tag:blogger.com,1999:blog-36420346824308780272024-03-14T08:15:16.082-07:00TestingSaaS the tell-it-as-it-is SaaS communityThe TestingSaaS Community blog reporting about software testing, data science, data journalism, online identity, computer forensics and security.Cordny Nederkoornhttp://www.blogger.com/profile/14202432427575098872noreply@blogger.comBlogger65125tag:blogger.com,1999:blog-3642034682430878027.post-39651149890434840922018-01-28T07:25:00.001-08:002018-08-27T06:23:13.886-07:00The number 1 reason What is the number 1 reason for modernizing TestingSaaS in 2018?<br />
<br />
Engagement!<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfxZV16t-_pHgckJcstyPlytEnYj2YvsqBtzcZTxBFYvbAXf6ZLf_6IVocUHt2CfRs3IEB62d2wMizp9scIo4RBP7UihcTNG6Y5VwdI7KoAVEV_gJ4JnW-UPpCu55FynGAu6x1KSlXIfs/s1600/Schermafbeelding+2018-01-28+om+16.27.28.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="967" data-original-width="1406" height="219" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfxZV16t-_pHgckJcstyPlytEnYj2YvsqBtzcZTxBFYvbAXf6ZLf_6IVocUHt2CfRs3IEB62d2wMizp9scIo4RBP7UihcTNG6Y5VwdI7KoAVEV_gJ4JnW-UPpCu55FynGAu6x1KSlXIfs/s320/Schermafbeelding+2018-01-28+om+16.27.28.png" width="320" /></a></div>
<br />
<div style="text-align: right;">
<span style="font-size: x-small;">source: https://adsoup.com/what-is-customer-engagement/</span></div>
<div style="text-align: right;">
<span style="font-size: x-small;"><br /></span></div>
Since the beginning of TestingSaaS it was used as a content platform to share my thoughts on SaaS related affairs like software testing, forensics, identity management and data science.<br />
Distribution channels like Twitter and Facebook were used to spread these thoughts.<br />
My thoughts were noticed and I got invited to write articles for online publishers like <a href="https://eforensicsmag.com/" target="_blank">eForensics Magazine</a>, <a href="http://securityaffairs.co/wordpress" target="_blank">Security Affairs </a>and <a href="http://fixate.io/">Fixate.io</a>.<br />
I even got the opportunity to attend and speak at international conferences.<br />
<br />
A journey indeed.<br />
But times are changing: spreading your thoughts online is much harder these days due to a multitude of distribution channels and stricter Search Engine Optimization.<br />
You have to stand out.<br />
Not only with your thoughts (the 'content'), but also with your engagement.<br />
Marketing is getting more important.<br />
<br />
The more you engage in a proper way online, the more you get noticed by search engines.<br />
<br />
I always used Twitter and LinkedIn as my main engagement channels, but a month ago I tried a more direct way: the chatbot.<br />
<br />
<h3>
<span style="font-weight: normal;">Engagement via a chatbot</span></h3>
<div>
On Facebook I got in talks with <a href="https://www.linkedin.com/in/max-ronai-6427bb15" target="_blank">Max Ronai</a>, founder of <a href="http://getgobot.com/" target="_blank">Gobot</a>, an easy to use chatbot.</div>
<div>
I agreed to test it on my blog TestingSaaS.</div>
<div>
Unfortunately I did not get any conversations with it and when I asked my Facebook fans for feedback on the chatbot I got an answer I did not expect.</div>
<div>
<br /></div>
<h4>
<i>Change your blog-platform, it's outdated!!</i></h4>
<div>
That was something that came out of the blue.</div>
<div>
I expected feedback on the contents of my blog, not the blog itself.</div>
<div>
But the feedback is correct.</div>
<div>
The content is good, but without a modern blog architecture you are nothing in today's online world.</div>
<div>
And comparing other blog-sites, my site really looks so 2010ish :).</div>
<div>
Even when I use a 2018 chatbot, which IMHO is a great chatbot to use.</div>
<div>
<br /></div>
<h3>
<span style="font-weight: normal;">A new blogplatform</span></h3>
<div>
So, I need a new platform to build for my blogging.</div>
<div>
<br /></div>
<div>
Wordpress, Medium.., take your pick.</div>
<div>
<br /></div>
<div>
As always, I will think about it and define a strategy.</div>
<div>
<br /></div>
<div>
In the meantime I will use Medium as my temporary blogging platform.</div>
<div>
No worries, LinkedIn and Twitter will remain my distribution channels.</div>
<div>
<br /></div>
<div>
As always, sharing your thoughts on engagement, chat-bots, blogs and all kind of other SaaS-related areas is very appreciated.</div>
<div>
<br /></div>
<div>
See you next time on <a href="https://medium.com/" target="_blank">Medium</a>.<br />
<br />
**********************<b>BIG UPDATE AUGUST 2018</b> ******************************</div>
<div>
<br /></div>
<div>
<b>TestingSaaS is NOT continued on Medium, but on <a href="https://testingsaas.nl/">https://testingSaaS.nl</a></b><br />
<b>Here a couple of blogs are already placed for your convenience.</b><br />
<b><br /></b>
<b><a href="http://testingsaas.blogspot.nl/">http://testingsaas.blogspot.nl</a> will be continued on <a href="https://testingsaas.nl/">https://testingSaaS.nl</a></b><br />
<br />
*********************************************************************************</div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
Cordny Nederkoornhttp://www.blogger.com/profile/14202432427575098872noreply@blogger.com0tag:blogger.com,1999:blog-3642034682430878027.post-33088207189638828912017-12-16T06:05:00.000-08:002018-01-29T01:32:02.936-08:00PIAM, CIAM, PAM, it's all IAM<div class="p1">
<br /></div>
<div class="p3">
<span class="s1">During my career I noticed abbreviations are used all the time in IT.</span></div>
<div class="p3">
<span class="s1">When I started this blog it was all about SaaS, PaaS, IaaS and some other aaS-variants.</span></div>
<div class="p3">
<span class="s1">It quickly became all known as the cloud, another fancy marketing word for the internet.</span></div>
<div class="p3">
<span class="s1">First people got headaches on finding out what all those different aaS-variants meant and then suddenly they were confronted with a new word: the cloud.</span></div>
<div class="p3">
<span class="s1">People, it's all marketing mumbo jumbo, inventing new words for already existing phenomena.</span></div>
<div class="p3">
<span class="s1"><br />
</span></div>
<div class="p3">
<span class="s1">Ok, the internet as it is known now, is more complicated and interactive (especially mobile) than in the beginning, but it's still the internet, the digital highway.</span></div>
<div class="p3">
<h2>
</h2>
</div>
<h3>
<span class="s1" style="font-weight: normal;">It's all IAM</span></h3>
<div class="p3">
<span class="s1">Why I am saying this?</span></div>
<div class="p3">
<span class="s1">Recently a infosecurity peer of mine, Andre Koot from <a href="https://www.nixu.com/nl/about"><span class="s2">Nixu</span></a> (great guy and company!), shared on LinkedIn an article about <a href="https://www.securitysales.com/access/piam-opportunities-installing-security-contractors/"><span class="s2">PIAM</span></a> with the remark: 'IAM, CIAM, PAM, now introducing PIAM... '.</span></div>
<div class="p5">
<span class="s1">That triggered my engagement, and especially when I saw the domain the article was posted on: securitysales.com.<span class="Apple-converted-space"> </span></span></div>
<div class="p5">
<span class="s1">Aha, another new abbreviation and it's published on a sales-site.</span></div>
<div class="p5">
<span class="s1">PIAM is like CIAM just a way of Identity and Access Management (IAM), embodied in a product to sell. Nothing more, nothing less.</span></div>
<div class="p5">
<span class="s1"><br />
Just like the cloud, nothing more than internet.</span></div>
<div class="p5">
<span class="s1"><br />
</span></div>
<h3>
<span class="s1" style="font-weight: normal;">IAM, CIAM, PIAM, keep cool!</span></h3>
<style type="text/css">
p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica; min-height: 14.0px}
p.p2 {margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Times; min-height: 14.0px}
p.p3 {margin: 0.0px 0.0px 0.0px 0.0px; line-height: 14.0px; font: 12.0px Times; -webkit-text-stroke: #000000}
p.p4 {margin: 0.0px 0.0px 14.0px 0.0px; line-height: 17.0px; font: 12.0px Times; -webkit-text-stroke: #000000}
p.p5 {margin: 0.0px 0.0px 0.0px 0.0px; line-height: 17.0px; font: 12.0px Times; -webkit-text-stroke: #000000}
span.s1 {font-kerning: none}
span.s2 {text-decoration: underline ; font-kerning: none; color: #042eee; -webkit-text-stroke: 0px #042eee}
</style> <br />
<div class="p5">
<span class="s1">So the next time you read: 'With this PIAM solution, by SaaS vendor X you can safely do IAM in the cloud', just keep cool and don't get worried that you do not know all the abbreviations in the sentence.</span></div>
<span style="background-color: white; font-family: "source sans pro" , "helvetica" , "arial" , sans-serif , "hiragino kaku gothic pro" , "meiryo" , "hiragino sans gb w3" , "noto naskh arabic" , "droid arabic naskh" , "geeza pro" , "simplified arabic" , "noto sans thai" , "thonburi" , "dokchampa" , "droid sans thai" , "droid sans fallback" , , ".sfnsdisplay-regular" , "heiti sc" , "microsoft yahei" , "segoe ui"; font-size: 15px; white-space: pre-wrap;"><br />
</span> <span style="background-color: white; font-family: "source sans pro" , "helvetica" , "arial" , sans-serif , "hiragino kaku gothic pro" , "meiryo" , "hiragino sans gb w3" , "noto naskh arabic" , "droid arabic naskh" , "geeza pro" , "simplified arabic" , "noto sans thai" , "thonburi" , "dokchampa" , "droid sans thai" , "droid sans fallback" , , ".sfnsdisplay-regular" , "heiti sc" , "microsoft yahei" , "segoe ui"; font-size: 15px; white-space: pre-wrap;"><br />
</span> <span style="background-color: white; font-family: "source sans pro" , "helvetica" , "arial" , sans-serif , "hiragino kaku gothic pro" , "meiryo" , "hiragino sans gb w3" , "noto naskh arabic" , "droid arabic naskh" , "geeza pro" , "simplified arabic" , "noto sans thai" , "thonburi" , "dokchampa" , "droid sans thai" , "droid sans fallback" , , ".sfnsdisplay-regular" , "heiti sc" , "microsoft yahei" , "segoe ui"; font-size: 15px; white-space: pre-wrap;"><br />
</span> <span style="background-color: white; font-family: "source sans pro" , "helvetica" , "arial" , sans-serif , "hiragino kaku gothic pro" , "meiryo" , "hiragino sans gb w3" , "noto naskh arabic" , "droid arabic naskh" , "geeza pro" , "simplified arabic" , "noto sans thai" , "thonburi" , "dokchampa" , "droid sans thai" , "droid sans fallback" , , ".sfnsdisplay-regular" , "heiti sc" , "microsoft yahei" , "segoe ui"; font-size: 15px; white-space: pre-wrap;"><br />
</span> <span style="background-color: white; color: rgba(0 , 0 , 0 , 0.7); font-family: "source sans pro" , "helvetica" , "arial" , sans-serif , "hiragino kaku gothic pro" , "meiryo" , "hiragino sans gb w3" , "noto naskh arabic" , "droid arabic naskh" , "geeza pro" , "simplified arabic" , "noto sans thai" , "thonburi" , "dokchampa" , "droid sans thai" , "droid sans fallback" , , ".sfnsdisplay-regular" , "heiti sc" , "microsoft yahei" , "segoe ui"; font-size: 15px; white-space: pre-wrap;"><br />
</span> <br />
<br />
<br />
<br />
<br />Cordny Nederkoornhttp://www.blogger.com/profile/14202432427575098872noreply@blogger.com0tag:blogger.com,1999:blog-3642034682430878027.post-70314183798890839972017-11-18T07:09:00.000-08:002018-01-29T01:32:48.887-08:00Explain SaaS through storytellingA year ago I announced I was going to do a blog series on ‘Big data, tell it as it is!!<br />
Well, due to a relocation and a new job that took a ‘bit’ more time.<br />
But, I keep a promise.<br />
<br />
<h3>
<span style="font-weight: normal;">
G’day</span></h3>
<div>
As my readers know, I try to explain SaaS as it is in a readable manner.</div>
<div>
I also like stories, so why shouldn't I use <i><a href="http://www.knowledge-management-tools.net/storytelling.html" target="_blank">Storytelling</a></i> to deliver my message and start interaction?</div>
<div>
<br /></div>
So last week I published on <a href="https://sweetcode.io/r-apache-log-analysis/" target="_blank">Sweetcode</a> about Geordie and his use of R to analyze Apache error logs.<br />
