People

232 deg Celcius: THE TEMPERATURE WE ROAST AT TO CREATE THE UNIQUE FLAVOUR, AROMA AND COLOUR OF Guinness

A pint with Jimothy: on fear, ego, and hiring smarter

☕️ We started with coffee, like most chats do. Black for me, cappuccino for Jimothy (he actually prefers Jim, or James). Corner terrace, Singelgracht. One of those confusing Amsterdam afternoons where the sky can’t decide − sunlight breaks through the clouds, then ducks back behind them. Just long enough to let a few leaves blow […]

Read More
Bright lamps on a wall in a brown pub

When Slack starts to feel like a DDoS attack

In software engineering, we often rely on “exponential back-off” when retrying failed network requests − a technique where each subsequent attempt is spaced out further in time to avoid overloading the system. Oddly enough, I’ve found myself applying a similar concept to human communication. As a Engineering lead, I’m frequently on the receiving end of […]

Read More
Blog draft and a keyboard in front

AI for Engineering managers: adapt now or trail behind

Remember when a five‑digit Stack Overflow score was a flex? Today that, and a vintage 2022 playbook will buy you precisely zero leverage. Yesterday’s job, tomorrow’s irrelevance Many Engineering managers still run on three rituals: However, none of those moves the product faster. Meanwhile, AI agents are quietly doing code reviews, generating boilerplate, even writing RFCs. The org chart hasn’t […]

Read More
a previous post, I looked at managing time effectively as an Engineering manager, drawing from Aviv Ben-Yosef’s insightful book, The Tech Executive Operating System. Today, let’s explore another valuable lesson from this book: how to recognize and handle impostor syndrome in the moments when it affects us most.

Impostor syndrome: kicking self-doubt to the curb

In a previous post, I looked at managing time effectively as an Engineering manager, drawing from Aviv Ben-Yosef’s insightful book, The Tech Executive Operating System. Today, let’s explore another valuable lesson from this book: how to recognize and handle impostor syndrome in the moments when it affects us most. We’re all familiar with IS − the […]

Read More
Belt with tasks falling off of it

Too many tabs open? Why real multitasking is hard

I recently attempted to write a blog post exploring how our human memory is limited and how easily things slip between the cracks when life gets overwhelming. The original draft was around 2,300 words – painstakingly researched, peppered with references to scientific studies, and teetering into “academic essay” territory. It ended up so dense and […]

Read More

Before you lead: honest questions for aspiring managers

So you’ve spent years honing your craft as an individual contributor (IC), and now you’re considering a transition to a leadership position. The appeal is obvious: greater influence, more responsibility, and a unique chance to shape your organization’s trajectory. However, stepping into a lead role comes with challenges that aren’t always highlighted in the job […]

Read More

Managing time as an Engineering manager

Every Engineering manager knows the feeling: you wake up already juggling a thousand thoughts, your calendar is a battlefield, and Slack notifications seem endless. It’s a chaotic yet rewarding role, one where the pressure to deliver is only rivaled by the satisfaction of seeing your team succeed. In 2024, my days as an Engineering manager […]

Read More
Amsterdam by night | Security awareness program

Getting it right: security awareness program on a budget

Introducing a Security Awareness program is becoming increasingly important for organizations as the cybersecurity landscape changes rapidly. This undertaking becomes even more challenging if the security team is new to the organization and operates on a limited budget. In this blog post, I share my experience implementing a security awareness program enriched by extensive research […]

Read More
Bench

Is my business secure? First look at the SAMM framework

Security is becoming more important for businesses operating in an increasingly complex landscape of cyber threats and data breaches. Small businesses often don’t have the advanced security measures and resources that larger enterprises possess, making them particularly vulnerable targets for cyberattacks.  A breach can result in significant financial losses, reputational damage, and legal liabilities, which […]

Read More