Feeds

European tech innovators honoured

And the IST Prize goes to...

SANS - Survey on application security programs

A computer memory that can survive radiation, a face recognition system and a digital content "finger-printing" system to deter multimedia pirates have jointly been awarded a top European prize for innovation. The Grand Prize Winners of the 2006 European IST Prize - Dutch firm Cavendish Kinetics, Guardia of Denmark and French firm Advestigo - will each receive €200,000 in recognition of their achievements in technology innovation.

Cavendish Kinetics caught the judge's eye with its Nanomech memory technology, while Guardia's Control System biometric kit and Advestigo's AdvestiSEARCH also impressed.

Seventeen more prizes of €5,000 each were awarded to other finalists in the competition. The top 20 projects were selected by the European Commission on 16 March from a total of 213 applicants from 28 European countries. It's hoped that the recognition awarded these young companies in competing in the competition will boost the visibility and help them to gain access to sources of finance.

The European IST Prize is organised by the European Commission and the European Council of Applied Sciences, Technologies and Engineering (Euro-CASE). The competition is open to organisations that develop innovative information technology products that have the potential to become a commercial success. Independent experts, proposed by Euro-CASE, judged entries to the competition and recommended winners to the European Commission. The prizes were awarded by EU Information Society and Media Commissioner Viviane Reding, Hubert Gorbach, Austrian Vice Chancellor and Minister for Transport, Innovation and Technology, and Eduard Mainoni, State Secretary for Technology during in the Hofburg Palace in Vienna on Wednesday.

During the presentation, Commissioner Reding said that information and communication technology is responsible for 45 per cent of the growth in labour productivity between 2000 to 2004, She called for more investment in hi-tech industries but added that "we must also ensure that this investment feeds a chain of innovation and growth throughout the economy". ®

Top three mobile application threats

More from The Register

next story
Red-faced LOHAN team 'fesses up in blown SPEARS fuse fiasco
Standing in the corner, big pointy 'D' hats
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
New FEMTO-MOON sighted BIRTHING from Saturn's RING
Icy 'Peggy' looks to be leaving the outer rings
Melting permafrost switches to nasty, high-gear methane release
Result? 'Way more carbon being released into the atmosphere as methane'
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.