Remove Architecture Remove Licensing Remove Open Source Remove Transportation
article thumbnail

Technology Short Take #37

Scott Lowe

A fan of network virtualization might also say that decomposing today’s complex physical networks into multiple simple logical networks on top of a simpler physical transport network—similar to Mike’s suggestion of converging on a smaller set of reference architectures—might also help. (Of

Vmware 60
article thumbnail

The Hacker Mind Podcast: Fuzzing Message Brokers

ForAllSecure

As I produce this episode, there's a dangerous new vulnerability known informally as Log4Shell, it’s a flaw in an open source Java logging library developed by the Apache Foundation and, in the hands of a malicious actor, could allow for remote code injection. Vamosi: The idea behind Open Source is great.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Generative Identity

Phil Windley

Here are the most important: Private — Privacy by Design is baked deep into the architecture of the identity metasystem as reflected by several fundamental architectural choices: Peer DIDs are pairwise unique and pseudonymous by default to prevent correlation. Drivers license. Business licenses. Wire authorizations.

article thumbnail

Life-Like Identity: Why the Internet Needs an Identity Metasystem

Phil Windley

When you hand your driver’s license to the bartender to establish your legal age, we would be surprised if she could remember all the detailed information it contains, like your address, and do that for every patron she encountered. It implies we need a simple encapsulating protocol (a way of agreeing on and transporting things).

Internet 102