Gamification is the process of designing something with game-like elements. A practice that has been used to drive engagement and motivation with features such as point systems, feedback loops, leaderboards, badges, and so on.
You soon start to realize that gamification is a play on dopamine release and is in every facet of our lives from the depths of social media, games (of course), business, and even life itself. Think of it.
Forbes Top 100? Real-life leaderboard.
Born with certain traits and characteristics? Genetic Random Number Generator (RNG).
Credit score? Point system.
College Degree? Merit system.
Coffee in the morning…
During my undergraduate career, I had the opportunity to volunteer as a research assistant in the Pharmacology and Toxicology department, studying the adverse effects of inflammation induced by viruses in rodents.
I was enamored by virology and infectious diseases — when I decided to change my career trajectory, the infatuation never went away. I’ve tend to see myself gravitate towards malware research by reading books, reverse engineering samples of malware and reading blogs. The similarities I’ve found between the two may be a coincidence or a natural formation of bio-mimicry. …
In 2010, security researchers at the University of California San Diego and the University of Washington demonstrated that messages can be injected into the Controller Area Network (CAN) of a vehicle.
The CAN, is essentially the raw representation of byte code running on a vehicle’s electric wiring. The bus architecture was released in 1986 at the SAE Conference in Detroit, MI. Since then, every vehicle past 1991 has used this architecture. There are many other architectures that precede CAN, to learn more about it click here.
It was 1989 that the World Wide Web (WWW) was born out of CERN in Switzerland, what followed was what became known as the “Browser Wars” between NCSA Mosaic, Netscape, and Microsoft. There was an urge for the web to be more dynamic than simple HTML pages, an urge to make it more intuitive and developer friendly.
In order to be a dominant force in browsers, Netscape developed the first language for the web called Mocha. At the same time Oak, also known as Java, was gaining traction to be another scripting language for the web. These pressures led to…
Virtual Realty enables us to interact with our computers in ways we’ve never seen before, a technology that was abandoned only to be revisited decades later. Now, it has the opportunity to change everything, from the way we interact, to the way we will do work in the future.
Jaron Lanier once stated that:
The future is always more complex than the present because we have to deal with multiple possible ends, each of which has all of the vagaries of the present.
How we use technology is unpredictable. Humans are passive hackers, it’s human nature to find ways to…
Cybersecurity as an industry still in it’s infancy, the term is used so liberally that it has become analogous with the term hacking, yet it means so much more. In its current state, cybersecurity is an industry that faces an identity crisis, the landscape evolves at such a rate that the good guys are having difficulty keeping up, there’s also a massive shortage in professionals, a misalignment of security between firms and governments, and the approach to tackle the issues are reactive rather than premeditated.
Given the dynamics of the system and the players involved, it boils down to this…
The function of a Browser Cookie is to be able to identify and remember things about you as you go along your web sessions. Logically speaking, all cookies are essentially text files that hold vital information about an established session. The World Wide Web in of itself one of the most innovating technologies to date, yet it lives on brittle foundation, littered with specifications to reinforce it.
Cookies are vital to how the WWW works. The attack exposure that cookies produce are poignant to the protections and processes required to ensure its integrity and confidentiality. To understand why, we need…
According to MDN web docs, WebSockets makes it possible to open two-way communication (full-duplex communication) between a client and a server without the client asking the server again for a response. The most common applications WebSockets are used for are ones that communicate data in a constant stream without querying the server subsequently for responses. These applications include: Client to client communications such as chat, Monitoring, and maintenance Human Machine Interfaces (HMI) that are used in Industrial Control Systems (ICS) or other SCADA networks, multiplayer games — the list goes on.
The great thing about WebSockets is that most browsers…
Hypertext transmission protocol (HTTP) is a text-based protocol built on top of TCP/IP. The first specification was proposed by Sir Tim Berners-Lee in March of 1989 this document was known as Information Management: A Proposal.
An HTTP Request and Response takes the general structure:
============Request=============POST /hello_world.php HTTP/1.1
Referer: http://www.helloworld.comHELLO============Response=============HTTP/1.1 200 OK
Every request you make in a browser takes the form of the request and response structure above. Each line consist of headers in the semantic of name:value pairs.
In the previous post we discussed about Serial Flow :
Now we are going to discuss Parallel Flow and it’s use cases in NodeJS.
The benefit in serial flow is that you are able to control execution in…
An internet researcher that loves to write about futurology, cybersecurity, and design. Finding answers to the self, and the virtual world around us. 🌸💀🌸