Physicist James Clerk Maxwell was perhaps the first to recognize that atoms could be used to keep time. In 1879 he wrote to electricity pioneer William Thomson, suggesting that the “period of vibration of a piece of quartz crystal” would be a better absolute standard of time than the mean solar second (based on the Earth’s rotation) but would still depend “essentially on one particular piece of matter” and therefore would be “liable to accidents.” Maxwell theorized that atoms would work even better as a natural standard of time. Thomson wrote in the second edition of the Elements of Natural Philosophy, published in 1879, that hydrogen atoms, sodium atoms, and others were “absolutely alike in every physical property” and “probably remain the same so long as the particle itself exists.”
“Going beyond 1 Gb/s with existing Cat5e and Cat6 cables was little more than a talking point two years ago. But now with NBASE-T, we have the ability to extend the life of an enormous asset —your wired network. The Cat5e and Cat6 installed in just the last 15 years now exceeds an estimated 70 billion meters of cabling, which is more than 10 trips to Pluto,”
The document spells out the 10 common design flaws in a straightforward manner, each with a lengthy explainer of inherent weaknesses in each area and how software designers and architects should take these potential pitfalls into consideration. The 10, in no particular order, are:
- Earn or give, but never assume, trust
- Use an authentication mechanism that cannot be bypassed or tampered with
- Authorize after you authenticate
- Strictly separate data and control instructions, and never process control instructions received from untrusted sources
- Define an approach that ensures all data are explicitly validated
- Use cryptography correctly
- Identify sensitive data and how they should be handled
- Always consider the users
- Understand how integrating external components changes your attack surface
- Be flexible when considering future changes to objects and actors
“They are having launches, and in the United States we’re in gridlock,” says Joan Johnson-Freese, a professor at the U.S. Naval War College, in Newport, R.I. “The Chinese will have a rover onthe moon, and we’re still developing PowerPoints for programs that don’t get approved by Congress.” That rover is rolling over the regolith right now.
NASA has a couple rovers on Mars.
To parse the simultaneous claims of both a shortage and a surplus of STEM workers, we’ll need to delve into the data behind the debate, how it got going more than a half century ago, and the societal, economic, and nationalistic biases that have perpetuated it. And what that dissection reveals is that there is indeed a STEM crisis—just not the one everyone’s been talking about. The real STEM crisis is one of literacy: the fact that today’s students are not receiving a solid grounding in science, math, and engineering.
“It is certainly unfortunate this information was leaked out, and who knows who got it before it got fixed,” Dragusin wrote. Elsewhere in the post he said: “If leaving an FTP directory containing 100GB worth of logs publicly open could be a simple mistake in setting access permissions, keeping both usernames and passwords in plaintext is much more troublesome.”
Update: An IEEE spokeswoman emailed the following statement: “IEEE has become aware of an incident regarding inadvertent access to unencrypted log files containing user IDs and passwords. We have conducted a thorough investigation and the issue has been addressed and resolved.
Of all groups that have membership websites which store passwords, IEEE would be the last on a list I would suspect to have something like this happen.
TDLS is based on the IEEE 802.11z standard, and the automatic link configuration is done in a couple of steps. The discovery process begins when one device sends a discovery request to another device, via the network they are connected to. If the target device is also TDLS compliant, then it sends a response directly to the initiator, providing information on its capabilities, including supported rates and channels.
Besides streaming video and audio, TDLS can also be used to improve the performance of wireless data back-up, printing and file transfers.
The clock operates over spans of seconds to minutes after an RFID chip is charged up from an RFID reader or other ambient radio-wave energy. As a result, even after the radio signal is removed, the clock endows the RFID chip with the ability to know when its security keys may be in danger.
Having a clock can be very useful in defending against brute-force attacks that may try to guess the chip’s passwords hundreds or thousands of times per second. A TARDIS-enabled chip—requiring no new hardware and representing fewer than 50 lines of additional code—would receive a power-up from, say, a nearby RFID reader. Instead of wiping the SRAM clean, the device would first read off the state of the SRAM, which would be partially decayed from the last time the chip was powered up. Comparing the percentage of decayed bits to a precompiled table would enable TARDIS to read off the time elapsed since the previous power-up.
The CPRG’s poker programs, named “Hyperborean” in the ACPC, are constructed quite differently compared to programs for “perfect information games” such as chess.
The spreading of a trend or behavior in a social network is a very active area of research. One very important model of trend spreading is the “tipping” model. With tipping, an individual in a network adopts a trend if at least half (or some other proportion) of his or her friends have previously done so. An important problem in viral marketing is to find a “seed set” of individuals in the social network. If all members of a “seed set” in a social network initially adopt a certain trend, then a cascade initiates through the tipping model which results in the entire population adopting that trend. So, if a viral marketer wants to provide free samples of a product to certain individuals, a seed set is likely a good place to start.
Our work, “Large Social Networks can be Targeted for Viral Marketing with Small Seed Sets,” will be presented at the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) as a full paper this August