<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Jessica Arnwine</title>
    <description>The latest articles on Forem by Jessica Arnwine (@jessica_arnwine_cfg).</description>
    <link>https://forem.com/jessica_arnwine_cfg</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3455362%2Fff553482-8768-449c-872b-7704990797d8.png</url>
      <title>Forem: Jessica Arnwine</title>
      <link>https://forem.com/jessica_arnwine_cfg</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/jessica_arnwine_cfg"/>
    <language>en</language>
    <item>
      <title>The Accounting Equation Explained — The Foundation of All Financial Literacy</title>
      <dc:creator>Jessica Arnwine</dc:creator>
      <pubDate>Wed, 29 Apr 2026 23:01:59 +0000</pubDate>
      <link>https://forem.com/jessica_arnwine_cfg/the-accounting-equation-explained-the-foundation-of-all-financial-literacy-4hb2</link>
      <guid>https://forem.com/jessica_arnwine_cfg/the-accounting-equation-explained-the-foundation-of-all-financial-literacy-4hb2</guid>
      <description>&lt;h1&gt;
  
  
  The Accounting Equation — The Foundation of All Financial Literacy
&lt;/h1&gt;

&lt;p&gt;By Jessica Arnwine, CAER Financial Group | caergroup.com&lt;/p&gt;

&lt;h2&gt;
  
  
  The Single Equation That Governs All of Finance
&lt;/h2&gt;

&lt;p&gt;Assets = Liabilities + Owner's Equity&lt;/p&gt;

&lt;p&gt;Every transaction that has ever occurred in any business — from a corner store to Apple — can be expressed within this equation. It always balances. This is the principle of double-entry bookkeeping, codified by Luca Pacioli in 1494.&lt;/p&gt;

&lt;h2&gt;
  
  
  Debit/Credit System Logic
&lt;/h2&gt;

&lt;p&gt;The accounting system uses a two-column ledger for every account. Left = Debit, Right = Credit.&lt;/p&gt;

&lt;p&gt;The confusion: a "debit" is not inherently positive or negative. Its effect depends on account type:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Account Type&lt;/th&gt;
&lt;th&gt;Normal Balance&lt;/th&gt;
&lt;th&gt;Debit&lt;/th&gt;
&lt;th&gt;Credit&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Assets&lt;/td&gt;
&lt;td&gt;Debit&lt;/td&gt;
&lt;td&gt;Increases&lt;/td&gt;
&lt;td&gt;Decreases&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Liabilities&lt;/td&gt;
&lt;td&gt;Credit&lt;/td&gt;
&lt;td&gt;Decreases&lt;/td&gt;
&lt;td&gt;Increases&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Equity&lt;/td&gt;
&lt;td&gt;Credit&lt;/td&gt;
&lt;td&gt;Decreases&lt;/td&gt;
&lt;td&gt;Increases&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Revenue&lt;/td&gt;
&lt;td&gt;Credit&lt;/td&gt;
&lt;td&gt;Decreases&lt;/td&gt;
&lt;td&gt;Increases&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Expenses&lt;/td&gt;
&lt;td&gt;Debit&lt;/td&gt;
&lt;td&gt;Increases&lt;/td&gt;
&lt;td&gt;Decreases&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Memory aid: DEAD CLIC&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Dividends, Expenses, Assets, Drawings → Debit to increase&lt;/li&gt;
&lt;li&gt;Capital, Liabilities, Income, Credits → Credit to increase&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Financial Statement Cascade
&lt;/h2&gt;

&lt;p&gt;The four financial statements are mathematically connected:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Income Statement → produces Net Income&lt;/li&gt;
&lt;li&gt;Net Income → flows into Statement of Retained Earnings&lt;/li&gt;
&lt;li&gt;Ending Retained Earnings → appears on Balance Sheet&lt;/li&gt;
&lt;li&gt;Balance Sheet cash → validated by Statement of Cash Flows&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Each statement feeds the next. An error in the income statement propagates through the entire system.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Rule of 72 Applied to Business Finance
&lt;/h2&gt;

&lt;p&gt;The same compound interest mathematics that governs investment doubling governs business growth:&lt;/p&gt;

