(Roughly) Daily

Posts Tagged ‘IBM

“We couldn’t build quantum computers unless the universe were quantum and computing… We’re hacking into the universe.”*…

… in the process of which, as Ben Brubaker explains, we learn some fascinating things…

If you want to tile a bathroom floor, square tiles are the simplest option — they fit together without any gaps in a grid pattern that can continue indefinitely. That square grid has a property shared by many other tilings: Shift the whole grid over by a fixed amount, and the resulting pattern is indistinguishable from the original. But to many mathematicians, such “periodic” tilings are boring. If you’ve seen one small patch, you’ve seen it all.

In the 1960s, mathematicians began to study “aperiodic” tile sets with far richer behavior. Perhaps the most famous is a pair of diamond-shaped tiles discovered in the 1970s by the polymathic physicist and future Nobel laureate Roger Penrose. Copies of these two tiles can form infinitely many different patterns that go on forever, called Penrose tilings. Yet no matter how you arrange the tiles, you’ll never get a periodic repeating pattern.

“These are tilings that shouldn’t really exist,” said Nikolas Breuckmann, a physicist at the University of Bristol.

For over half a century, aperiodic tilings have fascinated mathematicians, hobbyists and researchers in many other fields. Now, two physicists have discovered a connection between aperiodic tilings and a seemingly unrelated branch of computer science: the study of how future quantum computers can encode information to shield it from errors. In a paper posted to the preprint server arxiv.org in November, the researchers showed how to transform Penrose tilings into an entirely new type of quantum error-correcting code. They also constructed similar codes based on two other kinds of aperiodic tiling.

At the heart of the correspondence is a simple observation: In both aperiodic tilings and quantum error-correcting codes, learning about a small part of a large system reveals nothing about the system as a whole…

Fascinating: “Never-Repeating Tiles Can Safeguard Quantum Information,” from @benbenbrubaker in @QuantaMagazine.

Plus- bonus background on tiling.

* “We couldn’t build quantum computers unless the universe were quantum and computing. We can build such machines because the universe is storing and processing information in the quantum realm. When we build quantum computers, we’re hijacking that underlying computation in order to make it do things we want: little and/or/not calculations. We’re hacking into the universe.” –Seth Lloyd

###

As we care for qubits, we might send carefully-calculated birthday greetings to Herman Hollerith; he was born on this date in 1860. A statistician and inventor, he was a seminal figure in the development of data processing: he invented (for the 1890 U.S. Census) an electromechanical tabulating machine for punched cards to assist in summarizing information (and, later, for use in accounting). His invention of the punched card tabulating machine, which he patented in 1884, marked the beginning of the era of mechanized binary code and semiautomatic data processing systems– and his approach dominated that landscape for nearly a century.

The company that Hollerith founded to exploit his invention was merged in 1911 with several other companies to form the Computing-Tabulating-Recording Company. In 1924, the company was renamed “International Business Machines” (or, as we know it, IBM).

source

“There are two types of encryption: one that will prevent your sister from reading your diary and one that will prevent your government”*…

… But sometimes the encryption you think will work against governments won’t even deter your sister. Joesph Cox on the recently-uncovered vulnerabilities in TETRA, the encryption standard used in radios worldwide…

A group of cybersecurity researchers has uncovered what they believe is an intentional backdoor in encrypted radios used by police, military, and critical infrastructure entities around the world. The backdoor may have existed for decades, potentially exposing a wealth of sensitive information transmitted across them, according to the researchers… The end result, however, are radios with traffic that can be decrypted using consumer hardware like an ordinary laptop in under a minute…

The research is the first public and in-depth analysis of the TErrestrial Trunked RAdio (TETRA) standard in the more than 20 years the standard has existed. Not all users of TETRA-powered radios use the specific encryption algorithim called TEA1 which is impacted by the backdoor. TEA1 is part of the TETRA standard approved for export to other countries. But the researchers also found other, multiple vulnerabilities across TETRA that could allow historical decryption of communications and deanonymization. TETRA-radio users in general include national police forces and emergency services in Europe; military organizations in Africa; and train operators in North America and critical infrastructure providers elsewhere. 

Midnight Blue [presented] their findings at the Black Hat cybersecurity conference in August. The details of the talk have been closely under wraps, with the Black Hat website simply describing the briefing as a “Redacted Telecom Talk.” That reason for secrecy was in large part due to the unusually long disclosure process. Wetzels told Motherboard the team has been disclosing these vulnerabilities to impacted parties so they can be fixed for more than a year and a half. That included an initial meeting with Dutch police in January 2022, a meeting with the intelligence community later that month, and then the main bulk of providing information and mitigations being distributed to stakeholders. NLnet Foundation, an organization which funds “those with ideas to fix the internet,” financed the research.

The European Telecommunications Standards Institute (ETSI), an organization that standardizes technologies across the industry, first created TETRA in 1995. Since then, TETRA has been used in products, including radios, sold by Motorola, Airbus, and more. Crucially, TETRA is not open-source. Instead, it relies on what the researchers describe in their presentation slides as “secret, proprietary cryptography,” meaning it is typically difficult for outside experts to verify how secure the standard really is.

