The Ionic developer experience team is in London! We are in London to attend DevRelCon London and run a workshop on Thursday the 8th of December. If you are in the area, come find us and we will give you some swag. We are huge…
Blog
90 Results Found - Page 11 of 12
London Workshop
The Machina Tools Developer Experience team is in London! We are bringing Machina Tools and our workshop to Code Node, a great venue in Barbican. If you have been interested in how to develop against Machina, or want to learn how to protect yourself with…
Atlanta Workshop Recap
Thank you to everyone that came to the Atlanta Machina Tools Developer workshop, we had an amazing turnout. We started the event with Ionic Founder and CEO Adam Ghetti giving a talk about how important developers are to Machina and quickly got into how to…
Atlanta Developer Workshop
Our first developer event was just announced! Workshop Description This two-hour hands-on workshop is designed to get developers up and running with the Machina Tools C++ SDK. Participants will spend a significant portion of the workshop with their hands on the keyboard, learning by doing….
2016 #InternetTrends Report: Data Security & Management as a Platform
Yesterday, Mary Meeker at Kleiner Perkins Caufield Byers (KPCB) unveiled the hotly anticipated 2016 Internet Trends Report at the CODE Conference in California. The report has a wide range, including trends from the rate of global smartphone user growth to re-imagining human-computer interfaces. It concludes with a…
The Trichotomy of National Security, Data Privacy, and Data Protection
This post isn’t about a person’s right to privacy, and it isn’t about a corporation’s need to protect its data. It does, however, have everything to do with solving the underlying data security problem facing citizens, businesses, and governments in today’s cloud-heavy, borderless world. Before…
The Cloud, Regulations, and PII
In late July 2014, with very little fanfare, the International Standards Organization (ISO) published ISO/IEC 27018. The standard outlines controls and guidelines for implementing Personally Identifiable Information (PII) protection for public cloud computing environments. ISO 27018 builds on the existing ISO/IEC 27001 and ISO/IEC 27002 frameworks for information security systems….
Data Proliferation in a Bordered World
Data has to be ubiquitous. It is borderless in a bordered world. With the Right to be Forgotten, the European Court of Justice’s decision on Safe Harbor, and the EU General Data Protection Regulation (GDPR) on the horizon, we are at risk of seeing a…