Moores Law – Transistor Graph – Video

13-10-2011 16:28 Moore's law describes a long-term trend in the history of computing hardware. The number of transistors that can be placed inexpensively on an integrated circuit doubles approximately every two years. This trend has continued for more than half a century and is expected to continue until at least 2015 or 2020. The capabilities of many digital electronic devices are strongly linked to Moore's law: processing speed, memory capacity, sensors and even the number and size of pixels in digital cameras. All of these are improving at (roughly) exponential rates as well (see Other formulations and similar laws). This exponential improvement has dramatically enhanced the impact of digital electronics in nearly every segment of the world economy. Moore's law describes a driving force of technological and social change in the late 20th and early 21st centuries. The law is named after Intel co-founder Gordon E. Moore, who described the trend in his 1965 paper. The paper noted that the number of components in integrated circuits had doubled every year from the invention of the integrated circuit in 1958 until 1965 and predicted that the trend would continue "for at least ten years". His prediction has proved to be uncannily accurate, in part because the law is now used in the semiconductor industry to guide long-term planning and to set targets for research and development.

Excerpt from:

Moores Law - Transistor Graph - Video

HD Moores Law – Video

21-03-2012 02:35 Joshua Corman wrote a post entitled HD Moore's Law in which he raises some valid points around the fact that tools like Metasploit make it incredibly easy for anyone with little or no knowledge to be able to test a system for vulnerabilities. Naturally, the purpose of this or other such tools is to aid a security tester in finding these vulnerabilities. However, like any such tool, you cannot dictate if someone will use this for attack or defensive purposes. The question then becomes whether your security defences have increased at the same rate? (hint the answer is no.) It's a relatively straightforward process with many tools to choose from that you can simply point and click to your systems and see if they can find some vulnerabilities. If they do, then you're in a bit of trouble because it means anyone with a computer and internet connection can also find the same vulnerability.

Read more:

HD Moores Law - Video