arpieb

The hammer and the nail

black claw hammer on brown wooden plank

Quite possibly one of the most-quoted phrases in the software industry: “If all you have is a hammer, everything looks like a nail.” — Abraham Maslow, The Psychology of Science (1966) This is often pulled out and dusted off when discussions of high-level architectural components, stacks, and programming languages begin to get a bit heated.  This post was inspired by a discussion with a budding computer scientist I know regarding why there are so many different programming languages, tools, and environments.

Continue reading...

Notes from GT-IISP’s Cyber Security Lecture Series: Automatic Feature Engineering: Learning to Detect Malware by Mining the Scientific Literature

three people hacking a computer system

As a Georgia Tech OMSCS student as well as working software professional, advanced security topics are always something I want to learn more about. Georgia Tech’s Institute for Information Security & Privacy is presenting a weekly Cybersecurity Lecture Series on Fridays this fall, and being a local I’ve started attending them. Here are my quick (albeit not necessarily complete) notes from this week’s presentation by Tudor Dumitraș, Assistant Professor at the University of Maryland.

Continue reading...

Notes from GT-IISP’s Cyber Security Lecture Series: Software Assurance & Exploitation

three people hacking a computer system

As a Georgia Tech OMSCS student as well as working software professional, advanced security topics are always something I want to learn more about. Georgia Tech’s Institute for Information Security & Privacy is presenting a weekly Cybersecurity Lecture Series on Fridays this fall, and being a local I’ve started attending them. Here are my quick (albeit not necessarily complete) notes from this week’s presentation by Joel Odom of CipherLab @ GTRI.

Continue reading...

Why the CMS has given the CMS a bad name

turned on computer monitor displaying text

CMS. Anyone in the web biz knows what this stands for: “Content Management System.” The problem is, these systems often don’t properly or efficiently manage content. As a result, CMS has become the new dirty word when it comes to solutions for providing content on the web – or anywhere else for that matter.

Continue reading...

Notes from “Breaking Kernel Address Space Layout Randomization (KASLR) with Intel TSX”

three people hacking a computer system

As a Georgia Tech OMSCS student as well as working software professional, advanced security topics are always something I want to learn more about. Georgia Tech’s Institute for Information Security & Privacy is presenting a weekly Cybersecurity Lecture Series on Fridays this fall, and being a local I’ve started attending them. Here are my quick (albeit not necessarily complete) notes from this week’s presentation by Yeongjin Jang, a PhD student at Georgia Tech.

Continue reading...

Notes from “The Myths of Computer Security”

three people hacking a computer system

As a Georgia Tech OMSCS student as well as working software professional, advanced security topics are always something I want to learn more about. Georgia Tech’s Institute for Information Security & Privacy is presenting a weekly Cybersecurity Lecture Series on Fridays this fall, and being a local I’ve started attending them. Here are my quick (albeit not necessarily complete) notes from this week’s presentation.

Continue reading...

TIL observing the Pokémon GO phenomenon

Pokemon GO

I admit – I play Pokémon GO.  I was already walking 3-6 miles a day anyway, so it just gave me something to break the monotony of long hauls in the wee hours of the morning. That being said, it’s also been a great case study in scalable systems engineering and massively deployed client systems.

Continue reading...

Common internationalization misses

With the world becoming more and more connected, with better support for global users and global businesses, globalization (g11n), internationalization (i18n) and localization (l10n) are more commonly being viewed as functional requirements vs nonfunctional ones.  Everyone is focused on supporting RTL layouts, date-time formats, and translations.  But here are some commonly-overlooked internationalization challenges that nearly every site build misses on the first try.

Continue reading...

Why data portability matters

If you’ve been in the software industry long enough, you’ve heard the term portable bantered about as an ephemeral goal for all things constructed from zeroes and ones. Applications and services are primarily the focus of these discussions, but often one crucial component is overlooked.

Continue reading...