Page 4,116«..1020..4,1154,1164,1174,118..4,1304,140..»

Quantum computing | MIT News

Researchers integrate diamond-based sensing components onto a chip to enable low-cost, high-performance quantum hardware.

New detection tool could be used to make quantum computers robust against unwanted environmental disturbances.

Observation of the predicted non-Abelian Aharonov-Bohm Effect may offer step toward fault-tolerant quantum computers.

Shining light through household bleach creates fluorescent quantum defects in carbon nanotubes for quantum computing and biomedical imaging.

MITs Senthil Todadri and Xiao-Gang Wen will study highly entangled quantum matter in a collaboration supported by the Simons Foundation.

New dual-cavity design emits more single photons that can carry quantum information at room temperature.

Shor awarded the $150,000 prize, named after a fifth-century B.C. Chinese scientist, for his groundbreaking theoretical work in the field of quantum computation.

MIT researchers find a new way to make nanoscale measurements of fields in more than one dimension.

Efficient chip enables low-power devices to run todays toughest quantum encryption schemes.

The prestigious awards are supporting five innovative projects that challenge established norms and have the potential to be world-changing.

Approach developed by MIT engineers surmounts longstanding problem of light scattering within biological tissue and other complex materials.

William Oliver says a lack of available quantum scientists and engineers may be an inhibitor of the technologys growth.

Eleven new professors join the MIT community.

First measurement of its kind could provide stepping stone to practical quantum computing.

MIT researchers have demonstrated that a tungsten ditelluride-based transistor combines two different electronic states of matter.

Professors Daniel Harlow, Aram Harrow, Hong Liu, and Jesse Thaler among the first recipients of new honor for advances in quantum understanding.

PhD student David Layden in the Quantum Engineering Group has a new approach to spatial noise filtering that boosts development of ultra-sensitive quantum sensors.

Scientists find a theoretical optical device may have uses in quantum computing.

New York Times op-ed by MIT president says a national focus on innovation and research is more effective than only playing defense on trade practices.

Math and physics major Shaun Datta wraps up four years of pushing himself beyond his comfort zone by singing a cappella with the MIT Logarhythms.

The rest is here:
Quantum computing | MIT News

Read More..

A.I. Artificial Intelligence (2001) – IMDb

Edit Storyline

In the not-so-far future the polar ice caps have melted and the resulting rise of the ocean waters has drowned all the coastal cities of the world. Withdrawn to the interior of the continents, the human race keeps advancing, reaching the point of creating realistic robots (called mechas) to serve them. One of the mecha-producing companies builds David, an artificial kid which is the first to have real feelings, especially a never-ending love for his "mother", Monica. Monica is the woman who adopted him as a substitute for her real son, who remains in cryo-stasis, stricken by an incurable disease. David is living happily with Monica and her husband, but when their real son returns home after a cure is discovered, his life changes dramatically. Written byChris Makrozahopoulos

Budget:$100,000,000 (estimated)

Opening Weekend USA: $29,352,630,1 July 2001

Gross USA: $78,616,689

Cumulative Worldwide Gross: $235,926,552

Runtime: 146 min

Aspect Ratio: 1.85 : 1

Original post:

A.I. Artificial Intelligence (2001) - IMDb

Read More..

What is cloud services? – Definition from WhatIs.com

The term cloud services is a broad category that encompasses the myriad IT resources provided over the internet. The expression may also be used to describe professional services that support the selection, deployment and ongoing management of various cloud-based resources.

The first sense of cloud services covers a wide range of resources that a service provider delivers to customers via the internet, which, in this context, has broadly become known as the cloud. Characteristics of cloud services include self-provisioning and elasticity; that is, customers can provision services on an on-demand basis and shut them down when no longer necessary. In addition, customers typically subscribe to cloud services, under a monthly billing arrangement, for example, rather than pay for software licenses and supporting server and network infrastructure upfront. In many transactions, this approach makes a cloud-based technology an operational expense, rather than a capital expense. From a management standpoint, cloud-based technology lets organizations access software, storage, compute and other IT infrastructure elements without the burden of maintaining and upgrading them.

