January 19, 2015

Expert panel: Creating innovation in the federal government
The primary challenge is bringing together the right people to discuss interesting and important topics. When evaluating potential guests, I seek people whose ideas and activities are genuinely shaping our shared future. Three prominent guests appeared on CXO-Talk for a discussion about the evolving impact of technology in the federal government. The conversation explored how to encourage an environment of innovation in a huge, slow-moving organization. Although all three guests are strong supporters of work done by the Executive Office of the President and the agencies, their perspectives reflect the stark realism of experience.


Big Data Enters 2015
As we enter the new and exciting year 2015, the big data industry is well poised to achieve some truly great things. Our friends a DataRPM put together the compelling infographic below, “The Dawn of Smart Enterprise,” to highlight their predictions for how big data will advance in the coming year. 2015 should be gangbusters and insideBIGDATA will be here as your official news source to keep you well-informed.


The Three Cs of Web App Security
It's an application world and that means we're also increasing the rate with which we expose new web applications (and APIs) to the world. That parenthetical, too, is important. Failure to treat your API with as much care as a web app with respect to security could net you some pretty ugly results. And not the kind of ugly that grows up into a beautiful benevolent swan; I'm talking about the 9-headed hydra kind of ugly - the kind that takes the stuff of myth and legends to get rid of. For the security (and increasingly operations) practitioner, following the three Cs of web application security can provide a good foundation for keeping that hydra out of your app and your network and, of course, your data .


Where are Scrum Masters
It is no wonder that ‘ScrumMaster-less Scrum’ is one of the most common ‘Scrum-buts’ that I find when assessing Agile transformations. Considering that many companies obtain great benefits from this approach, it’s even tempting to consider ScrumMasters as ‘nice to have, although optional’. In fact, several Agile frameworks like Kanban, Cristal or Lean Software Development do not prescribe a ScrumMaster or Agile Coach role – and there is no mention of these in the Agile manifesto or in Nonaka and Takeuchi’s seminal article that inspired Scrum itself. To make things worse, Scrum-bashing has become a major sport on the Agile community.


SDN: software defined networking,  . . . or small distributed namespaces?
As a discipline, networking has lived a strangely separate existence from computing, over its history, and has adopted very different methodologies. It has embraced perhaps more of the methods of distributed systems than its computational counterpart (as it was forced to confront issues of scalability earlier), but it has fallen behind in the era of free and open source software innovation, and it's overdue for a makeover. Software defined networking could be that makeover. Maybe.


A Bendable Implant Taps the Nervous System without Damaging It
What’s new is how stretchable electronics are merging with a widening effort to invent new ways to send and receive signals from nerves (see “Neuroscience’s New Toolbox”). “People are pushing the limits because everyone wants to precisely interact with the brain and nervous system,” says Polina Anikeeva, a materials scientist at MIT who develops ultrathin fiber-optic threads as a different way of interfacing with neural tissue. The reason metal or plastic electrodes eventually cause damage, or stop working, is that they cause compression and tissue damage. A stiff implant, even if it’s very thin, will still not stretch as the spinal cord does.


Building Hybrid Teams
My experience with many hybrid teams is that the attitude towards each other as well as the coaching process is often not entirely positive - I will caveat this with saying that I've rarely coached a team that had only just started out, usually there was already a perceived "problem" with or in the team that highlighted the need for coaching. However I don't believe my experience is all that novel - a lot of offshoring team members are under great pressure to "be perfect" and having identified a need for coaching directly contradicts this perception. Equally, attitudes of onshore team members towards offshore team members can sometimes be negative - offshoring is often viewed as the "cheap" alternative and perceived as a direct threat to job security and ability to make a decent living.


The 1 Thing Every Employee Needs That Most Bosses Don’t Know How to Give
Every employee needs candid (yet caring) feedback about her performance, but most bosses shudder in fear at the thought of having that tough conversation. I’m the first to admit that having a discussion about an employee’s failing performance is one of the most unpleasant things a leader has to do; it’s awkward and uncomfortable for both parties involved. I mean, come one, no one likes to hear they aren’t doing a good job. But the way in which the feedback and coaching is delivered can make a huge difference. The key is to have a plan and process to follow.


