Random Articles (Page 6)
Have a deep view into what people are curious about.
π Object Oriented Role Analysis and Modeling
The Object Oriented Role Analysis and Modeling (OOram) is a method, based on the concept of role, for performing object-oriented modeling.
Originally (1989) coined Object Oriented Role Analysis, Synthesis and Structuring (OORASS), the method focuses on describing patterns of interaction without connecting the interaction to particular objects/instances. OOram was originally developed by Trygve Reenskaug (1996), a professor at the University of Oslo and the founder of the Norwegian IT company Taskon. The use of "roles" in OOram is similar in application to that of Agent-oriented programming.
Enterprise models created according to OOram may have a number of views, with each view presenting certain aspects of a model. The following ten views are proposed:
- Area of concern view: Textual description of a phenomenon represented in the role model.
- Stimulus-response view: Describes how environment roles may trigger activities in the organization (stimulus), together with the effect (response).
- Role list view: List describing all roles of a role model together with attributes and textual explanation.
- Semantic view: Describes meaning of roles and relationships between roles.
- Collaboration view: Describes patterns of roles and message paths.
- Interface view: Describes all messages that can be sent along a message path.
- Scenario view: Provides a sample sequence of messages flowing between roles (a concrete example).
- Process view: Describes data flow between roles and associated activities performed by the roles.
- State diagram view: For each role, the legal states can be described together with messages that trigger transitions.
- Method specification view: Describes what messages to send for each method belonging to a role. May also specify procedures to perform.
OOram suggests a varied mix of formal and informal notations and languages for representing and communicating models. Which view to use depends upon the needs in a particular situation.
Discussed on
- "Object Oriented Role Analysis and Modeling" | 2020-03-10 | 38 Upvotes 19 Comments
π Mode 2
A knowledge production mode is a term from the sociology of science which refers to the way (scientific) knowledge is produced. So far, three modes have been conceptualized. Mode 1 production of knowledge is knowledge production motivated by scientific knowledge alone (basic research) which is not primarily concerned by the applicability of its findings. Mode 1 is founded on a conceptualization of science as separated into discrete disciplines (e.g., a biologist does not bother about chemistry). Mode 2 was coined in 1994 in juxtaposition to Mode 1 by Michael Gibbons, Camille Limoges, Helga Nowotny, Simon Schwartzman, Peter Scott and Martin Trow. In Mode 2, multidisciplinary teams are brought together for short periods of time to work on specific problems in the real world for knowledge production (applied research) in the knowledge society. Mode 2 can be explained by the way research funds are distributed among scientists and how scientists focus on obtaining these funds in terms of five basic features: 1) knowledge produced in the context of application; (2) transdisciplinarity; (3) heterogeneity and organizational diversity; (4) social accountability and reflexivity; (5) and quality control. Subsequently, Carayannis and Campbell described a Mode 3 knowledge in 2006.
Discussed on
- "Mode 2" | 2014-05-07 | 20 Upvotes 3 Comments
π SHA-3 NIST announcement controversy
SHA-3 (Secure Hash Algorithm 3) is the latest member of the Secure Hash Algorithm family of standards, released by NIST on August 5, 2015. Although part of the same series of standards, SHA-3 is internally different from the MD5-like structure of SHA-1 and SHA-2.
SHA-3 is a subset of the broader cryptographic primitive family Keccak (), designed by Guido Bertoni, Joan Daemen, MichaΓ«l Peeters, and Gilles Van Assche, building upon RadioGatΓΊn. Keccak's authors have proposed additional uses for the function, not (yet) standardized by NIST, including a stream cipher, an authenticated encryption system, a "tree" hashing scheme for faster hashing on certain architectures, and AEAD ciphers Keyak and Ketje.
Keccak is based on a novel approach called sponge construction. Sponge construction is based on a wide random function or random permutation, and allows inputting ("absorbing" in sponge terminology) any amount of data, and outputting ("squeezing") any amount of data, while acting as a pseudorandom function with regard to all previous inputs. This leads to great flexibility.
NIST does not currently plan to withdraw SHA-2 or remove it from the revised Secure Hash Standard. The purpose of SHA-3 is that it can be directly substituted for SHA-2 in current applications if necessary, and to significantly improve the robustness of NIST's overall hash algorithm toolkit.
The creators of the Keccak algorithms and the SHA-3 functions suggest using the faster function KangarooTwelve with adjusted parameters and a new tree hashing mode without extra overhead for small message sizes.
Discussed on
- "SHA-3 NIST announcement controversy" | 2014-07-20 | 77 Upvotes 33 Comments
π Bicycle Day (Psychedelic Holiday)
Bicycle Day is a global holiday on April 19th celebrating the psychedelic revolution and commemorating the first psychedelic trip on LSD by Dr. Albert Hofmann in 1943, in tandem with his famous bicycle ride home from Sandoz Labs. It is commonly celebrated by ingesting psychedelics and riding a bike, sometimes in a parade, and often with psychedelic-themed festivities. The holiday was first named and declared in 1985 by Thomas Roberts, a psychology professor at Northern Illinois University, but has likely been celebrated by psychedelic enthusiasts since the begining of the psychedelic era, and celebrated in popular culture since at least 2004.
