Random Articles (Page 243)
Have a deep view into what people are curious about.
π Word2vec
Word2vec is a technique for natural language processing (NLP) published in 2013. The word2vec algorithm uses a neural network model to learn word associations from a large corpus of text. Once trained, such a model can detect synonymous words or suggest additional words for a partial sentence. As the name implies, word2vec represents each distinct word with a particular list of numbers called a vector. The vectors are chosen carefully such that they capture the semantic and syntactic qualities of words; as such, a simple mathematical function (cosine similarity) can indicate the level of semantic similarity between the words represented by those vectors.
Discussed on
- "Word2vec" | 2023-10-09 | 14 Upvotes 1 Comments
π Utah Data Center
The Utah Data Center (UDC), also known as the Intelligence Community Comprehensive National Cybersecurity Initiative Data Center, is a data storage facility for the United States Intelligence Community that is designed to store data estimated to be on the order of exabytes or larger. Its purpose is to support the Comprehensive National Cybersecurity Initiative (CNCI), though its precise mission is classified. The National Security Agency (NSA) leads operations at the facility as the executive agent for the Director of National Intelligence. It is located at Camp Williams near Bluffdale, Utah, between Utah Lake and Great Salt Lake and was completed in May 2019 at a cost of $1.5 billion.
The Utah Data Center, code-named Bumblehive, is the first Intelligence Community Comprehensive National Cyber-security Initiative (IC CNCI) data center designed to support the US intelligence community. The "massive data repository" is designed to cope with the large increase in digital data that has accompanied the rise of the global internet.
Discussed on
- "Utah Data Center" | 2020-05-29 | 40 Upvotes 19 Comments
- "Utah Data Center" | 2013-06-07 | 161 Upvotes 33 Comments
π COMEFROM
In computer programming, COMEFROM (or COME FROM) is an obscure control flow structure used in some programming languages, originally as a joke. COMEFROM
is roughly the opposite of GOTO
in that it can take the execution state from any arbitrary point in code to a COMEFROM
statement.
The point in code where the state transfer happens is usually given as a parameter to COMEFROM
. Whether the transfer happens before or after the instruction at the specified transfer point depends on the language used. Depending on the language used, multiple COMEFROM
s referencing the same departure point may be invalid, be non-deterministic, be executed in some sort of defined priority, or even induce parallel or otherwise concurrent execution as seen in Threaded Intercal.
A simple example of a "COMEFROM x
" statement is a label x
(which does not need to be physically located anywhere near its corresponding COMEFROM
) that acts as a "trap door". When code execution reaches the label, control gets passed to the statement following the COMEFROM
. This may also be conditional, passing control only if a condition is satisfied, analogous to a GOTO within an IF statement. The primary difference from GOTO is that GOTO only depends on the local structure of the code, while COMEFROM depends on the global structure β a GOTO transfers control when it reaches a line with a GOTO statement, while COMEFROM requires scanning the entire program or scope to see if any COMEFROM statements are in scope for the line, and then verifying if a condition is hit. The effect of this is primarily to make debugging (and understanding the control flow of the program) extremely difficult, since there is no indication near the line or label in question that control will mysteriously jump to another point of the program β one must study the entire program to see if any COMEFROM statements reference that line or label.
Debugger hooks can be used to implement a COMEFROM statement, as in the humorous Python goto module; see below. This also can be implemented with the gcc feature "asm goto" as used by the Linux kernel configuration option CONFIG_JUMP_LABEL. A no-op has its location stored, to be replaced by a jump to an executable fragment that at its end returns to the instruction after the no-op.
Discussed on
- "COMEFROM" | 2019-10-19 | 82 Upvotes 24 Comments
- "COMEFROM" | 2011-11-17 | 41 Upvotes 20 Comments
π Secure Remote Password protocol
The Secure Remote Password protocol (SRP) is an augmented password-authenticated key agreement (PAKE) protocol, specifically designed to work around existing patents.
Like all PAKE protocols, an eavesdropper or man in the middle cannot obtain enough information to be able to brute force guess a password without further interactions with the parties for each guess. Furthermore, being an augmented PAKE protocol, the server does not store password-equivalent data. This means that an attacker who steals the server data cannot masquerade as the client unless they first perform a brute force search for the password.
In layman's terms, during SRP (or any other PAKE protocol) authentication, one party (the "client" or "user") demonstrates to another party (the "server") that they know the password, without sending the password itself nor any other information from which the password can be derived. The password never leaves the client and is unknown to the server.
Furthermore, the server also needs to know about the password (but not the password itself) in order to instigate the secure connection. This means that the server also authenticates itself to the client, without reliance on the user parsing complex URLs. This prevents Phishing.
Discussed on
- "Secure Remote Password protocol" | 2017-04-11 | 17 Upvotes 19 Comments
π Dusty Hill of ZZ Top Dead
Joseph Michael "Dusty" Hill (May 19, 1949 β July 28, 2021) was an American musician, singer, and songwriter, best known as the bassist and secondary lead vocalist of the American rock group ZZ Top; he also played keyboards with the band. He was inducted into the Rock and Roll Hall of Fame, as a member of ZZ Top, in 2004.
