Friday, November 2, 2012
Hi Folks, Cloud Computing has grown since I started this blog. More and more companies are using private or hybrid clouds for their sensitive data and public clouds for the non-sensitive data. Platform as a service seems to be gaining momentum as more companies are offering it. Secure cloud computing is being offered by many companies in the form or hardware devices to software that detects intrusion, etc. I would tend to shy away from a security architecture that sends everything through a device as if the device dies, so does your process. The security architecture should be able to keep processing in place while detecting and weeding out the transgressors. Just my thoughts on Cloud Computing today..
Saturday, December 17, 2011
I have a long running fascination with Cloud Computing. I thought I would fill up this blog with Cloud Computing topics. But it was filled up with topics like futuring and Steve Jobs. I guess my Computing interests are all over the place. In the last 9 months (of no posts) I have been finishing up my Computer Science - EIS Doctorate degree and teaching computer programming topics from programming to web development. I love teaching
Thursday, March 24, 2011
1. Connect the dots (you can only do this looking back on your life)
2. Live life like you are going to die (one day it will be true)
3. Do what you love
4. Stay hungry, stay foolish
Friday, March 18, 2011
Cornish on Futuring ( I read this often, dreaming productively!)
1. Prepare for the future
2. Anticipate needs
3. Use Poor information when necessary
4. Expect the unexpected
5. Think long term as well as short term
6. Dream productively
7. Learn from your predecessors
Cornish, E. (2004). Futuring: The exploration of the future. Bethesda, MD: World Future Society.
Sunday, February 27, 2011
Biometrics is the use of fingerprints, the iris, voice and facial features to identify people. "For matters regarding greater security, "multimodel" systems combining two or more techniques are almost foolproof" (Halal, 2008). The book states the biometrics field is growing at 30 to 40% a year and that "most security systems will use biometrics about 2010 +/- 2 years" (Halal, 2008).
The process Mr. Halal uses in Technology's Promise is as follows. "Instead of consulting one seer about the future of technology, he questions roughly 100 of them. And instead of being general-purpose priestesses, Bill;s oracles are the experts in their fields, from medicine to computer technology and rocket science" (Halal, 2008). The result is you have a more accurate look into the future.
Halal, W. E. (2008). Technology’s promise. New York, NY: Palgrave Macmillan.
Saturday, February 26, 2011
Create your own video slideshow at animoto.com.
In this short animoto presentation Linked Data is discussed. Tim Berners-Lee discussed Linked Data in his Ted Talk. Since linked data encompasses the entire web it is a global force. Structural forces of data in the format of RFP or XML provides a standardized structure in linked data. This makes the HTTP or URL searchable, linkable and information about the data along with relationships to that information included.
Hans uses the United Nations raw data to analyze various changes between many countries including death rates of children under 1 year, increasing wealth, health, economies, and education. Environmental and Cultural forces are the most important goals of Economic Development. His mantra? "The seemingly impossible is possible".
This is an example of using open linked data, raw data to see patterns through time via statistics.