"At the end of the day, maybe the question to ask is “What do I need to do to make it not worth a casual hacker’s time to penetrate my network?” or “What is the real cost of having my network compromised?”, and going from there. There is no quick and easy answer...
The book I recently read, “Lean from the Trenches: Managing Large-Scale Projects with Kanban by Henrik Kniberg” does exactly that, offers a captivating real life example.
First things first the author is a popular keynote speaker at conferences worldwide, he has an excellent knowledge about Agile and he is super-good at his work. I have heard from fellow agileans that he is an excellent presenter and writer and he truly is. He takes the whole Kanban concept and implements it on a complex Public organization by demonstrating how agile principles are being used in a large scale project for the Swedish police. The important thing to note is not the mere fact they are using Scrum and Kanban, but the way they adapt them into their job context.
The book has two major parts. The actual case study and some additional info for the readers.
The first part is the most interesting, presenting the use of agile techniques and the way this process is still changing and being optimized. Reading the story provokes you to think how you could use it in your own work. Other than the technicalities of the actual Kanban board and process, the main thing that the reader should take in is the notion of “people mindset”. Without people mentality being receptive to change and trust the whole thing wouldn’t work. From the upper manager to the developer and even the end-user.
Kniberg is such a good writer that while reading the book you get the feeling you belong to one of the teams in the case study. I learned stuff and really enjoyed reading this book. It is certainly a must read.
From my blog: http://gpsistakis.wordpress.co...
The book: http://shop.oreilly.com/produc...
The author: http://www.oreilly.com/pub/au/...
There's a lot more information at terrancalendar.com including a date conversion form and a handfull of code-snipits & apps for implementing the terran computational calendar.
The cosmic bling was found around an object named Chariklo, which orbits in a region between Saturn and Uranus. At 155 miles across, or about the length of Massachusetts, Chariklo is the largest known asteroid in its neighborhood. Looking to get a better idea of its exact size and shape, astronomers trained their telescopes on the giant space rock as it passed in front on a distant star in June 2013. As Chariklo performed its eclipse, researchers noticed something odd: The star’s light flickered just a bit immediately before and after Chariklo’s pass.
The reason for this darkening was the asteroid’s two dense rings, which had briefly blocked the starlight. The thicker inner ring is about four miles wide, while the thinner outer ring is a little less than two miles. Spectroscopic analysis of the starlight also revealed that the rings are composed partially of water ice.
A team of web designers recently released an astonishingly innovative app for streaming movies online. The program, Popcorn Time, worked a bit like Netflix, except it had one unusual, killer feature. It was full of movies you’d want to watch.
When you loaded Popcorn Time, you were presented with a menu of recent Hollywood releases: “American Hustle,” “Gravity,” “The Wolf of Wall Street,” “12 Years A Slave” and hundreds of other acclaimed films were all right there, available for instant streaming at the click of a button.
If Popcorn Time sounds too good to be true, that’s because it was. The app was illegal — a well-designed, easy-to-use interface for the movie-pirating services that have long ruled the Internet’s underbelly. Shortly after the app went public, its creators faced a barrage of legal notices, and they pulled it down.
But like Napster in the late 1990s, Popcorn Time offered a glimpse of what seemed like the future, a model for how painless it should be to stream movies and TV shows online. The app also highlighted something we’ve all felt when settling in for a night with today’s popular streaming services, whether Netflix, Amazon, iTunes, Hulu, or Google or Microsoft’s media stores: They just aren’t good enough.
The official xbox blog details each status of player ranks:
One NASA astronaut and two Russian cosmonauts are still orbiting the Earth in a Russian Soyuz spacecraft nearly 24 hours after lifting off on what was expected to be a six-hour trip.
Two days ago, I posted about one guy's experience with his Tesla Model S not braking properly, which led him to question the car's pedal placement. Now he's conducted more tests, leaving the question open of whether the Model S has a software problem. When he accidentally hit the brake and the gas at the same time, the Model S didn't slow down. Now he's discovered that if he hits the gas, then the brake pedal too, the car slows down as he expected. BUT, reverse the order--hit the brake, then the gas while still braking--and the Model S actually surges forward, accelerating against its brakes. In theory, hitting both pedals at the same time should cause the brakes to override the accelerator--no matter what order the pedals are pressed. Has this driver uncovered a software flaw? It seems plausible. And that, my friends, seems like a safety concern--albeit one that could easily be fixed with one of Tesla's over-the-air software updates. But it would be a much easier fix than the current mess GM is dealing with, that's for sure.
