Tuesday 20 September 2016

How quantum computing could unpick encryption to reveal decades of secrets

Top tech stories now available. See what’s trending today.
Subscription | Read Online Twitter Facebook Google+

How quantum computing could unpick encryption to reveal decades of online secrets

The encryption we take for granted as being uncrackable would have a limited shelf-life in the quantum age, says a security expert.

New at TechRepublic

Oracle broadens cloud push with intelligent cloud apps, analytics, containers

GE and Intel 'superbrain' turns trains into mobile data centers

Why data centers fail to bring new jobs to small towns

New report details 3 reasons why messaging apps are taking over customer service

Blockchain: The smart person's guide

Why your next storage solution may depend on blockchain

How to migrate Google two-step verification to a new device

Video: How Louisville Metro Government is using data to cut energy consumption by 25%

Fiber channel networks ... in less than two minutes

Take this AI/machine learning survey

Is there a use for artificial intelligence at your company? Tell us why or why not in this survey, and get a free copy of the research report.

Featured Webcast

Live Webcast: Office 365 business-driven provisioning deep dive

As we approach the fifth anniversary of the release of Office 365, many of the "easy" Office 365 migrations are done. Customers that are migrating to Office 365 now have much more complex requirements. Don't miss "Office 365 business-driven provisioning deep dive." Join migration experts from Okta, Anat Shiwak and Marc Jordan, along with CBS Interactive Distinguished Lecturer David Gewirtz in a lively discussion about how you can build a foundation from which to launch your organization's future cloud strategy.

Featured multimedia

iOS 10 gallery: The big changes in the new version of Apple's mobile OS

Today's recommended downloads

Energy Efficient Cooling for Data Centers: A Close-Coupled Row Solution

(APC by Schneider Electric)

Securing Productivity in the Borderless Enterprise

(Microsoft)

On-Demand Webcast: Five ways the cloud can help you manage and secure enterprise mobility

(IBM)

Live Webcast: Office 365 business-driven provisioning deep dive

(OKTA)

When it Needs to get Done at 2am., That's when you can rely on CA Workload Automation

(CA Technologies)

A special feature from ZDNet & TechRepublic

Cyberwar and the Future of Cybersecurity

Today's security threats have expanded in their scope and seriousness. There can now be millions -- or even billions -- of dollars at risk when information security isn't handled properly. And beyond that, cybersecurity will define many of the international conflicts of the future.


We want to hear from you. The TechRepublic product team wants your input on making our app better. Tell us your opinion, take our short survey.

Connect with TechRepublic

Visit the Subscription Center to get other free newsletters, manage your account settings or to be removed from TechRepublic communications.

The e-mail address for your subscription is habib2best@gmail.com.

Unsubscribe | Send Feedback | FAQ | Advertise | Privacy Policy

© 2016 CBS Interactive, Inc. All rights reserved.

TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic

235 Second Street

San Francisco, CA 94105

U.S.A.

No comments:

Post a Comment