Random Articles (Page 265)

Have a deep view into what people are curious about.

πŸ”— Carthago delenda est

πŸ”— Military history πŸ”— Classical Greece and Rome πŸ”— Politics πŸ”— Military history/Classical warfare

"Ceterum censeo Carthaginem esse delendam", or "Ceterum autem censeo Carthaginem esse delendam" (English: "Furthermore, I consider that Carthage must be destroyed"), often abbreviated to "Carthago delenda est" (English: "Carthage must be destroyed"), is a Latin oratorical phrase pronounced by Cato the Censor, a politician of the Roman Republic. The phrase originates from debates held in the Roman Senate prior to the Third Punic War (149–146 BC) between Rome and Carthage, where Cato is said to have used it as the conclusion to all his speeches in order to push for the war.

Discussed on

πŸ”— Project Sanguine: a 6000 mile long antenna to communicate with submarines @ 76Hz

πŸ”— Military history πŸ”— Military history/Military science, technology, and theory πŸ”— Military history/Maritime warfare

Project Sanguine was a U.S. Navy project, proposed in 1968 for communication with submerged submarines using extremely low frequency (ELF) radio waves. The originally proposed system, hardened to survive a nuclear attack, would have required a giant antenna covering two fifths of the state of Wisconsin. Because of protests and potential environmental impact, the proposed system was never implemented. A smaller, less hardened system called Project ELF consisting of two linked ELF transmitters located at Clam Lake, Wisconsin and Republic, Michigan was built beginning in 1982 and operated from 1989 until 2004. The system transmitted at a frequency of 76Β Hz. At ELF frequencies the bandwidth of the transmission is very small, so the system could only send short coded text messages at a very low data rate. These signals were used to summon specific vessels to the surface to receive longer operational orders by ordinary radio or satellite communication.

πŸ”— The Clipper Chip

πŸ”— United States/U.S. Government πŸ”— United States πŸ”— Mass surveillance πŸ”— Cryptography πŸ”— Cryptography/Computer science

The Clipper chip was a chipset that was developed and promoted by the United States National Security Agency (NSA) as an encryption device that secured β€œvoice and data messages" with a built-in backdoor. It was intended to be adopted by telecommunications companies for voice transmission. It can encipher and decipher messages. It was part of a Clinton Administration program to β€œallow Federal, State, and local law enforcement officials the ability to decode intercepted voice and data transmissions." β€œEach clipper chip ha[d] a unique serial number and a secret β€˜unit key,’ programmed into the chip when manufactured." This way, each device was meant to be different from the next.

It was announced in 1993 and by 1996 was entirely defunct.

Discussed on

πŸ”— Aamber Pegasus

πŸ”— Computing πŸ”— New Zealand

The Aamber Pegasus is a home computer first produced in New Zealand in 1981 by Technosys Research Labs.

The hardware was designed by Stewart J Holmes. The software was designed by Paul Gillingwater, Nigel Keam and Paul Carter.

It is thought that Apple Computers introduction of the Apple II computer into the New Zealand market, and its subsequent heavy educational discounting was the final nail in the coffin for Technosys and the Aamber Pegasus computer. Total production numbers are unknown, but it is thought "around one hundred" were sold.

Discussed on

πŸ”— Motion Camouflage

πŸ”— Evolutionary biology πŸ”— Ecology πŸ”— Project-independent assessment

Motion camouflage is camouflage which provides a degree of concealment for a moving object, given that motion makes objects easy to detect however well their coloration matches their background or breaks up their outlines.

The principal form of motion camouflage, and the type generally meant by the term, involves an attacker's mimicking the optic flow of the background as seen by its target. This enables the attacker to approach the target while appearing to remain stationary from the target's perspective, unlike in classical pursuit (where the attacker moves straight towards the target at all times, and often appears to the target to move sideways). The attacker chooses its flight path so as to remain on the line between the target and some landmark point. The target therefore does not see the attacker move from the landmark point. The only visible evidence that the attacker is moving is its looming, the change in size as the attacker approaches.

