Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)WI
Posts
0
Comments
142
Joined
2 yr. ago

  • Here's the summary for the wikipedia article you mentioned in your comment:

    The Computer Fraud and Abuse Act of 1986 (CFAA) is a United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law (18 U. S. C. § 1030), which had been included in the Comprehensive Crime Control Act of 1984. Prior to computer-specific criminal laws, computer crimes were prosecuted as mail and wire fraud, but the applying law was often insufficient.

    to opt out, pm me 'optout'. article | about

  • Here's the summary for the wikipedia article you mentioned in your comment:

    The usage share of web browsers is the portion, often expressed as a percentage, of visitors to a group of web sites that use a particular web browser.

    to opt out, pm me 'optout'. article | about

  • Here's the summary for the wikipedia article you mentioned in your comment:

    Different methods of electricity generation can incur a variety of different costs, which can be divided into three general categories: 1) wholesale costs, or all costs paid by utilities associated with acquiring and distributing electricity to consumers, 2) retail costs paid by consumers, and 3) external costs, or externalities, imposed on society. Wholesale costs include initial capital, operations & maintenance (O&M), transmission, and costs of decommissioning. Depending on the local regulatory environment, some or all wholesale costs may be passed through to consumers. These are costs per unit of energy, typically represented as dollars/megawatt hour (wholesale). The calculations also assist governments in making decisions regarding energy policy.

    to opt out, pm me 'optout'. article | about

  • Here's the summary for the wikipedia article you mentioned in your comment:

    Gray goo (also spelled as grey goo) is a hypothetical global catastrophic scenario involving molecular nanotechnology in which out-of-control self-replicating machines consume all biomass (and perhaps also everything else) on Earth while building many more of themselves, a scenario that has been called ecophagy (the literal consumption of the ecosystem). The original idea assumed machines were designed to have this capability, while popularizations have assumed that machines might somehow gain this capability by accident. Self-replicating machines of the macroscopic variety were originally described by mathematician John von Neumann, and are sometimes referred to as von Neumann machines or clanking replicators. The term gray goo was coined by nanotechnology pioneer K. Eric Drexler in his 1986 book Engines of Creation.

    to opt out, pm me 'optout'. article | about

  • Here's the summary for the wikipedia article you mentioned in your comment:

    The Yahoo! Directory was a web directory which at one time rivaled DMOZ in size. The directory was Yahoo! 's first offering and started in 1994 under the name Jerry and David's Guide to the World Wide Web. When Yahoo!

    to opt out, pm me 'optout'. article | about

  • Here's the summary for the wikipedia article you mentioned in your comment:

    The evil bit is a fictional IPv4 packet header field proposed in a humorous April Fools' Day RFC from 2003, authored by Steve Bellovin. The Request for Comments recommended that the last remaining unused bit, the "Reserved Bit" in the IPv4 packet header, be used to indicate whether a packet had been sent with malicious intent, thus making computer security engineering an easy problem – simply ignore any messages with the evil bit set and trust the rest.

    to opt out, pm me 'optout'. article | about

  • Here's the summary for the wikipedia article you mentioned in your comment:

    TEMPEST is a U. S. National Security Agency specification and a NATO certification referring to spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations. TEMPEST covers both methods to spy upon others and how to shield equipment against such spying. The protection efforts are also known as emission security (EMSEC), which is a subset of communications security (COMSEC).

    to opt out, pm me 'optout'. article | about

  • Here's the summary for the wikipedia article you mentioned in your comment:

    Forced fatherhood or imposed paternity, occurs when a man's semen is used, against his will or without his knowledge or consent, to inseminate a woman, it includes deception by a partner about their ability to get pregnant or use of contraceptives, birth control sabotage, and sexual assaults of males that result in pregnancy. "Sperm theft" (also known as "unauthorized use of sperm", "spermjacking" or "spurgling" (a portmanteau of sperm and burgling), refers to a specific form of forced fatherhood where a males semen is collected without his consent. Although the term uses the word "theft", it more closely falls under a state of fraud or breach of contract. Stealing of sperm in itself without using it for successful insemination is not illegal and is difficult to prove. It usually has no bearing on issues like child support.

