system.

Scientists demo wireless power system

Scientists demo wireless power system

No more chargers needed for devices able to use wireless power source.
Iain Thomson Nov 16 2006 11:52AM Networking
Another VA breach affects 1,600 veterans from New York system

Another VA breach affects 1,600 veterans from New York system

The Department of Veterans Affairs (VA) is again warning veterans their identity may be at risk following the theft of an unencrypted laptop from the agency's New York Harbor Healthcare System.
Dan Kaplan Nov 2 2006 5:08PM Security
Motorola unveils in-car Bluetooth stereo system

Motorola unveils in-car Bluetooth stereo system

T605 offers digital music and phone calls through a car's sound system.
Clement James Nov 2 2006 10:07AM Telco/ISP
Wireless international beer tracking system trialled

Wireless international beer tracking system trialled

Satellite technology refreshes the parts beer reaches.
Andrew Charlesworth Oct 30 2006 11:29AM Oddware
Linux file system catches up with NFSv4

Linux file system catches up with NFSv4

Novell’s SUSE Linux Enterprise gets NFSv4.
Clement James Oct 27 2006 9:43AM Software
Microsoft unveils System Centre DPM 2

Microsoft unveils System Centre DPM 2

Latest offering boosts continuous data protection.
Robert Jaques Sep 28 2006 10:23AM Storage
IBM develops mobile system for the hard of hearing

IBM develops mobile system for the hard of hearing

Location-specific alerts delivered via SMS.
William Eazel Sep 14 2006 10:22AM Telco/ISP
Cisco scales down high-end routing system

Cisco scales down high-end routing system

320Gbps model targets regional data hubs and data peering sites.
Tom Sanders Sep 6 2006 11:59AM Networking
CA mistakes Windows system file for malware

CA mistakes Windows system file for malware

False positive causes system crashes.
Tom Sanders Sep 5 2006 9:54AM Security
The Month: Debate - Is the security threat faced by users of the
Mac operating system overhyped?

The Month: Debate - Is the security threat faced by users of the Mac operating system overhyped?

YES - Garry Sidaway senior security consultant, Cybertrust
Staff Writers Sep 4 2006 3:56PM Security
Boffins build tiny on-chip cooling system

Boffins build tiny on-chip cooling system

Ion pump sets new standard in cooling microelectronic components.
Robert Jaques Aug 30 2006 9:55AM Hardware
System simulates fault tolerance of the brain

System simulates fault tolerance of the brain

University of Manchester to build brain style computer.
Staff Writers Jul 27 2006 11:43AM Oddware
Open source phone system open to DoS attack

Open source phone system open to DoS attack

Hackers could launch DoS attacks against telephone systems, new research has revealed.
René Millman Jul 18 2006 12:25PM Security
Single system speeds police access to data

Single system speeds police access to data

South Wales force gains complete visibility of related case records.
Lisa Kelly Jul 13 2006 2:40PM Storage
Google checkout payment system goes live

Google checkout payment system goes live

Google has launched its online Google Checkout payment system, which was developed under the codename Gbuy.
Staff Writers Jun 30 2006 9:58AM Software
Microsoft releases Vista system requirements

Microsoft releases Vista system requirements

Microsoft announced this week the minimum and premium system requirements for the next generation Windows Vista operating system.
Frank Washkuch May 19 2006 7:17PM Security
Review: Nortel Threat Protection System

Review: Nortel Threat Protection System

The Nortel Threat Protection System runs on a Sourcefire platform, something that surprised us. The product is a flexible system composed of multiple sensors and a management console.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Review: Sentivist Real Time Threat Protection System

Review: Sentivist Real Time Threat Protection System

NFR is one of the pioneers in intrusion detection and prevention, and its pedigree shows in this product.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
The Common Vulnerability Scoring System: Get your threat priorities right

The Common Vulnerability Scoring System: Get your threat priorities right

Over the years, I’ve seen and used a diverse range of methods to evaluate and explain the risks associated with a particular security threat or vulnerability. Depending on the audience and the nature of the environment being evaluated, there has always been – and always will be – a frequent need to reclassify the severity of a finding. This is particularly relevant when making use of findings derived from automated security tools.
Gunter Ollmann Mar 6 2006 7:04PM Security
FedEx pay system could be grounded

FedEx pay system could be grounded

A smart card used for the FedEx Kinko’s ExpressPay system is vulnerable to malicious attacks that could lead to a handsome payday for hackers, a malware-monitoring group said Tuesday.
Dan Kaplan Mar 1 2006 9:45PM Security

Log In

  |  Forgot your password?