Bart Jacobs, a professor of security, privacy and identity, who did not work on the research itself but says he was briefed on it, said he hopes “this really is the end of closed, proprietary crypto, not based on open, publicly scrutinised standards.”…

The veil, pierced: “Researchers Find ‘Backdoor’ in Encrypted Police and Military Radios,” from @josephfcox in @motherboard. (Not long after this article ran– and after the downfall of Vice, Motherboard’s parent), Cox and a number of his talented Motherboard colleagues launched 404 Media. Check it out.)

Remarkably, some of the radio systems enabling critical infrastructure are even easier to hack– they aren’t even encrypted.

Bruce Schneier (@schneierblog)

###

As we take precautions, we might recall that it was on this date in 1980 that the last IBM 7030 “Stretch” mainframe in active use is decommissioned at Brigham Young University. The first Stretch was was delivered to Los Alamos National Laboratory in 1961, giving the model almost 20 years of operational service.

The Stretch was famous for many things, but perhaps most notably it was the first IBM computer to use transistors instead of vacuum tubes; it was the first computer to be designed with the help of an earlier computer; and it was the world’s fastest computer from 1961 to 1964.

source

“The more beautiful will the piece be by reason of its size”*…

From the annals of animation…

A Boy And His Atom earned the Guinness World Records record for the “World’s Smallest Stop-Motion Film.”…

What you see on screen are individual carbon monoxide molecules moving around. The film was zoomed in 100 million times. The actual plot of the film is about a boy who bounces his atom around and watches it morph into different forms such as clouds and the word “THINK,” which has been IBM’s slogan since 1911…

And as to how it was made…

A Boy And His Atom is the world’s smallest movie,” from @BoingBoing.

* Aristotle, Poetics

###

As we muse on the micro, we might lament that fact that it was on this date in 1944 that the final installment of George Herriman’s comic strip Krazy Kat appeared– exactly two months after Herriman’s death. The strip– aguably the best ever; inarguably foundational to the form– debuted in New York Journal (as the “downstairs” strip in Herriman’s predecessor comic, The Dingbat Family (later, The Family Upstairs).  Krazy, Ignatz, and Offisa Pup stepped out on their own in 1913, and ran until 1944– but never actually succeeded financially.  It was only the admiration (and support) of publisher William Randolph Hearst that kept those bricks aloft.

The final strip

source

“What’s in a name?”*…

Poe’s Law –  “Without a winking smiley or other blatant display of humour, it is impossible to create a parody of fundamentalism that someone won’t mistake for the real thing.”

Cohen’s Law – “Whoever resorts to the argument that ‘whoever resorts to the argument that… …has automatically lost the debate’ has automatically lost the debate.”

Badger’s Law –  “any website with the word “Truth” in the URL has none in the posted content.”

Lewis’ Law – “The comments on any article about feminism justify feminism.”

Time Cube Law –  “As the length of a webpage grows linearly, the likelihood of the author being a lunatic increases exponentially.”

A small selection of entries in “Eponymous Laws Part I: Laws of the Internet,” from @RogersBacon1.

[Image above: source]

* Shakespeare, Romeo and Juliet

###

As we go to school on the laws, we might send carefully-composed birthday greetings to Jean Sammet; she was born on this date in 1928. A pioneer in computing, she left a career as a professor of mathematics at the University of Illinois to join IBM, where she developed the computer programming language FORMAC, an extension to FORTRAN IV that was the first commonly used language for manipulating non-numeric algebraic expressions. She also wrote one of the classic histories of programming languages, Programming Languages: History and Fundamentals.

source

“Patents need inventors more than inventors need patents”*…

 

patent-toiletpaper

 

Patents for invention — temporary monopolies on the use of new technologies — are frequently cited as a key contributor to the British Industrial Revolution. But where did they come from? We typically talk about them as formal institutions, imposed from above by supposedly wise rulers. But their origins, or at least their introduction to England, tell a very different story…

How the 15th century city guilds of Italy paved the way for the creation of patents and intellectual property as we know it: “Age of Invention: The Origin of Patents.”

(Image above: source)

* Kalyan C. Kankanala, Fun IP, Fundamentals of Intellectual Property

###

As we ruminate on rights, we might recall that it was on this date in 1981 that IBM introduced the IBM Personal Computer, commonly known as the IBM PC, the original version of the IBM PC compatible computer design… a relevant descriptor, as the IBM PC was based on open architecture, and third-party suppliers soon developed to provide peripheral devices, expansion cards, software, and ultimately, IBM compatible computers.  While IBM has gone out of the PC business, it had a substantial influence on the market in standardizing a design for personal computers; “IBM compatible” became an important criterion for sales growth.  Only Apple has been able to develop a significant share of the microcomputer market without compatibility with the IBM architecture (and what it has become).

300px-Bundesarchiv_B_145_Bild-F077948-0006,_Jugend-Computerschule_mit_IBM-PC source