These are the changes made to these pages during the last 30 days. Check the FullRecentChanges for a complete list of all changed pages.

This server lives on Coordinated Universal Time and the time here is 19:39 on 24-May-2017.

24.05.2017
XDAS Trust Management Events 15:55:17 jim
XDAS Security Events 15:44:47 jim
XDASv2 Events 15:40:32 jim
XDAS Data Item Management Events 15:39:36 jim XDAS Data-Resource Management ==> XDAS Data Item Management Events
XDAS Event 15:35:58 jim
EDirectory 9.0.3.0 (40005.12) 15:34:45 jim
XDAS Account Management 15:27:39 jim
XDAS Resource Access 15:16:47 jim
CREATE_SESSION 15:12:06 jim
DSE_NMAS_LOG_FINISH_LOGIN_STATUS 15:10:14 jim
XDAS Event Name 15:08:57 jim
CREATE_ACCOUNT 15:08:29 jim
ACCOUNT_UNLOCK 14:47:06 jim
XDAS Fields 14:46:37 jim
DSE_DELETE_VALUE 14:37:44 jim
XDAS Correlation IDs for IDM 14:33:55 jim
DSE_ADD_VALUE 14:20:58 jim
EDirectory Event Type 14:19:57 jim
NMAS_LOGIN 13:58:22 jim
NMAS -1642 13:56:38 jim
DSE_LOGIN_EX 13:12:56 jim
DSE_AUTHENTICATE 12:59:39 jim
EDirectory 9.0.2.0 (40004.44) 12:54:16 jim
AUTHENTICATE_SESSION 12:47:05 jim
Web Blog_blogentry_240517_1 11:08:20 jim
DSE_CREATE_ENTRY 10:27:28 jim
DELETE_ACCOUNT 10:24:59 jim
DSE_DELETE_ENTRY 10:24:32 jim
XDAS Initiator 09:35:02 jim
XDAS Observer 09:32:59 jim
23.05.2017
NDSTRACE Examples 17:01:01 jim
22.05.2017
Verizon Data Breach Investigations Report 15:01:47 jim
HTTP 204 12:27:47 jim
HTTP 200 12:24:51 jim
HTTP 404 12:15:19 jim
HTTP 410 12:09:40 jim
HTTP Status Code 12:01:28 jim
INVALID_RESPONSE 11:38:45 jim
EDirectory 11:28:19 jim
AMBIGUOUS_RESPONSE 11:26:48 jim
NDS Result Code 11:24:31 jim
Common Active Directory Bind Errors 11:20:30 jim
Common Edirectory Bind Errors 11:08:46 jim
LDAP Client Error And Result Codes 11:07:05 jim
LDAP Result Codes 11:05:27 jim
Functional Programming 11:00:19 jim
Result Code 10:55:21 jim
SCIM Delete Request 10:40:23 jim
Immutable 10:36:59 jim
Idempotent 10:30:18 jim
21.05.2017
Off-the-Record Messaging 21:22:21 jim
Key Verification 21:18:42 jim
Homomorphic Encryption 21:16:03 jim
Repudiation 21:03:56 jim
OTR 20:51:41 jim
Key Transparency 20:48:35 jim
Encrypt 20:46:48 jim
Public Key Cryptography 20:45:43 jim
CONIKS 20:34:36 jim
Web Blog_blogentry_210517_1 20:23:46 jim
W3C Web Crypto API 20:19:48 jim
Same Origin Policy 20:10:02 jim
Proxy Server 20:09:30 jim
Linked Data 20:07:33 jim
3D Secure 20:05:49 jim
Host Card Emulation 19:57:19 jim
Open Banking 11:26:42 jim
General Data Protection Regulation 11:16:49 jim
TPP 11:11:25 jim
Third Party Payment Service Provider 11:11:05 jim
Third-party 11:08:50 jim
ASPSP 10:47:15 jim
Acquirer 10:46:42 jim
PSP 10:45:35 jim
Payment Service Provider 10:43:46 jim
Merchant 10:39:25 jim
Account Servicing Payment Service Provider 10:35:23 jim
Financial Data 10:04:48 jim
Certificate Fingerprint 09:50:39 jim
Thumbprint 09:24:28 jim
Obtain a Certificate from Server 09:17:41 jim
20.05.2017
RFC 6234 09:41:17 jim
RFC 4634 09:40:26 jim
SHA-2 09:37:24 jim
Secure Hash Algorithm 09:36:15 jim
