Archives for Software Dev - Page 4
Active Directory on Google Cloud Platform
This post is about hosting your AD on GCP. It is not about syncing gSuite and AD users. Typically, in Cloud IAM, you would bring over your gSuite users by…
Azure Devops – Features, Epics, User Stories and Tasks
High Level and Lower Level Components in Agile (azure devops) Epics and Features are higher level containers. User Stories and Tasks are more sub-level components. Epics can DIRECTLY be broken…
Caffeine and Mindfulness – Alertness versus Awareness
Often, people confuse alertness with mindfulness. The two are as far apart as can be. The impatient driver on the road, or the one person who leaves their faucet running, is…
Mail Drop Feature in iCloud to free up space
If your email boxes are running out of space on your iPhone, there is a way you can free up a lot of space. This applies to the default iCloud…
Transferring names out of network solutions
Most registrars make it simple to transfer out to another registrar. Not Network Solutions. They still haven't gotten over losing their monopolistic hold on domain name registrations. In a futile…
Lenovo won’t power on
Unplug batter, unplug power. Replug both in. Hold power button for fifteen seconds and then release the power button. This should turn on your laptop.
Diffie Helman, Symmetric and Asymmetric Encryption
Symmetric Encryption has two potential drawbacks. The first of these is the commonly known Man in the Middle attack. The second is a limitation on reuse. Man in the Middle…
Read Only vs. Spend Transactions
Read Only Transactions Cost no money. They are executed against your local node only. Transactions that modify state cost money (gas). These need to be transmitted (broadcast) to the entire…
CSR , TBSCertificate and Private Keys
Do I need to send (or even possess) a private key to request an SSL Certificate? Believe it or not, no - you do not need to even possess the…