July 20, 2016

The Body as Interface and Interpreting the Body talks

It helps us move away from viewing things in terms of the interfaces we are familiar with. For instance, we were able to provide an alternative to the mouse by introducing touch screens. We then moved from touch screens to more gestural interfaces with the Kinect and virtual reality goggles. We need to build devices that give users greater autonomy to determine where they go with the design. Thinking of the body as an interface and designing with that mindset, lends itself to a more experimental and iterative approach to design. ... You can track metrics like temperature, heart rate, blood pressure or breathing rate, to stop traders trading when they’re more likely to make a decision based on emotion. Emotion sensors can allow users to better control their behaviour in emotionally charged situations.


MicroProfile streamlines Java EE for microservices

The MicroProfile approach to optimizing for microservices is to start with a small core set of features and grow from there with heavy involvement from the community. The core platform will likely add functionality over time, some of which will come from Java EE related JSRs, and some that are not directly related to Java EE at all. For the latter, the MicroProfile community will investigate how to more directly address microservice-related patterns like circuit breakers, bulkheads and service discovery. The MicroProfile project aims to get Java EE back on the edge of innovation, Sharples said. "The goal is to ensure that when developers think about microservices they start with Java and Java EE; this enables them to start with the standards-based platform with familiar Java APIs."


CIOs and CISOs share insights on strategic collaboration

All executives with a C-level title should be working together toward the mission, said Mansur Hasib, program chair for cybersecurity technology at the Graduate School at the University of Maryland University College and author of the books “Cybersecurity Leadership” and “The Impact of Security Culture on Security Compliance.” ... "The C-level officers should be sitting together and offering each perspective on how to achieve this particular goal. The CIO might say, ‘OK, to do this we need to have a webinar, and we might need connections with the mayor’s office and maybe the state department of health.’ Another officer could say, ‘We need to put some ads in the newspaper,’ and someone else might say, ‘We need some town halls because consumers do not have technology for webinars, and further, maybe some door-to-door canvassing.’"


Why Virtual Reality is Auto Marketing's 'Sleeping Giant'

Automakers are also bringing virtual reality inside dealerships. For instance, Audi is rolling out VR systems at dealerships that allow customers to experience vehicles in various environments or to "virtually dive into specific parts of the vehicle and explore their technical design," according to Audi's website. "You're wearing the glasses and you really think you're in the car," Marcus Kuehne, Audi's virtual-reality project lead,told Bloomberg earlier this year. "You get a good feeling for the size -- do the rims fit to the body of the car, do the colors inside the car fit well together?" he added. "You can judge this much better through this technology than on a screen."


Microsoft is rolling out Windows 10 as a subscription service

At the enterprise level, Microsoft has always charged businesses for using Windows. The upgrade to Windows 10 from Windows 7 or 8 may be free, but the continued use of Windows in your business has never been free, nor should it be. The new twist in the conversation is that the fees for using Windows will be called a subscription now. Hardly earth shattering. At the consumer level, the future prospects of Windows 10 and the subscription model are much murkier. Where enterprises are willing to pay for more security assurances and management services, consumers may fail to see the value and resist a monthly fee. Microsoft knows this and will look for ways to mitigate such entrenched resistance.


Could Bulgaria's open source law transform government software worldwide?

The advantages of going open source are numerous, Bozhanov says. Most importantly, the new legislation will bring better written software, and developers will follow better practices. "Currently there's nobody inspecting the quality of the code or the architecture, and companies can get away with pretty low-quality solutions," he says. Open source will also offer more affordable software, with less money spent on support and fewer new projects commissioned simply because the old ones didn't work properly. Also, government contractors will be able to reuse the code when working on a common piece of functionality, without having to reinvent the wheel every time. "Companies will no longer be able to sell open-source solutions as complex custom software, which has [previously] happened," Bozhanov says.


The best mobile security plans examine risks first, then prescribe

The balance between risk and control is exacerbated when applied to mobile devices. Mobile devices (smart phones and tablets) are, by their very nature, designed to blend the organization and personal computing experiences. My phone is filled with personal photos and photos of whiteboard architecture and flow diagrams. My apps include my corporate email and expense approval as well as my personal mobile banking. ... When it comes to assessing risks, I like to first identify the specific risks and then, for each risk, define the likelihood and impact of the risk. I then figure out the best, most pragmatic way to mitigate the risks with the highest likelihood-impact combination.


Why ALM Is Becoming Indispensable in Safety-Critical Product Development

When developing complex software systems before, especially in scaled Agile environments, these issues are quite common. That's exactly the need that gave rise to the notion of Application Lifecycle Management. ALM tools help developers oversee and manage several (ideally all) stages of development using a single software solution. By design, they offer functionality across the entire lifecycle, supporting development from requirements to release. While ALM is a relatively modern concept, ALM solutions have been around for a decade or so, and have evolved a lot over the years. Some ALM vendors started out as developers of single-point solutions, and have developed further modules to add to the basic functionality of their products, or have acquired other solutions and created integrations between these preexisting modules.


Internet of Things in healthcare: What's next for IoT technology in the health sector

Inova Design's CEO Leon Marsh agrees: "The potential with IoT is that throughout a whole care pathway a person's data is continuously being gathered and used to help diagnose the patient so they can receive the best treatment as quickly as possible." Ideally, the objective data that could be taken from a network of IoT devices will also be able to significantly lower margins of error. And in the predictive realm, it could, for example, be able to detect the onset of a wide range of health issues, from high blood pressure to early signs of delirium. Emergency admissions could then, in theory, be reduced - with proactive health systems in place to address the problems before they become more serious or irreversible. More generally, data from a network of IoT devices has the potential to transform the check-in process, filling in past health data for professionals to review automatically.


Container Management Simplifies SDN Application Deployment

One of the problems that SDN companies attempted to tackle is the issue of firewall rule explosion. Firewall access control lists (ACLs) are notoriously difficult to understand and process. For example, a customer I worked with at a former company had 50,000 firewall rules on a single firewall device and they did not know if they could remove any one rule without breaking an application! Load balancers have similar problems as firewalls. With hundreds of applications, come thousands of rules that must reside in a single hardware load balancer. Clearly, there is a problem. One way to attempt to solve this problem is to create network application centricity. There are many network IT vendors that claim application-centric infrastructure and networking.



Quote for the day:


"The more that you read, the more things you will know. The more that you learn, the more places you’ll go." -- Dr. Seuss


No comments:

Post a Comment