Random Articles (Page 6)

Have a deep view into what people are curious about.

๐Ÿ”— Homotopy Type Theory

๐Ÿ”— Computer science ๐Ÿ”— Mathematics

In mathematical logic and computer science, homotopy type theory (HoTT ) refers to various lines of development of intuitionistic type theory, based on the interpretation of types as objects to which the intuition of (abstract) homotopy theory applies.

This includes, among other lines of work, the construction of homotopical and higher-categorical models for such type theories; the use of type theory as a logic (or internal language) for abstract homotopy theory and higher category theory; the development of mathematics within a type-theoretic foundation (including both previously existing mathematics and new mathematics that homotopical types make possible); and the formalization of each of these in computer proof assistants.

There is a large overlap between the work referred to as homotopy type theory, and as the univalent foundations project. Although neither is precisely delineated, and the terms are sometimes used interchangeably, the choice of usage also sometimes corresponds to differences in viewpoint and emphasis. As such, this article may not represent the views of all researchers in the fields equally. This kind of variability is unavoidable when a field is in rapid flux.

Discussed on

๐Ÿ”— ISO 1

๐Ÿ”— Measurement

ISO 1 is an international standard set by the International Organization for Standardization that specifies the standard reference temperature for geometrical product specification and verification. The temperature is fixed at 20 ยฐC, which is equal to 293.15 kelvins and 68 degrees Fahrenheit.

Due to thermal expansion, precision length measurements need to be made at (or converted to) a defined temperature. ISOย 1 helps in comparing measurements by defining such a reference temperature. The reference temperature of 20ย ยฐC was adopted by the CIPM on 15 April 1931, and became ISO recommendation number 1 in 1951. It soon replaced worldwide other reference temperatures for length measurements that manufacturers of precision equipment had used before, including 0ย ยฐC, 62ย ยฐF, and 25ย ยฐC. Among the reasons for choosing 20ย ยฐC was that this was a comfortable and practical workshop temperature and that it resulted in an integer value on both the Celsius and Fahrenheit scales.

Discussed on

  • "ISO 1" | 2013-11-09 | 94 Upvotes 17 Comments

๐Ÿ”— Protocol Wars

๐Ÿ”— Computing

A long-running debate in computer science known as the Protocol Wars occurred from the 1970s to the 1990s when engineers, organizations and nations became polarized over the issue of which communication protocol would result in the best and most robust computer networks. This culminated in the Internetโ€“OSI Standards War in the late 1980s and early 1990s, which was ultimately "won" by the Internet protocol suite ("TCP/IP") by the mid-1990s and has since resulted in most other protocols disappearing.

The pioneers of packet switching technology built computer networks to research data communications in the early 1970s. As public data networks emerged in the mid to late 1970s, the debate about interface standards was described as a "battle for access standards". An international collaboration between several national postal, telegraph and telephone ("PTT") providers and commercial operators developed the X.25 standard in 1976, which was adopted on public networks providing global coverage. Several proprietary standards also emerged, most notably IBM's Systems Network Architecture.

The United States Department of Defense developed and tested TCP/IP during the 1970s in collaboration with universities and researchers in the United States, United Kingdom and France. IPv4 was released in 1981 and the DoD made it standard for all military computer networking. By 1984, an international reference model known as the OSI model had been agreed on, with which TCP/IP was not compatible. Many governments in Europe โ€“ particularly France, West Germany, the United Kingdom and the European Economic Community โ€“ and also the United States Department of Commerce mandated compliance with the OSI model and the US Department of Defense planned to transition away from TCP/IP to OSI.

Meanwhile, the development of a complete Internet protocol suite by 1989, and partnerships with the telecommunication and computer industry to incorporate TCP/IP software into various operating systems laid the foundation for the widespread adoption of TCP/IP as a comprehensive protocol suite. While OSI developed its networking standards in the late 1980s, TCP/IP came into widespread use on multi-vendor networks for internetworking and as the core component of the emerging Internet.

Discussed on

๐Ÿ”— Full employment theorem

In computer science and mathematics, a full employment theorem is a term used, often humorously, to refer to a theorem which states that no algorithm can optimally perform a particular task done by some class of professionals. The name arises because such a theorem ensures that there is endless scope to keep discovering new techniques to improve the way at least some specific task is done.

For example, the full employment theorem for compiler writers states that there is no such thing as a provably perfect size-optimizing compiler, as such a proof for the compiler would have to detect non-terminating computations and reduce them to a one-instruction infinite loop. Thus, the existence of a provably perfect size-optimizing compiler would imply a solution to the halting problem, which cannot exist. This also implies that there may always be a better compiler since the proof that one has the best compiler cannot exist. Therefore, compiler writers will always be able to speculate that they have something to improve. A similar example in practical computer science is the idea of no free lunch in search and optimization, which states that no efficient general-purpose solver can exist, and hence there will always be some particular problem whose best known solution might be improved.

Similarly, Gรถdel's incompleteness theorems have been called full employment theorems for mathematicians. In theoretical computer science this field of study is known as Kolmogorov complexity, or the smallest program which outputs a given string.