Why not publish more posts about Geordie and his employer ‘G’day’, an Aussie content marketing firm?<br />
By doing this I can explain SaaS, datascience, infosec, forensics and QA in a ‘tell-it-as-it-is’ manner, readable for a broad audience.<br />
Because that’s my mission, explain SaaS without the marketing and technical terms, or at least explain them.<br />
<br />
<h3>
<span style="font-weight: normal;">
I need your help!</span></h3>
<div>
Inspiration for the adventures of Geordie at ‘G’day’ I can retrieve from my own experiences, but why not use <i><a href="https://www.businessnewsdaily.com/4025-what-is-crowdsourcing.html" target="_blank">crowdsourcing</a></i>?</div>
<div>
TestingSaaS is read globally by SaaS enthusiasts from different sectors like finance (banks, accountants), government, software dev, IT consultancy and many more.<br />
These fellow SaaS enthusiasts work in disciplines like identity, infosec, data science, digital marketing and forensics.<br />
With storytelling we have an instrument to explain SaaS in a simple way, as it is!<br />
But I need your input.<br />
Are you interested or want to give feedback on my TestingSaaS storytelling?<br />
Let me know through the TestingSaaS social media channels.<br />
<br /></div>
<div>
<br /></div>
<h4>
Let’s work together to explain SaaS through storytelling, as it is!!!</h4>
<br />Cordny Nederkoornhttp://www.blogger.com/profile/14202432427575098872noreply@blogger.com0tag:blogger.com,1999:blog-3642034682430878027.post-55013921509908829702017-07-30T05:09:00.002-07:002017-07-30T05:11:05.511-07:00A day at the office: Configuring Identity in the cloud<span style="background-color: white;">The past half year I did not blog that much on TestingSaaS.</span><br />
<span style="background-color: white;">With good reason!</span><br />
<span style="background-color: white;">I started a new job as a technical consultant at <a href="http://iwelcome.com/" target="_blank">iWelcome</a> and I was quite busy with relocating too.</span><br />
<span style="background-color: white;"><br /></span>
<span style="background-color: white;">Why iWelcome?</span><br />
<span style="background-color: white;">It is Europe's Identity Platform in the cloud.</span><br />
<span style="background-color: white;">iWelcome provides Identity & Access Management as a Service (IDAAS) for organizations, so they can manage the identity lifecycle of their consumers, employees, business customers, partners and suppliers in a secure, simple and efficient manner.</span><br />
<span style="background-color: white;"><br /></span>
<span style="background-color: white;">How cool is that?</span><br />
<span style="background-color: white;">Since 2010 I have been studying IDAAS (thanks <a href="https://kantarainitiative.org/confluence/display/uma/Home" target="_blank">UMA</a> :-) ) and now with the hype of data science (event logging !!) and data privacy (<a href="http://www.eugdpr.org/" target="_blank">GDPR</a>) I can all combine these disciplines in one job. Who dares wins!</span><br />
<span style="background-color: white;"><br /></span>
<span style="background-color: white;">Mind you, I already had some IAM experience at Essent and Onegini, but this was software related, now it's implementation, a complete other ball game with other stakes and rules.</span><br />
<span style="background-color: white;"><br /></span>
<span style="background-color: white;">Just one step at a time.</span><br />
<span style="background-color: white;"><br /></span>
<span style="background-color: white;">So stay tuned for my further adventures in IAM told on <a href="http://testingsaas.blogspot.com/" target="_blank">TestingSaaS</a>, <a href="http://eforensicsmag.com/" target="_blank">eForensics Magazine</a>, <a href="http://fixate.io/" target="_blank">Fixate</a> and the <a href="https://www.iwelcome.com/category/blog/" target="_blank">iWelcome blog</a>.</span><br />
<span style="background-color: white;"><br /></span>
Cordny Nederkoornhttp://www.blogger.com/profile/14202432427575098872noreply@blogger.com4tag:blogger.com,1999:blog-3642034682430878027.post-55315236188484865192016-11-07T01:14:00.000-08:002016-11-07T01:35:31.233-08:00Big data, what's in a name?<span style="font-family: "arial" , "helvetica" , sans-serif;">Last week I <a href="http://testingsaas.blogspot.nl/2016/10/big-data-deep-learning-neural-networks.html">announced </a>I am going to do a blog series about big data items and explain them in a straightforward way.</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;">Well, naturally I have to start with big data because everybody talks about it, but nobody can exactly say what it is.</span><br />
<br />
<span style="font-family: "arial" , "helvetica" , sans-serif;">You can find many definitions of big data online.</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br />
</span> <span style="font-family: "arial" , "helvetica" , sans-serif;"><a href="http://www.gartner.com/it-glossary/big-data/" target="_blank">Gartner </a>explains Big Data as</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><span style="font-family: "times" , "times new roman" , serif;"><br />
</span> </span><br />
<blockquote class="tr_bq">
<blockquote class="tr_bq">
<i><span style="font-family: "arial" , "helvetica" , sans-serif;"><span style="font-family: "times" , "times new roman" , serif;"> "</span><span style="font-family: "times" , "times new roman" , serif;">Big data is high-volume, high-velocity and/or high-variety information assets that demand cost-effective, innovative forms of information processing that enable enhanced insight, decision making, and process automation."</span></span></i></blockquote>
</blockquote>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br />
</span> <span style="font-family: "arial" , "helvetica" , sans-serif;">This a very business-driven definition.</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br />
</span> <span style="font-family: "arial" , "helvetica" , sans-serif;">Technology vendors like <a href="https://www.technologyreview.com/s/519851/the-big-data-conundrum-how-to-define-it/" target="_blank">Microsoft </a>define it as:</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br />
</span> <br />
<blockquote class="tr_bq">
<blockquote class="tr_bq">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><i>“Big data is the term increasingly used to describe the process of applying serious computing power—the latest in machine learning and artificial intelligence—to seriously massive and often highly complex sets of information.”</i></span></blockquote>
</blockquote>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br />
</span> <span style="font-family: "arial" , "helvetica" , sans-serif;">Lots of tech-talk in a definition about data.</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><span style="font-family: "times" , "times new roman" , serif;"><br />
</span> <span style="font-family: &quot: Arial" , "Arial" , serif;">A more straightforward definition is given by big data expert <a href="https://www.linkedin.com/pulse/20130527063838-64875646-what-the-hell-is-big-data">Bernard Marr</a>:</span></span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><span style="font-family: "times" , "times new roman" , serif;"><br />
</span> </span><br />
<blockquote class="tr_bq">
<blockquote class="tr_bq">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><i> "Big data refers to our ability to collect and analyze the vast amounts of data we are now generating in the world."</i></span></blockquote>
</blockquote>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br />
</span> <span style="font-family: "arial" , "helvetica" , sans-serif;">In other words, all definitions above state it's not about the data itself , but the way we utilize the data which is now generated in a huge amount.</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br />
</span> <span style="font-family: "arial" , "helvetica" , sans-serif;">Mind you, big data today is small data, or just data, in a few years from now.</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br />
</span> <span style="font-family: "arial" , "helvetica" , sans-serif;">Big data, it's just data, only we now learn how to use it.</span><br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />Cordny Nederkoornhttp://www.blogger.com/profile/14202432427575098872noreply@blogger.com0tag:blogger.com,1999:blog-3642034682430878027.post-52983642250013279062016-10-28T05:54:00.001-07:002016-10-28T06:10:31.004-07:00Big Data, deep learning, neural networks. Blimey, now I'm confused!Yesterday I went to the BI-Podium Event <a href="http://bi-podium.nl/showcase/de_achterkant_van_big_data/72/programma" target="_blank">'De achterkant van Big Data'</a> in Amersfoort.<br />
A great event with fascinating presentations about big data, technology and even ethics.<br />
<br />
Many Dutch companies in data science like <a href="http://bigdatalab.nl/wp/" target="_blank">Big Data Lab</a>, <a href="http://xomnia.com/" target="_blank">Xomnia </a>and <a href="http://many2more.com/" target="_blank">Many2More</a> were present.<br />
Also a great endnote by <a href="https://www.linkedin.com/in/donnaburbank" target="_blank">Donna Burbank</a>, which was a great boost for starting data scientists.<br />
Awesome to see there are a lot of Dutch Big Data enthousiasts and there was enough time for networking.<br />
Thank you <a href="http://www.visservanbaars.nl/" target="_blank">Visser & Van baars Recruitment</a> for this opportunity.<br />
<br />
As a data scientist with a bio-informatics and software testing (also lots of analysis) background I was able to follow the presentations.<br />
A lot of terms were not new for me, but is that also true for my fellow SaaS enthusiasts from my TestingSaaS-community?<br />
I already wondered why big data terms like deep learning, neural networks, machine learning etc.are mostly explained from a marketing (too easy) or development (too technical) viewpoint?<br />
Luckiliy, this was not the case at this BI-Podium Event.<br />
<br />
So, I got the idea for a blog series on explaining these big data terms in a straight forward way without the marketing and technical phrases.<br />
This way I want to help new big data enthusiasts not too get scared of all these terms, but give them a starting point to explore this new <a href="https://hbr.org/2012/10/data-scientist-the-sexiest-job-of-the-21st-century" target="_blank">sexy </a>discipline data science.<br />
<br />
That's why I founded TestingSaaS, to explain the world of SaaS in a straightforward way.<br />
<br />
Stay tuned for my blog series on Big Data as-it-is!<br />
<br />
<br />
<br />
<br />
<br />
<br />Cordny Nederkoornhttp://www.blogger.com/profile/14202432427575098872noreply@blogger.com0tag:blogger.com,1999:blog-3642034682430878027.post-20665881575852592382016-10-18T05:57:00.000-07:002016-10-18T05:57:43.346-07:00DataOps: Combining data analytics and DevOps<br />
Blogging and writing articles for <a href="http://fixate.io/" target="_blank">Fixate </a>is fun!<br />
Next to learning about the Fixate customers like <a href="https://www.sumologic.com/" target="_blank">Sumo Logic</a> and <a href="https://www.pagerduty.com/" target="_blank">PagerDuty </a>it is also exciting to combine IT disciplines in 1 article.<br />
As you already know I am a trained software tester interested in data science.<br />
Fixate is DevOps oriented, so I investigated if data science is related to DevOps.<br />
Well, it is: DataOps.<br />
DataOps is the extension of DevOps values and practices into the data analytics world. The DevOps philosophy emphasizes seamless collaboration between developers, quality assurance teams and IT Ops admins. DataOps does the same for the admins and engineers who store data, analyze data, archive data and deliver data.<br />
In other words, DataOps is all about streamlining the processes involved in storing, interpreting and deriving value from big data. It aims to break down the siloes that have traditionally separated different teams from one another in the data storage and analytics fields.<br />
