We Build Secure Software

Software Development & Application Security Services

Find Out How

Application Security Services

Application Testing

  • Ethical Hacking
  • Application Penetration Testing
  • Mobile App Pen testing

Mitigating Risk

  • Static Testing of Source Code
  • Security Architecture Analysis
  • Hybrid Assessment

Remediation

  • Security Remediation Strategy
  • Incidence Response Strategy
  • Code Remediation

Training

  • Security Training for Developers
  • HIPAA Compliance Consulting
  • PCI Compliance Consulting

UX and Web Development Clients

Bloggery

DEV

Novel Uses of Foreign-Key Constraints

Posted by gavin on July 7, 2016, 11:26 a.m.

I have been thinking about ways to increase data integrity in a relational database. I have found some interesting ways to use foreign-key constraints to that end. Here are some examples.

DESIGN

Do Social Sharing Buttons Actually Work?

Posted by justin on July 5, 2016, 10 a.m.

You may be tempted to include social sharing buttons on your website in order to increase traffic, but is it a useful thing to do?