Remove 2002 Remove Case Study Remove Communications Remove Security
article thumbnail

A short history of intranets and what's next with social, mobile and cloud

ChiefTech

However, they had no intention of implementing any kind of sophisticated security or access control system. Real-time audio and video communication. Some called it knowledge management, but in 2002 Clay Shirky - more correctly - defined it as 'social software'. For end-users, the base line or 'native' intranet included: Email.

Cloud 89
article thumbnail

A short history of intranets and what next with social, mobile and cloud

ChiefTech

However, they had no intention of implementing any kind of sophisticated security or access control system. Real-time audio and video communication. Some called it knowledge management, but in 2002 Clay Shirky - more correctly - defined it as 'social software'. For end-users, the base line or 'native' intranet included: Email.

Cloud 40
article thumbnail

The Hacker Mind Podcast: Ethical Hacking

ForAllSecure

The US Justice Department says it will no longer prosecute good-faith security researchers, but what constitutes good-faith security research? It will no longer prosecute good-faith security research that would have otherwise violated the Computer Fraud and Abuse Act (CFAA). Is hacking a crime? Who is responsible?

IT 52