Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Intel

Submission + - High schooler is awarded $100,000 for research

wired_LAIN writes: A teenager from Oklahoma was awarded $100,000 in the Intel Science Talent Search competition for building an inexpensive and accurate spectrograph that can identify the specific characteristics of different kinds of molecules. While normal spectrographs can cost between $20,000 and 100,000 to build, her spectrograph cost less than $500 dollars. The 40 finalists' projects were judged by a panel of 12 scientists, all well established in their respective fields. Among the judges were Vera Rubin , who proved Dark Matter, and Andrew Yeager, one of the pioneers of stem cell research. My only question is: why aren't these kids given more media coverage?
Security

Submission + - Dealing with long-term security requirements?

tbo writes: I'm an academic researcher in the field of quantum computing. I'm interested in learning what the IT community is doing to prepare for future developments in quantum computing and the resulting security implications — in particular, the compromise of most or all known public key cryptosystems.

Although large-scale quantum computers may be a decade or more away, this still has immediate implications for those with long-term forward security requirements (i.e., data that must stay secret for a long time). Does your organization have data with substantial forward security requirements? How do you deal with protecting that data against future advances in cryptanalysis? Has your organization considered quantum key distribution or other new cryptography technologies?

Another concern is replacing the present-day public key cryptography infrastructure with something immune to quantum computers. A malicious person with access to a single large-scale quantum computer could use it to crack the root certificate authorities' private keys, thus enabling him or her to fake certificates for anything they want and perform undetectable man-in-the-middle attacks against banks and e-commerce sites. Since it's very hard to revoke and re-issue root certificates, this would only have to happen once to do serious damage. What are people planning to do about this?
Businesses

Submission + - 15 Minute SEO

Amit Bhawnani writes: "15 Minute SEO is a checklist of the factors that affect your rankings with Google, MSN, Yahoo! and the other search engines. The list contains positive, negative and neutral factors because all of them exist. Most of the factors in the checklist apply mainly to Google and partially to MSN, Yahoo! and all the other search engines of lesser importance."

Slashdot Top Deals

Anyone can make an omelet with eggs. The trick is to make one with none.

Working...