Skip to main content

Posts

Showing posts from February, 2019

Snapchat Dysmorphia

Snapchat dysmorphia is a body-image disorder characterized by the need to heavily edit one's own digital image. At its most severe, the disorder may cause people to seek out cosmetic procedures in order to replicate the altered images they present online. Dr. Tijion Esho, a British physician known for performing cosmetic procedures, coined the term Snapchat dysmorphia after becoming aware that an increasing number of patients were bringing heavily-edited selfies to their consultation appointments instead of celebrity photos, as was generally the practice in the past. Doctors have reported that patients who bring in heavily-edited selfies are often surprised to learn that their altered photographic results cannot be replicated in real life. Digital self portraits, which are commonly referred to as selfies, tend to be a bit like studio portraits. Before photographing themselves, subjects are likely to adjust hair, clothing, lighting and cam...

White Box Testing

White box testing is a software testing methodology that uses source code as the basis for designing tests and test cases. White box testing takes an inward look at the framework and components of a software application to check the internal structure and design of the software. White box testing is also called transparent, clear and glass box testing for this reason. This test type can also be applied to unit, system and integration testing. White box testing usually involves tracing possible execution paths through the code and working out what input values would force the execution of those paths. The tester, who is usually the developer that wrote the code, will verify the code according to its design- which is why familiarity with the code is important for the one initiating the test. Code is tested by running input values through the code to determine if the output is what should be expected. Testers can work out the smallest number of paths necessary to test, or "cove...

Artificial Intelligence of Things (AIoT)

Artificial Intelligence of Things (AIoT) is the use of artificial intelligence (AI) technologies to enhance an Internet of Things (IoT) infrastructure. An important goal of AIoT is to transform operational data into information that can be used to make decisions in real time. AIoT technologies have the ability to capture streaming data, determine valuable attributes and immediately make a decision without requiring human intervention. Currently, AIoT can support freestanding hardware components such as Google Home, as well as embedded hardware components such as AI chipsets. Application programming interfaces (APIs) can be used to extend interoperability between components at the device level, software level or platform level. While the concept of AIoT is still relatively new, real possibilities exist for AI to improve industry verticals for industrial, consumer, business-to-business (B2B) and service sectors. As applications for AI tec...

Secure Container

A secure container is a lightweight, executable software package that has been isolated from other software or processes running on the same virtual or physical host. The purpose of containerization (also known as sandboxing) is to prevent intruders and malicious code from interacting with other applications and data in an unauthorized manner.  For example, in a mobile security context, a secure container might consist of a logical area of an employee's smartphone in which corporate applications and data are isolated from the owner's personal data and apps. This approach to using secure containers in mobile device management (MDM) is also known as duel persona. Today, security and isolation concerns for containers are a top priority for industry vendors who have split their applications into services and microservices. Strategies for keeping containers secure include reducing the attack surfaces in container images, avoiding the use of public container images and...

What is the difference between Recovery Time Objective (RTO) and Recovery Point Objective (RPO)?

Both RTO and RPO are essential elements of business continuity, and they sound quite similar. But their purpose is quite different. What is RTO? So, what does RTO mean? BS 25999-2, a leading business continuity standard, defines RTO as “…target time set for resumption of product, service or activity delivery after an incident”. This actually means that RTO is crucial when implementing business continuity in a company – calculating how quickly you need to recover will determine what kind of preparations are necessary. For example, if RTO is 2 hours, then you need to invest quite a lot of money in a disaster recovery center, telecommunications, automated systems, etc. – because you want to be able to achieve full recovery in only 2 hours. However, if your RTO is 2 weeks, then the required investment will be much lower because you will have enough time to acquire resources after an incident has occurred. RTO is determined during the business impact analysis (BIA), and the ...

Dependency hell

Dependency hell is a negative situation that occurs when a software application is not able to access the additional programming it requires in order to work. In software development, additional programs that software requires are called dependencies. Sometimes known as JAR hell or class-path hell, dependency hell's common outcomes include software performing abnormally, bugs, errors messages when trying to run or install software, or the software ceasing to function. Many times, these software dependencies are developed by third parties. The cause of dependency hell is varied, but it usually happens for one of four reasons: 1.   The main software relies on a multitude of large software libraries, causing lengthy downloads and decreasing the portability of the software. Even if an application requires only a small portion of a large library, the whole library must be downloaded. 2.   The main software creates a chain of dependencies, where the software relies on...

Right to be forgotten

The right to be forgotten is the concept that individuals have the civil right to request that personal information is removed from the Internet. In May 2014, a man from Spain asked Google to remove links to an old newspaper article about his previous bankruptcy, claiming there was no legitimate reason for the outdated information to remain accessible online. The European Court of Justice ruled that under European law, search engines are data controllers so they must consider all requests to stop returning irrelevant or outdated information in search queries. According to the ruling, the Web pages that the query results in question point to can remain online and any link omissions on query returns will only occur when searches are made in Europe. In the wake of the ruling, Google began receiving thousands of more requests to take down links. While the right to be forgotten aims to support personal privacy, the concern is that it conflicts with the open nature of the ...

VPN (virtual private network)

A virtual private network (VPN) is programming that creates a safe and encrypted connection over a less secure network, such as the internet. VPNs were originally developed to provide branch office employees with safe access to corporate applications and data. Today, VPNs are often used by remote workers and business travelers who require access to sites that are geographically restricted. The two most common types of VPNs are remote access VPNs and site-to-site VPNs. Remote access VPN Remote access VPN clients connect to a VPN gateway on the organization's network. The gateway requires the device to authenticate its identity before granting access to internal network resources such as file servers, printers and intranets. This type of VPN usually relies on either IP Security (IP-sec) or Secure Sockets Layer (SSL) to secure the connection, although SSL VPNs are often focused on supplying secure access to a single application rath...