You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce. Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with customers, employees, partners, and suppliers will be richer and more flexible. Digital Identity explains how to...
Why is it difficult for so many companies to get digital identity right? If you're still wrestling with even simple identity problems like modern website authentication, this practical book has the answers you need. Author Phil Windley provides conceptual frameworks to help you make sense of all the protocols, standards, and solutions available and includes suggestions for where and when you can apply them. By linking current social login solutions to emerging self-sovereign identity issues, this book explains how digital identity works and gives you a firm grasp on what's coming and how you can take advantage of it to solve your most pressing identity problems. VPs and directors will learn ...
None
This volume presents the proceedings of the 7th International Workshop on Higher Order Logic Theorem Proving and Its Applications held in Valetta, Malta in September 1994. Besides 3 invited papers, the proceedings contains 27 refereed papers selected from 42 submissions. In total the book presents many new results by leading researchers working on the design and applications of theorem provers for higher order logic. In particular, this book gives a thorough state-of-the-art report on applications of the HOL system, one of the most widely used theorem provers for higher order logic.
This two-volume set contains papers presented at the International Conference on Computational Engineering Science (ICES '95) held in Mauna Lani, Hawaii from 30 July to 3 August, 1995. The contributions capture the state of the science in computational modeling and simulation in a variety of engineering disciplines: civil, mechanical, aerospace, materials and electronics engineering.
Why is it difficult for so many companies to get digital identity right? If you're still wrestling with even simple identity problems like modern website authentication, this practical book has the answers you need. Author Phil Windley provides conceptual frameworks to help you make sense of all the protocols, standards, and solutions available and includes suggestions for where and when you can apply them. By linking current social login solutions to emerging self-sovereign identity issues, this book explains how digital identity works and gives you a firm grasp on what's coming and how you can take advantage of it to solve your most pressing identity problems. VPs and directors will learn ...
Wikinomics and The Wisdom of Crowds identified the phenomena of emerging social networks, but they do not confront how businesses can profit from the wisdom of crowds. WE ARE SMARTER THAN ME by Barry Libert and Jon Spector, Foreword by Wikinomics author Don Tapscott, is the first book to show anyone in business how to profit from the wisdom of crowds. Drawing on their own research and the insights from an enormous community of more than 4,000 people, Barry Libert and Jon Spector have written a book that reveals what works, and what doesn't, when you are building community into your decision making and business processes. In We Are Smarter Than Me, you will discover exactly how to use social ...
Caveat venditor—let the seller beware While marketers look for more ways to get personal with customers, including new tricks with “big data,” customers are about to get personal in their own ways, with their own tools. Soon consumers will be able to: • Control the flow and use of personal data • Build their own loyalty programs • Dictate their own terms of service • Tell whole markets what they want, how they want it, where and when they should be able to get it, and how much it should cost And they will do all of this outside of any one vendor’s silo. This new landscape we’re entering is what Doc Searls calls The Intention Economy—one in which demand will drive supply f...
CHARME’99 is the tenth in a series of working conferences devoted to the dev- opment and use of leading-edge formal techniques and tools for the design and veri?cation of hardware and systems. Previous conferences have been held in Darmstadt (1984), Edinburgh (1985), Grenoble (1986), Glasgow (1988), Leuven (1989), Torino (1991), Arles (1993), Frankfurt (1995) and Montreal (1997). This workshop and conference series has been organized in cooperation with IFIP WG 10. 5. It is now the biannual counterpart of FMCAD, which takes place every even-numbered year in the USA. The 1999 event took place in Bad Her- nalb, a resort village located in the Black Forest close to the city of Karlsruhe. The ...
None