After initially viewing AI as just another hype cycle driven by market pressures, I became a daily user when Claude Code allowed me to harness AI's power within my existing development workflow.
Formation flying demands a level of precision and focus unlike anything else in general aviation. Here's what it took to train for the B2Osh arrival into Oshkosh.
I was invited to speak at the innagural AuthCon, the first Customer Identity and Access Management (CIAM) conference. During my presentation, I shared real-world insights from my company’s journey to SaaS. I outlined how customer identity and access management needs evolved across on-premises, hybrid, and cloud-native environments, and why building or buying the right identity features is critical for security, scalability, and customer satisfaction.
After attending multiple security conferences this year, BlueHat 2024 stood out for all the right reasons: no vendors, no sales pitches, just pure technical content. The dual perspectives from security researchers and Microsoft's Security Response Center revealed that every security team faces the same fundamental challenges, just at different scales.
Fed up with losing SSH keys during my annual machine rebuilds, I discovered 1Password's SSH Agent functionality. With some configuration tweaks, I now manage keys securely across devices and projects while adding MFA protection to every SSH operation.
Cross-platform encryption is a pain - different languages, same algorithm, different implementations. Here's working AES-256 code for C#, Node.js, and PowerShell that actually interoperates correctly, so you don't have to debug crypto edge cases.
Six years after receiving 'Getting Naked' during Slalom onboarding, I finally read it. The three fears that sabotage client loyalty - embarrassment, feeling inferior, losing business - hit hard. Being vulnerable is terrifying, but it's also where growth happens.
The security field is constantly evolving. While Application Security has been around since the early 2000s, Product Security has only gained popularity in the last 5-8 years. Is Product Security just a rebrand of AppSec? There's no universal agreement on what it actually is.
A guide to filing IFR practice approaches in the Seattle area, including the unique approach code system used by Seattle Approach for concise flight plan remarks.
After 500+ days of waiting for registration issues, engine upgrades, and magneto problems, I finally flew my Beechcraft Bonanza 1,000 miles from Riverside, California to the Pacific Northwest.