1. Manage Your AWS Docker Secrets With This Simple Command Line Tool

    We released a CLI for storing and retrieving secret environment variables on Amazon ECS or any EC2 instance.

    Read More
  2. The Turing Files:
    An Ominous Test

    A case from the files of the Turing Detective Agency

    Read More
  3. Public Keys in Perl 6

    Implementing the RSA algorithm for public key encryption in Perl 6.

    Read More
  4. Brian’s Highlights from the DC Baltimore Perl Workshop

    Brian describes highlights of the 2016 DC Baltimiore Perl Workshop.

    Read More
  5. Trust and Use of Insecure Software

    In 1984, Ken Thompson wrote Reflections on Trusting Trust which provided a formal demonstration that absolute security of software is unachievable. Running any software at all involves an act of trust between people.

    Read More