Random Articles (Page 4)

Have a deep view into what people are curious about.

πŸ”— Solar eclipse of August 12, 2026

πŸ”— Astronomy πŸ”— Astronomy/Eclipses

A total solar eclipse will occur at the Moon's descending node of the orbit on Wednesday, August 12, 2026, 2 days past perigee (Perigee on Monday, August 10, 2026), in North America and Europe. The total eclipse will pass over the Arctic, Greenland, Iceland, Atlantic Ocean and northern Spain. The points of greatest duration and greatest eclipse will be just 45Β km off the western coast of Iceland by 65Β°10.3' N and 25Β°12.3' W, where the totality will last 2m 18.21s. It will be the first total eclipse visible in Iceland since June 30, 1954, also Solar Saros series 126 (descending node), and the only one to occur in the 21st century as the next one will be in 2196.

Occurring only 2.3 days after perigee (Perigee on August 10, 2026), the Moon's apparent diameter will be larger. Lunar Perigee will occur on Monday, August 10, 2026, two days before the total solar eclipse.

The total eclipse will pass over northern Spain from the Atlantic coast to the Mediterranean coast as well as the Balearic Islands. The total eclipse will be visible from the cities of Valencia, Zaragoza, Palma and Bilbao but both Madrid and Barcelona will be just outside the path of totality.

The last total eclipse in continental Europe occurred on March 29, 2006 and in continental part of European Union it occurred on August 11, 1999. The last total solar eclipse happened in Spain on August 30, 1905 and followed a similar path across the country. The next total eclipse visible in Spain will happen less than a year later on 2 August 2027. A partial eclipse will cover more than 90% of the area of the sun in Ireland, Great Britain, Portugal, France, Italy, the Balkans and North Africa and to a lesser extent in most of Europe, North Africa and North America.

Discussed on

πŸ”— Exercise Paradox

The exercise paradox, also known as the workout paradox, refers to the finding that physical activity, while essential for maintaining overall health, does not necessarily lead to significant weight loss or increased calorie expenditure. This paradox challenges the common belief that more exercise equates to more calories burned and consequently, more weight loss.

Discussed on

πŸ”— Luhn Algorithm for validating credit cards

πŸ”— Computing πŸ”— Mathematics

The Luhn algorithm or Luhn formula, also known as the "modulus 10" or "mod 10" algorithm, named after its creator, IBM scientist Hans Peter Luhn, is a simple checksum formula used to validate a variety of identification numbers, such as credit card numbers, IMEI numbers, National Provider Identifier numbers in the United States, Canadian Social Insurance Numbers, Israel ID Numbers, South African ID Numbers, Greek Social Security Numbers (Ξ‘ΞœΞšΞ‘), and survey codes appearing on McDonald's, Taco Bell, and Tractor Supply Co. receipts. It is described in U.S. Patent No. 2,950,048, filed on January 6, 1954, and granted on August 23, 1960.

The algorithm is in the public domain and is in wide use today. It is specified in ISO/IEC 7812-1. It is not intended to be a cryptographically secure hash function; it was designed to protect against accidental errors, not malicious attacks. Most credit cards and many government identification numbers use the algorithm as a simple method of distinguishing valid numbers from mistyped or otherwise incorrect numbers.

Discussed on

πŸ”— List of Psychological Effects

πŸ”— Lists πŸ”— Psychology

A list of 'effects' that have been noticed in the field of psychology.

πŸ”— Proxy Firm

A proxy firm (also a proxy advisor, proxy adviser, proxy voting agency, vote service provider or shareholder voting research provider) provides services to shareholders (in most cases an institutional investor of some type) to vote their shares at shareholder meetings of, usually, quoted companies.

The typical services provided include agenda translation, provision of vote management software, voting policy development, company research, and vote administration including vote execution. According to their websites, not all firms provide voting recommendations and those that do may simply execute client voting instructions.

The votes executed are called "Proxy Votes" because the shareholder usually does not attend the meeting and instead sends instructions - a proxy appointment - for a third party, usually the chairman of the meeting to vote shares in accordance with the instructions given on the voting card.

πŸ”— List of commercial video games with available source code

πŸ”— Video games πŸ”— Computing πŸ”— Lists πŸ”— Computing/Software πŸ”— Computing/Free and open-source software

This is a list of commercial video games with available source code. The source code of these commercially developed and distributed video games is available to the public or the games' communities.

Discussed on

πŸ”— Zygalski Sheets

πŸ”— Cryptography πŸ”— Cryptography/Computer science πŸ”— Poland

The method of Zygalski sheets was a cryptologic technique used by the Polish Cipher Bureau before and during World War II, and during the war also by British cryptologists at Bletchley Park, to decrypt messages enciphered on German Enigma machines.

The Zygalski-sheet apparatus takes its name from Polish Cipher Bureau mathematician–cryptologist Henryk Zygalski, who invented it about October 1938.

