March 31, 2016

Full Stack Testing: Balancing Unit and End-to-End Tests

At their core, tests make sure your application is doing what you intend it to do. They are an automated script to execute your code and check that it did what you expected. The better they are, the more you can rely on them to gate your deployments. Where your tests are weak, you either need a QA team or you ship buggy software (both mean your users get value at a much slower pace than is ideal). Where your tests are strong, you can ship confidently and quickly, without approvals or slow, manual processes like QA. You must also balance the future maintainability of the tests you write. Your application will change and thus so will your tests. Ideally, your tests only have to change proportionally to the change you are making in your software. If you are making a change in an error message, you don’t want to have to rewrite a lot of your test suite. 

From Role-Based Access Control to Access Governance

Because the organization is fluid (e.g. reorganizations, mergers, etc.), the composition of the attributes (the payroll system) is in a constant state of change. The network landscape is also subject to change. And this means that the model that was set up has to be reviewed regularly. Validating the RBAC model is also known as re-certification. Re-certification checks whether the authorizations a person receives on the basis of his attributes are still appropriate within the organization. Alongside validating the RBAC model that has been set up, part of access governance is also to test the reality. This is called attestation. In attestation the organization itself is asked whether the assignment of certain authorizations to employees is in fact correct.

Coursera Announces First MOOC-Based Master’s Degree in Data Science

Data science has quickly become one of the most sought-after and highest-paid professionsin the United States, yet few highly ranked master’s programs exist today that are developed specifically for training data scientists, and none offer the scale of an open online course platform. The MCS-DS degree taps a whole new demographic of potential data scientists who are unable to take a traditional education path by reimagining graduate-level education as a “stackable” degree. Unlike other master’s degrees, students can test the waters of the MCS-DS degree with a shorter Specialization certificate program in data mining or cloud computing, earning a meaningful credential that can then fully transfer to the MCS-DS if they later decide that they want the full degree.

10 Ways Virtual Reality is Disrupting Industries

The concept of remodeling isn’t just limited to education or world history. It is creating ripples in the medical world as well. For quite some time now, Virtual Reality is being used to treat Posttraumatic Stress Disorder (PTSD) in war veterans. Using VR therapists recreate situations which the patient fears while they are still in a safe environment. Commonly known as exposure therapy, this helps soldiers in dealing with the stress endured on the during real-world war situations. USC’s Institute for Creative Technologies has been remodeling sites of Iraq and Afghanistan in virtual reality to help warriors combat PTSD. Another healing application of VR in medical is helping amputees deal with phantom pain by recreating their limbs.

Why Hospitals Are the Perfect Targets for Ransomware

The payoff for hackers can be huge. The FBI estimated in 2014 that the extortionists behind the CryptoLocker strain of ransomware swindled some $27 million in just six months out of people whose data they took hostage. And ransomware attackers have upped the ante in recent months with attacks that encrypt not just files on an individual computer but on core servers, to prevent an entire organization from accessing shared files and databases. ... “You don’t have to lock an entire network,” Sjouwerman says. “You just need to find where are the critical files in a network—what servers are serving up the millions of files that most workers use…. And you only need to lock maybe two or three file servers to essentially block the whole network.”

IBM Data Chief on Strategy: Training Engineers for Cognitive Systems

Data is playing an ever-growing role in the business world, with machine learning software and artificial intelligence systems like IBM’s Watson leading the way. IBM’s Bhandari says that IBM is focused on training more data scientists and engineers in analytics systems, such as open-source computing framework Apache Spark, because it believes the amount of human talent has not kept pace with advances in analytics. Simply put, there are not enough people who can take action on insight that is provided by today’s data-analytics software, like the video footage of the Magic-Heat games did for the in-game stats, he says. IBM’s corporate strategy in the current market is on cognitive systems, such as Watson, Bhandari says.

Senator Wyden Lays Out New 'Compact For Privacy & Security In The Digital Age'

Here’s the problem. A few decades ago, courts began ruling that if you provide information to a third party, like your bank or your phone company, you are no longer keeping it private, and it is no longer protected under the Fourth Amendment to the Constitution.  There is a huge, glaring problem with that logic. When you share your information with a single private company, that is not the same thing as making it public. Your phone company may have records of who you call, and your bank may have records of how you spend your money, but your contract with them will have rules for when and how they are allowed to share that information. They are not allowed to just disclose it freely.  This is true in the digital world as well. When I post a handsome new profile picture on Facebook, or send out a tweet to tell people that I’m holding a town hall in Oregon,

Enterprise Mobility is Going Beyond “Mobile First” Approach. Are You Ready?

The future is likely to become even more connected, thanks to internet of things and M2M (machine-to-machine) communications. This means, businesses now need to go beyond ‘mobile first’ planning. By this we mean you need to develop a strategy that puts your business at the forefront of mobility. You need to go beyond just creating mobile applications and services when it comes to deploying mobile technologies. While these efforts were tactical enough to address the need for people to remain connected 24*7 across various devices, they won’t suffice to make your business ready for the mobile journey of the future. Today, we see more and more businesses are investing resources to create a mobile strategy that can successfully transform the enterprise, changing the way they run their business.

5 Dev Tools For Better Code Security

Information security is of paramount importance these days, and there is no better place to start securing systems and data than in the software development process itself. Lapses in coding can leave systems vulnerable to attackers. But examining thousands and thousands of lines of code for a wide array of potential weaknesses is no easy task. Thankfully, a variety of tools are emerging to help ensure the security of your code. With the help of capabilities such as static analysis, these tools not only flag possible issues but enforce security a priority in the development process. Following are five tools aimed at analyzing your code for security flaws, ranging from open source to commercial offerings, available as on-premises solutions or services in the cloud.

Why CISOs Need to Build Better Business Cases For Data Security

The overall budget for security-related costs is often within decentralized healthcare organizations and resides with a number of different clinical, business and technology areas. Typically, the easy business case to make for security investments comes from improving the organization’s overall security posture. However, CISOs will have to redesign this undemanding path toward an approach for making business cases in terms executives can appreciate and directly connect to the organization’s top strategy goals and objectives. Making more effective business cases can help to gain investment dollars and increased control for a budget not always under a CISO’s direct management.

Quote for the day:

"There are many elements to a campaign. Leadership is number one. Everything else is number two." -- Bertolt Brecht

No comments:

Post a Comment