Searched for: "terrorism and business"
- Security (40)
- Cxo (21)
- Data Centers (9)
- Tech & Work (4)
- After Hours (3)
- Networking (3)
- Software (3)
- Start-Ups (3)
- Banking (2)
- Data Management (2)
- Developer (2)
- Enterprise Software (2)
- Hardware (2)
- Innovation (2)
- Social Enterprise (2)
- Apple (1)
- Cloud (1)
- Collaboration (1)
- Consumerization (1)
- Microsoft (1)
- Mobility (1)
- Open Source (1)
- Tech Industry (1)
- Virtualization (1)
About 109 results for "terrorism and business"
Defending the last missing pixels: Phil Zimmermann speaks out on encryption, privacy, and avoiding a surveillance state
Since writing the PGP encryption software in the 1990s, Phil Zimmermann has been a key figure in the internet privacy debate. With that argument heating up again, his perspective i...
The real life inspiration for Jurassic's famous paleontologist shares his insight about the latest installation of the iconic franchise that opens today, starring Chris Pratt.
Learn how the battle over privacy technologies could define the future of the web. This TechRepublic cover story explains the strange history and the serious consequences of the fi...
With many of the videos from linux.conf.au now available, and a three-day weekend about to hit Australia, there's no excuse not to watch the best talks from last week.
In its annual financial report, Apple lists all the potential threats to its future success. Jordan takes a close look at the top 10.
The disproportionate impact of police militarization upon poor and minority communities highlights the need to uphold the right to record police activity in a democratic society.
It's time to close the the cyber-awareness gap and improve cybersecurity, according to a Brookings Institute Fellow.
A Microscopic Simulation Modelling of Vehicle Monitoring Using Kinematic Data Based on GPS and ITS Technologies
In this paper, the authors present an en-route anti-terrorism security system for Commercial Vehicle Operations (CVO) using kinematic data based on Global Positioning Systems (GPS)...
Cyber security associates with technologies, processes and practices designed to protect organization's networks. Today internet and cyber space is the life line of every business ...
With an increasing amount of business being conducted online, the internet has quickly become the frontline in an ongoing battle between companies and an unseen enemy. Industrial e...