Science

Tags:

Homeland Security cyber protection office's fate is up in the air

The House is poised to vote on a measure that would not create a permanent Homeland Security Department cybersecurity office, after a committee on Thursday passed authorization legislation that does not mention the program. The move represents a departure from the Senate's version of the bill, which would retain and rename the office to better reflect a new focus on safeguarding critical commercial

Tags:

Pentagon cancels $15.9 billion battlefield radio program

nghome_image_2011-10-14_ng_20111014_9506.jpg

Tags:

Enterprises Get Ruggedized Secure Tablet

Tablets used in the enterprise require strong security and other features that many consumer models simply do not offer. One manufacturer is trying to address the enterprise market with the introduction of a bullet-proof professional's tablet.

rugged_0.JPG
Motorola's first enterprise tablet (ET1) gives sales, marketing, servicing, warehousing and delivery personnel a ruggedized alternative to consumer-grade tablets.

Tags:

It's Time to Randomize Social Security Numbers

Cyber-criminals have managed to crack the SSN code, which allows them to mine data breaches to find children's identity information and use it to run up millions in bad debts.

However, data breaches aren't the only way criminals get SSNs. A network of cyber-criminals has figured out how the Social Security Administration generates its numbers and is using that to come up with valid Social Security numbers around the time that a child is born. Because the first three digits of a Social Security number reference the region where the number is issued, it's only the last six numbers that are really tied to identity, and those are issued in a predictable sequence.

Tags:

Organized Cyber-Crime Network May Be Stealing Your Child`s Identity

Cyber-criminals have managed to crack the SSN code, which allows them to mine data breaches to find children's identity information and use it to run up millions in bad debts.

Organized cyber-criminals have taken what used to be a minor domestic crime and turned it into a global ID trafficking ring. In these cases, the data that's so valuable are the Social Security numbers of young children because they can easily be matched with any name and date of birth and used to create fraudulent identities, obtain credit or even dodge residency rules for getting work in the United States.

Tags:

N-able to Support Managed Mobile Devices in 2012

Remote monitoring and management firm N-able announced a bigger investment in its Freemium strategy, worth $108,000 per MSP, and also offered a peek at the product roadmap which promises more automation in the near future, and support for managing mobile devices such as iPhones, iPads and Android-based devices in mid-2012.

androidtablets394x230.jpg

Tags:

Model of Corporate Networks Could Improve Stability

Because they are so complex, servers at corporate data centers are often stuck running obsolete software on inefficient networks. A new computer model from researchers at MIT could enable IT managers to better monitor their information infrastructure.

rkr_datacenter_1.jpg
Corporate servers often consist of scores of processors and connections.

Tags:

NASA Readies New Type of Earth-Observing Satellite for Launch

595388main1_npp-launch-prep-226_0.jpg
NPP inside a clean room at Vandenberg Air Force Base in California.

Tags:

Traffic Model Uses Human Reason to Understand Crashes

Researchers in Israel have created a traffic-modeling tool that predicts how drivers and pedestrians will react to surrounding events. The simulator could enable city planners and engineers to design safer roads and fix regulation problems.

traffic4_0.JPG
SAFEPED could help researchers identify causes of fatal accidents and prevent future crashes before they occur.

Tags:

Software as Service: The Next Generation - part 2

Fearing Loss of Control

FEARING LOSS OF CONTROL

One of the challenges many companies considering SaaS face is a loss of control. Jeff Muscarella, executive vice president with spend-management consultancy NPI Financial, says this manifests itself initially during contract talks. The way to avoid being disappointed, he says, is to be very specific about your company’s needs.