10 posts about
Tech

Uncomfortable Questions You Should Ask Before Accepting a Job Offer

In job interviews, there are numerous information asymmetries. Job descriptions lack details about what the position really entails and are vague about what the company actually needs. Employers hide weaknesses in leadership, revenue growth, and employee morale. Hiring managers and HR departments aren't transparent about your fair market value. Having conducted dozens of interviews...

The Ultimate Onboarding Checklist for Remote Developers

A guide to the unique challenges that remote developers face when joining a new organization. Everyone knows the nervous routines of starting a new job: sweaty palms and jitters upon walking into the office, back-and-forth internal dialogues as you sort out obstacles (“should I ask for help or play it cool?”), and maybe a...

Speaking at the Cloud Analytics World Tour - April 2018

Those who are familiar with my work and this blog know that I am a huge fan of Snowflake Computing and the work the company is doing in cloud-based data warehousing. So I reacted with great excitement when offered the chance to participate in their recent Cloud Analytics World Tour event here in Washington,...

Building an Advanced Analytics Platform using Snowflake’s Cloud Data Warehouse

This is a repost of my feature on the Upside Engineering Blog. At Upside, we’re in the business of providing the best possible experience to business travelers. In that objective, we take measures such as proactively detecting flight delays & cancellations, algorithmically recommending suitable travel packages, and integrating with numerous external services such...

Basecoin: Designing a Price-Stable Cryptocurrency for Mainstream Adoption

UPDATE 12/14/2018: Sadly, the Basis (formerly Basecoin) project is shutting down. Citing US securities regulations, the team saw no way to implement their design without onerous and substantive alterations. The regulations would force measures such as 1) limiting token ownership to accredited investors and 2) enforcing transfer restrictions. Both actions centralize quite...

Integrating Security into the CI/CD Pipeline: Step-by-Step Recommendations

This is post 2 of 2 on the subject of security in a DevOps environment. For an introduction to the concept, see my previous post. Starting Out The first step towards the delivery of secure software is to conduct risk assessment and threat modeling. The exercise allows you to formulate security objectives and outline...

Integrating Security into the CI/CD Pipeline: An Introduction

This is post 1 of 2 on the subject of security in a DevOps environment. For step-by-step security recommendations, see my next post. Recently, a roommate and I got into a discussion about experiences with various CI/CD tools. When I asked about security practices, his enlightening comment was, “I do the least amount...