Congratulations! You have finally built your website after what feels like hours (or even days) of planning and executing. So now what? Its time to make sure that your website is working as expected and is presenting your material in the most effective manner. If you are paying to host your website and you have...Read More
Let’s face it, all organizations should have an incident response plan in place in case the unthinkable happens. It’s a no brainer these days considering how savvy attackers are becoming. Responding to the incident is only part of the equation. The other part is figuring out how to avoid another incident like it again? To...Read More
Technology has evolved to be a critical component of any organizations performance. As the rate of change of technology accelerates, it creates opportunities for organizations to innovate and disrupt in order to create a competitive advantage, and advance the industry as a whole. Although not far behind the times, the healthcare industry is beginning to...Read More
The following post is about how I developed an application named Content Aggregator, utilizing Python and various API’s, that aims to simplify the curation and vetting of online publications and content. The Problem – Too Much to Choose From With the abundance of online sources and social media, deciding on what you should read when...Read More
The following post is about how I developed an application named Sentiment Analyzer, utilizing Python, that aims to quantify the reaction and perception of an audience towards a subject using a popular social media platform. The Problem – How Does My Audience Feel? Understanding how people feel on a given subject can be challenging without...Read More
The following post is about how I developed an application named Medgibility, utilizing Python and various API’s, that aims to promote cost transparency to consumers in healthcare. The Problem – The cost of your healthcare is not transparent or readily available. According to a study published by JAMA Internal Medicine, surprise out-of-network billing and related...Read More
The following is a project I conducted for a company who wanted to created a security council. The real life scenario was given to me below and I was able to to create a report to help justify and sell this need to the President of the company. Background The Office of the President of...Read More
The following is an example of a memorandum framework I created for an organization. Most of the information has been redacted to allow me to post it. TO: CISO FROM: Ravel Charles DATE: 1/13/2017 SUBJECT: Proposed Laws/Regulations and Frameworks Introduction/Purpose The following provides descriptions of proposed Law/Regulation and Control Framework/Standard that our company should consider...Read More
The following is a quick post about transport protocols. Whether you are a network engineer or a systems analyst, it is important to understand how data is transferred from system to system. I will be covering SSL and SSH in this post. SSH stands for Secure Shell and is a protocol that allows people to...Read More
The following is a quick post that outlines the Man in the Middle Attack. With technology evolving as fast as it does, it is important to understand the most popular attacks that exist out there. The issue with HTTP is that eavesdroppers can intercept your messages. This is problematic when it comes to sending confidential...Read More