The Accidental History of the @ Symbol

Tomlinson’s eyes fell on @, poised above “P” on his Model 33 teletype. “I was mostly looking for a symbol that wasn’t used much,” he told Smithsonian. “And there weren’t a lot of options—an exclamation point or a comma. I could have used an equal sign, but that wouldn’t have made much sense.” Tomlinson chose @—“probably saving it from going the way of the ‘cent’ sign on computer keyboards,” he says. Using his naming system, he sent himself an e-mail, which traveled from one teletype in his room, through Arpanet, and back to a different teletype in his room.

via The Accidental History of the @ Symbol | Science & Nature | Smithsonian Magazine.

The bang (!) was also used back then for email.

Wi-Fi Alliance starts certifying tunnel technology for better wireless performance

TDLS is based on the IEEE 802.11z standard, and the automatic link configuration is done in a couple of steps. The discovery process begins when one device sends a discovery request to another device, via the network they are connected to. If the target device is also TDLS compliant, then it sends a response directly to the initiator, providing information on its capabilities, including supported rates and channels.

via Wi-Fi Alliance starts certifying tunnel technology for better wireless performance – Computerworld.

Besides streaming video and audio, TDLS can also be used to improve the performance of wireless data back-up, printing and file transfers.

As Microsoft gains, VMware insists that it maintains the upper hand

“Everybody has a hypervisor today and everybody gives it away for free,” Maritz continued. “What it’s all about are the automation layers on top of it,” and extending the benefits of virtualization from servers to the entire network.

How is VMware achieving that? The company today explained it wants to make “virtual data center” a phrase just as commonly uttered as virtual machines. Instead of merely virtualizing CPU capacity, a virtual data center brings CPU, storage, network services, security, load balancing, and other characteristics together into a single profile that can be easily reproduced and provisioned.

via As Microsoft gains, VMware insists that it maintains the upper hand | Ars Technica.

Why your smart device can’t get WiFi in the home team’s stadium

The only thing my boss said to me was, ‘Chip, the only thing that has to work is the cell phones.’”

That’s why stadiums across the country are partnering with cellular carriers to build Distributed Antenna Systems, or DAS. These are essentially a bunch of antennas spread throughout a building to make sure phones don’t lose their connections to the cellular network when fans walk in the door. But it’s not just phone calls and text messages filling up wireless networks during games. Fans are streaming video, whether from third-party sources or apps created by the home teams to provide replays, different camera angles, or action happening in other cities. Teams are concluding that cellular just isn’t enough, and are thus building WiFi networks to offload traffic from cellular and provide connections to devices that are WiFi-only.

via Why your smart device can’t get WiFi in the home team’s stadium | Ars Technica.

Distributed Antenna Systems connect to the service provider’s network either with a bi-directional amplifier, which uses an outdoor antenna to bring the cellular signal into the building, or a base transceiver station, which is installed inside and is the same type of radio used at cell sites, as explained by the Steel In The Air cellular consultancy. Signals are then distributed throughout the facility with a series of hubs, cables, and antennas.

Stanford researchers discover the ‘anternet’

On the surface, ants and the Internet don’t seem to have much in common. But two Stanford researchers have discovered that a species of harvester ants determine how many foragers to send out of the nest in much the same way that Internet protocols discover how much bandwidth is available for the transfer of data. The researchers are calling it the “anternet.”

via Stanford researchers discover the ‘anternet’.

Application Development Now Worth More Than $9 Billion Globally

According to Gartner’s “Market Trends: Application Development (AD) Software, Worldwide, 2012-2016” report, cloud is changing the way applications are designed, tested, and deployed, resulting in a significant shift in development priorities.

“The trend is compelling enough to force traditional AD vendors to ‘cloud-enable’ their existing offerings and position them as a service to be delivered through the cloud,” said Asheesh Raina, principal research analyst at Gartner.

via Application Development Now Worth More Than $9 Billion Globally | Dr Dobb’s.

Flat lens offers a perfect image

Operating at telecom wavelengths (i.e., the range commonly used in fiber-optic communications), the new device is completely scalable, from near-infrared to terahertz wavelengths, and simple to manufacture. The results have been published online in the journal Nano Letters.

via Flat lens offers a perfect image — Harvard School of Engineering and Applied Sciences.

“In the future we can potentially replace all the bulk components in the majority of optical systems with just flat surfaces,” says lead author Francesco Aieta, a visiting graduate student from the Università Politecnica delle Marche in Italy. “It certainly captures the imagination.”

 

Shor’s algorithm

If a quantum computer with a sufficient number of qubits were to be constructed, Shor’s algorithm could be used to break public-key cryptography schemes such as the widely used RSA scheme. RSA is based on the assumption that factoring large numbers is computationally infeasible. So far as is known, this assumption is valid for classical (non-quantum) computers; no classical algorithm is known that can factor in polynomial time. However, Shor’s algorithm shows that factoring is efficient on a quantum computer, so a sufficiently large quantum computer can break RSA. It was also a powerful motivator for the design and construction of quantum computers and for the study of new quantum computer algorithms. It has also facilitated research on new cryptosystems that are secure from quantum computers, collectively called post-quantum cryptography.

via Shor’s algorithm – Wikipedia, the free encyclopedia.

Trusted Platform Module

Software can use a Trusted Platform Module to authenticate hardware devices. Since each TPM chip has a unique and secret RSA key burned in as it is produced, it is capable of performing platform authentication.

Generally, pushing the security down to the hardware level in conjunction with software provides more protection than a software-only solution. However even where a TPM is used, a key is still vulnerable while a software application that has obtained it from the TPM is using it to perform encryption/decryption operations, as has been illustrated in the case of a cold boot attack.

via Trusted Platform Module – Wikipedia, the free encyclopedia.

“Trusted Platform Module (TPM) Specifications”. Trusted Computing Group.

coreboot

coreboot is a Free Software project aimed at replacing the proprietary BIOS (firmware) found in most computers. coreboot performs a little bit of hardware initialization and then executes additional boot logic, called a payload.

With the separation of hardware initialization and later boot logic, coreboot can scale from specialized applications that run directly from firmware, run operating systems in flash, load custom bootloaders, or implement firmware standards, like PC BIOS services or UEFI. This allows for systems to only include the features necessary in the target application, reducing the amount of code and flash space required

via coreboot.