April 18, 2018

Tuesday, April 10, 2018: A federal jury in Eastern District of Texas awarded VirnetX Holding Corp. (VHC) with a $502.6 million verdict against Apple Inc. finding that Apple was infringing 4 secure communications patents – providing a new chapter to the now eight-year old battle between Zephyr Cove, Nevada based VirnetX and Cupertino-based Apple, Inc.

VirnetX first sued Apple back in 2010 (6:10-cv-00417), for which the jury awarded VirnetX $368 million in damages in November 2012 plus a 1 percent ongoing royalty on iPhones. The four patents-in-suit relate generally to creating Virtual Private Network (VPN) connections from a client to server by way of sending a domain name se...

April 12, 2018

The Microsoft HoloLens has finally received its first major update in over a year, which Microsoft calls the RedStone 4. The update provides a boost to developers using the UWP (Universal Windows Platform) to develop applications for the HoloLens with ease. Mixed reality has been a top emerging technology for at least 4 years now, but despite increasing investments in mixed reality, the current industry majors have yet to sufficiently commercialize a consumer product.

The headset which weighs around 580 grams, with no wires or oddly shaped antennas popping out of it, is surely on the heavier side of the spectrum of headsets, but the weight is evenly distributed and designed...

April 11, 2018

In the present technological era, information plays a vital role and a critical asset which should be protected. Cryptography has always been the first choice for the security solution to protect the information. It is a technique for changing over plaintext into some code, known as ciphertext, which the third party can’t decrypt easily. The cryptographic information is secure, however, decryption of data at the destination end, the complete integrity of the data and availability of the data when needed are three vital aspects of cryptography. In the view of these three aspects a few methods, protocols and security standards should be followed to protect the information ove...

Please reload

Please reload

Topics