    to opt out, pm me 'optout'. article | about

  • Here's the summary for the wikipedia article you mentioned in your comment:

    The Carrington Event was the most intense geomagnetic storm in recorded history, peaking from 1 to 2 September 1859 during solar cycle 10. It created strong auroral displays that were reported globally and caused sparking and even fires in multiple telegraph stations. The geomagnetic storm was most likely the result of a coronal mass ejection (CME) from the Sun colliding with Earth's magnetosphere. The geomagnetic storm was associated with a very bright solar flare on 1 September 1859. It was observed and recorded independently by British astronomers Richard Christopher Carrington and Richard Hodgson—the first records of a solar flare.

    to opt out, pm me 'optout'. article | about

  • Here's the summary for the wikipedia article you mentioned in your comment:

    **Prefabricated homes, often referred to as prefab homes or simply prefabs, are specialist dwelling types of prefabricated building, which are manufactured off-site in advance, usually in standard sections that can be easily shipped and assembled. Some current prefab home designs include architectural details inspired by postmodernism or futurist architecture.

    "Prefabricated" may refer to buildings built in components (e. g. panels), modules (modular homes) or transportable sections (manufactured homes), and may also be used to refer to mobile homes, i.**

    to opt out, pm me 'optout'. article | about

  • Here's the summary for the wikipedia article you mentioned in your comment:

    The Organization X (Greek: Οργάνωσις Χ; commonly referred to simply as X ("Chi" in Greek), and members as Chites (Χίτες)) was a paramilitary right-wing anti-communist royalist organization set up in 1941 during the Axis occupation of Greece. Initially an anti-Axis resistance organization, it gradually shifted its focus towards anti-communism. In 1951, X was officially recognized as a National Organization of Internal Resistance by the Greek Ministry of National Defense. Following the end of the Axis occupation, it played an active role in the persecution of communists during the White Terror and various military operations of the Greek Civil War, most notably the Dekemvriana.

    to opt out, pm me 'optout'. article | about

  • Here's the summary for the wikipedia article you mentioned in your comment:

    Lavabit is an open-source encrypted webmail service, founded in 2004. The service suspended its operations on August 8, 2013 after the U. S. Federal Government ordered it to turn over its Secure Sockets Layer (SSL) private keys, in order to allow the government to spy on Edward Snowden's email. Lavabit's owner and operator, Ladar Levison, announced on January 20, 2017 that Lavabit would start operating again, using the new Dark Internet Mail Environment (DIME), which is an end-to-end email encryption platform designed to be more surveillance-resistant.

    to opt out, pm me 'optout'. article | about

  • Here's the summary for the wikipedia article you mentioned in your comment:

    Liquid Audio Inc was a US software company based in Redwood City, California. Formed in 1996, Liquid Audio developed a major standard, multiple software clients, and a client/server media distribution system for streaming and downloading audio on the Internet. Along with RealNetworks' RealAudio (on the RealPlayer), Liquid Audio was one of the two emerging online audio standards in the 1990s. The company's founders – Gerry Kearby, Robert Flynn, and Phil Wiser – focused on professional audio quality and copyright security to differentiate the offer. The company was a pioneer in enabling copy-restricted media distribution, working closely with record companies and publishing rights agencies such as ASCAP, BMI, The Harry Fox Agency, in the United States, and various other agencies around the world.

    to opt out, pm me 'optout'. article | about

  • Here's the summary for the wikipedia article you mentioned in your comment:

    John Atkinson Grimshaw (6 September 1836 – 13 October 1893) was an English Victorian-era artist best known for his nocturnal scenes of urban landscapes. He was called a "remarkable and imaginative painter" by the critic and historian Christopher Wood in Victorian Painting (1999). Grimshaw's love for realism stemmed from a passion for photography, which would eventually lend itself to the creative process. Though entirely self-taught, he is known to have used a camera obscura or lenses to project scenes onto canvas, which made up for his shortcomings as a draughtsman and his imperfect knowledge of perspective. This technique, which Caravaggio and Vermeer may also have used, was condemned by a number of his contemporaries who believed it demonstrated less skill than painting by eye, with some claiming that his paintings appeared to "show no marks of handling or brushwork", while others "were doubtful whether they could be accepted as paintings at all".

