Random Articles (Page 24)
Have a deep view into what people are curious about.
π Stalin Note
The Stalin Note, also known as the March Note, was a document delivered to the representatives of the Western Allies (the United Kingdom, France, and the United States) from the Soviet Union in Germany on 10 March 1952. Soviet general secretary and premier Joseph Stalin put forth a proposal for a German reunification and neutralisation with no conditions on economic policies and with guarantees for "the rights of man and basic freedoms, including freedom of speech, press, religious persuasion, political conviction, and assembly" and free activity of democratic parties and organizations.
James Warburg, a member of the United States Senate Committee on Foreign Relations, testified before the committee on 28 March 1952 and observed that the Soviet proposal might be a bluff, but he thought that it seemed "that our government is afraid to call the bluff for the fear that it may not be a bluff at all" and might lead to "a free, neutral, and demilitarised Germany", which might be "subverted into Soviet orbit". That led to an exchange of notes between the West and the Soviet Union, which eventually ended after the West had insistence for a unified Germany to be free to join the European Defence Community and to be rearmed, demands that Stalin rejected.
West German Chancellor Konrad Adenauer and the Western Allies characterised Stalin's move as an aggressive action that attempted to stall the reintegration of West Germany. However, there was later a debate on whether a chance for reunification had been missed. Six years after the exchange, two West German ministers, Thomas Dehler and Gustav Heinemann, blamed Adenauer for not having explored the chance of reunification.
π Post-quantum cryptography: just in case
Post-quantum cryptography (sometimes referred to as quantum-proof, quantum-safe or quantum-resistant) refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a quantum computer. As of 2019, this is not true for the most popular public-key algorithms, which can be efficiently broken by a sufficiently strong quantum computer. The problem with currently popular algorithms is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic-curve discrete logarithm problem. All of these problems can be easily solved on a sufficiently powerful quantum computer running Shor's algorithm. Even though current, publicly known, experimental quantum computers lack processing power to break any real cryptographic algorithm, many cryptographers are designing new algorithms to prepare for a time when quantum computing becomes a threat. This work has gained greater attention from academics and industry through the PQCrypto conference series since 2006 and more recently by several workshops on Quantum Safe Cryptography hosted by the European Telecommunications Standards Institute (ETSI) and the Institute for Quantum Computing.
In contrast to the threat quantum computing poses to current public-key algorithms, most current symmetric cryptographic algorithms and hash functions are considered to be relatively secure against attacks by quantum computers. While the quantum Grover's algorithm does speed up attacks against symmetric ciphers, doubling the key size can effectively block these attacks. Thus post-quantum symmetric cryptography does not need to differ significantly from current symmetric cryptography. See section on symmetric-key approach below.
Discussed on
- "Post-quantum cryptography" | 2018-11-12 | 20 Upvotes 14 Comments
- "Post-quantum cryptography" | 2015-08-22 | 50 Upvotes 21 Comments
π Ryan Model 147
The Ryan Model 147 Lightning Bug is a jet-powered drone, or unmanned aerial vehicle, produced and developed by Ryan Aeronautical from the earlier Ryan Firebee target drone series.
Beginning in 1962, the Model 147 was introduced as a reconnaissance RPV (Remotely Piloted Vehicle, nomenclature of that era) for a United States Air Force project named Fire Fly. Over the next decade β assisted with secret funding from the recently formed National Reconnaissance Office along with support of the Strategic Air Command and Ryan Aeronautical's own resources β the basic Model 147 design would be developed into a diverse series of variants configured for a wide array of mission-specific roles, with multiple new systems, sensors and payloads used, modified and improved upon during the operational deployment of these drones in Southeast Asia. Missions performed by the Model 147 series RPVs included high- and low-altitude photographic and electronic aerial reconnaissance, surveillance, decoy, electronic warfare, signals intelligence, and psychological warfare.
The Ryan drones were designed without landing gear for simplicity and to save weight. Like its Firebee predecessor, the Model 147 could either be air-launched from a larger carrier aircraft or launched from the ground using a solid rocket booster; at completion of its mission the drone deployed its own recovery parachute which could be snatched in mid-air by a recovery helicopter (in a combat environment it was naturally not desired to recover the drone on, from or near enemy territory and ground or water impact could also cause damage to or loss of the drone or its payload).
At the end of the Vietnam War in 1975 the U.S. military's available funding and need for combat drones severely declined, even as Teledyne Ryan introduced further advanced developments of the Model 147 series such as the BGM-34 strike and defense suppression RPVs. Costs of maintaining the Lightning Bugs at full readiness could no longer be justified. Only by the 1990s did substantial interest, organization and funding again emerge from the U.S. Air Force and intelligence agencies to develop, acquire and widely deploy combat UAVs.
