article thumbnail

Symantec Government Symposium 11 March 2014 at the Renaissance Hotel Washington DC

CTOvision

Wolf Tombe , CTO, U.S. Travis Howerton , CTO, NNSA. David Shive , Director, Office of Enterprise Infrastructure, GSA IT. Dr. Alissa Johnson , Deputy CIO, Office of Administration, Executive Office of the President. Dr. Sasi Pillay , CTO for IT, NASA. Dr. Michael Valivullah , CTO, NASS, USDA.

Symantec 261
article thumbnail

Disney Does Data! With Magic Bands park visitors get a better experience (and Disney knows more about you than you would ever believe)

CTOvision

Disney World has 5 parks and 25 hotels on their property, not including the countless restaurants and other amenities. With a simple scan of their band users will be able to purchase food and beverage, check into FastPass, and even use it as a hotel room key. To me, what Disney is doing is not as bad as tracking your Internet use.

CTO Hire 279
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

NFTs and the monetization of hope

Vox

Much of what’s going on in crypto, perhaps especially in Web3 (the supposed next version of the internet) and NFTs (unique digital bits), is pretty scammy and predatory. But then in the middle of a Herald Square hotel diner, Mitchell hits the nail on the head. We hope that the future is something that delivers greater good.”.

article thumbnail

IT leaders rethink the people part of business continuity

CIO Business Intelligence

Wright’s IT department has four staffers in Russia, and he works with a consulting firm that supplies him with about 25 workers — half from Russia and half from Ukraine. Monish Darda, CTO and co-founder of software company Icertis, says his executive team thought about such topics in response to the pandemic. Monish Darda.

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

That, of course, was not all, but it is an example of how someone -- anyone on the internet -- can take a photo or blog post or Yelp review from social media, or some other seemingly random open source item and tie it back to a crime. Which then I could configure to get on the internet, you know.