Create an Account
username: password:
 
  MemeStreams Logo

the workings of the system

search

noteworthy
Picture of noteworthy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

noteworthy's topics
Arts
  Literature
   Fiction
   Non-Fiction
  Movies
   Documentary
   Drama
   Film Noir
   Sci-Fi/Fantasy Films
   War
  Music
  TV
   TV Documentary
Business
  Tech Industry
  Telecom Industry
  Management
Games
Health and Wellness
Home and Garden
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
   Asian Travel
Local Information
  Food
  SF Bay Area Events
Science
  History
  Math
  Nano Tech
  Physics
  Space
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Sports
Technology
  Biotechnology
  Computers
   Computer Security
    Cryptography
   Human Computer Interaction
   Knowledge Management
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
the workings of the system
Topic: Miscellaneous 9:53 am EDT, Mar 28, 2015

Humera Khan:

The communities that are least inclined to engage are often the ones that need the outreach the most.

Dana Tamir:

Trusteer's services team discovers massively distributed APT malware such as Dyre and Citadel in virtually every customer environment it works with.

Siobhan Gorman, in 2012:

Companies aren't obligated to disclose a breach to another company as part of an acquisition deal, said Jacob Olcott of Good Harbor Consulting, a firm that advises companies on national-security issues. It is up to the acquiring company to ask, he said.

Joel Warner:

He's stopped listing his master's degree from Indiana State on his resume. He's been told it's better to have it appear as if he was doing nothing at all during that time than to be associated with a low-prestige school.

Damian Paletta:

Mr. Burr said the bill would allow companies to share information with intelligence agencies like the National Security Agency, but only if the data wasn't provided in "electronic form." He didn't provide more details.

Reuters:

The measures offer corporations liability protection if they share information with intelligence agencies. Data handed over also would be "scrubbed" twice to remove personal information.

Mark Seaborn:

History has shown that issues that are thought to be 'only' reliability issues often have significant security implications.

The Economist:

The architecture of Estonia's system is poorly documented, and that rules for classification of data as sensitive, personal, secret or public were not suitable for digital continuity: "frequently only a small number of experts understand the workings of the system," the report notes.



 
 
Powered By Industrial Memetics
RSS2.0