Author: Maikel Mardjan

  • Open Security News week 8-2025

    Cyber security is a key quality aspect that can not be integrated later in a product. You can not create a better security architecture when your product is finished. Security is a core product quality aspect that can not be added later. Security should be seen as a foundation quality aspect that is developed in parallel with your new product. You don’t have to be a genius to make cyber security simpler and better. Continuous learning is key!

    (more…)
  • Open ML/AI News week 7-2025

    General accepted definitions for open ML/AI are a must for Free and Open ML / AI systems and software. But despite several attempts there is still no general de facto accepted definition for ML/AI software and applications. The OSI Open Source AI Definition is not perfect. It is and was heavily criticized. However it is a first step towards a better definition.

    (more…)
  • Simplify Python

    This book is NOT another Python learning book. This book simplifies software development using the Python programming language. So with all key references included that professional programmers use. This Playbook is created to be used daily.

    (more…)
  • Pushing complexity to users

    Creating simple IT solutions is challenging, but that doesn’t mean your product has to be difficult to use. Too often, we are confronted with seemingly simple tasks like creating a document, ordering a ticket, booking a hotel, or completing a mandatory government form online. Why do these simple tasks turn out to be a nightmare and time sink? 

    (more…)
  • Simplify IT

    Nobody ever asks for a complex IT solution. We all love simple IT solutions.

    (more…)
  • Finding duplicates in a collection: A solved problem!

    We all have used Ms Excel. Or still do. Companies love Ms Excel or store information in databases.

    A common challenge is: How to find duplicate row items?

    (more…)
  • Cyber Security Conferences

    Cyber security conferences or seminars are crucial for continuous learning. But the number of annual held cybersecurity events is immense. So on this blog page you will find an opinionated collection of exiting cyber security events worldwide.

    (more…)
  • Open Security News week 49-2024

    Security relies on understanding the present and past vulnerabilities within your hardware and software stack. Responsible software and hardware companies publish detailed information about known vulnerabilities. However, remember that the number of reported vulnerabilities for a product does never ever reflect its quality.

    In fact, a lack of openly published vulnerabilities should raise suspicion, as transparency is a hallmark of trustworthy and secure products. The amount of vulnerabilities you can find for a product is not related to the quality. Distrust products that have no open published vulnerabilities.

    (more…)
  • Open Security News week 48-2024

    Security is complicated. This is why open development is a key factor and a precondition for creating secure solutions. Security is getting more important every day. Also due to the development of machine learning applications many data driven solutions are poisoned with privacy related data. Transparency and openness increase security protection levels. A good security product should never ever introduce extra vulnerabilities. However many low quality security products increase your cyber risk profile instead of lowering.

    (more…)
  • Open Security News week 24-2024

    We all deserve protection from abusive data practices like mass surveillance, browser tracking, demographic profiling, and data discrimination. Protecting privacy means preserving your and our digital autonomy, our freedom, and core democratic values. Technology will continue to enrich our lives and enable new possibilities for the future.

    There should be no tension between digital innovations and maintaining your digital privacy. Good security is vital for good privacy. Using open, transparent and simple solutions is key to prevent unneeded data collections that impact our privacy and fundamental human rights.

    (more…)