1. Welcome to Wikifunctions

Total comment counts : 31

Summary

error

Top 1 Comment Summary

The article describes the confusion and difficulty the writer encountered while trying to navigate and understand a documentation website called WikiFunctions. The writer finds the website’s layout and features confusing, particularly the “try this function” section which did not work properly. The “current object” section also displayed an unfamiliar script, further adding to the confusion. The writer questions who the target audience for the website is, as they feel they are not a part of it.

Top 2 Comment Summary

The article discusses a favorite mathematical function/formula of the author, which is n/(n+x). The formula has several interesting aspects, such as approaching 1 as n gets bigger and approaching 0.5 when n equals x. It also mentions that for large values of n, the results of the formula are equal. The author then applies the formula to determine the probability of a new cafe being exceptionally awesome, based on the number of people praising it. The formula is used to calculate the probability and shows that the probability changes significantly at the beginning but becomes less impactful as more people report about the cafe. The author also mentions that changing the variable x in the formula can affect its behavior. The article concludes with the suggestion of naming the formula “the trust formula.”

2. Ffmprovisr – Making FFmpeg Easier

Total comment counts : 29

Summary

The article is a detailed guide on how to use FFmpeg, a powerful tool for manipulating audiovisual files. It provides instructions on various tasks such as creating and saving videos, running batch commands, applying filters, mapping streams, rewrapping files, transcoding files, and more. The guide includes numerous command examples for different scenarios and explains the flags and options used in each command. It also covers topics like colorspace conversion, aspect ratio conversion, and fading videos in and out. The article aims to help users effectively utilize FFmpeg for their audiovisual processing needs.

Top 1 Comment Summary

The article praises ffmpeg, calling it one of the best software ever written. The author emphasizes the talent of Fabian Fabrice, an engineer associated with ffmpeg, and describes him as a valuable asset to the FOSS (Free and Open Source Software) community. The author also mentions their personal experience of working on products that depended heavily on ffmpeg in a previous job.

Top 2 Comment Summary

The article discusses the frustration with using ffmpeg CLI for video filtering and introduces VapourSynth as an alternative. VapourSynth is described as an optimized Pythonic video filtering tool that offers more than just filtering capabilities. The article also mentions Staxrip, a software that utilizes ffmpeg, VapourSynth, and other encoders and tools for video processing. The author even goes to the extent of rebooting from Linux to Windows just to use it.

3. Snowflake

Total comment counts : 14

Summary

Snowflake is a system that helps people access censored websites and applications by disguising their internet activity. It operates similarly to VPNs, but instead of installing a separate application, Snowflake is embedded within existing apps. By redirecting internet traffic or scrambling it, Snowflake makes it difficult for censors to block access without blocking a large portion of the internet. Snowflake proxies are operated by volunteers, and users are matched with random proxies. If individuals want to help bypass censorship, they can install and run a Snowflake proxy. Different methods, from the web extension to embedding it in a personal website, are available to run a Snowflake proxy. If users encounter any issues, they can file a bug report or seek support through the Tor Support Channel. Snowflake is continuously being improved as part of the Pluggable Transports family.

Top 1 Comment Summary

The article discusses the use of domain fronting as a technique for rendezvous in the digital realm. It explains that domain fronting is often used by malicious actors, and some cloud providers are now blocking it by default. AWS, for example, expressed concerns that if domain fronting was widely implemented, countries like Iran and China could block all of AWS. The article provides links for more information on domain fronting and the actions taken by cloud providers.

Top 2 Comment Summary

The article discusses a relay for Tor users to access Tor when normal guard relays are blocked. This relay uses domain fronting and webrtc technology. However, the article’s confusing translation suggests that the target website also needs to support webrtc, making it impossible to access HTTP(S) websites through this in-browser proxy. The article claims that no separate software is needed to visit censored websites, but in reality, a Tor client is required to use this snowflake proxy.

4. ASML EUV lithography machine could keep Moore’s Law on track

Total comment counts : 14

Summary

The article discusses the development of high-numerical-aperture extreme-ultraviolet (EUV) lithography as the next generation of lithography for shrinking device geometries in the semiconductor industry. The resolution of photolithography has improved over the years through factors such as wavelength, numerical aperture, and process control. The switch to EUV from 193-nanometer light helped decrease critical dimensions, and now the focus is on increasing the numerical aperture from 0.33 to 0.55. However, increasing the numerical aperture poses challenges, such as the need for anamorphic optics to manage the angle of reflection. The article also mentions the efforts to design and manufacture the necessary components for high-NA EUV systems and the plan to open a lab for further development. Ultimately, high-NA EUV is critical for the advancement of Moore’s Law in the semiconductor industry.

