Random Articles (Page 220)
Have a deep view into what people are curious about.
๐ Men Without Work: America's Invisible Crisis (Book)
Men Without Work: America's Invisible Crisis is a 2016 book by the American political economist Nicholas Eberstadt discussing the phenomenon of American men in their prime leaving the workforce. Statistically, the labor force involvement for men twenty and older fell from 86% to 68% between 1948 and 2015. The book discusses the history, causes, and implications of the phenomenon, as well as possible solutions.
Discussed on
- "Men Without Work: America's Invisible Crisis (Book)" | 2023-01-03 | 85 Upvotes 174 Comments
๐ Policy laundering
Policy laundering is the disguising of the origins of political decisions, laws, or international treaties. The term is based on the similar money laundering.
Discussed on
- "Policy laundering" | 2018-03-15 | 119 Upvotes 65 Comments
๐ Burned house horizon
In the archaeology of Neolithic Europe, the burned house horizon is the geographical extent of the phenomenon of presumably intentionally burned settlements.
This was a widespread and long-lasting tradition in what is now Southeastern and Eastern Europe, lasting from as early as 6500 BCE (the beginning of the Neolithic) to as late as 2000 BCE (the end of the Chalcolithic and the beginning of the Bronze Age). A notable representative of this tradition is the Cucuteni-Trypillian culture, which was centered on the burned-house horizon both geographically and temporally.
There is still a discussion in the study of Neolithic and Eneolithic Europe whether the majority of burned houses were intentionally set alight or not.
Although there is still debate about the why house burning was practiced, the evidence seems to indicate that it was highly unlikely to have been accidental. There is also debate about why this would have been done deliberately and regularly, since these burnings could destroy the entire settlement. However, in recent years, the consensus has begun to gel around the "domicide" theory supported by Tringham, Stevanovic and others.
Cucuteni-Trypillian settlements were completely burned every 75โ80 years, leaving behind successive layers consisting mostly of large amounts of rubble from the collapsed wattle-and-daub walls. This rubble was mostly ceramic material that had been created as the raw clay used in the daub of the walls became vitrified from the intense heat that would have turned it a bright orange color during the conflagration that destroyed the buildings, much the same way that raw clay objects are turned into ceramic products during the firing process in a kiln. Moreover, the sheer amount of fired-clay rubble found within every house of a settlement indicates that a fire of enormous intensity would have raged through the entire community to have created the volume of material found.
Discussed on
- "Burned House Horizon" | 2021-03-06 | 331 Upvotes 146 Comments
- "Burned house horizon" | 2016-12-07 | 180 Upvotes 62 Comments
๐ Serial-position effect
Serial-position effect is the tendency of a person to recall the first and last items in a series best, and the middle items worst. The term was coined by Hermann Ebbinghaus through studies he performed on himself, and refers to the finding that recall accuracy varies as a function of an item's position within a study list. When asked to recall a list of items in any order (free recall), people tend to begin recall with the end of the list, recalling those items best (the recency effect). Among earlier list items, the first few items are recalled more frequently than the middle items (the primacy effect).
One suggested reason for the primacy effect is that the initial items presented are most effectively stored in long-term memory because of the greater amount of processing devoted to them. (The first list item can be rehearsed by itself; the second must be rehearsed along with the first, the third along with the first and second, and so on.) The primacy effect is reduced when items are presented quickly and is enhanced when presented slowly (factors that reduce and enhance processing of each item and thus permanent storage). Longer presentation lists have been found to reduce the primacy effect.
One theorised reason for the recency effect is that these items are still present in working memory when recall is solicited. Items that benefit from neither (the middle items) are recalled most poorly. An additional explanation for the recency effect is related to temporal context: if tested immediately after rehearsal, the current temporal context can serve as a retrieval cue, which would predict more recent items to have a higher likelihood of recall than items that were studied in a different temporal context (earlier in the list). The recency effect is reduced when an interfering task is given. Intervening tasks involve working memory, as the distractor activity, if exceeding 15 to 30 seconds in duration, can cancel out the recency effect. Additionally, if recall comes immediately after the test, the recency effect is consistent regardless of the length of the studied list, or presentation rate.
Amnesiacs with poor ability to form permanent long-term memories do not show a primacy effect, but do show a recency effect if recall comes immediately after study. People with Alzheimer's disease exhibit a reduced primacy effect but do not produce a recency effect in recall.
Discussed on
- "Serial-position effect" | 2021-11-11 | 33 Upvotes 9 Comments
๐ Miller Columns
Miller columns (also known as cascading lists) are a browsing/visualization technique that can be applied to tree structures. The columns allow multiple levels of the hierarchy to be open at once, and provide a visual representation of the current location. It is closely related to techniques used earlier in the Smalltalk browser, but was independently invented by Mark S. Miller in 1980 at Yale University. The technique was then used at Project Xanadu, Datapoint, and NeXT.
