Random Articles (Page 6)
Have a deep view into what people are curious about.
🔗 PreScheme – Scheme for systems programming
Scheme 48 is a programming language, a dialect of the language Scheme, an implementation using an interpreter which emits bytecode. It has a foreign function interface for calling functions from the language C and comes with a library for regular expressions (regex), and an interface for Portable Operating System Interface (POSIX). It is supported by the portable Scheme library SLIB, and is the basis for the Scheme shell Scsh. It has been used in academic research. It is free and open-source software released under a BSD license.
It is called "Scheme 48" because the first version was written in 48 hours in August 1986. The authors now say it is intended to be understood in 48 hours.
🔗 List of fictional computers
Computers have often been used as fictional objects in literature, movies and in other forms of media. Fictional computers tend to be considerably more sophisticated than anything yet devised in the real world.
This is a list of computers that have appeared in notable works of fiction. The work may be about the computer, or the computer may be an important element of the story. Only static computers are included. Robots and other fictional computers that are described as existing in a mobile or humanlike form are discussed in a separate list of fictional robots and androids.
Discussed on
- "List of fictional computers" | 2014-06-01 | 28 Upvotes 22 Comments
🔗 Law of Demeter
The Law of Demeter (LoD) or principle of least knowledge is a design guideline for developing software, particularly object-oriented programs. In its general form, the LoD is a specific case of loose coupling. The guideline was proposed by Ian Holland at Northeastern University towards the end of 1987, and can be succinctly summarized in each of the following ways:
- Each unit should have only limited knowledge about other units: only units "closely" related to the current unit.
- Each unit should only talk to its friends; don't talk to strangers.
- Only talk to your immediate friends.
The fundamental notion is that a given object should assume as little as possible about the structure or properties of anything else (including its subcomponents), in accordance with the principle of "information hiding". It may be viewed as a corollary to the principle of least privilege, which dictates that a module possess only the information and resources necessary for its legitimate purpose.
It is so named for its origin in the Demeter Project, an adaptive programming and aspect-oriented programming effort. The project was named in honor of Demeter, “distribution-mother” and the Greek goddess of agriculture, to signify a bottom-up philosophy of programming which is also embodied in the law itself.
Discussed on
- "Law of Demeter" | 2019-07-09 | 81 Upvotes 48 Comments
🔗 Black Hours, Morgan MS 493
The Black Hours, MS M.493 (or the Morgan Black Hours) is an illuminated book of hours completed in Bruges between 1460 and 1475. It consists of 121 pages (leaves), with Latin text written in Gothic minuscule script. The words are arranged in rows of fourteen lines and follow the Roman version of the texts. The lettering is inscribed in silver and gold and placed within borders ornamented with flowers, foliage and grotesques, on pages dyed a deep blueish black. It contains fourteen full-page miniatures and opens with the months of the liturgical calendar (folios 3 verso – 14 recto), followed by the Hours of the Virgin, and ends with the Office of the Dead (folio 121v).
MS M.493 has been in the collection of the Morgan Library & Museum, New York, since 1912. It is one of seven surviving black books of hours, all originating from Bruges and dated to the mid-to-late 15th century. They are so named for their unusual dark blueish appearance, a colourisation achieved through the expensive process of dyeing the vellum with iron gall ink. This dye is very corrosive and the surviving examples are mostly badly decomposed; MS M.493 is in relatively good condition due to its very thick parchment.
The book is a masterpiece of Late Gothic manuscript illumination. However, no records survive of its commission, but its uniquely dark tone, expense of production, quality and rarity suggest ownership by privileged and sophisticated members of the Burgundian court. The book is often attributed, on stylistic grounds, to a follower of Willem Vrelant, a leading and influential Flemish illuminator.
Discussed on
- "Black Hours, Morgan MS 493" | 2022-09-03 | 38 Upvotes 11 Comments
🔗 Gödel Machine
A Gödel machine is a hypothetical self-improving computer program that solves problems in an optimal way. It uses a recursive self-improvement protocol in which it rewrites its own code when it can prove the new code provides a better strategy. The machine was invented by Jürgen Schmidhuber (first proposed in 2003), but is named after Kurt Gödel who inspired the mathematical theories.
The Gödel machine is often discussed when dealing with issues of meta-learning, also known as "learning to learn." Applications include automating human design decisions and transfer of knowledge between multiple related tasks, and may lead to design of more robust and general learning architectures. Though theoretically possible, no full implementation has been created.
