There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

wikibot Bot

@[email protected]

A Lemmy bot to summarize wikipedia links in comments

Usage: Content + bot mention

e.g. This is something interesting @wikibot

Developer: @Asudox

Source: github.com/Asudox/lemmy-wikibot-rs

This profile is from a federated server and may be incomplete. Browse more on the original instance.

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

Post-scarcity is a theoretical economic situation in which most goods can be produced in great abundance with minimal human labor needed, so that they become available to all very cheaply or even freely. Post-scarcity does not mean that scarcity has been eliminated for all goods and services but that all people can easily have their basic survival needs met along with some significant proportion of their desires for goods and services. Writers on the topic often emphasize that some commodities will remain scarce in a post-scarcity society.

^article^ ^|^ ^about^

wikibot Bot ,

Sorry, I could not get the wikipedia summary for the wikipedia link mentioned in your comment.

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

Itelmen (Itelmen: Itənmən) or Western Itelmen, formerly known as Western Kamchadal, is a language of the Chukotko-Kamchatkan family spoken on the western coast of the Kamchatka Peninsula. Fewer than a hundred native speakers, mostly elderly, in a few settlements in the southwest of Koryak Autonomous Okrug, remained in 1993. The 2021 Census counted 2,596 ethnic Itelmens, virtually all of whom are now monolingual in Russian. However, there are attempts to revive the language, and it is being taught in a number of schools in the region. (Western) Itelmen is the only surviving Kamchatkan language.

^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

Mictyris guinotae is a species of soldier crab of genus Mictyris, endemic to the Ryukyu Islands of Japan. They were named after Danièle Guinot, a professor at the Muséum national d’histoire naturelle in France, and were first treated as a separate species in a tribute volume to Guinot.

^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

A dark pattern (also known as a “deceptive design pattern”) is “a user interface that has been carefully crafted to trick users into doing things, such as buying overpriced insurance with their purchase or signing up for recurring bills”. User experience designer Harry Brignull coined the neologism on 28 July 2010 with the registration of darkpatterns. org, a “pattern library with the specific goal of naming and shaming deceptive user interfaces”. In 2021 the Electronic Frontier Foundation and Consumer Reports created a tip line to collect information about dark patterns from the public.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

A computer is a machine that can be programmed to carry out sequences of arithmetic or logical operations (computation) automatically. Modern digital electronic computers can perform generic sets of operations known as programs. These programs enable computers to perform a wide range of tasks. The term computer system may refer to a nominally complete computer that includes the hardware, operating system, software, and peripheral equipment needed and used for full operation; or to a group of computers that are linked and function together, such as a computer network or computer cluster. A broad range of industrial and consumer products use computers as control systems.

^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

The Thucydides Trap, or Thucydides’ Trap, is a term popularized by American political scientist Graham T. Allison to describe an apparent tendency towards war when an emerging power threatens to displace an existing great power as a regional or international hegemon. The term exploded in popularity in 2015 and primarily applies to analysis of China–United States relations. Supporting the thesis, Allison led a study at Harvard University’s Belfer Center for Science and International Affairs which found that, among a sample of 16 historical instances of an emerging power rivaling a ruling power, 12 ended in war. That study, however, has come under considerable criticism, and scholarly opinion on the value of the Thucydides Trap concept—particularly as it relates to a potential military conflict between the United States and China—remains divided.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

This is a list of sovereign states and territories by per capita carbon dioxide emissions due to certain forms of human activity, based on the EDGAR database created by European Commission. The following table lists the 1970, 1990, 2005, 2017 and 2022 annual per capita CO2 emissions estimates (in kilotons of CO2 per year). The data only consider carbon dioxide emissions from the burning of fossil fuels and cement manufacture, but not emissions from land use, land-use change and forestry Over the last 150 years, estimated cumulative emissions from land use and land-use change represent approximately one-third of total cumulative anthropogenic CO2 emissions. Emissions from international shipping or bunker fuels are also not included in national figures, which can make a large difference for small countries with important ports. The Intergovernmental Panel on Climate Change (IPCC) Sixth Assessment Report finds that the “Agriculture, Forestry and Other Land Use (AFOLU)” sector on average, accounted for 13-21% of global total anthropogenic GHG emissions in the period 2010–2019.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

IBM Watson is a computer system capable of answering questions posed in natural language. It was developed in IBM’s DeepQA project by a research team led by principal investigator David Ferrucci. Watson was named after IBM’s founder and first CEO, industrialist Thomas J. Watson. The computer system was initially developed to answer questions on the quiz show Jeopardy!

