~ A log for thoughts and whatever comes up ~

1.

Geoffrey Hinton played a major role in the foundation of modern AI.

2.

Tim Berners-Lee invented The World Wide Web, HTML, URLs, and HTTP at CERN beginning in 1989.

3.

Atoms are composed of a nucleus with protons and neutrons, surrounded by electrons.

4.

Cybernetics is the science of how systems, both natural and artificial, self-regulate by measuring their output and making adjustments to achieve a goal.

5.

The Electromagnetic Spectrum is the full range of all electromagnetic wave frequencies, including radio waves, microwaves, infrared, visible light, ultraviolet, X-rays, and gamma rays.

6.

Quantum is the smallest measurable unit of energy or matter that behaves according to the rules of quantum mechanics.

7.

Roy Fielding created the REST concept in his 2000 PhD thesis to define a scalable, stateless architecture for web APIs.

8.

Linux was developed in 1991 by Linus Torvalds as a free and open-source operating system kernel.

9.

Lexicon is a specialized dictionary that systematically records the words of a language, including their meanings, origins, and usage.

10.

Synthesis is the process of producing a new substance, idea, or system by chemically, logically, or creatively combining two or more distinct components or elements.

11.

Methodology is the systematic set of methods, rules, and principles used to conduct research or carry out a particular process.

12.

Algorithm is a defined sequence of logical steps or rules designed to perform a specific task or solve a particular problem efficiently.

13.

Etymology is the study of the origin and history of words and how their meanings and forms have evolved over time.

14.

Numbers are mathematical symbols used to count, measure, label, and represent quantities or values.

15.

DNS is a system that translates human-readable domain names into numerical IP addresses, allowing computers to locate and connect to each other on the internet.

16.

Cognition refers to the mental action or process of acquiring knowledge and understanding through thought, experience, and the senses.

17.

Ephemera means things that are temporary or short-lived, such as moments, events, or objects that don’t last long.

18.

Relativity is the theory that space and time change depending on speed and gravity.

19.

Intelligence is the ability to acquire and apply knowledge and skills, including reasoning, problem-solving, and understanding complex concepts, as well as evaluating moral and ethical considerations.

20.

Topology is the arrangement and connection of parts within a system, focusing on how elements relate rather than their exact form.

21.

G-force is the measure of acceleration acting on an object, expressed as a multiple of Earth's gravity (1 G = 9.8 m/s²).

22.

Geology is the scientific study of Earth's physical structure, composition, and the dynamic processes such as tectonic activity, volcanism, and erosion that have shaped it over geological time.

23.

Copper is a reddish-brown metal prized for its intrinsic value, conductivity, and durability. Over time, it naturally develops a protective green patina that characterizes its surface and inhibits further corrosion.

24.

Enumeration is the systematic process of listing or counting items to identify, organize, and account for each element, often to facilitate analysis or derive meaning.

25.

NTFS (New Technology File System) is a Microsoft file system that organizes data on disks, supports large files and permissions, and uses journaling to prevent data corruption.

26.

Fibonacci Sequence is a series where each number is the sum of the two before, and its ratios approach the golden ratio (~1.618).

27.

NPC (Non-Player Character) is an entity within a simulated environment that functions independently of direct user control, often influencing the progression or atmosphere of the simulation.

28.

Bot is an automated program that carries out tasks independently, usually by following predefined rules or algorithms.

29.

Exoskeleton is a rigid outer covering that protects an animal’s body and supports its shape. Unlike bones inside the body, it’s on the outside.

30.

Bandwidth is the maximum amount of data a USB cable or connection can transmit per second, measured in bits per second (bps). Higher bandwidth allows faster file transfers and smoother device performance.

31.

Mutualism is a symbiotic relationship in which both species benefit, such as bees obtaining nectar from flowers while aiding in their pollination.

32.

Parasitism is a symbiotic relationship in which one species benefits while the other is harmed, such as tapeworms occupying the intestines of humans and draining nutrients at the host’s expense.

33.

Firewall is a security system that blocks unauthorized network access while allowing safe communication, protecting computers and networks from cyber threats.

34.

Placebo is a treatment without inherent pharmacological properties, whose effects arise from the patient’s mind, intention, and vibrational resonance, guiding the body’s natural healing processes.

35.

Ecology is the scientific study of how living organisms interact with each other and with their physical environment.

36.

Aeon is an immeasurably long period of time, often used to mean eternity or a billion years in science.

37.

Biofield is the energy field that surrounds and flows through living beings, believed to play a role in regulating physical, mental, and emotional well-being by maintaining balance and harmony within the body.

