<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[KeepHustlingTech Newsletter]]></title><description><![CDATA[I'm a husband and a father and tech enthusiast. I love to share knowledge. Connect me on LinkedIn via https://www.linkedin.com/in/yekyawsoe/
]]></description><link>https://www.keephustlingtech.com</link><image><url>https://substackcdn.com/image/fetch/$s_!QP6f!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2274a5cc-3d74-4c6f-a3d0-2d7684ad635a_144x144.png</url><title>KeepHustlingTech Newsletter</title><link>https://www.keephustlingtech.com</link></image><generator>Substack</generator><lastBuildDate>Sat, 11 Apr 2026 03:03:47 GMT</lastBuildDate><atom:link href="https://www.keephustlingtech.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Ye Kyaw Soe]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[yekyawsoe@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[yekyawsoe@substack.com]]></itunes:email><itunes:name><![CDATA[Ye Kyaw Soe (Michael)]]></itunes:name></itunes:owner><itunes:author><![CDATA[Ye Kyaw Soe (Michael)]]></itunes:author><googleplay:owner><![CDATA[yekyawsoe@substack.com]]></googleplay:owner><googleplay:email><![CDATA[yekyawsoe@substack.com]]></googleplay:email><googleplay:author><![CDATA[Ye Kyaw Soe (Michael)]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Join me on Notes]]></title><description><![CDATA[A new place for us to share ideas]]></description><link>https://www.keephustlingtech.com/p/join-me-on-notes</link><guid isPermaLink="false">https://www.keephustlingtech.com/p/join-me-on-notes</guid><dc:creator><![CDATA[Ye Kyaw Soe (Michael)]]></dc:creator><pubDate>Mon, 08 May 2023 01:13:54 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/2a8cd0ae-b2c0-4e1f-bfb8-1ae41535beb4_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I just published my first note on <a href="https://substack.com/notes">Substack Notes</a>, and would love for you to join me there!</p><p></p><div class="comment" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/notes&quot;,&quot;commentId&quot;:15216564,&quot;comment&quot;:{&quot;id&quot;:15216564,&quot;date&quot;:&quot;2023-04-25T18:11:41.242Z&quot;,&quot;edited_at&quot;:null,&quot;body&quot;:&quot;Hello, Notes! What's going on?&quot;,&quot;body_json&quot;:{&quot;type&quot;:&quot;doc&quot;,&quot;attrs&quot;:{&quot;schemaVersion&quot;:&quot;v1&quot;},&quot;content&quot;:[{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;Hello, Notes! What's going on?&quot;}]}]},&quot;restacks&quot;:0,&quot;reaction_count&quot;:0,&quot;attachments&quot;:[],&quot;name&quot;:&quot;Ye Kyaw Soe (Michael)&quot;,&quot;user_id&quot;:142368061,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6e23a44b-48f0-4d18-9dbd-6c588df2b10b_413x531.jpeg&quot;,&quot;user_bestseller_tier&quot;:null}}" data-component-name="CommentPlaceholder"></div><p></p><p><a href="http://substack.com/notes">Notes</a> is a new space on Substack for us to share links, short posts, quotes, photos, and more. I plan to use it for things that don&#8217;t fit in the newsletter, like work-in-progress or quick questions.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://substack.com/notes&quot;,&quot;text&quot;:&quot;Go to Notes&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://substack.com/notes"><span>Go to Notes</span></a></p><div><hr></div><h3>How to join</h3><p>Head to <a href="https://substack.com/notes">substack.com/notes</a> or find the &#8220;Notes&#8221; tab in the <a href="https://substack.com/app/app-store-redirect">Substack app</a>. As a subscriber to KeepHustlingTech Newsletter, you&#8217;ll automatically see my notes. Feel free to like, reply, or share them around!</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kqe3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a49b00f-8d2b-43f7-b673-ae99359fba90_399x174.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kqe3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a49b00f-8d2b-43f7-b673-ae99359fba90_399x174.png 424w, https://substackcdn.com/image/fetch/$s_!kqe3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a49b00f-8d2b-43f7-b673-ae99359fba90_399x174.png 848w, https://substackcdn.com/image/fetch/$s_!kqe3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a49b00f-8d2b-43f7-b673-ae99359fba90_399x174.png 1272w, https://substackcdn.com/image/fetch/$s_!kqe3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a49b00f-8d2b-43f7-b673-ae99359fba90_399x174.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kqe3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a49b00f-8d2b-43f7-b673-ae99359fba90_399x174.png" width="399" height="174" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8a49b00f-8d2b-43f7-b673-ae99359fba90_399x174.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:174,&quot;width&quot;:399,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:20005,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!kqe3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a49b00f-8d2b-43f7-b673-ae99359fba90_399x174.png 424w, https://substackcdn.com/image/fetch/$s_!kqe3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a49b00f-8d2b-43f7-b673-ae99359fba90_399x174.png 848w, https://substackcdn.com/image/fetch/$s_!kqe3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a49b00f-8d2b-43f7-b673-ae99359fba90_399x174.png 1272w, https://substackcdn.com/image/fetch/$s_!kqe3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a49b00f-8d2b-43f7-b673-ae99359fba90_399x174.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>You can also share notes of your own. I hope this becomes a space where every reader of KeepHustlingTech Newsletter can share thoughts, ideas, and interesting quotes from the things we're reading on Substack and beyond.</p><div><hr></div><h3>Why Substack Notes</h3><p>Fellow writers and readers are spending time in Notes for a variety of reasons.</p><p><a href="https://tedgioia.substack.com/p/introducing-substack-notesa-new-forum">Ted Gioia</a>&nbsp;sees Notes as a forum for dialogue.</p><blockquote><p>The idea behind Notes is simple. Millions of people now participate in Substack as writers and readers&#8212;but much of this is built on long articles and essays. We now have a forum for dialoguing and sharing shorter posts.</p></blockquote><p><a href="https://chrisryan.substack.com/p/join-me-on-notes">Chris Ryan</a>&nbsp;is drawn to Substack as an alternative for legacy social media.</p><blockquote><p>One of my main reasons for joining Substack was to wean myself off exploitative social media platforms. I&#8217;m hoping this is going to help move us along on that journey!</p></blockquote><p><a href="https://shermanalexie.substack.com/p/join-me-on-notes">Sherman Alexie</a>&nbsp;wants to create a kind and creative new space in Notes.</p><blockquote><p>I&#8217;m going to focus on being positive, with my own thoughts and photos and by linking to songs, stories, poems from around the web and from other Substacks.</p></blockquote><div><hr></div><p>If you encounter any issues, you can always refer to the <a href="https://support.substack.com/hc/en-us/sections/14408747121940-Notes">Notes FAQ</a> for assistance. Looking forward to seeing you there!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://substack.com/notes&quot;,&quot;text&quot;:&quot;Go to Notes&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://substack.com/notes"><span>Go to Notes</span></a></p>]]></content:encoded></item><item><title><![CDATA[Kerberos Simplified: A Beginner's Guide]]></title><description><![CDATA[Understanding Kerberos Authentication: Advantages and Disadvantages]]></description><link>https://www.keephustlingtech.com/p/kerberos-simplified-a-beginners-guide</link><guid isPermaLink="false">https://www.keephustlingtech.com/p/kerberos-simplified-a-beginners-guide</guid><dc:creator><![CDATA[Ye Kyaw Soe (Michael)]]></dc:creator><pubDate>Sun, 07 May 2023 18:26:19 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!TDfH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f867373-eb4a-4deb-a493-0051328f208f_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TDfH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f867373-eb4a-4deb-a493-0051328f208f_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TDfH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f867373-eb4a-4deb-a493-0051328f208f_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!TDfH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f867373-eb4a-4deb-a493-0051328f208f_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!TDfH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f867373-eb4a-4deb-a493-0051328f208f_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!TDfH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f867373-eb4a-4deb-a493-0051328f208f_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TDfH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f867373-eb4a-4deb-a493-0051328f208f_1024x1024.png" width="368" height="368" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6f867373-eb4a-4deb-a493-0051328f208f_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:368,&quot;bytes&quot;:2278141,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!TDfH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f867373-eb4a-4deb-a493-0051328f208f_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!TDfH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f867373-eb4a-4deb-a493-0051328f208f_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!TDfH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f867373-eb4a-4deb-a493-0051328f208f_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!TDfH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f867373-eb4a-4deb-a493-0051328f208f_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image generated using Dall-E, an AI model developed by Open AI for image creation.</figcaption></figure></div><p>In this blog, we'll be exploring the Kerberos authentication protocol which was developed in the 1980s at MIT to solve network authentication problems. It became popular and was made freely available. In 1993, Kerberos v5 was standardized by the Internet Engineering Task Force (IETF), in the document&nbsp;<a href="https://www.ietf.org/rfc/rfc1510.txt">RFC 1510</a>, and it is now widely used in enterprise environments.</p><p>Enjoy!</p><div><hr></div><p>Kerberos is a network authentication protocols based on tickets. It provides clients and servers a reliable way to verify each other before establishing a connection.</p><p>Kerberos authentication involves two types of tickets: <em>Ticket Granting Ticket</em> (TGT) and <em>Service Tickets</em> (ST). Users are issued a TGT after logging in with their password, and they use it to obtain an ST when accessing network shares or web servers. The ST is presented to the server to start a session and access the desired resources.</p><p>Some common use cases:</p><ol><li><p>Single sign-on (SSO): Kerberos supports SSO, allowing users to authenticate once and then access multiple resources without having to enter their credentials again.