What you would be taking is most likely silica gel or some other desiccant? That can absorb and maintains water vapor. These little packets are discovered in all kinds of products to help maintain top quality. Small packets of silica are ...
Tags: silica gel, desiccant, water vapor
The London Olympics faced six major cyber attacks during the Games out of some 165 million individual security-related "events" identified by the IT team put together by Gary Pennell, the CIO of the London 2012 Olympics. Cloud was a ...
When designing a ZigBee wireless sensor networking device is it often necessary to make a system partitioning choice. What makes the most sense – a ZigBee system-on-chip (SoC) that combines a 2.4GHz wireless transceiver and a ...
Tags: ZigBee, wireless sensor networking device, processing core
Prices are falling and the number of services is increasing as developers in the online underground compete fiercely for criminals looking to purchase botnets and other tools to mount cyber attacks. The trends in the so-called ...
Jason Stamper summarises the most recent technology results and deals announcements. Of those reporting in this period it is Cisco that's the bellwether, and its results should give a little encouragement to the sector as a whole. But not ...
Tags: Jason Stamper, Cisco, technology results
Applying big data approaches to information security can help enterprises build better situational awareness capabilities, but implementation could prove to be a major challenge, security experts said at the RSA Conference 2013 being held ...
Tags: information security, RSA Conference 2013, data aggregation
Global packaging manufacturer ASG (AGI-Shorewood Group) has unveiled a new automated magnetic-coating inline process for a new line of chewing gum marketed by a gum manufacturer. The folding packs feature a new type of magnetic closure ...
Tags: ASG, AGI-Shorewood Group, magnetic-coating inline process
Every day new applications appear on the world's mobile communications networks and user behaviour keeps adapting to new ways of streaming video, sharing files and communicating. New business demands, such as traffic monetisation, must ...
Tags: mobile communications networks, streaming video, sharing files
Global packaging manufacturer ASG (AGI-Shorewood Group) has developed a new automated magnetic-coating inline process for a new line of chewing gum marketed by a gum manufacturer. The folding packs feature a new type of magnetic closure ...
By Eric Aasen, Product Line Manager, Bosch Packaging Technology More than ever before, our supermarket shelves are a battleground for an enormous array of packaged fresh food products, each competing for the attention of time-strapped, ...
A Los Alamos National Laboratory quantum cryptography (QC) team says it successfully completed the first-ever demonstration of securing control data for electric grids using quantum cryptography. Quantum cryptography provides a means of ...
Tags: quantum cryptography, securing control data, electric grids
RSA last week launched its Security Analytics solution in the UAE, promising to leverage big data in order to provide the visibility and context required to help defend against advanced security threats. The new Security Analytics fuses ...
Tags: RSA, UAE, Security Analytics solution
A coffeemaker embedded with Swarovski crystals seems a little over the countertop but maybe it takes a little bling to make an everyday appliance seem less prosaic. Fortunately, the Cuisinart Crystal coffeemaker had other attributes ...
Tags: coffeemaker, everyday appliance, coffee
India-based manufacturer of branded milk and ice cream Hatsun Agro Product plans to establish a milk processing facility in Tirunelveli, Tamil Nadu with an investment of INR500m ($9.39m). The plant is expected to process 2.5 lakh liters ...
Tags: branded milk, ice cream, Hatsun Agro Product
RSA has unveiled a new tool designed to let enterprises detect security threats more quickly than current technologies permit by combining big data management and analytics approaches with traditional network monitoring and threat ...
Tags: RSA, security threats, big data management, analytics approaches