Cryptography

http://www.youtube.com/watch?v=3QnD2c4Xovk&feature=fvwrel – Diffie Hellman key exchange

http://www.youtube.com/watch?feature=endscreen&NR=1&v=wXB-V_Keiu8 – RSA Algorithm – how and why

To be watched in the order above…wish we had math teachers in school who explained it this way.

 

  1. http://nptel.iitm.ac.in/video.php?subjectId=106105084 Lectures 32, 33, 34 deal with Cryptography and cover all the important topics in 3 hours.
  2. If you are the old-fashioned learner, then The Code Book by Simon Singh (http://simonsingh.net/books/the-code-book/the-book/) is an entertaining and explanatory book on Cryptography. This book takes a story-telling approach and still manages to make you understand Symmetric and Public-Key cryptography and fascinate you with the 2000 year old rivalry between code-makers and code-breakers.
Advertisements

NOSQL High Scalability

Choosing your next NoSQL database

http://highscalability.com/blog/2013/6/10/the-10-deadly-sins-against-scalability.html

http://blog.nahurst.com/visual-guide-to-nosql-systems

http://highscalability.com/blog/2014/2/26/the-whatsapp-architecture-facebook-bought-for-19-billion.html

Introduction to NoSQL by Martin Fowler

Speaking Tree

Three Golden rules of wise living

Sense of ownership binds you

Understanding ASP.NET Dynamic Compilation

http://msdn.microsoft.com/en-us/library/ms366723.aspx

By default, ASP.NET Web pages and code files are compiled dynamically when users first request a resource, such as an ASP.NET page (.aspx file), from a Web site. After pages and code files have been compiled the first time, the compiled resources are cached, so that subsequent requests to the same page are extremely efficient.

ASP.NET supports the dynamic compilation of ASP.NET pages (.aspx files), ASP.NET Web services (.asmx files), ASP.NET HTTP handlers (.ashx files) and ASP.NET application files (Global.asax), as well as other files, such as source code and class files. For more information about ASP.NET file types, see ASP.NET Web Project File Types. For more information about the ASP.NET compilation process, see the “Compilation Life Cycle” section of ASP.NET Application Life Cycle Overview for IIS 5.0 and 6.0.

http://tunein.com

http://tunein.com

Decrypting HTTPS traffic

http://www.fiddler2.com/fiddler/help/httpsdecryption.asp

 http://stackoverflow.com/questions/10808930/what-is-point-of-ssl-if-fiddler-2-can-decrypt-all-calls-over-https

Containerization on Mobile via virtualization

Cellrox MDM

I love the fact that they pioneered the idea of multiple “personas” on a smartphone.

Samsung KNOX does the same thing now. So does BB10.

Interesting twist to how MDM can be achieved via virtualization –

http://www.informationweek.com/byte/video/personal-tech/smart-phones/240001081

Cellrox – an Israeli company has already developed a “Thinvisor” that runs multiple VMs on a single OS (Android) instance – thus MDM is done by creating 2 personas – “business” and private. A wipe is accomplished merely by deleting the business persona.

http://www.cellrox.com/wp-content/uploads/2013/08/Cellrox-ThinVisor-Architecture-v2.pdf

 

“In the extreme, worst-case scenario of the fired employee, IT need only wipe and remove the business persona. The user’s private persona can remain untouched, avoiding the common horror story of people’s baby pictures being deleted forever by an IT mistake.

Because of the level at which Cellrox operates, it needs to partner with handset makers and possibly carriers to get its product to end users. In a busy market it’s not clear who will win these battles, but Cellrox’s approach looks like a winner. Of course, it might be that cell phone virtualization won’t become really respectable until Apple invents it, but it’s coming, one way or another.”