</p></li><li><p>Web authentication: Kerberos can be used to authenticate users accessing web applications, providing a secure way to access sensitive information.</p></li><li><p>Cross-realm authentication: Kerberos can be used to authenticate users across different realms or domains, allowing for seamless access to resources across different networks.</p></li></ol><p>However, Kerberos is not without its shortcomings. The weakest link in the Kerberos chain is the <em>password</em>. Passwords can be brute force, cracked or stolen by known methods illustrated below.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ze9W!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818badb1-7750-4268-bbd4-590a0fc5469a_1716x356.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ze9W!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818badb1-7750-4268-bbd4-590a0fc5469a_1716x356.png 424w, https://substackcdn.com/image/fetch/$s_!Ze9W!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818badb1-7750-4268-bbd4-590a0fc5469a_1716x356.png 848w, https://substackcdn.com/image/fetch/$s_!Ze9W!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818badb1-7750-4268-bbd4-590a0fc5469a_1716x356.png 1272w, https://substackcdn.com/image/fetch/$s_!Ze9W!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818badb1-7750-4268-bbd4-590a0fc5469a_1716x356.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ze9W!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818badb1-7750-4268-bbd4-590a0fc5469a_1716x356.png" width="1456" height="302" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/818badb1-7750-4268-bbd4-590a0fc5469a_1716x356.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:302,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;No alt text provided for this image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="No alt text provided for this image" title="No alt text provided for this image" srcset="https://substackcdn.com/image/fetch/$s_!Ze9W!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818badb1-7750-4268-bbd4-590a0fc5469a_1716x356.png 424w, https://substackcdn.com/image/fetch/$s_!Ze9W!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818badb1-7750-4268-bbd4-590a0fc5469a_1716x356.png 848w, https://substackcdn.com/image/fetch/$s_!Ze9W!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818badb1-7750-4268-bbd4-590a0fc5469a_1716x356.png 1272w, https://substackcdn.com/image/fetch/$s_!Ze9W!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818badb1-7750-4268-bbd4-590a0fc5469a_1716x356.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Some of the known Kerberos attacks</figcaption></figure></div><h3>Why should you care?</h3><p>It's the potential for unauthorized access to sensitive information. Kerberos, being the backbone of AD authentication, is often exploited by attackers during various stages of a cyber-attack, such as initial access, privilege escalation, defense evasion, credential access, and lateral movement.</p><p>By recognizing and addressing these weaknesses, organizations can proactively protect themselves against potential security threats and safeguard their sensitive data.</p><h3>What's next?</h3><p>The use of cloud-based authentication methods like OAuth and OpenID Connect is increasing. They offer more flexibility and scalability than traditional Kerberos authentication and are useful for modern cloud-based applications that need authentication across multiple domains.</p><p>Blockchain-based authentication, Contextual authentication (location, device, and behavior patterns), Continuous authentication, Passwordless authentication (FIDO 2) as well as MFA and biometric authentication are becoming more popular for sensitive applications and services, especially in finance and healthcare. They provide additional layers of security beyond traditional Kerberos authentication, which only uses username and password.</p><p>There has also been a trend towards zero-trust security architectures that assume all users and devices are untrusted. This approach relies on various authentication mechanisms like MFA, biometrics, and device attestation to ensure secure access to sensitive resources.</p><p>While these trends do not necessarily mean the end of Kerberos authentication, they do suggest that its use may become more specialized, particularly in environments where legacy systems and applications still rely on it.</p><p>Thank you for reading my blog, and I hope this information was helpful!</p><p>References and some good reads:</p><ul><li><p><a href="https://www.splunk.com/en_us/blog/security/detecting-active-directory-kerberos-attacks-threat-research-release-march-2022.html">Detecting Active Directory Kerberos Attacks: Threat Research Release, March 2022 | Splunk</a></p></li><li><p><a href="https://research.splunk.com/stories/active_directory_kerberos_attacks/?_gl=1*mqgzrb*_ga*MTkxMTY0MzQ2Ny4xNjgzNDc0MTIx*_ga_5EPM2P39FV*MTY4MzQ3NDEyMC4xLjAuMTY4MzQ3NDEyMC42MC4wLjA.">Active Directory Kerberos Attacks - Splunk Security Content</a></p></li><li><p><a href="https://medium.com/tenable-techblog/decrypt-encrypted-stub-data-in-wireshark-deb132c076e7">Decrypt Kerberos/NTLM &#8220;encrypted stub data&#8221; in Wireshark | by Cl&#233;ment Notin [Tenable] | Tenable TechBlog | Medium</a></p></li><li><p><a href="https://medium.com/tenable-techblog/dont-make-your-soc-blind-to-active-directory-attacks-5-surprising-behaviors-of-windows-audit-272551430721">Don&#8217;t make your SOC blind to Active Directory attacks: 5 surprising behaviors of Windows audit policy | by Cl&#233;ment Notin [Tenable] | Tenable TechBlog | Medium</a></p></li><li><p><a href="https://www.sans.org/blog/kerberos-in-the-crosshairs-golden-tickets-silver-tickets-mitm-and-more/">SANS Digital Forensics and Incident Response Blog | Kerberos in the Crosshairs: Golden Tickets, Silver Tickets, MITM, and More | SANS Institute</a></p></li><li><p><a href="https://learn.microsoft.com/en-us/windows/win32/ad/mutual-authentication-using-kerberos">Mutual Authentication Using Kerberos - Win32 apps | Microsoft Learn</a></p></li><li><p><a href="https://www.sans.org/white-papers/206/">Kerberos: Secure Authentication | SANS Institute</a></p></li></ul><p></p>]]></content:encoded></item><item><title><![CDATA[Join my new subscriber chat]]></title><description><![CDATA[A private space for us to converse and connect]]></description><link>https://www.keephustlingtech.com/p/join-my-new-subscriber-chat</link><guid isPermaLink="false">https://www.keephustlingtech.com/p/join-my-new-subscriber-chat</guid><dc:creator><![CDATA[Ye Kyaw Soe (Michael)]]></dc:creator><pubDate>Sun, 30 Apr 2023 16:10:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!2H2-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9a23d49f-76bd-4f75-baac-0ae5733774bd_1456x743.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Today I&#8217;m announcing a brand new addition to my Substack publication: the KeepHustlingTech Newsletter subscriber chat.</p><p>This is a conversation space in the Substack app that I set up exclusively for my subscribers &#8212; kind of like a group chat or live hangout. I&#8217;ll post short prompts, thoughts, and updates that come my way, and you can jump into the discussion. </p><p><strong>To join our chat, you&#8217;ll need to download the <a href="https://substack.com/app/app-store-redirect">Substack app</a>, now available for both iOS and Android.</strong> Chats are sent via the app, not email, so turn on push notifications so you don&#8217;t miss conversation as it happens.</p><div><hr></div><h2>How to get started</h2><ol><li><p><strong>Download the app by clicking <a href="https://substack.com/app/app-store-redirect">this link</a> or the button below.</strong> Substack Chat is now available on both iOS and Android.</p></li></ol><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://substack.com/app/app-store-redirect&quot;,&quot;text&quot;:&quot;Get app&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://substack.com/app/app-store-redirect"><span>Get app</span></a></p><ol start="2"><li><p><strong>Open the app and tap the Chat icon.</strong> It looks like two bubbles in the bottom bar, and you&#8217;ll see a row for my chat inside.</p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2H2-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9a23d49f-76bd-4f75-baac-0ae5733774bd_1456x743.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2H2-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9a23d49f-76bd-4f75-baac-0ae5733774bd_1456x743.png 424w, https://substackcdn.com/image/fetch/$s_!2H2-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9a23d49f-76bd-4f75-baac-0ae5733774bd_1456x743.png 848w, https://substackcdn.com/image/fetch/$s_!2H2-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9a23d49f-76bd-4f75-baac-0ae5733774bd_1456x743.png 1272w, https://substackcdn.com/image/fetch/$s_!2H2-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9a23d49f-76bd-4f75-baac-0ae5733774bd_1456x743.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2H2-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9a23d49f-76bd-4f75-baac-0ae5733774bd_1456x743.png" width="542" height="276.5837912087912" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/9a23d49f-76bd-4f75-baac-0ae5733774bd_1456x743.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:743,&quot;width&quot;:1456,&quot;resizeWidth&quot;:542,&quot;bytes&quot;:501468,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!2H2-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9a23d49f-76bd-4f75-baac-0ae5733774bd_1456x743.png 424w, https://substackcdn.com/image/fetch/$s_!2H2-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9a23d49f-76bd-4f75-baac-0ae5733774bd_1456x743.png 848w, https://substackcdn.com/image/fetch/$s_!2H2-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9a23d49f-76bd-4f75-baac-0ae5733774bd_1456x743.png 1272w, https://substackcdn.com/image/fetch/$s_!2H2-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9a23d49f-76bd-4f75-baac-0ae5733774bd_1456x743.png 1456w" sizes="100vw" loading="lazy" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ol start="3"><li><p><strong>That&#8217;s it!</strong> Jump into my thread to say hi, and if you have any issues, check out <a href="https://support.substack.com/hc/en-us/sections/360007461791-Frequently-Asked-Questions">Substack&#8217;s FAQ</a>.</p></li></ol><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/pub/yekyawsoe/chat&quot;,&quot;text&quot;:&quot;Join chat&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://open.substack.com/pub/yekyawsoe/chat"><span>Join chat</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Learning Made Simple: The Feynman Technique Explained ]]></title><description><![CDATA[The Power of the Feynman Technique]]></description><link>https://www.keephustlingtech.com/p/learning-made-simple-the-feynman</link><guid isPermaLink="false">https://www.keephustlingtech.com/p/learning-made-simple-the-feynman</guid><dc:creator><![CDATA[Ye Kyaw Soe (Michael)]]></dc:creator><pubDate>Sun, 30 Apr 2023 07:35:34 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!QP6f!