My Portfolio
Featured Articles
While many of my articles focus on data engineering, I've also written about quantum computing, marketing, and cryptocurrency. The quality has improved over time, thanks to guidance from Anthony Garone at Edify Content. You can browse all my articles here, or jump straight to a curated list of data migration guides here.
- AI/Machine Learning
- Blockchain Technology
- Business Compliance
- Business Operations
- Cryptography
- Cybersecurity
- Data Engineering
- IT Infrastructure
- Kubernetes
- Marketing
- Quantum Computing
- Stock Analysis
AI / Machine Learning
- Maximizing Efficiency: Pairing Code Generators with AI Code Reviewers
- Machine Learning Data Catalogs Enhance Data Discoverability
- How AI is Revolutionizing Data Collaboration
- Data for AI: The Fuel that Supercharges Machine Learning
- Top 5 AI Code Generation Tools
- Static Code Analyzers vs AI Code Reviewers: Which is Best?
Blockchain Technology
- Comdex integrates CosmWasm
- Meme Chains Take Meme Coins to the Next Level
- Polygon Edge: Providing Blockchain Sovereignty To Dogechain
- The Power of Cross-Chain Bridges
- How Can Value Investors Profit in the Crypto Ecosystem?
Business Compliance
- Navigating Sarbanes-Oxley: A Guide to IT Compliance Essentials
- The 8 Rights of the CCPA: What are they?
- Understanding the 7 Core Principles of GDPR
- Corporate Compliance: Test of Design vs. Test of Effectiveness in Internal Controls
Business Operations
- Mastering Inspection Dispatch and Scheduling With Technology
- Simplify Inspections: Inspection Reporting Software for Data and Compliance
- Work Order Apps Advance the Shift to Digital
- How Construction Management Software Is Transforming Jobsite Efficiency
- The Evolution of Work Orders and Maintenance Management
Cryptography
- Quantum Computing: The Cause of the Next Crypto Crash
- Breaking Bitcoin: ECDSA vs XMSS
- Is Bitcoin (BTC) Safe from Grover's Algorithm?
- From Scalpels to Qubits: The Story of the World's First Post-Quantum Blockchain
- Making Quantum Security More Accessible
- The Moving Target Defense at Storage Level
Cybersecurity
- Navigating CMMC Certification: A Guide for DoD Contractors
- Zero Trust Security: The New Standard for Robust Cyber Protection
- Mastering Vulnerability Management: A Guide to CVE and EPSS
- Mastering Security Assurance through Hardening, Testing, and Vulnerability Management
- Revolutionizing Security Audits: Streamlining Evidence Collection for Efficiency and Cost-Effectiveness
Data Engineering
- Postgres to Snowflake: A Definitive Guide
- SQL Server Migration Made Easy
- Optimize ETL Processes with dbt
- Replicating MongoDB to BigQuery: A Practical Guide
- How Data Marketplaces Shape Modern Data Products
IT Infrastructure
Kubernetes
- Kubernetes Compliance with ISO 27001: A Strategic Imperative
- Kubernetes Challenges: Container Orchestration and Scaling
- Kubernetes on Bare Metal: How and why to Run Kubernetes without Virtualization
- Kubernetes for Machine Learning: How to Build Your First ML Pipeline
Marketing
- Mastering Incrementality Across Marketing Channels
- Level Up Your Lookalike Audiences
- Why Personalized Direct Mail Boosts Customer Engagement
- The Rise of Retail Media Networks
- The Power of Algorithms in Direct Mail Marketing
- When Direct Mail Meets Deep Learning: A Perfect Match
Quantum Computing
- Nvidia, Rolls-Royce, Classiq Tap Quantum for Jet Engine Design
- Nord Quantique Unveils New Technique for Scalable Qubit Error Correction
- Researchers Develop Cameras to Visualise Quantum States
- Accenture, SandboxAQ Collaborate on Quantum-AI Cybersecurity
- 10 Enterprises Experimenting with Quantum Technology in 2023
- 4 Countries That Began Funding Quantum Initiatives in 2022