Random Articles (Page 6)
Have a deep view into what people are curious about.
๐ Wikipedia: Don't Be High-Maintenance
Occasionally, some long-time users come to believe they are more important than other editors, and act in ways to seek regular validation of that belief. Validation is obtained by delivering and obtaining compliance with ultimatums, such as threatening to storm off the project in a huff โ a "retirement" or long wikibreak. Other examples including threats to make vexatious claims at noticeboards, or to cease all work in a particular topic area. These dramatics are usually accompanied by a long diatribe about whatever petty issue is driving them away this time.
The writer hopes that this fit of pique will attract a flood of "please don't go" messages, along with plenty of support for their side of the dispute that triggered their round of unreasonable demands. The end result sought is that the "high-maintenance" editing behavior gets the editor exactly what they crave โ validation and support โ leading to a triumphant return to the project or article, at least until the next petty conflict. Because Wikipedia is not therapy (even if it was, this behavior would be undesirable) or, more importantly, not a soapbox, and most other editors can see through this sort of behavior, such an outcome is unlikely, and becomes decreasingly likely the more times such a door-slamming conniption is attempted, until people hope the editor really quits.
Threats to "leave and never come back" inevitably invite the response: don't let the door hit you on the way out.
Discussed on
- "Wikipedia: Don't Be High-Maintenance" | 2020-12-16 | 29 Upvotes 15 Comments
๐ Greco-Buddhist Art
The Greco-Buddhist art or Gandhara art is the artistic manifestation of Greco-Buddhism, a cultural syncretism between Ancient Greek art and Buddhism. It had mainly evolved in the ancient region of Gandhara, located in the northwestern fringe of the Indian subcontinent.
The series of interactions leading to Gandhara art occurred over time, beginning with Alexander the Great's brief incursion into the area, followed by the Mauryan Emperor Ashoka converting the region to Buddhism. Buddhism became the prominent religion in the Indo-Greek Kingdoms. However, Greco-Buddhist art truly flowered and spread under the Kushan Empire, when the first surviving devotional images of the Buddha were created during the 1st-3rd centuries CE. Gandhara art reached its zenith from the 3rd-5th century CE, when most surviving motifs and artworks were produced.
Gandhara art is characterized by Buddhist subject matter, sometimes adapting Greco-Roman elements, rendered in a style and forms that are heavily influenced by Greco-Roman art. It has the strong idealistic realism and sensuous description of Hellenistic art, and it is believed to have produced the first representations of Gautama Buddha in human form, ending the early period of aniconism in Buddhism.
The representation of the human form in large sculpture had a considerable influence, both to the south in the rest of India, and to the east, where the spread of Buddhism carried its influence as far as Japan.
Discussed on
- "Greco-Buddhist Art" | 2024-06-30 | 55 Upvotes 15 Comments
๐ The Cathedral and the Bazaar
The Cathedral and the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary (abbreviated CatB) is an essay, and later a book, by Eric S. Raymond on software engineering methods, based on his observations of the Linux kernel development process and his experiences managing an open source project, fetchmail. It examines the struggle between top-down and bottom-up design. The essay was first presented by the author at the Linux Kongress on May 27, 1997 in Wรผrzburg (Germany) and was published as part of the book in 1999.
The illustration on the cover of the book is a 1913 painting by Liubov Popova titled Composition with Figures and belongs to the collection of the State Tretyakov Gallery. The book was released under the Open Publication License v2.0 around 1999.
Discussed on
- "The Cathedral and the Bazaar" | 2023-04-29 | 24 Upvotes 1 Comments
- "The Cathedral and the Bazaar" | 2015-05-15 | 10 Upvotes 1 Comments
๐ Tardigrades on the Moon
On April 11, 2019, the Israeli spacecraft Beresheet crashed into the Moon during a failed landing attempt. Its payload included a few thousand tardigrades. Initial reports suggested they could have survived the crash landing. If any of them did survive, they would be the second animal species to reach the Moon, after humans.