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2274a5cc-3d74-4c6f-a3d0-2d7684ad635a_144x144.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Learning is an important aspect of our lives, and it is essential to comprehend the ideas we come across. </p><p>Luckily, the Feynman Technique is here to help. Developed by Nobel Prize-winning physicist Richard Feynman, it's a simple yet effective framework that many students and professionals use. </p><p>In this blog post, we'll explore the Feynman Technique and its ability to aid you in learning efficiently.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DOF3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0dcb8394-4188-4e5e-9b6b-e0c01c0c5a03_220x311.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DOF3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0dcb8394-4188-4e5e-9b6b-e0c01c0c5a03_220x311.jpeg 424w, https://substackcdn.com/image/fetch/$s_!DOF3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0dcb8394-4188-4e5e-9b6b-e0c01c0c5a03_220x311.jpeg 848w, https://substackcdn.com/image/fetch/$s_!DOF3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0dcb8394-4188-4e5e-9b6b-e0c01c0c5a03_220x311.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!DOF3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0dcb8394-4188-4e5e-9b6b-e0c01c0c5a03_220x311.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DOF3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0dcb8394-4188-4e5e-9b6b-e0c01c0c5a03_220x311.jpeg" width="220" height="311" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0dcb8394-4188-4e5e-9b6b-e0c01c0c5a03_220x311.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:311,&quot;width&quot;:220,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Feynman in a jacket and tie, smiling&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Feynman in a jacket and tie, smiling" title="Feynman in a jacket and tie, smiling" srcset="https://substackcdn.com/image/fetch/$s_!DOF3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0dcb8394-4188-4e5e-9b6b-e0c01c0c5a03_220x311.jpeg 424w, https://substackcdn.com/image/fetch/$s_!DOF3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0dcb8394-4188-4e5e-9b6b-e0c01c0c5a03_220x311.jpeg 848w, https://substackcdn.com/image/fetch/$s_!DOF3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0dcb8394-4188-4e5e-9b6b-e0c01c0c5a03_220x311.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!DOF3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0dcb8394-4188-4e5e-9b6b-e0c01c0c5a03_220x311.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Richard Feynman - Wikipedia</figcaption></figure></div><p><strong>Step 1: Set the Stage.</strong> <br>The first step in the Feynman Technique is to set the stage. This involves selecting a topic that you want to learn and understand deeply. It is essential to choose a subject that you are genuinely interested in and passionate about. Once you have identified your topic, you should gather all the relevant information and resources necessary for your learning journey.</p><p><strong>Step 2: ELI5 (Explain It To Me Like I'm 5)</strong> <br>The second step in the Feynman Technique is to ELI5 or explain it to me like I'm 5. This step involves breaking down the complex concepts into simple terms that a five-year-old could understand. This is a critical step in the learning process because it helps you identify areas where you might be lacking in your understanding. If you can explain a topic in simple terms, you have a good grasp of the underlying concepts.</p><p><strong>Step 3: Assess &amp; Study</strong><br>The third step in the Feynman Technique is to assess and study. This step involves reviewing your understanding of the topic and identifying any areas where you might be lacking. It is essential to identify your weaknesses and focus on them to improve your understanding. This step also involves studying the topic in more detail, using various resources such as books, articles, and online courses.</p><p><strong>Step 4: Organize, Convey &amp; Review</strong> <br>The final step in the Feynman Technique is to organize, convey, and review. This step involves organizing your understanding of the topic and presenting it in a clear and concise manner. This could be done through writing, presentations, or discussions with others. It is also essential to review your understanding of the topic regularly to ensure that you have retained the knowledge.</p><p><strong>Example</strong>: Let us take an example of a student learning about the concept of photosynthesis. <br>In the first step, the student would gather all the relevant resources and information on photosynthesis. In the second step, the student would ELI5 the concept by breaking down the process into simple terms such as "plants make food from sunlight." <br>In the third step, the student would assess their understanding of the topic by identifying areas where they might be lacking, such as the chemical reactions involved. The student would then study these areas in more detail using various resources. <br>In the final step, the student would organize their understanding of photosynthesis and present it in a clear and concise manner, such as through a presentation or essay.</p><p>Thank you for reading my blog, and I hope this information was helpful!</p>]]></content:encoded></item><item><title><![CDATA[Simplifying Authentication: Understanding OAuth, OIDC, and SAML]]></title><description><![CDATA[If you're wondering what sets OAuth, OIDC, and SAML apart, it's all about the ABCs of user identity: authentication and authorization.]]></description><link>https://www.keephustlingtech.com/p/simplifying-authentication-understanding</link><guid isPermaLink="false">https://www.keephustlingtech.com/p/simplifying-authentication-understanding</guid><dc:creator><![CDATA[Ye Kyaw Soe (Michael)]]></dc:creator><pubDate>Sun, 30 Apr 2023 07:19:33 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1651235732694-0d057ace2f30?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw5fHxhdXRoZW50aWNhdGlvbiUyMGFuZCUyMGF1dGhvcmlzYXRpb258ZW58MHx8fHwxNjgyODM5MTEx&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>OAuth, OIDC, and SAML are all protocols used for user authentication and authorization in web applications.</p><p>Before we dive in, we need to understand the distinction between <strong>authentication</strong> and <strong>authorization</strong>. </p><p>Authentication and authorization are like a bouncer at a club. Authentication checks your ID at the door to make sure you're not a fake, while authorization checks the VIP list to see what access you have once you're inside.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1651235732694-0d057ace2f30?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw5fHxhdXRoZW50aWNhdGlvbiUyMGFuZCUyMGF1dGhvcmlzYXRpb258ZW58MHx8fHwxNjgyODM5MTEx&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1651235732694-0d057ace2f30?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw5fHxhdXRoZW50aWNhdGlvbiUyMGFuZCUyMGF1dGhvcmlzYXRpb258ZW58MHx8fHwxNjgyODM5MTEx&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1651235732694-0d057ace2f30?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw5fHxhdXRoZW50aWNhdGlvbiUyMGFuZCUyMGF1dGhvcmlzYXRpb258ZW58MHx8fHwxNjgyODM5MTEx&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1651235732694-0d057ace2f30?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw5fHxhdXRoZW50aWNhdGlvbiUyMGFuZCUyMGF1dGhvcmlzYXRpb258ZW58MHx8fHwxNjgyODM5MTEx&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1651235732694-0d057ace2f30?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw5fHxhdXRoZW50aWNhdGlvbiUyMGFuZCUyMGF1dGhvcmlzYXRpb258ZW58MHx8fHwxNjgyODM5MTEx&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1651235732694-0d057ace2f30?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw5fHxhdXRoZW50aWNhdGlvbiUyMGFuZCUyMGF1dGhvcmlzYXRpb258ZW58MHx8fHwxNjgyODM5MTEx&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="384" height="256" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1651235732694-0d057ace2f30?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw5fHxhdXRoZW50aWNhdGlvbiUyMGFuZCUyMGF1dGhvcmlzYXRpb258ZW58MHx8fHwxNjgyODM5MTEx&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1080,&quot;resizeWidth&quot;:384,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;a screenshot of a phone&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="a screenshot of a phone" title="a screenshot of a phone" srcset="https://images.unsplash.com/photo-1651235732694-0d057ace2f30?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw5fHxhdXRoZW50aWNhdGlvbiUyMGFuZCUyMGF1dGhvcmlzYXRpb258ZW58MHx8fHwxNjgyODM5MTEx&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1651235732694-0d057ace2f30?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw5fHxhdXRoZW50aWNhdGlvbiUyMGFuZCUyMGF1dGhvcmlzYXRpb258ZW58MHx8fHwxNjgyODM5MTEx&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1651235732694-0d057ace2f30?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw5fHxhdXRoZW50aWNhdGlvbiUyMGFuZCUyMGF1dGhvcmlzYXRpb258ZW58MHx8fHwxNjgyODM5MTEx&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1651235732694-0d057ace2f30?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw5fHxhdXRoZW50aWNhdGlvbiUyMGFuZCUyMGF1dGhvcmlzYXRpb258ZW58MHx8fHwxNjgyODM5MTEx&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@impelling">Ed Hardie</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p><strong>OAuth</strong> is mainly used for allowing users to grant access to their resources on one website to another website or application, without sharing their login credentials. For example, if you use your Facebook account to log in to another website or app, OAuth is likely the protocol being used to authenticate you. The other example is Authorization for API access - Many APIs (e.g. Google Maps, Twitter) use OAuth to grant access to third-party applications that need to use their services. For example, a weather app may use Google Maps to show the user's current location on a map.</p><p><strong>OIDC</strong> on the other hand, is a newer protocol that builds on top of OAuth and adds <em>identity</em> information to the authentication process. It is used to verify a user's identity and provide information about them, such as their name and email address. It is commonly used in modern single sign-on (SSO) systems.</p><p><strong>SAML</strong> which stands for <em>Security Assertion Markup Language</em>, is an older protocol used primarily in enterprise environments and SaaS applications. It allows users to log in to multiple applications using a single set of credentials, which can simplify the login process and increase security. It also uses for cross-organizational collaboration - can be used to provide secure access to resources across different organizations. For example, a university may use SAML to allow students from different schools to access shared resources such as library databases.</p><p>In conclusion, these protocols serve different purposes in web authentication and authorization, and understanding the differences is important for building secure and efficient web applications.