Home Blog

Stage Up: Creating Tech Employment Alternatives in Brazil and Past



 

 

This weblog was written by Luciana Depieri, Chief Individuals & Administrative Officer at Logicalis Latam.

 

 

 


My dwelling nation, Brazil, is a dynamic and vibrant nation. Nevertheless, not everybody has entry to the identical employment alternatives. Like Cisco, the corporate I work for, Logicalis, is dedicated to creating a greater world for the communities we serve, and we imagine within the worth of Cisco’s function to “Energy an Inclusive Future for All.”

That’s why, in 2023, Logicalis Latin America launched Stage Up. Stage Up is a program that mixes a technical curriculum with the event of soppy expertise, designed to assist contributors construct their information and allow them to compete for roles within the know-how sector. It’s remote-based and free, making it extra accessible to all.

As we developed this system, we needed to make use of best-in-class, modern technical content material. So, we leveraged our present partnership with Cisco and built-in the Cisco Networking Academy curriculum into our course content material. We imagine that this, coupled with transferable expertise coaching centered on collaboration, buyer expertise, challenge administration, and different areas, will help college students differentiate themselves from different candidates within the market.

The Mentorship Journey

Along with the coaching, every participant is accompanied by a Logicalis mentor. These Logicalis professionals volunteer their time to information contributors’ journeys by providing personalised follow-ups, encouragement, skilled recommendation, and confidence-building as contributors work towards their certifications and put together for careers within the tech discipline.

Mentorships are a novel facet of Stage Up, and I do know firsthand how rewarding these relationships could be. Throughout one of many cohorts, I used to be paired with a lady who was altering careers. As I shared insights from my profession, she shared her private experiences. Our exchanges helped me higher perceive the particular assist she wanted and broadened my perspective on how I would serve others by this system. Maytê Araújo, one of many course contributors, shared,

“Probably the most memorable elements of this system was the person mentoring. I used to be mentored by an expert from the corporate, who motivated me to persevere within the studying course of, along with offering worthwhile steering for creating new expertise and sharing her experiences. This was invaluable for my progress.”

Broadening Our Affect

Because the program’s inception, six cohorts have been accomplished, which included 441 registrants, 312 hours of coaching, and 18 profession webinars. We’re greater than enthusiastic about this system’s progress, with 40% of these registrants now licensed in Community Infrastructure and Data Safety. Moema Rocha, a participant from the primary cohort, shared,

“Stage Up was a turning level for me. It was a whole studying expertise, each technically and behaviorally, which permits me to enter the know-how discipline with extra confidence. I extremely suggest it to anybody who desires a superb and full course.”

We’re desirous to carry comparable studying alternatives to much more communities and are actively working to increase this system to different international locations in Latin America the place Logicalis operates.

Making a Pipeline of Expertise

Graduates usually are not assured a job at Logicalis upon finishing the course. Nevertheless, they’re inspired to use for open positions at Logicalis that align with their newly acquired expertise, and we’ve got employed a number of graduates into technical roles. Many others have additionally been employed at different organizations.

It’s thrilling to know that with the Cisco Networking Academy curriculum, and the dedication of our instructors, mentors, and college students, the Stage Up program is creating extra pathways to employment within the tech business, one pupil at a time.

If as a Cisco accomplice, you wish to collaborate with the Logicalis workforce to increase the Stage Up program to a broader viewers throughout Latin America, please contact Renata Oliveria or Liege Rodrigues.

 

When you have inspiring tales about how your group is creating a greater world for the communities you serve, we encourage you to share them.

 


We’d love to listen to what you assume. Ask a Query, Remark Under, and Keep Linked with #CiscoPartners on social!

Cisco Companions Fb  |  @CiscoPartners X/Twitter  |  Cisco Companions LinkedIn

Share:



A Sensible Information to Risk Modeling


When constructing a software-intensive system, a key half in making a safe and strong resolution is to develop a cyber risk mannequin. This can be a mannequin that expresses who is likely to be curious about attacking your system, what results they may wish to obtain, when and the place assaults may manifest, and the way attackers may go about accessing the system. Risk fashions are essential as a result of they information necessities, system design, and operational selections. Results can embody, for instance, compromise of confidential info, modification of knowledge contained within the system, and disruption of operations. There are numerous functions for attaining these sorts of results, starting from espionage to ransomware.

