Advancement in technology should be viewed with the same preciseness that is used with troop movement. Before we advance we need confident information on what lies ahead, what is on our flank, what is behind us, and what the impact will be.
The news buzz about the latest, large scale, cyber-attack generates more questions than answers. According to the latest reports on the attack at Target, and other retailers, the attack originated from a teenage hacker in Russia.
According to the latest news reports an attack on one of Yahoo's Ad servers perpetuated a large scale malware infestation across user's computers of the popular search engine and the breech seems to point to flaws in the java code used on the servers.
I decided to write a small program using jQuery/CSS. This is similar to my other programs, in that js plays a major part in the structure.
In an increasingly technical world that depends on well written programs to run multi-million dollar infrastructures and global financial concerns, it is no surprise that programmers are in high demand.
I've been working for a few weeks now to republish Memphis Web Programming with a new look and feel. Here are some of the changes:
healthcare.gov - Well, it's pretty bad. After several hours of going through the initial registration and validation steps I got to a dead end at the point where I was supposed to be presented with my insurance options and costs.
Ember.js offers a good framework for JSON and JQuery in a fairly slick MVC with a good VIEWS API binding that will eliminate a lot of the grunt work of building JS applications.
Cisco report says the number of smartphones, tablets, laptops and internet-capable phones will exceed the number of humans in 2013. One can only imagine the power if an individual or group had control over a portion of those devices.
By observing Newton's law we can conclude that the efforts of the quantum dawn tests and the other security risk assessments undertaken across internet connected sites have been significant but have not yet matched the effort of the attackers.