The typical picture of a hacker has often been one of an introverted, misunderstood teen with a great deal of repressed anger. Launching an attack and disabling thousands of computers somehow seems to compensate for those feelings. Increasingly, however, while the hacker profile remains much the sam...
They are the bane of many consumers' existence, but the boon to many corporate executives' business plans: Speech recognition systems can make consumers' blood boil as they unsuccessfully try to respond to prompts, such as "Enter your account number," but the technology can also help executives redu...
IBM today announced it is contributing proprietary voice-recognition software to two different open-source software groups. The Apache Software Foundation will receive Reusable Dialog Components (RDCs), used for handling simple words for dates, times and locations. In addition, IBM is proposing a pr...
On all accounts where it's available
Limited to critical accounts like banking and email
Only when enforced by the service provider
Plan to start using soon
Prefer not to use
What is two-factor authentication?
Enter your Username and Password to sign in.