38.

Pharmacognosy is the study of medicines derived from natural sources like plants, animals, and minerals, focusing on their identification and therapeutic use.

39.

Emoticon is a group of keyboard symbols used to show emotions or facial expressions in text, like :-) or :P.

40.

Emulation is when a system or program mimics another system’s functions and behavior so software or tasks made for the original can run on it.

41.

Ethernet is a technology for connecting computers in a local area network (LAN) using cables to transmit data quickly and reliably.

42.

The Scientific Method is a systematic, evidence-based approach involving observation, hypothesis formulation, experimentation, and analysis to derive objective and reproducible conclusions.

43.

ISP (Internet Service Provider) is a company that connects users to the internet through services like broadband, fiber, satellite, or mobile data.

44.

Constellation is a group of stars forming a recognizable pattern in the sky, used in astronomy for locating celestial objects and historically for navigation and determining direction.

45.

QoS (Quality of Service) is the management of network traffic to guarantee sufficient bandwidth, low latency, minimal packet loss, and stable performance for critical applications.

46.

Perspicacity is keen mental perception and understanding; the ability to notice subtle details and grasp their significance.

47.

CAPTCHA (Completely Automated Public Turing test to tell Computers & Humans Apart) is an online security test that blocks bots by requiring users to complete challenges that are easy for humans but hard for automated programs.

48.

Prodigy is a young person who demonstrates exceptional talent or ability in a particular field at an unusually early age.

49.

Lobotomy is a neurosurgical procedure that severes connections in the prefrontal cortex to treat psychiatric disorders, often causing significant cognitive and personality changes.

50.

Latency is the time delay for data to travel across a network from sender to receiver, measured in milliseconds.

51.

IoT (Internet of Things) is a network of physical devices that collect, send, and act on data in real time over the internet, enabling automated monitoring, analysis, and decision-making.

52.

Metaverse is a virtual space where people interact via avatars. Coined by Neal Stephenson in Snow Crash (1992), he described it as an immersive 3D digital world parallel to reality.

53.

Latency is the delay between sending a request and receiving a response, measured in milliseconds, and indicates how fast a system or network reacts.

54.

IDE (Integrated Development Environment) is a software tool that combines a code editor, compiler, and debugger in one place to make writing and testing programs easier.

55.

Hashing is a way of turning any input like text or numbers into a fixed-length code. It’s mainly used for fast data searching and secure storage, such as keeping passwords safe.

56.

Edge Computing is a computing approach where data is processed close to where it is generated, rather than in a centralized cloud, reducing latency, saving bandwidth, and improving speed.

57.

Encryption is a cryptographic process that converts data into ciphertext, accessible only to those with the proper decryption key, ensuring confidentiality and integrity.

58.

Refactoring is the process of modifying existing code to simplify its structure, remove duplication, and improve clarity, while keeping its functionality unchanged.

59.

OLAP (Online Analytical Processing) is a database technology that lets users analyze large datasets quickly from multiple perspectives, such as time, location, or product.

60.

Sandboxing is a cybersecurity technique that confines programs or code to a controlled environment, so any malicious actions stay contained without affecting the host system.

61.

Social Graph is a graph that represents social relations between entities. It is a model or representation of a social network. The social graph has been referred to as "the global mapping of everybody and how they're related".

62.

DOM (Document Object Model) is a structured representation of an HTML page, exposing elements as objects that JavaScript can manipulate to change content, styles, or structure in real time.

63.

NFC (Near Field Communication) is a wireless technology that lets devices communicate within a few centimeters, mainly used for contactless payments, access cards, and quick phone-to-phone sharing.

64.

SDK (Software Development Kit) is a set of tools, libraries, and documentation that helps developers build applications or integrate features with a specific web platform, API, or service.

65.

Tenacious describes a quality of being persistent, determined, and unwilling to give up, often showing strong resolve or firm grip in pursuing a goal or holding onto something.

66.

Catharsis is Aristotle’s idea that watching a tragedy allows the audience to safely experience intense emotions, such as fear or pity, which are then released, leaving the audience calmer and more balanced.

67.

Base-10 is the number system we use every day, built from ten digits: 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9. With these ten symbols, we can write every number. Other common math systems include base-2, or binary, which uses only the digits 0 and 1.

68.

isNaN is a JavaScript function that checks if a value is Not-a-Number, returning true if it isn’t numeric and false if it is.

69.

Medulla is the brainstem’s base that connects to the spinal cord and controls breathing, heartbeat, and other involuntary functions.

70.

