Arduino Clones and DHT11 temperature/humidity sensor

As previously mentioned, to diversify my techie skills (and its fun), I have a little side home DIY project on the go to achieve the following: Create a RS485 network, to allow me to easily connect together multiple Arduino’s over a distributed network. Gateway said RS485 network onto the Ethernet network in the house Get[…]

Software Architect Security – what does defense by depth mean on the cloud?

According to a recent report – security looks to be a top concern among Software Architects. In this article I go into detail on one of the core ways in which you can achieve dependable security in evolving online systems – namely defense by depth. What is defense by depth? Simply put this is where one[…]

software architecture skills, top 5

Software Architect skills, the top 5

Software Architects need a combination of skills to be able to succeed and deliver designs that are long lived and able to provide strong commercial value to a business. Below I list what I consider to be the top 5 skills in order to be a good Software Architect. #1 Able to listen and confirm[…]

PII Hacking

What is PII Really?

PII (Personally Identifiable Information) broadly speaking is information that relates directly to the individual (you) and allows you to be individually identified. We explain in this article what it is and how to protect yourself against people trying to steal your identity through PII. Why is PII so dangerous? Such information can be often easily[…]

Systems Architecture & Security, winning at both

Online systems need to be both secure and designed to last, so how can you achieve both and not blow the budget? This article covers a few simple principals you can adopt which are both good for your systems architecture and good for your security. #1 System Components should only do what they say on[…]