</p><p>Thank you for reading my blog, and I hope this information was helpful!</p>]]></content:encoded></item><item><title><![CDATA[From Lift and Shift to Cloud-Native: The 6 Most Common Application Migration Strategies ]]></title><description><![CDATA[A beginner roadmap to modernize your applications.]]></description><link>https://www.keephustlingtech.com/p/from-lift-and-shift-to-cloud-native</link><guid isPermaLink="false">https://www.keephustlingtech.com/p/from-lift-and-shift-to-cloud-native</guid><dc:creator><![CDATA[Ye Kyaw Soe (Michael)]]></dc:creator><pubDate>Sun, 30 Apr 2023 06:47:36 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!AIsq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fa1a0ac-04e2-4a34-a502-946714a64e46_1689x1584.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Are you considering migrating your applications to the cloud? </p><p>You're not alone. With the increasing demand for scalability, agility, and cost-effectiveness, more and more organizations are moving their applications to the cloud. </p><p>But with so many application migration strategies available, how do you know which one is right for your business? </p><p>In this post, we will explore the 6 most common application migration strategies and their benefits and drawbacks, so you can make an informed decision and ensure a successful migration. Whether you're looking to re-host, re-platform, re-architect, re-purchase, retire, or retain your applications, we've got you covered. </p><div><hr></div><p>Let's dive in!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!AIsq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fa1a0ac-04e2-4a34-a502-946714a64e46_1689x1584.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!AIsq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fa1a0ac-04e2-4a34-a502-946714a64e46_1689x1584.png 424w, https://substackcdn.com/image/fetch/$s_!AIsq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fa1a0ac-04e2-4a34-a502-946714a64e46_1689x1584.png 848w, https://substackcdn.com/image/fetch/$s_!AIsq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fa1a0ac-04e2-4a34-a502-946714a64e46_1689x1584.png 1272w, https://substackcdn.com/image/fetch/$s_!AIsq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fa1a0ac-04e2-4a34-a502-946714a64e46_1689x1584.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!AIsq!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fa1a0ac-04e2-4a34-a502-946714a64e46_1689x1584.png" width="1098" height="1029.375" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0fa1a0ac-04e2-4a34-a502-946714a64e46_1689x1584.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:1365,&quot;width&quot;:1456,&quot;resizeWidth&quot;:1098,&quot;bytes&quot;:164956,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-large" alt="" srcset="https://substackcdn.com/image/fetch/$s_!AIsq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fa1a0ac-04e2-4a34-a502-946714a64e46_1689x1584.png 424w, https://substackcdn.com/image/fetch/$s_!AIsq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fa1a0ac-04e2-4a34-a502-946714a64e46_1689x1584.png 848w, https://substackcdn.com/image/fetch/$s_!AIsq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fa1a0ac-04e2-4a34-a502-946714a64e46_1689x1584.png 1272w, https://substackcdn.com/image/fetch/$s_!AIsq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0fa1a0ac-04e2-4a34-a502-946714a64e46_1689x1584.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Summary table of 6 most common application migration strategies</figcaption></figure></div><p>In conclusion, selecting the right migration strategy is crucial for the success of any application migration project. It is important to carefully evaluate the benefits and drawbacks of each strategy before making a decision.</p><p>Thank you for reading my blog, and I hope this information was helpful!</p>]]></content:encoded></item><item><title><![CDATA[Unleashing the Power of Data: K-Means Clustering for Finding Your Tribe ]]></title><description><![CDATA[A Beginner's Guide to K-Means Clustering]]></description><link>https://www.keephustlingtech.com/p/unleashing-the-power-of-data-k-means</link><guid isPermaLink="false">https://www.keephustlingtech.com/p/unleashing-the-power-of-data-k-means</guid><dc:creator><![CDATA[Ye Kyaw Soe (Michael)]]></dc:creator><pubDate>Sun, 30 Apr 2023 06:09:57 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1511298341002-15d91b5d09b7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1NXx8bWVzc3klMjBjb2xvciUyMGNsdXN0ZXJ8ZW58MHx8fHwxNjgyODM0OTAx&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>K-means clustering is a popular unsupervised machine learning technique used to group data points into distinct clusters based on similarities in their features.</p><p>Think of it like sorting your clothes - you might put all your shirts in one pile, pants in another, and so on. K-means clustering does the same thing with data.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1511298341002-15d91b5d09b7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1NXx8bWVzc3klMjBjb2xvciUyMGNsdXN0ZXJ8ZW58MHx8fHwxNjgyODM0OTAx&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1511298341002-15d91b5d09b7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1NXx8bWVzc3klMjBjb2xvciUyMGNsdXN0ZXJ8ZW58MHx8fHwxNjgyODM0OTAx&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1511298341002-15d91b5d09b7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1NXx8bWVzc3klMjBjb2xvciUyMGNsdXN0ZXJ8ZW58MHx8fHwxNjgyODM0OTAx&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1511298341002-15d91b5d09b7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1NXx8bWVzc3klMjBjb2xvciUyMGNsdXN0ZXJ8ZW58MHx8fHwxNjgyODM0OTAx&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1511298341002-15d91b5d09b7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1NXx8bWVzc3klMjBjb2xvciUyMGNsdXN0ZXJ8ZW58MHx8fHwxNjgyODM0OTAx&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1511298341002-15d91b5d09b7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1NXx8bWVzc3klMjBjb2xvciUyMGNsdXN0ZXJ8ZW58MHx8fHwxNjgyODM0OTAx&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="222" height="296" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1511298341002-15d91b5d09b7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1NXx8bWVzc3klMjBjb2xvciUyMGNsdXN0ZXJ8ZW58MHx8fHwxNjgyODM0OTAx&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:1440,&quot;width&quot;:1080,&quot;resizeWidth&quot;:222,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;assorted-colored umbrellas&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="assorted-colored umbrellas" title="assorted-colored umbrellas" srcset="https://images.unsplash.com/photo-1511298341002-15d91b5d09b7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1NXx8bWVzc3klMjBjb2xvciUyMGNsdXN0ZXJ8ZW58MHx8fHwxNjgyODM0OTAx&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1511298341002-15d91b5d09b7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1NXx8bWVzc3klMjBjb2xvciUyMGNsdXN0ZXJ8ZW58MHx8fHwxNjgyODM0OTAx&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1511298341002-15d91b5d09b7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1NXx8bWVzc3klMjBjb2xvciUyMGNsdXN0ZXJ8ZW58MHx8fHwxNjgyODM0OTAx&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1511298341002-15d91b5d09b7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1NXx8bWVzc3klMjBjb2xvciUyMGNsdXN0ZXJ8ZW58MHx8fHwxNjgyODM0OTAx&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Here's how it works: imagine you have a bunch of data points that you want to group into different clusters. First, you choose how many clusters you want - let's say 3. Then, the algorithm will randomly assign each data point to one of the clusters. Next, it will calculate the <em><strong>"center"</strong></em> of each cluster based on the average of all the data points in that cluster. After that, it will reassign each data point to the cluster whose center it is closest to. This process repeats until the clusters stop changing.</p><p>The end result is that you have 3 clusters of data points that are similar to each other, and different from the other clusters. You can then use this information for things like market segmentation, image recognition, fraud detection, recommender systems and more.</p><p><em>To learn more about K-Means Clustering in Python, check out "Foundations of Data Science: K-Means Clustering in Python" by Coursera.</em></p>]]></content:encoded></item><item><title><![CDATA[Unpacking the 4Vs of Big Data: Why Size, Speed, Variety, and Accuracy Matter! ]]></title><description><![CDATA[A Guide to Understanding the 4Vs]]></description><link>https://www.keephustlingtech.com/p/unpacking-the-4vs-of-big-data-why</link><guid isPermaLink="false">https://www.keephustlingtech.com/p/unpacking-the-4vs-of-big-data-why</guid><dc:creator><![CDATA[Ye Kyaw Soe (Michael)]]></dc:creator><pubDate>Sun, 30 Apr 2023 05:33:15 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!j14H!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57683fb-a06b-4d17-93e1-53153a1008fe_1408x685.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Big data is like a huge toy box filled with tons of information from different places, such as social media and online shopping. It's too much information to handle with just regular tools, but it's also super helpful because it can reveal hidden treasures and patterns. By analyzing big data, we can make better decisions and improve our lives, kind of like having a crystal ball.</p><p>It's important to know about the 4Vs of big data because it helps us understand the characteristics of large amounts of data that businesses and organizations collect.</p><p>The 4Vs stand for <strong>volume</strong>, <strong>velocity</strong>, <strong>variety</strong>, and <strong>veracity</strong>. </p><ol><li><p><strong>Volume</strong>: Imagine a library with millions of books. That's a lot of books! Similarly, big data has a lot of information - so much that it can be difficult to manage and analyze without the right tools.</p></li><li><p><strong>Velocity</strong>: Think of a fast-moving river. Just as the water in the river is constantly flowing, big data is always coming in from different sources at a rapid pace.</p></li><li><p><strong>Variety</strong>: Imagine a buffet with many different types of food - Italian, Chinese, Mexican, and more. Similarly, big data comes in many different forms, such as text, images, audio, and video.</p></li><li><p><strong>Veracity</strong>: Consider a game of telephone where a message is whispered from person to person. Sometimes, the message can get distorted or changed along the way. Similarly, big data may contain errors or inconsistencies, so it's important to make sure it is accurate and trustworthy before using it for important decisions. We can use various methods such as data cleaning, data validation, and data verification so as to make more informed decisions and avoid errors or inaccuracies that can have negative consequences.</p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!j14H!