<$BlogRSDUrl$>

Tuesday, March 02, 2004

This Blog Has Moved 

For anyone out there who wants to keep in touch, this blog has moved to: http://geekswithblogs.net/rumair/.


On The Move - Bye Bye Blogger 

I will be moving this blog to a new location soon.... Blogger is good but iText is better.

This page will be history as I start the painful process of moving all of my rants one by one manually to this blogs new location.

Soon the only thing left on this page will be a redirection to my new blog address.


Sunday, February 29, 2004

Hmmm, I sww light 

The reason that data structures and algorithms
can work together seamlessly is ... that they
do not know anything about each other.

- Alex Stepanov

This DVD Will Self-Destruct in 48 Hours  

Disney may be taking a cue from Mission Impossible with its latest development, DVDs that become unreadable 48 hours after being opened. This new technology allows any retailer to become a movie vendor with a small collection of DVDs, but the design is also ground-breaking. The movies are known as EZ-D, and once the package is opened and exposed to oxygen, it starts a countdown that culminates in the disc displaying only a black screen when its time has expired. Stores in four states are due to begin selling the DVDs in the near future with plans to expand nationwide.

Disney thinks this could be the future of movie rentals, and Blockbuster might be worried about its future market."

The death of the Password 

It will come someday soon. When passwords will be outdated my much secure and better ways of authtication leading to better security.

The tamper resistant ID-card software has been developed by Microsoft's research arm and was demonstrated during Gate's keynote for RSA.

To create an ID card, the software requires a photograph and some basic information about the user, for example, name and date of birth. This information is put through an algorithm to create a digital signature in the form of a barcode, which is also printed onto the ID card. If any of the information on the ID card is altered, it will not correlate to the signature and the card is rejected.

Gavin Jancke, development manager at Microsoft Research, who demonstrated the product, said one of the key aspects of the system is that it does not require a database because all the information is already stored on the card: 'The authenticity ID is stored in the printed information in the card itself. There are no user privacy issues because we know that what is stored on this card is stuff that they can actually see,' he said."

This page is powered by Blogger. Isn't yours? Site Meter Creative Commons License