Top 1 Comment Summary

The article explains that generating extreme ultraviolet (EUV) light requires a complex process involving hitting molten tin droplets with a CO2 laser. The laser vaporizes the tin, creating a plasma that emits a spectrum of photonic energy. The EUV optics then capture the 13.5-nm wavelength from this spectrum and direct it through mirrors. The light is reflected off a patterned mask and projected onto a wafer. The author finds this process incredible and mentions its successful implementation in commercial systems that can produce hundreds of chip wafers per hour.

Top 2 Comment Summary

The author worked at Imec in 2005 and witnessed the installation and research of the first EUV machines from ASML. They were initially skeptical about the success of these machines due to the complex technological challenges involved. However, they are now glad that the machines were able to work, as it enables printing on a smaller scale.

5. Scientists may have found mechanism behind cognitive decline in aging

Total comment counts : 33

Summary

Scientists at the University of Colorado Anschutz Medical Campus have identified a potential mechanism behind cognitive decline in normal aging. They found that the mis-regulation of a brain protein called CaMKII, which is important for memory and learning, may be responsible for the decline. Altering this protein in mouse models produced similar cognitive effects as those seen in normal aging. The researchers discovered that normal aging decreases the modification of CaMKII known as S-nitrosylation, which in turn reduces memory and learning ability. The findings could lead to the development of pharmacological treatments to normalize the nitrosylation of the protein and potentially delay cognitive decline associated with normal aging. However, the treatment would not be effective for the cognitive decline seen in Alzheimer’s disease and dementia.

Top 1 Comment Summary

This article discusses a study in which researchers discovered that altering the CaMKII brain protein in mice led to cognitive effects similar to those observed in normal aging. The study suggests that this protein plays a role in age-related cognitive decline.

Top 2 Comment Summary

The author of the article has experienced a cognitive decline in the past few years, likely due to long covid. They attribute this decline to the side effects of long covid, particularly severe insomnia. While the insomnia has improved, the author still feels that their cognitive abilities haven’t fully returned, which is concerning to them.

6. Functions are vectors

Total comment counts : 20

Summary

The article discusses the concept of conceptualizing functions as infinite-dimensional vectors and applying the tools of linear algebra to various problems, such as image and geometry processing, curve fitting, light transport, and machine learning. It explains how vectors can be represented as lists of numbers, and how this representation can be extended to include functions with infinitely many values. The article also discusses the concept of vector spaces, abstract vector spaces, and the use of matrices to transform vectors. It explores the use of diagonalization in linear algebra and the spectral theorem, which states that a self-adjoint operator admits an orthonormal eigenbasis with real eigenvalues. The Laplacian operator is used as an example to demonstrate these concepts and its application in signal processing and Fourier transformations.

Top 1 Comment Summary

The article discusses the concept of functional analysis and its application in control theory. It mentions a basic introduction to functional analysis and provides a link to a more in-depth mathematical overview. Additionally, it highlights the use of the composition/Koopman operator in control theory, which allows for the linear approximation of nonlinear systems. This simplifies control and estimation processes in real-world systems such as autonomous drones, cars, and robot arms. The article also references additional resources on Koopman theory and its applications in controlling systems like soft robots.

Top 2 Comment Summary

The article discusses the concept of treating functions as elements in an abstract vector space, which led to the development of functional analysis. This paradigm shift allowed mathematicians to apply geometric intuition from finite-dimensional spaces to problems involving functions, such as solving certain differential equations. The article traces the history of this change in perspective, mentioning key works by Vito Volterra, Maurice Fréchet, and Stefan Banach.

7. Button Pushes You (2022)

Total comment counts : 12

Summary

The article discusses the concept of a “Call to Action” (CTA) in interface design. A CTA is a text label on a button or widget that directs users towards specific goals within an application, website, or device. Traditional CTAs typically present actions that users can activate to change the system’s state. However, a new style of button labeling has emerged that focuses on reconfiguring the user’s state rather than the system’s state. These buttons, labeled with phrases like “Get started” or “Explore,” require users to change their attitude or mindset before accessing the next piece of information. This reconfiguration work is entirely on the user’s side, as the computer does not assist in completing this task. The article also explores the difference between buttons and links, emphasizing the communicative role of buttons and their ability to change the state of an application. It discusses interface design guidelines from dominant players like Apple, Microsoft, and Google, highlighting the shift in the role of buttons in Material Design 3. The article concludes by suggesting that this new style of button labeling, called “Button Pushes You” (BPY), represents a shift in user interfaces, as users are tricked into performing work for the system by redefining established elements.

