Profile

Cover photo
Issy Fernando
Works at IBM
66,870 views
AboutPostsPhotosVideos

Stream

Issy Fernando

Shared publicly  - 
 
“Enterprise content management puts content to work. Beyond capturing and sharing, it's responsive, immediate, and actionable. A unified customer experience delivering the right content to the right people where and when they need it. Putting context around content, empowering every employee so organizations can make smarter decisions, realize new value, and deliver better customer service. Smarter content is transforming business around the world, right now.” #ibminsight   #ibmecm  
1
Add a comment...

Issy Fernando

Shared publicly  - 
 
im rethinking the removal of all the grass in our backyard. this is awesome

http://i.imgur.com/J3SYQVd.jpg
2
Add a comment...

Issy Fernando

Shared publicly  - 
 
You wouldn't think an initialization system would cause a this much debate.  But, for over a year, the debate between the systemd init system and Ubuntu's upstart system has been dividing the Linux community, spawning hundreds of posts on blogs and social media, and fanning the flames of a good old open source war.

In the end, it came down to a decision by the Debian project. When they announced that they were going to use systemd instead of upstart in the next release of the operating system

https://lists.debian.org/debian-ctte/2014/02/msg00281.html

In the end, Canonical founder Mark Shuttleworth posted a very gracious article discussing the issue and, while praising the efforts of those involved in the upstart project, conceded defeat.  The post was titled 'Losing Graciously' and it was exactly that: someone who'd poured money, time, effort, and man hours, into a project that just didn't work out. It was a great show of class and what is possible within the community when people can step out of their personal camps and focus on what's best for the community.

http://www.markshuttleworth.com/archives/1316
With Bdale Garbee's casting vote this week, the Debian technical committee finally settled the question of init for both Debian and Ubuntu in favour of systemd. I'd like to thank the committee for their thoughtful debate under pressure in the fishbowl; it set a high bar for analysis and ...
1
Add a comment...

Issy Fernando

Shared publicly  - 
 
So that's really cool ... Managing teams is an art form, managing virtual teams is that much more of a craft (i suppose). IBM went about and interviewed successful guild leaders in World of Warcraft (WoW) to understand and build some manner of comprehension on how they effectively managed virtual teams! #ibmconnect #gamification
1
Issy Fernando's profile photoJasvir Nagra's profile photo
3 comments
 
+Issy Fernando I better be getting points for all this virutal teaming.  Or stars.
Add a comment...

Issy Fernando

Shared publicly  - 
 
Oh #Lorde :)
You are too fanastical!
http://i.imgur.com/3VKVl4s.jpg
1
Add a comment...

Issy Fernando

Shared publicly  - 
 
I had quite a funny post on my Facebook wall to welcome in the new year, it ended with "So think back to the wonderful things that happened this past year, and enjoy the anticipation of the yummy things yet to happen for this new year." (I had, what I thought, a clever play on words where I earlier mentioned anticipating scoffing into a cake that my wife had baked).

Some days later I was shuffling around some of the books on the book case and found myself flipping pages over an old "History of Philosophy" textbook where I found myself spending time reading on Stoicism. Wikipedia has them down as teaching "that destructive emotions resulted from errors in judgment, and that a sage, or person of "moral and intellectual perfection," would not suffer such emotions." More importantly to me "the Stoics presented their philosophy as a way of life, and they thought that the best indication of an individual's philosophy was not what a person said but how they behaved." Perhaps there was something here that could be applied to life in the 21st century.

Turns out that one of the most important Stoic philosophers Marcus Aurelius, the last of the Five Good Emperors penned what is now titled the "Meditations (of Marcus Aurelius)". Initially written to himself as a source for his own guidance and self-improvement, the writings run over 12 books that were written during the various periods of his life. Admittedly I have yet to read the works, or even a digest of his works ... but one of the (many) themes of his writings is of "maintaining focus and to be without distraction all the while maintaining strong ethical principles such as "Being a good man"". Now that is something that I can get behind! I did however peruse the many reviews and reflections on his works and the extracts (of translations) were powerfully eye opening (and quotable).

