10,000 Matching Annotations
  1. May 2023
    1. A Uniform Resource Name (URN) is a Uniform Resource Identifier (URI) that uses the urn scheme. URNs are globally unique persistent identifiers assigned within defined namespaces so they will be available for a long period of time, even after the resource which they identify ceases to exist or becomes unavailable

      {Persistence}

    1. A truth window (or truth wall[1]) is an opening in a wall surface, created to reveal the layers or components within the wall.[2][3] In a strawbale house, a truth window is often used to show the walls are actually made from straw bales. A small section of a wall is left unplastered on the interior, and a frame is used to create a window which shows only straw, which makes up the inside of the wall.[4]

      I wonder what the history is of the motivation

    1. A reputation system's vulnerability to a Sybil attack depends on how cheaply identities can be generated, the degree to which the reputation system accepts inputs from entities that do not have a chain of trust linking them to a trusted entity, and whether the reputation system treats all entities identically
      • cost of identity generation (needs to be high)
      • active chain of trust
    1. The cartel tested their bulbs and fined manufacturers for bulbs that lasted more than 1,000 hours. A 1929 table listed the amount of Swiss francs paid that depended on the exceeding hours of lifetime.[8]

      ingenuity

    1. The bone is named for Atlas of Greek mythology, for just as Atlas bore the weight of the heavens, the first cervical vertebra supports the head.[1] However, the term atlas was first used by the ancient Romans for the seventh cervical vertebra (C7) due its suitability for supporting burdens.[2] In Greek mythology, Atlas was condemned to bear the weight of the heavens as punishment for rebelling against Zeus. Ancient depictions of Atlas show the globe of the heavens resting at the base of his neck, on C7. Sometime around 1522, anatomists decided to call the first cervical vertebra the atlas.[2] Scholars believe that by switching the designation atlas from the seventh to the first cervical vertebra Renaissance anatomists were commenting that the point of man’s burden had shifted from his shoulders to his head--that man’s true burden was not a physical load, but rather, his mind.[2]

      Deeper significance of naming of a bone

  2. Apr 2023
    1. code refactoring is the process of restructuring existing computer code—changing the factoring—without changing its external behavior. Refactoring is intended to improve the design, structure, and/or implementation of the software (its non-functional attributes), while preserving its functionality. Potential advantages of refactoring may include improved code readability and reduced complexity; these can improve the source code's maintainability and create a simpler, cleaner, or more expressive internal architecture or object model to improve extensibility

      重构目的:抽象与复用

    1. A MUD (/mʌd/; originally multi-user dungeon, with later variants multi-user dimension and multi-user domain)[1][2] is a multiplayer real-time virtual world, usually text-based or storyboarded. MUDs combine elements of role-playing games, hack and slash, player versus player, interactive fiction, and online chat.

      MUD

    1. the trailing-shield head invented by Michael Mallary. This head offered higher field gradients

      How does it work? It seems like the trailing sheild would cause the magnetic field lines to be less perpendicular, and hence less effective. Maybe it's because the increase in field strength outweighs the decrease in perpendicular projection.

    2. uniaxial anisotropy constant Ku, which in turn is higher for a material with a higher magnetic coercivity

      What is the exact relationship between the two?

    3. Perpendicular recording uses higher coercivity materials because the head's write field penetrates the medium more efficiently in the perpendicular geometry.

      If the reason for PMA being better is simply that the write head is better, then there would be no advantage for out of plane spin torques.

    4. Hard disk technology with longitudinal recording has an estimated limit of 100 to 200 gigabit per square inch (16 to 31 Gb/cm2) due to the superparamagnetic effect, though this estimate is constantly changing.

      How does this follow from the superparamagnetic effect?

