-
Technology cost analysis
Cost analysis can be a tricky exercise in the technology space as not all costs are readily apparent during price shopping.
-
Establishing trust in business
Sometimes the best way to make a sale is to stop selling and focus instead on building a relationship and establishing trust.
-
Information leakage and side channel attacks
Side channel attacks are one of the many cryptographic footguns we need to avoid while designing and building secure applications.
-
Security by obscurity
The weakest form of security is that obtained through obscurity – hiding what would otherwise be plainly found in hopes it’ll be missed.
-
The value of repetition
There is value in every coding discipline, but repetition and practice should have a particular emphasis.
-
Right to repair
I will always support a consumer’s right to repair the things they own. It’s cheaper, sustainable, and far more rewarding than replacement.
-
Own your mistakes
What’s the largest mistake you’ve made in your career? Did you hold yourself accountable for it? What did you learn through the experience?
-
Basic cryptography – Diffie-Hellman key exchange
How do you communicate securely over an insecure medium? Using the Diffie-Hellman key exchange to agree on an encryption key is a start!
-
Fear of deployment
Everyone experiences fear, especially creatives like developers. Overcoming that fear to ship an imperfect 1.0 is the only way we learn.
-
One month with WordPress
After using WordPress’ new editor for a month, here are some of the pros and cons I see as a writer using the platform.