<br />
Great, a story about DataOps, that's old school TestingSaaS.<br />
Well, now it's time for something new. As you already saw in an earlier blogpost, TestingSaaS is <a href="http://testingsaas.blogspot.nl/2015/11/so-whats-your-hobby-resurrection.html" target="_blank">resurrected</a>, and I wanted to alter my blog reporting.<br />
I always wanted to develop an infographic and why not now? So for my DataOps article I devised an infographic on DataOps, which can be found here on the Fixate <a href="http://sweetcode.io/dataops-leveraging-devops-principles-better-data-analytics/" target="_blank">Sweetcode</a>.<br />
It shows the infographic and an accompanying story.<br />
In my opinion, this dual way of reporting attracts two kinds of readers: the visual (infographic) and the text readers.<br />
And for making an infographic you really need to know your theme, otherwise you can't grasp it all in a simple, though elegant, infographic.<br />
So, a lot of advantages.<br />
<br />
Have fun reading and if you have any questions or feedback do not hesitate to contact me.<br />
<br />Cordny Nederkoornhttp://www.blogger.com/profile/14202432427575098872noreply@blogger.com2tag:blogger.com,1999:blog-3642034682430878027.post-50780145158662412762016-09-01T11:17:00.001-07:002018-01-29T02:39:40.822-08:00New challenge: contentmarketing with Fixate<br />
<h3>
<span style="font-weight: normal;">
What's going on?</span></h3>
This summer I was approached by Chris Riley from <a href="http://fixate.io/" target="_blank">Fixate</a> IO, the content and influencer marketing company for techies. Chris needed help.<br />
He is a big fan of the TestingSaaS social network and wanted me to become a member of the Fixate Influencer Community aimed at <a href="https://theagileadmin.com/what-is-devops/" target="_blank">DevOps</a>.<br />
<div style="text-align: justify;">
This <a href="http://fixate.io/top-voices/" target="_blank">crack </a>community (with the best QA and DEV professionals) is the DevOps contentmarketing engine for Fixate's clients <a href="http://rollbar.com/" target="_blank">Rollbar</a>, <a href="https://www.sumologic.com/" target="_blank">Sumo Logic</a> and a lot of others.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<h3>
<span style="font-weight: normal;">
A huge honour</span></h3>
</div>
<div style="text-align: justify;">
This is a huge honour for me.<br />
I can improve my content marketing skills in my free time, meet great people and still have a daily job.</div>
<div style="text-align: justify;">
Ok, I know about software testing, security and forensics, but Fixate IO wants to put time and effort in me and trust my work as a tech blogger and social media community leader.</div>
<div style="text-align: justify;">
That's just awesome!!</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
So, it's time to kick Ass.</div>
<div style="text-align: justify;">
Prepare yourself for some informative articles about DevOps, data science, security and software testing.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Thank you Fixate IO. Glad to be of help.<br />
<br /></div>
<div style="text-align: justify;">
TestingSaaS, he's <a href="https://www.youtube.com/watch?v=xU72v7TgZ2k" target="_blank">back</a>!</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<br /></div>
<br />Cordny Nederkoornhttp://www.blogger.com/profile/14202432427575098872noreply@blogger.com0tag:blogger.com,1999:blog-3642034682430878027.post-68274771823427893542016-04-24T03:23:00.000-07:002016-04-24T03:26:29.561-07:00 time for WhatsApp forensics with R and SQLiteIt's the end of April 2016.<br />
Spring is in the Netherlands (still some wet snow, but who cares)<br />
<br />
Time for some adventures in computer forensics.<br />
This time I want to combine<a href="https://www.r-project.org/" target="_blank"> R</a> and mobile forensics.<br />
<br />
And what's the best app for that: <a href="https://www.whatsapp.com/" target="_blank">WhatsApp </a>!<br />
<br />
Hm, but how to get data from WhatsApp into R.<br />
Well, WhatsApp uses <a href="https://www.sqlite.org/" target="_blank">SQLite </a>to store its data.<br />
SQLite is an open source, embedded relational database and via R you can examine the data in the SQLite database used in WhatsApp at your mobile phone.<br />
<br />
So, follow this week the #RWhatsApp on the TestingSaaS social network for my deepdive into WhatsApp forensics with R and SQLite.<br />
Feedback is always welcome. <br />
<br />
<br />
Trust me, it's going to be a fun week!Cordny Nederkoornhttp://www.blogger.com/profile/14202432427575098872noreply@blogger.com0tag:blogger.com,1999:blog-3642034682430878027.post-6289064268071549942016-03-20T08:06:00.000-07:002016-03-20T08:13:41.423-07:00When curiosity gets noticed: an interview about my journey in big dataLast year I started my deepdive in big data.<br />
Blogging, Tweeting and following Coursera data science modules gave me a good start.<br />
<br />
Well, that was noticed by my Twitter followers.<br />
One guy, <a href="https://twitter.com/mr_itter" target="_blank">Matt Ritter</a> saw my enthusiasm and wanted an <a href="https://preinventedwheel.com/new-to-data-an-interview/" target="_blank">interview</a>.<br />
We talked about my curiosity for big data, my journey and the problems I face when dealing with big data.<br />
<br />
Matt, thank you for interviewing me and sharing my journey.<br />
A great guy to follow. <br />
<br />
Join also my social network for sharing adventures in big data, software testing, SaaS and computer security and forensics.<br />
<br />
Enough adventures for a lifetime!<br />
<br />
<br />
<br />
<br />Cordny Nederkoornhttp://www.blogger.com/profile/14202432427575098872noreply@blogger.com0tag:blogger.com,1999:blog-3642034682430878027.post-80186951804951135832016-01-26T02:42:00.000-08:002018-01-29T02:41:49.580-08:00Data science and software testing, it's all about the question<h3>
<span style="font-weight: normal;">
Introduction</span></h3>
When I started my career in software testing I was a biologist without business experience, but I knew how to crunch data through statistics, python and machine learning.<br />
In the last 11 years software testing was my main profession and still is.<br />
But, more and more companies are into Big Data (as a part of data science) and as a biologist, trained in crunching lots of data (genetics, bioinformatics), I got curious.<br />
Is there a way to combine my knowledge of statistics and crunching big data and software testing in today's business?<br />
Sure there is: a lot of methods (statistics, data mining, web scraping) and programming language (R, python) used in data science can also be used in software testing.<br />
Both software testing and data science are empirical studies trying to answer a specific question. The answer to this question can be derived by using tools or methods.<br />
Mind you, don't let the tool or method determine how the answering process proceeds, let the question be the determinant.<br />
Be open minded! Remember a fool with a tool is just a fool.<br />
<br />
<h3>
<span style="font-weight: normal;">
Data science and software testing</span></h3>
<a href="https://en.wikipedia.org/wiki/Data_science" target="_blank">Data science </a>is not just statistics, it is an interdisciplinary field like bioinformatics, combining mathematics, statistics, computer science, information science etc.<br />
Just like <a href="https://en.wikipedia.org/wiki/Big_data" target="_blank">Big Data</a>, it's a buzz word, but a data scientist, according to <a href="https://www.coursera.org/specializations/jhu-data-science" target="_blank">Coursera</a>, has one goal:<br />
<br />
<i><span class="s12n-description" data-reactid=".0.1.1.1.1.0.2.1.1.0.0.1.1">Ask the right questions, manipulate data sets, and create visualizations to communicate results.</span></i><br />
<br />
<span class="s12n-description" data-reactid=".0.1.1.1.1.0.2.1.1.0.0.1.1">Well, that's the same in software testing.</span><br />
<span class="s12n-description" data-reactid=".0.1.1.1.1.0.2.1.1.0.0.1.1">Without the correct question, dataset and visualization (report) a software tester can't inform the stakeholder about the state of quality of the object under test.</span><br />
<span class="s12n-description" data-reactid=".0.1.1.1.1.0.2.1.1.0.0.1.1"><br /></span>
<span class="s12n-description" data-reactid=".0.1.1.1.1.0.2.1.1.0.0.1.1">Now I know testers have tools like Jira, Microsoft Excel and Selenium to help them.</span><br />
<span class="s12n-description" data-reactid=".0.1.1.1.1.0.2.1.1.0.0.1.1">Why should we know about data science then?</span><br />
<span class="s12n-description" data-reactid=".0.1.1.1.1.0.2.1.1.0.0.1.1">Well, as I said before, a fool with a tool is just a fool.</span><br />
<span class="s12n-description" data-reactid=".0.1.1.1.1.0.2.1.1.0.0.1.1">You maybe know how to use many testtools, but the most important thing a tester does is asking the right questions. This triggers the other stakeholders to answer these and this way possible issues are found.</span><br />
<span class="s12n-description" data-reactid=".0.1.1.1.1.0.2.1.1.0.0.1.1">Data science is all about asking the right questions. It can help the tester with creating the question and deriving the testset, even when the testset has missing data. It also learns the tester how to visualize its findings.</span><br />
<span class="s12n-description" data-reactid=".0.1.1.1.1.0.2.1.1.0.0.1.1">Testtools can also do these things, but, in my opinion, a tester should be able to do it himself.</span><br />
<span class="s12n-description" data-reactid=".0.1.1.1.1.0.2.1.1.0.0.1.1">Knowing data science can help the tester to stay critical. </span><br />
<span class="s12n-description" data-reactid=".0.1.1.1.1.0.2.1.1.0.0.1.1">There are a lot of data science courses online like <a href="http://coursera.org/" target="_blank">Coursera </a>or <a href="http://www.udacity.com/" target="_blank">Udacity</a>.</span><br />
<span class="s12n-description" data-reactid=".0.1.1.1.1.0.2.1.1.0.0.1.1">Try a course, it won't be easy, but that's part of the learning. </span><br />
<span class="s12n-description" data-reactid=".0.1.1.1.1.0.2.1.1.0.0.1.1"><br /></span>
<span class="s12n-description" data-reactid=".0.1.1.1.1.0.2.1.1.0.0.1.1"></span>
<span class="s12n-description" data-reactid=".0.1.1.1.1.0.2.1.1.0.0.1.1"></span><br />
<h3>
<span class="s12n-description" data-reactid=".0.1.1.1.1.0.2.1.1.0.0.1.1" style="font-weight: normal;">Conclusion</span></h3>
<span class="s12n-description" data-reactid=".0.1.1.1.1.0.2.1.1.0.0.1.1">Software testers can learn from data science to help them in their daily work: ask open minded critical questions, testdata development and processing, testtool selection and visualizing the quality of the object under test.</span><br />
<span class="s12n-description" data-reactid=".0.1.1.1.1.0.2.1.1.0.0.1.1"><br /></span>
<span class="s12n-description" data-reactid=".0.1.1.1.1.0.2.1.1.0.0.1.1">For me, data science increased my ability to ask the right questions and diminished the fear of going too deep into the data. </span><br />
<span class="s12n-description" data-reactid=".0.1.1.1.1.0.2.1.1.0.0.1.1">A </span><span class="s12n-description" data-reactid=".0.1.1.1.1.0.2.1.1.0.0.1.1">software tester never should be afraid to ask the right questions to different (!) people, go deep if neccesary and report his/her findings</span><br />
<span class="s12n-description" data-reactid=".0.1.1.1.1.0.2.1.1.0.0.1.1">You have a job to do: Visualize the quality of the object under test, as critical as possible!</span><br />
<span class="s12n-description" data-reactid=".0.1.1.1.1.0.2.1.1.0.0.1.1"><br /></span>
<span class="s12n-description" data-reactid=".0.1.1.1.1.0.2.1.1.0.0.1.1"><br /></span>
<br />
<br />
<br />
<br />Cordny Nederkoornhttp://www.blogger.com/profile/14202432427575098872noreply@blogger.com0tag:blogger.com,1999:blog-3642034682430878027.post-56300578094936469362015-11-01T06:44:00.002-08:002015-11-01T06:44:49.206-08:00So what's your hobby? Resurrection!<br />
