Random Articles (Page 3)
Have a deep view into what people are curious about.
π Pioneer Species
Pioneer species are resilient species that are the first to colonize barren environments, or to repopulate disrupted biodiverse steady-state ecosystems as part of ecological succession. A number of kinds of events can create good conditions for pioneers, including disruption by natural disasters, such as wildfire, flood, mudslide, lava flow or a climate-related extinction event or by anthropogenic habitat destruction, such as through land clearance for agriculture or construction or industrial damage. Pioneer species play an important role in creating soil in primary succession, and stabilizing soil and nutrients in secondary succession.
For humans, because pioneer species quickly occupy disrupted spaces they are sometimes treated as weeds or nuisance wildlife, such as the common dandelion or stinging nettle. Even though humans have mixed relationships with these plants, these species tend to help improve the ecosystem because they can break up compacted soils and accumulate nutrients that help with a transition back to a more mature ecosystem. In human managed ecological restoration or agroforestry, trees and herbaceous pioneers can be used to restore soil qualities and provide shelter for slower growing or more demanding plants. Some systems use introduced species to restore the ecosystem, or for environmental remediation. The durability of pioneer species can also make them potential invasive species.
Discussed on
- "Pioneer Species" | 2024-11-17 | 19 Upvotes 1 Comments
π List of people and companies named in the Paradise Papers
This is a list of people and organisations named in the Paradise Papers as connected to offshore companies. The International Consortium of Investigative Journalists stated in their politicians database, as a disclaimer, "There are legitimate uses for offshore companies and trusts. We do not intend to suggest or imply that any people, companies or other entities included in the ICIJ Offshore Leaks Database have broken the law or otherwise acted improperly."
Discussed on
- "List of people and companies named in the Paradise Papers" | 2017-11-06 | 36 Upvotes 1 Comments
π Manned Orbiting Laboratory
The Manned Orbiting Laboratory (MOL), originally referred to as the Manned Orbital Laboratory, was a never-flown part of the United States Air Force's human spaceflight program, a successor to the canceled Boeing X-20 Dyna-Soar military reconnaissance space plane project. The project was developed from several early Air Force and NASA concepts of crewed space stations to be used for reconnaissance purposes. MOL evolved into a single-use laboratory, with which crews would be launched on 40-day missions and return to Earth using a Gemini B spacecraft, derived from NASA's Project Gemini.
The MOL program was announced to the public on 10 December 1963 as an inhabited platform to prove the utility of putting people in space for military missions. Astronauts selected for the program were later told of the reconnaissance mission for the program. The contractor for the MOL was the Douglas Aircraft Company. The Gemini B was externally similar to NASA's Gemini spacecraft, although it underwent several modifications, including the addition of a circular hatch through the heat shield, which allowed passage between the spacecraft and the laboratory.
MOL was canceled in 1969, during the height of the Apollo program, when it was shown that uncrewed reconnaissance satellites could achieve the same objectives much more cost-effectively. U.S. space station development was instead pursued with the civilian NASA Skylab (Apollo Applications Program) which flew in the mid-1970s.
In the 1970s, the Soviet Union launched three Almaz military space stations, similar in intent to the MOL, but cancelled the program in 1977 for the same reasons.
There is a MOL space suit on display at the Oklahoma City Science Museum, presumably never used.
Discussed on
- "Manned Orbiting Laboratory" | 2019-06-05 | 12 Upvotes 4 Comments
π SWEET16: Interpreted byte-code instruction set invented by Steve Wozniak
SWEET16 is an interpreted byte-code instruction set invented by Steve Wozniak and implemented as part of the Integer BASIC ROM in the Apple II series of computers. It was created because Wozniak needed to manipulate 16-bit pointer data, and the Apple II was an 8-bit computer.
SWEET16 was not used by the core BASIC code, but was later used to implement several utilities. Notable among these was the line renumbering routine, which was included in the Programmer's Aid #1 ROM, added to later Apple II models and available for user installation on earlier examples.
SWEET16 code is executed as if it were running on a 16-bit processor with sixteen internal 16-bit little-endian registers, named R0 through R15. Some registers have well-defined functions:
- R0Β β accumulator
- R12Β β subroutine stack pointer
- R13Β β stores the result of all comparison operations for branch testing
- R14Β β status register
- R15Β β program counter
The 16 virtual registers, 32 bytes in total, are located in the zero page of the Apple II's real, physical memory map (at $00β$1F), with values stored as low byte followed by high byte. The SWEET16 interpreter itself is located from $F689 to $F7FC in the Integer BASIC ROM.
According to Wozniak, the SWEET16 implementation is a model of frugal coding, taking up only about 300 bytes in memory. SWEET16 runs at about one-tenth the speed of the equivalent native 6502 code.
