How are you, @e3e77916db? 🪐 What's happening in tech this week: The Noonification by HackerNoon has got you covered with fresh content from our top 5 stories of the day, every day at noon your local time! Set email preference here. View other stories also published on this day throughout HackerNoon history. |
|
By @felixarpa [ 7 Min read ] As cryptographic technologies continue to advance and find new and ever more important uses in our lives, the processes these technologies carry out grow ever more complex. While a tremendous amount can be done with simple cryptographic primitives, it is what they can do when combined that is the most exciting. Even more impressive is the idea that some cryptographic protocols are designed with hardware description capabilities, granting them the power to tackle universal challenges. This idea, fittingly called “programmable cryptography,” has the promise of making more complicated actions possible by, to paraphrase Brian Gu, turning the mathematical problem of designing new protocols into the programming problem of combining existing ones. In this article, we will explore the layers of cryptographic application, from high-level goals to low-level algorithms, to understand where these ideas come from. Then, we will have a look at where they are going... |
By @interoperability [ 13 Min read ] Authors: (1) Daniel Reijsbergen, Nanyang Technological University, Singapore, Singapore; (2) Aung Maw, Singapore University of Technology and Design, Singapore, Singapore; (3) Jingchi Zhang, Nanyang Technological University, Singapore, Singapore; (4) Tien Tuan Anh Dinh, Deakin University, Melbourne, Australia; (5) Anwitaman Datta, Nanyang Technological University, Singapore, Singapore. Abstract & Introduction Overview of PIEChain Implementation of PIEChain Demontration Plan Extensions References.. |
|
By @stevemattussigfig [ 4 Min read ] Accelerated employment. Wage gains. Faster investment, more information and notable gains in productivity. These were all hallmarks of the 1990s, a period that looms large in the memories of those who witnessed this time of innovation and skyrocketing long-term growth. New technologies, like computers and software, gave rise to a greater reliance and utilization of networking. The internet first flashed its true potential. Information was suddenly accessible and storing it became cheaper and cheaper. The combination of personal computing and the internet catalyzed massive changes to industry, trade, finance and services. The economic sluggishness of the 1970s and 1980s finally folded, as technology prospered, inflation fell and poverty gave way to job gains. History certainly harmonizes... |
Amazon Echo Look was launched to allow users to take photos and videos of themselves to help them choose outfits and provide fashion advice. It was marketed as an AI-powered fashion assistant and could suggest styles based on a user's preferences and provide personalized fashion recommendations. The Echo Look was designed specifically for the fashion-conscious consumer, putting Amazon ahead as a leader in the voice-activated device market. |
|
|
Recently, the House passed a bill requiring ByteDance, the parent company of TikTok, to divest from the app within 180 days or face prohibition (a ban) in the U.S. However, Senate supporters argue that this is not a ban but rather a transition of ownership to ensure national security. |
We hope you enjoy this 24 minutes worth of free reading material. Feel free to forward this email to a nerdy friend who'll love you for it. See you on Planet Internet! With love, The HackerNoon Team ✌️ |
Want to get different tech stories?
|
|
|
|