OLPC Bitfrost – OLPC

There are five broad categories of “bad things” that running software could do, for the purposes of our discussion. In no particular order, software can attempt to damage the machine, compromise the user’s privacy, damage the user’s information, do “bad things” to people other than the machine’s user, and lastly, impersonate the user.

via OLPC Bitfrost – OLPC.

An MIT Magic Trick: Computing On Encrypted Databases Without Ever Decrypting Them

An MIT Magic Trick: Computing On Encrypted Databases Without Ever Decrypting Them – Forbes.

Now the Google- and Citigroup-funded work of three MIT scientists holds the promise of solving that long-nagging issue in some of the computing world’s most common applications. CryptDB, a piece of database software the researchers presented in a paper (PDF here) at the Symposium on Operating System Principles in October, allows users to send queries to an encrypted set of data and get almost any answer they need from it without ever decrypting the stored information, a trick that keeps the info safe from hackers, accidental loss and even snooping administrators. And while it’s not the first system to offer that kind of magically flexible cryptography, it may be the first practical one, taking a fraction of a second to produce an answer where other systems that perform the same encrypted functions would require thousands of years.

How to get rich in the cloud

To get rich in the world of cloud computing, you first need to focus on a skill that’s in high demand, which is the kind that will pay very well. Second, work for an organization that provides some return on equity around the use of those skills. Typically, that means a hot technology startup or perhaps a small publicly traded technology company that’s now moving to the cloud. Wait a few years, sell your stock, move to beach, then repeat.

via How to get rich in the cloud | Cloud Computing – InfoWorld.

And that’s all it takes.  🙂

Kenton’s Weekend Projects: LAN-party house: Technical design and FAQ

After I posted about my LAN-party optimized house, lots of people have asked for more details about the computer configuration that allows me to maintain all the machines as if they were only one. I also posted the back story to how I ended up with this house, but people don’t really care about me, they want to know how it works! Well, here you go!

via Kenton’s Weekend Projects: LAN-party house: Technical design and FAQ.