Tech Blog

Are You Prepared for the Coming Salesforce Instance Splits?

Posted by Adam Menzies

Nov 19, 2014 10:19:49 PM

Recently, Salesforce announced that it will be splitting a number of its North American customer instances. This can be an event that goes by without notice, or one that causes custom functionality to break and leaves you scrambling to put out fires without proper preparation. Below are answers to key questions and steps for how to plan for the coming instance splits. 

Read More

Topics:, Org Splits

How to Mitigate SSL 3.0 Being Disabled: Salesforce and Cast Iron

Posted by Don Ayres

Nov 10, 2014 12:04:12 PM

Salesforce recently announced in Knowledge Article Number: 000206013 that it will be disabling SSL 3.0 connections to address the POODLE security vulnerability in the coming months. The change is not expected to impact browser-based users, but may impact Salesforce customers who are using certain versions of data integration products, such as IBM Cast Iron.
Read More

How I was struck by Lightning at Dreamforce 2014

Posted by Sean Genung

Nov 5, 2014 9:43:00 AM


Read More

Topics:, Dreamforce 2014, Salesforce Lightning

JavaScript: The New Assembly

Posted by Steve Ayers

Oct 27, 2014 10:11:00 AM

I don’t like CoffeeScript.

I’m sorry, I know I just offended half of the JavaScript community, but I have to get that off my chest.  I feel like it adds an unnecessary abstraction and needless syntactic sugar over top of a language that is already pretty expressive and easy to understand.  To me, it smacks of laziness and a sense of entitlement.  ‘Ugh, I just can’t be bothered to write semicolons and curly brackets.  Who has the time?'

Read More

Topics: Angular, Javascript, ClojureScript, AtScript, Dart

OWASP Top 10 Risks #2: Broken Authentication and Session Management

Posted by Max McCarty

Oct 22, 2014 2:54:55 PM

In 2013 over 34 million Americans reported some form of identity theft.  Three quarters through 2014 there is already a reported 568 data breaches with over 75 million records compromised and hundreds of millions of users affected.  This is up from the 439 breaches in 2013.  Identity theft isn’t a possibility, it’s a reality that is happening all the time and identity theft is at the core of the 2nd of OWASP’s top 10 most critical web security risks of 2013; Broken Authentication and Session Management.

Here we'll examine the overall theme of just what broken authentication and session management looks like and also look at how to properly implement some common website features correctly.

Read More

Topics: authentication, security, OWASP

Admin Power Boost: Process Builder

Posted by Cindy Kester

Oct 21, 2014 10:49:01 PM

I had the pleasure of attending quite an amazing event, Dreamforce 2014.  Marc Benioff sure knows how to ‘WOW’ the crowd – I heard some fans even compare it to Woodstock.  The new feature I am most excited about is the Process Builder, a new workflow tool that will give Admins a power boost!

Read More


Interoperability and the Importance of Quality Process Supporting EHRs

Posted by Marcus Bruhn

Oct 16, 2014 10:10:00 AM

With healthcare’s continuing shift towards electronic health records (or EHRs), interoperability between systems and devices is a key driver for achieving successful communication between all parties in the healthcare environment. For patients, this means our health information must be available to anyone who may treat us, presented in a meaningful and value-driven manner. Implementing an EHR system, in many cases, can be a very complicated task which requires coordination between multiple disciplines inside healthcare. Although migrating to an electronic health system is a step forward to process optimization and efficiency, it can be a driver towards over-dependency and reliability for staff members in their everyday work.

Following the Ebola case at Texas Health, the Dallas hospital had initially stated that the hospital’s electronic health record had failed to admit Thomas Eric Duncan, an American unknowingly infected with the virus. During that time, Mr. Duncan’s health information was not passed along to other care
providers via their EHR system. This caused physicians not to receive his travel history due to a “flawed” setup in its health record system. This was all later retracted by the hospital in a statement made by Texas Health Resources:

“We would like to clarify a point made in the statement released earlier in the week. As a standard part of the nursing process, the patient's travel history was documented and available to the full care team in the electronic health record (EHR), including within the physician’s workflow. There was no flaw in the EHR in the way the physician and nursing portions interacted related to this event.” 

The confusion as to the root-cause of the issue is an alarming example of the lack of visibility engineers and quality experts can come across in the processes of health systems. Delivering quality standards down to the design-level, for both data and workflows, is key to driving process improvement and optimization inside the constantly changing technology of a healthcare facility.

Read More

OWASP Top 10 Risks: #1: Injection

Posted by Max McCarty

Oct 13, 2014 9:42:43 AM

The term injection can encompass a large number of different variations such as SQL, XML, LDAP, HTML, CSS and Remote file injections (which is not an exhaustive list).  In the end, they all boil down to injecting a command in the guise of data, where the command is then executed with malicious results on the targeted system.  This is all a result of what the Open Web Application Security Project has identified as Injection Flaws.

Read More

Topics: security, .Net, OWASP

How Leonardo da Vinci would paint the Mona Lisa today

Posted by Phil Van Sickel

Oct 9, 2014 10:02:24 PM

A common illustration used in Agile training is the process an artist uses to paint a picture.  It illustrates the iterative and incremental approach agile teams use to properly build software.   I expect every scrum adherent has seen this visual.

Read More

Be Sure with Azure .NET - Azure Table Storage (Part 2)

Posted by Max McCarty

Sep 30, 2014 11:02:00 PM

For part 2 of a two part series, we continue looking at Microsoft Azure's Table Storage service.  If you're just joining us, you can catch up with Part 1 and learn about getting started with Table Storage, comparison to relational databases, as well as desigining and persisting data to your tables.  

Read More

Topics: microsoft, .Net, azure

Subscribe to Email Updates