Random Articles (Page 4)

Have a deep view into what people are curious about.

πŸ”— Tide-Predicting Machine No. 2

πŸ”— Oceans

Tide-Predicting Machine No. 2, also known as Old Brass Brains, was a special-purpose mechanical computer that uses gears, pulleys, chains, and other mechanical components to compute the height and time of high and low tides for specific locations. The machine can perform tide calculations much faster than a person could do with pencil and paper. The U.S. Coast and Geodetic Survey put the machine into operation in 1910. It was used until 1965, when it was replaced by an electronic computer.

Discussed on

πŸ”— Terraforming of Mars

πŸ”— Technology πŸ”— Spaceflight πŸ”— Solar System/Mars πŸ”— Solar System

Terraforming of Mars is a procedure that would comprise of planetary engineering project or concurrent projects, with the goal of transforming the planet from one hostile to terrestrial life to one that can sustainably host humans and other lifeforms free of protection or mediation. The process would presumably involve the rehabilitation of the planet's extant climate, atmosphere, and surface through a variety of resource-intensive initiatives, and the installation of a novel ecological system or systems.

Justifications for choosing Mars over other potential terraforming targets include the presence of water and a geological history that suggests it once harbored a dense atmosphere similar to Earth’s. Hazards and difficulties include low gravity, low light levels relative to Earth’s, and the lack of a magnetic field.

Objections to the project include questions about its feasibility, general ethical concerns about terraforming, and the considerable cost that such an undertaking would involve. Reasons for terraforming the planet include allaying concerns about resource use and depletion on Earth and arguments that the altering and subsequent or concurrent settlement of other planets decreases the odds of humanity's extinction.

Disagreement exists about whether current technology could render the planet habitable.

Discussed on

πŸ”— Warez Scene

πŸ”— Computing πŸ”— Internet culture πŸ”— Law πŸ”— Software πŸ”— Software/Computing

The Warez scene, often referred to as The Scene, is an underground network of piracy groups specialized in obtaining and illegally releasing digital media before their official release date. The Scene distributes all forms of digital media, including computer games, movies, TV shows, music, and pornography. This network is meant to be hidden from the public, with the files shared only with members of the community. However, as files became commonly leaked outside the community and their popularity grew, some individuals from The Scene began leaking files and uploading them to file-hosts, torrents and EDonkey Networks.

The Scene has no central leadership, location, or other organizational culture. The groups themselves create a rule set for each Scene category (for example, MP3 or TV) that then becomes the active rules for encoding material. These rule sets include a rigid set of requirements that warez groups (shortened as "grps") must follow in releasing and managing material. The groups must follow these rules when uploading material and, if the release has a technical error or breaks a rule, other groups may "nuke" (flag as bad content) the release. Groups are in constant competition to get releases up as fast as possible. First appearing around the time of Bulletin Board Systems (BBSes), The Scene is composed primarily of people dealing with and distributing media content, for which special skills and advanced software are required.

Discussed on

πŸ”— Museum Fatigue

πŸ”— Psychology πŸ”— Museums

Museum fatigue is a state of physical or mental fatigue caused by the experience of exhibits in museums and similar cultural institutions. The collection of phenomena that characterize museum fatigue was first described in 1916, and has since received widespread attention in popular and scientific contexts.

The first known description of museum fatigue was made by Benjamin Ives Gilman in the January 1916 edition of The Scientific Monthly. Gilman mainly focused on the efforts of museum fatigue on how the viewing displays are placed. Gilman went on to say that the way the displays were presented caused museum fatigue. In other later studies, Edward Robinson in 1928 spoke more about museum fatigue, specifically of four museums that showed a lot of characteristics of museum fatigue because of how the displays were placed. Arthur Melton provided more proof for Robinson by observing visitors' interest in the displays decreased as the number of displays increased.

In a more recent study of the phenomenon, Falk, Koran, Direking, and Dreblow studied museum fatigue at the Florida Museum of Natural History in 1985. While observing visitors they noticed a pattern of high interest in anything in the museum for about 30 minutes and then a decrease in interest. In 1997–1998, Beverly Serrell in her research determined that in less than 20 minutes people became apathetic towards the museum. Museum fatigue has also been applied in zoos to see if they had the same effect. In one study in 1986, Bitgood, Patterson, and Benefeld observed the reptile house of the Birmingham Zoo. While observing they noticed that the pattern was different from museum fatigue.

Discussed on

πŸ”— Michigan Terminal System

πŸ”— Computing πŸ”— Michigan

The Michigan Terminal System (MTS) is one of the first time-sharing computer operating systems. Developed in 1967 at the University of Michigan for use on IBM S/360-67, S/370 and compatible mainframe computers, it was developed and used by a consortium of eight universities in the United States, Canada, and the United Kingdom over a period of 33 years (1967 to 1999).