Wishlist for 2015: The solutions we need in business tech
In general, there's always plenty of buzzing around fresh ideas in the tech industry, but too much of it focuses on quick hits and low hanging fruit. That's the easy stuff. It's a lot harder to go after intractable problems. But, we need some companies to step up, show leadership, take risks, and doggedly pursue solutions to these big problems. Make no mistake, some of these challenges connect into the larger themes of 2015, but they need a stronger focus on usefulness, especially for solutions that can benefit organizations and professionals.


Obama to Highlight Cybersecurity Proposals in State of the Union
"We don’t regulate Internet security the way we do, say, chemical plants and food production facilities. We just don’t do that - we might, but we’re not doing that now,” said Harris. In all, the White House has introduced three separate measures to combat cybercrime and strengthen privacy. The first, the Personal Data Protection and Notification Act, would require companies that handle data to alert customers if any of their private information had been compromised or stolen by hackers within 30 days. The measure has won strong backing by many retailers and other data companies.



Quote for the day:

"Most organizations staff their problems & starve their opportunities." -- Peter Drucker

January 18, 2015

David Cameron in 'cloud cuckoo land' over plans to deify security services
Independent expert Ive Noclue said: “It’s crazy. Cameron is living in cloud cuckoo land if he thinks that this is a sensible idea, and no it wouldn’t be possible to implement properly. You can't just go around turning ordinary intelligence officers into divine beings and creating a new omnipotent pantheon. This is obviously what the Tories are planning to do and it's not sensible." Other security experts echo Noclue, describing the approach as “idiocy” and saying Cameron’s plans are “ill-thought out and scary”.


Top Cloud Security Tips for CISOs
Integrating traditional security tools like those you're used to using in your on-premise data center might prove to be very complicated to use in the cloud, and may thus eliminate many of the cloud automation advantages. When possible, try to use tools specifically tailored to the cloud. Dome9 does a wonderful job providing an IaaS firewall, Incapsula provides a Web Application Firewall solution for such clouds, and Porticor provides an innovative key management and encryption solution for multiple IaaS clouds.


IBM Reveals Proof of Concept for Blockchain-Powered Internet of Things
The ADEPT concept, or Autonomous Decentralized Peer-to-Peer Telemetry, taps blockchains to provide the backbone of the system, utilizing a mix of proof-of-work and proof-of-stake to secure transactions. IBM and Samsung chose three protocols – BitTorrent (file sharing), Ethereum (smart contracts) and TeleHash (peer-to-peer messaging) – to underpin the ADEPT concept. ADEPT was formally unveiled at CES 2015 in Las Vegas. According to the draft paper, blockchains deployed within the ADEPT system would serve as a ledger of existence for billions of devices that would autonomously broadcast transactions between peers in a three-tier system of peer devices and architecture.


The time a major financial institution was hacked in under 15 minutes
Darkhotel is a specific operation where attackers are targeting C-level executives at major companies, and they're compromising hotel WiFi networks such that when you go to log into the hotel network, you get into the network and you think you're on the hotel's network, but they've actually gotten into the middle, so to speak, and your device then tells you, "Oh, you need to download a security patch for Adobe. Click here to update." And you're actually executing some malware on your device. Why are the C-level execs the target? Well, a couple of reasons. First, C-level execs are famous for wanting the rules bent for them. "I know you've got your security policies, but just make my iPad work, please!" That kind of thing.


Sony Xperia Z3 Tablet Compact review: Outstanding multimedia experience at a price
The Sony Xperia Z3 is one of my favorite smartphones, check out my review, so I was looking forward to spending time with the Xperia Z3 Tablet Compact. Sony took many elements of the sleek Z3 design and brought them to an eight inch Android tablet. It's thin, light, waterprooof, focused on audio and video experiences, optimized for PS4 gaming, and one of the best Android tablets you can find today. It is an iPad mini competitor and worth considering if you want an Android tablet.


Aligning Big Data
In order to bring some semblance of simplicity, coherence and integrity to the Big Data debate I am sharing an evolving model for pervasive information architecture and management. This is an overview of the realignment and placement of Big Data into a more generalized architectural framework, an architecture that integrates data warehousing (DW 2.0), business intelligence and statistical analysis. The model is currently referred to as the DW 3.0 Information Supply Framework, or DW 3.0 for short.