The usage of cloud services has become closely associated with common cloud offerings, such as software as a service (SaaS), platform as a service (PaaS) and infrastructure as a service (IaaS).

SaaS is a software distribution model in which applications are hosted by a vendor or service provider and made available to customers over a network, typically the internet. Examples include G Suite -- formerly Google Apps -- Microsoft Office 365, Salesforce and Workday.

PaaS refers to the delivery of operating systems and associated services over the internet without downloads or installation. The approach lets customers create and deploy applications without having to invest in the underlying infrastructure. Examples include Amazon Web Services' Elastic Beanstalk, Microsoft Azure -- which refers to its PaaS offering as Cloud Services -- and Salesforce's App Cloud.

IaaS involves outsourcing the equipment used to support operations, including storage, hardware, servers and networking components, all of which are made accessible over a network. Examples include Amazon Web Services, IBM Bluemix and Microsoft Azure. SaaS, PaaS and IaaS are sometimes referred to collectively as theSPI model.

Cloud services that a service provider offers to multiple customers through the internet are referred to as public cloud services. The SaaS, PaaS and IaaS providers noted above may all be said to be providing public cloud-based services.

Private cloud services, in contrast, are not made generally available to individual or corporate users or subscribers. Private cloud-based services use technologies and approaches associated with public clouds, such as virtualization and self-service. But private cloud services run on an organization's own infrastructure and are dedicated to internal users, rather than multiple, external customers.

The second sense of cloud services involves professional services that enable customers to deploy the various types of cloud services. Consulting firms, systems integrators and other channel partners may offer such services to help their clients adopt cloud-based technology.

In this context, cloud services might include any or all of the following offerings: cloud-readiness assessment, application rationalization, migration, deployment, customization, private and public cloud integration -- hybrid clouds -- and ongoing management. Companies specializing in cloud services have become an attractive acquisition target for large IT services providers -- Accenture, IBM and Wipro, for instance -- that seek expertise in cloud consulting and deployment.

Cloud services are sometimes deemed synonymous with web services. The two fields, although related, are not identical. A web service provides a way for applications or computers to communicate with each over the World Wide Web. So, web services are generally associated with machine-to-machine communications, while cloud services are generally associated with scenarios in which individuals or corporate customers consume the service -- users accessing office productivity tools via a SaaS-based application, for example.

Some web services, however, may be closely intertwined with cloud services and their delivery to individuals and organizations. Cloud services, for instance, often use RESTful web services, which are based on representational state transfer (REST) technology. REST is viewed as providing open and well-defined interfaces for application and infrastructure services.

See also: XaaS (anything as a service)

The rest is here:
What is cloud services? - Definition from WhatIs.com

Read More..

What is cloud server? – Definition from WhatIs.com

A cloud server is a hosted, and typically virtual, compute server that is accessed by users over a network. Cloud servers are intended to provide the same functions, support the same operating systems (OSes) and applications, and offer performance characteristics similar to traditional physical servers that run in a local data center. Cloud servers are often referred to as virtual servers, virtual private servers or virtual platforms.

An enterprise can choose from several types of cloud servers. Three primary models include:

Public cloud servers: The most common expression of a cloud server is a virtual machine (VM) -- or compute "instance" -- that a public cloud provider hosts on its own infrastructure, and delivers to users across the internet using a web-based interface or console. This model is broadly known as infrastructure as a service (IaaS). Common examples of cloud servers include Amazon Elastic Compute Cloud instances, Azure instances and Google Compute Engine instances.

Private cloud servers: A cloud server may also be a compute instance within an on-premises private cloud. In this case, an enterprise delivers the cloud server to internal users across a local area network, and, in some cases, also to external users across the internet. The primary difference between a hosted public cloud server and a private cloud server is that the latter exists within an organization's own infrastructure, where a public cloud server is owned and operated outside of the organization.

