Identity in the Age of Cloud Computing
by J. D. Lasica
Publisher: The Aspen Institute 2009
ISBN/ASIN: 0898435056
ISBN-13: 9780898435054
Number of pages: 110
Description:
As information, software and identity move to the cloud, the roundtable explores the transformative possibilities of this new computing paradigm for culture, commerce and personal communication. The report considers potential consequences for privacy, governance and security, and it includes policy recommendations and advice for the new presidential administration.
Download or read it online for free here:
Download link
(820KB, PDF)
Similar books
Two Bits: The Cultural Significance of Free Software
by Christopher M. Kelty - Duke University Press
The book investigates the cultural significance of free software, revealing the practices that have transformed software. Kelty explains how these practices have reoriented the relations of power around the creation of all kinds of knowledge.
(7579 views)
by Christopher M. Kelty - Duke University Press
The book investigates the cultural significance of free software, revealing the practices that have transformed software. Kelty explains how these practices have reoriented the relations of power around the creation of all kinds of knowledge.
(7579 views)
Tools for Thought
by Howard Rheingold - The MIT Press
Where will our new machines take us? Back in 1985, forward-thinking Howard Rheingold asked research pioneers to describe the nascent personal-computer revolution and its trajectory. The book is an excellent slice of retrospective 'futurism'.
(11508 views)
by Howard Rheingold - The MIT Press
Where will our new machines take us? Back in 1985, forward-thinking Howard Rheingold asked research pioneers to describe the nascent personal-computer revolution and its trajectory. The book is an excellent slice of retrospective 'futurism'.
(11508 views)
The Dark Visitor: Inside the World of Chinese Hackers
by Scott J. Henderson - Lulu.com
This book analyzes the history, ideology, organization, exploits, and political motivations of the Chinese hacker network. Whenever possible, the information contained herein has been taken directly from the Chinese hacker organization itself.
(12045 views)
by Scott J. Henderson - Lulu.com
This book analyzes the history, ideology, organization, exploits, and political motivations of the Chinese hacker network. Whenever possible, the information contained herein has been taken directly from the Chinese hacker organization itself.
(12045 views)
Planet Broadband
by R. Yassini, S. Schley, L. Ellis, R. Brown - Cisco Press
The book examines the promise behind the broadband: high-speed access to interactive media and communications. The authors explain why broadband is more than just a better connection to the Internet, and how it improves on every aspect of life.
(12250 views)
by R. Yassini, S. Schley, L. Ellis, R. Brown - Cisco Press
The book examines the promise behind the broadband: high-speed access to interactive media and communications. The authors explain why broadband is more than just a better connection to the Internet, and how it improves on every aspect of life.
(12250 views)