Chronicled Completes Technical Pilot Demonstrating Cryptographic Anonymous Transfer of SGTINs for Supply Chain … – PR Newswire (press release)

In addition to removing trust barriers and multi-party friction and bottlenecks, Chronicled's technical pilot represents the first step towards full prevention and elimination of the entry of counterfeit products and components into the supply chain. Within the cryptographic framework of the pilot, an SGTIN can be in the possession of only a single trading partner at any given time. Any duplication will alert the network to the existence and location of a counterfeit asset.

The first market vertical that Chronicled is tackling with the methodology -- in partnership with The LinkLab -- is the pharmaceutical supply chain. An FDA regulatory regime called the Drug Supply Chain Security Act (DSCSA) calls for full end-to-end track and trace of pharma products by 2023 on an interoperable platform. However, under conventional approaches, the pharmaceutical industry fears the leakage of sensitive business intelligence that could tip-off their trading and financing partners about purchasing patterns and business volumes.

"Our team has been working hard on this key privacy issue, and as a result Chronicled is now the first to successfully demonstrate this cryptographically secure method of anonymous physical asset identity transfer," said Chronicled CEO, Ryan Orr. "As an immediate next step, we plan to continue to work with industry partners to implement current supply chain workflows using this technology while optimizing for volume, aggregation, returns, recalls, and performance considerations."

"This is the first step in a longer-term plan to fundamentally improve the way assets move through supply chains by using blockchain technology to immutably track the provenance of any object with an SGTIN," said Chronicled CTO, Maurizio Greco.

Data written to a blockchain are transparent and immutable and do not rely on central databases or human intermediaries. Because of this, the zk-SNARK methodology is not susceptible to human error or conventional hacking. The framework piloted by Chronicled prevents any leakage of company identity, shipment information, and transaction volumes and makes the usage of a blockchain ledger resistant to unwanted usage or analysis of data by an industry analyst or malicious third party. Associated smart contracts allow a regulator to fully and reliably audit the provenance of an asset after the fact, without the need for prior knowledge, continuous monitoring, or the need for trust in the various organizations operating within the supply chain.

"In early August, Chronicled will host a clean-room session with three experts in the field of applied cryptography to verify the robustness of the technical method and publish independent assessments in a public forum," said Chronicled Engineer Maksym Petkus.

While the initial pilot is being implemented using a Parity client on Ethereum, it is compatible with other blockchain systems, including Quorum and Hyperledger, which Chronicled also supports. When fully implemented, the system is expected to represent a major step towards eliminating much of the friction that exists under present regulatory and trade regimes, as data privacy is afforded while at the same time the record of custody and provenance is immutably and cryptographically secured. This unique solution to solving the competing requirements of full privacy, and also item level provenance when requested by a regulator, will represent a major move toward digitalization, trust, and interoperability in global trade flows.

More broadly, the pilot lays the foundation for the implementation of secure, automated business practices on blockchain systems. Follow-on use cases might include IoT-based verification of physical custody of a physical shipment as a precursor to being able to transfer custody of an SGTIN to the next trading partner in the chain; or, immediate, secure fulfillment of contractual obligations, including, for example, automated payment upon delivery of a shipment.

About ChronicledBased in San Francisco, Chronicled is a technology company leveraging blockchain and IoT to power smart, secure supply chain solutions. Chronicled secures IoT device identities, data, and event logs and automates IoT-dependent business logic through smart contracts. Chronicled is also a founding member of the Trusted IoT Alliance, with the mission of creating open source tools and standards to connect IoT and blockchain ecosystems to deliver business value.

About The LinkLabThe LinkLab is a unique supply chain consulting group founded to provide life science companies guidance and support to meet world-wide serialization regulations. With deadlines fast approaching, we work to provide companies with innovative approaches to ensure gaps are identified, timelines are met, and business value is realized. The LinkLab formed from observing the Pharma industry's progression in establishing electronic management of prescription medicines and seeing a need for improvements. With experience going back to 2008 in planning for California's ePedigree law, The LinkLab principals have, for the last four years, focused on projects which support the packaging, distribution, and commercial requirements of serializing prescription medicines. To learn more, visit http://www.thelinklab.com/.

