article thumbnail

Library and Archives Canada’s journey of discovery: modernising our digital preservation infrastructure using Preservica

Preservica

On World Digital Preservation Day 2018, Sylvain Bélanger, Director General of Digital Operations and Preservation at Library and Archives Canada (LAC) discusses operating at scale, the challenges of preserving high volume born-digital content, and giving Canadians greater access to Canada’s continuing memory.

article thumbnail

US disrupts Russia-linked Snake implant’s network

Security Affairs

The malware has been designed and used by Center 16 of Russia’s Federal Security Service (FSB) in cyber espionage operations on sensitive targets. The development of the Snake malware, aka Uroburos , started in late 2003 and was completed in early 2004. “The FSB used the OpenSSL library to handle its Diffie-Hellman key exchange.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Professor Chris Whitty and author Matt Haig are among the recipients of CILIP Honorary Fellowships

CILIP

s CILIP honorary fellowships represent the breadth and scope of the information, knowledge management and library profession. Chris has been awarded Honorary Fellowship of the Chartered Institute of Library and Information Professionals in recognition of his services to the role of evidence in public health.

article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

In 2004, Giovanni Bisignani, CEO of the International Air Transport Association (IATA), made the case for the travel industry to reimagine its future: “Internet savvy travelers appreciate the convenience … Our mission is to keep the value and eliminate the cost. The travel industry has already reimagined its future. e-Discovery.

article thumbnail

Security Keys

Imperial Violet

The first instance of this that Google can find is from Bill Gates in 2004 , although I suspect it wasn’t the first. Security Keys are another attempt address this problem—initially in the form of a second authentication factor but, in the future, potentially as a complete replacement. Contrasts with existing solutions.

Security 116
article thumbnail

The History of Malware: A Primer on the Evolution of Cyber Threats

IBM Big Data Hub

2004: Mydoom worm Similar to ILOVEYOU, the Mydoom worm also used email to self-replicate and infect systems around the world. If the infected PC is a client in a local network, such as a library or office, any shared resources are targeted first. What do these two malware attacks have in common?

article thumbnail

The history of Kubernetes

IBM Big Data Hub

Each virtual machine has a guest operating system (OS), a virtual copy of the hardware that the OS requires to run and an application and its associated libraries and dependencies. Modern-day containers are defined as units of software where application code is packaged with all its libraries and dependencies.

Cloud 116