Random Articles (Page 24)

Have a deep view into what people are curious about.

πŸ”— Stalin Note

πŸ”— Soviet Union πŸ”— Russia πŸ”— History πŸ”— Germany πŸ”— Politics πŸ”— Cold War πŸ”— European history

The Stalin Note, also known as the March Note, was a document delivered to the representatives of the Western Allies (the United Kingdom, France, and the United States) from the Soviet Union in Germany on 10 March 1952. Soviet general secretary and premier Joseph Stalin put forth a proposal for a German reunification and neutralisation with no conditions on economic policies and with guarantees for "the rights of man and basic freedoms, including freedom of speech, press, religious persuasion, political conviction, and assembly" and free activity of democratic parties and organizations.

James Warburg, a member of the United States Senate Committee on Foreign Relations, testified before the committee on 28 March 1952 and observed that the Soviet proposal might be a bluff, but he thought that it seemed "that our government is afraid to call the bluff for the fear that it may not be a bluff at all" and might lead to "a free, neutral, and demilitarised Germany", which might be "subverted into Soviet orbit". That led to an exchange of notes between the West and the Soviet Union, which eventually ended after the West had insistence for a unified Germany to be free to join the European Defence Community and to be rearmed, demands that Stalin rejected.

West German Chancellor Konrad Adenauer and the Western Allies characterised Stalin's move as an aggressive action that attempted to stall the reintegration of West Germany. However, there was later a debate on whether a chance for reunification had been missed. Six years after the exchange, two West German ministers, Thomas Dehler and Gustav Heinemann, blamed Adenauer for not having explored the chance of reunification.

πŸ”— Post-quantum cryptography: just in case

πŸ”— Computing πŸ”— Computing/Software πŸ”— Computing/Computer science πŸ”— Cryptography πŸ”— Cryptography/Computer science πŸ”— Computing/Computer Security

Post-quantum cryptography (sometimes referred to as quantum-proof, quantum-safe or quantum-resistant) refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a quantum computer. As of 2019, this is not true for the most popular public-key algorithms, which can be efficiently broken by a sufficiently strong quantum computer. The problem with currently popular algorithms is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic-curve discrete logarithm problem. All of these problems can be easily solved on a sufficiently powerful quantum computer running Shor's algorithm. Even though current, publicly known, experimental quantum computers lack processing power to break any real cryptographic algorithm, many cryptographers are designing new algorithms to prepare for a time when quantum computing becomes a threat. This work has gained greater attention from academics and industry through the PQCrypto conference series since 2006 and more recently by several workshops on Quantum Safe Cryptography hosted by the European Telecommunications Standards Institute (ETSI) and the Institute for Quantum Computing.

In contrast to the threat quantum computing poses to current public-key algorithms, most current symmetric cryptographic algorithms and hash functions are considered to be relatively secure against attacks by quantum computers. While the quantum Grover's algorithm does speed up attacks against symmetric ciphers, doubling the key size can effectively block these attacks. Thus post-quantum symmetric cryptography does not need to differ significantly from current symmetric cryptography. See section on symmetric-key approach below.

Discussed on

πŸ”— Ryan Model 147

πŸ”— Aviation πŸ”— Military history πŸ”— Military history/Military aviation πŸ”— Military history/North American military history πŸ”— Military history/United States military history πŸ”— Military history/Military science, technology, and theory πŸ”— Aviation/aircraft πŸ”— Military history/Cold War

The Ryan Model 147 Lightning Bug is a jet-powered drone, or unmanned aerial vehicle, produced and developed by Ryan Aeronautical from the earlier Ryan Firebee target drone series.

Beginning in 1962, the Model 147 was introduced as a reconnaissance RPV (Remotely Piloted Vehicle, nomenclature of that era) for a United States Air Force project named Fire Fly. Over the next decade β€” assisted with secret funding from the recently formed National Reconnaissance Office along with support of the Strategic Air Command and Ryan Aeronautical's own resources β€” the basic Model 147 design would be developed into a diverse series of variants configured for a wide array of mission-specific roles, with multiple new systems, sensors and payloads used, modified and improved upon during the operational deployment of these drones in Southeast Asia. Missions performed by the Model 147 series RPVs included high- and low-altitude photographic and electronic aerial reconnaissance, surveillance, decoy, electronic warfare, signals intelligence, and psychological warfare.

The Ryan drones were designed without landing gear for simplicity and to save weight. Like its Firebee predecessor, the Model 147 could either be air-launched from a larger carrier aircraft or launched from the ground using a solid rocket booster; at completion of its mission the drone deployed its own recovery parachute which could be snatched in mid-air by a recovery helicopter (in a combat environment it was naturally not desired to recover the drone on, from or near enemy territory and ground or water impact could also cause damage to or loss of the drone or its payload).

At the end of the Vietnam War in 1975 the U.S. military's available funding and need for combat drones severely declined, even as Teledyne Ryan introduced further advanced developments of the Model 147 series such as the BGM-34 strike and defense suppression RPVs. Costs of maintaining the Lightning Bugs at full readiness could no longer be justified. Only by the 1990s did substantial interest, organization and funding again emerge from the U.S. Air Force and intelligence agencies to develop, acquire and widely deploy combat UAVs.

Discussed on

πŸ”— Ignaz Semmelweis

πŸ”— Biography πŸ”— Medicine πŸ”— Biography/science and academia πŸ”— History of Science πŸ”— Hungary πŸ”— Medicine/Society and Medicine πŸ”— Project-independent assessment

Ignaz Philipp Semmelweis (German: [ˈΙͺΙ‘naːts ˈzΙ›mlΜ©vaΙͺs]; Hungarian: Semmelweis IgnΓ‘c FΓΌlΓΆp [ˈsΙ›mmΙ›lvΙ›js ˈiΙ‘naːts ˈfylΓΈp]; 1 July 1818 – 13 August 1865) was a Hungarian physician and scientist of German descent who was an early pioneer of antiseptic procedures and was described as the "saviour of mothers". Postpartum infection, also known as puerperal fever or childbed fever, consists of any bacterial infection of the reproductive tract following birth and in the 19th century was common and often fatal. Semmelweis discovered that the incidence of infection could be drastically reduced by requiring healthcare workers in obstetrical clinics to disinfect their hands. In 1847, he proposed hand washing with chlorinated lime solutions at Vienna General Hospital's First Obstetrical Clinic, where doctors' wards had thrice the mortality of midwives' wards. The maternal mortality rate dropped from 18% to less than 2%, and he published a book of his findings, Etiology, Concept and Prophylaxis of Childbed Fever, in 1861.

Despite his research, Semmelweis's observations conflicted with the established scientific and medical opinions of the time and his ideas were rejected by the medical community. He could offer no theoretical explanation for his findings of reduced mortality due to hand-washing, and some doctors were offended at the suggestion that they should wash their hands and mocked him for it. In 1865, the increasingly outspoken Semmelweis allegedly suffered a nervous breakdown and was committed to an asylum by his colleagues. In the asylum, he was beaten by the guards. He died 14 days later from a gangrenous wound on his right hand that may have been caused by the beating.

His findings earned widespread acceptance only years after his death, when Louis Pasteur confirmed the germ theory, giving Semmelweis' observations a theoretical explanation, and Joseph Lister, acting on Pasteur's research, practised and operated using hygienic methods with great success.

Discussed on

πŸ”— Unexplained red flashes on the moon's surface

πŸ”— Astronomy πŸ”— Moon πŸ”— Solar System

A transient lunar phenomenon (TLP) or lunar transient phenomenon (LTP) is a short-lived light, color, or change in appearance on the surface of the Moon. The term was created by Patrick Moore in his co-authorship of NASA Technical Report R-277 Chronological Catalog of Reported Lunar Events, published in 1968.

Claims of short-lived lunar phenomena go back at least 1,000 years, with some having been observed independently by multiple witnesses or reputable scientists. Nevertheless, the majority of transient lunar phenomenon reports are irreproducible and do not possess adequate control experiments that could be used to distinguish among alternative hypotheses to explain their origins.

Most lunar scientists will acknowledge transient events such as outgassing and impact cratering do occur over geologic time. The controversy lies in the frequency of such events.

Discussed on

πŸ”— Area code 710

πŸ”— United States πŸ”— Telecommunications

Area code 710 is a special area code, reserved to the federal government of the United States in 1983. As of December 2006, it had only one working number, 710-NCS-GETS (710-627-4387), which requires a special access code to use.

See Government Emergency Telecommunications Service for more information on this service.

Discussed on

πŸ”— Floyd–Hoare logic

πŸ”— Computer science

Hoare logic (also known as Floyd–Hoare logic or Hoare rules) is a formal system with a set of logical rules for reasoning rigorously about the correctness of computer programs. It was proposed in 1969 by the British computer scientist and logician Tony Hoare, and subsequently refined by Hoare and other researchers. The original ideas were seeded by the work of Robert W. Floyd, who had published a similar system for flowcharts.

Discussed on

πŸ”— Topological quantum computer

πŸ”— Mathematics πŸ”— Physics

A topological quantum computer is a theoretical quantum computer that employs two-dimensional quasiparticles called anyons, whose world lines pass around one another to form braids in a three-dimensional spacetime (i.e., one temporal plus two spatial dimensions). These braids form the logic gates that make up the computer. The advantage of a quantum computer based on quantum braids over using trapped quantum particles is that the former is much more stable. Small, cumulative perturbations can cause quantum states to decohere and introduce errors in the computation, but such small perturbations do not change the braids' topological properties. This is like the effort required to cut a string and reattach the ends to form a different braid, as opposed to a ball (representing an ordinary quantum particle in four-dimensional spacetime) bumping into a wall. Alexei Kitaev proposed topological quantum computation in 1997. While the elements of a topological quantum computer originate in a purely mathematical realm, experiments in fractional quantum Hall systems indicate these elements may be created in the real world using semiconductors made of gallium arsenide at a temperature of near absolute zero and subjected to strong magnetic fields.

πŸ”— False Banana Tree

πŸ”— Food and drink πŸ”— Plants

Ensete ventricosum, commonly known as enset or ensete, Ethiopian banana, Abyssinian banana, and false banana, is an herbaceous species of flowering plant in the banana family Musaceae. The domesticated form of the plant is only cultivated in Ethiopia, where it provides the staple food for approximately 20 million people. The name Ensete ventricosum was first published in 1948 in the Kew Bulletin, 1947, p.Β 101. Its synonyms include Musa arnoldiana De Wild., Musa ventricosa Welw. and Musa ensete J.F.Gmel. In its wild form, it is native to the eastern edge of the Great African Plateau, extending northwards from South Africa through Mozambique, Zimbabwe, Malawi, Kenya, Uganda and Tanzania to Ethiopia, and west to the Congo, being found in high rainfall forests on mountains, and along forested ravines and streams.

Discussed on