Top 1 Comment Summary

The article discusses the annoyance caused by obtuse labeling of buttons, particularly when trying to access API documentation for a new framework. The author suggests that this style of labeling, which progresses from function to call to action to obfuscated self-help style language, is a trend in marketing. They speculate that it may work in A/B testing but question its effectiveness in general. The author also connects this trend to a callback to 1960s language and an appeal to nostalgia, as well as a form of vaguely insulting corporate-speak.

Top 2 Comment Summary

The author shares their strategy of relabeling a button from “Maybe Later” to “Fuck off” in order to dismiss a modal without feeling pressured by the button.

8. How to find a street in 2 minutes [video]

Total comment counts : 17

Summary

error

Top 1 Comment Summary

The article discusses an online tool called Overpass Turbo, which the author had never heard of before. The tool allows users to check number plates and bin logos. The author considers discovering Overpass Turbo to be the only valuable takeaway from the video they watched.

Top 2 Comment Summary

The article discusses a geodetective named Rainbolt and talks about a presentation on Overpass Turbo and other OSINT (Open Source Intelligence) tools at the 2021 CCC Congress. The presentation provides examples from outside the US and is available in English.

9. Forced rhubarb, a vegetable deprived of sunlight, is having a renaissance (2019)

Total comment counts : 16

Summary

The article discusses the unique tradition of growing forced rhubarb in West Yorkshire, England. Farmers in the region use a specific technique to grow this complex vegetable during the cold winter months. The process involves forcing the rhubarb to use stored energy in its roots, resulting in a sweeter taste. The article highlights the history and cultural significance of forced rhubarb in Yorkshire, as well as its use in various culinary creations. It also mentions the recent revival of the local industry, with artisans incorporating rhubarb into products such as gin.

Top 1 Comment Summary

The article mentions that forced rhubarb grows so fast that you can hear it. There is a soundcloud file that suggests hearing it in a darkened vault by candlelight would be an extraordinary experience.

Top 2 Comment Summary

The Rhubarb Triangle is a small area in West Yorkshire, England, known for its production of early forced rhubarb. It covers 9 square miles and includes several towns. Originally, the Rhubarb Triangle was larger, covering an area between Leeds, Bradford, and Wakefield. During the early 1900s to 1930s, the rhubarb industry experienced growth and expanded to about 30 square miles.

10. Critical theory is radicalizing high school debate

Total comment counts : 79

Summary

The article discusses how competitive debate has shifted from focusing on public policy and critical thinking to becoming dominated by critical theory arguments known as kritiks. These kritiks propose complex social criticisms based on various theories and reject spending time on the assigned topics. The author argues that this shift undermines the goal of teaching students how to engage in pragmatic policy discussions and instead promotes a worldview that condemns American institutions and society. The article also highlights how kritiks have become popular in high school debate tournaments and have influenced the next generation of debaters. The author expresses concern about the long-term impact of this trend on American politics and the potential for the activity to become a site of radicalization.

Top 1 Comment Summary

This article discusses the flaws and problematic practices in high school debate. It highlights the focus on winning rather than the exchange of ideas. In policy debate, a tactic called ‘spreading’ involves speaking rapidly to present numerous points, making it difficult for the opposing team to address them all. In Lincoln Douglas debate, there is a strategy called ‘collapsing tautology’ where arguments are constructed to appear logical but are actually unrefutable traps. Overall, high school debate is seen as a realm of politics and persuasion, where knowing the judges, having charisma, and utilizing effective strategies matter more than the actual content of the arguments. The article argues that while the introduction of new controversial strategies might be noteworthy, it does not ruin debate any more than other existing problematic practices, and students generally do not care about these strategies or the validity of the ideas behind them.

Top 2 Comment Summary

The article discusses the idea of rhetoric as a virtue and the importance of arguing in good faith. The author shares a personal story about their grandfather’s training in a yeshiva, where students had to defend opposing sides of an argument with equal logic and vigor. The author suggests that learning to see through rhetorical tricks is valued beyond the ability to convince others. The article also mentions that there is nothing inherently wrong with breaking the rules of a debate to win, but failing to consider the unlikeable part of an argument is seen as cheating and will ultimately lead to failure.