Camouflage is sometimes facilitated by motion, as in the leafy sea dragon and some stick insects. These animals complement their passive camouflage by swaying like plants in the wind or ocean currents, delaying their recognition by predators.

First discovered in hoverflies in 1995, motion camouflage by minimizing optic flow has been demonstrated in another insect order, dragonflies, as well as in two groups of vertebrates, falcons and echolocating bats. Since bats hunt at night, they cannot use camouflage. Instead they use an efficient homing strategy called constant absolute target direction. It has been suggested that anti-aircraft missiles could benefit from similar techniques.

πŸ”— Railway Time

πŸ”— Trains πŸ”— Trains/UK Railways πŸ”— Trains/Rail transport in Germany

Railway time was the standardised time arrangement first applied by the Great Western Railway in England in November 1840, the first recorded occasion when different local mean times were synchronised and a single standard time applied. The key goals behind introducing railway time were to overcome the confusion caused by having non-uniform local times in each town and station stop along the expanding railway network and to reduce the incidence of accidents and near misses, which were becoming more frequent as the number of train journeys increased.

Railway time was progressively taken up by all railway companies in Great Britain over the following seven years. The schedules by which trains were organised and the time station clocks displayed were brought in line with the local mean time for London or "London Time", the time set at Greenwich by the Royal Observatory, which was already widely known as Greenwich Mean Time (GMT).

The development of railway networks in North America in the 1850s, India in around 1860, and in Europe, prompted the introduction of standard time influenced by geography, industrial development, and political governance.

The railway companies sometimes faced concerted resistance from local people who refused to adjust their public clocks to bring them into line with London Time. As a consequence, two different times would be displayed in the town and in use, with the station clocks and the times published in train timetables differing by several minutes from that on other clocks. Despite this early reluctance, railway time rapidly became adopted as the default time across the whole of Great Britain, although it took until 1880 for the government to legislate on the establishment of a single standard time and a single time zone for the country.

Some contemporary commentators referred to the influence of railway time on encouraging greater precision in daily tasks and the demand for punctuality.

Discussed on

πŸ”— Unidirectional Network

A unidirectional network (also referred to as a unidirectional gateway or data diode) is a network appliance or device that allows data to travel in only one direction. Data diodes can be found most commonly in high security environments, such as defense, where they serve as connections between two or more networks of differing security classifications. Given the rise of industrial IoT and digitization, this technology can now be found at the industrial control level for such facilities as nuclear power plants, power generation and safety critical systems like railway networks.

After years of development the use of data diodes have increased creating two variations:

  • Data diode: Network appliance or device allowing raw data to travel only in one direction, used in guaranteeing information security or protection of critical digital systems, such as industrial control systems, from inbound cyber attacks.
  • Unidirectional gateway: Combination of hardware and software running in proxy computers in the source and destination networks. The hardware, a data diode, enforces physical unidirectionality and the software replicates databases and emulates protocol servers to handle bi-directional communication. The unidirectional gateway is capable of transferring multiple protocols and data types simultaneously. It contains a broader range of cybersecurity features like, secure boot, certificate management, data integrity, forward error correction (FEC), secure communication via TLS, among others. A unique characteristic is that data is transferred deterministically (to predetermined locations) with a protocol "break" that allows the data to be transferred through the data diode.

Data diodes are commonly found in high security military and government environments, and are now becoming widely spread in sectors like oil & gas, water/wastewater, airplanes (between flight control units and in-flight entertainment systems), manufacturing and cloud connectivity for industrial IoT. New regulations have increased demand and with increased capacity, major technology vendors have lowered the cost of the core technology.

Discussed on

πŸ”— Mammonart. An Essay on Economic Interpretation (1925)

πŸ”— Novels πŸ”— Books

Mammonart. An Essay on Economic Interpretation is a book of literary criticism from a Socialist point of view of the traditional "great authors" of Western and American literature (along with a few painters and composers). Mammonart was written by the prolific journalist, novelist and Socialist activist Upton Sinclair, and published in 1925.

Discussed on