Monday, September 26, 2016

Studying Failures - Tim Mitchell

Studying Failures - Tim Mitchell



As awful as any of these events is, it would be even more tragic to miss
the opportunity to learn exactly why and how it happened. To learn
nothing from such a failure is to increase the risk of it occurring
again.



It actually makes me a more confident air traveler, because each
incident that occurs increases the body of knowledge on why planes crash
and how to prevent future accidents. The more our experts know about
the dangers of manned flight, the safer air travel becomes.

Saturday, September 24, 2016

Bossie Awards 2016: The best open source networking and security software | InfoWorld

Bossie Awards 2016: The best open source networking and security software | InfoWorld



A datacenter penetration testing tool, Infection Monkey spins up infected virtual machines in random parts of the network. Inspired by Netflix’s Chaos Monkey



lectronic Frontier Foundation is working toward a world where all web traffic is encrypted by default. First came HTTPS Everywhere, a browser extension that ensures the use of secure connections. Now the EFF aids website administrators with its free Let’s Encrypt CA (certificate authority). To automate the process, the EFF released Certbot, a client that communicates with Let’s Encrypt to get TLS/SSL certificates



Sponsored by the Open Networking Foundation, Delta is designed to help penetration testers probe software-defined networks for any security issues



Domain Controller Enticing Password Tripwire (DCEPT) is a honeytoken-based tripwire for Microsoft's Active Directory from Dell SecureWorks



VersionEye
checks the libraries in your development projects against the contents
of package managers for Java, Node.js, Python, PHP, Ruby, and other
languages, alerting you when your libraries are no longer up to date.



Pwnie Express also maintains the Android Open Pwn Project (AOPP), an Android ROM built for penetration testers



Needle does for iOS what Drozer does for Android. 



ConnectBot
offers that same freedom we once only dreamed about -- although
connecting via SSH on the go to check in on a server feels more like
work than novelty these days.



running Signal on your iPhone or Android smartphone.



Google’s GRR Rapid Response pairs a central server with client-side agents to form an enterprise scalable incident response tool 



The Sleuth Kit (TSK)



Lynis in your toolkit. A fast system auditing tool,



Cuckoo Sandbox is a fenced-in or sandboxed environment for automated malware analysis. 



Vault, like Consul built by HashiCorp, is a tool for secrets management.

Inbenta Raises $12 Million to Improve Natural Language Searches

Inbenta Raises $12 Million to Improve Natural Language Searches



More than 200 companies have added the software to their customer
“knowledge bases” including Groupon, Ticketmaster, and Schlage. (It
supports cloud service desk software from Zendesk and Salesforce, among others.) Inbenta’s software also powers chatbots—apps that simulate basic conversations—such as one used by bitcoin marketplace Xapo.

AI that identifies pixelated & blurred faces easy for hackers to exploit - researchers — RT Viral

AI that identifies pixelated & blurred faces easy for hackers to exploit - researchers — RT Viral



Researchers at Cornell University and
University of Texas at Austin trained artificial neural networks to
successfully identify faces, objects and handwritten digits even if the
images were protected by obfuscation techniques such as blurring,
mosaicing or P3 - a type of JPEG encryption.



The team tested their technique on YouTube’s blur tool using the
pixelation technique, which can be used in Photoshop and other common
editing programs and on Privacy Preserving Photo Sharing (P3) - a
process that encrypts identifying data in JPEG photos so humans can’t
see the overall image but maintains other data in the file.

Marrying Ephemeral Docker Containers to Persistent Data | Linux.com | The source for Linux information

Marrying Ephemeral Docker Containers to Persistent Data | Linux.com | The source for Linux information



Kendrick Coleman of EMC {code} demonstrated how to have both
ephemeral containers and persistent data in his talk called "Highly
Available & Distributed Containers" at ContainerCon North America.


As container technologies become more complex, using them becomes
easier. Coleman gave a wonderful presentation using a Minecraft game to
demonstrate persistent data storage with ephemeral containers, and did
it all live. This setup requires two technologies that were not
available as recently as a year ago: Docker SwarmKit and REX-Ray.

What They Don't Tell You about Microservices...

What They Don't Tell You about Microservices...



Daniel Rolnick provides insights on building and deploying microservices
and talks about the process Yodle went through adopting and deploying
microservices, including database architectures and architectural
patterns that emerged. 

Need Some AI? Yeah, There’s a Marketplace for That | WIRED

Need Some AI? Yeah, There’s a Marketplace for That | WIRED



Diego Oppenheimer is worried that the Googles and the Facebooks will dominate the world of artificial intelligence.


It’s a legitimate worry. Elon Musk and Sam Altman are worried about the same thing. That’s why they created a startup called OpenAI. In recent years, Google and Facebook have snapped up so many researchers at the heart of the deep learning movement, an AI movement that’s rapidly reinventing everything from speech recognition to security.

Inside The Mind That Built Google Brain: On Life, Creativity, And Failure

Inside The Mind That Built Google Brain: On Life, Creativity, And Failure



Carnegie Mellon, MIT, UC Berkeley, and Stanford. These are the same
places, respectively, where Andrew Ng received his bachelor's degree,
his master's, his Ph.D., and has taught for 12 years.




