Cardinal Peak
Blog Post

Faster Live Debug with Loggly: A Guest Post for Loggly

Accelerate your debugging process with Cardinal Peak's expert strategies. Enhance efficiency with these actionable tips. Read more on the Loggly blog!
Cardinal Peak
Blog Post

Matt Osminer Featured as a Synscort Blog Expert Interview

This past week, Cardinal Peak director of server and web software engineering, Matt Osminer was featured in an in-depth, two-part expert interview on the Synscort blog. Matt discusses Big Data and many of the solutions we employ at Cardinal Peak. He also talks about dev ops, when to outsource, and improving ROI in data management.... View Article
Cardinal Peak
Blog Post

Security Best Practices: From IoT to HIPAA

Secure your IoT devices with robust cryptography and access control. Learn best practices for HIPAA compliance, encryption, and secure communication in this in-depth guide!
Accelerate your debugging process with Cardinal Peak's expert strategies. Enhance efficiency with these actionable tips. Read more on the Loggly blog!
This past week, Cardinal Peak director of server and web software engineering, Matt Osminer was featured in an in-depth, two-part expert interview on the Synscort blog. Matt discusses Big Data and many of the solutions we employ at Cardinal Peak. He also talks about dev ops, when to outsource, and improving ROI in data management.... View Article
Secure your IoT devices with robust cryptography and access control. Learn best practices for HIPAA compliance, encryption, and secure communication in this in-depth guide!
Cardinal Peak
Blog Post

The Myth of a Hacker-Proof IoT

I was recently invited to give a presentation on security for Internet of Things networking at infocomm 16. While I discussed the topic and scope with the organizers, I didn’t have a good catchy title prepared, so the organizers took it upon themselves to submit one for me: “Hacker-Proof IoT.” Easy, right? While I would... View Article
Cardinal Peak
Blog Post

Increasing Speed: Cython vs CPython vs Python & Pypy

Last week I started this two-part blog series about increasing the speed of Python through Cython and PyPy. While we already discussed the effects of Cython, I wanted to continue the discussion with a look at PyPy and then a contrast of both PyPy and Cython. What is PyPy and how fast is it? PyPy... View Article
Cardinal Peak
Blog Post

How To Speed Up Python Code With Cython & PyPy: Part 1

When a Python program runs too slowly for our liking, there are several ways to speed it up. Our expert recently spent some time experimenting with two of the most popular tools: Cython and PyPy. This two-part post begins by delving into Cython.
I was recently invited to give a presentation on security for Internet of Things networking at infocomm 16. While I discussed the topic and scope with the organizers, I didn’t have a good catchy title prepared, so the organizers took it upon themselves to submit one for me: “Hacker-Proof IoT.” Easy, right? While I would... View Article
Last week I started this two-part blog series about increasing the speed of Python through Cython and PyPy. While we already discussed the effects of Cython, I wanted to continue the discussion with a look at PyPy and then a contrast of both PyPy and Cython. What is PyPy and how fast is it? PyPy... View Article
When a Python program runs too slowly for our liking, there are several ways to speed it up. Our expert recently spent some time experimenting with two of the most popular tools: Cython and PyPy. This two-part post begins by delving into Cython.
Cardinal Peak
Blog Post

What’s so Hard About Hardware?

I had the pleasure of attending a few segments of Boulder Startup Week, a weeklong event just down the road from Cardinal Peak dedicated to helping startups become successful. Startup Week brings innovators, entrepreneurs, mentors, and investors together to talk about how startups can create the right culture, find funding, bring a product to market,... View Article
Cardinal Peak
Blog Post

Remote Logging: Part 2

Continuing his guest blogging series over at the Loggly blog, Cardinal Peak Senior Software Engineer Thomson Comer talks this week about how to write effectively for Loggly. He debunks myths about remote logging and gives some great tips for debugging. Check out his most recent post and stay tuned for the third and final post... View Article
Cardinal Peak
Blog Post

Remote Logging: A Guest Post for Loggly

Thomson Comer, Senior Software Engineer here at Cardinal Peak, is writing a guest blog series starting this week for Loggly. His three-part series begins with this post explaining how remote logging works and how it can benefit engineers and developers in locating bugs in specific lines of code. Leave questions and comments for Thomson here... View Article
I had the pleasure of attending a few segments of Boulder Startup Week, a weeklong event just down the road from Cardinal Peak dedicated to helping startups become successful. Startup Week brings innovators, entrepreneurs, mentors, and investors together to talk about how startups can create the right culture, find funding, bring a product to market,... View Article
Continuing his guest blogging series over at the Loggly blog, Cardinal Peak Senior Software Engineer Thomson Comer talks this week about how to write effectively for Loggly. He debunks myths about remote logging and gives some great tips for debugging. Check out his most recent post and stay tuned for the third and final post... View Article
Thomson Comer, Senior Software Engineer here at Cardinal Peak, is writing a guest blog series starting this week for Loggly. His three-part series begins with this post explaining how remote logging works and how it can benefit engineers and developers in locating bugs in specific lines of code. Leave questions and comments for Thomson here... View Article
Cardinal Peak
Blog Post

It’s That Time Again

It’s an early morning for many of us after “springing forward” and losing an hour of sleep over the weekend. While the time change might have a jarring impact on our alertness, our computers are probably humming along without ever noticing the switch. Or did they? It depends on which time system you’re using since... View Article
Howdy Pierce
Blog Post

We Need a Better Way to Lock the Doors

Another day, another public hack: Today we learned that a “cyber-espionage operation” has used a previously unknown flaw in Adobe Flash to gain information from NATO governments and others. And also 87% of Android devices are vulnerable to numerous known hacks because there’s no good business model to distribute patches on that platform. That’s just... View Article
Howdy Pierce
Blog Post

Which Estimate Should I Give?

One thing that is striking amongst different engineering cultures is the range of approaches to scheduling accuracy: How tolerant is the organization of schedule slips? And therefore how aggressive are engineering planners encouraged to be?
It’s an early morning for many of us after “springing forward” and losing an hour of sleep over the weekend. While the time change might have a jarring impact on our alertness, our computers are probably humming along without ever noticing the switch. Or did they? It depends on which time system you’re using since... View Article
Another day, another public hack: Today we learned that a “cyber-espionage operation” has used a previously unknown flaw in Adobe Flash to gain information from NATO governments and others. And also 87% of Android devices are vulnerable to numerous known hacks because there’s no good business model to distribute patches on that platform. That’s just... View Article
One thing that is striking amongst different engineering cultures is the range of approaches to scheduling accuracy: How tolerant is the organization of schedule slips? And therefore how aggressive are engineering planners encouraged to be?