Related Content
Data Leaks—Will Secure Programming Save the Day? 2014 is already shaping up to be another horrible year for compromised data. With all the widely publicized large-scale data leaks, there has to be a better way to secure sensitive data and applications. Secure programming, combined with more sophisticated network separation, might be the answer. |
||
Google’s Project Ara Phone: Will You Accept the Challenge? What if there were a modular smartphone, an endoskeleton with interchangeable parts you could customize to your needs? Google's Advanced Technology and Projects group is working on a concept—Project Ara—that will enable users to configure their own phone according to their personal preferences. |
||
Big Data, Big Brother, and Big Questions We should all be aware of our credit score—the important number used to determine interest rates and insurance costs. What you may not be aware of is how big data is being used to score you on many areas of your daily life. Joe Townsend explores the connection between big data and big brother. |
||
Killing Mobile: The Advent of the "Kill Switch" Last week, many of the major phone manufacturers and wireless companies announced they would offer an antitheft feature on smartphones. The feature, known as a kill switch, will include several components aimed at deterring theft. |
||
Just How Persistent Are Your Cloud Bits, Anyway? Have you ever wondered what happens to your data if you cancel services with your cloud service provider? Is the data really gone, or does it persist? Beth Cohen looks at the common data backup and disposal practices and how various backup practices can affect the outcome. |
||
How the Weather Company Is Using Big Data to Stay ahead of the Storm The Weather Company is moving to a NoSQL-powered big-data platform, which can gather some twenty terabytes of weather data a day. The NoSQL environment’s ability to scale to extremely large sizes helps with the intake of this additional data, and faster queries mean quicker, more accurate forecasts. |
||
Heartbleed Bug Bypasses Web Encryption, Exposing Personal Data A significant security vulnerability called Heartbleed could allow hackers to gain access to private keys and other highly sensitive information on many widely visited websites. The problem is in the most popular software used to encrypt web communications—and the flaw has existed since 2011. |
||
What Time Is It? Check the New NIST-F2 Atomic Clock The U.S. Department of Commerce's National Institute of Standards and Technology (NIST) recently introduced the newest atomic clock, called NIST-F2, as a US civilian time and frequency standard. The NIST-F2 U.S. atomic clock is now the world's most accurate time standard. |