Related Content
Necessity Is the Mother of Innovation, Too An age old proverb says that necessity is the mother of invention. If you look at the meaning this statement holds, the proverb extends itself to several other areas—including innovations, improvisations, or any action that is a step ahead in bringing added value to a current process. |
||
USB Condom to Protect Those Engaging in Risky Business Now that we're running dozens of apps around the clock, our mobile device batteries are often in need of a charge. Remote charging spots are popping up left and right, but so are the risks of those hotspots being used by hackers. The USB Condom is poised to be a solid solution. |
||
Cloud Computing Is a Utility for the Future Sanjeeb Kumar Jena looks at how cloud computing's stratospheric rise puts it at the same must-have level as any public utility commodity. But how are the technologies between utility computing and cloud computing different? What gives cloud computing the upper hand? |
||
September Hacking News Roundup In this hacking roundup for September, read about two companies that are both specializing in hacking software, albeit from two different angles. One company is selling hacking tools to law enforcement agencies worldwide; the other company is building a software platform that prevents attacks. |
||
This Far-Reaching Wireless Platform May Support the Internet of Things An in-the-works project called Flutter provides an inexpensive, power-efficient alternative to Wi-Fi and covers an area a hundred times larger. Get enough transmitters to communicate, and you could cover whole cities. This is the future of controlling our connected devices in the Internet of Things. |
||
Do You Want Facebook’s Facial Recognition to Remember You? When it comes to the growing use of facial recognition technology, some prefer that their face be forgotten rather than be digitally recognized, remembered, and used in random applications that they may not be aware of. Pamela Rentz looks at Facebook's use of facial recognition technology. |
||
How NSA Cracks Encrypted Data New facts continue to come out about the National Security Agency’s information-gathering programs. Each day's news seems to outdo previous scoops about its spying capabilities. This week is no different, with new reports detailing NSA's efforts to crack encrypted data. |
||
US Government Says Android Mobile OS Is Top Malware Target When it comes to malware attacks, there is one mobile operating system—Android—that walks away with the dubious honor of being recognized as the number one target by two US security agencies. Pamela Rentz provides details about the report released by the DHS and the FBI. |