    1. re. During this period, Agamben began to elaborate his primary concerns, although their political bearings were not yet made explicit. In 1974–1975 he was a fellow at the Warburg Institute, University of London, due to the courtesy of Frances Yates, whom he met through Italo Calvino. During this fellowship, Agamben began to develop his seco

      leoleoeoleoeoel

    1. al-Ghazali to investigate a form of theological occasionalism, or the belief that all causal events and interactions are not the product of material conjunctions but rather the immediate and present will of God.

      al-Ghazali practiced a theological form of occasionalism, which suggested that God was the cause of events. This was rebutted by Averroes a century later, but al-Ghazali's influence on Islamic thought broadly won out.

    2. Al-Ghazali (c. 1058 – 19 December 1111; ٱلْغَزَّالِيُّ), full name Abū Ḥāmid Muḥammad ibn Muḥammad aṭ-Ṭūsiyy al-Ġazzālīy (أَبُو حَامِدٍ مُحَمَّدُ بْنُ مُحَمَّدٍ ٱلطُّوسِيُّ ٱلْغَزَالِيُّ),[a] and known in Persian-speaking countries as Imam Muhammad-i Ghazali (Persian: امام محمد غزالی) or in Medieval Europe by the Latinized as Algazelus or Algazel, was a Persian Muslim polymath.
    1. Google allowed third parties to build their own Wave services (be it private or commercial) because it wanted the Wave protocol to replace the e-mail protocol.[2][16][17] Initially, Google was the only Wave service provider, but it was hoped that other service providers would launch their own Wave services, possibly designing their own unique web-based clients as is common with many email service providers.
    1. Refusing her advances, Siavash will have nothing to do with her stratagems to lure him into intercourse. She fakes a rape and abortion scene and blames the double calamity on Siavash who is forced to prove his innocence by riding through a colossal mountain of fire. Despite his proven innocence, the Shah eventually grows cold towards Siavash as he does not want to punish the woman he loves or anger her father, a powerful ally in the East.

      The character of Siavash in the Shahnameh is a tragic figure who is ultimately destroyed by the jealousy and deceit of others. His story highlights the consequences of false accusations and wrongful judgments, and the importance of upholding justice and truth. Siavash's character also serves as a symbol of cultural exchange, as his parents come from two different cultures and his character embodies the best of both worlds. Overall, Siavash's story is a powerful reminder of the dangers of betrayal and the importance of standing up for what is right.

    1. The dream

      While in prison, Joseph correctly interpreted the dreams of two fellow prisoners, which eventually led to him being summoned by Pharaoh to interpret his own dreams. Joseph's interpretation of Pharaoh's dreams led to him being made the second most powerful man in Egypt, and he was put in charge of managing the country's food supply during a severe famine.

    1. 5 nm nodes in mass production[32][33][38][39][40]

      Mac M2 chip has 5nm nodes and 30 billion transistors. Mac M3 chip is spec'd to have 3nm nodes and 100 billion transistors

    1. Similar to Base64, but modified to avoid both non-alphanumeric characters (+ and /) and letters that might look ambiguous when printed (0 – zero, I – capital i, O – capital o and l – lower-case L).
    1. a change in a weight of evidence of 1 deciban (i.e., a change in the odds from evens to about 5:4) is about as finely as humans can reasonably be expected to quantify their degree of belief in a hypothesis
    1. She partnered with Japanese Canadian author, Kerri Sakamoto, to write a coming-of-age story about a Japanese American girl in 1970s Chicago, resulting in Strawberry Fields.

      Rea Tajiri's parternship with author Kerri Sakamoto to produce the story of Strawberry Fields

    1. eridat ha-dorot (Hebrew: ירידת הדורות), meaning literally "the decline of the generations", or nitkatnu ha-dorot (נתקטנו הדורות), meaning "the diminution of the generations", is a concept in classical Rabbinic Judaism and contemporary Orthodox Judaism expressing a belief in the intellectual inferiority of subsequent, and contemporary Torah scholarship and spirituality in comparison to that of the past.