- If thou art pained by any external thing, it is not this that disturbs thee, but thy own judgment about it. And it is in thy power to wipe out this judgment now.

- Not to feel exasperated or defeated or despondent because your days aren't packed with wise and moral actions. But to get back up when you fail, to celebrate behaving like a human—however imperfectly—and fully embrace the pursuit you've embarked on.

- Let it be your constant method to look into the design of people's actions, and see what they would be at, as often as it is practicable; and to make this custom the more significant, practice it first upon yourself.

- When you wake up in the morning, tell yourself: The people I deal with today will be meddling, ungrateful, arrogant, dishonest, jealous, and surly. They are like this because they can't tell good from evil. But I have seen the beauty of good, and the ugliness of evil, and have recognized that the wrongdoer has a nature related to my own—not of the same blood or birth, but the same mind, and possessing a share of the divine.

- Never regard something as doing you good if it makes you betray a trust or lose your sense of shame or makes you show hatred, suspicion, ill-will or hypocrisy or a desire for things best done behind closed doors.

- Begin - to begin is half the work, let half still remain; again begin this, and thou will have finished.

Great to reflect on as we anticipate all the yummy things yet to happen this year!
2
Add a comment...

Issy Fernando

Shared publicly  - 
 
If you've ever wanted to know how the iPhone 5s' Touch ID fingerprint security works beyond a basic overview, you'll be glad to hear Apple has just delivered a motherlode of new details. An updated security document newly posted to its “iPhone in Business” microsite. The new info provides an inside look at how exactly the Secure Enclave generates and communicates encrypted and temporary identification information to the rest of the system to make sure that fingerprint data is never exposed to anything beyond itself.


"Each Secure Enclave is provisioned during fabrication with its own UID (Unique ID) that is not accessible to other parts of the system and is not known to Apple. When the device starts up, an ephemeral key is created, tangled with its UID, and used to encrypt the Secure Enclave’s portion of the device’s memory space.
Additionally, data that is saved to the file system by the Secure Enclave is encrypted with a key tangled with the UID and an anti-replay counter."


Apple goes on to detail how the A7 processor helps gather the fingerprint data, but can’t actually read said information itself, and how the exchange that takes place between the A7 and the secure enclave is encrypted to prevent any hijacking of the data at that point.


"Communication between the A7 and the Touch ID sensor takes place over a serial peripheral interface bus. The A7 forwards the data to the Secure Enclave but cannot read it. It’s encrypted and authenticated with a session key that is negotiated using the device’s shared key that is built into the Touch ID sensor and the Secure Enclave. The session key exchange uses AES key wrap- ping with both sides providing a random key that establishes the session key and uses AES-CCM transport encryption."


The document also includes previously revealed technical data around the Touch ID scanner itself, which takes an 88-by-88-pixel, 500-ppi raster scan of the finger being applied, which is then transmitted to the Secure Enclave, vectorized for the purposes of being analyzed and compared to fingerprints stored in memory, and then discarded.


Apple closes the section on Touch ID with a detailed, step-by-step explanation of how unlocking the smartphone with the tech works.


"On devices with an A7 processor, the Secure Enclave holds the cryptographic class keys for Data Protection. When a device locks, the keys for Data Protection class Complete are discarded, and files and keychain items in that class are inaccessible until the user unlocks the device by entering their passcode.
On iPhone 5s with Touch ID turned on, the keys are not discarded when the device locks; instead, they’re wrapped with a key that is given to the Touch ID subsystem. When a user attempts to unlock the device, if Touch ID recognizes the user’s finger- print, it provides the key for unwrapping the Data Protection keys and the device is unlocked. This process provides additional protection by requiring the Data Protection and Touch ID subsystems to cooperate in order to unlock the device.
The decrypted class keys are only held in memory, so they’re lost if the device is rebooted. Additionally, as previously described, the Secure Enclave will discard the keys after 48 hours or 5 failed Touch ID recognition attempts."


Another new section details iCloud Keychain, the syncing service that stores your passwords for use across platforms. Apple notes the system is designed to prevent unauthorized access to iCloud Keychain stored information in the event of a compromised iCloud account, and to prevent third-party access to any passwords housed in the service.


"iCloud provides a secure infrastructure for keychain escrow that ensures only authorized users and devices can perform a recovery. Topographically positioned behind iCloud are clusters of hardware security modules (HSM). These clusters guard the escrow records. Each has a key that is used to encrypt the escrow records under their watch, as described previously.
To recover a keychain, the user must authenticate with their iCloud account and password and respond to an SMS sent to their registered phone number. Once this is done, the user must enter their iCloud Security Code. The HSM cluster verifies that the user knows their iCloud Security Code using Secure Remote Password protocol (SRP); the
White Paper 26 iOS Security code itself is not sent to Apple. Each member of the cluster independently verifies that the user has not exceeded the maximum number of attempts that are allowed to retrieve their record, as discussed below. If a majority agree, the cluster unwraps the escrow record and sends it to the user’s device."


Apple has also added new information about iMessage, FaceTime encryption, single sign-on and Airdrop in terms of areas of interest to check out.
1
Add a comment...

Issy Fernando

Shared publicly  - 
 
Thought provoking post by Jeff Atwood.

When apps are free, you're the product
I know, I know, I'm sick of this trite phrase too. But if the market is emphatically proving that free is the only sustainable model for apps, then this is the new reality we have to acknowledge.

Nothing terrifies me more than an app with no moral conscience in the desperate pursuit of revenue that has full access to everything on my phone: contacts, address book, pictures, email, auth tokens, you name it. I'm not excited by the prospect of installing an app on my phone these days. It's more like a vague sense of impending dread, with my finger shakily hovering over the uninstall button the whole time. All I can think is what shitty thing is this "free" app going to do to me so they can satisfy their investors?

For the sake of argument, let's say the app is free, and the developers are ethical, so you trust that they won't do anything sketchy with the personal information on your device to make ends meet. Great! But they still have to make a living, don't they? Which means doing anything useful in the app requires buying three "optional" add-ons that cost $2.99 each. Or there are special fees for performing certain actions. Isn't this stuff you would want to know before installing the app? You betcha. Maybe the app is properly tagged as "offering in-app purchases" but the entire burden of discovering exactly what "in-app purchases" means, and how much the app will ultimately cost you, is placed completely on your shoulders. You, the poor, bedraggled user.

http://www.codinghorror.com/blog/2014/02/app-pocalypse-now.html
1
Add a comment...

Issy Fernando

Shared publicly  - 
 
After denied rights to use "Another One Bites the Dust" for Rocky III, Sylvester Stallone hired Survivor to write an original song instead, which turned out to be "Eye Of The Tiger". 


http://www.guitarworld.com/interview-guitarist-jim-peterik-talks-tiger-and-new-pride-lions-album-immortal

This year marks the 30th anniversary of “Eye of The Tiger." What’s the origin of that song?

I came home from shopping one day and heard a message on the answering machine from Sylvester Stallone. At first, I thought it was a joke, but I called the number and sure enough, Stallone answered. He told me that he loved the band and had heard “Poor Man’s Son” and “Take You On A Saturday” from our Premonition album and wanted that same kind of “street” sound for his new movie, Rocky III.

He sent us a video montage of the movie and Frankie (Sullivan) and I watched it together. There were scenes of Rocky getting a little “soft” (doing the Visa card commercials) and Mr. T “rising up” with his Mohawk. It was electric. The temp music they used to accompany the montage was “Another One Bites The Dust” by Queen. I remember asking Stallone why he just didn’t use that song for the movie and he said it was because they couldn’t get the publishing rights for it. At that point I just said, “Thank you, Queen!” [laughs]

I had my Les Paul and a small amp that we had set up in the kitchen. I turned down the sound and just started playing the little intro [mimics the intro], just feeling that pulse. Then I added to it when I saw the punches being thrown, trying to score the chords in time with the punches. We couldn’t get any farther because we didn’t have the whole movie.

