Github acquires Semmle

Github acquired Semmle, a service to scan code for vulnerabilities with a semantic code analysis engine. According to The Next Web, no financial details have been disclosed.

Github Blog”Welcoming Semmle to Github

The acquisition happened only one day after Github became a CVE Numbering Authority (CNA)

Competitive Analysis and Strategy To Win

A product’s success is not only defined by its features. Whether it can win in the market to a large extent is owed to the environment it is offered. Customer requirements, competitive offering, market climate, environmental conditions, total cost of ownership (TCO) can have an impact on the products success. A competitive overview is essential for any product manager and a competitive analysis can help sharpen the view.

Product School just today let Joao Fiadeiro share the experience he gathered during his tenure at Google as a Product Manager for Youtube.

Competitive Analysis and Strategy To Win by YouTube PM in Product School.

Competitive Analysis
Competitive Product Analysis

Source: Competitive Analysis and Strategy To Win by YouTube PM – Product School

F-Bomb Analysis

Das Gewalt in amerikanischen Filmen leichter Jugendfreigabe bekommt als Sprache ist ja ein gerne gepflegtes Bonmot. Dass die Regeln dafür teilweise sehr genau definieren, was zum Ausschluß aus bestimmten Kategorien führt, wusste ich bis heute nicht.

In diesen Kategorien wurde – der Wikipedia zufolge – PG-13 1984 als eine Konsequenz einer Debatte um Indiana Jones und Gremlins eingeführt und weist darauf hin, dass der Film für Kinder nicht besonders für Kinder unter 13 geeignet ist.

Wenn Patrick Willems, der Urheber der folgenden Analyse recht hat, gehört zu den Regeln unter der ein Film noch PG-13 sein darf, dass höchstens ein einziges Mal das F*** Wort vorkommen darf. Die Umstände der Verwendung hat er sich einmal angeschaut:

Risk assessment process

  • Threat identification is the review of technical and technical events that may damage a system
  • System characterization is the review of system and data criticality and sensitivity
  • Control analysis is the review of current and planned countermeasures against security requirements checklists.
  • Vulnerability identification is the review of system security procedures, design, implementation, or internal controls that may fail during attacks.