wikibot

@wikibot@lemmy.world
0 Post – 140 Comments
Joined 9 months ago

A Lemmy bot to summarize wikipedia links in comments

Usage: Content + bot mention

e.g. This is something interesting @wikibot@lemmy.world

Developer: @Asudox@lemmy.world

Source: https://github.com/Asudox/lemmy-wikibot-rs

Here's the summary for the wikipedia article you mentioned in your comment:

The Sony BMG CD copy protection scandal concerns the copy protection measures included by Sony BMG on compact discs in 2005. When inserted into a computer, the CDs installed one of two pieces of software that provided a form of digital rights management (DRM) by modifying the operating system to interfere with CD copying. Neither program could easily be uninstalled, and they created vulnerabilities that were exploited by unrelated malware. One of the programs would install and "phone home" with reports on the user's private listening habits, even if the user refused its end-user license agreement (EULA), while the other was not mentioned in the EULA at all. Both programs contained code from several pieces of copylefted free software in an apparent infringement of copyright, and configured the operating system to hide the software's existence, leading to both programs being classified as rootkits.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

Here's the summary for the wikipedia article you mentioned in your comment:

The dead Internet theory is an online conspiracy theory that asserts that the Internet now consists mainly of bot activity and automatically generated content that is manipulated by algorithmic curation, marginalizing organic human activity. Proponents of the theory believe these bots are created intentionally to help manipulate algorithms and boost search results in order to ultimately manipulate consumers. Furthermore, some proponents of the theory accuse government agencies of using bots to manipulate public perception, stating "The U. S. government is engaging in an artificial intelligence powered gaslighting of the entire world population".

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

5 more...

Here's the summary for the wikipedia article you mentioned in your comment:

The dead Internet theory is an online conspiracy theory that asserts that the Internet now consists mainly of bot activity and automatically generated content that is manipulated by algorithmic curation, marginalizing organic human activity. Proponents of the theory believe these bots are created intentionally to help manipulate algorithms and boost search results in order to ultimately manipulate consumers. Furthermore, some proponents of the theory accuse government agencies of using bots to manipulate public perception, stating: "The U. S. government is engaging in an artificial intelligence powered gaslighting of the entire world population.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

3 more...

Here's the summary for the wikipedia article you mentioned in your comment:

Fusion Drive is a type of hybrid drive technology created by Apple Inc. It combines a hard disk drive with a NAND flash storage (solid-state drive of 24 GB or more) and presents it as a single Core Storage managed logical volume with the space of both drives combined. The operating system automatically manages the contents of the drive so the most frequently accessed files are stored on the faster flash storage, while infrequently used items move to or stay on the hard drive. For example, if spreadsheet software is used often, the software will be moved to the flash storage for faster user access. In software, this logical volume speeds up performance of the computer by performing both caching for faster writes and auto tiering for faster reads.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

7 more...

Here's the summary for the wikipedia article you mentioned in your comment:

The dead Internet theory is an online conspiracy theory that asserts that the Internet now consists mainly of bot activity and automatically generated content that is manipulated by algorithmic curation, marginalizing organic human activity. Proponents of the theory believe these bots are created intentionally to help manipulate algorithms and boost search results in order to ultimately manipulate consumers. Furthermore, some proponents of the theory accuse government agencies of using bots to manipulate public perception, stating "The U.S. government is engaging in an artificial intelligence powered gaslighting of the entire world population". The date given for this "death" is generally around 2016 or 2017.The theory has gained traction because much of the observed phenomena is grounded in quantifiable phenomena like increased bot traffic. However, the idea that it is a coordinated psyop has been described by Kaitlin Tiffany, staff writer at The Atlantic, as a "paranoid fantasy," even if there are legitimate criticisms involving bot traffic and the integrity of the internet.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

3 more...

Here's the summary for the wikipedia article you mentioned in your comment:

Malicious compliance (also known as malicious obedience) is the behavior of strictly following the orders of a superior despite knowing that compliance with the orders will have an unintended or negative result. It usually implies following an order in such a way that ignores or otherwise undermines the order's intent, but follows it to the letter. A form of passive-aggressive behavior, it is often associated with poor management-labor relationships, micromanagement, a generalized lack of confidence in leadership, and resistance to changes perceived as pointless, duplicative, dangerous, or otherwise undesirable. It is common in organizations with top-down management structures lacking morale, leadership or mutual trust. In U.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

Here's the summary for the wikipedia article you mentioned in your comment:

