Random Articles (Page 3)

Have a deep view into what people are curious about.

๐Ÿ”— Kaktovik Iรฑupiaq Numerals

๐Ÿ”— Numbers ๐Ÿ”— Canada ๐Ÿ”— Arctic ๐Ÿ”— Writing systems ๐Ÿ”— Indigenous peoples of North America ๐Ÿ”— Canada/Canadian Territories ๐Ÿ”— Alaska

Kaktovik Iรฑupiaq numerals are a featural positional numeral system created by Alaskan Iรฑupiat.

Arabic numeral notation, which was designed for a base-10 numeral system, is inadequate for the Inuit languages, which use a base-20 numeral system. Students from Kaktovik, Alaska invented a base-20 numeral notation in 1994 to rectify this issue, and this system spread among the Alaskan Iรฑupiat and has been considered in other countries where Inuit languages are spoken.

The image at right shows the digits 0 to 19. Twenty is written as a one and a zero (I0), forty as a two and a zero (V0), four hundred as a one and two zeros (I00), eight hundred as a two and two zeros (V00), etc.

Discussed on

๐Ÿ”— Sousveillance

๐Ÿ”— Technology ๐Ÿ”— Blogging

Sousveillance ( soo-VAY-lษ™nss) is the recording of an activity by a participant in the activity, typically by way of small wearable or portable personal technologies. The term "sousveillance", coined by Steve Mann, stems from the contrasting French words sur, meaning "above", and sous, meaning "below", i.e. "surveillance" denotes the "eye-in-the-sky" watching from above, whereas "sousveillance" denotes bringing the camera or other means of observation down to human level, either physically (mounting cameras on people rather than on buildings), or hierarchically (ordinary people doing the watching, rather than higher authorities or architectures doing the watching).

While surveillance and sousveillance both generally refer to visual monitoring, the terms also denote other forms of monitoring such as audio surveillance or sousveillance. In the audio sense (e.g. recording of phone conversations), sousveillance is referred to as "one party consent".

Undersight (inverse oversight) is sousveillance at high-level, e.g. "citizen undersight" being reciprocal to a congressional oversight committee or the like.

Inverse surveillance is a subset of sousveillance with a particular emphasis on the "watchful vigilance from underneath" and a form of surveillance inquiry or legal protection involving the recording, monitoring, study, or analysis of surveillance systems, proponents of surveillance, and possibly also recordings of authority figures and their actions. Inverse surveillance is typically an activity undertaken by those who are generally the subject of surveillance, and may thus be thought of as a form of an ethnography or ethnomethodology study (i.e. an analysis of the surveilled from the perspective of a participant in a society under surveillance).

Sousveillance typically involves community-based recording from first person perspectives, without necessarily involving any specific political agenda, whereas inverse-surveillance is a form of sousveillance that is typically directed at, or used to collect data to analyze or study, surveillance or its proponents (e.g., the actions of police or protestors at a protest rally).

Sousveillance is not necessarily countersurveillance; i.e. sousveillance can be used to "counter" the forces of surveillance, or it can also be used together with surveillance to create a more complete "veillance" ("Surveillance is a half-truth without sousveillance"). The question of "Who watches the watchers" is dealt with more properly under the topic of metaveillance (the veillance of veillance) than sousveillance.

Discussed on

๐Ÿ”— Gunung Padang

๐Ÿ”— Skepticism ๐Ÿ”— Indonesia ๐Ÿ”— Archaeology

Gunung Padang is a megalithic site located in Karyamukti, Campaka, Cianjur Regency, West Java, Indonesia, 30 kilometres (19ย mi) southwest of the regency seat or 8 kilometres (5.0ย mi) from Lampegan station. Located at 885 metres (2,904ย ft) above sea level, the site covers a hill, an extinct volcano, in a series of five terraces bordered by retaining walls of stone that are accessed by 370 successive andesite steps rising about 95 metres (312ย ft). It is covered with massive hexagonal stone columns of volcanic origin. The Sundanese people consider the site sacred and believe it was the result of King Siliwangi's attempt to build a palace in one night.

