The Rietta Blog
Since 2005, this publication covers a wide range of topics, including cybersecurity, software development, and cloud migration. It’s a valuable resource for anyone interested in staying informed about these areas.
05/14/2024
UUID as a secure API token for API RESTful endpoints? (Video)
by Frank Rietta
Video excerpt about the role of UUIDs as a security identifier for REST API and how to use them more securely if you must.
05/08/2024
Restoring Old Software for Child Learning Safety
by Frank Rietta
Learn why classic software like WordPerfect & 1st Math can boost your child's development! Explore safe retro tech & conquer digital learning challenges.
11/28/2023
An Honest Conversation About Cyber Security (Video)
by Frank Rietta
I recently sat down with Jeremy Duvall of 7Factor Software to discuss Cyber Security and application developers. Enjoy this video!
09/27/2023
Prioritizing cybersecurity (Pluralsight)
by Frank Rietta
The structure and siloing of a large enterprise organization can thwart security efforts. Here is a tip on how to overcome.
04/04/2023
How to win the race with hackers when new vulnerabilities are publicly disclosed!
by Frank Rietta
Keeping deployed web applications up-to-date is imperative to prevent data breaches. Here's how to use automated testing of custom web application software to patch quickly after a support chain vulnerability is publicly disclosed.
10/04/2022
Case Study: Migration of Public Service On-Prem to AWS Cloud
by Frank Rietta
How Rietta planned and implemented a multi-step process to fully migrate a monolithic on-prem Rails application to the the AWS cloud using Docker, AWS Elastic Container Service, the AWS Secrets Manager, and more.
09/26/2022
Case Study: Complex Insurance Document Solution with LibreOffice, Docker, and AWS
by Frank Rietta
How Rietta built a complex document solution that seamlessly deploys to AWS using purely open source technology.
09/21/2022
Top 5 Tips and Tricks on Developing with Docker
by Frank Rietta
A five tips and tricks I've built up working daily with Docker professionally for three years.
10/01/2021
You Can be the Victim of a Cybersecurity Attack: Do Your Part. #BeCyberSmart.
by Frank Rietta
Be cyber smart by recognizing that you can be the victim of a cyber security incident and that you have to keep your Internet connected custom software securely configured and patched up-to-date at all times. Do Your Part. #BeCyberSmart.
08/31/2021
The Ripples From SolarWinds
by Wren Steitle
The effects of the Solar Winds breach are felt throughout the tech community. More important than the breach though is the aftermath and the response to the incident. How does that affect others?