Discussed on
- "Ryan Model 147" | 2015-04-29 | 19 Upvotes 2 Comments
π Ignaz Semmelweis
Ignaz Philipp Semmelweis (German: [ΛΙͺΙ‘naΛts ΛzΙmlΜ©vaΙͺs]; Hungarian: Semmelweis IgnΓ‘c FΓΌlΓΆp [ΛsΙmmΙlvΙjs ΛiΙ‘naΛts ΛfylΓΈp]; 1 July 1818 β 13 August 1865) was a Hungarian physician and scientist of German descent who was an early pioneer of antiseptic procedures and was described as the "saviour of mothers". Postpartum infection, also known as puerperal fever or childbed fever, consists of any bacterial infection of the reproductive tract following birth and in the 19th century was common and often fatal. Semmelweis discovered that the incidence of infection could be drastically reduced by requiring healthcare workers in obstetrical clinics to disinfect their hands. In 1847, he proposed hand washing with chlorinated lime solutions at Vienna General Hospital's First Obstetrical Clinic, where doctors' wards had thrice the mortality of midwives' wards. The maternal mortality rate dropped from 18% to less than 2%, and he published a book of his findings, Etiology, Concept and Prophylaxis of Childbed Fever, in 1861.
Despite his research, Semmelweis's observations conflicted with the established scientific and medical opinions of the time and his ideas were rejected by the medical community. He could offer no theoretical explanation for his findings of reduced mortality due to hand-washing, and some doctors were offended at the suggestion that they should wash their hands and mocked him for it. In 1865, the increasingly outspoken Semmelweis allegedly suffered a nervous breakdown and was committed to an asylum by his colleagues. In the asylum, he was beaten by the guards. He died 14 days later from a gangrenous wound on his right hand that may have been caused by the beating.
His findings earned widespread acceptance only years after his death, when Louis Pasteur confirmed the germ theory, giving Semmelweis' observations a theoretical explanation, and Joseph Lister, acting on Pasteur's research, practised and operated using hygienic methods with great success.
Discussed on
- "Ignaz Semmelweis" | 2025-07-13 | 10 Upvotes 1 Comments
π Unexplained red flashes on the moon's surface
A transient lunar phenomenon (TLP) or lunar transient phenomenon (LTP) is a short-lived light, color, or change in appearance on the surface of the Moon. The term was created by Patrick Moore in his co-authorship of NASA Technical Report R-277 Chronological Catalog of Reported Lunar Events, published in 1968.
Claims of short-lived lunar phenomena go back at least 1,000 years, with some having been observed independently by multiple witnesses or reputable scientists. Nevertheless, the majority of transient lunar phenomenon reports are irreproducible and do not possess adequate control experiments that could be used to distinguish among alternative hypotheses to explain their origins.
Most lunar scientists will acknowledge transient events such as outgassing and impact cratering do occur over geologic time. The controversy lies in the frequency of such events.
Discussed on
- "Unexplained red flashes on the moon's surface" | 2009-04-13 | 17 Upvotes 2 Comments
π Area code 710
Area code 710 is a special area code, reserved to the federal government of the United States in 1983. As of December 2006, it had only one working number, 710-NCS-GETS (710-627-4387), which requires a special access code to use.
See Government Emergency Telecommunications Service for more information on this service.
Discussed on
- "Area code 710" | 2017-06-10 | 356 Upvotes 81 Comments
π FloydβHoare logic
Hoare logic (also known as FloydβHoare logic or Hoare rules) is a formal system with a set of logical rules for reasoning rigorously about the correctness of computer programs. It was proposed in 1969 by the British computer scientist and logician Tony Hoare, and subsequently refined by Hoare and other researchers. The original ideas were seeded by the work of Robert W. Floyd, who had published a similar system for flowcharts.
Discussed on
- "FloydβHoare logic" | 2015-07-13 | 36 Upvotes 14 Comments
π Topological quantum computer
A topological quantum computer is a theoretical quantum computer that employs two-dimensional quasiparticles called anyons, whose world lines pass around one another to form braids in a three-dimensional spacetime (i.e., one temporal plus two spatial dimensions). These braids form the logic gates that make up the computer. The advantage of a quantum computer based on quantum braids over using trapped quantum particles is that the former is much more stable. Small, cumulative perturbations can cause quantum states to decohere and introduce errors in the computation, but such small perturbations do not change the braids' topological properties. This is like the effort required to cut a string and reattach the ends to form a different braid, as opposed to a ball (representing an ordinary quantum particle in four-dimensional spacetime) bumping into a wall. Alexei Kitaev proposed topological quantum computation in 1997. While the elements of a topological quantum computer originate in a purely mathematical realm, experiments in fractional quantum Hall systems indicate these elements may be created in the real world using semiconductors made of gallium arsenide at a temperature of near absolute zero and subjected to strong magnetic fields.
π False Banana Tree
Ensete ventricosum, commonly known as enset or ensete, Ethiopian banana, Abyssinian banana, and false banana, is an herbaceous species of flowering plant in the banana family Musaceae. The domesticated form of the plant is only cultivated in Ethiopia, where it provides the staple food for approximately 20 million people. The name Ensete ventricosum was first published in 1948 in the Kew Bulletin, 1947, p.Β 101. Its synonyms include Musa arnoldiana De Wild., Musa ventricosa Welw. and Musa ensete J.F.Gmel. In its wild form, it is native to the eastern edge of the Great African Plateau, extending northwards from South Africa through Mozambique, Zimbabwe, Malawi, Kenya, Uganda and Tanzania to Ethiopia, and west to the Congo, being found in high rainfall forests on mountains, and along forested ravines and streams.
Discussed on
- "False Banana Tree" | 2019-06-26 | 16 Upvotes 1 Comments
π Blind faith (computer programming)
Discussed on
- "Blind faith (computer programming)" | 2013-07-21 | 24 Upvotes 16 Comments