Posted by cadsmith on January 16, 2011
Automated testing improves usability. Ten ways good and bad hackers operate. PQ Labs SDK can handle 32-finger touchscreen. Stack Exchange has an answers community. Newsle filters friends in the news. DIY combines real and animated video. PixelOptics automatically focuses eyewear. Drones used for construction. Scooba robotic washer updated. Growbots learn on their own. New consumer bots shown at CES 2011. Vanishing commons and means of dissent point to global elite. Wall Street has its own code. Political implications of networking hint at Machiavelli 2.0. JFK Library now digital. Mass. Workforce Training has grants. Globalization may be superceded by the Walled Wide Web. Universal Electronic Card implemented in Russia. Bulgarian cybercrime expert missing. Tunisian cyberattacks linked to government. Superstreet routing has smoother, safer traffic. Snowmobiles are fitted for all-weather racing. Fruit Flies do computation. 34,000-Year-Old Organism found alive. There were 25 recent links.
Fundamentals of Information Systems Security, Kim and Solomon, 2010
Chapter 7 has testing recommendations. The goal is mitigation of risks due to threats and vulnerabilities. Security testing paths include reconnaissance, network mapping, and testing of vulnerability and penetration. Scans show vulnerable services that require a patch. Configuration hardening turns off unnecessary services. Covert testers act like hostiles. Intrusion detection systems may be network or host-based. A Security Information and Event Management system organizes log files. Benchmarks include ISO 27002, NIST SP 800, ITIL, COBIT, COSO. The Disaster Recovery Plan can be tested using checklist, structured walkthrough, simulation, parallel or full-interruption. A security gap analysis compares what the system has and what it needs. The book has 3 parts, 15 chapters having quizzes, and 4 appendices. There is a comprehensive glossary of key terms, and a list of references. The rest of the book has preparation for the Systems Security Certified Practitioner.
Posted in Uncategorized | Tagged: answers, automotive, digital-libraries, economics, identity, investing, network, news, optical, robotics, science, security, test, touchscreen, training, travel, video | Leave a Comment »
Posted by cadsmith on August 17, 2010
The internet wants to be the answer. It has tied together all of the testimonials and provided search to find sources, and rankings to reveal the best. Women can review unbiased medical advice, and patients all of their records. It can reshape itself from smartphones if needed. Show sensors tell people what to hear. Robotics reports progress in batteries, walking, emotions and space travel. The brain is almost mapped. Beyond scifi, the imagination is also scenic, intriguing and mysterious.
Recent links (twenty-two):
Swingly | It’s time you got some answers.
Exploring How to Build a Cloud With Smartphones – ReadWriteCloud
IBM’s Cloud Computing Coming to a Hospital Near You
4 Tools for Assessing Cloud Performance – ReadWriteCloud
FindTheBest.com | Find. Compare. Decide.
The Best Top 10, Top 100 & More Lists: List Making is Easy at Ranker | Ranker – A World of Lists
Boston-Power heads to the moon – Boston Business Journal
A Robot Capable of Developing Bonds and Showing Emotions
IEEE Spectrum: Iran’s Humanoid Robot Surena 2 Walks, Stands on One Leg (Video)
Robot to escort on space shuttle mission: NASA – International Business Times
Kraken, China Mieville, 2010
Terminal World, Alastair Reynolds, 2010
The Dervish House, Ian McDonald, 2010
Posted in Uncategorized | Tagged: answers, books, cloud, cognitive, fiction, manufacturing, medical, ranking, rfid, robotics, scifi, startup, writing | Leave a Comment »