Random Articles (Page 3)
Have a deep view into what people are curious about.
π Abram Petrovich Gannibal
Abram Petrovich Gannibal, also Hannibal or Ganibal, or Abram Hannibal or Abram Petrov (Russian: ΠΠ±ΡΠ°ΜΠΌ ΠΠ΅ΡΡΠΎΜΠ²ΠΈΡ ΠΠ°Π½Π½ΠΈΠ±Π°ΜΠ»; c. 1696 β 14 May 1781), was a Russian military engineer, major-general, and nobleman of African origin. Kidnapped as a child, Gannibal was taken to Russia and presented as a gift to Peter the Great, where he was freed, adopted and raised in the Emperor's court household as his godson.
Gannibal eventually rose to become a prominent member of the imperial court in the reign of Peter's daughter Elizabeth. He had 11 children, most of whom became members of the Russian nobility; he was a great-grandfather of the author and poet Alexander Pushkin.
Discussed on
- "Abram Petrovich Gannibal" | 2021-06-03 | 55 Upvotes 4 Comments
π Apple Pippin (1996)
The Apple Pippin is a defunct open multimedia technology platform, designed by Apple Computer, and marketed as PiPP!N. According to Apple, Pippin was directed at the home market as "an integral part of the consumer audiovisual, stereo, and television environment."
Pippin is based on the Apple Macintosh platform, including the classic Mac OS architecture. Apple built a demonstration device based on Pippin called "Pippin Power Player," and used it to demonstrate the platform at trade shows and to the media, in order to attract potential software developers and hardware manufacturers. Apple licensed the Pippin technology to third-party companies. Bandai Company Ltd. developed the ATMARK and @WORLD models, and focused them on the gaming and entertainment business in Japan and the United States. Katz Media developed the KMP 2000, and focused it on vertical markets throughout Europe and Canada.
Discussed on
- "Apple Pippin (1996)" | 2018-03-31 | 68 Upvotes 29 Comments
π Literature-Based Discovery
Literature-based discovery is a form of knowledge extraction and automated hypothesis generation that uses papers and other academic publications (the "literature") to find new relationships between existing knowledge (the "discovery"). The technique was pioneered by Don R. Swanson in the 1980s and has since seen widespread use.
Literature-based discovery does not generate new knowledge through laboratory experiments, as is customary for empirical sciences. Instead it seeks to connect existing knowledge from empirical results by bringing to light relationships that are implicated and "neglected". It is marked by empiricism and rationalism in concert or consilience.
Discussed on
- "Literature-Based Discovery" | 2019-08-03 | 34 Upvotes 6 Comments
π Legendre's constant
Legendre's constant is a mathematical constant occurring in a formula conjectured by Adrien-Marie Legendre to capture the asymptotic behavior of the prime-counting function . Its value is now known to be exactlyΒ 1.
Examination of available numerical evidence for known primes led Legendre to suspect that satisfies an approximate formula.
Legendre conjectured in 1808 that
where ....OEIS:Β A228211
Or similarly,
where B is Legendre's constant. He guessed B to be about 1.08366, but regardless of its exact value, the existence of B implies the prime number theorem.
Pafnuty Chebyshev proved in 1849 that if the limit B exists, it must be equal to 1. An easier proof was given by Pintz in 1980.
It is an immediate consequence of the prime number theorem, under the precise form with an explicit estimate of the error term
(for some positive constant a, where O(β¦) is the big O notation), as proved in 1899 by Charles de La VallΓ©e Poussin, that B indeed is equal to 1. (The prime number theorem had been proved in 1896, independently by Jacques Hadamard and La VallΓ©e Poussin, but without any estimate of the involved error term).
Being evaluated to such a simple number has made the term Legendre's constant mostly only of historical value, with it often (technically incorrectly) being used to refer to Legendre's first guess 1.08366... instead.
Pierre Dusart proved in 2010
- for , and
- for . This is of the same form as
- with .
Discussed on
- "Legendre's constant" | 2018-09-22 | 14 Upvotes 1 Comments
π Apollo 15 postage stamp incident
The Apollo 15 postal covers incident, a 1972 NASA scandal, involved the astronauts of Apollo 15, who carried about 400 unauthorized postal covers into space and to the Moon's surface on the Lunar Module Falcon. Some of the envelopes were sold at high prices by West German stamp dealer Hermann Sieger, and are known as "Sieger covers". The crew of Apollo 15, David Scott, Alfred Worden and James Irwin, agreed to take payments for carrying the covers; though they returned the money, they were reprimanded by NASA. Amid much press coverage of the incident, the astronauts were called before a closed session of a Senate committee and never flew in space again.
The three astronauts and an acquaintance, Horst Eiermann, had agreed to have the covers made and taken into space. Each astronaut was to receive about $7,000. Scott arranged to have the covers postmarked on the morning of the Apollo 15 launch on July 26, 1971. They were packaged for space and brought to him as he prepared for liftoff. Due to an error, they were not included on the list of the personal items he was taking into space. The covers spent July 30 to August 2 on the Moon inside Falcon. On August 7, the date of splashdown, the covers were postmarked again on the recovery carrier USSΒ Okinawa. One hundred were sent to Eiermann (and passed on to Sieger); the remaining covers were divided among the astronauts.
