Random Articles (Page 3)

Have a deep view into what people are curious about.

πŸ”— Abram Petrovich Gannibal

πŸ”— Biography πŸ”— Russia πŸ”— Russia/technology and engineering in Russia πŸ”— Russia/demographics and ethnography of Russia πŸ”— African diaspora πŸ”— Russia/Russian, Soviet, and CIS military history πŸ”— Russia/history of Russia

Abram Petrovich Gannibal, also Hannibal or Ganibal, or Abram Hannibal or Abram Petrov (Russian: Абра́м ΠŸΠ΅Ρ‚Ρ€ΠΎΜΠ²ΠΈΡ‡ Ганниба́л; c. 1696 – 14 May 1781), was a Russian military engineer, major-general, and nobleman of African origin. Kidnapped as a child, Gannibal was taken to Russia and presented as a gift to Peter the Great, where he was freed, adopted and raised in the Emperor's court household as his godson.

Gannibal eventually rose to become a prominent member of the imperial court in the reign of Peter's daughter Elizabeth. He had 11 children, most of whom became members of the Russian nobility; he was a great-grandfather of the author and poet Alexander Pushkin.

Discussed on

πŸ”— Apple Pippin (1996)

πŸ”— Apple Inc. πŸ”— Video games πŸ”— Computing

The Apple Pippin is a defunct open multimedia technology platform, designed by Apple Computer, and marketed as PiPP!N. According to Apple, Pippin was directed at the home market as "an integral part of the consumer audiovisual, stereo, and television environment."

Pippin is based on the Apple Macintosh platform, including the classic Mac OS architecture. Apple built a demonstration device based on Pippin called "Pippin Power Player," and used it to demonstrate the platform at trade shows and to the media, in order to attract potential software developers and hardware manufacturers. Apple licensed the Pippin technology to third-party companies. Bandai Company Ltd. developed the ATMARK and @WORLD models, and focused them on the gaming and entertainment business in Japan and the United States. Katz Media developed the KMP 2000, and focused it on vertical markets throughout Europe and Canada.

Discussed on

πŸ”— Literature-Based Discovery

πŸ”— Science

Literature-based discovery is a form of knowledge extraction and automated hypothesis generation that uses papers and other academic publications (the "literature") to find new relationships between existing knowledge (the "discovery"). The technique was pioneered by Don R. Swanson in the 1980s and has since seen widespread use.

Literature-based discovery does not generate new knowledge through laboratory experiments, as is customary for empirical sciences. Instead it seeks to connect existing knowledge from empirical results by bringing to light relationships that are implicated and "neglected". It is marked by empiricism and rationalism in concert or consilience.

Discussed on

πŸ”— Legendre's constant

πŸ”— Mathematics

Legendre's constant is a mathematical constant occurring in a formula conjectured by Adrien-Marie Legendre to capture the asymptotic behavior of the prime-counting function Ο€ ( x ) {\displaystyle \pi (x)} . Its value is now known to be exactlyΒ 1.

Examination of available numerical evidence for known primes led Legendre to suspect that Ο€ ( x ) {\displaystyle \pi (x)} satisfies an approximate formula.

Legendre conjectured in 1808 that

Ο€ ( x ) = x ln ⁑ ( x ) βˆ’ B ( x ) {\displaystyle \pi (x)={\frac {x}{\ln(x)-B(x)}}}

where lim x β†’ ∞ B ( x ) = 1.08366 {\displaystyle \lim _{x\to \infty }B(x)=1.08366} ....OEIS:Β A228211

Or similarly,

lim n β†’ ∞ ( ln ⁑ ( n ) βˆ’ n Ο€ ( n ) ) = B {\displaystyle \lim _{n\to \infty }\left(\ln(n)-{n \over \pi (n)}\right)=B}

where B is Legendre's constant. He guessed B to be about 1.08366, but regardless of its exact value, the existence of B implies the prime number theorem.

