Courtney Arthur, Author at Root Level Technology

Author: Courtney Arthur, Author at Root Level Technology

Google’s Lighthouse

Overview: The difference between page 15 and page 1 of Google’s search results can weigh heavily on the quality of a web page. Let’s be honest, when is the last time you went to page 2 of your search results? An increase in quality leads to a higher SEO score and an increase in SEO rankings usually generates more traffic for the website. Google is the most used search engine, so I’m willing to bet they would know a thing or two about search engine optimization. This brings us to an amazing tool for evaluating web applications, Google’s Lighthouse. Lighthouse is a tool that evaluates web applications, and give suggestions on how to improve performance. It evaluates performance, accessibility, progressive […]

Continue reading

Review: Writing Infrastructure as code with “Terraform up and running” by Yevgeniy Brikman.

If you’re familiar with DevOps, you’ve probably been introduced to building immutable infrastructure with Hashicorp’s tool, Terraform. Originally, I used AWS CloudFormation but switched right after learning about Terraform. Essentially, Terraform is designed specifically for one purpose: to provision infrastructure. Yevgeniy’s book takes you from beginner to advanced in 170 pages.   2 key points that anyone looking into Terraform should consider What Terraform is, and how it compares to other IAC tools.   How Terraform works, and the versatility it provides across multiple cloud platforms (i.e. AWS, Azure, GCP, and IBM) The Calm Before The Storm In the first 30 pages, you’ll learn a few things outside of Terraform. Yevgeniy talks about the growth of DevOps. He gives a […]

Continue reading

What’s The Difference Between A RTOS And A GPOS?

With the Internet of Things, RTOS’s have been gaining a great deal of popularity lately. After all, they’re much better-suited for use in embedded systems than GPOS’s, and far easier to work with in many cases, as well. If the previous two sentences sounded like Greek to you, then don’t worry –  you aren’t alone. It can be easy to forget that not everyone understands all the buzzphrases and insider terminology that’s bandied about around a particular technological development. Today, I’d like to demystify things a bit. Let’s talk about some of the most important terms in embedded computing. . They actually aren’t as complex as you might think. You probably already know what a General Purpose Operating System is […]

Continue reading

Wannacry Ransomware

In this day and age where we’ve never been more attached to our gadgets and computers, imagine if your laptop was literally held ransom? That’s the reality thousands of individuals and corporations woke up to on the May 12th, 2017 when a global malware campaign, called WannaCry (also called WCry or Wannacryptor), began.   This malware is a ransomware variant, and some of its most notable victims are the United Kingdom’s National Health Service (NHS), Telefonica in Spain, Renault in France and some Chinese universities. This article aims to reveal key details about this rapidly growing malware threat and how to protect your computers from it.   How does WannaCry Operate? Most malware attacks are focused on security vulnerabilities on […]

Continue reading

Three Critical Steps To Protecting Your Business From Mobile Malware

  Mobile malware is on the rise. According to a recent Kaspersky survey, malicious software targeted at mobile devices increased by nearly 1.7 times between Q1 and Q2 2016. It’s an upward trend that shows no signs of slowing – and if you haven’t adjusted to it yet, it’s long past time that you do. Smartphones have, after all, become ubiquitous in enterprise. Everybody uses them, even if you think they don’t. If you get complacent and fail to secure them, you will eventually suffer a breach. It’s not a question of if – it’s a question of when. MDM, MAM, and MCM Standing for Mobile Device Management, Mobile Application Management, and Mobile Content Management respectively, these three abbreviations are […]

Continue reading