User:Eric M Gearhart: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Eric M Gearhart
No edit summary
imported>Eric M Gearhart
No edit summary
Line 1: Line 1:
==Introduction/Background==
==Introduction/Background==
Hello, and welcome to CZ!
Hello, and welcome to CZ!
[[Image:Mt Lemmon, Tucson, AZ.jpg|right|thumb|200px||Tucson mountain ranges, viewed from Mt. Lemmon. I lived in Tucson for about two years,  shortly after leaving the Army]]


I've always been passionate about and interested in technology in its myriad forms, from computers to Sci-Fi, since around age 12 (the "[[Age of Reason]]" as it were). In the past few years my career has led me into the information security field, for which I have always had a "soft spot in my heart." I've always been curious about pushing technology to its limits, and this curiosity dovetails will with the InfoSec field.
I've always been passionate about and interested in technology in its myriad forms, from computers to Sci-Fi, since around age 12 (the "[[Age of Reason]]" as it were). In the past few years my career has led me into the information security field, for which I have always had a "soft spot in my heart." I've always been curious about pushing technology to its limits, and this curiosity dovetails will with the InfoSec field.


If you're so inclined, a summary of my 'professional life' is located here on LinkedIn: [http://www.linkedin.com/in/ericgearhart]
If you're so inclined, a summary of my 'professional life' is located here on LinkedIn: [http://www.linkedin.com/in/ericgearhart]
[[Image:Mt Lemmon, Tucson, AZ.jpg|right|thumb|200px||Tucson mountain ranges, viewed from Mt. Lemmon. I lived in Tucson for about two years,  shortly after leaving the Army]]


=='''What We're Doing Here'''==
=='''What We're Doing Here'''==

Revision as of 07:15, 1 July 2012

Introduction/Background

Hello, and welcome to CZ!

Tucson mountain ranges, viewed from Mt. Lemmon. I lived in Tucson for about two years, shortly after leaving the Army

I've always been passionate about and interested in technology in its myriad forms, from computers to Sci-Fi, since around age 12 (the "Age of Reason" as it were). In the past few years my career has led me into the information security field, for which I have always had a "soft spot in my heart." I've always been curious about pushing technology to its limits, and this curiosity dovetails will with the InfoSec field.

If you're so inclined, a summary of my 'professional life' is located here on LinkedIn: [1]

What We're Doing Here

  • Please see the video here for a description of what we're doing here & the future of knowledge in general, from "the horse's mouth," Dr. Larry Sanger himself.
  • If there is any doubt on the necessity of this project, please see Wikitruth for all the (somewhat biased) convincing one could possibly need.

Call for Help

Please help out on the Computers Workgroup articles! The four or five of us that regularly edit articles there can't do it alone. You can see related changes in the Workgroup here.

Images on CZ

See Image_talk:MOS_6502.jpg for an interesting dialog between myself and constable Stephen Ewen about importing images from Wikipedia or Wikipedia Commons. Things are definitely not always what they seem to be.

Articles I'm collaborating on

The Unix / Linux / Open Source Software family:

The Computer security family of articles:

  • Developed Article Buffer overflow: In computers and computer security, occurs when more data is written to a memory buffer than can fit into the memory buffer. [e]
  • Stub Hacker: An expert, a problem solver, and generally a brilliant programmer. In popular usage, those who illegally break into computer systems. [e]

General Computer articles

  • Developing Article Beowulf cluster: Distributed supercomputer cluster made from commodity hardware (e.g. PCs). [e]
  • Developing Article Java platform: A bunch of programs needed for creating and running programs written in the Java programming language. [e]
  • Developing Article Network topology: Defines the method in which a computer network is architected; topologies can be either physical (meaning how the actual hardware is interconnected) or logical (meaning how that network is implemented by protocols in software) [e]
  • Developing Article Operating system: The main software of a computer system; controls the execution of applications and provides various services to them. [e]
  • Developing Article Open Systems Interconnection Reference Model: ISO standard that describes a layered approach to designing computer networks [e]
  • Developed Article Virtualization: In computing, a broad term that usually refers to the abstraction of resources on a computer, using a container such as a "virtual machine" or several "virtual machines." Usually this is accomplished using either a virtual machine or an operating system that has tools to enable virtual environments to run inside it. [e]
  • Approved Article Email system: General overview of how the Internet electronic mail system works. [e]

Approved Articles

  • Approved Article Tux: The name of the penguin, official logo and cartoon mascot for the Linux computer operating system. [e] - the first Computers Workgroup article to get approved!
    (Josh put a HUGE amount of work into this article. Great job folks!)