Skip to main content

Thursday 5th February 2021

Here's some of what you missed in the discussion at 'The Thirsty Robot':

Technical Musings:

Instantiation. We discussed the problems when a software suite provides control over preferences and settings, but then does not instantiate them correctly when you start a new session or tab. This can lead to security/privacy problems where rules about restricted scope or domains are not followed, or where information leaks, and more. Testing this type of deep functionality can be a challenge with software that has lots of user control and many derived capabilities. Explore deeper:  Mocks   Control

Conglomerate or Accretion. Stolen from geology, these are possible terms for describing software that has had functionality randomly added over time, without any clear overall plan or structure. A bit like someone else's toolbox where the drill bits are stored in the little metal box decorated with roses - if you don't know this then it can take some time to find the drill bits! Microsoft Word and OWASP's Zap were cited as possible examples for further study and critique. The links provide just two examples of reviews that are critical in their appraisal, rather than just providing positive marketing fodder.

Recommended Movies:

The Shape of Water All 4 UK (free)

    The conversation went from determining the gender of hamsters that led to fish (guppies), and ended up with this amazing movie. 50s-flavour sci-fi that breaks the mould...

Bio-Dome  Amazon Prime Video Apple TV Microsoft Video (rent/buy)

    Adam Sandler was mentioned, and this led to Pauly Shore, which led to this movie...

As usual, we reckon it is best if you don't know anything before watching a film! So only click on a link if you want your experience to be potentially spoiled...

Recommended TV:

The Equaliser (Not known which streaming service this will be on in the UK)

    TV Series, then Film, then reboot the Film, then reboot the TV series. This is how media is made these days. Having multiple film and TV series makes searching for it difficult!

Recommended YouTube:

    Fruit Juice from the previous Millenium.   Fruit Juice (may not be politically correct in 2021)

    Do reservoirs have overflows? Wow!

Tech Developments:

    Cinemas are selling access to big screens to gamers... Cineworld

    Suffolk (& Norfolk) Innovation Network: Innovation Network

Recommended Interweb URLs to visit:

    Poorly chosen Domain Names: Domain Names Not To Have... (thanks, Ian)

    Gritting Lorry Names: Names...  Names...  Names...

    Infinite zoom-ins and outs: Link. Link. (The original)

Security and Pen-Testing:

Recommended Foodstuff:

Cornish Pasties delivered to you: Link.  LinkLink

---

The next online meeting at The Thirsty Robot is on Thursday 25th February 2021 at 7:30pm GMT.




Comments

Popular posts from this blog

Thursday 24th June 2021

 Here's some of what you missed at The Thirsty Robot: Technical Musings Technology Topic - Nostalgia & Alternative Universes Maybe it was the recent Summer Solstice, or the change of weather from 'too hot' to 'unsettled', or the leak of Windows 11 , but The Thirsty Robot attendees were in a nostalgic mood. Microsoft's 'Bob' user interface was mentioned, because it is one of those fascinating 'roads almost travelled' that is probably dominant in an alternative universe - but not this one. The idea of making a computer a 'simple to use' device is an old idea, but there are few good implementations...  So, Bob was the classic 'use simple, familiar metaphors' approach. In this case, the inside of a house, where rooms were devoted to various tasks: https://en.wikipedia.org/wiki/Microsoft_Bob   This was back in 1995, and so high resolution, lots of colours and many other 2020's 'standards' just didn't exist then. To ...

Thursday 25th February 2021

Here's some of what you missed in the discussion at 'The Thirsty Robot': Technical Musings: Eye Tracking:  So what are you looking at on the screen? We discussed the subject of 'Eye Tracking' and wondered if you could do it with the cameras built into laptops nowadays. Eye tracking can be achieved in a number of ways, but the main usual method uses Infra-Red light to illuminate the eye, and then track the reflection from the cornea (the front part of the eye). Other techniques include tracking the retina (the back) of the eye. Some methods require wearing a special pair of glasses... Eye tracking started out as a technique used by UI researchers to see what people looked at in user interfaces, but over time has been used in a number of other applications, including using it to enable disabled people to control things by moving where their eyes are looking (the senses of fighter aircraft pilots are used in many ways as well...).  Good explanation... Wikipedia Eye Tra...

Thursday 14th May 2021

Here's some of what you missed at The Thirsty Robot: Technical Musings Technology Topic - The 5 Stages of Hacking Discussion turned immediately to Security this time. The fifth stage of Hacking was mentioned, in the context of digital forensics. Hang on, you might be thinking, the fifth stage of Hacking isn't Forensics! Photo of one of the 5 Stages by  Antoine Julien  on  Unsplash Let's refresh our memories about those 5 stages first. No, not that sort of stage! - Reconnaissance - Scanning - Gaining Access - Maintaining Access - Cover(ing) Tracks Now, if you are talking about Ethical Hacking, then that fifth stage is often changed - to Forensics. And some people insist on calling it 'digital forensics', to differentiate it from dusting for fingerprints, looking at blood splatter patterns and all those other 'Witless Silence' tropes. (The long-used incorrect spoonerism of a famous BBC crime drama was first given a mass audience in the 1999 Easter Special epi...