Tasks such as virus writing and detection, and spam filtering and filter-breaking are also subject to Rice's theorem.

Discussed on

๐Ÿ”— Steve Jackson Games, Inc. vs. United States Secret Service (1993)

๐Ÿ”— United States ๐Ÿ”— Law ๐Ÿ”— United States/Texas - Austin

Steve Jackson Games, Inc. v. United States Secret Service, 816 F. Supp. 432 (W.D. Tex. 1993), was a lawsuit arising from a 1990 raid by the United States Secret Service on the headquarters of Steve Jackson Games (SJG) in Austin, Texas. The raid, along with the Secret Service's unrelated Operation Sundevil, was influential in the founding of the Electronic Frontier Foundation.

Discussed on

๐Ÿ”— Personal Knowledge Management

๐Ÿ”— Computing

Personal knowledge management (PKM) is a process of collecting information that a person uses to gather, classify, store, search, retrieve and share knowledge in their daily activities (Grundspenkis 2007) and the way in which these processes support work activities (Wright 2005). It is a response to the idea that knowledge workers need to be responsible for their own growth and learning (Smedley 2009). It is a bottom-up approach to knowledge management (KM) (Pollard 2008).

๐Ÿ”— Curse of the Colonel

๐Ÿ”— Japan ๐Ÿ”— Paranormal ๐Ÿ”— Baseball ๐Ÿ”— Japan/Japanese baseball ๐Ÿ”— Japan/Mythology

The Curse of the Colonel (Japanese: ใ‚ซใƒผใƒใƒซใ‚ตใƒณใƒ€ใƒผใ‚นใฎๅ‘ชใ„, romanisation: Kฤneru Sandฤsu no Noroi) refers to a 1985 Japanese urban legend regarding a reputed curse placed on the Japanese Kansai-based Hanshin Tigers baseball team by the ghost of deceased KFC founder and mascot Colonel Sanders.

The curse was said to be placed on the team because of the Colonel's anger over treatment of one of his store-front statues, which was thrown into the Dลtonbori River by celebrating Hanshin fans before their team's victory in the 1985 Japan Championship Series. As is common with sports-related curses, the Curse of the Colonel was used to explain the team's subsequent 18-year losing streak. Some fans believed the team would never win another Japan Series until the statue had been recovered. They have appeared in the Japan Series three times since then, losing in 2003, 2005 and 2014.

Comparisons are often made between the Hanshin Tigers and the Boston Red Sox, who were said to be under the Curse of the Bambino until they won the World Series in 2004. The "Curse of the Colonel" has also been used as a bogeyman threat to those who would divulge the secret recipe of eleven herbs and spices that result in the unique taste of his chicken.

Discussed on

๐Ÿ”— Banana equivalent dose

๐Ÿ”— Medicine ๐Ÿ”— Physics ๐Ÿ”— Health and fitness

Banana equivalent dose (BED) is an informal measurement of ionizing radiation exposure, intended as a general educational example to compare a dose of radioactivity to the dose one is exposed to by eating one average-sized banana. Bananas contain naturally occurring radioactive isotopes, particularly potassium-40 (40K), one of several naturally-occurring isotopes of potassium. One BED is often correlated to 10โˆ’7 sievert (0.1 ฮผSv); however, in practice, this dose is not cumulative, as the principal radioactive component is excreted to maintain metabolic equilibrium. The BED is only meant to inform the public about the existence of very low levels of natural radioactivity within a natural food and is not a formally adopted dose measurement.

Discussed on

๐Ÿ”— The Myth of Mental Illness

๐Ÿ”— Books ๐Ÿ”— Psychology

The Myth of Mental Illness: Foundations of a Theory of Personal Conduct is a 1961 book by the psychiatrist Thomas Szasz, in which the author criticizes psychiatry and argues against the concept of mental illness. It received much publicity, and has become a classic, well known as an argument that "mentally ill" is a label which psychiatrists have used against people "disabled by living" rather than truly having a disease.

Discussed on

๐Ÿ”— Erewhon

๐Ÿ”— Novels ๐Ÿ”— Novels/19th century ๐Ÿ”— Novels/Science fiction ๐Ÿ”— New Zealand ๐Ÿ”— Sociology

Erewhon: or, Over the Range () is a novel by English writer Samuel Butler, first published anonymously in 1872, set in a fictional country discovered and explored by the protagonist. The book is a satire on Victorian society.

The first few chapters of the novel dealing with the discovery of Erewhon are in fact based on Butler's own experiences in New Zealand, where, as a young man, he worked as a sheep farmer on Mesopotamia Station for about four years (1860โ€“64), and explored parts of the interior of the South Island and wrote about in his A First Year in Canterbury Settlement (1863).

The novel is one of the first to explore ideas of artificial intelligence, as influenced by Darwin's recently published On the Origin of Species (1859) and the machines developed out of the Industrial Revolution (late 18th to early 19th centuries). Specifically, it concerns itself, in the three-chapter "Book of the Machines", with the potentially dangerous ideas of machine consciousness and self-replicating machines.