We believe the chances of survival for the tardigrades... are extremely high.
๐ Pizza box form factor
In computing, a pizza box is a style of case design for desktop computers or network switches. Pizza box cases tend to be wide and flat, normally 1.5 to 4 inches or 4 to 10 centimetres in height, resembling pizza delivery boxes and thus the name. This is in contrast to a tower system, whose case height is much greater than the width and has an "upright" appearance. In modern usage, the term "pizza box" is normally reserved for very flat cases with height no more than 2 inches (51ย mm), while those taller than 2 inches are referred to as desktop cases instead.
The common setup of a pizza box system is to have the display monitor placed directly on top of the case, which serves as a podium to elevate the monitor more towards the user's eye level, and to have other peripherals placed in front and alongside the case. Occasionally, the pizza box may be laid on its sides in a tower-like orientation.
Data General's Aviion Unix server was the first to coin the expression when it advertised in 1991 with the tagline "Who just fit mainframe power in a pizza box?", but most computers generally referred to as pizza box systems were high-end desktop systems such as Sun Microsystems workstations sold in the 1990s, most notably the SPARCstationย 1 and SPARCstationย 5. Other notable examples have been among the highest-performing desktop computers of their generations, including the SGIย Indy, the NeXTstation, and the Amiga 1000, but the form factor was also seen in budget and lower-end lines such as the Macintosh LC family.
The original SPARCstationย 1 design included an expansion bus technology, SBus, expressly designed for the form factor; expansion cards were small, especially in comparison to other expansion cards in use at the time such as VMEbus, and were mounted horizontally instead of vertically. PC-compatible computers in this type of case typically use the PCI expansion bus and are usually either a)ย limited to one or two horizontally placed expansion cards or b)ย require special low-profile expansion cards, shorter than the PCIย cards regular PCs use.
The density of computing power and stackability of pizza box systems also made them attractive for use in data centers. Systems originally designed for desktop use were placed on shelves inside of 19-inch racks, sometimes requiring that part of their cases be cut off for them to fit. Since the late 1990s, pizza boxes have been a common form factor in office cubicles, data centers or industrial applications, where desktop space, rack room and density are critical. Servers in this form factor, as well as higher-end Ethernet switches, are now designed for rack mounting. Rack mount 1U computers come in all types of configurations and depths.
The pizza box form factor for smaller personal systems and thin clients remains in use well into the 21st century, though it is increasingly being superseded by laptops, nettops or All-in-One PC designs that embed the already size-reduced computer onto the keyboard or display monitor.
๐ Teletransportation Paradox
The teletransportation paradox or teletransport paradox (also known in alternative forms as the duplicates paradox) is a thought experiment on the philosophy of identity that challenges common intuitions on the nature of self and consciousness. It first appeared under this name in full published form presumably in Derek Parfit's 1984 book Reasons and Persons.
The Polish science-fiction writer Stanisลaw Lem described the same problem in the mid-twentieth century. He put it in writing in his philosophical text "Dialogs", 1957. Similarly, in Lem's Star Diaries ("Fourteenth Voyage") of 1957 the hero visits a planet and he finds himself recreated from a backup record, after his death from a meteorite strike, which on this planet is a very commonplace procedure.
Similar questions of identity have been raised as early as 1775.
I would be glad to know your Lordship's opinion whether when my brain has lost its original structure, and when some hundred years after the same materials are fabricated so curiously as to become an intelligent being, whether, I say that being will be me; or, if, two or three such beings should be formed out of my brain; whether they will all be me, and consequently one and the same intelligent being.
Discussed on
- "Teletransportation Paradox" | 2021-09-17 | 42 Upvotes 118 Comments
๐ United States involvement in regime change
United States involvement in regime change describes United States government participation or interference, both overt and covert, in the replacement of foreign governments. In the latter half of the 19th century, the U.S. government initiated actions for regime change mainly in Latin America and the southwest Pacific, including the SpanishโAmerican and PhilippineโAmerican wars. At the onset of the 20th century, the United States shaped or installed governments in many countries around the world, including neighbors Panama, Honduras, Nicaragua, Mexico, Haiti, and the Dominican Republic.
