Skip to main content
Public OpenPGP key of Daniel Fishman

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: OpenPGP.js v.1.20130820
Comment: http://openpgpjs.org
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=wSrX
-----END PGP PUBLIC KEY BLOCK-----

*** exported with www.mailvelope.com ***P key of Daniel Fishman

Comments

MrVicchio said…
Dan, Dan dan the fishmerman? From the Ranch? Long hair, and a neck beard?

That Dan? That went to UT?
MrVicchio said…
Dan, as in the Ranch, as in long hair, played soccer and Nintendo? How goes it?

Popular posts from this blog

Preventing accidental large deletes.

Instructions for Developers on Using the safe_delete Stored Procedure To enhance safety and auditability of delete operations within our databases, we have implemented a controlled deletion process using a stored procedure named safe_delete . This procedure relies on a temporary table ( temp_delete_table ) that lists complete records intended for deletion, not just their IDs. This approach helps prevent accidental deletions and provides a traceable audit log of delete actions. Why We Are Doing This Controlled Deletions : Centralizing delete operations through a stored procedure reduces the risk of erroneous or unauthorized deletions. Auditability : Using a temporary table to store complete records before deletion allows for an in-depth review and verification process, enhancing our ability to confirm and audit delete operations accurately. Security : Restricting direct delete permissions and channeling deletions through a specific proced...
 In software engineering, accumulating code behind a release wall is akin to gathering water behind a dam. Just as a dam must be built higher and stronger to contain an increasing volume of water, the more code we delay releasing, the more resources we must allocate to prevent a catastrophic flood—major bugs or system failures—while also managing the inevitable trickles—minor issues and defects. Frequent, smaller releases act like controlled spillways, effectively managing the flow of updates and reducing the risk of overwhelming both the system and the team. The ideal of ci/cd may not be achievable for all teams, but smaller and faster is always better.

October is Cyber Security Month

The President has declared October as Cybersecurity month.  It's not a bad idea -- just like you change the batteries in your smoke detectors once a year, maybe you should review your electronic vulbnerabilities? My top ten security tips: 1) Change your passwords.  You've had them too long, you use the same password in too many places.  Somewhere someone has hacked a site that has your username and password in plain text.  Now they are getting ready to try that username/password somewhere else.  Beat them to the punch. 2) Use a safe browser.  That means anything that's not Internet Explorer.   I prefer chrome. 3) Use 2 step verification for your email account.  If your email doesn't provide 2 step authentication consider switching. 4) Get a free credit report  and review it.  You are entitled to one free report a year.   BE VERY CAREFUL!  There are man scam sites that offer free credit reports.  Go through the s...