Discussed on
- "SWEET16: Interpreted byte-code instruction set invented by Steve Wozniak" | 2023-10-14 | 23 Upvotes 3 Comments
π Overengineering β I see this every day, please stop
Overengineering (or over-engineering, or over-kill) is the act of designing a product to be more robust or have more features than often necessary for its intended use, or for a process to be unnecessarily complex or inefficient.
Overengineering is often done to increase a factor of safety, add functionality, or overcome perceived design flaws that most users would accept.
Overengineering can be desirable when safety or performance is critical (e.g. in aerospace vehicles and luxury road vehicles), or when extremely broad functionality is required (e.g. diagnostic and medical tools, power users of products), but it is generally criticized in terms of value engineering as wasteful of resources such as materials, time and money.
As a design philosophy, it is the opposite of the minimalist ethos of "less is more" (or: βworse is betterβ) and a disobedience of the KISS principle.
Overengineering generally occurs in high-end products or specialized markets. In one form, products are overbuilt and have performance far in excess of expected normal operation (a city car that can travel at 300Β km/h, or a home video recorder with a projected lifespan of 100 years), and hence are more expensive, bulkier, and heavier than necessary. Alternatively, they may become overcomplicated β the extra functions may be unnecessary, and potentially reduce the usability of the product by overwhelming lesser experienced and technically literate end users, as in feature creep.
Overengineering can decrease the productivity of design teams, because of the need to build and maintain more features than most users need.
A related issue is market segmentation β making different products for different market segments. In this context, a particular product may be more or less suited (and thus considered over- or under-engineered) for a particular market segment.
Discussed on
- "Overengineering β I see this every day, please stop" | 2016-05-29 | 11 Upvotes 5 Comments
π Bored of the Rings
Bored of the Rings is a parody of J. R. R. Tolkien's The Lord of the Rings. This short novel was written by Henry Beard and Douglas Kenney, who later founded National Lampoon. It was published in 1969 by Signet for the Harvard Lampoon. In 2013, an audio version was produced by Orion Audiobooks, narrated by Rupert Degas.
Discussed on
- "Bored of the Rings" | 2017-07-08 | 55 Upvotes 22 Comments
π Padonkaffsky jargon
Padonkaffsky jargon (Russian: ΡΠ·ΡΠΊ ΠΏΠ°Π΄ΠΎΠ½ΠΊΠ°ΡΡ, yazyk padonkaff) or Olbanian (ΠΎΠ»Π±Π°Π½ΡΠΊΠΈΠΉ, olbanskiy) is a cant language developed by a subculture of Runet called padonki (Russian: ΠΏΠ°Π΄ΠΎΠ½ΠΊΠΈ). It started as an Internet slang language originally used in the Russian Internet community. It is comparable to the English-based Leet. Padonkaffsky jargon became so popular that the former President of Russia Dmitry Medvedev jokingly suggested that Olbanian be taught in schools.
Discussed on
- "Padonkaffsky jargon" | 2015-01-17 | 36 Upvotes 4 Comments
π Warchalking
Warchalking is the drawing of symbols in public places to advertise an open Wi-Fi network. Inspired by hobo symbols, the warchalking marks were conceived by a group of friends in June 2002 and publicised by Matt Jones who designed the set of icons and produced a downloadable document containing them. Within days of Jones publishing a blog entry about warchalking, articles appeared in dozens of publications and stories appeared on several major television news programs around the world.
The word is formed by analogy to wardriving, the practice of driving around an area in a car to detect open Wi-Fi nodes. That term in turn is based on wardialing, the practice of dialing many phone numbers hoping to find a modem.
Having found a Wi-Fi node, the warchalker draws a special symbol on a nearby object, such as a wall, the pavement, or a lamp post. Those offering Wi-Fi service might also draw such a symbol to advertise the availability of their Wi-Fi location, whether commercial or personal.
Discussed on
- "Warchalking" | 2023-12-31 | 60 Upvotes 33 Comments
π The Power Elite
The Power Elite is a 1956 book by sociologist C. Wright Mills, in which Mills calls attention to the interwoven interests of the leaders of the military, corporate, and political elements of society and suggests that the ordinary citizen in modern times is a relatively powerless subject of manipulation by those three entities.
π Program slicing
In computer programming, program slicing is the computation of the set of program statements, the program slice, that may affect the values at some point of interest, referred to as a slicing criterion. Program slicing can be used in debugging to locate source of errors more easily. Other applications of slicing include software maintenance, optimization, program analysis, and information flow control.
Slicing techniques have been seeing a rapid development since the original definition by Mark Weiser. At first, slicing was only static, i.e., applied on the source code with no other information than the source code. Bogdan Korel and Janusz Laski introduced dynamic slicing, which works on a specific execution of the program (for a given execution trace). Other forms of slicing exist, for instance path slicing.
Discussed on
- "Program slicing" | 2017-12-25 | 59 Upvotes 10 Comments