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57683fb-a06b-4d17-93e1-53153a1008fe_1408x685.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!j14H!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57683fb-a06b-4d17-93e1-53153a1008fe_1408x685.png 424w, https://substackcdn.com/image/fetch/$s_!j14H!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57683fb-a06b-4d17-93e1-53153a1008fe_1408x685.png 848w, https://substackcdn.com/image/fetch/$s_!j14H!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57683fb-a06b-4d17-93e1-53153a1008fe_1408x685.png 1272w, https://substackcdn.com/image/fetch/$s_!j14H!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57683fb-a06b-4d17-93e1-53153a1008fe_1408x685.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!j14H!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57683fb-a06b-4d17-93e1-53153a1008fe_1408x685.png" width="1408" height="685" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c57683fb-a06b-4d17-93e1-53153a1008fe_1408x685.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:685,&quot;width&quot;:1408,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:438786,&quot;alt&quot;:&quot;Photo credit: IBM&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Photo credit: IBM" title="Photo credit: IBM" srcset="https://substackcdn.com/image/fetch/$s_!j14H!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57683fb-a06b-4d17-93e1-53153a1008fe_1408x685.png 424w, https://substackcdn.com/image/fetch/$s_!j14H!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57683fb-a06b-4d17-93e1-53153a1008fe_1408x685.png 848w, https://substackcdn.com/image/fetch/$s_!j14H!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57683fb-a06b-4d17-93e1-53153a1008fe_1408x685.png 1272w, https://substackcdn.com/image/fetch/$s_!j14H!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57683fb-a06b-4d17-93e1-53153a1008fe_1408x685.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Thank you for reading my blog, and I hope this information was helpful!</p>]]></content:encoded></item><item><title><![CDATA[Solution Design Principles]]></title><description><![CDATA["Everything should be made as simple as possible, but not simpler." ~Albert Einstein]]></description><link>https://www.keephustlingtech.com/p/solution-design-principles</link><guid isPermaLink="false">https://www.keephustlingtech.com/p/solution-design-principles</guid><dc:creator><![CDATA[Ye Kyaw Soe (Michael)]]></dc:creator><pubDate>Tue, 25 Apr 2023 17:32:04 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/398ac15c-a989-4717-927d-ad6a6196d29b_964x964.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This is another of my blog about IT solutions design principles which are general rules and guidelines.</p><p>Whether you're a seasoned pro or just starting out, get ready to discover some fresh ideas that will take your IT solution architecture game to the next level!</p><p><em>Use your first principles thinking to understand why. If you haven't read my other blog about it, read <a href="https://yekyawsoe.substack.com/p/first-principles-thinking">here</a>.</em></p><p>Enjoy!</p><p>When it comes to solution design principles, we all have some ideas in mind, right? </p><p>Here are some of mine. </p><p>You don't need all of them but some of them are just necessary. However, each of them should be clearly related back to business objectives and key architecture drivers.&nbsp;</p><ul><li><p><strong>Scalability</strong> - a solution must be capable of (dynamically) increasing itself according to the demand (horizonal or vertical). We're in 2023 now people.</p></li><li><p><strong>Security</strong> (all about CIA) - a solution must be secure regarding the communication between components, data at rest/in motion, accessibility of service administrations etc.</p></li><li><p><strong>Resiliency</strong> - a solution must be capable of being stable also at times of intensive load can recover from expectational states.&nbsp;</p></li><li><p><strong>Fail-over capability</strong> - a solution must be able to continue working even if instances of components are not available.</p></li><li><p><strong>SPOF</strong> (Single Point of Failure) - it must be clear which components are crucial to mitigate potential risks.</p></li><li><p><strong>Accessibility, Availability</strong> - a solution must be deployed as close as possible to the users (low latency) and must guarantee a high up-time SLA.</p></li><li><p><strong>Ownership</strong> - All components must have clear ownership / accountability.</p></li><li><p>Build comprehensive documentation (HLD/LLD)&nbsp;</p></li><li><p><strong>Technology independence</strong> - a solution should be independent of specific technology and there can operate on a variety of technology platforms.</p></li></ul><p>So, besides those functional requirements, there're several other things that solutions architect can consider listed as below:</p><ul><li><p><strong>Cost optimization</strong> - finding the perfect mix of technologies and infrastructure to solve the problem, and to spend a minimum of money. (<em>Reuse before buy, buy before build</em>)</p></li><li><p><strong>User Experience</strong> - supporting the UX team find the ideal user interface if you're building a product/process/service or software, guiding users intuitively through the solution.</p></li><li><p><strong>Performance</strong> - support with load testing to ensure the expected number of concurrent users and client services.</p></li></ul><p>There are more based on TOGAF but hey, those are structured set of ideas that collectively define and guide our organization, from values through actions and results.</p><p>Thanks for reading my blog!</p>]]></content:encoded></item><item><title><![CDATA[First principles thinking]]></title><description><![CDATA["If I had an hour to solve a problem, I would spend 55 minutes thinking about the problem and 5 minutes on the solution." ~ Albert Einstein]]></description><link>https://www.keephustlingtech.com/p/first-principles-thinking</link><guid isPermaLink="false">https://www.keephustlingtech.com/p/first-principles-thinking</guid><dc:creator><![CDATA[Ye Kyaw Soe (Michael)]]></dc:creator><pubDate>Tue, 25 Apr 2023 17:02:51 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/de05fa56-a858-4862-8bbf-4a5a6106ced8_964x964.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2><strong>What is it?</strong></h2><p>We're making decisions every single day of our lives. Be it a small or big one. We all used different kind of reasonings which allow us to weigh benefits and disadvantages of two or more courses of action before choosing the one with most benefit or the one suits our needs. The most common one would be a reasoning by analogy which involves the use of past experiences to solve problems that are similar to problems solved before. It may be the fastest way to solve problems but definitely not the most certain.</p><p>The one I wanted to discuss here is a reasoning by first principles, also called first principles thinking.</p><blockquote><p><em>"We get through life by reasoning by analogy, which essentially means copying what other people do with slight variations. And you have to do that. Otherwise, mentally, you wouldn't be able to get through the day. But when you want to do something new, you have to apply the first-principles approach." ~ Elon Musk</em></p></blockquote><p>Often times, when we faced with difficult problems, we tend to fall back on our pre-existing beliefs and opinions. With first principles thinking, we can break out of this herd mentality, think creatively, and create some unique solutions to very common problems. Thus, make our valuable contribution in any field like IT, daily life etc.</p><p>It's sort of like '<em>boiling down to fundamental truths and&nbsp;reasoning up from there</em>".</p><p>In some simpler terms, it's a fact or premise or conclusion that is the only conclusion, regardless of your perspective. And It's a basic proposition or assumption that cannot be deduced from any other proposition or assumption. It also means establishing a fundamental fact or conclusion that you know is true, deconstructing it down to its core elements, and working up from there.</p><h2><strong>How to do it?</strong></h2><p>One way is to use Socratic questioning method. There're so many methods out there. There's no hard and fast rule. There's a popular method like fish bone tool for root cause analysis. Google it if you want to learn further.</p><p>The sample process looks like this.&nbsp;</p><ul><li><p>Clarifying questions like 'What do you mean by Microsoft Teams is slow?" Questions like (5 Whys, what, How) can help to break down the question, idea, thought or direction to the most basic truths.</p></li><li><p>Challenging assumptions like "Why do you think it's related to network or endpoint?"</p></li><li><p>Looking for evidence like "Are there event/audit/diagnostics logs to support this idea?"</p></li><li><p>Considering alternative perspectives like "How do I know I am correct?" and "What might other experts think of this?"</p></li><li><p>Questioning the original question like "Why did I think that?", "Was I correct?"</p></li></ul><h2><strong>What's in it for me?</strong></h2><p>There're many. It may take time compared to reasoning by analogy but there're tons of benefits.</p><ul><li><p>Problem solving becomes fun.</p></li><li><p>You automatically improve your knowledge with every problem you solve.</p></li><li><p>You learn what is important and what's not.</p></li><li><p>You can drive innovation.</p></li><li><p>You feel smart LOL!</p></li></ul><p>Thanks for reading my blog.</p><p>References: Google, Elon Musk, past mentors and my father.</p>]]></content:encoded></item><item><title><![CDATA[What the heck is EDA (Exploratory Data Analysis) Part I]]></title><description><![CDATA[In this article, I'll try to explain Exploratory Data Analysis (EDA) in a five-part series. If you&#8217;re new to EDA, I recommend reading all five of them. If you&#8217;re not, you may read through the part you&#8217;re interested. The following are five parts: Overview of statistics and scales of measurement]]></description><link>https://www.keephustlingtech.com/p/what-the-heck-is-eda-exploratory</link><guid isPermaLink="false">https://www.keephustlingtech.com/p/what-the-heck-is-eda-exploratory</guid><dc:creator><![CDATA[Ye Kyaw Soe (Michael)]]></dc:creator><pubDate>Tue, 25 Apr 2023 16:37:51 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/805e6ec8-61a7-4e5f-88fb-495a8d44dff0_964x964.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In this article, I'll try to explain Exploratory Data Analysis (EDA) in a five-part series. If you&#8217;re new to EDA, I recommend reading all five of them. If you&#8217;re not, you may read through the part you&#8217;re interested.</p><p>The following are five parts:</p><ol><li><p><strong>Overview of statistics and scales of measurement</strong></p></li><li><p>Types of data</p></li><li><p>Measures of location such as mean, median and mode.