Discussed on
- "Bicycle Day (Psychedelic Holiday)" | 2024-04-19 | 92 Upvotes 16 Comments
π Finite Element Method
The finite element method (FEM) is the most widely used method for solving problems of engineering and mathematical models. Typical problem areas of interest include the traditional fields of structural analysis, heat transfer, fluid flow, mass transport, and electromagnetic potential. The FEM is a particular numerical method for solving partial differential equations in two or three space variables (i.e., some boundary value problems). To solve a problem, the FEM subdivides a large system into smaller, simpler parts that are called finite elements. This is achieved by a particular space discretisation in the space dimensions, which is implemented by the construction of a mesh of the object: the numerical domain for the solution, which has a finite number of points. The finite element method formulation of a boundary value problem finally results in a system of algebraic equations. The method approximates the unknown function over the domain. The simple equations that model these finite elements are then assembled into a larger system of equations that models the entire problem. The FEM then uses variational methods from the calculus of variations to approximate a solution by minimizing an associated error function.
Studying or analyzing a phenomenon with FEM is often referred to as finite element analysis (FEA).
Discussed on
- "Finite Element Method" | 2020-02-17 | 75 Upvotes 44 Comments
π Debate between sheep and grain
The "Debate between sheep and grain" or "Myth of cattle and grain" is a Sumerian creation myth, written on clay tablets in the mid to late 3rd millennium BCE.
Discussed on
- "Debate between sheep and grain" | 2018-04-06 | 47 Upvotes 18 Comments
π Credit card imprinter
A credit card imprinter, colloquially known as a ZipZap machine, click-clack machine or Knuckle Buster, is a manual device that was used by merchants to record payment card transactions before the advent of payment terminals.
The device works by placing the customerβs credit card into a bed in the machine, then layering carbon paper forms over the card. A bar is slid back and forth over the paper to create an impression of the embossed card data and the merchant information on the imprinter. The customer signs these paper forms, with one copy as the customer receipt and the other kept by the merchant.
Discussed on
- "Credit card imprinter" | 2025-10-04 | 16 Upvotes 7 Comments
π Slide rule: One of the simplest forms of analog computer
A slide rule is a hand-operated mechanical calculator consisting of slidable rulers for evaluating mathematical operations such as multiplication, division, exponents, roots, logarithms, and trigonometry. It is one of the simplest analog computers.
Slide rules exist in a diverse range of styles and generally appear in a linear, circular or cylindrical form. Slide rules manufactured for specialized fields such as aviation or finance typically feature additional scales that aid in specialized calculations particular to those fields. The slide rule is closely related to nomograms used for application-specific computations. Though similar in name and appearance to a standard ruler, the slide rule is not meant to be used for measuring length or drawing straight lines. Nor is it designed for addition or subtraction, which is usually performed using other methods, like using an abacus. Maximum accuracy for standard linear slide rules is about three decimal significant digits, while scientific notation is used to keep track of the order of magnitude of results.
English mathematician and clergyman Reverend William Oughtred and others developed the slide rule in the 17th century based on the emerging work on logarithms by John Napier. It made calculations faster and less error-prone than evaluating on paper. Before the advent of the scientific pocket calculator, it was the most commonly used calculation tool in science and engineering. The slide rule's ease of use, ready availability, and low cost caused its use to continue to grow through the 1950s and 1960s, even as desktop electronic computers were gradually introduced. But after the handheld scientific calculator was introduced in 1972 and became inexpensive in the mid-1970s, slide rules became largely obsolete, so most suppliers departed the business.
In the United States, the slide rule is colloquially called a slipstick.
π Wikipedia: "Add a Fact" LLM Future Audiences Experiment
Add A Fact is a temporary experimental tool created by the Wikimedia Foundation's Future Audience team to learn how and if we can support making it possible to contribute productively to Wikipedia from outside of Wikipedia, and if guidance to the contributor from a large language model (LLM) could be useful in this process. The idea was developed and workshopped with Wikipedians at WikiConference North America 2023, demoed and tested with Wikipedia community members as part of our teamβs regular monthly community calls.
Add A Fact is available for the Google Chrome and Mozilla Firefox browsers and can be used by any logged in, autoconfirmed English Wikipedia user. We welcome your feedback on the talk page of this page, or via the Feedback tool in the browser extension.
Discussed on
- "Wikipedia: "Add a Fact" LLM Future Audiences Experiment" | 2024-09-27 | 41 Upvotes 4 Comments
π Linux Router Project
The Linux Router Project (LRP) is a now defunct networking-centric micro Linux distribution. The released versions of LRP were small enough to fit on a single 1.44MB floppy disk, and made building and maintaining routers, access servers, thin servers, thin clients, network appliances, and typically embedded systems next to trivial.
Discussed on
- "Linux Router Project" | 2024-02-25 | 24 Upvotes 1 Comments