Latest News
ANZ's technology division to be impacted by planned cuts
Phishing attack nets enormous npm supply chain compromise
Most pandemic-era ransomware raids conducted by two gangs
Are you ready for AI & data without the risk? The answer awaits you at the Melbourne Synology Solution Day
Australia’s AI adopters are leaning on visibility-driven architectures to realise value
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
decode
decode
IBM develops a way to process encrypted data
A researcher at IBM has developed a way to analyse encrypted data without decoding it, according to a statement from IBM.
Chuck Miller
Jun 26 2009 10:36AM
Security
Computers 'decode' the human brain
Scientists have come up with a computer-based system which can predict activity patterns in the human brain when prompted by certain words..
Guy Dixon
May 31 2008 2:17PM
Software
IBM scientists decode the DNA of spam
IBM scientists have used a mix of DNA analysis techniques and Feng-Shui to combat the growing tide of spam.
René Millman
Aug 25 2004 4:04PM
Security
Most popular tech stories
NSW Education turns to Deloitte for HCM program delivery
Lion migrates staff onboarding process from SAP into ServiceNow
State of MarTech
David Jones invites all parts of its business to embrace data
mecwacare sizes its digital transformation
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Photos: Australian industry explores data for net zero
Govt launches consumer tech label program for smart devices
UTS launches Australian Artificial Intelligence Institute
Photos: The 2024 IoT Awards winners
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?