Certificate Fingerprint/certificate-fingerprint.png 09:29:01 jim certificate-fingerprint
Certificate 09:08:24 jim
License 09:07:24 jim
Identity Document 09:05:58 jim
Passport 09:03:09 jim
NIST Information Technology Laboratory 08:39:02 jim
ITL 08:38:35 jim
NIST.SP.500 Computer Systems Technology 08:37:23 jim
NIST Special Publication 08:36:29 jim
NIST.SP.1800 Cybersecurity Practice Guides 08:36:13 jim SP 1800 Cybersecurity Practice Guides ==> NIST.SP.1800 Cybersecurity Practice Guides
Web Blog_blogentry_030915_1 08:36:13 jim SP 1800 Cybersecurity Practice Guides ==> NIST.SP.1800 Cybersecurity Practice Guides
FIPS Based Cipher Suites 08:21:55 jim NIST.SP.57 ==> NIST.SP.800-57
NIST.SP.800-57 08:21:54 jim NIST.SP.57 ==> NIST.SP.800-57
NIST.SP.800-52 08:21:21 jim NIST.SP.52 ==> NIST.SP.800-52
Payment Card Industry Data Security Standard 08:21:21 jim NIST.SP.52 ==> NIST.SP.800-52
NIST.SP.800-132 08:18:01 jim
NIST.SP.800-157 08:12:31 jim
Credential 08:07:19 jim
Cancelable Biometrics 07:48:13 jim
Biometric Data Challenges 07:44:11 jim
19.05.2017
SHA-1 Deprecation 10:29:02 jim
JAVA LDAP SDKs 10:28:10 jim
Schema Extensions 10:25:58 jim
Interface Description Language 10:25:17 jim
PKCS12 10:24:02 jim
Common Development And Distribution License 10:20:48 jim
AbzillaPerson 10:20:13 jim
Persona 10:18:54 jim
NSS 10:18:27 jim
Network Security Services 10:18:00 jim
MozillaCertutil 10:17:23 jim
Mozilla 10:12:42 jim
Firefox 10:10:24 jim
TLS 1.3 10:09:17 jim
RSA key-exchange 10:06:54 jim
TLS Renegotiation 09:50:21 jim
TLS Compression 09:49:00 jim
TLS 1.2 09:44:18 jim
EncryptedPreMasterSecret 09:43:21 jim
Premaster Secret 09:41:41 jim
Cipher Suite 09:28:11 jim
Encryption Scheme 09:26:58 jim
Signature Primitive 09:26:43 jim
Verification Primitive 09:26:11 jim
Cryptographic Primitive 09:24:33 jim
Encryption 08:55:07 jim
Digital Signature 08:51:41 jim
PKCS 1 08:31:25 jim
18.05.2017
Server Message Block 07:55:19 jim
NetworkAddress 07:47:30 jim
Novell NetworkAddress 07:43:28 jim
NxsettingsDriver 07:41:53 jim
NTLM SSP 07:40:12 jim
CIFS 07:39:03 jim
Common Internet File System 07:33:59 jim
17.05.2017
LDAP policy in Active Directory 09:25:04 jim
MaxReceiveBuffer 09:16:44 jim
MaxValRange 09:16:24 jim
MaxTempTableSize 09:15:47 jim
MaxPageSize 09:15:36 jim
MaxQueryDuration 09:15:24 jim
MaxPoolThreads 09:10:37 jim
MaxNotificationPerConnection 09:06:09 jim
MaxResultSetSize 09:04:46 jim
MaxDatagramRecv 08:55:00 jim
MaxConnIdleTime 08:53:25 jim
MaxActiveQueries 08:51:48 jim
InitRecvTimeout 08:47:52 jim
ERROR_ACCOUNT_LOCKED_OUT 08:39:55 jim
Active Directory Account Lockout 08:39:43 jim
Ntdsutil.exe 08:29:29 jim
MaxConnections 08:27:41 jim
MAXIMUM_LOGINS_EXCEEDED 08:23:37 jim
Intruder Detection 08:12:58 jim
ACCOUNTDISABLE 08:10:22 jim
ERROR_PASSWORD_EXPIRED 08:04:33 jim
16.05.2017
NspmAdminsDoNotExpirePassword 16:12:39 jim
Edirectory Administrative Password Changes 16:08:57 jim
PasswordExpirationTime 16:08:09 jim
Grace Logins 15:05:44 jim
Password Reset 14:42:11 jim
Password Change 14:40:08 jim
NspmConfigurationOptions 12:03:16 jim
SPM_ALLOW_SPWD_SET 12:00:03 jim