10 Companies to Watch in 2015
Every year we highlight 10 companies and technologies to watch. Our selection is driven primarily by the fact that the companies we mention have briefed us in the past 12 months, and hence we are reasonably familiar with their capabilities. Naturally, we tend to choose companies and technologies that are distinctive, innovative and align with what we consider to be the direction of the IT industry. Here is this year’s list, arranged in alphabetical order to avoid any suggestion that ranking is involved:


Should enterprises join the rush to use Docker's container software?
"Containers are not a landmark innovation," he wrote an email. If you take into account OS-level virtualization technology like BSD jails and Unix chroot, containers have actually existed for up to 30 years, he said. So why are the likes of Google, IBM, Amazon and Microsoft, as well as non-tech firms and big banks, signing up for what The New York Times describes as "a new way to create software," facilitated by Docker's brand of container technology? For starters, as Forrester's Dave Bartoletti lays out, Docker makes containers easier and more efficient to use, providing benefits that allow companies to provide services in such a way that formerly was possible only from large cloud vendors.


Podcasts by The Open Group
Listen to, or read the transcripts of, recent podcast sessions available on The Open Group Blog. The podcasts feature subject matter experts and panels consisting of Open Group members and staff. Our archive of podcasts serves as a repository of analysis and exploration on subjects most integral to the profession, and continues the conversations being held in our industry.


Is Open Source Collaboration the Key to Better Communication?
Communication has been pushed to new heights with advancing smartphone capabilities and cloud-based applications and services, but are these technologies making communication better?  One of the benefits of modern communication systems is the reduced friction of team and business collaboration. To fully realize the promise of these modern technologies, they must fit into daily workflows. They cannot be disruptive and must be complementary to how employees want to work.



Quote for the day:

"Remember that not getting what you want is sometimes a wonderful stroke of luck." -- DALAI LAMA

January 17, 2015

Things every programmer should know
Learning process of developers never ends. It is in our DNA to continuously feel the need to learn and self develop. As much as we learn, we have even more to learn. The technology world is moving so fast that to keep the pace and be up to date with cutting edge knowledge, we need to embrace learning as part of our daily activities. Whenever we say we learned to use a framework, we see that 7 other frameworks have become famous and we need to take a look on them. One of the most frequent questions of my students is the question “what should I learn to be a good programmer?”.


Introduction to the blockchain
The blockchain data structure is an ordered back-linked list of blocks of transactions. The blockchain can be stored as a flat file, or in a simple database. The bitcoin core client stores the blockchain metadata using Google’s LevelDB database. Blocks are linked “back,” each referring to the previous block in the chain. The blockchain is often visualized as a vertical stack, with blocks layered on top of each other and the first block serving as the foundation of the stack. The visualization of blocks stacked on top of each other results in the use of terms like “height” to refer to the distance from the first block, and “top” or “tip” to refer to the most recently added block.


Big Data Is No Longer Confined to the Big Business Playbook
Many smaller businesses are reluctant to invest in leading-edge technologies. Limited capital or the lack of the right staffperson might prompt even the most forward-thinking companies to avoid innovations or postpone such a move until they reach a certain revenue or profit goal.  It's an erroneous notion among small business owners and decision-makers that big data is too complex or something only big companies can afford to try out. Even the name -- the “big” in big data -- can seem off-putting. But it’s not as tough to dive into big data as small companies might think and the payoff can be significant.


Moving Towards a Theory of Enterprise Architecture
Enterprise architects are called upon to help in both ways. We have to answer questions like: “what does “innovation X” do for us, and what does it do to us?” We also have to contribute to ongoing concerns like “how do I grow my business in “Market Segment Y” in an innovative and compelling way?” and “How do I cut the cost of our IT expenditures?” and “How do I improve the quality of my customer data?” These questions fall under the category of “organizational cost”. Cost and quality come together to include a balance of monetary cost, effectiveness, customer satisfaction, efficiency, speed, security, reliability, and many other system quality attributes.


Man Saves Wife’s Sight by 3D Printing Her Tumor
Balzer wanted a tangible model of Scott’s cranium so that he could get perspective on the location and size of the tumor and think about what kind of treatment to pursue. The standard removal process for a tumor like Scott’s, known as a meningioma, is a craniotomy, in which the skull is sawed open. Her tumor was located under her brain, so to remove it, doctors would have to physically lift her brain out of the way. This is as risky as it sounds. Nerves can be dislodged, and patients can lose their sense of smell, taste, or even sight. Thinking about her thyroid surgery, she and Balzer wondered if a similarly noninvasive procedure might be possible.