View original content with multimedia:http://www.prnewswire.com/news-releases/chronicled-completes-technical-pilot-demonstrating-cryptographic-anonymous-transfer-of-sgtins-for-supply-chain-applications-300496402.html

SOURCE Chronicled

http://www.chronicled.com

Original post:
Chronicled Completes Technical Pilot Demonstrating Cryptographic Anonymous Transfer of SGTINs for Supply Chain ... - PR Newswire (press release)

China’s New Quantum Communication Network Will Be Unhackable – Futurism

In Brief China's new quantum communication network in the city of Jinan is expected to change cryptography for the better. As computers become more powerful, current encryption methods become less reliable. Quantum cryptography will be a key technology for addressing this. Securing the Internet

For a country notorious for its restrictive internet policies, China seems to be taking the lead on developing next-generation internet communications. The city of Jinan is set to become the hub of this quantum communications network that will boost Beijing-Shanghai internet when the project is launched by the end of August. It is set to become the worlds first unhackable internet communications network.

Unlike encryption methods that hide the key under difficult mathematical problems, quantum communication and cryptographyuse entanglementto do the trick. Concretely, the key is embedded in photons (light particles) and sent ahead of the encrypted message a method called quantum key distribution (QKD).

Communication becomes unhackable this way because any attempt to intercept the key would be obviousto the sender and the intendedrecipient. Whats even more impressive is that China has the technology to extend quantum communications up to 400 kilometers (about 250 miles), as previously demonstrated in a quantum cryptography research in Hefei.

As technology becomes increasingly more complex, computers are becomingincreasingly more powerful. This puts current encryption methods in danger, as number-crunching becomes easier with powerful computing power. Number-based keys need to be prolonged and constantly updated to keep up. QKD potentially solves all of this.

Yet, for the most part, it seems China is leaving the West behind in pursuit of this technology. For a long time people simply didnt think it was needed, Myungshik Kim from Imperial College, London,told the BBC. The mathematical difficulty of the current coding system was so high that it was not thought necessary to implement the new technology.

Recent security breeches and hacks, of course, reveal the error of this thinking. Thats one reason why China is pursuing quantum communication, but the tech has a number of other possible applications as well.

We plan to use the [Jinan] network for national [defense], finance, and other fields, and hope to spread it out as a pilot that if successful, can be used across China and the whole world, Zhou Fei, Jinan Institute of Quantum Technology assistant director, previously told the Financial Times.

See more here:
China's New Quantum Communication Network Will Be Unhackable - Futurism

Quantum Cryptography System Breaks Daylight Distance Record – IEEE Spectrum

Satellites can now set up quantum communications links through the air during the day instead of just at night, potentially helping a nigh-unhackable space-based quantum Internet to operate 24-7, a new study from Chinese scientists finds.

Quantum cryptography exploits the quantum properties of particles such as photons to help encrypt and decrypt messages in a theoretically unhackable way. Scientists worldwide are now endeavoring to develop satellite-based quantum communications networks for a global real-time quantum Internet.

However, prior experiments with long-distance quantum communications links through the airwere mostly conducted at night because sunlight serves as a source of noise. Previously, the maximum range for day-time free-space quantum communication was 10 kilometers,says study co-senior author Qiang Zhang, a quantum physicist at the University of Science and Technology of China in Shanghai.

Now researchers led by quantum physicist Jian-Wei Pan at the University of Science and Technology of China at Hefei have successfully established 53-kilometer quantum cryptography links during the day between two ground stations. This research suggests that such links could work between a satellite and either a ground station or another satellite, they say.

To overcome interference from sunlight, the researchers switched from the roughly 700-to-900-nanometer wavelengths of light used in all prior day-time free-space experiments to roughly 1,550 nm. The sun is about one-fifth as bright at 1,550 nanometers as it is at 800 nanometers, and 1,550-nanometer light can also pass through Earth's atmosphere with virtually no interference. Moreover, this wavelength is also currently widely used in telecommunications, making it more compatible with existing networks.