      Essence of Richie's idea of premodernism

    1. In the Roman Catholic Church, pouring the consecrated wine, the Blood of Christ, or the Host down a sacrarium is forbidden.[3] Extremely rarely, the Eucharistic species spoils or becomes contaminated such that it cannot be consumed. The host is then dissolved in water until it disappears, and then the water is poured down into the sacrarium.

      Spoiled flesh must be diluted till it isn't evident to the eye

    1. It has been estimated that 60% of all bridge failures result from scour and other hydraulic-related causes.[2] It is the most common cause of highway bridge failure in the United States,[3] where 46 of 86 major bridge failures resulted from scour near piers from 1961 to 1976.[4]

      Bridges fail because the water carves out under their supports

    1. Then, if we let g lie in the z direction for simplicity, the ε tensor simplifies to the form:

      Ah, this was in the other paper, and the magneto optics book, without justification.

    2. can obtain a nonlinear optical effect of magneto-optical parametric generation (somewhat analogous to a Pockels effect whose strength is controlled by the applied magnetic field).

      Wild. Something to look into later.

    3. resulting principal axes become complex as well, corresponding to elliptically-polarized light where left- and right-rotating polarizations

      Seems to be the connection between permittivity and the reflectivity matrix

    4. with reversed rotation directions of the two principal polarizations, corresponding to complex-conjugate ε tensors for lossless media, are called optical isomers.

      Trying to disentangle this. What do they mean by reversed rotation of the two principal axes?

    5. s well as Lorentz reciprocity, which is a necessary condition to construct devices such as optical isolators (through which light passes in one direction but not the other).

      Not sure how this stacks up against the wave plate argument you have.

    1. Woods, William A (1970). "Transition Network Grammars for Natural Language Analysis" (PDF). Communications of the ACM. 13 (10): 591–606. doi:10.1145/355598.362773.

      What's in a Link Author

    2. An augmented transition network or ATN is a type of graph theoretic structure used in the operational definition of formal languages, used especially in parsing relatively complex natural languages, and having wide application in artificial intelligence.

      is a - graph theoretic structure

      used in - definition of formal languages - parsing natural languages - AI

      // TrailMarks goes in the opposite direction - practical graph overlaying intentional mark in notation working at the level of associative complexes powered by praxtical extensible co-evolving graph based affordances - progressive injection of structure and interpretational affordances in a new way of augmented writing - augmenting human intellect rather than the machines

    3. from :https://hyp.is/1_kLfN27Ee2Hud9n6Nb6mQ/www.google.co.uk/search?q=ATN+%22augmented+transition+network%22&source=hp&ei=JUg-ZJTZPKnykgX80q-IDg&iflsig=AOEireoAAAAAZD5WNnSfNyhFSjKCxnorfPxc-Zgwoivz&ved=0ahUKEwjU_5bD9bL-AhUpuaQKHXzpC-EQ4dUDCAk&oq=ATN+%22augmented+transition+network%22&gs_lcp=Cgdnd3Mtd2l6EAwyBQgAEKIEMgUIABCiBDIFCAAQogQ6CwguEIAEEMcBENEDOgUIABCABDoFCC4QgAQ6CAguEIAEENQCOgsILhCABBDHARCvAToNCC4QgAQQxwEQ0QMQCjoHCAAQgAQQCjoGCAAQFhAeOggIABCKBRCGAzoFCCEQoAE6BAghEBU6BwghEKABEAo6CAghEBYQHhAdOgoIIRAWEB4QDxAdOgQIIRAKULUOWJFhYMZyaAFwAHgAgAGGAYgBvxmSAQUyMi4xMpgBAKABAbABAA&sclient=gws-wiz

    1. The Imperial Wireless Chain was a strategic international communications network of powerful long range radiotelegraphy stations, created by the British government to link the countries of the British Empire.

