Security vs Functionality in Android Marshmallow: Locked Screen Apps
Security Scanning

The ability to display widgets within the locked screen was present through Android KitKat. Sadly, this useful feature is not in the latest Android OS. Security and functionality have always had a tenuous relationship. In order to be absolutely functional, a system must allow everything. To make a system truly secure, it must allow nothing. […]

Read more
My First Ansible Jinja2 Filter

Why would I want to make a Jinja2 filter? While Ansible Modules are the main way you accomplish something in Ansible, Jinja2 Filters are the main way you manipulate data.  The first python code you’ll need to write in ansible is probably because you want to transform some data to send to a module or […]

Read more
Run Headless Selenium Tests From Jenkins

In a previous blog I went over how to set up headless tests on a centos machine; in this blog, I will be going over how to introduce this machine into a continuous integration environment via Jenkins. The first thing that we need to do is install the Xvfb plugin on the Jenkins instance, which […]

Read more
Introduction To Git-svn

Subversion or SVN is a version control system that has been around for over 15 years and was the industry standard before the arrival of Git. Although Git is far superior to SVN, a lot of places are still tied to SVN for any number of reasons. I was exposed to and worked with only […]

Read more
Agile Testing with Zephyr as a JIRA Plugin
Testing

Zephyr Plugin is the solution for Agile Testing if you are already using JIRA in your Agile Software Management as a tool for issue tracking and project management, and want to integrate test management into the same system. It adds many new features to JIRA: Collaboration Test Cases Writing, Reviewing, Executing, Verify Test Results. Formal […]

Read more
Squashing Third Party Security Vulnerabilities
Security

It seems like more often we hear stories of another security breach at our favorite retailer, bank, or some place that has our sensitive data.  Any organization that has been entrusted to protect sensitive information should have solid security practices in place.  Once a hacker has accessed your system it’s all over.  The most expensive […]

Read more
Including Swagger Docs into your DevOps Pipeline

On my last two posts I went through setting up CI for your PHP project. While I promised this post would cover setting up CD for your pipeline, I realized that I left out a fairly useful (but in my mind unique) part of the process. Our PHP application is using Laravel as the back […]

Read more
IVY, Putting Dependencies in Ant

Ivy – Ant Dependency Bolt On My last assignment introduced me to Gradle. My experiences have let me run the trifecta for build tools: Ant, Maven, and Gradle. However last time I used Ant, Ivy was not managing the dependencies. Versus Maven and Gradle that have automatic dependency resolution built in. What is automatic dependency resolution? In […]

Read more
Nexus Firewall

Any developer who has ever opened up a pom file on a large project will be familiar with the seemingly infinite number of dependences which make governance nearly impossible. Thankfully, Sonatype is making our job a little bit easier with Nexus Firewall–a tool which allows system administrators the ability to craft policies to limit which […]

Read more
X