<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Reardon Tech</title>
    <link>https://www.reardontech.uk/</link>
    <description>Recent content on Reardon Tech</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Fri, 05 Sep 2025 10:00:00 +0000</lastBuildDate>
    <atom:link href="https://www.reardontech.uk/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Understanding Idempotency</title>
      <link>https://www.reardontech.uk/posts/understanding-idempotency/</link>
      <pubDate>Sun, 24 Aug 2025 10:30:00 +0000</pubDate>
      <guid>https://www.reardontech.uk/posts/understanding-idempotency/</guid>
      <description>When communication between systems there is no guarantee that requests will only be send / received only once. Idempotency ensures that performing the same operation multiple times has the same effect as performing it once, preventing duplicate processing and data corruption. This is crucial for building reliable systems that can handle the inevitable failures and retries that occur in distributed environments.&#xA;What is Idempotency? Link to heading An operation is idempotent if performing it multiple times has the same effect as performing it once.</description>
    </item>
    <item>
      <title>The 8 Fallacies of Distributed Computing</title>
      <link>https://www.reardontech.uk/posts/the-8-fallacies-of-distributed-computing/</link>
      <pubDate>Fri, 22 Aug 2025 10:30:00 +0000</pubDate>
      <guid>https://www.reardontech.uk/posts/the-8-fallacies-of-distributed-computing/</guid>
      <description>In today&amp;rsquo;s cloud-native landscape, where systems are no longer monolithic and communicate across networks and continuously deployment practices ships new versions frequently, understanding the fundamental assumptions that can lead to system failures is more critical than ever. The 8 Fallacies of Distributed Computing, originally formulated by Peter Deutsch and others at Sun Microsystems, remain as relevant today as when they were first articulated—perhaps even more so.&#xA;Modern cloud architectures, with their dynamic scaling, rolling deployments, and multi-region setups, mean that each time you call a service, you might be talking to a completely different node running a different version of its system.</description>
    </item>
    <item>
      <title>Developing with the Azure Service Bus Emulator</title>
      <link>https://www.reardontech.uk/posts/asb-emulator/</link>
      <pubDate>Wed, 27 Nov 2024 10:00:00 +0000</pubDate>
      <guid>https://www.reardontech.uk/posts/asb-emulator/</guid>
      <description>For years, developers working with Azure Service Bus have longed for a local emulator to streamline development and testing. Relying on cloud-based instances for every iteration was costly, time-consuming, and often impractical. But as of November 19, 2024, Microsoft has answered those prayers with the official release of the Azure Service Bus Local Emulator!&#xA;Azure Service Bus Emulator is not a full replacement for Azure Service bus but is aimed at local development and testing never the less lets look into how to the features it offers and how to use it.</description>
    </item>
    <item>
      <title>How Do Computers Know Which Sites to Trust</title>
      <link>https://www.reardontech.uk/posts/tls-trusted-root-store/</link>
      <pubDate>Mon, 23 Sep 2024 10:00:00 +0100</pubDate>
      <guid>https://www.reardontech.uk/posts/tls-trusted-root-store/</guid>
      <description>We are all aware of the padlock in address bar of our web browser means that this site is secure, but have you ever wondered how the computer knows that it is secure? The answer lies in the intricate world of TLS (Transport Layer Security) trust. Let&amp;rsquo;s dive in and explore how this crucial process works.&#xA;How Transport Layer Security works Link to heading Before we delve deeper into trust, let&amp;rsquo;s briefly touch upon TLS itself.</description>
    </item>
    <item>
      <title>Cross-Site Request Forgery</title>
      <link>https://www.reardontech.uk/posts/csrf/</link>
      <pubDate>Fri, 13 Sep 2024 10:00:00 +0100</pubDate>
      <guid>https://www.reardontech.uk/posts/csrf/</guid>
      <description>Cross-Site Request Forgery (XSRF or CSRF), often pronounced as &amp;ldquo;Sea-Surf&amp;rdquo;, attacks are a serious threat to web applications. They exploit the trust a website has in a user&amp;rsquo;s browser, tricking the browser into sending unauthorised requests to the website. This can lead to data breaches, unauthorised actions on a user&amp;rsquo;s account, and other malicious activities.&#xA;The Attack Vector Link to heading A CSRF attack typically unfolds in the following way :</description>
    </item>
    <item>