      Why is this name so powerful

    1. Since 2012, he leads the division of Economic Studies, Fundación Acordar, a think tank of national scope.[5] He is also a member of the B20, the Economic Policy Group of International Chamber of Commerce (an advisor to the G20), and the World Economic Forum. He is a specialist in economic growth and has been professor of several economic subjects in Argentine universities and abroad. He has authored nine books.[6] Currently, he works for Argentine tycoon Eduardo Eurnekián.

      dsSA

    2. (2014) 'De los picapiedras a los supersónicos: Maravillas del progreso tecnológico con convergencia', Revista Actualidad Económica, Universidad Nacional de Córdoba, Facultad de Ciencias Económicas, Instituto de Economía y Finanzas, vol. 0(83), pp. 5–18.

      milei4 VLLC

    1. Literary Machines

      El software de Literary Machines ofrecía una forma innovadora de estructurar y navegar por la información en la pantalla, permitiendo al usuario navegar por enlaces y organizar información de formas no lineales. También presentaba una visión de cómo las computadoras podían ser utilizadas para mejorar la comunicación y el acceso a la información.

      Aunque el software de Literary Machines nunca alcanzó una gran popularidad, tuvo una influencia significativa en el desarrollo de la teoría y la práctica de la hipertextualidad y la creación de software de escritura y publicación en línea. El trabajo de Nelson en el diseño de Literary Machines ayudó a establecer la idea de que las computadoras podrían ser utilizadas para crear un entorno de publicación más democrático y accesible, lo que a su vez ha influido en el desarrollo de tecnologías web como los wikis y los blogs.

    1. Contents move to sidebar hide (Top) 1Format 2History 3Literary reception 4See also 5Notes 6References 7External links Toggle the table of contents Toggle the table of contents Choose Your Own Adventure

      Creo que los libros de "Choose Your Own Adventure" son una excelente herramienta para fomentar la lectura y la imaginación en niños y jóvenes. Asi como su capacidad de tomar decisiones y de afectar el curso de una historia puede ser motivador para ellos. Además, al ofrecer diferentes opciones y finales, los libros ayudan a desarrollar la habilidad de tomar decisiones y entender que cada elección tiene una consecuencia.

    2. La famosa frase “Elige tu propia aventura” nació cuando Ed Packard vendió su segundo y tercer libro. El segundo, Deadwood City , era una saga del oeste, y a la editora junior Dinah Stevenson se le asignó la tarea de crear una línea de portada que explicara este estilo narrativo desconocido a los lectores; A Stevenson se le ocurrió "Elige tu propia aventura en el Salvaje Oeste". [ cita requerida ] La frase se adaptó para el siguiente título con el eslogan, El tercer planeta de Altair: Elige tu propia aventura en el espacio exterior .

      Propone otras formas de interacción con los textos desde la comprensión hasta la producción textual .

    1. During that time he deployed it in crucial experiments involving polarization, birefringence, and optical rotation,[3][4][5] all of which contributed to the eventual acceptance of his transverse-wave theory of light.

      That's crazy that that's how the transverse theory of light came about.

    1. Otro papel importante de la practicidad en la tecnología es el método de asociación y selección. "Puede haber millones de pensamientos finos, y el relato de la experiencia en la que se basan, todos encerrados dentro de paredes de piedra de forma arquitectónica aceptable;

      Importante para la organización y actualización de la información.

    2. De hecho, hoy en día, "la ciencia ha proporcionado la comunicación más rápida entre individuos; ha proporcionado un registro de ideas y ha permitido al hombre manipular y hacer extractos de ese registro para que el conocimiento evolucione y perdure a lo largo de la vida de una raza en lugar de de un individuo".

      Se podría hablar de una construcción colectiva de conocimiento.

    3. De hecho, hoy en día, "la ciencia ha proporcionado la comunicación más rápida entre individuos; ha proporcionado un registro de ideas y ha permitido al hombre manipular y hacer extractos de ese registro para que el conocimiento evolucione y perdure a lo largo de la vida de una raza en lugar de de un individuo".

      Permite que fluya de manera rápida y efectiva el conocimiento.