</p></li><li><p>Measures of location (percentile and quartiles) and measures of variation (range and interquartile range)</p></li><li><p>Finally, measures of variation (variance and standard deviation). Enjoy!</p></li></ol><p>This part 1 is about overview of statistics and scales of measurement.</p><blockquote><p>In statistics, exploratory data analysis is an approach of analyzing data sets to summarize their main characteristics, often using statistical graphics and other data visualization methods.</p></blockquote><p>Statistics has many applications in many disciplines and can e used to predict results of an election, forecast weather, forecast sales and more. It has two main branches; <em>descriptive </em>and <em>inferential </em>statistics.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WBLG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b64801f-f41f-4485-a95b-500d3ee609eb_1125x455.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WBLG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b64801f-f41f-4485-a95b-500d3ee609eb_1125x455.png 424w, https://substackcdn.com/image/fetch/$s_!WBLG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b64801f-f41f-4485-a95b-500d3ee609eb_1125x455.png 848w, https://substackcdn.com/image/fetch/$s_!WBLG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b64801f-f41f-4485-a95b-500d3ee609eb_1125x455.png 1272w, https://substackcdn.com/image/fetch/$s_!WBLG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b64801f-f41f-4485-a95b-500d3ee609eb_1125x455.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WBLG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b64801f-f41f-4485-a95b-500d3ee609eb_1125x455.png" width="1125" height="455" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0b64801f-f41f-4485-a95b-500d3ee609eb_1125x455.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:455,&quot;width&quot;:1125,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!WBLG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b64801f-f41f-4485-a95b-500d3ee609eb_1125x455.png 424w, https://substackcdn.com/image/fetch/$s_!WBLG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b64801f-f41f-4485-a95b-500d3ee609eb_1125x455.png 848w, https://substackcdn.com/image/fetch/$s_!WBLG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b64801f-f41f-4485-a95b-500d3ee609eb_1125x455.png 1272w, https://substackcdn.com/image/fetch/$s_!WBLG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0b64801f-f41f-4485-a95b-500d3ee609eb_1125x455.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">descriptive vs inferential statistics comparison table</figcaption></figure></div><p>You might notice the words, populace data and sample data. Those are just jargons used by Statisticians. Population and sample are nothing but names to differential different set of data.</p><p>For example, suppose you&#8217;re working on research to know age differences between male and female students in a university. Population or population data means all students (i.e., both males and females) in that university. Can you guess what sample data means in the above example?</p><p>A sample is a subset of population that is representative of the population from which it was selected. Read the table below which i summaries it for your easy understanding.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!w51X!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc34214d7-e79f-4929-9581-d673f5cf4727_1125x411.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!w51X!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc34214d7-e79f-4929-9581-d673f5cf4727_1125x411.png 424w, https://substackcdn.com/image/fetch/$s_!w51X!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc34214d7-e79f-4929-9581-d673f5cf4727_1125x411.png 848w, https://substackcdn.com/image/fetch/$s_!w51X!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc34214d7-e79f-4929-9581-d673f5cf4727_1125x411.png 1272w, https://substackcdn.com/image/fetch/$s_!w51X!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc34214d7-e79f-4929-9581-d673f5cf4727_1125x411.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!w51X!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc34214d7-e79f-4929-9581-d673f5cf4727_1125x411.png" width="1125" height="411" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c34214d7-e79f-4929-9581-d673f5cf4727_1125x411.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:411,&quot;width&quot;:1125,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!w51X!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc34214d7-e79f-4929-9581-d673f5cf4727_1125x411.png 424w, https://substackcdn.com/image/fetch/$s_!w51X!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc34214d7-e79f-4929-9581-d673f5cf4727_1125x411.png 848w, https://substackcdn.com/image/fetch/$s_!w51X!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc34214d7-e79f-4929-9581-d673f5cf4727_1125x411.png 1272w, https://substackcdn.com/image/fetch/$s_!w51X!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc34214d7-e79f-4929-9581-d673f5cf4727_1125x411.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Comparison between population and sample</figcaption></figure></div><blockquote><p>The problem is that 99.999&#8230; % of the time, we don&#8217;t &#8212; or can&#8217;t &#8212; know the real value of a population parameter. The best we can do is estimate the parameter! This is where samples and statistics come in to play.</p></blockquote><p>Next, I&#8217;ll discuss about scales of measurement or level of measurements. Understanding this is important to interpreting the numbers assigned to people, objects, and events. Moreover, it&#8217;s an indicator of the most suitable data summary and statistical analysis.</p><blockquote><p>Psychologist Stanley Smith Stevens developed the best-known classification with four levels, or scales, of measurement: nominal, ordinal, interval, and ratio.</p></blockquote><p>There are four scales or levels: nominal, ordinal, interval and ratio. Read the table below for your easy understanding.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3x_w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf1d8d08-7cda-476f-9b7e-c44bca74be0e_1125x642.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3x_w!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf1d8d08-7cda-476f-9b7e-c44bca74be0e_1125x642.png 424w, https://substackcdn.com/image/fetch/$s_!3x_w!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf1d8d08-7cda-476f-9b7e-c44bca74be0e_1125x642.png 848w, https://substackcdn.com/image/fetch/$s_!3x_w!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf1d8d08-7cda-476f-9b7e-c44bca74be0e_1125x642.png 1272w, https://substackcdn.com/image/fetch/$s_!3x_w!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf1d8d08-7cda-476f-9b7e-c44bca74be0e_1125x642.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3x_w!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf1d8d08-7cda-476f-9b7e-c44bca74be0e_1125x642.png" width="1125" height="642" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf1d8d08-7cda-476f-9b7e-c44bca74be0e_1125x642.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:642,&quot;width&quot;:1125,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!3x_w!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf1d8d08-7cda-476f-9b7e-c44bca74be0e_1125x642.png 424w, https://substackcdn.com/image/fetch/$s_!3x_w!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf1d8d08-7cda-476f-9b7e-c44bca74be0e_1125x642.png 848w, https://substackcdn.com/image/fetch/$s_!3x_w!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf1d8d08-7cda-476f-9b7e-c44bca74be0e_1125x642.png 1272w, https://substackcdn.com/image/fetch/$s_!3x_w!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf1d8d08-7cda-476f-9b7e-c44bca74be0e_1125x642.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Comparison of the four scales of measurement</figcaption></figure></div><p>This is the end of Exploratory Data Analysis Part I, <strong>Overview of statistics and scales of measurement. </strong>I hope you have a fruitful reading.</p><p>If you enjoy this article and want to read more, please support me by giving claps or responses. Thank you!</p><p>Don&#8217;t forget to check out on the next part 2 about Types of data.</p>]]></content:encoded></item><item><title><![CDATA[Windows Hello vs Windows Hello for Business]]></title><description><![CDATA[Is it the end game for Passwords and Credential Theft?]]></description><link>https://www.keephustlingtech.com/p/windows-hello-vs-windows-hello-for</link><guid isPermaLink="false">https://www.keephustlingtech.com/p/windows-hello-vs-windows-hello-for</guid><dc:creator><![CDATA[Ye Kyaw Soe (Michael)]]></dc:creator><pubDate>Tue, 25 Apr 2023 16:36:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!YwKx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed1f7cbe-b87c-426c-a9c4-baccd0d9c56b_788x443.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In this article, I&#8217;ll try to explain some of the key points of Windows Hello and Hello for business and why are they important for passwordless environment.</p><blockquote><p>The road to being passwordless is a journey. Almost everyone wants the instant gratification of achieving a passwordless environment but can easily become overwhelmed by many challenges and frustrations.</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!YwKx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed1f7cbe-b87c-426c-a9c4-baccd0d9c56b_788x443.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!YwKx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed1f7cbe-b87c-426c-a9c4-baccd0d9c56b_788x443.jpeg 424w, https://substackcdn.com/image/fetch/$s_!YwKx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed1f7cbe-b87c-426c-a9c4-baccd0d9c56b_788x443.jpeg 848w, https://substackcdn.com/image/fetch/$s_!YwKx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed1f7cbe-b87c-426c-a9c4-baccd0d9c56b_788x443.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!YwKx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed1f7cbe-b87c-426c-a9c4-baccd0d9c56b_788x443.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!YwKx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed1f7cbe-b87c-426c-a9c4-baccd0d9c56b_788x443.jpeg" width="788" height="443" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ed1f7cbe-b87c-426c-a9c4-baccd0d9c56b_788x443.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:443,&quot;width&quot;:788,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!YwKx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed1f7cbe-b87c-426c-a9c4-baccd0d9c56b_788x443.jpeg 424w, https://substackcdn.com/image/fetch/$s_!YwKx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed1f7cbe-b87c-426c-a9c4-baccd0d9c56b_788x443.jpeg 848w, https://substackcdn.com/image/fetch/$s_!YwKx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed1f7cbe-b87c-426c-a9c4-baccd0d9c56b_788x443.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!YwKx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed1f7cbe-b87c-426c-a9c4-baccd0d9c56b_788x443.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@xps?utm_source=medium&amp;utm_medium=referral">XPS</a> on <a href="https://unsplash.com/?