Strava – As Experience Vehicle – Data and UI

We continue to capture more and more data and we process this data as fast as the firehose (see Kinesis) can accept. One platform that continues to aggregate the data that fuels the future of augmented reality (AR) is Strava. As brief background, Strava is a platform built around athletes and their recorded events whether outdoor or inside Zwift and …

Chuck E. Cheese Tokens – Microservices and Cryptocurrencies.

An important piece of experience is the value of the TOKEN. Today, more than ever, tokens play an increasing important role in our interaction with APIs and microservices. They allow for authentication but more importantly a definition of services in a micro-services architecture. { “message”: “Authorization Error”, “errors”: [ { “resource”: “Athlete”, “field”: “access_token”, “code”: “invalid” } ] } One …

Signing Commits – A Proposal.

You step up to the counter. You’re thirsty and just want your drink. The cashier asks you to pay and you use your credit card. A piece of paper pops out and they ask you to sign the transaction? Why do they need that? The argument goes that some verification is needed from you that you authorized the transaction. But …

“I See Dead People” – Machine Learning and Post Mortems.

Machines help us learn. Machines can avoid failure, assist failures and reverse failures. One component of the “learning revolution” is the ability to employ tivo-like capabilities on events. A common end process in many organizations is the post mortem (Autopsy). Google famously studies post mortems to grow and evolve their approaches. However, what can we learn from looking at these …

Hardware Security Key – Ledger Nano S – U2F

In order to provide another layer of security, you can include a hardware key with a private key to authenticate with services like GMAIL or Github. This hardware key support storing cryptocurrencies along with its U2F (Universal 2 Factor) authentication. There are other hardware key like the Yubikey NEO which can utilize NFC and operates as a U2F but it …

Yubikey – Encryption – OTP – 2FH – Challenge-Response – Better Security – FIDO Certified

Recently, in order to take the security story further I purchased a Yubikey from http://www.yubico.com. My decision was prompted to use better security for all places that I use keys. 1. Laptop – Login to Device (Challenge-Response) 2. Access to hosting provider (VULTR) 3. SSH access to systems (VPS, AWS) 4. Move away from Google Authenticator (2FH) 5. Laptop access …