    1. flow in the x-direction of spins polarized along y is transformed to a flow in the y-direction of spins polarized along x.

      Why does this happen?

    1. For now left and forlorn

      shift in use of tenses further underlines gap between lover's blissful fancy and the cruel reality he suffers

      longing for bliss in imagined action of 'infinitive verbs' 'to kiss' or 'to touch': suffering is real and personal

    1. A PDE is called linear if it is linear in the unknown and its derivatives

      where ai and f are functions of the independent variables x and y only. (Often the mixed-partial derivatives uxy and uyx will be equated, but this is not required for the discussion of linearity.) If the ai are constants (independent of x and y) then the PDE is called linear with constant coefficients. If f is zero everywhere then the linear PDE is homogeneous, otherwise it is inhomogeneous.

    1. The story of the film centers on Irene Kawai, a Japanese American teenager in Chicago in the 1970s who is haunted by a photo of her grandfather she never knew standing by a barracks in a World War II internment camp for Japanese Americans.

      Rea Tajiri's 1977 film Strawberry Fields narrates the story of a young Japanese American woman that embarks on a journey to discover her family history during the Japanese American Internment

    1. e magnetization field or M-field can be defined according to the following equation: M = d m d V {\displaystyle \mathbf {M} ={\frac {\mathrm {d} \mathbf {m} }{\mathrm {d} V}}}

      This equation \(\bm{M} = d\bm{m}/dV\) is rather bizarre. How do you take a derivative with respect to a volume?

      This makes sense if you take the definition of m as an indefinite integral, rather than an integral evaluated over all space.

      In that context, m is a function of the volume you have included so far. This makes the derivative make sense, because as you include more volume, the derivative is how much the total magnetization increases by.

    1. t the magnetization tries to reduce the poles as much as possible

      Justification probably being that the like poles repel each other, and like poles attract and annihilate.

    1. In this way, an NTM can be thought of as simultaneously exploring all computational possibilities in parallel and selecting an accepting branch

      Non-deterministic Turing Machines are able to get lucky and choose the single path to the answer in polynomial time, or be given a "hint" or "proof" or "certificate" for that path. This isn't realistic, but it separates the difficulty of the problem of verifying a solution and finding one into two different tasks.

    2. Computational problems[edit] Intuitively, a computational problem is just a question that can be solved by an algorithm. For example, "is the natural number n {\displaystyle n} prime?" is a computational problem. A computational problem is mathematically represented as the set of answers to the problem. In the primality example, the problem (call it PRIME {\displaystyle {\texttt {PRIME}}} ) is represented by the set of all natural numbers that are prime: PRIME = { n ∈ N | n  is prime } {\displaystyle {\texttt {PRIME}}=\{n\in \mathbb {N} |n{\text{ is prime}}\}} . In the theory of computation, these answers are represented as strings; for example, in the primality example the natural numbers could be represented as strings of bits that represent binary numbers. For this reason, computational problems are often synonymously referred to as languages, since strings of bits represent formal languages (a concept borrowed from linguistics); for example, saying that the PRIME {\displaystyle {\texttt {PRIME}}} problem is in the complexity class NP is equivalent to saying that the language PRIME {\displaystyle {\texttt {PRIME}}} is in NP.

      Explanation of why computational complexity class proofs with Turing Machines use "strings" instead of algorithms or programs.

    1. Presburger arithmetic is much weaker than Peano arithmetic, which includes both addition and multiplication operations. Unlike Peano arithmetic, Presburger arithmetic is a decidable theory. This means it is possible to algorithmically determine, for any sentence in the language of Presburger arithmetic, whether that sentence is provable from the axioms of Presburger arithmetic. The asymptotic running-time computational complexity of this algorithm is at least doubly exponential, however, as shown by Fischer & Rabin (1974).

      This is an example of a decision problem that is at least doubly exponential \(2^{2^n}\). It is a simpler form of arithmetic where the Halting problem/incompleteness theorem does not apply.