Spmdclnt 11:52:22 jim
NDSD Loadable Module 11:50:49 jim
SPM 11:48:39 jim
Secure Password Manager 11:48:11 jim
LoginGraceRemaining 10:30:36 jim
15.05.2017
Password Life Time 17:27:25 jim
13.05.2017
Set Active Directory Password From Java 15:17:38 jim
12.05.2017
Key Usage 14:25:24 jim
Certificate Extensions 14:21:39 jim
Subject Unique Identifier 14:16:34 jim
Issuer Unique Identifier 14:16:07 jim
Example Certificate 14:12:40 jim
SubjectPublicKeyInfo 14:11:37 jim
Subject Public Key Info 14:11:16 jim
Certificate Validity Period 14:09:04 jim
Distinguished Names 14:02:41 jim
2.5.4.7 13:46:53 jim
LocalityName 13:46:25 jim
OrganizationalUnitName 13:44:52 jim organizationalUnitName ==> OrganizationalUnitName
CountryName 13:43:54 jim countryName ==> CountryName
AlgorithmIdentifier 13:27:07 jim
Certificate Algorithm ID 13:26:43 jim
Certificate Serial Number 12:10:19 jim
X.509 Style Guide 12:06:41 jim
Certificate Version 12:05:00 jim
Certificate Issuer 11:48:48 jim
SerialNumber 11:30:39 jim
IDMAndOIDWithSSL 11:11:02 jim
Keytool 11:10:14 jim
Certificate Alias 11:07:55 jim
Keystore 10:55:50 jim
Trust Anchor 10:55:30 jim
Java KeyStore 10:54:01 jim
Root Certificate 10:52:33 jim
Public Key Infrastructure Weaknesses 10:46:40 jim
Certificate Authority 10:41:38 jim
Registration Authority 10:32:06 jim
Certificates and Authentication 10:15:01 jim
Toolbox 09:58:16 jim
Certificate Validation Tools 09:56:49 jim
OpenSSL Commands 09:47:40 jim
How To Crack SSL-TLS 09:42:42 jim
Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 09:01:33 jim
SSLv2 08:59:41 jim
Deprecating Secure Sockets Layer Version 3.0 08:56:39 jim
SSLv3 08:55:15 jim
RFC 7568 08:54:05 jim
Transport Layer Security 08:43:38 jim
Prohibiting Secure Sockets Layer (SSL) Version 2.0 08:38:31 jim
RFC 6176 08:35:43 jim
11.05.2017
Command-line 13:37:30 jim
Create a MAD Service To Run 13:35:22 jim
LDAPs and AD 13:34:51 jim
Linux setgid and setuid 13:34:10 jim
LDIF to Bulk Load Test Users 13:33:07 jim
NAM Administration 13:32:35 jim
DXServer Commands 13:32:09 jim
DxPwdFailedAttempts 13:31:37 jim
Join AD Domain 13:30:28 jim
Kinit 13:29:59 jim
DumpEdirectoryPasswordInformationTool 13:28:48 jim
Kerberos Tools LDAP 13:28:18 jim
Using RPM 13:27:53 jim
DumpUP 13:26:28 jim
Dxcmd 13:25:49 jim
Passwd 13:25:17 jim
Unix Time 13:24:41 jim
Which LDAPSEARCH 13:23:31 jim
Force Immediate Synchronization 13:22:01 jim
Dsquery 13:21:23 jim
LDAPSEARCH 13:20:47 jim
Bash Shell Initialization Files 13:20:05 jim
Edirectory Usefull Linux Commands 13:18:36 jim
Unix Linux CommandLine Tricks 13:17:49 jim
Dump Password Information Tool-Command Line Options 13:17:05 jim
SSH CommandLine Tips 13:16:16 jim
Edirectory Instance Management 13:12:31 jim
N4u.server.configdir 13:05:26 jim
10.05.2017
Password Validator 19:08:19 jim
Credential Leaked Databases 19:07:31 jim
Credential Leakage 19:05:45 jim
Eavesdropper 18:51:03 jim
Information Leakage 18:50:16 jim
ASCII 15:26:49 jim
ISO 10646 15:23:27 jim
Code Point 15:22:10 jim
Unicode 15:20:00 jim
UCS 15:18:38 jim
