The Pomodoro Technique: The Art of Focus

What Is The Pomodoro Technique? From Wikipedia “The Pomodoro Technique is a time management method developed by Francesco Cirillo in the late 1980s. The technique uses a timer to break down work into intervals, traditionally 25 minutes in length, separated by short breaks. These intervals are named pomodoros, the plural in English of the Italian word pomodoro (tomato), after the tomato-shaped kitchen timer that Cirillo used as a university student.

Read more

Share Comments

HIPAA & Cryptographic Standards

Health Insurance Portability Act (HIPAA) HIPAA is a federal United States law that governs the handling and safekeeping of health information. Under HIPAA, it is important to maintain the integrity and privacy of such information. This information can be referred to as protected health information (PHI). It has three broad rules, which include: The Privacy Rule The Security Rule The Breach Notification Rule The most involved is the security rule, which has different safeguards you must abide to.

Read more

Share Comments

OWASP Top 10 & Go

OWASP Top 10 The Open Web Application Security Project (OWASP) publishes a list of the top ten most critical web application security risks. The OWASP Top 10 is in the process of being revamped since the last release in 2013. A release candidate was published on April 10th, 2017 and is planned to be released in July or August of 2017 after taking comments from the public which ends on June 30th.

Read more

Share Comments

An Introduction to the Technical Security Requirements of the HIPAA

Health Insurance Portability and Accountability Act (HIPAA) Security Requirements

Any organization that deals with Protected Health Information (PHI), that is any health information that can be linked to an individual user must be handled in such a way as to maintain the integrity and privacy of the information.

There are many safeguards that need to be considered, some administrative and some technical in nature. We’re going to focus on the technical ones here.

Read more

Share Comments

Summary of the OWASP Top Ten Vulnerabilities

The Open Web Application Security Project maintains a list of the top ten vulnerabilities ranked by their respective risks. These ranks are based on how easy it is for an attacker to exploit it, how common the exploit can be found in the wild, how easily an attacker can detect it, and the amount of damage that a successful attack can potentially cause.

Read more

Share Comments

Open Source

Open source software plays a big role in the products we develop. Simply put, we could not do our jobs without it! That’s why we love to contribute back to the community whenever we can. Contributions including providing bug reports to releasing code of our own. Today, we are announcing two open source libraries.

Read more

Share Comments

JavaScript Modules: Building Maintainable JavaScript

The JavaScript Module Pattern is used to make code cleaner, easier to understand, easier to reuse, and easier to test. We’re going to look at some of the basic concepts of this pattern along with some examples and how this pattern can help improve JavaScript code in DDX. Anonymous Closures Anonymous Closures are the backbone of the module pattern. Closures allow us to keep everything in our module in the local scope while exposing only the parts we want to the outside world.

Read more

Share Comments

Hax0r Pwn3d? n00b Guide to Web App Security

A talk I gave for Refresh Annapolis Valley

If you build web applications, or run a website, having a working knowledge of common exploits and security best practices is fundamental to protecting your digital playground for you and your users. In this talk, Mike Caplan of Henry Schein & HarvestHand will review the top 10 web security risks, how they work, and how you can defend your web properties against them.

Not a web developer? Users of the web who are interested in increasing their web savviness are encouraged to attend.

Read more

Share Comments

Open Web Platform: HTML5 and Semantic Markup

Here is the slide deck for a talk for Refresh Annapolis Valley I gave about HTML5’s new elements and attributes that allow us to define semantically meaningful HTML. Semantics you say? What is the meaning of this? Check the slide deck to find out.

Read more

Share Comments

Don't Forget to Flush

By way of my favourite Bulgarian / Canadian / American / Web Ninja Stoyan Stefanov, and Yahoo!’s Exceptional Performance Team I’ve been studying the fine work found in their best practises guide for speeding up websites. As a recluse who prefers hiding behind servers rather than dancing around your web browser’s canvas, I was intrigued with their server side recommendations – however sparse they may be. In particular, flushing generated head content early to speed up overall page delivery and rending time was a technique new to me.

Read more

Share Comments