article thumbnail

RealNetworks releases its first hardware product, a kiosk that checks for proper facemask usage

GeekWire

But the pandemic is pushing many companies to try new things, and the software mainstay is getting into hardware for the first time. Features of the MaskCheck Kiosk include a loop in the base for locking the kiosk with a security cable. million in the second quarter, with a net loss of $1.4 RealNetworks CEO Rob Glaser in 2017.

Hardware 114
article thumbnail

7 tech trends that have changed the tech landscape in 2023

CIO Business Intelligence

Trust Architectures and Digital Identity – Trust architectures and digital identity have grown by nearly 50 percent, reflecting the increasing importance of security, privacy, and resilience. Technological Frontiers – Cloud and edge computing, along with bioengineering, have shown steady innovation and expanded use cases.

Trends 108
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New research: How IT leaders drive business benefits by accelerating device refresh strategies

CIO Business Intelligence

Increased security, productivity gains and enhancing innovation are among the reasons IT leaders are modernising their device fleets more frequently, new research reveals. Forrester’s research found that 55% of firms prioritised security at the hardware level when refreshing. Ease of management is another crucial driver.

article thumbnail

LinkedIn Shuts Down Four XSS Flaws, Is wireless the Trojan horse in your network security? and more

CTOvision

IE zero-day vulnerability exploited more widely than previously thought - “A recently announced and yet-to-be-patched vulnerability that affects all versions of Microsoft Internet Explorer (IE) has been exploited in targeted attacks against organizations in Taiwan since the beginning of July, according to security researchers.”

Wireless 194
article thumbnail

Bidding Open on DHS’ $6B Security Hub, House report stresses sharing

CTOvision

The fact that more key sensors in ICS systems are found to be vulnerable is evidence of the inherent weaknesses in these systems and the need to secure them. Via Net Security, more here. Via ComputerWorld, more here. Via InfoSecurity, more here. They then resold these for varying amounts, depending on the origin of the card.

Symantec 226
article thumbnail

Multicloud by design approach simplifies the cloud experience

CIO Business Intelligence

Foundry’s 2023 Cloud Computing Study found that 96% of APAC IT decision-makers reported significant hurdles to implementing cloud strategies, pointing to a lack of cloud management and security expertise and related skills as their top challenge. Multi Cloud

Cloud 125
article thumbnail

Emulating USB Dongle – Introducing HASP Dongle Emulator Software

Galido

One of the most common methods has been to use hardware keys or dongles which will enable the user to activate an application, unlocking its full functionality without using a device. A software USB emulator means that a user can take a virtual copy of a security key. The tool works with parallel HASP hardware keys and USB dongles.