'Point: Effective identity management strategies are business-based, and should rise above technical limitations. - Steve Mowll, Identity Architect, RSA'
Superlative study (funded by the Department of Defense - Army Research Office) - via Duke University's Department of Electrical and Computer Engineering at Durham, Nort Carolina and the Salk Institute for Biological Studies - Integrative Biology Laboratory in La Jolla, California - targeting the apparent similarities between artifical and biologic network implementations. Today's must read!
“The founders of the Internet spent a lot of time considering how to make information flow efficiently,” says Salk Assistant Professor Saket Navlakha, coauthor of the new study that appears online in Neural Computation on February 9, 2017. “Finding that an engineered system and an evolved biological one arise at a similar solution to a problem is really interesting.”
Decisions. Deeply Rooted (apparently) in Incompetence
News, via El Reg staff reporter Shaun Nichols, detailing the deep security ignorance on part of Republican Part contractor research firm Deep Root Analytics. Storing nearly 200 million voter registration records in an unencrypted form, on an accessible S3 bucket certainly sets the bar to a new low in custodial security oversight, don't you think? Harsh you may ask? Read the El Reg post for the full details... H/T
Roland Pease - writing for the BBC Radio Science Unit, has crafted this well-reported piece, targeting the PRC's Micius satellite, engineered to provision the fundamentals of an ostensibly 'unbreakable' crypto-mehodology, i.e., quantum entanglement (in this case, wierding twins)...
"Chinese scientists have pulled off a major feat with one of the sub-atomic world's weirdest phenomena: photons that behave like twins and experience the same things simultaneously, even over great distances." - via Phys.org