Dedicated cloud servers: In addition to virtual cloud servers, cloud providers can also supply physical cloud servers, also known as bare-metal servers, which essentially dedicate a cloud provider's physical server to a user. These dedicated cloud servers also called dedicated instances -- are typically used when an organization must deploy a custom virtualization layer, or mitigate the performance and security concerns that often accompany a multi-tenant cloud server.

Cloud servers are available in a wide array of compute options, with varying amounts of processors and memory resources. This enables a user to select an instance type that best fits the needs of a specific workload. For example, a smaller Amazon EC2 instance might offer one virtual CPU and 2 GB of memory, while a larger Amazon EC2 instance provides 96 virtual CPUs and 384 GB of memory. In addition, it is possible to find cloud server instances that are tailored to unique workload requirements, such as compute-optimized instances that include more processors relative to the amount of memory.

While it's common for traditional physical servers to include some storage, most public cloud servers do not include storage resources. Instead, cloud providers typically offer storage as a separate cloud service, such as Amazon Simple Storage Service and Google Cloud Storage. A user provisions and associates storage instances with cloud servers to hold content, such as VM images and application data.

The choice to use a cloud server will depend on the needs of the organization and its specific application and workload requirements. Some potential benefits and drawbacks include:

Ease of use: One of the biggest benefits of cloud servers is that a user can provision them in a matter of minutes. With a public cloud server, an organization does not need to worry about server installation, maintenance or other tasks that come with ownership of a physical server.

Globalization: Public cloud servers can "globalize" workloads. With a traditional centralized data center, users can still access workloads globally, but network latency and disruptions can reduce performance for geographically distant users. By hosting duplicate instances of a workload in different global regions, users can benefit from faster and often more reliable access.

Cost: Public cloud servers follow a pay-as-you-go pricing model. Compared to a traditional physical server, this can save an organization money, particularly for workloads that only need to run temporarily or are used infrequently. Cloud servers are often used in such temporary use cases, such as software development and testing, as well as where high scalability is important. However, depending on the amount of use, the long-term and full-time cost of cloud servers can become more expensive than owning the server outright. In addition, regulatory obligations and corporate governance standards may prohibit organizations from using cloud servers and storing data in different geographic regions.

Performance: Because cloud severs are typically multi-tenant environments, and a user has no direct control over those servers' physical location, a VM may be adversely impacted by excessive storage or network demands of other cloud servers on the same hardware. This is often referred to as the "noisy neighbor" issue. Dedicated or bare-metal cloud servers can help a user avoid this problem.

Outages and resilience: Cloud servers are subject to periodic and unpredictable service outages, usually due to a fault within the provider's environment or an unexpected network disruption. For this reason, and because a user has no control over a cloud provider's infrastructure, some organizations choose to keep mission-critical workloads within their local data center rather than the public cloud. Also, there is no inherent high availability or redundancy in public clouds. Users that require greater availability for a workload must deliberately architect that availability into the workload.

Continued here:
What is cloud server? - Definition from WhatIs.com

Read More..

Cloud Hosting | Unlimited Cloud Hosting UK with SSD and …

Who is the the best cloud hosting provider? That's a question that can be extremely tricky to answer these days, with most web hosts offering seemingly similar packages with almost identical specifications. Many hosts can overpromise and underdeliver especially when it comes to providing quality support (and let's be honest this is where most hosting companies fail).

So, who is the best? It really comes down to reputation, plus your own personal experience with a company; does your website load fast and is it deployed within a stable environment with little to no downtime? Is your hosting platform supported should issues arise with your website and are they answered in a fast, polite manner that leads to a swift resolution?

These questions and more are at the forefront of our ethos and we understand what a person's needs when it comes to web hosting (we're people too, not machines)! We want to provide the best hosting experience for our clients; with the fastest speeds, bullet-proof security and round-the-clock support for our clients.

Here's some points that we feel make us one the best web hosting providers:

100% UK based, personable and intelligent support personnel are ready and on-hand to deliver swift resolutions to your issues via Live Chat support ticket system and telephone.

Since our inception in 2003 we wanted to create a hosting company that stands out from the rest, the hidden gem of the hosting industry. We now proudly host over 27,569 clients and receive consistent 5-star reviews from our clients and how they enjoy the service and support we provide and consider us the best host for their WordPress website in 2019.

