I am a freelance software engineer with the skills and experience needed to build functional, reliable, secure, maintainable code. My extensive software engineering background across many areas helps me to bring a wealth of experience to development projects.
Web application technologies I work with most and know best are:
Desktop application technology I work with most and know best:
Java SE for Windows, Linux, and Mac applications.
I have extensive experience integrating data and services from 3rd party APIs into custom software applications.
I am communicative and reliably available by email, instant message, and phone.
I work well with others making me an effective team member.
I work efficiently and always try to resolve problems and issues the same day when possible.
I write high-quality, secure, maintainable software code and test thoroughly to prevent “bugs” and security vulnerabilities.
Custom software can deliver more value from your IT resources because it can be targeted directly to your unique business requirements. Custom applications can be built to provide the features you, your employees, and your customers really need without those you don’t, making your business more efficient and more productive.
For the most part WordPress is a good option for your web site. With its extensive repository of themes and plugins WordPress provides site owners with many options for design and content. Also, the fact that WordPress is built on php and MySQL, two open technologies with large developer bases, site owners can leverage a high-level of customization. But, in spite of all the good things, WordPress site security can be a significant challenge.
Google’s Project Zero security team just announced two serious security vulnerabilities called Meltdown and Spectre. These vulnerabilities are particularly serious because they occur in the CPU chip’s architectures so it affects any software running on most Intel CPUs manufactured from 1995 to today. If you have a device or computer with an Intel processor that implements “out-of-order” execution, as most CPUs in use today do, it is vulnerable to attacks.