Search Details

Word: backups (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...Primitive though Morse may be, the world may want to keep it alive, if only as a backup when global communications networks crash-as they did spectacularly on Dec. 26 when an earthquake off Taiwan's coast damaged seven undersea fiber-optic cables that handle some 90% of phone calls and data traffic in the region. Millions of homes and businesses across Asia were left without Internet access, e-mail and international phone connections. Financial markets were interrupted. And those lucky enough to connect to overseas websites experienced exasperatingly sluggish data-transfer speeds. While most services have been at least...

Author: /time Magazine | Title: Hanging by a Thread | 1/4/2007 | See Source »

...1980s, Stanford University scientists applied the technique to computer security. But it was not until BioPassword bought the patents from the school in 2002 that keystroke dynamics found its first commercial use. BioPassword's developers harnessed the technology into portable software and began selling it in 2004 as a backup password-protection authentication method for many online sites. Now more than 30 companies, or about half a million users, have signed on. As BioPassword CEO Mark Upson puts it, "For $1 per user annually, you've got online security that can't be sold, lost or replicated...

Author: /time Magazine | Title: Change Agent: Telltale Fingertips | 12/10/2006 | See Source »

Many banks, fearing the Big Brother aspect of biometrics, have chosen in-depth analysis of customers' online behavior as a backup. Such monitoring can then determine whether a certain customer needs a higher level of security, like a token or an RFID tag. "Some of the most advanced technology we're seeing is those tokens being embedded in something that a consumer is carrying every day, such as a cell phone or credit card," says cybersecurity expert Fran Rosch of VeriSign, a leader in online authentication. "That makes it less likely to be lost." Less likely, but not impossible...

Author: /time Magazine | Title: Change Agent: Telltale Fingertips | 12/10/2006 | See Source »

...time to install a wireless "sniffer" that could later broadcast information going in and out of the bank. He could also have shut down the security cameras, alarm and telephone systems. The pair got access to the back side of the ATM and a room with boxes of backup customer data. Alsbury was able to drop a disc into an unattended, logged-on computer: a Trojan Horse virus could then download itself and allow him to hack the credit union's system. "There was nothing more we could have done," says Stickley laughing, when the pair returns triumphant...

Author: /time Magazine | Title: Small Business: Hackers For Hire | 12/10/2006 | See Source »

Hizballah also accuses Siniora's ministers of secretly siding with Israel and the U.S. by failing to provide backup during the July-August war with Israel. With its massive street demonstrations, Hizballah hopes to intimidate the country's other parties into giving it more than the six Cabinet seats it had held, enabling it to block any legislation seen as contrary to the interests of Hizballah and its backers in Damascus and Tehran...

Author: /time Magazine | Title: Losing Lebanon | 12/3/2006 | See Source »

Previous | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | Next