Read the original post:
Cloud Hosting | Unlimited Cloud Hosting UK with SSD and ...

Read More..

The 5 Best Cloud Hosting Providers: Service On Cloud Nine …

If some of these terms sound like a load of techie jargon to you, dont worry. Below, well run through what they mean, and why theyre important:

Random-access Memory (RAM) is a kind of digital brainpower. It provides the data storage necessary for computers to complete tasks. The more RAM your site has, the more work it can handle. For most websites, a gigabyte (GB) or two ought to have you covered.

Computer Processing Units (CPUs) are the cores of your server. They act as the brain, processing information. Naturally, the more you have, the more efficient your site becomes.

Bandwidth is the amount of data that can flow between servers (i.e. your site), the internet, and users. Bandwidth dictates how much information can travel along its connections, as well as how quickly. Hosting with good bandwidth allows your site to cope with high traffic.

Root Access gives you the ability to customize your servers environment. You can install specialist software, such as extra security, and make changes to hardware settings. This adds an extra layer of flexibility to your hosting and gives you greater control.

Uptime literally refers to the amount of time your website is up online. Its impossible to achieve 100% uptime, but the aim is to get as near to that as possible. After all, if your site goes down, no one can access it.

Read the original post:
The 5 Best Cloud Hosting Providers: Service On Cloud Nine ...

Read More..

How Do Quantum Computers Work? – sciencealert.com

Quantum computers perform calculations based on the probability of an object's state before it is measured - instead of just 1s or 0s - which means they have the potential to process exponentially more data compared to classical computers.

Classical computers carry out logical operations using the definite position of a physical state. These are usually binary, meaning its operations are based on one of two positions. A single state - such as on or off, up or down, 1 or 0 - is called a bit.

In quantum computing, operations instead use the quantum state of an object to produce what's known as a qubit. These states are the undefined properties of an object before they've been detected, such as the spin of an electron or the polarisation of a photon.

Rather than having a clear position, unmeasured quantum states occur in a mixed 'superposition', not unlike a coin spinning through the air before it lands in your hand.

These superpositions can be entangled with those of other objects, meaning their final outcomes will be mathematically related even if we don't know yet what they are.

The complex mathematics behind these unsettled states of entangled 'spinning coins' can be plugged into special algorithms to make short work of problems that would take a classical computer a long time to work out... if they could ever calculate them at all.

Such algorithms would be useful in solving complex mathematical problems, producing hard-to-break security codes, or predicting multiple particle interactions in chemical reactions.

Building a functional quantum computer requires holding an object in a superposition state long enough to carry out various processes on them.

Unfortunately, once a superposition meets with materials that are part of a measured system, it loses its in-between state in what's known as decoherence and becomes a boring old classical bit.

Devices need to be able to shield quantum states from decoherence, while still making them easy to read.

Different processes are tackling this challenge from different angles, whether it's to use more robust quantum processes or to find better ways to check for errors.

For the time being, classical technology can manage any task thrown at a quantum computer. Quantum supremacy describes the ability of a quantum computer to outperform their classical counterparts.

Some companies, such as IBM and Google, claim we might be close, as they continue to cram more qubits together and build more accurate devices.

Not everybody is convinced that quantum computers are worth the effort. Some mathematicians believe there are obstacles that are practically impossible to overcome, putting quantum computing forever out of reach.

Time will tell who is right.

See the article here:
How Do Quantum Computers Work? - sciencealert.com

Read More..

What is Quantum Computing? – Definition from Techopedia

A traditional computer works on bits of data that are binary, or Boolean, with only two possible values: 0 or 1. In contrast, a quantum bit, or "qubit," has possible values of 1, 0 or a superposition of 1 and 0, in the case of an unknown value. According to scientists, qubits are based on physical atoms and molecular structures. However, many find it helpful to theorize a qubit as a binary data unit with superposition.

