Archive | Technology RSS feed for this section

Technology content from Leo Nelson

Ello – Your Social Network is Owned by Advertisers

Your social network is owned by advertisers. Every post you share, every friend you make and every link you follow is tracked, recorded and converted into data. Advertisers buy your data so they can show you more ads. You are the product that’s bought and sold. We believe there is a better way. We believe in audacity. We believe in beauty, simplicity and transparency. We believe that the people who make things and the people who use them should be in partnership. We believe a social network can be a tool for empowerment. Not a tool to deceive, coerce and manipulate — but a place to connect, create and celebrate life. You are not a product.

– Ello manifesto.

The Art and Beauty of Testing

Two really good articles on testing recently showed up on my radar. The essence of both articles is that testing helps ensure you won’t ship garbage and that testers are those entrusted with ensuring truth, transparency and accountability about the state of a project. Both resonated well, because of a recent project at work where testing, and more testing, really helped provide a foundation for the project to succeed.

Definition of Testing

Verification that a product does what it is intended to do and does so elegantly, efficiently, and correctly

– Steven Sinofsky on Beauty of Testing.

Approach and Mindset of Testing

A tester approaches a product as a user would, and does the things that occur to users. All the time taking notes. After that, the tester goes through the docs, and tests them too. Do they accurately describe the product? In what ways did I get lost? A tester gives you all the information she has that could help you find the problem and fix it. And when you ask for more, the questions are answered clearly and directly.

– Dave Winer on The lost art of software testing

Responsibility of Testers

Change is the enemy of quality. Testers know that when you have a bug and you change the code you are introducing risk into a complex system. Their job is to understand the potential impact a change might have on the overall product and weigh that against the known/reported problem. Good testers do not just report on problems that need to be fixed, but also push back on changing too much at the wrong time because of potential impact. Historically, for every 10 changes made to a stable product, at least one will backfire and cause things to break somehow.

– Steven Sinofsky on Beauty of Testing.


STIX™ is a collaborative community-driven effort to define and develop a standardized language to represent structured cyber threat information. The STIX Language intends to convey the full range of potential cyber threat information and strives to be fully expressive, flexible, extensible, automatable, and as human-readable as possible.

TAXII™ defines a set of services and message exchanges that, when implemented, enable sharing of actionable cyber threat information across organization and product/service boundaries. TAXII, through its member specifications, defines concepts, protocols, and message exchanges to exchange cyber threat information for the detection, prevention, and mitigation of cyber threats. TAXII is not a specific information sharing initiative or application and does not attempt to define trust agreements, governance, or other non-technical aspects of cyber threat information sharing. Instead, TAXII empowers organizations to achieve improved situational awareness about emerging threats, enabling organizations to share the information they choose with the partners they choose.