Skip to main content

Posts

Showing posts from March, 2015

Apa itu korsleting

http://teknologi.kompasiana.com/terapan/2012/08/01/apa-itu-korsleting-listrik-dan-bagaimana-mencegahnya-475915.html Perubahan URL: https://www.kompasiana.com/dw/5512ef91a333114469ba7d47/apa-itu-korsleting-listrik-dan-bagaimana-mencegahnya

Sokoban Levels Design Contest

http://sokoban-gild.com/ Introduction This is a contest site that is all about the classic puzzle game of Sokoban. If you have never heard of it, and also if you have some familiarity with it, It is recommended that you look in The Sokoban Wiki where you can find a lot of useful information about Sokoban. This contest is unique however, because the goal here, is to design or generate Sokoban levels with longest possible solution given some parameter constraints. In other words instead of solving some levels as in usual Sokoban game play, you need to design levels, or write a program that does. In order to succeed, you can use whatever methods you choose, but I assume that programming skills and computer help will be necessary in order to have good results. The concept of this competition, and the scoring system is very much inspired by Al Zimmermann's programming contests site and I am indebted to him for useful discussion and help. The competition will s

Choose boring technology

http://mcfunley.com/choose-boring-technology Probably the single best thing to happen to me in my career was having had Kellan placed in charge of me. I stuck around long enough to see Kellan's technical decisionmaking start to bear fruit. I learned a great deal from this, but I also learned a great deal as a result of this. I would not have been free to become the engineer that wrote Data Driven Products Now! if Kellan had not been there to so thoroughly stick the landing on technology choices. Being inspirational as always. In the year since leaving Etsy, I've resurrected my ability to care about technology. And my thoughts have crystallized to the point where I can write them down coherently. What follows is a distillation of the Kellan gestalt, which will hopefully serve to horrify him only slightly. Embrace Boredom. Let's say every company gets about three innovation tokens. You can spend these however you want, but the supply is fixed for

After Snowden, The NSA Faces Recruitment Challenge

http://www.npr.org/2015/03/31/395829446/after-snowden-the-nsa-faces-recruitment-challenge Daniel Swann is exactly the type of person the National Security Agency would love to have working for it. The 22-year-old is a fourth-year concurrent bachelor's-master's student at Johns Hopkins University with a bright future in cybersecurity. And growing up in Annapolis, Md., not far from the NSA's headquarters, Swann thought he might work at the agency, which intercepts phone calls, emails and other so-called "signals intelligence" from U.S. adversaries. The Two-Way Report: NSA Can Record, Store Phone Conversations Of Whole Countries The Two-Way Glenn Greenwald: NSA Believes It Should Be Able To Monitor All Communication "When I was a senior in high school I thought I would end up working for a defense co

Exploding Software-Engineering Myths

http://research.microsoft.com/en-us/news/features/nagappan-100609.aspx At Microsoft Research, there are computer scientists and mathematicians who live in a world of theory and abstractions. Then there is Nachi Nagappan , who was on loan to the Windows development group for a year while building a triage system for software bugs. For Nagappan, a senior researcher at Microsoft Research Redmond with the Empirical Software Engineering and Measurement Research Group (ESM) , the ability to observe software-development processes firsthand is critical to his work. The ESM group studies large-scale software development and takes an empirical approach. When Nagappan gets involved in hands-on projects with Microsoft development teams, it's all part of ongoing research in his quest to validate conventional software-engineering wisdom. "A big part of my

Exploding Software-Engineering Myths

http://research.microsoft.com/en-us/news/features/nagappan-100609.aspx At Microsoft Research, there are computer scientists and mathematicians who live in a world of theory and abstractions. Then there is Nachi Nagappan , who was on loan to the Windows development group for a year while building a triage system for software bugs. For Nagappan, a senior researcher at Microsoft Research Redmond with the Empirical Software Engineering and Measurement Research Group (ESM) , the ability to observe software-development processes firsthand is critical to his work. The ESM group studies large-scale software development and takes an empirical approach. When Nagappan gets involved in hands-on projects with Microsoft development teams, it's all part of ongoing research in his quest to validate conventional software-engineering wisdom. "A big part of my

How Doctors Choose to Die

http://www.theguardian.com/society/2012/feb/08/how-doctors-choose-die Years ago, Charlie, a highly respected orthopaedist and a mentor of mine, found a lump in his stomach. He asked a surgeon to explore the area, and the diagnosis was pancreatic cancer. This surgeon was one of the best in the country. He had even invented a new procedure for this exact cancer that could triple a patient's five-year-survival odds – from five per cent to 15% – albeit with a poor quality of life. Charlie was uninterested. He went home the next day, closed his practice, and never set foot in a hospital again. He focused on spending time with his family and feeling as good as possible. Several months later, he died at home. He received no chemotherapy, radiation, or surgical treatment. Medicare didn't spend much on him. It's not a frequent topic of discussion, but doctors die, too. And they don't die like the rest of us. What's unusual about them is not how much treatm

Hacking BIOS Chips Isn’t Just the NSA’s Domain Anymore

http://www.wired.com/2015/03/researchers-uncover-way-hack-bios-undermine-secure-operating-systems/ The ability to hack the BIOS chip at the heart of every computer is no longer reserved for the NSA and other three-letter agencies. Millions of machines contain basic BIOS vulnerabilities that let anyone with moderately sophisticated hacking skills compromise and control a system surreptitiously, according to two researchers. The revelation comes two years after a catalogue of NSA spy tools leaked to journalists in Germany surprised everyone with its talk about the NSA’s efforts to infect BIOS firmware with malicious implants. The BIOS boots a computer and helps load the operating system. By infecting this core software, which operates below antivirus and other security products and therefore is not usually scanned by them, spies can plant malware that remains live and undetected even if the computer’s operating system were wiped and re-installed. BIOS-hacking unti