<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Example</title> <atom:link href="https://www.iphere.com/tag/example/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>Target breach notifications are a perfect example of what not to do</title><link>https://www.iphere.com/target-breach-notifications-are-a-perfect-example-of-what-not-to-do</link> <comments>https://www.iphere.com/target-breach-notifications-are-a-perfect-example-of-what-not-to-do#comments</comments> <pubDate>Sat, 18 Jan 2014 08:14:51 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Breach]]></category> <category><![CDATA[Example]]></category> <category><![CDATA[notifications]]></category> <category><![CDATA[perfect]]></category> <category><![CDATA[Target]]></category> <guid
isPermaLink="false">http://www.iphere.com/target-breach-notifications-are-a-perfect-example-of-what-not-to-do</guid> <description><![CDATA[Hopefully your company will never be the victim of a massive data breach. If it is, though, and customer data is compromised, make sure you don’t follow Target’s lead when it comes to notifying customers. Target’s customer notification efforts are wrong on almost every level. Customers are conditioned to not click on links in email [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/target-breach-notifications-are-a-perfect-example-of-what-not-to-do/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>VDI: An Example Of Service Delivery</title><link>https://www.iphere.com/vdi-an-example-of-service-delivery</link> <comments>https://www.iphere.com/vdi-an-example-of-service-delivery#comments</comments> <pubDate>Wed, 06 Jul 2011 02:17:00 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Delivery]]></category> <category><![CDATA[Example]]></category> <category><![CDATA[Service]]></category> <guid
isPermaLink="false">http://www.iphere.com/vdi-an-example-of-service-delivery</guid> <description><![CDATA[Any migration to the cloud should have a focus on the services required and the best way in which to deliver those services. Business enablement should hold as much, or more, weight than ROI. The same holds true when discussing virtual desktops. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/vdi-an-example-of-service-delivery/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Follow Amazon Example In User Account Management</title><link>https://www.iphere.com/follow-amazon-example-in-user-account-management</link> <comments>https://www.iphere.com/follow-amazon-example-in-user-account-management#comments</comments> <pubDate>Fri, 17 Jun 2011 14:13:03 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Account]]></category> <category><![CDATA[Amazon]]></category> <category><![CDATA[Example]]></category> <category><![CDATA[Follow]]></category> <category><![CDATA[Management]]></category> <category><![CDATA[user]]></category> <guid
isPermaLink="false">http://www.iphere.com/follow-amazon-example-in-user-account-management</guid> <description><![CDATA[Organizations that manage sensitive customer information have largely done their users a disservice by using links in emails. While they are trying to be helpful by providing links, the critical side effect is that users get used to clicking on them and that is one way of facilitating phishing. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/follow-amazon-example-in-user-account-management/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>