Programming Behaviors

In software engineering, behavior-driven development (BDD) is an agile software development process that encourages collaboration among developers, quality assurance testers, and customer representatives in a software project. It encourages teams to use conversation and concrete examples to formalize a shared understanding of how the application should behave. It emerged from test-driven development (TDD). Behavior-driven development combines the general techniques and principles of TDD with ideas from domain-driven design and object-oriented analysis and design to provide software development and management teams with shared tools and a shared process to collaborate on software development.

The madman theory is a political theory commonly associated with US President Richard Nixon’s foreign policy. Nixon and his administration tried to make the leaders of hostile Communist Bloc nations think he was irrational and volatile. According to the theory, those leaders would then avoid provoking the United States, fearing an unpredictable American response.

International relations scholars have been skeptical of madman theory as a strategy for success in bargaining. One study found that madman theory is frequently counterproductive, but that it can be an asset under certain conditions.

Deterrence is widely defined as any use of threats (implicit or explicit) or limited force intended to dissuade an actor from taking an action (i.e. maintain the status quo). Deterrence is unlike compellence, which is the attempt to get an actor (such as a state) to take an action (i.e. alter the status quo). Both are forms of coercion. Compellence has been characterized as harder to successfully implement than deterrence. Deterrence also tends to be distinguished from defense or the use of full force in wartime.

Good cop/bad cop is a psychological tactic used in negotiation and interrogation, in which a team of two interrogators take apparently opposing approaches to the subject. One interrogator adopts a hostile or accusatory demeanor, emphasizing threats of punishment, while the other adopts a more sympathetic demeanor, emphasizing reward, in order to convince the subject to cooperate.

Vladimir Vladimirovich Putin (born 7 October 1952) is a Russian politician and former intelligence officer who is serving as the current president of Russia since 2012, previously being in the office from 1999 until 2008. He was also prime minister from 1999 to 2000 and again from 2008 to 2012. As of 2021, Putin is the second-longest serving European president, after Alexander Lukashenko of Belarus.

Many Russians credit Putin for reviving Russia’s fortunes. Former Soviet Union leader Mikhail Gorbachev, while acknowledging the flawed democratic procedures and restrictions on media freedom during the Putin presidency, said that Putin had pulled Russia out of chaos at the end of the Yeltsin years, and that Russians “must remember that Putin saved Russia from the beginning of a collapse.” In 2015, opposition politician Boris Nemtsov said that Putin was turning Russia into a “raw materials colony” of China. Chechen Republic head and Putin supporter, Ramzan Kadyrov, states that Putin saved both the Chechen people and Russia.

Nuclear Magnetic Resonance

Nuclear magnetic resonance (NMR) is a physical phenomenon in which nuclei in a strong constant magnetic field are perturbed by a weak oscillating magnetic field (in the near field) and respond by producing an electromagnetic signal with a frequency characteristic of the magnetic field at the nucleus. This process occurs near resonance, when the oscillation frequency matches the intrinsic frequency of the nuclei, which depends on the strength of the static magnetic field, the chemical environment, and the magnetic properties of the isotope involved; in practical applications with static magnetic fields up to ca. 20 tesla, the frequency is similar to VHF and UHF television broadcasts (60–1000 MHz). NMR results from specific magnetic properties of certain atomic nuclei. Nuclear magnetic resonance spectroscopy is widely used to determine the structure of organic molecules in solution and study molecular physics and crystals as well as non-crystalline materials. NMR is also routinely used in advanced medical imaging techniques, such as in magnetic resonance imaging (MRI).

The most commonly used nuclei are 1H and 13C, although isotopes of many other elements can be studied by high-field NMR spectroscopy as well. In order to interact with the magnetic field in the spectrometer, the nucleus must have an intrinsic nuclear magnetic moment and angular momentum. This occurs when an isotope has a nonzero nuclear spin, meaning an odd number of protons and/or neutrons (see Isotope). Nuclides with even numbers of both have a total spin of zero and are therefore NMR-inactive.

A key feature of NMR is that the resonance frequency of a particular sample substance is usually directly proportional to the strength of the applied magnetic field. It is this feature that is exploited in imaging techniques; if a sample is placed in a non-uniform magnetic field then the resonance frequencies of the sample’s nuclei depend on where in the field they are located. Since the resolution of the imaging technique depends on the magnitude of the magnetic field gradient, many efforts are made to develop increased gradient field strength.

The principle of NMR usually involves three sequential steps:

  • The alignment (polarization) of the magnetic nuclear spins in an applied, constant magnetic field B0.
  • The perturbation of this alignment of the nuclear spins by a weak oscillating magnetic field, usually referred to as a radio-frequency (RF) pulse. The oscillation frequency required for significant perturbation is dependent upon the static magnetic field (B0) and the nuclei of observation.
  • The detection of the NMR signal during or after the RF pulse, due to the voltage induced in a detection coil by precession of the nuclear spins around B0. After an RF pulse, precession usually occurs with the nuclei’s intrinsic Larmor frequency and, in itself, does not involve transitions between spin states or energy levels.

