Friday, July 21, 2017 Page Options

Vashon Software

You are here > Blogola
By John on 6/22/2011 12:51 PM

from, Arien Malec, ONC’s Direct Project Coordinator, responded to my...
By John on 6/17/2011 7:50 AM

CONNECT 3.2 ReleasedCONNECT is an open source software solution that supports health information exchange at the local & national level. CONNECT is a reference implementation of the Nationwide Health Information Network (NwHIN) standards and governance, helping ensure health information exchanges are compatible with other private and state level exchanges being set up throughout the country.

On June 10th, CONNECT version 3.2 was released – a reasonable hiatus since the September 15th version 3.1 release – especially considering the loss of CONNECT stalwarts David Riley and Vanessa Manchester to the Alembic Foundation...
By John on 6/14/2011 6:48 AM

The White House announced today it intends to eliminate the public’s access to half of the federal government’s websites within the next year.  The White House said there are nearly 2,000 websites operated by the federal government, which it said confuses people.

“With so many separate sites, Americans often do not know where to turn for information,” the office of Vice President Joseph Biden Jr. said in a statement. “The administration will immediately put a halt to the creation of new websites. The administration will also shut down or consolidate 25% of the 2,000 sites over the next few months and set a goal of cutting the number of separate, standalone...
By John on 6/7/2011 7:43 AM

The new jQuery 1.6 release splits DOM attributes and DOM properties into separate methods:

DOM attributes represent the state of DOM information as retrieved from the document, & DOM properties represent the dynamic state of the document. The performance benefits primarily appear to be realized when using .attr(“value) or .attr(“name”,”value”) and .data()’s getData and setData events.

One can now also specify relative values in CSS:

// Move an item 10px over $("#item").css("left", "+=10px"); .csharpcode, .csharpcode pre { font-size: small; color: black; font-family: consolas, "Courier New", courier, monospace; background-color: #ffffff; /*white-space: pre;*/ } .csharpcode pre { margin: 0em; } .csharpcode .rem { color: #008000; } .csharpcode .kwrd { color: #0000ff; } .csharpcode .str { color: #006080; } .csharpcode .op { color: #0000c0; } .csharpcode .preproc { color: #cc6633; } .csharpcode...
By John on 6/7/2011 7:10 AM

rsa_0RSA Security is offering to provide security monitoring and replace its well-known SecurID tokens—devices used by millions of corporate workers to securely log on to their computers—"for virtually every customer we have," the company's Chairman Art Coviello said in an interview.

In a letter to customers Monday, the EMC Corp. unit openly acknowledged for the first time that intruders had breached its security systems at defense contractor Lockheed Martin Corp. using...
By John on 6/7/2011 6:51 AM

With any new theater come new techniques to gather intelligence. New warfighting capabilities are drawn up. That's the phase we're in right now.

- Herbert Thompson, professor of cybersecurity at Columbia University and chief security strategist of People Security

In March, unidentified hackers penetrated RSA, a top U.S. cybersecurity company, and stole complex security codes. At the same time, intruders broke into Google's Gmail system and stole passwords, enabling them to potentially gain access to sensitive facilities or information.

Cybersecurity experts say these recent intrusions are the most sophisticated hacking efforts ever perpetrated against private computer networks. Even more worrisome, such actions could have set the stage for cyberwar. The perpetrators may have gained the capability to identify targets, assess vulnerabilities and position themselves for future attacks.

"I think what we're seeing today are the reconnaissance activities of cyberwar,"...
By John on 6/7/2011 6:43 AM

One in four U.S. hackers is an FBI informant, according to an investigation by Britain's Guardian newspaper.

The world of computer hacking has been "so thoroughly infiltrated in the U.S. by the FBI and secret service that it is now riddled with paranoia and mistrust," the paper claims in a report published Monday.

The best-known example of the turncoat "phenomenon," the paper says, is Adrian Lamo, a convicted hacker who turned informant on Bradley Manning, a United States Army soldier who was arrested in May 2010 in Iraq on suspicion of of passing secret documents to the whistle-blower website WikiLeaks.


By John on 6/7/2011 6:15 AM

About 42 million people were forced to flee their homes because of natural disasters around the world in 2010, more than double the number during the previous year, experts said Monday.

One reason for the increase in the figure could be climate change, and the international community should be doing more to contain it, the experts said.

The Internal Displacement Monitoring Centre said the increase from 17 million displaced people in 2009 was mainly due to the impact of "mega-disasters" such as the massive floods in China and Pakistan and the earthquakes in Chile and Haiti.

- Read full story:

By John on 6/6/2011 7:33 PM

David Riley, President of the Alembic FoundationThe Aurion Project has announced the heir apparent to Connect 3.1:

Aurion is an open source health information exchange platform that implements the Nationwide Health Information Network standard services and content specifications. Aurion is the first project chartered through the Alembic Foundation. This software enables the secure exchange of interoperable health information among diverse organizations using a wide variety of technologies.

Organizations implementing Aurion as a part of their health information exchange strategy gain the benefits of implementing nationally-recognized standards...
Skip Navigation Links.
Working the Digital Landscape
 Search the Blogs
Privacy Statement | Terms Of Use | 10506 SW 132nd Pl. | Vashon, WA 98070 | 206-914-3050