Author Archive

Turing Machine paper is published, November 12, 1937

https://www.edn.com/electronics-blogs/edn-moments/4401108/Turing-Machine-paper-is-published–November-12–1937?utm_content=buffer3dc5b&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer  Britain’s Alan Turingpublished a paper entitled “On Computable Numbers with an Application to the Entscheidungs-problem” on November 12, 1937, was later renamed the Turing Machine.

A Formula for Success with GDPR – IBM Analytics – Medium

https://medium.com/ibm-analytics/a-formula-for-success-with-gdpr-c7fbd2a5b2f The General Data Protection Regulationcomes into effect on May 25th 2018 and many organizations are already seeking outside help to understand and navigate the complexities. As you consider connecting with an advisor, this brief series of posts lets you know some of the most important questions to ask, how to set priorities. You should consider having a

One Bitcoin Transaction Now Uses As Much Energy As Your House In a Week – Slashdot

https://m.slashdot.org/story/333535 It look like Bitcoin is not very “clean” technology: Bitcoin’s incredible price run to break over $7,000 this year has sent its overall electricity consumption soaring, as people worldwide bring more energy-hungry computers online to mine the digital currency.  Bitcoin miners burn through over 24 terawatt-hours of electricity annually. This averages out to a shocking 215

Nanodevice Maps the Angle of Light to Color and Vice Versa – IEEE Spectrum

https://spectrum.ieee.org/nanoclast/semiconductors/nanotechnology/nanodevice-maps-the-angle-of-light-to-color-and-vice-versa  An international team of researchers has added a small twist to typical light filters. They’ve fabricated a nanoscale device that divides incident light into its different component colors based on the direction the light is coming from. They’ve switched from making filters with equally spaced grooves to an aperiodic architecture wherein the grooves are not equally spaced. The research

How Threat Modeling Helps Discover Security Vulnerabilities

https://access.redhat.com/blogs/766093/posts/2914051?sc_cid=7016000000127ECAAY Application threat modeling can be used as an approach to secure software development, as it is a nice preventative measure for dealing with security issues, and mitigates the time and effort required to deal with vulnerabilities that may arise later throughout the application’s production life cycle. Unfortunately, it seems security has no place in

Evolution of Mobile Communication from 1(G) to 4G, 5G, 6G, 7G …

http://vitorr.com/post-details.php?postid=2615 The cellular wireless Generation (G) generally refers to a change in the nature of the system, speed, technology and frequency. Each generation have some standards, capacities, techniques and new features which differentiate it from the previous one. Now 5G is hot technology at the top of the hype cycle. But that’s not the end

The digital age of data art | TechCrunch

https://techcrunch.com/2016/05/08/the-digital-age-of-data-art/ Many artists use as material for art the raw data produced by our societies, seeking innovative means of display or transforming it into a work of art. By blurring boundaries between art and information, data artdispels the myth of the romantic artist while offering a fundamental artistic act in a critical commentary of the digital age

Saying Goodbye to Firebug ★ Mozilla Hacks – the Web developer blog

https://hacks.mozilla.org/2017/10/saying-goodbye-to-firebug/ Firebug has been a phenomenal success over its 12-year lifespan. So it’s sad that Firebug is now reaching end-of-life in the Firefox browser, with the release of Firefox Quantum (version 57) soon. The good news is that all the capabilities of Firebug are now present in current Firefox Developer Tools. So the work pioneered by the