Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged https

Rss Feed Group items tagged

Collin Jackson

Cell Phone Data Could Help Clip Malaria Spread - 0 views

  •  
    Using data from cellphone locations in Kenya, analysts are better able to predict how malaria will spread.
Kristin Davis

BBC - Future-Intelligence agencies turn to crowdsourcing - 0 views

  •  
    This article on how the CIA is using crowdsourcing to make intelligence more accurate is particularly well written because if its inclusion of a quick attention draw with the reference to the new James Bond movie, good historical background, an inviting writing style that includes rhetorical questions, and interviews with experts that add to the legitimacy of the article. 
Marco Tiburcio

Robots: Can biohybrid model sink or swim? - 0 views

  •  
    This article describes an ongoing project to build an artificial organism that integrates biological parts with electrical components. The article, while introducing scientific jargon, does a great job of explaining technical terms in depth. It also quotes members of the project team, presenting a realistic assessment of the project's progress and odds of success. Lastly, the article includes several links to videos and pages of extremely interesting and relevant content.
Tyren Herbst-Ingram

Come Firewalk With Me - 0 views

  •  
    The article makes a clear argument with supporting facts, all while being easily accessible to people that are unfamiliar with the field and remaining entertaining
Collin Jackson

Cipher Solver - 0 views

  •  
    Here is the tool I used that puts the plain text letters over the cipher letters.
Marco Tiburcio

Step 1: Post Elusive Proof. Step 2: Watch Fireworks. - 0 views

  •  
    Online collaboration over the claimed proof "P versus NP" demonstrates the potential of the internet in the field of mathematical and intellectual research alike. The proof "P versus NP," if verified, would make obsolete modern cryptography, which works under the assumption that P does not equal NP.
Hannah Lee

Eastern European Cybercriminals Said to Trump Asian Counterparts in Sophistication CIO.com - 0 views

  •  
    Eastern European hackers have been proven more effective at their craft than Asian cybercriminals due to their precision, focus, and ability to protect their identities. 
Justin Yeh

Cisco Releases Cloud IPS, Upgrades Security Products - 0 views

  •  
    An article about a Cisco security upgrade for the cloud and various devices that access the cloud.
Malak Elmousallamy

Hacked Chamber of Commerce Opposed Cybersecurity Law - 0 views

  •  
    This is another example of the debate on whether security or privacy is more important.
Siegfried Schlunk

Quantum processor's prime feat raises security issues | ZDNet - 0 views

  •  
    Summary: California researchers report a breakthrough with the creation of a solid-state quantum processor that could ultimately have a bearing on future cryptographic techniques. Researchers in California have designed and built a quantum processor capable of factoring 15 into its primes - with major implications for computer security.
Emily Dinino

New security flaws detected in mobile devices - USATODAY.com - 0 views

  •  
    Mobile devices offer incredibly low security or protection from criminals trying to decipher data. 
Kristin Davis

UK recruits code-breakers with online puzzle - CNN - 0 views

  •  
    The Government Communications Headquarters in the UK offered a job application to anyone who could solve their code found at www.canyoucrackit.co.uk
Annie Vreeland

How 18th-Century Copiale Cipher Was Cracked - 0 views

  •  
    A description of how the Copiale Cipher was cracked. 
Justin Yeh

Getting Slower And Slower: How Slow Can You Go? : Krulwich Wonders... : NPR - 0 views

  •  
    Speed is generally considered exciting, but this blog post takes a different approach. It uses interesting examples, both foreign and familiar, to create a relative scale of speed. It is extremely easy to understand and informative. 
Annie Vreeland

Walking on Eggshells: Anatomy of a Science Story | Cocktail Party Physics, Scientific A... - 0 views

  •  
    I like the way this is written because the author makes it a fun read. It is not a long boring article about the writing process of her story, but rather it breaks down her process into steps. Moreover, her writing is entertaining, which grasped my interest more so than many other posts. 
michaelpollack

Unpleasant Sounds - 0 views

  •  
    I thought the author of this post did a great job explaining the experiment and the point of his research. Additionally, he was able to clarify complex scientific words and processes, without spending too much time explaining every detail. The overall structure of the blog post is well done, as the author progresses from an explanation of the experiment, to the meaning of certain results, to the results themselves.
Emily Dinino

The Smart Scanner That May Put Shampoo Back Into Your Carry-on | Weapons & Security | D... - 0 views

  •  
    I thought this post was incredibly well written, starting with the title. The title is captivating and draws readers in by suggesting a solution to a common annoyance. The article also addresses the bigger scientific achievement: this scanner may be useful for medical purposes such as measuring glucose levels or cancer cell levels at tumor sites. The article provides sufficient, interesting information while creatively tying in witty humor. 
‹ Previous 21 - 40 of 791 Next › Last »
Showing 20 items per page