Fortunately, we were able to get a copy of the finished movie with the promise that we’d send it right back the next day. At that point, we had become totally enamored in the movie and when I heard that phrase: “Hey Rocky, you’re losing the eye of the tiger” I remember turning to Frankie and saying, “Well, there’s the name of our song!” Once we had the title, the challenge became telling the story.

Four days later we gathered the troops, went into the Chicago Recording Company and recorded it. Frankie and I both wanted that big John Bonham type of drum sound and I’ll never forget the feeling and the way our drummer, Marc Droubay, captured it. As soon as he hit that beat I said, “Oh shit, this is going to be HUGE!” And there was the sound of Survivor. It was just magic!


What’s your greatest memory of your days with Survivor?

Some of the more subtle moments are my favorites. When “Eye of the Tiger” was first starting to zoom up the charts, we were out on the road with REO Speedwagon. I remember it was late in the afternoon and I went into a restaurant to get something to eat. While I was there, somebody played "Eye Of The Tiger" on the jukebox. There was a little girl there with her family. She must have been around 4 years old or so. When the song started playing, she immediately got up from her family, started spinning around and said, “Mommy! Daddy! That’s MY song! They’re playing MY song! Out of the mouth of babes. You can’t fool them and you can’t hide from them. They either love it or they don’t, and they loved it.
1
Add a comment...

Issy Fernando

Shared publicly  - 
 
Turns out electric cars are quite old! In the case of  Porsche 116 years old. 

The automaker has recovered the P1, an electric car that Ferdinand Porsche built while working for a carriage maker in 1898; it was also the first car he ever built. 

A wooden frame, 3HP motor and 50-mile range and but it was fast enough to win an all-electric race in 1899. Porsche raced his car in 1899 in a 24-mile, all-electric competition and crossed the finish line with three passengers 18 minutes ahead of his nearest competitor.

That's right! An all electric race ... in 1899

The young engineer built a total of four of these Egger-Lohner electric vehicles, according to the brand that bears his name today. The rest are unaccounted for. This version was parked in a warehouse in 1902 and has sat there untouched ever since. It will now become a permanent part of the Porsche display at its museum.

http://press.porsche.com/news/release.php?id=842&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+PorschePressNews+%28Porsche+Press+News%29
1
Issy Fernando's profile photo
 
yeh its pretty neat! to think we had the tech back in the 1800s!
im trying to dig up more info on the all-electric 1899 race but coming shot of verifiable info.
Add a comment...

Issy Fernando

Shared publicly  - 
 
ah chocolate! The Hershey Company has signed an agreement to develop printable treats with 3D Systems, which announced its own chocolate-equipped printer at CES last week. That yet-to-be-released machine will fall under the ChefJet line, and also supports printing 3D objects with sugar. 

http://www.3dsystems.com/press-releases/3d-systems-hershey-team-deliver-3d-printed-edibles
3
Add a comment...

Issy Fernando

Shared publicly  - 
 
Jackie Chan talks about his scene with Bruce Lee ... which he describes as his best story ever. 

Jackie Chan got the chance on the set of 'Enter the Dragon' to act opposites Bruce Lee and Bruce Lee accidentally hit Jackie in the head ! 
1
1
Lim Soon Sim's profile photo
Add a comment...
Story
Tagline
technology connoisseur
Introduction
I'm a technologist focused on helping good people make great things. With a passion for technology, I practice my craft at IBM.
Basic Information
Gender
Decline to State
Work
Occupation
Technomancer at IBM (for more accurate chronological detail of my employment, please see my linkedin profile)
Employment
  • IBM
    Information and Analytics, Technology Lead, 2005 - present
  • Technomancer
    HAL : http://en.wikipedia.org/wiki/HAL_9000, 2005 - 2013
  • Vulcan
    Vulcan : http://en.wikipedia.org/wiki/Vulcan_(Star_Trek), 2001 - 2005
  • UX Day Dreamer
    UX Day Dreamer : http://www.youtube.com/watch?v=2uohP4gk0wU, 2000 - 2005
  • Code Monkey
    Code Monkey : http://www.youtube.com/watch?v=v4Wy7gRGgeA, 1998 - 2005