Wishing a good and secure digital year

As the time for the traditional New Year wishes is approaching, let us at Smart Webzine wish successful experience, management and deployment of digital services at all levels. Looking back at the past 12 months, [...]

Finally, Security on the Internet comes !

The Princes who rule the Internet have understood that they should not disappoint Internet users and that effective and quick action must be taken to regain their trust. This is done, almost! Indeed, manufacturers have [...]

Personal Health Monitoring

The Belgian Research Center in nanoelectronics IMEC and the Holst Centre have developed a kit for monitoring personal health. In this kit, a data acquisition chip equipped with integrated multi-sensors performs the translation of all [...]

On the Origin of the IoT and Other Online Services

What would the Cloud Computing, the Internet or the IoT be without the telecommunication networks? In the guise of a lively encyclopaedia of the telecommunication services, a book gives the keys to understand the evolution [...]

Secure Passwords and Biometric Authentication with FIDO

The proliferation of online piracy would be greatly reducing the degree of confidence in the use of the Internet. For this reason, the main players in online banking transactions, including PayPal and Lenovo, created in [...]

Internet passwords robbery

In early August 2014, a gang of Russian hackers have collected no less than 1.2 billion IDs and passwords and more than 500 million email addresses. According to Dashlane, personal data discovered by the American [...]

Bluetooth 4.2 targets IoT

Bluetooth 4.2 boasts improved privacy, higher speed, and a profile that has just been approved, enabling IP connectivity. Bluetooth 4.2 is all about continuing to make Bluetooth Smart the best solution to connect all the [...]

About the scope and role of the identity card

The question is no longer focusing on the need of an ID card, which is opposed to the British “habeas corpus” principle, but on its scope (the city, the nation or the region of the [...]

The “enigma” of the Second World War finally revealed

The secret code breakers of Bletchley Park in Britain allowed the Allies to keep a step ahead of the Nazis on a message encryption machine during World War II. Maybe even have they shortened it [...]

Cost Reduction while Strengthening Bank Security

Barclays will set up the video service  in its banking services. Several European and Indian banks are working on a similar service, but Barclays will have the first network using two-way video for banking operations. [...]

A toy becoming an indispensable tool

Internet seduced first youth because of its ease of use and its multiple applications. Criticized and cursed because of its lack of security and of facilities open to fraud, the Internet has gradually become the [...]

New sensors based on MEMs

According to the market analysis conducted recently by Yole Developement, technology-based micro-mechanisms electromechanical sensors (or MEMS) is in rapid evolution. The MEMS consist of mechanical microsystems performing sensor functions or activators. They are increasingly used [...]

Apple Pay, the successful payment ecosystem

Apple Pay payment system was built with the help of banks, retailers, and many partners. Pay Apple has a good head start on its competitors. Apple Pay works with most major credit and debit cards [...]

Very Simple Cyber Attack!

All door locks are ineffective when one left the front door open. And it is the same for bank accounts! One Saturday morning, at 6:00, someone calls on the phone to ask for confirmation of [...]

Nearly 5 billion objects connected in 2015

According to Gartner Research Institute, nearly 5 billion devices connected to the Internet will be in use in 2015, an increase of 30% compared to 2014. In 2020, the Internet of Things (IoT) will connect [...]

Simplified electronic driving license

Under present conditions, France is already living beyond its “environmental needs” and must therefore make savings. Consequently, the French government reversed its decision to generalize the driving license in the form of a “credit card” [...]

“Silence, shut up! Walls have Ears! »

You probably know that there is on the Internet a variety of online tools available to participate in piracy of responses to questionnaires or to launch artificial traffic flashes on websites. According to the website [...]

BT’s Strategy on Fixed and Mobile Supports

Like all incumbent network operators, BT must adjust its network capabilities to customer demand on the various media available. As it is necessary to make preliminary tests to be sure of the quality of service [...]

“Net Neutrality”, what about ?

The term “net neutrality network” refers to the rules of classical ethics transport connections. The postman should be neutral in its mission of routing connections. He does not care about the relative importance of their [...]

Skyrocketing sensor market for handheld computer

According to a market study prepared by IHS Technology, demand for sensors for smartphones and tablets continues to grow and this trend will increase over the period 2012-2018,. Samsung and Apple dominate this activity with [...]

SuperCom implements the electronic passport and national security systems

SuperCom company announced that it had signed a contract relating to the delivery of a national security system which consists of a visa and passport biometric control devices, and a resident identification system for a [...]

Collaboration between education and the Internet of Things

The technological evolution led to the opening of new teaching methods based on collaborative processes. The level of connectivity offered by the Internet of Things (IoT) allows to enrich the learning process for students worldwide. [...]

Priority to the Internet of Things

Major technical changes are underway, although we do not yet know where they will lead us. First, the Internet is gradually changing and there is no evidence that we still retain a unique Internet globally. [...]

Secure NFC/RFID tag with energy harvesting

This new device, developed by Maxim Integrated, is a NFC / RFID tag that protects the transfer of sensitive data between master and slave devices. The MAX66242 authenticates, configures and collects data from any embedded [...]

Hackers’ dynamism mobilized a large industrial experts team

The “Assure Threat Defense” (ATD) service from BT is attempting to detect the beginnings of hacking, penetration of networks by potential security vulnerabilities, intrusions into databases, etc. Nearly 2,000 IT experts were recruited for this [...]

Digital identity in question in the United States

To communicate its Internet address or its phone number does not pose problems for Americans. But using an electronic ID card is deeply shocking. Yet the paradox is there. If the Americans have several debit [...]

Tactile Internet and 5G, same futures !

Electronics is driving the future of our society! After the 130 nanos-CMOS, we arrive at the era of 28 nanos on 10 mm2 wafers. These performances with barbarous names are clearly achieving speeds of 10 [...]

What a Surprise: a commercial logo on an official document !

Experts in constitutional law and in economics criticize the Federal Government of Nigeria for agreeing to place the MasterCard logo on the electronic national identity card. MasterCard has provided its logo on the ID card [...]

Market growth of the Internet of Things

According to a study prepared by Gartner Intitute, the growth of the Internet of Things (IoT) will be ensured through the creation of many niche applications, by young companies and entrepreneurs, not by technology providers, [...]

Cooperation in authentication

Identity and authentication service provider SecureKey has announced a collaboration with Oberthur Technologies, which delivers SIMs and SIM-based software to drive further competition in the mobile identity service market. The agreement will enable SecureKey to [...]

Articles précédents

© 2014 Strategies Telecoms & Multimedia |  -