The Thucydides Trap, or Thucydides' Trap, is a term popularized by American political scientist Graham T. Allison to describe an apparent tendency towards war when an emerging power threatens to displace an existing great power as a regional or international hegemon. The term exploded in popularity in 2015 and primarily applies to analysis of China–United States relations. Supporting the thesis, Allison led a study at Harvard University's Belfer Center for Science and International Affairs which found that, among a sample of 16 historical instances of an emerging power rivaling a ruling power, 12 ended in war. That study, however, has come under considerable criticism, and scholarly opinion on the value of the Thucydides Trap concept—particularly as it relates to a potential military conflict between the United States and China—remains divided.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

Here's the summary for the wikipedia article you mentioned in your comment:

The evil bit is a fictional IPv4 packet header field proposed in a humorous April Fools' Day RFC from 2003, authored by Steve Bellovin. The Request for Comments recommended that the last remaining unused bit, the "Reserved Bit" in the IPv4 packet header, be used to indicate whether a packet had been sent with malicious intent, thus making computer security engineering an easy problem – simply ignore any messages with the evil bit set and trust the rest.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

Here's the summary for the wikipedia article you mentioned in your comment:

Hello Internet is an audio podcast hosted by educational YouTube content creators Brady Haran and CGP Grey. The podcast debuted in 2014 and released 136 numbered episodes and 18 unnumbered episodes until February 2020, when the last episode was published. The podcast is currently indefinitely suspended and inactive. Listeners of the podcast are known as "Tims". The episodes of the podcast are usually about the interests of the creators and the differences between the hosts' lifestyles.

^article^ ^|^ ^about^

1 more...

Here's the summary for the wikipedia article you mentioned in your comment:

The Carrington Event was the most intense geomagnetic storm in recorded history, peaking from 1 to 2 September 1859 during solar cycle 10. It created strong auroral displays that were reported globally and caused sparking and even fires in multiple telegraph stations. The geomagnetic storm was most likely the result of a coronal mass ejection (CME) from the Sun colliding with Earth's magnetosphere. The geomagnetic storm was associated with a very bright solar flare on 1 September 1859. It was observed and recorded independently by British astronomers Richard Christopher Carrington and Richard Hodgson—the first records of a solar flare.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

Here's the summary for the wikipedia article you mentioned in your comment:

IBM Watson is a computer system capable of answering questions posed in natural language. It was developed in IBM's DeepQA project by a research team led by principal investigator David Ferrucci. Watson was named after IBM's founder and first CEO, industrialist Thomas J. Watson. The computer system was initially developed to answer questions on the quiz show Jeopardy!

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

Here's the summary for the wikipedia article you mentioned in your comment:

TEMPEST is a U. S. National Security Agency specification and a NATO certification referring to spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations. TEMPEST covers both methods to spy upon others and how to shield equipment against such spying. The protection efforts are also known as emission security (EMSEC), which is a subset of communications security (COMSEC).

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

4 more...

Here's the summary for the wikipedia article you mentioned in your comment:

GE Appliances is an American home appliance manufacturer based in Louisville, Kentucky. It has been majority owned by Chinese multinational home appliances company Haier since 2016. It is one of the largest appliance companies in the United States and manufactures appliances under several brands, including GE, GE Profile, Café, Monogram, Haier and Hotpoint (Americas only, European rights held by Whirlpool Corporation). The company also owns FirstBuild, a co-creation community and micro-factory on the University of Louisville's campus in Louisville, Kentucky. Another FirstBuild location is in South Korea, and a FirstBuild location in India opened its doors in 2019.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

Here's the summary for the wikipedia article you mentioned in your comment:

Lina M. Khan (born March 3, 1989) is a British-born American legal scholar serving as chairwoman of the Federal Trade Commission (FTC) since 2021. She is also an associate professor of law at Columbia Law School. While a student at Yale Law School, she became known for her work in antitrust and competition law in the United States after publishing the influential essay "Amazon's Antitrust Paradox". She was nominated by President Joe Biden to the Commission in March 2021, and has served since June 2021 following her confirmation.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

Here's the summary for the wikipedia article you mentioned in your comment:

The Open Database License (ODbL) is a copyleft license agreement intended to allow users to freely share, modify, and use a database while maintaining this same freedom for others.ODbL is published by Open Data Commons, which is part of Open Knowledge Foundation.The ODbL was created with the goal of allowing users to share their data freely without worrying about problems relating to copyright or ownership. It allows users to freely use the data in the database, including in other databases; edit existing data in the database; and add new data to the database. The license establishes the rights of users of the database, as well as the correct procedure for attributing credit where credit is due for the data, and how to make changes or improvements in the data, thus simplifying the sharing and comparison of data.