Pafnuty Chebyshev proved in 1849 that if the limit B exists, it must be equal to 1. An easier proof was given by Pintz in 1980.

It is an immediate consequence of the prime number theorem, under the precise form with an explicit estimate of the error term

Ο€ ( x ) = L i ( x ) + O ( x e βˆ’ a ln ⁑ x ) asΒ  x β†’ ∞ {\displaystyle \pi (x)={\rm {Li}}(x)+O\left(xe^{-a{\sqrt {\ln x}}}\right)\quad {\text{as }}x\to \infty }

(for some positive constant a, where O(…) is the big O notation), as proved in 1899 by Charles de La VallΓ©e Poussin, that B indeed is equal to 1. (The prime number theorem had been proved in 1896, independently by Jacques Hadamard and La VallΓ©e Poussin, but without any estimate of the involved error term).

Being evaluated to such a simple number has made the term Legendre's constant mostly only of historical value, with it often (technically incorrectly) being used to refer to Legendre's first guess 1.08366... instead.

Pierre Dusart proved in 2010

x ln ⁑ x βˆ’ 1 < Ο€ ( x ) {\displaystyle {\frac {x}{\ln x-1}}<\pi (x)} for x β‰₯ 5393 {\displaystyle x\geq 5393} , and
Ο€ ( x ) < x ln ⁑ x βˆ’ 1.1 {\displaystyle \pi (x)<{\frac {x}{\ln x-1.1}}} for x β‰₯ 60184 {\displaystyle x\geq 60184} . This is of the same form as
Ο€ ( x ) = x ln ⁑ ( x ) βˆ’ B ( x ) {\displaystyle \pi (x)={\frac {x}{\ln(x)-B(x)}}} with 1 < B ( x ) < 1.1 {\displaystyle 1<B(x)<1.1} .

Discussed on

πŸ”— Apollo 15 postage stamp incident

πŸ”— United States πŸ”— Spaceflight πŸ”— Philately πŸ”— Guild of Copy Editors

The Apollo 15 postal covers incident, a 1972 NASA scandal, involved the astronauts of Apollo 15, who carried about 400 unauthorized postal covers into space and to the Moon's surface on the Lunar Module Falcon. Some of the envelopes were sold at high prices by West German stamp dealer Hermann Sieger, and are known as "Sieger covers". The crew of Apollo 15, David Scott, Alfred Worden and James Irwin, agreed to take payments for carrying the covers; though they returned the money, they were reprimanded by NASA. Amid much press coverage of the incident, the astronauts were called before a closed session of a Senate committee and never flew in space again.

The three astronauts and an acquaintance, Horst Eiermann, had agreed to have the covers made and taken into space. Each astronaut was to receive about $7,000. Scott arranged to have the covers postmarked on the morning of the Apollo 15 launch on July 26, 1971. They were packaged for space and brought to him as he prepared for liftoff. Due to an error, they were not included on the list of the personal items he was taking into space. The covers spent July 30 to August 2 on the Moon inside Falcon. On August 7, the date of splashdown, the covers were postmarked again on the recovery carrier USSΒ Okinawa. One hundred were sent to Eiermann (and passed on to Sieger); the remaining covers were divided among the astronauts.

Worden had agreed to carry 144 additional covers, largely for an acquaintance, F. Herrick Herrick; these had been approved for travel to space. Apollo 15 carried a total of approximately 641 covers. In late 1971, when NASA learned that the Herrick covers were being sold, the astronauts' supervisor, Deke Slayton, warned Worden to avoid further commercialization of what he had been allowed to take into space. After Slayton heard of the Sieger arrangement, he removed the three as backup crew members for Apollo 17, though the astronauts had by then refused compensation from Sieger and Eiermann. The Sieger matter became generally known in the newspapers in June 1972. There was widespread coverage; some said astronauts should not be allowed to reap personal profits from NASA missions.

By 1977, all three former astronauts had left NASA. In 1983, Worden sued, and the covers were returned to them. One of the postal covers given to Sieger sold for over $50,000 in 2014.

