Author Archive

A Better Way to Organize the Internet: Content-Centric Networking

The Internet is more than 45 years old, and it’s starting to show its age. To be sure, it has served us wonderfully well. Its underlying technologies delivered the World Wide Web (still a young adult at around 28 years old) and our global communications network. Even as its user base has swelled to 3.4 billion, these technologies have

Stack Overflow Developer Survey 2017

https://stackoverflow.com/insights/survey/2017/ Each year since 2011, Stack Overflow has asked developers about their favorite technologies, coding habits, and work preferences, as well as how they learn, share, and level up.  https://stackoverflow.com/insights/survey/2017/

Introduction to Developing a New Wireless Product

https://blog.hackster.io/introduction-to-developing-a-new-wireless-product-bf0a6c5b51a4#.esxyeyiei There are many thing to consider in modern wireless device design. I have done some design work to several devices with wireless communication and can agree on many details..

Sequential Programming Considered Harmful? – IEEE Spectrum

http://spectrum.ieee.org/at-work/education/sequential-programming-considered-harmful Today, multicore processors power our laptops and cellphones. Distributed cloud servers or supercomputer clusters process large data sets. To take full advantage of these systems, you need parallel algorithms. “It’s a parallel world,”  Why is no one teaching a course in parallel algorithms to freshmen?  Currently, most introductory computer science courses start with sequential

Cheap fiber optic visual fault locator

The Visual Fault Finder is a visible laser light source used to check continuity, locate breaks, poor mechanical splices and damaged connectors in fiber optic cabling. It can be used to verify continuity, test and find breaks in fibre links, locate pinched fiber strands in termination cabinets, or anywhere fiber optic cables are terminated and

Critical infrastructures under daily attack — EU cyber security team head

https://horizon-magazine.eu/article/critical-infrastructures-under-daily-attack-erncip-head-georg-peter_en.html ‘Critical infrastructures around the world, not just in Europe, are constantly being targeted by cyber attacks, as are many other systems used by society which are internet-connected. Every day, European vital services and infrastructures have to be able to resist many types of cyber attacks. ‘The risk of attacks against such infrastructures is expected

Security in the Age of Open Source

http://www.darkreading.com/application-security/security-in-the-age-of-open-source/a/d-id/1328407 Dramatic changes in the use of open source software over the past decade demands major changes in security testing regimens today. 

7 considerations to make when securing your Raspberry Pi

https://opensource.com/article/17/3/iot-security-raspberry-pi?sc_cid=7016000000127ECAAY IoT has been huge for experimentation and innovation. But as projects get rushed to completion, there have been severe consequences for ignoring security. And this applies both to commercial products and hobby projects.