Quantum cryptography: yesterday, today, and tomorrow

Imagine you have a product of two prime numbers, say, 221. Now, we set that number to be an endpoint—for the purposes of our game, there are no higher integers. If we multiply two numbers together and get a number larger than 221, it wraps around, so 15 times 15 results in 225-221 = 4. If we multiply two by itself, we only get four, which doesn’t wrap, and we can do that 7 times before it wraps. But 28 results in 35. Got that? Great.

via Quantum cryptography: yesterday, today, and tomorrow | Ars Technica.

Let’s consider a consequence of using phase to calculate prime factors: 221 has prime factors 17 and 13, and factors 1 and 221. We can eliminate the latter in the classical part of our algorithm. But, what about two and 111? “Wait,” you say. “That is not a factor. The product is 222.” Nevertheless, we need to think about it, because quantum algorithms are probabilistic. 17 and 13 have the highest probabilities, but two and 111 only have a phase error of 0.5 percent. The probability of Shor’s algorithm returning the incorrect result is rather high. Unfortunately, a near miss (though easy to spot, since it is very quick to calculate that 2×111=222 not 221). This is likely not very useful in terms of decrypting a message, so we need to do something to increase the chance of getting the correct answer.

Can Microsoft Convince People to Subscribe to Software?

Observers have said that, with this newest pricing shift, Microsoft is using a carrot-and-stick approach or trying to “nudge” customers toward a subscription service for Office. But I’d go a bit farther—for some buyers, it might feel like signing up with a gun to their head.

That’s because Microsoft is making it much more expensive to buy Office the old way, in order to make the new subscription model look like a better, simpler, more straightforward deal.

via Can Microsoft Convince People to Subscribe to Software? | Xconomy.

IPv4 address transfer markets are forming where we least expected

And indeed, in the APNIC region, 191,744 addresses were transferred in 2011 with another 713,216 in the first half of 2012. In the RIPE region Europe, the former Soviet Union, and the Middle East, the researchers couldn’t find any address transfers. But surprisingly, in the ARIN region North America—where there is no immediate shortage—no less than 821,504 addresses were transferred in 2011 with 4.22 million in the first half of 2012.

via IPv4 address transfer markets are forming where we least expected | Ars Technica.

But we now know there are other players than ISPs looking to secure enough IPv4 addresses for the medium term. There’s also the possibility that address trading will take off once trading between regions becomes a possibility, so that address-starved Asians can buy up addresses from North American companies such as HP. That company happens to be sitting on more than 33 million addresses. Or consider the US government, which has more than 168 million. Ultimately, maybe the money is better spent upgrading to IPv6 instead.

Former JDSU Exec Rediscovers His Optical Drive

According to Lumish and his CTO, Pilot founder Frank Smyth, these products, available from October, are needed in the development of optical transport systems beyond 100Gbit/s. The lasers enable a lot more data to be sent down a fiber by cutting down the space between the wavelengths so that more can be packed into the space currently taken up by a single wavelength. Smyth points out that the spacing is fixed between the multiple wavelengths emitted by Pilot’s optical comb sources and this allows the channels effectively to be transmitted right up against each other.

via Light Reading Europe – Optical Networking – Former JDSU Exec Rediscovers His Optical Drive – Telecom News Analysis.

Avoiding Egypt: Where Cables Fear to Dredge

New cables are finding other ways to connect Europe and the Middle East. The Europe-Persia Express Gateway (EPEG), a terrestrial cable that routes from Frankfurt to Oman via Ukraine and Iran, is built “away from the known trouble areas,” says Gavin Tait, director of Asia network planning for Cable & Wireless Worldwide plc (London: CW), now part of the Vodafone Group plc (NYSE: VOD). “Obviously it doesn’t go anywhere near the Red Sea,” he adds. (See Euronews: Vodafone Gets the Nod on C&WW, Vodafone Appoints C&WW Execs and ancotel Provides EPEG Connection Point.)

via Light Reading Asia – Optical Networking – Avoiding Egypt: Where Cables Fear to Dredge – Telecom News Analysis.

Meanwhile, Singapore’s popularity as a network destination is making it hard to land cables there, says Genaro Sanchez, Philippine Long Distance Telephone Co. (PLDT) vice-president of network planning and engineering. “The corridor in Singapore is narrow, it’s getting crowded, [and] it’s getting more difficult to work with cables.”

W3C announces plan to deliver HTML 5 by 2014, HTML 5.1 in 2016

The World Wide Web Consortium (W3C), the group that manages development of the main specifications used by the Web, has proposed a new plan that would see the HTML 5 spec positioned as a Recommendation—which in W3C’s lingo represents a complete, finished standard—by the end of 2014. The group plans a follow-up, HTML 5.1, for the end of 2016.

via W3C announces plan to deliver HTML 5 by 2014, HTML 5.1 in 2016 | Ars Technica.

The new HTML 5.1 will be smaller as a number of technologies (such as Web Workers and WebSockets) were once under the HTML 5 umbrella but have now been broken out into separate specifications. It will also have less stringent testing requirements.

Facebook: snitchgate!

A story about Facebook went around twitter last night that provoked quite a reaction in privacy advocates like me: Facebook, it seems, is experimenting with getting people to ‘snitch’ on any of their friends who don’t use their real names. Take a look at this:

via Facebook: snitchgate! « Paul Bernal’s Blog.

People in my field have known about this for a long time – it’s been the cause of a few ‘high profile’ events such as when Salman Rushdie had his account suspended because they didn’t believe that he was who he said he was – but few people had taken it very seriously for anyone other than the famous. Everyone knows ‘fake’ names and ‘fake’ accounts – my sister’s dog has a Facebook account – so few believed that Facebook was going to bother enforcing it, except for obvious trolls and so forth. Now, however, that appears to be changing.

Australian researchers create world’s first working quantum bit

This enabled them to form a quantum bit or “qubit”, the basic unit of data for quantum computers, which promise to solve complex problems “that are currently impossible on even the world’s largest supercomputers,” according to team leader Dr Andrea Morello.

via Australian researchers create world’s first working quantum bit – Professor Andrew Dzurak, Dr Andrea Morello, university of new south wales, quantum bit, quantum computing – CIO.

The paper’s lead author, UNSW PhD student Jarryd Pla, said researchers had been able to “isolate, measure and control an electron belonging to a single atom, all using a device that was made in a very similar way to everyday silicon computer chips.”

Future Software Will Look Like Facebook

“I think all software is going to look like Facebook,” he said. “Everyone is going to have to rewrite to have a feed-based platform.” If people can collaborate on tagging a photo, he added, they could easily do the same with a product or business problem.

Salesforce’s software, of course, integrates many of the social-networking tropes that Facebook and Twitter helped establish, including profiles and real-time collaboration.

via Salesforce CEO Benioff: Future Software Will Look Like Facebook.

In addition to Salesforce Touch, Salesforce is using the conference to push new initiatives such as its Marketing Cloud, which allows companies to manage their presence across social channels; Work.com, a cloud-based performance-management platform for Human Resources divisions; Chatter Communities for Partners, which lets companies create multiple private communities; and Data.com Social Key, which combines social data such as Tweets with “traditional” business information such as phone numbers.