May 20, 2013 · 7:00 PM
This location is shown only to members
Every networked application has to deal with security threats, and the code in your application might not always be able to deal with them: someone running off with hardware, a malicious DBA, or a zero-day exploit, for example. Cryptography helps in these situations, and is frequently required in a compliance audit too. Protect your data with exciting acronyms such as HTTPS, GPG, AES, RSA, ECC, DSA, and more; learn about the quick and easy ways to get it right, the difficult ways to get it wrong, and the fantastically difficult ways to get it right that particularly esoteric situations will demand.
Bryce is a software engineer at Basho, makers of the Riak database. He also runs the Miami Ruby Brigade, and really would enjoy doing more front-end design but finds back-end work more entertaining.