Random Articles (Page 2)

Have a deep view into what people are curious about.

πŸ”— Cow Tools

πŸ”— Comics

"Cow tools" is a cartoon from The Far Side by American cartoonist Gary Larson, published in October 1982. It depicts a cow standing behind a table of bizarre, misshapen implements with the caption "cow tools". The cartoon confused many readers, who wrote or phoned in seeking an explanation of the joke. In response to the controversy, Larson issued a press release clarifying that the thrust of the cartoon was simply that, if a cow were to make tools, they would "lack something in sophistication". It has been described as "arguably the most loathed Far Side strip ever" while also becoming a popular internet meme.

Discussed on

πŸ”— Wootz steel

πŸ”— Technology πŸ”— India πŸ”— Metalworking

Wootz steel is a crucible steel characterized by a pattern of bands. These bands are formed by sheets of microscopic carbides within a tempered martensite or pearlite matrix in higher carbon steel, or by ferrite and pearlite banding in lower carbon steels. It was a pioneering steel alloy developed in Southern India (Tamilakam present day Tamil Nadu and Kerala) and Sri Lanka in the 6th century BC and exported globally. It was also known in the ancient world by many different names including ukku, Hindvi steel, Hinduwani steel, Teling steel and seric iron.

Discussed on

πŸ”— SHA-3 NIST announcement controversy

πŸ”— Internet πŸ”— Computing πŸ”— Cryptography πŸ”— Numismatics πŸ”— Numismatics/Cryptocurrency πŸ”— Computing/Computer Security

SHA-3 (Secure Hash Algorithm 3) is the latest member of the Secure Hash Algorithm family of standards, released by NIST on August 5, 2015. Although part of the same series of standards, SHA-3 is internally different from the MD5-like structure of SHA-1 and SHA-2.

SHA-3 is a subset of the broader cryptographic primitive family Keccak (), designed by Guido Bertoni, Joan Daemen, MichaΓ«l Peeters, and Gilles Van Assche, building upon RadioGatΓΊn. Keccak's authors have proposed additional uses for the function, not (yet) standardized by NIST, including a stream cipher, an authenticated encryption system, a "tree" hashing scheme for faster hashing on certain architectures, and AEAD ciphers Keyak and Ketje.

Keccak is based on a novel approach called sponge construction. Sponge construction is based on a wide random function or random permutation, and allows inputting ("absorbing" in sponge terminology) any amount of data, and outputting ("squeezing") any amount of data, while acting as a pseudorandom function with regard to all previous inputs. This leads to great flexibility.

NIST does not currently plan to withdraw SHA-2 or remove it from the revised Secure Hash Standard. The purpose of SHA-3 is that it can be directly substituted for SHA-2 in current applications if necessary, and to significantly improve the robustness of NIST's overall hash algorithm toolkit.

The creators of the Keccak algorithms and the SHA-3 functions suggest using the faster function KangarooTwelve with adjusted parameters and a new tree hashing mode without extra overhead for small message sizes.

Discussed on

πŸ”— The If-by-whiskey fallacy

πŸ”— Philosophy πŸ”— Philosophy/Logic

In political discourse, if-by-whiskey is a relativist fallacy in which the speaker's position is contingent on the listener's opinion. An if-by-whiskey argument implemented through doublespeak appears to affirm both sides of an issue, and agrees with whichever side the listener supports, in effect taking a position without taking a position. The statement typically uses words with strongly positive or negative connotations (e.g., terrorist as negative and freedom fighter as positive).

Discussed on

πŸ”— List of Laboratory Biosecurity Incidents

πŸ”— Medicine

This list of laboratory biosecurity incidents includes accidental laboratory-acquired infections and laboratory releases of lethal pathogens, containment failures in or during transport of lethal pathogens, and incidents of exposure of lethal pathogens to laboratory personnel, improper disposal of contaminated waste, and/or the escape of laboratory animals. The list is grouped by the year in which the accident or incident occurred and does not include every reported laboratory-acquired infection.

Discussed on

πŸ”— Postzegelcode

πŸ”— Philately πŸ”— Netherlands

A postzegelcode is a hand-written method of franking in the Netherlands. It consists of a code containing nine numbers and letters that customers can purchase online from PostNL and write directly on their piece of mail within five days as proof-of-payment in place of a postage stamp.

For mail within the Netherlands the nine letters and numbers are written as a grid of 3x3. For international mail there is fourth additional row that contains P, N, L.

The system was started in 2013. Initially the postzegelcode was more expensive than a stamp because additional handling systems were required. Then for a while the postzegelcode was cheaper. Eventually the tariffs were set to the same price.

In December 2020, 590,000 people sent cards with postzegelcodes.

Discussed on

πŸ”— Operation Ivy Bells

πŸ”— Mass surveillance πŸ”— Espionage πŸ”— Military history πŸ”— Military history/North American military history πŸ”— Military history/United States military history πŸ”— Military history/Maritime warfare πŸ”— Cold War

Operation Ivy Bells was a joint United States Navy, Central Intelligence Agency (CIA), and National Security Agency (NSA) mission whose objective was to place wire taps on Soviet underwater communication lines during the Cold War.

Discussed on

πŸ”— Email Storm

πŸ”— Computing

An email storm (also called a reply allpocalypse) is a sudden spike of "reply all" messages on an email distribution list, usually caused by a controversial or misdirected message. Such storms can start when even one member of the distribution list replies to the entire list at the same time in response to an instigating message. When other members respond, pleading for the cessation of messages, asking to be removed from the list, or adding vitriol to the discussion this triggers a chain reaction of email messages. The sheer load of traffic generated by these storms can render the email servers inoperative, similar to a distributed denial-of-service attack.

Some email viruses also have the capacity to create email storms by sending copies of themselves to an infected user's contacts, including distribution lists, infecting the contacts in turn.

Discussed on

πŸ”— Usenet – A worldwide distributed discussion system

πŸ”— Internet πŸ”— Internet culture πŸ”— Linguistics πŸ”— Linguistics/Applied Linguistics

Usenet () is a worldwide distributed discussion system available on computers. It was developed from the general-purpose Unix-to-Unix Copy (UUCP) dial-up network architecture. Tom Truscott and Jim Ellis conceived the idea in 1979, and it was established in 1980. Users read and post messages (called articles or posts, and collectively termed news) to one or more categories, known as newsgroups. Usenet resembles a bulletin board system (BBS) in many respects and is the precursor to Internet forums that are widely used today. Discussions are threaded, as with web forums and BBSs, though posts are stored on the server sequentially. The name comes from the term "users network".

A major difference between a BBS or web forum and Usenet is the absence of a central server and dedicated administrator. Usenet is distributed among a large, constantly changing conglomeration of servers that store and forward messages to one another via "newsΒ feeds". Individual users may read messages from and post messages to a local server, which may be operated by anyone.

Usenet is culturally and historically significant in the networked world, having given rise to, or popularized, many widely recognized concepts and terms such as "FAQ", "flame", sockpuppet, and "spam". In the 1990s, before access to the Internet became commonly affordable, Usenet connections via Fidonet's dial-up BBS networks made long-distance or worldwide discussions and other communication widespread, not needing a server, just (local) telephone service.

Discussed on

πŸ”— Shot tower

πŸ”— Architecture πŸ”— Firearms πŸ”— Metalworking

A shot tower is a tower designed for the production of small diameter shot balls by freefall of molten lead, which is then caught in a water basin. The shot is primarily used for projectiles in shotguns, and also for ballast, radiation shielding and other applications where small lead balls are useful.

Discussed on