Random Articles (Page 2)

Have a deep view into what people are curious about.

πŸ”— Thomas Harriot

πŸ”— Biography πŸ”— Mathematics πŸ”— Biography/science and academia πŸ”— Astronomy πŸ”— Linguistics πŸ”— Linguistics/Applied Linguistics πŸ”— Indigenous peoples of North America πŸ”— University of Oxford

Thomas Harriot (Oxford, c. 1560 – London, 2 July 1621), also spelled Harriott, Hariot or Heriot, was an English astronomer, mathematician, ethnographer and translator who made advances within the scientific field. Thomas Harriot was recognized for his contributions in astronomy, mathematics, and navigational techniques. Harriot worked closely with John White to create advanced maps for navigation. While Harriot worked extensively on numerous papers on the subjects of astronomy, mathematics, and navigation the amount of work that was actually published was sparse. So sparse that the only publication that has been produced by Harriot was The Briefe and True Report of the New Found Land of Virginia. The premise of the book includes descriptions of English settlements and financial issues in Virginia at the time. He is sometimes credited with the introduction of the potato to the British Isles. Harriot was the first person to make a drawing of the Moon through a telescope, on 26 July 1609, over four months before Galileo Galilei.

After graduating from St Mary Hall, Oxford, Harriot travelled to the Americas, accompanying the 1585 expedition to Roanoke island funded by Sir Walter Raleigh and led by Sir Ralph Lane. Harriot was a vital member of the venture, having learned and translating the Carolina Algonquian language from two Native Americans: Wanchese and Manteo. On his return to England, he worked for the 9th Earl of Northumberland. At the Earl's house, he became a prolific mathematician and astronomer to whom the theory of refraction is attributed.

Discussed on

πŸ”— Endurance Running Hypothesis

πŸ”— Anthropology πŸ”— Athletics πŸ”— Running πŸ”— Evolutionary biology

The endurance running hypothesis is the hypothesis that the evolution of certain human characteristics can be explained as adaptations to long-distance running. The hypothesis suggests that endurance running played an important role for early hominins in obtaining food. Researchers have proposed that endurance running began as an adaptation for scavenging and later for persistence hunting.

Discussed on

πŸ”— Those Thieving Image Farms

Discussed on

πŸ”— Deniable Encryption

πŸ”— Cryptography πŸ”— Cryptography/Computer science

In cryptography and steganography, plausibly deniable encryption describes encryption techniques where the existence of an encrypted file or message is deniable in the sense that an adversary cannot prove that the plaintext data exists.

The users may convincingly deny that a given piece of data is encrypted, or that they are able to decrypt a given piece of encrypted data, or that some specific encrypted data exists. Such denials may or may not be genuine. For example, it may be impossible to prove that the data is encrypted without the cooperation of the users. If the data is encrypted, the users genuinely may not be able to decrypt it. Deniable encryption serves to undermine an attacker's confidence either that data is encrypted, or that the person in possession of it can decrypt it and provide the associated plaintext.

In their pivotal 1996 paper, Ran Canetti, Cynthia Dwork, Moni Naor, and Rafail Ostrovsky introduced the concept of deniable encryption, a cryptographic breakthrough that ensures privacy even under coercion. This concept allows encrypted communication participants to plausibly deny the true content of their messages. Their work lays the foundational principles of deniable encryption, illustrating its critical role in protecting privacy against forced disclosures. This research has become a cornerstone for future advancements in cryptography, emphasizing the importance of deniable encryption in maintaining communication security. The notion of deniable encryption was used by Julian Assange and Ralf Weinmann in the Rubberhose filesystem.

πŸ”— Proxy Firm

A proxy firm (also a proxy advisor, proxy adviser, proxy voting agency, vote service provider or shareholder voting research provider) provides services to shareholders (in most cases an institutional investor of some type) to vote their shares at shareholder meetings of, usually, quoted companies.

The typical services provided include agenda translation, provision of vote management software, voting policy development, company research, and vote administration including vote execution. According to their websites, not all firms provide voting recommendations and those that do may simply execute client voting instructions.

The votes executed are called "Proxy Votes" because the shareholder usually does not attend the meeting and instead sends instructions - a proxy appointment - for a third party, usually the chairman of the meeting to vote shares in accordance with the instructions given on the voting card.

