Matt Boegner

A collection of my ideas on tech, travel, policy, and life.

Washington DC, USA

A Visit to "The Walker Library of The History of Human Imagination"

I recently had the privilege of touring the magnificent private library maintained by Jay Walker, CEO of Upside Business Travel. The inspiration and theme of the 3,600 sq. ft, 50,000+ item collection is "the history of human imagination". Mr. Walker, a masterful storyteller, weaves a compelling narrative of human imagination as the...

Speaking at the Cloud Analytics World Tour - April 2018

Those who are familiar with my work and this blog know that I am a huge fan of Snowflake Computing and the work the company is doing in cloud-based data warehousing. So I reacted with great excitement when offered the chance to participate in their recent Cloud Analytics World Tour event here in Washington,...

Building an Advanced Analytics Platform using Snowflake’s Cloud Data Warehouse

This is a repost of my feature on the Upside Engineering Blog. At Upside, we’re in the business of providing the best possible experience to business travelers. In that objective, we take measures such as proactively detecting flight delays & cancellations, algorithmically recommending suitable travel packages, and integrating with numerous external services such...

Basecoin: Designing a Price-Stable Cryptocurrency for Mainstream Adoption

For better or for worse, I’ve developed a bit of a reputation as “the cryptocurrency guy” around the office - the large Ethereum sticker on my MacBook Pro is hard to miss. And admittedly I’ve derailed a couple of happy hour conversations at the first mention of blockchain, Bitcoin, etc. So it’...

Integrating Security into the CI/CD Pipeline: Step-by-Step Recommendations

This is post 2 of 2 on the subject of security in a DevOps environment. For an introduction to the concept, see my previous post. Starting Out The first step towards the delivery of secure software is to conduct risk assessment and threat modeling. The exercise allows you to formulate security objectives and outline...