Remove Course Remove Libraries Remove Military Remove Mining
article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

As is now traditional, I’ve installed myself in the porter’s chair next to the fire in the library, ready to recap some of the year’s more newsworthy information security events. that the crooks were only able to mine a paltry $24 – which Coinhive refused to pay out anyway. And, of course, on 25 May the GDPR came into effect.

article thumbnail

Web 2 Preview: DigitalGlobe: The World Is The Index

John Battelle's Searchblog

Those images are, of course, digital. Of course it is. Mine is, but then again, that happens a bit more frequently than your average bear, I'll admit. In essence, the US Government uses DigitalGlobe for the same reason it uses FedEx to move military supplies around the world: it's just faster, better, cheaper, and easier.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A brief history of data and how it helped change the world

Collibra

It involved thousands of workers, each of whom required a daily ration of food, which of course had to be grown, harvested and delivered on schedule. . Cloud storage, text mining and social network analytics are vital 21 st century tools. As a result, military medical care was reformed. . Data collection is what we do.

IT 52
article thumbnail

Sergeant Dennis Fisher and Marine Corps Combat Photography in Vietnam

Unwritten Record

Upon graduation everyone was assigned a Military Occupational Specialty (MOS) and sent off to train for it. Mine was 0311 which was an infantry rifleman, and I was sent off for advanced infantry training. ” But of course I didn’t. DF: That is a story in itself but I’ll keep it short. Each roll of film held 36 exposures.

article thumbnail

EP 49: LoL

ForAllSecure

Sometimes it can be really complex DLLs and they call that hijacking or DLL hijacking and what they'll do is they'll use a legitimate program that depends on a library, bring their malicious library with them and it gets sometimes side loaded. Sometimes it can be really complex DLLs and they call that hijacking or DLL hijacking.

article thumbnail

An Update on Still Picture Catalog Additions

Unwritten Record

Army Signal Corps Photographs Of Military Activity During World War II and The Korean Conflict. This series consists of bound photo albums that document American military activities. That said, through the course of reference activities, select scans have been made from original 80-GK transparencies. Submarine Mine Explosion.