Skip to content
  • ANSI Webstore
  • Accreditation
  • Training
Facebook Instagram YouTube Linkedin X Threads Pinterest Tumblr TikTok
The ANSI Blog
Search
  • Latest
  • ANSI Blog
  • ANAB Blog
  • Workcred Point of View
  • Customer Service
The ANSI Blog
Cybersecurity worker in server room
ANSI | Computer Science

Job Opportunities in Cybersecurity

ByBrad Kelechava November 13, 2015May 30, 2025

According to a recent article by the Star Tribune, hiring managers are having trouble finding talent to fill cybersecurity job positions. This derives from both…

Framework of Computer Icons
ANSI | Computer Science

Framework of Computer Icons

ByBrad Kelechava November 5, 2015May 30, 2025

According to a recent survey by the Pew Research Center, 39 percent of Americans 65 and older do not use the Internet, believing that they…

Blue digital lines representing the internet of things (IoT)
ANSI | Computer Science

Internet of Things and IPv6 Discussed by Vint Cerf at NYU Lecture

ByRobert Russotti November 5, 2015May 21, 2025

The Internet of Things is not new, though it is certainly evolving. The sheer number of devices poses a problem for internet addressing since IPv4…

Woman sliding finger across tablet in a gesture based interface according to ISO/IEC 30113-1.
ANSI | Computer Science

Gesture Based Interfaces

ByBrad Kelechava August 10, 2015May 30, 2025

Globalization has been paired with constant technological innovation, spreading information and communications technology (ICT) devices throughout the world to all different kinds of people. One…

New Group to Focus on Standards for “Internet of Things”, IoT, INCITS
ANSI | Computer Science

New Group to Focus on Standards for “Internet of Things”

ByRobert Russotti February 25, 2013May 30, 2025

Stakeholders to Begin Work This Month on Common U.S. Approach The U.S. tech sector is engaged in setting common standards to drive interoperability and connectivity…

Piracy Online
ANSI | Information Security / ISO 27000

Piracy Online

ByRobert Russotti January 20, 2012May 30, 2025

Did you listen to the NPR audio interview about the Megaupload indictment and the attack on the Department of Justice’s website by the group Anonymous?…

IT Security Standards, data management
ANSI | Computer Science

IT Security Standards

ByBoris Kuslitskiy October 14, 2011May 30, 2025

IT security standards are guidelines and specifications for various practices within the IT security industry, arrived at through a process culminating in consensus. The use…

Entity Authentication
ANSI | Information Security / ISO 27000

Entity Authentication

ByBoris Kuslitskiy October 14, 2011May 30, 2025

Entity authentication in today’s IT security industry is used as one part of a security system to verify that an entity actually is who or…

Cryptography and Key Management, cyber security, cryptanalysis, algorithm
ANSI | Information Security / ISO 27000

Cryptography and Key Management

ByBoris Kuslitskiy October 14, 2011May 30, 2025

Cryptography in today’s IT security industry is, at its core, the field of inquiry surrounding the encryption and decryption of information. Cryptographic algorithms are developed,…

Page navigation

Previous PagePrevious 1 … 8 9 10 11 Next PageNext

About Us

The statements made in ANSI blogs are those of the authors and do not reflect the official policy or position of ANSI.

Powered by ANSI. Made for you. - © 2025 The ANSI Blog - Our Privacy Policy - Our Cookie Policy - Our Terms of Use - Do Not Sell My Personal Information Copyright The ANSI Blog. All rights reserved.

  • Latest
  • ANSI Blog
  • ANAB Blog
  • Workcred Point of View
  • Customer Service
Search