2015 is a busy year for me: new job, more responsibilities, work abroad and some explorations in data science using R.<br />
<br />
I noticed I did not post anything on my TestingSaaS blog for a while now.<br />
Well, it's that time again.<br />
Too much is going on in software testing,cloud computing, forensics and information security to let unnoticed.<br />
Questions to be answered like:<br />
<br />
<ul>
<li>Is the software tester a dying breed?</li>
<li>How can we test the Internet of Things?</li>
<li>Can we use data science when doing software tests?</li>
<li>Isn't test automation just checking, not testing?</li>
<li>What's a RAT in information security, and why should you know about it?</li>
</ul>
<div>
Just a few questions, and the next few months I am going to answer these through my blog and my articles for <a href="http://eforensicsmag.com/">Eforensics Magazine</a>.</div>
<div>
<br /></div>
<div>
TestingSaaS is not a dying breed.</div>
<div>
Why not?</div>
<div>
Because his hobby is: <a href="https://www.youtube.com/watch?v=xU72v7TgZ2k">Resurrection!</a></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<br />
<br />
<br />
<br />Cordny Nederkoornhttp://www.blogger.com/profile/14202432427575098872noreply@blogger.com0tag:blogger.com,1999:blog-3642034682430878027.post-48978494904069625332015-01-24T06:53:00.000-08:002015-01-24T06:53:28.618-08:00A decade of software testing, how it all startedWhen you are having fun time flies!<br />
Well, you could say that with me concerning software testing.<br />
And I am a fun-loving tester now for ten years, a decade of adventure!<br />
How did it all start?<br />
<br />
Ten years ago I got the idea to become a software tester.<br />
Pretty strange at that time because I just finished a Masters in Biology at the Wageningen University and Research Centre (<a href="http://www.wageningenur.nl/en.htm">WageningenUR</a>) and was destined to become a <a href="http://en.wikipedia.org/wiki/Bioinformatics">bioinformatician</a>.<br />
However, specific events led me to this decision:<br />
<br />
<ol>
<li>I always was intrigued by computers: birds were my first love, but computers my second</li>
<li>A summerjob introduced me to the world of softwaretesting: I had to test a time-planning application for truckers, exploratory tessting to the max!!</li>
<li>10 years ago biology was more in the DNA labs than behind the computer</li>
<li>I did not want to be a programmer:. I can build, but I like breaking more!</li>
</ol>
<div>
So I wanted to earn money, use my brain and get some business experience.</div>
<div>
Softwaretesting is then not a bad career move:</div>
<div>
you get a nice salary, you have to think a lot and you explore different businesses.</div>
<div>
When I was studying biology, I would have never thinked of working at a bank, a logistics company or a mbile security firm. Or spending your free evenings and nights exploring XMLs, identity protocols or forensic software.</div>
<div>
And still I find enough time to explore testing adventures abroad.</div>
<div>
<br /></div>
<div>
Sometimes a bumpy ride, but with enough fun time.</div>
<div>
Well, it's a jungle out there, and it's survival of the fittest, but this guy adapts and sometimes he wins.</div>
<div>
<br /></div>
<div>
Let's see how the next decade goes.</div>
<div>
I am ready to go, are you?</div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<br />
<br />Cordny Nederkoornhttp://www.blogger.com/profile/14202432427575098872noreply@blogger.com0tag:blogger.com,1999:blog-3642034682430878027.post-44119069720576146682014-12-11T02:30:00.001-08:002014-12-11T02:30:57.215-08:00Back in business: Software testing, information security and computer forensicsThe last 2 months I was very busy with a lot of things except blogging on this site:<br />
I founded a new social network about the <a href="http://birdsandtheirbehaviour.blogspot.com/">behaviour of birds</a> and together with <a href="http://www.socialquant.me/">SocialQuant</a>, a company founded by my friend <a href="https://www.linkedin.com/in/socialquant">Dr. Morten Middelfart</a>, we increased the online social Twitter-traffic for <a href="http://twitter.com/testingsaas">TestingSaaS</a> and <a href="http://twitter.com/BirdsBehaviour">BirdBehaviour</a>. Lots of fun and a lot tested and learned.<br />
<br />
But, it started to itch again and after following an event organized by <a href="http://www.testnet.org/">Testnet</a> yesterday I was in the blogging mood again.<br />
Why?<br />
Well, the event was about information security and privacy.<br />
Although the things said were not new to me I realized information security (infosec) and computer forensics depend on each other. <br />
With infosec you want to defend information from wrongful behaviour by a third party.<br />
This can be criminal behaviour, for which the evidence can be pertained by computer forenics specialists to use in legal court.<br />
Yesterday, the first speaker from <a href="http://www.emcs-it-services.nl/">EMCS IT Services</a> was saying government organizations were exploring the internet for criminal cyberbehaviour, but he did not say the evidence found for this has to be secured for forensic investigation. Finding the evidence is one thing, securing it and reporting it is something else.<br />
To learn more about this, just have a look at <a href="http://eforensicsmag.com/">Eforensics Magazine</a> .<br />
It's the same with software testing, bugs in the code and flaws in the documentation can be found, but this work is not effective without a sound description and report.<br />
That's why I like software testing, information security and computer forensics.<br />
It's all about interdisciplinary (functional, technical and legal) analysis and the way to visualize it in a report. <br />
You can say that you found a bug, breach or forensic proof, but without a good report (with argumentation to back it) do not expect a pat on the back.Cordny Nederkoornhttp://www.blogger.com/profile/14202432427575098872noreply@blogger.com0tag:blogger.com,1999:blog-3642034682430878027.post-45083085008555608082014-07-29T11:50:00.000-07:002016-07-21T11:21:23.250-07:00Using forensics for mobile testing<div class="MsoNormal" style="mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;">
<div align="LEFT" style="margin-bottom: 0cm; orphans: 1;">
<span style="color: #204063;"><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><span style="font-size: small;"><span lang="en-US">In
May 2014 I started a new job as the QA engineer at </span></span></span></span><a href="http://www.onegini.com/"><span style="color: #0000e9;"><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><span style="font-size: small;"><span lang="en-US"><b>Onegini</b></span></span></span></span></a><span style="color: #204063;"><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><span style="font-size: small;"><span lang="en-US">.</span></span></span></span><span style="color: #204063;"><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><span style="font-size: 9pt;"> </span></span></span><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><br /></span><span style="color: #204063;"><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><span style="font-size: small;"><span lang="en-US">It
is a software company, which develops access management solutions for
online services for insurance companies, webshops and financial
businesses</span></span></span></span><span style="color: #343434;"><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><span style="font-size: small;"><span lang="en-US">. </span></span></span></span></div>
<div align="LEFT" style="margin-bottom: 0cm; orphans: 1;">
<span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><br /></span><span style="color: #343434;"><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><span style="font-size: small;"><span lang="en-US">Who
is familiar with my social network TestingSaaS will not be surprised
hearing this, because of my fascination with online authentication.</span></span></span></span></div>
<div align="LEFT" style="margin-bottom: 0cm; orphans: 1;">
<span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><br /></span><span style="color: #343434;"><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><span style="font-size: small;"><span lang="en-US">One
of the many challenges I now have is to develop a testing approach
for their mobile solution.That involves developing a test
strategy, knowledge training, test automation and tool/device
training.The hardest part here is the knowledge and tool training.</span></span></span></span></div>
<div align="LEFT" style="margin-bottom: 0cm; orphans: 1;">
<span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><br /></span><span style="color: #343434;"><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><span style="font-size: small;"><span lang="en-US">Mind
you, the company uses the agile methodology and that means every
two weeks a delivery of workable software. No time for on-the-job
reading.Fortunately, another hobby of mine (yeah, I see software
testing as a paid hobby :) ),</span></span></span></span><a href="http://en.wikipedia.org/wiki/Computer_forensics"><span style="color: #0000e9;"><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><span style="font-size: small;"><span lang="en-US"> </span></span></span></span><span style="color: #0000e9;"><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><span style="font-size: small;"><span lang="en-US"><b>computer
forensics</b></span></span></span></span></a><span style="color: #343434;"><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><span style="font-size: small;"><span lang="en-US"> (not
paid yet :) ), provides me the knowledge necessary to be able to test
the mobile application.</span></span></span></span><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><br /></span><span style="color: #343434;"><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><span style="font-size: small;"><span lang="en-US">Both
for software testing and computer forensics (read </span></span></span></span><a href="http://en.wikipedia.org/wiki/Mobile_device_forensics"><span style="color: #0000e9;"><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><span style="font-size: small;"><span lang="en-US"><b>mobile
forensics</b></span></span></span></span></a><span style="color: #343434;"><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><span style="font-size: small;"><span lang="en-US">)
you need analytical skills to know what you have to analyse. For
software testing this is identifying, analysing and documenting bugs
and for computer forensics it is identifying, preserving,
recovering, analysing and presenting facts and opinions about
the digital information.Both disciplines require a sound
understanding of the object under analysis.</span></span></span></span></div>
<br />
<div align="LEFT" style="margin-bottom: 0cm; orphans: 1;">
<span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><br /></span><span style="color: #343434;"><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><span style="font-size: small;"><span lang="en-US">For
a couple of years now I write for the online magazine </span></span></span></span><a href="http://eforensicsmag.com/"><span style="color: #0000e9;"><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><span style="font-size: small;"><span lang="en-US"><b>Eforensics
Magazine</b></span></span></span></span></a><span style="color: #343434;"><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><span style="font-size: small;"><span lang="en-US"> ,where
I use my testing skills to study forensics software. A great way to
learn forensics and practise my software testing skills.</span></span></span></span><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><br /></span><span style="color: #0000e9;"><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><span style="font-size: small;"><span lang="en-US"><b><br /></b></span></span></span></span><br />
