Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Computing
Conference & Expo
November 2-4, 2009 NYC
Register Today and SAVE !..

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
In many cases, the end of the year gives you time to step back and take stock of the last 12 months. This is when many of us take a hard look at what worked and what did not, complete performance reviews, and formulate plans for the coming year. For me, it is all of those things plus a time when I u...
SYS-CON.TV
The Wearable-Gesture Security Risk Danger Zone
At this point it has to be said that, inconveniently but truthfully, new user paradigms always bring security risks

This post is sponsored by The Business Value Exchange and HP Enterprise Services

There are only two certainties in life - death and taxes, said Benjamin Franklin. What the theorist and founding father clearly meant was: There are only three certainties in life - death and taxes and information security changeability.

In the constantly changing dynamic world of malware, viral attacks, spam, phishing, zero days attacks and targeted exploits we know only one thing for sure - tomorrow will bring new insight.

This somewhat generic introduction is merely offered to whet the appetite and suggest that we are on the edge of a new "device paradigm" in the form of a) wearable technology combined with a side order of of b) facial recognition served up with a more meaty portion of c) emerging gesture recognition technology.

New Paradigm, New Risk
At this point it has to be said that, inconveniently but truthfully, new user paradigms always bring security risks.

Just look at what has been happening at Google this month; the firm filed a patent this June detailing facial and gesture recognition technology that has already been (in another form) incorporated into Android in the shape of what was known as a human "liveness check" at the time.

This was Google playing with incorporating "user blinking" into the Jelly Bean release of Android. This means of Human Computer Interaction (HCI) was used to detect if a person is "live" or whether it is just an image of a person being shown to the camera. A user blinks at the camera to prove that they are human.

This so-called "facial landmarking" (it turns out) is easy enough to fool with a simple pair of alternating "dead" and "live" images - one with eyes shut, one with eyes open.

Privacy Is Never Far Away from Security
Google Glass has obviously made plenty of headlines in terms of its newness and wow-factor, but also for the privacy questions it throws up as users suddenly get a face-mounted video camera. Privacy is never far away from security and Google Glass is no exception; these cloud services powered devices will naturally have their own shape of applications and interfaces, which ultimately represent freshly laden snow for the malicious hacker attacker.

This subject demands far more detailed analysis and this is merely an ‘amuse- bouche' of interjected commentary to direct our thinking as these devices start to become commonplace, if they indeed do take off in terms of popularity.

Not many of us are saying, "I got a virus from my glasses," or indeed, "My RFID-enabled sports T-shirt needs rebooting," or even, "My gesture-based password identifier doesn't recognize the silly face I am pulling to try and log in, maybe I have been hacked by a liveness-bot." But these technologies HCI and wearable technologies will very likely form part of the fabric (ouch! no pun intended, sorry) of our next computing landscape. So forewarned is forearmed.

About Adrian Bridgwater
Adrian Bridgwater is a freelance journalist and corporate content creation specialist focusing on cross platform software application development as well as all related aspects software engineering, project management and technology as a whole.

In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1

SOA World Latest Stories
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for pe...
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portabil...
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die...
If your cloud deployment is on AWS with predictable workloads, Reserved Instances (RIs) can provide your business substantial savings compared to pay-as-you-go, on-demand services alone. Continuous monitoring of cloud usage and active management of Elastic Compute Cloud (EC2), Relation...
Consumer-driven contracts are an essential part of a mature microservice testing portfolio enabling independent service deployments. In this presentation we'll provide an overview of the tools, patterns and pain points we've seen when implementing contract testing in large development ...
In his session at 19th Cloud Expo, Claude Remillard, Principal Program Manager in Developer Division at Microsoft, contrasted how his team used config as code and immutable patterns for continuous delivery of microservices and apps to the cloud. He showed how the immutable patterns hel...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021


SYS-CON Featured Whitepapers
ADS BY GOOGLE