Thanks to a handful of emerging technologies, virtual touch-screen keyboards are getting closer to the feel of real electromechanical keyboards. Enhancements such as tactile feedback and surfaces that change to mimic physical keys could eventually redefine the virtual keyboard experience for millions of users of devices ranging from smartphones to tablets and touch-screen PCs.
Taiwanese electronics maker BenQ plans to continue to focus on e-readers instead of developing a tablet device similar to Apple's iPad, and believes a color version of its nReader due out later this year will be one of the keys to winning the market.
MetroPCS, with a customer base of just 7.6 million, doesn't seem the most likely mobile operator to launch the first commercial LTE networks in the U.S., but its small size actually was one of the reasons the carrier jumped on the new technology, MetroPCS Chief Operating Officer Thomas Keys said Thursday.
Okay, maybe it's not fair to call IT security 'miserable', but the lack of praise and abundance of blame certainly creates plenty of cynics and grouches. Security Incite's Mike Rothman offers seven keys to fight the good fight and still be happy.
Public-key cryptography offers very strong protection for electronic communications. Much of its strength comes from the use of paired keys, which are separate (but mathematically related) codes that encrypt and decrypt a message; one key is public and one is known only to the recipient.
Microsoft Corp., tacitly acknowledging the continued popularity of Windows XP, said Tuesday it was updating the operating system's anti-piracy technology to detect illegal copies installed with newly-stolen or faked product keys, or with new activation cracks.
San Francisco Mayor Gavin Newsom met with jailed IT administrator Terry Childs Monday, convincing him to hand over the administrative passwords to the city's multimillion-dollar wide area network.
Starting Tuesday Microsoft platforms will block the use of encryption keys less than 1024 bits so businesses that are still using weaker keys better get busy.
Cryptography Research, known for its crypto system-breaking stunts, will be at it again at the RSA Conference in San Francisco next month when it shows a way to steal encryption keys off hardware chips and smart cards.
Quantum cryptography, an advanced form of crypto that uses photons to exchange encryption keys, will be used for the first time to secure balloting information when the Swiss hold their election on October 21st, says officials, calling it a landmark for the use of the security technology
Featured Webcast: Are your disaster recovery goals unrealistic? View this exclusive Webcast and get expert advice and tips on crafting a real-world disaster recovery plan. Learn the keys to successful disaster recovery, how to assess your plan and more. Get the real-world guidance you need to ensure you quickly get your critical applications back online. http://w.on24.com/r.htme=28834&s=1&k=8A19D42BF4EC068E831C7254E83E2F3&partnerref=WCNL We hope you find our weekly newsletter informative and welcome you to
Last time, we mentioned that there is a lower-speed version of metro Ethernet, commonly called "mid-band" Ethernet, which is starting to be rolled out. The keys to mid-band is that it provides access at rates between T-1 (1.5Mbps) and a full 10Mbps, and that it can be deployed over copper.
Featured Webcast: Are your disaster recovery goals unrealistic? View this exclusive Webcast and get expert advice and tips on crafting a real-world disaster recovery plan. Learn the keys to successful disaster recovery, how to assess your plan and more. Get the real-world guidance you need to ensure you quickly get your critical applications back online. http://w.on24.com/r.htme=28834&s=1&k=8A19D42BF4EC068E831C7254E83E2F3&partnerref=WCNL We hope you find our weekly newsletter informative and welcome you to
Featured Webcast: Are your disaster recovery goals unrealistic? View this exclusive Webcast and get expert advice and tips on crafting a real-world disaster recovery plan. Learn the keys to successful disaster recovery, how to assess your plan and more. Get the real-world guidance you need to ensure you quickly get your critical applications back online. http://w.on24.com/r.htme=28834&s=1&k=8A19D42BF4EC068E831C7254E83E2F3&partnerref=WCNL We hope you find our weekly newsletter informative and welcome you to
Former Tribune Company employee Matthew Keys has denied giving a username and password to anyone, or conspiring to cause damage to a protected computer.
A new Web application security product prevents hacker attacks with 256-bit secret keys that authenticate and encrypt each data transmission as it happens.
Hackers stole about US$250,000 from BitFloor, a BitCoin exchange, on Monday, and it does not have the money to reimburse account holders, according to the website's founder.
Featured Webcast: Are your disaster recovery goals unrealistic? View this exclusive Webcast and get expert advice and tips on crafting a real-world disaster recovery plan. Learn the keys to successful disaster recovery, how to assess your plan and more. Get the real-world guidance you need to ensure you quickly get your critical applications back online. http://w.on24.com/r.htme=28834&s=1&k=8A19D42BF4EC068E831C7254E83E2F3&partnerref=WCNL We hope you find our weekly newsletter informative and welcome you to
Featured Webcast: Are your disaster recovery goals unrealistic? View this exclusive Webcast and get expert advice and tips on crafting a real-world disaster recovery plan. Learn the keys to successful disaster recovery, how to assess your plan and more. Get the real-world guidance you need to ensure you quickly get your critical applications back online. http://w.on24.com/r.htme=28834&s=1&k=8A19D42BF4EC068E831C7254E83E2F3&partnerref=WCNL We hope you find our weekly newsletter informative and welcome you to
Featured Webcast: Are your disaster recovery goals unrealistic? View this exclusive Webcast and get expert advice and tips on crafting a real-world disaster recovery plan. Learn the keys to successful disaster recovery, how to assess your plan and more. Get the real-world guidance you need to ensure you quickly get your critical applications back online. http://w.on24.com/r.htme=28834&s=1&k=8A19D42BF4EC068E831C7254E83E2F3&partnerref=WCNL We hope you find our weekly newsletter informative and welcome you to
When making a security outsourcing decision, you not only have to trust that the company can competently do the work, but you have to trust that you can trust them. After all, you are handing them the keys to the kingdom.
Featured Webcast: Are your disaster recovery goals unrealistic? View this exclusive Webcast and get expert advice and tips on crafting a real-world disaster recovery plan. Learn the keys to successful disaster recovery, how to assess your plan and more. Get the real-world guidance you need to ensure you quickly get your critical applications back online. http://w.on24.com/r.htme=28834&s=1&k=8A19D42BF4EC068E831C7254E83E2F3&partnerref=WCNL We hope you find our weekly newsletter informative and welcome you to
Featured Webcast: Are your disaster recovery goals unrealistic? View this exclusive Webcast and get expert advice and tips on crafting a real-world disaster recovery plan. Learn the keys to successful disaster recovery, how to assess your plan and more. Get the real-world guidance you need to ensure you quickly get your critical applications back online. http://w.on24.com/r.htme=28834&s=1&k=8A19D42BF4EC068E831C7254E83E2F3&partnerref=WCNL We hope you find our weekly newsletter informative and welcome you to
Featured Webcast: Are your disaster recovery goals unrealistic? View this exclusive Webcast and get expert advice and tips on crafting a real-world disaster recovery plan. Learn the keys to successful disaster recovery, how to assess your plan and more. Get the real-world guidance you need to ensure you quickly get your critical applications back online. http://w.on24.com/r.htme=28834&s=1&k=8A19D42BF4EC068E831C7254E83E2F3&partnerref=WCNL We hope you find our weekly newsletter informative and welcome you to