      <title>Multi-Factor Just-in-Time Authentication</title>
      <link>https://www.reardontech.uk/posts/step-up-auth/</link>
      <pubDate>Tue, 03 Sep 2024 10:27:00 +0100</pubDate>
      <guid>https://www.reardontech.uk/posts/step-up-auth/</guid>
      <description>Step-Up JIT is an authentication mechanism that combines the security of MFA with the flexibility of contextual risk assessment. Instead of requiring MFA challenges for every authentication attempt, Step-Up JIT dynamically evaluates the risk associated with each access request based on various factors such as:&#xA;Resource and Action : Is the resource privileged such as updating passwords or transferring money? User identity : Who is attempting to access the resource? Device : What device is being used for access?</description>
    </item>
    <item>
      <title>A Tale of HTTP: From Humble Beginnings to Hyper-Speed</title>
      <link>https://www.reardontech.uk/posts/a-tale-of-http/</link>
      <pubDate>Thu, 22 Aug 2024 10:00:00 +0100</pubDate>
      <guid>https://www.reardontech.uk/posts/a-tale-of-http/</guid>
      <description>In the vast digital landscape of the internet, where billions of web pages, images, videos, and applications reside, a silent conductor orchestrates the seamless flow of information: the Hypertext Transfer Protocol, or HTTP. It&amp;rsquo;s the invisible language that allows your browser to communicate with web servers, fetching the content you request and delivering it to your screen.&#xA;As the web has evolved from simple text-based pages to complex, interactive experiences, HTTP has also undergone a series of transformations.</description>
    </item>
    <item>
      <title>Mutli-factor Authentication</title>
      <link>https://www.reardontech.uk/posts/mutli-factor-authentication/</link>
      <pubDate>Wed, 14 Aug 2024 10:30:00 +0100</pubDate>
      <guid>https://www.reardontech.uk/posts/mutli-factor-authentication/</guid>
      <description>Multi-factor authentication requires users to present multiple pieces of evidence, or factors, to verify their identity before accessing an account or system. This approach drastically reduces the risk of unauthorised access, even if one factor is compromised. The most common factors used in MFA fall into three categories:&#xA;Something you know : This typically involves a password, PIN, or security questions. Something you have : This can be a physical token, a smartphone, or a hardware security key.</description>
    </item>
    <item>
      <title>OAuth2 - Token Exchange</title>
      <link>https://www.reardontech.uk/posts/oauth2-token-exchange/</link>
      <pubDate>Sat, 29 Jun 2024 13:00:44 +0100</pubDate>
      <guid>https://www.reardontech.uk/posts/oauth2-token-exchange/</guid>
      <description>OAuth 2.0 is a widely adopted framework for authorisation in web applications and APIs. While it provides essential grant types for obtaining tokens, the Token Exchange flow (defined in RFC 8693) is a powerful extension that addresses complex scenarios involving multiple services and token types. This flow enables the exchange of one type of token for another, making it particularly useful for cross-domain single sign-on (SSO), delegated access, token transformation, and confidential client access.</description>
    </item>
    <item>
      <title>An introduction to OAuth 2.0</title>
      <link>https://www.reardontech.uk/posts/oauth2/</link>
      <pubDate>Wed, 12 Jun 2024 10:30:00 +0100</pubDate>
      <guid>https://www.reardontech.uk/posts/oauth2/</guid>
      <description>OAuth 2.0 is an authorisation framework that allows applications to securely access resources on behalf of a user without requiring the user to share their credentials directly with the application. It achieves this by obtaining limited access to a user&amp;rsquo;s account on a service (like Google, Facebook, etc.) and authorising third-party applications to act on that user&amp;rsquo;s behalf.&#xA;Key Roles in OAuth 2.0 Link to heading OAuth 2 is still a tri-party trust (trust between the Client, Server and Authority) below shows the 4 key roles.</description>
    </item>
    <item>
      <title>OAuth2 - Authorisation Code Flow with Proof Key for Code Exchange</title>
      <link>https://www.reardontech.uk/posts/oauth2-auth-code-pkce/</link>
      <pubDate>Wed, 12 Jun 2024 10:00:01 +0100</pubDate>
      <guid>https://www.reardontech.uk/posts/oauth2-auth-code-pkce/</guid>
      <description>OAuth 2.0 is the industry-standard protocol for authorisation, enabling applications to securely access user resources on behalf of the user. The Authorisation Code Flow is a popular OAuth 2.0 grant type used by web and mobile applications to obtain access tokens from authorisation servers. While secure in many scenarios, it can be vulnerable to certain attacks when used with &amp;ldquo;public&amp;rdquo; clients (applications that cannot securely store secrets). This is where Proof Key for Code Exchange (PKCE) comes into play.</description>