<span style="color: #0000e9;"><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><span style="font-size: small;"><span lang="en-US"><b><a href="https://eforensicsmag.com/">Eforensics
Magazine</a></b></span></span></span></span><span style="color: #204063;"><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><span style="font-size: small;"><span lang="en-US"> also
has special </span></span></span></span><a href="https://eforensicsmag.com/category/magazine/mobile/"><span style="color: #0000e9;"><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><span style="font-size: small;"><span lang="en-US"><b>issues</b></span></span></span></span></a><span style="color: #204063;"><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><span style="font-size: small;"><span lang="en-US"> on
Mobile Forensics, with a load of reading material on forensics and
mobile operating systems. I am not a die hard programmer, but a
forensics enthusiast. </span></span></span></span><br />
<span style="color: #204063;"><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><span style="font-size: small;"><span lang="en-US">So </span></span></span></span><a href="https://eforensicsmag.com/"><span style="color: #0000e9;"><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><span style="font-size: small;"><span lang="en-US"><b>Eforensics
Magazine</b></span></span></span></span></a><span style="color: #204063;"><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><span style="font-size: small;"><span lang="en-US"> is
my prime supplier of enough material to enhance my knowledge on
mobile operating systems to test the </span></span></span></span><a href="http://www.onegini.com/"><span style="color: #4386ce;"><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><span style="font-size: small;"><span lang="en-US"><b>Onegini</b></span></span></span></span></a><span style="color: #204063;"><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><span style="font-size: small;"><span lang="en-US"> solutions
optimally.</span></span></span></span><br />
<span style="color: #204063;"><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><span style="font-size: small;"><span lang="en-US"><br /></span></span></span></span>
<span style="color: #204063;"><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;"><span style="font-size: small;"><span lang="en-US">Android, Blackberry, Apple, Windows Phone, it's a jungle
out there, but I am ready to explore!</span></span></span></span><span style="font-family: "helvetica" , "arial" , "verdana" , "trebuchet ms" , sans-serif;">
</span>
</div>
</div>
<!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]-->
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:HyphenationZone>21</w:HyphenationZone>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>JA</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
<w:UseFELayout/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="276">
<w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" Priority="39" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" Name="toc 9"/>
<w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
</w:LatentStyles>
</xml><![endif]-->
<!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:Standaardtabel;
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
mso-para-margin:0cm;
mso-para-margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:12.0pt;
font-family:Cambria;
mso-ascii-font-family:Cambria;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Cambria;
mso-hansi-theme-font:minor-latin;
mso-ansi-language:EN-US;}
</style>
<![endif]-->
<!--StartFragment-->
<!--EndFragment-->Cordny Nederkoornhttp://www.blogger.com/profile/14202432427575098872noreply@blogger.com2tag:blogger.com,1999:blog-3642034682430878027.post-2701487312644982162014-02-13T10:55:00.000-08:002016-07-21T07:06:44.795-07:00Made in Japan: Homomorphic encryption biometrics style!<span style="font-family: inherit;">The last weeks I am blogging, writing articles and social networking about <a href="http://en.wikipedia.org/wiki/Privacy_homomorphism">homomorphic encryption</a>.</span><br />
<span style="font-family: inherit;">This all started when reading the <a href="http://www.fujitsu.com/global/news/pr/archives/month/2013/20130828-01.html">news</a> Fujitsu Labs Ltd. wants to implement a DNA read- and processtechnology using homomorphic encryption where encrypted genetic data can be read without decrypting it.</span><br />
<span style="font-family: inherit;">Great news for a software tester with a <a href="http://en.wikipedia.org/wiki/Bioinformatics">bioinformatics</a> background and privacy at heart!</span><br />
<span style="font-family: inherit;"><br /></span>
<span style="font-family: inherit;"><a href="http://jp.fujitsu.com/group/labs/en">Fujitsu Labs</a> claims it can ensure privacy by encrypting the query , the data and the searchresults, so a possible third party (read pharmaceutical company etc.) can't see to which person the DNA data belongs to.</span><br />
<span style="font-family: inherit;">But, homomorphic encryption is a slow process, how does Fujitsu cope with this?</span><br />
<span style="font-family: inherit;">They have 2 solutions:</span><br />
<span style="font-family: inherit;">The first is that the searches are in batchmode (16K per second) and second is that the search already starts when encrypting the data.</span><br />
<span style="font-family: inherit;">Cool stuff, but still questions pop up in my mind: is the encryption undecryptable for hackers, is the performance really 16K strings per second (performance tes(t!)), are the search results correct and can the data be tampered with with for instance Man in the Middle Attacks?</span><br />
<span style="font-family: inherit;">Questions I like to see answered and I wait until more news emerges.</span><br />
<span style="font-family: inherit;">Implementation is set in 2015. Let's see what happens and how the competition will deal with this.</span><br />
<span style="font-family: inherit;"><br /></span>
<span style="font-family: inherit;">Feedback is very welcome by responding to this blog, through Tweeting to <a href="http://twitter.com/TestingSaaS">@TestingSaaS</a> or through the <a href="http://www.facebook.com/TestingSaas">TestingSaaS</a> Facebook-page.</span>Cordny Nederkoornhttp://www.blogger.com/profile/14202432427575098872noreply@blogger.com0tag:blogger.com,1999:blog-3642034682430878027.post-76925613478575516692014-02-04T01:54:00.000-08:002014-02-04T03:05:28.549-08:002014, year of encryption?<!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]--><br />
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:HyphenationZone>21</w:HyphenationZone>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>NL</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
DefSemiHidden="false" DefQFormat="false" DefPriority="99"
LatentStyleCount="371">
<w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 9"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="header"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footer"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index heading"/>
<w:LsdException Locked="false" Priority="35" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of figures"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope return"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="line number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="page number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of authorities"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="macro"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="toa heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 5"/>
<w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Closing"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Signature"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="true"
UnhideWhenUsed="true" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Message Header"/>
<w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Salutation"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Date"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Note Heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Block Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Hyperlink"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="FollowedHyperlink"/>
<w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Document Map"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Plain Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="E-mail Signature"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Top of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Bottom of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal (Web)"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Acronym"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Cite"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Code"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Definition"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Keyboard"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Preformatted"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Sample"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Typewriter"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Variable"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Table"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation subject"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="No List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Contemporary"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Elegant"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Professional"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Balloon Text"/>
<w:LsdException Locked="false" Priority="39" Name="Table Grid"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Theme"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" QFormat="true"
Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" QFormat="true"
Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" QFormat="true"
Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" QFormat="true"
Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" QFormat="true"
Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" QFormat="true"
Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" SemiHidden="true"
UnhideWhenUsed="true" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/>
<w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/>
<w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/>
<w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/>
<w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/>
<w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/>
<w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/>
<w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 6"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
mso-para-margin-top:0cm;
mso-para-margin-right:0cm;
mso-para-margin-bottom:8.0pt;
mso-para-margin-left:0cm;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-fareast-language:EN-US;}
</style>
<![endif]-->
<br />
<div class="MsoNoSpacing">
<span lang="EN-US" style="mso-ansi-language: EN-US;">According
to <a href="http://www.bbc.co.uk/news/business-25670315">Unisys</a>, 2014 will be the year of encryption. </span></div>
<div class="MsoNormal">
<span lang="EN-US" style="mso-ansi-language: EN-US;">Quite
logical, regarding the protection of personal data needed after all those hacks
the past years. Encrypting this data is not a bad option, but it has its
drawbacks.</span></div>
<div class="MsoNormal">
<span lang="EN-US" style="mso-ansi-language: EN-US;">How can I
search in encrypted data? </span></div>
<div class="MsoNormal">
<span lang="EN-US" style="mso-ansi-language: EN-US;">Is
decrypting the data not necessary then? But this costs computer power and time
diminishing the search efficiency. Is there a solution? </span></div>
<div class="MsoNormal">
<span lang="EN-US" style="mso-ansi-language: EN-US;">A
possibility is <a href="http://en.wikipedia.org/wiki/Privacy_homomorphism">homomorphic encryption</a>, which is an encryption issue to tackle
at different universities and companies like MIT, IBM, Fujitsu and Microsoft.
