Random Articles (Page 6)

Have a deep view into what people are curious about.

🔗 Betteridge's Law of Headlines

🔗 Journalism

Betteridge's law of headlines is an adage that states: "Any headline that ends in a question mark can be answered by the word no". It is named after Ian Betteridge, a British technology journalist who wrote about it in 2009, although the principle is much older. As with similar "laws" (e.g., Murphy's law), it is intended to be humorous rather than the literal truth. The adage fails to make sense with questions that are more open-ended than strict yes-no questions.

The maxim has been cited by other names since 1991, when a published compilation of Murphy's Law variants called it "Davis's law", a name that also crops up online (such as cited by linguist Mark Liberman), without any explanation of who Davis was. It has also been referred to as the "journalistic principle" and in 2007 was referred to in commentary as "an old truism among journalists".

Discussed on

🔗 Lipogram

🔗 Writing systems

A lipogram (from Ancient Greek: λειπογράμματος, leipográmmatos, "leaving out a letter") is a kind of constrained writing or word game consisting of writing paragraphs or longer works in which a particular letter or group of letters is avoided. Extended Ancient Greek texts avoiding the letter sigma are the earliest examples of lipograms.

Writing a lipogram may be a trivial task when avoiding uncommon letters like Z, J, Q, or X, but it is much more challenging to avoid common letters like E, T, or A in the English language, as the author must omit many ordinary words. Grammatically meaningful and smooth-flowing lipograms can be difficult to compose. Identifying lipograms can also be problematic, as there is always the possibility that a given piece of writing in any language may be unintentionally lipogrammatic. For example, Poe's poem The Raven contains no Z, but there is no evidence that this was intentional.

A pangrammatic lipogram is a text that uses every letter of the alphabet except one. For example, "The quick brown fox jumped over the lazy dog" omits the letter S, which the usual pangram includes by using the word jumps.

Discussed on

🔗 Warchalking

🔗 Computing 🔗 Computer Security 🔗 Computer Security/Computing 🔗 Computing/Computer Security 🔗 Computing/Networking

Warchalking is the drawing of symbols in public places to advertise an open Wi-Fi network. Inspired by hobo symbols, the warchalking marks were conceived by a group of friends in June 2002 and publicised by Matt Jones who designed the set of icons and produced a downloadable document containing them. Within days of Jones publishing a blog entry about warchalking, articles appeared in dozens of publications and stories appeared on several major television news programs around the world.

The word is formed by analogy to wardriving, the practice of driving around an area in a car to detect open Wi-Fi nodes. That term in turn is based on wardialing, the practice of dialing many phone numbers hoping to find a modem.

Having found a Wi-Fi node, the warchalker draws a special symbol on a nearby object, such as a wall, the pavement, or a lamp post. Those offering Wi-Fi service might also draw such a symbol to advertise the availability of their Wi-Fi location, whether commercial or personal.

Discussed on

🔗 Sexy prime

🔗 Mathematics

Sexy primes are prime numbers that differ from each other by 6. For example, the numbers 5 and 11 are both sexy primes, because 11 - 5 = 6.

The term "sexy prime" is a pun stemming from the Latin word for six: sex.

If p + 2 or p + 4 (where p is the lower prime) is also prime, then the sexy prime is part of a prime triplet.

Discussed on

🔗 Gresham's Law

🔗 Economics 🔗 Numismatics

In economics, Gresham's law is a monetary principle stating that "bad money drives out good". For example, if there are two forms of commodity money in circulation, which are accepted by law as having similar face value, the more valuable commodity will gradually disappear from circulation.

The law was named in 1860 by Henry Dunning Macleod, after Sir Thomas Gresham (1519–1579), who was an English financier during the Tudor dynasty. However, the concept itself had been previously expressed by others, including by Aristophanes in his play The Frogs, which dates from around the end of the 5th century BC, in the 14th century by Nicole Oresme c. 1350, in his treatise On the Origin, Nature, Law, and Alterations of Money, and by jurist and historian Al-Maqrizi (1364–1442) in the Mamluk Empire; and in 1519 by Nicolaus Copernicus in a treatise called Monetae cudendae ratio For this reason, it is occasionally known as the Gresham–Copernicus' law.

Discussed on

🔗 (e^(i * pi)) + 1 = 0

🔗 Mathematics

In mathematics, Euler's identity (also known as Euler's equation) is the equality

e i π + 1 = 0 {\displaystyle e^{i\pi }+1=0}

where

e is Euler's number, the base of natural logarithms,
i is the imaginary unit, which by definition satisfies i2 = −1, and
π is pi, the ratio of the circumference of a circle to its diameter.