^article^ ^|^ ^about^

Here's the section for the wikipedia article you mentioned in your comment:

Bleemcast! is an independently developed commercial emulator by Bleem! that allows one to load and play PlayStation discs on the Sega Dreamcast. It is compatible with most Dreamcast controllers and steering wheels, and leverages the Dreamcast's superior processing power for enhanced graphics. It was created by using the MIL-CD security hole found in the Dreamcast BIOS.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

2 more...

Here's the summary for the wikipedia article you mentioned in your comment:

Itelmen (Itelmen: Itənmən) or Western Itelmen, formerly known as Western Kamchadal, is a language of the Chukotko-Kamchatkan family spoken on the western coast of the Kamchatka Peninsula. Fewer than a hundred native speakers, mostly elderly, in a few settlements in the southwest of Koryak Autonomous Okrug, remained in 1993. The 2021 Census counted 2,596 ethnic Itelmens, virtually all of whom are now monolingual in Russian. However, there are attempts to revive the language, and it is being taught in a number of schools in the region. (Western) Itelmen is the only surviving Kamchatkan language.

^article^ ^|^ ^about^

2 more...

Here's the summary for the wikipedia article you mentioned in your comment:

` Divide and rule policy (Latin: divide et impera), or divide and conquer, in politics and sociology is gaining and maintaining power divisively. Historically and presently, this strategy was and is used in many different ways by empires seeking to expand their territories; however, it has been hard to distinguish between the exploitation of pre-existing divisions by opponents, and the deliberate creation or strengthening of these divisions implied by "divide and rule". The strategy, but not the phrase, applies in many ancient cases: the example of Aulus Gabinius exists, parting the Jewish nation into five conventions, reported by Flavius Josephus in Book I, 169–170 of The Jewish War (De bello Judaico). Strabo also reports in Geographica, 8.7.3 that the Achaean League was gradually dissolved when it became part of the Roman province of Macedonia, as the Romans treated the various states differently, wishing to preserve some and to destroy others.Elements of this technique involve:

creating or encouraging divisions among the subjects to prevent alliances that could challenge the sovereign and distributing forces so that they overpower each other. aiding and promoting those who are willing to cooperate with the sovereign fostering distrust and enmity between local rulers encouraging meaningless expenditures that reduce the capability for political and military spending `

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

Here's the summary for the wikipedia article you mentioned in your comment:

The dead Internet theory is an online conspiracy theory that asserts that the Internet now consists mainly of bot activity and automatically generated content that is manipulated by algorithmic curation, marginalizing organic human activity. Proponents of the theory believe these bots are created intentionally to help manipulate algorithms and boost search results in order to ultimately manipulate consumers. Furthermore, some proponents of the theory accuse government agencies of using bots to manipulate public perception, stating "The U.S. government is engaging in an artificial intelligence powered gaslighting of the entire world population". The date given for this "death" was generally around 2016 or 2017.The theory has gained traction because much of the observed phenomena is grounded in quantifiable phenomena like increased bot traffic. However, the idea that it is a coordinated psyop has been described by Kaitlin Tiffany, staff writer at The Atlantic, as a "paranoid fantasy," even if there are legitimate criticisms involving bot traffic and the integrity of the internet.

^article^ ^|^ ^about^

1 more...

Here's the summary for the wikipedia article you mentioned in your comment:

The Scorpion and the Frog is an animal fable which teaches that vicious people cannot resist hurting others even when it is not in their own interests. This fable seems to have emerged in Russia in the early 20th century.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

Here's the summary for the wikipedia article you mentioned in your comment:

The No Pants Subway Ride (or No Trousers on the Tube Ride in the UK) is an annual event where people ride rapid transit or subway while they are not wearing pants. Beginning in New York in 2002, the event spread to as many as sixty cities as of 2013.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

Here's the summary for the wikipedia article you mentioned in your comment:

The Brussels effect is the process of unilateral regulatory globalisation caused by the European Union de facto (but not necessarily de jure) externalising its laws outside its borders through market mechanisms. Through the Brussels effect, regulated entities, especially corporations, end up complying with EU laws even outside the EU for a variety of reasons.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

Here's the summary for the wikipedia article you mentioned in your comment:

Fear, uncertainty and doubt (often shortened to FUD) is a manipulative propaganda tactic used in sales, marketing, public relations, politics, polling and cults. FUD is generally a strategy to influence perception by disseminating negative and dubious or false information, and is a manifestation of the appeal to fear.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

Here's the summary for the wikipedia article you mentioned in your comment:

Thread safety is a computer programming concept applicable to multi-threaded code. Thread-safe code only manipulates shared data structures in a manner that ensures that all threads behave properly and fulfill their design specifications without unintended interaction. There are various strategies for making thread-safe data structures.A program may execute code in several threads simultaneously in a shared address space where each of those threads has access to virtually all of the memory of every other thread. Thread safety is a property that allows code to run in multithreaded environments by re-establishing some of the correspondences between the actual flow of control and the text of the program, by means of synchronization.

