January 28, 2014

The Internet of Things might not be what you're hoping for
The problem that we now face is that the internet into which IoT is being born is philosophically very different to the internet into which the web was born. The internet of twenty-plus years ago and prior was a place of free love and open standards. It all came from academia where commercial pressures were low. As we moved into the era where internet connectivity onto PCs was the norm -- I usually take this to be related to the introduction of Windows 95 -- what we as a society has done with the internet has had an uneasy relationship with this "free love", uncommercial philosophy.

Measuring the Impact of Social, Economic, and Technological Factors on Cybersecurity
Interestingly, the model found a paradox that stems from the modernization of information and communications technology. While increased Internet access and more mature technological development is correlated with improvement in cybersecurity at the global level, it has the opposite effect among countries with developing economies and lower levels of technological development. For example, as Broadband Penetration increases, Maximizers (countries that are more technologically mature) experience a decrease in malware, while Seeker countries (that are less technologically mature) experience an increase in malware.

Data-driven troubles
"Some time ago the company I work in decided to change one system with another. We wrote the new system and it was time for testing. In general at the first stage the new system must do the same things as the old one. We had a lot of tests for old system, so we decided to reuse these tests. The point was that the same test should be executed for both systems."

How and why to check port 32764 on your router
There are roughly 64,000 ports that are not tested by ShieldsUP. One of them is 32764. On a LAN, testing all 65,535 ports is a more do-able thing. Recently Eloi Vanderbecken did just that on his home network and turned up something interesting. His Linksys WAG 200G router responded to the virtual knock on the front door for port 32,764. The port was open and the router itself (not a computer on his LAN) was processing data sent to it.

Service Complexity And the Perils of Productization
Complexity can be a good thing. But when it comes to servicing customers, it is generally accepted that complexity reduces satisfaction. In other words, the proliferation of products in many service-based organizations prevents them from staying true to who they are—a service company. Service vision becomes clouded and the overall strategy is no longer clear to employees or customers. Modern banks simply have too many products and services for front-line staff to understand and properly explain to a customer.

Cisco aims to be cloud connector in hybrid data centers
Strategically, InterCloud may be the most interesting item for Cisco. If successful, InterCloud puts Cisco in the middle of the network and cloud connections on a software basis. Licensing models are still being worked out. If Cisco can make InterCloud a dominant software defined networking platform it'll have more licensing revenue and the profit margins that go with it. Meanwhile, InterCloud is designed to work with any server or switch, said Gori. Naturally, there will be more features enabled with Cisco's software and hardware combined.

Security testing basics: QA professionals take the lead
Having test professionals assume some responsibility for security testing basics is important for two reasons. First, application security is a growing concern for all software and test organizations as security breaches continue to make headline news. Second, getting testers involved can help solve a problem that plagues most software development organizations today, said Payne. "Where in the application lifecycle does security testing fit?"

Suspected email hackers for hire charged in four countries
Three other U.S. residents were charged with misdemeanor offenses for hiring email hackers from foreign countries. John Ross Jesensky, 30, of Northridge, Calif., is believed to have paid $21,675 to a Chinese website to get e-mail account passwords. Laith Nona, 31, of Troy, Michigan, and Arthur Drake, 55, of Bronx, N.Y., are suspected to have paid $1,081 and $1,011 respectively for similar services. The five defendants are expected to plead guilty in the coming weeks, the U.S. Attorney's Office said.

Big Data Influences More Long-Term Storage
The pursuit of big data has led to an increase of companies keeping older files they would have previously discarded, confirms Scott Gillespie, expert on regulations and compliance and senior VP of business analysis at Quadron Data Solutions. There is a six-year retention requirement of client account data, he explains. Account records, trades, holdings, profile information, goals and objectives and so on fall into this category. There are three reasons these records, which have historically been discarded with regularity, are now starting to stick around.

Agile with Guts - A pragmatic guide to value-driven development
You want to deliver valuable software with iterative delivery. There might be dozens of stakeholders with dozens of definition of value. How do you ensure you are both “building the right thing” and “building the thing right”? Suppose you are increasing your productivity, you might be building the wrong product faster. This book describes how a large organization uses techniques to focus on the right product and to deeply anchor the idea that less output can deliver more outcomes.

Quote for the day:

"The supreme quality for leadership is unquestionable integrity." -- Dwight D. Eisenhower