nanos gigantum humeris insidentes My previous post told you something on the ethics of hacking and what a hack is all about. I made some screen hacks which basically do nothing else then throwing sprites all around. They can be called hacks, cause they hack the XNA and Windows Phone Systems to do some crazy and funny things. They are free to try and look at and perhaps it tickles some interesting brain waves.
Have fun! http://www.windowsphoneart.com/ http://www.windowsphoneart.com/kabbalah.html http://www.windowsphoneart.com/thinkers.html
0 Comments
dimidium facti qui coepit habet I was re-reading some hackers ethics, among which the book Hackers from steven levy is really one of the best around. Levy is writing about real Hacker heroes of the past and I was ashamed. Why was I ashamed? For good reasons. Let me explain. I myself am a programmer for quite some time now. Lets say 20+ years. I did many hacks with Ansi C, Java, C++, Visual Basic, C#, Clipper, DBase, Basic and so on and so forth. Also I hacked around putting up all kinds of solutions by hooking together different non compatible applications on non compatible operating systems. In the old days I did it with binary socket which I wrote for different operating systems (C, JAVA) and made them talk through binary streams. Nowadays WCF, XML, SOAP and so on are the roads to ride. Never mind, the topic of this post is: I was ashamed after reading about Wozniak, Samson, Greenblatt, Kotok, Woods, Warran, Deutsch, Schwader, Saunders, Russel and all alike. Bill Gates belongs in this list. He's the hacker pulling it off to make money from his nerdiness. Many say it's not Hacking Ethics to make money out of it. True, that's the reason why I am ashamed. But, the world is running on hacking knowledge and Gates and Jobs were the nerds making the world nerdie. That deserves lots of respect and I am very happy with their nerdie world. http://en.wikipedia.org/wiki/Hacker_ethic http://www.stevenlevy.com/index.php/books/hackers http://project.cyberpunk.ru/idb/hacker_ethics.html http://hacks.mit.edu/misc/ethics.html But, for many small hacks asking money is bad taste. I tried to pull that off. I made a hack on the windows phone, Azure and XNA and put them together in a funny hacked game systems. The game sucks, and the system itself is not very interesting. But, it is definitely a hack. A technical interesting one and funny to do, and with many useful implications. And I should NOT ask money for it. Which I did and will not do anymore. Now, something about the hack. A guy made an interesting game engine on XNA called Farseer. You can check it out at: http://www.codeproject.com/Articles/173529/BounceBall-XNA-Farseer-Magic It is cool and it works. The guy didn't made it work on the phone (only in the emulator), so that's what I hacked together. The things is downloadable on the phone marketplace and you can find it at: http://www.windowsphone.com/en-us/store/app/freemasonace/ee2ce166-9703-4c79-8e47-d9de93dbfe3c I made it free today, so if it still asks money, wait a couple of days and check again. Furthermore, the real hack is hooking it up with azure. Not only are the high scores saved in azure and viewable for the rest of the world, but the most funny thing is you can make your own levels. The levels are saved in the cloud as blob and can be downloaded on the phone and played right away. That's cool and it can be called a hack, because you pull some strings on something technical and search for boundaries. But, it should be free to explore and investigate. You could say: "What the heck is the hack part of it..." Well, making your own levels in a website online by dragging some stuff on an area, give it a name and play it directly on the phone is really kinda new and funny. The fact that it is done with Windows Phone, an existing game engine and solution ported to the phone and azure and hooking it all up into some game system; is some kind of a hack. Check it all out here: http://www.freemasonace.com I instantly have read again the story about SpaceWars on the PDP-1 and, boy. some story that is. Wanna know something about the real heroes of the first programming hours? Read that story and get the book "Hackers" from Levy. Well, have fun out there. Just be careful. Ow, I've put a new site in the air: http://hackersinformation.com Check it out.... "Acta non verba - in nubibus" How to Authenticate Web Users with Windows Azure Active Directory Access Control is an easy task, if all steps are mentioned. Besides, a video shows often more than pictures can make clear. That's why I made a video wherein I make this principle of using more identity providers for an MVC application really work. It'll start with one video with the overall picture. If I think some things should need more focus, I will add videos. The video is companioned with an internet address with the text backing up the video. This text doesn't have the critical step to make all things work, which step you WILL find in the video. https://www.windowsazure.com/en-us/develop/net/how-to-guides/access-control/ http://msdn.microsoft.com/en-us/library/gg185972.aspx ![]()
"per aspera ad astra! " Windows Azure PowerShell is a powerful scripting environment that you can use to control and automate the deployment and management of your workloads in Windows Azure. Whether you are experienced with Windows PowerShell or a new user, instructions are available to help you get started provisioning virtual machines, setting up virtual networks and cross-premises networks, and managing cloud services in Windows Azure.