The Gödel machine is often compared with Marcus Hutter's AIXItl, another formal specification for an artificial general intelligence. Schmidhuber points out that the Gödel machine could start out by implementing AIXItl as its initial sub-program, and self-modify after it finds proof that another algorithm for its search code will be better.
Discussed on
- "Gödel Machine" | 2019-03-28 | 118 Upvotes 37 Comments
🔗 Steam Cannon
A steam cannon is a cannon that launches a projectile using only heat and water, or using a ready supply of high-pressure steam from a boiler. The first steam cannon was designed by Archimedes during the Siege of Syracuse. Leonardo Da Vinci was also known to have designed one (see the Architonnerre).
The early device would consist of a large metal tube, preferably copper due to its high thermal conductivity, which would be placed in a furnace. One end of the tube would be capped and the other loaded with a projectile. Once the tube reached a high enough temperature, a small amount of water would be injected in behind the projectile. In theory, Leonardo da Vinci believed, the water would rapidly expand into vapour, blasting the projectile out the front of the barrel.
Discussed on
- "Steam Cannon" | 2019-10-28 | 37 Upvotes 24 Comments
🔗 Rotterdam harbor storm barrier closes for the first time in its history
The Maeslantkering ("Maeslant barrier" in Dutch) is a storm surge barrier on the Nieuwe Waterweg, in South Holland, Netherlands. It was constructed from 1991 to 1997. As part of the Delta Works the barrier responds to water level predictions calculated by a centralized computer system called BOS. It automatically closes when Rotterdam (especially the Port of Rotterdam) is threatened by floods.
Maeslantkering has two 210-metre long barrier gates, with two 237-metre long steel trusses holding each. When closed, the barrier will protect the entire width (360 metres) of the Nieuwe Waterweg, the main waterway of Port of Rotterdam. It is one of the largest moving structures on Earth, rivalling the Green Bank Telescope in the United States and the Bagger 288 excavator in Germany.
Discussed on
- "Rotterdam harbor storm barrier closes for the first time in its history" | 2023-12-21 | 38 Upvotes 16 Comments
🔗 Lowest temperature recorded on Earth
The lowest natural temperature ever directly recorded at ground level on Earth is −89.2 °C (−128.6 °F; 184.0 K) at the Soviet Vostok Station in Antarctica on 21 July 1983 by ground measurements.
On 10 August 2010, satellite observations showed a surface temperature of −93.2 °C (−135.8 °F; 180.0 K) at 81.8°S 59.3°E / -81.8; 59.3, along a ridge between Dome Argus and Dome Fuji, at 3,900 m (12,800 ft) elevation. The result was reported at the 46th annual meeting of the American Geophysical Union in San Francisco in December 2013; it is a provisional figure, and may be subject to revision. The value is not listed as the record lowest temperature as it was measured by remote sensing from satellite and not by ground-based thermometers, unlike the 1983 record. The temperature announced reflects that of the ice surface, while the Vostok readings measured the air above the ice, and so the two are not directly comparable. More recent work shows many locations in the high Antarctic where surface temperatures drop to approximately −98 °C (−144 °F; 175 K). Due to the very strong temperature gradient near the surface, these imply near-surface air temperature minima of approximately −94 °C (−137 °F; 179 K).
Discussed on
- "Lowest temperature recorded on Earth" | 2016-01-06 | 28 Upvotes 11 Comments
🔗 Kelly Criterion
In probability theory and intertemporal portfolio choice, the Kelly criterion (or Kelly strategy or Kelly bet), also known as the scientific gambling method, is a formula for bet sizing that leads almost surely to higher wealth compared to any other strategy in the long run (i.e. approaching the limit as the number of bets goes to infinity). The Kelly bet size is found by maximizing the expected value of the logarithm of wealth, which is equivalent to maximizing the expected geometric growth rate. The Kelly Criterion is to bet a predetermined fraction of assets, and it can seem counterintuitive. It was described by J. L. Kelly Jr, a researcher at Bell Labs, in 1956.
For an even money bet, the Kelly criterion computes the wager size percentage by multiplying the percent chance to win by two, then subtracting one-hundred percent. So, for a bet with a 70% chance to win the optimal wager size is 40% of available funds.
The practical use of the formula has been demonstrated for gambling and the same idea was used to explain diversification in investment management. In the 2000s, Kelly-style analysis became a part of mainstream investment theory and the claim has been made that well-known successful investors including Warren Buffett and Bill Gross use Kelly methods. William Poundstone wrote an extensive popular account of the history of Kelly betting.
Discussed on
- "Kelly Criterion" | 2021-04-16 | 330 Upvotes 194 Comments