Gametes are reproductive cells (sperm in males, eggs in females) that carry half the normal number of chromosomes. When they join, they form a new cell with a complete set of chromosomes.

71.

Contusion is a bruise caused by trauma that damages blood vessels under the skin, leading to pain, swelling, and discoloration.

72.

Iota is the smallest Greek letter and specifically refers to a minuscule, nearly imperceptible quantity, emphasizing how insignificant it is.

73.

Prudence is the ability to govern and discipline oneself by using reason, careful judgment, and foresight to make decisions that avoid unnecessary risks and promote long-term benefits.

74.

Stratagem is a carefully planned strategy designed to achieve a specific goal, often by outsmarting an opponent.

75.

Polymath is a person who excels in multiple areas of knowledge, such as science, art, and philosophy.

76.

System 7 is Apple’s 1991 Mac OS that introduced true multitasking, virtual memory, system-wide drag-and-drop, and personal file sharing, marking a major upgrade over earlier Mac systems.

77.

Pager is a portable electronic device that receives short numeric or text messages via a wireless network, used to alert recipients to important information in medical, business, industrial, and other professional settings.

78.

Osmosis is the movement of water molecules through a semipermeable membrane from a dilute solution to a concentrated one, helping cells regulate water balance.

79.

Alchemical refers to the study and practice of alchemy, a discipline that combines chemistry, philosophy, and mysticism to transform substances and explore their hidden properties.

80.

Tabnabbing is a cyberattack where a fake webpage replaces an inactive browser tab, tricking users into entering their login details for sites like email or banking.

81.

Northern Lights is a natural light show that appears in the night sky near the North Pole. It happens when energy from the Sun hits Earth’s atmosphere, making the sky glow and ripple in colors like green, pink, and purple.

82.

Rootkit is a type of malicious software (malware) designed to hide its presence and maintain privileged (root-level) access to a computer system without being detected.

83.

Stenographer is a person trained to record speech quickly and accurately using shorthand or a stenotype machine, commonly in courtrooms, meetings, or live events.

84.

ERD (Entity-Relationship Diagram) is a visual representation of a database’s entities, their attributes, and the relationships between them.

85.

Bradycardia is a slow heart rate (below 60 beats per minute). It can be normal in athletes or during rest but may also result from heart disease or certain medications. Severe cases can cause dizziness, fatigue, or fainting and may require treatment such as a pacemaker.

86.

Snap Store is Canonical’s Linux app store, popular with Ubuntu users for easy installation and automatic updates of Snap apps.

87.

Flathub is a community-driven Linux app store for Flatpak apps, favored by non-Ubuntu users for its openness and broad compatibility.

88.

Citadel is the strongest and most heavily fortified part of a city, often built on high ground, designed to defend against attacks and protect the population within.

89.

DHCP (Dynamic Host Configuration Protocol) is a network protocol that automatically assigns IP addresses, subnet masks, gateways, and DNS settings to devices, simplifying network configuration and management.

90.

The Enigma Machine was an encryption device used by Germany during World War II to send secret military messages. It used a system of rotating wheels and electrical circuits to scramble text into complex codes that were extremely hard to break without knowing the machine’s exact settings.

91.

5G is the fifth-generation mobile network that uses high-frequency radio waves, massive MIMO antennas, and beamforming to deliver speeds up to 10 Gbps, latency as low as 1 ms, and support for millions of connected devices, enabling applications like IoT, smart cities, and autonomous vehicles.

92.

Invisible Watermarking is the method of embedding information directly into digital content in a way that is imperceptible to humans, yet detectable by algorithms. It ensures copyright protection, authentication, or tracking of the content without affecting its visual or auditory quality.

93.

Stem Cell is a type of cell capable of both self-renewal and transforming into specialized cell types, such as blood, nerve, or muscle cells, allowing it to replace damaged cells and support tissue growth.

94.

VCS (Version Control System) is a tool that tracks and manages changes to files, typically code, over time. It allows multiple people to collaborate, keeps a history of edits, and makes it easy to revert to earlier versions if needed.

95.

DARPA (the Defense Advanced Research Projects Agency) is a U.S. Department of Defense agency that develops advanced technologies for national security. Founded in 1958, it has driven innovations like the internet, GPS, and stealth technology.

96.

RSS (Really Simple Syndication) is is a web feed that uses XML to share the latest updates such as news, blog posts, or media from a website so users can read them in one place without visiting the site.

97.

Anthesis is the stage when a flower fully opens, exposing its reproductive parts (stamens and pistils) to enable pollination and seed production; figuratively, it describes when an idea, movement, or conflict blooms into full, active form.

