In the first two chapters of this series, we explored the core functionality of Blockchain: the ability to create and maintain a secure, distributed, trustless transaction ledger. In this chapter, we
As vehicles pack in more and more technology, such as remote diagnostics, on-board GPS, collision avoidance systems, Wi-Fi hotspots for connectivity, cameras and yes, autonomous driving systems, it’s
Cryptocurrency news roared in like a lion in 2018. As 2017 came to a close, Bitcoin shares briefly peaked over $19,000 USD. It got me to thinking, a lot. I made a mental note: I should have bought BTC
When Thomas J. Watson, Jr., the former president of IBM said in a 1973 lecture that “good design is good business,” he was acknowledging the impact design had made on IBM’s fortunes during the 1950s a
Having a strong perimeter for protection has been a core security strategy for centuries, and it’s still the basic foundation for network security today. Enterprises traditionally focus most of their
Industries
Mining the Blockchain, Part III
Jeff Harris 2018.09.16
12 min read
#Blockchain #Network Security
Industries
Data Centers on Wheels
Jeff Harris 2018.08.23
6 min read
#Automotive + Energy #Connected Car #Automotive Ethernet
Executive Perspectives
Mining the Blockchain, Part I
Jeff Harris 2018.08.23
9 min read
#Blockchain
Executive Perspectives
The future of design: Integrating services into product development
Jeff Harris 2018.08.23
6 min read
#Services
Industries
Where did my network perimeter go? Five steps to ensure persistent security.
Jeff Harris 2018.08.23
5 min read
#Customer Privacy #Network Security #GDPR #Data Privacy