&lt;p&gt;A company growing revenue at 12% annually doubles revenue in 6 years.&lt;br&gt;
At 6% annual growth, doubling takes 12 years.&lt;br&gt;
At 3% (GDP pace), doubling takes 24 years.&lt;/p&gt;

&lt;p&gt;For financial modeling and business valuation, understanding the compounding implications of growth rates is essential.&lt;/p&gt;

&lt;h2&gt;
  
  
  CFG Young Investors — Free Financial Literacy
&lt;/h2&gt;

&lt;p&gt;This content is part of the curriculum we teach through CFG Young Investors — a free financial literacy program led by youth, for youth, in Elizabethtown, Kentucky and virtually all over.&lt;/p&gt;

&lt;p&gt;Contact: &lt;a href="mailto:Amberly@caergroup.com"&gt;Amberly@caergroup.com&lt;/a&gt; | caergroup.com&lt;br&gt;
&lt;a href="mailto:Jessica@caergroup.com"&gt;Jessica@caergroup.com&lt;/a&gt; | 502-677-0176&lt;/p&gt;

</description>
      <category>ai</category>
      <category>learning</category>
      <category>datascience</category>
      <category>agents</category>
    </item>
    <item>
      <title>Building a Retirement Income System — Thinking Like an Engineer</title>
      <dc:creator>Jessica Arnwine</dc:creator>
      <pubDate>Sat, 25 Apr 2026 15:30:10 +0000</pubDate>
      <link>https://forem.com/jessica_arnwine_cfg/building-a-retirement-income-system-thinking-like-an-engineer-3dce</link>
      <guid>https://forem.com/jessica_arnwine_cfg/building-a-retirement-income-system-thinking-like-an-engineer-3dce</guid>
      <description>&lt;h1&gt;
  
  
  Building a Retirement Income System — Thinking Like an Engineer
&lt;/h1&gt;

&lt;p&gt;By Jessica Arnwine, CAER Financial Group | caergroup.com&lt;/p&gt;

&lt;h2&gt;
  
  
  The Systems Approach to Retirement
&lt;/h2&gt;

&lt;p&gt;A retirement income system is an engineering problem: you need a guaranteed output (monthly income) from inputs (accumulated assets) that remains reliable under variable conditions (market performance, inflation, longevity) for an uncertain duration (your lifespan).&lt;/p&gt;

&lt;p&gt;Good engineers build redundancy. They design for worst-case, not expected-case. They separate critical systems from volatile ones.&lt;/p&gt;

&lt;p&gt;Applying this framework to retirement:&lt;/p&gt;

&lt;h2&gt;
  
  
  The Three-Layer Architecture
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Layer 1 — Guaranteed Baseline (Non-negotiable income)&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Social Security (optimized claiming age)&lt;/li&gt;
&lt;li&gt;Fixed annuity / MYGA income&lt;/li&gt;
&lt;li&gt;Pension (if applicable)&lt;/li&gt;
&lt;li&gt;Purpose: Cover 100% of essential monthly expenses with certainty&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Layer 2 — Protected Growth (Capital preservation + growth)&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Fixed Indexed Annuities&lt;/li&gt;
&lt;li&gt;IUL cash value&lt;/li&gt;
&lt;li&gt;Conservative bond allocation&lt;/li&gt;
&lt;li&gt;Purpose: Inflation protection, healthcare reserve, bridge income&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Layer 3 — Growth Engine (Optional upside)&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Equity investments&lt;/li&gt;
&lt;li&gt;Real estate&lt;/li&gt;
&lt;li&gt;Alternatives&lt;/li&gt;
&lt;li&gt;Purpose: Legacy, discretionary spending, inflation upside&lt;/li&gt;
&lt;li&gt;Key property: If this layer fails entirely, retirement still works&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  The Math of Sequence Risk
&lt;/h2&gt;

&lt;p&gt;For a portfolio with 30-year horizon:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Expected annual return: 7%&lt;/li&gt;
&lt;li&gt;Standard deviation: 15%&lt;/li&gt;
&lt;li&gt;Annual withdrawal: 4%&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Monte Carlo simulation shows ~93% success rate.&lt;/p&gt;

