In nature as well as technology, there is a constant jockeying for position between rival factions. The moon follows the sun and hackers lurk in the shadows of innovation.
The seesaw battle between technology and security breaches is as old as cave communities protecting information over the whereabouts of a saber-tooth tiger. The arrival of the printed word jump started this chess match to a new level and with emails, document sharing , and public clouds, the game has become a daily highlight reel.
Earlier this summer the professional social networking site LinkedIn suffered a security breach compromising an estimated 6 million of its user’s passwords. The New York Times Technology writer Nicole Perlroth hinted that the passwords of LinkedIn users were only “lightly encrypted.”
Cookeyah designers were well aware of the importance of encryption. The innovative technology company complimented voice biometric authentication with three of the industry’s most well-respected encryption families.
Encryption is a highly effective tool to protect data. It involves the transfer of information like text into an unreadable format. The transfer is performed by algorithms and the data remains encrypted or unreadable until a key is granted. Continue reading →
The long, hot summer blends well with outdoor music festivals, swimming in public pools, and upgrading your vintage Pontiac Thunderbird with a more powerful motor because no summer is complete without some tinkering to a modular structure.
Modular Designs are used in buildings, automobiles, and computer hardware. They separate mechanisms into smaller and independent components enabling upgrades and/or maintenance to be completed without disrupting the overall system. This proves to be cost-effective and beneficial when for example you’re preparing for a drag race by the lake and need some more vrooooom in your engine.
Cookeyah was also designed with a modular approach in order to facilitate ongoing innovation. Modular approaches become critically important in a technology industry that rolls out the red carpet for new devices on a seasonal basis. A modular approach is the equivalent of boxcars being linked by hitches that can be easily removed or upgraded rather than permanently welded together. Continue reading →
**This is part 3 of a three-part series on passwords
As we discussed in the first segment of this series-The Password Puzzle-password theft is a growing concern, not just for industry experts, but individuals who make online purchases and perform various banking functions.
The convenience in performing so many tasks online in an ever-increasing mobile world is a force gaining momentum with every passing day. We’ve witnessed the emergance of the PC, Laptop, and more recently, widespread mobile device usage. The path towards even greater convenience shows no signs of letting up. Google’s next generation computer goggles bring mobility to an entirely new level. Password security can no longer be seen as a luxury or something to put off until tomorrow. It should be an immediate necessity. Continue reading →
* This is part two of a three-part series on passwords
A closer look at the word “authentication” hints at a new and more logical solution to the password puzzle. Authentication comes from the word authenticate or the process of determining whether someone truly is who they say they are. It comes from the Greek word authentikos–original, genuine, principal. Continue reading →
*This is part 1 of a three-part series on passwords
Imagine for a moment that you have two brothers, one sister, a mother, a father, and two grandparents. That makes seven different birthdays you need to remember or run the risk of a less than pleasant family reunion.
In today’s online world, the average web user has more than birthdays to remember. He or she must memorize 6.5 passwords or be restricted from accessing Facebook, bank accounts, or any other on-line convenience. (PC World) Young professionals, teenagers, and the elderly all struggle with the same dilemma; how to remember an ever-increasing number of passwords. Continue reading →