Random Articles (Page 53)

Have a deep view into what people are curious about.

πŸ”— TSLAQ

πŸ”— Internet culture

TSLAQ is a loose, international collective of largely anonymous short-sellers, skeptics, and researchers who openly criticize Tesla, Inc. and its CEO, Elon Musk. The group primarily organizes on Twitter, often using the $TSLAQ cashtag, and Reddit to coordinate efforts and share news, opinions, and analysis about the company and its stock. Edward Niedermeyer, in his book Ludicrous: The Unvarnished Story of Tesla Motors (2019), establishes the doxxing of Lawrence Fossi, a Seeking Alpha writer and Tesla short seller who uses the pseudonym Montana Skeptic, in July 2018 as the catalyst for the formation of TSLAQ. The group was the subject of a Real Vision video which included interviews with prominent members @TESLACharts and @Paul91701736.

TSLAQ highlights what they claim to be a variety of dangerous, deceptive, unlawful and fraudulent business practices by Tesla. Regular criticisms include knowingly selling Model S cars with a design flaw that could cause fires, reselling defective "lemon" cars, performing stealth recalls and requiring customers to sign non-disclosure agreements for "goodwill" repairs, issuing over-the-air updates to cover-up a fire risk in their batteries, publishing misleading safety statistics, delivering cars with lower-performance hardware than promised, taking months to issue customers refunds, and selling a Full Self-Driving package with the promise 1 million "robotaxis" by the end of 2020 despite the technology not yet being available. TSLAQ has also criticized Tesla and Musk for their attempts to intimidate and silence whistleblowers who have spoken out against the company. In addition, the group has highlighted Tesla's history of environmental violations, disregard for workers' safety, and Musk's excessive compensation package. As financial media producer Demetri Kofinas put it, TSLAQ believes Musk "to be a carnival barker running the biggest fraud in corporate America."

On occasion, TSLAQ has exchanged online verbal hostilities with Tesla fans and Elon Musk, who once tweeted with a prominent member and also tweeted personal information of another. While explicitly an online group, off-line activities performed by subgroups include aerial reconnaissance and on-the-ground observations of parking lots used by Tesla for storage.

Discussed on

πŸ”— Gravity Hill

πŸ”— Geography πŸ”— Mountains

A gravity hill, also known as a magnetic hill, mystery hill, mystery spot, gravity road, or anti-gravity hill, is a place where the layout of the surrounding land produces an optical illusion, making a slight downhill slope appear to be an uphill slope. Thus, a car left out of gear will appear to be rolling uphill against gravity. There are hundreds of recognized gravity hills around the world.

The slope of gravity hills is an optical illusion, although sites are often accompanied by claims that magnetic or supernatural forces are at work. The most important factor contributing to the illusion is a completely or mostly obstructed horizon. Without a horizon, it becomes difficult to judge the slope of a surface as a reliable reference is missing. Objects which one would normally assume to be more or less perpendicular to the ground, such as trees, may actually be leaning, offsetting the visual reference.

A 2003 study looked into how the absence of a horizon can skew the perspective on gravity hills by recreating a number of antigravity places in the lab to see how volunteers would react. As a conclusion, researchers from Universities of Padova and Pavia in Italy found that without a true horizon in sight, landmarks such as trees and signs actually played these tricks on the human brain.

The illusion is similar to the Ames room, in which objects can also appear to roll against gravity.

The opposite phenomenonβ€”an uphill road that appears flatβ€”is known in bicycle racing as a "false flat".

Discussed on

πŸ”— Quine

πŸ”— Computing

A quine is a computer program which takes no input and produces a copy of its own source code as its only output. The standard terms for these programs in the computability theory and computer science literature are "self-replicating programs", "self-reproducing programs", and "self-copying programs".

A quine is a fixed point of an execution environment, when the execution environment is viewed as a function transforming programs into their outputs. Quines are possible in any Turing complete programming language, as a direct consequence of Kleene's recursion theorem. For amusement, programmers sometimes attempt to develop the shortest possible quine in any given programming language.

The name "quine" was coined by Douglas Hofstadter, in his popular science book GΓΆdel, Escher, Bach, in honor of philosopher Willard Van Orman Quine (1908–2000), who made an extensive study of indirect self-reference, and in particular for the following paradox-producing expression, known as Quine's paradox:

"Yields falsehood when preceded by its quotation" yields falsehood when preceded by its quotation.

Discussed on

πŸ”— MONIAC – Monetary National Income Analogue Computer

πŸ”— Computing πŸ”— Economics πŸ”— Computing/Early computers

The MONIAC (Monetary National Income Analogue Computer) also known as the Phillips Hydraulic Computer and the Financephalograph, was created in 1949 by the New Zealand economist Bill Phillips (William Phillips) to model the national economic processes of the United Kingdom, while Phillips was a student at the London School of Economics (LSE). The MONIAC was an analogue computer which used fluidic logic to model the workings of an economy. The MONIAC name may have been suggested by an association of money and ENIAC, an early electronic digital computer.