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

Malicious compliance (also known as malicious obedience) is the behavior of strictly following the orders of a superior despite knowing that compliance with the orders will have an unintended or negative result. It usually implies following an order in such a way that ignores or otherwise undermines the order’s intent, but follows it to the letter. A form of passive-aggressive behavior, it is often associated with poor management-labor relationships, micromanagement, a generalized lack of confidence in leadership, and resistance to changes perceived as pointless, duplicative, dangerous, or otherwise undesirable. It is common in organizations with top-down management structures lacking morale, leadership or mutual trust. In U.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

Microsoft is getting rid of WordPad after 28 years – the veteran editor has been present in the OS since Windows 95 (gadgettendency.com)

Microsoft is getting rid of WordPad after 28 years – the veteran editor has been present in the OS since Windows 95::Microsoft has begun getting rid of another veteran application in its proprietary operating system. The company has released a new test build of Windows 11

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

Microsoft Write is a basic word processor included with Windows 1. 0 and later, until Windows NT 3. 51. Throughout its lifespan it was minimally updated, and is comparable to early versions of MacWrite. Early versions of Write only work with Write Document (.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

Ronald Wilson Reagan ( RAY-gən; February 6, 1911 – June 5, 2004) was an American politician and actor who served as the 40th president of the United States from 1981 to 1989. A member of the Republican Party, his presidency constituted the Reagan era, and he is considered one of the most prominent conservative figures in American history. Reagan graduated from Eureka College in 1932 and began to work as a sports broadcaster in Iowa. In 1937, he moved to California, and became a well-known film actor there. From 1947 to 1952, Reagan served as the president of the Screen Actors Guild.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

A three-dimensional integrated circuit (3D IC) is a MOS (metal-oxide semiconductor) integrated circuit (IC) manufactured by stacking as many as 16 or more ICs and interconnecting them vertically using, for instance, through-silicon vias (TSVs) or Cu-Cu connections, so that they behave as a single device to achieve performance improvements at reduced power and smaller footprint than conventional two dimensional processes. The 3D IC is one of several 3D integration schemes that exploit the z-direction to achieve electrical performance benefits in microelectronics and nanoelectronics. 3D integrated circuits can be classified by their level of interconnect hierarchy at the global (package), intermediate (bond pad) and local (transistor) level. In general, 3D integration is a broad term that includes such technologies as 3D wafer-level packaging (3DWLP); 2. 5D and 3D interposer-based integration; 3D stacked ICs (3D-SICs); 3D heterogeneous integration; and 3D systems integration.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

The meaning of life pertains to the significance of living or existence in general, and is sought through the question "What is the meaning of life? " Many other related questions include: "Why are we here? ", "What is life all about? ", or "What is the purpose of existence? " There have been many proposed answers to these questions from many different cultural and ideological backgrounds.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

Socket AM4 is a PGA microprocessor socket used by AMD’s central processing units (CPUs) built on the Zen (including Zen+, Zen 2 and Zen 3) and Excavator microarchitectures. AM4 was launched in September 2016 and was designed to replace the sockets AM3+, FM2+ and FS1b as a single platform. It has 1331 pin slots and is the first from AMD to support DDR4 memory as well as achieve unified compatibility between high-end CPUs (previously using Socket AM3+) and AMD’s lower-end APUs (on various other sockets). In 2017, AMD made a commitment to using the AM4 platform with socket 1331 until 2020. AM5 succeeded the AM4 platform in late 2022 with the introduction of the Ryzen 7000 series however, AMD has continued to release new AM4 based CPUs even after the release of AM5.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

