Welcome to our fully functional beta site. We welcome all comments
the Official Informatica Blog - Subscribe & get informed!
  • Psst! Wanna be anonymous?Most of us find the vast expanse of the Web more than a little overwhelming, so we rarely have an opportunity to think about 'what else might be out there'.

    Most people are also vaguely aware of the existence of a rich universe of virtual worlds layered across the vastness of the Internet. These make it possible for millions of people to spend a significant portion of their time interacting in digital universes or collaborating across obscure academic, military or commercial networks.

    To those people, the rest of us exist on the surface. The clearnet - or surface Web - is more than a nickname. It's a hint as to how this abstract universe is stacked, digitally overlaid atop the ecosystems of the Deep Web whose secretive existence is made that much more intriguing by its diversity of names. Indeed much of what exists below the Web we know goes by nicknames such as Darknet, Undernet, hidden Web or Invisible Web.

  • Defeating snoopersRevelations that global communications are being monitored more aggressively than previously imagined have sent the public looking for software to protect their privacy. This is a good opportunity to give you a "defense-in-depth" idea of what it might look like to use different layers of encryption in your everyday computing.

    Whether you’re a high flying executive or a stay-at-home mom, you have probably thought a lot about what privacy means to you. Do you ambitiously entertain notions of anonymity and confidentiality or simply hope to retain some control over the information you enter into your computer and send over the wires? Either way, here's something to get you started.
  • Why not lie to protect your identity?I’m always impressed at the low-tech nature of today’s most brazen hacking attacks and abuses of identity. It’s inevitable that someone will lie to get at your information, then leverage that information to get access to something valuable. In other words, people will lie to get access to your data. So here’s a thought: why not employ the same strategy to combat the problem?

Welcome to Informatica

Be Secure.

Be Trusted.

Follow us on