The Rietta Blog
Since 2005, this publication covers a wide range of topics, including cybersecurity, software development, and cloud migration. It’s a valuable resource for anyone interested in staying informed about these areas.
10/29/2019
Xfinity is Man-in-the-Middle (MITM) Attacking my Internet
by Alex Piechowski
Did you know that Xfinity regularly launches security attacks against it's own customers?
10/28/2019
Patch Production Faster with Security-oriented Agile Development Practices
by Frank Rietta
Companies take too long to patch production leaving plenty of time for threats to attack! Here's how to fix it with security-oriented Agile practices.
10/24/2019
MySQL Decimal Data Type
by Alex Piechowski
The MySQL decimal (A.K.A. numeric) data type can be used to store the exact numerical value with a fixed point decimal. The Syntax of MySQL's decimal is "DECIMAL(precision, scale)".
10/22/2019
What is Web Accessibility?
by Christopher Choi
It's important to answer the demand for accessible websites to proactively avoid legal implications after the Supreme Court declined to hear the Domino's Pizza appeal in an ADA case.
10/07/2019
Acknowledge Open-Source Contributors with Git Authorship
by Alex Piechowski
Even though Git has been the dominant VCS for over a decade, some popular open-source projects don't properly accredit contributors. Open-source projects have a ethical obligation to properly portray the work that was done to the project.
10/02/2019
The Clean-up Refactor Deleting ".arel_tables"
by Alex Piechowski
Composing queries with ActiveRecord and .arel_tables[] to select individual columns results in long lines. By delegating `arel_tables[] to .[], queries have a more readable interface without losing context. Delete .arel_tables from all usages; gain sanity dealing with complex queries.
09/25/2019
Why do Rietta Developers Git Fork?
by Christopher Choi
Forking open source repositories is a standard way of contributing to open source projects. At Rietta, a small agency, all developers fork internal repositories when working on client projects.
09/06/2019
Ruby Gems Supply Chain Vulnerability
by Frank Rietta
Learn 5 practical steps to protect yourself from malicious backdoors in Ruby Gems.
08/22/2019
The Case for 2FA, Post Rest-client Gem CVE
by Christopher Choi
On 08/19/2019, a CVE was discovered on a popular Ruby gem called Rest-client. Although caught quickly, this could raise the case of 2FA being a requirement for Package Manager accounts like Rubygems and NPM.
06/07/2019
What's the Difference Between the 3 Github Merge Methods?
by Christopher Choi
Github's interface makes merging in commits versatile to suit your style of maintaining a clean Git history. The three different styles are Create Commit, Squash, and Rebase.