Ng is an icon of the artificial intelligence world with the pedigree
to match, and he is not yet 40 years old. In 2011, he founded Google
Brain, a deep-learning research project supercharged by Google's vast
stores of computing power and data. Delightfully, one of its most
important achievements came when computers analyzing scores of YouTube
screenshots were able to recognize a cat. (The New York Times' headline: "How Many Computers to Identify a Cat? 16,000.") As Ng explained,

How the startup world is bringing digital nomadism closer to reality | TechCrunch

How the startup world is bringing digital nomadism closer to reality | TechCrunch



Digital nomads
are free-spirited freelance and tech workers who need little more than
an internet connection and a passport. They’ve taken the concept of
remote work out of the home office and made the big, wide world their
workplace.


With half of the American workforce spending some time each week working remotely,

React: Facebook's Functional Turn on Writing JavaScript

React: Facebook's Functional Turn on Writing JavaScript - ACM Queue



One of the long-standing ironies of user-friendly JavaScript front
ends is that building them typically involved trudging through the DOM
(Document Object Model), hardly known for its friendliness to
developers. But now developers have a way to avoid directly interacting
with the DOM, thanks to Facebook's decision to open-source its React
library for the construction of user interface components.

How to Be More Assertive, According to Research

How to Be More Assertive, According to Research



Professor Randy Peterson points out something interesting: passive people don’t just avoid conflict. They often avoid saying a lot of good stuff too.




You might think that a person who overuses the passive style would
have no great difficulty giving positive feedback. They might be giving
it constantly, using a “Here’s a compliment, don’t attack me” strategy.
In fact, the reverse seems to be true. Most passive individuals not only
avoid conflict, they also avoid the expression of positive feeling.
They seldom give compliments, express affection, or provide positive
feedback.



As you become more assertive, you’ll be a more encouraging, supportive, friend, partner, employee or co-worker.

Deploying Microservices with Amazon ECS, AWS CloudFormation, and an Application Load Balancer

awslabs/ecs-refarch-cloudformation: A reference architecture for deploying containerized microservices with Amazon ECS and AWS CloudFormation (YAML)















A reference architecture for deploying containerized microservices with Amazon ECS and AWS CloudFormation (YAML)




This reference architecture provides a set of YAML templates for deploying microservices to Amazon EC2 Container Service (Amazon ECS) with AWS CloudFormation.

Facebook and Intel reign supreme in 'Doom' AI deathmatch

Facebook and Intel reign supreme in 'Doom' AI deathmatch



the island of Santorini, Greece, a group of AIs has been facing off in an epic battle of Doom.



This is VizDoom, a contest born from one man's idea:
to improve the state of artificial intelligence by teaching computers
the art of fragging. That simple notion then spiraled into a battle
between tech giants, universities and coders. Over the past few months,
they've all been honing their bots (known as "agents"), building up to
one final death match.

How Machine Learning, Big Data And AI Are Changing Healthcare Forever

How Machine Learning, Big Data And AI Are Changing Healthcare Forever



While robots and computers will probably never completely replace
doctors and nurses, machine learning/deep learning and AI are
transforming the healthcare industry, improving outcomes, and changing
the way doctors think about providing care.




Machine learning is improving diagnostics, predicting outcomes, and just beginning to scratch the surface of personalized care.

Google Deepmind: Should patients trust the company with their data? - BBC News

Google Deepmind: Should patients trust the company with their data? - BBC News



Google's artificial intelligence unit DeepMind is getting serious about
healthcare - with ambitious plans to digitise the NHS - but first it
needs to convince patients to hand over their medical records.

New survey of more than 2,100 JVM developers finds at least half now embrace microservices to boost their speed and agility

Survey: in a DevOps world, microservices rule | ZDNet



Microservices are highly granular and modular services, constructed via
APIs and HTTP, capable of running their own processes independent of
centralized management. An advantage is that a microservice failure will
remain contained to that microservice, not the entire application.

Thursday, September 22, 2016

On Being Economical with the Truth - Simple Talk

On Being Economical with the Truth - Simple Talk



What actually should happen in the course of creating an application is
messier and more complicated than the perceived wisdom implies. The art
of developing effective software generally relies on there being several
phases. First, there is a wild, creative phase where anything goes, and
there is a lot of architectural sketching, rapid development of
prototypes and wireframes. Alternative technologies and algorithms must
be assessed. There is a second phase where there is enough consensus
that the team can work together to create a likely candidate
application, which is close enough to the final product. At this stage,
major U-turns can be considered, even if it frightens the project
manager. The final stage is a disciplined and highly structured march
towards release.

Monday, September 19, 2016

How should candidates—and voters—argue about politics?

The State of the Presidential Debate - The New Yorker



First televised Presidential debate, between Richard M. Nixon and John F.
Kennedy, in 1960. Nixon and Kennedy met in a bare CBS studio in
Chicago, without an audience; the event was broadcast, live, by CBS,
NBC, and ABC.

React: Facebook's Functional Turn on Writing JavaScript - ACM Queue

React: Facebook's Functional Turn on Writing JavaScript - ACM Queue



Pete Hunt, and Paul O’Shannessy, talk about their perspectives on the
need for React, and elucidate all the architectural decisions that were
took to offer a solution for a “referentially transparent UI”; quite an
insightful discussion.