Posted on 01 November 2011 by Thales DIS
This week, Gemalto is heading to Washington, DC for the Smart Card Alliance’s annual government conference. We will be blogging from the event and after, as there is sure to be a lot of news regarding some of the most pressing topics in government, healthcare and trusted IDs on the Internet. Some of the topics […]
Posted on 12 June 2012 by Thales DIS
The internet will only get bigger and better. Or, that’s an impression you get from reading some of the reports compiled by the likes of Boston Consulting Group, McKinsey and any of the organizations looking at the impact of the Internet on our future economies. These reports are looking at the future of our economies, […]
Posted on 04 December 2013 by Tim Cawsey
Today’s technology doesn’t only help us do our day jobs faster and more knowledgably, it also speeds up the admin tasks that keep every good office operating well. Many workers can now do the majority of admin tasks themselves, eliminating the need for hoards of assistants and secretaries who were previously required to do everything […]
Posted on 04 February 2014 by Jennifer Dean
As Facebook turned ten years old today, it occurred to me that one out of every six people on the planet now has a Facebook profile. Facebook is now reported to have more than 1.2 billion users out of the world’s 7.2 billion people. This achievement is stunning, particularly when one considers that this ‘social […]
Posted on 02 December 2013 by Thales DIS
I’m occasionally asked: ‘Aren’t NFC payments vulnerable to hacking?” and “What if your NFC phone or card is stolen? Can’t someone just run off spending your money?” My answers are simple. Firstly, anything is vulnerable to hacking if it isn’t secured properly (even smart toilets); just make sure your NFC payment method is secured by […]
Posted on 01 February 2013 by Thales DIS
Which password do you think is easier for a hacker to crack – “Th3r3 can only b3 #1!” or “Hammered asinine requirements”? According to some new research from Carnegie Mellon University’s Institute for Software Research, it’s actually the former that is the weaker password. Why? Because the password “Th3r3 can only b3 #1!” has grammatical […]