The structure and siloing of a large enterprise organization can thwart security efforts. Here is a tip on how to overcome.
Keeping deployed web applications up-to-date is imperative to prevent data breaches. Here's how to use automated testing of custom web application software to patch quickly after a support chain vulnerability is publicly disclosed.
A five tips and tricks I've built up working daily with Docker professionally for three years.
The effects of the Solar Winds breach are felt throughout the tech community. More important than the breach though is the aftermath and the response to the incident. How does that affect others?
Dr. Brad J. Cox Ph.D., influential computer scientist, co-inventor of the Objective C object oriented programming language, influencer of modern programming based on reusability of software components, has died.
How to ensure your high quality microphone is always used and not the low quality USB webcam audio when joining Google Meet, Zoom, Microsoft Teams, and other video calls. Block list the webcam sound with udev and use it only for video, not audio.
Code review and style guides are valuable when delivering clean and reliable code which is a team effort, especially in distributed teams.
Technology changes, application functionalities will be deprecated and vulnerable to security threats. This is why consistent, and proper maintenance is essential.
The MySQL decimal (A.K.A. numeric) data type can be used to store the exact numerical value with a fixed point decimal. The Syntax of MySQL's decimal is "DECIMAL(precision, scale)".
Even though Git has been the dominant VCS for over a decade, some popular open-source projects don't properly accredit contributors. Open-source projects have a ethical obligation to properly portray the work that was done to the project.