Talk before you act strategy in the web 2.0 era

I’ve encountered today a post regarding Microsoft‘s Vista contemplations about their pricing and regardless of the specific subject covered in the post, it came to my attention that something has changed. Before web 2.0 business pattern pf rapid application deployment, Microsoft and few other vendors were using a strategy of talking a lot about upcoming …

Continue reading

What Will Happen When Machines Start Lying to Us

The mere thought of a computer lying to you about something has boggled my brain ever since I heard it from a friend professor on a flight as an anecdote on what could happen next in AI. That one sentence took me on a long trip in a rabbit hole of a wide range of …

Continue reading

Some Of These Rules Can Be Bent, Others Can Be Broken

Cryptography is a serious topic — a technology based on mathematical foundation posing an ever-growing challenge for attackers. On November 11th, 2016 Motherboard wrote a piece about FBI’s ability to break into suspects’ locked phones. Contrary to FBI’s constant complaints about going dark with strong encryption the actual number of phones they were able to …

Continue reading

United We Stand, Divided We Fall.

If I had to single out an individual development that elevated the sophistication of cybercrime by order of magnitude, it would be sharing. Code sharing, vulnerabilities sharing, knowledge sharing, stolen passwords and anything else one can think of. Attackers that once worked in silos, in essence competing, have discovered and fully embraced the power of …

Continue reading

Right and Wrong in AI

Background The DARPA Cyber Grand Challenge (CGC) 2016 competition has captured the imagination of many with its AI challenge. In a nutshell, it is a contest where seven highly capable computers compete, and a team owns each computer. Each group creates a piece of software which can autonomously identify flaws in their computer and fix …

Continue reading

Easily develop cool UI in native client applications

For a long time I was contemplating on the best strategy for client application development, mobile clients or desktop client applications. The problem with native client application development is usually the difficulty of building the UI and applying changes to it over time. Since I did both web development and client development I am accustomed …

Continue reading

Machine Operated Web Applications

Software applications have two main perspectives the external perspective where interfaces to the external world are defined and consumed and the internal perspective where an internal structure enables and supports the external interface. Let me elaborate on this: The internal perspective shows the building blocks and layers within the application allowing specific data flow and …

Continue reading

#140conf in Tel Aviv

Today on #140conf Google proved again they are the new Microsoft. They talked about their products and technologies instead of praising Twitter and the good change they brought on us. Microsoft are the inventors of the strategy of not acknowledging others' achievements as if that would diminish their position and Google just follows the same …

Continue reading

Israel’s Mistakes Since the Disengagement from Gaza

The disengagement from Gaza made a few years ago was actually the moment Hamas started getting stronger below the nose of Israel until they have become the authority over there. Eventually, the extremist voices in Gaza won over the more rational ones such as the Fatah and that was certainly not on Israel’s plans. Many …

Continue reading