Data & The Database
Posts on digital data and how it is used, stored, and modified.
Providing access to your database can lead to horrible data breaches, such as when China pulled down all federal employee data from the Office of Personnel Management. Regardless of the security you put in place, fundamentally all the information in your database is accessible to the right query, with the correct credentials. Your only protection […] …read more
We’re creating a word processor that runs in the browser. A web worker recalculating the layout of the document in the background seemed at first to be a no-brainer. That would have no impact on the UI and could recalculate as a background thread. This is definitely how you would code it if it was […] …read more
Although I am new to the OData protocol and OData reporting, I am realizing that the more I learn about it, the more I like it. OData allows anyone to query data from a REST API by supplying typed data as well as relevant metadata. Armed with this information, one can easily and quickly write […] …read more
When a prospective client approaches us about integrating our solution, often the first question they have is about how we handle data security. So I want to share with you how Windward works with the vast array of security protocols that exist in today’s world. In this blog post you will learn how we operate […] …read more
At Windward we deal with all flavors of databases on a daily basis. Our developers and engineers have encountered numerous problems with data structured by our customers and prospects. Through utilizing best practices and researching optimal solutions, we have the created the tools and developed the experience needed to help our customers succeed. So we’ve […] …read more