Previous research was reluctant to use 1,550-nanometer light because of a lack of good commercial single-photon detectors capable of working at this wavelength. But the Shanghai group developed a compact single-photon detector for 1,550-nanometer light that could work at room temperature. Moreover, the scientists developed a receiver that needed less than one tenth of the field of view that receivers for night-time quantum communications links usually need to work. This limited the amount of noise from stray light by a factor of several hundred.

In experiments, the scientists repeatedly established quantum communications links across Qinghai Lake, the biggest lake in China, from 3:30 p.m. to 5 p.m. local time on several sunny days, achieving transmission rates of 20 to 400 bits per second. Furthermore, they could establish these links despite roughly 48 decibels of loss in their communications channel, which is more than the roughly 40 to 45 decibels of loss typically seen in communications channels between satellites and the ground and between low-Earth-orbit satellites, Zhang says. In comparison, previous day-time free-space quantum communications experiments could only accommodate roughly 20 decibels of noise.

The researchers note that their experiments were performed in good weather, and that quantum communication is currently not possible in bad weather with todays technology. Still, they note that bad weather is only a problem for ground-to-space links, and that it would not pose a problem for links between satellites.

In the future, the researchers expect to boost transmission rates and distance using better single-photon detectors, perhaps superconducting ones. They may also seek to exploit the quantum phenomenon known as entanglement to carry out more sophisticated forms of quantum cryptography, although this will require generating very bright sources of entangled photons that can operate in a narrow band of wavelengths, Zhang says.

The scientists detailed their findings online 24 July in the journal Nature Photonics.

IEEE Spectrums general technology blog, featuring news, analysis, and opinions about engineering, consumer electronics, and technology and society, from the editorial staff and freelance contributors.

Sign up for the Tech Alert newsletter and receive ground-breaking technology and science news from IEEE Spectrum every Thursday.

Two quantum leaps in quantum communication 9Nov2015

In two new trials, satellites set distance records for beaming photons usable in quantum crypto 21Jul

Draft Defense Authorization Act includes $15 million for national rollout of Stanford-originated Hacking for Defense class 25Jul

Inexpensive and small, this GPS receiver turbocharged the market for integrated navigation in mobile devices 30Jun

Record distance for quantum entanglement set at more than 1,200 km 15Jun

Dust-sized micrometeroids can cause an EMP "like a mini-nuke" that could wreck satellite electronics 3May

Facebook's Yael Maguire talks about millimeter wave networks, Aquila, and flying tethered antennas at the F8 developer conference 19Apr

NASAs new geosensing satellites may be on the chopping block. The timing could hardly be worse 24Mar

NASAs new geosensing satellites may be on the chopping block. The timing could hardly be worse 9Mar

The RSGS spacecraft could visit and inspect dozensofsatellites 8Mar

India plans to launch 103 satellites at once next month; Spaceflight Industries is launching a system for 87 in February 4Jan

Stanford students meet with John Kerry, U.S. State Department officials, and diplomats from around the world as they take on real-world problems 21Dec2016

Computer models combine daytime satellite images, nighttime lighting, and survey data to estimate poverty levels 18Aug2016

The mission will test quantum linksin principle unhackablebetween space and the ground 16Aug2016

Polish-less technology also offers "smart optics" for deforming the mirror in different telescope orientations 14Jul2016

Is this solar-powered remote plant monitor the most sensor-packed gadget on the Internet of Things? 12Jul2016

Claire, a Canadian microsatellite launched in June, is gearing up to take high-res snapshots of greenhouse gas plumes 5Jul2016

Claire, a Canadian microsatellite launched in June, is gearing up to take high-resolution snapshots of greenhouse gas plumes 5Jul2016

Eyeing the space boom, the company plans to launch a constellation of CubeSats 27Jun2016

Hundreds of threatened and endangered turtles wash ashore in Chesapeake Bay each year, and no one knows why 20Jun2016

Continued here:
Quantum Cryptography System Breaks Daylight Distance Record - IEEE Spectrum

SK Telecom Develops Quantum Cryptography Chip for IoT – SDxCentral

SK Telecom is adding a new level of security to the Internet of Things (IoT) by embedding a small quantum random number generator (QRNG) chip into its IoT devices. QRNG chips generates random numbers without any pattern, which is intended to increase the level of security.