Before you can start using the cmdlets in Windows Azure PowerShell, you will need to download and import the module, as well as import and configure information that provides connectivity to Windows Azure through your subscription. For instructions, see Get Started with Windows Azure Cmdlets. http://msdn.microsoft.com/en-us/library/windowsazure/jj156055.aspx To get started with the Windows Azure module for Windows PowerShell, you’ll need to:
http://technet.microsoft.com/en-us/library/hh849812.aspx A Windows Azure management certificate is an X.509 v3 certificate used to authenticate an agent, such as Visual Studio Tools for Windows Azure or a client application that uses the Service Management API, acting on behalf of the subscription owner to manage subscription resources. Windows Azure management certificates are uploaded to Windows Azure and stored at the subscription level. The management certificate store can hold up to 100 certificates per subscription. These certificates are used to authenticate your Windows Azure deployment. http://msdn.microsoft.com/en-us/library/windowsazure/gg551722.aspx Good luck! "aut viam inveniam aut faciam" Before you start working on something, it is essential to have a ticket system like Jira, TFS or the like. Before you choose a ticket system or issue tracker, it is important to define for what you will be using it. TFS for example is mostly focussed on Software Development projects, while Jira is more focussed on overall issues which are more related to processes on a higher level.
This is not a blog about the differences between these ticket applications, but it is about telling you that such a system is essential for work tracking. Without it, you swim in the dark and the project manager, supplier, contractor and client are not able to get the proper insight in what needs to be done, what is already done and are we getting the work done in time, with the given resources and with the given budget. Often I see Excel sheets, documents, email and what not, miss used for issue tracking. If you are in such a situation; be sure of the fact that you have blind spots and you are not aware of all the work done and work coming your way. In other words, you are throwing away money, which belongs to the client. As a contractor it is your responsibility to always make it for the client as transparent as possible what you're going to do, what the workload is, what can be done with whom and for what money. Some sort of an issue and work item tracker is in such cases indispensable. Doing without it is hiding your work behind curtains. The client can be sure that the work done, being done and must be done will stay in the dark and its money is used in some sort of gamble. I give you some links to TFS and Jira, as examples. You can relate these example to other programs alike. I do not believe in gurus. But Brian Keller is a guy I respect a lot for the contributions he did on the topic of Software Development Life Cycle Management with TFS. Check him out and stick with the guy. Brian Keller on TFS and SDLMS http://blogs.msdn.com/b/briankel/?Redirected=true Scrum at Microsoft: See the TFS Agile Team do a Scrum http://www.youtube.com/watch?v=-UUrLxNBK_g Jira in a nutshell http://m.youtube.com/index?&desktop_uri=%2F#/watch?v=xrCJv0fTyR8 Jira tutorial for beginners http://m.youtube.com/index?&desktop_uri=%2F#/watch?v=xIupa-L7rIk Jira tutorial video http://m.youtube.com/index?&desktop_uri=%2F#/watch?v=ca8n9uW3afg Jira to improve visibility and productivity http://m.youtube.com/index?&desktop_uri=%2F#/watch?v=ZsvNMZFnjiU Jira Homepage http://www.atlassian.com/software/jira Happy Cycling... "perfer et obdura; dolor hic tibi proderit olim" More often nowadays I see it happen that suppliers who fight for a contract give presentations which in short suck. More often nowadays I see it happen that the clients are not fully aware that those presentations suck. And more often nowadays I see it happen that the supplier who gets the job doesn't get the job done because its presentation and thus its insights did - indeed - suck. How can we be sure that the supplier knows what it must do and what the project consists of? In the old days we used the good old (Nesma) FPA to check the amount of function points of a system to build. In these days I do not see this happening anymore, only within the really big projects. But everything under the million seems to be target for sloppy planning. http://www.nesma.nl/sectie/home/ How can a supplier be sure how much time it takes to build something without proper function point analysis? I used to work a lot with Cocomo II. It's not the holy grail but what it did and had was analyzing a projects function points compared to a big database wherein we could find similar