Remove tag google
Remove 2014 Remove IT Remove Manufacturing
article thumbnail

Predictions 2014: A Difficult Year To See

John Battelle's Searchblog

The post Predictions 2014: A Difficult Year To See appeared first on John Battelle's Search Blog. But gazing into 2014 has been the hardest of the bunch – and not because the industry is getting so complicated. And yet somehow, this all leads me to my 2014 predictions. In a phrase, it’s global warming.

IT 111
article thumbnail

French Firms Rocked by Kasbah Hacker?

Krebs on Security

Other victims included one of France’s largest hospital systems; a French automobile manufacturer; a major French bank; companies that work with or manage networks for French postal and transportation systems; a domestic firm that operates a number of airports in France; a state-owned railway company; and multiple nuclear research facilities.

Passwords 267
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Srivastav 2014) See Figure 1 (HistoryComputer 2021). This includes defining the product scope of the DT journey and the digital products and services that will deliver transformative change for a new future. Part 3 will discuss how to manage the various DT risks. This is a best-case scenario. Figure 1: Illustration of Bush’s Memex.

article thumbnail

Security Keys

Imperial Violet

The first instance of this that Google can find is from Bill Gates in 2004 , although I suspect it wasn’t the first. Google Authenticator ) which produces codes that change every minute or so. Introduction. Predictions of, and calls for, the end of passwords have been ringing through the press for many years now. RSA SecurID ).

Security 118
article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

India's Aadhaar implementation is the largest biometric system in the world, holding about 1.2 billion locals' data. It's operating in an era of increasingly large repositories of personal data held by both private companies and governments alike. They claim that they're hack-proof. Can you prove otherwise? agarwal_mohit) January 5, 2018.

Security 111
article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

Environmental effects caused by pollution. This included the rapid adoption of smart meters. For example, in 2009, the Obama administration provided financial incentives to utilities in the United States. It's estimated that within the first year, over half the homes in the United States had spark meters installed. I'm Robert Vamosi.

article thumbnail

The Hacker Mind Podcast: EP 69 Self-Healing Operating Systems

ForAllSecure

It’s time to evolve beyond the UNIX operating system. OSes today are basically ineffective database managers, so why not build an OS that’s a database manager? Michael Coden, Associate Director, Cybersecurity, MIT Sloan, along with Michael Stonebreaker will present this novel concept at RSAC 2023. He died prematurely on April 23 in 2021.