The “Regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC” — in short, the General Data Protection Regulation, or GDPR — comes to the end of its two-year transition period and will be fully enforced in four weeks, on
When it comes to staying out of security trouble, users must think and check what they do (and click). If they can think before acting, and act safely, they will be able to avoid security trouble completely.
During Day 2: Global MVP Summit I feel like I’m trying to drink from the firehose of knowledge. I’m filled up long before the hose is empty, though it’s all great stuff from a wonderful cast of characters.
Guess what? There’s a new kind of mining for digital currency emerging in the marketplace. It’s called “browser mining” and it works something like this. User visits web page; web page downloads mining widget; mining widget runs on user system generating hashes (and ultimately, spendable digital coins) for the web site operator. That sounds fair,