Database Migration at Scale

Three years ago, I joined an excellent caller solutions company named Callapp.  After a few months since I started, Amit On, the CEO and Alon Zimmerman, VP RND,  approached me…

Unleashing Productivity in the Professional Engineer’s World

Introduction In this post, I present a set of tools, habits, and rules that I have incorporated into my career, drawing insights from both my own mistakes and those of…

Cryptographic Failures and Security Protocols

Cryptographic failure Cryptographic failure refers to a flaw in the way we protect confidential information, either when we transmit data from one end to another (at transit), or when we…

Spark vs Hadoop – Part 1

In this series of posts, I will cover the differences between Spark and Hadoop, and elaborate on what exactly makes Spark an efficient computational module compared to its predecessor. Whenever…

OWASP TOP 10 – PART A

In the previous post, we discussed what security is,  the methodologies applied to attack applications, and who determines the requirements and laws that we must abide by.  In this post,…

Security 101

In recent years legislators have pushed for more regulations on the Tech Industry, and it’s evident that compliance has become a top priority. In this series of posts, starting from…

General Design calls in Software

Back in 2012, when I started my first Position as a Backend-Engineer, our team’s main goal was to improve Scalability and Availability, to support more customers and larger workloads. It…

Mentoring-Intro

Eight months ago, I gave a lecture on the basics of Big Data to a great group of people, who came to meet us, learn how is it to work…