Red Star OS (Korean: 붉은별; MR: Pulgŭnbyŏl) is a North Korean Linux distribution, with development first starting in 1998 at the Korea Computer Center (KCC). Prior to its release, computers in North Korea typically used Red Hat Linux, and later switched to modified versions of Microsoft Windows with North Korean language packs installed. Version 3. 0 was released in the summer of 2013, but as of 2014, version 1. 0 continues to be more widely used.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

Fax (short for facsimile), sometimes called telecopying or telefax (the latter short for telefacsimile), is the telephonic transmission of scanned printed material (both text and images), normally to a telephone number connected to a printer or other output device. The original document is scanned with a fax machine (or a telecopier), which processes the contents (text or images) as a single fixed graphic image, converting it into a bitmap, and then transmitting it through the telephone system in the form of audio-frequency tones. The receiving fax machine interprets the tones and reconstructs the image, printing a paper copy. Early systems used direct conversions of image darkness to audio tone in a continuous or analog manner. Since the 1980s, most machines transmit an audio-encoded digital representation of the page, using data compression to more quickly transmit areas that are all-white or all-black.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

Samurai (侍、さむらい) were the hereditary military nobility and officer caste of medieval and early-modern Japan from the late 12th century until their abolition in the late 1870s during the Meiji era. They were the well-paid retainers of the daimyo, the great feudal landholders. They had high prestige and special privileges. Following the passing of a law in 1629, samurai on official duty were required to practice daishō (wear two swords). Samurai were granted kiri-sute gomen: the right to kill anyone of a lower class in certain situations.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

The Utah Data Center (UDC), also known as the Intelligence Community Comprehensive National Cybersecurity Initiative Data Center, is a data storage facility for the United States Intelligence Community that is designed to store data estimated to be on the order of exabytes or larger. Its purpose is to support the Comprehensive National Cybersecurity Initiative (CNCI), though its precise mission is classified. The National Security Agency (NSA) leads operations at the facility as the executive agent for the Director of National Intelligence. It is located at Camp Williams near Bluffdale, Utah, between Utah Lake and Great Salt Lake and was completed in May 2014 at a cost of $1. 5 billion.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

Rockmelt is a discontinued proprietary social media web browser developed by Tim Howes and Eric Vishria based on the Google Chromium project, incorporating social media features such as Facebook chat, Twitter notifications and widgetised areas for other content providers such as YouTube and local newspapers. The Rockmelt web browser project was backed by Netscape founder Marc Andreessen. In April 2013, Rockmelt discontinued its desktop web browser, replacing it with a collaborative project bringing together social elements from various sources. Rockmelt was created by Rockmelt, Inc. , located in Mountain View, California.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

Artificial Intelligence is a scientific journal on artificial intelligence research. It was established in 1970 and is published by Elsevier. The journal is abstracted and indexed in Scopus and Science Citation Index. The 2021 Impact Factor for this journal is 14. 05 and the 5-Year Impact Factor is 11.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the section for the wikipedia article you mentioned in your comment:

Bleemcast! is an independently developed commercial emulator by Bleem! that allows one to load and play PlayStation discs on the Sega Dreamcast. It is compatible with most Dreamcast controllers and steering wheels, and leverages the Dreamcast’s superior processing power for enhanced graphics. It was created by using the MIL-CD security hole found in the Dreamcast BIOS.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

Lightning is a proprietary computer bus and power connector, created and designed by Apple Inc. It was introduced on September 12, 2012, in conjunction with the iPhone 5, to replace its predecessor, the 30-pin dock connector. The Lightning connector is used to connect Apple mobile devices like iPhones, iPads, and iPods to host computers, external monitors, cameras, USB battery chargers, and other peripherals. Using 8 pins instead of 30, Lightning is much smaller than its predecessor. The Lightning connector is reversible.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

