|
|
|
|
| Vladimir Mencl received his PhD in computer science (CS) from Charles University in Prague and became a reviewer for Computing Reviews while working as a researcher there. After a few years of academic work, Mencl moved to New Zealand and switched his career from being an academic himself to supporting researchers across various disciplines: first as a member of the team running the BlueFern supercomputer at the University of Canterbury, and later supporting the research community from REANNZ, New Zealand's Research and Education Advanced Network.
Throughout his career, Mencl has kept the Computing Reviews affiliation, both as a way (and nudge) to keep learning new developments outside his immediate areas of focus and as a way to give back to the community.
|
|
|
|
Date Reviewed |
|
|
1 - 8 of 8
reviews
|
|
|
|
|
|
|
|
Establishing SRE foundations: a step-by-step guide to introducing site reliability engineering in software delivery organizations Ukis V., Pearson, Hoboken, NJ, 2023. 560 pp. Type: Book (0137424604) In a product-oriented organization, how do you get product operations, product development, and product owners to work together? Traditional methodologies like the Information Technology Infrastructure Library (ITIL) or Control Objectives for Info...
|
Apr 6 2023 |
|
|
|
|
|
|
A study examining relationships between micro patterns and security vulnerabilities Sultana K., Williams B., Bhowmik T. Software Quality Journal 27(1): 5-41, 2019. Type: Article
Do you have an unlimited budget for code review and testing? Or can you ignore security vulnerabilities in the code? If not, you might be interested in this novel way of allocating code review and testing resources to better detect sec...
|
Nov 5 2020 |
|
|
|
|
|
|
A study examining relationships between micro patterns and security vulnerabilities Sultana K., Williams B., Bhowmik T. Software Quality Journal 27(1): 5-41, 2019. Type: Article
Do you have an unlimited budget for code review and testing? Or can you ignore security vulnerabilities in the code? If not, you might be interested in this novel way of allocating code review and testing resources to better detect sec...
|
Nov 5 2020 |
|
|
|
|
|
|
Designing password policies for strength and usability Shay R., Komanduri S., Durity A., Huh P., Mazurek M., Segreti S., Ur B., Bauer L., Christin N., Cranor L. ACM Transactions on Information and System Security 18(4): Article No. 13, 2016. Type: Article
Have you ever wondered why some websites use really annoying password policies? Or have you been responsible for designing a password policy for your organization, and been caught between the users’ demands for easy-to-rememb...
|
Jun 27 2017 |
|
|
|
|
|
|
Designing password policies for strength and usability Shay R., Komanduri S., Durity A., Huh P., Mazurek M., Segreti S., Ur B., Bauer L., Christin N., Cranor L. ACM Transactions on Information and System Security 18(4): Article No. 13, 2016. Type: Article
Have you ever wondered why some websites use really annoying password policies? Or have you been responsible for designing a password policy for your organization, and been caught between the users’ demands for easy-to-rememb...
|
Jun 27 2017 |
|
|
|
|
|
|
Privacy preserved attribute aggregation to avoid correlation of user activities across Shibboleth SPs Nakamura M., Nishimura T., Yamaji K., Sato H., Okabe Y. COMPSACW 2013 (Proceedings of the 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops, Kyoto, Japan, Jul 22-26, 2013) 367-372, 2013. Type: Proceedings
Have you ever encountered a problem where you thought you had to dig a tunnel through the hard way, but then saw you can instead fly around it?...
|
Jun 11 2014 |
|
|
|
|
|
|
Privacy preserved attribute aggregation to avoid correlation of user activities across Shibboleth SPs Nakamura M., Nishimura T., Yamaji K., Sato H., Okabe Y. COMPSACW 2013 (Proceedings of the 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops, Kyoto, Japan, Jul 22-26, 2013) 367-372, 2013. Type: Proceedings
Have you ever encountered a problem where you thought you had to dig a tunnel through the hard way, but then saw you can instead fly around it?...
|
Jun 11 2014 |
|
|
|
|
|
|
Tool support for detecting defects in object-oriented models Górski J., Jarzebowicz A., Leszczyna R., Miler J., Olszewski M. In Enhanced methods in computer security, biometric and artificial intelligence systems. London: Springer-Verlag, 2005. Type: Book Chapter
Defects in object-oriented designs are more costly to repair if they are detected later in the software development process. Early detection of defects should significantly reduce development costs. Apart from detecting obvious syntact...
|
Nov 6 2006 |
|
|
|
|
|
|
|
|
|
|
|