It used to be you had to get a warrant to monitor a person or a group of people. Today, it is increasingly easy to monitor ideas. And then track them back to people. Most of us don't have access to the databases, software, or computing power of the NSA, F
It used to be you had to get a warrant to monitor a person or a group of people. Today, it is increasingly easy to monitor ideas. And then track them back to people. Most of us don't have access to the databases, software, or computing power of the NSA, F
My friends at Flickr have just rolled out something very, very smart -- and potentially game-changing. They have released live meta-data about trends in the camera market based on what they are seeing in pictures uploaded at that popular photo-sharing sit
My friends at Flickr have just rolled out something very, very smart -- and potentially game-changing. They have released live meta-data about trends in the camera market based on what they are seeing in pictures uploaded at that popular photo-sharing sit
When you pay attention to something (and when you ignore something), data is created. This “attention data” is a valuable resource that reflects your interests, your activities and your values, and it serves as a proxy for your attention. To capture t
When you pay attention to something (and when you ignore something), data is created. This “attention data” is a valuable resource that reflects your interests, your activities and your values, and it serves as a proxy for your attention. To capture t
Think of trust as the currency of social capital. Managing trusted relationships is a complex and risky social, emotional, and strategic problem. Social networking systems are still fairly new, so while earning the trust of their users is being increasing
Think of trust as the currency of social capital. Managing trusted relationships is a complex and risky social, emotional, and strategic problem. Social networking systems are still fairly new, so while earning the trust of their users is being increasing
Stiftung Secure Information and Communication Technologies SIC offers a wide range of cryptography- and security-related Java products, covering all aspects of data and communication security.
Support for a Kerberos based Network Authentication Service and the introduction of Enterprise Identity Mapping (EIM) were exciting OS/400® V5R2 announcements during 2002.