&lt;p&gt;But: Replace Layer 1 with guaranteed annuity covering essential expenses + run only discretionary from market portfolio:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Required withdrawal rate drops to ~2%&lt;/li&gt;
&lt;li&gt;Success rate approaches 99%+&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The architecture change — not additional capital — produces the reliability improvement.&lt;/p&gt;

&lt;h2&gt;
  
  
  Correlation Matrix — Why Income Diversification Matters
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Income Source&lt;/th&gt;
&lt;th&gt;Market Correlation&lt;/th&gt;
&lt;th&gt;Inflation Sensitivity&lt;/th&gt;
&lt;th&gt;Longevity Risk&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Social Security&lt;/td&gt;
&lt;td&gt;0.0&lt;/td&gt;
&lt;td&gt;Indexed (partial)&lt;/td&gt;
&lt;td&gt;Eliminated&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;SPIA Annuity&lt;/td&gt;
&lt;td&gt;0.0&lt;/td&gt;
&lt;td&gt;Fixed (vulnerable)&lt;/td&gt;
&lt;td&gt;Eliminated&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;FIA with GLWB&lt;/td&gt;
&lt;td&gt;0.1&lt;/td&gt;
&lt;td&gt;Partial hedge&lt;/td&gt;
&lt;td&gt;Eliminated&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;S&amp;amp;P 500&lt;/td&gt;
&lt;td&gt;1.0&lt;/td&gt;
&lt;td&gt;Moderate hedge&lt;/td&gt;
&lt;td&gt;Full exposure&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;TIPS/Bonds&lt;/td&gt;
&lt;td&gt;0.3&lt;/td&gt;
&lt;td&gt;Direct hedge&lt;/td&gt;
&lt;td&gt;Full exposure&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Low correlation income sources reduce system-wide risk more effectively than adding more of the same type.&lt;/p&gt;

&lt;h2&gt;
  
  
  Contact
&lt;/h2&gt;

&lt;p&gt;Jessica Arnwine, CEO, CAER Financial Group&lt;br&gt;
&lt;a href="mailto:Jessica@caergroup.com"&gt;Jessica@caergroup.com&lt;/a&gt; | caergroup.com | 502-677-0176&lt;/p&gt;

</description>
      <category>ai</category>
      <category>programming</category>
      <category>productivity</category>
      <category>webdev</category>
    </item>
    <item>
      <title>The Mathematics of Compound Interest — A Developer's Deep Dive</title>
      <dc:creator>Jessica Arnwine</dc:creator>
      <pubDate>Sat, 25 Apr 2026 15:28:34 +0000</pubDate>
      <link>https://forem.com/jessica_arnwine_cfg/the-mathematics-of-compound-interest-a-developers-deep-dive-2456</link>
      <guid>https://forem.com/jessica_arnwine_cfg/the-mathematics-of-compound-interest-a-developers-deep-dive-2456</guid>
      <description>&lt;h1&gt;
  
  
  The Mathematics of Compound Interest — A Developer's Deep Dive
&lt;/h1&gt;

&lt;p&gt;By Jessica Arnwine, CAER Financial Group | caergroup.com&lt;/p&gt;

&lt;h2&gt;
  
  
  The Formula
&lt;/h2&gt;

&lt;p&gt;The compound interest formula:&lt;/p&gt;

&lt;p&gt;A = P(1 + r/n)^(nt)&lt;/p&gt;

&lt;p&gt;Where:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A = Final amount&lt;/li&gt;
&lt;li&gt;P = Principal (initial deposit)&lt;/li&gt;
&lt;li&gt;r = Annual interest rate (decimal)&lt;/li&gt;
&lt;li&gt;n = Compounding periods per year&lt;/li&gt;
&lt;li&gt;t = Time in years&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  The Rule of 72 — A Logarithmic Approximation
&lt;/h2&gt;

&lt;p&gt;The precise doubling time formula:&lt;br&gt;
T = ln(2) / ln(1 + r) ≈ 0.693 / r&lt;/p&gt;

&lt;p&gt;The Rule of 72 approximates this as:&lt;br&gt;
T ≈ 72 / (r × 100)&lt;/p&gt;