The two magnetic fields are usually chosen to be perpendicular to each other as this maximizes the NMR signal strength. The frequencies of the time-signal response by the total magnetization (M) of the nuclear spins are analyzed in NMR spectroscopy and magnetic resonance imaging. Both use applied magnetic fields (B0) of great strength, often produced by large currents in superconducting coils, in order to achieve dispersion of response frequencies and of very high homogeneity and stability in order to deliver spectral resolution, the details of which are described by chemical shifts, the Zeeman effect, and Knight shifts (in metals). The information provided by NMR can also be increased using hyperpolarization, and/or using two-dimensional, three-dimensional and higher-dimensional techniques.

The term “prison–industrial complex” (PIC), after the “military–industrial complex” of the 1950s, describes the attribution of the rapid expansion of the US inmate population to the political influence of private prison companies and businesses that supply goods and services to government prison agencies for profit. According to this concept the most common agents of PIC are corporations that contract cheap prison labor, construction companies, surveillance technology vendors, companies that operate prison food services and medical facilities, correctional officers unions, private probation companies, lawyers, and lobby groups that represent them.

The term also refers to the network of participants who, in theory, prioritize personal financial gain over rehabilitating criminals. Proponents of this view, including civil rights organizations such as the Rutherford Institute and the American Civil Liberties Union (ACLU), believe that the desire for monetary gain through prison privatization has led to the growth of the prison industry and contributed to the increase of incarcerated individuals, also known as mass incarceration. These advocacy groups assert that incentivizing the construction of more prisons for monetary gain will encourage incarceration, which would affect people of color at disproportionately high rates.

Feedback Loop

Negative feedback

A Negative feedback occurs when the fed-back output signal has a relative phase of 180° with respect to the input signal. This situation is sometimes referred to as being out of phase, but that term also is used to indicate other phase separations, as in “90° out of phase”. Negative feedback can be used to correct output errors or to desensitize a system to unwanted fluctuations. In feedback amplifiers, this correction is generally for waveform distortion reduction or to establish a specified gain level. A general expression for the gain of a negative feedback amplifier is the asymptotic gain model.

Positive feedback

Positive feedback occurs when the fed-back signal is in phase with the input signal. Under certain gain conditions, positive feedback reinforces the input signal to the point where the output of the device oscillates between its maximum and minimum possible states. Positive feedback may also introduce hysteresis into a circuit. This can cause the circuit to ignore small signals and respond only to large ones. It is sometimes used to eliminate noise from a digital signal. Under some circumstances, positive feedback may cause a device to latch, i.e., to reach a condition in which the output is locked to its maximum or minimum state. This fact is very widely used in digital electronics to make bistable circuits for volatile storage of information.

The loud squeals that sometimes occurs in audio systems, PA systems, and rock music are known as audio feedback. If a microphone is in front of a loudspeaker that it is connected to, sound that the microphone picks up comes out of the speaker, and is picked up by the microphone and re-amplified. If the loop gain is sufficient, howling or squealing at the maximum power of the amplifier is possible.


An electronic oscillator is an electronic circuit that produces a periodic, oscillating electronic signal, often a sine wave or a square wave. Oscillators convert direct current (DC) from a power supply to an alternating current signal. Common examples of signals generated by oscillators include signals broadcast by radio and television transmitters, clock signals that regulate computers and quartz clocks, and the sounds produced by electronic beepers and video games.

Oscillators are often characterized by the frequency of their output signal:

  • A low-frequency oscillator (LFO) is an electronic oscillator that generates a frequency below ≈20 Hz. This term is typically used in the field of audio synthesizers, to distinguish it from an audio frequency oscillator.
  • An audio oscillator produces frequencies in the audio range, about 16 Hz to 20 kHz.
  • An RF oscillator produces signals in the radio frequency (RF) range of about 100 kHz to 100 GHz.

Oscillators designed to produce a high-power AC output from a DC supply are usually called inverters.

There are two main types of electronic oscillator: the linear or harmonic oscillator and the nonlinear or relaxation oscillator.

On Superpositions

PRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from various U.S. internet companies.[1][2][3] The program is also known by the SIGAD US-984XN.[4][5] PRISM collects stored internet communications based on demands made to internet companies such as Google LLC under Section 702 of the FISA Amendments Act of 2008 to turn over any data that match court-approved search terms.[6] Among other things, the NSA can use these PRISM requests to target communications that were encrypted when they traveled across the internet backbone, to focus on stored data that telecommunication filtering systems discarded earlier,[7][8] and to get data that is easier to handle.[9]

