As the name suggests, it is technically not a virus because it doesn’t perform all the tasks that a computer virus is intended to perform. Thus, this pseudo virus has an advantage over the ordinary viruses i.e. it cannot be detected by an antivirus software. However it does demonstrate the power of C by [...]
Archive for February, 2010
New York Times (02/11/10) LaFraniere, Sharon; Ansfield, Jonathan; Markoff, John; et al.
China is increasingly worried about threats to its security and political stability posed by the Internet. Both Chinese and U.S. political analysts and technology experts say China’s attempts to tightly control the Internet are partly fueled by the conviction that the West is trying [...]
Princeton University (02/05/10) MacPherson, Kitta
Princeton University professor Jason Petta has developed a technique that can control the properties of a lone electron, a feat that is essential to the development of quantum computers with near-limitless capabilities. Petta’s method achieves control of single electrons extremely rapidly, in one-billionth of a second, another feature that is [...]
Using data structures like array is a common solution to the problem of storing similar data types. However, the ordering of the items in as array is implicit. Hence we cant use an array to explicitly order the group of items. In such a case a linked list is used.
The code of the most [...]
MIT News (02/09/10) Hardesty, Larry
Communications networks’ efficiency could be upgraded with a new network coding approach co-developed by researchers at the Massachusetts Institute of Technology (MIT). Network coding is a scheme in which a router mathematically combines data packets into new, hybrid packets rather than handing them off to the next router. The researchers determined [...]