Logo

Identity in the Age of Cloud Computing

Small book cover: Identity in the Age of Cloud Computing

Identity in the Age of Cloud Computing
by

Publisher: The Aspen Institute
ISBN/ASIN: 0898435056
ISBN-13: 9780898435054
Number of pages: 110

Description:
As information, software and identity move to the cloud, the roundtable explores the transformative possibilities of this new computing paradigm for culture, commerce and personal communication. The report considers potential consequences for privacy, governance and security, and it includes policy recommendations and advice for the new presidential administration.

Download or read it online for free here:
Download link
(820KB, PDF)

Similar books

Book cover: Spreading the Word on the InternetSpreading the Word on the Internet
by - OSCE
Reflections from the Amsterdam Conference on Freedom of the Media and the Internet, June 2003. The book includes articles by representatives from the OSCE, the Council of Europe, journalists and media NGOs from Europe and the United States.
(12035 views)
Book cover: Software and Mind: The Mechanistic Myth and Its ConsequencesSoftware and Mind: The Mechanistic Myth and Its Consequences
by - Andsor Books
Addressing general readers and software practitioners, the author discusses the fallacies of the mechanistic ideology and the degradation of minds caused by it. Mechanistic ideology has turned most of our activities into pseudoscientific pursuits.
(5300 views)
Book cover: The Official Dictionary of Unofficial EnglishThe Official Dictionary of Unofficial English
by - McGraw-Hill
The Dictionary presents more than 750 words that have unofficially joined the English language. These words are hot off the street, new even to cyberspace. Each entry features a definition, etymology, and at least three citations from print.
(19265 views)
Book cover: The Dark Visitor: Inside the World of Chinese HackersThe Dark Visitor: Inside the World of Chinese Hackers
by - Lulu.com
This book analyzes the history, ideology, organization, exploits, and political motivations of the Chinese hacker network. Whenever possible, the information contained herein has been taken directly from the Chinese hacker organization itself.
(12036 views)