key

China key to $11bn Asia WiMax bonanza

China key to $11bn Asia WiMax bonanza

The Asia-Pacific region could have as many as 43 million WiMax subscribers by the end of 2013, according to new forecasts..
Simon Burns Jun 7 2008 11:42AM Telco/ISP
Existing cables key part of home networks

Existing cables key part of home networks

Service providers make the most of coaxial and phone wiring.
Robert Jaques Jun 5 2008 8:08AM Networking
Education key to fighting computer fraud

Education key to fighting computer fraud

A US university researcher has published details of a strategy for businesses to fight computer fraud that centres on better education of managers..
Robert Jaques May 28 2008 7:44AM Security
Debian random key generator flaw could persist

Debian random key generator flaw could persist

Even though a vulnerability in the OpenSSL library used to generate key pairs on Debian-based Linux distributions has been fixed, IT administrators will be hard-pressed to ensure each key is unbreakable, a security researcher said this week.
Dan Kaplan May 21 2008 8:55AM Security
Unified communications a 'key technology'

Unified communications a 'key technology'

Unified communications is emerging as a "key technology" that can help firms improve business process efficiencies, and address concerns over carbon consumption, experts report..
Robert Jaques May 1 2008 8:58AM Software
Flexible communications key to SME success

Flexible communications key to SME success

The majority of small business decision makers spend a minimum of five hours a week out of the office which can affect the company's ability to make fast decisions when needed..
Staff Writers Apr 29 2008 7:44AM Strategy
Joint effort key to IT security future

Joint effort key to IT security future

Co-operation between public and private sectors crucial to raising internet security levels.
Phil Muncaster Sep 28 2007 10:55AM Security
CIPA key to keeping students safe on the web

CIPA key to keeping students safe on the web

Pornography. Adult Chat Rooms. Violence. Child Stalking. Hacking. There are millions of websites that house offensive content that minors should not be exposed to, and their presence is compounded by their accessibility.
Joshua Block, May 8 2007 4:58PM Security
Scientists hold key to the future of flight

Scientists hold key to the future of flight

Morphing wings are the secret, claim scientists.
Staff Writers May 1 2007 3:00PM Oddware
Automation the key to tackling malware

Automation the key to tackling malware

Teaching software to find malware will speed up the protection process.
Matt Chapman Apr 30 2007 2:39PM Security
Existing features hold key to mobile security

Existing features hold key to mobile security

Making better use of cameras and touch sensitive screens.
Matt Chapman Apr 27 2007 4:00PM Security
Infosecurity: Brand protection is key driver in encryption deployment

Infosecurity: Brand protection is key driver in encryption deployment

More than half of UK businesses believe brand protection and reputation are the key drivers in the decision to deploy encryption technology, new figures from PGP Corporation show.
Fiona Raisbeck Apr 26 2007 10:11AM Security
Three E approach key to complicated compliance requirements

Three E approach key to complicated compliance requirements

Today's industry regulations are complex and difficult to understand.
Pat Sueltz, Mar 26 2007 10:34AM Security
Key science sites buried in 'info avalanche'

Key science sites buried in 'info avalanche'

Important science websites are in danger of becoming buried in the " avalanche of facts" now available online, academics warned today.
Robert Jaques Mar 23 2007 11:52AM Software
Technology key to getting parents back to work

Technology key to getting parents back to work

Big mother is watching you.
Staff Writers Mar 9 2007 8:24AM Training & Development
Passwords management for UNIX and Linux systems

Passwords management for UNIX and Linux systems

An unhappy systems administrator who may want to teach a seemingly unappreciative company a lesson. An employee who is passed over for a promotion or a raise. An IT manager who is disappointed by a bonus. A technically savvy database administrator willing to change information in the Oracle Financial Suite for a CEO whose future is riding on the next stock analyst's recommendation.
Ellen Libenson, Feb 26 2007 7:12AM Security
Experts say global cooperation key to fighting cybercrime

Experts say global cooperation key to fighting cybercrime

International cooperation among law enforcement agencies is key to taking the allure from cybercrime, a panel of experts said today at a Kaspersky Lab-sponsored breakfast in New York.
Dan Kaplan Feb 1 2007 9:04PM Security
PayPal claims key victory against fraud

PayPal claims key victory against fraud

Key fob device provides new security code every 30 seconds.
Shaun Nichols Jan 16 2007 9:20AM Security
Hybrids key to success of next-gen DVD

Hybrids key to success of next-gen DVD

LG and Warner hybrid player and disc are the way forward.
Clement James Jan 15 2007 3:08PM Hardware
Costs key in high-def DVD war

Costs key in high-def DVD war

Licensing costs from 'winning' format could hold back hybrid systems.
Test account Jan 10 2007 9:26AM Hardware

Log In

  |  Forgot your password?