Random Articles (Page 35)
Have a deep view into what people are curious about.
π Don't Buy This
Don't Buy This (also known as Don't Buy This: Five of the Worst Games Ever) is a compilation of video games for the ZX Spectrum released on 1 April 1985. As described on the box, it contains five of the poorest games submitted to publisher Firebird. Instead of rejecting the submissions, they decided to mock the original developers by releasing them together and publicly brand it as "unoriginal" and "awful". Firebird even disowned all their copyright to the game and encouraged buyers to pirate it at will.
Reviews for the game were universally negative, with critics questioning how to critique the game due to its publicity being based on it being a collection of bad games. Despite the negative reception, the game was a commercial success.
π X Window System: Principles
The X Window System (X11, or simply X) is a windowing system for bitmap displays, common on Unix-like operating systems.
X provides the basic framework for a GUI environment: drawing and moving windows on the display device and interacting with a mouse and keyboard. X does not mandate the user interfaceΒ β this is handled by individual programs. As such, the visual styling of X-based environments varies greatly; different programs may present radically different interfaces.
X originated at the Project Athena at Massachusetts Institute of Technology (MIT) in 1984. The X protocol has been at version 11 (hence "X11") since September 1987. The X.Org Foundation leads the X project, with the current reference implementation, X.Org Server, available as free and open source software under the MIT License and similar permissive licenses.
Discussed on
- "X Window System: Principles" | 2020-05-05 | 32 Upvotes 11 Comments
π Operation Northwoods
Operation Northwoods was a proposed false flag operation against the Cuban government that originated within the U.S. Department of Defense (DoD) and the Joint Chiefs of Staff (JCS) of the United States government in 1962. The proposals called for the Central Intelligence Agency (CIA) or other U.S. government operatives to both stage and actually commit acts of terrorism against American military and civilian targets, blaming them on the Cuban government, and using it to justify a war against Cuba. The possibilities detailed in the document included the possible assassination of Cuban immigrants, sinking boats of Cuban refugees on the high seas, hijacking planes to be shot down or given the appearance of being shot down, blowing up a U.S. ship, and orchestrating violent terrorism in U.S. cities. The proposals were rejected by President John F. Kennedy.
Communists led by Fidel Castro had taken power in Cuba in 1959, which aroused the concern of the U.S. military due to the Cold War. The operation proposed creating public support for a war against Cuba by blaming it for terrorist acts that would actually be perpetrated by the U.S. Government. To this end, Operation Northwoods proposals recommended hijackings and bombings followed by the introduction of phony evidence that would implicate the Cuban government. It stated:
The desired result from the execution of this plan would be to place the United States in the apparent position of suffering defensible grievances from a rash and irresponsible government of Cuba and to develop an international image of a Cuban threat to peace in the Western Hemisphere.
Several other proposals were included within Operation Northwoods, including real or simulated actions against various U.S. military and civilian targets. The operation recommended developing a "Communist Cuban terror campaign in the Miami area, in other Florida cities and even in Washington".
The plan was drafted by the Joint Chiefs of Staff, signed by Chairman Lyman Lemnitzer and sent to the Secretary of Defense. Although part of the U.S. government's anti-communist Cuban Project, Operation Northwoods was never officially accepted; it was authorized by the Joint Chiefs of Staff, but then rejected by President John F. Kennedy. According to currently released documentation, none of the operations became active under the auspices of the Operation Northwoods proposals.
Discussed on
- "Operation Northwoods: CIA false-flag op against American citizens (1962)" | 2022-08-21 | 18 Upvotes 2 Comments
- "Operation Northwoods" | 2019-09-01 | 82 Upvotes 35 Comments
π CueCat
The CueCat, styled :CueCat with a leading colon, is a cat-shaped handheld barcode reader that was given away free to Internet users starting in 2000 by the now-defunct Digital Convergence Corporation. The CueCat was named CUE for the unique bar code which the device scanned and CAT as a play on "Keystroke Automation Technology" and it enabled a user to open a link to an Internet URL by scanning a barcode β called a "cue" by Digital Convergence β appearing in an article or catalog or on some other printed matter. In this way, a user could be directed to a web page containing related information without having to enter a URL. The company asserted that the ability of the device to direct users to a specific URL, rather than a domain name, was valuable. In addition, television broadcasters could use an audio tone in programs or commercials that, if a TV was connected to a computer via an audio cable, acted as a web address shortcut.