Prep for continuous delivery with iterative development
If you don't have a staging environment for review before production release, you aren't ready for continuous delivery. If the business you work for hasn't made a commitment to continuous delivery, you cannot reap the full benefit of ongoing, rapid software releases. "Continuous delivery is the sum of a series of practices," said Carl Caum, prototype engineer at Puppet Labs. "The end goal is to deploy every [software] change at the push of a button. But there are numerous problems you have to solve before you can do that."


IT development, operations teams really do deliver when working together
DevOps is a key initiative because developers and operations teams typically have different mindsets -- developers tend to work in a more informal style, and all any and all hours. Operations folks are more focused on structure and schedules. To get software releases out the door faster, these two groups need to work in sync. ... Looking at the benefits another way, IT and business leaders with DevOps programs underway report they have seen upward bumps in the business metrics they have tied to their initiatives.


An introduction to Gulp
Gulp focuses on a few key points: First and foremost, speed. That speed comes in two flavors. We do not only have superior build system (does usually not matter so much), but also superior development speed (that matters much more). Why is the build speed superior? We will see that Gulp uses streaming, which will keep the working version in-memory, until we decide to create a version on the hard disk with the current contents. Easy CS101 tells us that latency and transfer rates of a computer's main memory is better than the usual HDDs. The second flavor is more controversial, yet much more important. By allowing any code to run, Gulp manages to get rid of plugins altogether.


Department of Defense Launches New Cloud Computing Security Requirements
“The SRG is designed to ensure that DOD can attain the full economic and technical advantages of using the commercial cloud without putting the departments data and missions at risk,” said DISA Risk Management Executive Mark Orndorff in a statement. Orndorff also issued a memo earlier this week (PDF) which indicates the version released by DISA may be followed by updates pending further research into some industry comments. The SRG applies to missions with “secret” or lower classification, and takes the place of the previous Cloud Security Model used by the DoD.


4 Reasons Why Executives Are Concerned About Digital Risk
Beyond the hype and hysteria in the press about cybersecurity threats, board members and senior executives are genuinely interested in the IT risks they currently face. This growing interest in IT risk is currently being driven by four consistent themes that we experience in our daily client interactions at Gartner.



Quote for the day:

"A single question can be more influential than a thousand statements." -- Bo Bennett

January 16, 2015

Cameron and Obama plan war games to test cyber resilience
The cyber war games agreement was announced as prime minister David Cameron held talks with president Barack Obama in the US. The two leaders also agreed that intelligence agents from GCHQ, MI5, the National Security Agency and the FBI will co-operate in "cyber cells" in both countries to improve the sharing of information about cyber threats, reported the BBC. ... Obama is expected to focus on cyber security in his State of the Union address on 20 January 2015. He recently previewed the address in a speech at the US Federal Trade Commission, in which he outlined some of the legislation he would like the US Congress to pass.


What do you do when your code has cancer?
One truth about business software applications is that they evolve together with business requirements. From different reasons, sometimes from lack of experience of developers and sometimes from not having enough time to devise good solutions, the code often tends to create some sort of cancer inside, which progressively grows to unmanageable pieces of software until it breaks the whole system. What do we do if we find such phenomenon in your code? In my experience I have seen that dealing with such code is almost inevitable in brown field projects. Ignoring them makes things only worse.


Flavors of Concurrency in Java: Threads, Executors, ForkJoin and Actors
Java threads are actually mapped to the operating system threads and every Thread object represents one of the lower level computation threads. Naturally, the lifecycle of a thread is taken care of by the JVM and scheduling is not your concern as long as you don’t have to make Threads communicate with each other. Every thread gets its own stack space, consuming a part of the designated JVM process memory. The Thread API is pretty straightforward, you feed it a Runnable and call .start() to begin the computation. There’s no good API to stop the Thread, you have to implement it yourself using some kind of boolean flag to communicate.


5 attitudes to accelerate leadership development in 2015
Often the elephant in the room (or on the team) is the consistent poor performer. No matter what you do, you can’t find a role where they bring energy. Everyone seems drained as they interact with them. At best, they are simply someone to be avoided. At worst, they act like a ringleader, sucking people into their energy drain. You still must put them in a position to succeed, too. That may mean a very unpleasant review or series of reviews. It may even mean helping them find someplace else to work. Helping them become a good performer is in their best interest. No one wants a job where they’re not appreciated.


