Since 1999

The Rietta Blog

Since 2005, this publication covers a wide range of topics, including cybersecurity, software development, and cloud migration. It’s a valuable resource for anyone interested in staying informed about these areas.

09/06/2018

Writing a good bin/setup

What it takes to write a project setup script to ease on-boarding headaches and reduce company overhead

Read More »

08/21/2018

Automatically Migrate from Factory Girl to Factory Bot

Gem updates are tedious. Gem name changes are even more tedious. This quick script converts Factory Girl references to Factory Bot references.

Read More »

08/07/2018

Deep Work and Remote Work

By working deeply, you can achieve the best work you are capable of.

Read More »

07/24/2018

Security Quick-Wins: Use DNS CAA records to avoid fraudulent certificates

Prevent certificate fraud and boost your TLS security in 5 minutes using this simple standardized DNS entry.

Read More »

07/18/2018

Automate Scheduled Security Scans With CircleCI

Stay on top of vulnerabilities by automating security scans with workflow schedules

Read More »

07/10/2018

How to Ask Great Questions Online

All devs ask questions. Good questions save time and effort for both the asker and answerer, follow these tips to become a superstar question asker and super power your development cycle with and without community assistance.

Read More »

06/30/2018

Migrate Away from SSL/Early TLS for PCI Compliance

PCI compliance 3.1 and 3.2 no longer allow for SSL/Early TLS. Upgrade now to ensure your company remains compliant with the changes that start June 30, 2018.

Read More »

06/25/2018

3 Developer Onboarding Tips From My Recent Experiences

This blog post briefly explores experiences and lessons that I have learned since joining the Rietta team; experiences that developers in a similar position can benefit from.

Read More »

06/15/2018

Harvest vs. Productive.io

Choosing a time tracking and invoicing solution can be tricky. This comparative analysis examines the factors our team factored into our decision to switch to Productive.

Read More »

04/25/2018

Stop Thinking about GA SB 315 in Terms of "Digital Homes"

Some mistakenly say an ethical hacker is like a nice neighbor walking into your unlocked back door without permission! In reality, security research is about public businesses and institutions open to the public.

Read More »