Showing posts from November 25, 2015

Personal data, identity and privacy through IBM Identity Mixer on Bluemix in our digital age

Stakes and challenges related to personal data, identity and privacy in our connected world are strongly critical; so that misconduct at any level is not tolerated.
With, henceforth everyone and every enterprise and organization is aware of each challenge and stakes related to your privacy, security and personal data. 

Today, welcomes IBM Identity Mixer, now available on Bluemix, with the critical purpose toenable developers to build apps which protect consumer privacy and combat identity theft .
Identity Mixer can allow developers to build apps which can authenticate users’ identities without collecting personal data. observes that, Identity Mixer can authenticate users by asking them to provide a public key. Each user has a single secret key which corresponds with multiple public keys, or identities.

Help digital marketers deliver reliable customer experience across paid, owned and earned media,

We live henceforth in a connected world where, according to Forrester Research, more than three-quarters of marketing leaders believe that the majority of their digital customer engagements are not optimized.
Based on this reality, encourages digital marketers to:
quickly and easily embrace actionable data, technology and content,
Better understand the profile of their individual contacts and engage them with relevant content,
Deliver a relevant message to consumers within the context of a mobile application,
build integrations into key digital advertising and media platforms, such as demand side platforms, ad networks, website optimization tools and more,
Analyzing variables including subject lines, content and the sender of the message,
Analyze what content and cross-channel interactions drive conversions
Your real-time and streamlined ability to modernize existing processes and embrace actionable data, technologies and content will increasingly define the success of org…

Alert: Dell Computers Contain CA Root Certificate Vulnerability

Image recalls that, Dell consumer personal computers using the preinstalled certificate authority (CA) root certificate (eDellRoot) contain a critical vulnerability. This preinstalled root certificate resides on newer Dell laptops and desktops. Exploitation of the vulnerability could allow a remote attacker to read all encrypted web browser traffic (HTTPS), successfully impersonate (spoof) any website, or perform other attacks on the affected system.
So, encourages users and administrators to review Vulnerability Note VU#870761 and Dell's blog post for more information and guidance on removing the certificate.