How are you, @e3e77916db? 🪐 What's happening in tech this week: The Noonification by HackerNoon has got you covered with fresh content from our top 5 stories of the day, every day at noon your local time! Set email preference here. View other stories also published on this day throughout HackerNoon history. |
By @felixarpa [ 7 Min read ] As cryptographic technologies continue to advance and find new and ever more important uses in our lives, the processes these technologies carry out grow ever more complex. While a tremendous amount can be done with simple cryptographic primitives, it is what they can do when combined that is the most exciting. Even more impressive is the idea that some cryptographic protocols are designed with hardware description capabilities, granting them the power to tackle universal challenges. This idea, fittingly called “programmable cryptography,” has the promise of making more complicated actions possible by, to paraphrase Brian Gu, turning the mathematical problem of designing new protocols into the programming problem of combining existing ones. In this article, we will explore the layers of cryptographic application, from high-level goals to low-level algorithms, to understand where these ideas come from. Then, we will have a look at where they are going... |
By @interoperability [ 13 Min read ] Authors: (1) Daniel Reijsbergen, Nanyang Technological University, Singapore, Singapore; (2) Aung Maw, Singapore University of Technology and Design, Singapore, Singapore; (3) Jingchi Zhang, Nanyang Technological University, Singapore, Singapore; (4) Tien Tuan Anh Dinh, Deakin University, Melbourne, Australia; (5) Anwitaman Datta, Nanyang Technological University, Singapore, Singapore. Abstract & Introduction Overview of PIEChain Implementation of PIEChain Demontration Plan Extensions References.. |
By @stevemattussigfig [ 4 Min read ] Accelerated employment. Wage gains. Faster investment, more information and notable gains in productivity. These were all hallmarks of the 1990s, a period that looms large in the memories of those who witnessed this time of innovation and skyrocketing long-term growth. New technologies, like computers and software, gave rise to a greater reliance and utilization of networking. The internet first flashed its true potential. Information was suddenly accessible and storing it became cheaper and cheaper. The combination of personal computing and the internet catalyzed massive changes to industry, trade, finance and services. The economic sluggishness of the 1970s and 1980s finally folded, as technology prospered, inflation fell and poverty gave way to job gains. History certainly harmonizes... |
Featured Jobs: Gilat: Embedded Software Engineer Whisker: Sr Software Engineer NVIDIA: Senior Developer Technology Engineer - AI Explore thousands of tech jobs on the HackerNoon Job Board. Message from the Sponsor: It’s one of the oldest markets in the world, but until recently, the average person would never dream of investing in it. Until a Harvard data scientist and his team cracked the code with a system to identify “excess alpha.” The best part? Everyday people are already benefiting. The company that makes it all possible is called Masterworks, whose unique investment platform enables savvy investors to invest in blue-chip art for a fraction of the cost. Their proprietary database of art market returns provides an unrivaled quantitative edge in analyzing investment opportunities. So far, it's been right on the money. Every one of their 16 exits has been profitable, with recent exits delivering +17.8%, +21.5%, and +35.0% net annualized returns. Intrigued? HackerNoon readers can skip the waitlist with this exclusive referral link.* * Past performance is not indicative of future returns, investing involves risk. See disclosures: masterworks.com/cd |
Amazon Echo Look was launched to allow users to take photos and videos of themselves to help them choose outfits and provide fashion advice. It was marketed as an AI-powered fashion assistant and could suggest styles based on a user's preferences and provide personalized fashion recommendations. The Echo Look was designed specifically for the fashion-conscious consumer, putting Amazon ahead as a leader in the voice-activated device market. | |
|
Recently, the House passed a bill requiring ByteDance, the parent company of TikTok, to divest from the app within 180 days or face prohibition (a ban) in the U.S. However, Senate supporters argue that this is not a ban but rather a transition of ownership to ensure national security. 38% Yes - ban TikTok for national security reasons. 22% No - keep TikTok operational as security concerns are exaggerated. 12% Compromise - keep TikTok, force ByteDance out. 26% I have no horse in this race. |
We hope you enjoy this 24 minutes worth of free reading material. Feel free to forward this email to a nerdy friend who'll love you for it. See you on Planet Internet! With love, The HackerNoon Team ✌️ |
|
|
|