When working on a new web application there are some crucial aspects to your application security that all developers should follow. This applies to both a production and test environment. Just because an application is in-test or not production-ready does not excuse poor security. There are a few examples of where even ‘secure’ environments have been exploited through their test systems. Secure Development Environments Should not use real-world data and should rely on faker or placeholder data. This can be more time consuming for agile teams as the data may change over time, which is why your ORM models should… Continue reading Building Secure Web Applications
Moving your applications to the cloud can be a polarising task. Some believe that the cloud is the future and the value add outweighs the work involved. Others believe that on premise solutions are best for users and data. Vendor Lock-in Although vendors like Azure may offer greater features or added value than traditional on-premise services, there can often be features that PaaS services offer that are not available in other solutions that can increase the total cost of ownership. Features are not the only drawbacks to cloud solutions, many cloud platforms can offer additional infrastructure or architectures that can… Continue reading Challenges Moving Applications to the Cloud
Fiber optic internet is the newest form of residential cable that is run either to your local distribution cabinet or to your house. Because the maximum bandwidth that can be put down a fiber cable it enables greater speeds along greater distances thanks to its physical properties (light). A fiber optic cable can in some cases be used at 10Gbit/s but for residential its more likely 1Gbit/s or less. Many ISPs will allow you to take advantage of fiber optic but limit the speeds for a reduction in price. How Long Does it Take to Install Fiber? Fiber optic cable… Continue reading What does it take to get Fiber to the Home?
Writing a Minimal Requirement Specification Document for a Software Project
I have a long standing interest in monitoring my daily doings, I previously thought about putting a GPS tracker in my car, a good idea for both tracking my position and also checking to see if it has gone walkies (is stolen). I decided against doing this a while ago due to exams and lack of time to set the whole thing up. But I did decide to have a crack at this idea later with my phone. The way I chose to go about this power hungry task was to use an app like IFTTT to record my position… Continue reading Tracking My Position all the Time
Information systems especially in large businesses are crucial to managing a business effectively, these are some of the advantages and disadvantages.
Hey Thanks for checking out my project, or discovering it organically! Whats the weather? This page shows the output of my outdoor box DHT22 Temperature sensor, powered by two 100w solar panels it can sometimes run out of power, especially late at night on miserable days. The data is updated in 15-minute intervals based on three samples. The data is monitored and transmitted from an esp8266 to my web-server, which is then logged in a google spreadsheet and then published here, only the last 500 entries are kept in the chart, which makes the whole chart 15 hours long. The… Continue reading Woodmansy, Beverley UK Weather Current Temperature and Humidity
Many Businesses use IT to manage their accounts, documents and decision-making. It is, therefore important that Access Control be implemented in Organisations to prevent unwanted modification or prying eyes from being able to commit computer crimes, such as the ones outlined in the Computer Misuse Act. Using Access Control can prevent these people and operational staff from being able to modify information that otherwise is not their place to edit. Some common implementations of Access Control could be limiting the information available to a customer about Transaction Processing Systems or Management Information Systems not allowing Managers access to manufacturer prices.… Continue reading Access Control in Daily IT Organisation Tasks
When you signup for a website. You enter your information (or data). You don’t always get it right and could miss a box or spell your own credentials wrong (garbage), this data in an ICT system is very important that it is minimised. There are numerous ways that this can be accomplished. Data must be correct In order to have an accurate IT solution, your data must be correct, otherwise users may find your solution hard to use. It is important that you minimise GIGO through thorough data validation. Garbage in Garbage Out When you enter data into an ICT… Continue reading Garbage in Garbage Out Data
When data is processed there are multiple methods of processing data, there are several types that all have individual Advantages and Disadvantages. Batch, Interactive and Transaction Processing Batch Processing Batch Processing is when data is processed in ‘batches’ (groups) Advantages Batches mean that the process does not require human interaction, this allows the system to be automated and means that it can be left running for multiple sessions at a time, that could potentially last a long time, This type of process can also allow for custom processing ‘jobs’. Which means that the data can be suited to fit the needs of… Continue reading Advantages and Disadvantages of Types of Processing data