Category: IM
-
How to Design — And Defend Against — The Perfect Security Backdoor
Bruce Schneier: How to Design — And Defend Against — The Perfect Security Backdoor
By
·
-
Google CIO Ben Fried on How Google Works
Build your own cloud, don’t trust providers 🙂 Google CIO Ben Fried on How Google Works
By
·
-
Reverse Engineering a D-Link Backdoor
How not to invent your own security! Reverse Engineering a D-Link Backdoor
By
·
-
Gartner Identifies the Top 10 Strategic Technology Trends for 2014
Being first to talk about 2014 Gartner Identifies the Top 10 Strategic Technology Trends for 2014
By
·
-
Interesting Resources for Technical Operations Engineers
FYI… Interesting Resources for Technical Operations Engineers
By
·
-
Banking decomposed or decomposing banks
Quick reminder about disruption in banking! Banking decomposed or decomposing banks
By
·
-
Swiss to vote on 2,500 franc basic income for every adult
Democracy rules! Swiss to vote on 2,500 franc basic income for every adult
By
·
-
Detecting program-tampering in the cloud
Complementary to homomorphic encryption. Detecting program-tampering in the cloud
By
·
-
Facebook’s check-in based free Wi-Fi rolling out nationally with Cisco’s help
Win-Win for merchants and Facebook, but what about customers? Facebook’s check-in based free Wi-Fi rolling out nationally with Cisco’s help
By
·
-
How bout them apples
Apple collecting iPhone active usage time via EXIF – why? How bout them apples
By
·