Our WLan is secured with WEP2 protocol because it is much harder to break due to the 128-bit key it uses, even with this protocol we had a security breach after one of our workers gave the key to one of his friends. Now we are working on a system that would allow the information to be instantly available anywhere across the enterprise, the company we are working with also have great BPM systems that are worth trying.
Drones are, in essence, flying autonomous vehicles. Pros and cons surrounding drones today might well foreshadow the debate over the development of self-driving cars. In the context of a strongly regulated aviation industry, "self-flying" drones pose a fresh challenge. How safe is it to fly drones in different environments? Should drones be required for visual line of sight – as are piloted airplanes? Join EE Times' Junko Yoshida as she moderates a panel of drone experts.