MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Wall Street & Technology
June 13, 2006
Authentication Gets Deeper Deepnet Unified Authentication is a single integrated authentication platform that provisions, manages and verifies all types of authentication, form factors and user credentials that are used for user authentication with Internet services, remote access and enterprise network access. mark for My Articles similar articles
InternetNews
July 28, 2010
Enterprise Wi-Fi users at Risk? Although Cisco downplays the danger, researchers at the Black Hat security conference discussed a potential security vulnerability in Cisco 1200-series wireless access points. mark for My Articles similar articles
InternetNews
August 3, 2010
Tech Firms Split on Paying for Security Flaws Some major IT firms have made it a standard practice to pay security researchers for bringing vulnerabilities to their attention, while others have a strict prohibition against it. What accounts for the divide? mark for My Articles similar articles
InternetNews
September 21, 2004
Ryan Naraine
RSA, VeriSign Take Two-Factor Authentication Onstage Two-factor authentication technology vendors RSA Security and VeriSign took center stage on Tuesday with separate announcements trumping the value of adding another security layer to the existing username/password scheme. mark for My Articles similar articles
InternetNews
May 20, 2011
Sean Michael Kerner
Say What? Top Five IT Quotes of the Week LinkedIN's IPO, SUSE sticks with Mono, Android at risk and Dell disses tablets. mark for My Articles similar articles
Bank Systems & Technology
May 26, 2010
Matt Gunn
Fiserv, PhoneFactor Partner For Phone-Based Multi-Factor Authentication Authentication services provider PhoneFactor and Fiserv announced a partnership that makes phone-based multi-factor authentication available through Fiserv's Corillian Online banking solution. mark for My Articles similar articles
Technology Research News
March 12, 2003
Net has few degrees of separation Researchers have found that the average number of connections needed to get from one point to another in real-world networks like the Internet and social networks is smaller than the number needed for randomly-connected networks. The findings could lead to improved networks. mark for My Articles similar articles
InternetNews
July 22, 2009
Alex Goldman
A Better iPhone for the Enterprise? RSA says the release of its SecurID Token helps address iPhone security concerns. mark for My Articles similar articles
InternetNews
December 1, 2008
Richard Adhikari
PayPal Rings Up Two-Factor Security PayPal customers can now use their cell phones to authenticate their transactions through a new service that lets customers use SMS messaging to get a randomly-generated access code to log into their accounts. mark for My Articles similar articles
Wall Street & Technology
November 19, 2008
Melanie Rodier
Case Study: Loomis Sayles Implements Multifactor Authentication Loomis Sayles deploys the Imprivata OneSign Authentication Management solution, enabling authentication via password, fingerprint and token. mark for My Articles similar articles
Technology Research News
September 10, 2003
Neural net tracks skin color Researchers working to give computers and robots the ability to recognize gestures are up against several challenges. Researchers from China have come up with a way to use skin color to detect faces and hands. mark for My Articles similar articles
Technology Research News
June 29, 2005
Paint program renders ink physics The physics behind the Moxi brush-and-ink style computer painting program is quite complicated. mark for My Articles similar articles
InternetNews
July 26, 2010
Microsoft Updates Bug Reporting Process Extending an olive branch to security researchers, Microsoft says it will provide new mechanisms to make it easier to report vulnerabilities. mark for My Articles similar articles
InternetNews
April 7, 2008
Sean Michael Kerner
The Annual Pitch For Two-Factor Security VeriSign keeps the faith on pitching two-factor authentication with new features, partners this year. mark for My Articles similar articles
InternetNews
March 18, 2005
Erin Joyce
Bruce Schneier, CTO, Counterpane Internet Security An interview covering the weakness of 2-factor authentication on the Internet, managed security services, software insecurity, and advice for lawmakers. mark for My Articles similar articles
The Motley Fool
December 23, 2010
Carl Bagh
Google Takes on iTunes: Buy Android Apps and Bill It on AT&T Account AT&T Android customers can buy apps more easily. mark for My Articles similar articles
JavaWorld
May 2001
Raghavan N. Srinivas
Java security evolution and concepts, Part 4 This article details the optional, yet important, packages that enhance Java security. Bonus: A working applet to demonstrate this article's concepts. mark for My Articles similar articles
Technology Research News
March 26, 2003
