[TechRepublic] Securing non-volatile memory on the fly

Trouble viewing this mail? Read it online | Manage my newsletters | Unsubscribe

IT Security

TechRepublic Member | August 02, 2011

i-NVMM: Securing non-volatile memory on the fly

Computer memory is a treasure of unencrypted information. Fortunately, power off and it disappears. That's not the case with next-generation memory. Read more

Resource of the day

Looking for a solution to curb your organization's rising IT costs?

Download complimentary whitepaper from Oracle and learn the key capabilities in Oracle Database 11g Release 2 that enable IT professionals to successfully deliver more information, with high quality service, and at much lower cost.


Get ready for the action at Black Hat 2011

The Black Hat 2011 technical security conference kicks off this week. Get a preview of the presentations on the schedule. Read more

Unpatched servers and other insurgents: Antisec vs. Booz Allen Hamilton

Mark Underwood takes a closer look at Antisec's attack on Booz Allen Hamilton. Meanwhile, arrests targeting the so-called hacktivists continue: UK police arrest alleged LulzSec spokesman "Topiary." Read more

Additional TechRepublic resources

 

10 ways to safeguard your college-bound student's computer

You protect your corporate systems, but what about that back-to-school laptop you just bought your kid? Here are some things you can do to keep your student safe from cyber dangers. Read more

Looking for security and system administrator writers

TechRepublic is looking for some writers who can talk about IT security in a from-the-trenches way. If you think that's you, drop us a line! Read more

10 things you still should do to a new PC before you login to Facebook

When you get a new PC, one of the first things you want to do is connect it to the Internet. But that is a very bad idea. We list 10 things you need to do to prepare your new PC for the Internet. Read more

The top 10 hackers of all time

Black hat, white hat, or somewhere in between, hackers have had a huge impact on the evolution of information technology. See if you agree that these 10 hackers belong on this list. Read more

Featured multimedia

 

5 seriously useful Chrome extensions (photos)

There's one major element that sets browsers like Google Chrome apart from Safari and Internet Explorer--add-ons. Check out our top five Chrome extensions for the seriously efficient types. View on site


Focus on Chromebooks

Your questions answered: What Chromebooks can and can't do

While IT pros scoff, Google Chromebooks will likely seduce businesses

Three things Chromebooks need to fix to win buyers

Samsung and Acer Chromebooks: More netbook than notebook


Today's recommended downloads

Prepare an ERM classification scheme

eBook: Learn more about Dell Workstations here

Looking for a solution to curb your organization's rising IT costs?

KPMG, HP simplify HP records management - A Case Study

Free Trial Download: up.time Systems Management Software (Uptime Software)


Is speech input/output on smartphones ready for prime time?

According to Deb Shinder, voice integration on smartphones is increasingly becoming more advanced, and speech is well on its way to becoming the primary input/output method. Do you think it's ready for prime time?




Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is ceasar@cesabarre.com.
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2011 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.

No comments:

Post a Comment