Billy Okeyo
Billy Okeyo
Andrew Abok
Andrew Abok
Fredrick Kamau
Fredrick Kamau
Carlvin Jerry
Carlvin Jerry
Joseph Ndungi
Joseph Ndungi
Joy Omondi
Joy Omondi
Kate Ratemo
Kate Ratemo
Margaret Maina
Margaret Maina
Shawn Ng'iela
Shawn Ng'iela
Norman Fwamba
Norman Fwamba
Omega Makena
Omega Makena

Meet the people who make it all happen.

Believe, Innovate, Create

This blog is dedicated to the curious minds seeking knowledge, innovation, and a fresh perspective on the world around us.

    All Articles

    Password Hashing

    Hashing is basically turning your password into a secret code that no one (not even you) can reverse. When someone signs up, you don’t store their actual password. Instead, you...

    What is Big Data?

    Big data is like running a high-speed, high-volume coffee shop — data flows in rapidly from many sources, in different forms, and needs to be processed, stored, and served efficiently....

    Content Security Policy (CSP) in Angular Apps

    Content Security Policy (CSP) represents a fundamental shift in web application security, moving from traditional "allow all" models to a strict whitelist approach. For Angular developers, implementing CSP requires deep...

    Principles of High-Output Engineering Teams

    An in-depth guide to the fundamental principles that empower engineering teams to maximize productivity, foster strong collaboration, and consistently deliver high-quality software at scale.

    System Design chapter 13 - Idempotency

    Imagine you are in making a purchase from an online market place like Amazon. When you click on the 'pay' button, the browser freezes or you experience a timeout error...

    Fractals in Nature - The Hidden Geometry of the Natural World

    Fractals are intricate geometric shapes that can be split into parts, each of which is a smaller copy of the whole. This property, known as self-similarity, makes fractals both fascinating...

    REDEFINING MOMENTS

    Over the past 12 weeks, my life has been anything but ordinary. By day, I work my 9–5 job. But once the clock strikes five, I switch hats, diving into...

    Internet Security - How to Protect Yourself from Malicious Attacks

    In today’s hyper-connected world, internet security is no longer a luxury, it's a necessity. From phishing emails to ransomware attacks, malicious actors are constantly developing new tactics to exploit unsuspecting...

    Alternative Data – The New Frontier in Financial Intelligence

    Alternative data is revolutionizing how banks assess creditworthiness and financial health, enabling them to serve previously unbanked populations and create fairer, more inclusive financial systems.