Skip to main content

New Public Key

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: Mailvelope v3.1.0
Comment: https://www.mailvelope.com
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=nXnz
-----END PGP PUBLIC KEY BLOCK-----

Comments

Unknown said…
Pretty.

Popular posts from this blog

 In software engineering, accumulating code behind a release wall is akin to gathering water behind a dam. Just as a dam must be built higher and stronger to contain an increasing volume of water, the more code we delay releasing, the more resources we must allocate to prevent a catastrophic flood—major bugs or system failures—while also managing the inevitable trickles—minor issues and defects. Frequent, smaller releases act like controlled spillways, effectively managing the flow of updates and reducing the risk of overwhelming both the system and the team. The ideal of ci/cd may not be achievable for all teams, but smaller and faster is always better.

Preventing accidental large deletes.

Instructions for Developers on Using the safe_delete Stored Procedure To enhance safety and auditability of delete operations within our databases, we have implemented a controlled deletion process using a stored procedure named safe_delete . This procedure relies on a temporary table ( temp_delete_table ) that lists complete records intended for deletion, not just their IDs. This approach helps prevent accidental deletions and provides a traceable audit log of delete actions. Why We Are Doing This Controlled Deletions : Centralizing delete operations through a stored procedure reduces the risk of erroneous or unauthorized deletions. Auditability : Using a temporary table to store complete records before deletion allows for an in-depth review and verification process, enhancing our ability to confirm and audit delete operations accurately. Security : Restricting direct delete permissions and channeling deletions through a specific proced...

October is Cyber Security Month

The President has declared October as Cybersecurity month.  It's not a bad idea -- just like you change the batteries in your smoke detectors once a year, maybe you should review your electronic vulbnerabilities? My top ten security tips: 1) Change your passwords.  You've had them too long, you use the same password in too many places.  Somewhere someone has hacked a site that has your username and password in plain text.  Now they are getting ready to try that username/password somewhere else.  Beat them to the punch. 2) Use a safe browser.  That means anything that's not Internet Explorer.   I prefer chrome. 3) Use 2 step verification for your email account.  If your email doesn't provide 2 step authentication consider switching. 4) Get a free credit report  and review it.  You are entitled to one free report a year.   BE VERY CAREFUL!  There are man scam sites that offer free credit reports.  Go through the s...