The South Korean operator also said that its QRNG chip will be just 5 millimeters (mm) by 5 mm in size, making it small enough to embed in a variety of devices.

According to Sam Hale, analyst with MachNation, hardware-based random number generation, like the QRNG chip, has existed for some time and is already largely deployed in some business sectors. In fact, Hale said that random number generators (of which QRNG is a subset), have existed in various formats for decades and Intel currently uses this type of technology for its Intel Secure Key brand.

The benefit to IoT is that QRNG ensures common encryption methods cannot be broken due to weaknesses within their random number generators. The QRNG technology magnifies very small scale quantum uncertainties to a much larger scale.

SK Telecom has not yet determined the price of its QRNG chips, but said that it will work with partners to accelerate the popularity of QRNG and increase its presence in the market.

However, Hale said that SK may have some difficulty getting traction for its QRNG chip as both Intel and ARM, which currently produce the majority of IoT processors, already use competing technologies or have QRNG technology already embedded in them.

SK Telecom has been investing heavily in IoT. The company said earlier this year that it would invest $9 billion over the next three years in artificial intelligence (AI), IoT, autonomous vehicles, and 5G.

Sue is VP of Content and Editor-in-Chief at SDxCentral. Sue covers 5G and IoT for SDxCentral as well as overseeing all the editorial content on the site. Prior to SDxCentral, Sue was the Editor-in-Chief of FierceMarkets Telecom Group. Sue has more than 20 years of experience reporting on the telecom industry, including roles as the Executive Editor at Wireless Week and Managing Editor at Convergence magazine. She has also worked as an analyst for Paul Kagan Associates, specializing in wireless and broadband technologies. She can be reached at smarek@sdxcentral.com

The rest is here:
SK Telecom Develops Quantum Cryptography Chip for IoT - SDxCentral

China set to launch ‘unhackable’ messaging network using quantum cryptography – International Business Times UK

China is set to launch a new "unhackable" communications network built upon cutting-edge quantum cryptography, promising to revolutionise the process of encryption. State media said the city of Jinan will be "the first in the world" to use the secure technology in government.

Scientists claimed the network, which reportedly cost 120m yuan ($19.5m, 15m) to construct, will connect government offices in the city. Roughly 50 rounds of testing indicated it will be capable of encrypting more than 4,000 pieces of data every second, China Daily reported.

It will be used by 200 users across Jinan's government, finance and military departments, state media said. Experts from the Institute of Quantum Technology located in Jinan revealed the revolutionary network would be rolled out by August later this year.

Unlike the encryption of today, quantum-based networks send messages inserted into particles of light.

The "unhackable" claim comes from the fact that if anyone attempts to break into the network the particles will change and the message will be destroyed.

"We plan to use the network for national defence, finance and other fields, and hope to spread it out as a pilot that if successful, can be used across China and the whole world," said Zhou Fei, assistant director of Jinan Institute of Quantum Technology, as noted by the Financial Times.

It's not the first time China has invested in quantum tech. Last year it launched a "hack-proof" communications satellite, which was put on a two-year mission to help develop stronger communications at speeds "faster than light".

Many other nations have been reluctant to invest in such systems at scale, but why?

"For a long time people simply didn't think it was needed," Professor Myungshik Kim of Imperial College, London, told the BBC. "The mathematical difficulty of the current coding system was so high that it was not thought necessary to implement the new technology."

Now, it appears that China is leading the charge. "While nothing can truly be deemed as 'unhackable', new and radical approaches are very much needed to help secure technology and communications," said Javvad Malik, an expert at security firm AlienVault.

