The origin of the modern neckbeard (hacker)

Henry David Thoreau (1816-1862) was probably the first content creator to sport a vigorous neckbeard. As Louisa May Alcott noted: “Most assuredly it deflected amorous advances and preserve the man’s virtue in perpetuity.” Discovering the contraceptive advantages of the neckbeard was not the only way in which Thoreau was ahead of his time. He was […]

Read More

Russian inflatable tank

The Art of Maskirovka: Russian Intel linked to DNC & DCCC hacks

Information Security Researcher & OpSec guru thegrugq is piecing various independently researched information together, leaving no doubt that the FSB was behind recent DNC and DCCC hacks. In my elaborate August post on Smart-City security and ethical considerations, I pointed out that hacking and meddling in a foreign nation’s elections is neither new, nor unexpected. […]

Read More


SmartCities’s Cyber Security Role and Ethical Challenges

The security and safety challenges of smart-cities are an area of hot discussion, and thanks to its property as an umbrella term, every vendor has their opinion on it. Most technical research on smart-cities aren’t addressing cyber security and privacy concerns in their design. The consensus is that it’s really the vendor who should be held accountable. […]

Read More

digital darwinism

Streembit in the era of “Digital Darwinism”

Human Vs. machine, Atoms Vs. bits; this changes in how people communicate, connect with machines, and discover the world of things are carrying incredible technologies to Digital market. We are now beginning the era of “Digital Darwinism”. “Era where technology , society and operation models are evolving faster than businesses can adapt.” Firstly thanks for […]

Read More

Dog Licking Fawn

Thoughts on Streembit without getting too technical

I have been trying to come up with a simple explanation of Streembit. Almost like an explanation without actually explaining it: “Streembit is a peer-to-peer human and machine communication platform. Secure, peer-to-peer, decentralized network formation is a fundamental and unsolved information technology problem.“ Streembit aims to solve this problem. But what exactly is the problem […]

Read More


Interesting Lifehacks: Use a Wooden Spoon to Block Part of your Screen

While the benefit of the wooden spoon may not be immediately obvious to the novice user, the concept is now hailed the ‘next big thing’ in software development. Early adopters have been tinkering with some creative use-cases. Most users first realize The Spoons power when selectively blocking unwanted pop-ups. This works much better than any browser […]

Read More


Can Passengers Access an Aircraft’s Safety Critical Systems via the IFE?

Interesting discussion has popped up on my LinkedIn feed over a picture showing an ancient version of Linux used in an In-Flight Entertainment (IFE) system. The question was raised again (over and over) whether a passenger can issue safety critical commands or access functions from the cockpit. IFE’s are typically certified to Design Assurance Level […]

Read More


Streembit: “Hello World” My 1st Ever Video Call over a Decentralised P2P Network

Today I’d like to show you what Streembit, the world’s first decentralised P2P based messaging platform can do for humans (besides the IoT). Streembit uses well tested cryptographic industry standards to ensure end-to-end encryption. There are no 3rd parties, or intermediaries monetizing your data. Using a DHT, Streembit avoids the traditional pitfalls threatening the bitcoin network while remaining agnostic about the eventual outcome […]

Read More


Streembit: a decentralised peer-2-peer messaging platform for the IoT

Introducing Streembit: a decentralised, peer-to-peer, secure communication system for humans and machines. The purpose of Streembit is to create a free, secure, decentralised, peer to peer, Open Source system that secures your real time communication in accordance to the currently evolving W3C’s Web of Things (WoT) standard. You can have as many accounts on the permission less […]

Read More

Securing the Internet of Things

Securing the Internet of Things

A report from the Economist Intelligence Unit The internet of things (IoT) presents the ultimate scenario of technology disruption. In industries ranging from door locks to auto, from sports apparel to heavy manufacturing, the IoT is upending business models, restructuring organisations and redefining the very nature of information technology (IT). But recent research by The […]

Read More


An incomplete List of Organizations and Alliances for the Internet of Things

Does the IoT needs more standards? Yes because we all know that the more standards we have the better it is for the industry (sarcasm tag for those who haven’t gotten the irony). Standards are utterly pointless if we can not rely on them remaining stable. And so unless the individual standardization bodies realize their […]

Read More

cyber tyrannosaurus rex

Attacking the Internet of Things for Fun and Profit

Last updated 22nd Sept. 2016. Below we’re collecting the most interesting and influential IoT Security papers. This post targets engineering professionals who want to jump-start their IoT Security foo or wish to move into this Brave New World that is the Internet of Things or more specifically learn about IoTSecurity. The below content is evolving (hopefully with your help). If you find something missing […]

Read More


The role of the Business Analyst in Agile Projects

I still find that many engineers and even decision makers planning large-scale Agile Transformation are unaware of what a Business Analyst does and how critical their value can be to a project. So today let’s take a closer look at the often misunderstood job definition of “Business Analyst” and what makes a BA outstanding in their field. […]

Read More

US DoS site data leak

Misconfigured US DoS website leaked classified files into

thié has recently pointed out that the robots.txt file from the US Department of State website contains a grave misconfiguration. A robots.txt is part of a webservers configuration and supposed to be publicly readable. It tells search engines which links on the site should (not) be indexed. But the configuration directives which were used in robots.txt must have […]

Read More

mercury retrogrde

The Software Engineers Guide to Mercury Retrograde

According to Western astrology, there’s this thing called “Mercury Retrograde”. Before you dismiss it as mumbo-jumbo remember that this “science” is several thousand years old. And probably too complex for even software engineers like you and me to understand 🙂 During a this “planetary” alignment some activities (like hosting long meetings or code-refacturing) are safe, others are not. […]

Read More

devops in a box

Is DevOps Bullshit?

