The changing landscape of programming technology
1 / 16

the changing landscape of programming technology - PowerPoint PPT Presentation

  • Uploaded on

The Changing Landscape of Programming Technology. Karl Lieberherr Northeastern University. Swiss connection. PhD from ETH Zurich: Pascal, Modula, Oberon (Wirth) Sabbatical 2000 with UBS Zurich Sabbatical 2006 with Novartis Collaborations with ABB and Mettler-Toledo One Swiss PhD

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about 'the changing landscape of programming technology' - Jeffrey

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
The changing landscape of programming technology l.jpg

The Changing Landscape of Programming Technology

Karl Lieberherr

Northeastern University

Friends of Switzerland

Swiss connection l.jpg
Swiss connection

  • PhD from ETH Zurich: Pascal, Modula, Oberon (Wirth)

  • Sabbatical 2000 with UBS Zurich

  • Sabbatical 2006 with Novartis

  • Collaborations with ABB and Mettler-Toledo

  • One Swiss PhD

  • Yearly summer vacation in Switzerland

Friends of Switzerland

How i came to boston l.jpg
How I came to Boston

  • 1983: GTE in Waltham, now Verizon

  • 1985: tenured full professor at Northeastern

  • I like it here!

Friends of Switzerland

Slide4 l.jpg

  • We want reliable and secure software.

  • No technical vulnerabilities.

  • Not enough: social vulnerabilities are also very important in the age of the web.

Friends of Switzerland

Outline l.jpg

  • Program Organization

    • Crosscutting Concerns

    • Law of Demeter

  • Programming Team Organization

    • Extreme Programming

  • Security:

    • Social Phishing

    • SAT solvers

Friends of Switzerland

Software bugs l.jpg
Software bugs

  • Excel 2007 multiplication bug: September 2007

    • 850 * 77.1 should be 65535 but displays as 100000.

Friends of Switzerland

Program organization l.jpg
Program Organization

  • cross-cutting concerns

  • the tyranny of the primary decomposition

    • organize software into modules

  • group functionality that lives in several modules

Friends of Switzerland

Law of demeter l.jpg
Law of Demeter

  • Organization principle for objects

    • “talk only to your friends”

    • “each object talks only to a limited number of other objects”

    • avoids information overload for the programmer

    • from Northeastern

  • Leads to objects that are easier to change

Friends of Switzerland

Extreme programming l.jpg
Extreme Programming

  • Planning around User Stories

  • Small Releases of Functionality

  • Simple Design

    • build what is asked for, no design for the future

  • Continuous testing

Friends of Switzerland

Extreme programming10 l.jpg
Extreme Programming

  • Pair Programming

  • Collective Product (Code) Ownership

    • Design, Coding Standards

  • Continuous integration

  • On-site Customer Representative

Friends of Switzerland

Sat solvers l.jpg
SAT Solvers

  • a fundamental topic in computer science

  • express your “wishes”

  • computer satisfies as many as possible

  • used for software and hardware verification

  • based on learning from mistakes (non-chronological backtracking)

  • can solve systems with over 100000 parameters (variables)

Friends of Switzerland

Social phishing l.jpg
Social Phishing

  • friendly email message tempts recipients to reveal more online than they otherwise would.

  • impersonating a trustworthy entity

Friends of Switzerland

Class project at johns hopkins l.jpg
class project at Johns Hopkins

  • find publicly available information from social networks: MySpace, Facebook, LinkedIn.

  • how can a phisher exploit social network data? very easily and effectively

  • over four times as likely to become a victim if they are solicited by someone appearing to be a known acquaintance

Friends of Switzerland

Observations l.jpg

  • 77% females, 65% males

  • But trick males by sending them a spoofed message appearing to come from a female (68% if message from female versus 53% if from another male)

  • somewhat reassuringly: computer science students were the least vulnerable

Friends of Switzerland

Observations observed reactions after debriefing message l.jpg
Observations: observed reactions after debriefing message

  • Anger

    • significant social cost to victims

  • Denial

    • we find it difficult to admit our own vulnerability: many successful phishing attacks go unreported

Friends of Switzerland

Conclusions l.jpg

  • Still a very exciting time in computer and information science.

  • Computer science students have excellent job prospects, despite outsourcing.

Friends of Switzerland