Most of us corporate application developers are subject to the boundaries of corporate networks and this is a good thing since we have our security and authentication infrastructure being taken care of by the IT security people, just like the […] ↓ Read the rest of this entry…