Random Articles (Page 312)

Have a deep view into what people are curious about.

๐Ÿ”— Dagen H โ€“ the day Sweden switched to driving on the right

๐Ÿ”— Transport ๐Ÿ”— Sweden

Dagen H (H day), today usually called "Hรถgertrafikomlรคggningen" ("The right-hand traffic diversion"), was the day on 3 September 1967, in which the traffic in Sweden switched from driving on the left-hand side of the road to the right. The "H" stands for "Hรถgertrafik", the Swedish word for "right traffic". It was by far the largest logistical event in Sweden's history.

Discussed on

๐Ÿ”— Relativistic kill vehicle

๐Ÿ”— Physics ๐Ÿ”— Firearms

A projectile is any object thrown into space (empty or not) by the exertion of a force. Although any object in motion through space (for example a thrown baseball) may be called a projectile, the term more commonly refers to a ranged weapon. Mathematical equations of motion are used to analyze projectile trajectory. An object projected at an angle to the horizontal has both the vertical and horizontal components of velocity. The vertical component of the velocity on the y-axis given as Vy=USin(teta) while the horizontal component of the velocity Vx=UCos(teta). There are various terms used in projectiles at specific angle teta 1. Time to reach maximum height. It is symbolized as (t), which is the time taken for the projectile to reach the maximum height from the plane of projection. Mathematically, it is given as t=USin(teta)/g Where g=acceleration due to gravity(app 9.81m/sยฒ) U= initial velocity (m/s) teta= angle made by the projectile with the horizontal axis.

2. Time of flight (T): this is the total time taken for the projectile to fall back to the same plane from which it was projected. Mathematically it is given as T=2USin(teta)/g

3. Maximum Height (H): this is the maximum height attained by the projectile OR the maximum displacement on the vertical axis(y-axis) covered by the projectile. It is given as H= UยฒSinยฒ(teta)/2g

4. Range(R): The Range of a projectile is the horizontal distance covered (on the x-axis) by the projectile. Mathematically, R= UยฒSin2(teta)/g. The Range is maximum when angle teta= 45ยฐ I.e Sin2(teta)=1.

Discussed on

๐Ÿ”— Confused Deputy Problem

๐Ÿ”— Computing ๐Ÿ”— Computer Security ๐Ÿ”— Computer Security/Computing ๐Ÿ”— Computing/Software

In information security, a confused deputy is a computer program that is tricked by another program (with fewer privileges or less rights) into misusing its authority on the system. It is a specific type of privilege escalation. The confused deputy problem is often cited as an example of why capability-based security is important.

Capability systems protect against the confused deputy problem, whereas access-control listโ€“based systems do not.

Discussed on

๐Ÿ”— K-anonymity

๐Ÿ”— Internet ๐Ÿ”— Cryptography ๐Ÿ”— Cryptography/Computer science

k-anonymity is a property possessed by certain anonymized data. The concept of k-anonymity was first introduced by Latanya Sweeney and Pierangela Samarati in a paper published in 1998 as an attempt to solve the problem: "Given person-specific field-structured data, produce a release of the data with scientific guarantees that the individuals who are the subjects of the data cannot be re-identified while the data remain practically useful." A release of data is said to have the k-anonymity property if the information for each person contained in the release cannot be distinguished from at least k โˆ’ 1 {\displaystyle k-1} individuals whose information also appear in the release.

K-anonymity received widespread media coverage in 2018 when British computer scientist Junade Ali used the property alongside cryptographic hashing to create a communication protocol to anonymously verify if a password was leaked without disclosing the searched password. This protocol was implemented as a public API in Troy Hunt's Have I Been Pwned? service and is consumed by multiple services including password managers and browser extensions. This approach was later replicated by Google's Password Checkup feature.

Discussed on

๐Ÿ”— Thridrangaviti Lighthouse

๐Ÿ”— Iceland ๐Ÿ”— Lighthouses

รžrรญdrangaviti Lighthouse (transliterated as Thridrangaviti) is an active lighthouse 7.2 kilometres (4.5 miles) off the southwest coast of Iceland, in the archipelago of Vestmannaeyjar. It is often described as one of the most isolated lighthouses in the world. รžrรญdrangar means "three rock pillars", referring to the three named sea stacks at that location: Stรณridrangur (on which the lighthouse stands), รžรบfudrangur, and Klofadrangur. The lighthouse was commissioned on 5 July 1942.

๐Ÿ”— Stalin Note

๐Ÿ”— Soviet Union ๐Ÿ”— Russia ๐Ÿ”— History ๐Ÿ”— Germany ๐Ÿ”— Politics ๐Ÿ”— Cold War ๐Ÿ”— European history

The Stalin Note, also known as the March Note, was a document delivered to the representatives of the Western Allies (the United Kingdom, France, and the United States) from the Soviet Union in Germany on 10 March 1952. Soviet general secretary and premier Joseph Stalin put forth a proposal for a German reunification and neutralisation with no conditions on economic policies and with guarantees for "the rights of man and basic freedoms, including freedom of speech, press, religious persuasion, political conviction, and assembly" and free activity of democratic parties and organizations.

James Warburg, a member of the United States Senate Committee on Foreign Relations, testified before the committee on 28 March 1952 and observed that the Soviet proposal might be a bluff, but he thought that it seemed "that our government is afraid to call the bluff for the fear that it may not be a bluff at all" and might lead to "a free, neutral, and demilitarised Germany", which might be "subverted into Soviet orbit". That led to an exchange of notes between the West and the Soviet Union, which eventually ended after the West had insistence for a unified Germany to be free to join the European Defence Community and to be rearmed, demands that Stalin rejected.

West German Chancellor Konrad Adenauer and the Western Allies characterised Stalin's move as an aggressive action that attempted to stall the reintegration of West Germany. However, there was later a debate on whether a chance for reunification had been missed. Six years after the exchange, two West German ministers, Thomas Dehler and Gustav Heinemann, blamed Adenauer for not having explored the chance of reunification.

๐Ÿ”— Erdล‘s number

๐Ÿ”— Mathematics

The Erdล‘s number (Hungarian:ย [หˆษ›rdรธหสƒ]) describes the "collaborative distance" between mathematician Paul Erdล‘s and another person, as measured by authorship of mathematical papers. The same principle has been applied in other fields where a particular individual has collaborated with a large and broad number of peers.

Discussed on

๐Ÿ”— Protestant Work Ethic

๐Ÿ”— Religion ๐Ÿ”— Philosophy ๐Ÿ”— Philosophy/Philosophy of religion ๐Ÿ”— Philosophy/Ethics ๐Ÿ”— Christianity ๐Ÿ”— Christianity/theology ๐Ÿ”— Christianity/Calvinism

The Protestant work ethic, also known as the Calvinist work ethic or the Puritan work ethic, is a work ethic concept in scholarly sociology, economics and historiography. It emphasizes that diligence, discipline, and frugality are a result of a person's subscription to the values espoused by the Protestant faith, particularly Calvinism.

The phrase was initially coined in 1905 by Max Weber in his book The Protestant Ethic and the Spirit of Capitalism. Weber asserted that Protestant ethics and values, along with the Calvinist doctrines of asceticism and predestination, enabled the rise and spread of capitalism. It is one of the most influential and cited books in sociology, although the thesis presented has been controversial since its release. In opposition to Weber, historians such as Fernand Braudel and Hugh Trevor-Roper assert that the Protestant work ethic did not create capitalism and that capitalism developed in pre-Reformation Catholic communities. Just as priests and caring professionals are deemed to have a vocation (or "calling" from God) for their work, according to the Protestant work ethic the "lowly" workman also has a noble vocation which he can fulfill through dedication to his work.

The concept is often credited with helping to define the societies of Northern, Central and Northwestern Europe as well as the United States of America.

Discussed on

๐Ÿ”— Gematria

๐Ÿ”— Judaism ๐Ÿ”— Writing systems ๐Ÿ”— Kabbalah

Gematria (; Hebrew: ื’ืžื˜ืจื™ื or gimatria ื’ื™ืžื˜ืจื™ื”, plural ื’ืžื˜ืจืื•ืช or ื’ื™ืžื˜ืจื™ืื•ืช, gimatriot) is the practice of assigning a numerical value to a name, word or phrase by reading it as a number, or sometimes by using an alphanumerical cipher. The letters of the alphabets involved have standard numerical values, but a word can yield several values if a cipher is used.

According to Aristotle (384โ€“322 BCE), isopsephy, based on the Milesian numbering of the Greek alphabet developed in the Greek city of Miletus, was part of the Pythagorean tradition, which originated in the 6th century BCE. The first evidence of use of Hebrew letters as numbers dates to 78 BCE; gematria is still used in Jewish culture. Similar systems have been used in other languages and cultures, derived from or inspired by either Greek isopsephy or Hebrew gematria, and include Arabic abjad numerals and English gematria.

The most common form of Hebrew gematria is used in the Talmud and Midrash, and elaborately by many post-Talmudic commentators. It involves reading words and sentences as numbers, assigning numerical instead of phonetic value to each letter of the Hebrew alphabet. When read as numbers, they can be compared and contrasted with other words or phrasesย โ€“ cf. the Hebrew proverb ื ื›ื ืกย ื™ื™ืŸย ื™ืฆืย ืกื•ื“ (nichnasย yayinย yatzaย sod, lit.โ€‰'wine entered, secret went out', i.e. "in vino veritas"). The gematric value of ื™ื™ืŸ ('wine') is 70 (ื™=10; ื™=10; ืŸ=50) and this is also the gematric value of ืกื•ื“ ('secret', ืก=60; ื•=6; ื“=4)โ€Ž.

Although a type of gematria system ('Aru') was employed by the ancient Babylonian culture, their writing script was logographic, and the numerical assignments they made were to whole words. Aru was very different from the Milesian systems used by Greek and Hebrew cultures, which used alphabetic writing scripts. The value of words with Aru were assigned in an entirely arbitrary manner and correspondences were made through tables, and so cannot be considered a true form of gematria.

Gematria sums can involve single words, or a string of lengthy calculations. A short example of Hebrew numerology that uses gematria is the word ื—ื™ (chai, lit.โ€‰'alive'), which is composed of two letters that (using the assignments in the mispar gadol table shown below) add up to 18. This has made 18 a "lucky number" among the Jewish people. Donations of money in multiples of 18 are very popular.

In early Jewish sources, the term can also refer to other forms of calculation or letter manipulation, for example atbash.

Discussed on

๐Ÿ”— Andrew Johnson's drunk vice-presidential inaugural address

๐Ÿ”— United States ๐Ÿ”— Politics ๐Ÿ”— Spirits

Andrew Johnson was drunk when he made his inaugural address as Vice President of the United States on March 4, 1865. Multiple sources suggest Johnson had been drunk for at least a week prior, he drank heavily the night before the inauguration, and he consumed either three glasses of whisky or one glass of French brandy the morning of the ceremony. Witnesses variously described Johnson's speech as incoherent, inane, self-aggrandizing, repetitive, hostile, sloppy, and overly long. He kissed the Bible when he took the oath of office, and he was too drunk to administer the oath of office to incoming senators. The incident presaged some of Johnson's difficulties as chief executive when he succeeded to the presidency 42 days later, following the assassination of Abraham Lincoln.

Discussed on