What is it then? In cryptography, encryption is the process of encoding
messages (or information) in such a way that only authorized parties can read
it. With homomorphic encryption, encrypted data could be processed without
decrypting it first. This makes it ideal for Cloud applications, enabling
vendors to process encrypted personal data without decryption, ensuring privacy
of the data owner. This would be great in the financial and medical sector. One
disadvantage, homomorphic encryption is a slow process. Full encryption is
still practically impossible, but partially there are possibilities.</span></div>
<div class="MsoNormal">
<span lang="EN-US" style="mso-ansi-language: EN-US;">Which ones
are part of the next blogposts. This tester's adventure in encryption continues!</span><br />
<span lang="EN-US" style="mso-ansi-language: EN-US;"><br /></span>
<span lang="EN-US" style="mso-ansi-language: EN-US;"><br /></span>
<span lang="EN-US" style="mso-ansi-language: EN-US;">PS:</span><br />
<span lang="EN-US" style="mso-ansi-language: EN-US;">This blogpost is also posted in the Dutch online magazine for IT-professionals Computable:</span><br />
<span lang="EN-US" style="mso-ansi-language: EN-US;"><br /></span>
<span lang="EN-US" style="mso-ansi-language: EN-US;"><a href="http://www.computable.nl/artikel/opinie/security/4979600/1276896/versleutelde-dataverwerking-in-de-cloud.html">Versleutelde data-verwerking in de cloud</a></span><br />
<span lang="EN-US" style="mso-ansi-language: EN-US;"><br /></span>
<span lang="EN-US" style="mso-ansi-language: EN-US;"><br /></span></div>
Cordny Nederkoornhttp://www.blogger.com/profile/14202432427575098872noreply@blogger.com0tag:blogger.com,1999:blog-3642034682430878027.post-83688690967555311202014-01-07T00:08:00.001-08:002014-02-04T03:51:56.077-08:00New year, new softwaretesting adventures<div class="MsoNormal">
<span style="font-family: inherit;"><br /></span></div>
<div class="MsoNormal">
<b><span lang="EN-US" style="font-family: inherit; line-height: 107%;"><br /></span></b></div>
<div class="MsoNormal">
<span lang="EN-US" style="font-family: inherit; line-height: 107%;">It’s 2014, a new year!<o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="EN-US" style="font-family: inherit; line-height: 107%;">What is it going to be?<o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="EN-US" style="font-family: inherit; line-height: 107%;">Well, it’s predecessor, 2013, was awesome.<o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="EN-US" style="font-family: inherit; line-height: 107%;">A new job at <a href="http://eyefreight.com/">Eyefreight</a>, a new journal to write for
(<a href="http://eforensicsmag.com/">eForensics Magazine</a>) and expanding the TestingSaaS network through a
conference in Denmark (Thank you <a href="http://targit.com/">Targit </a>and <a href="http://morton.dk/">Dr. Morton</a> ). Not to mention the
personal things that happened, which deeply broadened my life.<o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="EN-US" style="font-family: inherit; line-height: 107%;">Strangely enough, this was all NOT planned, I just
went with the flow.<o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="EN-US" style="font-family: inherit; line-height: 107%;">And that’s exactly what I am going to continue in the
coming year.<o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="EN-US" style="font-family: inherit; line-height: 107%;"><br /></span></div>
<div class="MsoNormal">
<span lang="EN-US" style="font-family: inherit; line-height: 107%;">Believing the expectations of different visionaries
it will be the year of Internet of Things, mobile, big data, privacy and consumerization. <o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="EN-US" style="font-family: inherit; line-height: 107%;">Regarding my blogs, tweets and articles this could be
a continuation of 2013, but 2013 also gave me inspiration for testing computer
forensics applications, which could be very well combined with big data and
privacy. This will certainly continue in 2014.<o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="EN-US" style="font-family: inherit; line-height: 107%;">Next to this, I should also make some time for
helping the <a href="http://t.co/4SN1ZumXs9">UMA-WG</a> wih their interoperability tests, maybe even with some implementors?<o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="EN-US" style="font-family: inherit; line-height: 107%;">By the way, these possible future efforts will be done
in my free time.<o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="EN-US" style="font-family: inherit; line-height: 107%;">My daily job will still be softwaretesting at
<a href="http://eyefreight.com/">Eyefreight </a>where every day is a new fun(!) day with lots of challenges ranging from
testing new applications, reviewing new documentation (it is promised) or
devising new test strategies for regression (test automation) , load- and security testing. And maybe some
international adventures, you never know.<o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="EN-US" style="font-family: inherit; line-height: 107%;"><br /></span></div>
<div class="MsoNormal">
<span lang="EN-US" style="line-height: 107%;"><span style="font-family: inherit;">Who dares wins!</span><span style="font-size: small;"><o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<br />
<div class="MsoNormal">
<br /></div>
Cordny Nederkoornhttp://www.blogger.com/profile/14202432427575098872noreply@blogger.com0tag:blogger.com,1999:blog-3642034682430878027.post-49105717820338947652013-10-03T11:37:00.000-07:002013-10-03T11:40:23.007-07:00Roaring with the Vikings<w:sdt contentlocked="t" id="89512093" sdtgroup="t"><span style="font-family: "Calibri","sans-serif"; font-size: 1.0pt; mso-ansi-language: NL; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: NL; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-latin;"><w:sdtpr></w:sdtpr><w:sdt docpart="61C931C500AB4471A18996BBD7D41240" id="89512082" storeitemid="X_5F329CAD-B019-4FA6-9FEF-74898909AD20" text="t" title="Post Title" xpath="/ns0:BlogPostInfo/ns0:PostTitle"></w:sdt></span>
</w:sdt><br />
<div class="Publishwithline">
I plan to go every year on an adventure
combined with a IT conference.</div>
<div class="MsoNormal">
<span lang="EN-US">In 2010 I
went to Belgium for <a href="http://testingsaas.blogspot.nl/2010/03/european-e-identities.html">EEMA </a>and Colorado for the <a href="http://testingsaas.blogspot.nl/2010/08/cloud-identity-summit-no-more-passwords.html">Cloud Identity Summit</a>.</span></div>
<div class="MsoNormal">
2011 was the time for the<a href="http://testingsaas.blogspot.nl/2011/05/internet-identity-workshop-12-seen-by.html"> Internet Identity WorkShop</a> in San Francisco and Silicon Valley.</div>
<div class="MsoNormal">
<span lang="EN-US">2012 was a
year without conferences, but my trip to the Panama Canal got me interested in
logistics.<o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="EN-US">And voila
where do I work in 2013: <a href="http://www.eyefreight.com/">Eyefreight</a>, a kick-ass transport management software
company with big multinational customers.<o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="EN-US">But that
does not mean 2013 is only logistics for me.<o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="EN-US">Nope, this
year Big Data caught my attention. And when looking for other enthusiasts
I got in contact with a Danish daredevil named <a href="http://www.morton.dk/">Morten Middelfart</a>.<o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="EN-US">He is CTO
of <a href="http://www.targit.com/">Targit</a>, also a kick-ass company, specialized in business Intelligence
solutions.<o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="EN-US"><br /></span></div>
<div class="MsoNormal">
<span lang="EN-US">And when I
heard they were giving a <a href="http://www.targit.com/en/offers/targitdecisionday2013/about">conference </a> in Copenhagen in September I knew it
was time again to pack my bags: </span>Four days
Copenhagen: three days sightseeing and one day conference, mixing business with
pleasure, Viking style!</div>
<div class="MsoNormal">
<span lang="EN-US"><br /></span></div>
<div class="MsoNormal">
<span lang="EN-US">And it did
not disappoint me: Copenhagen is a vibrant capitol, with great history and
amazing buildings.<o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="EN-US">The
Conference was a combination of showing the new
target product: the <a href="http://www.targit.com/en/experience-targit/products/targit-decision-suite">Targit 2013 Decision suite</a> (link) and the new trends in IT
like big data and analytics.<o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="EN-US">In the
morning it started with some great keynotes (guarded by <a href="http://www.targit.com/da/jungle/animals/lion">Lenny the Lion</a>)
and in the afternoon it was time for the parallel sessions where visitors could
listen to people of their interest.<o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="EN-US">Oh, and did
I tell you the King of <a href="http://en.wikipedia.org/wiki/Performance_indicator">KPIs</a>,<a href="http://davidparmenter.com/"> David Parmenter</a> was invited as a keynote
speaker?<o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="EN-US">By
demystifying KPI he taught me valuable lessons in Business Performance, and all
just in a few hours. Well, his books and recommendations are now on my
wishlist and I am eager to see if I can use it in my daily work. <o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="EN-US">The other
parallel presentations taught me a lot about <a href="http://www.google.com/analytics/apps/results?category=Social%20Media%20Analytics">Social Analytics</a>, airport
logistics and the target products, valuable insights!<o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="EN-US"><br /></span></div>
<div class="MsoNormal">
<span lang="EN-US">Then a few
hours off (except for a lucky lady who went for a skydive with Morten).<o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="EN-US">Seven o'clock it was time for drinks and a good dinnerbuffet where the King of KPI
entertained us with a story about Shackleton who did not succeed in
reaching his goal but still learned us an important leadership lesson.<o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="EN-US">The evening
ended with Kate Perry ‘roaring’her latest <a href="http://www.vevo.com/watch/katy-perry/roar-official/USUV71301934">song </a>, a recording of the
skydive and a breathtaking show by the Copenhagen Drummers.<o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="EN-US"><br /></span></div>
<div class="MsoNormal">
<span lang="EN-US">And then
when I thought it was all over my friend Morten came to me and he said he had
to do something he promised me some time ago: drinking a beer together. <o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="EN-US">So, it was
a good day Dr. Morten and I met new friends and new opportunities are in the horizon.<o:p></o:p></span></div>
<div class="MsoNormal">
<span lang="EN-US">Thanks for
giving me the opportunity to roar with the Vikings: AWESOME!!!<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
Cordny Nederkoornhttp://www.blogger.com/profile/14202432427575098872noreply@blogger.com4tag:blogger.com,1999:blog-3642034682430878027.post-71623243986519603672013-05-25T08:46:00.000-07:002013-05-25T08:46:48.857-07:00when exploring the cloud brings you to a new employerIn the beginning of 2013 it became clear to me I needed a change.<br />
