Remove 2019 Remove Libraries Remove Manufacturing Remove Mining
article thumbnail

The Week in Cyber Security and Data Privacy: 1 – 7 January 2024

IT Governance

KG Source 1 ; source 2 (New) Manufacturing Germany Yes 1.1 TB Halara Cannabis Source (New) Manufacturing USA Yes >1,000,000 Proax Technologies Ltd. Source 1 ; source 2 (Update) Manufacturing USA Yes 735 Osteopathic Healing Hands Source (New) Healthcare USA Yes 707 Marathon Coach, Inc.

article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

As is now traditional, I’ve installed myself in the porter’s chair next to the fire in the library, ready to recap some of the year’s more newsworthy information security events. The year started with the revelation of Spectre and Meltdown – major security flaws affecting processors manufactured by Intel, ARM and AMD.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

For example, organizations can re-package video libraries, songs, research, and course material for different audiences – customers, researchers, academics, students, and so on; and they can monetize the content via CaaS. DRM is used by publishers, manufacturers and IP owners for digital content and device monitoring” (Techopedia 2021).

article thumbnail

MY TAKE: How blockchain technology came to seed the next great techno-industrial revolution

The Last Watchdog

Blockchain technology in 2019 may prove to be what the internet was in 1999. Bitcoin mining, for instance, is a contest to solve a difficult cryptographic puzzle in order to earn the right to add the next block of validated ledger entries to the historical chain of ledger blocks.