To help avoid unexpected loss of data and minimize downtime, Mitsubishi Electric Automation will now offer its customers remote access to a backup of their CNC machine tool information. The new service includes the creation and ...
Tags: Mitsubishi, Electric, CNC Data Backup
Google has bowed to concerns over unauthorised eavesdropping by announcing that it will start to automatically encrypt data stored in Google Cloud Storage. The company says that it will use 128-bit advanced encryption standard (AES) ...
Tags: Google, Computer Products, webservice, Google Cloud
Elastane yarns give garments stretch and a perfect fit, but they do present a number of production challenges. During warp preparation in particular, the special physical characteristics of the high-stretch synthetic yarns have to be ...
Tags: Karl Mayer, Warping Range, DSE-EC Machine
Microsoft is seeking permission to disclose "aggregate statistics" about the number of requests for data it receives under the U.S. Foreign Intelligence Surveillance Act, following a similar move by Google earlier this month. FISA has ...
A newly discovered Trojan program exploits previously unknown flaws in Android and borrows techniques from Windows malware in order to evade detection and achieve persistence on infected devices. Security researchers from antivirus firm ...
Data encryption could help enterprises protect their sensitive information against mass surveillance by governments, as well as guard against unauthorized access by ill-intended third parties, but the correct implementation and use of data ...
Tags: Data encryption, Spy-Proof, Surveillance
Cloud storage service SugarSync today announced it is offering users the ability to remotely delete all their synced files from a PC or Mac in the event it is lost or stolen. Remote wipe capabilities are typically offered as part of ...
Check Point has published its second mobile security report, revealing that 79% of businesses had a mobile security incident in the past year, in many cases incurring substantial costs. The report found mobile security incidents cost more ...
An ongoing cyberespionage campaign compromised over 350 high-profile victims from more than 40 countries over the past eight years, including political activists, research centers, governmental institutions, embassies, military contractors ...
Texas is poised to become the first state in the U.S. to require law enforcement officers to get a search warrant based on probable cause before they access any electronic communications and customer data stored by a third-party service ...
Elsevier has collaborated with Illumina to launch Genomics Data app, a sequencing and array-based solutions provider for genetics research. The app enables to share large data sets in Illumina's BaseSpace cloud, where they can easily be ...
Tags: Elsevier, Illumina, Genomics Data App
Only a year after acquiring Syncplicity, EMC is getting ready to make the company's enterprise file management system work with hybrid clouds. Syncplicity began as software for enterprises and consumers to synchronize and share files in ...
Tags: EMC, Hybrid-Cloud, Computer Products
EMC today introduced the world’s first software-defined storage platform at its annual flagship event, EMC World 2013 in Las Vegas. EMC ViPR, which will be generally available in the second half of 2013, allows organisations to ...
Tags: Software, Storage Platform, EMC
Users of the Hadoop data processing platform now have two more search engines to help them sort through their mountains of information. Hadoop distributor MapR has integrated the LucidWorks Search into its own distribution. And Cloudera ...
Tags: Computer Products, Hadoop
Teradata today became the first company to offer business analysts streamlined and self-service access to Apache Hadoop. Teredata Enterprise Access for Hadoop allows organisations to reach directly into Hadoop to find new value from data ...
Tags: Teradata, Hadoop Data, Computer Products