We are witnessing a programming paradigm shift towards Functional Programming (FP)…
I’ve been writing Go tests using the Ginkgo BDD test library, and its preferred matcher library Gomega for almost…
The term ‘smoke and mirrors’ could easily be applied to the lab-grown diamond industry’s…
Wave energy has had many false dawns. But now a company from Finland has a working 2MW…
Using non-stationary time series data in forecasting models produces unreliable and spurious results…
A version of this article previously appeared in The Wall Street Journal.
One of my writer friends sent me a video yesterday that made me drop everything…
There’s a lot of bad writing advice out there. From self-declared “thought…
Code reviews are a beneficial engineering practice to ensure high-quality and maintainable…
Summary: DID Messaging can provide a secure, authenticated, and verified channel for every…
Things I Wish I Knew The First Day I Published.
Branding a company — let alone creating a personal brand — is tricky business.
IoT security is not properly equipped to handle advanced threats. Traditional IT security does…
My voice and I have not always been friends.
Without Vulnerability, You Can’t Form Connection, And Without Connection, You Can’t Lead
Myths vanish once people stop believing in them.
It is years now that data-driven, data-based, data-intensive activities ceased to be of purely scientific significance and…
How a major appliance failure forced a life reassessment
Environment. Culture. HR…
And enjoy the writing journey
I have a friend who has recently had quite a run of good luck. Barely a week goes by without her…
“Are you sure you want to do that?”, my mother asked, a mixture of concerned and supportive.
Can you take control by giving up control? What its all about is influence.