PRISM began in 2007 in the wake of the passage of the Protect America Act under the Bush Administration.[10][11] The program is operated under the supervision of the U.S. Foreign Intelligence Surveillance Court (FISA Court, or FISC) pursuant to the Foreign Intelligence Surveillance Act (FISA).[12] Its existence was leaked six years later by NSA contractor Edward Snowden, who warned that the extent of mass data collection was far greater than the public knew and included what he characterized as “dangerous” and “criminal” activities.[13] The disclosures were published by The Guardian and The Washington Post on June 6, 2013. Subsequent documents have demonstrated a financial arrangement between the NSA’s Special Source Operations (SSO) division and PRISM partners in the millions of dollars.[14]

Documents indicate that PRISM is “the number one source of raw intelligence used for NSA analytic reports”, and it accounts for 91% of the NSA’s internet traffic acquired under FISA section 702 authority.”[15][16] The leaked information came after the revelation that the FISA Court had been ordering a subsidiary of telecommunications company Verizon Communications to turn over to the NSA logs tracking all of its customers’ telephone calls.[17][18]

U.S. government officials have disputed criticisms of PRISM in the Guardian and Washington Post articles and have defended the program, asserting that it cannot be used on domestic targets without a warrant, that it has helped to prevent acts of terrorism, and that it receives independent oversight from the federal government’s executive, judicial and legislative branches.[19][20] On June 19, 2013, U.S. President Barack Obama, during a visit to Germany, stated that the NSA’s data gathering practices constitute “a circumscribed, narrow system directed at us being able to protect our people.”[21]

Wide Area Persistent Surveillance (also Wide Area Motion Imaging) is a form of airborne surveillance system that collects pattern-of-life data by recording motion images of an area larger than a city – in sub-meter resolution. This video allows for anyone within the field of regard to be tracked – both live and retroactively, for forensic analysis. The use of sophisticated tracking algorithms applied to the WAMI dataset also enables mass automated geo-location tracking of every vehicle and pedestrian.[123] WAMI sensors are typically mounted on manned airplanes, drones, blimps and aerostats. WAMI is currently in use on the southern border of the USA and has been deployed in Baltimore,[124] Dayton Ohio as well as in Los Angeles, specifically targeting Compton. Wide Area Persistent Surveillance systems such as ARGUS WAMI are capable of live viewing and recording a 68 square mile area with enough detail to view pedestrians and vehicles and generate chronographs[125] These WAMI cameras, such as Gorgon Stare, Angelfire, Hiper Stare, Hawkeye and ARGUS,[126] create airborne video so detailed that pedestrians can be followed across the city through forensic analysis. This allows investigators to rewind and playback the movements of anyone within this 68 square mile area for hours, days or even months at a time depending on the airframe the WAMI sensors are mounted on. JLENS, a surveillance aerostat scheduled for deployment over the east coast of the USA, is a form of WAMI that uses sophisticated radar imaging along with electro-optical WAMI sensors to enable mass geo-location tracking of ground vehicles.

While a resistance to the domestic deployment of WAMI has emerged in areas where the public has learned of the technologies use, the deployments have been intentionally hidden from the public, as in Compton California, where the mayor learned about the surveillance[127] from groups like the American Civil Liberties Union,[128] Teame Zazzu[123] and the Center for Investigative Reporting.

PeSEAS[129] and PerMIATE[130] software automate and record the movement observed in the WAMI video.[131] This technology uses software to track and record the movements of pedestrians and vehicles using automatic object recognition software across the entire frame, generating “tracklets” or chronographs of every car and pedestrian movements. 24/7 deployment of this technology has been suggested by the DHS on spy blimps such as the recently killed Blue Devil Airship.[132]

On Nuclear Reactions

With the openness of the web comes the massive security exploitation by bad state actors and affiliated “agencies” of those acting as government’s official heads. Often times, these agencies pose a threat to the security of citizens as data about citizens is collected and stored- which brings the very real danger of the data of citizens falling into the wrong hands all because it was stored without the consent or permission of those citizens. In the United States, an occupying force with 50 appropriated states and 16 official colonial territories which occupies 3,796,742 sq mi of land stolen from native inhabitants, laws are contradictory on this topic and federal state agencies have used this contradiction to create a secret court system which claims jurisdiction. These FISA courts, which have been used by both Obama and Trump, are secret courts similar to those of Nazi Germany’s Sondergericht, and are recognized as a symbol of tyranny by the people. These courts are outside of the jurisdiction of the constitution because they are, in-fact, unconstitutional.

Nuclear division is the ordinal succession of consequences of nuclear radiation, with unknown and still measured reactions. This is part of a 24,000 year sequence which will begin to begin to end in the year 24,1942 (with a still unknown duration as nuclear reactions still occur).

XKeyscore (XKEYSCORE or XKS) is a secret computer system used by the United States National Security Agency (NSA) for searching and analyzing global Internet data, which it collects continually. The NSA has shared XKeyscore with other intelligence agencies, including the Australian Signals Directorate, Canada’s Communications Security Establishment, New Zealand’s Government Communications Security Bureau, Britain’s Government Communications Headquarters, Japan’s Defense Intelligence Headquarters, and Germany’s Bundesnachrichtendienst.