Wednesday 13 July 2016

The (Re)Rise of Assembly

Well, I never.

In days long ago when I first started out in IT, the language of choice for any serious developer had to be Assembly, whether it be Z80, 6510 or 6502. In-machine memory was small and expensive and developers needed to produce code that was tight, efficient and compact. Things progressed, memory became cheap and newer, ’easier’ programming languages took hold.

Now, with the emergence of the Internet of Things (IoT) the demand for Assembly language skills seem, to be once more, on the rise. According to Tiobe's programming language index, Assembly just cracked the top-10.


It is no surprise that the languages most in demand are still C, C++ and Java, but this blogger, for one, never imagined a time when Assembly would once more appear in the top 10. 

The most likely reasons that we are seeing this trend is the growth in small devices that, by nature of their size, have a need for the compact coding footprint of that once popular form of programming. Plus, Assembly code for a set chip-set can run on just about any device that makes use of that chip-set.

As IoT technology evolves we may see a reversal in the ‘rise from the ashes’ of Assembly, new technology may once more allow the use of looser, bigger foot print languages. But for now, as a developer, you could do a lot worse than dusting of your old Assembly skills.

Related Posts



Will Hogarth
CTO @ VGS Media

Will Hogarth is a long time geek, writer and long distance triathlete, with extensive experience in most areas of the IT World. Will is a former games developer, DBA and project manager, but unlike most geeks he has a passion for the outdoors and a life of adventure.

Links

Monday 11 July 2016

Throwing Business Away

In our technological age, data is king. We all look to grow the quantity and quality of the data we hold on our respective CRM systems. 

The way we can collect this data can vary: mailing lists, logins for free downloads or subscription benefits. Whichever way you collect your data, one thing that is almost certain is that you/your business will be making use of on line forms.

This brings me to my point. There are so many companies, including some of the larger organisation, throwing away this opportunity.

How?

The problem is they use an email validation routine within their forms that only copes with the tradition Top Level Domains (TLDs). This means it is OK if your perspective customer trying to give you their data, uses a ‘.com’ or a ‘.co.uk’ email address. However, if they use one of the newer TLDs,  (such as '.global') their email address will be rejected as being invalid. 


The Result

They will then soon become fed up and go to one of your competitors. All this means you have lost out on valuable data, and moreover: the prospect of a new customer.

In Wrap Up

In order to make sure you and/or your organisation does not lose out, the answer is simple: Make sure any data capture forms validate any email addresses against the latest list of Top Level Domains.

Talk to VGS Media about your Web App needs

Will Hogarth
CTO @ VGS Media

Will Hogarth is a long time geek, writer and long distance triathlete, with extensive experience in most areas of the IT World. Will is a former games developer, DBA and project manager, but unlike most geeks he has a passion for the outdoors and a life of adventure.

Links

Wednesday 6 July 2016

Home AND Away

In the year ending December 2015, government figures show there were over 713,000 domestic burglaries in England and Wales. Averaged out, that is one burglary ever 45-seconds. This figure can be further split down to 499,000 burglaries in a dwelling and the remaining 214,000 in a non-dwelling.  (Non-dwellings include the likes of sheds and other out buildings.)

While this is a drop of almost 10% on the previous year, steps can be taken, to reduce your risk of being part of these statistics.  

The recent advancement on Smart Home security technology has taken residential security to a whole new level.

From basic motion sensors and sensors that detect open windows and doors, through to remote monitoring CCTV solutions, through again to the latest in smart, motion detection CCTV solutions.
  
It is now possible to set up a CCTV system that has specific zones for motion its detection. Then only if movement is detected, in the specified zone, will the alarm be raised. This allows users to set up the system so nearby tree movements etc. can be ‘zoned-out’ so to reduce the number of false alarms.


However, in the modern Smart Home, you do not have to stop there. Think about it. A CCTV motion sensor could trigger a chain of other events. A bedroom light could come on. Followed by a landing light. Then an audible alarm could be sounded if further sensors are triggered and messages sent to anyone on a predefined contacts list. All-in-all, making the home owner a less attractive target.

But what if I am away?

This is where the latest range of Smart Home equipment come into their own.

At one time consumers were limited to an alarm and a set of simple timers to switch lights on and off and pre-set times. Now, smart homes can be set up to ‘learn’ the habits of its occupants. What is learned can be stored and used as a pre-defined program to run when the home owner is away. This program can also be randomised to some level to give the prospective burglar more to think about.

So, lights can be set to come, dim, brighten and go off. TV and audio equipment may be programmed to play in different rooms. Blinds may be opened and closed, and even the vacuum cleaner can be set to do the rounds. All the time, the Smart Home owner can monitor their home from any internet connected location anywhere in the world.

At the end of the day it will seem to the casual onlooker that the home is occupied and busy. Again making it less likely to be just another statistic.

Is your home a Smart home?

Related Posts

Securing the Smart Home

Will Hogarth

CTO @ VGS Media

Will Hogarth is a long time geek, writer, and long distance triathlete, with extensive experience in most areas of the IT World. Will is a former games developer, DBA and project manager, but unlike most geeks he has a passion for the outdoors and a life of adventure.

Links

Monday 4 July 2016

Stand and Deliver

A switch back to security issues with today’s post. Specifically, a look at Ransomware, what it is and how to protect against it.

What is Ransomware?

Ransomware is a type of malware (or virus) that can be installed on a computer without knowledge or the intention of the user. Typically, it takes the form of a Trojan, entering a system through, a downloaded file or a vulnerability in an online service. Its aim is to restricts access to the infected computer system in some way, sometimes completely. Then it will demand that the user pays a fee (a Ransom) to the perpetrators to have the restriction removed.


Have Ransomware attacks not ended?

Things did seem to quiet down, however there has been a measured increase in detection of new threats. Kaspersky Lab Detected a 14% Increase in New Ransomware Modifications in the first quarter of 2016.

Are only PCs at risk?

Originally, this was the case. However, it did not take long for attacks to migrate from traditional targets to mobile devices. These infections work in much the same way, locking out a user until a fee is paid.

What can I do to protect myself?

Vigilance is the key. Avoid sites where pirated content is provided. Pirated downloads may have been modified to harbour hidden viruses and malicious content.  Avoid sites that stream pay for view content for free. Again for the same reasons as above. And also in this vain, think before clicking on a link.

Next, ensure you keep your anti-virus software up to date. At one time there was little defence against Ransomware, but now most credible anti-virus systems deal well with legacy attacks. I say legacy attacks as new malware is always been developed and there is always the risk of attacks before fixes become available. 

Finally, take regular off line back-ups.  Ransomware plays on a weakness that we are all afraid of losing all our precious content. Knowing that many of us would rather pay than suffer that fate. Having a good back-up policy removes this risk. If you become infected you can simply ‘flatten’ a machine and restore from back-up. 


Related Posts



Will Hogarth

CTO @ VGS Media

Will Hogarth is a long time geek, writer, and long distance triathlete, with extensive experience in most areas of the IT World. Will is a former games developer, DBA and project manager, but unlike most geeks he has a passion for the outdoors and a life of adventure.

Links