Tobii's eye tracker REX will showcase at CES (w/ video)

(Phys.org)—Tobii Technology is introducing the REX, a USB-connected peripheral that works with Tobii's software Gaze. The Stockholm-based company will show its REX device for Windows 8 at the CES show in Las Vegas, from ...

Hide files within files for better data security

Steganography is a form of security through obscurity in which information is hidden within an unusual medium. An artist might paint a coded message into a portrait, for instance, or an author embed words in the text. A traditional ...

Review: Mega sharing service lacks versatility

New Zealand entrepreneur Kim Dotcom—still wanted by U.S. authorities on allegations of copyright infringement—launched a new online service this week for storing and sharing files.

Steganography is no laughing matter

It is possible to hide secret messages in simple jokes, according to US research published in the latest issue of the International Journal of Security and Networks.

Is fog more secure than cloud?

Computer scientists in Italy are working on a new concept for remote and distributed storage of documents that could have all the benefits of cloud computing but without the security issues of putting one's sensitive documents ...

Program does impressive file size reductions

We intuitively understand the value of being able to make things smaller without sacrificing performance. The endeavor produces smaller speakers with bigger sound and a host of portable electronic devices such as digital ...

Handling trillions of supercomputer files just got simpler

A new distributed file system for high-performance computing available today via the software collaboration site GitHub provides unprecedented performance for creating, updating and managing extreme numbers of files.

A Q&A about the malicious software known as ransomware

Ransomware is a growing threat to computer users, who can suddenly find they're unable to open or use their files when their machines are infected. The malicious software can attack any user—an individual, small business, ...

page 2 from 4