Global Sources
EE Times-Asia
Stay in touch with EE Times Asia
EE Times-Asia > Advanced Search > application security

application security Search results

?
?
total search1363 articles
2003-11-03 XML services call for security checks
Nothing has done more to erode the enterprise security perimeter than the rise of XML Web services. Designed to bypass the existing enterprise IP-based security infrastructure, Web services create a sea of vulnerabilities
2015-06-01 Synopsys to buy Quotium's app security testing biz
The Quotium Seeker complements the Coverity platform's static analysis technology by testing and analysing applications, providing customers with a solution to detect and remediate security issues
2010-02-01 Firms push smart card security standard
The standard intends to bring public transport agencies and smart card industry players better security and performance and the availability of multiple sources for chip products
2007-05-14 Establishing mobile security
Every company in the mobile technology community should start considering how to proceed to take advantage of the MTM specification and to implement improved security in their next-generation products
2013-11-21 Ensuring the security of connected cars
Learn about some of the ways to manage data exchange and processing in connected cars.
2009-09-18 ZIF connector combines plug security, variability
Yamaichi Electronics has expanded its boar-to-cable connection portfolio with a flip type ZIF connector for FFC/FPC.
2010-03-12 Wireless comm processor ups security with WPA2
Rabbit, a Digi International brand is offering the Rabbit 6000 embedded wireless communications and control SoC targeted for industrial automation applications.
2011-08-26 Wind River, McAfee strengthen security for embedded designs
The rise of Internet-enabled devices has given embedded system designers the challenge to incorporate security into their designs
2007-01-08 WiMAX security gaps bring revenue opportunities
Profit from WiMAX technology will not only come from its application deployments as addressing the security vulnerabilities of the technology will create revenue opportunities for security solutions vendors, reported ABI Research.
2005-07-01 VMs tighten up PC security
Virtual machines can bridge the gap between data protection and usability.
2007-10-31 Video content analysis is essential in security and surveillance applications
Video content analysis, also known as video analytics, electronically recognizes the significant features within a series of frames and allows systems to issue alerts when specific types of events occur, speeding real-time security response
2003-01-23 VIA x86 processor has embedded security functions
VIA Technologies has released the C3 processor, which is claimed to be the industry's first x86 processor that has embedded security functions
2004-09-22 VIA application writes over previously deleted files
VIA made available its PadLock Tru-Delete utility and source code, a new security app that writes over previously deleted files to keep sensitive data safe
2005-11-07 VeriSign to endorse Infineon's PC security system
German chipmaker Infineon Technologies AG is working with VeriSign Inc. on extending the security of transactions made with personal computers
2008-01-16 VCA: Raising video security to a new level
There is a push to develop methods that will significantly increase the effectiveness of monitoring security and surveillance video. Video content analysis (VCA), also known as video analytics, electronically recognizes the significant features within a series of frames and allows systems to issue alerts when specific types of events occur, speeding real-time security response
2001-09-05 Variable split-band scrambling (VSB) furnishes voice security
This application note describes how to implement VSB (variable split band) scrambling for enhanced voice security.
2010-01-04 Using the design security feature in Cyclone III LS devices
This application note describes the design security feature in Cyclone III LS FPGA devices.
2010-07-28 User-driven IT penetrates enterprise, challenges security
The influence of end users on enterprise IT decisions is increasing as smart phones, netbooks and tablet PCs set afoot in the workplace. The phenomenon poses a challenge for enterprise security chiefs, whose roadmaps now factor in enabling a new era of choice computing. The influence of end users on enterprise IT decisions is increasing as smart phones, netbooks and tablet PCs set afoot in the workplace. The phenomenon poses a challenge for enterprise security chiefs, whose roadmaps now factor in enabling a new era of choice computing
2008-07-24 USB security dongle handles complicated access systems
Using a unique, hard-coded identification number, the USB-Key security device from Future Technology Devices International can interface to any USB host or hub to provide application software access control or as part of a more sophisticated key-based physical access control.
2008-09-10 Tiny switches respond to security cards' risks
Peratech has developed switches made from an ultrathin pressure sensitive material, which the company claims can overcome the risks of "contactless skimming" in security cards
2013-04-29 Tilera's cyber security building blocks ready for 100Gbit/s
The security on Tilera's TILE-Gx processors have been bolstered with the MDE software tool suite and an array of powerful application building blocks that enable customer solutions.
2014-09-04 Thwarting IoT security threats with ARM TrustZone
Virtualisation can be leveraged to enable consolidation of connected devices, and ARM TrustZone can be utilised to tackle security threats to the Internet of Things
2007-10-16 Think security, efficiency in handsets
With security being a specialized domain, expertise is needed to correctly implement mobile device security and avoid inefficiencies. Clearly, security can no longer be an afterthought in application development for mobile devices.
2007-10-16 System security takes on SoC approach
Protecting a device's secret key and content as well as understanding the basic requirements of a secure SoC are vital to create leading-edge products.
2015-04-21 Synopsys expands security platform with new acquisition
Synopsys has acquired software security company Codenomicon, which is known for independently discovering the Heartbleed bug. The acquisition is seen to extend Synopsys's Coverity quality and security platform
2009-02-02 Synochip taps ARC license to build SoC for security
Synochip Technologies Co. Ltd has taken an ARC International plc license to build SoCs that provide advanced security for PCs, flash drives, portable video players, and information security and online payment systems
2002-11-25 Suppliers to add security features to wireless comm chips
Infineon Technologies AG has made a strategic decision to put security features into its wireless-modem chips
2015-04-22 SSL inspection sol'n for network monitoring, security apps
The Transparent SSL Proxy solution from EZchip claims to deliver 20Gb/s of SSL Proxy throughput and more than 30,000 new connection set-ups per second on a single TILE-Gx processor.
2012-10-30 SSD targets commercial security apps
Microsemi's SECURRE-Stor is an encrypted 2.5in SATA SSD that claims to provide data protection for commercial, banking/financial, medical, industrial and smart grid applications.
2011-01-13 Software eases network security
Cavium Networks' TurboDPI software solution integrates protocol analysis, application recognition, URL filtering, IDS/IPS and anti-malware
Bloggers Say

Bloggers Say

See what engineers like you are posting on our pages.

?
?
Back to Top