Crackdown: Law and Disorder on the Electronic Frontier is a work of nonfiction by Bruce Sterling first published in 1992.

The book discusses watershed events in the hacker subculture in the early 1990s. The most notable topic covered is Operation Sundevil and the events surrounding the 1987โ€“1990 war on the Legion of Doom network: the raid on Steve Jackson Games, the trial of "Knight Lightning" (one of the original journalists of Phrack), and the subsequent formation of the Electronic Frontier Foundation. The book also profiles the likes of "Emmanuel Goldstein" (publisher of 2600: The Hacker Quarterly), the former assistant attorney general of Arizona Gail Thackeray, FLETC instructor Carlton Fitzpatrick, Mitch Kapor, and John Perry Barlow.

In 1994, Sterling released the book for the Internet with a new afterword.

Discussed on

๐Ÿ”— Euthanasia Coaster

๐Ÿ”— Death ๐Ÿ”— Lithuania ๐Ÿ”— Amusement Parks ๐Ÿ”— Amusement Parks/Roller Coasters

The Euthanasia Coaster is a hypothetical steel roller coaster designed to kill its passengers. In 2010, it was designed and made into a scale model by Lithuanian artist Julijonas Urbonas, a PhD candidate at the Royal College of Art in London. Urbonas, who has worked at an amusement park, stated that the goal of his concept roller coaster is to take lives "with elegance and euphoria". As for practical applications of his design, Urbonas mentioned "euthanasia" or "execution". John Allen, who served as president of the Philadelphia Toboggan Company, inspired Urbonas with his description of the "ultimate" roller coaster as one that "sends out 24 people and they all come back dead".

Discussed on

๐Ÿ”— Trojan Room Coffee Pot

๐Ÿ”— Internet ๐Ÿ”— University of Cambridge

The Trojan Room coffee pot was a coffee machine located in the Computer Laboratory of the University of Cambridge, England. Created in 1991 by Quentin Stafford-Fraser and Paul Jardetzky, it was migrated from their laboratory network to the web in 1993 becoming the world's first webcam.

To save people working in the building the disappointment of finding the coffee machine empty after making the trip to the room, a camera was set up providing a live picture of the coffee pot to all desktop computers on the office network. After the camera was connected to the Internet a few years later, the coffee pot gained international renown as a feature of the fledgling World Wide Web, until being retired in 2001.

Discussed on

๐Ÿ”— RTX2010 radiation-hardened microprocessor

๐Ÿ”— Computing ๐Ÿ”— Computing/Computer hardware

The RTX2010 manufactured by Intersil is a radiation hardened stack machine microprocessor which has been used in numerous spacecraft.

Discussed on

๐Ÿ”— United States involvement in regime change

๐Ÿ”— United States ๐Ÿ”— International relations ๐Ÿ”— Espionage ๐Ÿ”— History ๐Ÿ”— Military history ๐Ÿ”— Military history/North American military history ๐Ÿ”— Military history/United States military history ๐Ÿ”— Politics ๐Ÿ”— Politics/American politics ๐Ÿ”— United States/U.S. history

United States involvement in regime change describes United States government participation or interference, both overt and covert, in the replacement of foreign governments. In the latter half of the 19th century, the U.S. government initiated actions for regime change mainly in Latin America and the southwest Pacific, including the Spanishโ€“American and Philippineโ€“American wars. At the onset of the 20th century, the United States shaped or installed governments in many countries around the world, including neighbors Panama, Honduras, Nicaragua, Mexico, Haiti, and the Dominican Republic.

During World War II, the United States helped overthrow many Nazi Germany or imperial Japanese puppet regimes. Examples include regimes in the Philippines, Korea, the Eastern portion of China, and much of Europe. United States forces were also instrumental in ending the rule of Adolf Hitler over Germany and of Benito Mussolini over Italy. After World War II, the United States in 1945 ratified the UN Charter, the preeminent international law document, which legally bound the U.S. government to the Charter's provisions, including Article 2(4), which prohibits the threat or use of force in international relations, except in very limited circumstances. Therefore, any legal claim advanced to justify regime change by a foreign power carries a particularly heavy burden.

In the aftermath of World War II, the U.S. government struggled with the Soviet Union for global leadership, influence and security within the context of the Cold War. Under the Eisenhower administration, the U.S. government feared that national security would be compromised by governments propped by the Soviet Union's own involvement in regime change and promoted the domino theory, with later presidents following Eisenhower's precedent. Subsequently, the United States expanded the geographic scope of its actions beyond traditional area of operations, Central America and the Caribbean. Significant operations included the United States and United Kingdom-orchestrated 1953 Iranian coup d'รฉtat, the 1961 Bay of Pigs Invasion targeting Cuba, and support for the overthrow of Sukarno by General Suharto in Indonesia. In addition, the U.S. has interfered in the national elections of countries, including the Philippines in 1953, and Japan in the 1950s and 1960s as well as Lebanon in 1957. According to one study, the U.S. performed at least 81 overt and covert known interventions in foreign elections during the period 1946โ€“2000. Another study found that the U.S. engaged in 64 covert and six overt attempts at regime change during the Cold War.

Following the dissolution of the Soviet Union, the United States has led or supported wars to determine the governance of a number of countries. Stated U.S. aims in these conflicts have included fighting the War on Terror, as in the ongoing Afghan war, or removing dictatorial and hostile regimes, as in the Iraq War.

Discussed on

๐Ÿ”— Capability Based Security

๐Ÿ”— Computing ๐Ÿ”— Computer Security ๐Ÿ”— Computer Security/Computing

Capability-based security is a concept in the design of secure computing systems, one of the existing security models. A capability (known in some systems as a key) is a communicable, unforgeable token of authority. It refers to a value that references an object along with an associated set of access rights. A user program on a capability-based operating system must use a capability to access an object. Capability-based security refers to the principle of designing user programs such that they directly share capabilities with each other according to the principle of least privilege, and to the operating system infrastructure necessary to make such transactions efficient and secure. Capability-based security is to be contrasted with an approach that uses hierarchical protection domains.

Although most operating systems implement a facility which resembles capabilities, they typically do not provide enough support to allow for the exchange of capabilities among possibly mutually untrusting entities to be the primary means of granting and distributing access rights throughout the system. A capability-based system, in contrast, is designed with that goal in mind.

Capabilities as discussed in this article should not be confused with POSIX 1e/2c "Capabilities". The latter are coarse-grained privileges that cannot be transferred between processes.

Discussed on