Search

Search results

NSA Global Data Gathering (Old News)

... world’s first quantum network," using a quantum data encryption protocol called AlphaEta, delivering end-to-end key distribution via ... at the Austrian Research Centres said, "Network quantum encryption and QKD mean that many parties can communicate securely, not just ...

Blog Post - Jim Myres - Jun 7 2013 - 10:22am - 0 attachments

Custom Silicon Solutions Programmable 555 timer

In my previous blog post, How I Solved My 555 Timer IC Frequency and Built a 555 Guituner, even though I tried several different combinations of resistors in series, I was unsuccessful in finding the correct combination of resistors to achieve the ...

Blog Post - Steve Schuler - Apr 9 2013 - 5:51pm - 0 attachments

Microsoft Surface Pro reviewed from a scientist perspective. This is the future of personal computing.

With the Surface Pro Microsoft has made a statement on what a PC should be for the next five to ten years.   Rather than fading away the PC will become thin, lite, and easy to use while retaining the flexibility that has always been the hallma ...

Blog Post - Hontas Farmer - Feb 24 2013 - 11:58pm - 0 attachments

Guns

... Silent Circle offers a surveillance-proof peer-to-peer encryption capability for the masses . The key to organizing an uprising is ...

Article - Fred Phillips - Feb 11 2013 - 10:38pm - 0 attachments

Design for a national secure identity system

... biometric technologies) to generate an extremely robust encryption key. If today’s technology is not yet capable of combining all ...

Blog Post - Alan Hoshor - Mar 12 2012 - 1:42pm - 0 attachments

Quantum Cloning?

... for quantum information processing methods such as encryption systems. Quantum cloning is difficult because quantum mechanics ... has applications in analyzing the security of messages encryption systems, based on shared secret quantum keys. Two people will know ...

Article - News Staff - Nov 4 2011 - 11:47am - 0 attachments

Your next hard drive - bacteria

... stealing those pictures of your cat, they have created an encryption module with the R64 Shufflon-Specific Recombinase.   Next up, they ...

Blog Post - Hank Campbell - Dec 5 2010 - 11:00am - 0 attachments

Total Encryption Security - Quantum Entanglement Remains Even After 140KM

Quantum entanglement is one of the many non-intuitive features of quantum mechanics. If two photons of light are allowed to properly interact with one another, they can become entangled. One can even directly create pairs of entangled photons using a no ...

Article - News Staff - Jun 12 2007 - 3:12pm - 0 attachments

Virtual Conference On Mobile, Cloud Computing, Virtualization & Web Apps Security

... includes: "Avoiding Legal Implications for Breaking Encryption in the Cloud," presented by Thomas Roth, Security Consultant, Lanworks AG "Encryption in the Cloud," presented by Varun Badhwar, Director of Business ...

Article - Anna Ohlden - Mar 31 2011 - 11:31am - 0 attachments

WD-40 Lubricates Their Secure Remote Access With Ericom

... -- Secure on-demand application access - supports SSL encryption and Single Sign On -- Improves information confidentiality - no data ...

Article - Anna Ohlden - Mar 29 2011 - 7:00am - 0 attachments