This weblog put up focuses on a way risk modelers can use to make credible claims about assaults the system may face and to floor these claims in observations of adversary ways, methods, and procedures (TTPs).

Brainstorming, subject material experience, and operational expertise can go a good distance in growing a listing of related risk eventualities. Throughout preliminary risk state of affairs technology for a hypothetical software program system, it could be potential to think about, What if attackers steal account credentials and masks their motion by placing false or unhealthy information into the person monitoring system? The more durable job—the place the attitude of risk modelers is crucial—substantiates that state of affairs with identified patterns of assaults and even particular TTPs. These could possibly be knowledgeable by potential risk intentions based mostly on the operational function of the system.

Creating sensible and related mitigation methods for the recognized TTPs is a crucial contributor to system necessities formulation, which is likely one of the targets of risk modeling.

This SEI weblog put up outlines a way for substantiating risk eventualities and mitigations by linking to industry-recognized assault patterns powered by model-based programs engineering (MBSE).

In his memo Directing Trendy Software program Acquisition to Maximize Lethality, Secretary of Protection Pete Hegseth wrote, “Software program is on the core of each weapon and supporting system we discipline to stay the strongest, most deadly preventing power on the earth.” Whereas understanding cyber threats to those advanced software program intensive programs is essential, figuring out threats and mitigations to them early within the design of a system helps scale back the associated fee to repair them. In response to Government Order (EO) 14028, Enhancing the Nation’s Cybersecurity, the Nationwide Institute of Requirements and Expertise (NIST) advisable 11 practices for software program verification. Risk modeling is on the high of the checklist.

Risk Modeling Targets: 4 Key Questions

Risk modeling guides the necessities specification and early design selections to make a system strong in opposition to assaults and weaknesses. Risk modeling will help software program builders and cybersecurity professionals know what varieties of defenses, mitigation methods, and controls to place in place.

Risk modelers can body the method of risk modeling round solutions to 4 key questions (tailored from Adam Shostack):

  1. What are we constructing?
  2. What can go improper?
  3. What ought to we do about these wrongs?
  4. Was the evaluation enough?

What are we constructing? The muse of risk modeling is the mannequin of the system centered on its potential interactions with threats. A mannequin is a graphical, mathematical, logical, or bodily illustration that abstracts actuality to handle a selected set of considerations whereas omitting particulars not related to the considerations of the mannequin builder. There are numerous methodologies that present steering on tips on how to assemble risk fashions for various kinds of programs and use circumstances. For already constructed programs the place the design and implementation are identified and the place the principal considerations relate to faults and errors (relatively than acts by intentioned adversaries), methods akin to fault tree evaluation could also be extra acceptable. These methods usually assume that desired and undesired states are identified and could be characterised. Equally, kill chain evaluation could be useful to grasp the complete end-to-end execution of a cyber assault.

Nevertheless, present high-level programs engineering fashions might not be acceptable to determine particular vulnerabilities used to conduct an assault. These programs engineering fashions can create helpful context, however extra modeling is critical to handle threats.

On this put up I take advantage of the Unified Structure Framework (UAF) to information our modeling of the system. For bigger programs using MBSE, the risk mannequin can construct on DoDAF, UAF, or different architectural framework fashions. The widespread thread with all of those fashions is that risk modeling is enabled by fashions of knowledge interactions and flows amongst elements. A standard mannequin additionally provides advantages in coordination throughout massive groups. When a number of teams are engaged on and deriving worth from a unified mannequin, the up-front prices could be extra manageable.

There are numerous notations for modeling information flows or interactions. We discover on this weblog using an MBSE software paired with a regular architectural framework to create fashions with advantages past less complicated diagramming software or drawings. For present programs with out a mannequin, it’s nonetheless potential to make use of MBSE. This may be performed incrementally. For example, if new options are being added to an present system, it might be essential to mannequin simply sufficient of the system interacting with the brand new info flows or information shops and create risk fashions for this subset of latest components.

What Can Go Incorrect?

Risk modeling is much like programs modeling in that there are numerous frameworks, instruments, and methodologies to assist information growth of the mannequin and determine potential drawback areas. STRIDE is risk identification taxonomy that may be a helpful a part of fashionable risk modeling strategies, having initially been developed at Microsoft in 1999. Earlier work by the SEI has been carried out to increase UAF with a profile that permits us to mannequin the outcomes of the risk identification step that makes use of STRIDE. We proceed that strategy on this weblog put up.

