Robustness in Programming
(For my regular readers, I know I promised this post would detail ‘a method by which anyone could send me a message securely, without knowing anything else about me other than my e-mail address, in a...
View ArticleA Brief Introduction to Part-of-Speech Tagging
A field of computer science that has captured my attention lately is computational linguistics — the inexact science of how to get a computer to understand what you mean. This could be something as...
View ArticleScaling Enterprise Database-Bound Applications: I/O
Optimizing Slow Accesses While most software developers like to think of themselves as computer scientists in the purest sense of the term, with job duties that would include intimately understanding...
View ArticleWhen to Ride the Service Bus
One of the great things about adding new, senior talent to a storied team working on a large, complex, and successful enterprise application solution is the critical technical review that results in a...
View ArticlePowerShell one-liner to find outbound connectivity via WinRM
In controlled environments, it’s useful to know when outbound connectivity is not restricted to a predefined list of required hosts, as many standards like PCI require. Here’s a helpful one-liner that...
View Article