Defense IT Investment to Focus on Big Data, Cloud
The combination of a shrinking force size and technological advances are driving the importance of data and analytics. Advances in sensors, wireless networks, and unmanned aerial vehicles have resulted in a flood of new data. Despite the need to rely more heavily on data for situational awareness and predictive analytics to give them the edge over the enemy, defense leaders are concerned that they will not have the people or time to deal with all this new information. Technology will need to bridge the gap. Additionally, on the business side of the house, the military is looking at its data for new ways to increase efficiencies and make more informed decisions.


Time for CEOs to Step In and Stop CIO-CMO Bickering
On the relationship side, we've certainly seen people recognizing the real challenge, not just focusing on personality differences. CMOs in particular need to understand the challenges in the technology environment. We've spent a lot of time with clients working through that awareness and education about what's smart and not smart implementing technology and, ultimately, the end result that may come about if CMOs make lateral decisions too quickly. On the business side, it's what do we do about it? We've got some of these technologies that are hard to work around. We've seen some organizations able to implement cloud-based solutions and incrementally move the needle on what the marketing organization is able to achieve.


Developers See Enterprise Shift for IoT in 2015
"These survey results confirm that IoT is crossing over from consumer gadgets to business productivity and customer engagement," said Michael Swindell, senior vice president of products at Embarcadero, in a statement. "In the consumer space, individuals connect to IoT typically through a single personal mobile device, with the IoT experience encircling the user. However with business solutions IoT includes users and encircles the business and enterprise assets. The IoT connected applications developers build for the Enterprise are essential to connect the disparate parts of a distributed IoT business solution – from mobile devices, to wearables and sensors, to cloud and on-premises Enterprise back-ends. Software developers will clearly play a pivotal role in driving IoT innovation and business adoption in 2015 and beyond."


The path to continuous delivery
Continuous delivery from the business angle needs small incremental changes to be delivered on a regular basis. Agile IT aims to do the same, but there are often problems in the development-to-operational stage. Sure, everything has been tested in the testing environment; sure, operations understand how to implement those changes in the run-time environment. According to a survey by VersionOne, 85% of respondents stated that they had encountered failures in Agile projects - a main reason stated was that the company culture was at odds with an Agile approach.


Resource Governor Enhancements in SQL Server 2014
The Resource Governor allows the user to put restrictions on the amount of resources which can be used from the SQL Server instance’s total available resources in each database’s workload. The versions of Resource Governor that we released with SQL Server 2008 to SQL Server 2012 were limited in functionality as they could specify limits for only the CPU and the memory requested by the incoming application within a resource pool. In the latest version, SQL Server 2014, the developers have improved this feature to include a couple of additional functionalities. These settings can now control the minimum and maximum physical I/O operations per second per disk volume for user threads of a given resource pool.


Conversation Patterns for Software Professionals. Part 3
Since the source code can be structured (in the form of design patterns), which makes it easier to develop and maintain, why not apply the same analogy to a conversation? When we look at the conversation in a structured and orderly manner, it may help us lead it more effectively. What we mean here is not related to patterns of conducting meetings, during which every participant has their specific role. We are talking about something more fundamental – about how people exchange information (especially people form business with those from IT) in the course of a conversation. We assume that your interlocutor does not need to have any knowledge about the techniques of gathering information or conducting meetings.



Quote for the day:

"As a manager; the more uncomfortable the conversation you have to make is, the more important it is." -- @LeadershipCures

January 15, 2015

2015 Top Five Data Center Trends
As the conversations continue to circulate between IT companies and Datacenter Providers, it appears we have some differing opinions on what is to emerge in the New Year. Although there are many predictions on what will increase and what will decrease in popularity, some areas of the industry have brought about an increased chatter among the experts. In this article, we walk though the top five up-and-coming themes predicted to take place in 2015. They include trends in cloud, virtualization, internet of things (IoT), and the size of the industry.


Mobile users encountered malware 75% more often in 2014 compared to 2013
"We've seen a significant increase in both the frequency and sophistication of attacks that would truly represent a concern for the enterprise, like exploits that would let the bad guys get access to corporate networks," he said. "We also saw a greater prevalence and sophistication of applications that enable rooting or jail breaking the device." For enterprises in particular, the top security threats associated with mobile devices are loss of sensitive data and illicit access to corporate networks. "The threats that we found targeted both of these issues," Cockerill said.