He added: "Having applications utilising technologies that make them more difficult to hack, or can detect quickly and reliably when a compromise has occurred is always a welcome addition and one would hope to see such improvements in all new technologies and national infrastructure."

Andrew Clarke, director at security firm One Identity, said that the promise of quantum technology continued to be a "bright spot on the horizon".

He elaborated: "The latest experiments in China have adopted satellite systems and increased wavelengths to establish quantum cryptography links during the day.

"The concept behind the technology is that if there is any interference in the communication such as an attacker trying to steal an encryption key then the quantum mechanics theory indicates that the key would immediately change to prevent that from being successful.

"At this stage, the experiments involve point-to-point encrypted communication, but when extended could provide a new approach to wider communications between multiple trusted parties.

"It will require much more research; experimentation and investment to extend to wider use; boost transmission rates and distance. This is certainly a step in the right direction to address global security concerns concerning public internet use."

Read more

Original post:
China set to launch 'unhackable' messaging network using quantum cryptography - International Business Times UK

A brief history of Alice & Bob, cryptography’s first couple – Boing Boing

Alice and Bob are the hypothetical communicants in every cryptographic example or explainer, two people trying to talk with one another without being thwarted or overheard by Eve, Mallory and their legion of nefarious friends.

Alice and Bob's first known appearance was in Rivest, Shamir, and Adleman's 1978 Communications in the ACM paper, A Method for Obtaining Digital Signatures and Public-key Cryptosystems." Since then, they have enjoyed many adventures.

The potted history of Alice and Bob at Cryptocouple is a delightful way to explore the history of crypto and the way we think about secrecy and privacy.

Alice and Bob are the worlds most famous cryptographic couple. Since their invention in 1978, they have at once been called inseparable, and have been the subject of numerous divorces, travels, and torments. In the ensuing years, other characters have joined their cryptographic family. Theres Eve, the passive and submissive eavesdropper, Mallory the malicious attacker, and Trent, trusted by all, just to name a few.

While Alice, Bob, and their extended family were originally used to explain how public key cryptography works, they have since become widely used across other science and engineering domains. Their influence continues to grow outside of academia as well: Alice and Bob are now a part of geek lore, and subject to narratives and visual depictions that combine pedagogy with in-jokes, often reflecting of the sexist and heteronormative environments in which they were born and continue to be used. More than just the worlds most famous cryptographic couple, Alice and Bob have become an archetype of digital exchange, and a lens through which to view broader digital culture.

Alice & Bob A History of The Worlds Most Famous Cryptographic Couple [Cryptocouple]

This week on HOME: Stories From L.A.:The original Forest Lawn Memorial Park, in the hills above Glendale, may be best known outside California for inspiring the sledgehammer satire of the 1965 cult comedyThe Loved One. For tourists and curiosity-seekers, its the gonzo lifes work of Hubert Eaton, who memorialized himself as The Builder in the []

The Awakening by Henry Mayer is considered one of the finest pieces of political art of the 20th-century and is often mentioned as the most beautiful of the suffrage maps. American women earned the vote from west to east before the right became federal law.

From Business Insider; mostly unappetizing. Pictured here is the 17th century watermelon, as cropped from Giovanni Stanchis c. 1650s painting. They look rough, but would have tasted great. The watermelon originally came from Africa, but after domestication it thrived in hot climates in the Middle East and southern Europe. It probably became common in European []

Whether youre a seasoned entertainment industry veteran or a student working on your first spec script, having the right tool for the job will make a huge difference in your focus and productivity.Final Draft 10 is far and away the worlds best screenwriting software, used extensively by professional film and TV writers at top production []

Web content creators who dont have a solid SEO strategy should take note of Webtexttool. Its a service that pulls in anonymous data from their entire user base to offer crowdsourced guidance that increases your search page ranks. By analyzing prior user successes, it helps you better gauge how your posts will perform at a []

Just because English has become the common global tongue doesnt mean its the easiest language to writeeven for native speakers. If youre looking to improve your written communication skills, especially on your smartphone, take a look at Ginger Page.Ginger is a cross-platform app that offers corrections for phrasing as well as grammar. Its powered by []