The CueCat connected to computers using the PS/2 keyboard port and USB, and communicated to desktop "CRQ" software running on Windows 32-bit and Mac OS 9 operating systems. Users of this software were required to register with their ZIP code, gender, and email address. This registration process enabled the device to deliver relevant content to a single or multiple users in a household.
By year-end 2001, Codes could no longer be generated for the device or scanned with the device. However, third-party software can decode the lightweight encryption in the device.
π The most viewed articles of 2024
Discussed on
- "The most viewed articles of 2024" | 2025-01-21 | 33 Upvotes 16 Comments
π Frequency Format Hypothesis
The frequency format hypothesis is the idea that the brain understands and processes information better when presented in frequency formats rather than a numerical or probability format. Thus according to the hypothesis, presenting information as 1 in 5 people rather than 20% leads to better comprehension. The idea was proposed by German scientist Gerd Gigerenzer, after compilation and comparison of data collected between 1976β1997.
Discussed on
- "Frequency Format Hypothesis" | 2023-03-26 | 47 Upvotes 11 Comments
π ACT-R: A cognitive architecture
ACT-R (pronounced /ΛΓ¦kt ΛΙr/; short for "Adaptive Control of ThoughtβRational") is a cognitive architecture mainly developed by John Robert Anderson and Christian Lebiere at Carnegie Mellon University. Like any cognitive architecture, ACT-R aims to define the basic and irreducible cognitive and perceptual operations that enable the human mind. In theory, each task that humans can perform should consist of a series of these discrete operations.
Most of the ACT-R's basic assumptions are also inspired by the progress of cognitive neuroscience, and ACT-R can be seen and described as a way of specifying how the brain itself is organized in a way that enables individual processing modules to produce cognition.
Discussed on
- "ACT-R: A cognitive architecture" | 2015-12-17 | 20 Upvotes 4 Comments
π Tetration
In mathematics, tetration (or hyper-4) is an operation based on iterated, or repeated, exponentiation. It is the next hyperoperation after exponentiation, but before pentation. The word was coined by Reuben Louis Goodstein from tetra- (four) and iteration.
Under the definition as repeated exponentiation, the notation means , where n copies of a are iterated via exponentiation, right-to-left, I.e. the application of exponentiation times. n is called the "height" of the function, while a is called the "base," analogous to exponentiation. It would be read as "the nth tetration of a".
Tetration is also defined recursively as
- ,
allowing for attempts to extend tetration to non-natural numbers such as real and complex numbers.
The two inverses of tetration are called the super-root and the super-logarithm, analogous to the nth root and the logarithmic functions. None of the three functions are elementary.
Tetration is used for the notation of very large numbers.
Discussed on
- "Tetration" | 2010-05-02 | 28 Upvotes 11 Comments
π Buffon's Needle Problem
In mathematics, Buffon's needle problem is a question first posed in the 18th century by Georges-Louis Leclerc, Comte de Buffon:
- Suppose we have a floor made of parallel strips of wood, each the same width, and we drop a needle onto the floor. What is the probability that the needle will lie across a line between two strips?
Buffon's needle was the earliest problem in geometric probability to be solved; it can be solved using integral geometry. The solution for the sought probability p, in the case where the needle length l is not greater than the width t of the strips, is
This can be used to design a Monte Carlo method for approximating the number Ο, although that was not the original motivation for de Buffon's question.
Discussed on
- "Buffon's Needle Problem" | 2019-09-28 | 51 Upvotes 7 Comments
π Laconic Phrase
A laconic phrase or laconism is a concise or terse statement, especially a blunt and elliptical rejoinder. It is named after Laconia, the region of Greece including the city of Sparta, whose ancient inhabitants had a reputation for verbal austerity and were famous for their blunt and often pithy remarks.
Discussed on
- "Laconic Phrase" | 2015-04-24 | 12 Upvotes 3 Comments