# Hello World
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam,
quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse
cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
## Unordered List
- one two
- three
- teenth
### Image, Inserted (full size)

### Image, Resized
<img src="assets/becky.jpeg" style="width:50px;height:auto;"/>
### Image as a Link
[<img src="assets/fp2.svg" style="width:50px;height:auto;"/>](https://stage.frogpuppy.com)
#### Video
<figure class="video_container">
<iframe src="https://player.vimeo.com/video/187287984?badge=0&autopause=0&player_id=0&app_id=58479" width="320" height="180" frameborder="0" allow="autoplay; fullscreen; picture-in-picture" allowfullscreen title="Burn Camp Movie Teaser"></iframe>
</figure>
Hello World
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam,
quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse
cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
Unordered List
one two
three
teenth
Image, Inserted (full size)
Image, Resized
Image as a Link
Video
<h1 id="hello-world">Hello World</h1>
<p>Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam,
quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse
cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.</p>
<h2 id="unordered-list">Unordered List</h2>
<ul>
<li>one two</li>
<li>three</li>
<li>teenth</li>
</ul>
<h3 id="image-inserted-full-size">Image, Inserted (full size)</h3>
<p><img src="assets/becky.jpeg" alt="becky graduation with cigar and flowers" title="Becky"></p>
<h3 id="image-resized">Image, Resized</h3>
<img src="assets/becky.jpeg" style="width:50px;height:auto;"/>
<h3 id="image-as-a-link">Image as a Link</h3>
<p><a href="https://stage.frogpuppy.com"><img src="assets/fp2.svg" style="width:50px;height:auto;"/></a></p>
<h4 id="video">Video</h4>
<figure class="video_container">
<iframe src="https://player.vimeo.com/video/187287984?badge=0&autopause=0&player_id=0&app_id=58479" width="320" height="180" frameborder="0" allow="autoplay; fullscreen; picture-in-picture" allowfullscreen title="Burn Camp Movie Teaser"></iframe>
</figure>
site-ui: Initial Web Site
Home
<h2>Welcome to Sweet Software</h2><p> Sweet Software, LLC provides unique software solutions to a company's complex information processing challenges. We specialize in the areas of Network Security, Application Security, Schedule/Route Optimizations and Efficiencies, Programming Language Design, Mobile Software Development (concentrate on security for banking/financials). In addition, we help set up security incident response procedures (focused on software security bugs) as well as software development process consulting.</p>
Services
<p>Your company uses computers and software solutions throughout its business. Your IT or engineering department is full of smart people. Perhaps, they lack the experience or simply the time your company needs.</p><p>You've thought about looking for outside help.</p><p>You've found it:</p>
<h2>Network Security</h2><p>Web-based applications should use SSL. All the other network apps out there (client/server, smart-grid/home-energy, mobile app to server, in-home networks, proprietary network protocol) need a secure network protocol. Building one takes experience. Sure, your engineers might wire in Yarrow, AES and SHA-1, but have they left any holes? Perhaps, you are relying on security by obscurity. You're only one decompiler or oscilliscope away from having your system hacked.</p><p>Want to make sure that secure channel is up to snuff?</p><p><a href="contact.html">Contact us</a> to review your application's network security.</p>
<h2><a class="nakedlink" href="srvcs.html">Services</a>: Development Process</h2><p>You're development schedule slipped months ago. Cool stuff is being coded, but the application isn't even alpha. Bugs are stored on crumpled sticky notes. Coders get carpal tunnel just thinking about writing a design. You wish someone would accidentally break the code daily because that would mean they're using source control. This isn't the feature set you asked for.</p><p>Are you tired of herding cats?</p><p><a href="contact.html">Contact us</a> to rope them in.</p>
<h2><a class="nakedlink" href="srvcs.html">Services</a>: Incident Response</h2><p>You're application or website has been hacked a few times and your operations and development teams are in disarray. You've tried to release patches to your software, but your customers are getting more and more upset. Finger pointing runs rampant, and the reported security problems are getting worse. You're the lucky ones, some companies don't even have a security incident response team.</p><p>Looking for a better way to deal with reported security problems?</p><p><a href="contact.html">Contact us</a> to relieve the pressure.</p>
<h2><a class="nakedlink" href="srvcs.html">Services<a>: Mobile Applications</h2><p>On the phone or on the web? Both? Should that web address start with an 'm.', end with '.mobi' or just work off your current website? Which phones should you build for? Does anyone even consider 2007 technology anymore? And, what about securing the phone application?</p><p>Will anyone take you seriously if you don't have a mobile app?</p><p><a href="contact.html">Contact us</a> for code on the go.</p>