Discussed on

πŸ”— Wireworld

πŸ”— Computing πŸ”— Mathematics

Wireworld is a cellular automaton first proposed by Brian Silverman in 1987, as part of his program Phantom Fish Tank. It subsequently became more widely known as a result of an article in the "Computer Recreations" column of Scientific American. Wireworld is particularly suited to simulating transistors, and Wireworld is Turing-complete.

Discussed on

πŸ”— Cold Boot Attack

πŸ”— Computer Security πŸ”— Computer Security/Computing πŸ”— Cryptography πŸ”— Cryptography/Computer science

In computer security, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer's random access memory by performing a hard reset of the target machine. Typically, cold boot attacks are used to retrieve encryption keys from a running operating system for malicious or criminal investigative reasons. The attack relies on the data remanence property of DRAM and SRAM to retrieve memory contents that remain readable in the seconds to minutes after power has been removed.

An attacker with physical access to a running computer typically executes a cold boot attack by cold-booting the machine and booting a lightweight operating system from a removable disk to dump the contents of pre-boot physical memory to a file. An attacker is then free to analyze the data dumped from memory to find sensitive data, such as the keys, using various forms of key finding attacks. Since cold boot attacks target random access memory, full disk encryption schemes, even with a trusted platform module installed are ineffective against this kind of attack. This is because the problem is fundamentally a hardware (insecure memory) and not a software issue. However, malicious access can be prevented by limiting physical access and using modern techniques to avoid storing sensitive data in random access memory.

Discussed on

πŸ”— East German Balloon Escape

The East German balloon escape occurred on 16 September 1979, when eight people in two families escaped the Eastern Bloc country of East Germany by crossing the border to the Western Bloc's West Germany in a homemade hot air balloon at around 2:00Β a.m. The escape plot was carried out over one and a half years, including a previously unsuccessful attempt, three different balloons, and various modifications. One failed crossing alerted the government to the plot, but the police were not able to identify the suspects before their flight to the West.

Discussed on

πŸ”— Berkson's Paradox

πŸ”— Statistics

Berkson's paradox also known as Berkson's bias or Berkson's fallacy is a result in conditional probability and statistics which is often found to be counterintuitive, and hence a veridical paradox. It is a complicating factor arising in statistical tests of proportions. Specifically, it arises when there is an ascertainment bias inherent in a study design. The effect is related to the explaining away phenomenon in Bayesian networks, and conditioning on a collider in graphical models.

It is often described in the fields of medical statistics or biostatistics, as in the original description of the problem by Joseph Berkson.

Discussed on

πŸ”— Assassination of Kim Jong-Nam

πŸ”— Crime πŸ”— Death πŸ”— Korea πŸ”— Korea/North Korea πŸ”— Malaysia

On 13 February 2017, the eldest son of Kim Jong-il and half-brother of Kim Jong-un, Kim Jong-nam, was attacked with the nerve agent VX at Kuala Lumpur International Airport in Malaysia. He had been exiled from North Korea in 2003 and had been living abroad.

Following his visit to the resort island Langkawi, Kim Jong-nam had arrived at terminal 2 sometime before 9:00 a.m. to take a 10:50 a.m. AirAsia flight to Macau. At approximately 9:00 a.m., two women attacked Kim Jong-nam with the VX nerve agent. He died about 15 to 20 minutes later.

The women were identified as Siti Aisyah, an Indonesian and ĐoΓ n Thα»‹ HΖ°Ζ‘ng, a Vietnamese. Both were charged with the murder of Kim Jong-nam. The charges were dropped, although HΖ°Ζ‘ng pled guilty to "voluntarily causing hurt by dangerous weapons or means" and received a sentence of three years and four months. Four North Korean suspects left the airport shortly after the assassination and reached Pyongyang without being arrested. Other North Koreans were arrested but were released without charge.

It is widely believed that Kim Jong-nam was murdered on the orders of Kim Jong-un.