DiscoverCodifyre
Codifyre
Claim Ownership

Codifyre

Author: Steve Giguere

Subscribed: 10Played: 90
Share

Description

Codifyre is an entertaining look at emerging trends in technology. It covers anything from software development and security concepts to philosophy and culture. The aim is to create easy to digest content for everyone from coders to sales gurus looking to stay clued in.
21 Episodes
Reverse
There is a lot of hype around the cloud.  Many people know the term "the cloud" but the meaning is often jokingly relegated to the "other peoples computers".   Is it really other peoples computers?  Well it's not your computer.  It's bigger and more amazing than that.  In this show I'll talk about the inception of the cloud and how it went from solving an internal problem to becoming the global operating system is it today.   #thecloud #aws #azure #whatisthecloud #gcp #google #microsoft #jeffbezos #andyjassy
#DevOps, #DevSecOps, #ShineTheory "Shine Theory not only defines how success can be achieved across so many aspects of our lives but also brings clarity to the successes of such movements as DevOps.  The concept of collaboration of software development and operations, over the separation of role, knowledge and/or power is proving both an advantage and an enabler." Read the full blog: https://codifyre.com/culture/shine-theory-devops-community Follow along on... Twitter: https://www.twitter.com/codifyre Facebook: https://www.facebook.com/codifyre Instagram: https://www.instagram.com/codifyre.co.uk Web: https://www.codifyre.com DevOps, DevSecOps, Open Source, Shine Theory, Rancher, Cloud Native, Open Source Software
...or is it "are devices listening" to you? Well yes. There's always a simple answer to these questions and it's yes. Breaking it down to the basics, pretty much all of our devices are listening because we've enabled Siri or Google or Alexa or… to respond to a keyword command like "Hey Siri" such that they can present us, in the case of Siri, with a spooky HAL 9000ish blob to indicate it's listening (because it wasn't before honest) and ready to perform our bidding. Sometimes things can go amiss... Read the full blog Follow us on... Twitter: https://www.twitter.com/codifyre Facebook: https://www.facebook.com/codifyre Instagram: https://www.instagram.com/codifyre.co.uk Web: https://www.codifyre.com
This was going to be a comparison of major phones, breaking down some of the exploits and weaknesses.  I was potentially going to compare IOS to Android and throw fuel onto an already raging fire amongst smart phone enthusiasts which is, if you’re listening to a podcast, all of us.   Maybe you’re not a geek or a gadget nut but you’re probably far more dependent on that device that you may realise.  You’ve probably never really put a great deal of thought into how much of YOU is locked up in that phone.  You might even have a Kanye-West style pin code like 000000 to unlock it (if you didn’t see the article I posted on the Codifyre Facebook page about the worst passwords and pin-codes of 2018, it’s worth a read.  Kanye tops the bill. Let’s start with what’s in your phone.   Read the rest here...    Follow us on... Twitter: https://www.twitter.com/codifyre Facebook: https://www.facebook.com/codifyre Instagram: https://www.instagram.com/codifyre.co.uk Web: https://www.codifyre.com
Last year at this time Bitcoin was going haywire!  It was on what seems to be the never ending rise to THE MOON!   Until it stopped just shortly into 2018.  Totally unpredictable behaviour.  Stupid bitcoin!  Or is it?   There is a pattern.  Ok a few patterns but this one struck me as interesting.   If you check out the blog article or this podcast on Codifyre.com you’ll see a few graphs of bitcoin over the years.  The all time price isn’t really that interesting because the big 2017 Christmas spike kind of skews the whole thing but the idea is that it’s generally going up with basic awareness.  That doesn’t give it real value so much as real potential value.   What IS interesting is the behaviour of the price when the media gets involved and starts hyping it.  Part time thrill seekers get into the crypto band wagon and shit gets crazy.  In fact if you think last year was a bizarre anomaly, and do check out the price graph for Nov 4th 2017 to Nov 4th 2018 to get a feel for the signature of that crazy….   but then, let’s go back 4 years.   In fact I’ll even go back to the exact same dates Nov 4th 2013 to Nov 4th 2014.  That was the last major Bitcoin hullabaloo in the press.   If you check out the graph, although the pricing is almost exactly 20 times smaller, the shape of the graph can almost be overlaid on the graph from 2017/18 and it was even the exact same time of the year as Christmas approaches.   