Discussed on
- "Dusty Hill of ZZ Top Dead" | 2021-07-28 | 86 Upvotes 16 Comments
π Desertec
DESERTEC was a large-scale project supported by a foundation of the same name and the consortium Dii (Desertec industrial initiative) created in Germany as a limited liability company (GmbH). The project aimed at creating a global renewable energy plan based on the concept of harnessing sustainable power from sites where renewable sources of energy are more abundant and transferring it through high-voltage direct current transmission to consumption centers. All kinds of renewable energy sources are envisioned, but the sun-rich deserts of the world play a special role.
There are some parallels between Desertec and the Atlantropa project plan in the 1920s. Atlantropa aimed to integrate Europe and Northern Africa and its electricity grid based on a giant hydro power station at Gibraltar. The industry platform Dii is continuing to pave the way for renewables and grid integration on a very pragmatic basis. As of 2019 the project is described as largely "stalled" and "failed".
Discussed on
- "Desertec" | 2015-03-23 | 70 Upvotes 27 Comments
π Napster
Napster was a peer-to-peer (P2P) file sharing application primarily associated with digital audio file distribution. Founded by Shawn Fanning and Sean Parker, the platform originally launched on June 1, 1999. Audio shared on the service was typically encoded in the MP3 format. As the software became popular, the company encountered legal difficulties over copyright infringement. Napster ceased operations in 2001 after losing multiple lawsuits and filed for bankruptcy in June 2002.
The P2P model employed by Napster involved a centralized database that indexed a complete list of all songs being shared from connected clients. While effective, the service could not function without the central database, which was hosted by Napster and eventually forced to shutdown. Following Napster's demise, alternative decentralized methods of P2P file-sharing emerged, including Gnutella, Freenet, FastTrack, and BitTorrent.
Napster's assets were eventually acquired by Roxio, and it re-emerged as an online music store commonly known as Napster 2.0. Best Buy later purchased the service and merged it with its Rhapsody streaming service on December 1, 2011. In 2016, the original branding was restored when Rhapsody was renamed Napster.
Discussed on
- "Napster" | 2024-01-08 | 22 Upvotes 14 Comments
π Hawala
Hawala or hewala (Arabic: ΨΩΩΨ§ΩΨ©β αΈ₯awΔla, meaning transfer or sometimes trust), also known as havaleh in Persian, and xawala or xawilaad in Somali, is a popular and informal value transfer system based not on the movement of cash, or on telegraph or computer network wire transfers between banks, but instead on the performance and honour of a huge network of money brokers (known as hawaladars). While hawaladars are spread throughout the world, they are primarily located in the Middle East, North Africa, the Horn of Africa, and the Indian subcontinent, operating outside of, or parallel to, traditional banking, financial channels, and remittance systems. Hawala follows Islamic traditions but its use is not limited to Muslims.
Discussed on
- "Hawala" | 2013-11-04 | 200 Upvotes 55 Comments
- "Hawala: transferring money without actually moving it" | 2009-04-19 | 58 Upvotes 19 Comments
π List of Proposed Etymologies of OK
This is a list of etymologies proposed for the word OK or okay. The majority can be easily classified as false etymologies, or possibly folk etymologies. H. L. Mencken, in The American Language, lists serious candidates and "a few of the more picturesque or preposterous". Allen Walker Read surveyed a variety of explanations in a 1964 article titled The Folklore of "O. K." Eric Partridge described O.K. as "an evergreen of the correspondence column."
Discussed on
- "List of Proposed Etymologies of OK" | 2021-03-31 | 71 Upvotes 24 Comments
π Horizontal Gene Transfer
Horizontal gene transfer (HGT) or lateral gene transfer (LGT) is the movement of genetic material between unicellular and/or multicellular organisms other than by the ("vertical") transmission of DNA from parent to offspring (reproduction). HGT is an important factor in the evolution of many organisms.
Horizontal gene transfer is the primary mechanism for the spread of antibiotic resistance in bacteria, and plays an important role in the evolution of bacteria that can degrade novel compounds such as human-created pesticides and in the evolution, maintenance, and transmission of virulence. It often involves temperate bacteriophages and plasmids. Genes responsible for antibiotic resistance in one species of bacteria can be transferred to another species of bacteria through various mechanisms of HGT such as transformation, transduction and conjugation, subsequently arming the antibiotic resistant genes' recipient against antibiotics. The rapid spread of antibiotic resistance genes in this manner is becoming medically challenging to deal with. Ecological factors may also play a role in the LGT of antibiotic resistant genes. It is also postulated that HGT promotes the maintenance of a universal life biochemistry and, subsequently, the universality of the genetic code.
Most thinking in genetics has focused upon vertical transfer, but the importance of horizontal gene transfer among single-cell organisms is beginning to be acknowledged.
Gene delivery can be seen as an artificial horizontal gene transfer, and is a form of genetic engineering.
Discussed on
- "Horizontal gene transfer" | 2014-04-29 | 14 Upvotes 1 Comments