Computable Minds

Blog of popular science about the more exiting branches of computer science.

Loading searcher...
Sorted by "More votes"

visits

163

votes

25

Posted on: Apr, 13th 2011
Signal warning of radiactivity
The processors aren't inmune to the radiactivity. This it produces soft errors, that are errors in the signals of its circuits, produced by the noise that generates the radiation on it. The consequences of the radiation over the machines aren't so devastating as over the human, because in the worst case we can reboot the machine, but the things that could do the machines affected by radiation to the humans, it could be dangerous. Learn more about "The machines neither are inmune to the radiactivity"

visits

351

votes

25

Posted on: Feb, 15th 2011
RSA
The RSA is an encription algorithm of public key more used in the world. Its security increases exponentially with every bit that we add to the encription key, hence nobody have achieved break its security and maybe nobody do it never. If you want know how are posible the secure bank transactions over Internet, or how can be signed digitally e-mails and documents, besides of other things, follow reading. Don't left of read the rest of "RSA: the security of your money depends of it"

visits

133

votes

24

Posted on: Sep, 25th 2011
dumb software questions
A lot of people think that a computer specialist is someone that knows how use all the software that exists and have been existed on the world, in any operating system of any kind of computer or movile device. Can be an architecture sorftware, photographic retouching, accounting or the management software tailor-made only for his enterprise, don't mind!, as is a computer specialist, has to know use them. So that they think that the computer specialist will answer then they question anything related with them. Don't stop reading the rest of "Dumb questions about software"

visits

275

votes

24

Posted on: Jan, 11th 2011
IPv6 protocol
According to the IANA (Internet Assigned Numbers Authority), the organization that assign the IP addresses, in February of 2011 all the IP addresses will be occupied. The solution to this problem is being implanted, approximately from the year 2000 and will follow implanting during a lot of years more. This consists in replace all the software and hardware that use the IPv4 protocol to another that use the IPv6 protocol. Read all about of "What will happen when the IPv4 addresses will be exhausted?"

visits

368

votes

23

Posted on: Oct, 26th 2010
Gold medal of the Loebner prize
The past day 23 was celebrated the twentieth edition of the Loebner prize in the University of California. This competition consist in test several chatbots to see if they are capable to surpass the Turing test. Don't stop reading the rest of "Winner of the Loebner prize 2010"

visits

641

votes

21

Posted on: Apr, 21st 2011
Computer easter egg
Often the programmers hide surprises in its programs, hided by key combinations or strange actions. These surprises usually consist in unusual functionalities, credit titles or any other rare thing. The name that recieve these surprises is "easter eggs". Continue discovering "The best easter eggs"
Daiatron on Google+