IT System Basics

IT System and Server Fundamentals, ignore at your own peril.

Global Cyber Attack

Using the released NSA hacking tools Windows XP systems without the March update are now participating in one of the largest botnets attacking vulnerable machines.

There are many guilty parties contributing to this fiasco.

The administrators failing to patch systems

The software companies failing to properly support older software

The government for failing to secure its hacking tools

At some point modern systems may become unsustainable.

May 15 now over 200,000 computers in 150 countries. Total ransom collected $50,000 so far.


Filed under: Security

Limits of Computation

time e.g. weather forecast
power e.g. mining bit coin
as fundemental as thermodynamics is to mechanical engineering

Filed under: All Systems

Riemann Hypothesis and implications to cryptography

Intro – the video is very good. In fact it may take a quantum computer to prove the hypothesis.

However the distribution of primes that comes from the hypothesis does not speed up factoring the large numbers found in encryption protocols such as RSA.



Filed under: Security

The Mathematics of Quantum Computing

Filed under: Uncategorized

Quantum Computer Programming

The typical Wikipedia starting point:
The conventional textbook:

Filed under: All Systems

Quantum computers in 5 years



Filed under: All Systems

Books on the Block Chain

Blockchain Revolution by Don Tapscott and Allan Tapscott


Thorough book with notes

Filed under: Blockchain

Block Chain Applications

BlockchainID – passcards
Supply Chain
Distributed asset ledger
Decentralized notary
Online Voting
Stock Market Trades
Land registries
Smart Contracts
Distributed Cloud Storage
Content payment and licensing
read more

Filed under: Blockchain

Blockchain digitizing asset classes


The growth of Bitcoin


Bitcoin an example where the security of block chain transactions is measured by the individual computing power vs. all the legitimate modes computing power to solve, proof of work puzzles; furthermore
large scale computing power may be better used being a bitcoin miner rather than forking the chain with a fraudulent transaction.

A good explanation of how this works is at

There is another security limit based on the lifetime of current encryption technologies. Encryption has 50% chance broken by 2030 due to advances in quantum computing.


Filed under: Blockchain

Blockchain the next big thing

Blockchain is a mechanism for establishing trust in a modern world. It is the underlying technology behind crypto currencies such as Bit Coin.

WHY – see TED talks


A gentle introduction to bitcoin



Filed under: All Systems

%d bloggers like this: