Behavior Is the New Credential. And That’s a Problem.
Cybersecurity is undergoing a transition that deserves more attention than it gets: online authentication is shifting from what you know to how you behave.
Cybersecurity is undergoing a transition that deserves more attention than it gets: online authentication is shifting from what you know to how you behave.
It’s tempting to dismiss it as a legal team slip-up. It isn’t. Terms of Use aren’t written by accident—and every word is meant for court.
A few weeks ago I received an advisory report on IT services in our segment. It was solid, but it missed what only delivery-side vendors learn.
Nobody knows what they’re doing—not as a cliché, but as a structural fact: our technical systems are now too complex for any single person to understand.
And the people who build it for a living are the last to admit it.
A manifesto for people who build tech and are also parents: on engagement, attention extraction, and a simple rule—build as if your child were the user.
When people shout that the state is "holding back progress," are they really talking about progress: or something else entirely?
Three roles, three lenses on the IT market: corporate, startup, and a client portfolio. A non-linear path that clarifies what really matters in sourcing.
The structural blind spot of the IT services advisory market—and why closing it is urgent, before sourcing decisions keep going wrong at scale.
OpenAI buys Astral, Anthropic bought Bun. The quiet colonization of the development stack has already begun, and it's not about open source.