The Latest in IT Security

Posts Tagged ‘design’

Until a few years ago, only military organizations could afford #drones, but advances in sensors, micro-controllers and batteries have led to these aerial vehicles becoming available to consumers. These days, anyone can buy a quadcopter with a camera and have fun with it, or use it to shoot professional videos. A market study from Teal […]

Read more ...

#google #researchers have written the first-ever attack code that takes advantage of #electrical interference between densely packed memory cells, a unique style of attack that could require changes in #chip #design. The work builds on a paper published last year by Carnegie Mellon University and Intel, which found it was possible to change binary values […]

Read more ...

As the world becomes increasingly (and justifiably) dominated by flash storage, old fashioned hard disk drives are becoming increasingly (and justifiably) useless. But slap a set of hands and a quartz movement on one, and boom! You’ve got yourself a pretty awesome-looking watch. Read more… Original source:

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments