Is Pepper Useful for Hashing Secrets?
How is pepper useful, since it’s stored in plain text? It requires potential attacker to either get more information or work more. Learn more in this video.
Is Pepper Useful for Hashing Secrets? Read More »
How is pepper useful, since it’s stored in plain text? It requires potential attacker to either get more information or work more. Learn more in this video.
Is Pepper Useful for Hashing Secrets? Read More »
We have come to the conclusion that AI will either pop the bubble or disrupt full industries and the economy. We see that the agentic workflows are a disruptive force with the potential to automate a lot of existing business flows. Yet the progress is not visible to everyone while having the potential to be exponential, and therefore highly counter-intuitive.
AI – Pop or Disrupt? Read More »
Could tables be a universal UI and application engine? In this video, Alex introduces a small prototype of a table-based app
Tables as Universal Apps? – A Toy Read More »
A programmer recently asked me how he could switch to a cybersecurity role. The answer might surprise you.
5 Effective Ways To Switch Roles Read More »
Every architectural decision is a trade-off. But trade-offs are not discussed enough and architects learn them empirically. So let’s look at some examples and discuss how to apply them. Links:
Trade offs examples Read More »
What’s orchestration? What’s choreography? How do we choose between them? If you’ve ever asked these questions, this is the video for you.
Orchestration vs Choreography Read More »
Humans have always learned and solved problems through conversations. Yet, the education systems we have use a linear way to present their material. And software development has selected the silent problem solvers. With newer generations being more connected and the rise of AI assistants, will we go back to conversational learning and problem solving?
Rise of Conversational Learning? Read More »
Just reacting to memes about AI.
React to AI Memes To End 2025 With Fun Read More »
Alex talks about 5 useful tools he used in 2025:
5 Awesome Tools I Used In 2025 Read More »
Following the Shai Hulud worm and its Shai Hului 2.0 follow up, supply chain attacks have gained visibility in the development space. But what are they? How can we prevent them? What can we do when we build embedded systems? Spoiler alert: audit, pin versions, identify packages based on cryptographic hashes, use SBOMs, scan for
Supply Chain Attacks Explained Read More »