Driven by media and speculation, people react almost exactly the same and it appears that 4 years is the magic amount of time for us humans to totally forget that we already did it once and, just go ahead and do it again.   Let’s get away from Bitcoin for the moment… and talk about some of the other big ones like Ethereum and Litecoin.   I like Ethereum and while I don’t entirely understand Litecoin's purpose yet it’s definitely got a good following.   The reason I like Ethereum is it has a leader (who is real), it had a plan and it has one really critical differentiator that I think a lot of people will like and that’s the Proof of Stake system it’s got in its roadmap for the future.   Before I get into that though, the other reason I like Ethereum is because it’s not a straight up cryptocurrency.   It’s a platform for the creation of Smart Contracts.   Read the rest here...    Follow us on... Twitter: https://www.twitter.com/codifyre Facebook: https://www.facebook.com/codifyre Instagram: https://www.instagram.com/codifyre.co.uk Web: https://www.codifyre.com
Once a new technology rolls over you, if you're not part of the steamroller, you're part of the road. Stewart Brand This is one of those podcasts which isn’t the offspring of late night research, countless hours of trial and error tempered by seminars, articles and other people podcasts. This one is coming from real life… whatever that means. This one is coming from real life… whatever that means. If you’ve found yourself working in the technology arena it can be as exciting as it is challenging. Sometimes these are one and the same and sometimes they could not be farther apart. Being a GenXr myself I was there at the beginning of the home computing boom. I remember the rise of Steve Jobs, and when Bill Gates was the young genius instead of Mark Zuckerberg except of course when he famously said “640k is all the memory anyone will ever need” or words to that effect. Ok fine he didn’t say that but, thanks to the post-truth world I think it’s probably perfectly ok to attribute that statement to him or anyone else for that matter. Even better if you turn it into a meme! Getting back to the 80s and 90s when technology was “young” and when air-quotes were first invented (I was thinking some as I typed “young”). Back then I learn to program in C language, I could disassemble my PC and fix it myself, even over-clock the CPU to get more gusto from it and I was building linux kernel I got from Linus Torvalds (the OS namesake) himself because that was the only place you could get it. I will return to Linus as a flagship example of staying relevant in the technological age as he one of the most influential people in our technological era. Let’s talk about that era. We are currently in a phase of advancement which is to say the least, complex.  Check out the full blog at  https://codifyre.com/tech-skills/staying-relevant-technology-world-editorial/ Follow us on... Twitter: https://www.twitter.com/codifyre Facebook: https://www.facebook.com/codifyre Instagram: https://www.instagram.com/codifyre.co.uk Web: https://www.codifyre.com
Is it cast aside teenage wunderkinds who can seemingly dissect all things computer with the crack of a laptop to create designer chaos?  They are portrayed smoking cigarettes, roller blading and always have media savvy branding!  Too cool! Any time a major breach is announced, the media conjures up their classic image of this hooded jedi-like figure in a dimly lit room with 0s and 1s swirling about. Film and TV has done a superb job of portraying our favourite computer hacker as the stereotyped quirky yet heavily crafted indie kid who wields the required dexterity to power-type at a moments notice, anywhere on the planet and inject themselves straight into anything from corporate servers, to traffic light control systems to Dinosaur based fun parks. It usually involves some superb visualisations of neon landscapes and swirling equations. In the episode I unpack hacking and what it really is, with a few notable examples from the past few years.    Warning! I may debunk Hollywood's sexy portrayal and expose hacking for what it really is... good ol' fashioned elbow grease. The shownotes for the episode are here. https://codifyre.com/coding/hacking-hackers-and-their-hacks-2018/ Follow us on... Twitter: https://www.twitter.com/codifyre Facebook: https://www.facebook.com/codifyre Instagram: https://www.instagram.com/codifyre.co.uk Web: https://www.codifyre.com
