article thumbnail

Geek of the Week: Tech vet Dick Hardt searches for a better way to verify your ?internet identity?

GeekWire

Dick Hardt has often been “early to the new,” as he puts it: Microsoft Windows in 1986, neural networks in 1989, the internet in 1993, open source in 1995, and even Burning Man in 1999. “The internet does not have an identity layer,” said Hardt, our latest Geek of the Week. back in 2005.

Internet 109
article thumbnail

The Hacker Mind Podcast: Learn Competitive Hacking with picoCTF

ForAllSecure

She's carrying a computer around with her all the time, it's likely attached to the internet, many times a day. And so that platform is now available, like you said 365, Vamosi: The open source CTF platform is by itself. They can use the open source. Kearns: Your grandmother has a cell phone in her pocket.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Upskilling ramps up as gen AI forces enterprises to transform

CIO Business Intelligence

The emergence of the Internet could have been a death blow, but the company survived — and thrived. As soon as Stable Diffusion, the first open-source diffusion model, came out in mid-2023, the company immediately pivoted. “We Thomson Reuters is in the information business, and has been for a long time.

article thumbnail

DID Messaging: A Batphone for Everyone

Phil Windley

In my last post, I wrote about a demo given by BCGov, Spark NZ, and Streetcred ID at the last Internet Identity Workshop. This capability requires the use of a DID Messaging protocol like the one found in the open-source Hyperledger Aries codebase 1 that forms the basis for peer-to-peer interactions in the Sovrin network.

article thumbnail

The Laws of Identity

Phil Windley

It's no coincidence that Internet Identity Workshop got started in 2005. Many people were talking about user-centric identity and developing ideas about how we might be able to create an identity layer for the Internet. The Internet was created without any way to identify the people who used it.

Banking 88
article thumbnail

Silicon Valley’s AI frenzy isn’t just another crypto craze

Vox

She compared recent advancements in generative AI to the creation of the internet itself. “I In the ’80s, we had the advent of the personal computer; in the ’90s, the internet; and in the 2000s, the mobile phone and the suite of apps built on it. “We I think this is absolutely on the same order of magnitude. That’s a personal belief.”

Google 98
article thumbnail

Build your first MongoDB App in Ruby @ StrangeLoop 2013

SPF13

An updated version of the very popular workshop I gave at OSCON last year. This presentation was given at Strangeloop 2013 as a 3 hour interactive workshop. We will be using the following GEMs and they MUST BE installed ahead of time so you can be ahead of the game and safe in the event that the Internet isn’t accommodating.