Rob's Blog

My blog will range from helpful hints for the home user, through to the results of various research projects, beneficial for professionals and developers.

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Bloggers
    Bloggers Search for your favorite blogger from this site.
  • Team Blogs
    Team Blogs Find your favorite team blogs here.
  • Login


I finished school in 2012 and went straight to work with Genisyst. I am still learning the ropes of the business and the technical side of everything we have to offer, but at the same time, I am researching new and innovative products and systems we can implement with our own.

Posted by on in Tech tips and thoughts
Cloud computing is a term that has taken the IT world by storm, particularly on the marketing and advertising side. Every major software provider is offering some form of cloud computing experience. But what exactly is cloud computing? In its simplest form, cloud computing is using a combination of resources from an external source over the internet to supplement or completely replace your IT infrastructure. This ranges from software services to physical hardware and can be utilised by both businesses and home users. You can essentially bundle cloud computing into three major categories, which can be viewed as the 'layers' that form the majority of cloud computing. 1. Infrastructure as a Service (IaaS) At the 'base' you have Infrastructure as a service, or the physical resources, including servers, data storage and interfaces. This has some huge advantages over conventional infrastructure such as easy, fast scaling to use exactly how much is...
Last modified on
Thanks to pop culture, it is well known that one of the best steps when trying to solve a computer problem is ‘turn it off and on again’. But what about when there is a problem with the web? Unfortunately for the sufferer, but fortunately for everyone else, there is no restart button for the internet. So what is the quick problem solving step for web pages that aren’t loading the way they should? SHIFT + REFRESH To understand this, we need a basic idea of what web caching is and what it does. Web caching takes data from a web site the first time it is accessed and stores it locally on your computer. Your browser does this automatically for data that would not be changing on the web page, like the files that dictate the pages style and files that detail what happens when a button is pressed, etc....
Last modified on
After covering what makes for a good password in my previous post, it is important for developers to understand the equal importance of storing passwords securely. Whether you have designed an email service, web application or even operating system, it is essential that you store your passwords securely and specifically NOT AS PLAIN TEXT!! It is not enough to simply rely on your website security either, so any passwords in your database need to be encrypted somehow. The problem with plain text: No matter how much protection you have on the storage of your databases, there are always ways to obtain the data they hold, including social engineering and even a disgruntled employee as well as more complicated 'hacking' methods. You may think this is fine for your Mongolian throat singing appreciation website, which only has 3 members, where the most damage that could be done is an obscene post on...
Last modified on
It is safe to say that technology plays an integral part in our lives today, from socialising to shopping, business to banking. As such, we all have a huge number of password protected accounts. Due to the sensitivity of information protected by these passwords, it is necessary that they are well chosen to provide the most security. To best demonstrate what constitutes a 'strong' password I will use a series of examples in ascending order of strength. DO NOT USE - E.g. 'password', '12345', 'qwerty' or 'secret' A password like the ones above should NEVER be used as the are easy to both GUESS or CRACK. Very Weak - Your name, any dictionary word - E.g 'computer' These passwords, while better than the previous level of security, are still both easy to GUESS and CRACK. Not only because the passwords are simple, but using personal information makes it much easier to...
Last modified on