You need a separate IoT network

No it is not to isolate malicious devices?? It is because you have lots of “old” device that does not handle and will not connect to your main WiFi network. You need a 2.4 Ghz network (this include Raspbery Pi Zero)

November 21, 2025 · Arve Svendsen

Where Should You Run Your Web Application? It Depends.

Exploring deployment options for a web app with a focus on cost, speed, and learning.

November 11, 2025 · Arve Svendsen

My Experience with AI Coding Assistants

I use GitHub Copilot (Pro) and Google Gemini CLI1. Do coding assistants help me develop faster, improve code, or cause other effects? Disclaimer: The way we use AI assisted development will continue to evolve and these are my thoughts and experiences with coding assistants as of November 2025. I expect to look back on this post and feel embarrassed - but that’s part of the journey. I use AI coding assistants in different ways, each with its own impact. ...

November 5, 2025 · Arve Svendsen

SSH Keys Management

This is how I manage my SSH private keys. I think this is a good balance between security and usability, but this setup is for me. Your situation may be different so read this as potential inspiration, not as a blueprint. I have a “master” key that gives access to all the clouds, linux machines and Git/GitHub. This gives lots of access so it must be protected. But I also use it often, so it must be easy to use. The way I solve this is using 1Password. It allows the keys to be used on multiple devices while keeping them secure through biometric authentication. ...

November 3, 2025 · Arve Svendsen

Authenticode Signing

A long time ago my employer needed to sign a shrink-wrapped software package using Authenticode. This was my first experience with code signing. Below I summarize what code signing is, why it matters, the 2023 HSM requirements, and practical options for signing in local and CI environments. I have used Azure Key Vault for HSM-backed signing. What is code signing and why use it? A digital signature is an encrypted checksum of a file. It can be verified with the public key to ensure the file was not modified after signing and that the signer controls the corresponding private key. ...

November 28, 2023 · Arve Svendsen