Remove 2005 Remove Authentication Remove Open Source Remove Security
article thumbnail

The Hacker Mind Podcast: Digital Forensics

ForAllSecure

It was for UNIX systems and it was created by Dan Farmer and Wheat-say Vene-ma, who then co-authored a book in 2005 called Forensic Discovery. And my background is pretty straightforward with cyber security for the past 16 years on many different levels. Even if you think you’re erasing your tracks.

article thumbnail

The Generative Self-Sovereign Internet

Phil Windley

Summary: The self-sovereign internet, a secure overlay on the internet, provides the same capacity to produce change by numerous, unaffiliated and uncoordinated actors as the internet itself. In 2005, Jonathan Zitrain wrote a compelling and prescient tribute to the generative capacity of the Internet and its tens of millions of attached PCs.

Internet 135
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Seven Trends and Predictions for 2017

CTOvision

Their Mesos framework is built on open source tools: Apache Spark, Apache Mesos, R, and Docker. AirBnB has released the platform to the entire travel industry as open source. In 2005 it seemed the logical way to solve the rapid provisioning and under-utilization problem. Trend #6—Security.

Trends 150
article thumbnail

The Laws of Identity

Phil Windley

In 2005, Microsoft's Chief Identity Architect, Kim Cameron wrote an influential paper called The Laws of Identity (PDF). Kim had been talking about and formulating these laws in 2004 and throughout 2005. It's no coincidence that Internet Identity Workshop got started in 2005. I urge you to join us in making it a reality.

Banking 88
article thumbnail

Life-Like Identity: Why the Internet Needs an Identity Metasystem

Phil Windley

An identity metasystem can remove the friction, decrease cognitive overload, and make online interactions more private and secure. In 2005, Kim Cameron, Microsoft’s Chief Identity Architect, published the Laws of Identity (PDF), a paper that laid out seven important principles for how digital identity should work.

Internet 102