projects. True, if you didn't know what you was doing, the outcomes sucked also. But, if you knew what you were doing, the outcomes were very interesting. http://csse.usc.edu/tools/COCOMOII.php You can do FPA at three levels: indicative, global and detailed. When project managers came to me for estimations about projects, I gave them three plannings. I gave them an indicative, global and detailed FPA planning on the discovered function points of a system. These function points were surrounded by the Cocomo constructive cost model elements based on function points and the proper chosen programming language. Indeed, this does not give you the certainty that the planning 100% fit the bill, and often the project managers were choosing the indicative to communicate with the client. But, it is far more responsible than what I see happening in these times. They come up with global Use Cases, Story points, System parts and what not and start doing the math on these very global functional system elements. People, that is not enough. To be honest: I use Use Cases and User Stories myself all the time. Also to get a clear picture of the system to build. A nice document about this way of estimating your to build system is included in this post. But, it is not enough. Although this guy Clemmons is doing a real nice job, I prefer to go a bit deeper and take the defined Use Cases and split them up in function points; whether they be indicative, global or detailed. This gives them a more realistic body. Document: clemmons_project_estimation_with_ucp.pdf Having said this I think that it must be clear by now that the planning of the system to build is a serious business and not something you can do in a global functional and commercial presentation. It is not enough when a supplier answers the project questionnaire all positive. That gives us not enough proof that they understand what they have to do. At least we want the suppliers to have a clear picture of the complexity of the system to build and the knowledge of how many functional elements the system has. Another very interesting thing is the quantitative risk analysis for project managers. Included is a paper about it. This paper is the final report of the RAND Internal Research and Development (IR&D) project “Risk Management and Risk Analysis for Complex Projects: Developing a Research Agenda.” The aim of the project was to survey how quantitative risk management and risk analysis methods were applied to the planning and execution of complex projects, particularly those which planned to utilize new and untried technologies. One recent RAND study indicated that such methods, while widely advocated, were not used to plan and manage a critical government satellite development project. This paper recommends several research areas in which RAND could contribute to evaluating the utility of these methods and improving their applicability. Document : rand_wr112.pdf (included) What it shows you is that this quantitative risk analysis means serious business and especially when things are new. When I relate it to SharePoint and Azure for example, then we are talking about new things. When we rig up complex Azure SharePoint farms, combined with BizTalk Azure farms and Navision Azure farms which are interconnected with on premise farms with interconnected AD's, databases, resources and what not; then we are talking about serious business. It is incredible to realize that many suppliers approach these kinds of projects without doing the proper FPA, UCP or quantitative risk analysis. To round things up, I found a nice document about integrated qualitative and quantitative risk analysis of project portfolios submitted for the "Enterprise Risk Management Symposium"of April 2013 in Chicago. Project portfolio risk management and risk analysis is one of the critical components of ERM. Organizations measure and analyze risks associated with projects, project portfolios, and programs. Such risks can be related to project schedules and affect project durations, completion dates, costs, resources, success rates, etc. Document : erm_2013_paper_virine.pdf This integrated qualitative and quantitative risk analysis should somehow be related to upcoming projects for organizations. Just as you can do an indicative, global and detailed FPA or UCP planning; you can also do a indicative, global or detailed integrated qualitative and quantitative risk analysis which depend on the complexity of the project. Not doing it at all is asking for trouble and makes the project more a gamble. The outcome of the project in such a case is more like a poker game of black jack. Don't be surprised if you loose and get hurt. Happy planning. ![]()
![]()
![]()
|
Details
AuthorJaap Zwart (B-ICT) ArchivesCategories |