👋 Hi!

I’m a software engineer specializing in server applications and system-level software development, but sometimes I venture into the front end world too. Quite often I find myself taking a deep dive into a topic that tickles my brain.

When I’m not coding I like spending time outdoors, such as cycling, climbing. We are writing this blog together with my partner Sanja.

You can find most of my work on GitHub.

Monitoring: Basics


Monitoring your application is critical. But how do you do it? What are the important things you need to watch out for?

Immutable Infrastructure?


Immutability is an important concept I talked about before. But how do we apply it to infrastructure?

Host everything yourself!


Often when a big service provider messes up, there is an inevitable slew of people who tout the advantages of self-hosting everything. But is it really efficient?

Fundamentals: The Address Resolution Protocol


How does a computer know what MAC address belongs to an IP? How does ARP work?

Security: What is Cross-Site Request Forgery?


Cross-Site Request Forgery is a pretty well known security vulnerability, yet many developers still fail to secure their applications. Let’s discuss this!

Security: What is Server Side Request Forgery?


Cross-site Request Forgery or CSRF is a well known security vulnerability. But what is SSRF?

Fundamentals: The Internet Protocol


How do you scale a network to global proportions? The answer is the Internet Protocol. Let’s dive into it.

What can we learn from Kubernetes' first major security hole?


Kubernetes first major security hole is out… does this mean Kubernetes is not secure? What can we learn from it?

Kubernetes is hard


Kubernetes won the container wars… allegedly. However, Kubernetes is still hard and causing a lot of grief.