Random Articles (Page 2)
Have a deep view into what people are curious about.
π Cow Tools
"Cow tools" is a cartoon from The Far Side by American cartoonist Gary Larson, published in October 1982. It depicts a cow standing behind a table of bizarre, misshapen implements with the caption "cow tools". The cartoon confused many readers, who wrote or phoned in seeking an explanation of the joke. In response to the controversy, Larson issued a press release clarifying that the thrust of the cartoon was simply that, if a cow were to make tools, they would "lack something in sophistication". It has been described as "arguably the most loathed Far Side strip ever" while also becoming a popular internet meme.
Discussed on
- "Cow Tools" | 2023-08-09 | 42 Upvotes 7 Comments
π Wootz steel
Wootz steel is a crucible steel characterized by a pattern of bands. These bands are formed by sheets of microscopic carbides within a tempered martensite or pearlite matrix in higher carbon steel, or by ferrite and pearlite banding in lower carbon steels. It was a pioneering steel alloy developed in Southern India (Tamilakam present day Tamil Nadu and Kerala) and Sri Lanka in the 6th century BC and exported globally. It was also known in the ancient world by many different names including ukku, Hindvi steel, Hinduwani steel, Teling steel and seric iron.
Discussed on
- "Wootz steel" | 2019-06-19 | 61 Upvotes 45 Comments
π SHA-3 NIST announcement controversy
SHA-3 (Secure Hash Algorithm 3) is the latest member of the Secure Hash Algorithm family of standards, released by NIST on August 5, 2015. Although part of the same series of standards, SHA-3 is internally different from the MD5-like structure of SHA-1 and SHA-2.
SHA-3 is a subset of the broader cryptographic primitive family Keccak (), designed by Guido Bertoni, Joan Daemen, MichaΓ«l Peeters, and Gilles Van Assche, building upon RadioGatΓΊn. Keccak's authors have proposed additional uses for the function, not (yet) standardized by NIST, including a stream cipher, an authenticated encryption system, a "tree" hashing scheme for faster hashing on certain architectures, and AEAD ciphers Keyak and Ketje.
Keccak is based on a novel approach called sponge construction. Sponge construction is based on a wide random function or random permutation, and allows inputting ("absorbing" in sponge terminology) any amount of data, and outputting ("squeezing") any amount of data, while acting as a pseudorandom function with regard to all previous inputs. This leads to great flexibility.
NIST does not currently plan to withdraw SHA-2 or remove it from the revised Secure Hash Standard. The purpose of SHA-3 is that it can be directly substituted for SHA-2 in current applications if necessary, and to significantly improve the robustness of NIST's overall hash algorithm toolkit.
The creators of the Keccak algorithms and the SHA-3 functions suggest using the faster function KangarooTwelve with adjusted parameters and a new tree hashing mode without extra overhead for small message sizes.
Discussed on
- "SHA-3 NIST announcement controversy" | 2014-07-20 | 77 Upvotes 33 Comments
π The If-by-whiskey fallacy
In political discourse, if-by-whiskey is a relativist fallacy in which the speaker's position is contingent on the listener's opinion. An if-by-whiskey argument implemented through doublespeak appears to affirm both sides of an issue, and agrees with whichever side the listener supports, in effect taking a position without taking a position. The statement typically uses words with strongly positive or negative connotations (e.g., terrorist as negative and freedom fighter as positive).
Discussed on
- "The If-by-whiskey fallacy" | 2013-01-16 | 268 Upvotes 97 Comments
π List of Laboratory Biosecurity Incidents
This list of laboratory biosecurity incidents includes accidental laboratory-acquired infections and laboratory releases of lethal pathogens, containment failures in or during transport of lethal pathogens, and incidents of exposure of lethal pathogens to laboratory personnel, improper disposal of contaminated waste, and/or the escape of laboratory animals. The list is grouped by the year in which the accident or incident occurred and does not include every reported laboratory-acquired infection.
Discussed on
- "List of Laboratory Biosecurity Incidents" | 2022-01-04 | 25 Upvotes 5 Comments
π Postzegelcode
A postzegelcode is a hand-written method of franking in the Netherlands. It consists of a code containing nine numbers and letters that customers can purchase online from PostNL and write directly on their piece of mail within five days as proof-of-payment in place of a postage stamp.
For mail within the Netherlands the nine letters and numbers are written as a grid of 3x3. For international mail there is fourth additional row that contains P, N, L.
The system was started in 2013. Initially the postzegelcode was more expensive than a stamp because additional handling systems were required. Then for a while the postzegelcode was cheaper. Eventually the tariffs were set to the same price.
In December 2020, 590,000 people sent cards with postzegelcodes.
Discussed on
- "Postzegelcode" | 2024-06-30 | 241 Upvotes 105 Comments
π Operation Ivy Bells
Operation Ivy Bells was a joint United States Navy, Central Intelligence Agency (CIA), and National Security Agency (NSA) mission whose objective was to place wire taps on Soviet underwater communication lines during the Cold War.
Discussed on
- "Operation Ivy Bells" | 2018-05-07 | 98 Upvotes 31 Comments
π Email Storm
An email storm (also called a reply allpocalypse) is a sudden spike of "reply all" messages on an email distribution list, usually caused by a controversial or misdirected message. Such storms can start when even one member of the distribution list replies to the entire list at the same time in response to an instigating message. When other members respond, pleading for the cessation of messages, asking to be removed from the list, or adding vitriol to the discussion this triggers a chain reaction of email messages. The sheer load of traffic generated by these storms can render the email servers inoperative, similar to a distributed denial-of-service attack.
Some email viruses also have the capacity to create email storms by sending copies of themselves to an infected user's contacts, including distribution lists, infecting the contacts in turn.
Discussed on
- "Email Storm" | 2017-08-04 | 69 Upvotes 23 Comments
π Usenet β A worldwide distributed discussion system
Usenet () is a worldwide distributed discussion system available on computers. It was developed from the general-purpose Unix-to-Unix Copy (UUCP) dial-up network architecture. Tom Truscott and Jim Ellis conceived the idea in 1979, and it was established in 1980. Users read and post messages (called articles or posts, and collectively termed news) to one or more categories, known as newsgroups. Usenet resembles a bulletin board system (BBS) in many respects and is the precursor to Internet forums that are widely used today. Discussions are threaded, as with web forums and BBSs, though posts are stored on the server sequentially. The name comes from the term "users network".
A major difference between a BBS or web forum and Usenet is the absence of a central server and dedicated administrator. Usenet is distributed among a large, constantly changing conglomeration of servers that store and forward messages to one another via "newsΒ feeds". Individual users may read messages from and post messages to a local server, which may be operated by anyone.
Usenet is culturally and historically significant in the networked world, having given rise to, or popularized, many widely recognized concepts and terms such as "FAQ", "flame", sockpuppet, and "spam". In the 1990s, before access to the Internet became commonly affordable, Usenet connections via Fidonet's dial-up BBS networks made long-distance or worldwide discussions and other communication widespread, not needing a server, just (local) telephone service.
Discussed on
- "Usenet β A worldwide distributed discussion system" | 2018-08-05 | 104 Upvotes 87 Comments
π Shot tower
A shot tower is a tower designed for the production of small diameter shot balls by freefall of molten lead, which is then caught in a water basin. The shot is primarily used for projectiles in shotguns, and also for ballast, radiation shielding and other applications where small lead balls are useful.
Discussed on
- "Shot tower" | 2013-09-12 | 269 Upvotes 79 Comments