Discussed on

πŸ”— No free lunch in search and optimization

πŸ”— Computing πŸ”— Computer science

In computational complexity and optimization the no free lunch theorem is a result that states that for certain types of mathematical problems, the computational cost of finding a solution, averaged over all problems in the class, is the same for any solution method. The name alludes to the saying "no such thing as a free lunch", that is, no method offers a "short cut". This is under the assumption that the search space is a probability density function. It does not apply to the case where the search space has underlying structure (e.g., is a differentiable function) that can be exploited more efficiently (e.g., Newton's method in optimization) than random search or even has closed-form solutions (e.g., the extrema of a quadratic polynomial) that can be determined without search at all. For such probabilistic assumptions, the outputs of all procedures solving a particular type of problem are statistically identical. A colourful way of describing such a circumstance, introduced by David Wolpert and William G. Macready in connection with the problems of search and optimization, is to say that there is no free lunch. Wolpert had previously derived no free lunch theorems for machine learning (statistical inference). Before Wolpert's article was published, Cullen Schaffer independently proved a restricted version of one of Wolpert's theorems and used it to critique the current state of machine learning research on the problem of induction.

In the "no free lunch" metaphor, each "restaurant" (problem-solving procedure) has a "menu" associating each "lunch plate" (problem) with a "price" (the performance of the procedure in solving the problem). The menus of restaurants are identical except in one regard – the prices are shuffled from one restaurant to the next. For an omnivore who is as likely to order each plate as any other, the average cost of lunch does not depend on the choice of restaurant. But a vegan who goes to lunch regularly with a carnivore who seeks economy might pay a high average cost for lunch. To methodically reduce the average cost, one must use advance knowledge of a) what one will order and b) what the order will cost at various restaurants. That is, improvement of performance in problem-solving hinges on using prior information to match procedures to problems.

In formal terms, there is no free lunch when the probability distribution on problem instances is such that all problem solvers have identically distributed results. In the case of search, a problem instance in this context is a particular objective function, and a result is a sequence of values obtained in evaluation of candidate solutions in the domain of the function. For typical interpretations of results, search is an optimization process. There is no free lunch in search if and only if the distribution on objective functions is invariant under permutation of the space of candidate solutions. This condition does not hold precisely in practice, but an "(almost) no free lunch" theorem suggests that it holds approximately.

πŸ”— Stochastic Resonance

πŸ”— Mathematics πŸ”— Physics

Stochastic resonance (SR) is a phenomenon where a signal that is normally too weak to be detected by a sensor, can be boosted by adding white noise to the signal, which contains a wide spectrum of frequencies. The frequencies in the white noise corresponding to the original signal's frequencies will resonate with each other, amplifying the original signal while not amplifying the rest of the white noise (thereby increasing the signal-to-noise ratio which makes the original signal more prominent). Further, the added white noise can be enough to be detectable by the sensor, which can then filter it out to effectively detect the original, previously undetectable signal.

This phenomenon of boosting undetectable signals by resonating with added white noise extends to many other systems, whether electromagnetic, physical or biological, and is an area of research.

Discussed on

πŸ”— Wolf Warrior Diplomacy

πŸ”— International relations πŸ”— China

Wolf warrior diplomacy (Chinese: ζˆ˜η‹Όε€–δΊ€; pinyin: ZhΓ nlΓ‘ng WΓ ijiāo) describes an aggressive style of coercive diplomacy adopted by Chinese diplomats in the 21st century under Chinese leader Xi Jinping's administration. The term was coined from the Chinese action film, Wolf Warrior 2. This approach is in contrast to prior Chinese diplomatic practices of Deng Xiaoping, which had emphasized the avoidance of controversy and the use of cooperative rhetoric. Wolf warrior diplomacy is confrontational and combative, with its proponents loudly denouncing any criticism of China on social media and in interviews. As an attempt to gain "discourse power" in international politics, wolf warrior diplomacy forms one part of a new foreign policy strategy called Xi Jinping's "Major Country Diplomacy" (Chinese: ε€§ε›½ε€–δΊ€; pinyin: DΓ guΓ³ WΓ ijiāo) which has legitimized a more active role for China on the world stage, including engaging in an open ideological struggle with the West.

Although the phrase "wolf warrior diplomacy" was popularized as a description of this diplomatic approach during the COVID-19 pandemic, the appearance of wolf warrior-style diplomats had begun a few years prior. Chinese leader and General Secretary of the Chinese Communist Party Xi Jinping's foreign policy writ large, perceived anti-China hostility from the West among Chinese government officials, and shifts within the Chinese diplomatic bureaucracy have been cited as factors leading to its emergence.

πŸ”— List of Prolific Writers

πŸ”— Literature

Some writers have had prolific careers with hundreds of their works being published. While some best-selling authors have written a small number of books that have sold millions of copies, others have had lengthy careers and maintained a high level of output year after year. Dame Agatha Christie, the most-published novelist in history, is estimated to have sold 4 billion books, having written 69 novels and 19 plays. Her works were published between 1920 and 1976, equating to around three publications every two years. Dame Barbara Cartland has also sold millions of copies of her books but wrote many more than Christie. She spent 80 years as a novelist with 722 books published, averaging one book released every 40 days of her career. While Cartland wrote a significant number of full-length novels, other authors have been published many more times but have specialised in short stories. Spanish author CorΓ­n Tellado wrote over 4,000 novellas, selling 400 million copies of her books.

Not all authors work alone. Groups of writers, sometimes led by one central figure, have published under shared pseudonyms. The Stratemeyer Syndicate, started by Edward Stratemeyer in 1905, created numerous book series including 190 volumes of The Hardy Boys and 175 volumes of Nancy Drew. More than 1,300 books were published by the group, and although Edward L. Stratemeyer wrote several hundred, he also employed ghostwriters to keep up with the demand. These writers were given storylines and strict guidelines to follow to ensure a level of consistency within each series. Amongst the writing team was Howard R. Garis, who contributed several hundred books to the collection, one of the most active authors. Sales were estimated at over two hundred million copies before the syndicate was sold to Simon & Schuster in 1984.

Most authors carefully craft their work, writing and rewriting several times before publication. Some authors simply use pen and paper, while others such as Isaac Asimov spent hours at a stretch working at a typewriter. Philip M. Parker, by one measure the world's most prolific author, has an entirely different approach. Parker has over 200,000 titles listed on Amazon.com, having developed an algorithm to gather publicly available data and compile it into book form. The computer-generated nature of the books is not detailed on the sales page and the books are printed only when ordered.

Discussed on

πŸ”— COINTELPRO

πŸ”— United States πŸ”— Human rights πŸ”— History πŸ”— Politics πŸ”— Politics/American politics πŸ”— African diaspora πŸ”— United States History πŸ”— United States/FBI πŸ”— Civil Rights Movement πŸ”— United States/U.S. history

COINTELPRO (syllabic abbreviation derived from COunter INTELligence PROgram) (1956–1971) was a series of covert and, at times, illegal projects conducted by the United States Federal Bureau of Investigation (FBI) aimed at surveilling, infiltrating, discrediting, and disrupting American political organizations. FBI records show that COINTELPRO resources targeted groups and individuals that the FBI deemed subversive, including feminist organizations, the Communist Party USA, anti–Vietnam War organizers, activists of the civil rights movement or Black Power movement (e.g. Martin Luther King Jr., the Nation of Islam, and the Black Panther Party), environmentalist and animal rights organizations, the American Indian Movement (AIM), independence movements (such as Puerto Rican independence groups like the Young Lords), and a variety of organizations that were part of the broader New Left. The program also targeted the Ku Klux Klan in 1964.

In another instance in San Diego, the FBI financed, armed, and controlled an extreme right-wing group of former members of the Minutemen anti-communist para-military organization, transforming it into a group called the Secret Army Organization that targeted groups, activists, and leaders involved in the Anti-War Movement, using both intimidation and violent acts.

The FBI has used covert operations against domestic political groups since its inception; however, covert operations under the official COINTELPRO label took place between 1956 and 1971. COINTELPRO tactics are still used to this day and have been alleged to include discrediting targets through psychological warfare; smearing individuals and groups using forged documents and by planting false reports in the media; harassment; wrongful imprisonment; and illegal violence, including assassination. The FBI's stated motivation was "protecting national security, preventing violence, and maintaining the existing social and political order".

Beginning in 1969, leaders of the Black Panther Party were targeted by the COINTELPRO and "neutralized" by being assassinated, imprisoned, publicly humiliated or falsely charged with crimes. Some of the Black Panthers affected included Fred Hampton, Mark Clark, Zayd Shakur, Geronimo Pratt, Mumia Abu-Jamal, and Marshall Conway. Common tactics used by COINTELPRO were perjury, witness harassment, witness intimidation, and withholding of evidence.

FBI Director J. Edgar Hoover issued directives governing COINTELPRO, ordering FBI agents to "expose, disrupt, misdirect, discredit, or otherwise neutralize" the activities of these movements and especially their leaders. Under Hoover, the agent in charge of COINTELPRO was William C. Sullivan. Attorney General Robert F. Kennedy personally authorized some of the programs. Although Kennedy only gave written approval for limited wiretapping of Martin Luther King's phones "on a trial basis, for a month or so", Hoover extended the clearance so his men were "unshackled" to look for evidence in any areas of King's life they deemed worthy.

Discussed on