Remove 2002 Remove Computer and Electronics Remove Events Remove Video
article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

This means imagining the “art of the possible” for a new future using a cloud computing model to deliver transformative change. Implied herein is a cloud computing model that ARMA (2016) defines as “A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g.,

article thumbnail

Capture the Flag events and eSports

Adam Shostack

Capture the Flag Events (CTFs) and electronic Sports (eSports) are good examples of a relatively new trend. Now take that, and imagine that for some people, the game is a video game and the lawn is a network. If your mind is not blown already, here’s a crowd of about six hundred people cheering for a video game to start.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spotlight Podcast: At 15 Cybersecurity Awareness Month Grows with Cyber Risk

The Security Ledger

Russ Schrader of the National Cybersecurity Alliance (NCSA) and Angel Grant of RSA * join us to discuss the history of Cybersecurity Awareness Month and how the event is changing to meet growing demand. . The Computers in our Pockets. October is Cybersecurity Awareness Month. See also: DHS announces New Cybersecurity Strategy ].

article thumbnail

Top Database Security Solutions for 2021

eSecurity Planet

Starting our list of the top database security vendors is the multinational cloud computing company, Alibaba Cloud. As is true with any cloud service, the Seattle cloud computing company emphasizes the shared responsibility model. One such example is the addition of cloud computing service Microsoft Azure in 2008. Alibaba Cloud.

Security 118
article thumbnail

European Data Privacy Day Expert Panel Provides 30-Year Retrospective on UK Data Protection

Hunton Privacy

The system required controllers to complete lengthy questionnaires, reflecting the fact that, at that time, data processing took place on a handful of large mainframe computers. A Period of Significant Legislative Change – 1994 to 2002. She served until December 2002. During her tenure, people began to speak of “privacy.”.