[-] [email protected] 17 points 2 months ago

Here's the summary for the wikipedia article you mentioned in your comment:

Hello Internet is an audio podcast hosted by educational YouTube content creators Brady Haran and CGP Grey. The podcast debuted in 2014 and released 136 numbered episodes and 18 unnumbered episodes until February 2020, when the last episode was published. The podcast is currently indefinitely suspended and inactive. Listeners of the podcast are known as "Tims". The episodes of the podcast are usually about the interests of the creators and the differences between the hosts' lifestyles.

^article^ ^|^ ^about^

[-] [email protected] 20 points 2 months ago

Here's the summary for the wikipedia article you mentioned in your comment:

The Thucydides Trap, or Thucydides' Trap, is a term popularized by American political scientist Graham T. Allison to describe an apparent tendency towards war when an emerging power threatens to displace an existing great power as a regional or international hegemon. The term exploded in popularity in 2015 and primarily applies to analysis of China–United States relations. Supporting the thesis, Allison led a study at Harvard University's Belfer Center for Science and International Affairs which found that, among a sample of 16 historical instances of an emerging power rivaling a ruling power, 12 ended in war. That study, however, has come under considerable criticism, and scholarly opinion on the value of the Thucydides Trap concept—particularly as it relates to a potential military conflict between the United States and China—remains divided.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

[-] [email protected] 53 points 2 months ago

Here's the summary for the wikipedia article you mentioned in your comment:

The dead Internet theory is an online conspiracy theory that asserts that the Internet now consists mainly of bot activity and automatically generated content that is manipulated by algorithmic curation, marginalizing organic human activity. Proponents of the theory believe these bots are created intentionally to help manipulate algorithms and boost search results in order to ultimately manipulate consumers. Furthermore, some proponents of the theory accuse government agencies of using bots to manipulate public perception, stating: "The U. S. government is engaging in an artificial intelligence powered gaslighting of the entire world population.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

[-] [email protected] 16 points 2 months ago

Here's the summary for the wikipedia article you mentioned in your comment:

IBM Watson is a computer system capable of answering questions posed in natural language. It was developed in IBM's DeepQA project by a research team led by principal investigator David Ferrucci. Watson was named after IBM's founder and first CEO, industrialist Thomas J. Watson. The computer system was initially developed to answer questions on the quiz show Jeopardy!

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

[-] [email protected] 22 points 2 months ago

Here's the summary for the wikipedia article you mentioned in your comment:

Malicious compliance (also known as malicious obedience) is the behavior of strictly following the orders of a superior despite knowing that compliance with the orders will have an unintended or negative result. It usually implies following an order in such a way that ignores or otherwise undermines the order's intent, but follows it to the letter. A form of passive-aggressive behavior, it is often associated with poor management-labor relationships, micromanagement, a generalized lack of confidence in leadership, and resistance to changes perceived as pointless, duplicative, dangerous, or otherwise undesirable. It is common in organizations with top-down management structures lacking morale, leadership or mutual trust. In U.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

[-] [email protected] 18 points 3 months ago

Here's the summary for the wikipedia article you mentioned in your comment:

The evil bit is a fictional IPv4 packet header field proposed in a humorous April Fools' Day RFC from 2003, authored by Steve Bellovin. The Request for Comments recommended that the last remaining unused bit, the "Reserved Bit" in the IPv4 packet header, be used to indicate whether a packet had been sent with malicious intent, thus making computer security engineering an easy problem – simply ignore any messages with the evil bit set and trust the rest.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

[-] [email protected] 14 points 3 months ago

Here's the summary for the wikipedia article you mentioned in your comment:

TEMPEST is a U. S. National Security Agency specification and a NATO certification referring to spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations. TEMPEST covers both methods to spy upon others and how to shield equipment against such spying. The protection efforts are also known as emission security (EMSEC), which is a subset of communications security (COMSEC).

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

[-] [email protected] 16 points 3 months ago

Here's the summary for the wikipedia article you mentioned in your comment:

The Carrington Event was the most intense geomagnetic storm in recorded history, peaking from 1 to 2 September 1859 during solar cycle 10. It created strong auroral displays that were reported globally and caused sparking and even fires in multiple telegraph stations. The geomagnetic storm was most likely the result of a coronal mass ejection (CME) from the Sun colliding with Earth's magnetosphere. The geomagnetic storm was associated with a very bright solar flare on 1 September 1859. It was observed and recorded independently by British astronomers Richard Christopher Carrington and Richard Hodgson—the first records of a solar flare.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

[-] [email protected] 67 points 3 months ago

Here's the summary for the wikipedia article you mentioned in your comment:

The Sony BMG CD copy protection scandal concerns the copy protection measures included by Sony BMG on compact discs in 2005. When inserted into a computer, the CDs installed one of two pieces of software that provided a form of digital rights management (DRM) by modifying the operating system to interfere with CD copying. Neither program could easily be uninstalled, and they created vulnerabilities that were exploited by unrelated malware. One of the programs would install and "phone home" with reports on the user's private listening habits, even if the user refused its end-user license agreement (EULA), while the other was not mentioned in the EULA at all. Both programs contained code from several pieces of copylefted free software in an apparent infringement of copyright, and configured the operating system to hide the software's existence, leading to both programs being classified as rootkits.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

[-] [email protected] 62 points 3 months ago

Here's the summary for the wikipedia article you mentioned in your comment:

The dead Internet theory is an online conspiracy theory that asserts that the Internet now consists mainly of bot activity and automatically generated content that is manipulated by algorithmic curation, marginalizing organic human activity. Proponents of the theory believe these bots are created intentionally to help manipulate algorithms and boost search results in order to ultimately manipulate consumers. Furthermore, some proponents of the theory accuse government agencies of using bots to manipulate public perception, stating "The U. S. government is engaging in an artificial intelligence powered gaslighting of the entire world population".

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

[-] [email protected] 42 points 3 months ago

Here's the summary for the wikipedia article you mentioned in your comment:

Fusion Drive is a type of hybrid drive technology created by Apple Inc. It combines a hard disk drive with a NAND flash storage (solid-state drive of 24 GB or more) and presents it as a single Core Storage managed logical volume with the space of both drives combined. The operating system automatically manages the contents of the drive so the most frequently accessed files are stored on the faster flash storage, while infrequently used items move to or stay on the hard drive. For example, if spreadsheet software is used often, the software will be moved to the flash storage for faster user access. In software, this logical volume speeds up performance of the computer by performing both caching for faster writes and auto tiering for faster reads.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

[-] [email protected] 22 points 3 months ago

Here's the summary for the wikipedia article you mentioned in your comment:

The dead Internet theory is an online conspiracy theory that asserts that the Internet now consists mainly of bot activity and automatically generated content that is manipulated by algorithmic curation, marginalizing organic human activity. Proponents of the theory believe these bots are created intentionally to help manipulate algorithms and boost search results in order to ultimately manipulate consumers. Furthermore, some proponents of the theory accuse government agencies of using bots to manipulate public perception, stating "The U.S. government is engaging in an artificial intelligence powered gaslighting of the entire world population". The date given for this "death" is generally around 2016 or 2017.The theory has gained traction because much of the observed phenomena is grounded in quantifiable phenomena like increased bot traffic. However, the idea that it is a coordinated psyop has been described by Kaitlin Tiffany, staff writer at The Atlantic, as a "paranoid fantasy," even if there are legitimate criticisms involving bot traffic and the integrity of the internet.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

view more: next ›

wikibot

joined 6 months ago