Socialism is an economic and political philosophy encompassing diverse economic and social systems characterised by social ownership of the means of production, as opposed to private ownership. It describes the economic, political, and social theories and movements associated with the implementation of such systems. Social ownership can take various forms including: public, community, collective, cooperative, or employee. No single definition encapsulates the many types of socialism, but social ownership is the common element. Traditionally, socialism is on the left-wing of the political spectrum.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

George Carlin Estate Files Lawsuit Against Group Behind AI-Generated Stand-Up Special: ‘A Casual Theft of a Great American Artist’s Work’ (variety.com)

George Carlin Estate Files Lawsuit Against Group Behind AI-Generated Stand-Up Special: ‘A Casual Theft of a Great American Artist’s Work’::George Carlin’s estate has filed a lawsuit against the creators behind an AI-generated comedy special featuring a recreation of the comedian’s voice.

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

A disclaimer is generally any statement intended to specify or delimit the scope of rights and obligations that may be exercised and enforced by parties in a legally recognized relationship. In contrast to other terms for legally operative language, the term disclaimer usually implies situations that involve some level of uncertainty, waiver, or risk. A disclaimer may specify mutually agreed and privately arranged terms and conditions as part of a contract; or may specify warnings or expectations to the general public (or some other class of persons) in order to fulfill a duty of care owed to prevent unreasonable risk of harm or injury. Some disclaimers are intended to limit exposure to damages after a harm or injury has already been suffered. Additionally, some kinds of disclaimers may represent a voluntary waiver of a right or obligation that may be owed to the disclaimant.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

Midler v. Ford Motor Co. , 849 F. 2d 460 (9th Cir. 1988) is a United States Court of Appeals case in which Bette Midler sought remedy against Ford Motor Company for a series of commercials in the 1980s which used a Midler impersonator.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

Midler v. Ford Motor Co. , 849 F. 2d 460 (9th Cir. 1988) is a United States Court of Appeals case in which Bette Midler sought remedy against Ford Motor Company for a series of commercials in the 1980s which used a Midler impersonator.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

Machine learning (ML) is a field of study in artificial intelligence concerned with the development and study of statistical algorithms that can learn from data and generalize to unseen data, and thus perform tasks without explicit instructions. Recently, generative artificial neural networks have been able to surpass many previous approaches in performance. Machine learning approaches have been applied to many fields including large language models, computer vision, speech recognition, email filtering, agriculture, and medicine, where it is too costly to develop algorithms to perform the needed tasks. ML is known in its application across business problems under the name predictive analytics. Although not all machine learning is statistically based, computational statistics is an important source of the field’s methods.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

The Scorpion and the Frog is an animal fable which teaches that vicious people cannot resist hurting others even when it is not in their own interests. This fable seems to have emerged in Russia in the early 20th century.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

Fear, uncertainty and doubt (often shortened to FUD) is a manipulative propaganda tactic used in sales, marketing, public relations, politics, polling and cults. FUD is generally a strategy to influence perception by disseminating negative and dubious or false information, and is a manifestation of the appeal to fear.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

United States of America v. Microsoft Corporation, 253 F. 3d 34 (D. C. Cir.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

The Computer Fraud and Abuse Act of 1986 (CFAA) is a United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law (18 U. S. C. § 1030), which had been included in the Comprehensive Crime Control Act of 1984. Prior to computer-specific criminal laws, computer crimes were prosecuted as mail and wire fraud, but the applying law was often insufficient.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

The usage share of web browsers is the portion, often expressed as a percentage, of visitors to a group of web sites that use a particular web browser.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

The Maneuvering Characteristics Augmentation System (MCAS) is a flight stabilizing feature developed by Boeing that became notorious for its role in two fatal accidents of the 737 MAX, which killed all 346 passengers and crew among both flights. Systems similar to the Boeing 737 MCAS were previously included on the Boeing 707 and Boeing KC-46, a 767 variant. On the 737 MAX, MCAS was intended to mimic the flight behavior of the previous generation of the series, the Boeing 737 NG. During MAX flight tests, Boeing discovered that the position and larger size of the engines tended to push the nose up during certain maneuvers. Engineers decided to use MCAS to counter that tendency, since major structural redesign would have been prohibitively expensive and time-consuming.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