STRIDE itself is an acronym standing for spoofing, tampering, repudiation, info disclosure, denial of service, and elevation of privilege. This mnemonic helps modelers to categorize the impacts of threats on completely different information shops and information flows. Earlier work by Scandariato et al., of their paper A descriptive research of Microsoft’s risk modeling method has additionally proven that STRIDE is adaptable to a number of ranges of abstraction. This paper reveals that a number of groups modeling the identical system did so with various measurement and composition of the info circulation diagrams used. When engaged on new programs or a high-level structure, a risk modeler might not have all the main points wanted to make the most of some extra in-depth risk modeling approaches. This can be a advantage of the STRIDE strategy.

Along with the taxonomic structuring supplied by STRIDE, having a regular format for capturing the risk eventualities permits simpler evaluation. This format brings collectively the weather from the programs mannequin, the place we have now recognized property and knowledge flows, the STRIDE technique for figuring out risk sorts, and the identification of potential classes of risk actors who might need intent and means to create conequences. Risk actors can vary from insider threats to nation-state actors and superior persistent threats. The next template reveals every of those components on this customary format and accommodates the entire important particulars of a risk state of affairs.

An [ACTOR] performs an [ACTION] to [ATTACK] an [ASSET] to realize an [EFFECT] and/or [OBJECTIVE].

ACTOR | The individual or group that’s behind the risk state of affairs

ACTION | A possible incidence of an occasion that may injury an asset or purpose of a strategic imaginative and prescient

ATTACK | An motion taken that makes use of a number of vulnerabilities to understand a risk to compromise or injury an asset or circumvent a strategic purpose

ASSET | A useful resource, individual, or course of that has worth

EFFECT | The specified or undesired consequence

OBJECTIVE | The risk actor’s motivation or goal for conducting the assault

With formatted risk eventualities in hand, we are able to begin to combine the weather of the eventualities into our system mannequin. On this mannequin, the risk actor components describe the actors concerned in a risk state of affairs, and the risk aspect describes the risk state of affairs, goal, and impact. From these two components, we are able to, throughout the mannequin, create relations to the precise components affected or in any other case associated to the risk state of affairs. Determine 1 reveals how the completely different risk modeling items work together with parts of the UAF framework.

figure1_05152025

Determine 1: Risk Modeling Profile

For the diagram components highlighted in purple, our group has prolonged the usual UAF with new components (<>, <>, <> and <> blocks) in addition to new relationships between them (<>, <> and <>). These additions seize the consequences of a risk state of affairs in our mannequin. Capturing these eventualities helps reply the query, What can go improper?

Right here I present an instance of tips on how to apply this profile. First, we have to outline a part of a system we wish to construct and a number of the elements and their interactions. If we’re constructing a software program system that requires a monitoring and logging functionality, there could possibly be a risk of disruption of that monitoring and logging service. An instance risk state of affairs written within the model of our template could be, A risk actor spoofs a reliable account (person or service) and injects falsified information into the monitoring system to disrupt operations, create a diversion, or masks the assault. This can be a good begin. Subsequent, we are able to incorporate the weather from this state of affairs into the mannequin. Represented in a safety taxonomy diagram, this risk state of affairs would resemble Determine 2 under.

figure2_05152025

Determine 2: Disrupted Monitoring Risk Situation

What’s essential to notice right here is that the risk state of affairs a risk modeler creates drives mitigation methods that place necessities on the system to implement these mitigations. That is, once more, the purpose of risk modeling. Nevertheless, these mitigation methods and necessities in the end constrain the system design and will impose extra prices. A major profit to figuring out threats early in system growth is a discount in price; nonetheless, the true price of mitigating a risk state of affairs won’t ever be zero. There may be at all times some trade-off. Given this price of mitigating threats, it’s vitally essential that risk eventualities be grounded in reality. Ideally, noticed TTPs ought to drive the risk eventualities and mitigation methods.

Introduction to CAPEC

MITRE’s Frequent Assault Sample Enumerations and Classifications (CAPEC) challenge goals to create simply such a listing of assault patterns. These assault patterns at various ranges of abstraction enable a straightforward mapping from risk eventualities for a particular system to identified assault patterns that exploit identified weaknesses. For every of the entries within the CAPEC checklist, we are able to create <> components from the prolonged UAF viewpoint proven in Determine 1. This gives many advantages that embody refining the eventualities initially generated, serving to decompose high-level eventualities, and, most crucially, creating the tie to identified assaults.

