Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Computing
Conference & Expo
November 2-4, 2009 NYC
Register Today and SAVE !..

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
In many cases, the end of the year gives you time to step back and take stock of the last 12 months. This is when many of us take a hard look at what worked and what did not, complete performance reviews, and formulate plans for the coming year. For me, it is all of those things plus a time when I u...
SYS-CON.TV
The Wearable-Gesture Security Risk Danger Zone
At this point it has to be said that, inconveniently but truthfully, new user paradigms always bring security risks

This post is sponsored by The Business Value Exchange and HP Enterprise Services

There are only two certainties in life - death and taxes, said Benjamin Franklin. What the theorist and founding father clearly meant was: There are only three certainties in life - death and taxes and information security changeability.

In the constantly changing dynamic world of malware, viral attacks, spam, phishing, zero days attacks and targeted exploits we know only one thing for sure - tomorrow will bring new insight.

This somewhat generic introduction is merely offered to whet the appetite and suggest that we are on the edge of a new "device paradigm" in the form of a) wearable technology combined with a side order of of b) facial recognition served up with a more meaty portion of c) emerging gesture recognition technology.

New Paradigm, New Risk
At this point it has to be said that, inconveniently but truthfully, new user paradigms always bring security risks.

Just look at what has been happening at Google this month; the firm filed a patent this June detailing facial and gesture recognition technology that has already been (in another form) incorporated into Android in the shape of what was known as a human "liveness check" at the time.

This was Google playing with incorporating "user blinking" into the Jelly Bean release of Android. This means of Human Computer Interaction (HCI) was used to detect if a person is "live" or whether it is just an image of a person being shown to the camera. A user blinks at the camera to prove that they are human.

This so-called "facial landmarking" (it turns out) is easy enough to fool with a simple pair of alternating "dead" and "live" images - one with eyes shut, one with eyes open.

Privacy Is Never Far Away from Security
Google Glass has obviously made plenty of headlines in terms of its newness and wow-factor, but also for the privacy questions it throws up as users suddenly get a face-mounted video camera. Privacy is never far away from security and Google Glass is no exception; these cloud services powered devices will naturally have their own shape of applications and interfaces, which ultimately represent freshly laden snow for the malicious hacker attacker.

This subject demands far more detailed analysis and this is merely an ‘amuse- bouche' of interjected commentary to direct our thinking as these devices start to become commonplace, if they indeed do take off in terms of popularity.

Not many of us are saying, "I got a virus from my glasses," or indeed, "My RFID-enabled sports T-shirt needs rebooting," or even, "My gesture-based password identifier doesn't recognize the silly face I am pulling to try and log in, maybe I have been hacked by a liveness-bot." But these technologies HCI and wearable technologies will very likely form part of the fabric (ouch! no pun intended, sorry) of our next computing landscape. So forewarned is forearmed.

About Adrian Bridgwater
Adrian Bridgwater is a freelance journalist and corporate content creation specialist focusing on cross platform software application development as well as all related aspects software engineering, project management and technology as a whole.

In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1

SOA World Latest Stories
21st International Cloud Expo, taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced b...
With the rise of DevOps, containers are at the brink of becoming a pervasive technology in Enterprise IT to accelerate application delivery for the business. When it comes to adopting containers in the enterprise, security is the highest adoption barrier. Is your organization ready to ...
Agile has finally jumped the technology shark, expanding outside the software world. Enterprises are now increasingly adopting Agile practices across their organizations in order to successfully navigate the disruptive waters that threaten to drown them. In our quest for establishing c...
There is a huge demand for responsive, real-time mobile and web experiences, but current architectural patterns do not easily accommodate applications that respond to events in real time. Common solutions using message queues or HTTP long-polling quickly lead to resiliency, scalability...
Enterprises are moving to the cloud faster than most of us in security expected. CIOs are going from 0 to 100 in cloud adoption and leaving security teams in the dust. Once cloud is part of an enterprise stack, it’s unclear who has responsibility for the protection of applications, ser...
Many organizations adopt DevOps to reduce cycle times and deliver software faster; some take on DevOps to drive higher quality and better end-user experience; others look to DevOps for a clearer line-of-sight to customers to drive better business impacts. In truth, these three foundati...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021


SYS-CON Featured Whitepapers
ADS BY GOOGLE