whoisjoe.com

Security, people, process, and resilient software.

84 published stories
Hero

The High Cost of an Application Security Data Breach

In the wake of the Sony Security Breaches (breaches, you say? As in plural? Yes, read on for more information) I decided to update some of our instructor led training slide deck...

Hero

Using the ConfigurationManager to Access your ConnecitonStrings in the Web.Config

This is just a quick post because I couldn’t find this information easily available on other sites. I knew there was a quick way to access the connection strings from the web.co...

Hero

When is it OK to Build up Technical Debt

As I previously mentioned I’ve been writing a bit of Ruby on Rails. I’m surprised at how quickly I can slap something together and get results, especially prototypes, up and run...

Hero

Time Management with the Pomodoro Technique

About 6 months ago it seemed like the internet was infatuated with a new time management technique called “Pomodoro.” Developed by Francesco Cirillo, The Pomodoro Technique is a...