    </item>
    <item>
      <title>Security Basics - The 3 A&#39;s</title>
      <link>https://www.reardontech.uk/posts/security-basics/</link>
      <pubDate>Thu, 23 May 2024 10:30:00 +0100</pubDate>
      <guid>https://www.reardontech.uk/posts/security-basics/</guid>
      <description>In the ever-evolving landscape of cybersecurity, safeguarding sensitive information and systems is of paramount importance. A robust security framework must be in place to protect against unauthorised access and potential threats. The foundation of such a framework is built upon the three pillars known as the 3 A&amp;rsquo;s of security: Authentication, Authorisation, and Audit.&#xA;Authentication Link to heading Authentication (sometimes referred to as AuthN) is essentially the process of validating identity, or more to the point asking the question &amp;ldquo;Who am I&amp;rdquo;, this is the first step in accessing any resource.</description>
    </item>
    <item>
      <title>MS SQL OpenJSON</title>
      <link>https://www.reardontech.uk/posts/mssql-open-json/</link>
      <pubDate>Thu, 25 Apr 2024 10:30:00 +0000</pubDate>
      <guid>https://www.reardontech.uk/posts/mssql-open-json/</guid>
      <description>In our increasingly data-driven world, JSON (JavaScript Object Notation) has emerged as a versatile and lightweight format for exchanging information. While JSON offers flexibility, working with it within the structured realm of relational databases like SQL Server can be cumbersome. Microsoft SQL Server has supported the OPENJSON function since SQL Server 2016 (Compatibility Level 130) with the primary purpose of converting JSON text into tabular format making it easier to query and manipulate JSON data to integrate into your current queries.</description>
    </item>
    <item>
      <title>Entity Framework : Query types</title>
      <link>https://www.reardontech.uk/posts/ef-queries/</link>
      <pubDate>Thu, 18 Apr 2024 10:30:00 +0000</pubDate>
      <guid>https://www.reardontech.uk/posts/ef-queries/</guid>
      <description>Entity Framework Core (EF Core) streamlines database interactions, but its automatic translation of LINQ queries can sometimes lead to overly complex SQL. This becomes evident when you need to fetch data across multiple relationships, potentially resulting in performance problems. Split queries offer a way to optimize these situations.&#xA;For more information on EF Core click here&#xA;For more information on LINQ click here&#xA;Single Query Link to heading Single Query is the default type of query used with Entity Framework (EF), a Single query creates a query that returns a cartesian product which can, under the correct circumstances, create significant performance issues when loading and hydrating the entities in code.</description>
    </item>
    <item>
      <title>Hexagonal Architecture</title>
      <link>https://www.reardontech.uk/posts/hexagonal-architecture/</link>
      <pubDate>Thu, 11 Apr 2024 10:30:00 +0000</pubDate>
      <guid>https://www.reardontech.uk/posts/hexagonal-architecture/</guid>
      <description>In the ever-changing world of software development, crafting applications that are both maintainable and adaptable is a constant challenge. Hexagonal architecture, also known as &amp;lsquo;Ports and Adapters&amp;rsquo;, provides an elegant solution to this problem, emphasizing separation of concerns and testability.&#xA;Why use Hexagonal Architecture Link to heading The core idea behind hexagonal architecture is to isolate the business domain (the heart of the application) from the technical details of infrastructure, databases, user interfaces, and external services.</description>
    </item>
    <item>
      <title>Messaging Basics</title>
      <link>https://www.reardontech.uk/posts/messaging-basics/</link>
      <pubDate>Thu, 04 Apr 2024 10:30:00 +0000</pubDate>
      <guid>https://www.reardontech.uk/posts/messaging-basics/</guid>
      <description>In the realm of software development, the way applications communicate with each other is critical to achieving scalability, flexibility, and resilience. This is where messaging comes into play, acting as a powerful tool in a software architect&amp;rsquo;s toolkit. Let&amp;rsquo;s delve into messaging paradigms, patterns, and their value in modern software architectures.&#xA;Fundamentals Link to heading There are many reasons to choose Distributed systems or Microservices architectures, simplicity is not one of them, these architectures do however help to force some good design patterns such as loose coupling between bounded contexts, for more on bounded contexts please ready my Domain Driven Design Article.</description>
