Remove tag twitter
article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

That is almost 2000 times more data in less than 20 years (Press 2013, Patrizio 2018). This includes defining the product scope of the DT journey and the digital products and services that will deliver transformative change for a new future. Part 3 will discuss how to manage the various DT risks. This is a best-case scenario. Cloud-First.

article thumbnail

I'm Open Sourcing the Have I Been Pwned Code Base

Troy Hunt

Let me explain: HIBP Has Always Been Open in Spirit I've already written extensively about the architecture of the system across many of the 128 previous blog posts tagged as Have I Been Pwned. The very second blog post on that tag was about how I used Azure Table Storage to make it so fast and so cheap. Let me explain why and how.

Passwords 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Predictions From Last Year: How I Did (2012 Edition)

John Battelle's Searchblog

I hope 2013 keeps pace. Predictions 2012: #1 – On Twitter and Media - Twitter will become a media company, and the only “free radical of scale” in our Internet ecosystem. . Twitter is a major force in media now, a statement that could not be said just one short year ago. He’s not anymore.).

Marketing 101
article thumbnail

Predictions 2014: A Difficult Year To See

John Battelle's Searchblog

If you’re wondering what’s made me feel this way, a couple of choice articles from 2013 (and there were too many to count) should do the trick. The post Predictions 2014: A Difficult Year To See appeared first on John Battelle's Search Blog. But while the topic is orthogonal at best, it’s weighing heavily on me.

Marketing 111
article thumbnail

Project Svalbard: The Future of Have I Been Pwned

Troy Hunt

Back in 2013, I was beginning to get the sense that data breaches were becoming a big thing. Increasingly, I was writing about what I thought was a pretty fascinating segment of the infosec industry; password reuse across Gawker and Twitter resulting in a breach of the former sending Acai berry spam via the latter. It's alive! "Have

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

It's operating in an era of increasingly large repositories of personal data held by both private companies and governments alike. India's Aadhaar implementation is the largest biometric system in the world, holding about 1.2 billion locals' data. They claim that they're hack-proof. Can you prove otherwise? Of course it can!

Security 111