In a recently trending rant on hackernews Josh Johnson pointed to his negative experience with the DevOps process after taking on a new job in a firm that had a “dedicated devops team”. The post is mainly a rant about “that devops is utter bullcrap” and any sane developer should run when they hear the term. My problem with this is that […]

Read More


Tinker Tailor Soldier Spy: US industrial espionage in Germany

a quick reminder that NSA surveillance is not just a post 9/11 phenomenon. “Echelon” was a US industrial espionage program in Germany. See this post from 2000 calling for the shutdown of the program. “Germany’s national intelligence agency, Verfassungsschutz, openly warns its business and industry community against Echelon. Germany’s intelligence agencies do more than just warn […]

Read More

Tony Hoare

Tony Hoare: Invention of the null-reference a billion dollar mistake

Computing Pioneer Sir Charles Antony Richard Hoare (aka C.A.R. Hoare) was mostly known for his Quicksort algorithm, but less remembered for the idea of the “null-reference”. He noted in 2009 that it was his “billion-dollar mistake” which he regretted and only implemented it because it was so easy to do: I call it my billion-dollar […]

Read More

service level agrement

Service Level Agreements for Carrier-Grade Clouds: beyond best-effort

Service Level Agreements (SLAs) are a the nuts and bolts of a business agreement and next to QoS and Security the final pillar of a Carrier-Grade Cloud offering. SLAs define functional and non-functional conditions under which the service should be delivered. They allow for penalties or compensations to be directly derived. Ironically these SLAs have historically been best-effort, static (sometimes paper) constructs, taking only […]

Read More


QoS considerations for Carrier Grade Clouds: location, location, location.

A Carrier-Grade Cloud (CGC) is a cloud platform suitable for deployment, with stringent Availability, Reliability, QoS and Security requirements which are fundamental for Real-Time applications in many domains such as Telecoms, Automotive, Banking (Trading) sector. In our previous post we looked at the security requirements paramount to the design of such systems. Now lets see how […]

Read More


DevOps and Security

Software developers are “bonused and incentivized” for causing change. That’s how they make their money. Operations people inherit these changes and earn their money by maintaining stability. As change is the natural enemy of stability, developers and operations are natural enemies. DevOps changes this by harmonizing and aligning their incentives.  But what about Security? The recent “heartbleed” and “shellhock” exploits […]

Read More


Flow: my addiction behind programming!

The psychologist Mihaly Csikszentmihalyi (pronounced six-cent-mihaly) has studied the state of effortless attending, or  flow, as he called it. Flow is characterized by complete absorption in what one does. People who experience flow describe it as the “ultimate state” of effortless concentration and “joyful immersion”. So deep that they lose sense of time, of themselves and their problems. Hence Csikszentmihalyi calls it […]

Read More


Software-Defined Networking: A Comprehensive Survey

This is probably one of the most complete papers on the subject I have seen to date, published 02/06/2014 by by Diego Kreutz, Fernando M. V. Ramos, Paulo Verissimo, Christian Esteve Rothenberg, Siamak Azodolmolky, Steve Uhlig. So if you’re new to SDN or need an in-depth look, grab yourself a fresh coffee and get started: Software-Defined Networking […]

Read More

imposter syndrome

The Imposter Syndrome in Software Development

“The impostor syndrome, is a psychological phenomenon in which people are unable to internalize their accomplishments. Despite external evidence of their competence, those with the syndrome remain convinced that they are frauds and do not deserve the success they have achieved. Proof of success is dismissed as luck, timing, or as a result of deceiving others […]

Read More

hype cycle

Gartner Hype Cycle 2014

Gartner predicts that the Internet of Things will replace Big Data at the top of the “peak of inflated expectations”. I like the idea of illustrating Hype Cycles because buzzwords to me become quickly annoying. My data aggregation is full of blah and press-releases and “tech-news” are often just empty blah! Words like BigData and Cloud are being thrown around by […]

Read More


Considerations for Carrier Grade Clouds: Security

A carrier-grade cloud is a cloud platform or infrastructure suitable for deployment, with stringent availability, reliability, QoS and security requirements which are fundamental for real-time applications in Telecoms, Automotive, Banking (Stock Trading) and the Energy (Smart-Grid) sector. These industries operate under regulations that can prevent data sharing in many circumstances. Additionally, companies are reluctant to […]

Read More

Businessmen fighting with golf clubs

Root Cause Analysis: Problem identified between keyboard and the chair!

“No matter how technical it looks at first, it’s always a people problem” is the famous quote of Gerald M. Weinberg, who noted that in computer science we tend to look at all problems as engineering problems. What makes or breaks your project are process and people issues. We search for technical solutions, when we should be […]

Read More


DISCLAIMER: this post may contain buzzwords!

buzz·word  (bzwûrd) n. 1. A word or phrase connected with a specialized field or group that usually sounds important or technical and is used primarily to impress laypersons: “BigData”, “Cloud”, “Internet of Things“, “Agile“, “DevOps” …. 2. A stylish or trendy word or phrase. When people in tech hear buzzwords, it usually makes their skin […]

Read More


BreakingNews: Hapless recruiter searching for LAMP developer; hires electrician

All joking aside, the current state of the recruitment industry is no laughing matter. It is a world lacking any form of entry barrier and as bizarre as something directed by David Lynch himself! It’s not only the candidates who are getting fed up. Also HR departments are fending off hordes of thick skinned recruiter-goblins. And […]

Read More