Random Articles (Page 2)

Have a deep view into what people are curious about.

πŸ”— The Narcissism of Small Differences

πŸ”— Psychology

The narcissism of small differences (German: der Narzissmus der kleinen Differenzen) is the thesis that communities with adjoining territories and close relationships are especially likely to engage in feuds and mutual ridicule because of hypersensitivity to details of differentiation. The term was coined by Sigmund Freud in 1917, based on the earlier work of British anthropologist Ernest Crawley. In language differing only slightly from current psychoanalytic terminology, Crawley declared that each individual is separated from others by a taboo of personal isolation, a narcissism of minor differences.

πŸ”— A Dog of Flanders

πŸ”— Novels πŸ”— Children's literature πŸ”— Dogs πŸ”— Novels/19th century

A Dog of Flanders is an 1872 novel by English author Marie Louise de la RamΓ©e published with her pseudonym "Ouida". It is about a Flemish boy named Nello and his dog, Patrasche and is set in Antwerp.

In Japan, Korea and the Philippines, the novel has been an extremely popular children's classic for decades and has been adapted into several Japanese films and anime. Since the 1980s, the Belgian board of tourism caught on to the phenomenon and built two monuments honoring the story to please East-Asian tourists. There is a small statue of Nello and Patrasche at the Kapelstraat in the Antwerp suburb of Hoboken, and a commemorative plaque in front of the Antwerp Cathedral donated by Toyota, that was later replaced by a marble statue of the two characters covered by a cobblestone blanket, created by the artist Batist Vermeulen.

Discussed on

πŸ”— OFFSystem

πŸ”— Computing

The Owner-Free File System (OFF System, or OFF for short) is a peer-to-peer distributed file system in which all shared files are represented by randomized multi-used data blocks. Instead of anonymizing the network, the data blocks are anonymized and therefore, only data garbage is ever exchanged and stored and no forwarding via intermediate nodes is required. OFF claims to have been created with the expressed intention "to cut off some gangrene-infested bits of the copyright industry."

Discussed on

πŸ”— British Navy against slave trade

πŸ”— Military history πŸ”— Military history/African military history πŸ”— British Empire πŸ”— Military history/Maritime warfare πŸ”— African diaspora πŸ”— Military history/European military history πŸ”— Military history/British military history

The British Royal Navy established the West Africa Squadron at substantial expense in 1808 after Parliament passed the Slave Trade Act of 1807, an Act for the Abolition of the Slave Trade. The squadron's task was to suppress the Atlantic slave trade by patrolling the coast of West Africa. With a home base at Portsmouth, England, it began with two small ships, the 32-gun fifth-rate frigate HMSΒ Solebay and the Cruizer-class brig-sloop HMSΒ Derwent. At the height of its operations, the squadron employed a sixth of the Royal Navy fleet and marines. In 1819 the Royal Navy established a West Coast of Africa Station and the West Africa Squadron became known as the Preventative Squadron. It remained an independent command until 1856 and then again 1866 to 1867. Between 1830 and 1865, more than 1,500 British sailors died on their mission of freeing slaves with the West Africa Squadron.

Between 1808 and 1860 the West Africa Squadron captured 1,600 slave ships and freed 150,000 Africans. It is considered the most costly international moral action in modern history.

The Squadron has been described as being poorly resourced and plagued by corruption; it only managed to capture around 6% of the transatlantic slave ships, but patrolling 3,000 miles of African coast from 1808 to 1860 it liberated 150,000 Africans.

Discussed on

πŸ”— iSmell (2001)

πŸ”— Computing πŸ”— Computing/Computer hardware

The iSmell Personal Scent Synthesizer developed by DigiScents Inc. is a small device that can be connected to a computer through a Universal serial bus (USB) port and powered using any ordinary electrical outlet. The appearance of the device is similar to that of a shark’s fin, with many holes lining the β€œfin” to release the various scents. Using a cartridge similar to a printer’s, it can synthesize and even create new smells by combining certain combinations of other scents. These newly created odors can be used to closely replicate common natural and manmade odors. The cartridges used also need to be swapped every so often once the scents inside are used up. Once partnered with websites and interactive media, the scents can be activated either automatically once a website is opened or manually. However, the product is no longer on the market and never generated substantial sales. Digiscent had plans for the iSmell to have several versions but did not progress past the prototype stage. The company did not last long and filed for bankruptcy a short time after.

In 2006, the iSmell was named one of the "25 Worst Tech Products of All Time" by PC World Magazine, which commented that "[f]ew products literally stink, but this one did--or at least it would have, had it progressed beyond the prototype stage."

