I built a simple web app that lets you create, edit and delete files on your Google Drive.

It's called FileDrop ( https://www.filedrop.io ) and it uses OAuth2 to access the Google Drive API. Google recently announced their new "Drive API v3" which is an evolution of the previous version 2 . ...

Continue Reading
Ransomware can penetrate quickly, significantly damaging an organization.

How to develop a skilled cybersecurity team. What skills should aspiring information security workers possess and work on? What certifications can come in handy more than others? What strategies shoul ...

Continue Reading
I’m a software engineer and I’ve been working in the field for over 10 years.

In that time, I've worked on some really awesome projects with great people. I have experience in both frontend and backend development as well as devops (and everything else). My main focus is JavaS ...

Continue Reading
The most important thing is to make sure you have a good grasp of the material and are well prepared for the exam.

You can do this by doing practice problems, reading through old exams (if your school has them), or both. I've been asked about how I studied for my CFA Level 1 Exam many times since I took it in Dec ...

Continue Reading
I’m a software engineer who loves to build things, and I want to help you do the same.

I have been building web applications for over 10 years now. Most of that time has been spent in the trenches as an individual contributor or small team lead. I am currently working at Pivotal Labs wh ...

Continue Reading
Ransomware can penetrate shortly, considerably damaging a corporation Cloudian issued its 2021 Ransomware Victims Report, based mostly on an impartial survey of 200 IT choice makers whose organizations skilled a ransomware assault between 2019 and 2021.

How you can develop a talented cybersecurity staff What expertise ought to aspiring data safety staff possess and work on? What certifications can come in useful greater than others? What methods ough ...

Continue Reading
Ransomware can penetrate quickly, significantly damaging an organization.

How to develop a skilled cybersecurity team. What skills should aspiring information security workers possess and work on? What certifications can come in handy more than others? What strategies shoul ...

Continue Reading
– A vulnerability in the Node.

js HTTP parser could be exploited to cause a denial of service or potentially execute arbitrary code on systems running an application server using Node.js 6.x through 8.x, either directly or via modu ...

Continue Reading

Back to Main

Subscribe for the latest news: