Your browser does not support JavaScript or it may be disabled!
 India As It Happens
Rediff Labs will showcase innovative products that rediff is working on behind the scenes.
News   |   Images
Get Realtime News
on your webpage

About 50 results for "ieee security privacy magazine"

Article: Is Bitcoin a Decentralized Currency?

Article: Is Bitcoin a Decentralized Currency?

This article first appeared in IEEE Security & Privacy magazine and is brought to you by InfoQ & IEEE Computer Society. Bitcoin has witnessed wider adoption and more attention than any other digital currency proposed to date. One reason for this ... InfoQ, 3 weeks ago

IEEE Announces The Future Of Identity ...

IEEE, the world's largest professional organization dedicated to advancing technology for humanity, today announced the acceptance of its Future of Identity Series at The South by Southwest® (SXSW®) Interactive Festival from March 13-17, 2015 in ...
 EFYTimes.com1 month ago

Cigital Adds Security Veteran John Becker to Board of Directors

-- Three decades of experience enhance Company's service and product solutions DULLES, Virginia, Sept. 17, 2014 /PRNewswire/ -- Cigital, Inc. [], the industry leader in software security solutions, announced the addition of ...
 Individual.com2 months ago
Low-Power Design

Next-Generation Design Issues in Communications

Design Articles If wireless devices are to communicate and interoperate autonomously, they first need to speak a common language. By Bruce Fette PhD, Chief Scientist, General Dynamics C4 Systems; Mieczyslaw M. Kokar, PhD, Northeastern University; ...
 Low-Power Design6 hours ago
Sys-Con Italia

The 'Internet of Things' and Big Data | @ThingsExpo [#IoT]

By Lori MacVittie Article Rating: October 31, 2014 05:00 PM EDT Reads: 4,386 Cloud and Things and Big Operational Data Software-defined architectures are critical for achieving the right mix of efficiency and scale needed to meet ...
 Sys-Con Italia1 week ago

Data Hiding — A look at the Latest Techniques and Countermeasures

Presented by: Michael Raggo, Chet Hosmer Duration: Approximately 60 minutes. Cost: Free As malware grows in sophistication, current techniques reveal that malware variants are employing more covert functions. Additionally, corporate espionage ...
 O'Reilly Network1 week ago

Ireland's talented 38 women of technology for 2014 (IrishCentral)

Here's the women who drive the tech and/or startup scenes in Ireland, the US, and around the world. Photo by: Technology Voice is a Galway-based online publisher of forward-looking content that documents ongoing changes ...
 Irish Central1 month ago
Information Week

Internet Of Things Needs Government Support

The US risks being left behind as other countries invest in ubiquitous computing. Here's a seven-point framework to bolster the US's support of IoT technologies. 9 Innovative Products: Designers Of Things Conference (Click image for larger view ...
 Information Week1 month ago

West Point Computer Science Professor to Speak at Honors Colloquium on Oct. 7

[September 27, 2014] (Targeted News Service Via Acquire Media NewsEdge) KINGSTON, R.I., Sept. 26 -- The University of Rhode Island issued the following news release: Col. Gregory Conti, associate professor of computer science and ...
 TMC Net1 month ago

11 Game-Changing Technology Trends

One trend addresses computers so intelligent that they're capable of conducting human-like reasoning and conversations. Another focuses on machines so small that you could literally drink one with a sip of water and not realize you swallowed it. A ...
 Baseline2 months ago
Personalize your Realtimeclose [x]
Add content to your personalized tab - My News
Add upto 6 topics of your interest:
for eg.2g Scam , World
Personalize the tabs display. ( You can add or remove the tabs )
AlertsGet updates on latest news & your favourite topics right in your inbox.Set an Alert|Manage your Alerts


Realtime News

on your Webpage

Add Widget >Get your members hooked!
Get updated on latest news & your favorite topics right in your inbox!
More     Less