Universal Coded Character Set 15:17:34 jim
Vulnerability 15:12:35 jim
Exploit 15:09:03 jim
Attack 15:06:15 jim
Passive attacker 15:03:20 jim
Attacker 15:02:39 jim
DBIR 14:39:25 jim
Verizon 14:37:18 jim
Mobile Network Operators 14:33:40 jim
Unicode Standard Annex 15 14:31:55 jim
UAX 15 14:29:05 jim
Federal Information Processing Standard 11:45:34 jim
FIPS198-1 11:42:14 jim
PBKDF2 11:36:51 jim
Unauthenticated 11:00:47 jim
NDS Connection States 10:59:44 jim
Verifier 10:33:40 jim
08.05.2017
UniqueID 17:32:21 jim
PermanentConfigParms 17:31:27 jim
Edirectory Indexes 17:30:23 jim
Password History 17:18:10 jim
Password Modification Policy 15:30:47 jim
PwdMaxLength 15:29:20 jim Password-composition Policy ==> Password Modification Policy
PwdMinLength 15:29:20 jim Password-composition Policy ==> Password Modification Policy
Draft-behera-ldap-password-policy 15:29:19 jim Password-composition Policy ==> Password Modification Policy
NspmComplexityRules 15:29:19 jim Password-composition Policy ==> Password Modification Policy
Password Authentication is Broken 15:29:19 jim Password-composition Policy ==> Password Modification Policy
Password Character Composition 15:29:19 jim Password-composition Policy ==> Password Modification Policy
Password Maximum Length 15:29:19 jim Password-composition Policy ==> Password Modification Policy
Password Minimum Length 15:29:19 jim Password-composition Policy ==> Password Modification Policy
Password Policy 15:29:19 jim Password-composition Policy ==> Password Modification Policy
Password Quality 15:29:19 jim Password-composition Policy ==> Password Modification Policy
Password Reuse 15:29:19 jim Password-composition Policy ==> Password Modification Policy
Password Modify Operation 15:11:55 jim
Modify-password 15:11:28 jim
Password Usage Policy 15:01:29 jim
NspmPasswordPolicy 14:53:15 jim
NspmMaximumLength 14:11:25 jim
PwdMaxAge 13:56:43 jim
2.16.840.1.113719.1.39.43.4.231 13:46:43 jim
2.16.840.1.113719.1.1.4.1.69 13:05:48 jim
PasswordMinimumLength 13:00:56 jim
Passwords Must Meet Complexity Requirements 12:51:08 jim
NdsLoginProperties 11:44:30 jim PasswordMinimumLength ==> Password Minimum Length
2.16.840.1.113719.1.1.6.1.33 11:44:29 jim PasswordMinimumLength ==> Password Minimum Length
2.16.840.1.113719.1.39.43.6.1 11:44:29 jim PasswordMinimumLength ==> Password Minimum Length
2.16.840.1.113719.1.64.6.1.1 11:44:29 jim PasswordMinimumLength ==> Password Minimum Length
Attribute-Names 11:44:29 jim PasswordMinimumLength ==> Password Minimum Length
InetOrgPerson 11:44:29 jim PasswordMinimumLength ==> Password Minimum Length
Implementing Universal Password 11:32:44 jim
Password Composition 11:29:46 jim
NIST.SP.800-63B 11:28:52 jim Passwords Composition ==> Password Composition
Password Considerations and Requirements 11:28:11 jim
Password Complexity 11:24:17 jim
07.05.2017
Signalling System No. 7 09:48:05 jim
SS7 hack 09:45:18 jim
Transaction Authentication Number 09:39:51 jim
CCSS7 09:36:51 jim
Common-channel signaling 09:35:58 jim
SS7 09:35:38 jim