Discussed on

πŸ”— Butterfly gardening

πŸ”— Lepidoptera

Butterfly gardening is a way to create, improve, and maintain habitat for lepidopterans including butterflies, skippers, and moths. Butterflies have four distinct life stagesβ€”egg, larva, chrysalis, and adult. In order to support and sustain butterfly populations, an ideal butterfly garden contains habitat for each life stage.

Butterfly larvae, with some exceptions such as the carnivorous harvester (Feniseca tarquinius), consume plant matter and can be generalists or specialists. While butterflies like the painted lady (Vanessa cardui) are known to consume over 200 plants as caterpillars, other species like the monarch (Danaus plexippus), and the regal fritillary (Speyeria idalia) only consume plants in one genus, milkweed and violets, respectively.

As adults, butterflies feed mainly on nectar, but they have also evolved to consume rotting fruit, tree sap, and even carrion. Supporting nectarivorous adult butterflies involves planting nectar plants of different heights, color, and bloom times. Butterfly bait stations can easily be made to provide a food source for species that prefer fruit and sap. In addition to food sources, windbreaks in the form of trees and shrubs shelter butterflies and can provide larval food and overwintering grounds. "Puddling" is a behavior generally done by male butterflies in which they gather to drink nutrients and water and incorporating a puddling ground for butterflies will enhance a butterfly garden. While butterflies are not the only pollinator, creating butterfly habitat also creates habitat for bees, beetles, flies, and other pollinators

Discussed on

πŸ”— Amiga Unix

πŸ”— Computing πŸ”— Computing/Software πŸ”— Computing/Amiga πŸ”— Project-independent assessment

Amiga Unix (informally known as Amix) is a discontinued full port of AT&T Unix System V Release 4 operating system developed by Commodore-Amiga, Inc. in 1990 for the Amiga computer family as an alternative to AmigaOS, which shipped by default. Bundled with the Amiga 3000UX, Commodore's Unix was one of the first ports of SVR4 to the 68k architecture. The Amiga A3000UX model even got the attention of Sun Microsystems, though ultimately nothing came of it.

Unlike Apple's A/UX, Amiga Unix contained no compatibility layer to allow AmigaOS applications to run under Unix. With few native applications available to take advantage of the Amiga's significant multimedia capabilities, it failed to find a niche in the quite-competitive Unix workstation market of the early 1990s. The A3000UX's price tag of $4,998 (equivalent to $9,382 in 2019) was also not very attractive compared to other Unix workstations at the time, such as the NeXTstation ($5,000 for a base system, with a full API and many times the number of applications available), the SGI Indigo (starting at $8,000), or the Personal DECstation 5000 Model 25 (starting at $5,000). Sun, HP, and IBM had similarly priced systems. The A3000UX's 68030 was noticeably underpowered compared to most of its RISC-based competitors.

Unlike typical commercial Unix distributions of the time, Amiga Unix included the source code to the vendor-specific enhancements and platform-dependent device drivers (essentially any part that wasn't owned by AT&T), allowing interested users to study or enhance those parts of the system. However this source code was subject to the same license terms as the binary part of the system – it was not free software. Amiga Unix also incorporated and depended upon many open source components, such as the GNU C Compiler and X Window System, and included their source code.

Like many other proprietary Unix variants with small market shares, Amiga Unix vanished into the mists of computer history when its vendor, Commodore, went out of business. Today, Unix-like operating systems such as Minix, NetBSD, and Linux are available for the Amiga platform.

Discussed on

πŸ”— Benford's Law

πŸ”— Mathematics πŸ”— Statistics

Benford's law, also called the Newcomb–Benford law, the law of anomalous numbers, or the first-digit law, is an observation about the frequency distribution of leading digits in many real-life sets of numerical data. The law states that in many naturally occurring collections of numbers, the leading significant digit is likely to be small. For example, in sets that obey the law, the number 1 appears as the leading significant digit about 30% of the time, while 9 appears as the leading significant digit less than 5% of the time. If the digits were distributed uniformly, they would each occur about 11.1% of the time. Benford's law also makes predictions about the distribution of second digits, third digits, digit combinations, and so on.

The graph to the right shows Benford's law for base 10. There is a generalization of the law to numbers expressed in other bases (for example, base 16), and also a generalization from leading 1 digit to leading n digits.

It has been shown that this result applies to a wide variety of data sets, including electricity bills, street addresses, stock prices, house prices, population numbers, death rates, lengths of rivers, physical and mathematical constants. Like other general principles about natural dataβ€”for example the fact that many data sets are well approximated by a normal distributionβ€”there are illustrative examples and explanations that cover many of the cases where Benford's law applies, though there are many other cases where Benford's law applies that resist a simple explanation. It tends to be most accurate when values are distributed across multiple orders of magnitude, especially if the process generating the numbers is described by a power law (which are common in nature).

It is named after physicist Frank Benford, who stated it in 1938 in a paper titled "The Law of Anomalous Numbers", although it had been previously stated by Simon Newcomb in 1881.

Discussed on