Discussed on

πŸ”— Locating a hospital by hanging meat around the city (981CE)

πŸ”— Medicine πŸ”— Iran πŸ”— History of Science πŸ”— Middle Ages πŸ”— Islam πŸ”— Middle Ages/History πŸ”— Turkey

A bimaristan (Persian: Ψ¨ΩŠΩ…Ψ§Ψ±Ψ³ΨͺΨ§Ω†β€Ž, romanized:Β bΔ«mārestān; Arabic: Ψ¨ΩΩŠΩ’Ω…ΩŽΨ§Ψ±ΩΨ³Ω’ΨͺΩŽΨ§Ω†β€Ž, romanized:Β bΔ«māristān), also known as dar al-shifa (also darüşşifa in Turkish) or simply maristan, is a hospital in the historic Islamic world.

Discussed on

πŸ”— Lucid programming language

πŸ”— Computer science πŸ”— Computer science/Computing

Lucid is a dataflow programming language designed to experiment with non-von Neumann programming models. It was designed by Bill Wadge and Ed Ashcroft and described in the 1985 book Lucid, the Dataflow Programming Language.

pLucid was the first interpreter for Lucid.

Discussed on

πŸ”— Role-playing game theory

πŸ”— Role-playing games

A role-playing game theory is the ludology of role-playing games (RPGs) where they are studied as a social or artistic phenomenon. RPG theories seek to understand what role-playing games are, how they function, and how the process can be refined in order to improve the gaming experience and produce more useful game products.

Discussed on

πŸ”— Terraforming of Mars

πŸ”— Technology πŸ”— Spaceflight πŸ”— Solar System/Mars πŸ”— Solar System

Terraforming of Mars is a procedure that would comprise of planetary engineering project or concurrent projects, with the goal of transforming the planet from one hostile to terrestrial life to one that can sustainably host humans and other lifeforms free of protection or mediation. The process would presumably involve the rehabilitation of the planet's extant climate, atmosphere, and surface through a variety of resource-intensive initiatives, and the installation of a novel ecological system or systems.

Justifications for choosing Mars over other potential terraforming targets include the presence of water and a geological history that suggests it once harbored a dense atmosphere similar to Earth’s. Hazards and difficulties include low gravity, low light levels relative to Earth’s, and the lack of a magnetic field.

Objections to the project include questions about its feasibility, general ethical concerns about terraforming, and the considerable cost that such an undertaking would involve. Reasons for terraforming the planet include allaying concerns about resource use and depletion on Earth and arguments that the altering and subsequent or concurrent settlement of other planets decreases the odds of humanity's extinction.

Disagreement exists about whether current technology could render the planet habitable.

Discussed on

πŸ”— Sousveillance

πŸ”— Technology πŸ”— Blogging

Sousveillance ( soo-VAY-lΙ™nss) is the recording of an activity by a participant in the activity, typically by way of small wearable or portable personal technologies. The term "sousveillance", coined by Steve Mann, stems from the contrasting French words sur, meaning "above", and sous, meaning "below", i.e. "surveillance" denotes the "eye-in-the-sky" watching from above, whereas "sousveillance" denotes bringing the camera or other means of observation down to human level, either physically (mounting cameras on people rather than on buildings), or hierarchically (ordinary people doing the watching, rather than higher authorities or architectures doing the watching).

While surveillance and sousveillance both generally refer to visual monitoring, the terms also denote other forms of monitoring such as audio surveillance or sousveillance. In the audio sense (e.g. recording of phone conversations), sousveillance is referred to as "one party consent".

Undersight (inverse oversight) is sousveillance at high-level, e.g. "citizen undersight" being reciprocal to a congressional oversight committee or the like.

Inverse surveillance is a subset of sousveillance with a particular emphasis on the "watchful vigilance from underneath" and a form of surveillance inquiry or legal protection involving the recording, monitoring, study, or analysis of surveillance systems, proponents of surveillance, and possibly also recordings of authority figures and their actions. Inverse surveillance is typically an activity undertaken by those who are generally the subject of surveillance, and may thus be thought of as a form of an ethnography or ethnomethodology study (i.e. an analysis of the surveilled from the perspective of a participant in a society under surveillance).

Sousveillance typically involves community-based recording from first person perspectives, without necessarily involving any specific political agenda, whereas inverse-surveillance is a form of sousveillance that is typically directed at, or used to collect data to analyze or study, surveillance or its proponents (e.g., the actions of police or protestors at a protest rally).

Sousveillance is not necessarily countersurveillance; i.e. sousveillance can be used to "counter" the forces of surveillance, or it can also be used together with surveillance to create a more complete "veillance" ("Surveillance is a half-truth without sousveillance"). The question of "Who watches the watchers" is dealt with more properly under the topic of metaveillance (the veillance of veillance) than sousveillance.

Discussed on