&lt;p&gt;Why 72 and not 69.3? Because 72 is divisible by 2, 3, 4, 6, 8, 9, and 12 — making mental arithmetic dramatically easier with ~1-2% error for rates between 2-20%.&lt;/p&gt;

&lt;h2&gt;
  
  
  Practical Comparison Table
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Instrument&lt;/th&gt;
&lt;th&gt;Annual Rate&lt;/th&gt;
&lt;th&gt;Doubling Time&lt;/th&gt;
&lt;th&gt;$10K after 30 years&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Bank savings&lt;/td&gt;
&lt;td&gt;0.50%&lt;/td&gt;
&lt;td&gt;144 years&lt;/td&gt;
&lt;td&gt;$11,614&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;MYGA (5-yr)&lt;/td&gt;
&lt;td&gt;5.00%&lt;/td&gt;
&lt;td&gt;14.4 years&lt;/td&gt;
&lt;td&gt;$43,219&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;IUL (avg)&lt;/td&gt;
&lt;td&gt;7.00%&lt;/td&gt;
&lt;td&gt;10.3 years&lt;/td&gt;
&lt;td&gt;$76,123&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;S&amp;amp;P 500 (hist)&lt;/td&gt;
&lt;td&gt;8.00%&lt;/td&gt;
&lt;td&gt;9.0 years&lt;/td&gt;
&lt;td&gt;$100,627&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Credit card&lt;/td&gt;
&lt;td&gt;20.00%&lt;/td&gt;
&lt;td&gt;3.6 years&lt;/td&gt;
&lt;td&gt;$2.37M OWED&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  The 0% Floor Problem
&lt;/h2&gt;

&lt;p&gt;A Fixed Indexed Annuity or IUL with a 0% floor produces a fundamentally different return distribution than an S&amp;amp;P 500 index fund. Consider this simulation:&lt;/p&gt;

&lt;p&gt;Year 1: S&amp;amp;P +15% → IUL earns min(15%, cap=12%) = 12% | S&amp;amp;P fund earns 15%&lt;br&gt;
Year 2: S&amp;amp;P -25% → IUL earns 0% | S&amp;amp;P fund loses 25%&lt;br&gt;
Year 3: S&amp;amp;P +18% → IUL earns 12% | S&amp;amp;P fund earns 18%&lt;/p&gt;

&lt;p&gt;After 3 years on $100,000:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;IUL: $100,000 × 1.12 × 1.00 × 1.12 = $125,440&lt;/li&gt;
&lt;li&gt;S&amp;amp;P fund: $100,000 × 1.15 × 0.75 × 1.18 = $101,903&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The floor's protection in negative years outweighs the cap's limitation in positive years over long time horizons with typical volatility.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Sequence of Returns Problem (Mathematically)
&lt;/h2&gt;

&lt;p&gt;For an accumulation portfolio, order of returns doesn't matter — only average matters.&lt;br&gt;
For a distribution portfolio (retirement), order matters critically.&lt;/p&gt;

&lt;p&gt;Withdrawing $40K/year from a $1M portfolio:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;If returns are [-30%, +30%, +8%, +8%...]: portfolio may be depleted by year 15&lt;/li&gt;
&lt;li&gt;If returns are [+8%, +8%, +30%, -30%...]: portfolio may last 30+ years&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Guaranteed income sources eliminate sequence risk by removing the distribution dependency on market performance.&lt;/p&gt;

&lt;h2&gt;
  
  
  Contact
&lt;/h2&gt;

&lt;p&gt;Jessica Arnwine, CEO, CAER Financial Group&lt;br&gt;
&lt;a href="mailto:Jessica@caergroup.com"&gt;Jessica@caergroup.com&lt;/a&gt; | 502-677-0176 | caergroup.com&lt;br&gt;
Faith · Family · Financial Responsibility&lt;/p&gt;

</description>
      <category>ai</category>
      <category>programming</category>
      <category>productivity</category>
      <category>tutorial</category>
    </item>
    <item>
      <title>The Mathematics of Compound Interest — A Developer's Deep Dive</title>
      <dc:creator>Jessica Arnwine</dc:creator>
      <pubDate>Fri, 24 Apr 2026 15:16:36 +0000</pubDate>
      <link>https://forem.com/jessica_arnwine_cfg/the-mathematics-of-compound-interest-a-developers-deep-dive-27lk</link>
      <guid>https://forem.com/jessica_arnwine_cfg/the-mathematics-of-compound-interest-a-developers-deep-dive-27lk</guid>
      <description>&lt;h1&gt;
  
