- Linux Workstation Security Checklist — This is a set of recommendations used by the Linux Foundation for their systems administrators.
- Giant Bags of Mostly Water (PDF) — on securing systems that are used by humans. This is what DevOps is about: running Ops like you’re Developing an app, not letting your devs run your ops.
- Mining and Summarising Customer Reviews (Paper a Day) — redux of a 2004 paper on sentiment extraction from reviews.
- Brain-Machine-Interface for Exoskeleton — no need to worry about the “think of sex every seven seconds” trope, the new system allows users to move forwards, turn left and right, sit and stand simply by staring at one of five flickering LEDs.
Four core questions that every security team must ask itself to develop its strategy in dealing with attacks.
Massive software vulnerabilities have been surfacing with increasingly high visibility, and the world’s computer administrators are repeatedly thrust into the cycle of confusion, anxiety, patching and waiting for the Next Big One. The list of high profile vulnerabilities in widely used software packages and platforms continues to rise. A recent phenomenon has researchers borrowing from the National Hurricane Center’s tradition, to introduce a vulnerability with a formal name. Similar to hurricanes and weather scientists, security researchers, analysts, and practitioners observe and track vulnerabilities as more details unfold and the true extent of the risk (and subsequent damage) is known.
Take for example the Android vulnerability released at the beginning of August, 20151. This vulnerability, named “Stagefright” after its eponymous application, can lead to remote code execution (RCE) through several vectors including MMS, Email, HTTP, Media applications, Bluetooth, and more. These factors coupled with the fact that at its release there were no approved patches available for upwards of 95% of the world’s mobile Android footprint means the vulnerability is serious — especially to any organization with a significant Android population.
A look at our unified program for unified creators.
Register now for Solid Amsterdam 2015, our conference exploring the intersections of manufacturing, design, hardware, software, and business strategy. The event will take place in Amsterdam on October 28, 2015.
Creating a great product means knowing something about many things: design, prototyping, electronics, software, manufacturing, marketing, and business strategy. That’s the blend that Solid brings together: over our one-day program at Solid Amsterdam on October 28, 2015, we’ll walk through a range of inspiration and insight that’s essential for anyone who creates physical products — consumer devices, industrial machines, and everything in between.
Start with design: it’s the first discipline that’s called on to master any new technology, and designers whose work has been confined to the digital realm are now expected to understand hardware and connected systems as well.
Design at Solid begins with our program co-chair, Marko Ahtisaari, who was head of product design at Nokia from 2009 to 2013, and is now CEO and co-founder of The Sync Project. We’ll also hear from Thomas Widdershoven, creative director at Design Academy Eindhoven and co-founder of thonik, a design studio whose work specializes in interaction and motion design. Read more…