Reading List

The Selfish Gene
The Psychopath Test: A Journey Through the Madness Industry
Bad Science
The Feynman Lectures on Physics
The Theory of Everything: The Origin and Fate of the Universe


ifknot's favorite books »

Saturday 27 August 2016

Fontastic! Meaningful programming ligatures with FiraCode

Fira Code: monospaced font with programming ligatures


Fira Code is an extension of the Fira Mono font containing a set of ligatures for common programming multi-character combinations. It is easy to install in OS X and works with Qt Creator.

I think I like it :)



Friday 26 August 2016

Qt Creator 4.1.0 released

Qt Creator 4.1.0 Released!


 How To Update:

  1. Run the Maintenance Tool app (found inside your Qt folder).
  2. Follow this (if you need to).
  3. ?
  4. Profit


Saturday 20 August 2016

What is the Government going to do with your Health Data now? Consenting to your Health Data, Opting in or Opting out?



NHS Survival has a great article covering the Government's desire for views on the proposed Data Security In Health policy do you want to consent and have an opt-out?

https://consultations.dh.gov.uk/information/ndg-review-of-data-security-consent-and-opt-outs/consultation/subpage.2016-06-22.4165482086

It's a lengthy but important document here are the proposed standards in a nutshell:

Proposed Data Security Standards
  1.  All staff ensure that personal confidential data is handled, stored and transmitted securely, whether in electronic or paper form. Personal confidential data is only shared for lawful and appropriate purposes.
  2.  All staff understand their responsibilities under the National Data Guardian’s Data Security Standards including their obligation to handle information responsibly and their personal accountability for deliberate or avoidable breaches.
  3.  All staff complete appropriate annual data security training and pass a mandatory test, provided through the revised Information Governance Toolkit.
  4.  Personal confidential data is only accessible to staff who need it for their current role and access is removed as soon as it is no longer required. All access to personal confidential data on IT systems can be attributed to individuals.
  5.  Processes are reviewed at least annually to identify and improve processes which have caused breaches or near misses, or which force staff to use workarounds which compromise data security.
  6.  Cyber-attacks against services are identified and resisted and CareCERT security advice is responded to. Action is taken immediately following a data breach or a near miss, with a report made to senior management within 12 hours of detection.
  7.   A continuity plan is in place to respond to threats to data security, including significant data breaches or near misses, and it is tested once a year as a minimum, with a report to senior management.
  8.   No unsupported operating systems, software or internet browsers are used within the IT estate.
  9.   A strategy is in place for protecting IT systems from cyber threats which is based on a proven cyber security framework such as Cyber Essentials. This is reviewed at least annually.
  10.  Suppliers are held accountable via contracts for protecting the personal confidential data they process and meeting the National Data Guardian’s Data Security Standard.

So I spent a bit of time on the document, here are my answers: