total search4411 articles
2009-09-18 | ZIF connector combines plug security, variability Yamaichi Electronics has expanded its boar-to-cable connection portfolio with a flip type ZIF connector for FFC/FPC. |
2003-11-03 | XML services call for security checks Nothing has done more to erode the enterprise security perimeter than the rise of XML Web services. Designed to bypass the existing enterprise IP-based security infrastructure, Web services create a sea of vulnerabilities. |
2005-02-18 | Xilinx, Sensory Networks to deliver network security platform Xilinx Inc. and Sensory Networks have entered into a joint collaboration resulting in Sensory Networks' latest network security platform |
2014-02-07 | Wireless tech seen as threat to manufacturing security The rising use of connected devices is exposing production sites to security breaches and cyber-attacks, compelling firms to seek ways to protect their networks, according to IHS. |
2002-05-15 | Wireless security: End to end The solution to secure wireless networks is in applying the same techniques used for end-to-end security on wired networks. |
2004-04-22 | Wireless security tops U.S.-China trade talks China and the United States will square off in Washington on Wednesday (April 21, 2004) for the annual U.S.-China Joint Commission on Commerce and Trade, a forum where officials haggle over trade disputes and promote commercial agendas. |
2008-02-15 | Wireless processor offers control, networking, security Cavium Networks Inc. has introduced a wireless processor with integrated control processing, networking processing and security capabilities. |
2010-03-12 | Wireless comm processor ups security with WPA2 Rabbit, a Digi International brand is offering the Rabbit 6000 embedded wireless communications and control SoC targeted for industrial automation applications. |
2006-12-14 | Wintegra access processor suits security-intensive apps Wintegra's new access processor supports wireless and other security-intensive applications with the addition of on-board processing blocks for a wide range of confidentiality and authentication processing. |
2003-04-02 | Windows XP download boosts 802.11 security Microsoft has released for download a free patch that adds WiFi Protected Access to both consumer and business versions of its Windows XP OS. |
2011-08-26 | Wind River, McAfee strengthen security for embedded designs The rise of Internet-enabled devices has given embedded system designers the challenge to incorporate security into their designs. |
2007-01-08 | WiMAX security gaps bring revenue opportunities Profit from WiMAX technology will not only come from its application deployments as addressing the security vulnerabilities of the technology will create revenue opportunities for security solutions vendors, reported ABI Research. |
2006-07-27 | VoIP-ready PoE switches offer scalability, security The new PoE switches from Foundry Networks promise a scalable, secure, low-latency and fault-tolerant infrastructure for cost-effective deployment of VoIP, wireless and high-capacity data services. |
2005-07-01 | VMs tighten up PC security Virtual machines can bridge the gap between data protection and usability. |
2014-03-18 | Vietnam, Microsoft ink agreement for tighter IT security Microsoft has signed a cooperative deal with Vietnam to take advantage of the latest IT solutions in enhancing the country's IT capacity. |
2008-09-17 | Video security encoders get a boost via McVFE Nuvation introduces the McVFE reference design for accelerating new product development of video security multichannel encoders. |
2007-10-31 | Video content analysis is essential in security and surveillance applications Video content analysis, also known as video analytics, electronically recognizes the significant features within a series of frames and allows systems to issue alerts when specific types of events occur, speeding real-time security response. |
2003-01-23 | VIA x86 processor has embedded security functions VIA Technologies has released the C3 processor, which is claimed to be the industry's first x86 processor that has embedded security functions. |
2005-11-07 | VeriSign to endorse Infineon's PC security system German chipmaker Infineon Technologies AG is working with VeriSign Inc. on extending the security of transactions made with personal computers. |
2008-01-16 | VCA: Raising video security to a new level There is a push to develop methods that will significantly increase the effectiveness of monitoring security and surveillance video. Video content analysis (VCA), also known as video analytics, electronically recognizes the significant features within a series of frames and allows systems to issue alerts when specific types of events occur, speeding real-time security response. |
2001-09-05 | Variable split-band scrambling (VSB) furnishes voice security This application note describes how to implement VSB (variable split band) scrambling for enhanced voice security. |
2009-01-27 | Using the design security feature in Stratix III devices As FPGAs start to play a role in larger and more critical system components, it is ever more important to protect the designs from unauthorized copying, reverse engineering, and tampering. |
2010-01-04 | Using the design security feature in Cyclone III LS devices This application note describes the design security feature in Cyclone III LS FPGA devices. |
2010-07-28 | User-driven IT penetrates enterprise, challenges security The influence of end users on enterprise IT decisions is increasing as smart phones, netbooks and tablet PCs set afoot in the workplace. The phenomenon poses a challenge for enterprise security chiefs, whose roadmaps now factor in enabling a new era of choice computing. The influence of end users on enterprise IT decisions is increasing as smart phones, netbooks and tablet PCs set afoot in the workplace. The phenomenon poses a challenge for enterprise security chiefs, whose roadmaps now factor in enabling a new era of choice computing. |
2008-07-24 | USB security dongle handles complicated access systems Using a unique, hard-coded identification number, the USB-Key security device from Future Technology Devices International can interface to any USB host or hub to provide application software access control or as part of a more sophisticated key-based physical access control. |
2011-12-21 | Understanding public key cryptography, security certificates Here's a discussion on public key cryptography and the role of security certificates, and the way they are used by the secure protocols to provide ultimate security. |
2013-09-23 | UFS 2.0 boosts security, increases link bandwidth Developed for mobile applications and computing systems, JEDEC's Universal Flash Storage version 2.0 enable significant improvements in throughput and system performance. |
2003-06-05 | TTPCom releases 802.11i IP core security extension TTPCom Ltd expanded their 802.11 a/b/g core IP designs with the introduction of the 802.11i security extension. |
2002-06-22 | Transcend equips USB Flash drives with security features Transcend Information Inc. has announced that it has equipped its line of JetFlash USB Flash drives with password protection and a write protect switch to ensure the privacy and retention of sensitive information. |
2005-06-09 | Toshiba, McAfee offer security solution to combat latest PC threats Toshiba announced an agreement with McAfee Inc. to include McAfee SecurityCenter and McAfee VirusScan on the current libretto U105, libretto U100 and Tecra M4 models, and on future Toshiba notebook PCs offered by Toshiba America Information Systems Inc. digital products division, including the Satellite, Qosmio, Tecra, Portege and libretto lines |
Bloggers Say
See what engineers like you are posting on our pages.