Weak References

The unsolicited and inept out pourings of my mind, mostly regarding Computer Science, Engineering etc.

Thursday, 5 October 2017

The Leaky Ship of MFA.

›
We've just finished getting PCI compliance for our SaaS offering at work. One of the interesting things around this is the need for Mul...
Monday, 18 September 2017

Lessons never learned, Equifax

›
It's curious looking at the fall out over the Equifax hack. I've been biting my tongue, not wanting to add to the hyperbole, but th...
Wednesday, 23 August 2017

Entropy & Passwords

›
I've been putting off writing this for a while, mostly because I hope that this should be obvious to people in the security world. ...
Thursday, 3 August 2017

Trust. No. One. - Zero Trust in Networking.

›
It's funny how quickly things change. Especially so when it comes to technology and the internet. In some ways security reflects this ...
Monday, 21 March 2016

RDF Store, Part 1: Implementing B-Trees

›
Data structures are awesome! Seriously, I know that is probably one of the most geekiest things I have ever said, it's really true. Thin...
Monday, 14 March 2016

The current main stream ways of storing data suck but it's not their fault.

›
The current main stream ways of storing data suck, but the problem isn't them, it's us. We've moved on, and the way we store da...
Monday, 7 March 2016

Erlang, is it really viable?

›
Lately, I've been looking for a language to write a pet project in. Realistically I will most likely fall back onto on the languages I f...
›
Home
View web version

Contributors

  • Unknown
  • Unknown
Powered by Blogger.