You arrive 10 minutes early to a sales appointment. You are…

You arrive 10 minutes early to a sales appointment. You are seated outside the customer’s office in a common area. The customer comes out, sees you sitting there but does not address you in any way. They check their watch and go back inside their office. At the precise time of your appointment, they greet you with a soft handshake. You enter their office to see that it is spotless, well organized and sterile. You notice several shelves of white “Policies and Procedures” notebooks with neatly printed subject labels on the edge of the binder. They pick up a pen and pad of paper to take notes. What type of conversation do you think the customer will likely be interested in?  

Google is building a subsea cable that will provide a digita…

Google is building a subsea cable that will provide a digital connection that links the US to Australia. Google says that the goal of the investment is to, “improve reliability, add capacity, and reduce latency for users in the Pacific Islands and around the world.” What type of cable would you expect Google to use in this application?

Suppose that Apple adds built-in support for public-key cryp…

Suppose that Apple adds built-in support for public-key cryptography to the next version of iOS, the operating system used by the iPhone.  There are a variety of ways that Apple might manage the distribution of keys in such a system, but for the following questions you should assume the following: Embedded in each iPhone is a globally unique secret key and the corresponding public key associated with the device Apple maintains a database of iPhone public keys accessible via the Internet on a server using the keys.apple.com domain When a user activates their Apple account, the user’s name and their iPhone’s public key are uploaded to the keys database The iPhone caches recently used public keys Users obtain a copy of a phone’s public key by sending an HTTPS request that posts the user’s name to the page keys.apple.com/getkey.  The key server responds by sending a file containing the public key.