Category: Computers

Sort: Date | Views | Sort Ascending
View:

Luis von Ahn: Massive-scale online collaboration

4.26K Views0 Comments

After re-purposing CAPTCHA so each human-typed response helps digitize books, Luis von Ahn wondered how else to use small contributions by many on the Internet for greater good. At TEDxCMU, he shares how his ambitious...

Pranav Mistry: The thrilling potential of SixthSense technology

5.04K Views0 Comments

At TEDIndia, Pranav Mistry demos several tools that help the physical world interact with the world of data -- including a deep look at his SixthSense device and a new, paradigm-shifting paper "laptop." In an onstage ...

The Power of Networks: Knowledge in an age of infinite interconnectedness

676 Views0 Comments

Manuel Lima, senior UX design lead at Microsoft Bing, explores the power of network visualisation to help navigate our complex modern world.

Reverse engineering techniques to find security bugs

898 Views0 Comments

Alex Sotirov is a vulnerability engineer at determina. He will discuss some latest techniques in reverse engineering software to find vulnerabilities. Particularly, he'll discuss his technique that lead him to find th...

Frank Rose Forecasts Artificial Intelligence

1.07K Views0 Comments

University of California at Berkeley has long been a hotbed of research on AI.

How To Design A Good API and Why it Matters

880 Views0 Comments

Every day around the world, software developers spend much of their time working with a variety of Application Programming Interfaces (APIs). Some are integral to the core platform, some provide access to widely distr...

Michio Kaku: How to Program a Quantum Computer

1.14K Views0 Comments

Quantum computing already exists, but on a truly minuscule scale. We'll probably have molecular computers before true quantum ones, says the physicist.

Theory and Practice of Cryptography

846 Views0 Comments

Introduction to Modern Cryptography, Using Cryptography in Practice and at Google, Proofs of Security and Security Definitions and A Special Topic in Cryptography.

Tan Le ideaCity10

746 Views0 Comments

Think of Star Wars -- who wouldn't want to use "The Force," firsthand? Tan Le presents the EPOC headset; a device that makes it possible for specially designed computer applications to be controlled and influenced by ...

The Xbox 360 Security System and its Weaknesses

977 Views0 Comments

After the disaster of the original Xbox, Microsoft put a lot of effort in designing what is probably the most sophisticated consumer hardware security system to date. We present its design, its implementation, its wea...

Page 1 of 812345...Last »