Useful tools

edit
  • WP:PETSCAN -> Useful for finding intersections and unions of categories
  • Copy and paste:
    There's a rough notecard system here with the sources sorted by date and the facts from the articles beneath the source title, just an FYI for the curious.
edit
  • "Access to UIUC library userbox" -> Something like "This user has access the <parameter> library system, including and especially the lovely Grainger Engineering Library, even though that's really not its full or colloquial name.
  • Check out this userbox for an example of switching logic in a userbox.

Possible articles to do

edit
Possible articles
Date added Article subject Notes
31 August 2023 George Means Bevier The namesake of the Engineering library at UPitt
18 October 2023 Xposed framework Useful on Android
18 October 2023 Grounding ear See AC_power_plugs_and_sockets#Earthing_(grounding) and mentioned in Milwaukee Electric Tool Bulletin #58-12-2653
31 October 2023 Giant Oak Search Database or GOST Hilarious application of AI-powered wrong-think detection link
31 October 2023 Parsl, a parallelization Python library https://parsl-project.org/publications.html
3 November 2023 HPE/Cray's Slingshot, Atos's BXI, Fujitsu's Tofu D All HPC interconnects, and good counters to the Infiniband article
18 November 2023 Jack Stephan the Cal Worthington of plumbing
18 November 2023 Looksmaxxing thank you NYT Style section
27 November 2023 Wired Manual of Style (1996) Wired Magazine’s 1996 Style Guide for Writing in the Digital Age Is an Artifact in Amber
2 December 2023 Habsora or "the Gospel" An AI-powered & IDF-run military targeting system
6 January 2024 Joseph W. Royer House and Ella Danely Cottage A historic district in Urbana
28 January 2024 CSX-l Computer A historic microcomputer at the University of Illinois
28 January 2024 Ubiquitous technical surveillance "a pervasive concern at the CIA"
30 January 2024 Full DIMM heat-spreader Revealed to me in a dream (on a Hynix memory module datasheet)
2 February 2024 Citation File Format and CodeMeta The former natively supported in GitHub, and the latter has linked-data capabilities
9 February 2024 Young Progressives of America A seemingly defunct mid 20th century student organization for George Wallace?
25 April 2024 Wagon Wheel Restaurant A Silicon Valley staple, closed in 1999, mentioned also in Nerds 2.0.1
5 May 2024 Flame graph Useful for performance monitoring, as explained in Communications of the ACM
13 May 2024 Mammoni #JustItalyThings
19 May 2024 Any of Gear puller, Bearing puller, Jaw puller, or Puller (tool) Too many product listings to even enumerate one US Army manual
29 May 2024 The Great American People Show The state theater company of the state of Illinois, as detailed by the U of I Library
13 June 2024 Swim test Apparently this is done at colleges in the northeast US. Mortimer J. Adler refused his at Columbia.
11 July 2024 CycloneDX SBOM spec by OWASP, seemingly more active than SPDX
17 September 2024 Fred Society LA Times gives some leads to the society which inspired the wife of the author of The Graduate (1963)
1 October 2024 Hurford wheel or its inventor Big meat and also "Why would you take children to see this?"

Post-alien cryptography?

edit

I am pleased to announce that FC1 symmetric key cipher has been made public.

FC1 is a groundbreaking, non-deterministic algorithm, infinitely stronger than AES standard. It can quickly handle keys of millions or billions of bits, providing an incredible grade of confidentiality. It is based on the uniqueness of the modular multiplicative inverse of a positive integer a modulo n and on its computability in a polynomial time.

aa' ≡ 1 mod n

The plaintext is a, the ciphertext a', modulo n is the secret key. This is the basic concept of FC1. Simple and devastating.

FC1 full specification is available on IACR (International Association for Cryptologic Research), paper title "FC1: A Powerful, Non-Deterministic, Symmetric Key Cipher" https://www.iacr.org/news/item/18288

The algorithm was also published at the Internet Engineering Task Force (IETF) website under the title: "FC1 Algorithm Ushers In The Era Of Post-Alien Cryptography" https://datatracker.ietf.org/doc/draft-fabbrini-algorithm-post-alien-cryptography/

I also released the full code in Julia Programming Language: https://github.com/FabbriniCiphers

Hackers are harvesting large quantites of encrypyted data with the aim of keeping them for the day when the development of quantum computers will make it possible to decrypt them. With FC1 you can be sure that no one will ever be able to decrypt your most valuable data in the near or distant future.

FC1 can be considered the first ever designed to face the challenges posed by contact with an alien civilization. It ushers in the era of Post-Alien Cryptography (neologism, see https://postaliencryptography.org).

For feedback, exchange of views or implementation suggestions, I welcome your email at: fc1@fabbrini.org

— Michele Fabbrini, An email (2022)

Piper

edit

It's the internally developed version control system used by Google for their M O N O R E P O. first seen here and mentioned here

Howard Frank the Network Scientist

edit

https://www.internethalloffame.org/inductees/howard-frank

WP:BIOGRAPHY has a template even!

Dealers of Lighting

edit

https://www.dau.edu/library/professional-reading-program/blog/Dealers-of-Lightning--Xerox-PARC-and-the-Dawn-of-the-Computer-Age

Open Information Security Foundation

edit

Creators of Suricrata

Bicep (programming language)

edit

A domain specific language for programmatic infrastructure as code for Microsoft Azure

Bicep - Microsoft Learn

Digital optical monitoring

edit

Relevant for monitoring Small_Form-factor_Pluggable modules Also consider Digital Diagnostic Monitoring

International Association for Testing Materials

edit

An organization related to the ASTM International

Privilege Elevation and Delegation Management

edit

Very Linux

Switch Abstraction Interface

edit

The new standard for white box switches.

MR-IOV

edit

Multi root input output virtualization
Also, clean up the SR-IOV article with info from the x86 Virtualization article.

CARTA

edit

Or, Continuous Adaptive Risk and Trust Assessment, something Gartner created ten years ago

Zero touch provisioning

edit

Or, is it zero-touch provisioning? hmmmmm

interconnection oriented architecture

edit

As mentioned on Dell's support site, might be something general

1EdTech

edit

Formerly IMS Global Learning and associated with the Open Knowledge Institute

MSAB

edit

A Swedish company specializing in phone forensics. Similar in vein to Cellebrite

OCP Accelerator Module

edit

A hardware specification by the Open Compute Project

Software collapse

edit

one source, but check the references on this too

Zanzibar

edit

Google's Consistent, Global Authorization System

KeyDB

edit

Snap Inc.'s alternative to Redis, which is also multithreaded.

Pingora (software)

edit

Cloudflare's in-house replacement for NGINX that isn't quite yet open source

Hardware noise

edit

Unrelated to cryptographic noise, but coming to a Linux kernel near you (if you run 6.3 and above)

Nellie

edit

the most important individual buried on the UIUC campus, and also a cow.

Ziad Ahmed

edit

A legend, and also living

ARPANET Network Terminal System (ANTS)

edit

Used by the University of Illinois Center for Advanced Computation on their PDP-11.

Somewhat related but also consider expanding the Trusted ILLIAC subsection archive of site with more sources

CERN Virtual Machine File System

edit

A parallel file system used by the Canadians

Sabrent

edit

A manufacturer of computer accessories

1792 Exchange

edit

An anti-ESG organization. Source

LetMeSpy

edit

A defunct stalkerware company, or their flagship product