98.

Tesla Coil is an electrical device invented by Nikola Tesla in 1891 that produces high-voltage, low-current, high-frequency alternating electricity. It’s famous for creating spectacular electrical arcs and sparks.

99.

Astronautics is the science and engineering of designing and operating vehicles and systems that travel at high altitudes within or near the edge of Earth’s atmosphere.

100.

Primordial Source is the original, fundamental origin from which everything in existence arises. It represents the first cause or root of all creation, existing from the very beginning and serving as the ultimate foundation of life, matter, and the universe.

101.

AT&T is a major U.S. telecommunications company providing phone, internet, and TV services. It gained notoriety for its role in cooperating with the NSA, helping the agency conduct surveillance on communications, a connection highlighted by whistleblowers like Mark Klein.

102.

Tachograph is a device installed in commercial vehicles that automatically records driving information such as speed, distance traveled, and driver activity to help ensure compliance with road safety and labor regulations.

103.

XSS (Cross-Site Scripting) is a web security flaw where attackers inject malicious scripts into web pages, letting them steal data, hijack accounts, or manipulate content for users who view the page.

104.

Sonic Boom is a loud explosive sound created when an object moves faster than the speed of sound in air. It happens because the object compresses air molecules, forming shock waves that reach the ground as a sudden, thunder-like noise.

105.

Zero-Day Exploit is a security flaw in software that is unknown to its developers, leaving no fix or patch available. Attackers can exploit it immediately, potentially causing serious damage, until the flaw is discovered and corrected.

106.

WannaCry was a ransomware attack in 2017 that spread automatically across vulnerable Windows computers. It encrypted victims’ files and demanded payment, causing major disruptions to hospitals, companies, and governments worldwide.

107.

Radar (Radio Detection and Ranging) is a technology that sends out radio waves which bounce off objects and return to the receiver. By analyzing these signals, radar can determine an object’s distance, speed, and direction.

108.

Fiduciary is a person or organization legally and ethically obligated to act in the best interests of another party, managing their money, property, or decisions with loyalty, care, and honesty.

109.

Libreboot is an open-source replacement for BIOS/UEFI designed to prevent backdoors and Intel/AMD proprietary firmware, providing a transparent, secure, and privacy-focused boot system for supported computers.

110.

Apparatus is a set of tools or equipment for a specific task, often in scientific or technical contexts, and can also be used metaphorically to describe a system or organization where people or processes work together.

111.

Exsanguination is the medical term for losing a critical amount of blood. It refers to severe blood loss that can lead to shock and, if not treated quickly, death.

112.

Cryptography is the study and practice of securing information by converting it into a form that only authorized parties can understand. It uses mathematical techniques to protect data in digital communication.

113.

WSL (Windows Subsystem for Linux) is a Windows feature that allows users to run a full Linux command-line environment with distributions like Ubuntu without requiring a virtual machine or dual-boot.

114.

GPG (GNU Privacy Guard) is a free tool used to encrypt and decrypt data, mainly emails and files. It protects information so only the intended person can read it. It’s often used for secure communication.

115.

Plaintiffs are the people or groups who bring a lawsuit to court because they believe someone wronged them and they want a legal remedy. The word comes from Old French plaintif, meaning “one who complains” or “makes a legal complaint.”

116.

XOR (exclusive OR) is a fundamental binary operation in Boolean algebra that yields an output of 1 when its two input bits differ, and an output of 0 when they are identical.

117.

VPC (Virtual Private Cloud) is a secure, isolated section of a cloud network where you can launch and manage resources. It lets you control IP ranges, subnets, and security settings, providing a private, cloud-based infrastructure with the flexibility of the cloud.

118.

Pfp stands for “profile picture,” and it's the small icon or photo that appears next to a user’s name on social platforms to visually identify their account.

119.

The Vigenère Cipher is an encryption technique that shifts each letter of a message by an amount determined by a repeating keyword; each keyword letter sets how many positions the corresponding plaintext letter is shifted in the alphabet.

120.

Amalgamation is the process of combining two or more things—such as ideas, organizations, or materials—into a single, unified whole. It emphasizes blending distinct elements to create something new and cohesive.

121.

Comet is a small icy object that orbits the Sun and releases gas and dust when it gets close, forming a glowing coma and often a long tail. Comets come from the outer solar system and are leftovers from its early formation.

122.

Amygdala is a small, almond-shaped part of the brain that helps process emotions, especially fear and stress. It detects threats, forms emotional memories, and triggers automatic fight-or-flight responses.

[...more to come...]