Flexible motor takes shape Researchers from Pennsylvania State University have designed a motor that can be made in a range of shapes, including nearly flat. Key to the flexibility of the design is lead zirconate titanate, a piezoelectric material that changes shape in the presence of an electric field. mark for My Articles similar articles
Technology Research News
May 19, 2004
Nanotube Sparks Could Cool Chips Researchers from Purdue University and have found a way to use carbon nanotubes to ionize air and generate minuscule air currents that can be used to cool computer chips. mark for My Articles similar articles
Technology Research News
August 11, 2004
Shifty tiles bring walking to VR A moving floor allows the user to stay in place while walking through a virtual environment. One application? Simulating disaster evacuations and similar operations, according to the researchers. mark for My Articles similar articles
Technology Research News
February 25, 2004
Film promises terabit storage Scientists are looking to cram more information in a given area by finding ways to store the 1s and 0s of computer information in single molecules. mark for My Articles similar articles
Technology Research News
August 13, 2003
Video keys off human heat Researchers from the University of Tokyo have developed a method for segmenting out the human parts of a video stream that does not require a particular background. mark for My Articles similar articles
Technology Research News
June 16, 2004
Pressure Adds Depth to Displays Researchers are proposing to add a new dimension to the clickable graphics that appear on computer screens: pressure. mark for My Articles similar articles
Technology Research News
April 23, 2003
Degree of difference sorts data Researchers from the Institute of Applied Physics in Spain have found an efficient way to sort inconsistent sets of data into groups that share some similarity. mark for My Articles similar articles
Bank Systems & Technology
July 28, 2006
Gregg Keizer
Phishers Beat Citibank's Two-Factor Authentication Nearly three-dozen phishing Web sites have targeted Citibank business customers with a new scheme that circumvents two-factor authentication. mark for My Articles similar articles
Bank Technology News
December 2009
Rebecca Sausner
Out-of-Band Authentication Gets Outfoxed Banks in the United Kingdom are battling fraudsters that have found a way to compromise out-of-band authentication-an approach supported by many fraud experts. mark for My Articles similar articles
Technology Research News
August 11, 2004
Pen writes micro wires Researchers have devised a way to write stripes of gold onto glass to produce microscopic wires. The method could eventually be used to manufacture conductors for tiny electronic devices. mark for My Articles similar articles
Technology Research News
July 14, 2004
Retinal display guides near-blind Researchers develop a wearable computer that helps people with low vision see potential obstacles. The system will become practical in three to five years. mark for My Articles similar articles
Wall Street & Technology
January 23, 2007
Cory Levine
VASCO Bolsters Tokens The strong authentication vendor has bolstered its hardware authentication offerings with the release of two new user authentication products for online commerce. mark for My Articles similar articles
Wall Street & Technology
November 18, 2005
Stronger Authentication Single-factor authentication is insufficient for online financial services, according to the Federal Financial Institutions Examination Council (FFIEC). mark for My Articles similar articles
Technology Research News
August 10, 2005
Chemistry moves micro machines One way to propel microscopic machines is to turn them into tiny chemical rockets. mark for My Articles similar articles
Technology Research News
July 2, 2003
Printing method makes biochips University of Illinois researchers have fabricated tiny, three-dimensional fluidic networks that promise to reduce the size of biochips. mark for My Articles similar articles
Technology Research News
June 2, 2004
Process Nets Cheap Microstructures Researchers from Boston College have demonstrated that it's possible to use relatively inexpensive polymers to construct tiny structures using multiphoton-absorption photopolymerization. mark for My Articles similar articles
Wall Street & Technology
April 27, 2005
Jim Middlemiss
CIO Challenge: Two-Factor Authentication The rising incidence of account hijacking and identity theft has created a challenge for financial organizations that want to secure their data, but still allow clients and staff to conduct transactions online. Two-factor authentication may provide a solution. mark for My Articles similar articles
Technology Research News
June 30, 2004
Mega video enables virtual window Researchers have put together a camera and display system that displays full-motion video at nearly human-visual-system resolution. mark for My Articles similar articles