Computable Minds

Blog of popular science about the more exiting branches of computer science.

Loading searcher...

visits

257

votes

25

Posted on: Feb, 15th 2011
RSA
The RSA is an encription algorithm of public key more used in the world. Its security increases exponentially with every bit that we add to the encription key, hence nobody have achieved break its security and maybe nobody do it never. If you want know how are posible the secure bank transactions over Internet, or how can be signed digitally e-mails and documents, besides of other things, follow reading. Don't left of read the rest of "RSA: the security of your money depends of it"

visits

697

votes

-6

Posted on: Feb, 8th 2011
Robot eyes
The vision is one of the principal senses of the human being. Give to the future robots a similar vision to the human is a big challenge of the branch of artificial intelligence called artificial vision. If you want know what is the difference between the human vision and the robotic vision, follow reading. Fill your mind with "Computer vision vs biologic vision"

visits

909

votes

20

Posted on: Feb, 1st 2011
Bionic eye
Through the optical nerves, our eyes are connected to the visual cortex or cortex V1 located in the back part of the brain. If we decode the way in that the retinas of our eyes encode the information and how is interpreted after by the brain, we could connect a cable on the rear part of the head of a person to recreate in the brain an alternative reality. This seems take it from the script of Matrix, have already done to return the vision the blinds. Don't miss the rest of "The bionic eye"

visits

168

votes

15

Posted on: Jan, 25th 2011
Apocalipsis 2038
A lot of programs wrote in C, Unix operating systems and others based in this, use a date format that consist in count the seconds that have passed from the midnight of the January 1, 1960, without counting leap seconds. This format is called POSIX and when arrives the moment 19/01/2038 03:14:07, the counter will show incorrectly the date 1901/12/13 20:46:52, causing errors in a lot of programs. Follow reading "The effect 2038"

visits

156

votes

13

Posted on: Jan, 18th 2011
Logo
During any software development is normal that the client want that the application does more things. If the computer specialist don't have all the things well defined from the beginning can make more difficult the development, but that isn't a problem, the problem is that normally the client don't want to pay more than that was established in the initial budget. Continue reading "Sponger of the computer specialist"

visits

224

votes

24

Posted on: Jan, 11th 2011
IPv6 protocol
According to the IANA (Internet Assigned Numbers Authority), the organization that assign the IP addresses, in February of 2011 all the IP addresses will be occupied. The solution to this problem is being implanted, approximately from the year 2000 and will follow implanting during a lot of years more. This consists in replace all the software and hardware that use the IPv4 protocol to another that use the IPv6 protocol. Follow discovering "What will happen when the IPv4 addresses will be exhausted?"
Daiatron on Google+