Recommendation for cryptographic key generation

Cryptography is often used in information technology security environments to protect sensitive, high-value data that might be compromised during transmission or while in storage. It relies upon two basic components: an algorithm ...

Why forgetting at work can be a good thing

The amount of information and data which workers are confronted with every day has increased enormously over the past few years. Globalisation and digitalisation have led to a steady increase in the complexity of work and ...

The legal implications of digital privacy

A June 2018 decision rendered by the Supreme Court of the United States established an interesting principle on digital privacy in a case related to a criminal proceeding.

Digitally enhanced: Estonia plots the end of bureaucracy

In the Estonian capital of Tallinn, three-day-old Oskar Lunde sleeps soundly in his hospital cot, snuggled into a lime green blanket decorated with red butterflies. Across the room, his father turns on a laptop.

Engineers invent groundbreaking spin-based memory device

A team of international researchers led by engineers from the National University of Singapore (NUS) have invented a new magnetic device to manipulate digital information 20 times more efficiently and with 10 times more stability ...

page 1 from 12