Category: Analysis

Returning security back to the user

I am not a fan of apps encouraging users to sign up using their social network credentials. The other popular alternative is creating individual accounts on each service, but it has its own pitfalls. There are emerging techniques like password-less authenticators that help simplify and secure the process. This post reviews some of them.

Teleportation can corrupt your data

By sending me unsolicited emails and by cold calling me using robotic software you are indicating to me that you feel my time is not valuable. You are saying that interrupting me all day with unsolicited emails and cold calls costs you nothing but a small chance of you winning a gig is worth it to you.

Let’s talk cloud neutrality

Avoiding managed services, using Docker and running eight Mongo and twelve Kafka nodes does not make an application cloud neutral — it makes it costly to develop, Kafkaesque to architect, and impossible to maintain in production. You end up losing your weekends and quality time with family to DR exercises and production support.