Are Estimates Actually Valuable?
A video reacting to comments on estimates by our viewer yugr: we have a toolbox of practices, each practice has an applicability domain, estimates are no different.
Are Estimates Actually Valuable? Read More »
A video reacting to comments on estimates by our viewer yugr: we have a toolbox of practices, each practice has an applicability domain, estimates are no different.
Are Estimates Actually Valuable? Read More »
Dr. Werner Vogels, CTO at Amazon, has published recently a set of predictions for 2026 and beyond. We focus on one of them: “The dawn of renaissance developers”.
Renaissance Developer Read More »
After going through our courses on clean code, refactoring, TDD, or software design, a common question is “how do I convince my colleagues to follow these practices?”. The answer is more subtle than you might expect, and it involves an interesting trip to the patterns community.
How do I convince my colleagues to <practice> Read More »
As AI transformations start ramping up in large organizations, they face the same dilemma as previous initiatives: innovation is fastest with freedom, while organizational stability requires constraints. To navigate this contradiction, Alex revisits the trusted tool of Cynefin sense-making device, that turns out has an even better applicability for AI transformations. If you want to
Cynefin Applied to AI transformations Read More »
In 2026, large organizations will transform due to AI and blur the lines between roles still considered distinct today.
AI Transformations Will Change Your Role Read More »
The internet was designed to survive a nuclear attack, yet it doesn’t survive a DNS misconfiguration. We can blame centralization, but look deeper: any distributed architecture is subject to forces that push it in conflicting directions.
DNS Exemplifies Distributed Systems Tradeoffs Read More »
Applications using LLMs open to a huge number of vulnerabilities and potential attacks. Learn why and what to do to enhance the security of your products. Links:
LLMs are Highly Insecure Read More »
In which Alex explains the meaning of this phrase: “The threat actor used OSINT reconnaissance to map our attack surface, exploited a vulnerability to gain initial access, then used lateral movement and privilege escalation before exfiltrating PII and establishing persistence”
Security Jargon for Developers Read More »
Residuality theory is a fascinating theory about designing stable architecture over time, created by Barry O’Reilly. Alex takes a look at it, and it might be the practice that solves software architecture and design. Links:
Residuality theory solves architecture Read More »
InfoQ has published the latest AI, ML and Data Engineering Report for 2025, and Alex reacts to the parts that affect software development.
Reaction to InfoQ AI Trends Report 2025 Read More »