Brains, Security and Hierarchical Temporal Memory (HTM) And What? Please Read On…

McCourt, Mark
March 2007
Security: Solutions for Enterprise Security Leaders;Mar2007, Vol. 44 Issue 3, p10
Trade Publication
The article explains that Jeff Hawkins is an engineer and founder of security software solutions developer Numenta. Hierarchical Temporal Memory (HTM) is a computer system developed by Hawkins that functions similar to the human brain. HTM promises to have a direct impact on the execution of computer security, on the security industry, and on security executives.


Related Articles

  • SMEs offered plug-in authentication unit. Goodwin, Bill // Computer Weekly;2/15/2005, p8 

    This article reports that small businesses are being offered low-maintenance plug-in units that will allow them to secure computers by replacing insecure passwords with two-factor authentication. The devices, to be unveiled by RSA Security Inc. this week, offer the same level of security used by...

  • A Security Module for Car Appliances. Pang-Chieh Wang; Ting-Wei Hou; Jung-Hsuan Wu; Bo-Chiuan Chen // Proceedings of World Academy of Science: Engineering & Technolog;Dec2007, Vol. 36, p411 

    In this paper we discuss on the security module for the car appliances to prevent stealing and illegal use on other cars. We proposed an open structure including authentication and encryption by embed a security module in each to protect car appliances. Illegal moving and use a car appliance...

  • FACE-OFF: Is anomaly detection the best way to prevent virus and worm attacks? Morville, Paul; Arbel, Gil // Network World;3/13/2006, Vol. 23 Issue 10, p38 

    The article focuses on the effectiveness of a new security technology for the detection of computer network threats. According to the author a recent network behavior analysis has been one of the most robust and scalable security technologies for network threat detection. The network behavior...

  • 2010 Innovators. Stephenson, Peter // SC Magazine: For IT Security Professionals (15476693);Dec2010, Vol. 21 Issue 12, p36 

    The article discusses what it takes to be in the periodical's 2010 Innovators. According to the author, companies need to take the security business as seriously as security technology. He mentions that being an innovator demands innovation. Most of the 2010 Innovators say they looked for niches...

  • Intrusion Detection System based on Learning Fuzzy Rules and Membership Functions using Genetic Algorithms. Soleiman, Ezat; Fetanat, Abdelhamid // International Journal of Computer Applications;Jul2013, Vol. 73 Issue 1-22, p44 

    With the rapid expansion of Internet in recent years, computer systems are facing increased number of security threats. Despite numerous technological innovations for information assurance, it is still very difficult to protect computer systems. Therefore, unwanted intrusions take place when the...

  • Panel: Anti-Virus Measures Are A Critical Business Process. Trembly, Ara C. // National Underwriter / Life & Health Financial Services;2/2/2004, Vol. 108 Issue 4, p21 

    Assesses anti-virus technology on businesses. Establishment of security policies; Cost paid by companies for security; Effects of computer virus on productivity.

  • IP security breaks in to more than just video. Ziobron, Betsy // Cabling Installation & Maintenance;Aug2006, Vol. 14 Issue 8, p31 

    The article provides updates on the Internet Protocol (IP)-based security systems. It also discusses the benefits of IP technology on other security applications, the functions of IP-based security programs and the issues concerning the new technology. One primary benefit of the technology is...

  • Professional Evolution. Heiser, Jay G. // Information Security;Nov2004, Vol. 7 Issue 11, p24 

    Focuses on how information security employees could achieve success in their profession. Tips for professionals in adapting with technological innovations; Developments in the use of firewalls; Information on how success is measured in the profession.

  • Invest in the right people & tools. Olney, Matthew // SC Magazine: For IT Security Professionals (15476693);Nov2010, Vol. 21 Issue 11, p50 

    The article emphasizes the importance of choosing the right people and tools to invest on with regard to cyber security. According to the author, companies should make it sure that their teams are competent and that the vendors are supporting their ability to develop customized and innovative...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics