Remove Hardware Remove Internet Remove Operating Systems Remove Transportation
article thumbnail

DIDComm and the Self-Sovereign Internet

Phil Windley

Because of its general nature and inherent support for self-sovereign relationships, DIDComm provides a basis for a self-sovereign internet much more private, enabling, and flexible than the one we've built using Web 2.0 Transport-agnostic. A Self-Sovereign Internet. technologies. DID Communications Protocol. Interoperable.

article thumbnail

Naturally Better Security: Leveraging the power of nature to enhance Internet security

CTOvision

Solutions inspired by nature are being applied to diverse fields including energy production, medicine and healthcare, architecture, food production, transportation and manufacturing. It also ensures that an enterprise’s encryption keys are protected by an advanced hardware security module.

Security 150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Full Steam Ahead: CIO Kopal Raj of WABTEC on staying ‘on-track’ with AI, IoT and sustainability goals

CIO Business Intelligence

With a mission to revolutionize the future of global mobility, WABTEC delivers transformative transportation systems that quite literally propel the world forward. As a major transportation player in the industry, we have signed up to reduce the carbon footprint generated by locomotives and passenger trains.

article thumbnail

The Generative Self-Sovereign Internet

Phil Windley

Summary: The self-sovereign internet, a secure overlay on the internet, provides the same capacity to produce change by numerous, unaffiliated and uncoordinated actors as the internet itself. This article explores the properties of the self-sovereign internet and makes the case that they justify its generativity claims.

Internet 135
article thumbnail

Technology Short Take #44

Scott Lowe

As described in this Metacloud blog post , vxfld is designed to “handle VXLAN traffic from any operationg system or hardware platform that adheres to the IETF Internet-Draft for VXLAN” Nir Yechiel recently posted part 1 of a discussion on the need for network overlays. Servers/Hardware.

Linux 60
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

The Internet of Things presents us with both convenience and inconvenience at the same time, suddenly everything is smart is hackable again with startups sometimes repeating security mistakes made decades ago in the rush to market toys. The question is, who is hacking the internet of things today, and how does one even get started?

article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

The Internet of Things presents us with both convenience and inconvenience at the same time, suddenly everything is smart is hackable again with startups sometimes repeating security mistakes made decades ago in the rush to market toys. The question is, who is hacking the internet of things today, and how does one even get started?