Guy PerelmuterSocial CreditWhat will future society look like as technology’s role grows? The answers are speculative and concerning. It is clear that the daily use…3 min read·Feb 18, 2022----
Guy PerelmuterA Safe CareerCyberterrorism is considered a real threat by governments around the world, and many believe that future wars will be fought in this arena…3 min read·Dec 3, 2021----
Guy PerelmuterTrojan horsesAccording to historical accounts, the Greeks implemented a unique strategy to finally conquer the independent city of Troy. After…3 min read·Sep 20, 2021----
Guy PerelmuterThe real digital theftsDuring virtually the entire history of civilization, one of the prerequisites for carrying out a theft has been the presence of the…3 min read·Jun 7, 2021----
Guy PerelmuterPassword: 123456In a progressively more connected world, the expansion of the Internet and the falling price of sensors are making it possible for…3 min read·May 10, 2021----
Guy PerelmuterWhite Hat, Black HatThe word hack (the root of the word hacker) was already a few hundred years old before it became associated with attacks on computer…3 min read·Apr 13, 2021----
Guy PerelmuterThe First HackerThe inexorable advance in connectivity, linking equipment used daily by billions of people, has led “Information” to the top of modern…4 min read·Jan 22, 2021----
Guy PerelmuterFuture TellerThe primary objective of big data technology is the extraction of recommendations based on a vast sample set. Sometimes all samples…2 min read·Dec 17, 2020----
Guy PerelmuterOur Digital TracksThe originally French word routine comes from the word route (meaning road). Literally, routine means the road normally taken, and…3 min read·Nov 13, 2020----
Guy PerelmuterThe Rule of DataIn 1979, American historian Elizabeth Lewisohn Eisenstein (1923–2016) published a book titled The Printing Press as an Agent of Change…3 min read·Oct 30, 2020----