  
  The Mathematics of Compound Interest — A Developer's Deep Dive
&lt;/h1&gt;

&lt;p&gt;By Jessica Arnwine, CAER Financial Group | caergroup.com&lt;/p&gt;

&lt;h2&gt;
  
  
  The Formula
&lt;/h2&gt;

&lt;p&gt;The compound interest formula:&lt;/p&gt;

&lt;p&gt;A = P(1 + r/n)^(nt)&lt;/p&gt;

&lt;p&gt;Where:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A = Final amount&lt;/li&gt;
&lt;li&gt;P = Principal (initial deposit)&lt;/li&gt;
&lt;li&gt;r = Annual interest rate (decimal)&lt;/li&gt;
&lt;li&gt;n = Compounding periods per year&lt;/li&gt;
&lt;li&gt;t = Time in years&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  The Rule of 72 — A Logarithmic Approximation
&lt;/h2&gt;

&lt;p&gt;The precise doubling time formula:&lt;br&gt;
T = ln(2) / ln(1 + r) ≈ 0.693 / r&lt;/p&gt;

&lt;p&gt;The Rule of 72 approximates this as:&lt;br&gt;
T ≈ 72 / (r × 100)&lt;/p&gt;

&lt;p&gt;Why 72 and not 69.3? Because 72 is divisible by 2, 3, 4, 6, 8, 9, and 12 — making mental arithmetic dramatically easier with ~1-2% error for rates between 2-20%.&lt;/p&gt;

&lt;h2&gt;
  
  
  Practical Comparison Table
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Instrument&lt;/th&gt;
&lt;th&gt;Annual Rate&lt;/th&gt;
&lt;th&gt;Doubling Time&lt;/th&gt;
&lt;th&gt;$10K after 30 years&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Bank savings&lt;/td&gt;
&lt;td&gt;0.50%&lt;/td&gt;
&lt;td&gt;144 years&lt;/td&gt;
&lt;td&gt;$11,614&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;MYGA (5-yr)&lt;/td&gt;
&lt;td&gt;5.00%&lt;/td&gt;
&lt;td&gt;14.4 years&lt;/td&gt;
&lt;td&gt;$43,219&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;IUL (avg)&lt;/td&gt;
&lt;td&gt;7.00%&lt;/td&gt;
&lt;td&gt;10.3 years&lt;/td&gt;
&lt;td&gt;$76,123&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;S&amp;amp;P 500 (hist)&lt;/td&gt;
&lt;td&gt;8.00%&lt;/td&gt;
&lt;td&gt;9.0 years&lt;/td&gt;
&lt;td&gt;$100,627&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Credit card&lt;/td&gt;
&lt;td&gt;20.00%&lt;/td&gt;
&lt;td&gt;3.6 years&lt;/td&gt;
&lt;td&gt;$2.37M OWED&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  The 0% Floor Problem
&lt;/h2&gt;

&lt;p&gt;A Fixed Indexed Annuity or IUL with a 0% floor produces a fundamentally different return distribution than an S&amp;amp;P 500 index fund. Consider this simulation:&lt;/p&gt;

&lt;p&gt;Year 1: S&amp;amp;P +15% → IUL earns min(15%, cap=12%) = 12% | S&amp;amp;P fund earns 15%&lt;br&gt;
Year 2: S&amp;amp;P -25% → IUL earns 0% | S&amp;amp;P fund loses 25%&lt;br&gt;
Year 3: S&amp;amp;P +18% → IUL earns 12% | S&amp;amp;P fund earns 18%&lt;/p&gt;

&lt;p&gt;After 3 years on $100,000:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;IUL: $100,000 × 1.12 × 1.00 × 1.12 = $125,440&lt;/li&gt;
&lt;li&gt;S&amp;amp;P fund: $100,000 × 1.15 × 0.75 × 1.18 = $101,903&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The floor's protection in negative years outweighs the cap's limitation in positive years over long time horizons with typical volatility.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Sequence of Returns Problem (Mathematically)
&lt;/h2&gt;

