Peer 2 Peer

Peer-to-Peer is Back with a Bang!

It’s been a long time coming, but long after the days of Napster, Peer-to-Peer is making its grand return. Well over a decade after tech titans such as Google, Amazon,…

Read more

Technology

Blockchain and Its Impact on Information Security’s CIA-triad: Part 1

The value of Confidentiality, Integrity, and Availability  Peer Social advisor Farshad Abasi, Founder of Forward Security, writes about the importance of information security. According to Wikipedia, “A blockchain, originally block chain, is a growing…

Read more

Technology

Sleight of Hand

What exactly is a sleight of hand? /ˌslīd əv ˈhand/ skillful deception. “this is financial sleight of hand of the worst sort” Synonyms: deception, deceit, dissimulation, double-dealing, chicanery, trickery, sharp practice,…

Read more

Decentralization

Data Breaches Are The New Normal

Most Internet companies don’t build products with security in mind.

Read more

Technology

Peer-to-Peer Communications 101 – A Quick Primer

When we think about peer-to-peer communication, it may be easier to understand by analyzing the interaction you have with your colleagues or managers at work.

Read more

Technology

Who invited the 800-pound Gorilla?

When value is not as it seems Web portals like Alta Vista and Netscape were great but it was the search engine that really kicked things off, and screwed things…

Read more

Technology

How much does Google know about you? Here’s how to find out!

Google is watching you. It’s how they make their money. In fact, the more they watch you, the more they can monetize your data. But how much do they know…

Read more