since 1999

The Rietta Blog

05/14/2024

UUID as a secure API token for API RESTful endpoints? (Video)

Video excerpt about the role of UUIDs as a security identifier for REST API and how to use them more securely if you must.

Read More »

05/08/2024

Restoring Old Software for Child Learning Safety

Learn why classic software like WordPerfect & 1st Math can boost your child's development! Explore safe retro tech & conquer digital learning challenges.

Read More »

11/28/2023

An Honest Conversation About Cyber Security (Video)

I recently sat down with Jeremy Duvall of 7Factor Software to discuss Cyber Security and application developers. Enjoy this video!

Read More »

09/27/2023

Prioritizing cybersecurity (Pluralsight)

The structure and siloing of a large enterprise organization can thwart security efforts. Here is a tip on how to overcome.

Read More »

04/04/2023

How to win the race with hackers when new vulnerabilities are publicly disclosed!

Keeping deployed web applications up-to-date is imperative to prevent data breaches. Here's how to use automated testing of custom web application software to patch quickly after a support chain vulnerability is publicly disclosed.

Read More »

10/04/2022

Case Study: Migration of Public Service On-Prem to AWS Cloud

How Rietta planned and implemented a multi-step process to fully migrate a monolithic on-prem Rails application to the the AWS cloud using Docker, AWS Elastic Container Service, the AWS Secrets Manager, and more.

Read More »

09/26/2022

Case Study: Complex Insurance Document Solution with LibreOffice, Docker, and AWS

How Rietta built a complex document solution that seamlessly deploys to AWS using purely open source technology.

Read More »

09/21/2022

Top 5 Tips and Tricks on Developing with Docker

A five tips and tricks I've built up working daily with Docker professionally for three years.

Read More »

10/01/2021

You Can be the Victim of a Cybersecurity Attack: Do Your Part. #BeCyberSmart.

Be cyber smart by recognizing that you can be the victim of a cyber security incident and that you have to keep your Internet connected custom software securely configured and patched up-to-date at all times. Do Your Part. #BeCyberSmart.

Read More »

08/31/2021

The Ripples From SolarWinds

The effects of the Solar Winds breach are felt throughout the tech community. More important than the breach though is the aftermath and the response to the incident. How does that affect others?

Read More »