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure></div><p>Before i start explaining Windows Hello and Hello for Business, let me give you some background story of why all tech companies are pushing for passwordless journey as part of digital transformation.</p><p>The cyberattack landscape is getting sophisticated. As you might have heard recently Microsoft confirmed it was also breached in recent SolarWinds supply chain hack. It&#8217;s the most widespread and complex events cybersecurity history. It was a clear reminder of what they are all up against.</p><p>One of the main identity related topic during Microsoft Ignite 2021 was also about passwordless strategy and they are urging their customers to start passwordless journey.</p><p>If you&#8217;re a nerd like me, you might know MFA (Multi Factor Authentication). It&#8217;s a Cybersecurity 101. To break it down, MFA typically have 3 separate categories of authentication factors such as the knowledge, possession and inherence categories.</p><p>Before you ask what the heck are those, let me explain.</p><ul><li><p>The knowledge factor is <em>something you know</em> such as username and password.</p></li><li><p>The <em>possession </em>factor is <em>something you have</em> such as OTP (One-Time Password or PIN or token).</p></li><li><p>The inherence factor is essentially any biological traits you got such as fingerprint, facial recognition, voice recognition, retina scan etc. In other words, it&#8217;s <em>something you are</em>.</p></li></ul><p>So, going passwordless means they will get rid of passwords for good. The idea is that they are getting rid of <em>something you know </em>part and replace it with <em>something you have and/or something you are </em>(i.e. biometric authentication available on Windows 10 devices).</p><p>The end goal of most tech companies is to transition into a passwordless world. A world where users never type their password, never change their password and do not know their password. Sounds interesting?</p><p>Read on..</p><p>This is the part where i explain about the different between Windows Hello vs Hello for Business.</p><h1><strong>The difference between Windows Hello and Windows Hello for Business</strong></h1><p><strong>Windows Hello</strong></p><ul><li><p>Users can create a so called &#8220;Windows Hello convenience PIN&#8221; or biometric gesture on their <em>personal devices</em> for convenient sign-in. If you sign into Windows 10 with fingerprint or face recognition, then you are already using Windows Hello.</p></li><li><p>This use of Windows Hello is unique to the device in which it&#8217;s setup. Basically it means that if someone else knows the PIN you use to login to your Windows 10 device, that PIN is theoretically useless on another device, since that PIN is device specific and stored locally.</p></li><li><p>It&#8217;s backed by asymmetric (public/private key) or certificate-based authentication.</p></li><li><p>Both Windows Hello and Hello for Business requires Windows 10 device which either includes built-in support for biometric logins or else you&#8217;ll need to install a compatible biometric login device such as a webcam or a fingerprint reader.</p></li><li><p>Windows Hello reduces the risk of keyloggers or password phishing, but the login process still uses your password hash. As you are normally not joined to a domain and your hash cannot harm other devices, this is a reduced risk.</p></li><li><p>It leverages the Trusted Platform Module (TPM) chip.</p></li><li><p>Microsoft will be deprecating convenience PINs in the future and will publish the date early to ensure customers have adequate lead time to deploy Windows Hello for Business. Ouch!</p></li></ul><p><strong>Windows Hello for Business</strong></p><ul><li><p>In a nutshell, Windows Hello for Business =Windows Hello + the Asymmetric Authentication method (combines biometric and PKI mechanisms). It replaces passwords with strong two-factor authentication on PCs and mobile devices and lets user authenticate to an Active Directory or Azure Active Directory account.</p></li><li><p>Windows Hello for Business incorporates minimum two factors: something you have (i.e., user&#8217;s private key protected by the device&#8217;s TPM) and something you know (i.e., PIN) and/or biometric.</p></li></ul><blockquote><p><em>However, most companies replace this &#8216;something you know&#8217; authentication factor with the something you are which is biometric.</em></p></blockquote><ul><li><p>Windows Hello for Business uses key-based or certificate-based authentication and is considered MFA authentication. It registers a credential to Azure AD or Active Directory.</p></li><li><p>If you&#8217;re a business owner, your employees can use fingerprint or facial recognition as an alternative method to unlocking a device. This type of authentication doesn&#8217;t roam among devices, isn&#8217;t shared with a server, and can&#8217;t easily be extracted from a device. If your multiple employees share a device (max is 10), each of them will use his or her own biometric data on the device.</p></li><li><p>You can configure this by Group Policy or mobile device management (MDM)policy, always uses key-based or certificate-based authentication. It&#8217;s much more secure than Windows Hello convenience PIN.</p></li><li><p>It addresses several problems with passwords such as strong passwords can be difficult to remember and most of us use the same password on multiple sites, passwords are subjected to replay attacks and most importantly business users can expose their passwords due to phishing attacks. As you might aware phishing attacks are on the rise as people working from home.</p></li></ul><p>Before i end this, a lot of people asked this question.</p><blockquote><p>&#8216;<em>How can a PIN more secure than a password?</em>&#8217;.</p></blockquote><p>The answer is that.</p><ul><li><p>the <strong>PIN is tied to the specific device on which it was setup.</strong> The PIN is useless to anyone without that specific hardware (i.e., laptop, mobile etc.). However, someone who steals your password can sign into your account from anywhere, but if they steal your PIN, they&#8217;d have to steal your physical device too!</p></li><li><p>Your login password is transmitted over the network to server which means it can be intercepted in transmission or stolen from a server whereas <strong>a PIN is local to a device, and it isn&#8217;t transmitted anywhere and stored on any server.</strong></p></li></ul><p>If you&#8217;re planning for WHB (Windows Hello for Business), i suggest you go through this documentation below from Microsoft.</p><p><a href="https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-planning-guide">Planning a Windows Hello for Business Deployment &#8212; Microsoft 365 Security | Microsoft Docs</a></p><p>If you enjoy this article and want to read more, please support me by giving claps or responses. Thank you!</p>]]></content:encoded></item><item><title><![CDATA[What is Apple User Enrollment?]]></title><description><![CDATA[In this article, i&#8217;ll discuss about one of the enrollment types for mobile device management with Apple devices called &#8216;User Enrollment&#8217;. This is also featured in WWDC 2019. Enjoy!]]></description><link>https://www.keephustlingtech.com/p/what-is-apple-user-enrollment</link><guid isPermaLink="false">https://www.keephustlingtech.com/p/what-is-apple-user-enrollment</guid><dc:creator><![CDATA[Ye Kyaw Soe (Michael)]]></dc:creator><pubDate>Tue, 25 Apr 2023 16:22:39 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/a493dfa9-1ac6-4704-bfb5-ed8a84503c6e_964x964.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<blockquote><p><em>The term &#8216;User Enrollment&#8217; is designed by Apple for BYOD &#8212; or bring your own device type where the user (you and me), not the organization or company, owns the device.</em></p></blockquote><h1><strong>What&#8217;s this about?</strong></h1><p>User enrollment is introduced by Apple during WWDC 2019. Instead of managing entire BYOD device using mobile device management solution (such as AirWatch, Intune etc.), they are managing an enterprise user identity on the device in the form of configuring a <em>managed Apple ID.</em></p><p>Confusing?</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.keephustlingtech.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ye&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>I suggest you soldier on. In short, this managed Apple ID allows iOS device to create a new separate, cryptographically protected APFS volume specific to the managed data of the BYOD user. So, any data installed by the MDM vendor will associate with this managed Apple ID. Any other personal data, personal apps, photos etc., will stay on personal Apple ID of the device.</p><p>This is mainly designed to keep personal and company data separate by associating a personal Apple ID with personal data and a managed Apple ID with corporate data.</p><blockquote><p><em>User enrollment is similar to what Google Android Enterprise has already achieved, they&#8217;ve been calling it &#8216;Work profile&#8217;</em></p></blockquote><h1><strong>What are the benefits?</strong></h1><p>It&#8217;s mostly an additional privacy created by the separation and protection of a user&#8217;s personal data and the securing of corporate data. Your Information Security dept. will love it.</p><blockquote><p>Another benefit is BYOD devices using this enrollment method can now use Apple watch to unlock their iOS devices by using numeric PIN instead of alphanumeric.</p></blockquote><h1><strong>What are the challenges?</strong></h1><ol><li><p>Due to the nature of this user enrollment method, MDM vendor can no longer access any persistent identifiers, any sort of PII associated with the device, especially what apps user has installed. You might say it&#8217;s a good thing since you don&#8217;t want company to know what you have on your device. However, most companies have their on-premise Wi-Fi which requires to check your mobile device&#8217;s UDID to verify that your device is enrolled to company approved MDM vendor. This will not be possible if you used &#8216;User enrollment&#8217; method.</p></li><li><p>You would need to re-enroll your mobile device to user enrollment method if you already enrolled using different method.</p></li><li><p>This really depends on your company security policy where 2FA (Two factor authentication) is enforced or not. If it is, you will need to provide 2FA token.</p></li></ol><h1><strong>What is required to enable User Enrollment?</strong></h1><p>This is a question for technical person (your IT team) to know. You will need federated authentication. Remember the managed Apple ID I talked earlier? It is an enterprise identity created on behalf of users by Apple Business Manager through federation to IdP such as Azure AD or any other IdPs. You will need to enable it so that your company email address will become a managed Apple ID.</p><p>The rest is just user communication, onboarding and getting clearance from your Information Security dept.