Hi. My name is Tamas.

I'm a software engineer.

Who I Am

Dynamic and innovative IT professional, specialising in Agile and Scrum methodology, Scala, Java development and software testing across various sectors, including finance, international media and sports betting. Passionate about continually learning and growing in the industry, utilising new technologies and methodologies to identify and implement effective change for clients, following projects through the entire lifecycle from inception to successful completion. Able to find creative solutions to complex problems, drawing on 9 years of commercial experience and 2 years in research and development to develop solid skills in communication, prioritisation and attention to detail. Currently pursuing an extracurricular passion for agile startup development, developing additional knowledge and skills.

What I Do

Architect systems, design solutions, implement ideas.

Code review, code cleanups.

Security review, penetration testing.

Contact

I'd be happy to discuss your software development needs, please don't hesitate to contact me.

Here is my PGP key.

Blog posts

Hack: How to Use Scala Futures with Cats IO

It’s a common scenario to use plain Scala Futures with IO monads, such as Cats Effect’s IO, mainly as part of integrating “legacy” libraries with pure functional programming libraries. This article demonstrates a common trap you might fall into during the integration process.

How to Store Data with a Few Million Akka Actors

Using dictionary like data structures is very common in software engineering; storing indexed data, accessing stateful entities by id and so on. There are many ways and technologies to implement this; in this article I’m demonstrating a few ways how Akka actors can be used to store and access indexed data or entities.

Hack: How to Use SecureRandom with Kubernetes and Docker

Cryptographically secure pseudo-random number generator depends on good entropy; however from Docker containers we don’t always get this. This can cause the random generation be to block the execution of the application.

How to Hack a Weak JWT Implementation with a Timing Attack

A timing attack is usually an overlooked threat. Is it just a fluke or can it really be pulled off on a real web server?