ARM Information Center

Welcome to the ARM Infocenter. The Infocenter contains all ARM non-confidential Technical Publications, including:

Via ARM Information Center.

Quantum cryptography: yesterday, today, and tomorrow

Imagine you have a product of two prime numbers, say, 221. Now, we set that number to be an endpoint—for the purposes of our game, there are no higher integers. If we multiply two numbers together and get a number larger than 221, it wraps around, so 15 times 15 results in 225-221 = 4. If we multiply two by itself, we only get four, which doesn’t wrap, and we can do that 7 times before it wraps. But 28 results in 35. Got that? Great.

via Quantum cryptography: yesterday, today, and tomorrow | Ars Technica.

Let’s consider a consequence of using phase to calculate prime factors: 221 has prime factors 17 and 13, and factors 1 and 221. We can eliminate the latter in the classical part of our algorithm. But, what about two and 111? “Wait,” you say. “That is not a factor. The product is 222.” Nevertheless, we need to think about it, because quantum algorithms are probabilistic. 17 and 13 have the highest probabilities, but two and 111 only have a phase error of 0.5 percent. The probability of Shor’s algorithm returning the incorrect result is rather high. Unfortunately, a near miss (though easy to spot, since it is very quick to calculate that 2×111=222 not 221). This is likely not very useful in terms of decrypting a message, so we need to do something to increase the chance of getting the correct answer.

Set Up the Master Boot Record

When setting up the Master Boot Record, you need to enter appropriate partition information. In this example, Grub is in the first partition on the first hard drive, which is (hd0,0) in Grub. Change this to whatever partition Grub is in.

After getting the Grub prompt, type:

root (hd0,0)
setup (hd0)
quit

via Set Up the Master Boot Record.

This has been sitting as draft since August 5 and works in setting the MBR on a hard drive and since things like this can be easily forgotten, it has become a reference.  Even Testdisk couldn’t  write the MBR correctly when I tried to transfer a Fedora14 VM onto a real hard drive.  After setting the MBR and getting it to boot the network and graphic interfaces required manual intervention.  I’m not convinced transferring a virtual image to a physical image is much of a time saver.

Note: Not all installations have grub installed by default.  The command to get the grub prompt is /sbin/grub run as root.

Raising the dead: Can a regular person repair a damaged hard drive?

This is a story of my efforts to repair the drive myself, my research into the question of whether or not users can repair modern hard drives, and the results of my efforts. If your drive is still detected in BIOS, you may be able to use software tools to retrieve your data. Here, we’re going to focus exclusively on hardware-related failures, and what your options are.

via Raising the dead: Can a regular person repair a damaged hard drive? | ExtremeTech.

Surf the internet for more than two minutes, and you’ll find people who recommend you do one of the following things:

  • Stick your hard drive in the freezer
  • Pop your hard drive into the oven
  • Give it a few taps with a hammer or rubber mallet

LOL. I have been desparate to try the freezer trick a couple of times without luck.

Natural Language Toolkit — NLTK 2.0 documentation

NLTK is a leading platform for building Python programs to work with human language data. It provides easy-to-use interfaces to over 50 corpora and lexical resources such as WordNet, along with a suite of text processing libraries for classification, tokenization, stemming, tagging, parsing, and semantic reasoning.

via Natural Language Toolkit — NLTK 2.0 documentation.

From: http://www.cloudera.com/blog/2010/03/natural-language-processing-with-hadoop-and-python/

NLP is a highly interdisciplinary field of study comprising of concepts and ideas from Mathematics, Computer Science and Linguistics. Naturally occurring instances of human language, be it text or speech, are growing at an exponential rate given the popularity of the Web and social media. In addition, people are increasingly becoming more and more reliant on internet services to search, filter, process and, in some cases, even understand the subset of such instances they encounter in their daily lives.

NLP = Natural Language Processing

Choosing the Right Security Tools to Protect VMs

As enterprises move towards virtualizing more of their servers and data center infrastructure, protective technologies—plentiful and commonplace in the physical world—become few and far between. When your Windows Server or SQL database is running in a virtual machine (VM), you still need to protect it from viruses and other attacks while providing the same level of access controls you have for physical servers. Let’s look at the different approaches to protecting your VMs, as well as the major issues involved with deploying these technologies.

via Choosing the Right Security Tools to Protect VMs.

Anyone seriously invested in virtualization is going to need more than one protection product. So before you dive into this marketplace, you should carefully consider the types of protective features you really need at present, and where you want to end up in the next 12 months. You should look at covering five different functional areas: