Remove tag security-rule
article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

This means imaging the “art of the possible” for a new future using a cloud computing model to deliver transformative change. The invention of the transistor in 1947 can be considered the seed for the Information Revolution, because the transistor is at the heart of every electronic device used today! Figure 2: Information Explosion.

article thumbnail

Apple founder Steve Wozniak interview, answers your Tweeted questions | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Windows 7 Microsofts Windows 7 arrived in late 2009 and kicked off a PC upgrade cycle thats expected to. Hot Topics iPhone iPad Enterprise 2.0 Microsoft Office Green tech Smart phones Collaboration 2.0

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

What role might the security industry have in identifying or even stopping it? Welcome to the hacker mind, in original podcast from for all security. I'm a principal on the security team at Cybereason, and I'm also a digital forensics instructor at the SANS Institute, Grooten: Martijn Grooten. It's natural.

article thumbnail

The Hacker Mind Podcast: EP 69 Self-Healing Operating Systems

ForAllSecure

It’s time to evolve beyond the UNIX operating system. OSes today are basically ineffective database managers, so why not build an OS that’s a database manager? Michael Coden, Associate Director, Cybersecurity, MIT Sloan, along with Michael Stonebreaker will present this novel concept at RSAC 2023. He died prematurely on April 23 in 2021.