Automation has been part of the production process for many years. In 1947 General Motors created an automation department in their factory. At that time, the technology tools used in industrial automation were largely electrical, mechanical, and hydraulic. Amazingly, in the first 17 years of the department, General Motors doubled their productivity and output. Proving Read more
Archive : Security
10 Ways to Stay Safe in the Cloud
Though cloud security has advanced, applications in the public cloud are not as secure as applications stored on servers in enterprises. Even with security issues, cloud computing is becoming a necessity in businesses. Cloud computing is recommended for disaster recovery, for increased mobility and for increased accessibility of applications and data. When risks are reduced, Read more
Windows 8 Will Be Able To Manage Multiple Passwords
Microsoft has declared that the next Operating System that it is going to release shortly will feature an app that will be able to manage several passwords single handedly. According to a post on Microsoft’s Building Windows 8 blog the aforementioned Operating System will enable the users to maintain multiple passwords behind one single major Read more
Former US General talks about cyber weapons
Former No. 2 uniformed officer in the U.S. military claims that the United States should be developing offensive cyber weapons so that they could use it whenever some foreigners hack their computer.
Four-star Marine Corps general who retired in August as the vice chairman of the Joint Chiefs of Staff, James Wright says that the US must be open to developing cyber weapons since they got the capabilities. The US must also train people in order to make them credible of fighting this online threat so that the world will know that hacking is criminally liable, and the US will do something about it.
Facebook easily penetrated by Bots
A result of an eight week study found that Facebook’s fake account detection mechanisms can be easily overcome by 80 percent of the time with the special help of automated tools. The study conducted by researchers from the University of British Columbia (UBC).
Yazan Boshmaf together with some of the of programmers such as Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu created a network of 102 bots designed to pose as real humans on social networks. The researchers then released the bots on Facebook with the intention of befriending as many users as possible so that it could collect private information about the unsuspecting users.
- 1
- 2
- 3
- ...
- 17
- Next Page »