While at Datapoint, Miller generalized the technique to browse directed graphs with labeled nodes and arcs. In all cases, the technique is appropriate for structures with high degree (large fanout). For low-degree structures, outline editors or graph viewers are more effective.
Discussed on
- "Miller Columns" | 2018-10-02 | 177 Upvotes 90 Comments
๐ Eltanin impact
The Eltanin impact is thought to be an asteroid impact in the eastern part of the South Pacific Ocean during the Pliocene-Pleistocene boundary around 2.51โยฑโ0.07โ million years ago. The location was at the edge of the Bellingshausen Sea 1,500ย km (950ย mi) southwest of Chile. The asteroid was estimated to be about one to fourย km (0.6 to 2.5ย mi) in diameter and the impact would have left a crater approximately 35ย km (22ย mi) across.
Discussed on
- "Eltanin impact" | 2019-07-27 | 25 Upvotes 3 Comments
๐ Max Headroom broadcast signal intrusion
A broadcast signal hijacking of two television stations in Chicago, Illinois was carried out on November 22, 1987, in an act of video piracy. The stations' broadcasts were interrupted by a video of an unknown person wearing a Max Headroom mask and costume, accompanied by distorted audio.
The first incident took place for 25 seconds during the sports segment of WGN-TV's 9:00 p.m. news broadcast; the second occurred around two hours later, for about 90 seconds during PBS affiliate WTTW's broadcast of Doctor Who.
The hacker made references to Max Headroom's endorsement of Coca-Cola, the TV series Clutch Cargo, WGN anchor Chuck Swirsky; and "all the greatest world newspaper nerds", a reference to WGN's call letters, which stand for "World's Greatest Newspaper". A corrugated panel swiveled back and forth mimicking Max Headroom's geometric background effect. The video ended with a pair of exposed buttocks being spanked with a flyswatter before normal programming resumed. The culprits were never caught or identified.
Discussed on
- "Max Headroom Signal Hijacking" | 2023-11-23 | 133 Upvotes 36 Comments
- "Max Headroom Signal Hijacking" | 2023-07-28 | 14 Upvotes 2 Comments
- "Max Headroom Signal Hijacking" | 2021-08-11 | 39 Upvotes 2 Comments
- "Max Headroom broadcast signal intrusion" | 2019-11-23 | 211 Upvotes 54 Comments
- "The 1987 Max Headroom Pirating Incident" | 2010-03-21 | 15 Upvotes 5 Comments
๐ Von Neumann-Landauer limit
Landauer's principle is a physical principle pertaining to the lower theoretical limit of energy consumption of computation. It holds that "any logically irreversible manipulation of information, such as the erasure of a bit or the merging of two computation paths, must be accompanied by a corresponding entropy increase in non-information-bearing degrees of freedom of the information-processing apparatus or its environment".
Another way of phrasing Landauer's principle is that if an observer loses information about a physical system, the observer loses the ability to extract work from that system.
A so-called logically-reversible computation, in which no information is erased, may in principle be carried out without releasing any heat. This has led to considerable interest in the study of reversible computing. Indeed, without reversible computing, increases in the number of computations-per-joule-of-energy-dissipated must come to a halt by about 2050: because the limit implied by Landauer's principle will be reached by then, according to Koomey's law.
At 20ย ยฐC (room temperature, or 293.15ย K), the Landauer limit represents an energy of approximately 0.0175ย eV, or 2.805ย zJ. Theoretically, roomโtemperature computer memory operating at the Landauer limit could be changed at a rate of one billion bits per second (1Gbps) with energy being converted to heat in the memory media at the rate of only 2.805 trillionths of a watt (that is, at a rate of only 2.805 pJ/s). Modern computers use millions of times as much energy per second.
Discussed on
- "Landauer's Principle" | 2023-05-27 | 80 Upvotes 32 Comments
- "Von Neumann-Landauer limit" | 2017-09-30 | 183 Upvotes 36 Comments
๐ Bacon's Cipher
Bacon's cipher or the Baconian cipher is a method of steganographic message encoding devised by Francis Bacon in 1605. A message is concealed in the presentation of text, rather than its content. Bacon cipher is categorized as both a substitution cipher (in plain code) and a concealment cipher (using the two typefaces).
Discussed on
- "Bacon's Cipher" | 2023-07-11 | 80 Upvotes 9 Comments
๐ Greek Language Question
The Greek language question (Greek: ฯฮฟ ฮณฮปฯฯฯฮนฮบฯ ฮถฮฎฯฮทฮผฮฑ, to glossikรณ zรญtima) was a dispute about whether the vernacular of the Greek people (Demotic Greek) or a cultivated literary language based on Ancient Greek (Katharevousa) should be the prevailing language of the people and government of Greece. It was a highly controversial topic in the 19th and 20th centuries, and was finally resolved in 1976 when Demotic was made the official language. The language phenomenon in question, which also occurs elsewhere in the world, is called diglossia.
Discussed on
- "Greek Language Question" | 2025-03-30 | 26 Upvotes 1 Comments