    </item>
    <item>
      <title>Verifying a JWT</title>
      <link>https://www.reardontech.uk/posts/jwt-verification/</link>
      <pubDate>Thu, 28 Mar 2024 10:30:01 +0000</pubDate>
      <guid>https://www.reardontech.uk/posts/jwt-verification/</guid>
      <description>JSON Web Tokens (JWTs) provide a secure and reliable method for user authentication in web applications. This article explores the structure, uses, and advantages of JWTs, along with an example of how to verify their signatures.&#xA;Structure of a JWT Link to heading A JWT is comprised of 3 base64 encoded sections separated by full stops:&#xA;The Header Contains information about the token type (i.e., JWT) and the signing algorithm used (such as HMAC SHA256 or RSA).</description>
    </item>
    <item>
      <title>Versioned Aggregates in Event-Driven Architecture: Maintaining Consistency and Integrity</title>
      <link>https://www.reardontech.uk/posts/eda-versioned-aggregates/</link>
      <pubDate>Fri, 22 Mar 2024 10:30:00 +0000</pubDate>
      <guid>https://www.reardontech.uk/posts/eda-versioned-aggregates/</guid>
      <description>In the realm of event-driven architecture (EDA), aggregates play a pivotal role. Aggregates are clusters of domain objects that are treated as a single unit for the purpose of state changes and data consistency. As an EDA system evolves, managing modifications to these aggregates while maintaining consistency is crucial. This is where the concept of versioned aggregates enters the picture. For more information on Aggregates See my What Is Domain Driven Design article.</description>
    </item>
    <item>
      <title>Azure Service Bus Sessions: Solving the Competing Consumers Problem for Ordered Parallel Processing</title>
      <link>https://www.reardontech.uk/posts/azure-service-bus-sessions/</link>
      <pubDate>Sun, 17 Mar 2024 10:30:00 +0000</pubDate>
      <guid>https://www.reardontech.uk/posts/azure-service-bus-sessions/</guid>
      <description>In the world of cloud messaging, where applications often exchange a continuous stream of data, ensuring the right order and correlation amongst messages can be critical. Azure Service Bus sessions provide a mechanism to achieve this.&#xA;Completing messages in order Link to heading In some scenarios, it is important to complete all messages in the order that they are sent such as&#xA;Financial Transactions : Actions like deposits, withdrawals, and transfers must occur in the precise order received to maintain account accuracy.</description>
    </item>
    <item>
      <title>What Is Domain Driven Design</title>
      <link>https://www.reardontech.uk/posts/what-is-domain-driven-design/</link>
      <pubDate>Fri, 08 Mar 2024 10:30:00 +0000</pubDate>
      <guid>https://www.reardontech.uk/posts/what-is-domain-driven-design/</guid>
      <description>Have you ever used software that seemed completely out of touch with how your work actually gets done? Confusing terminology, endless menus, features nobody needs&amp;hellip; these are signs of software that wasn&amp;rsquo;t designed with the real world in mind. Domain-Driven Design (DDD) offers a solution. It&amp;rsquo;s a powerful approach that aligns software with the way businesses truly operate. If you work at a company whose developers practice DDD you may have heard the terms &amp;lsquo;domain,&amp;rsquo; &amp;lsquo;bounded context,&amp;rsquo; and &amp;lsquo;aggregate&amp;rsquo; floating around, let&amp;rsquo;s dive into what they actually mean.</description>
    </item>
    <item>
      <title>Application configuration in .Net</title>
      <link>https://www.reardontech.uk/posts/configuration-in-dotnet/</link>
      <pubDate>Thu, 29 Feb 2024 10:30:00 +0000</pubDate>
      <guid>https://www.reardontech.uk/posts/configuration-in-dotnet/</guid>
      <description>Effective application configuration management is crucial for ensuring adaptability and maintainability. It empowers applications to seamlessly adapt to diverse environments, from development to production, and dynamically adjust settings like external service URLs.&#xA;Types of configuration Link to heading Configuration can be broken down in many different ways, I like to categories it in the following groups:&#xA;Environmental Configuration Link to heading This is configuration that will change between environments some good examples are</description>
    </item>
    <item>
      <title>Roles and Permissions</title>
      <link>https://www.reardontech.uk/posts/roles-and-permissions/</link>
