- NSA Global Data Gathering (Old News)
-
... world’s first quantum network," using a quantum data encryption protocol called AlphaEta, delivering end-to-end key distribution via ... at the Austrian Research Centres said, "Network quantum encryption and QKD mean that many parties can communicate securely, not just ...
Blog Post - Jim Myres - Jun 7 2013 - 10:22am - 0 attachments
- Custom Silicon Solutions Programmable 555 timer
-
In my previous blog post, How I Solved My 555 Timer IC Frequency and Built a 555 Guituner, even though I tried several different combinations of resistors in series, I was unsuccessful in finding the correct combination of resistors to achieve the ...
Blog Post - Steve Schuler - Apr 9 2013 - 5:51pm - 0 attachments
- Microsoft Surface Pro reviewed from a scientist perspective. This is the future of personal computing.
-
With the Surface Pro Microsoft has made a statement on what a PC should be for the next five to ten years. Rather than fading away the PC will become thin, lite, and easy to use while retaining the flexibility that has always been the hallma ...
Blog Post - Hontas Farmer - Feb 24 2013 - 11:58pm - 0 attachments
- Guns
-
... Silent Circle offers a surveillance-proof peer-to-peer encryption capability for the masses . The key to organizing an uprising is ...
Article - Fred Phillips - Feb 11 2013 - 10:38pm - 0 attachments
- Design for a national secure identity system
-
... biometric technologies) to generate an extremely robust encryption key. If today’s technology is not yet capable of combining all ...
Blog Post - Alan Hoshor - Mar 12 2012 - 1:42pm - 0 attachments
- Quantum Cloning?
-
... for quantum information processing methods such as encryption systems. Quantum cloning is difficult because quantum mechanics ... has applications in analyzing the security of messages encryption systems, based on shared secret quantum keys. Two people will know ...
Article - News Staff - Nov 4 2011 - 11:47am - 0 attachments
- Your next hard drive - bacteria
-
... stealing those pictures of your cat, they have created an encryption module with the R64 Shufflon-Specific Recombinase. Next up, they ...
Blog Post - Hank Campbell - Dec 5 2010 - 11:00am - 0 attachments
- Total Encryption Security - Quantum Entanglement Remains Even After 140KM
-
Quantum entanglement is one of the many non-intuitive features of quantum mechanics. If two photons of light are allowed to properly interact with one another, they can become entangled. One can even directly create pairs of entangled photons using a no ...
Article - News Staff - Jun 12 2007 - 3:12pm - 0 attachments
- Virtual Conference On Mobile, Cloud Computing, Virtualization & Web Apps Security
-
... includes: "Avoiding Legal Implications for Breaking Encryption in the Cloud," presented by Thomas Roth, Security Consultant, Lanworks AG "Encryption in the Cloud," presented by Varun Badhwar, Director of Business ...
Article - Anna Ohlden - Mar 31 2011 - 11:31am - 0 attachments
- WD-40 Lubricates Their Secure Remote Access With Ericom
-
... -- Secure on-demand application access - supports SSL encryption and Single Sign On -- Improves information confidentiality - no data ...
Article - Anna Ohlden - Mar 29 2011 - 7:00am - 0 attachments