    1. At present, all known algorithms for NP-complete problems require time that is superpolynomial in the input size, in fact exponential in O ( n k ) {\displaystyle O(n^{k})} [clarify] for some k > 0 {\displaystyle k>0} and it is unknown whether there are any faster algorithms.

      So how hard are NP-complete problems?

    2. The Subgraph Isomorphism problem is NP-complete. The graph isomorphism problem is suspected to be neither in P nor NP-complete, though it is in NP. This is an example of a problem that is thought to be hard, but is not thought to be NP-complete. This class is called NP-Intermediate problems and exists if and only if P≠NP.

      There might even be some problems in NP but not in P and that are not NP-complete.

  3. Mar 2023
    1. line through the middle of a stationary process then it should be flat; it may have 'seasonal' cycles, but o

      Doesn't that break the definition? The definition was that the probability distribution did not change with time.

    1. rence is represented as a Gaussian function expressed as[13]

      Not sure where this comes from. Citation does not appear to have this equation

    2. he former being an equivalent to the coherence length of the light source

      Would it be better to just use white light, rather than a SLED then? Or does that cause to thin of a cross section, and too little signal?

    3. ut scattering is too small to be detected. No special preparation of a biological specimen is required, and images can be obtained ‘non-contact’ or through a transparent window or membrane. It is also important to note that the laser output from the instruments used is low – eye-safe near-infrared or visible-light[29]

      Too little light to be detected, yet the light intensity is low. Can you penetrate deeper with just a stronger beam?

    1. capture a broad band of light and focus it into each pinhole significantly increasing the amount of light directed into each pinhole and reducing the amount of light blocked by the spinning-disk.

      How does this not defeat the purpose of the pinhole blocking unwanted light?

    1. Perspectivas en el uso de la ciencia

      "As We May Think" es un ensayo escrito por Vannevar Bush en 1945, en el que se presenta su visión de cómo la tecnología de la información podría mejorar la capacidad de los seres humanos para almacenar, acceder y procesar información. Por ejemplo, este autor describe una máquina de almacenamiento y recuperación de información, a la que llama "Memex", cuyo propósito sería que los usuarios pudiesen tener acceso a grandes cantidades de información de manera rápida y fácil. Me parece importante en Bush que destaca la importancia de la colaboración y el intercambio de información entre expertos en diferentes campos y también argumenta que la tecnología de la información tiene el potencial de ayudar a los expertos en distintos campos a compartir sus conocimientos y trabajar juntos para resolver problemas complejos.

    2. El memex, en esencia, refleja una biblioteca de saberes colectivos almacenados en una maquinaria descrita en su ensayo como “un mueble”. [3] La publicación en Atlantic del artículo de Bush fue seguida, en el número del 10 de septiembre de 1945, de la revista Life , por una reimpresión que mostraba ilustraciones del escritorio memex y la máquina de escribir automática propuestos.

      El Memex se basaba en la idea de que la capacidad humana para almacenar y recuperar información estaba limitada y que, por lo tanto, era necesario desarrollar herramientas que permitieran ampliar esa capacidad. A pesar de que el Memex nunca se construyó en realidad, se considera una visión innovadora del potencial de la tecnología de la información para mejorar la capacidad de los seres humanos para acceder y procesar información.

    3. Durante años, los inventos han ampliado los poderes físicos de las personas en lugar de los poderes de su mente. Argumenta que están a la mano los instrumentos que, si se desarrollan adecuadamente, darán a la sociedad acceso y dominio sobre el conocimiento heredado de las épocas. La perfección de estos instrumentos pacíficos, sugiere, debería ser el primer objetivo de nuestros científicos.

      Esto es buenísimo para la innovación de nuevos inventos que pueden beneficiar la humanidad por medio de la imaginación del ser humano pero creo se debe ser limitado debido a la gran imaginación que contiene el ser humano pero dicha imaginación se puede crear ideas buenas, malas y desechables.

    4. Bush envisioned the ability to retrieve several articles or pictures on one screen, with the possibility of writing comments that could be stored and recalled together

      Se puede decir, que Bush predijo el concepto de la web 2.0 o el trabajo cooperativo en línea.

    1. This logos holds always but humans always prove unable to ever understand it,

      Sounds like the Tao and the first verse of the Tao te king

    1. The term appeared in Freud's Civilization and Its Discontents (1929–30) in relation to the application of the inborn aggression in man to ethnic (and other) conflicts, a process still considered by Freud, at that point, as a convenient and relatively harmless satisfaction of the inclination to aggression.[3]

      Sigmund Freud

    2. In psychoanalysis, the narcissism of small differences (German: der Narzissmus der kleinen Differenzen) is the idea that the more a relationship or community shares commonalities, the more likely the people in it are to engage in interpersonal feuds and mutual ridicule because of hypersensitivity to minor differences perceived in each other.[1] The term was coined by Sigmund Freud in 1917, based on the earlier work of English anthropologist Ernest Crawley. Crawley theorized that each individual is separated from others by a taboo of personal isolation, which is effectively a narcissism of minor differences.[2

      narcissism of minor differences

    1. Tag management system

      helps manage the lifecycle of digital marketing tags (sometimes referred to as tracking pixels or web beacons), used to track activity on digital properties, such as websites and web applications.

    1. Methexis as participation suggests an alternative to Aristotelian mimesis. Both theatrical and philosophical.

      Teskey on allegory asserts that Platonism cannot account for the gap between ideal form and particular object. He proposes that allegory as a form arises out of this inability to join the two, and that it does so by importing the metaphor of copulation. For Teskey, this means that allegory is tainted (by way of sedimentation) with a kind of primary sexual violence.

      But does the notion of methexis as alternative to mimesis suggest an alternative conception of allegory?

    1. Graeber's father, Kenneth, was affiliated with the Young Communist League in college, participated in the Spanish Revolution in Barcelona and fought in the Spanish Civil War.[9] He later worked as a plate stripper on offset presses.

      What a house!

    1. One-time passwords are generated on demand by a dedicated OATH OTP authenticator that encapsulates a secret that was previously shared with the verifier. Using the authenticator, the claimant generates an OTP using a cryptographic method. The verifier also generates an OTP using the same cryptographic method. If the two OTP values match, the verifier can conclude that the claimant possesses the shared secret.
    1. The term originated as a whimsical irregular form of the verb think. It refers to the original use of thunks in ALGOL 60 compilers, which required special analysis (thought) to determine what type of routine to generate.
    1. One estimate says that between 12,000 to 20,000 books and journals, and even larger number of images and sex subjects, were destroyed.[68] Another estimate says that about 25,000 books were destroyed.[71]

      12-25 thousand books, not all from insitut but mostly

    1. The university library was renovated between 2013 and 2017.[40] The RUG has a branch in Leeuwarden.[41] Plans to establish a "branch campus" in China's Yantai were called off in January 2018, and the University Museum is now in the process of being established.[42]

      This paragraph is not quite coherent.

    1. Wilusa (Hittite: 𒌷𒃾𒇻𒊭 URUwi5-lu-ša) or Wilusiya was a Late Bronze Age city in western Anatolia known from references in fragmentary Hittite records. The city is notable for its identification with the archaeological site of Troy, and thus its potential connection to the legendary Trojan War.

      Wilusa is a city in western Anatolia in the Late Bronze Age which we identify as a Hittite word for the city of Troy.

      Mentioned briefly in lecture 10 of Ancient Empires before Alexander.