Euler's identity is named after the Swiss mathematician Leonhard Euler. It is considered to be an exemplar of mathematical beauty as it shows a profound connection between the most fundamental numbers in mathematics.

Discussed on

🔗 Wine-dark sea

🔗 Classical Greece and Rome

The wine-dark sea is a traditional English translation of οἶνοψ πόντος (oînops póntos, IPA: /ôi̯.nops pón.tos/), from οἶνος (oînos, “wine”) + ὄψ (óps, “eye; face”). It is an epithet in Homer of uncertain meaning: a literal translation is "wine-face sea" (wine-faced, wine-eyed). It is attested five times in the Iliad and twelve times in the Odyssey, often to describe rough, stormy sea.

The only other use of oînops in the works of Homer is for oxen (once in both his epic poems), where it seems to describe a reddish color, which has given rise to various speculations about what it could mean about either the state of Aegean Sea during antiquity or the color perception of Ancient Greeks.

Discussed on

🔗 M.2

🔗 Computing 🔗 Computing/Computer hardware

M.2, formerly known as the Next Generation Form Factor (NGFF), is a specification for internally mounted computer expansion cards and associated connectors. M.2 replaces the mSATA standard, which uses the PCI Express Mini Card physical card layout and connectors. Employing a more flexible physical specification, the M.2 allows different module widths and lengths, and, paired with the availability of more advanced interfacing features, makes the M.2 more suitable than mSATA in general for solid-state storage applications, and particularly in smaller devices such as ultrabooks and tablets.

Computer bus interfaces provided through the M.2 connector are PCI Express 3.0 (up to four lanes), Serial ATA 3.0, and USB 3.0 (a single logical port for each of the latter two). It is up to the manufacturer of the M.2 host or module to select which interfaces are to be supported, depending on the desired level of host support and device type. The M.2 connector keying notches denote various purposes and capabilities of both M.2 hosts and devices. The unique key notches of M.2 modules also prevent them from being inserted into incompatible host connectors.

The M.2 specification supports NVM Express (NVMe) as the logical device interface for M.2 PCI Express SSDs, in addition to supporting legacy Advanced Host Controller Interface (AHCI) at the logical interface level. While the support for AHCI ensures software-level backward compatibility with legacy SATA devices and legacy operating systems, NVM Express is designed to fully utilize the capability of high-speed PCI Express storage devices to perform many I/O operations in parallel.

Discussed on

  • "M.2" | 2018-06-03 | 17 Upvotes 4 Comments

🔗 Toom–Cook multiplication

🔗 Mathematics

Toom–Cook, sometimes known as Toom-3, named after Andrei Toom, who introduced the new algorithm with its low complexity, and Stephen Cook, who cleaned the description of it, is a multiplication algorithm for large integers.

Given two large integers, a and b, Toom–Cook splits up a and b into k smaller parts each of length l, and performs operations on the parts. As k grows, one may combine many of the multiplication sub-operations, thus reducing the overall complexity of the algorithm. The multiplication sub-operations can then be computed recursively using Toom–Cook multiplication again, and so on. Although the terms "Toom-3" and "Toom–Cook" are sometimes incorrectly used interchangeably, Toom-3 is only a single instance of the Toom–Cook algorithm, where k = 3.

Toom-3 reduces 9 multiplications to 5, and runs in Θ(nlog(5)/log(3)) ≈ Θ(n1.46). In general, Toom-k runs in Θ(c(k) ne), where e = log(2k − 1) / log(k), ne is the time spent on sub-multiplications, and c is the time spent on additions and multiplication by small constants. The Karatsuba algorithm is a special case of Toom–Cook, where the number is split into two smaller ones. It reduces 4 multiplications to 3 and so operates at Θ(nlog(3)/log(2)) ≈ Θ(n1.58). Ordinary long multiplication is equivalent to Toom-1, with complexity Θ(n2).

Although the exponent e can be set arbitrarily close to 1 by increasing k, the function c unfortunately grows very rapidly. The growth rate for mixed-level Toom–Cook schemes was still an open research problem in 2005. An implementation described by Donald Knuth achieves the time complexity Θ(n 22 log n log n).

Due to its overhead, Toom–Cook is slower than long multiplication with small numbers, and it is therefore typically used for intermediate-size multiplications, before the asymptotically faster Schönhage–Strassen algorithm (with complexity Θ(n log n log log n)) becomes practical.

Toom first described this algorithm in 1963, and Cook published an improved (asymptotically equivalent) algorithm in his PhD thesis in 1966.

Discussed on