Pages: 1 ... 3 4 5 6 ...7 ... 9 ...11 ...12 13 14


Book review: The Myths of Innovation, by Scott Berkun

  23:24, by Hagai Bar-El   , 220 words
Categories: Sources
I have just finished reading The Myths of Innovation by Scott Berkun. This 248-pages book describes how the work on innovation, and innovation in general, deviate from how we often perceive it, and from how it is presented by the media. It essentially c… more »


The Future of Content Protection on Open Platforms, Such as Android

  23:20, by Hagai Bar-El   , 824 words
Categories: Security Engineering
The emergence of the Android Operating System for mobile devices is said to have put the content protection industry in trouble. This is probably true. However, for sake of accuracy, it has not introduced wholly new problems as it worsened existing… more »


Tips for Submitting Proposals to EU FP7 (now H2020) and Others

  23:09, by Hagai Bar-El   , 994 words
Categories: Security Policies
Among the work I do is the evaluation of research proposals for the FP7 (and H2020) of the European Commission. I review research proposals that are submitted in response to calls that are related to information security. Truthfully, this work… more »


Cyber-war Risk Exaggerated?

  23:02, by Hagai Bar-El   , 700 words
Categories: Security Policies, Cyber Security, Counter-media
A ZDNet article, Cyber-war risk is exaggerated, says OECD study, points to what seems as a thorough study that concluded with the stated result. I never read this study, but from the article one can point one point in which it is probably right and one… more »


Car Automation. Me? Worried?

  22:48, by Hagai Bar-El   , 732 words
Categories: Security Engineering
Cars will soon be (almost) fully automated. News on experiments with cars that drive by themselves, in different scenarios and situations, make it seem obvious that soon enough the role of the driver is to be similar to that of a pilot in a passenger je… more »


The Effect of Wikileaks

  22:47, by Hagai Bar-El   , 689 words
Categories: IT Security
Wikileaks did evil. It published stuff that should not have been published. Julian Assange acted carelessly, I think. Still, the impact of Wikileaks is not what we usually think it is. The security of citizens was not affected by Wikileaks, but by the… more »


Overcoming Distrust in CAs Using External Quality Enforcement

  22:46, by Hagai Bar-El   , 790 words
Categories: IT Security
A few weeks ago, I wrote about the inherent limitations of the certification model. This model cannot be expected to provide a solution to the binding of entities to public keys, primarily because Certification Authorities (CAs) have no financial… more »

1 ... 3 4 5 6 ...7 ... 9 ...11 ...12 13 14