Preliminary Adventures on a Jailbroken iPad
The new jailbreak for iOS 12 came out in the last few days, and as I’ve been doing some basic digging, I thought I’d share my results so far. Nothing too...
The new jailbreak for iOS 12 came out in the last few days, and as I’ve been doing some basic digging, I thought I’d share my results so far. Nothing too...
In the second post of this series, The Software Triforce Part 2: The Power of Discipline, I covered some of the benefits my team gained by doing our stab...
In the first post of this series, The Software Triforce Part 1: Setting a Courageous Goal, I talked about our decision to set a clear, courageous goal fo...
In nearly every installation of The Legend of Zelda, there is a resonating theme among the characters: the mystical power of the Triforce. Wisdom, Courag...
There’s always a reason to rebuild. Perhaps you’re a CEO of a startup that’s had some success and your engineers are clamoring to replatform and do a rew...
PKC has begun a series of software initiatives with its clients to take on custom software projects in a way that is safe and secure—something which is m...
In my previous post, I pointed out that as software developers writing business-driven software, we build automation, not products—at least not products ...
According to David Thomas, we went from following principles of an agile manifesto to doing Agile™ (just google image search “agile development cycle”). ...
CISOs have a tough job. They are faced with securing data across thousands of devices. They are often brought in after a bad breach and are asked to make...
An old adage in cryptography is that one should never “roll his or her own crypto.” Besides being really hard to get right, it is stress-inducing, time-...
So far, end-to-end encryption has primarily risen as a response to perverse cloud models where services are incentivized to collect as much data as possib...
Think of this as a companion guide to the official w3 spec. With better pictures. In plain English. This is an attempt at a flow-centric, rather than code-c...
CISOs have a tough job. They are faced with securing data across thousands of devices. They are often brought in after a bad breach and are asked to make...
CISOs have a tough job. They are faced with securing data across thousands of devices. They are often brought in after a bad breach and are asked to make...
CISOs have a tough job. They are faced with securing data across thousands of devices. They are often brought in after a bad breach and are asked to make...
CISOs have a tough job. They are faced with securing data across thousands of devices. They are often brought in after a bad breach and are asked to make...