placeholder

The Factoring Dead: Preparing for the Cryptopocalypse

A talk at Black Hat USA 2013 discussing recent advances in academic research that imperils two critical algorithms upon which Internet trust rests: RSA and Diff

Click to view the original at slideshare.net

placeholder

Sprites mods - Hard disk hacking - Intro

Apart from this article, I also gave a talk at OHM2013 about this subject. As soon as the video recordings made at that time are available, I'll link there.

Click to view the original at spritesmods.com

placeholder

Michael Lewis: Did Goldman Sachs Overstep in Criminally Charging Its Ex-Programmer?

With Sergey Aleynikov in prison for lifting computer code from Goldman Sachs, Michael Lewis convenes a private “jury” to determine what he actually did wrong.

Click to view the original at vanityfair.com

placeholder

Scientific Breakthrough Lets SnappyCam App Take 20 Full-Res Photos Per Second | TechCrunch

Your standard iPhone camera app is actually pretty slow, taking just three to six photos per second at 8 megapixels each. But with SnappyCam 3.0 you can shoot 20 full-resolution photos per second thanks to a breakthrough in discrete cosine transform JPG science by its inventor. 20 frames per secon..

Click to view the original at techcrunch.com

Hasnain says:

This is cool, though "thanks to a breakthrough in discrete cosine transform JPG science by its inventor." does indicate how good the reporting is.

Posted on 2013-08-01T17:00:03+0000

placeholder

Your app makes me fat

In 1999, Professor Baba Shiv (currently at Stanford) and his co-author Alex Fedorikhin did a simple experiment on 165 grad students.They asked half to memorize a seven-digit number and the other half to memorize a two-digit number. After completing the memorization task, participants were told the e...

Click to view the original at seriouspony.com

placeholder

Computer scientists develop 'mathematical jigsaw puzzles' to encrypt software

(Phys.org) —UCLA computer science professor Amit Sahai and a team of researchers have designed a system to encrypt software so that it only allows someone to use a program as intended while preventing any deciphering of the code behind it. This is known in computer science as 'software obfuscation,'...

Click to view the original at phys.org

placeholder

placeholder

placeholder

placeholder

A Race to Save the Orange by Altering Its DNA

Growers turned to genetics in hopes of building a tougher orange tree. But what intervention would the public accept?

Click to view the original at nytimes.com