The use of qubits makes the practical quantum computer model quite difficult. Traditional hardware requires altering to read and use these unknown values. Another idea, known as entanglement, uses quantum theory to suggest that accurate values cannot be obtained in the ways that traditional computers read binary bits. It also has been suggested that a quantum computer is based on a non-deterministic model, where the computer has more than one possible outcome for any given case or situation. Each of these ideas provides a foundation for the theory of actual quantum computing, which is still problematic in todays tech world.

Visit link:
What is Quantum Computing? - Definition from Techopedia

Read More..

How to Set Up BitLocker Encryption on Windows

BitLocker is a tool built into Windows that lets you encrypt an entire hard drive for enhanced security. Heres how to set it up.

When TrueCrypt controversially closed up shop, they recommended their users transition away from TrueCrypt to using BitLocker or Veracrypt. BitLocker has been around in Windows long enough to be considered mature, and is anencryption product generally well-regarded by security pros. In this article, were going to talk about how you can set it up on your PC.

RELATED: Should You Upgrade to the Professional Edition of Windows 10?

Note: BitLocker Drive Encryption and BitLocker To Go require a Professional or Enterprise edition of Windows 8 or 10, or the Ultimate version of Windows 7. However, starting with Windows 8.1, the Home and Pro editions of Windows include a Device Encryption feature(a feature also included in Windows 10) that works similarly. We recommend Device Encryption if your computer supports it, BitLocker for Pro users who cant use Device Encryption, and VeraCrypt for people using a Home version of Windows where Device Encryption wont work.

Many guides out there talk about creating a BitLocker container that works much like the kind of encrypted container you can create with products like TrueCrypt or Veracrypt. Its a bit of a misnomer, but you can achieve a similar effect. BitLocker works by encrypting entire drives. That could be your system drive, a different physical drive, or a virtual hard drive (VHD) that exists as a file and is mounted in Windows.

RELATED: How to Create an Encrypted Container File With BitLocker on Windows

The difference is largely semantic. In other encryption products, you usually create an encrypted container, and then mount it as a drive in Windows when you need to use it. With BitLocker, you create a virtual hard drive, and then encrypt it. If youd like to use a container rather than, say, encrypt your existing system or storage drive, check out our guide to creating an encrypted container file with BitLocker.

For this article, were going to concentrate on enabling BitLocker for an existing physical drive.

RELATED: How to Use BitLocker Without a Trusted Platform Module (TPM)

To use BitLocker for a drive, all you really have to do is enable it, choose an unlock methodpassword, PIN, and so onand then set a few other options. Before we get into that, however, you should know that using BitLockers full-disk encryption on a system drive generally requires a computer with a Trusted Platform Module (TPM) on your PCs motherboard. This chip generates and store the encryption keys that BitLocker uses. If your PC doesnt have a TPM, you can use Group Policy to enable using BitLocker without a TPM. Its a bit less secure, but still more secure than not using encryption at all.

You can encrypt a non-system drive or removable drive without TPM and without having to enable the Group Policy setting.

On that note, you should also know that there are two types of BitLocker drive encryption you can enable:

In Windows 7 through 10, you really dont have to worry about making the selection yourself. Windows handles things behind the scenes, and the interface youll use to enable BitLocker doesnt look any different. If you end up unlocking an encrypted drive on Windows XP or Vista, youll see the BitLocker to Go branding, so we figured you should at least know about it.

So, with that out of the way, lets go over how this actually works.

The easiest way to enable BitLocker for a drive is to right-click the drive in a File Explorer window, and then choose the Turn on BitLocker command. If you dont see this option on your context menu, then you likely dont have a Pro or Enterprise edition of Windows and youll need to seek another encryption solution.

Its just that simple. The wizard that pops up walks you through selecting several options, which weve broken down into the sections that follow.

The first screen youll see in the BitLocker Drive Encryption wizard lets you choose how to unlock your drive. You can select several different ways of unlocking the drive.

If youre encrypting your system drive on a computer thatdoesnt have a TPM, you can unlock the drive with a password or a USB drive that functions as a key. Select your unlock method and follow the instructions for that method (enter a password or plug in your USB drive).

RELATED: How to Enable a Pre-Boot BitLocker PIN on Windows

If your computer does have a TPM, youll see additional options for unlocking your system drive. For example, you can configure automatic unlocking at startup (where your computer grabs the encryption keys from the TPM and automatically decrypts the drive). You could alsouse a PIN instead of a password, or even choose biometric options like a fingerprint.

If youre encrypting a non-system drive or removable drive, youll see only two options (whether you have a TPM or not). You can unlock the drive with a password or a smart card (or both).

BitLocker provides you with a recovery key that you can use to access your encrypted files should you ever lose your main keyfor example, if you forget your password or if the PC with TPM dies and you have to access the drive from another system.

You can save the key to your Microsoft account, a USB drive, a file, or even print it. These options are the same whether youre encrypting a system or non-system drive.

If you back up the recovery key to your Microsoft account, you can access the key later at https://onedrive.live.com/recoverykey. If you use another recovery method, be sure to keep this key safeif someone gains access to it, they could decrypt your drive and bypass encryption.

You can also back up your recovery key multiple ways if you want. Just click each option you want to use in turn, and then follow the directions. When youre done saving your recovery keys, click Next to move on.

Note: If youre encrypting a USB or other removable drive, you wont have the option of saving your recovery key to a USB drive. You can use any of the other three options.

BitLocker automatically encrypts new files as you add them, but you must choose what happens with the files currently on your drive. You can encrypt the entire driveincluding the free spaceor just encrypt the used disk files to speed up the process. These options are also the same whetheryoure encrypting a system or non-system drive.

RELATED: How to Recover a Deleted File: The Ultimate Guide

If youre setting up BitLocker on a new PC, encrypt the used disk space onlyits much faster. If youre setting BitLocker up on a PC youve been using for a while, you should encrypt the entire drive to ensure no one can recover deleted files.

When youve made your selection, click the Next button.

If youre using Windows 10, youll see an additional screen letting you choose an encryption method. If youre using Windows 7 or 8, skip ahead to the next step.

Windows 10 introduced a new encryption method named XTS-AES. It provides enhanced integrity and performance over the AES used in Windows 7 and 8. If you know the drive youre encrypting is only going to be used on Windows 10 PCs, go ahead and choose the New encryption mode option. If you think you might need to use the drive with an older version of Windows at some point (especially important if its a removable drive), choose the Compatible mode option.

Whichever option you choose (and again, these are the same for system and non-system drives), go ahead and click the Next button when youre done, and on the next screen, click the Start Encrypting button.

The encryption process can take anywhere from seconds to minutes or even longer, depending on the size of the drive, the amount of data youre encrypting, and whether you chose to encrypt free space.

If youre encrypting your system drive, youll be prompted to run a BitLocker system check and restart your system. Make sure the option is selected, click the Continue button, and then restart your PC when asked.After the PC boots back up for the first time, Windows encrypts the drive.

If youre encrypting a non-system or removable drive, Windows does not need to restart and encryption begins immediately.

Whatever type of drive youre encrypting, you can check the BitLocker Drive Encryption icon in the system tray to see its progress, and you can continue using your computer while drives are being encryptedit will just perform more slowly.

If your system drive is encrypted, unlocking it depends on the method you chose (and whether your PC has a TPM). If you do have a TPM and elected to have the drive unlocked automatically, you wont notice anything differentyoull just boot straight into Windows like always. If you chose another unlock method, Windows prompts you to unlock the drive (by typing your password, connecting your USB drive, or whatever).

RELATED: How to Recover Your Files From a BitLocker-Encrypted Drive

And if youve lost (or forgotten) your unlock method, press Escape on the prompt screen to enter your recovery key.

If youve encrypted a non-system or removable drive, Windows prompts you to unlock the drive when you first access it after starting Windows (or when you connect it to your PC if its a removable drive). Type your password or insert your smart card, and the drive should unlock so you can use it.

In File Explorer, encrypted drives show a gold lock on the icon (on the left). That lock changes to gray and appears unlocked when you unlock the drive (on the right).

You can manage a locked drivechange the password, turn off BitLocker, back up your recovery key, or perform other actionsfrom the BitLocker control panel window. Right-click any encrypted drive, and then select Manage BitLocker to go directly to that page.

Like all encryption, BitLocker does add some overhead. Microsofts official BitLocker FAQ says that Generally it imposes a single-digit percentage performance overhead. If encryption is important to you because you have sensitive datafor example, a laptop full of business documentsthe enhanced security is well worth the performance trade-off.

Read more:
How to Set Up BitLocker Encryption on Windows

Read More..

Encryption: What It Is, and How It Works for You | Tom’s Guide

Encryption refers to any process used to make sensitive data more secure and less likely to be intercepted by those unauthorized to view it.

There are several modern types of encryption used to protect sensitive electronic data, such as emails, files, folders and entire drives. It's very important to understand what kinds of encryption are most important for a particular need, and to not be lulled into a false sense of security by fancy-sounding process names.

There are many encryption programs that provide excellent security for very little money sometimes even for free.

For example, consider the folder-encryption options available to users of the Microsoft Windows operating system. Microsoft's encryption is generally strong, meaning that most users won't have to seek out additional methods of protecting their sensitive financial data, medical records and other sensitive files.

MORE: 17 Security and Privacy Apps and Plugins

Or, if you're worried about Microsoft's alleged relationship with the U.S. National Security Agency, try TrueCrypt, an open-source, free-to-use software solution.

The most dangerous pitfall of folder encryption is that there may be temporary versions of the sensitive files that are not encrypted.

Consider this: Most computer users regularly save their work to avoid catastrophic data loss due to a power outage, electrical storm or other unexpected event. Each time the user saves a file in progress, a temporary version of that file is created and stored in the aptly named "temp" folder, where it remains unencrypted.

Simply deleting temp files isn't enough protection, either. Someone who wants to access your data badly enough will likely be able to access those files using free or cheap data-recovery software.

All encryption techniques have weak spots. As these weaknesses are revealed and exploited, new methods of encrypting data are developed to provide additional layers of security for users.

One of the most common and bothersome weaknesses occurs when an encryption method, also called a cipher or an algorithm, that's supposed to generate seemingly random strings of gibberish instead produces outputs that have a discernible pattern. If the pattern gets noticed by interlopers, it may help them crack the encrypted data.

A similar issue involves encryption algorithms that generate predictable patterns of characters in response to repetitious, predictable input.

MORE: Email Encryption: Worth the Trouble?

If this problem is extensive enough, it can help digital intruders decipher at least part of the encrypted data, which may include financial information, government documents or other sensitive information. In many cases, even a partial data breach can be devastating.

Individuals and organizations that want to add protection to their encryption algorithms often insert extra lines of code to alter the outputs -- a practice known as "salting."

For example, one of the most common passwords used is simply "password." Malicious hackers know what "password" and other common passwords look like after they're run though common encryption algorithms.

But if an organization adds extra characters to each password during the encryption process, such as "password" plus "safe," the output will be something malicious hackers won't recognize as long as the extra characters are kept secret.

Encryption can also be used to verify the integrity of a file or piece of software. The raw binary data of a file or application is run through a special encryption algorithm to produce a "hash," a long number unique to that file.

Any alteration to the file, such as by a hacker inserting malicious code or by random data corruption, will produce a different hash. Computers and mobile devices compare a new piece of software's stated hash to its actual one before installing the software.

A similar process involves running a piece of software through a simple algorithm that produces a single short number, a "checksum." Altering the software in any way will likely produce a different checksum.

To guard against random, accidental corruption, many pieces of software include protection in the form of self-diagnostic checksum matches that the software performs each time it's launched.

Data encryption is important for everyone, not just big corporations and government officials. The topic can be intimidating for those without extensive computer experience, but thankfully, for most users, keeping sensitive data safe is a relatively straightforward process.

The key is to start early and regularly verify the effectiveness of the chosen security measures.

Follow us@tomsguide, onFacebookand onGoogle+.

Follow this link:
Encryption: What It Is, and How It Works for You | Tom's Guide

Read More..