&lt;p&gt;For an accumulation portfolio, order of returns doesn't matter — only average matters.&lt;br&gt;
For a distribution portfolio (retirement), order matters critically.&lt;/p&gt;

&lt;p&gt;Withdrawing $40K/year from a $1M portfolio:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;If returns are [-30%, +30%, +8%, +8%...]: portfolio may be depleted by year 15&lt;/li&gt;
&lt;li&gt;If returns are [+8%, +8%, +30%, -30%...]: portfolio may last 30+ years&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Guaranteed income sources eliminate sequence risk by removing the distribution dependency on market performance.&lt;/p&gt;

&lt;h2&gt;
  
  
  Contact
&lt;/h2&gt;

&lt;p&gt;Jessica Arnwine, CEO, CAER Financial Group&lt;br&gt;
&lt;a href="mailto:Jessica@caergroup.com"&gt;Jessica@caergroup.com&lt;/a&gt; | 502-677-0176 | caergroup.com&lt;br&gt;
Faith · Family · Financial Responsibility&lt;/p&gt;

</description>
      <category>web3</category>
      <category>programming</category>
      <category>productivity</category>
      <category>tutorial</category>
    </item>
    <item>
      <title>AI-Enhanced Network Monitoring with Python: Detecting Anomalies Before They Become Threats</title>
      <dc:creator>Jessica Arnwine</dc:creator>
      <pubDate>Tue, 02 Sep 2025 01:12:06 +0000</pubDate>
      <link>https://forem.com/jessica_arnwine_cfg/ai-enhanced-network-monitoring-with-python-detecting-anomalies-before-they-become-threats-1686</link>
      <guid>https://forem.com/jessica_arnwine_cfg/ai-enhanced-network-monitoring-with-python-detecting-anomalies-before-they-become-threats-1686</guid>
      <description>&lt;p&gt;Cybersecurity isn’t just about scanning for open ports — it’s about identifying unusual patterns and potential threats before they cause damage. By combining Python with AI, you can build a monitoring system that detects anomalies, scores vulnerabilities, and automatically alerts your team. This project demonstrates advanced technical skill and practical application.&lt;/p&gt;

&lt;p&gt;Step 1: Preparing Your Environment&lt;/p&gt;

&lt;p&gt;You’ll need Python 3.x and a few key libraries for network scanning, data analysis, and machine learning:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;# Create a virtual environment
python3 -m venv ai-netmon
source ai-netmon/bin/activate  # Mac/Linux
ai-netmon\Scripts\activate     # Windows

# Install required packages
pip install python-nmap pandas scikit-learn matplotlib requests
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;python-nmap for scanning&lt;/p&gt;

&lt;p&gt;pandas for organizing scan data&lt;/p&gt;

&lt;p&gt;scikit-learn for anomaly detection&lt;/p&gt;

&lt;p&gt;matplotlib for visualization&lt;/p&gt;

&lt;p&gt;requests for sending alerts&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2: Scanning the Network&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We start with the same scanning logic as before, but store the results in a DataFrame for AI processing:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;import nmap
import pandas as pd

scanner = nmap.PortScanner()
scanner.scan('192.168.1.0/24', '22,80,443')

data = []
for host in scanner.all_hosts():
    for port in scanner[host]['tcp'].keys():
        data.append({
            'host': host,
            'port': port,
            'state': 1 if scanner[host]['tcp'][port]['state']=='open' else 0
        })

df = pd.DataFrame(data)
print(df.head())

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This creates a structured dataset ready for anomaly detection.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 3: Detecting Anomalies with Isolation Forest&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The Isolation Forest algorithm is great for spotting unusual behavior, like unexpected open ports or rogue devices:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;from sklearn.ensemble import IsolationForest

# Train Isolation Forest on current network state
model = IsolationForest(contamination=0.1)  # ~10% of data considered anomalous
df['anomaly'] = model.fit_predict(df[['state']])

