Tapp and Chandran (LRDA) wrote an articles published in EETimes (online). The articles starts with sharing information on vulnerabilities and cases related to exploitation. It then goes into CWE (Common Weaknesses Enumeration), purpose, people behind it, etc. They further explain on propose tool in CWE and end-up with why LRDA should be incorporated...
Tuesday, September 27, 2011
List of Conferences as of Sep 25, 2011
RightClick 2011
30 September 2011 Perth Australia
2nd National Conference on Information Technology for Business Transformation
04 November 2011 Ghaziabad India
Fourth International Ubiquitous Learning Conference
11 November 2011 Berkeley California
Voices That Matter: iOS Developer Conference
12 November 2011 Boston...
Quantum Lecture Series 5
Laboratory of Computational
Sciences and Mathematical Physics, Institute for Mathematical Research in Universiti Putra Malaysia
will be organizing Expository Quantum Lecture Series 5 on January 9-13,
2012. The theme for EQuaLS5 is "Geometry, Topology and Physics 2012" and
the speakers are
John Baez (NUS, Univ of California, Riverside)"Network...
Facebook Updates Could Give Nonprofits Better Visibility
An interesting articles written by Derek Lieu and posted at Social Philantrophy.
My thoughts:
1. Lots of algorithm running behind facebook which one small mistake might affect lots of people
2. Opportunity for researchers as there are lots of research can be done especially on algorithm, security, social etc.
3. Facebook will be here for another...
Friday, September 23, 2011
User privacy concerns emerge over supercookies
By Ellyne Phneah
, ZDNet Asia on September 19, 2011
Difficult to remove new type of cookie which can track user history and
preference, giving rise to privacy concerns, note experts, but add that
supercookies aren't legal issue for now. [read more]
What do I think?
The author list out few option as preventive measurements...
Tuesday, September 20, 2011
Applying Static Analysis To Medical Device Software
September 20, 2011Buffer Overflow, Critics, Information Security, Personal Opinion, Software Security, Static Analysis
No comments:

An interesting articles written back on 2008 by David N. Kleidermacher indicates the importance of having static analysis tool to improve reliability and sustainability of medical devices [read here]
However, as complexity increases especially on mobile devices and mission-critical devices like medical and military, static analysis tool is still far...
International Conference on Distributed Computing Engineering (ICDCE 2011)
2011 International Conference on Distributed Computing Engineering (ICDCE 2011)28 to 30 December 2011Dubai, United Arab Emirates2011 International Conference on Distributed Computing Engineering (ICDCE 2011)will be held in Dubai, Chengdu, China during December 28-30, 2011. The upcomingICDCE 2011 will inherit the advantages of the previous conferences...
Implement CRUD operations using RESTful WCF Service and javascript
Found a good articles to start playing with WCF and Javascript (for Java developers) written by Shahriar Iqbal Chowdhury. Check it out @ Code Proj...
Friday, September 16, 2011
Using static code analysis to support DO-178b certification
September 16, 2011Buffer Overflow, Critics, Information Security, Personal Opinion, Software Security, Static Analysis
No comments:

Paul Anderson, GrammaTech
9/6/2011 6:29 PM EDT
In this Product How-To, Paul Anderson of
GrammaTech takes you step by step through the DO-178B and how use his
company’s static analysis tools to support the safety-critical software
requirements of the specification [read more].
As one of my interest in software...
Thursday, September 15, 2011
Google add new artilery in fight with the other giant (Facebook, Yahoo, Microsoft, Apple, etc)
Recently, I heard many IT giant acquiring patents from various company such as Nortel, HTC, IBM, etc and we will definitely keep on reading news of patent infringement case as the fight continues. Latest news was acquisition of some IBM patents related to Java language (JDJ: Google Buys Some Java Patents). And this was continuation from the last battle...
Vulnerabilities is known and yet it is still there
Reported by Symantec, vulnerabilities still there and will always be there unless we do something to eliminate or reduce it to lower state. This is numbers of vulnerabilities captured/monitored by Symantec. It does not includes or cross-checking between other vulnerability databases such as NIST, CVE, Karspesky, Microsoft, etc.
Check it out the reports...
Oracle Critical Patch Update - September 2011
Critical Patch
Update - September 2011
Dear Oracle Security Alert
Customer,
Oracle Security Alert for
CVE-2011-3192 was released on September 15th, 2011.Oracle strongly
recommends applying Security Alert fixes as soon as possible.The
Security Alert Advisory is the starting point for relevant information. It
includes the list of products affected,...
Auto-format for references/bibliography using plugin
Some of use may have found the solutions but most of us are still using the old-fashion ways in doing references or bibliography section while writing a technical papers, journal, etc.
Me too facing the same problems when trying to add, edit, or formatting according to certain standards or rules required by journal or conferences which I'm submitting...