Category: Computers

Sort: Date | Views | Sort Ascending
View:

Luis von Ahn: Massive-scale online collaboration

4.15K Views0 Comments

After re-purposing CAPTCHA so each human-typed response helps digitize books, Luis von Ahn wondered how else to use small contributions by many on the Internet for greater good. At TEDxCMU, he shares how his ambitious...

Pranav Mistry: The thrilling potential of SixthSense technology

4.93K Views0 Comments

At TEDIndia, Pranav Mistry demos several tools that help the physical world interact with the world of data -- including a deep look at his SixthSense device and a new, paradigm-shifting paper "laptop." In an onstage ...

The Power of Networks: Knowledge in an age of infinite interconnectedness

658 Views0 Comments

Manuel Lima, senior UX design lead at Microsoft Bing, explores the power of network visualisation to help navigate our complex modern world.

Reverse engineering techniques to find security bugs

876 Views0 Comments

Alex Sotirov is a vulnerability engineer at determina. He will discuss some latest techniques in reverse engineering software to find vulnerabilities. Particularly, he'll discuss his technique that lead him to find th...

Frank Rose Forecasts Artificial Intelligence

1.05K Views0 Comments

University of California at Berkeley has long been a hotbed of research on AI.

How To Design A Good API and Why it Matters

860 Views0 Comments

Every day around the world, software developers spend much of their time working with a variety of Application Programming Interfaces (APIs). Some are integral to the core platform, some provide access to widely distr...

Michio Kaku: How to Program a Quantum Computer

1.11K Views0 Comments

Quantum computing already exists, but on a truly minuscule scale. We'll probably have molecular computers before true quantum ones, says the physicist.

Theory and Practice of Cryptography

828 Views0 Comments

Introduction to Modern Cryptography, Using Cryptography in Practice and at Google, Proofs of Security and Security Definitions and A Special Topic in Cryptography.

Cross-Compiling Android Applications to the iPhone

654 Views0 Comments

Smart phones such as Google's Android and Apple's iPhone have become popular devices for mobile applications. In particular, both devices allow the development of native applications that can take advantage of special...

The Lazy Programmer’s Guide to Secure Computing

2.23K Views0 Comments

This presentation starts with a simple block of code written by the Lazy Programmer, to observe how laziness made the code more compact and simpler. We then define the Principle of Least Authority(POLA), and explain w...

Page 1 of 812345...Last »