</p><p>Hope you enjoy this article. Feel free to reach out to me if you have any queries!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.keephustlingtech.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ye&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[What, why and how OKRs?]]></title><description><![CDATA[In this article, i&#8217;ll try to explain what is OKRs (Objectives and Key Results) and why and how do we use it? Enjoy!]]></description><link>https://www.keephustlingtech.com/p/what-why-and-how-okrs</link><guid isPermaLink="false">https://www.keephustlingtech.com/p/what-why-and-how-okrs</guid><dc:creator><![CDATA[Ye Kyaw Soe (Michael)]]></dc:creator><pubDate>Tue, 25 Apr 2023 16:19:55 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/3df2c463-4aa5-47a1-ada7-b949a5abc14b_964x964.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1><strong>What is OKRs?</strong></h1><p>OKR is a goal-setting framework driven by outcomes that includes two components: <strong>Objectives </strong>and <strong>Key Results</strong>. This framework has successfully been used in many large organizations such as Google. Twitter and LinkedIn with an increasing popularity over the past years due to its effectiveness.</p><p><em>Objectives </em>are ambitious, clearly defined goals but might feel somewhat uncomfortable.<br><em>Key Results </em>are specific measures used to track the achievement of those defined goals. It should be easy to grade with a number such as 0&#8211;1.0 scale.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2eke!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf0728ca-e5b6-480e-ba1a-8b32eac992be_672x138.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2eke!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf0728ca-e5b6-480e-ba1a-8b32eac992be_672x138.png 424w, https://substackcdn.com/image/fetch/$s_!2eke!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf0728ca-e5b6-480e-ba1a-8b32eac992be_672x138.png 848w, https://substackcdn.com/image/fetch/$s_!2eke!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf0728ca-e5b6-480e-ba1a-8b32eac992be_672x138.png 1272w, https://substackcdn.com/image/fetch/$s_!2eke!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf0728ca-e5b6-480e-ba1a-8b32eac992be_672x138.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2eke!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf0728ca-e5b6-480e-ba1a-8b32eac992be_672x138.png" width="672" height="138" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf0728ca-e5b6-480e-ba1a-8b32eac992be_672x138.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:138,&quot;width&quot;:672,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2eke!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf0728ca-e5b6-480e-ba1a-8b32eac992be_672x138.png 424w, https://substackcdn.com/image/fetch/$s_!2eke!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf0728ca-e5b6-480e-ba1a-8b32eac992be_672x138.png 848w, https://substackcdn.com/image/fetch/$s_!2eke!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf0728ca-e5b6-480e-ba1a-8b32eac992be_672x138.png 1272w, https://substackcdn.com/image/fetch/$s_!2eke!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf0728ca-e5b6-480e-ba1a-8b32eac992be_672x138.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><blockquote><p><em>OKRs represent more than progress, they represent the meaningful changes/improvement you want to see in your teams and organisation.</em></p></blockquote><h1><strong>Why should you need it?</strong></h1><p>OKRs promise several key factors critical to organization moving towards increased human-centric and value-driving ways of working such as:</p><ol><li><p><strong>Agile and Lean ways of working</strong> where OKRs are built on short review cycles so that you can be nimbler, and staff can reach to changes much faster.</p></li><li><p><strong>Transparency</strong>, which means OKRs are public; everyone in the company should be able see what everyone else is working on. Objectives should be aligned with the overall company strategy as a guiding star. Clarity and purpose makes people feel motivated and engaged.</p></li><li><p><strong>Ambitious</strong>: Objectives are ambitious, challenging and inspirational. This makes people think outside the box and inspire them to achieve their best possible work.</p></li></ol><h1><strong>What are the benefits of OKRs?</strong></h1><ol><li><p>Capture cross-functional dependencies across teams.</p></li><li><p>Helps to steer development through data-driven decision making.</p></li><li><p>Focuses on outcome, not output by measuring delivered value.</p></li><li><p>You can achieve remarkable results when you&#8217;re engaged with a purpose. OKRs help communicate the bigger picture in a way everyone understands.</p></li></ol><h1><strong>What makes good OKRs?</strong></h1><ol><li><p>Effective OKRs detail the criteria that help communicate to your team if you&#8217;re successful or not in the actions that you decided to take together. That information helps your team understand if they need to course correct of change action. And that&#8217;s also the reason why OKRs are transparent or public, they end up being this very transparent communication tool that your entire team can rally behind.</p></li><li><p>A good objective, which has three qualities such as <em><strong>meaningful</strong></em>, which articulates a top priority and provides clear direction.<br><em><strong>audacious </strong></em>means it should be pushing your team to do what you thought wasn&#8217;t possible and <em><strong>inspiring </strong></em>which means it&#8217;s memorable and empowering for your team.</p></li></ol><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.keephustlingtech.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Ye&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[How Might We statement]]></title><description><![CDATA[One of the first thing i learned in design thinking lesson is about HMW (How Might We) statement. In this article, I&#8217;ll explain it under 5 minutes using Q&A style. Enjoy!Thanks for reading Ye&#8217;s Substack! Subscribe for free to receive new posts and support my work.]]></description><link>https://www.keephustlingtech.com/p/how-might-we-statement</link><guid isPermaLink="false">https://www.keephustlingtech.com/p/how-might-we-statement</guid><dc:creator><![CDATA[Ye Kyaw Soe (Michael)]]></dc:creator><pubDate>Tue, 25 Apr 2023 16:16:32 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/147aa9ba-4ac3-441d-a7a0-f25bfd776aa1_964x964.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Get ready to take your design thinking game to the next level with one of the most exciting tools in the toolkit: the HMW (How Might We) statement! </p><p>In just five minutes, I'll show you how to master this technique with a fun and informative Q&amp;A session. </p><p>So, let's dive in and unleash our creativity!</p><div><hr></div><p></p><p><strong>Have you heard of HMW (How Might We) statements?</strong> </p><p>They're questions designed to spark ideas during brainstorming sessions.</p><p><strong>Why use them?</strong> </p><p>To focus on creating solutions that address the needs and pain points of the people you're designing for.</p><p><strong>What are the benefits?</strong> </p><p>They remind everyone involved of what matters most to customers and why.</p><p><strong>How do you get started?</strong> </p><p>Gather a small group of 3-7 people and have a facilitator who understands what makes a good HMW statement. The facilitator should also have data on the target group and their needs.</p><p>If you&#8217;re a facilitator, it&#8217;d be helpful to spend some time to gather data that will help inform about your target group (i.e., customers/users) and their needs and pain points.</p><blockquote><p><em>If the people in the room don&#8217;t have a solid understanding of what customers/users needs, business drivers etc., don&#8217;t proceed. Go get data to be better informed.</em></p></blockquote><p><strong>Here's a step-by-step approach to creating HMW statements:</strong></p><p>1. Identify, discuss and write down:<br><em>what are your customers/users need?<br>What are their pain points?</em></p><p>2. Cluster needs and pain points across commonalities by giving a title to each cluster of needs and pain points.</p><p>3. Review your clusters and look for insights and patterns and write them down. Insights is the understanding of a specific cause and effect within a particular context.</p><p>4. Based on clustered data and insights, write down HMW statements as many as you can come up with.</p><p>For example,<br>&#8220;<em>How might we redesign air travel?</em>&#8221; is too broad.<br>&#8220;<em>How might we reimagine aircraft seats?</em>&#8221; can be too specific and limiting.<br>&#8220;<em>How might we design joyful and stress-free flight experience for our customers while ensuring their safety while onboard our aircrafts?</em>&#8221; is appropriate.</p><p>5. Now is the time to ask your working group to vote for the top 3&#8211;5 HMW statements to bring to your ideation session.</p><p>Here is an example of what HMW statement might look like:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!KYXU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F845b6765-5969-467b-b938-68d8396ee786_788x501.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!KYXU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F845b6765-5969-467b-b938-68d8396ee786_788x501.png 424w, https://substackcdn.com/image/fetch/$s_!KYXU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F845b6765-5969-467b-b938-68d8396ee786_788x501.png 848w, https://substackcdn.com/image/fetch/$s_!KYXU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F845b6765-5969-467b-b938-68d8396ee786_788x501.png 1272w, https://substackcdn.com/image/fetch/$s_!KYXU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F845b6765-5969-467b-b938-68d8396ee786_788x501.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!KYXU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F845b6765-5969-467b-b938-68d8396ee786_788x501.png" width="788" height="501" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/845b6765-5969-467b-b938-68d8396ee786_788x501.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:501,&quot;width&quot;:788,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!KYXU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F845b6765-5969-467b-b938-68d8396ee786_788x501.png 424w, https://substackcdn.com/image/fetch/$s_!KYXU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F845b6765-5969-467b-b938-68d8396ee786_788x501.png 848w, https://substackcdn.com/image/fetch/$s_!KYXU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F845b6765-5969-467b-b938-68d8396ee786_788x501.png 1272w, https://substackcdn.com/image/fetch/$s_!KYXU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F845b6765-5969-467b-b938-68d8396ee786_788x501.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Give it a try. All the best!</figcaption></figure></div><p></p>]]></content:encoded></item></channel></rss>