Info

Legacy Code Rocks

Legacy Code Rocks explores the world of modernizing existing software applications. Hosts Andrea Goulet and M. Scott Ford of Corgibytes are out to change the way you think about legacy code. If you’re like a lot of people, when you hear the words “legacy code” it conjures up images of big mainframes and archaic punch card machines. While that’s true — it only tells a small part of the story. The truth is, the code you leave behind is your legacy, so let's make it a good one.
RSS Feed
Legacy Code Rocks
2024
September
July
June
April
March
February
January


2023
December
November
October
September
July
June
May
April
March
February
January


2022
December
October
September
August
June
May
April
March
February
January


2021
December
November
October
September
August
July
June
May
April
March
February
January


2020
December
November
October
September
August
July
June
May
April
March
February
January


2019
December
November
October
September
August
July
June
May
April
March
February
January


2018
October
September
August
July
June
March
February
January


2017
November
October
September
August
July
May
April
March
February
January


2016
December
November
October
September
August
July
June
May


Categories

All Episodes
Archives
Categories
Now displaying: Page 1
May 31, 2023

How many of your passwords do you actually know? Now, how many of those passwords are already on the black web? We are living in a fascinating age of transition from personalised passwords dependent on text inputs and our memory to more advanced access solutions. 

To help us navigate this evolution, we talk with Justin Richer. Justin is a technologist working on a wide variety of projects and problems throughout the internet. Justin is the founder of Bespoke Engineering, an independent consultancy specialising in internet security and identity. He is the author of OAuth in Action along with Antonio Sanso. He is the editor of several security standards including http message signatures, GNAP, OAuth dynamic client registration, OAuth token introspection, and vectors of trust, and has contributed to dozens of others. He previously spent 15 years at the MITRE Corporation contributing to many different efforts, including collaboration, identity, serious gaming, and security research programs.

When you finish listening to the episode, visit the Bespoke Engineering website, grab Justin's and Antonio's book, or connect with Justin on LinkedIn or Twitter

Mentioned in this episode:

Justin on LinkedIn at https://www.linkedin.com/in/justinricher/

Justin on Twitter at https://twitter.com/justin__richer

Bespoke Engineering at https://bspk.io

OAuth in Action at https://www.manning.com/books/oauth-2-in-action

 

0 Comments
Adding comments is not available at this time.