Why You Should Not Compress Encrypted Data
Both compressed data and encrypted data look similar: they are a string of apparently random characters that seem to bear no relationship to the original data. But there are significant differences...
View ArticleA Real-Time View of Cyber Attacks
I feel a little lazy this week. We just got back from a very busy spring with two cruises: one from Vancouver around Hawaii and back to Vancouver on Holland America and the other from Amsterdam to...
View ArticleThe End of Moore’s Law
In 1965, Gordon Moore predicted that computer chips would double in performance every two years at low cost, now known as Moore’s aw. He also predicted that chips they would eventually be so small and...
View ArticleQuantum Computing Part 1
In my last post I indicated that the fifty-year trend of doubling computer processing power every two years was coming to an end, and growth with the current integrated circuit technologies is expected...
View ArticleWhat Is Quantum Computing?
Last time we talked about the weird quantum universe, where particles can be in more than one state at the same time and can be entangled with another particle at great distances. What does this have...
View ArticleThe Impact of Quantum Computing on Data Security
This is the third in my Quantum Computing series. Last time I indicated that the two main areas in which quantum computers will be very much faster than digital computers are searching and factoring....
View ArticleThe State of Quantum Computing Today
This is the last of a series of four blogs about quantum computing. The first was a quick view into the weird world of quantum physics, followed by a look at was capabilities a quantum computer would...
View ArticleAutonomous Vehicle Update
Tesla is having an interesting year with its Autopilot capabilities. Its software, supported by cameras, radar and ultrasonic sensors, can automatically drive on a highway including changing lanes...
View ArticleIs the US Presidential Election Vulnerable to Cyber Attack?
With the news of targeted attacks against election systems, should the American voter be concerned that the upcoming presidential election could be manipulated or invalidated by a foreign government or...
View ArticleThe Second and Third Levels of Defense for the US Election
Last time I wrote about how the complexity of the presidential voting process in the US is an important defense against cyber-terrorism, and specifically the risk of a foreign power impacting or...
View Article
More Pages to Explore .....