since 1999

Prioritizing cybersecurity (Pluralsight)

The structure and siloing of a large enterprise organization can thwart security efforts. Here is a tip on how to overcome.

How to win the race with hackers when new vulnerabilities are publicly disclosed!

Keeping deployed web applications up-to-date is imperative to prevent data breaches. Here's how to use automated testing of custom web application software to patch quickly after a support chain vulnerability is publicly disclosed.

Case Study: Migration of Public Service On-Prem to AWS Cloud

How Rietta planned and implemented a multi-step process to fully migrate a monolithic on-prem Rails application to the the AWS cloud using Docker, AWS Elastic Container Service, the AWS Secrets Manager, and more.

Case Study: Complex Insurance Document Solution with LibreOffice, Docker, and AWS

How Rietta built a complex document solution that seamlessly deploys to AWS using purely open source technology.

Top 5 Tips and Tricks on Developing with Docker

A five tips and tricks I've built up working daily with Docker professionally for three years.

Dockerizing Development Saves Serious Money for Small Agency

Systematic investment in Docker is paying off big time. From a agency owner's perspective this is why the up front investment was worth it.

How to Set Up and Encrypt an External SSD and Run Docker Images Externally

Running multiple Docker images locally can eat up a lot of disk space. Computers with smaller hard drives will have a problem keeping up. We can mitigate this issue by setting up an encrypted external ssd to run our Docker images and free up local disk space

Learning Object-Oriented Programming in Ruby vs C/C++

Learning object-oriented programming is a fundamental piece of computer science education. But is C/C++ the best environment to do it in?

Implementing Proper Application Maintenance Practices

Technology changes, application functionalities will be deprecated and vulnerable to security threats. This is why consistent, and proper maintenance is essential.

Automate Scheduled Security Scans With CircleCI

Stay on top of vulnerabilities by automating security scans with workflow schedules