Lysis is the pen name for a technology web content writer. I provide high quality content for the technology industry including white papers, technical documentation, SEO articles, blog posts and tutorials. I've written for IBM, Verizon and Rackspace on a variety of technologies for end-users and management.
I'm a software engineer who has written several web and mobile applications, so I can provide technology articles at a more detailed level than most writers.
My expertise includes:
* Server technology (IIS, web management, configurations)
* Programming (MVC C#, PHP, VB.NET, Android, Java, and HTML)
* Web design and development (UX, UI, CSS, and dynamic content)
* Hacking and security (web security, analysis and defense)
* General Internet culture and information
* Computer hardware and disaster recovery
* Cloud computing
To read some of my musings, I blog on my dev site at pinkhatcode.com.
Contact me for web content in any of these areas for a quick turnaround and extensively researched articles.
Embedded Linux is a lightweight version of the open-source operating system, but it's often poorly secured. To improve the cybersecurity of your IoT devices, routers, home automation and network, you should follow some basic best practices. These cybersecurity standards will reduce risk and improve the security of your data. | Read More →Words: 1010 Downloads: 0 Category: IT By: Lysis
The Mirai botnet and malware were able to bring down the internet using gigabytes of data sent to targeted businesses including Dyn, a provider of DNS. Botnets cause spikes in internet traffic that crash servers and critical web services, and Mirai is one of the most effective at it. Mirai infects IoT devices running embedded Linux, which powers much of the world's routers, cameras, mobile devices, smart home automation, and many other components. To add cybersecurity to your IoT devices, you must change the default password as soon as you install and use them in your home or business. | Read More →Words: 1057 Downloads: 0 Category: IT By: Lysis
To better improve customer experience and overall revenue of your business, you need a fast application. Application performance monitoring tools detect usage spikes, errors, and poor user behavior patterns so that you can review your web application for issues. With the right application monitoring, you can retain customers and improve the user experience so that customers do not leave your site for a competitor. | Read More →Words: 1034 Downloads: 0 Category: Web Development By: Lysis
Log management is the process of organizing and aggregating events for infrastructure and applications across the network. By managing logs properly, organizations can use analytical software such as security information and event management (SIEM) software to accurately monitor the network. SIEMs are enterprise applications critical to the cybersecurity and reliability of a network including the cloud. Log management is the first step in building an efficient way to monitor on-premise and cloud infrastructure. | Read More →Words: 1019 Downloads: 0 Category: IT By: Lysis
When building a web application, keeping cybersecurity in mind to avoid the latest exploits and vulnerabilities is difficult for developers. Web development requires an understanding of the way hackers compromise code. Cross-site scripting (XSS) is a very common exploit that can be found in many applications when developers leave their code vulnerable to non-sanitized user input. | Read More →Words: 1106 Downloads: 0 Category: Web Development By: Lysis
If you’re passionate about the written word and have a proven track record in creating exceptional content, then we should talk. We’re always looking to find great content and copywriters to join our site.Writer Registration