Serverless computing: economic and architectural impact

Serverless computing: economic and architectural impact Adzic et al., ESEC/FSE’17 Today we have another paper inspired by talks from the GOTO Copenhagen conference, in this case Gojko Adzic’s talk on ”Designing for the serverless age.” It’s a case study on how serverless computing changes the shape of the systems that we build, and the (dramatic) … Continue reading Serverless computing: economic and architectural impact

On understanding software agility – a social complexity point of view

On Understanding Software Agility - A Social Complexity Point Of View Joseph Pelrine, E:CO 2011 With the background understanding of the Cynefin framework under our belts, today we turn our attention to the paper recommended by Linda Rising in her GOTO Copenhagen conference keynote earlier this month: “On understanding software agility - a social complexity … Continue reading On understanding software agility – a social complexity point of view

The new dynamics of strategy: sense-making in a complex and complicated world

The new dynamics of strategy: Sense-making in a complex and complicated world Kurtz & Snowden et al., IBM Systems Journal, 2003 Tomorrow we’ll be taking a look at a paper recommended by Linda Rising during her keynote at GOTO Copenhagen earlier this month. Today’s choice provides the necessary background to the Cynefin (Kin-eh-vun) framework on … Continue reading The new dynamics of strategy: sense-making in a complex and complicated world

“A Rail of One’s Own” – Creating spaces for women in IT

“A Rail of One’s Own” - Creating Spaces for Women in IT Laugwitz, GenderIT 2014 I had the good fortune of chatting with Laura Laugwitz over breakfast on my last day before leaving the GOTO Copenhagen conference. She studied both anthropology and computer science, which must be a pretty rare but very interesting combination! “A … Continue reading “A Rail of One’s Own” – Creating spaces for women in IT

BadNets: Identifying vulnerabilities in the machine learning model supply chain

BadNets: Identifying vulnerabilities in the machine learning model supply chain Gu et al., ArXiv 2017 Yesterday we looked at the traditional software packages supply chain. In BadNets, Gu et al., explore the machine learning model supply chain. They demonstrate two attack vectors: (i) if model training is outsourced, then it’s possible for a hard to … Continue reading BadNets: Identifying vulnerabilities in the machine learning model supply chain

CHAINIAC: Proactive software update transparency via collectively signed skipchains and verified builds

CHAINIAC: Proactive software-update transparency via collectively signed skipchains and verified builds Nikitin et al., USENIX Security ‘17 So hopefully you’ve put in place some kind of software supply chain management process that will pick up the availability of new package versions, particularly of course those with fixes for discovered vulnerabilities, and ensure those updates are … Continue reading CHAINIAC: Proactive software update transparency via collectively signed skipchains and verified builds