Archives
You are currently viewing archive for August 2011
Posted By Carl Engelbrecht

"A provider of broadband, data networking and voice services, CenturyLink, Inc., has announced two new VoIP services, CenturyLink Hosted VoIP and CenturyLink SIP Trunking, which will enable companies to access advanced features that enhance connectivity and mobility in the workplace. These services will also give employees the tools they need to connect and collaborate with customers and one another."

preview.tinyurl.com/4y34pff

 
Posted By Carl Engelbrecht

"Smartphones and tablets are becoming ubiquitous, and a new study says that in the next five years 65 percent of the U.S. population will own one or the other."

preview.tinyurl.com/3gmnwle

 
Posted By Carl Engelbrecht

"In the August 2011 Symantec Intelligence Report, the company noted there have already been as many new boot time malware threats detected in the first seven months of 2011 as there were in the previous three years. Also known as MBR (master boot record) threats, the malware infect an area of the hard disk that makes them one of the first things to be read and executed when a computer is turned on. This enables the threats to effectively dodge many security defenses."

preview.tinyurl.com/3u6zkmw

 
Posted By Carl Engelbrecht

"The report showed that with the continued growth in online advertising, there is also an increasing trend in online threats through “malvertising,” a growing method used to distribute malware via advertising tags served through an unsuspecting publisher’s Web site, blog comments, forums and other forms of user generated content, allowing cybercriminals to create content that used to carry out a wide range of malicious attacks."

preview.tinyurl.com/2wl6ys2

 
Posted By Carl Engelbrecht

"With electrical grids now often controlled by systems running Windows or Linux, and using IP networks to communicate, a new world of risks has been introduced, as the systems are no longer isolated within the perimeter of facilities. Wireless and Bluetooth capabilities are starting to appear in supervisory control and data acquisition (SCADA) devices that are integral to the backbone of grid operations."

preview.tinyurl.com/43u77jt

 
Posted By Carl Engelbrecht

"Systems that print mechanical components with metal ­powder could be used to build lighter, more efficient airplanes."

preview.tinyurl.com/3dlkxzo

 
Posted By Carl Engelbrecht

"People across the Triangle had their early afternoon activities shaken up by tremors created by a 5.9 magnitude earthquake near Richmond, Va. on Tuesday."

preview.tinyurl.com/3mfcwkr

 
Posted By Carl Engelbrecht

Isn't this profiling? I realize it works, but guess it's different if a computer does it...Right?

"Last time we looked at the UK’s teeming video surveillance technology sector we were writing about facial recognition software that Scotland Yard was trialling during the recent London riots. But facial recognition is both fraught with privacy concerns and difficult to make reliable. So researches at Kingston University are building a CCTV system that uses AI to recognize specific types of criminal behaviors--like someone brandishing a firearm--and use that to alert authorities and build a video profile of the way a crime unfolded."

preview.tinyurl.com/3l7maw4

 
Posted By Carl Engelbrecht

"IBM is testing a new system that--using just weather patterns and detailed maps--can accurately predict 100 hours of future river behavior."

preview.tinyurl.com/3w43j5y

 
Posted By Carl Engelbrecht

"Duke Energy is turning to cellular networks as the backbone for its smart grid. The utility detailed the network plan in a white paper released earlier this month, and revealed one of the most aggressive uses of cellular networks by the utility industry in the U.S."

preview.tinyurl.com/3twl8q6

 
Posted By Carl Engelbrecht

"Yale University has notified about 43,000 faculty, staff, students and alumni that their names and Social Security numbers were publicly available via Google search for about 10 months."

preview.tinyurl.com/3gy5usa

 
Posted By Carl Engelbrecht

"The newly released Secure Open Wireless Access (SOWA) proof-of-concept implementation is aimed at making openly available WiFi networks safer by giving users encrypted connections to wireless networks without their risking connecting to a rogue wireless access point or their traffic getting sniffed or hijacked."

preview.tinyurl.com/3txgutz

 
Posted By Carl Engelbrecht

"Water is crucial to the operation of many data centers. This summer’s heat wave in much of the U.S. has taxed the water infrastructure in many areas, causing a jump in water main breaks due to the combination of dry round and increased usage."

preview.tinyurl.com/3w3zo94

 
Posted By Carl Engelbrecht

"Amoroso identified a number of security features that smartphone users are looking for. First, they want to have the ability to put a password on their device. Second, they want to be able to perform a remote wipe in case the device is lost or stolen. And third, they want to be able to have some level of encryption."

preview.tinyurl.com/3sog7gv

 
Posted By Carl Engelbrecht

"This is a legitimate concern, but online backup services are as safe as anything else in this dangerous cyberworld--provided you can take the proper precautions."

preview.tinyurl.com/3ov3d4f

 


 
Google

User Profile
Carl Engelbr...
Holly Spring...

 
Archives
 
Visitors

You have 3135759 hits.