TechAndComputer (Dec. 23, 2010) Scientists from the Kavli Institute of Nanoscience at Delft University of Technology and Eindhoven University of Technology have succeeded in controlling the building blocks of a future super-fast quantum computer. They are now able to manipulate these building blocks (qubits) with electrical rather than magnetic fields, as has been the common practice up till now. They have also been able to embed these qubits...
TechAndComputer (Dec. 23, 2010) Scientists from the Kavli Institute of Nanoscience at Delft University of Technology and Eindhoven University of Technology have succeeded in controlling the building blocks of a future super-fast quantum computer. They are now able to manipulate these...
Hacking
Better control of building blocks for quantum computer
- 23 December 2010
- Editor
- Hits: 90
Computer memory takes a spin: Physicists read data after storing them in atomic nuclei for 112 seconds
- 16 December 2010
- Editor
- Hits: 96
TechAndComputer (Dec. 16, 2010) University of Utah physicists stored information for 112 seconds in what may become the world's tiniest computer memory: magnetic "spins" in the centers or nuclei of atoms. Then the physicists retrieved and read the data electronically -- a big step toward using the new kind of memory for both faster conventional and superfast "quantum" computers.
"The length of spin memory we observed is more than adequate to...
TechAndComputer (Dec. 16, 2010) ...
"The length of spin memory we observed is more than adequate to...
TechAndComputer (Dec. 16, 2010) ...
Is Internet backbone vulnerable to cyber attack?
- 14 December 2010
- Editor
- Hits: 99
TechAndComputer (Dec. 15, 2010) While cyber attacks on the internet involving malware, hacking and distributed denial of service are featured in the headlines most often, researchers in Switzerland suggest that physical attack on internet backbones, servers and internet data hubs could be just as important a problem in sustaining network functions.
Writing in the December issue of the International Journal of Critical Infrastructures, the team...
TechAndComputer (Dec. 15, 2010) While...
Writing in the December issue of the International Journal of Critical Infrastructures, the team...
TechAndComputer (Dec. 15, 2010) While...
Profiling based on mobile, online behavior: A privacy issue
- 06 December 2010
- Editor
- Hits: 105
TechAndComputer (Dec. 6, 2010) It's illegal for businesses and law enforcement to profile a person based on their race, gender, or ethnicity, yet millions of Americans are being profiled every day based on their online consumer behavior and demographics.
Known as consumer profiling for behavioral advertising purposes, this type of profiling is largely unregulated.
The result, according to two recent articles in the journal of Computer Law &...
TechAndComputer (Dec. 6, 2010) It's...
Known as consumer profiling for behavioral advertising purposes, this type of profiling is largely unregulated.
The result, according to two recent articles in the journal of Computer Law &...
TechAndComputer (Dec. 6, 2010) It's...
Computer scientist, student design software to combat hacking using keystroke anti-spoofing technique
- 01 November 2010
- Editor
- Hits: 100
TechAndComputer (Nov. 2, 2010) One of the serious threats to a user's computer is a software program that might cause unwanted keystroke sequences to occur in order to hack someone's identity. This form of an attack is increasing, infecting enterprise and personal computers, and caused by "organized malicious botnets," said Daphne Yao, assistant professor of computer science at Virginia Tech.
To combat the "spoofing attacks," Yao and her former...
TechAndComputer (Nov. 2, 2010) One of...
To combat the "spoofing attacks," Yao and her former...
TechAndComputer (Nov. 2, 2010) One of...