Working on numerous projects can require significant time to set up locally. With Docker, we have streamlined this process to mere minutes.
Technology purchases cannot solve application security. Improving security is a matter of people, processes, and technology. Here's how to invest developer education and processes first.
Running multiple Docker images locally can eat up a lot of disk space. Computers with smaller hard drives will have a problem keeping up. We can mitigate this issue by setting up an encrypted external ssd to run our Docker images and free up local disk space
As a computing professional, top end computers are a necessity for your livelihood. Here's how setting aside just $69/month will ensure you can buy a new computer at any time and have the funds for guilt free technology splurges.
Why I optimize for redundancy via RAID and multiple computers as a developer for whom development time is money instead of relying on a single high end laptop.
Frank Rietta guest on the Application Security Podcast with Chris Romeo
Best thank you note form a client ever! Custom painting on canvas.
Technology changes, application functionalities will be deprecated and vulnerable to security threats. This is why consistent, and proper maintenance is essential.
When Georgia was on the Brink of Outlawing Critical Computer Security Research, the Governor's Office Met with Me, and Vetoed it!
On April 25, 2018, nine information security professionals met with the Georgia Governor's office to discuss why the proposed criminal hacking law passed by both houses of the General Assembly was extremely problematic to Georgia's booming Information Security industry and risked putting the public at greater risk. Governor Deal vetoed the law a few weeks later.
Podcast interview about Ruby on Rails dependencies, security, state-sponsored hacking, and practical tips on how to protect your organization.