Tecnologia da Informática Márcio Francisco Dutra e Campos

Archive for the ‘Eng. Computação’ Category

Information Security by Generation

06.30.2017 · Posted in Eng. Computação

“Cyber attacks are becoming a regular feature of everyday life and it’s more important than ever to be aware of the risks and take steps to protect yourself. But, according to a survey of 1,000 people across the US by password management company LastPass, different age groups have very different attitudes to security.” Leia o artigo ...

Comments Off on Information Security by Generation Tags: ,


02.02.2017 · Posted in Eng. Computação, Eng. Eletrônica

“When I first got interested in computers, it was all but impossible for an individual to own a computer outright. Even a “small” machine cost a fortune not to mention requiring specialized power, cooling, and maintenance. Then there started to be some rumblings of home computers (like the Mark 8 we recently saw a replica ...

Comments Off on ENIAC: THE WAY WE WERE Tags: ,

1981 Radio Shack computer catalog

10.07.2016 · Posted in Art. Diversos, Eng. Computação

Catálogo de computadores da Radio Shack, de 1981. Tinha até tela colorida, gravador k7, etc … só coisas de última geração. http://mashable.com/2015/02/06/radio-shack-catalog-1981/#EhN3kTvcmkqP ...

Comments Off on 1981 Radio Shack computer catalog

Engineering isn’t for everyone

07.25.2016 · Posted in Eng. Computação

“Google recently launched Project Bloks — a “platform” that will enable developers, educators and designers to work together in order to build “physical programming experiences” for children. This actually has the potential to be a great educational tool — but not in the way Google presents it (or at least not in the way it’s being ...

Comments Off on Engineering isn’t for everyone Tags: ,

Assembly Language Keeps Rising

07.06.2016 · Posted in Eng. Computação, Eng. Eletrônica

“Why would anyone write code at such a low level, being far less productive if compared to using any other programming language and being vulnerable to all kinds of programming mistakes?” read TIOBE’s note accompanying the rankings. “The only reasonable explanation for this is that the number of very small devices that are only able ...

Comments Off on Assembly Language Keeps Rising Tags: , ,

Etiquetas RFID

05.05.2016 · Posted in Eng. Computação, Eng. Eletrônica

“A identificação por rádio freqüência (RFID) vem sendo testada desde o início da década de 80 como uma alternativa a outros meios de identificação, como é o caso típico dos códigos de barras e o do QR Code. As grandes vantagens de utilizar rádio frequência para este tipo de identificação são a possibilidade de fazer a ...

Comments Off on Etiquetas RFID Tags: ,

The Malware Museum

02.09.2016 · Posted in Eng. Computação

“The Malware Museum is a collection of malware programs, usually viruses, that were distributed in the 1980s and 1990s on home computers. Once they infected a system, they would sometimes show animation or messages that you had been infected. Through the use of emulations, and additionally removing any destructive routines within the viruses, this collection ...

Comments Off on The Malware Museum Tags:

The future is the Internet of Things

10.30.2015 · Posted in Eng. Computação

“Even before there was a World Wide Web, there was an Internet of Things”. “IoT is about to explode, perhaps literally, if privacy and security issues aren’t fixed”. Leia o artigo em: http://arstechnica.com/unite/2015/10/the-future-is-the-internet-of-things-deal-with-it/ ...

Comments Off on The future is the Internet of Things Tags: ,

Internet Archive

10.23.2015 · Posted in Eng. Computação

“The Internet Archive has been documenting the Web’s evolution since the dawdling days of dial-up — or 1996, to be exact. Anyone wishing to return to the Apple homepage of 1998, or the New York Times of the early 2000s, can simply plug their desired URL into the Wayback Machine, and it takes care of ...

Comments Off on Internet Archive Tags:

How Diffie-Hellman Fails in Practice

10.16.2015 · Posted in Eng. Computação

A troca de chaves é o calcanhar de Aquiles dos mecanismos de criptografia. O Algoritmo de Diffie-Hellman tem sido utilizado há anos para compartilhar chaves secretas e, até então, era tido como um mecanismo “seguro”. Mas, como afirmam os hackers, “não existe rede, algoritmo, protocolo ou aplicação segura”. O NSA que o diga. Leia o artigo ...

Comments Off on How Diffie-Hellman Fails in Practice Tags: , ,