TechAndComputer (Mar. 16, 2011) It's increasingly difficult to keep up with all the vulnerabilities present in today's highly complex operating systems and applications. Attackers constantly search for and exploit these vulnerabilities to commit identity fraud, intellectual property theft and other attacks. The National Institute of Standards and Technology (NIST) has released two updated publications that help organizations to find and manage...
TechAndComputer (Mar. 16, 2011) It's increasingly difficult to keep up with all the vulnerabilities present in today's highly complex operating systems and applications. Attackers constantly search for and exploit these vulnerabilities to commit identity fraud, intellectual property theft...
Hacking
Two new SCAP documents help improve automating computer security management
- 16 March 2011
- Editor
- Hits: 97
Predicting future appearance: New computer-based technique ages photographic images of people's faces
- 11 March 2011
- Editor
- Hits: 162
TechAndComputer (June 20, 2011) A Concordia graduate student has designed a promising computer program that could serve as a new tool in missing-child investigations and matters of national security. Khoa Luu has developed a more effective computer-based technique to age photographic images of people's faces -- an advance that could help to identify missing kids and criminals on the lam.
"Research into computer-based age estimation and face...
TechAndComputer (June 20, 2011) A...
"Research into computer-based age estimation and face...
TechAndComputer (June 20, 2011) A...
Open-source software is actually more secure for health care IT, study suggests
- 08 March 2011
- Editor
- Hits: 98
TechAndComputer (Mar. 10, 2011) Globally the sale of health care information systems is a multibillion dollar industry. The vast costs, frequent failed systems, and inability of systems to talk to each other regularly attract media comment. However policy makers still shy away from a class of software, Open Source, that could address many of these problems, because of worries about the safety and security of Open Source systems. Now new...
TechAndComputer (Mar. 10, 2011) Globally the...
TechAndComputer (Mar. 10, 2011) Globally the...
Extremely fast magnetic random access memory (MRAM) computer data storage within reach
- 08 March 2011
- Editor
- Hits: 89
TechAndComputer (Mar. 9, 2011) Magnetic random access memory (MRAM) is the most important new module on the market of computer storage devices. Like the well known USB sticks, they store information into static memory, but MRAM offers short access times and unlimited writing properties. Commercial MRAMs have been on the market since 2005. They are, however, still slower than the competitors they have among the volatile storage media.
An...
TechAndComputer (Mar. 9, 2011) Magnetic...
An...
TechAndComputer (Mar. 9, 2011) Magnetic...
New publication fundamentally changes federal information security risk management
- 02 March 2011
- Editor
- Hits: 95
TechAndComputer (Mar. 2, 2011) The National Institute of Standards and Technology (NIST) has published the final version of a special publication that can help organizations to more effectively integrate information security risk planning into their mission-critical functions and overall goals.
Managing Information Security Risk: Organization, Mission, and Information System View (NIST Special Publication 800-39) provides the groundwork for a...
TechAndComputer (Mar. 2, 2011) The...
Managing Information Security Risk: Organization, Mission, and Information System View (NIST Special Publication 800-39) provides the groundwork for a...
TechAndComputer (Mar. 2, 2011) The...