Tech and Computer

Tech and Computer news

 

 

Thu04042013

Last update06:42:42 PM GMT

Hacking

Better control of building blocks for quantum computer

  • PDF
TechAndComputer (Dec. 23, 2010) — Scientists from the Kavli Institute of Nanoscience at Delft University of Technology and Eindhoven University of Technology have succeeded in controlling the building blocks of a future super-fast quantum computer. They are now able to manipulate these building blocks (qubits) with electrical rather than magnetic fields, as has been the common practice up till now. They have also been able to embed these qubits...

TechAndComputer (Dec. 23, 2010) — Scientists from the Kavli Institute of Nanoscience at Delft University of Technology and Eindhoven University of Technology have succeeded in controlling the building blocks of a future super-fast quantum computer. They are now able to manipulate these...

Computer memory takes a spin: Physicists read data after storing them in atomic nuclei for 112 seconds

  • PDF
TechAndComputer (Dec. 16, 2010) — University of Utah physicists stored information for 112 seconds in what may become the world's tiniest computer memory: magnetic "spins" in the centers or nuclei of atoms. Then the physicists retrieved and read the data electronically -- a big step toward using the new kind of memory for both faster conventional and superfast "quantum" computers.

"The length of spin memory we observed is more than adequate to...

TechAndComputer (Dec. 16, 2010) —...

Is Internet backbone vulnerable to cyber attack?

  • PDF
TechAndComputer (Dec. 15, 2010) — While cyber attacks on the internet involving malware, hacking and distributed denial of service are featured in the headlines most often, researchers in Switzerland suggest that physical attack on internet backbones, servers and internet data hubs could be just as important a problem in sustaining network functions.

Writing in the December issue of the International Journal of Critical Infrastructures, the team...

TechAndComputer (Dec. 15, 2010) — While...

Profiling based on mobile, online behavior: A privacy issue

  • PDF
TechAndComputer (Dec. 6, 2010) — It's illegal for businesses and law enforcement to profile a person based on their race, gender, or ethnicity, yet millions of Americans are being profiled every day based on their online consumer behavior and demographics.

Known as consumer profiling for behavioral advertising purposes, this type of profiling is largely unregulated.

The result, according to two recent articles in the journal of Computer Law &...

TechAndComputer (Dec. 6, 2010) — It's...

Computer scientist, student design software to combat hacking using keystroke anti-spoofing technique

  • PDF
TechAndComputer (Nov. 2, 2010) — One of the serious threats to a user's computer is a software program that might cause unwanted keystroke sequences to occur in order to hack someone's identity. This form of an attack is increasing, infecting enterprise and personal computers, and caused by "organized malicious botnets," said Daphne Yao, assistant professor of computer science at Virginia Tech.

To combat the "spoofing attacks," Yao and her former...

TechAndComputer (Nov. 2, 2010) — One of...