Random Articles (Page 2)

Have a deep view into what people are curious about.

πŸ”— Walking Truck

πŸ”— Biography

Discussed on

πŸ”— London Pneumatic Despatch Company

πŸ”— London πŸ”— Philately πŸ”— Trains πŸ”— Trains/UK Railways πŸ”— London Transport

The London Pneumatic Despatch Company (also known as the London Pneumatic Dispatch Company) was formed on 30 June 1859, to design, build and operate an underground railway system for the carrying of mail, parcels and light freight between locations in London. The system was used between 1863 and 1874.

Discussed on

πŸ”— Aarne–Thompson–Uther Index

πŸ”— Literature πŸ”— Folklore

The Aarne–Thompson–Uther Index (ATU Index) is a catalogue of folktale types used in folklore studies. The ATU Index is the product of a series of revisions and expansions by an international group of scholars: Originally composed in German by Finnish folklorist Antti Aarne (1910); the index was translated into English, revised, and expanded by American folklorist Stith Thompson (1928, 1961); and later further revised and expanded by German folklorist Hans-JΓΆrg Uther (2004). The ATU Index, along with Thompson's Motif-Index of Folk-Literature (1932) (with which it is used in tandem) is an essential tool for folklorists.

Discussed on

πŸ”— Cold Boot Attack

πŸ”— Computer Security πŸ”— Computer Security/Computing πŸ”— Cryptography πŸ”— Cryptography/Computer science

In computer security, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer's random access memory by performing a hard reset of the target machine. Typically, cold boot attacks are used to retrieve encryption keys from a running operating system for malicious or criminal investigative reasons. The attack relies on the data remanence property of DRAM and SRAM to retrieve memory contents that remain readable in the seconds to minutes after power has been removed.

An attacker with physical access to a running computer typically executes a cold boot attack by cold-booting the machine and booting a lightweight operating system from a removable disk to dump the contents of pre-boot physical memory to a file. An attacker is then free to analyze the data dumped from memory to find sensitive data, such as the keys, using various forms of key finding attacks. Since cold boot attacks target random access memory, full disk encryption schemes, even with a trusted platform module installed are ineffective against this kind of attack. This is because the problem is fundamentally a hardware (insecure memory) and not a software issue. However, malicious access can be prevented by limiting physical access and using modern techniques to avoid storing sensitive data in random access memory.

Discussed on

πŸ”— Turboencabulator

πŸ”— Engineering

The turboencabulator or turbo-encabulator (and its later incarnations, the retroencabulator or retro-encabulator and Micro Encabulator) is a fictional machine whose alleged existence became an in-joke and subject of professional humor among engineers. The explanation of the supposed product makes extensive use of technobabble.

The gag was popular for many years. The following quote is from the original Students' Quarterly Journal article written by J. H. Quick in 1944. The citation in the later Time article misspells several of the technical terms. General Electric, Chrysler and Rockwell Automation use many of the same words.

The original machine had a base plate of prefabulated amulite, surmounted by a malleable logarithmic casing in such a way that the two main spurving bearings were in a direct line with the panametric fan. The latter consisted simply of six hydrocoptic marzlevanes, so fitted to the ambifacient lunar waneshaft that side fumbling was effectively prevented. The main winding was of the normal lotus-o-deltoid type placed in panendermic semi-boloid slots in the stator, every seventh conductor being connected by a nonreversible tremmie pipe to the differential girdlespring on the "up" end of the grammeters.

Discussed on

πŸ”— You don't know ice. Neither do I, apparently

πŸ”— Physics πŸ”— Meteorology πŸ”— Chemistry πŸ”— Geology πŸ”— Limnology and Oceanography πŸ”— Materials

Ice is water frozen into a solid state. Depending on the presence of impurities such as particles of soil or bubbles of air, it can appear transparent or a more or less opaque bluish-white color.

In the Solar System, ice is abundant and occurs naturally from as close to the Sun as Mercury to as far away as the Oort cloud objects. Beyond the Solar System, it occurs as interstellar ice. It is abundant on Earth's surface – particularly in the polar regions and above the snow line – and, as a common form of precipitation and deposition, plays a key role in Earth's water cycle and climate. It falls as snowflakes and hail or occurs as frost, icicles or ice spikes.

Ice molecules can exhibit eighteen or more different phases (packing geometries) that depend on temperature and pressure. When water is cooled rapidly (quenching), up to three different types of amorphous ice can form depending on the history of its pressure and temperature. When cooled slowly correlated proton tunneling occurs below βˆ’253.15Β Β°C (20Β K, βˆ’423.67Β Β°F) giving rise to macroscopic quantum phenomena. Virtually all the ice on Earth's surface and in its atmosphere is of a hexagonal crystalline structure denoted as ice Ih (spoken as "ice one h") with minute traces of cubic ice denoted as ice Ic. The most common phase transition to ice Ih occurs when liquid water is cooled below 0Β Β°C (273.15Β K, 32Β Β°F) at standard atmospheric pressure. It may also be deposited directly by water vapor, as happens in the formation of frost. The transition from ice to water is melting and from ice directly to water vapor is sublimation.

Ice is used in a variety of ways, including cooling, winter sports and ice sculpture.