      <pubDate>Thu, 22 Feb 2024 10:30:00 +0000</pubDate>
      <guid>https://www.reardontech.uk/posts/roles-and-permissions/</guid>
      <description>In the complex realm of application security, roles and permissions play a foundational role. While seemingly straightforward, their effective implementation can often be shrouded in confusion. This article aims to shed light on this critical duo, exploring common patterns surrounding user, roles, and permissions. Through practical insights and clear explanations, we&amp;rsquo;ll unveil the secrets of constructing a robust authorization model – a vital piece of the security puzzle safeguarding your applications.</description>
    </item>
    <item>
      <title>Using Azure Managed Identity to connect with SQL Server</title>
      <link>https://www.reardontech.uk/posts/sql-server-managed-identity/</link>
      <pubDate>Tue, 13 Feb 2024 10:30:00 +0000</pubDate>
      <guid>https://www.reardontech.uk/posts/sql-server-managed-identity/</guid>
      <description>In the realm of Azure integration, robust security is paramount. When it comes to accessing your Azure SQL Server, opting for Azure Identity or token-based authentication is the obvious choice over basic forms of authentication. This approach significantly enhances security and streamlines access management, offering numerous advantages over traditional methods.&#xA;For more information on Azure Managed Identity, please read this article Azure Managed Identities Introduction.&#xA;Obtaining a Token Link to heading The first step in connecting to SQL Server is to obtain a token.</description>
    </item>
    <item>
      <title>Outbox Pattern</title>
      <link>https://www.reardontech.uk/posts/outbox-pattern/</link>
      <pubDate>Tue, 06 Feb 2024 10:30:00 +0000</pubDate>
      <guid>https://www.reardontech.uk/posts/outbox-pattern/</guid>
      <description>The outbox pattern emerges as a powerful solution for ensuring reliable event delivery, guaranteeing events reach their destination even in the face of failures. This introductory tech article delves into the outbox pattern&amp;rsquo;s high-level structure, exploring how it empowers us to confidently update entities and trigger downstream actions with the peace of mind that events will be published, no matter what.&#xA;When a user makes a call to an API to update their address typically this will result in an update to the data store, in event driven systems there would also be an expectation of an event being sent so that all downstream consumers are notified of the change and can act accordingly.</description>
    </item>
    <item>
      <title>Securing Azure Pipelines with Azure Identities</title>
      <link>https://www.reardontech.uk/posts/securing-azure-pipelines-with-azure-identities/</link>
      <pubDate>Fri, 02 Feb 2024 08:30:04 +0000</pubDate>
      <guid>https://www.reardontech.uk/posts/securing-azure-pipelines-with-azure-identities/</guid>
      <description>In the era of DevOps, manual processes are relics of the past. Repetitive tasks are prime candidates for automation, freeing up development teams to focus on strategic innovation. Today, we no longer build and package applications locally for production—infrastructure concerns such as how database schemas and message queues are managed seamlessly through code. But how do we ensure secure access to these protected Azure resources while adhering to the principle of least privilege?</description>
    </item>
    <item>
      <title>An Introduction To Azure Managed Identities</title>
      <link>https://www.reardontech.uk/posts/azure-managed-identities-introduction/</link>
      <pubDate>Mon, 29 Jan 2024 10:30:00 +0000</pubDate>
      <guid>https://www.reardontech.uk/posts/azure-managed-identities-introduction/</guid>
      <description>Microsoft&amp;rsquo;s cloud ecosystem boasts a robust and multifaceted approach to service-to-service communication security. This intricate landscape, familiar to developers familiar with Azure AD (now evolved into Entra ID), reflects Microsoft&amp;rsquo;s long-standing commitment to robust identity and access management solutions. At the heart of this layered approach lies the fundamental principle of the Three A&amp;rsquo;s: Authentication, Authorization, and Audit. This article delves specifically into the realm of Authentication, focusing on Managed Service Identities as a cornerstone for establishing secure communication between Azure services.</description>
    </item>
    <item>
      <title>Array vs List CSharp</title>
      <link>https://www.reardontech.uk/posts/array-vs-list-csharp/</link>
      <pubDate>Thu, 25 Jan 2024 10:30:00 +0000</pubDate>
      <guid>https://www.reardontech.uk/posts/array-vs-list-csharp/</guid>