Bruns-Pak: Datacenters vs. collocation vs. cloud computing
Owning and operating one's own data center might actually be the lowest cost option if the overall cost is considered. This approach, however, is not without its challenges. This approach requires the largest up-front investment as well as the need for the largest staff. Using this approach makes it possible, however, for an enterprise to take advantage of the reduced costs produced by purchasing systems, storage, software, power and networking in bulk. It also offers the opportunity of potential tax advantages of owning real estate, buildings and the like.


Intel-backed OIC advances in fast-moving IoT standards race
Though it seems too soon to be pushing out specifications and code, given that the industry isn’t expected to settle on standards until next year or later, this may be the best time to capture the hearts and minds of product developers. The International CES show last week in Las Vegas was rife with emerging (and some half-baked) IoT devices, especially for smart homes. Those that make it to market will eventually need to lock into some platform for working with other connected products. The OIC is developing its own standard for IoT connectivity but turned to the Linux Foundation to organize the project that is developing IoTivity. That project is open to anyone who wants to participate, whether they belong to OIC or not.


Nine CIO tips for surviving and thriving in 2015
In part one of Harvey's 2015 predictions column for CIOs, he singles out three trends that will continue to have big ramifications for the CIO role and enterprise IT next year. Here, he offers readers nine CIO tips for surviving and thriving in 2015, plus a cautionary compilation of quotes illustrating the danger of making technology predictions:


How to make applications resilient on AWS
Amazon provides different services to decouple systems and make them more reliable. One of the first services was Simple Queuing Services (SQS). Amazon describes SQS as a distributed queue system that enables service applications to quickly and reliably queue messages that one component in the application generates to be consumed by another component. Later, other services such as Simple Notification Service (SNS) or Simple Workflow Service (SWF) followed. One of the main characteristics of the cloud is elasticity, which means not making any assumptions about the health, availability or fixed location of other components.


Keeping Big Data Secure: Should You Consider Data Masking?
As Girard points out, one of the problems associated with traditional data masking is that, “every request by users for new or refreshed data sets must go through the manual masking process each time.” This, he explains, “is a cumbersome and time-consuming process that promotes ‘cutting corners’– skipping the process altogether and using old, previously masked data sets or delivering teams unmasked versions.” As a result, new agile data masking solutions have been developed to meet the new demands associated with protecting larger volumes of information.


5 Agile Ways to Achieve your New Year’s Resolutions
Perhaps we can use recent advances in software project management to get that success rate higher. Traditional software development efforts last one to two years and are managed by planning everything up front with what are called “waterfall” management practices. According to the Standish Group, the failure rate for waterfall projects from 2002 to 2011 was 29%. The costs for these failures can be measured in billions of dollars wasted. Agile management practices, which introduce frequent inspection and adaptation, have succeeded in reducing project failures to about 9%.


New report: DHS is a mess of cybersecurity incompetence
The report cautions about DHS's limited strategies, noting: "While patch management and cyber hygiene are clearly important, they are only basic security precautions, and are unlikely to stop a determined adversary, such as a nation state seeking to penetrate federal networks to steal sensitive information." The section on cybersecurity is titled: "The Department of Homeland Security is struggling to execute its responsibilities for cybersecurity, and its strategy and programs are unlikely to protect us from the adversaries that pose the greatest cybersecurity threat." One example in that section shows DHS departments effectively lying about performing critical and well-known security updates -- updates that DHS warned the public about via US-CERT.


New service wants to rent out your hard drive's extra space
The service works by first uploading a file-sharing application onto a user’s computer then breaking file data into small 8MB or 32MB blocks, or “shards,” as Storj calls them. Each block of data is encrypted with a unique hash, and then the pieces are distributed throughout the cloud network, according to a white paper the company published on its peer-to-peer storage technology. The file blocks get distributed throughout the network on nodes called “DriveShares” located all over the world. Storj uses hash chains or Merkle Trees, as they are sometimes called, to verify the contents of a file after it has been broken up into blocks or “leaves” off of a master or root hash.



Quote for the day:

"A budget tells us what we can't afford, but it doesn't keep us from buying it." -- William Feather