article thumbnail

DIDComm and the Self-Sovereign Internet

Phil Windley

Because of its general nature and inherent support for self-sovereign relationships, DIDComm provides a basis for a self-sovereign internet much more private, enabling, and flexible than the one we've built using Web 2.0 Once Bob's agent receives the message, it authenticates that it came from Alice and decrypts it. technologies.

article thumbnail

Guidance Software Federal Summit 6 March 2014

CTOvision

By Bob Gourley 2014 Guidance Software Federal Summit: Cybersecurity | E-Discovery | Enterprise Forensics. As an information security trailblazer, Mr. Bigman participated in developing security measures for Government computers well before commercial industry found the Internet. Cyber Security'

Software 257
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BGP: What is border gateway protocol, and how does it work?

Network World

In the latter case, Border Gateway Protocol (BGP), the routing protocol used by the global internet, is used to find the best path by weighing the latest network conditions based on reachability and routing information. BGP has been called the glue of the Internet and the postal service of the internet.

Internet 124
article thumbnail

Security attacks and countermeasures

Cloud Musings

Cyber attacks are on the increase, with six of the top 10 largest incidents occurring in 2013 (402M) and 2014 (469M to date) [1]. For example, in the first half of 2014, 84.6% MINIMIZING OR AVERTING ATTACKS The best protection against malware includes anti-malware and Internet security software. from the government.

Security 159
article thumbnail

Forget fingerprints; Iris scans could validate mobile payments

Network World

While mobile payment systems like Apple Pay and Samsung Pay are growing, they haven't lived up to the hype that surrounded their arrival in 2014. INSIDER: 5 ways to prepare for Internet of Things security threats. INSIDER: 5 ways to prepare for Internet of Things security threats.

Mobile 60
article thumbnail

Advantages of Virtual Textbooks over Print Textbooks

Kitaboo

The value-added services such as geo-tagging, authenticity confirmation, and anti-counterfeiting are not costly to offer. They can convert a digital textbook into more of an Internet of Things (IoT) book with identifiable images, text, and pages. Digital Publishing / January 23, 2014. Digital Publishing / March 19, 2014.

article thumbnail

Why DRM-Protected eBooks Are the Preferred Choice for Educational Publishing Today?

Kitaboo

The internet is a godsend for educational publishers to get their textbooks published online. If left unregulated, the internet could also be a nightmare. DRM Protects the Authenticity of the Content. Digital Publishing / March 20, 2014. What Makes DRM eBooks One of the Most Sought-After K12 Content Solutions?

eBook 78