The following is a quick post that should help you understand how SQL Injections work. SQL Injection is a software vulnerability that is introduced into the computing environment when developers create dynamic SQL queries that require user input. These types of attacks can affect most programming languages with any type of database. The following is...Read More
The following is my opinion on whether or not Uber is a disruptive technology. I hope you enjoy the read. Uber first came into the scene by launching a product that was truly disruptive. Disruptive technology can be defined as any enhanced or completely new technology that replaces and disrupts an existing technology, rendering it...Read More
In the world of healthcare and interoperability you probably have been hearing the term “FHIR” a lot recently. Actually pronounced “FIRE”, FHIR stands for Fast Healthcare Interoperability Resources. At a high level, it is a standard that describes data formats, its elements and an API for exchanging electronic health records. It was created by the...Read More
The following is a quick post on how to interpret Database Corruption. More specifically, we will be looking at SQL Server. Sql Server is Microsoft’s popular database engine that uses Structured Query Language (SQL) to accept requests for data access. There are many types of corruption that can occur. Corruption usually occurs when there is...Read More
The following post is a quick walkthrough on how to set up a secure password storing policy. In application security, it is very important to have a secure and reliable password storage policy. I hope you fine the following to be useful and maybe even implement it in your organization. When designing an application, I...Read More
Whether you are looking to go back to school or take a class or two, online courses is an option that most schools will offer you during this day and age. The following is a my personal opinion on Online Courses, its disruptiveness and some advantages/disadvantages from both sides of the equation (teachers & students. Likely...Read More
This is a quick post to help you in your understanding of Trust Models and how it relates to cryptography. The trust models can be broken down to several degrees of trust. In general Trust model can be defined as “the type of trust relationship that can exist between individuals or entities. For example, direct...Read More
The following is an high level overview of Cryptography. I hope this post lays the foundation in your understanding of information travels securely across the internet. Essentially, cryptography is the basis of how information travels securely across the World Wide Web. Both end-users, such as ourselves, and large corporations make use of cryptography in their...Read More
The following is post that can help you understand all the database lingo you may hear from your database architects/engineers. I hope this post helps you keep up in those technical conversations in the work place! This post will cover: Data Mart, Operational Data Store, Data Dictionary, Metadata, Master Data Management, Business Intelligence, Index, Primary...Read More
In this post, you will quickly learn about why IT Projects fail. This type of information can be useful in your next planning meeting for retrospective at work! Roughly about 68% of all IT projects fail. Listed below are 8 reasons why IT projects fail: Failure to understand what results the project needs to meet...Read More