Wikipedia:Articles for deletion/SharkSSL
Bold text===SharkSSL===
- SharkSSL (edit | talk | history | protect | delete | links | watch | logs | views) – (View log · Stats)
- (Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL)
NN software that doesn't assert notability. I trimmed the press releases, negative comparative language ("unlike X"), and non-independent material out of the article, and I can't find a single documented instance of where it is used that isn't cited to the company or a press release. It's been around for a decade, and I just can't find anything independent on it. MSJapan (talk) 17:57, 21 July 2016 (UTC)
MSJapan, I think you are abusing your editing privileges and I'm not sure if it's a direct attack against me personally or this company Real Time Logic, but there seems to be a pattern. What seems extremely odd is that you first delete much of the content and related references that have nothing to do with press release or the company itself and then make an unfounded proposal for deletion. These were the first articles that I tried on Wikipedia and sure I made mistakes, but there appears to be an obvious pattern of attack here.
Why would you delete half the article along with the references and then state there are no references?:
COSIC Cryptography Researchers acknowledge SharkSSL for delivering the fastest, and smallest known implementation for Cortex-M processors.[1]
The SharkSSL concept is focused on code readability, documentation, and a loosely coupled design to maintain portability. It is designed with hardware crypto engines in mind, using ANSI C and Assembly-optimized big-integer libraries to allow use in embedded devices associated with the Internet of Things (IoT).[2]
- Secure SMQ C Client for publish–subscribe IoT Communications[3][4]
The subject matter is about "embedded software", which if you understand the topic does not take mainstream visibility given it is embedded into a product or device. None of us know what software is used in connected devices that surround us everyday and I found it extremely hard to dig up the materials that I did site in this article. Given the endorsement of COSIC (above) I think we can safely assume that the technology has reached notability. I would appreciate if you would restore the article as I had it and then post it for deletion review rather than the hacked condition it is currently in. Sorisen (talk) 18:53, 21 July 2016 (UTC)
- ^ N. Mouha, B. Mennink, A. Van Herrewege, D. Watanabe, B. Preneel, and I. Verbauwhede, "Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers," In Selected Areas in Cryptography, 21st Annual International Workshop, SAC 2014, Lecture Notes in Computer Science 8781, A. Joux, and A. M. Youssef (eds.), Springer-Verlag, pp. 306-323, 2014: "An Efficient MAC Algorithm for 32-bit Microcontrollers", 2014
- ^ Connected World, Balancing Device Security and Design Cost, November 2014
- ^ EE Journal, Asserting Machine Control in the IoT, August 2015
- ^ EE Journal, All About Messaging Protocols, April 2015