Tag Archives | Encryption
Bionimbus Protected Data Cloud to Enable Researchers to Analyze Cancer Data

Bionimbus Protected Data Cloud to Enable Researchers to Analyze Cancer Data

The University of Chicago has launched the first secure cloud-based computing system that enables researchers to access and analyze human genomic cancer information without the costly and cumbersome infrastructure normally needed to download and store massive amounts of data.   The Bionimbus Protected Data Cloud, as it is called, enables researchers who are authorized by […]

Read full story Comments { 0 }
Data Storage: Synchronized at the ‘Write Time’

Data Storage: Synchronized at the ‘Write Time’

Numerical simulations show how to avoid imperfections in the next generation of high-density data storage.   The rise of the internet and the move from paper to digital information has driven a need for large-volume electronic data storage. Maria Yu Lin and her co‐workers at the A*STAR Data Storage Institute, Singapore, have now established some […]

Read full story Comments { 0 }
How Hard Is It to ‘De-Anonymize’ Cellphone Data?

How Hard Is It to ‘De-Anonymize’ Cellphone Data?

The proliferation of sensor-studded cellphones could lead to a wealth of data with socially useful applications — in urban planning, epidemiology, operations research and emergency preparedness, among other things. Of course, before being released to researchers, the data would have to be stripped of identifying information. But how hard could it be to protect the […]

Read full story Comments { 0 }

Engineers Develop Techniques to Boost Efficiency of Cloud Computing Infrastructure

Computer scientists at the University of California, San Diego, and Google have developed a novel approach that allows the massive infrastructure powering cloud computing as much as 15 to 20 percent more efficiently. This novel model has already been applied at Google. Researchers presented their findings at the IEEE International Symposium on High Performance Computer […]

Read full story Comments { 0 }

Quantum Cryptography Theory Has a Demonstrated Security Defect

Researchers at Tamagawa University announced August 10 that they had demonstrated the incompleteness and limit of the security theory in quantum key distribution. The present theory cannot guarantee unconditional security. Details will be given at the SPIE conference on Quantum Communication and Quantum Imaging on August 15, 2012. Many papers claim that the trace distance, […]

Read full story Comments { 0 }

E-commerce 101: A Guide to Successful Selling on the Web

For many business owners, launching an online shopping site makes perfect sense. However, there are some important things you should know before diving into the e-commerce marketplace. The online economy is ripe with opportunity, but it’s also rife with pitfalls that can trip up even the savviest business person. This guide reviews the basics of […]

Read full story Comments { 0 } Download Whitepaper

SSL 101: A Guide to Fundamental Website Security

As use of the Internet has grown, the Web has also become more popular with scammers, identity thieves, and other cybercriminals. Given the number of people who experience or have heard about phishing and other Web-based scams, many Internet users don’t feel comfortable sharing their personal details online. Fortunately, there is secure sockets layer (SSL) […]

Read full story Comments { 1 } Download Whitepaper

Choosing a Cloud Provider with Confidence

Cloud computing is rapidly transforming the IT landscape and the conversation around adopting cloud technology has progressed from “if” to “when”. Although cloud services offer enormous economic benefits, they also pose significant potential risks for enterprises that must safeguard corporate information assets while also complying with industry and government regulations. Download this paper to better […]

Read full story Comments { 0 } Download Whitepaper

The Internet is not a Place for Ostriches

A recent report shows the following frightening statistics (Websense 2009): 233% growth in malicious Web sites in the last six months 7% of malicious Web sites are legitimate sites that have been compromised – in most cases they don’t even know it! 95% of user generated comments to blogs, message boards, chat rooms, etc are […]

Read full story Comments { 7 }

Signed, Sealed – Delivered? The Payoff of Showing Your “Trust Mark”

A big benefit of buying an SSL Certificate from a known brand includes the recognition value of their trust mark, so it is highly important that you use this to maximum benefit on your Web site. Here are some tips on how to place the trust mark for maximum impact.

Read full story Comments { 0 }