The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
VIRTUS is the first United Kingdom (UK) military personal armour system to provide components that are capable of protecting the whole face from low velocity ballistic projectiles. Protection is modular, using a helmet worn with ballistic eyewear, a visor, and a mandibular guard. When all four components are worn together the face is completely covered, but the heat, discomfort, and weight may not...
Is the increasing number of mobile devices advertised as 4G a product of marketing hype, or does it represent the traditionally assumed one-order-of magnitude improvement over the previous generation of cellular architectures?
The recent Conficker worm has garnered considerable attention by infecting millions of machines and having the potential to cause many problems. Conficker has created a new level of cohesion between security, domain-name-administration, routing, and code-analysis professionals, according to the Shadowserver Foundation's Di Mino.
As networking has become more complex, routers-which historically have been very basic pieces of equipment-are adding functions formerly found in other devices. In addition, new approaches and alternatives are emerging.
The inability of vendors to make money using pure open source approaches caused many to change their business models. They also now view open source as just one efficient way to develop software, not as a social movement.
The need to more easily and effectively analyze the mountains of data that organizations are gathering and also to see their findings in ways that are simple to understand and work with has created a growing interest in visual analytics.
As they face challenging times, networking-service providers are looking to save money by studying the use of relatively new wavelength-division-multiplexing-based passive optical networks to create more efficient systems that increase data rates.
With the increasing use of high-speed Internet technologies, the concept of cloud computing has become more popular. In cloud computing, users work with Web-based, rather than local, storage and software. These applications are accessible via a browser and look and act like desktop programs.
The US wireless industry appears to be in the midst of a sea change in the way it does business. It is just beginning to move away from the traditional walled-garden approach, in which users can pick their service providers but the carriers determine the phones and applications that customers can use. This gives service providers control of the wireless experience.
Experts have talked about the dangers of mobile malware since the first Palm Pilot Trojan horse, called Liberty, was reported in 2000, and the first mobile-phone virus, Cabir, was reported in 2004. However, each year, mobile viruses and similar threats have turned out to be a minor concern. In part, this is because there have been far fewer smart mobile devices than PCs, making desktops much more...
To eliminate cables and provide installation flexibility, consumers want the various elements of their home-entertainment systems to communicate wirelessly. In response, vendors are developing wireless high-definition video technologies.
One of the hot topics in computer technology is software as a service, in which vendors host applications on the Internet and provide them via a browser to users, who perform and store their work online. Users thus don't have to worry about developing, hosting, updating, or maintaining applications or storing data. Several vendors have taken the SaaS concept a big step further and now offer platform...
Security experts are working on data-leak-prevention technology to combat threats emanating from employees and others deliberately or inadvertently sending out sensitive material without authorization.
Ajax has become a popular open approach for developing rich Internet applications. Now, some vendors are releasing their own Ajax-based development platforms, while others have released proprietary platforms not based on Ajax. RIAs feature responsive user interfaces and interactive capabilities. This makes Internet-based programs easier to use and more functional, and also overcomes problems with...
By its very nature, Web 2.0 is interactive, allowing users to add input such as participatory book reviews, blogs, wikis, social net works, and video- and photo sharing services to Web sites. Web 2.0 has consequently become very popular with users and Web site operators. However, the approach's interactivity has also made it popular with hackers. This paper discusses some security challenges in Web...
A team of MIT scientists has developed a prototype for a small, inexpensive, holographic video system that works with consumer computer hardware such as PCs or gaming consoles, thereby enabling users to view images in three dimensions. The Mark III display could enhance participation in video games and virtual worlds, which currently are displayed mainly in two dimensions. The technology could also...
The DNS is a service that translates easy-to-remember alphabetic URLs into Web sites' actual numerical IP addresses. The system enables users to easily access the Web sites they want to visit and thus is a critical part of Internet operations. DDoS attacks can overwhelm servers with hacker-generated traffic and thereby make them unavailable for legitimate communications. These assaults are a serious...
A new chipmaking approach marks the biggest change in transistor technology since the introduction of polysilicon-gate, metal-oxide-semiconductor. This could overcome the most substantial roadblock to continuing to use current production processes to shrink transistor elements and thereby increase chip performance. AMD, IBM, and Intel have announced plans to replace the silicon dioxide insulator layer...
Advertising has become one of the Internet's most important economic engines. Thus, advertisers, online-advertising hosts, and the technology vendors that support them are always looking for better ways to get potential customers to look at their material. This is particularly the case because banner ads and other types of online promotions have proven easy to ignore. Now, though, the Internet advertising...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.