{"id":124,"date":"2014-06-03T13:28:33","date_gmt":"2014-06-03T13:28:33","guid":{"rendered":"http:\/\/thomasgardnerofsalem.wordpress.com\/?p=124"},"modified":"2014-06-03T13:28:33","modified_gmt":"2014-06-03T13:28:33","slug":"cyber-physical","status":"publish","type":"post","link":"https:\/\/tgsoc.org\/tech\/2014\/06\/03\/cyber-physical\/","title":{"rendered":"Cyber-physical"},"content":{"rendered":"<p>We hear a lot about the cloud? What exactly is that? Opaque sink for data which can be used by whomever can obtain access (even if they have no right to the data)? A way for management to get something for nothing (their main objective, it seems) while impairing safety? That topic will continue to be of interest.<\/p>\n<p>Code? We hear a lot about that, too. Code having some meaning <a title=\"Does code matter?\" href=\"http:\/\/thomasgardnerofsalem.wordpress.com\/2014\/05\/30\/does-code-matter\/\"><strong>in and of itself<\/strong><\/a>? Much to discuss there.<\/p>\n<p>This month, ACM Communications (Vol. 57, No. 6) has an article titled: <strong><a href=\"http:\/\/cacm.acm.org\/magazines\/2014\/6\/175172-cyber-physical-testbeds\/abstract\">Cyber-Physical Testbeds<\/a><\/strong>. This is just a brief mention of an important topic. With the coming <a href=\"https:\/\/en.wikipedia.org\/wiki\/Internet_of_Things\"><strong>Internet of things<\/strong><\/a>, the issues here will be of even more importance.<\/p>\n<p>We touched upon the topic about four years ago, <strong><a href=\"http:\/\/7-oops-7.blogspot.com\/2010\/04\/cyber-physical.html\">in another context<\/a><\/strong>. So, the interest is there, especially when biological computing (<a href=\"http:\/\/www.extremetech.com\/extreme\/152074-stanford-creates-biological-transistors-the-final-step-towards-computers-inside-living-cells\"><strong>one of many examples<\/strong><\/a>) is brought into the discourse.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We hear a lot about the cloud? What exactly is that? Opaque sink for data which can be used by whomever can obtain access (even if they have no right to the data)? A way for management to get something for nothing (their main objective, it seems) while impairing safety? That topic will continue to&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-124","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/tgsoc.org\/tech\/wp-json\/wp\/v2\/posts\/124","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tgsoc.org\/tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tgsoc.org\/tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tgsoc.org\/tech\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/tgsoc.org\/tech\/wp-json\/wp\/v2\/comments?post=124"}],"version-history":[{"count":0,"href":"https:\/\/tgsoc.org\/tech\/wp-json\/wp\/v2\/posts\/124\/revisions"}],"wp:attachment":[{"href":"https:\/\/tgsoc.org\/tech\/wp-json\/wp\/v2\/media?parent=124"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tgsoc.org\/tech\/wp-json\/wp\/v2\/categories?post=124"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tgsoc.org\/tech\/wp-json\/wp\/v2\/tags?post=124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}