For almost five years I was in the contract business doing challenging projects for my employer.<br />
But something nagged.<br />
I noticed most projects were in finance and I knew there was more to test, especially in the cloud.<br />
And I wanted to work for a company which was developing for interesting clients in the cloud.<br />
So, I started to go walkabout. <br />
My goal was to find a suitable project in 3 months or less.<br />
Man, if I knew what I was getting myself into.<br />
In 3 months time I saw more companies and organisations then in all my testing career.<br />
Names I won't tell, but let me say this, every big player in finance, e-commerce, navigation, government, insurances etc etc got a call or letter from me.<br />
A lot of telephone calls, emails and invites followed.<br />
At the end of april I struck gold, and in an area which was known to me, but I never imagined to start working for in the cloud: a company in transport management software (see my personal details for more :) ).<br />
Well, and it's completely out of my comfort zone finance.<br />
I need all my knowledge on software testing, test automation, ERP, cloud and review techniques.<br />
And not for only 1 client like I had in my previous projects. Nope, for more than 5, and these are still encounting, I love it.<br />
It's gonna be a hot summer with new stuff to see and learn.<br />
New areas to spread the softwaretesting word., all in the name of quality.<br />
<br />
Stay tuned for updates, they certainly will come...Cordny Nederkoornhttp://www.blogger.com/profile/14202432427575098872noreply@blogger.com0tag:blogger.com,1999:blog-3642034682430878027.post-49586486030443154062013-02-26T05:32:00.000-08:002013-02-27T07:26:13.805-08:00Transparancy at a SaaS company<br />
<div lang="en-US" style="margin-bottom: 0cm; page-break-before: always;">
<br /></div>
<div lang="en-US" style="margin-bottom: 0cm;">
For me, transparancy is
one of the most important characteristics a SaaS company or other
cloud company (IaaS, PaaS) must have to survive in the current world.</div>
<div lang="en-US" style="margin-bottom: 0cm;">
A customer relies 24/7 on
the SaaS solution and when something goes wrong (server down,
security breach etc.) a customer should be informed immediately so he
can adapt to it and hopefully don't loose too much time and money
when the SaaS solution is down.</div>
<div lang="en-US" style="margin-bottom: 0cm;">
<br /></div>
<div lang="en-US" style="margin-bottom: 0cm;">
So when I read the tweet
by <a href="http://www.afas.nl/">AFAS </a>Software CEO Bas van der Veldt that transparancy is great
when you have nothing to hide and AFAS likes transparancy, I made a
bold move.</div>
<div lang="en-US" style="margin-bottom: 0cm;">
I tweeted back that I want
to test that. Promptly I got a tweet back with an invitation to do
just that.</div>
<div lang="en-US" style="margin-bottom: 0cm;">
But as a SaaS software
tester I was really interested in how AFAS deals with traceability,
which was also interesting for Mr van der Veldt, so he invited me to
come over.</div>
<div lang="en-US" style="margin-bottom: 0cm;">
Within a few days
arrangements were made and I was invited on Friday 15 February to see
how Testing&Development was done at AFAS in a transparant way.</div>
<div lang="en-US" style="margin-bottom: 0cm;">
<br /></div>
<div lang="en-US" style="margin-bottom: 0cm;">
After a nice drive through
the Dutch 'hills' (Utrechtse Heuvelrug) I arrived at AFAS.</div>
<div lang="en-US" style="margin-bottom: 0cm;">
At arrival in the
reception it became clear to me automation was a key process here.</div>
<div lang="en-US" style="margin-bottom: 0cm;">
The AFAS reception
welcomed me and guided me to a registration unit where I could
register myself. Pretty fancy stuff with an automated photocamera to
take mugshots (not so fancy :-) ) and a SMS-service telling my host I
arrived.</div>
<div lang="en-US" style="margin-bottom: 0cm;">
Within minutes my host
arrived: Martijn Wouter, teamlead test.</div>
<div lang="en-US" style="margin-bottom: 0cm;">
After a brief introduction
I was given an elaborate tour through the AFAS building seeing the
different departments development, test and support and the inhouse
server room. A nice thing to see was the AFAS Usability Lab where it
explores through cameras and special software how customers realtime
use its software and register the results for future use.</div>
<div lang="en-US" style="margin-bottom: 0cm;">
Martijn introduced me to
his team and explained the different roles the team members have.</div>
<div lang="en-US" style="margin-bottom: 0cm;">
As a professionally
educated tester it struck me most testers came from other divisions
of AFAS ready to use their knowledge and also eager to learn testing by certifying and visiting workshops.</div>
<div lang="en-US" style="margin-bottom: 0cm;">
I see it as a way of
exploratory testing, using your skills as a domain tester testing new software, doing testspecification and execution at the same time. The last is not simultaneously at AFAS, which<br />
is no problem, software is rated high by its clients.</div>
<div lang="en-US" style="margin-bottom: 0cm;">
Another thing intrigued
me: most SaaS-companies work via the agile methodology in small
interdisciplinary teams. Martijn explained to me AFAS still uses the
waterfall method, but because of the short line development&testing
is still moving in a fast pace with the documentation department.
Also with the client because of the direct incident system (including
automated dashboards).</div>
<div lang="en-US" style="margin-bottom: 0cm;">
Next to this, inhouse
developed test automation tools speed up tests and ensure test
coverage.</div>
<div lang="en-US" style="margin-bottom: 0cm;">
Clients are very important
to AFAS and AFAS sees to it they are satisfied through the already
mentioned Usability lab, the AFAS Theater product and knowledge
presentations (SEPA!), an online transparant annual report and
special online client and partner dossiers. Traceability meets
automation!</div>
<div lang="en-US" style="margin-bottom: 0cm;">
Employees are also
important for AFAS: during breaks they can play table soccer, spent
time in the gym or eat lunch/dinner at the company restaurant.</div>
<div lang="en-US" style="margin-bottom: 0cm;">
<br /></div>
<div lang="en-US" style="margin-bottom: 0cm;">
It was a great Friday
afternoon at AFAS. I hereby want to thank AFAS for the opportunity
they gave me to have a look into the kitchen of a successfull SaaS
company.</div>
<div lang="en-US" style="margin-bottom: 0cm;">
<br /></div>
<div lang="en-US" style="margin-bottom: 0cm;">
<br /></div>
Cordny Nederkoornhttp://www.blogger.com/profile/14202432427575098872noreply@blogger.com0tag:blogger.com,1999:blog-3642034682430878027.post-70046901043158273022013-01-16T05:55:00.000-08:002013-01-16T09:42:46.228-08:00Protocol of the Month<span style="font-family: Arial, Helvetica, sans-serif;"><br />
</span><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">In my previous blogpost I said I am going to explore OAuth 2.0 more in detail.</span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;"><br />
</span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">Bluntly said, OAuth 2.0 is an open source framework for online datasharing without using a username/password, but by means of access tokens.</span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">This simplifies data sharing for a user and is also more secure, because you do not have to enter your password in a third-party site. </span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">UMA,my pet identity protocol to test of the last two years, is build uponOAuth2.0, making it a OAuth 2.0 profile.</span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;"><br />
</span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">To understand UMA, you have to understand OAuth2.0 first.</span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">This can get quickly technical, demotivating nontechnical users tounderstand OAuth.</span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">This is a pity.</span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">That's why I will discuss OAuth 2.0 and its different authorization flows in a series of blogposts.</span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">Told in a functional way, illustrated with daily used examples like social networks.</span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">If you want to have more technical details I recommend the I<a href="http://tools.ietf.org/html/ietf-oauth-v2-31">ETF OAuth2.0 draft.</a></span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;"><br />
</span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">First,let's have a look at OAuth 2.0 and its roles.</span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">There are four roles: </span><br />
<span style="font-family: Arial, Helvetica, sans-serif;"><br />
</span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">resourceowner</span></div><div align="LEFT" style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">An entity capable of granting access to a protected resource.</span></div><div align="LEFT" style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">When the resource owner is a person, it is referred to as an enduser.</span></div><div align="LEFT" style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;"><br />
</span></div><div align="LEFT" style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">resourceserver</span></div><div align="LEFT" style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">The server hosting the protected resources, capable of accepting</span></div><div align="LEFT" style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">and responding to protected resource requests using access tokens.</span></div><div align="LEFT" style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;"><br />
</span></div><div align="LEFT" style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">client</span></div><div align="LEFT" style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">An application making protected resource requests on behalf of the</span></div><div align="LEFT" style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">resourceowner and with its authorization. </span><br />
<span style="font-family: Arial, Helvetica, sans-serif;">The term client does not imply any particular implementation characteristics (e.g.whether the application executes on a server, a desktop, or other</span></div><div align="LEFT" style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">devices).</span></div><div align="LEFT" style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;"><br />
</span></div><div align="LEFT" style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">authorizationserver</span></div><div align="LEFT" style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">The server issuing access tokens to the client after successfully</span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">authenticating the resource owner and obtaining authorization.</span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;"><br />
</span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">This can be visualized like in this diagram:</span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;"><br />
</span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;"><br />