Discussed on

πŸ”— Rapatronic Camera

πŸ”— Military history πŸ”— Military history/Military science, technology, and theory πŸ”— Military history/Weaponry πŸ”— Engineering πŸ”— Photography πŸ”— Photography/History of photography

The rapatronic camera (a portmanteau of rapid action electronic) is a high-speed camera capable of recording a still image with an exposure time as brief as 10 nanoseconds.

The camera was developed by Harold Edgerton in the 1940s and was first used to photograph the rapidly changing matter in nuclear explosions within milliseconds of detonation, using exposures of several microseconds. To overcome the speed limitation of a conventional camera's mechanical shutter, the rapatronic camera uses two polarizing filters and a Faraday cell (or in some variants a Kerr cell). The two filters are mounted with their polarization angles at 90Β° to each other, to block all incoming light. The Faraday cell sits between the filters and changes the polarization plane of light passing through it depending on the level of magnetic field applied, acting as a shutter when it is energized at the right time for a very short amount of time, allowing the film to be properly exposed.

In magneto-optical shutters, the active material of the Faraday cell (e.g. dense flint glass, which reacts well to a strong magnetic field) is located inside an electromagnet coil, formed by a few loops of thick wire. The coil is powered from a pulse forming network by discharging a high-voltage capacitor (e.g. 2 microfarads at 1000 volts), into the coil via a trigatron or a thyratron switch. In electro-optical shutters, the active material is a liquid, typically nitrobenzene, located in a cell between two electrodes. A brief impulse of high voltage is applied to rotate the polarization of the passing light.

For a film-like sequence of high-speed photographs, as used in the photography of nuclear and thermonuclear tests, arrays of up to 12 cameras were deployed, with each camera carefully timed to record sequentially. Each camera was capable of recording only one exposure on a single sheet of film. Therefore, in order to create time-lapse sequences, banks of four to ten cameras were set up to take photos in rapid succession. The average exposure time used was three microseconds.

Discussed on

πŸ”— Banana equivalent dose

πŸ”— Medicine πŸ”— Physics πŸ”— Health and fitness

Banana equivalent dose (BED) is an informal measurement of ionizing radiation exposure, intended as a general educational example to compare a dose of radioactivity to the dose one is exposed to by eating one average-sized banana. Bananas contain naturally occurring radioactive isotopes, particularly potassium-40 (40K), one of several naturally-occurring isotopes of potassium. One BED is often correlated to 10βˆ’7 sievert (0.1 ΞΌSv); however, in practice, this dose is not cumulative, as the principal radioactive component is excreted to maintain metabolic equilibrium. The BED is only meant to inform the public about the existence of very low levels of natural radioactivity within a natural food and is not a formally adopted dose measurement.

Discussed on

πŸ”— iSmell (2001)

πŸ”— Computing πŸ”— Computing/Computer hardware

The iSmell Personal Scent Synthesizer developed by DigiScents Inc. is a small device that can be connected to a computer through a Universal serial bus (USB) port and powered using any ordinary electrical outlet. The appearance of the device is similar to that of a shark’s fin, with many holes lining the β€œfin” to release the various scents. Using a cartridge similar to a printer’s, it can synthesize and even create new smells by combining certain combinations of other scents. These newly created odors can be used to closely replicate common natural and manmade odors. The cartridges used also need to be swapped every so often once the scents inside are used up. Once partnered with websites and interactive media, the scents can be activated either automatically once a website is opened or manually. However, the product is no longer on the market and never generated substantial sales. Digiscent had plans for the iSmell to have several versions but did not progress past the prototype stage. The company did not last long and filed for bankruptcy a short time after.

In 2006, the iSmell was named one of the "25 Worst Tech Products of All Time" by PC World Magazine, which commented that "[f]ew products literally stink, but this one did--or at least it would have, had it progressed beyond the prototype stage."

Discussed on

πŸ”— Superman 64

πŸ”— Video games πŸ”— Comics πŸ”— Comics/Superman

Superman: The New Superman Adventures, commonly referred to as Superman 64, is an action-adventure game developed and published by Titus Interactive for the Nintendo 64 and based on the television series Superman: The Animated Series. Released in North America on May 31, 1999, and in Europe on July 23, 1999, it is the first 3D Superman game.

In the game, Lex Luthor has trapped Jimmy Olsen, Lois Lane, and Professor Hamilton in a virtual reality version of Metropolis that he created with the help of Brainiac, leaving it up to Superman to save them and break apart the virtual world. The game shifts between outdoor levels where the player flies through rings while saving civilians, and indoor levels where the player looks for access cards, activates computers, and fights villains such as Brainiac, Mala, Metallo, Darkseid, and Parasite.

The development of Superman began in 1997 and was largely hampered by constraints between Titus and the game's licensors, Warner Bros. and DC Comics, leaving little room for polishing the gameplay. BlueSky Software attempted to redo the game for the PlayStation, but this version was ultimately canceled, as Titus's license with Warner Bros. had expired by the time it was completed. With three E3 presentations and positive press coverage before its release, Superman 64 was released to strong sales and positive consumer reception; however, critical reviews were extremely negative, claiming it to be one of the worst video games ever made and panning its unresponsive controls, technical flaws, repetitive gameplay, overuse of distance fog, and poor graphics.

Discussed on