Bookmarks for December 14th from 10:28 to 10:34

These are my links for December 14th from 10:28 to 10:34:

  • [quant-ph/0204088] The Wave Function: It or Bit? – Schroedinger's wave function shows many aspects of a state of incomplete knowledge or information ("bit"): (1) it is usually defined on a space of classical configurations, (2) its generic entanglement is, therefore, analogous to statistical correlations, and (3) it determines probabilities of measurement outcomes. Nonetheless, quantum superpositions (such as represented by a wave function) define individual physical states ("it"). This conceptual dilemma may have its origin in the conventional operational foundation of physical concepts, successful in classical physics, but inappropriate in quantum theory because of the existence of mutually exclusive operations (used for the definition of concepts). In contrast, a hypothetical realism, based on concepts that are justified only by their universal and consistent applicability, favors the wave function as a description of (thus nonlocal) physical reality. The (conceptually local) classical world then appears as an illusion…
  • 9 Ways to Visualize Proportions – A Guide | FlowingData – With all the visualization options out there, it can be hard to figure out what graph or chart suits your data best. This is a guide to make your decision easier for one particular type of data: proportions.
  • Computer Laboratory – Technical reports: UCAM-CL-TR-754 – The success of many attacks on computer systems can be traced back to the security engineers not understanding the psychology of the system users they meant to protect. We examine a variety of scams and “short cons” that were investigated, documented and recreated for the BBC TV programme The Real Hustle and we extract from them some general principles about the recurring behavioural patterns of victims that hustlers have learnt to exploit.

    We argue that an understanding of these inherent “human factors” vulnerabilities, and the necessity to take them into account during design rather than naïvely shifting the blame onto the “gullible users”, is a fundamental paradigm shift for the security engineer which, if adopted, will lead to stronger and more resilient systems security.

  • Memristor – Wikipedia, the free encyclopedia – On April 30, 2008 a team at HP Labs announced the development of a switching memristor. Based on a thin film of titanium dioxide, it has a regime of operation with an approximately linear charge-resistance relationship.[5][6][7] These devices are being developed for application in nanoelectronic memories, computer logic, and neuromorphic computer architectures.

Leave a comment

Your email address will not be published.