    to opt out, pm me 'optout'. article | about

  • Here's the summary for the wikipedia article you mentioned in your comment:

    The Computer Fraud and Abuse Act of 1986 (CFAA) is a United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law (18 U. S. C. § 1030), which had been included in the Comprehensive Crime Control Act of 1984. Prior to computer-specific criminal laws, computer crimes were prosecuted as mail and wire fraud, but the applying law was often insufficient.

    to opt out, pm me 'optout'. article | about

  • Here's the summary for the wikipedia article you mentioned in your comment:

    The Sony BMG CD copy protection scandal concerns the copy protection measures included by Sony BMG on compact discs in 2005. When inserted into a computer, the CDs installed one of two pieces of software that provided a form of digital rights management (DRM) by modifying the operating system to interfere with CD copying. Neither program could easily be uninstalled, and they created vulnerabilities that were exploited by unrelated malware. One of the programs would install and "phone home" with reports on the user's private listening habits, even if the user refused its end-user license agreement (EULA), while the other was not mentioned in the EULA at all. Both programs contained code from several pieces of copylefted free software in an apparent infringement of copyright, and configured the operating system to hide the software's existence, leading to both programs being classified as rootkits.

    to opt out, pm me 'optout'. article | about

  • Here's the summary for the wikipedia article you mentioned in your comment:

    Between 2011 and 2018, a series of disputes took place about the copyright status of selfies taken by Celebes crested macaques using equipment belonging to the British wildlife photographer David J. Slater. The disputes involved Wikimedia Commons and the blog Techdirt, which have hosted the images following their publication in newspapers in July 2011 over Slater's objections that he holds the copyright, and People for the Ethical Treatment of Animals (PETA), who have argued that the copyright should be assigned to the macaque. Slater has argued that he has a valid copyright claim because as he engineered the situation that resulted in the pictures by travelling to Indonesia, befriending a group of wild macaques, and setting up his camera equipment in such a way that a selfie might come about. The Wikimedia Foundation's 2014 refusal to remove the pictures from its Wikimedia Commons image library was based on the understanding that copyright is held by the creator, that a non-human creator (not being a legal person) cannot hold copyright, and that the images are thus in the public domain.

    to opt out, pm me 'optout'. article | about

  • Here's the summary for the wikipedia article you mentioned in your comment:

    Battery recycling is a recycling activity that aims to reduce the number of batteries being disposed as municipal solid waste. Batteries contain a number of heavy metals and toxic chemicals and disposing of them by the same process as regular household waste has raised concerns over soil contamination and water pollution.

    to opt out, pm me 'optout'. article | about

  • Here's the summary for the wikipedia article you mentioned in your comment:

    Hawala or hewala (Arabic: حِوالة ḥawāla, meaning transfer or sometimes trust), originating in India as havala (Hindi: हवाला), also known as havaleh in Persian, and xawala or xawilaad in Somali, is a popular and informal value transfer system based on the performance and honour of a huge network of money brokers (known as hawaladars). They operate outside of, or parallel to, traditional banking, financial channels and remittance systems. The system requires a minimum of two hawaladars that take care of the "transaction" without the movement of cash or telegraphic transfer. While hawaladars are spread throughout the world, they are primarily located in the Middle East, North Africa, the Horn of Africa and the Indian subcontinent. Hawala follows Islamic traditions but its use is not limited to Muslims.

    to opt out, pm me 'optout'. article | about

  • Here's the summary for the wikipedia article you mentioned in your comment:

    AlphaGo is a computer program that plays the board game Go. It was developed by the London-based DeepMind Technologies, an acquired subsidiary of Google (now Alphabet Inc. ). Subsequent versions of AlphaGo became increasingly powerful, including a version that competed under the name Master. After retiring from competitive play, AlphaGo Master was succeeded by an even more powerful version known as AlphaGo Zero, which was completely self-taught without learning from human games.

    to opt out, pm me 'optout'. article | about