This appears to have been just submitted as it does not have any signatures yet, but it is an interesting read.
I left Microsoft because I think when you have the ability to be a creative person, you have to take that seriously, and you have to push yourself. And pushing yourself is a lot easier to do if you’re in a life raft that has a big hole in the side, and that’s what I think indie development is. You’re paddling desperately to get where you want to go to, but you’re also bailing out. Whereas if you’re in a big supertanker of safety, which Microsoft was, then that safety is like an anesthetic. It’s like taking antidepressants. The world just feels too comfortable.
With a 20 to 30 minute drive to and fro the office when traffic is light, i might as well listen to something. Being too lazy to read LoTR, maybe i can listen to it.
The Russian intelligence agency warned US authorities twice that Tsarnaev was a radical Islamist and potentially dangerous. As a result, Tsarnaev was entered into two US government databases: the Terrorist Identities Datamart Environment and the Treasury Enforcement Communications System (TECS), an interagency border inspection database.
A special note was added to TECS in October of 2011 requiring a mandatory search and detention of Tsarnaev if he left the country. "Detain isolated and immediately call the lookout duty officer," the note reportedly said. "Call is mandatory whether or not the officer believes there is an exact match."
"Detain isolated and immediately call the lookout duty officer."
Unfortunately, Tsarnaev's name was not an exact match: it was misspelled by one letter. Whoever entered it in the database spelled it as "Tsarnayev." When Tsarnaev flew to Russia in January of 2012 on his way to terrorist training, the system was alerted but the mandatory detention was not triggered. Because officers did not realize Tsarnaev was a high-priority target, he was allowed to travel without questioning.
Deep down in Google’s Developer Preview License Agreement (http://developer.android.com/wear/license.html) is language prohibiting Android Wear applications that involve personal health information:
“Unless otherwise specified in writing by Google, Google does not intend use of Android Wear to create obligations under the Health Insurance Portability and Accountability Act, as amended, (“HIPAA”), and makes no representations that Android Wear satisfies HIPAA requirements."
Android Wear users who "are (or become) a Covered Entity or Business Associate under HIPAA... agree not to use Android Wear for any purpose or in any manner involving Protected Health Information unless you have received prior written consent to such use from Google.”
Google’s prohibition of medical applications is interesting. The market for personal health devices is evolving quickly, and the U.S. government has already warned that – in some cases – mobile applications may count as a type of medical device regulated by the FDA.(https://securityledger.com/2013/09/fda-says-some-medical-apps-a-kind-of-medical-device/)
No word from Google yet on how it plans to enforce the ban on medical applications for Google Wear, or what process it will set up to vet and approve health-related wearables. Given the potential for wearables to be used in health monitoring and the delivery of medical care, however, its a problem that the company might want to jump on — fast!
The patient suffered from a disorder that caused her cranial bones to thicken to the point where too much pressure was put on her brain.
"The disease manifests itself in the beginning with severe headaches," said Dr Bon Verweij, a neurosurgeon at UMC Utrecht. "Over time, the increasing pressure on the brain from the thickening skull began to affect her eyesight and coordination. It was only a matter of time before other crucial brain functions became compromised and she would die."
Bill Clinton thinks that the US needs to keep control of the internet to make sure it stays open and free Yep.
Clinton made his comments during a debate sponsored by his charitable foundation, Clinton Global Initiative:
The internet has flourished in freedom,
I just know that a lot of these so-called multi-stakeholders are really governments that want to gag people and restrict access to the internet.
Now I don't blame him one bit. He performed a thankless job admirably for 12 years and deserves some time off. But I, for one, already miss Full Disclosure. So I decided to make a new list today which is a successor in name and spirit. Like the old one, it uses Mailman and is being archived by my Seclists.org site as well as numerous other archives around the world.
This list is a fresh start, so the old userbase won't automatically transfer over. And I haven't added any of you either, because it is your choice. But IF YOU WANT TO JOIN THE NEW LIST, you can do so here:
The list launched just 7 hours ago and we already have 904 members subscribed. I hope you'll join us and resume posting your security info and advisories. If not now, then someday