Categories
Security

API security from REDHAT

Use tokens. Establish trusted identities and then control access to services and resources by using tokens assigned to those identities. Use encryption and signatures. Encrypt your data using a method like TLS(see above). Require signatures to ensure that the right users are decrypting and modifying your data, and no one else. Identify vulnerabilities. Keep up […]

Categories
sys.admin

UP IN THE CLOUDS

This summer I made use of some of my commuting time by studying network infrastructure via Enki a popular CS app – I highly recommend it. Also I’ve had a little experience setting up small apps on both Amazon’s AWS and Googles Cloud Platform – the AWS UX for a newbie left a lot to […]

Categories
Uncategorized

C++

Although I’m learning python at uni, I found this podcast very enlightening in terms of progressing my understanding of the history and bigger picture of the field. The creator of a fundamentaly vital language in software speaks very clearly and calmly – good educational stuff! ” Bjarne Stroustrup is the creator of C++, a programming […]

Categories
Uncategorized

CODE IS POWER

@naval Code is power. It is the new literacy. The personal computer is the most powerful tool ever invented by mankind since maybe the fire or the stone axe. And I would put it above the steam engine. I would put it above flight. I would put it above cars. I would put it above […]

Categories
Future

THE HYPE CYCLE:

Emerging Technology: Thoughts based on: Svetlana Sicular and Kenneth Brant (2018): Hype Cycle for Artificial Intelligence 2018, Gartner. PRESSURE TO ADOPT NEW TECHNOLOGY Sometimes we come under great pressure to adopt new technology or processes whether at home or at work. This brief analysis will deal simply with a typical work culture. Why would people […]

Categories
Privacy Security

Amazon Alexa

IoT is a huge topic and one that is hugely relevant for all computing students I feel. There is a tremendous number of data points generated and a scary level of security in general – so very many loopholes! ECHO UTILITY “The Gartner Hype Cycle of Emerging Technologies“ was covered in detail yesterday so I […]

Categories
Uncategorized

studio

A quick reflective update on our ambitious project for 1st year: RESEARCH The process of research can on one hand feel like a magical, addictive mode of discovery as you encounter fantastic new information. On the other hand it can be equally frustrating as you cant find evidence of a theory you have developed or […]

Categories
career dev

pro v amateur

I’m struggling to find the author of the quote but I remember reading that a professional is a ‘gun for hire’, a mercenary if you like – a tool to get a job done. Whilst an amateur will do something for the true passion of it as they have no ulterior motive. I like the […]

Categories
career dev

THE PROFESSIONALS VIEWPOINT

I thought I would give a little feedback on each point referenced in an article (link here) of a tutorial at uni. In a sense what does it mean to me. “Have fun and ask questions“ Look at your job creatively, search out opportunity and explore your passions. “Accept the knowledge gap and be ready […]

Categories
Privacy Security

Snowden & Metadata + “”””””

Here are some random key quotes from Snowden’s new book that are of particular interest. On metadata : metadata is data about data ….. …communication(s) is rarely as revealing as its other elements—the unwritten, unspoken information that can expose the broader context and patterns of behaviour. He means to say the real evil of the […]