Technology - RollWiki

Technology

Articles in this category

Artificial intelligence

Artificial intelligence (AI) empowers computational systems to perform tasks traditionally requiring human intelligence, such as learning, reasoning, and problem-solving. Established as an academic discipline in 1956, AI's history saw cycles of optimism and "AI winters" before a significant resurgence after 201...

Fifth Generation Computer Systems

The Fifth Generation Computer Systems (FGCS) was a landmark 10-year research initiative launched in 1982 by Japan's Ministry of International Trade and Industry (MITI). Its ambitious goal was to develop computers based on massively parallel computing and logic programming, envisioning an "epoch-making computer" with su...

Symposium on Logic in Computer Science

The ACM–IEEE Symposium on Logic in Computer Science (LICS) is a prominent annual academic conference exploring the intersection of computer science and mathematical logic. Originally sponsored solely by the IEEE, it became the flagship conference for the ACM Special Interest Group on Logic and Computation (SIGLOG) in 2014, now enjoying...

Computer vision

Computer vision is an interdisciplinary field that empowers computers to "understand" digital images and videos, essentially automating tasks performed by the human visual system. Its core purpose is to transform visual input into meaningful descriptions of the world, enabling intelligent thought processes and appropriate actions.

...
International Council on Nanotechnology

The International Council on Nanotechnology (ICON) is a global, multi-stakeholder organization established in 2004 with the mission to develop and communicate information about the potential environmental and health risks of nanotechnology, aiming to foster risk reduction while maximizing societal benefits. Founded as an extension of t...

Software asset management

Software Asset Management (SAM) is a crucial business practice focused on optimizing an organization's software assets throughout their entire lifecycle, from purchase to disposal. Its core purpose is to significantly reduce IT costs and mitigate business and legal risks associated with software ownership and usage, while simultaneousl...

Ancient Qumran: A Virtual Reality Tour

Ancient Qumran: A Virtual Reality Tour is a computer-generated film and virtual model offering a theoretical reconstruction of the ancient Khirbet Qumran site, renowned for its connection to the Dead Sea Scrolls. Authored by UCLA scholars Robert Cargill and William Schniedewind, the project aimed to vividly il...

Cybersecurity Information Sharing Act

The Cybersecurity Information Sharing Act (CISA), a U.S. federal law, was enacted on December 18, 2015, by President Barack Obama, aiming to improve national cybersecurity through enhanced information sharing. Introduced in July 2014 and passed by the Senate in October 2015, the law allows technology and manufacturing ...

Automated machine learning

Automated machine learning (AutoML) is an AI-based solution designed to streamline the entire process of applying machine learning to real-world problems. By automating tasks from raw data ingestion to model deployment, AutoML aims to make sophisticated machine learning accessible to non-experts. This approach simplifi...

40-bit encryption

Here's a comprehensive summary of the article on 40-bit encryption:

40-bit encryption refers to a symmetric key size of forty bits, or 2^40 possible keys, which offered a very low and now completely broken level of security. This limited key length made it highly vulnerable to brute-force attacks; for instance, the Electronic Fr...

Privacy and blockchain

A blockchain is an immutable, shared digital ledger that securely records transactions in chronological "blocks" after they are validated and cryptographically verified by a network of participants. This decentralized system rose to prominence with the creation of Bitcoin in 2008 by Satoshi Nak...

Hardware security

Hardware security is a vital discipline stemming from cryptographic engineering, focused on securing hardware design, ensuring code authenticity, secure key storage, and maintaining a secure supply chain for products. A cornerstone of this field is the Hardware Security Module (HSM), a physical device that safeguards a...