article thumbnail

This is the old ChiefTech blog.: Dreaming of Enterprise RSS functionality

ChiefTech

Attensa is a client of mine, and I live the benefits every day. We take the ability to transport email between organisations for granted and I think we need RSS to have the same abilities. Love the idea and imagination, obviously you "get" it. So I shake my head on the lack of institutionalized adoption all the time.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

16 ZB (zettabytes) of data in 2006, then 2.83 Blockchain, Provenance, and Authentic Information. From a DT perspective, how can blockchain help manage the content explosion of digital assets, control access rights, validate authentic information, confirm ownership, and so on? IDC estimated the world created.16

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Car Hacking 0x05

ForAllSecure

This is also risky, when he was arrested in 2006, the Prague Post reported that the thief had the code for 150 stolen cars still on his laptop, enough evidence to convict him. The Secure Gateway requires registration and authentication through an approved device for aftermarket use. It has to be controlled by the vendor.

article thumbnail

Top 6 Rootkit Threats and How to Protect Yourself

eSecurity Planet

This type of rootkit was developed as a proof of concept in 2006, but in 2017, researcher Joseph Connelly designed nested virtual machine rootkit CloudSkulk as part of his Masters degree work at Boise State University. using strong authentication. The rootkit does not have to modify the kernel to subvert the operating system.

article thumbnail

Email Is the Biggest Threat to Business, So Why Is Everyone Using It?

Adam Levin

Email addresses are still the main way we authenticate ourselves to do business online, and because of that email as a category represents an extremely weak link in our collective cybersecurity. That’s why it doesn’t matter that Bill Gates didn’t come through with the promise of eradicating spam by 2006.

IT 45