Machine Learning I’ve heard the phrase Machine Learning banging around the media more intensely over the past few years and you know what that means… I’m not happy until I know what is really means. TO THE BAT-MOWER! My first conjured image is of course a lawn mower in a classroom trying to fumble its way through the shakespearean sonnet. It seems I wasn’t far off! Ok I was pretty far off. But there is a smart lawn mower that learns how to cut you lawn which is in fact machine learning. It’s the word machine which I find distracting. We’re not accustomed to speaking of computers as machines or machines as computers although the latter is quickly becoming so and hence the phrase. A few podcasts ago we discussed Self-Driving Cars and machine learning is definitely at the core of their success. We have all driven cars and would unanimously agree that no two routes are the same even if you’re driving the same route every day. There is always some element of surprise. These cars would not exist if not for some very clever learning algorithms which prioritise success paths over failures in order to adapt their reactions and even their default behaviour to new situations. Just like us human learners. What about other non-driving based applications? The mower is essentially a tiny little self-driving car that works out your lawns shape and the best route while having the luxury of not having to contend with human driven lawn mowers, drinking and just mowing all over the place. Machine learning and AI (Artifical Intelligence) are peanut butter and chocolate, ham and cheese, bacon and…. everything. What’s the point of learning if you aren’t going to use what you have learned? I could dive deep into the inner workings of machine learning algorithms but that would be a serious snoozer to the non-enthusiast and as complex and fasinating as it is, it’s more fun to try to derive the gist of what it all means by looking at the applications because without application there is no learning. Are we surrounded by learning machines who will eventually take over the world? Yes! But how? Let’s have a crack at a top 5!  Check out the podcast for the list. The shownotes for the episode are here: https://codifyre.com/technology/machine-learning-are-you-smarter-than-a-toaster/ Follow us on... Twitter: https://www.twitter.com/codifyre Facebook: https://www.facebook.com/codifyre Instagram: https://www.instagram.com/codifyre.co.uk Web: https://www.codifyre.com
I was a late adopter waiting until about 2007 before getting onto Facebook. Back in the 2000s I remember my brother calling Facebook a platform for narcissists. Just over 10 years later and 2.3 Billion narcissists later he and I are both active participants. I don’t think he was wrong! To a degree of course. I think Facebook, to take a positive spin, provides an outlet for many people to express themselves without directly expressing themselves.  Kind of like wearing a Nike t-shirt. Do I like sports or do like to look like I like sports? Hard to know and you’d need a larger piece of the profile to figure it out but the point remains, I’ve made a statement without having to say anything. Facebook allows people to ‘share’, ‘like’, or ’emoji’ to provide indicators of their feelings without the risk of direct criticism to direct messaging. In fact don’t we find it a bit annoying sometimes when somebody breaches the unwritten rules and posts something blatantly opinionated… I mean come on people… allude to your feelings damn it, don’t provide direct feelings, we are not capable of coping with that! So why the analysis… there is a point and that point is the what has happened over the past few weeks with Facebook and their handling (mishandling) of your data. Social Media Privacy Is that a contradiction or oxymoron?  What can we do about our privacy and what regulations will change the face of how our data is handled in the future? The shownotes for the episode are here in addition to some great tips and links on cleaning up the privacy of your digital presence! https://codifyre.com/culture/social-media-versus-data-privacy-gdpr/ Follow us on... Twitter: https://www.twitter.com/codifyre Facebook: https://www.facebook.com/codifyre Instagram: https://www.instagram.com/codifyre.co.uk Web: https://www.codifyre.com
Robots will rule us all. I feel that’s already been established by more sci-fi writers than can be credited in one podcast. You may have recently seen that an Uber self-driving car killed a pedestrian in a headline grabbing frenzy that re-awakened the humanity in all of us. Questions like What if… insert dystopian human based car fiasco here where AI (artificial intelligence) is deciding the fate of human lives with alarmingly regularity. During my recent discussions I found some common themes where these infinite ethical conundrums often came back to the questions of responsibility. Who do you blame if AI kills one of our humans AND… assuming the AI is forced into making a decision which means one life over another how does it make that choice? Heavy stuff folks. Fasten your seatbelts.  Or don't. Doing my best and simplifying my position, I’ll start with defining for the curious (hey that’s why you listen to podcasts isn’t it!) how self-driving cars work and then we'll start talking philosophy and how we are trying to tackle those tough questions, or, ask ourselves if we're just being too darn human. Read the notes at https://codifyre.com/culture/self-driving-cars/ Follow us on... Twitter: https://www.twitter.com/codifyre Facebook: https://www.facebook.com/codifyre Instagram: https://www.instagram.com/codifyre.co.uk Web: https://www.codifyre.com    