Read more here:
A brief history of Alice & Bob, cryptography's first couple - Boing Boing

SKT Develops Hacking-Proof Core Chip for Quantum Cryptography – BusinessKorea


BusinessKorea
SKT Develops Hacking-Proof Core Chip for Quantum Cryptography
BusinessKorea
Key equipment was developed for the popularization of quantum cryptography known to be impossible to hack. SK Telecom announced on July 23 that it developed a prototype chip for generating ultra-small quantum random numbers. The product which was ...
SK Telecom develops 5mm QRNG chip prototype - TelecompaperTelecompaper (subscription)

all 5 news articles »

More here:
SKT Develops Hacking-Proof Core Chip for Quantum Cryptography - BusinessKorea

MCU or DSP?: Graphics and Cryptography in Microchip’s New Microcontrollers – All About Circuits

The hardware inside microcontrollers is increasingly powerful and versatile. This is good, right?

When I started working with embedded systems, microcontrollers and DSPs were very different things. In fact, the first professional system that I was deeply involved in was a perfect example of the distinction: An 8051 microcontroller was used for housekeeping tasks and a test/debug RS-232 interface. A Texas Instruments DSP was used for intensive mathematical computations. The 8051 was programmed by a mechanical engineer, and the DSP was programmed by an electrical engineer who later became a system engineer. I dont know what this last sentence says about the MCU vs. DSP distinction, but maybe you can discover some hidden significance.

As microcontrollers become more powerful and incorporate additional dedicated hardware, the MCU and DSP categories become less relevant. Microchip is contributing to this trend with its PIC32MZ DA and CEC1702 microcontrollers, which incorporate advanced graphics capabilities and hardware cryptography, respectively. As one of the press releases points out, the PIC32MZ DA family breaks through perceived MCU graphics barriers. Just for the record, Im not making a value judgment here; you can call these parts whatever you want as far as Im concerned. When Im searching for a part I look at the specs, not the category, and I know which manufacturers make the processors that Im interested in.

However, as implied by the introduction to this article, I think it is worthwhile to consider the implications of microcontrollers that incorporate increasingly diverse and sophisticated functionality. There is always a trade-off: higher performance comes with design challenges such as stricter layout requirements, higher levels of firmware abstraction, or simply longer datasheets that are more intimidating for novices. There is perhaps some degree of risk in making microcontrollers increasingly unapproachable for those who dont have extensive experience in embedded design.

No one could deny that graphical displays or interfaces are essential aspects of modern electronic devices, and I assume that many designers will be glad to see manufacturers such as Microchip making efforts to support and improve this functionality. The PIC32MZ DA family includes a graphics controller, a graphics processing unit (GPU), and up to 32 MB of RAM.

Ive never had any need for encryption in my projects and I honestly know very little about it. But I readily believe that its important in these days of cybercriminals, identify theft, and shady business practices (shady business practices are nothing new, I supposeI doubt the Phoenicians attributed their success to fair trade). Microchip is emphasizing the importance of data security in the context of an IoT world, and that makes sense: if indeed the world will one day be filled with little Internet-connected devices sending data every which way, we might as well do what we can to protect that data from malefactors.

The CEC1702 is a 32-bit microcontroller built around an ARM Cortex-M4 processor. The special security features are described as encryption, authentication, and private and public key capabilities. As usual, this integrated functionality provides significant performance benefits by using hardware to accomplish tasks that otherwise would burden the processor; the product page mentions a factor-of-100 performance improvement for encryption and decryption.

In addition to typical encryption of data and code, the CEC1702 offers the following:

Do you have experience with complex embedded graphics applications? Do you think that the functionality offered by the PIC32MZ DA would be a significant advantage in the design process?

Read the original here:
MCU or DSP?: Graphics and Cryptography in Microchip's New Microcontrollers - All About Circuits

A brief history of Alice & Bob, cryptography’s first couple / Boing Boing – Boing Boing

Alice and Bob are the hypothetical communicants in every cryptographic example or explainer, two people trying to talk with one another without being thwarted or overheard by Eve, Mallory and their legion of nefarious friends.

