User Authentication, you must do it right!

I must admit, one of my all time pet peeves is when engineers do not implement their user authentication service in the right way to be defendable against an attack. Take for the instance the recent hack against Zomato in which they had 6.6m hashed user passwords stolen. The real problem here is not that the[…]

Arduino Clones and DHT11 temperature/humidity sensor

This is part of the TechEd section. As previously mentioned, to diversify my techie skills (and its fun), I have a little side home DIY project on the go to achieve the following: Create a RS485 network, to allow me to easily connect together multiple Arduino’s over a distributed network. Gateway said RS485 network onto[…]

Software Architect Security – what does defense by depth mean on the cloud?

According to a recent report – security looks to be a top concern among Software Architects. In this article I go into detail on one of the core ways in which you can achieve dependable security in evolving online systems – namely defense by depth. What is defense by depth? Simply put this is where one[…]

software architecture skills, top 5

Software Architect skills, the top 5

Software Architects need a combination of skills to be able to succeed and deliver designs that are long lived and able to provide strong commercial value to a business. Below I list what I consider to be the top 5 skills in order to be a good Software Architect. #1 Able to listen and confirm[…]