My project of tying together various sensors to work out what is happening around the property is taking shape. I just took delivery of the Hydreon RG-11 Optical Rain Sensor a few days ago, cost $99 plus postage from Ocean Controls. A nifty little unit that makes use of the same technology as rain sensors[…]
The Australian Cyber Security Growth Network (ACSGN) is currently establishing itself.
Technical Debt – A phrase that brings shiver to any experienced engineer or software architect. In this article I’ll explore why it is so Evil and a few basic things you can do to stop it bringing your whole business to a go slow state. (This is a follow-up article from my talk on Technical[…]
As previously mentioned, to diversify my techie skills (and its fun), I have a little side home DIY project on the go to achieve the following: Create a RS485 network, to allow me to easily connect together multiple Arduino’s over a distributed network. Gateway said RS485 network onto the Ethernet network in the house Get[…]
According to a recent report – security looks to be a top concern among Software Architects. In this article I go into detail on one of the core ways in which you can achieve dependable security in evolving online systems – namely defense by depth. What is defense by depth? Simply put this is where one[…]
Software Architects need a combination of skills to be able to succeed and deliver designs that are long lived and able to provide strong commercial value to a business. Below I list what I consider to be the top 5 skills in order to be a good Software Architect. #1 Able to listen and confirm[…]
PII (Personally Identifiable Information) broadly speaking is information that relates directly to the individual (you) and allows you to be individually identified. We explain in this article what it is and how to protect yourself against people trying to steal your identity through PII. Why is PII so dangerous? Such information can be often easily[…]
Online systems need to be both secure and designed to last, so how can you achieve both and not blow the budget? This article covers a few simple principals you can adopt which are both good for your systems architecture and good for your security. #1 System Components should only do what they say on[…]