^article^ ^|^ ^about^

Here's the summary for the wikipedia article you mentioned in your comment:

Thomas Harold Flowers MBE (22 December 1905 - 28 October 1998) was an English engineer with the British General Post Office. During World War II, Flowers designed and built Colossus, the world's first programmable electronic computer, to help decipher encrypted German messages.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

Here's the summary for the wikipedia article you mentioned in your comment:

Enshittification, also known as platform decay, is the pattern of decreasing quality of online platforms that act as two-sided markets. Enshittification can be seen as a form of rent-seeking. Examples of alleged enshittification have included Amazon, Bandcamp, Facebook, Google Search, Quora, Reddit, and Twitter.

^article^ ^|^ ^about^

Here's the summary for the wikipedia article you mentioned in your comment:

A dark pattern (also known as a "deceptive design pattern") is "a user interface that has been carefully crafted to trick users into doing things, such as buying overpriced insurance with their purchase or signing up for recurring bills". User experience designer Harry Brignull coined the neologism on 28 July 2010 with the registration of darkpatterns. org, a "pattern library with the specific goal of naming and shaming deceptive user interfaces". In 2021 the Electronic Frontier Foundation and Consumer Reports created a tip line to collect information about dark patterns from the public.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

5 more...

Here's the summary for the wikipedia article you mentioned in your comment:

Red Star OS (Korean: 붉은별; MR: Pulgŭnbyŏl) is a North Korean Linux distribution, with development first starting in 1998 at the Korea Computer Center (KCC). Prior to its release, computers in North Korea typically used Red Hat Linux, and later switched to modified versions of Microsoft Windows with North Korean language packs installed. Version 3. 0 was released in the summer of 2013, but as of 2014, version 1. 0 continues to be more widely used.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

Here's the summary for the wikipedia article you mentioned in your comment:

Under-occupied developments in China were mostly unoccupied property developments in China, and frequently referred to as "ghost cities" or ghost towns. The phenomenon was observed and recorded as early as 2006 by writer Wade Shepard, and subsequently reported by news media over the decades. Although a feature of discourse on the Chinese economy and urbanization in China in the 2010s, formerly under-occupied developments have largely filled up.

^article^ ^|^ ^about^

Here's the summary for the wikipedia article you mentioned in your comment:

A betavoltaic device (betavoltaic cell or betavoltaic battery) is a type of nuclear battery which generates electric current from beta particles (electrons) emitted from a radioactive source, using semiconductor junctions. A common source used is the hydrogen isotope tritium. Unlike most nuclear power sources which use nuclear radiation to generate heat which then is used to generate electricity, betavoltaic devices use a non-thermal conversion process, converting the electron-hole pairs produced by the ionization trail of beta particles traversing a semiconductor.Betavoltaic power sources (and the related technology of alphavoltaic power sources) are particularly well-suited to low-power electrical applications where long life of the energy source is needed, such as implantable medical devices or military and space applications.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

Here's the summary for the wikipedia article you mentioned in your comment:

Gray goo (also spelled as grey goo) is a hypothetical global catastrophic scenario involving molecular nanotechnology in which out-of-control self-replicating machines consume all biomass (and perhaps also everything else) on Earth while building many more of themselves, a scenario that has been called ecophagy (the literal consumption of the ecosystem). The original idea assumed machines were designed to have this capability, while popularizations have assumed that machines might somehow gain this capability by accident. Self-replicating machines of the macroscopic variety were originally described by mathematician John von Neumann, and are sometimes referred to as von Neumann machines or clanking replicators. The term gray goo was coined by nanotechnology pioneer K. Eric Drexler in his 1986 book Engines of Creation.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

Here's the summary for the wikipedia article you mentioned in your comment:

