A small personal after-movie of two inspiring days at Supernova 2025. https://vimeo.com/1070968187/4dc81879b3?ts=0&share=copy The event was a celebration of ambition, grit, and vision: Entrepreneurs building global AI-driven companies from Belgian soil Investors bold enough to back them early and big Politicians who recognise their value and want to see them thrive This is what forward momentum …
Analysing the Okta-Auth0 acquisition
Why was this an amazing deal? Okta was co-founded in 2009 by Todd McKinnon and Frederic Kerrest, who previously worked together at Salesforce [1]. In 2021, Okta was a software vendor of identity and access management solutions, to enable single sign-on for employees and control their access to enterprise applications. Auth0 was co-founded in 2013 …
How to industrialise API development?
Developing and operating software used to be two separate jobs, performed by two different groups of people. Developers wrote software, and they passed it on to operations staff, who ran and maintained the software in production (that is to say, serving real users, instead of merely running under test conditions). Like computers that need their …
Lessons Learned: Bank of Bangladesh hack of $1bn
On February 4, 2016, perpetrators attempted to steal nearly $1 billion from the Bangladesh central bank's account with the Federal Reserve Bank of New York. The perpetrators managed to compromise Bangladesh Bank's system, observe how transfers are done, and gain access to the bank's credentials for payment transfers, which they used to send about three …
Continue reading "Lessons Learned: Bank of Bangladesh hack of $1bn"
Becoming reader-centric as a publisher
How can publishers tap new sources of revenue? The effects of readers encouraging each other to install the app thanks to sharing, following, and doing things in group generate network effects.
Becoming animal-centric as nutrition vendor
Producers of animal food have little contact with the end consumer, let alone the animals they feed. Their contacts are limited to distributors and the resellers, and may professionals such as breeders and veterinarians. They wish they could converse with consumers like social networks that do see the shared pictures of their favourite dog, cat …
Continue reading "Becoming animal-centric as nutrition vendor"
How to scale the administration of access control?
IT administrators know this very well: administering access for a few hundreds of accounts is a challenge, doing this for tens of thousands and including group assignments make this an error-prone process, if not a major headache. What if you need to scale this to millions of users in an extended enterprise or a B2B2C …
Continue reading "How to scale the administration of access control?"
Passwordless payment
Thanks to PSD2, payments can now be initiated by merchants and be confirmed by customers using an app. But how does this actually work and how can this be secure? This post describes how passwordless payment works in practice and elaborates on the mechanisms and standards behind such a solution. The protocol is referred to …
How to implement policy enforcement?
For digital services to be monetised, business rules are applied that may or may not be explicit. These business rules are often ad hoc and implemented by the back-end applications. For example: a consumer can read an article if they have a paid subscription, or, if they have read less than 3 articles this month, …
How to implement anonymous login?
User login is often said to provide proof of the identity of the user. Is this always the case and is it necessary? If I register an account at a site with a fake name X and a chosen password Y, am I proving my identity? Of course not. In fact, the password only serves …
