Khalid A. Al-Abbad

15 Added | 3 Magazines | 7 Likes | 3 Following | 1 Follower | @abbadka | Keep up with Khalid A. Al-Abbad on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Khalid A. Al-Abbad”

Demystifying the Bézier Curve

How does a Bézier curve work under the hood? If you design vector graphics for a living — or aspire to do so — you might just want to know such a thing.<p>Bézier curves gained popularity in 1962 from Pierre Bézier, a French engineer who used them for automobile design at Renault. They are widely used …

Hacker Lexicon: What Is Homomorphic Encryption?

TL;DR:<p>Homomorphic encryption is a method of performing calculations on encrypted information without decrypting it first. Why do you care about some …

PayPal exec aims to “obliterate passwords from the face of the planet” | Ars Technica

Forget passwords—let your phone scan your fingerprints or eyes.<p>PayPal's top security official is on a quest to kill passwords.<p>"Our intention is to …

The ultimate Dots strategy guide

Dots, the extremely addictive mobile game that’s something like a delightful mix of Tetris, Connect Four, and a Rubik’s Cube, is the second most popular free iPhone app just a week after launching. It’s been downloaded more than a million times, and at least 38 million games of dots have been …

iPhone 5

Amid a barrage of password breaches, “honeywords” to the rescue | Ars Technica

Decoy passwords would trigger alarms that account credentials are compromised.<p>Security experts have proposed a simple way for websites to better …

Government Lab Admits to Using Quantum Internet for Two Years

This might be the biggest tech humblebrag ever. A team of scientists at Los Alamos National Labs has quietly shrugged its shoulders and admitted to …

LulzSec hackers plead guilty to cyberattack charges

LulzSec, short for Lulz Security, is a hacker collective that has pulled quite a few grand cyberattacks, taking high-profile and big-name websites …

A Different Approach To Foiling Hackers? Let Them In, Then Lie To Them.

Most systems administrators describe the task of network security as something like defending a castle. Kristin Heckman talks about fighting hackers in terms that sound more like a job as a Walmart greeter.<p>“We want to provide these individuals with an enjoyable experience,” she says of the …

One Magic Mile

A simple workout to help chart your progress.<p>Two decades ago, I began using a one-mile time trial workout with my runners to predict potential performances during a training season. Running a timed mile provides a reality check on your current goals, helps you determine a safe long-run pace, and …

Marathons

China’s internet is better than yours

A new paper shines some light on the “next generation internet” China is building—and it’s far ahead of anything any other country has at the moment. The improvements aren’t just superficial faster broadband fluff either. They are deeply important changes to the very backbone of the system.<p>The …

Internet

Damaged undersea internet cable causes widespread global service disruption

A cut to the largest internet cable that connects Europe and Asia caused severe service disruption that stretched from from Africa to Pakistan.<p>Chief …

A Battle-of-the-Sexes Mystery

Does the gap between men and women narrow or widen at longer distances? It depends.<p>There's a long, tired history of claims that women will turn out to be better than men at very long races. "Will women soon outrun men?", an article in <i>Nature</i> asked back in 1992. (Yes they would, by 1998, it …

Body Fat

The 10-Year-Old Security Sink Hole Slowing the Entire Internet, Explained

This article is from the archive of our partner .<p>The largest known hack attack of its kind brought the Internet to a crawl for users all over the …

Experts say Spamhaus attack is first of many to come

Earlier today, we reported on a cyber-battle between two groups that ended up dragging the entire internet along with it. The week-long battle …

Cybersecurity