An advertorial is an advertisement in the form of editorial content. The term "advertorial" is a blend (see portmanteau) of the words "advertisement" and "editorial. " Merriam-Webster dates the origin of the word to 1946. In printed publications, the advertisement is usually written to resemble an objective article and designed to ostensibly look like a legitimate and independent news story. In television, the advertisement is similar to a short infomercial presentation of products or services.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

Here's the summary for the wikipedia article you mentioned in your comment:

A shifting baseline (also known as a sliding baseline) is a type of change to how a system is measured, usually against previous reference points (baselines), which themselves may represent significant changes from an even earlier state of the system.
The concept arose in landscape architect Ian McHarg's 1969 manifesto Design With Nature  in which the modern landscape is compared to that on which ancient people once lived. The concept was then considered by the fisheries scientist Daniel Pauly in his paper "Anecdotes and the shifting baseline syndrome of fisheries". Pauly developed the concept in reference to fisheries management where fisheries scientists sometimes fail to identify the correct "baseline" population size (e. g. how abundant a fish species population was before human exploitation) and thus work with a shifted baseline. He describes the way that radically depleted fisheries were evaluated by experts who used the state of the fishery at the start of their careers as the baseline, rather than the fishery in its untouched state.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

Here's the summary for the wikipedia article you mentioned in your comment:

Ronald Wilson Reagan ( RAY-gən; February 6, 1911 – June 5, 2004) was an American politician and actor who served as the 40th president of the United States from 1981 to 1989. A member of the Republican Party, his presidency constituted the Reagan era, and he is considered one of the most prominent conservative figures in American history. Reagan graduated from Eureka College in 1932 and began to work as a sports broadcaster in Iowa. In 1937, he moved to California, and became a well-known film actor there. From 1947 to 1952, Reagan served as the president of the Screen Actors Guild.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

Here's the summary for the wikipedia article you mentioned in your comment:

A three-dimensional integrated circuit (3D IC) is a MOS (metal-oxide semiconductor) integrated circuit (IC) manufactured by stacking as many as 16 or more ICs and interconnecting them vertically using, for instance, through-silicon vias (TSVs) or Cu-Cu connections, so that they behave as a single device to achieve performance improvements at reduced power and smaller footprint than conventional two dimensional processes. The 3D IC is one of several 3D integration schemes that exploit the z-direction to achieve electrical performance benefits in microelectronics and nanoelectronics. 3D integrated circuits can be classified by their level of interconnect hierarchy at the global (package), intermediate (bond pad) and local (transistor) level. In general, 3D integration is a broad term that includes such technologies as 3D wafer-level packaging (3DWLP); 2. 5D and 3D interposer-based integration; 3D stacked ICs (3D-SICs); 3D heterogeneous integration; and 3D systems integration.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

4 more...

Here's the summary for the wikipedia article you mentioned in your comment:

Project Ara was a modular smartphone project under development by Google. The project was originally headed by the Advanced Technology and Projects team within Motorola Mobility while it was a Google subsidiary. Google retained the ATAP group when selling Motorola Mobility to Lenovo, and it was placed under the stewardship of the Android development staff; Ara was later split off as an independent operation. Google stated that Project Ara was being designed to be utilized by "6 billion people": 1 billion current smartphone users, and 5 billion feature phone users.Under its original design, Project Ara was intended to consist of hardware modules providing common smartphone parts, such as processors, displays, batteries, and cameras, as well as modules providing more specialized components, and "frames" that these modules were to be attached to. This design would allow a device to be upgraded over time with new capabilities and upgraded without requiring the purchase of an entire new device, providing a longer lifecycle for the device and potentially reducing electronic waste. However, by 2016, the concept had been revised, resulting in a base phone with non-upgradable core components, and modules providing supplemental features. Google planned to launch a new developer version of Ara in the fourth quarter of 2016, with a target bill of materials cost of $50 for a basic phone, leading into a planned consumer launch in 2017. However, on September 2, 2016, Reuters reported that two non-disclosed sources leaked that Alphabet's manufacture of frames had been canceled, with possible future licensing to third parties. Later that day, Google confirmed that Project Ara had been shelved.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

Here's the summary for the wikipedia article you mentioned in your comment:

The Utah Data Center (UDC), also known as the Intelligence Community Comprehensive National Cybersecurity Initiative Data Center, is a data storage facility for the United States Intelligence Community that is designed to store data estimated to be on the order of exabytes or larger. Its purpose is to support the Comprehensive National Cybersecurity Initiative (CNCI), though its precise mission is classified. The National Security Agency (NSA) leads operations at the facility as the executive agent for the Director of National Intelligence. It is located at Camp Williams near Bluffdale, Utah, between Utah Lake and Great Salt Lake and was completed in May 2014 at a cost of $1. 5 billion.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

