A few weeks ago, Stripe hosted their 3rd Capture the Flag competition. Their first two CTFs were focused on security where you had to exploit a vulnerability in a small system or application to move on to each level until the final level is completed.
For their 3rd CTF, they've decided to switch gears and focus on distributed systems. Each of the 5 CTF levels focused on a…Continue
As a kid I loved playing coin-op games. Some of my favorites were: Space Invaders, Defender, Centipede, Galaxian and Galaga, Dig Dug, Tempest, Joust, Tempest, Spy Hunter, Tron, Robotron, and I must've spent a lot on Gauntlet.
My experiences with them were mostly at where ever I could find them. From…Continue
Last night I was working on a script to build and sign iOS applications for ad hoc distribution. If you've ever done over-the-air distribution of iOS applications, then you have probably seen what happens when you attempt to install an application that is not signed properly. The installation will start and progress to a certain point and then fail and then re-try forever or until you interrupt it. What I discovered last night is that even when you interrupt it, it may still continue looping…Continue
Many of you have heard of Six Sigma as a methodology (primarily for large organizations) for quality and process improvement. One early success story was that of Motorola in the early 2000s, who attributed $17 billion in savings due to…Continue
Added by Joseph Lui on February 25, 2014 at 5:30pm — No Comments
Last week while strolling down the Ala Wai with my 2yo son we stopped to look at the crabs that collect around the stairs that decend into the canal. I was glancing down at my iPhone when my son suddenly yelled "BIRD FISH!" and started pointing. I looked over and saw this:Continue
Added by Daniel Leuck on February 23, 2014 at 10:30am — No Comments
From an email:
"Dear HVCA Members and Friends
It has been a wonderful honor and privilege to lead HVCA since 1999, almost 15 years, so I know most of you personally. It has been extremely rewarding and fulfilling to host interesting programs, advocate on your behalf, mentor, network and develop many friendships along the way.
At this point in my life, it is time for me to move on. I look forward to new opportunities and continuing my work with Hawaii Angels and…
The Mac turned 30 today. Happy Birthday, Mac! Apple has been through ups and downs in those 30 years, but now they are one of the most successful companies in the world. That’s thanks in large part to the success of their iPods, iPhones and iPads, but the Mac remains a mainstay of Apple’s product…Continue
Look around you, and just about everyone you see probably has a smartphone. And if those smartphone owners were aware of the sweatshop labor in dangerous conditions and minerals which finance arms-buying,…Continue
I decided to hit 2014 running, and whipped up another shootout experiment; this time…Continue
Added by Joseph Lui on January 4, 2014 at 3:30pm — No Comments
In perhaps an unfriendly move by Apple, iOS 6 devices that are charging and connected to wifi get the possibly unwanted benefit of receiving the iOS 7 Update Installer that will sit on the device and take up valuable storage space in addition to the continual nagging of a red alert icon. There are some good reasons not to upgrade to iOS 7 on older devices.
I took a short trip to Tokyo in October to visit family and friends. I've lived there for over eight years, so every time I go back I notice what's changed. And since I'm on the geekier side, I notice tech-related changes.
QR Codes to Search Boxes
When I moved to Tokyo…Continue
Do you have a smartphone? Chances are you do. Whether it is an iPhone, an Android phone or any one of the many other smartphones out there it is clear that the age of the feature phone (dumbphone) is past. This year, for the first time, smartphone sales have exceeded dumbphone sales worldwide.
The explosion of smartphones is due to the steady march of technology getting better and lowering costs. Smartphones have dropped in cost from $600+ in the early 2000’s…Continue
Note: I write this as a fan and frequent user of Facebook. In addition to helping my family stay connected with friends around the world, the site has helped our company find new customers and team members. I wish them well. That being said, there are many areas where FB really needs to get its act…Continue
Infosys, the large multi-national technology services company based in India, has agreed to pay $34 million dollars to settle charges that it mis-used the U.S. visa system in hiring and deploying foreign technology workers in the United States. The New York Times reports that this is the largest ever…
Added by John Robert Egan on October 30, 2013 at 1:34pm — No Comments
I think we should talk.
To be perfectly frank, I think we should see other people. I understand that we have a considerable history together, but for me to grow as a developer, I need to be able to see what else…
Ok, ok admittedly it's not really a "shootout". We all already know SQL-based data sources are generally less performant…Continue
Sometimes it seems like there is a new mobile phone or device announced every day. It’s an exciting time when the things we could only dream about 15 years ago are becoming reality. What do we have to look forward to in the next few years and beyond?
Near Field Communication (NFC)
The technology allows interaction between devices and even unpowered chips or tags. It’s already used in a…Continue
Could it be that we building up to a collective moment against oversharing? That social media posturing, "like"-chasing and follower-building have created a backlash and a hunger for less exposed, more targeted, and more authentic forms of connecting? Perhaps so, judging by the intense interest around apps like SnapChat, Whisper, and Avocado.
Fueling the popular disappearing-photo messaging…
Added by Tzyh Ng on September 6, 2013 at 5:32pm — No Comments
Just tried to explain what the floppy disk icon is for saving a doc to an 8 year old. Looked at me like I’m…Continue
There is no doubt that all of us have heard about the security breaches of numerous Fortune 500 companies. From credit card information hijacks to content defilement, there is no shortage of news reports detailing the exploits of uber-hackers or hacker groups. The companies that were aggrieved were so, in part, due to their size. The acclaim for a hacker penetrating Wal-Mart or Citibank will be far greater than that achieved by taking down Joe's Pool & Spa. But the havoc wreaked on…Continue