Search Results for "data center"

173 results found.

Qi charge transmitter

I found out that I need more chargers than my Ikea lamp with Qi charger.  I planned to try how well less expensive Qi chargers work, so I bought  AUDEW Q5 Universal Qi Wireless Charger Charging Pad Transmitter. Banggood sells that at cheap price less than 4 Euros. So it is really cheap, and hopefully

Warning: JSocket RAT malware spreads in Finland

Finnish National Bureau of Investigation (Keskusrikospoliisi) has begun to explore its dissemination campaign on JSocket RAT malware that has plagued widely. National Bureau of Investigation investigates, according to it malware is sent to 15 000 Finnish people through e-mail. On the basis of information received by the Finnish cyber security center (Kyberturvallisuuskeskus) there has been

Aftermath: Computer trends 2014

Here is aftermath for my computer technology trends and predictions for year 2014. Let’s see how correctly they went. Original assumptations are in  in italic font style. It seems that PC market is not recovering in 2014. IDC is forecasting that the technology channel will buy in around 34 million fewer PCs this year than

IoT trends for 2015

It’s undeniable: 2014 was the year when the electronics industry decidedly and collectively moved forward to push the Internet of Things (IoT). In year 2015 IoT markets will continue to grow. I think we’re going to see some critical mass on corralling the IoT in 2015. IoT is a young market – no one seems

Aftermath: Security trends 2014

My assumptations I made in Security trends 2014 posting is in italic font style. There will still be NSA aftershocks after new material comes out and different parties react to them (and news sources write about them). U.S. cloud services have been put into question for good reason. There will be a lot of NSA

Cloudwash – Creating the Technical Prototype

How to build a IoT device? Cloudwash – Creating the Technical Prototype is an interesting project description how to design and build a connected washing machine. Cloudwash developers understood that to understand and design for this type of device, the designers need to have a working technical prototype that allows experimenting and getting experience. So

Secure software design tips

Avoiding the top 10 software security design flaws is a document published as part of the IEEE Computer Society cybersecurity initiative.  IEEE Computer Society Center for Secure Design. The Center intends to shift some of the focus in security from finding bugs to identifying common design flaws in the hope that software architects can learn

Wire ferrule crimping tools

Wire Ferrules (sometimes called Cord End Sleeves) allow the easy and reliable connection of flexible leads to screw terminals. Ferrules are the preferred alternative to twisting wire strands or tinning the wire end (tinned ends should not be terminated in compression clamps). Industrial best practice is to NOT tin wires that are to be terminated

Home Routers a Big Consumer Cyberthreat?

Home routers and firewalls are supposed to make users easy and safely connect many devices to their Internet connection. Those devices were advertised to make your Internet safer. In many cases they helped, but more and more often they itself be a real security problem. Strange but saddly true. Home Routers Pose Biggest Consumer Cyberthreat

Security trends for 2014

Year 2014 will be a year of cybersecurity after the NSA revelations made in 2013: The headline news is that the NSA has surreptitiously “burrowed its way into nearly all the security architecture” sold by the world’s largest computer networking companies. A lot of people were shocked how NSA monitored and hacked almost everything in