</span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;"><img align="BOTTOM" alt="OAuth 2.0 roles as defined in the specification." border="0" height="307" name="Afbeeldingen1" src="http://tutorials.jenkov.com/images/oauth2/overview-roles.png" width="431" /></span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">source: <a href="http://tutorials.jenkov.com/oauth2/roles.html">http://tutorials.jenkov.com/oauth2/roles.html</a></span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;"><br />
</span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;"><br />
</span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">Obtaining access tokens is an important part of the OAuth2.0 protocol.</span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">This differs per interaction the OAuth2.0 roles can undertake.</span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">An access token is an example of an authorisation grant, a credential which represents the resource owner's authorization (to access itsprotected resources) used by the client to obtain an access token.</span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">For granting authorization in OAuth2.0 there are four grant types:authorization code, implicit, resource owner password credentials,and client credentials, as well as an extensibility mechanism for deining additional types.</span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;"><br />
</span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">The next blog series will discuss the OAuth grant types</span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;"><br />
</span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;">Stay tuned for my online adventures to unravel OAuth2.0 and interact with me through my <a href="http://testingsaas.blogspot.com/">blog</a>, <a href="http://twitter.com/testingsaas">Twitter </a>and <a href="http://facebook.com/testingsaas">Facebook</a>.</span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;"><br />
</span></div><div style="margin-bottom: 0cm;"><span style="font-family: Arial, Helvetica, sans-serif;"><br />
</span></div><div style="margin-bottom: 0cm;"><br />
</div>Cordny Nederkoornhttp://www.blogger.com/profile/14202432427575098872noreply@blogger.com0tag:blogger.com,1999:blog-3642034682430878027.post-23549815581264854062012-12-31T05:40:00.001-08:002012-12-31T05:40:09.133-08:00Hello 2013, Goodbye 2012For me, 2012 was a year full of challenges, setting up ways to meet peers (<a href="http://www.facebook.com/testingsaas">Facebook)</a> and gaining <a href="http://nl.linkedin.com/in/cordnynederkoorn/">experience </a>in online identities, software testing and compliance .<br />
This I want to continue in 2013.<br />
Next year I want to deepen my security knowledge about online sharing protocols like <a href="http://kantarainitiative.org/confluence/display/uma/Home">UMA</a>, <a href="http://oauth.net/2/">OAuth2 </a>, <a href="http://openid.net/">OpenID</a> and my adventures (work experience, conference meetings) will be highlighted.<br />
Also, I will continue to follow the news on privacy , big data and compliance and blog about this to express my views on these subjects, which will be combined in 2013.<br />
<br />
Papers will be written, conferences will be visited and no worries, software and protocols will be tested.<br />
<br />
All thoroughly done to give you a quality up to date repository about testing Software as a Service, with a flavor of online identities.<br />
<br />
See you all in 2013 on <a href="http://facebook.com/testingsaas">Facebook</a>, <a href="http://www.testingsaas.blogspot.com/">TestingSaaS</a>-blog and <a href="http://www.twitter.com/testingsaas">Twitter</a>!<br />
And perhaps in real life too!!Cordny Nederkoornhttp://www.blogger.com/profile/14202432427575098872noreply@blogger.com0tag:blogger.com,1999:blog-3642034682430878027.post-9453623488294970322012-09-25T03:27:00.001-07:002012-09-25T03:27:12.279-07:00Mobile payment ecosystems: a challenge for compliance testingWhen you have read my blog lately you know I am very interested in compliance and software testing, especially for SaaS, NFC and mobile payments.<br />
<br />
Since Google initiated <a href="http://www.google.com/wallet/">Google Wallet</a> I kept a close eye on what the compliance institutions were planning to do to develop testing programs for the emerging mobile payment ecosystems.<br />
Especially because this is a new payment ecosystem, still unknown to the many merchants, acquirers and customers who are going to have to deal with it.<br />
That it is susceptible to malicious attacks is illustrated by the POS (point of sale/checkout) attacks at different merchant locations in the USA, like <a href="http://www.bankinfosecurity.com/subway-breach-exposes-pos-vulnerabilities-a-5125/op-1">Subway</a> and <a href="http://www.bankinfosecurity.com/penn-station-card-breach-grows-a-4862/op-1">Penn Station</a>.<br />
As always, the criminals know the weaker spots of the payment ecosystem the quickest and the compliance institutions are lagging behind, but have to react.<br />
The compliance institute which is publicly expected to design countermeasures is the PCI Security Standards Council (<a href="https://www.pcisecuritystandards.org/">PCI SSC</a>). And recently it has 'done' that.<br />
<br />
The PCI SSC has provided clarifications how every organisation (which stores, processes or transmits creditcard/debitcard data) should comply with the already devised PCI Data Security Standard (<a href="https://www.pcisecuritystandards.org/security_standards/documents.php?document=pci_dss_v2-0#pci_dss_v2-0">PCI DSS</a>). A standard which should not be unknown to you if you read my former blog posts.<br />
<br />
However, it are still clarifications about the PCI DSS, no update is planned yet until <a href="http://www.securitybistro.com/blog/?p=1960">2013</a>. <br />
Why clarifications?<br />
Well, The entity which executes the compliance validation annually(!) is dependent on the amount of volume of transactions involved. If the volumes are small a Self-Assesment Questionnare (<a href="https://www.pcisecuritystandards.org/merchants/self_assessment_form.php">SAQ</a>) is used. If the volumes are large, a Qualified Security Assessor (<a href="http://en.wikipedia.org/wiki/Qualified_Security_Assessor">QSA</a>) tests if the stakeholder is PCI DSS compliant.<br />
<br />
When you read the PCI DSS you will encounter a lot of text, but no real details about how to test mobile payment ecosystems effectively (by QSA or through SAQ) resulting in an inadequate coverage. Especially what was part of the to be tested ecosystem (the 'scope') was insufficiently explained.<br />
<br />
These and other points of concern are now written down in the <a href="https://www.pcisecuritystandards.org/security_standards/documents.php?association=PA-DSS">Summary </a>of 2012 Feedback for the PCI DSS and Payment Application Data Security Standard (<a href="http://en.wikipedia.org/wiki/PA-DSS">PA-DSS</a>). This document is a description of the international (!) feedback given by the PCI SSC stakeholders (merchants, acquirers, QSAs and payment software vendors) to the PCI SSC regarding PCI DSS v.2.0 and PA-DSS.<br />
Regarding PCI DSS the feedback suggestions were mainly about the already mentioned need for scope guidance, a more detailed description of requirements, a more simplified SAQ and an update on password requirements. The last one is, regarding the current changes in identity management, an effective step in actualizing PCI DSS procedures.<br />
<br />
Now I know what you're thinking: 'PCI SSC stakeholders, USA, is this also important for the European mobile payment system?'<br />
Yes, it is. It's not a U.S. standard, it's a global standard, also affecting Europe, Africa and the Asia-Pacific (mobile) payment environments. The standard is a result of aligned policies from different U.S. Credit and Debitcard companies like <a href="http://www.mastercard.com/">MasterCard</a> and <a href="http://www.visa.com/">VISA</a>.<br />
If these guidelines are not met annually, non -compliant merchants and acquirers meet its consequences: up to $500.000 fines and litigation costs, degradation to lower level PCI compliance and lower brand reputation and consumer confidence in the long term.<br />
<br />
So, it is not amazing merchants and acquirers are giving feedback on guidelines they must comply to, but do not know how to comply to.<br />
Let's see how the feedback from the PCI SSC stakeholders will result in a more testable, usable and , hopefully, more qualitative better PCI DSS standard.<br />
<br />
<br />
<br />Cordny Nederkoornhttp://www.blogger.com/profile/14202432427575098872noreply@blogger.com0tag:blogger.com,1999:blog-3642034682430878027.post-4600272849222896852012-07-28T10:47:00.001-07:002012-07-28T10:47:29.175-07:00A tester's nightmare: wrong testdataImagine the following situation: </BR>
A team of IT-professionals are working hard to get a GO for a release of a module of their online CRM software.
The architect designed the module, the developer creates the module and last, but not least, the tester has to do an end-to-end test to see if the whole chain is still working after the module is incorporated into the software. </BR>
As always, the end-to-end test is the finishing test, so the tester is on the critical path of the project. Better said, he has only 2 days to test and give a sound test advise of whether a GO/NO GO should be given. </BR>
Naturally, the tester prepared this test from the beginning. </BR>
While executing the testcases something weird happens: data is not migrated from the miodule to the other parts of the SaaS-landscape. </BR>
Awkward, because with other testcases this does not appear. </BR>
</BR>
The tester thinks it's a bug, because the only difference with other testcases is the situation it wants to test and the expected result does not occur, so hee, it must be a bug. It's almost D-day and the tester has to go further with testing. </BR>
So, the tester documents the bug and communicates it to the team so the developer can pick it up and the tester continues the testing. Luckily it was not a showstopper. </BR>
The next day (the last day of testing!!) the developer comes to the tester and says it's not a bug, it's wrong testdata, which the database could not process. </BR>
After testing with the correct testdata the expected situation occurred.
Shoot, almost a day lost due to bad testdata. </BR>
</BR>
What can we learn from this? </BR>
</BR>
A lot of you would say the tester screwed up here,he's responsible, but is he?
</BR>
No!
</BR>
</BR>
In the beginning of the story I described the project and its team. </BR>
And that's exactly where the responsibility lies, the team!</BR>
</BR>
This Single Point of Failure (wrong testdata) would not have occurred if other teammembers would have reviewed the testcases and the used testdata. </BR>
Then the rotten apple in the testdata would have been removed early in the process, even before the testing started. </BR>
</BR>
A tester reviews documents and tests software for a living, but we are also human beings and we too make mistakes. </BR>
I am now a tester for 8 years and every now and then I use bad testdata. </BR>
But I learned to get my testcases reviewed and diminish the risk of using bad testdata,stall the test process and unintentionally get the project in the danger zone. </BR>
</BR>
Bottom line, when you are testing in a very short time period, make sure the whole team is aware of the importance of testing and let them review your testcases, so the described situation above does not occur.Cordny Nederkoornhttp://www.blogger.com/profile/14202432427575098872noreply@blogger.com2