Common Channel Signalling System 7 09:35:17 jim
Mobile TAN 09:30:26 jim
Person-to-Person Payments 09:09:54 jim
P2P 09:00:03 jim
International Mobile Equipment Identity Database 08:53:48 jim
Integrated Automated Fingerprint Identification System 08:53:05 jim
United States Department of Justice 08:52:12 jim
Federal Bureau of Investigation 08:50:18 jim
CBP 08:49:35 jim
Law Enforcement Agency 08:49:04 jim Law Enforcement ==> Law Enforcement Agency
United States Customs and Border Protection 08:48:25 jim
Regulatory Agencies 08:45:26 jim
International Mobile Equipment Identity 08:37:22 jim
TAC 08:25:37 jim
IMEI Software Version 08:24:49 jim
IMEISV 08:24:08 jim
Type Allocation Code 08:21:13 jim
Home Location Register 08:00:36 jim
Central Equipment Identity Register 07:59:41 jim
IMEI DB 07:47:58 jim
CEIR 07:36:56 jim
06.05.2017
Mobile Equipment Identifier 11:13:05 jim
IMEI 11:04:02 jim
Mobile Switching Center 11:00:15 jim
Global System for Mobile Communications 10:59:25 jim
BSS 10:47:31 jim
BTS 10:47:11 jim
BSC 10:46:51 jim
Base Station Controller 10:46:34 jim
Base Transceiver Station 10:46:02 jim
Base Station Subsystem 10:39:38 jim
AuC 10:19:17 jim
Authentication Center 10:18:46 jim
Visitor Location Register 10:18:03 jim
Mobile Station 10:14:58 jim
MSC 09:43:22 jim
VLR 09:42:52 jim
General Packet Radio Service 09:38:29 jim
GPRS 09:37:02 jim
HLR 09:36:14 jim
Call Forwarding 09:35:41 jim
Call Diversion 09:35:13 jim
Mobile Station International Subscriber Directory Number 09:02:44 jim
ISDN 08:45:12 jim
Integrated Services Digital Network 08:44:39 jim
CCS 08:42:03 jim
Digital communication 08:35:36 jim
Telecommunications 08:35:12 jim
FIPs 08:17:37 jim
Privacy Considerations 08:16:52 jim
Year 1980 08:15:11 jim
Year 1945 08:14:28 jim
Year 1960 08:14:01 jim
OECD 08:13:39 jim
UN 08:12:54 jim
United Nations 08:12:37 jim
Organization for Economic Cooperation and Development 08:10:00 jim
HEW 08:06:13 jim
HHS 08:05:12 jim
United States Department of Health and Human Services 08:04:41 jim
Fair Information Practices 08:01:46 jim
SIP 07:39:29 jim
Session Initiation Protocol 07:39:13 jim
RFC 6716 07:33:38 jim
RFC 3325 07:32:35 jim
Glossary Of LDAP And Directory Terminology 07:30:25 jim
05.05.2017
ECHELON 12:03:51 jim
Surveillance in the Workplace 12:03:03 jim
Surveillance by Video 12:01:34 jim
Surveillance of Communications 12:00:03 jim
Surveillance 11:59:27 jim
National Security Agency 11:58:02 jim
Next Generation Identification 11:45:28 jim
Signals Intelligence 11:40:33 jim
SIGINT 11:38:21 jim
Web Blog_blogentry_050517_1 11:29:31 jim
Jim 11:26:49 jim
Privacy 11:16:45 jim
Universal Declaration of Human Rights 11:11:10 jim
UDHR 11:10:06 jim
Anonymity Set 10:39:23 jim
Identification 10:38:38 jim
Identity Proofing 10:33:16 jim
Level Of Assurance 10:28:21 jim
Authentication 10:23:14 jim
Consent vs Authorization 10:06:00 jim
Proximity Card 09:59:44 jim
Key Card 09:58:35 jim
Authorization 09:53:34 jim
Permission 09:51:29 jim
Privilege 09:49:16 jim
Malicious Software 09:39:45 jim
Malware 09:38:15 jim
Phishing 09:23:32 jim