πŸ”— Confocal microscopy

πŸ”— Technology πŸ”— Physics πŸ”— Neuroscience πŸ”— Molecular Biology πŸ”— Molecular Biology/Molecular and Cell Biology

Confocal microscopy, most frequently confocal laser scanning microscopy (CLSM) or laser scanning confocal microscopy (LSCM), is an optical imaging technique for increasing optical resolution and contrast of a micrograph by means of using a spatial pinhole to block out-of-focus light in image formation. Capturing multiple two-dimensional images at different depths in a sample enables the reconstruction of three-dimensional structures (a process known as optical sectioning) within an object. This technique is used extensively in the scientific and industrial communities and typical applications are in life sciences, semiconductor inspection and materials science.

Light travels through the sample under a conventional microscope as far into the specimen as it can penetrate, while a confocal microscope only focuses a smaller beam of light at one narrow depth level at a time. The CLSM achieves a controlled and highly limited depth of field.

Discussed on

πŸ”— Turboencabulator

πŸ”— Engineering

The turboencabulator or turbo-encabulator (and its later incarnations, the retroencabulator or retro-encabulator and Micro Encabulator) is a fictional machine whose alleged existence became an in-joke and subject of professional humor among engineers. The explanation of the supposed product makes extensive use of technobabble.

The gag was popular for many years. The following quote is from the original Students' Quarterly Journal article written by J. H. Quick in 1944. The citation in the later Time article misspells several of the technical terms. General Electric, Chrysler and Rockwell Automation use many of the same words.

The original machine had a base plate of prefabulated amulite, surmounted by a malleable logarithmic casing in such a way that the two main spurving bearings were in a direct line with the panametric fan. The latter consisted simply of six hydrocoptic marzlevanes, so fitted to the ambifacient lunar waneshaft that side fumbling was effectively prevented. The main winding was of the normal lotus-o-deltoid type placed in panendermic semi-boloid slots in the stator, every seventh conductor being connected by a nonreversible tremmie pipe to the differential girdlespring on the "up" end of the grammeters.

Discussed on

πŸ”— The Prisoner

πŸ”— Television πŸ”— Science Fiction πŸ”— Television/British television πŸ”— Television/ITC productions

The Prisoner is a 1967 British television series about an unnamed British intelligence agent who is abducted and imprisoned in a mysterious coastal village, where his captors designate him as Number Six and try to find out why he abruptly resigned from his job. Patrick McGoohan played the lead role as Number Six. The series was created by McGoohan with possible contributions from George Markstein. Episode plots have elements of science fiction, allegory, and psychological drama, as well as spy fiction. It was produced by Everyman Films for distribution by Lew Grade's ITC Entertainment.

A single series of 17 episodes was filmed between September 1966 and January 1968, with exterior location filming in Portmeirion, Wales. Interior scenes were filmed at MGM-British Studios in Borehamwood, north of London. The series was first broadcast in Canada beginning on 5 September 1967, in the UK on 29 September 1967, and in the US on 1 June 1968. Although the show was sold as a thriller in the mould of the previous series starring McGoohan, Danger Man, its combination of 1960s countercultural themes and surrealistic setting had a far-reaching influence on science fiction and fantasy TV programming, and on narrative popular culture in general. Since its initial screening, the series has developed a cult following.

A six-part TV miniseries remake aired on the US cable channel AMC in November 2009. In 2016, Big Finish Productions reinterpreted the series as an audio drama.

Discussed on

πŸ”— Kaktovik numerals – A base-20 number system that is visually easy too

πŸ”— Numbers πŸ”— Canada πŸ”— Arctic πŸ”— Writing systems πŸ”— Indigenous peoples of North America πŸ”— Canada/Canadian Territories πŸ”— Alaska

Kaktovik numerals are a featural positional numeral system created by Alaskan IΓ±upiat.

Arabic numeral notation, which was designed for a base-10 numeral system, is inadequate for the Inuit languages, which use a base-20 numeral system. Students in Kaktovik, Alaska, invented a base-20 numeral notation in 1994 to rectify this issue, and this system spread among the Alaskan IΓ±upiat and has been considered in other countries where Inuit languages are spoken.

The image at right shows the digits 0 to 19. Twenty is written as a one and a zero (\Ι€), forty as a two and a zero (VΙ€), four hundred as a one and two zeros (\Ι€Ι€), eight hundred as a two and two zeros (VΙ€Ι€), etc.

Discussed on

πŸ”— Jonathan James

πŸ”— Biography πŸ”— Law πŸ”— Computer Security πŸ”— Computer Security/Computing πŸ”— Biography/science and academia πŸ”— Florida

Jonathan Joseph James (December 12, 1983 – May 18, 2008) was an American hacker who was the first juvenile incarcerated for cybercrime in the United States. The South Florida native was 15 years old at the time of the first offense and 16 years old on the date of his sentencing. He died at his Pinecrest, Florida home on May 18, 2008, of a self-inflicted gunshot wound.

Discussed on