Global Sources
EE Times-Asia
Stay in touch with EE Times Asia
EE Times-Asia > Advanced Search > Security

Security Search results

?
?
total search4411 articles
2009-09-18 ZIF connector combines plug security, variability
Yamaichi Electronics has expanded its boar-to-cable connection portfolio with a flip type ZIF connector for FFC/FPC.
2003-11-03 XML services call for security checks
Nothing has done more to erode the enterprise security perimeter than the rise of XML Web services. Designed to bypass the existing enterprise IP-based security infrastructure, Web services create a sea of vulnerabilities.
2005-02-18 Xilinx, Sensory Networks to deliver network security platform
Xilinx Inc. and Sensory Networks have entered into a joint collaboration resulting in Sensory Networks' latest network security platform
2014-02-07 Wireless tech seen as threat to manufacturing security
The rising use of connected devices is exposing production sites to security breaches and cyber-attacks, compelling firms to seek ways to protect their networks, according to IHS.
2002-05-15 Wireless security: End to end
The solution to secure wireless networks is in applying the same techniques used for end-to-end security on wired networks.
2004-04-22 Wireless security tops U.S.-China trade talks
China and the United States will square off in Washington on Wednesday (April 21, 2004) for the annual U.S.-China Joint Commission on Commerce and Trade, a forum where officials haggle over trade disputes and promote commercial agendas.
2008-02-15 Wireless processor offers control, networking, security
Cavium Networks Inc. has introduced a wireless processor with integrated control processing, networking processing and security capabilities.
2010-03-12 Wireless comm processor ups security with WPA2
Rabbit, a Digi International brand is offering the Rabbit 6000 embedded wireless communications and control SoC targeted for industrial automation applications.
2006-12-14 Wintegra access processor suits security-intensive apps
Wintegra's new access processor supports wireless and other security-intensive applications with the addition of on-board processing blocks for a wide range of confidentiality and authentication processing.
2003-04-02 Windows XP download boosts 802.11 security
Microsoft has released for download a free patch that adds WiFi Protected Access to both consumer and business versions of its Windows XP OS.
2011-08-26 Wind River, McAfee strengthen security for embedded designs
The rise of Internet-enabled devices has given embedded system designers the challenge to incorporate security into their designs.
2007-01-08 WiMAX security gaps bring revenue opportunities
Profit from WiMAX technology will not only come from its application deployments as addressing the security vulnerabilities of the technology will create revenue opportunities for security solutions vendors, reported ABI Research.
2006-07-27 VoIP-ready PoE switches offer scalability, security
The new PoE switches from Foundry Networks promise a scalable, secure, low-latency and fault-tolerant infrastructure for cost-effective deployment of VoIP, wireless and high-capacity data services.
2005-07-01 VMs tighten up PC security
Virtual machines can bridge the gap between data protection and usability.
2014-03-18 Vietnam, Microsoft ink agreement for tighter IT security
Microsoft has signed a cooperative deal with Vietnam to take advantage of the latest IT solutions in enhancing the country's IT capacity.
2008-09-17 Video security encoders get a boost via McVFE
Nuvation introduces the McVFE reference design for accelerating new product development of video security multichannel encoders.
2007-10-31 Video content analysis is essential in security and surveillance applications
Video content analysis, also known as video analytics, electronically recognizes the significant features within a series of frames and allows systems to issue alerts when specific types of events occur, speeding real-time security response.
2003-01-23 VIA x86 processor has embedded security functions
VIA Technologies has released the C3 processor, which is claimed to be the industry's first x86 processor that has embedded security functions.
2005-11-07 VeriSign to endorse Infineon's PC security system
German chipmaker Infineon Technologies AG is working with VeriSign Inc. on extending the security of transactions made with personal computers.
2008-01-16 VCA: Raising video security to a new level
There is a push to develop methods that will significantly increase the effectiveness of monitoring security and surveillance video. Video content analysis (VCA), also known as video analytics, electronically recognizes the significant features within a series of frames and allows systems to issue alerts when specific types of events occur, speeding real-time security response.
2001-09-05 Variable split-band scrambling (VSB) furnishes voice security
This application note describes how to implement VSB (variable split band) scrambling for enhanced voice security.
2009-01-27 Using the design security feature in Stratix III devices
As FPGAs start to play a role in larger and more critical system components, it is ever more important to protect the designs from unauthorized copying, reverse engineering, and tampering.
2010-01-04 Using the design security feature in Cyclone III LS devices
This application note describes the design security feature in Cyclone III LS FPGA devices.
2010-07-28 User-driven IT penetrates enterprise, challenges security
The influence of end users on enterprise IT decisions is increasing as smart phones, netbooks and tablet PCs set afoot in the workplace. The phenomenon poses a challenge for enterprise security chiefs, whose roadmaps now factor in enabling a new era of choice computing. The influence of end users on enterprise IT decisions is increasing as smart phones, netbooks and tablet PCs set afoot in the workplace. The phenomenon poses a challenge for enterprise security chiefs, whose roadmaps now factor in enabling a new era of choice computing.
2008-07-24 USB security dongle handles complicated access systems
Using a unique, hard-coded identification number, the USB-Key security device from Future Technology Devices International can interface to any USB host or hub to provide application software access control or as part of a more sophisticated key-based physical access control.
2011-12-21 Understanding public key cryptography, security certificates
Here's a discussion on public key cryptography and the role of security certificates, and the way they are used by the secure protocols to provide ultimate security.
2013-09-23 UFS 2.0 boosts security, increases link bandwidth
Developed for mobile applications and computing systems, JEDEC's Universal Flash Storage version 2.0 enable significant improvements in throughput and system performance.
2003-06-05 TTPCom releases 802.11i IP core security extension
TTPCom Ltd expanded their 802.11 a/b/g core IP designs with the introduction of the 802.11i security extension.
2002-06-22 Transcend equips USB Flash drives with security features
Transcend Information Inc. has announced that it has equipped its line of JetFlash USB Flash drives with password protection and a write protect switch to ensure the privacy and retention of sensitive information.
2005-06-09 Toshiba, McAfee offer security solution to combat latest PC threats
Toshiba announced an agreement with McAfee Inc. to include McAfee SecurityCenter and McAfee VirusScan on the current libretto U105, libretto U100 and Tecra M4 models, and on future Toshiba notebook PCs offered by Toshiba America Information Systems Inc. digital products division, including the Satellite, Qosmio, Tecra, Portege and libretto lines
Bloggers Say

Bloggers Say

See what engineers like you are posting on our pages.

?
?
Back to Top