Random Articles (Page 2)

Have a deep view into what people are curious about.

πŸ”— Personal Knowledge Management

πŸ”— Computing

Personal knowledge management (PKM) is a process of collecting information that a person uses to gather, classify, store, search, retrieve and share knowledge in their daily activities (Grundspenkis 2007) and the way in which these processes support work activities (Wright 2005). It is a response to the idea that knowledge workers need to be responsible for their own growth and learning (Smedley 2009). It is a bottom-up approach to knowledge management (KM) (Pollard 2008).

πŸ”— Kibbutz

πŸ”— Urban studies and planning πŸ”— Cooperatives πŸ”— Israel

A kibbutz (Hebrew: Χ§Φ΄Χ‘ΦΌΧ•ΦΌΧ₯β€Ž / Χ§Χ™Χ‘Χ•Χ₯β€Ž, lit. "gathering, clustering"; plural: kibbutzim Χ§Φ΄Χ‘ΦΌΧ•ΦΌΧ¦Φ΄Χ™Χβ€Ž / Χ§Χ™Χ‘Χ•Χ¦Χ™Χβ€Ž) is a collective community in Israel that was traditionally based on agriculture. The first kibbutz, established in 1909, was Degania. Today, farming has been partly supplanted by other economic branches, including industrial plants and high-tech enterprises. Kibbutzim began as utopian communities, a combination of socialism and Zionism. In recent decades, some kibbutzim have been privatized and changes have been made in the communal lifestyle. A member of a kibbutz is called a kibbutznik (Hebrew: Χ§Φ΄Χ‘ΦΌΧ•ΦΌΧ¦Φ°Χ Φ΄Χ™Χ§β€Ž / Χ§Χ™Χ‘Χ•Χ¦Χ Χ™Χ§β€Ž; plural kibbutznikim or kibbutzniks).

In 2010, there were 270 kibbutzim in Israel. Their factories and farms account for 9% of Israel's industrial output, worth US$8 billion, and 40% of its agricultural output, worth over $1.7 billion. Some kibbutzim had also developed substantial high-tech and military industries. For example, in 2010, Kibbutz Sasa, containing some 200 members, generated $850 million in annual revenue from its military-plastics industry.

Currently the kibbutzim are organised in the secular Kibbutz Movement with some 230 kibbutzim, the Religious Kibbutz Movement with 16 kibbutzim and the much smaller religious Poalei Agudat Yisrael with two kibbutzim, all part of the wider communal settlement movement.

Discussed on

πŸ”— The Hacker Crackdown: Law and Disorder on the Electronic Frontier

πŸ”— Books πŸ”— Computer Security πŸ”— Computer Security/Computing

The Hacker Crackdown: Law and Disorder on the Electronic Frontier is a work of nonfiction by Bruce Sterling first published in 1992.

The book discusses watershed events in the hacker subculture in the early 1990s. The most notable topic covered is Operation Sundevil and the events surrounding the 1987–1990 war on the Legion of Doom network: the raid on Steve Jackson Games, the trial of "Knight Lightning" (one of the original journalists of Phrack), and the subsequent formation of the Electronic Frontier Foundation. The book also profiles the likes of "Emmanuel Goldstein" (publisher of 2600: The Hacker Quarterly), the former assistant attorney general of Arizona Gail Thackeray, FLETC instructor Carlton Fitzpatrick, Mitch Kapor, and John Perry Barlow.

In 1994, Sterling released the book for the Internet with a new afterword.

Discussed on

πŸ”— Dry Water

πŸ”— Chemistry

Dry water , an unusual form of "powdered liquid", is a water–air emulsion in which tiny water droplets, each the size of a grain of sand, are surrounded by a sandy silica coating. Dry water actually consists of 95% liquid water, but the silica coating prevents the water droplets from combining and turning back into a bulk liquid. The result is a white powder that looks very similar to table salt. It is also more commonly known among researchers as empty water.

Discussed on

πŸ”— Texas Instruments LPC Speech Chips

πŸ”— Computing

The Texas Instruments LPC Speech Chips are a series of speech synthesizer digital signal processor integrated circuits created by Texas Instruments beginning in 1978. They continued to be developed and marketed for many years, though the speech department moved around several times within TI until finally dissolving in late 2001. The rights to the speech-specific subset of the MSP line, the last remaining line of TI speech products as of 2001, were sold to Sensory, Inc. in October 2001.

Discussed on

πŸ”— Bernoulli number

πŸ”— Mathematics

In mathematics, the Bernoulli numbers Bn are a sequence of rational numbers which occur frequently in number theory. The Bernoulli numbers appear in (and can be defined by) the Taylor series expansions of the tangent and hyperbolic tangent functions, in Faulhaber's formula for the sum of m-th powers of the first n positive integers, in the Euler–Maclaurin formula, and in expressions for certain values of the Riemann zeta function.

The values of the first 20 Bernoulli numbers are given in the adjacent table. Two conventions are used in the literature, denoted here by B n βˆ’ {\displaystyle B_{n}^{-{}}} and B n + {\displaystyle B_{n}^{+{}}} ; they differ only for n = 1, where B 1 βˆ’ = βˆ’ 1 / 2 {\displaystyle B_{1}^{-{}}=-1/2} and B 1 + = + 1 / 2 {\displaystyle B_{1}^{+{}}=+1/2} . For every odd n > 1, Bn = 0. For every even n > 0, Bn is negative if n is divisible by 4 and positive otherwise. The Bernoulli numbers are special values of the Bernoulli polynomials B n ( x ) {\displaystyle B_{n}(x)} , with B n βˆ’ = B n ( 0 ) {\displaystyle B_{n}^{-{}}=B_{n}(0)} and B n + = B n ( 1 ) {\displaystyle B_{n}^{+}=B_{n}(1)} (Weisstein 2016).

The Bernoulli numbers were discovered around the same time by the Swiss mathematician Jacob Bernoulli, after whom they are named, and independently by Japanese mathematician Seki Kōwa. Seki's discovery was posthumously published in 1712 (Selin 1997, p. 891; Smith & Mikami 1914, p. 108) in his work Katsuyo Sampo; Bernoulli's, also posthumously, in his Ars Conjectandi of 1713. Ada Lovelace's note G on the Analytical Engine from 1842 describes an algorithm for generating Bernoulli numbers with Babbage's machine (Menabrea 1842, Note G). As a result, the Bernoulli numbers have the distinction of being the subject of the first published complex computer program.

πŸ”— K-anonymity

πŸ”— Internet πŸ”— Cryptography πŸ”— Cryptography/Computer science

k-anonymity is a property possessed by certain anonymized data. The concept of k-anonymity was first introduced by Latanya Sweeney and Pierangela Samarati in a paper published in 1998 as an attempt to solve the problem: "Given person-specific field-structured data, produce a release of the data with scientific guarantees that the individuals who are the subjects of the data cannot be re-identified while the data remain practically useful." A release of data is said to have the k-anonymity property if the information for each person contained in the release cannot be distinguished from at least k βˆ’ 1 {\displaystyle k-1} individuals whose information also appear in the release.

K-anonymity received widespread media coverage in 2018 when British computer scientist Junade Ali used the property alongside cryptographic hashing to create a communication protocol to anonymously verify if a password was leaked without disclosing the searched password. This protocol was implemented as a public API in Troy Hunt's Have I Been Pwned? service and is consumed by multiple services including password managers and browser extensions. This approach was later replicated by Google's Password Checkup feature.

Discussed on

πŸ”— Ask HN: using only static magnetism - impossible to stably levitate against gravity?

πŸ”— Mathematics πŸ”— Physics

Earnshaw's theorem states that a collection of point charges cannot be maintained in a stable stationary equilibrium configuration solely by the electrostatic interaction of the charges. This was first proven by British mathematician Samuel Earnshaw in 1842. It is usually referenced to magnetic fields, but was first applied to electrostatic fields.

Earnshaw's theorem applies to classical inverse-square law forces (electric and gravitational) and also to the magnetic forces of permanent magnets, if the magnets are hard (the magnets do not vary in strength with external fields). Earnshaw's theorem forbids magnetic levitation in many common situations.

If the materials are not hard, Braunbeck's extension shows that materials with relative magnetic permeability greater than one (paramagnetism) are further destabilising, but materials with a permeability less than one (diamagnetic materials) permit stable configurations.

Discussed on

πŸ”— One address is home to 285,000 US businesses, including Apple and Google

πŸ”— United States πŸ”— Companies πŸ”— Law πŸ”— United States/Delaware

The Corporation Trust Center, 1209 North Orange Street, is a single-story building located in the Brandywine neighborhood of Wilmington, Delaware, USA, operated by CT Corporation, a subsidiary of Dutch multinational services firm Wolters Kluwer. This is CT Corporation's location in the state of Delaware for providing "registered agent services." In 2012 it was the registered agent address of at least 285,000 separate businesses.

Many companies are incorporated in Delaware for its business-friendly General Corporation Law and it was estimated in 2012 that 9.5 billion dollars of potential taxes had not been levied over the past decade, due to an arrangement known as the "Delaware loophole." Companies formed in Delaware are required to have an address in the state at which process may be served. Therefore, Delaware entities with no physical office in the state must have a registered agent with a Delaware address. Notable companies represented by CT at this location include Google, American Airlines, Apple Inc., General Motors, The Coca-Cola Company, Walmart, Yum! Brands, Verizon, and about 430 of Deutsche Bank's more than 2,000 subsidiary companies and special purpose companies. Both Former President of the United States Donald Trump, and his opponent in the 2016 United States presidential election, Hillary Clinton, have registered companies at the center.

πŸ”— Jeff Bezos phone hacking incident

πŸ”— United States πŸ”— Saudi Arabia

In January 2020, the FTI Consulting company claimed that in May 2018 with "medium to high confidence" the phone of Jeff Bezos had been hacked by a file sent from the WhatsApp account of the crown prince of Saudi Arabia, Mohammed bin Salman. The Saudi Arabian embassy to the United States has denied the allegations. Billionaire Jeff Bezos, the owner of The Washington Post newspaper and founder of the company Amazon, engaged FTI Consulting in February 2019 after the National Enquirer in January 2019 reported details of Bezos's affair. FTI Consulting did not link the National Enquirer to the hack. In December 2021, the FBI stated they could not find proof to substantiate claims that Saudi Arabia hacked Jeff Bezos phone, and has considered an investigation into those allegations a low priority.

Discussed on