Within the Determine 2 instance state of affairs, a minimum of three completely different entries may apply to the state of affairs as written. CAPEC-6: Argument Injection, CAPEC-594: Visitors Injection, and CAPEC-194: Faux the Supply of Knowledge. This relationship is proven in Determine 3.

figure3_05152025

Determine 3: Risk Situation to Assault Mapping

<> blocks present how a state of affairs could be realized. By tracing the <> block to <> blocks, a risk modeler can present some degree of assurance that there are actual patterns of assault that could possibly be used to realize the target or impact specified by the state of affairs. Utilizing STRIDE as a foundation for forming the risk eventualities helps to map to those CAPEC entries in following means. CAPEC could be organized by mechanisms of assault (akin to “Have interaction in misleading interactions”) or by Domains of assault (akin to “{hardware}” or “provide chain”). The previous technique of group aids the risk modeler within the preliminary seek for discovering the proper entries to map the threats to, based mostly on the STRIDE categorization. This isn’t a one-to-one mapping as there are semantic variations; nonetheless, basically the next desk reveals the STRIDE risk kind and the mechanism of assault that’s prone to correspond.

STRIDE risk kind

CAPEC Mechanism of Assault

Spoofing

Have interaction in Misleading Interactions

Tampering

Manipulate Knowledge Buildings, Manipulate System Sources

Repudiation

Inject Sudden Gadgets

Info Disclosure

Gather and Analyze Info

Denial of Service

Abuse Present Performance

Elevation of Privilege

Subvert Entry Management

As beforehand famous, this isn’t a one-to-one mapping. For example, the “Make use of probabilistic methods” and “Manipulate timing and state” mechanisms of assault usually are not represented right here. Moreover, there are STRIDE assault sorts that span a number of mechanisms of assault. This isn’t stunning provided that CAPEC is just not oriented round STRIDE.

Figuring out Risk Modeling Mitigation Methods and the Significance of Abstraction Ranges

As proven in Determine 2, having recognized the affected property, info flows, processes and assaults, the subsequent step in risk modeling is to determine mitigation methods. We additionally present how the unique risk state of affairs was in a position to be mapped to completely different assaults at completely different ranges of abstraction and why standardizing on a single abstraction degree gives advantages.

When coping with particular points, it’s straightforward to be particular in making use of mitigations. One other instance is a laptop computer operating macOS 15. The Apple macOS 15 STIG Handbook states that, “The macOS system should restrict SSHD to FIPS-compliant connections.” Moreover, the handbook says, “Working programs utilizing encryption should use FIPS-validated mechanisms for authenticating to cryptographic modules.” The handbook then particulars check procedures to confirm this for a system and what actual instructions to run to repair the problem if it isn’t true. This can be a very particular instance of a system that’s already constructed and deployed. The extent of abstraction may be very low, and all information flows and information shops all the way down to the bit degree are outlined for SSHD on macOS 15. Risk modelers would not have that degree of element at early levels of the system growth lifecycle.

Particular points additionally usually are not at all times identified even with an in depth design. Some software program programs are small and simply replaceable or upgradable. In different contexts, akin to in main protection programs or satellite tv for pc programs, the flexibility to replace, improve, or change the implementation is restricted or troublesome. That is the place engaged on the next abstraction degree and specializing in design components and knowledge flows can get rid of broader lessons of threats than could be eradicated by working with extra detailed patches or configurations.

To return to the instance proven in Determine 2, on the present degree of system definition it’s identified that there might be a monitoring resolution to combination, retailer, and report on collected monitoring and suggestions info. Nevertheless, will this resolution be a business providing, a home-grown resolution, or a mixture? What particular applied sciences might be used? At this level within the system design, these particulars usually are not identified. Nevertheless, that doesn’t imply that the risk can’t be modeled at a excessive degree of abstraction to assist inform necessities for the eventual monitoring resolution.

CAPEC consists of three completely different ranges of abstraction concerning assault patterns: Meta, Normal, and Detailed. Meta assault patterns are excessive degree and don’t embody particular expertise. This degree is an effective match for our instance. Normal assault patterns do name out some particular applied sciences and methods. Detailed assault patterns give the complete view of how a particular expertise is attacked with a particular method. This degree of assault sample could be extra widespread in a resolution structure.

