Blog

Apps Use Image Recognition To Shop Online

August 26, 2013

Without using QR cods, new apps are able to recognize an image in a magazine and provide the customer with an ordering link online for that product or something similar.

Read More

Common Assumptions Could Torpedo Secure Crypto

August 19, 2013

Some common assumptions around randomness and quesswork are being challenged and could lead to easier ways to crack cryptography. At question is the used of uniform distribution in cryptography.

Read More

DeviceLine Radio: Matt Carrier On Mobile Security Within The Extended Enterprise

August 16, 2013

My guest this week is Matt Carrier, Director Mobile Solutions at SAP. We're discussing the subject of mobility within the extended enterprise.

You can hear the full conversation, along with a recap of this week’s news here.

Or subscribe to DeviceLine Radio on iTunes.

Or see the transcript below:

Read More

Android BitCoin Wallets Vulnerable To Attack

August 12, 2013

Private key collisions are possible when using BitCoin wallets on Android devices, says the company.

Read More

New Report Finds BYOD Increases Enterprise Risk

August 12, 2013

A report from Rapid7 last week concludes that enterprises are largely unaware of the dangers of BYOD.

Read More
COMMENTS