![From DevSecOps to Engineering Excellence](/content/images/size/w750/2024/07/Screenshot-2024-07-19-at-11.26.08-AM.png)
Latest
Jul
07
![From DevSecOps to Engineering Excellence](/content/images/size/w750/2024/07/Screenshot-2024-07-19-at-11.26.08-AM.png)
From DevSecOps to Engineering Excellence
As I sit here, sipping my third cup of coffee and staring at the blinking cursor, I can't
8 min read
Apr
22
![Sentinel: Hackers Trail | Chapter teasers](/content/images/size/w750/2024/04/DALL-E-2024-04-22-16.18.34---Create-a-wide-aspect-teaser-image-for-a-cyberpunk-themed-novel.-Feature-a-male-figure-with-bright-neon-green-hair-styled-in-spikes--viewed-from-behind.webp)
Sentinel: Hackers Trail | Chapter teasers
Every chapter of the book includes a Limerick, Naani Poem, Quatrain, or Proverb - at the start, can you decipher the story from them?
4 min read
Jan
31
![Exploring Delayed Dialogue Attribution](/content/images/size/w750/2024/01/DALL-E-2024-01-31-00.35.37---Create-an-image-inspired-by-vintage-writing-and-communication-themes.-Include-a-variety-of-objects-such-as-a-feather-quill--an-inkwell--a-vintage-type.png)
Exploring Delayed Dialogue Attribution
Fellow writers, we need to talk.. about talking properly. Delayed dialogue attribution is why a lot of readers get bored,
4 min read
Jan
14
![Navigating the Complexities of an ISBN (and an announcement)](/content/images/size/w750/2024/01/unveiling-of-a-new-imprint-logo.png)
Navigating the Complexities of an ISBN (and an announcement)
5 min read
Oct
23
![Understanding Digital Signatures: More Than Just a Hash](/content/images/size/w750/2023/10/what-is-a-digital-signature.png)
Understanding Digital Signatures: More Than Just a Hash
Digital signatures are a cornerstone of modern security practices, ensuring data integrity and authentication in various online communications. But there&
6 min read
Oct
18
![Word processors are holding you back!](/content/images/size/w750/2023/10/Typewriter_-4855182596-.jpg)
Word processors are holding you back!
2 min read
Oct
06
![Editors feedback for Sentience Chapter 4](/content/images/size/w750/2023/10/Facebook-cover-photo-1.jpg)
Editors feedback for Sentience Chapter 4
4 min read
Oct
04
![Why PASETO Might Not Be the JWT Replacement We Hoped For](/content/images/size/w750/2023/10/json-web-tokens-the-good-parts-0d4bc980e0cbc5f542f521ce7f673a14890e8726df21a2d20f5061a49d658bc7.jpg)
Why PASETO Might Not Be the JWT Replacement We Hoped For
PASETO, a potential alternative to JWT, has sparked conversations within the security and developer community alike (for once).
While PASETO
3 min read
Sep
05
![Sentience Chapter 9 - Book 3 of Sentinel Unleashed](/content/images/size/w750/2023/08/Eli-in-a-garage.png)
Sentience Chapter 9 - Book 3 of Sentinel Unleashed
If you thought rogue AI and world-altering chaos were intense, just wait until you delve deeper into the secrets that lie within the pages of this captivating series.
7 min read
Sep
05
![Unveiling the Myths of Multi-Factor Authentication](/content/images/size/w750/2023/09/How-Hackers-Bypass-MFA.webp)
Unveiling the Myths of Multi-Factor Authentication
MFA refresher
Multi-Factor Authentication (MFA) is a security practice that requires users to provide two or more distinct authentication factors
9 min read