The internet browser, which began as a simple visual interpretation of a "markup" language used to create a textual representation of visual elements is now a dangerously functional run-time environment potentially comparable to our host operating system.  In this episode we talk about known exploits in the browser from how file types have tricked the browser, and the OS, into giving away credentials to hacked browser extensions, to crypto mining to the potential for trusted websites to undermine our confidence and off up malvertising and lead us off the safe path. In short... it's a quick, learn from the mistakes of the past, cautionary tale about browsing the internet in the modern (2018) world.  I would be worried that I was dating this podcast but, as it's a tech podcast, it'll be dated faster than you can say Betamax.  So go listen now! Read the notes for Part 1 & 2 at https://codifyre.com/tech-skills/browser-shopper-shoplifter Follow us on... Twitter: https://www.twitter.com/codifyre Facebook: https://www.facebook.com/codifyre Instagram: https://www.instagram.com/codifyre.co.uk Web: https://www.codifyre.com  
Let me go back to the beginning. 1990! Shortly after the earth cooled and life began,  Sir Tim Berners-Lee just decided to invent the world wide web.  This was approximately 1990 give or take any prior research and general acceptance of the idea. He also put together the first browser confusingly and yet inspirationally called "WorldWideWeb". Well now you know how that all started and why it's called what it is. For those of you who were toddlers or perhaps not even born yet a world without the web sounds like a time when everything was in black and white, lit by open flame, the notion of evolution was exciting and new and tablets were made from stone. Since then things have evolved. The browser which began as a simple visual interpretation of a "markup" language used to create a textual representation of visual elements is now a dangerously functional run-time environment potentially comparable to our host operating system, more than you might expect.  Read the show notes at... https://codifyre.com/tech-skills/browser-shopper-shoplifter/ Follow us on... Twitter: https://www.twitter.com/codifyre Facebook: https://www.facebook.com/codifyre Instagram: https://www.instagram.com/codifyre.co.uk Web: https://www.codifyre.com  
In Part 1 of our article on blockchain security and cryptocurrency, we took a hard look at the core components that make up a successful cryptocurrency like Bitcoin. From the distributed network itself to the individuals who wish to own and use a cryptocurrency wallet to transfer or spend Bitcoin, security is key (pun intended) and very much a consideration at every stage. We ended our last article talking about the types of wallets available for conducting transactions on the network. This is where both choice and the potential for user or developer error come into play, especially when we discuss the types of wallets and, more importantly, the storage each type provides. "The technology is a deadly combination of high value, high stakes, and low maturity." Read the whole article for Part 2 here  https://www.synopsys.com/blogs/software-security/blockchain-security-cryptocurrency-application/ Follow us on... Twitter: https://www.twitter.com/codifyre Facebook: https://www.facebook.com/codifyre Instagram: https://www.instagram.com/codifyre.co.uk Web: https://www.codifyre.com  
Thanks to Bitcoin, it’s fair to say that “blockchain” is a buzzword at the moment—like DevOps, or Zumba. This article isn’t going to dive into what a blockchain is, because many others out there already do that. Here’s a pretty good one that has a snappy description of the evolution of Bitcoin and its symbiotic buddy, blockchain. (I may have written that one as well.) To some people, Bitcoin is a spoof currency trapped in a speculative bubble. To others, it and its alt-coin brethren are the future of financial exchange. In 2017 we saw a growing frequency of news about Bitcoin millionaires, lost Bitcoin tragedies, Bitcoin scandals, and various Bitcoin exchanges being hacked and shut down. For the millions who have invested (or are considering investing) in cryptocurrencies such as Bitcoin, Litecoin, Ethereum, and the ever-growing list of alt-coins, little has been mentioned about the software and the infrastructure on which these cryptocurrencies are based. With all early adoption of technology, there is risk, so there’s a natural inclination to question the security of blockchain and the potential for cyber attack against it. This special edition two part podcast was requested by Synopsys Software Integrity Group so you can read the show notes for it at the link below instead of the standard location at Codifyre.com Read the whole article for Part 1 here  https://www.synopsys.com/blogs/software-security/blockchain-security-cryptocurrency-theory/  
