Latest stories

Managed WordPress Hosting with Media Temple

M

I recently migrated this site to Media Temple’s managed WordPress hosting plan. For a number of years I had been running a dedicated server through CoreNetworks, which I have been extremely happy with. More recently however I have come to realize I no longer have the need for dedicated server and began researching cheaper managed hosting alternatives, which brought me to Media Temple. Over...

Scotch Box Vagrant LAMP Stack

S

For a while now I have been using WAMP as my daily driver for Drupal development on my Windows 8 machine. For anyone who is a Drupal developer and uses WAMP (or a variation LAMP stack on Windows) has probably felt the pain it brings in terms of sluggishness, incompatibility with native Linux applications (Drush anyone?), and a headache administer PHP modules. I won’t even get into the problems...

Top 5 Favorite Web Development Podcasts

T

I am often interested in hearing about how people within the software development community keep up with the latest changes in tools, technologies and programming languages. It seems that every few months there is a new framework or better way of doing something in an entirely new tool-set or language. For me personally, I don’t have much time during the day to spend reading the latest...

Best WordPress security and malware removal plugins

B

WordPress CMS has been prone to many online threats ever since Matt Mullenweg and the team officially launched it. The content management system is impressive, but you can’t stop hackers from attacking websites powered by WP. Attacks can be prevented by installing a WordPress security plugin. If the internet is the only source of your income, you shouldn’t risk your site. There are a...

Managing Access to Information Resources

M

Security breaches caused by internal employees, consultants, business partners and any other individual or group of individuals that have privileged access to certain parts of the network remain one of the highest threats to digital assets.  In an article about the employee life cycle and identification of internal organizational threats, Conrad et al (2009) asserts that within an...

Honeypots: To Lure or Not To Lure

H

Honeypots are sometimes used as an active defense mechanism for network security and provide a means for targeting attackers and recovering forensic evidence.  A typical honeypot traps attacks, records intrusion information about tools and activities of the hacking process, and prevents attacks outbound the compromised system.

Intrusion Detection

I

Intrusion Detection is the process of monitoring an information system in order to determine if any action is being performed with malicious or otherwise cause that may negatively affect its availability, confidentiality or integrity of data contained within.  In order to get started with intrusion detection, it is important to first of all gain an understanding of what an intrusion might...

Testing email in a local development environment

T

Have you ever had a need to test email functionality on an application within your local development setup?  I have found this process to be both time consuming and confusing in the past, especially when working within firewall restrictions.  Of course we can always test with real dummy email addresses, but what if we accidently send a mass email out to real users?  It is much...

Heather Remote Usability Session 10

H

Heather also experienced some workflow issues with the application where she was unable to locate various areas of the system.  She commented that the excessive scrolling contributed to her confusion with this.  In addition to this she noted concern with the various grid updates and format of the STA grid for editing and updating.

MSDN Perks: Azure Development Environment

M

Recently Microsoft started offering a $100 per month credit to all MSDN subscribers for using their Azure cloud based services.  A lot of developers here at ICF have MSDN subscriptions so I definitely recommend checking this out if you haven’t already done so.  I never really considered using Azure for anything as I had assumed it was mostly used as a cloud based hosting service...

Curriculum Mapping for Expeditionary Learning

C

Curriculum Mapping is the process of documenting lessons, activities and assessment methods used within different grade levels and classes in an educational institution.  Expeditionary Learning (EL) is a style of teaching that involves the students in experiences and problem-solving activities.  This paper explores the intersection of these two educational theories and addresses how pedagogical...

Jeff Remote Usability Session 6

J

Jeff ran into some problems when he did not save the form page he was on and lost changes.  He had trouble remembering to press the update button on the various grids.  In addition to this, he also came across problems with the ‘Big Ideas’ control and text area bug for ‘Final Product’ that others faced.

Backwards Design

B

Backwards design is a methodology used to develop curriculum, which promotes the identification of learning results at the start of the design process.  Wiggins and McTighe defined this term as part of their Understanding by Design (UbD) framework.  Backwards design is not a new concept, it has been around for a long time and this paper explores some of the underlying research behind Wiggins and...

Lorie Remote Usability Session 4

L

This usability testing session revealed some issues with the using the Big Ideas drop-down selectors for adding new records.  In addition to this, the process for adding standards, targets and assessments appeared confusing to the user.  There were some issues with workflow where the user was confused about which screen she was on.  Recommendations were made for allowing file uploads.

About Author

Ian Carnaghan

I am a software developer and online educator who likes to keep up with all the latest in technology. I also manage cloud infrastructure, continuous monitoring, DevOps processes, security, and continuous integration and deployment.

Follow Me