Alice and Bob's first known appearance was in Rivest, Shamir, and Adleman's 1978 Communications in the ACM paper, A Method for Obtaining Digital Signatures and Public-key Cryptosystems." Since then, they have enjoyed many adventures.

The potted history of Alice and Bob at Cryptocouple is a delightful way to explore the history of crypto and the way we think about secrecy and privacy.

Alice and Bob are the worlds most famous cryptographic couple. Since their invention in 1978, they have at once been called inseparable, and have been the subject of numerous divorces, travels, and torments. In the ensuing years, other characters have joined their cryptographic family. Theres Eve, the passive and submissive eavesdropper, Mallory the malicious attacker, and Trent, trusted by all, just to name a few.

While Alice, Bob, and their extended family were originally used to explain how public key cryptography works, they have since become widely used across other science and engineering domains. Their influence continues to grow outside of academia as well: Alice and Bob are now a part of geek lore, and subject to narratives and visual depictions that combine pedagogy with in-jokes, often reflecting of the sexist and heteronormative environments in which they were born and continue to be used. More than just the worlds most famous cryptographic couple, Alice and Bob have become an archetype of digital exchange, and a lens through which to view broader digital culture.

Alice & Bob A History of The Worlds Most Famous Cryptographic Couple [Cryptocouple]

The Awakening by Henry Mayer is considered one of the finest pieces of political art of the 20th-century and is often mentioned as the most beautiful of the suffrage maps. American women earned the vote from west to east before the right became federal law.

From Business Insider; mostly unappetizing. Pictured here is the 17th century watermelon, as cropped from Giovanni Stanchis c. 1650s painting. They look rough, but would have tasted great. The watermelon originally came from Africa, but after domestication it thrived in hot climates in the Middle East and southern Europe. It probably became common in European []

Sasha Trubetskoy always makes great maps, like this cool imagining of the Roman Empire road system in the style of a public transit system.

Although fully autonomous vehicles arent yet allowed on public streets, they are poised to dominate the roads in the not-too-distant future. But before that happens, Apple, Google, Uber, and other companies now investing in self-driving tech are going to need talented developers that can account for the dizzying array of factors at play when a []

The PiCar-V learning kit comes with everything you need to build a Python-powered robot, and its currently being offered in the Boing Boing Store.

New business ideas are a dime a dozen; everyone and their cousin has a concept for a new app or service that may or may not revolutionize a small slice of the world. Whether its novel ways of ordering food, or time savers that only apathetic wealthy people would pay for, coming up with your []

View post:
A brief history of Alice & Bob, cryptography's first couple / Boing Boing - Boing Boing

Global Quantum Cryptography Strategic Business Report 2017 – Major Growth Drivers, Trends & Issues 2016-2024 … – Business Wire (press release)

DUBLIN--(BUSINESS WIRE)--The "Quantum Cryptography - Global Strategic Business Report" report has been added to Research and Markets' offering.

The report provides separate comprehensive analytics for the US, Europe, Asia-Pacific, and Rest of World. Annual estimates and forecasts are provided for the period 2016 through 2024. Market data and analytics are derived from primary and secondary research.

This report analyzes the worldwide markets for Quantum Cryptography in US$ Million. Company profiles are primarily based on public domain information including company URLs.

The report profiles 27 companies including many key and niche players such as:

Key Topics Covered:

1. Industry Overview

2. Major Growth Drivers, Trends & Issues

3. Quantum Computers

4. Cryptography

5. Quantum Cryptography

6. Research/Innovations In Quantum Cryptography

7. Recent Industry Activity

8. Product Launches

9. Focus On Select Global Market Participants

10. Global Market Perspective

For more information about this report visit https://www.researchandmarkets.com/research/b7j2bq/quantum

Read more:
Global Quantum Cryptography Strategic Business Report 2017 - Major Growth Drivers, Trends & Issues 2016-2024 ... - Business Wire (press release)