2,093 research outputs found

    Digital nomads: A new form of leisure class?

    Get PDF
    Digital nomadism refers to a mobile lifestyle in which freelancers, digital entrepreneurs and remote workers combine work with continuous travel. In this chapter, we draw from Veblen’s Theory of the Leisure Class (1899) to explore whether digital nomads can be seen to constitute a new form of leisure class. In particular, this entails problematising digital nomadism through four dimensions, namely differentiation, emulation, visibility and institutionalisation. Drawing from a qualitative analysis of the mainstream promotional discourse underlying digital nomadism, we show the existence of a whole set of economic activities based on selling a dreamed work/lifestyle to others. These commercial propositions, which rely on online storytelling and visibility, constitute efficient means of emulation that contribute to framing images of success. Our ‘Veblen-inspired’ analysis, we contend, generates a source of questions not only relevant to the study of digital nomadism, but also to miscellaneous aspects of the new world of work

    Heralding two- and four-photon path entanglement on chip

    Full text link
    Generating quantum entanglement is not only an important scientific endeavor, but will be essential to realizing quantum-enhanced technologies, in particular, quantum-enhanced measurements with precision beyond classical limits. We investigate the heralded generation of multiphoton entanglement for quantum metrology using a reconfigurable integrated waveguide device in which projective measurement of auxiliary photons heralds the generation of path-entangled states. We use four and six-photon inputs, to analyze the heralding process of two- and four-photon NOON states-a superposition of N photons in two paths, capable of enabling phase supersensitive measurements at the Heisenberg limit. Realistic devices will include imperfections; as part of the heralded state preparation, we demonstrate phase superresolution within our chip with a state that is more robust to photon loss

    Economic Activity, International Intervention, and Transitional Governance: A Comparative Case Study of Somalia

    Get PDF
    This paper investigates the impact of international state-building efforts in Somalia on economic development. We use satellite data on night lights to measure economic activity to deal with nonexistent or poor-quality national income accounts. Using the synthetic control method, we find that the establishment of the Transitional Federal Government in 2004 was associated with economic stagnation relative to the years under statelessness. Using nighttime light emissions, we find economic stagnation regardless of whether we use the total lights emitted from the country or the spread of lights across the country. Our empirical findings are consistent with the idea that the exogenously imposed Transitional Federal Government destabilized the country through an incongruity with the informal institutions that had led to development during Somalia\u27s `statelessness.\u2

    Lattice energy-momentum tensor with Symanzik improved actions

    Get PDF
    We define the energy-momentum tensor on lattice for the λϕ4\lambda \phi^4 and for the nonlinear σ\sigma-model Symanzik tree-improved actions, using Ward identities or an explicit matching procedure. The resulting operators give the correct one loop scale anomaly, and in the case of the sigma model they can have applications in Monte Carlo simulations.Comment: Self extracting archive fil

    Revisiting Security Vulnerabilities in Commercial Password Managers

    Get PDF
    In this work we analyse five popular commercial password managers for security vulnerabilities. Our analysis is twofold. First, we compile a list of previously disclosed vulnerabilities through a comprehensive review of the academic and non-academic sources and test each password manager against all the previously disclosed vulnerabilities. We find a mixed picture of fixed and persisting vulnerabilities. Then we carry out systematic functionality tests on the considered password managers and find four new vulnerabilities. Notably, one of the new vulnerabilities we identified allows a malicious app to impersonate a legitimate app to two out of five widely-used password managers we tested and as a result steal the user's password for the targeted service. We implement a proof-of-concept attack to show the feasibility of this vulnerability in a real-life scenario. Finally, we report and reflect on our experience of responsible disclosure of the newly discovered vulnerabilities to the corresponding password manager vendors

    Passwords and the evolution of imperfect authentication

    Get PDF
    Theory on passwords has lagged practice, where large providers use back-end smarts to survive with imperfect technology.This is the author accepted manuscript. The final version is available from ACM via http://dx.doi.org/10.1145/269939

    The bound state Aharonov-Bohm effect around a cosmic string revisited

    Full text link
    In this article we observe that the self-adjoint extension of the Hamiltonian of a particle moving around a shielded cosmic string gives rise to a gravitational analogue of the bound state Aharonov-Bohm effect.Comment: 2 pages, no figure

    The quest to replace passwords: A framework for comparative evaluation of web authentication schemes

    Get PDF
    Abstract—We evaluate two decades of proposals to replace text passwords for general-purpose user authentication on the web using a broad set of twenty-five usability, deployability and security benefits that an ideal scheme might provide. The scope of proposals we survey is also extensive, including password management software, federated login protocols, graphical password schemes, cognitive authentication schemes, one-time passwords, hardware tokens, phone-aided schemes and biometrics. Our comprehensive approach leads to key insights about the difficulty of replacing passwords. Not only does no known scheme come close to providing all desired benefits: none even retains the full set of benefits that legacy passwords already provide. In particular, there is a wide range from schemes offering minor security benefits beyond legacy passwords, to those offering significant security benefits in return for being more costly to deploy or more difficult to use. We conclude that many academic proposals have failed to gain traction because researchers rarely consider a sufficiently wide range of real-world constraints. Beyond our analysis of current schemes, our framework provides an evaluation methodology and benchmark for future web authentication proposals. Keywords-authentication; computer security; human computer interaction; security and usability; deployability; economics; software engineering. I

    Violation of the Cauchy-Schwarz inequality with matter waves

    Get PDF
    The Cauchy-Schwarz (CS) inequality -- one of the most widely used and important inequalities in mathematics -- can be formulated as an upper bound to the strength of correlations between classically fluctuating quantities. Quantum mechanical correlations can, however, exceed classical bounds.Here we realize four-wave mixing of atomic matter waves using colliding Bose-Einstein condensates, and demonstrate the violation of a multimode CS inequality for atom number correlations in opposite zones of the collision halo. The correlated atoms have large spatial separations and therefore open new opportunities for extending fundamental quantum-nonlocality tests to ensembles of massive particles.Comment: Final published version (with minor changes). 5 pages, 3 figures, plus Supplementary Materia
    • …
    corecore