Blog Posts

Joy Not Happiness


Rejoice not in the earthly blessings Be thankful, very thankful Rejoice not in your ability to bless others Glorify the God who makes you a blessing Now Rejoice! Rejoice in the healing of the hurting Rejoice in the salvation of the lost Subscribe If you enjoyed this post, you can subscribe to receive my weekly newsletter via email.

Searching for Truth: Knowledge, Wisdom, and Understanding


About two weeks ago, I began a daily study of the Biblical book of Proverbs. I have often heard about the wisdom it contains and have ready it in the past. But I figured  a detailed study would be a good way to kick off 2018. The Bible often emphasizes wisdom as a prerequisite for living a meaningful life. As I have read proverbs, I was struck by its sharp focus on knowledge, wisdom, and understanding. It’s fair to say

Continue Reading

IoT Security: Old Problems + New Situations = New Problems


A few days ago, news broke concerning the unintended exposure of US Military around the world, due to a fitness tracker which allows it’s users to share their exercises and exercise locations. Perhaps even more disconcerting is that in this case, the fitness tracker or wearable (which is paired with the user’s smartphone) seems to have default settings that enable such sharing. Privacy problems introduced by location aware technology is not new. Research into mobile applications have revealed privacy concerns

Continue Reading

Bearing The Cross – Remembering Dr. Martin Luther King


It’s January 15… MLK day. A day that honours one of the foremost leaders of the civil rights movement, Dr Martin Luther King. It’s my 2nd MLK day in the United States of America. Just less than 2 years ago, I sought to explore technology in North America, having had the coals of tech desire heated in the country of my birth, Nigeria, and their flames fanned in the green fields of Ireland. Unsurprisingly, as I looked to new adventures

Continue Reading

Quick Overview of Spectre and Meltdown Attacks – Vulnerabilities in CPUs


On Wednesday, January 3, 2018, security researchers announced a series of security vulnerabilities that affect most of the world’s microprocessors (CPUs), going back about 20 years. Unsurprisingly, it’s caused a major firestorm in the media, and although I’m a little tongue-tied on this one – as some might have guessed – it’s well worth it to provide a high level overview and link repository. Summarily, the vulnerability means that due to the way modern microprocessors schedule and execute instructions, it

Continue Reading

The Art of Moving Part 1 – Leaves of Snow


It was a windy harmattan* evening in Ibadan, Nigeria’s oldest city in the south-western region of the country. The leaves of virtually all trees in our compound had dried up and littered our back yard. They were bright goldish-brown in colour and crackled when one stepped on them. As the few remaining leaves that clung to the mighty baobabs and Irokos fell down in resignation, I ran to window singing… snow, snow! My Dad laughed. Of course snow never fell

Continue Reading

Most Critical Web Application Security Risks in 2017


As 2017 draws to a close, I find myself reminiscing about major application security risks today. Unsurprisingly, I recall the OWASP Top 10, which has become a de facto standard for web application security. In the Information Security industry, it is well known that once a web application or service is hosted, it is likely to be automatically probed for security flaws – and perhaps compromised – within hours. This year, the  OWASP Top Ten was revamped to cater to

Continue Reading

Using Deep Learning to Build Secure Software


Neural networks are a set of algorithms, modeled loosely after the human brain, that are designed to recognize patterns. They interpret sensory data through a kind of machine perception, labeling or clustering raw input. The patterns they recognize are numerical, contained in vectors, into which all real-world data, be it images, sound, text or time series, must be translated.… a great resource for concepts, architectures, and tools. Neural networks (also referred to as deep neural networks or deep learning)

Continue Reading



In the deep, in the deep We crawl, in the deep We struggle, in the deep Blood streams down our fingers Gravel pushes up our nails It’s so dusty We’re no further than before Dust fills our lungs The surface, far away That light, too distant How we got here, who knows? But it’s clear, where we are In deep Our face contorts Grimace of exertion Our body rigid All muscles flexing One last push A good foothold We might

Continue Reading

Igniting Imagination About The Future Of The Internet of Things

We have heard it so much, we probably tune it out. Yet, it's true. The connected future, birthed in a blossom of the Internet of Things (IoT) will bring about major changes in the ways humans interact with computers and the impact of computing on our daily lives. For now, the fullness of the possibilities of IoT, is yet a promise to be considered, nurtured, and shaped.
Continue Reading