Abstracts - faqs.org

Abstracts

Science and technology

Search abstracts:
Abstracts » Science and technology

To protect and self-serve

Article Abstract:

Computer technicians are concerned about possible limitations if the content-protection-for-recordable-media standard proposed by a consortium of companies is implemented. The consortium says that the plan would apply only to removable media, but it is being considered to hard disks.

Author: Grossman, Wendy M.
Publisher: Scientific American, Inc.
Publication Name: Scientific American
Subject: Science and technology
ISSN: 0036-8733
Year: 2001
Standards, Computer industry, Data encryption, Hard disk drives, Hard disks, Media programs, Media programs (Education)

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Access denied

Article Abstract:

A painful shortage of women in computer related education and employment has been observed and the phenomenon is not unique to the US. Social scientists attribute this shortage to discrimination, harassment, lack of role models, the antisocial image of the hacker, among others.

Author: Grossman, Wendy M.
Publisher: Scientific American, Inc.
Publication Name: Scientific American
Subject: Science and technology
ISSN: 0036-8733
Year: 1998
Social aspects, Computer programming, Column, Employment, Data processing personnel, Programmer/Analysts, Programmer analysts

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Anonymous Trust

Article Abstract:

An overview is presented on direct anonymous attestation (DAA), a strategy that will boost data security without compromising user privacy. DAA operates via a trusted platform module, a secure chip with an embedded cryptographic key; specific processes are described.

Author: Grossman, Wendy M.
Publisher: Scientific American, Inc.
Publication Name: Scientific American
Subject: Science and technology
ISSN: 0036-8733
Year: 2004
Other Justice, Public Order, and Safety Activities, Privacy, Data Processing Security, Methods, Privacy issue, Data security, Data security issue, Access control (Computers), Computer access control, Network access

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA

Similar abstracts:
  • Abstracts: Potential difference. Achieving full potential. Miss the net, miss out: the potential of the internet for business in the 21st century is becoming clearer
  • Abstracts: Drink and be merry. The painted bird. Whale weight watching
  • Abstracts: Colorful pebbles and Darwin's dictum. Evonomics. The myth is the message
  • Abstracts: Egg beaters: flu vaccine makers look beyond the chicken egg. The risks on the table
  • Abstracts: John Glenn's excellent adventure. Long-distance robots. Look, Ma, no wires!
This website is not affiliated with document authors or copyright owners. This page is provided for informational purposes only. Unintentional errors are possible.
Some parts © 2025 Advameg, Inc.