Published inLevel Up CodingHow to Win a HackathonDo’s and Don’ts for a successful Hackathon POC and PitchFeb 4Feb 4
Published inTDS ArchiveWhy Every Software Architect Needs to Learn GenAIYou can’t afford to remain an AI-ignoramus, even if your product isn’t using an LLMJan 85Jan 85
Published inITNEXTMy DOs and DON’Ts of Software ArchitecturePhoto by Pixabay on PexelsDec 26, 20249Dec 26, 20249
Published inCode Like A GirlFixing The Broken RungOvercoming Unconcious Bias In The Tech WorkplaceFeb 15, 20231Feb 15, 20231
Published inITNEXTCloud Security Needs Defense In DepthA comprehensive overview to Defense-In-Depth in Cloud Security. A.K.A. “Why acronyms are not enough to secure your cloud”Feb 12, 20231Feb 12, 20231
Published inITNEXT“Cybersecurity” Is Too GeneralWhether you’re developing your Cybersecurity career, or searching for talent - Security means different things to different peopleJan 1, 20231Jan 1, 20231
Published inITNEXTVideo Security = The Original ZTNAVideo Security implemented a perfect Zero Trust architecture way before Zero Trust was invented.Dec 21, 2022Dec 21, 2022
Published inITNEXTWhat Is Zero Trust, And Why It’s Old NewsA speedy technical overview of ZTNA, beyond the buzz wordsDec 21, 20222Dec 21, 20222
Published inITNEXTSo what is a Software Architect exactly?or in other words- Why am I a Software Architect?Dec 12, 20212Dec 12, 20212