All articles
Sort by: publishing date popularity
How Do Cryptographic Hash Functions Work?
Cryptographic hash functions are a critical part of many data security algorithms and systems in use today.
10 / 30 / 2018 J.R. Johnivan
DNA Storage Advances with the Ability to Overwrite
DNA might be the next big storage medium. That dream is closer to reality now that data stored on DNA can be overwritten.
07 / 13 / 2020 Chris Connor
Lockheed Exploring Advanced Analytics and AI
Lockheed Martin is making some huge and significant advancements in machine learning, advanced analytics, AI and more.
01 / 27 / 2018 J.R. Johnivan
Nearly Half of Second-Hand Storage Devices Contain Personal Information
New research has found that nearly half of second hand storage devices contain personal information.
12 / 22 / 2017 Chris Connor
Video Game Dungeon Defenders 2 Embraces Blockchain
We already know how successful the blockchain is at securing cryptocurrency - but can it do the same for digital video game assets?
10 / 31 / 2018 J.R. Johnivan
How a Twitter Bot Tracks Tech Complaints
How a new Twitter bot is tracking complaints about the most popular consumer tech.
03 / 04 / 2022 J.R. Johnivan
Are Caching Gateways Replacing Enterprise NAS Devices?
What are caching gateways and how are they replacing the traditional NAS devices in enterprise applications?
12 / 07 / 2018 J.R. Johnivan