Useful tools
edit- WP:PETSCAN -> Useful for finding intersections and unions of categories
- Copy and paste:
There's a rough notecard system here with the sources sorted by date and the facts from the articles beneath the source title, just an FYI for the curious.
Userbox related
edit- "Access to UIUC library userbox" -> Something like "This user has access the <parameter> library system, including and especially the lovely Grainger Engineering Library, even though that's really not its full or colloquial name.
- Check out this userbox for an example of switching logic in a userbox.
Possible articles to do
editDate added | Article subject | Notes |
---|---|---|
31 August 2023 | George Means Bevier | The namesake of the Engineering library at UPitt |
18 October 2023 | Xposed framework | Useful on Android |
18 October 2023 | Grounding ear | See AC_power_plugs_and_sockets#Earthing_(grounding) and mentioned in Milwaukee Electric Tool Bulletin #58-12-2653 |
31 October 2023 | Giant Oak Search Database or GOST | Hilarious application of AI-powered wrong-think detection link |
31 October 2023 | Parsl, a parallelization Python library | https://parsl-project.org/publications.html |
3 November 2023 | HPE/Cray's Slingshot, Atos's BXI, Fujitsu's Tofu D | All HPC interconnects, and good counters to the Infiniband article |
18 November 2023 | Jack Stephan | the Cal Worthington of plumbing |
18 November 2023 | Looksmaxxing | thank you NYT Style section |
27 November 2023 | Wired Manual of Style (1996) | Wired Magazine’s 1996 Style Guide for Writing in the Digital Age Is an Artifact in Amber |
2 December 2023 | Habsora or "the Gospel" | An AI-powered & IDF-run military targeting system |
6 January 2024 | Joseph W. Royer House and Ella Danely Cottage | A historic district in Urbana |
28 January 2024 | CSX-l Computer | A historic microcomputer at the University of Illinois |
28 January 2024 | Ubiquitous technical surveillance | "a pervasive concern at the CIA" |
30 January 2024 | Full DIMM heat-spreader | Revealed to me in a dream (on a Hynix memory module datasheet) |
2 February 2024 | Citation File Format and CodeMeta | The former natively supported in GitHub, and the latter has linked-data capabilities |
9 February 2024 | Young Progressives of America | A seemingly defunct mid 20th century student organization for George Wallace? |
25 April 2024 | Wagon Wheel Restaurant | A Silicon Valley staple, closed in 1999, mentioned also in Nerds 2.0.1 |
5 May 2024 | Flame graph | Useful for performance monitoring, as explained in Communications of the ACM |
13 May 2024 | Mammoni | #JustItalyThings |
19 May 2024 | Any of Gear puller, Bearing puller, Jaw puller, or Puller (tool) | Too many product listings to even enumerate one US Army manual |
29 May 2024 | The Great American People Show | The state theater company of the state of Illinois, as detailed by the U of I Library |
13 June 2024 | Swim test | Apparently this is done at colleges in the northeast US. Mortimer J. Adler refused his at Columbia. |
11 July 2024 | CycloneDX | SBOM spec by OWASP, seemingly more active than SPDX |
17 September 2024 | Fred Society | LA Times gives some leads to the society which inspired the wife of the author of The Graduate (1963) |
1 October 2024 | Hurford wheel or its inventor | Big meat and also "Why would you take children to see this?" |
Post-alien cryptography?
editI am pleased to announce that FC1 symmetric key cipher has been made public.
FC1 is a groundbreaking, non-deterministic algorithm, infinitely stronger than AES standard. It can quickly handle keys of millions or billions of bits, providing an incredible grade of confidentiality. It is based on the uniqueness of the modular multiplicative inverse of a positive integer a modulo n and on its computability in a polynomial time.
aa' ≡ 1 mod n
The plaintext is a, the ciphertext a', modulo n is the secret key. This is the basic concept of FC1. Simple and devastating.
FC1 full specification is available on IACR (International Association for Cryptologic Research), paper title "FC1: A Powerful, Non-Deterministic, Symmetric Key Cipher" https://www.iacr.org/news/item/18288
The algorithm was also published at the Internet Engineering Task Force (IETF) website under the title: "FC1 Algorithm Ushers In The Era Of Post-Alien Cryptography" https://datatracker.ietf.org/doc/draft-fabbrini-algorithm-post-alien-cryptography/
I also released the full code in Julia Programming Language: https://github.com/FabbriniCiphers
Hackers are harvesting large quantites of encrypyted data with the aim of keeping them for the day when the development of quantum computers will make it possible to decrypt them. With FC1 you can be sure that no one will ever be able to decrypt your most valuable data in the near or distant future.
FC1 can be considered the first ever designed to face the challenges posed by contact with an alien civilization. It ushers in the era of Post-Alien Cryptography (neologism, see https://postaliencryptography.org).
For feedback, exchange of views or implementation suggestions, I welcome your email at: fc1@fabbrini.org
— Michele Fabbrini, An email (2022)
Piper
editIt's the internally developed version control system used by Google for their M O N O R E P O. first seen here and mentioned here
Howard Frank the Network Scientist
edithttps://www.internethalloffame.org/inductees/howard-frank
WP:BIOGRAPHY has a template even!
Dealers of Lighting
editOpen Information Security Foundation
editCreators of Suricrata
Bicep (programming language)
editA domain specific language for programmatic infrastructure as code for Microsoft Azure
Digital optical monitoring
editRelevant for monitoring Small_Form-factor_Pluggable modules Also consider Digital Diagnostic Monitoring
International Association for Testing Materials
editAn organization related to the ASTM International
Privilege Elevation and Delegation Management
editVery Linux
Switch Abstraction Interface
editThe new standard for white box switches.
MR-IOV
editMulti root input output virtualization
Also, clean up the SR-IOV article with info from the x86 Virtualization article.
CARTA
editOr, Continuous Adaptive Risk and Trust Assessment, something Gartner created ten years ago
Zero touch provisioning
editOr, is it zero-touch provisioning? hmmmmm
interconnection oriented architecture
editAs mentioned on Dell's support site, might be something general
1EdTech
editFormerly IMS Global Learning and associated with the Open Knowledge Institute
MSAB
editA Swedish company specializing in phone forensics. Similar in vein to Cellebrite
OCP Accelerator Module
editA hardware specification by the Open Compute Project
Software collapse
editone source, but check the references on this too
Zanzibar
editKeyDB
editSnap Inc.'s alternative to Redis, which is also multithreaded.
Pingora (software)
editCloudflare's in-house replacement for NGINX that isn't quite yet open source
Hardware noise
editUnrelated to cryptographic noise, but coming to a Linux kernel near you (if you run 6.3 and above)
Nellie
editthe most important individual buried on the UIUC campus, and also a cow.
Ziad Ahmed
editA legend, and also living
ARPANET Network Terminal System (ANTS)
editUsed by the University of Illinois Center for Advanced Computation on their PDP-11.
Somewhat related but also consider expanding the Trusted ILLIAC subsection archive of site with more sources
CERN Virtual Machine File System
editA parallel file system used by the Canadians
Sabrent
editA manufacturer of computer accessories
1792 Exchange
editAn anti-ESG organization. Source
LetMeSpy
editA defunct stalkerware company, or their flagship product