Post Profile

DARPA SEEKS HACK-PROOF COMPUTER CODE: It’s being tested. …the computer code underpinning the ha…

DARPA SEEKS HACK-PROOF COMPUTER CODE: It’s being tested. …the computer code underpinning the hardware was essentially unhackable with current technology. The report notes the code is “as trustworthy as a mathematical proof.” The programming approach is known as formal verification, and it’s written informally and evaluated based on whether it works or not. The language […]
read more


Related Posts

Creative mathematical tasks contribute to deeper learning in mathematics

Academics / Mathematics : EurekAlert: Math

(Umea University) Working with creative mathematical tasks is important for pupils both to reflect on mathematics as well as for their subsequent test results. Being faced with creative tasks during exercise has evident effects on a...

Amazon adds Nvidia GPU firepower to its compute cloud

Technology / Hardware : Extremetech

Amazon has announced it's adding new, GPU-equipped high-end servers to its EC2 cloud computing service. If you've ever wanted to take 8 Nvidia K80 GPUs for a test drive (without buying 8 K80's worth of graphics hardware), now is you...

DARPA Staging AI Hacking War

US Politics / Liberal : Drudge Retort Weblog

A bunch of computers will try to hack each other in Vegas for a $2 million prize," reports Tech Insider, calling it a "historic battle" that will coincide with "two of the biggest hacking conferences, Blackhat USA and DEFCON". DARPA...

DARPA Is Using Oculus Rift To Build The ‘Mega Man Battle Network’ Of Cyberwarfare

Technology : TechCrunch: Enterprise

In a surprising amount of futuristic visions of how hacking will work in the future, the experience is immersive, rather than something done hunched over a computer looking at lines of code scroll by. DARPA appears to agree with the...

Unhackable kernel could keep all computers safe from cyberattack

Technology : New Scientist: Tech

From helicopters to medical devices and power stations, mathematical proof that software at the heart of an operating system is secure could keep hackers out


Copyright © 2016 Regator, LLC