During World War II, the United States helped overthrow many Nazi Germany or imperial Japanese puppet regimes. Examples include regimes in the Philippines, Korea, the Eastern portion of China, and much of Europe. United States forces were also instrumental in ending the rule of Adolf Hitler over Germany and of Benito Mussolini over Italy. After World War II, the United States in 1945 ratified the UN Charter, the preeminent international law document, which legally bound the U.S. government to the Charter's provisions, including Article 2(4), which prohibits the threat or use of force in international relations, except in very limited circumstances. Therefore, any legal claim advanced to justify regime change by a foreign power carries a particularly heavy burden.
In the aftermath of World War II, the U.S. government struggled with the Soviet Union for global leadership, influence and security within the context of the Cold War. Under the Eisenhower administration, the U.S. government feared that national security would be compromised by governments propped by the Soviet Union's own involvement in regime change and promoted the domino theory, with later presidents following Eisenhower's precedent. Subsequently, the United States expanded the geographic scope of its actions beyond traditional area of operations, Central America and the Caribbean. Significant operations included the United States and United Kingdom-orchestrated 1953 Iranian coup d'รฉtat, the 1961 Bay of Pigs Invasion targeting Cuba, and support for the overthrow of Sukarno by General Suharto in Indonesia. In addition, the U.S. has interfered in the national elections of countries, including the Philippines in 1953, and Japan in the 1950s and 1960s as well as Lebanon in 1957. According to one study, the U.S. performed at least 81 overt and covert known interventions in foreign elections during the period 1946โ2000. Another study found that the U.S. engaged in 64 covert and six overt attempts at regime change during the Cold War.
Following the dissolution of the Soviet Union, the United States has led or supported wars to determine the governance of a number of countries. Stated U.S. aims in these conflicts have included fighting the War on Terror, as in the ongoing Afghan war, or removing dictatorial and hostile regimes, as in the Iraq War.
Discussed on
- "United States involvement in regime change" | 2021-06-17 | 35 Upvotes 15 Comments
๐ SIMH โ Old Computer Emulator
SIMH is a free and open source, multi-platform multi-system emulator. It is maintained by Bob Supnik, a former DEC engineer and DEC vice president, and has been in development in one form or another since the 1960s.
Discussed on
- "SIMH โ Old Computer Emulator" | 2023-09-29 | 92 Upvotes 63 Comments
๐ Founder's Syndrome
Founder's syndrome (also founderitis) is the difficulty faced by organizations where one or more founders maintain disproportionate power and influence following the effective initial establishment of the project, leading to a wide range of problems for the organization. The passion and charisma of the founder(s), sources of the initial creativity and productivity of the organization, become limiting or destructive factors. The syndrome occurs in both non-profit and for-profit organizations. It may simply limit further growth and success of the project, or it may lead to bitter factionalism and divisions as the scale of demands made on the organization increases, or it may result in outright failure. There are ways in which a founder or organization can respond and grow beyond this situation.
Discussed on
- "Founder's Syndrome" | 2020-05-25 | 70 Upvotes 66 Comments
๐ Differential Power Analysis
In cryptography, power analysis is a form of side channel attack in which the attacker studies the power consumption of a cryptographic hardware device (such as a smart card, tamper-resistant "black box", or integrated circuit). The attack can non-invasively extract cryptographic keys and other secret information from the device.
Simple power analysis (SPA) involves visually interpreting power traces, or graphs of electrical activity over time. Differential power analysis (DPA) is a more advanced form of power analysis, which can allow an attacker to compute the intermediate values within cryptographic computations through statistical analysis of data collected from multiple cryptographic operations. SPA and DPA were introduced to the open cryptology community in 1998 by Paul Kocher, Joshua Jaffe and Benjamin Jun.