I came across some interesting podcasts that discuss the ‘sticky’ situation of data privacy and how to ensure data security over time. Perspectives on Privacy on Future Tense Staying Connected – A Privacy Crisis Given the changes happening in Europe later this year, I reckon this will cause a progressive ‘tightening’ of privacy regulations globally.[…]
I must admit, one of my all time pet peeves is when engineers do not implement their user authentication service in the right way to be defendable against an attack. Take for the instance the recent hack against Zomato in which they had 6.6m hashed user passwords stolen. The real problem here is not that the[…]
This is part of the TechEd Section. As mentioned previously, I was on the look out for a suitable Solar sensor to provide measurement of the strength of the Sunlight on our property. Now where the RG-11 is located is actually quite an ideal place for determining Solar light levels, as it has a clear[…]
This is part of the TechEd Section. My project of tying together various sensors to work out what is happening around the property is taking shape. I just took delivery of the Hydreon RG-11 Optical Rain Sensor a few days ago, cost $99 plus postage from Ocean Controls. A nifty little unit that makes use[…]
The Australian Cyber Security Growth Network (ACSGN) is currently establishing itself.
Technical Debt – A phrase that brings shiver to any experienced engineer or software architect. In this article I’ll explore why it is so Evil and a few basic things you can do to stop it bringing your whole business to a go slow state. (This is a follow-up article from my talk on Technical[…]
This is part of the TechEd section. As previously mentioned, to diversify my techie skills (and its fun), I have a little side home DIY project on the go to achieve the following: Create a RS485 network, to allow me to easily connect together multiple Arduino’s over a distributed network. Gateway said RS485 network onto[…]
According to a recent report – security looks to be a top concern among Software Architects. In this article I go into detail on one of the core ways in which you can achieve dependable security in evolving online systems – namely defense by depth. What is defense by depth? Simply put this is where one[…]