October 23, 2014

Generic pagination in C# for .NET WebAPI
The idea is really simple, and it's not a lot of code, but it's guaranteed to save you time in your next .NET WebAPI project. It's built with Entity Framework in mind, but it will work with any IQueryable collection. We use IQueryable because at the time of pagination, you should not have executed your query yet in most cases. Otherwise you would be fetching the full list of items before just returning a few of them, rather than fetching only those few to begin with. Of course if you need to fetch the whole list (to perform a calculation on each result perhaps) you can do that as well and simply cast the list AsQueryable() when you pass it to the pager.

How to Design for Discovery
Disruptive vendors focus on providing tools that facilitate discovery by design; they provide tools and technology solutions that make the end user more independent. Yet, self-sufficiency doesn’t happen in a silo. True discovery tools provide users the ability to connect to large volumes of new data and easily join different data sets together to filter, query, and visualize to explore data in detail without choking the system or relying on IT. Navigating the “new breed” of truly disruptive discovery tools means we must concentrate first and foremost on the elements that make a tool designed for discovery – with a robust, agile IT-independent and user-centric approach that has better access to data, agile high-performance,

Abandoned subdomains pose security risk for businesses
The risk to website owners depends on what can be done on a third-party service once a domain is pointed to it. If the service allows users to set up Web pages or Web redirects, attackers could exploit the situation to launch credible phishing attacks by creating rogue copies of the main website. In an attack scenario described by Detectify, a company might set up a subdomain for use with an external support ticketing service, but later close its account and forget to delete the subdomain. Attackers could then create a new account with the same service and claim the company’s subdomain, which already has the needed DNS settings, as their own, allowing them to set up a fake website on it.

Capitalizing on the data driven revolution
Despite the potential of big data, managing the massive amounts of data generated by customers and enterprises can be overwhelming. CMOs are constantly hearing about how they must use data to evaluate their marketing campaigns, operations managers are well aware that the use of data can optimize their supply chain, and finance executives are clamoring for ways to use analytics to realize cost savings. However, many organizations don’t know where to start or are stuck at an unsatisfactory halfway point.

Gmail’s New Inbox App Puts the Important Stuff on Top
Like-kind messages are grouped together in bundles so you can easily sort through a collection of messages quickly. The “social” and “promotions” tabs found in Gmail are default bundles in Inbox. You can tap into a “promotions” bundle, glance over all the companies who’d like to sell you stuff, and if nothing jumps out at you, swipe the entire collection of emails away and out of your view (doing this can archive or delete your emails in both Inbox and Gmail, depending on how you set up the app). The goal is that you’ll be able to open Inbox up and see a stream you can quickly browse through, acting on what you want and discarding the rest.

Happy 10th Birthday, Selenium
Selenium as a technology is now 10 years old. ThoughtWorks is proud to have created and open-sourced what is now the defacto-standard for cross platform cross browser web-app functional testing. We’re also proud to have released it as open source for the greater good. In honor of its 10th birthday, we put together the below timeline. Here’s to another 10 successful years.

U.S. national security prosecutors shift focus from spies to cyber
As part of the shift, the Justice Department has created a new position in the senior ranks of its national security division to focus on cyber security and recruited an experienced prosecutor, Luke Dembosky, to fill the position. The agency is also renaming its counter-espionage section to reflect its expanding work on cases involving violations of export control laws, Carlin confirmed in an interview. Such laws prohibit the export without appropriate licenses of products or machinery that could be used in weapons or other defense programs, or goods or services to countries sanctioned by the U.S. government.

Lessons in cybersecurity launched for schoolchildren
Ken Mackenzie, head of at Sedgehill School, said that presenting students with the opportunities to expand their digital skills was one of the key reasons why the school signed up. “Students at our school may live in London but they don’t necessarily experience London in the same way that students from more affluent backgrounds would. We feel computing is a particular strength at the school and we work hard to make sure we are presenting students with a full range of opportunities.” However, Mr Mackenzie also stressed that, aside from enhancing digital skills, the focus on careers was one that appealed to the school.

Sweat and a smartphone could become the hot new health screening
Heikenfeld says future applications for the patch could involve drug monitoring. "A lot of drug metabolites come out of sweat, so by using this technology, doctors can help patients take drug dosages more evenly. Our current methods, often based on age or body weight, are extremely crude when you think about all the side effects listed on the warning labels." "Ultimately, sweat analysis will offer minute-by-minute insight into what is happening in the body, with on-demand, localized, electronically stimulated sweat sampling in a manner that is convenient and unobtrusive," Heikenfeld concludes in the article.

Regulation on cloud security may spur SaaS use in health care
"The role of government is to move toward that transparency and data sharing," he said. Governments could also pass legislation that gives people more access to the data companies have collected on them and the ability to control it, such as correcting wrong information, said Ralph Zottola, CTO of the research computing division at the University of Massachusetts. "People are smart and are willing to participate but they need to feel they're not being abused," he said. This applies to all industries, not just health care, he said.

Quote for the day:

"A good objective of leadership is to help those who are doing poorly to do well and those who are doing well to do even better." -- Jim Rohn