<h2><a class="nakedlink" href="srvcs.html">Services<a>: Computer Languages</h2><p>When in doubt, write a new language. It's fun to go meta.</p><p>Should you use lex/yacc (or bison/flex)? Do you code your own tokenizer/parser? Is it worth creating a new domain specific programming language or does the object-oriented nature of your current language meet your development needs? It depends on what you want to do.</p><p>Some problems are just easier to solve in the abstract.</p><p><a href="contact.html">Contact us</a> for a new way to code.</p>
<h2><a class="nakedlink" href="srvcs.html">Services<a>: Artificial Intelligence</h2><p>Sure, data are data and algorithms are algorithms. What could be so hard? It's not rocket science, is it? The problem is that a 10% bump in data turns into double your software's execution time. You need novel solutions to that really complex logistics or scheduling problem, not more silicon.</p><p>What about using an algorithm that schedules observation time on the Hubble Space Telescope? Maybe, it is rocket science.</p><p>Need smarter applications?</p><p><a href="contact.html">Contact us</a> to layer on a little artificial brain power.</p>
<h2><a class="nakedlink" href="srvcs.html">Services</a>: Application Security</h2><p>SHA or MD5? Which AES key-length is best? PKI or Password Hashes? PRNGs missing entropy? Are you supposed to encrypt all of the <a href="http://en.wikipedia.org/wiki/Personally_identifiable_information">PII</a>? Are you protected from code injections?</p><p>You've got acronym overload, and you haven't even discussed whether or not your application's state can be hacked.</p><p>Need your application's security design analyzed?</p><p><a href="contact.html">Contact us</a> for a review.</p>
Writings
<h2>Articles</h2><p>Blog stuff here</p>
About
<p>Sweet Software, LLC provides software consulting and software process consulting with a focus on the industry's really hard problems: security and artificial intelligence. Andy Philips, owner of Sweet Software, has been thinking about and fixing these types of problems for a long time.</p>
<h2>Bio: Andy Philips</h2><p>Mr. Philips started his career at NASA developing Artificial Intelligence algorithms for Shuttle Payload Processing, the Hubble Space Telescope and Automated Photometric Telescopes). While there, he helped create the <a href="http://en.wikipedia.org/wiki/Min-conflicts_algorithm">Min-Conflicts Algorithm</a>.</p><p>At Red Pepper Software he designed and built their scheduling and planning programming language: a proprietary, object-oriented 4GL with built in constraint modeling and recursive transactions. Using the language scheduling experts model customer problems in the abstract, freeing developers from detailed programming tasks. PeopleSoft (now Oracle) purchased the company as its sole MRP II product-line. </p><p>At Open Horizon, Mr. Philips worked managed development on two of their product lines. On the first, he designed and built a secure transport system for proprietary generic client/server objection replication and that included a distributed memory model. Over that code the team built secure database transports for Oracle, Sybase and ODBC drivers. The second product line was a Java-based, secure publish-subscribe messaging system.</p><p>Mr. Philips went on to work at Oracle for eight years where he first managed the secure database connectivity team and grew that group to support a broad offering of security components both commercially and internally. Next, he moved to the Applications Division where he worked to upgrade Oracle Applications (E-Business Suite) security and was instrumental in the creation of Oracle's Security Bug Incident and Handling Process. Mr. Philips authored a number of security related patents during his time at Oracle.</p><p>At telSPACE, Mr. Philips built three implementations of a Mobile Payments phone application in Brew, J2ME/Blackberry and WAP. The on-phone applications can update the UI on the fly (without new code downloads). The Java application has a built-in interpreter and rendering engine providing abstraction over all and Blackberry phone types. The J2ME version never met a phone it didn't like; three builds cover all Java phone types.</p><p>When not working, Mr. Philips may be found cooking for his family, coaching one of his kids sports teams or riding his bike along the sweeping roads of Northern California or down some of his favorite (secret) single-track.</p><p>Mr. Philips graduated from Carnegie Mellon University in 1989 with a B.S. in Electrical and Computer Engineering.</p>
<h3>Awards</h3><ul> <li>AAAI 2008 <a href="http://www.aaai.org/AITopics/pmwiki/pmwiki.php/AITopics/ClassicPapers">Classic Paper Award: Min-Conflicts</a></li> <li>NASA Certificate of Recognition of Technical Innovation</li></ul>
<h3>Patents</h3><ul> <li>Patent 7185202: Electronic Signature from a Browser</li> <li>Patent 7437562: Browser Assisted Email Signing</li> <li>Patent 7530094: Application Cluster Single Sign-On</li> <li>Patent 7764795: Key-Exchange with Password-Derived Prime</li> <li>Patent 7827599: Self-Service Certificate Provisioning</li></ul>