Passwords are a pain in the a$$.  In fact, in an interview with The Wall Street Journal, Fernando Corbató, now 91 years old and the inventor of the password back in the 60s said that passwords have become “kind of a nightmare”. The current state of the internet wasn’t quite a consideration when passwords first started. Nowadays the average internet user can have upwards of 100-150 different accounts across multiple services.  You might be thinking… not me!   When was the last time you actually tallied up all your online identities.  You might be surprised.  Each service is now putting sufficient password restrictions specifically force you away from the password top 10 list, but ensuring that you’ll probably forget what your password is… unless… you have a system.  A clever system! In out last episode we talked about bad passwords (the top bad passwords in fact), what makes a good password and how you can make something up that is easy for you to remember but hard for machines to guess.   This week we talk about password managers.  We include browsers in that as well.  We discuss the reason behind using password managers and offer suggestions for they can improve your standard of password hell provided you obey a few dos and don'ts.   Finally we end with two factor authentication and the different options for really ensuring you take your personal security to the next level starting with defining authentication mechanisms as  Something you know (eg. a password) Something you have (eg. your phone) Something you are (eg. your fingerprint) For more details please check out the blog for this show at  https://codifyre.com/appsec/passwords-suck/ Our Facebook Page https://www.facebook.com/codifyre/ Let's twitter as well https://www.twitter.com/codifyre/  
Passwords are a pain in the a$$.  In fact, in an interview with The Wall Street Journal, Fernando Corbató, now 91 years old and the inventor of the password back in the 60s said that passwords have become “kind of a nightmare”. The current state of the internet wasn’t quite a consideration when passwords first started. Nowadays the average internet user can have upwards of 100-150 different accounts across multiple services.  You might be thinking… not me!   When was the last time you actually tallied up all your online identities.  You might be surprised.  Each service is now putting sufficient password restrictions specifically force you away from the password top 10 list, but ensuring that you’ll probably forget what your password is… unless… you have a system.  A clever system! Learn more about what makes a good password, a BAD password, why it matters, how they word behind the scenes and what is a good practice.  We'll also talk about single sign on mechnisms like Facebook, Google and Twitter to sign into other online services like Spotify.  Is that dangerous.  Part 1 dives on in. In two weeks Part 2 will dive into Password Managers and 2 Factor Authentication mechanisms to ensure you are doing your best to keep your online life tight as a drum. Read the whole blog at https://codifyre.com/appsec/passwords-suck/
No! Thanks for reading (listening). It could be worth defining what a data breach actually is. Cyber security people often refer to three essential pillars upon which anyone responsible for data must adhere. They are called the CIA, oddly. Not to be confused with the American super-spy organisation or the FBI, NSA, USPI (US Postal Inspectors of course) or NCIS (whatever the hell that actually is… is it even real?) The CIA of cybersecurity stands for Confidentiality (can you keep my secret), Integrity (can you make sure my secret cannot be accessed or changed by anyone else), Availability (can anyone else deny me access to it).  If somebody screwed up any of these it’s a problem. A data breach is when a company royally screws up the first one, Confidentiality, and allows data about us, that we trusted them to keep on the down low, available to others. Two of the most high profile examples which occured in 2017 were of course Equifax and Uber. I could easily spend this whole time ripping into the Equifax breach alone but thankfully, John Oliver and Last Week Tonight have already done a stellar job of that. I highly recommend checking that out. The Uber breach was also super fun and also had in common with Equifax an attempt to cover it up, or, at least pretend it wasn’t happening for a while.  