Some people can criticize in such a nice way. After last month’s newsletter about Voltage Technology and its Identity-Based Encryption software (see links below) one very nice reader wrote to say, ...
Public-key infrastructure technology was once so cool. Its combination of encryption, digital certificates and other technologies appeared to be a foolproof way to ensure the security of electronic ...
COMMENTARY--A 1991 college computer-networking class almost stymied my vocational momentum. The professor, a genuinely keen and knowledgeable fellow, spent much time explaining the most important ...