RFC 7469 09:07:07 jim
Public Key Pinning Extension for HTTP 09:06:28 jim
04.05.2017
Oracle Internet Directory and DirXML Moves 12:41:22 jim
Oracle Internet Directory 12:38:01 jim
DirXML and Oracle (OID) 12:34:05 jim
Byte 12:22:50 jim
Encrypted 12:21:27 jim
DES 12:00:54 jim
Data Encryption Standard 12:00:46 jim
OID and Intruder Detection 11:47:55 jim
02.05.2017
EDirectory 9.0.2.1 (40004.44) 13:53:12 jim
EDirectory Version 13:50:02 jim
NetWare 13:30:12 jim
NDS External References 13:27:35 jim
EDirectory 8.8.5.0 (20219.15) 13:27:13 jim Edirectory 8.8.5.0 (20219.15) ==> EDirectory 8.8.5.0 (20219.15)
EDirectory 9.0.0.0 (40002.79) 13:24:01 jim EDirectory Version Information ==> EDirectory Version
Distributed Reference Links 13:23:39 jim
NDSD 13:20:34 jim
NICI 13:07:51 jim
Novell International Cryptographic Infrastructure 13:06:01 jim NICIWhichVersionIsInstalled ==> NICI Determine What Version
NICI Determine What Version 13:06:00 jim NICIWhichVersionIsInstalled ==> NICI Determine What Version
EDirectory 8.8 11:57:44 jim
Edirectory 8.8.x Anomalies 11:56:19 jim Edirectory8.8Anomalies ==> Edirectory 8.8.x Anomalies
EDirectory 8.8.3.0 (20804.05) 11:53:58 jim EDirectory 8.8 SP3 ==> EDirectory 8.8.3.0 (20804.05)
EDirectory 8.8.8.0 (20801.46) 11:47:35 jim
EdirectoryAnomalies 11:46:25 jim
EdirectoyFHSAndLSBCompliance 11:41:58 jim
IManager Server Configuration 11:40:50 jim
Data At Rest 11:40:06 jim
WIKI-Groups 11:38:18 jim
FLAIM 11:38:03 jim
Unix 11:37:11 jim
File System 11:35:36 jim
ServerHolds 10:08:40 jim
2.16.840.1.113719.1.1.4.1.96 10:02:50 jim
Tagged Name 09:56:12 jim
2.16.840.1.113719.1.1.5.1.23 09:48:48 jim
BackLink 09:47:25 jim
2.16.840.1.113719.1.1.4.1.110 09:41:37 jim
UnknownBaseClass 09:39:40 jim
NDS Unknow Entries 09:29:34 jim
01.05.2017
NDS Obituaries 12:41:27 jim
NDS Obituary State 12:37:50 jim
NDS Obituaries Type 12:35:32 jim
BACKLINK Obituary 12:33:19 jim
NDS Secondary Obituaries 12:30:45 jim
OLD RDN Obituary 12:29:25 jim
MOVED Obituary 12:27:36 jim
DEAD Obituary 12:25:08 jim
MOVED From Obituary 12:20:05 jim
MOVE Sub-Tree Obituary 12:16:49 jim
Tree_new_RDN Obituary 12:14:58 jim
PURGE ALL Obituary 12:11:35 jim
Used_By Obituary 12:08:12 jim
Tree_old_RDN Obituary 12:04:08 jim
NEW RDN Obituary 11:58:41 jim
RESTORED Obituary 11:52:57 jim
NDS Obituaries Classification 11:49:47 jim
NDS Special Case Obituaries 11:48:30 jim
NDS Informational Obituaries 11:46:48 jim
NDS Primary Obituaries 11:39:48 jim
INHIBIT_MOVE Obituary 10:55:09 jim
DS_ENTRY_NOT_PRESENT 10:48:54 jim
Simple Health Check 09:46:29 jim
Ndstrace 09:44:36 jim
Ndsrepair 09:42:37 jim
Flat Cleaner 09:40:57 jim
EDirectory Synchronization 09:40:19 jim
30.04.2017
2010s 12:13:08 jim
1980s 12:11:26 jim
2000s 12:10:39 jim
Common Vulnerabilities and Exposures 12:06:20 jim
Apache Hadoop 12:04:34 jim
Message Passing Interface 12:00:19 jim
MPI 12:00:03 jim
MapReduce 11:57:09 jim
Reduce() 11:44:22 jim
Map() 11:34:54 jim
Hadoop Distributed File System 11:11:25 jim
Ethernet 11:10:21 jim
Digital Equipment Corporation 11:07:31 jim