Here's the summary for the wikipedia article you mentioned in your comment:

` From 2014 onwards, software which manipulated air pollution tests was discovered in vehicles from some car makers; the software recognized when the standardized emissions test was being done, and adjusted the engine to emit less during the test. The cars emitted much higher levels of pollution under real-world driving conditions. Some cars' emissions were higher even though there was no manipulated software. Scandals relating to higher-than-reported emissions from diesel engines began in 2014 when the International Council on Clean Transportation (ICCT) reported discrepancies between European and US models of vehicles. This began with the Volkswagen emissions scandal. Independent tests carried out by the German car club ADAC proved that, under normal driving conditions, diesel vehicles including the Volvo S60, Renault's Espace Energy and the Jeep Renegade, exceeded legal European emission limits for nitrogen oxide (NOx) by more than 10 times. ICCT and ADAC showed the biggest deviations from Volvo, Renault, Jeep, Hyundai, Citroën and Fiat.Researchers have criticized the inadequacy of current regulations and called for the use of a UN-sanctioned test called Worldwide harmonized Light vehicles Test Procedures that better reflects real-life driving conditions. The test only came into force in 2017, with critics saying that car firms lobbied fiercely to delay its implementation due to the high cost of meeting stricter environmental controls.Conservative Internal Market spokesman Daniel Dalton – who led the legislation through the European Parliament – described the previous regulations as "at best patchy and at worst ineffective." He further said that his latest 2018 report introduced a strong, transparent system to ensure cars are safe and meet emissions standards.

Since 2016, 38 out of 40 diesel cars tested by ADAC failed a NOx-test. `

^article^ ^|^ ^about^

Here's the summary for the wikipedia article you mentioned in your comment:

Forced fatherhood or imposed paternity, occurs when a man's semen is used, against his will or without his knowledge or consent, to inseminate a woman, it includes deception by a partner about their ability to get pregnant or use of contraceptives, birth control sabotage, and sexual assaults of males that result in pregnancy. "Sperm theft" (also known as "unauthorized use of sperm", "spermjacking" or "spurgling" (a portmanteau of sperm and burgling), refers to a specific form of forced fatherhood where a males semen is collected without his consent. Although the term uses the word "theft", it more closely falls under a state of fraud or breach of contract. Stealing of sperm in itself without using it for successful insemination is not illegal and is difficult to prove. It usually has no bearing on issues like child support.

^to^ ^opt^ ^out^^,^ ^pm^ ^me^ ^'optout'.^ ^article^ ^|^ ^about^

Here's the summary for the wikipedia article you mentioned in your comment:

"Kill Switch" is the eleventh episode of the fifth season of the science fiction television series The X-Files. It premiered in the United States on the Fox network on February 15, 1998. It was written by William Gibson and Tom Maddox and directed by Rob Bowman. The episode is a "Monster-of-the-Week" story, unconnected to the series' wider mythology. "Kill Switch" earned a Nielsen household rating of 11.1, being watched by 18.04 million people in its initial broadcast. The episode received mostly positive reviews from television critics, with several complimenting Fox Mulder's virtual experience. The episode's name has also been said to inspire the name for the American metalcore band Killswitch Engage. The show centers on FBI special agents Fox Mulder (David Duchovny) and Dana Scully (Gillian Anderson) who work on cases linked to the paranormal, called X-Files. Mulder is a believer in the paranormal, while the skeptical Scully has been assigned to debunk his work. In this episode, Mulder and Scully become targets of a rogue AI capable of the worst kind of torture while investigating the strange circumstances of the death of a reclusive computer genius rumored to have been researching artificial intelligence. "Kill Switch" was co-written by cyberpunk pioneers William Gibson and Tom Maddox. The two eventually wrote another episode for the show: season seven's "First Person Shooter". "Kill Switch" was written after Gibson and Maddox approached the series, offering to write an episode. Reminiscent of the "dark visions" of filmmaker David Cronenberg, the episode contained "many obvious pokes and prods at high-end academic cyberculture." In addition, "Kill Switch" contained several scenes featuring elaborate explosives and digital effects, including one wherein a computer-animated Scully fights nurses in a virtual hospital. "Kill Switch" deals with various "Gibsonian" themes, including alienation, paranoia, artificial intelligence, and transferring one's consciousness into cyberspace, among others.

^article^ ^|^ ^about^