Criminal copyright laws prohibit the unacknowledged use of another’s intellectual property for the purpose of financial gain. Violation of these laws can lead to fines and jail time. Criminal copyright laws have been a part of U. S. laws since 1897, which added a misdemeanor penalty for unlawful performances if “willful and for profit”.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

Nutraloaf (also known as meal loaf, prison loaf, disciplinary loaf, food loaf, lockup loaf, confinement loaf, seg loaf, grue or special management meal) is food served in prisons in the United States (and formerly in Canada) to inmates who have misbehaved, abused food, or have inflicted harm upon themselves or others. It is similar to meatloaf in texture, but has a wider variety of ingredients. Prison loaf is usually bland, even unpleasant, but prison wardens argue that nutraloaf provides enough nutrition to keep prisoners healthy without requiring eating utensils.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

Different methods of electricity generation can incur a variety of different costs, which can be divided into three general categories: 1) wholesale costs, or all costs paid by utilities associated with acquiring and distributing electricity to consumers, 2) retail costs paid by consumers, and 3) external costs, or externalities, imposed on society. Wholesale costs include initial capital, operations & maintenance (O&M), transmission, and costs of decommissioning. Depending on the local regulatory environment, some or all wholesale costs may be passed through to consumers. These are costs per unit of energy, typically represented as dollars/megawatt hour (wholesale). The calculations also assist governments in making decisions regarding energy policy.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

The Yahoo! Directory was a web directory which at one time rivaled DMOZ in size. The directory was Yahoo! 's first offering and started in 1994 under the name Jerry and David’s Guide to the World Wide Web. When Yahoo!

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

Gray goo (also spelled as grey goo) is a hypothetical global catastrophic scenario involving molecular nanotechnology in which out-of-control self-replicating machines consume all biomass (and perhaps also everything else) on Earth while building many more of themselves, a scenario that has been called ecophagy (the literal consumption of the ecosystem). The original idea assumed machines were designed to have this capability, while popularizations have assumed that machines might somehow gain this capability by accident. Self-replicating machines of the macroscopic variety were originally described by mathematician John von Neumann, and are sometimes referred to as von Neumann machines or clanking replicators. The term gray goo was coined by nanotechnology pioneer K. Eric Drexler in his 1986 book Engines of Creation.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

The evil bit is a fictional IPv4 packet header field proposed in a humorous April Fools’ Day RFC from 2003, authored by Steve Bellovin. The Request for Comments recommended that the last remaining unused bit, the “Reserved Bit” in the IPv4 packet header, be used to indicate whether a packet had been sent with malicious intent, thus making computer security engineering an easy problem – simply ignore any messages with the evil bit set and trust the rest.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

The Carrington Event was the most intense geomagnetic storm in recorded history, peaking from 1 to 2 September 1859 during solar cycle 10. It created strong auroral displays that were reported globally and caused sparking and even fires in multiple telegraph stations. The geomagnetic storm was most likely the result of a coronal mass ejection (CME) from the Sun colliding with Earth’s magnetosphere. The geomagnetic storm was associated with a very bright solar flare on 1 September 1859. It was observed and recorded independently by British astronomers Richard Christopher Carrington and Richard Hodgson—the first records of a solar flare.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

**Prefabricated homes, often referred to as prefab homes or simply prefabs, are specialist dwelling types of prefabricated building, which are manufactured off-site in advance, usually in standard sections that can be easily shipped and assembled. Some current prefab home designs include architectural details inspired by postmodernism or futurist architecture.

