Published inBetter Programming·Pinned6 Questions to Ask Before Encrypting DataWhy and how to Encrypt — In the era of Facebook data scandals and Edward Snowden whistleblowers, data has never been as valuable as it is today. Consumers are starting to catch on that their data is actually valuable. Enterprises and businesses have always understood (and profited from) the value of data. …Security7 min readSecurity7 min read
PinnedEasiest Way to Encrypt in PythonAnyone can copy-and-paste AES invocations from StackOverflow. But the hard part of data security is the key lifecycle management, crypto-agility, centralized controls, and secure key distribution mechanisms. You can skim 6 Questions to Ask Before Encryption Application Layer Data to get a better sense of the responsibilities that come with…2 min read2 min read
Jun 13, 2022Diversity in Silicon Valley, Series 3/5: How to Build an Engineering Culture that Celebrates Diversity?As engineering leaders, our behaviors and values reinforce and steer culture. Whether we intend to influence others or not, it is crucial to recognize that we significantly contribute to the culture around us. As such, it’s not appropriate to complain about the attitudes we surround ourselves with — because they…Diversity6 min readDiversity6 min read
May 8, 2022Diversity in Silicon Valley, Series 2/5: How To Build Diverse Teams in Tech?We revisit traditional recruiting tools and optimize the experience and processes for more diverse team composition. Inbound Recruiting Top-of-Funnel Messaging to Target Underrepresented Groups We should already be using inclusive language to connect with the widest audiences, but let’s take it further. With messaging that speaks directly to our target market, we can optimize…Diversity3 min readDiversity3 min read
Apr 24, 2022Diversity in Silicon Valley, Series 1/5: Why Celebrating Diversity is Critical to Success in TechWhat is success in tech? Success is Product-Market fit. It’s when we’ve solved challenging problems that people have. Success is your market buying your product because it’s a painkiller, not a vitamin. When we deliver software that makes life more comfortable, protects our time, saves people money, or enables us to lead a more meaningful…Diversity6 min readDiversity6 min read
Mar 27, 2022Love People, Use Data — The Opposite Never Works.Data is almost universally seen as a good thing. The more, the merrier. Businesses stack their Gigabytes onto the Terrabytes and Terrabytes onto the Petabytes. They bask in the glory of total operational visibility. …Big Data4 min readBig Data4 min read
May 18, 2021The Pragmatic Guide to Encryption for Healthcare Startups in the USIt isn’t easy to navigate regulations around Protected Healthcare Information (PHI). This article shows how startups can tackle PHI regulations with three types of encryption and meet a high data security bar with ease and confidence. This concise and pragmatic guide for Founders and Lead Engineers helps navigate the highly…Healthcare Technology4 min readHealthcare Technology4 min read
Apr 27, 2021What is End-to-End-Encryption?Photo by Jan Antonin Kolar on Unsplash Legacy encryption is not sufficient. Let’s start with something we all know: Encryption in transit and encryption at rest. Encryption in transit provides confidentiality when your data is moving through the Internet. The little lock icon indicates TLS, which is encryption in transit.Data Security4 min readData Security4 min read
Apr 7, 2021How to Encrypt a File on the Command LineDiscover the easiest command line tool to encrypt and decrypt a file or stdin (1) Install this CLI: # Install peacemakr brew tap peacemakr-io/peacemakr brew install peacemakr (2) Authenticate to fetch your encryption keys: # Authenticate to Peacemakr's Demo Org for access to demo keys export PEACEMAKR_APIKEY=d1Maw58P2xCQ8d0GV15n22SQNI6lYXHzWLCTEvNPHnY= By the way, if you don’t want to use a demo account, then signup…Security3 min readSecurity3 min read
Apr 1, 2021I am a queer founder.Ashley Sumner, I stand with you. — Ashley Sumner struck out the “female” from her title as a founder, and everyone noticed. How do you change the world? There are two ways to approach change: Navigating the discourse, and engaging arguments directly Rejecting the discourse, and poking fun at it from the outside What the hell does that mean? Think of (1) as…Entrepreneurship4 min readEntrepreneurship4 min read