To determine mitigation methods, we should first guarantee our eventualities are normalized to some degree of abstraction. The instance state of affairs from above has points on this regard. First the state of affairs is compound in that the risk actor has three completely different targets (i.e., disrupt operations, create a diversion, and masks the assault). When trying to hint mitigation methods or necessities to this state of affairs, it might be troublesome to see the clear linkage. The kind of account might also influence the mitigations. It could be a requirement that a regular person account not be capable to entry log information whereas a service account could also be permitted to have such entry to do upkeep duties. These complexities brought on by the compound state of affairs are additionally illustrated by the tracing of the state of affairs to a number of CAPEC entries. These assaults characterize distinctive units of weaknesses, and all require completely different mitigation methods.

To decompose the state of affairs, we are able to first cut up out the various kinds of accounts after which cut up on the completely different targets. A full decomposition of those elements is proven in Determine 4.

figure4_05152025

Determine 4: Risk Situation Decomposition

This decomposition considers that completely different targets usually are achieved by means of completely different means. If a risk actor merely needs to create a diversion, the weak spot could be loud and ideally set off alarms or points that the system’s operators should take care of. If as an alternative the target is to masks an assault, then the attacker might should deploy quieter ways when injecting information.

Determine 4 is just not the one strategy to decompose the eventualities. The unique state of affairs could also be cut up into two based mostly on the spoofing assault and the info injection assault (the latter falling into the tampering class below STRIDE). Within the first state of affairs, a risk actor spoofs a reliable account (CAPEC-194: Faux the Supply of Knowledge) to maneuver laterally by means of the community. Within the second state of affairs, a risk actor performs an argument injection (CAPEC-6: Argument Injection) into the monitoring system to disrupt operations.

Given the breakdown of our unique state of affairs into the rather more scope-limited sub-scenarios, we are able to now simplify the mapping by mapping these to a minimum of one standard-level assault sample that provides extra element to engineers to engineer in mitigations for the threats.

Now that we have now the risk state of affairs damaged down into extra particular eventualities with a single goal, we could be extra particular with our mapping of assaults to risk eventualities and mitigation methods.

As famous beforehand, mitigation methods, at a minimal, constrain design and, in most circumstances, can drive prices. Consequently, mitigations must be focused to the precise elements that may face a given risk. Because of this decomposing risk eventualities is essential. With an actual mapping between risk eventualities and confirmed assault patterns, one can both extract mitigation methods instantly from the assault sample entries or give attention to producing one’s personal mitigation methods for a minimally full set of patterns.

Argument injection is a superb instance of an assault sample in CAPEC that features potential mitigations. This assault sample contains two design mitigations and one implementation-specific mitigation. When risk modeling on a excessive degree of abstraction, the design-focused mitigations will usually be extra related to designers and designers.

figure5_05152025

Determine 5: Mitigations Mapped to a Risk.

Determine 5 reveals how the 2 design mitigations hint to the risk that’s realized by an assault. On this case the assault sample we’re mapping to had mitigations linked and laid out plainly. Nevertheless, this doesn’t imply mitigation methods are restricted to what’s within the database. A very good system engineer will tailor the utilized mitigations for a particular system, setting, and risk actors. It must be famous in the identical vein that assault components needn’t come from CAPEC. We use CAPEC as a result of it’s a customary; nonetheless, if there may be an assault not captured or not captured on the proper degree of element, one can create one’s personal assault components within the mannequin.

Bringing Credibility to Risk Modeling

The overarching purpose of risk modeling is to assist defend a system from assault. To that finish, the actual product {that a} risk mannequin ought to produce is mitigation methods for threats to the system components, actions, and knowledge flows. Leveraging a combination of MBSE, UAF, the STRIDE methodology, and CAPEC can accomplish this purpose. Whether or not working on a high-level summary structure or with a extra detailed system design, this technique is versatile to accommodate the quantity of knowledge readily available and to permit risk modeling and mitigation to happen as early within the system design lifecycle as potential. Moreover, by counting on an industry-standard set of assault patterns, this technique brings credibility to the risk modeling course of. That is achieved by means of the traceability from an asset to the risk state of affairs and the real-world noticed patterns utilized by adversaries to hold out the assault.

New England Patriots kick off community improve



The longer-term roadmap with NWN features a refresh of the stadium’s 1,800 Excessive Networks Wi-Fi 6 entry factors to both Wi-Fi 6E or 7, a refresh of the community’s 80 Cisco bodily and digital firewalls, adopted by a community consolidation challenge.

