August 7th, 2018

Time for a refresh: Meet the new Google Classroom

In 2014, a team of Googlers, including several former teachers, began spending time with educators. We learned that teachers loved using G Suite’s collaborative tools with their students, but found that some of the features were [...]

Free Resources for Open Source Certification and Training

July was a hot month for certification on Linux.com. In case you missed it, we covered the open source certification process in a series of articles examining why certification is important, general tips for success, specific [...]

Don’t Forget Victimology as a Cybersecurity Strategy

Technology and IT principles play an undeniable role in cybersecurity defense, but criminological security principles should not be overlooked. As cybersecurity professionals overwhelmed with compliance requirements, regulations, and a multitude of tradecraft frameworks, we sometimes lose [...]

Part 2 – Identity Assurance by Our Own Volition and Memory

Identity Assurance by Our Own Volition and Memory We believe that the reliable identity assurance (See part 1) must be built on three prerequisite principles as follows. Volition of the User – with Self-Determination, Identity authentication [...]

Health records ‘put at risk by security bugs’

Health records of almost 100 million patients worldwide were put at risk by security issues with a popular patient management system, researchers say. Almost 30 bugs were found in the OpenEMR system, by a cyber-security group [...]

German start-up trials solar car that can charge as you drive

BERLIN (Reuters) – A Munich-based start-up has taken advantage of the strong Bavarian sun this summer to test the final development of the charging system of its Sion car, an all-electric solar vehicle that lets you [...]