TechAndComputer (Sep. 10, 2010) Behind every coincidence lies a plan -- in the world of classical physics, at least. In principle, every event, including the fall of dice or the outcome of a game of roulette, can be explained in mathematical terms.
Researchers at the Max Planck Institute for the Physics of Light in Erlangen have constructed a device that works on the principle of true randomness. With the help of quantum physics, their machine...
TechAndComputer (Sep. 10, 2010) Behind every coincidence lies a plan -- in the world of classical physics, at least. In principle, every event, including the fall of dice or the outcome of a game of roulette, can be explained in mathematical terms.
Researchers at the Max Planck...
Encryption
Quantum dice: Simple device measures quantum noise of vacuum fluctuations and generates true random numbers
- 09 September 2010
- Editor
- Hits: 88
New model to help organize, keep private 'vast ocean' of social network data
- 26 August 2010
- Editor
- Hits: 85
TechAndComputer (Aug. 27, 2010) Professors and a graduate student from the College of Engineering and Information Technology at the University of Arkansas at Little Rock (UALR) have developed a new model to manage the "vast ocean" of user-generated content being generated by the ever-growing social networking sites including Facebook and Twitter.
Dr. Nitin Agarwal, assistant professor in EIT's Department of Information Science, and his doctoral...
TechAndComputer (Aug. 27, 2010) ...
Dr. Nitin Agarwal, assistant professor in EIT's Department of Information Science, and his doctoral...
TechAndComputer (Aug. 27, 2010) ...
Why do consumers disclose sensitive information to shady-looking websites?
- 24 August 2010
- Editor
- Hits: 84
TechAndComputer (Aug. 26, 2010) Many consumers need help recognizing when their privacy is compromised, according to a new study in the Journal of Consumer Research.
"How can we make sense of the contradictory attitudes that individuals display toward privacy -- from the seemingly reckless willingness of some to post personal and even incriminating information on social network sites, to the concern people express over the range of information...
TechAndComputer (Aug. 26, 2010) Many...
"How can we make sense of the contradictory attitudes that individuals display toward privacy -- from the seemingly reckless willingness of some to post personal and even incriminating information on social network sites, to the concern people express over the range of information...
TechAndComputer (Aug. 26, 2010) Many...
Securing critical computer systems begins at the beginning, new report advises
- 04 August 2010
- Editor
- Hits: 102
TechAndComputer (Aug. 4, 2010) Nothing beats the feeling of starting up a new computer -- be it a laptop, desktop or a major, custom-designed computing system. A new system is a blank slate with no worry of botnets, viruses or any other cybersecurity hazards.
Not so, explains computer researcher Marianne Swanson at the National Institute of Standards and Technology (NIST), lead author of a draft report, Piloting Supply Chain Risk Management for...
TechAndComputer (Aug. 4, 2010) ...
Not so, explains computer researcher Marianne Swanson at the National Institute of Standards and Technology (NIST), lead author of a draft report, Piloting Supply Chain Risk Management for...
TechAndComputer (Aug. 4, 2010) ...
Reversible watermarking for digital images
- 06 July 2010
- Editor
- Hits: 97
TechAndComputer (July 7, 2010) Every picture tells a story, but how do you know that a digital photo has not been manipulated to change the tale being told? A new approach to adding an encrypted watermark to digital images allows the an image to be validated against a pass key, according to research published in the International Journal of Signal and Imaging Systems Engineering.
Visible watermarks are routinely added to digital images as a...
TechAndComputer (July 7, 2010) Every...
Visible watermarks are routinely added to digital images as a...
TechAndComputer (July 7, 2010) Every...