Assessments

What is Lorem Ipsum?

From its medieval origins to the digital era, learn everything there is to know about the ubiquitous lorem ipsum passage.From its medieval origins to the digital era, learn everything there is to know about the ubiquitous lorem ipsum passage.

Prevailing view assumed lorem

Until recently, the prevailing view assumed lorem ipsum was born as a nonsense text. “It's not Latin, though it looks like it, and it actually says nothing,” Before & After magazine answered a curious reader, “Its ‘words’ loosely approximate the frequency with which letters occur in English, which is why at a glance it looks pretty real.”

As Cicero would put it, “Um, not so fast.”

The placeholder text, beginning with the line “Lorem ipsum dolor sit amet, consectetur adipiscing elit”, looks like Latin because in its youth, centuries ago, it was Latin.

Richard McClintock, a Latin scholar from Hampden-Sydney College, is credited with discovering the source behind the ubiquitous filler text. In seeing a sample of lorem ipsum, his interest was piqued by consectetur—a genuine,

Fuzzy Beginnings

So how did the classical Latin become so incoherent? According to McClintock, a 15th century typesetter likely scrambled part of Cicero's De Finibus in order to provide placeholder text to mockup various fonts for a type specimen book.So how did the classical Latin become so incoherent? According to McClintock, a 15th century typesetter likely scrambled part of Cicero's De Finibus in order to provide placeholder text to mockup various fonts for a type specimen book.

Our Experts Can:

^
Lead strategy sessions that identify and explain current IAM trends and vendors and pinpoint customer business drivers and challenges.
^
Examine your organization’s existing infrastructure and system architecture to establish a roadmap that best addresses your organization’s needs.
^
Implement leading IAM technologies to develop a risk-appropriate approach to address single sign-on (SSO) and federated identity, password management, life cycle management, identity governance and privileged access management.
^
Improve your existing IAM program from tactical projects to a strategic security program.
^
Make identity a core component of your security strategy to maximize your cybersecurity investments.

Visit our security services page to learn more about how we help organizations secure their assets, operations and data.