On high of all that, the Kraft Group is looking for regulatory approval to construct a brand new stadium for the New England Revolution soccer workforce in Everett, Mass., which is simply north of Boston. If that challenge goes ahead, Israel will likely be working two sports activities amenities which might be 25 miles aside.

Demand for bandwidth is on the rise

Whereas the seating capability of the stadium is fastened at roughly 65,000, the demand for community capability is consistently growing. On the client facet, Israel identified that youthful followers are participating with social media throughout occasions, posting images and movies, placing extra pressure on the Wi-Fi.

At a current Taylor Swift live performance, there have been 10,000 individuals within the car parking zone who didn’t have tickets however have been there for a Tik-Tok problem, which put an extra and unanticipated burden on the community, he mentioned. Israel mentioned expects the World Cup matches will draw comparable ranges of fan engagement, and he’s working to beef up wi-fi connectivity in fan zones outdoors of the stadium.

On the enterprise facet, the underlying Cisco community wants to have the ability to deal with all the new bandwidth-hungry purposes, from facial recognition expertise at entry factors, digital pockets transactions at concession stands, wi-fi point-of-sale techniques that require split-second transaction processing, IPTV, plus an AI-driven video system that may detect if a concession stand is operating low on stock, enabling a fast restocking.

The improved fan expertise:

Listed here are among the key options that followers will have the ability to take pleasure in:

Stopping Malicious Cellular Apps from Taking Over iOS by means of App Vetting


Introduction

Cellular gadgets, significantly these operating iOS, are broadly assumed to have strong safety and privateness options. Nevertheless, no working system is foolproof, and probably the most vital vulnerabilities arises not from the system itself however from the apps customers set up. Most organizations fail to acknowledge that the non-work associated apps on company gadgets could inadvertently open the door to attackers to steal delicate information, together with company credentials.

Kodeco Podcast: Mastering Multiplatform: Flutter vs KMP – Podcast V2, S3 E5


Should you’ve ever puzzled how to decide on between Flutter and Kotlin Multiplatform—or what it’s like to make use of each in real-world manufacturing apps—this particular double-length episode is your definitive information. Google Developer Consultants Roman Jaquez and Kevin Moore be a part of us to unpack the realities of cross-platform cell improvement. From cutting-edge healthcare apps to Bluetooth integrations and developer finest practices, Roman and Kevin share deep insights, trustworthy comparisons, and suggestions for mastering multi-platform dev in 2025.

[Subscribe in Apple Podcasts] [Listen in Spotify] [RSS Feed]

Concerned about sponsoring a podcast episode? Take a look at our Promote With Kodeco web page to learn how!

Present Notes

Be a part of Jenn and Dru for a deep dive into the world of cross-platform improvement with two knowledgeable friends: Roman Jaquez and Kevin Moore. From structure to animations, this episode explores the strengths, trade-offs, and way forward for Flutter and Kotlin Multiplatform (KMP). The dialog additionally covers sensible recommendation for testing, efficiency, state administration, and methods to future-proof your abilities as a cell developer.

Highlights from this episode:

  • How Flutter and Kotlin Multiplatform (KMP) examine in real-world app improvement—together with the place every shines.
  • Roman’s journey bringing Flutter into a big healthcare group and the productiveness positive factors that adopted.
  • Kevin’s expertise constructing cross-platform apps with Flutter and integrating native Bluetooth code by way of plugins.
  • Finest practices for managing app structure, UI consistency, and platform-specific code in Flutter and KMP.
  • State administration choices like Supplier, Riverpod, and Bloc—when to make use of them and what to be careful for.
  • Instruments and strategies for efficiency optimization, testing, and debugging throughout platforms.
  • Roman and Kevin’s ideas on the way forward for cell improvement—from scorching reload to AI-driven coding instruments.

Talked about in This Episode

Contact Kevin, Roman & the Hosts

Observe Kodeco

The place to Go From Right here?

We hope you loved this episode of our podcast. Make sure you subscribe in Apple Podcasts or Spotify to get notified when the following episode comes out.

Hoping to study extra a couple of explicit side of cell improvement or life and work as a dev? Please write in and inform us and we’ll do our greatest to make that occur! Write in too when you your self want to be a visitor or your have a specific visitor request and we’ll see what we will do. Drop a remark right here, or e mail us anytime at podcast@teamkodeco.com.