Gunung Padang consists of a series of five artificial terraces, one rectangular and four trapezoidal, that occur, one through five, at successively higher elevations. These terraces also become sucessively smaller with elevation with the first terrace as the lowest and largest and the fifth terrace as the highest and smallest. These terraces lie along the a central, longitudinal NW-SE axis. They are artificial platforms created by lowering high spots and filling in low spots with fill until a flat surface was achieved. The terrace perimeters consist of perimeter retaining walls formed by volcanic polygonal columns stacked horizontally and posted vertically as posts. This terrace complex is accessed by a central stairway with 370 steps, an inclination of 45 degrees, and a length of 110ย m (360ย ft).

Discussed on

๐Ÿ”— 319 Leona

๐Ÿ”— Astronomy ๐Ÿ”— Astronomy/Astronomical objects ๐Ÿ”— Astronomy/Solar System

319 Leona (provisional designation A920 HE), is a dark asteroid and tumbling slow rotator from the outermost regions of the asteroid belt, approximately 70 kilometers in diameter. It was discovered on 8 October 1891, by French astronomer Auguste Charlois at Nice Observatory in southwestern France. Any reference of its name to a person is unknown. On 12 December 2023 Leona will occult Betelgeuse as seen from southern Europe.

Discussed on

๐Ÿ”— Cippi of Melqart

๐Ÿ”— History ๐Ÿ”— Ancient Near East ๐Ÿ”— Malta ๐Ÿ”— Phoenicia

The Cippi of Melqart are a pair of Phoenician marble cippi that were unearthed in Malta under undocumented circumstances and dated to the 2nd century BC. These are votive offerings to the god Melqart, and are inscribed in two languages, Ancient Greek and Phoenician, and in the two corresponding scripts, the Greek and the Phoenician alphabet. They were discovered in the late 17th century, and the identification of their inscription in a letter dated 1694 made them the first Phoenician writing to be identified and published in modern times. Because they present essentially the same text (with some minor differences), the cippi provided the key to the modern understanding of the Phoenician language. In 1758, the French scholar Jean-Jacques Barthรฉlรฉmy relied on their inscription, which used 17 of the 22 letters of the Phoenician alphabet, to decipher the unknown language.

The tradition that the cippi were found in Marsaxlokk was only inferred by their dedication to Heracles, whose temple in Malta had long been identified with the remains at Tas-Silฤก. The Grand Master of the Order of the Knights Hospitaller, Fra Emmanuel de Rohan-Polduc, presented one of the cippi to the Acadรฉmie des Inscriptions et Belles-Lettres in 1782. This cippus is currently in the Louvre Museum in Paris, while the other rests in the National Museum of Archaeology in Valletta, Malta. The inscription is known as KAI 47.

๐Ÿ”— Erewhon

๐Ÿ”— Novels ๐Ÿ”— Novels/19th century ๐Ÿ”— Novels/Science fiction ๐Ÿ”— New Zealand ๐Ÿ”— Sociology

Erewhon: or, Over the Range () is a novel by English writer Samuel Butler, first published anonymously in 1872, set in a fictional country discovered and explored by the protagonist. The book is a satire on Victorian society.

The first few chapters of the novel dealing with the discovery of Erewhon are in fact based on Butler's own experiences in New Zealand, where, as a young man, he worked as a sheep farmer on Mesopotamia Station for about four years (1860โ€“64), and explored parts of the interior of the South Island and wrote about in his A First Year in Canterbury Settlement (1863).

The novel is one of the first to explore ideas of artificial intelligence, as influenced by Darwin's recently published On the Origin of Species (1859) and the machines developed out of the Industrial Revolution (late 18th to early 19th centuries). Specifically, it concerns itself, in the three-chapter "Book of the Machines", with the potentially dangerous ideas of machine consciousness and self-replicating machines.

๐Ÿ”— The Albanian Civil War in 1997 was sparked by pyramid scheme failures

๐Ÿ”— Military history ๐Ÿ”— European history ๐Ÿ”— Military history/Balkan military history ๐Ÿ”— Organized crime ๐Ÿ”— Albania ๐Ÿ”— Military history/European military history ๐Ÿ”— Military history/Post-Cold War

The Albanian Civil War was a period of civil disorder in Albania in 1997, sparked by pyramid scheme failures. The government was toppled and more than 2,000 people were killed. It is considered to be either a rebellion, a civil war, or a rebellion that escalated into a civil war.

