Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
For the out-of-band Slashdot experience (mostly headlines), follow us on Twitter, or Facebook. ×

Comment: searching encrypted data (Score 1) 266 266

There are techniques to do this but none have made it out of academia. Most are quite inefficient and support very restricted querying models. Here's one paper that claims their methods are "practical" (but always keep in mind that academic claims of practicality should always be taken with a grain of salt):

http://www.cs.berkeley.edu/~dawnsong/papers/se.pdf

Comment: Re:concerns alleviated... (Score 1) 174 174

Bait and switch would be just like these guys!

Google wants an auto updater so badly because it allows them to gather more information on you. Why else would it have ever included a unique identifier?

The purpose of the ID is described here. But you may need to take off the tin foil hat before you can understand it.

GoogleUpdate also uses its own, randomly-generated unique ID number to accurately count total users. This information includes version numbers, languages, operating system, and other install or update-related details, such as whether or not the applications have been run. This information is not associated with you or your Google Account.

Math

+ - MIT dude disproves Wolfram on 44 conjectures 2 2

blue2 writes: Fresh out of press from the "Journal of cellular automata" ... geeky author Evangelos Georgiadis disproves legendary Stephen Wolfram on 44 conjectures. Abstract reads: In this note, we disprove 44 claims in [4] on minimal Boolean formula size of one-dimensional two-state nearest neighbor cellular automata as well as set a new lowersize bound. http://www.oldcitypublishing.com/JCA/JCA%202.4%20abstracts/GEORGIADIS.html

A fail-safe circuit will destroy others. -- Klipstein

Working...