The Uber/Equifax policy on disclosure is somewhat akin to Homer Simpson, aptly putting it…”I’ll hide under some coats and hope that somehow everything will work out!” The Uber breach was extra special in that they actually paid the hackers to shut-up and destroy the data they stole so no worries there right? Because hackers have a really rock solid code of ethics. Uber even said they had evidence to suggest data was destroyed. What evidence exactly was that? A screen shot of an empty directory called “Stuff we Stole from Uber” or perhaps they just send them a empty USB stick in the mail with a post-it note saying “See! Gone! We cool?” I’m not totally convinced. Have a quick surf through Dream Market (other Dark Web Marketplaces are available) and see what’s there. But how do these things happen in the first place?  Read more in the official show notes https://codifyre.com/technology/data-breach-is-my-data-safe/
The Internet of Things! Oh! That! The Internet… got it… Of… no problem… Things… nope you lost me. When I first heard the term IoT I had no f*cking idea what it was and what it meant. Obviously it was made completely clear when I was told what it stood for… How long did it take, and who came up with that catch phrase?  And why on earth did it stick?  Internet of Stuff would have been IOS and we can’t have Apple breathing down our necks. Internet of Devices? What stopped us there? The Institute of Directors perhaps? Those biz savvy suits play hardball about being top dog on the google search so we couldn’t usurp that acronym. So here we are with IoT. Regardless of how we got here… IoT is a buzzword/acronym/TLA (three letter acronym)/phrase which only through the atrition of use is starting to become somewhat understood. Defering to wikipedia (give that guy some money) it’s defined as: “The Internet of things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and network connectivity which enable these objects to connect and exchange data.” Teddy “Creepy” Ruxpin It’s that last bit… the “network connectivity” that is the critical new element that creates IoT.  We’ve had the “physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators”…and of course the machine that goes “ping!” for a while now in the form of TVs, toasters, baby monitors, lawn mowers, ovens, heart monitors and teddy bears. Yes Teddy Bears. I’m thinking of that old scary Teddy Ruxpin thing from the 80s. It haunts me in my nightmares. Read more on our blog/shownotes page. https://codifyre.com/culture/iot-internet-things-2017-probably-internet-stuff-acronym-already-taken/
This is one of those subjects that has struck everyone from the techno security guru to the average person who might simply be trying to do their job.  Ransomware brands such as Goldeneye, Petya (and its counterpart NotPetya), Cryptolocker, CryptoWall, Locky, WannaCry and very recently, Bad Rabbit (to name only a few) have been making headlines across the globe. I’ll start by taking a quick step back and just define Ransomware before I discuss how it tricks us into letting it in the door. I'll then take you through the stages of it's existence and finally what we can do to be better in the face of quickly advancing and mutating Ransomware attacks. 2017 was the year of the Ransomware... or is it?  2018 is just around the corner so only time will tell. Check out the full blog article based on this podcast on the Codifyre website. https://codifyre.com/tech-skills/what-is-ransomware/ Follow on twitter http://www.twitter.com/codifyre Like on Facebook http://www.facebook.com/codifyre
I’m in a taxi with my friend Sascha (names unchanged to torment the guilty) at about 3 in the morning and the taxi driver somehow ends up talking to us about whether he should buy or invest in Bitcoin.  Sascha pipes in first saying it’s a huge waste of time, it isn’t really worth anything and that anyone who buys Bitcoins should be thrown out of the taxi at high speed with their shirt off.   I may be paraphrasing and taking liberties but the message was clear.  He wasn’t pro-Bitcoin. This podcast explores the debates, the opinion and the history surrounding this technology.  I've intentionally dated it 2017 because it's changing so fast, who knows, there might be a 2018 (and 2019) episode. Check out the full blog article based on this podcast on the Codifyre website. https://codifyre.com/culture/wtf-is-a-bitcoin/ Follow on twitter http://www.twitter.com/codifyre Like on Facebook http://www.facebook.com/codifyre  
loading
Comments 
Download from Google Play
Download from App Store