By January 1997, Albanian citizens, who had lost a total of $1.2 billion (an average of $400 per person countrywide) took their protest to the streets. Beginning in February, thousands of citizens launched daily protests demanding reimbursement by the government, which they believed was profiting from the schemes. On 1 March, Prime Minister Aleksandรซr Meksi resigned and on 2 March, President Sali Berisha declared a state of emergency. On 11 March the Socialist Party of Albania won a major victory when its leader, Bashkim Fino, was appointed prime minister. However, the transfer of power did not halt the unrest, and protests spread to northern Albania. Although the government quelled revolts in the north, the ability of the government and military to maintain order began to collapse, especially in the southern half of Albania, which fell under the control of rebels and criminal gangs.

All major population centres were engulfed in demonstrations by 13 March and foreign countries began to evacuate their citizens. These evacuations included Operation Libelle, Operation Silver Wake and Operation Kosmas.. The United Nations Security Council, in Resolution 1101, authorised a force of 7,000 troops on 28 March to direct relief efforts and restore order in Albania. The UN feared the unrest would spread beyond Albania's borders and send refugees throughout Europe. On 15 April, Operation Alba was launched and helped restore rule of law in the country. After the unrest, looted weapons were made available to the Kosovo Liberation Army, many making their way to the Kosovo War (1998โ€“99).

Discussed on

๐Ÿ”— Microsoft Works

๐Ÿ”— Apple Inc. ๐Ÿ”— Computing ๐Ÿ”— Microsoft Windows ๐Ÿ”— Microsoft Windows/Computing ๐Ÿ”— Computing/Software ๐Ÿ”— Software ๐Ÿ”— Software/Computing ๐Ÿ”— Microsoft ๐Ÿ”— Microsoft/Microsoft Windows

Microsoft Works is a discontinued productivity software suite developed by Microsoft and sold from 1987 to 2009. Its core functionality included a word processor, a spreadsheet and a database management system. Later versions had a calendar application and a dictionary while older releases included a terminal emulator. Works was available as a standalone program, and as part of a namesake home productivity suite. Because of its low cost ($40 retail, or as low as $2 OEM), companies frequently pre-installed Works on their low-cost machines. Works was smaller, less expensive, and had fewer features than Microsoft Office and other major office suites available at the time.

Mainstream support for the final standalone and suite release ended on October 9, 2012 and January 8, 2013, respectively.

Discussed on

๐Ÿ”— The "DeWitt Clause"

๐Ÿ”— Biography ๐Ÿ”— Biography/science and academia

David J. DeWitt is a computer scientist specializing in database management system research at the Massachusetts Institute of Technology. Prior to moving to MIT, DeWitt was the John P. Morgridge Professor (Emeritus) of Computer Sciences at the University of Wisconsinโ€“Madison. He was also a Technical Fellow at Microsoft, leading the Microsoft Jim Gray Systems Lab at Madison, Wisconsin. Professor DeWitt received a B.A. degree from Colgate University in 1970, and a Ph.D. from the University of Michigan in 1976. He then joined the University of Wisconsin-Madison and started the Wisconsin Database Group, which he led for more than 30 years.

Professor DeWitt is known for his research in the areas of parallel databases, benchmarking, object-oriented databases, and XML databases. He is an elected member of the National Academy of Engineering (1998), and a Fellow of the Association for Computing Machinery.

He received the ACM SIGMOD Innovations Award (now renamed SIGMOD Edgar F. Codd Innovations Award) in 1995 for his contributions to the database systems field. In 2009, ACM recognized the seminal contributions of his Gamma parallel database system project with the ACM Software System Award. Also in 2009, he received the IEEE Emanuel R. Piore Award for his contributions to the database systems field.

Discussed on

๐Ÿ”— Unionization in the Tech Sector

๐Ÿ”— Human rights ๐Ÿ”— Technology ๐Ÿ”— Socialism ๐Ÿ”— Organizations ๐Ÿ”— Organized Labour

A tech union is a trade union for tech workers typically employed in high tech or information and communications technology sectors. Due to the evolving nature of technology and work, different government agencies have conflicting definitions for who is a tech worker. Most definitions include computer scientists, people working in IT, telecommunications, media and video gaming. Broader definitions include all workers required for a tech company to operate, including on-site service staff, contractors, and platform economy workers.

Discussed on