Remove 2005 Remove Authentication Remove Network Remove Open Source
article thumbnail

The Generative Self-Sovereign Internet

Phil Windley

In 2005, Jonathan Zitrain wrote a compelling and prescient tribute to the generative capacity of the Internet and its tens of millions of attached PCs. This kind of "layer" is called an overlay network. An overlay network comprises virtual links that correspond to a path in the underlying network. click to enlarge).

Internet 135
article thumbnail

The Hacker Mind Podcast: Digital Forensics

ForAllSecure

It was for UNIX systems and it was created by Dan Farmer and Wheat-say Vene-ma, who then co-authored a book in 2005 called Forensic Discovery. Vamosi: So you’re CISO at a major corporation and all of sudden there’s been a ransomware attack in your network, and it’s spreading throughout your infrastructure.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Seven Trends and Predictions for 2017

CTOvision

Their Mesos framework is built on open source tools: Apache Spark, Apache Mesos, R, and Docker. AirBnB has released the platform to the entire travel industry as open source. In 2005 it seemed the logical way to solve the rapid provisioning and under-utilization problem. Trend #5—Upset in Public Cloud.

Trends 150
article thumbnail

Geek of the Week: Tech vet Dick Hardt searches for a better way to verify your ?internet identity?

GeekWire

Dick Hardt has often been “early to the new,” as he puts it: Microsoft Windows in 1986, neural networks in 1989, the internet in 1993, open source in 1995, and even Burning Man in 1999. back in 2005. (Photo courtesy of Dick Hardt). What we need is a user-centric approach to identity, what I called Identity 2.0

Internet 112
article thumbnail

The Laws of Identity

Phil Windley

In 2005, Microsoft's Chief Identity Architect, Kim Cameron wrote an influential paper called The Laws of Identity (PDF). Kim had been talking about and formulating these laws in 2004 and throughout 2005. It's no coincidence that Internet Identity Workshop got started in 2005. This is an excellent description of Sovrin.

Banking 88
article thumbnail

Life-Like Identity: Why the Internet Needs an Identity Metasystem

Phil Windley

In 2005, Kim Cameron, Microsoft’s Chief Identity Architect, published the Laws of Identity (PDF), a paper that laid out seven important principles for how digital identity should work. The open-source nature of the reference code base for the metasystem ensures that multiple parties can bring interoperable solutions to market.

Internet 102