-
Join 887 other subscribers
Profile :
The opinion expressed here or re- blogged are my personal opinion and views and has no relation to any organization , group or people.
Follow me on Twitter
My TweetsPublic Facebook Profile:
Contact
reachoutshailendra (at) gmail (dot) com
Category Archives: Technology
US agency destroys keyboards, mice to get rid of viruses
The Economic Development Administration (EDA) is an agency in the US Department of Commerce that promotes economic development in regions of the US suffering low growth, low employment, and other economic problems. In December 2011, the Department of Homeland Security … Continue reading
Researchers eye memory access as cloud security loophole and propose a solution
SUMMARY: Outside an on-premise firewall, data in the cloud needs ample security protection. MIT researchers have drawn up a system to keep attackers from learning about data when it goes to and from memory. Encryption is a critical tool for … Continue reading
How mobile phones are making cash obsolete in Africa
When he rolls into a gas station to fill his tank, Barkhad Dahir doesn’t get out of his car. He punches a few buttons on his cellphone and within seconds he has paid for the fuel. With the same quick … Continue reading
As Big Data Explodes, Are You Ready For Yottabytes?
The inescapable truth about big data, the thing you must plan for, is that it just keeps getting bigger. As transactions, electronic records, and images flow in by the millions, terabytes grow into petabytes, which swell into exabytes. Next come … Continue reading
What Is the Software Defined Data Center and Why Is It Important?
In every emerging technology market, hype seems to wax and wane. One day a new technology is red hot, the next day it’s old hat. Sometimes the hype tends to pan out and concepts such as “e-commerce” become a normal … Continue reading
Smile! Hackers Can Silently Access Your Webcam Right Through The Browser (Again)
You know those people who put tape over their laptop’s webcam to keep digital peeping toms at bay? They’re not crazy. A new proof of concept is making the rounds today that demonstrates how a hacker can snap pics off … Continue reading
The media constellation has become increasingly fractured. The Web produced the initial fissure, but mobile created new cracks in the landscape. Today, no single medium earns more than 45% of our media consumption. How can you solve this problem? Social … Continue reading
Boundless Informant: the NSA’s secret tool to track global surveillance data
Revealed: The NSA’s powerful tool for cataloguing global surveillance data – including figures on US collection The color scheme ranges from green (least subjected to surveillance) through yellow and orange to red (most surveillance). Note the ‘2007’ date in the … Continue reading
When Your Data Is Currency, What Does Your Privacy Cost?
There was considerable mouth-dropping from publications such as at initial reports this week that NSA programs are gathering both telephone records and information gleaned from large tech companies like Google and Microsoft. But as those reports have settled in, reactions … Continue reading

You must be logged in to post a comment.