Remove 2002 Remove Authentication Remove Network Remove Virtualization
article thumbnail

The Back-to-Basics Readings of 2012 - All Things Distributed

All Things Distributed

Johnson, ACM Computing Surveys (CSUR) Surveys Volume 34 Issue 3, September 2002. May 28 - Virtual Time and Global States of Distributed Systems , Friedemann Mattern, Parallel and Distributed Algorithms, North-Holland (1989) , p. Aug 11 - " On the Naming and Binding of Network Destinations ", Saltzer, J. Araújo, K.

article thumbnail

How to make Facebook secure for organizational use: no more excuses! - Trends in the Living Networks

Trends in the Living Networks

Worklight has just released a Facebook application called Workbook , reports Dan Farber , which authenticates users with an organization’s identity systems, and enables closed communication within the Workbook application between Facebook users. The same thing is happening with social networks. So the excuses are running out.

Trends 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SeanDaniel.com [tech]: Understanding SSL Certificates for client to.

Sean Daniel

In this post I talked primarily about how the server is authenticated to the client by using a “root” certificate that the client already trusts, thus establishing a trust relationship with a website you are at without actually having been there before. Virtualization. That’s a tall order to boot!! Awesomeness.

Windows 45
article thumbnail

The future of adult entertainment - Trends in the Living Networks

Trends in the Living Networks

Similarly, many a relationship has been terminated because one party (quite often, a woman, it seems) finds evidence of physical or virtual infidelity in sent messages. What is much more likely is that virtual worlds and fully sensory experiences (i.e., If you think fully immersive virtual sex is pure sci-fi, youre right.

Trends 108