Apollo Computer 11:07:14 jim
DCE-RPC 11:06:26 jim
OSF 11:05:44 jim
DCE-DFS 10:52:51 jim
DFS 10:52:09 jim
Distributed File System 10:51:40 jim
Distributed Computing Environment 10:50:24 jim
HDFS 10:44:57 jim
Distributed Data Store 10:44:35 jim
Hadoop 10:35:25 jim
Computing Cluster 10:19:57 jim
Amazon Simple Storage Service 10:13:32 jim
Object storage 10:11:39 jim
Data-lake 10:06:03 jim
Big data 10:03:55 jim
Record Protocol 09:55:30 jim
BEAST 09:54:21 jim
Blockchain 09:52:29 jim
FLAIM Block Cache 09:50:15 jim
Block 09:48:49 jim Blocks ==> Block
Block Cipher 09:48:49 jim Blocks ==> Block
Inter-Planetary File System 09:48:49 jim Blocks ==> Block
S3 09:41:19 jim
Amazon Web Services 09:39:41 jim
AWS 09:38:39 jim
Amazon 09:36:47 jim
29.04.2017
Patient Data 09:58:41 jim
Electronic Health Record 09:56:22 jim
Electronic Medical Record 09:49:49 jim
Clinical Data 09:48:39 jim
Verifiable Claims 09:47:37 jim
Web Blog_blogentry_310715_1 09:39:03 jim
Blockchain Identity 09:37:32 jim
Data Pedigree 09:36:50 jim
Data Provenance 09:33:33 jim
Decentralized Identifier 09:20:24 jim
Web Blog_blogentry_290417_1 09:08:32 jim
Data Ownership 09:06:17 jim
28.04.2017
Data Breach 11:50:02 jim
Breach 11:38:35 jim
Identity Relationship Management 11:34:14 jim
Identity Relation 11:27:03 jim
Common Object Request Broker Architecture 09:11:53 jim
UML 09:06:33 jim
Object Management Group 09:06:04 jim
OMG 09:01:30 jim
People And Things Every IDM Person Should Know 08:59:35 jim
Burton Group 08:58:44 jim
Bob Blakley 08:58:24 jim
Recognition 08:51:32 jim
Maverick Research The Death of Authentication 08:49:16 jim
Web Blog_blogentry_280417_1 08:44:08 jim
Gartner 08:42:37 jim
Ian Glazer 08:31:05 jim
Access360 08:23:46 jim
IBM IDM 08:22:51 jim
The Seven Laws Of Identity 08:10:04 jim
Kim Cameron 08:07:31 jim
Microsoft Passport 08:05:36 jim
Law of Justifiable Parties 08:01:04 jim
Law of Minimal Disclosure For A Constrained Use 07:55:18 jim
Law of User Control and Consent 07:51:48 jim
IRM 07:41:05 jim
25.04.2017
Experimental 16:40:52 jim
LDAP Transactions 16:39:02 jim
2.16.840.1.113719.1.27.103.4 16:33:31 jim
EndGroupingNotice 16:32:46 jim
EDirectory LDAP Transaction 16:29:40 jim
EndGroupingResponse 16:27:21 jim
EndGroupingRequest 16:26:02 jim
CreateGroupingResponse 16:25:04 jim
CreateGroupingRequest 16:23:59 jim
2.16.840.1.113719.1.27.103.2 16:15:13 jim
2.16.840.1.113719.1.27.103.7 16:09:58 jim
GroupingControl 16:09:26 jim
CreateGroupValue 16:08:01 jim
GroupCookie 16:05:07 jim
2.16.840.1.113719.1.27.103.8 15:55:36 jim
CreateGroupType 15:54:43 jim
2.16.840.1.113719.1.27.103.1 15:51:48 jim
LDAP Grouping of Related Operations 15:39:09 jim GroupingControl ==> LDAP Grouping of Related Operations
LDAPv3 Grouping of Related Operations 15:39:09 jim GroupingControl ==> LDAP Grouping of Related Operations
Lightweight Directory Access Protocol (LDAP) Transactions 15:37:15 jim

Add new attachment

Only authorized users are allowed to upload new attachments.
« This page (revision-2) was last changed on 26-Jul-2014 09:01 by 71.0.193.131