article thumbnail

CloudVelocity Announces $13M Funding, New Tools for AWS.

Data Center Knowledge

More importantly, the One Hybrid Cloud technology adds security features that may make cloud adoption more accessible for enterprise customers with stringent compliance and security requirements. December 2005 (10). November 2005 (8). October 2005 (9). September 2005 (15). August 2005 (2). Contact Us.

Tools 205
article thumbnail

Tech Moves: Expedia board director Skip Battle resigns; Madrona promotions; Vacasa’s new CFO

GeekWire

He originally joined the travel company’s board in 2005. AskJeeves was acquired in 2005 by IAC, the internet media company run by Barry Diller, who is also chairman of Seattle-based Expedia Group. The 9-year old company provides security technology and analysts, with a focus on healthcare, financial and government organizations.

Groups 74
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Broadcom’s Approach Towards Delivering Customer Value

CIO Business Intelligence

Customers can also operate with confidence as a result of our actions in software, such as our migration of Symantec Web Security Service and Cloud Access Security Broker onto Google Cloud. From September 2005 to January 2008, he served as chairman of the board of Integrated Device Technology. Securities Act of 1933, as amended.

Vmware 87
article thumbnail

Identity and Consistent User Experience

Phil Windley

The web, and the internet for that matter, never had a consistent user experience for authentication. There's a saying in security: "Don't roll your own crypto." Kim Cameron gave us a model back in 2005 when he introduced Information Cards. That's unfortunate. At least not one that caught on. But how do we do that?

article thumbnail

The Self-Sovereign Internet

Phil Windley

If you're not up to speed with DIDComm and how it creates a secure overlay network on TCP/IP, you should be. DIDs and DID-based Communication or DIDComm form the second layer of the SSI stack, providing a secure communications layer for the exchange of identity information via verifiable credentials. claim it by logging in).

article thumbnail

The Generative Self-Sovereign Internet

Phil Windley

Summary: The self-sovereign internet, a secure overlay on the internet, provides the same capacity to produce change by numerous, unaffiliated and uncoordinated actors as the internet itself. In 2005, Jonathan Zitrain wrote a compelling and prescient tribute to the generative capacity of the Internet and its tens of millions of attached PCs.

Internet 135
article thumbnail

Goodbye, NAC. Hello, software-defined perimeter

Network World

Those of us who’ve been around security technology for a while will remember the prodigious rise of network access control (NAC) around 2006. The early 2000s produced a steady progression of internet worms, including Code Red (2001), Nimda (2001), SQL Slammer (2003), Blaster (2003), Bagel (2004), Sasser (2004), Zotob (2005), etc.