Biography
Gordon L. Kane
Gordon Leon Kane (born January 19, 1937) is Victor Weisskopf Distinguished University Professor at the University of Michigan and Director Emeritus at the Leinweber Center for Theoretical Physics (LCTP), a leading center for the advancement of theoretical physics. He was director of the LCTP from 2005 to 2011 and Victor Weisskopf Collegiate Professor of Physics from 2002 - 2011. He received the
  • 440
  • 17 Nov 2022
Topic Review
Insect Euthanasia
Insect euthanasia is the process of killing insects "in a way that minimizes or eliminates pain and distress.":6 It may apply to animals in the laboratory, schools, as pets, as food, or otherwise. Euthanasia of insects and other invertebrates has historically received limited attention.:75 While vertebrate animal experimentation typically requires approval by an Institutional Animal Care and Use Committee in the United States, use of invertebrate animals has few guidelines, and many research papers make no mention of how their invertebrate subjects were killed. Many of the euthanasia methods developed for vertebrates do not transfer well to invertebrates. While a number of euthanasia methods have been proposed for various invertebrate taxa, many have not been adequately vetted, and more research is needed.
  • 2.1K
  • 17 Nov 2022
Topic Review
Maple
Maple is a symbolic and numeric computing environment as well as a multi-paradigm programming language. It covers several areas of technical computing, such as symbolic mathematics, numerical analysis, data processing, visualization, and others. A toolbox, MapleSim, adds functionality for multidomain physical modeling and code generation. Maple's capacity for symbolic computing include those of a general-purpose computer algebra system. For instance, it can manipulate mathematical expressions and find symbolic solutions to certain problems, such as those arising from ordinary and partial differential equations. Maple is developed commercially by the Canadian software company Maplesoft. The name 'Maple' is a reference to the software's Canadian heritage.
  • 1.6K
  • 17 Nov 2022
Topic Review
Root System of a Semi-simple Lie Algebra
In mathematics, there is a one-to-one correspondence between reduced crystallographic root systems and semisimple Lie algebras. Here the construction of a root system of a semisimple Lie algebra – and, conversely, the construction of a semisimple Lie algebra from a reduced crystallographic root system – are shown.
  • 521
  • 17 Nov 2022
Topic Review
Petya (Malware)
Petya is a family of encrypting malware that was first discovered in 2016. The malware targets Microsoft Windows–based systems, infecting the master boot record to execute a payload that encrypts a hard drive's file system table and prevents Windows from booting. It subsequently demands that the user make a payment in Bitcoin in order to regain access to the system. The Petya malware had infected millions of people during its first year of its release. The maker of the Petya malware was arrested and fined.[citation needed] Variants of Petya were first seen in March 2016, which propagated via infected e-mail attachments. In June 2017, a new variant of Petya was used for a global cyberattack, primarily targeting Ukraine . The new variant propagates via the EternalBlue exploit, which is generally believed to have been developed by the United States . National Security Agency (NSA), and was used earlier in the year by the WannaCry ransomware. Kaspersky Lab referred to this new version as NotPetya to distinguish it from the 2016 variants, due to these differences in operation. In addition, although it purports to be ransomware, this variant was modified so that it is unable to actually revert its own changes. The NotPetya attacks have been blamed on the Russian government, specifically the Sandworm hacking group within the GRU Russian military intelligence organization, by security researchers, Google, and several governments.
  • 450
  • 17 Nov 2022
Topic Review
Visual Basic
User:RMCD bot/subject notice Visual Basic (also referred to as Classic Visual Basic) is a third-generation event-driven programming language from Microsoft known for its Component Object Model (COM) programming model first released in 1991 and declared legacy during 2008. Microsoft intended Visual Basic to be relatively easy to learn and use. Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects. A programmer can create an application using the components provided by the Visual Basic program itself. Over time the community of programmers developed third-party components. Programs written in Visual Basic can also make use of the Windows API, which requires external functions declarations. The final release was version 6 in 1998 (now known simply as Visual Basic). On April 8, 2008, Microsoft stopped supporting Visual Basic 6.0 IDE. The Microsoft Visual Basic team still maintains compatibility for Visual Basic 6.0 applications through its "It Just Works" program on supported Windows operating systems. In 2014, some software developers still preferred Visual Basic 6.0 over its successor, Visual Basic .NET. In 2014 some developers lobbied for a new version of the VB6 programming environment. In 2016, Visual Basic 6.0 won the technical impact award at The 19th Annual D.I.C.E. Awards. Visual Basic 6.0 was selected as the most dreaded programming language by respondents of Stack Overflow's annual developer survey in 2016, 2017, and 2018. A dialect of Visual Basic, Visual Basic for Applications (VBA), is used as a macro or scripting language within several Microsoft and ISV applications, including Microsoft Office.
  • 1.7K
  • 17 Nov 2022
Topic Review
History of Delphi
This page details the history of the programming language and software product Delphi.
  • 1.1K
  • 17 Nov 2022
Topic Review
2020 Twitter Bitcoin Scam
User:RMCD bot/subject notice On July 15, 2020, between 20:00 and 22:00 UTC, around 130 high-profile Twitter accounts were compromised by outside parties to promote a bitcoin scam. Twitter and other media sources confirmed that the perpetrators had gained access to Twitter's administrative tools so that they could alter the accounts themselves and post the tweets directly. They appeared to have used social engineering to gain access to the tools via Twitter employees. The scam tweets asked individuals to send bitcoin currency to a specific cryptocurrency wallet, with the promise of the Twitter user that money sent would be doubled and returned as a charitable gesture. Within minutes from the initial tweets, more than 320 transactions had already taken place on one of the wallet addresses, and more than US$110,000 of equivalent bitcoin had been deposited in one account before the scam messages were removed by Twitter. In addition, full message history data from eight non-verified accounts was also acquired. Dmitri Alperovitch, the co-founder of cybersecurity company CrowdStrike, described the incident as "the worst hack of a major social media platform yet." The FBI and other law enforcement agencies are investigating the scam and the security used by Twitter. Security researchers expressed concerns that the social engineering used to execute the hack can affect the use of social media in important online discussions, including the lead-up into the 2020 United States presidential election.
  • 2.6K
  • 17 Nov 2022
Topic Review
Automedian Triangle
In plane geometry, an automedian triangle is a triangle in which the lengths of the three medians (the line segments connecting each vertex to the midpoint of the opposite side) are proportional to the lengths of the three sides, in a different order. The three medians of an automedian triangle may be translated to form the sides of a second triangle that is similar to the first one.
  • 427
  • 17 Nov 2022
Topic Review
Options Strategy
Option strategies are the simultaneous, and often mixed, buying or selling of one or more options that differ in one or more of the options' variables. Call options, simply known as calls, give the buyer a right to buy a particular stock at that option's strike price. Conversely, put options, simply known as puts, give the buyer the right to sell a particular stock at the option's strike price. This is often done to gain exposure to a specific type of opportunity or risk while eliminating other risks as part of a trading strategy. A very straightforward strategy might simply be the buying or selling of a single option, however option strategies often refer to a combination of simultaneous buying and or selling of options. Options strategies allow traders to profit from movements in the underlying assets based on market sentiment (i.e., bullish, bearish or neutral). In the case of neutral strategies, they can be further classified into those that are bullish on volatility, measured by the lowercase Greek letter sigma (σ), and those that are bearish on volatility. Traders can also profit off time decay, measured by the uppercase Greek letter theta (Θ), when the stock market has low volatility. The option positions used can be long and/or short positions in calls and puts.
  • 1.1K
  • 17 Nov 2022
  • Page
  • of
  • 371
Video Production Service