    1. The Americo-Liberian settlers did not relate well to the indigenous peoples they encountered, especially those living in the more isolated interior. Colonial settlements were raided by the Kru and Grebo from their inland chiefdoms. Americo-Liberians promoted religious organizations to set up missions and schools to educate the native populace.[11] Americo-Liberians formed into a small elite that held disproportionate political power; indigenous Africans were excluded from birthright citizenship in their own land until 1904

      lmao

    1. In short, in the absence of legal tender laws, the seller will not accept anything but money of certain value (good money), but the existence of legal tender laws will cause the buyer to offer only money with the lowest commodity value (bad money), as the creditor must accept such money at face value.

      During the coronavirus pandemic, many vendors facing inflation began to pass along the 3% (or more) credit card processing fees to their customers. Previously many credit card companies would penalize vendors for doing this (and possibly cut them off). This fee was considered "the cost of doing business".

      Some vendors prior to the pandemic would provide cash discounts on large orders because they could circumvent these fees.

      Does this affect (harm) inflation? Is it a form of Gresham's law at play here? What effect does this have on credit card companies? Are they so integral to the system that it doesn't affect them, but instead the customers using their legal tender?

    2. In economics, Gresham's law is a monetary principle stating that "bad money drives out good". For example, if there are two forms of commodity money in circulation, which are accepted by law as having similar face value, the more valuable commodity will gradually disappear from circulation.[1][2] The law was named in 1860 by economist Henry Dunning Macleod after Sir Thomas Gresham (1519–1579), an English financier during the Tudor dynasty. Gresham had urged Queen Elizabeth to restore confidence in then-debased English currency. The concept was thoroughly defined in medieval Europe by Nicolaus Copernicus and known centuries earlier in classical Antiquity, the Middle East and China.

      Gresham's law is an economic monetary principle which states that "bad money drives out good."

      It relates to commodity value, particularly in coinage, where cheaper base metals in coins will cause more expensive coinage to disappear from circulation.

    1. Cytokine storm

      Wikipedia, qualche anno fa, descriveva la tempesta citochinica come segue ma dopo alcuni mesi si premurarono di cancellarla in quanto compromettente per loro e per bigpharma...Ve la proponiamo in originale..

      🇮🇹 "La sindrome da rilascio di citochine, nota anche come reazione all'infusione, è una forma di sindrome da risposta infiammatoria sistemica che si presenta come una complicazione di alcune malattie o infezioni ed è anche un effetto avverso di alcuni farmaci anticorpali monoclonali, nonché delle terapie a cellule T adottive. Casi gravi sono stati chiamati tempeste di citochine."

      🇬🇧 "Cytokine release syndrome, also known as an infusion reaction, is a form of systemic inflammatory response syndrome that arises as a complication of some diseases or infections, and is also an adverse effect of some monoclonal antibody drugs, as well as adoptive T-cell therapies. Severe cases have been called cytokine storms."

      Se controllate il testo attuale a fianco riportato, della descrizione qui sopra non vi è più traccia...(non vi è più il riferimento alla reazione avversa ad alcuni anticorpi monoclonali, intrigante, vero?)...

      Attraverso la WayBackMachine abbiamo recuperato la versione originale (poi cancellata da Wikipedia dopo il 2018) da noi riportata qui sopra.

  4. Feb 2023
    1. the energies of the bands near the surface are often pinned to the Fermi level, due to the influence of surface states.[

      Not sure why this is the case.

    1. Dinkelberg's wife, Emily, destitute and living in an "old peoples' home" died 10 years later July 3, 1945. Her body remained unclaimed for over a week and was about to be donated to a medical school when a Chicago attorney brought the matter to the Tribune.[23] The following day her body was claimed by the A.I.A. and they paid for her burial next to Fred. Her grave is unmarked.

      This really hurts to read... nobody can escape. Don't undervalue money or family.

    1. After the Norman conquest in 1066, Old English was replaced, for a time, by Anglo-Norman (also known as Anglo-Norman French) as the language of the upper classes

      Ovo nije tačno!

    1. Event sourcing

      Event sourcing is an architectural pattern in which entities do not track their internal state by means of direct serialization or object-relational mapping, but by reading and committing events to an event store.