Remove Airlines Remove Authentication Remove Development Remove Internet
article thumbnail

Averting turbulence in the air

CIO Business Intelligence

The diversification of payment methods and gradual increase in the volume of online transactions have cast a spotlight on the need for payment security compliance within the airline industry. Since Erin has a limited budget, one of the first things she might do is go to the internet and browse through meta-search engines looking for a deal.

article thumbnail

10 emerging innovations that could redefine IT

CIO Business Intelligence

The main constituency: Any developer who will happily trade a bit of precision for a big savings in electricity. Physical security of digital systems When most IT people think of computer security, they think of clever hackers who infiltrate their systems through the internet.

Tools 140
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Want to change the world? ‘Secure’ the Next Killer App in IoT

The Investing Edge

“What’s the next killer app in the Internet of Things?”. to iWatch: The Internet of Things” suggested several groundbreaking ideas that might be in the running. to iWatch: The Internet of Things” suggested several groundbreaking ideas that might be in the running. Pick one: this is a requirement.

Security 119
article thumbnail

Fed Tech News Roundup 8 July 2015

CTOvision

The Army, therefore, is planning to further incorporate the open VICTORY network development standard. Privileged user authentication and PKI are. All United Airlines flights in US grounded: Computer “glitch” cited as cause CTOvision (Today) - The entire U.S. Marine Corps, Interior Dept. The transparency.

Insurance 150
article thumbnail

SeanDaniel.com [tech]: Understanding SSL Certificates

Sean Daniel

Certificates provide two purposes: Authenticating the server to the client Providing encryption between the server and the client I will cover the authenticating the server to the client in this part 1 post, and will write a part 2 post that handles the second part of encryption. Sure, I trust the state government. at 10:32 AM.

Windows 45
article thumbnail

Building Identity Systems on the Sovrin Network

Phil Windley

Perhaps the most familiar example of a metasystem is the internet. The internet is not so much a communications system as it is a system for building communication systems that all interoperate. When I say "digital identity system" most people probably think of just one thing: authentication. Airline or train ticket.

System 87
article thumbnail

Generative Identity

Phil Windley

This article describes the implementation self-sovereign identity through protocol-mediated credential exchange on the self-sovereign internet, examines its properties, and argues for it generative nature from those properties. The self-sovereign internet is labeled "Layer Two" in this figure. Verifiable Credentials.