-
Virtual Safe Box
How to keep important documents and confidential data safe at runtime? Running the operating system on an encrypted disk only protects my data when the computer is at rest, but what happens while I am using the system?
Read more… -
Mullvad OpenVPN Gateway
Let’s say that you have a virtualised server similar to Proxmox VE. There are few Virtual Machines within this server, and you want them to use a safe VPN connection out to the Internet.
Read more… -
The CIA triad in cybersecurity
Shall we play a quick game? Please, try to relate the items of the following columns: Description Is? Name 1 Your customers expect their personal information to be securely stored.
Read more… -
Why IT recruitment is broken
“Why is the I.T. recruitment process broken? Because we are performing the Cinderella tale over and over again.” What follows is my point of view about the I.
Read more… -
Autonomous vs Automation testing
To perform any kind of effective testing activity it is required to have testing context awareness, healthy running environments, good sample data and a clear understanding of the business rules.
Read more… -
Automating bugs
Executing a set of SQL updates in order to prepare test data can be harmful. Legacy systems: “These systems can be hard to maintain, improve, and expand because there is a general lack of understanding of the system.
Read more… -
Devs environment disorder
Do developers prefer to work in chaotic environments? Let’s face it, we need someone to blame when things do not work as expected. It is actually hard to self-inflict punishment and feel guilty about errors, bugs and mistakes.
Read more… -
The fearless style
For those struggling to understand what is holding their teams to perform better. This post is a quick philosophical exercise that helps us understand the fundamental impediment that blocks improvement in software development.
Read more…