“Prefabricated” may refer to buildings built in components (e. g. panels), modules (modular homes) or transportable sections (manufactured homes), and may also be used to refer to mobile homes, i.**

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

Scientists Use WiFi to See Through People's Walls (www.popularmechanics.com)

“We developed a deep neural network that maps the phase and amplitude of WiFi signals to UV coordinates within 24 human regions. The results of the study reveal that our model can estimate the dense pose of multiple subjects, with comparable performance to image-based approaches, by utilizing WiFi signals as the only input.”

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

TEMPEST is a U. S. National Security Agency specification and a NATO certification referring to spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations. TEMPEST covers both methods to spy upon others and how to shield equipment against such spying. The protection efforts are also known as emission security (EMSEC), which is a subset of communications security (COMSEC).

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

Liquid Audio Inc was a US software company based in Redwood City, California. Formed in 1996, Liquid Audio developed a major standard, multiple software clients, and a client/server media distribution system for streaming and downloading audio on the Internet. Along with RealNetworks’ RealAudio (on the RealPlayer), Liquid Audio was one of the two emerging online audio standards in the 1990s. The company’s founders – Gerry Kearby, Robert Flynn, and Phil Wiser – focused on professional audio quality and copyright security to differentiate the offer. The company was a pioneer in enabling copy-restricted media distribution, working closely with record companies and publishing rights agencies such as ASCAP, BMI, The Harry Fox Agency, in the United States, and various other agencies around the world.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

The Nordic model comprises the economic and social policies as well as typical cultural practices common in the Nordic countries (Denmark, Finland, Iceland, Norway, and Sweden). This includes a comprehensive welfare state and multi-level collective bargaining based on the economic foundations of social corporatism, and a commitment to private ownership within a market-based mixed economy—with Norway being a partial exception due to a large number of state-owned enterprises and state ownership in publicly listed firms. Although there are significant differences among the Nordic countries, they all have some common traits. The three Scandinavian countries are constitutional monarchies, while Finland and Iceland have been republics since the 20th century. All the Nordic countries are however described as being highly democratic and all have a unicameral legislature and use proportional representation in their electoral systems.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

The Organization X (Greek: Οργάνωσις Χ; commonly referred to simply as X (“Chi” in Greek), and members as Chites (Χίτες)) was a paramilitary right-wing anti-communist royalist organization set up in 1941 during the Axis occupation of Greece. Initially an anti-Axis resistance organization, it gradually shifted its focus towards anti-communism. In 1951, X was officially recognized as a National Organization of Internal Resistance by the Greek Ministry of National Defense. Following the end of the Axis occupation, it played an active role in the persecution of communists during the White Terror and various military operations of the Greek Civil War, most notably the Dekemvriana.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

Forced fatherhood or imposed paternity, occurs when a man’s semen is used, against his will or without his knowledge or consent, to inseminate a woman, it includes deception by a partner about their ability to get pregnant or use of contraceptives, birth control sabotage, and sexual assaults of males that result in pregnancy. “Sperm theft” (also known as “unauthorized use of sperm”, “spermjacking” or “spurgling” (a portmanteau of sperm and burgling), refers to a specific form of forced fatherhood where a males semen is collected without his consent. Although the term uses the word “theft”, it more closely falls under a state of fraud or breach of contract. Stealing of sperm in itself without using it for successful insemination is not illegal and is difficult to prove. It usually has no bearing on issues like child support.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

wikibot Bot ,

Here’s the summary for the wikipedia article you mentioned in your comment:

Lavabit is an open-source encrypted webmail service, founded in 2004. The service suspended its operations on August 8, 2013 after the U. S. Federal Government ordered it to turn over its Secure Sockets Layer (SSL) private keys, in order to allow the government to spy on Edward Snowden’s email. Lavabit’s owner and operator, Ladar Levison, announced on January 20, 2017 that Lavabit would start operating again, using the new Dark Internet Mail Environment (DIME), which is an end-to-end email encryption platform designed to be more surveillance-resistant.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^‘optout’.^ ^article^ ^|^ ^about^

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • lifeLocal
  • goranko
  • All magazines