Remove tag consumer-protection
Remove Computer and Electronics Remove Examples Remove How To Remove Security
article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

This means imaging the “art of the possible” for a new future using a cloud computing model to deliver transformative change. Part 3 will discuss how to manage the various DT risks. This includes defining the product scope of the DT journey and the digital products and services that will deliver transformative change for a new future.

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

For example, in 2009, the Obama administration provided financial incentives to utilities in the United States. Vamosi: But as someone who wrote a book questioning the security of our mass produced IoT devices, I wonder why no one bothered to test and certify these devices before they were installed? I'm Robert Vamosi.