Archives for Software Dev - Page 25
High level architecture versus High level design
Architecture and design are closely related. Architecture is more abstract and is geared towards strategy, structure and purpose. High Level Design is more hands-on and geared towards implementation and practice.
Preventing your next application from becoming obsolete (in a hurry)…
The development landscape has changed rapidly in the past decade. NoSQL databases, Javascript libraries, Mobile Computing and other technologies have changed the traditional development lifecycle including, changing the end-game. The…
image2docker–getting older ASP.NET webforms apps onto newer OSes
Image2Docker may be the simplest path for getting your older .NET apps working on newer ; It works by extracting either an entire VM or specific 'artificats' from a ;…
What’s NEW in MVC 6.0?
These are some of the bigger changes in MVC 6 Dependency injection built in Cloud optimized versions of MVC, Web API, Web Pages, SignalR, and EF MVC, Web API and…
VPN–Tunnel essentials
Types of Tunnels - Site to Site or Network to Network VPNs can be either remote-access (connecting a computer to a network) or site-to-site (connecting two networks). In a corporate…
How the Internet Works
Company A = large communications provider. Has a PoP (Point of Presence) in each major city. Company B = large corporate with multiple buildings - lays out it's own fiberoptic…
Group Policy Preferences Security Hazards
Domain machines periodically reach out and authenticate to the Domain Controller utilizing the Domain credentials of the logged-in user (these can be, and often are, unprivileged accounts) and pull down…
Token based vs. Certificates based authentication
Read this earlier post on Web Services Security. There are a couple of major difference between a token and a certificate. Tokens are essentially a symmetric key. That means that…
Security certifications
CISSP or CCIE SECURITY? CISSP is an internationally recognized and accredited certification for IT security training, CCIE is a CISCO specific training – and though, several employers require CCIE, most…
Multifactor authentication
Two Factors used in 2FA include : Factor 1 - Something you know (PIN, password, secret questions, etc); Factor 2 - Something you have ( token, key, smartcard, mobile phone)…