Worden had agreed to carry 144 additional covers, largely for an acquaintance, F. Herrick Herrick; these had been approved for travel to space. Apollo 15 carried a total of approximately 641 covers. In late 1971, when NASA learned that the Herrick covers were being sold, the astronauts' supervisor, Deke Slayton, warned Worden to avoid further commercialization of what he had been allowed to take into space. After Slayton heard of the Sieger arrangement, he removed the three as backup crew members for Apollo 17, though the astronauts had by then refused compensation from Sieger and Eiermann. The Sieger matter became generally known in the newspapers in June 1972. There was widespread coverage; some said astronauts should not be allowed to reap personal profits from NASA missions.
By 1977, all three former astronauts had left NASA. In 1983, Worden sued, and the covers were returned to them. One of the postal covers given to Sieger sold for over $50,000 in 2014.
Discussed on
- "Apollo 15 postage stamp incident" | 2019-04-30 | 133 Upvotes 49 Comments
π Wireworld
Wireworld is a cellular automaton first proposed by Brian Silverman in 1987, as part of his program Phantom Fish Tank. It subsequently became more widely known as a result of an article in the "Computer Recreations" column of Scientific American. Wireworld is particularly suited to simulating transistors, and Wireworld is Turing-complete.
Discussed on
- "Wireworld" | 2016-07-07 | 290 Upvotes 26 Comments
π Cold Boot Attack
In computer security, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer's random access memory by performing a hard reset of the target machine. Typically, cold boot attacks are used to retrieve encryption keys from a running operating system for malicious or criminal investigative reasons. The attack relies on the data remanence property of DRAM and SRAM to retrieve memory contents that remain readable in the seconds to minutes after power has been removed.
An attacker with physical access to a running computer typically executes a cold boot attack by cold-booting the machine and booting a lightweight operating system from a removable disk to dump the contents of pre-boot physical memory to a file. An attacker is then free to analyze the data dumped from memory to find sensitive data, such as the keys, using various forms of key finding attacks. Since cold boot attacks target random access memory, full disk encryption schemes, even with a trusted platform module installed are ineffective against this kind of attack. This is because the problem is fundamentally a hardware (insecure memory) and not a software issue. However, malicious access can be prevented by limiting physical access and using modern techniques to avoid storing sensitive data in random access memory.
Discussed on
- "Cold Boot Attack" | 2013-09-27 | 33 Upvotes 9 Comments
π East German Balloon Escape
The East German balloon escape occurred on 16 September 1979, when eight people in two families escaped the Eastern Bloc country of East Germany by crossing the border to the Western Bloc's West Germany in a homemade hot air balloon at around 2:00Β a.m. The escape plot was carried out over one and a half years, including a previously unsuccessful attempt, three different balloons, and various modifications. One failed crossing alerted the government to the plot, but the police were not able to identify the suspects before their flight to the West.
Discussed on
- "East German Balloon Escape" | 2023-08-26 | 36 Upvotes 6 Comments
π Berkson's Paradox
Berkson's paradox also known as Berkson's bias or Berkson's fallacy is a result in conditional probability and statistics which is often found to be counterintuitive, and hence a veridical paradox. It is a complicating factor arising in statistical tests of proportions. Specifically, it arises when there is an ascertainment bias inherent in a study design. The effect is related to the explaining away phenomenon in Bayesian networks, and conditioning on a collider in graphical models.
It is often described in the fields of medical statistics or biostatistics, as in the original description of the problem by Joseph Berkson.
Discussed on
- "Berkson's Paradox" | 2022-11-20 | 101 Upvotes 10 Comments
- "Berkson's Paradox" | 2018-12-12 | 87 Upvotes 21 Comments
- "Berkson's Paradox" | 2014-09-03 | 39 Upvotes 20 Comments
π Assassination of Kim Jong-Nam
On 13 February 2017, the eldest son of Kim Jong-il and half-brother of Kim Jong-un, Kim Jong-nam, was attacked with the nerve agent VX at Kuala Lumpur International Airport in Malaysia. He had been exiled from North Korea in 2003 and had been living abroad.
Following his visit to the resort island Langkawi, Kim Jong-nam had arrived at terminal 2 sometime before 9:00 a.m. to take a 10:50 a.m. AirAsia flight to Macau. At approximately 9:00 a.m., two women attacked Kim Jong-nam with the VX nerve agent. He died about 15 to 20 minutes later.
The women were identified as Siti Aisyah, an Indonesian and ΔoΓ n Thα» HΖ°Ζ‘ng, a Vietnamese. Both were charged with the murder of Kim Jong-nam. The charges were dropped, although HΖ°Ζ‘ng pled guilty to "voluntarily causing hurt by dangerous weapons or means" and received a sentence of three years and four months. Four North Korean suspects left the airport shortly after the assassination and reached Pyongyang without being arrested. Other North Koreans were arrested but were released without charge.
It is widely believed that Kim Jong-nam was murdered on the orders of Kim Jong-un.