Blog

Stories of the adventurous life

We’re living in the golden age of software development

Software, as Marc Andreessen says, is eating the world. Everything we do is mediated through someone’s code — running on a smart thermostat, a smartphone, the old familiar PC, or as a microservice in an ever-expanding cloud. We’re finally delivering on the decades-old promise of a ubiquitous computing world. But more than that, from the […]

Why You Need a Web Application Firewall (WAF)

Hackers are getting control of web servers for different reasons, the main ones being the ability to control a server and spread malware.  Often, these two objectives go hand in hand. Why do hackers want to control a web server? Because a server is often hundreds of times more powerful than a workstation and that […]

Face it: Enterprise cyberattacks are going to happen

There are now so many cyberattacks that many enterprises simply accept that hackers and bad actors will find ways to break into their systems. A strategy some large businesses have developed over the past two years has been to quickly identify and isolate these attacks, possibly by shutting down part of a system or network […]

Serverless: The future of cloud computing?

Serverless: The future of cloud computing? While the cloud lends companies more agility, New York Times CTO Nick Rockwell says event-triggered computing cuts cost and enables more efficient application development. Welcome to the serverless era. Find out more by reading the article below… https://www.cio.com/article/3244644/cloud-computing/serverless-the-future-of-cloud-computing.html  

Is Cloud Storage Really Secure?

A reader asks: “Where does cloud storage really reside? And is it secure?” Quentin Hardy, The Times’s deputy technology editor, considers the question. _____ “Cloud” data is stored on hard drives (much the way data is usually stored). And yes, it’s probably more secure than conventionally stored data. What makes cloud storage different? Instead of being stored directly […]