Discussed on

πŸ”— Terahertz Gap

πŸ”— Technology πŸ”— Physics πŸ”— Radio πŸ”— Astronomy πŸ”— Engineering

In engineering, the terahertz gap is a frequency band in the terahertz region of the electromagnetic spectrum between radio waves and infrared light for which practical technologies for generating and detecting the radiation do not exist. It is defined as 0.1 to 10Β THz (wavelengths of 3Β mm to 30Β Β΅m). Currently, at frequencies within this range, useful power generation and receiver technologies are inefficient and unfeasible.

Mass production of devices in this range and operation at room temperature (at which energy kΒ·T is equal to the energy of a photon with a frequency of 6.2Β THz) are mostly impractical. This leaves a gap between mature microwave technologies in the highest frequencies of the radio spectrum and the well developed optical engineering of infrared detectors in their lowest frequencies. This radiation is mostly used in small-scale, specialized applications such as submillimetre astronomy. Research that attempts to resolve this issue has been conducted since the late 20thΒ century.

Discussed on

πŸ”— Cold Boot Attack

πŸ”— Computer Security πŸ”— Computer Security/Computing πŸ”— Cryptography πŸ”— Cryptography/Computer science

In computer security, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer's random access memory by performing a hard reset of the target machine. Typically, cold boot attacks are used to retrieve encryption keys from a running operating system for malicious or criminal investigative reasons. The attack relies on the data remanence property of DRAM and SRAM to retrieve memory contents that remain readable in the seconds to minutes after power has been removed.

An attacker with physical access to a running computer typically executes a cold boot attack by cold-booting the machine and booting a lightweight operating system from a removable disk to dump the contents of pre-boot physical memory to a file. An attacker is then free to analyze the data dumped from memory to find sensitive data, such as the keys, using various forms of key finding attacks. Since cold boot attacks target random access memory, full disk encryption schemes, even with a trusted platform module installed are ineffective against this kind of attack. This is because the problem is fundamentally a hardware (insecure memory) and not a software issue. However, malicious access can be prevented by limiting physical access and using modern techniques to avoid storing sensitive data in random access memory.

Discussed on

πŸ”— _NSAKEY

πŸ”— Computer Security πŸ”— Computer Security/Computing πŸ”— Microsoft Windows πŸ”— Microsoft Windows/Computing πŸ”— Cryptography πŸ”— Cryptography/Computer science

_NSAKEY was a variable name discovered in an operating system from Microsoft in 1999. The variable contained a 1024-bit public key; such keys are used in cryptography for encryption and authentication. Due to the name it was speculated that the key was owned by the United States National Security Agency (the NSA) which would allow the intelligence agency to subvert any Windows user's security. Microsoft denied the speculation and said that the key's name came from the NSA being the technical review authority for U.S. cryptography export controls.

The key was discovered in a Windows NT 4 Service Pack 5 (which had been released unstripped of its symbolic debugging data) in August 1999 by Andrew D. Fernandes of Cryptonym Corporation.

Discussed on

πŸ”— Garden Hermit

πŸ”— Horticulture and Gardening πŸ”— Occupations

Garden hermits or ornamental hermits were hermits encouraged to live in purpose-built hermitages, follies, grottoes, or rockeries on the estates of wealthy landowners, primarily during the 18th century. Such hermits would be encouraged to dress like druids and remain permanently on site, where they could be fed, cared for, and consulted for advice, or viewed for entertainment.

Discussed on

πŸ”— The Tennessee Valley Authority

πŸ”— United States/U.S. Government πŸ”— United States πŸ”— Appalachia πŸ”— National Archives πŸ”— Tennessee πŸ”— Energy πŸ”— Alabama

The Tennessee Valley Authority (TVA) is a federally owned electric utility corporation in the United States. TVA's service area covers all of Tennessee, portions of Alabama, Mississippi, and Kentucky, and small areas of Georgia, North Carolina, and Virginia. While owned by the federal government, TVA receives no taxpayer funding and operates similarly to a private for-profit company. It is headquartered in Knoxville, Tennessee, and is the sixth-largest power supplier and largest public utility in the country.

The TVA was created by Congress in 1933 as part of President Franklin D. Roosevelt's New Deal. Its initial purpose was to provide navigation, flood control, electricity generation, fertilizer manufacturing, regional planning, and economic development to the Tennessee Valley, a region that had suffered from lack of infrastructure and even more extensive poverty during the Great Depression than other regions of the nation. TVA was envisioned both as a power supplier and a regional economic development agency that would work to help modernize the region's economy and society. It later evolved primarily into an electric utility. It was the first large regional planning agency of the U.S. federal government, and remains the largest.

Under the leadership of David E. Lilienthal, the TVA also became the global model for the United States' later efforts to help modernize agrarian societies in the developing world. The TVA historically has been documented as a success in its efforts to modernize the Tennessee Valley and helping to recruit new employment opportunities to the region. Historians have criticized its use of eminent domain and the displacement of over 125,000 Tennessee Valley residents to build the agency's infrastructure projects.

Discussed on