      <description>When traversing collections of data in C#, developers wield a diverse arsenal of tools. Among the most prominent stand Arrays and Lists, powerful contenders often vying for the same role. Yet, beneath their shared purpose lies a nuanced tapestry of advantages and drawbacks, beckoning careful evaluation before making the optimal choice.&#xA;Arrays Link to heading An Array is a built in type in c#, generally an array is the first way that an aspiring developer is introduced to collections.</description>
    </item>
    <item>
      <title>Azure free offerings</title>
      <link>https://www.reardontech.uk/posts/azure-free-services/</link>
      <pubDate>Fri, 19 Jan 2024 10:00:00 +0000</pubDate>
      <guid>https://www.reardontech.uk/posts/azure-free-services/</guid>
      <description>As a professional developer, I often face a dilemma when hosting personal projects: striking a balance between affordability and the robust features I&amp;rsquo;m accustomed to at work. Many free or basic hosting solutions feel outdated or lack the functionalities I rely on. Fortunately, Azure offers a compelling solution with its &amp;ldquo;Always Free&amp;rdquo; tier, providing access to powerful services without incurring any costs. This article focuses specifically on these perpetually free offerings, as 12-month free trials don&amp;rsquo;t align with my preference for projects without set deadlines.</description>
    </item>
    <item>
      <title>Scheduling Posts in Hugo</title>
      <link>https://www.reardontech.uk/posts/hugo-scheduled-posts/</link>
      <pubDate>Tue, 16 Jan 2024 11:45:00 +0000</pubDate>
      <guid>https://www.reardontech.uk/posts/hugo-scheduled-posts/</guid>
      <description>Most modern content management systems have features to control when an article is published and when the article should be removed. This functionality can be quite useful if content needs to be approved or finished ahead of time for an announcement or if the post would no longer be relevant after a certain date. Hugo is not a stranger to these features however, given that Hugo sites are static there is server as such to control when these posts are published or to remove them.</description>
    </item>
    <item>
      <title>Sending messages from Azure Data Factory to Azure Service Bus</title>
      <link>https://www.reardontech.uk/posts/adf-to-asb/</link>
      <pubDate>Sun, 14 Jan 2024 09:00:00 +0000</pubDate>
      <guid>https://www.reardontech.uk/posts/adf-to-asb/</guid>
      <description>While dealing with a requirement to interact with a feed of data from a legacy system I decided to look into how I could leverage the existing ETL workflows in Azure Data Factory (ADF). There is not curenty a connector in ADF for Azure Service Bus (ASB) however ASB does have a simple REST interface. This article is going to focus on sending single messages to a Queue or Topic.</description>
    </item>
    <item>
      <title>Hugo and server side compute on Azure Static Web Apps</title>
      <link>https://www.reardontech.uk/posts/intro-to-hugo-and-functions/</link>
      <pubDate>Sat, 13 Jan 2024 12:03:32 +0000</pubDate>
      <guid>https://www.reardontech.uk/posts/intro-to-hugo-and-functions/</guid>
      <description>This site was made to Play with Azure Static Websites and Hugo. I intend to Add some Azure Functions and see how much I can get out of the Technology&#xA;Azure Function Example Code : Link to heading Please Enter your Name : Submit Building the above Link to heading The form&amp;rsquo;s functionality is powered by a two-pronged architecture:&#xA;Client-side rendering: Utilizes Hugo Shortcode, a lightweight templating system, for efficient on-demand content generation, minimizing server load.</description>
    </item>
    <item>
      <title>About</title>
      <link>https://www.reardontech.uk/about/</link>
      <pubDate>Sat, 13 Jan 2024 00:00:00 +0000</pubDate>
      <guid>https://www.reardontech.uk/about/</guid>
      <description>During my 15+ years in enterprise technology, spanning Australia&amp;rsquo;s Judicial and London&amp;rsquo;s FinTech scene, I have woven a tapestry of expertise in: robust software architecture, scalable distributed systems, event driven architecture, security, and cloud infrastructure. Passion fuels my work; I contribute to open-source software and champion DevOps collaboration, believing shared responsibility unlocks the true potential of technology.&#xA;This collaborative spirit extends beyond just systems. As a mentor, I find immense satisfaction in nurturing new engineers, creating an environment where veterans impart wisdom while young minds bring fresh perspectives.</description>
    </item>
  </channel>
</rss>
