Remove category general
article thumbnail

Capture the Flag events and eSports

Adam Shostack

Capture the Flag Events (CTFs) and electronic Sports (eSports) are good examples of a relatively new trend. Now take that, and imagine that for some people, the game is a video game and the lawn is a network. If your mind is not blown already, here’s a crowd of about six hundred people cheering for a video game to start.

article thumbnail

The Hacker Mind Podcast: The Hacker Revolution Will Be Televised

ForAllSecure

And DARPA made the event interesting. But also like vector graphics, like video games, there's, you know that so we were doing Capture the Flag events and building hackable video games. Perhaps the most common is Jeopardy style, where you have a board with categories and the questions get progressively harder in each.

IT 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Learn Competitive Hacking with picoCTF

ForAllSecure

It seems that preparing for, or even playing a game of capture the flag, might be a great way to expose any educational gaps, if not generally improve and deepen the security skills, you might already possess. Kearns: So for us, we typically have six categories. Vamosi: Okay, we have six categories across the board.

article thumbnail

Documentation Theory for Information Governance

ARMA International

It is important to note that this article does not claim that a documentary focus is a major departure from conventional scholarly or professional approaches to information governance, or even to information generally. The following discussion is arranged into three main sections.

article thumbnail

Understanding the different types and kinds of Artificial Intelligence

IBM Big Data Hub

Our collective understanding of realized AI and theoretical AI continues to shift, meaning AI categories and AI terminology may differ (and overlap) from one source to the next. However, the types of AI can be largely understood by examining two encompassing categories: AI capabilities and AI functionalities.

article thumbnail

Information Architecture for Audio: Doing It Right - Boxes and Arrows: The design behind the design

ChiefTech

Boxes And Arrows : The Design Behind the Design Register or Log In Search Stories Ideas Forums People Events Jobs About December Issue, 2008 Jens Jacobsen 32 Reputation points Jens likes writing for multimedia and loves tracking down usability issues. In some cases, text is a better choice and in other cases it’s video.

article thumbnail

What is Network Security? Definition, Threats & Protections

eSecurity Planet

Threats fall into the following main categories: Bad Users Bad users consist of misconfigured apps, hackers, and other unauthorized users that intentionally, or unintentionally attempt to access network resources. What Are the Main Network Security Threats? See also Activity Monitoring to Control Bad Intentions, below.