4.26K Views0 Comments3 Likes
After re-purposing CAPTCHA so each human-typed response helps digitize books, Luis von Ahn wondered how else to use small contributions by many on the Internet for greater good. At TEDxCMU, he shares how his ambitious...
5.04K Views0 Comments2 Likes
At TEDIndia, Pranav Mistry demos several tools that help the physical world interact with the world of data -- including a deep look at his SixthSense device and a new, paradigm-shifting paper "laptop." In an onstage ...
676 Views0 Comments1 Likes
Manuel Lima, senior UX design lead at Microsoft Bing, explores the power of network visualisation to help navigate our complex modern world.
898 Views0 Comments1 Likes
Alex Sotirov is a vulnerability engineer at determina. He will discuss some latest techniques in reverse engineering software to find vulnerabilities. Particularly, he'll discuss his technique that lead him to find th...
1.07K Views0 Comments1 Likes
University of California at Berkeley has long been a hotbed of research on AI.
880 Views0 Comments1 Likes
Every day around the world, software developers spend much of their time working with a variety of Application Programming Interfaces (APIs). Some are integral to the core platform, some provide access to widely distr...
1.14K Views0 Comments1 Likes
Quantum computing already exists, but on a truly minuscule scale. We'll probably have molecular computers before true quantum ones, says the physicist.
846 Views0 Comments1 Likes
Introduction to Modern Cryptography, Using Cryptography in Practice and at Google, Proofs of Security and Security Definitions and A Special Topic in Cryptography.
746 Views0 Comments0 Likes
Think of Star Wars -- who wouldn't want to use "The Force," firsthand? Tan Le presents the EPOC headset; a device that makes it possible for specially designed computer applications to be controlled and influenced by ...
977 Views0 Comments0 Likes
After the disaster of the original Xbox, Microsoft put a lot of effort in designing what is probably the most sophisticated consumer hardware security system to date. We present its design, its implementation, its wea...