Random Articles (Page 6)

Have a deep view into what people are curious about.

πŸ”— GΓΆdel Machine

πŸ”— Computing

A GΓΆdel machine is a hypothetical self-improving computer program that solves problems in an optimal way. It uses a recursive self-improvement protocol in which it rewrites its own code when it can prove the new code provides a better strategy. The machine was invented by JΓΌrgen Schmidhuber (first proposed in 2003), but is named after Kurt GΓΆdel who inspired the mathematical theories.

The GΓΆdel machine is often discussed when dealing with issues of meta-learning, also known as "learning to learn." Applications include automating human design decisions and transfer of knowledge between multiple related tasks, and may lead to design of more robust and general learning architectures. Though theoretically possible, no full implementation has been created.

The GΓΆdel machine is often compared with Marcus Hutter's AIXItl, another formal specification for an artificial general intelligence. Schmidhuber points out that the GΓΆdel machine could start out by implementing AIXItl as its initial sub-program, and self-modify after it finds proof that another algorithm for its search code will be better.

Discussed on

πŸ”— How a Buffer Overflow Works

πŸ”— Computing πŸ”— Computer Security πŸ”— Computer Security/Computing πŸ”— Computing/Software

In information security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations.

Buffers are areas of memory set aside to hold data, often while moving it from one section of a program to another, or between programs. Buffer overflows can often be triggered by malformed inputs; if one assumes all inputs will be smaller than a certain size and the buffer is created to be that size, then an anomalous transaction that produces more data could cause it to write past the end of the buffer. If this overwrites adjacent data or executable code, this may result in erratic program behavior, including memory access errors, incorrect results, and crashes.

Exploiting the behavior of a buffer overflow is a well-known security exploit. On many systems, the memory layout of a program, or the system as a whole, is well defined. By sending in data designed to cause a buffer overflow, it is possible to write into areas known to hold executable code and replace it with malicious code, or to selectively overwrite data pertaining to the program's state, therefore causing behavior that was not intended by the original programmer. Buffers are widespread in operating system (OS) code, so it is possible to make attacks that perform privilege escalation and gain unlimited access to the computer's resources. The famed Morris worm in 1988 used this as one of its attack techniques.

Programming languages commonly associated with buffer overflows include C and C++, which provide no built-in protection against accessing or overwriting data in any part of memory and do not automatically check that data written to an array (the built-in buffer type) is within the boundaries of that array. Bounds checking can prevent buffer overflows, but requires additional code and processing time. Modern operating systems use a variety of techniques to combat malicious buffer overflows, notably by randomizing the layout of memory, or deliberately leaving space between buffers and looking for actions that write into those areas ("canaries").

Discussed on

πŸ”— Beverly Clock

πŸ”— Physics πŸ”— New Zealand πŸ”— Physics/History

The Beverly Clock is a clock situated in the 3rd floor lift foyer of the Department of Physics at the University of Otago, Dunedin, New Zealand. The clock is still running despite never having been manually wound since its construction in 1864 by Arthur Beverly.

Discussed on

πŸ”— Bitching Betty

πŸ”— Aviation

Bitching Betty is a slang term used by some pilots and aircrew (mainly North American), when referring to the voices used by some aircraft warning systems.

The enunciating voice, in at least some aircraft systems, may be either male or female and in some cases this may be selected according to pilot preference. If the voice is female, it may be referred to as Bitching Betty; if the voice is male, it may be referred to as Barking Bob. A female voice is heard on military aircraft such as the F-16 Fighting Falcon, the Eurofighter Typhoon and the Mikoyan MiG-29. A male voice is heard on Boeing commercial airliners and is also used in the BAE Hawk.

In the United Kingdom the term Nagging Nora is sometimes used, and in New Zealand the term used for Boeing aircraft is Hank the Yank. The voice warning system used on London Underground trains, which also uses a female voice, is known to some staff as Sonya, as it "gets on ya nerves".

Discussed on

πŸ”— Geneva drive

πŸ”— Technology πŸ”— Physics

The Geneva drive or Maltese cross is a gear mechanism that translates a continuous rotation movement into intermittent rotary motion.

The rotating drive wheel is usually equipped with a pin that reaches into a slot located in the other wheel (driven wheel) that advances it by one step at a time. The drive wheel also has an elevated circular blocking disc that "locks" the rotating driven wheel in position between steps.

Discussed on

πŸ”— Werckmeister Temperment

Werckmeister temperaments are the tuning systems described by Andreas Werckmeister in his writings. The tuning systems are numbered in two different ways: the first refers to the order in which they were presented as "good temperaments" in Werckmeister's 1691 treatise, the second to their labelling on his monochord. The monochord labels start from III since just intonation is labelled I and quarter-comma meantone is labelled II. The temperament commonly known as "Werckmeister III" is referred to in this article as "Werckmeister I (III)".

The tunings I (III), II (IV) and III (V) were presented graphically by a cycle of fifths and a list of major thirds, giving the temperament of each in fractions of a comma. Werckmeister used the organbuilder's notation of ^ for a downwards tempered or narrowed interval and v for an upward tempered or widened one. (This appears counterintuitive - it is based on the use of a conical tuning tool which would reshape the ends of the pipes.) A pure fifth is simply a dash. Werckmeister was not explicit about whether the syntonic comma or Pythagorean comma was meant: the difference between them, the so-called schisma, is almost inaudible and he stated that it could be divided up among the fifths.

The last "Septenarius" tuning was not conceived in terms of fractions of a comma, despite some modern authors' attempts to approximate it by some such method. Instead, Werckmeister gave the string lengths on the monochord directly, and from that calculated how each fifth ought to be tempered.

Discussed on

πŸ”— Greek numerals

πŸ”— Mathematics πŸ”— Greece

Greek numerals, also known as Ionic, Ionian, Milesian, or Alexandrian numerals, are a system of writing numbers using the letters of the Greek alphabet. In modern Greece, they are still used for ordinal numbers and in contexts similar to those in which Roman numerals are still used elsewhere in the West. For ordinary cardinal numbers, however, Greece uses Arabic numerals.

Discussed on

πŸ”— Toyetic

πŸ”— Film πŸ”— Marketing & Advertising πŸ”— Film/Filmmaking πŸ”— Media πŸ”— Toys πŸ”— Games

Toyetic is a term referring to the suitability of a media property, such as a cartoon or movie, for merchandising tie-in lines of licensed toys, games and novelties. The term is attributed to Bernard Loomis, a toy development executive for Kenner Toys, in discussing the opportunities for marketing the film Close Encounters of the Third Kind, telling its producer Steven Spielberg that the movie wasn't "toyetic" enough, leading Loomis towards acquiring the lucrative license for the upcoming Star Wars properties.

Discussed on

πŸ”— Wikipedia lets you create books

This Help page is about Wikipedia books created on Wikipedia.

Discussed on

πŸ”— Agner Krarup Erlang

πŸ”— Biography πŸ”— Business πŸ”— Biography/science and academia πŸ”— Denmark

Agner Krarup Erlang (1 January 1878 – 3 February 1929) was a Danish mathematician, statistician and engineer, who invented the fields of traffic engineering and queueing theory.

By the time of his relatively early death at the age of 51, Erlang had created the field of telephone networks analysis. His early work in scrutinizing the use of local, exchange and trunk telephone line usage in a small community to understand the theoretical requirements of an efficient network led to the creation of the Erlang formula, which became a foundational element of modern telecommunication network studies.

Discussed on