# Flag anomalies
anomalies = df[df['anomaly'] == -1]
print("Anomalous network activity detected:\n", anomalies)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This identifies ports or hosts behaving differently than usual, giving you early warnings before a security incident occurs.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 4: Visualization&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Visualizing anomalies helps your team quickly grasp the network’s health:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;import matplotlib.pyplot as plt

plt.figure(figsize=(10,6))
plt.scatter(df['host'], df['port'], c=df['anomaly'], cmap='coolwarm', s=100)
plt.xlabel('Host')
plt.ylabel('Port')
plt.title('Network Anomalies Detection')
plt.colorbar(label='Anomaly (-1 = Anomalous)')
plt.show()
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Red dots represent anomalies&lt;/p&gt;

&lt;p&gt;Blue dots are normal activity&lt;/p&gt;

&lt;p&gt;This gives an intuitive, visual overview of your network.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 5: Automated Alerts&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Combine anomaly detection with Slack or email alerts:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;import requests

webhook_url = 'https://hooks.slack.com/services/XXX/YYY/ZZZ'

for _, row in anomalies.iterrows():
    message = {
        'text': f"Alert: Anomaly detected on host {row['host']}, port {row['port']}!"
    }
    requests.post(webhook_url, json=message)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Now your team receives instant notifications for unusual activity.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 6: Scaling and Next Steps&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Once working, you can:&lt;/p&gt;

&lt;p&gt;Schedule scans with cron or Task Scheduler&lt;/p&gt;

&lt;p&gt;Integrate CVE databases to assign risk scores to anomalous ports&lt;/p&gt;

&lt;p&gt;Add more features like geolocation for external IPs or multi-network monitoring&lt;/p&gt;

&lt;p&gt;Train machine learning models over time to improve anomaly detection accuracy&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Takeaway&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This AI-enhanced network monitoring script demonstrates:&lt;/p&gt;

&lt;p&gt;Automated scanning and data collection&lt;/p&gt;

&lt;p&gt;Machine learning-based anomaly detection&lt;/p&gt;

&lt;p&gt;Visualization of network health&lt;/p&gt;

&lt;p&gt;Real-time alerting for critical issues&lt;/p&gt;

&lt;p&gt;It’s a strong portfolio project because it combines Python, cybersecurity, and AI, showing you can solve complex problems and create actionable solutions.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Pro Tip: Share the full notebook or repository publicly. Employers love seeing working code, visual outputs, and automated systems that solve real-world problems.&lt;/em&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Advanced Network Monitoring with Python: Detection, Scoring, and Visualization</title>
      <dc:creator>Jessica Arnwine</dc:creator>
      <pubDate>Tue, 02 Sep 2025 01:08:17 +0000</pubDate>
      <link>https://forem.com/jessica_arnwine_cfg/advanced-network-monitoring-with-python-detection-scoring-and-visualization-h40</link>
      <guid>https://forem.com/jessica_arnwine_cfg/advanced-network-monitoring-with-python-detection-scoring-and-visualization-h40</guid>
      <description>&lt;p&gt;Building on basic network scanning, we can enhance our Python scripts to detect new devices, score vulnerabilities, and even visualize network health. This demonstrates real-world skills in cybersecurity automation and data-driven problem solving.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 1: Detecting New Devices&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Tracking devices over time helps spot unexpected or rogue devices on your network. We can do this by maintaining a list of known hosts and comparing it with each new scan:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;import nmap
import json

scanner = nmap.PortScanner()
scanner.scan('192.168.1.0/24', '22,80,443')

# Load known hosts from file
try:
    with open('known_hosts.json') as f:
        known_hosts = json.load(f)
except FileNotFoundError:
    known_hosts = []

current_hosts = scanner.all_hosts()
new_hosts = [host for host in current_hosts if host not in known_hosts]

if new_hosts:
    print("New devices detected:", new_hosts)

# Update known hosts file
with open('known_hosts.json', 'w') as f:
    json.dump(current_hosts, f)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This simple system flags any new host that wasn’t previously on your network, a first line of defense against unauthorized access.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2: Vulnerability Scoring&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Not all open ports are equally dangerous. We can assign a risk score based on known vulnerabilities:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;risk_scores = {'22': 9, '80': 5, '443': 3}  # Example scoring

for host in scanner.all_hosts():
    for port in scanner[host]['tcp'].keys():
        state = scanner[host]['tcp'][port]['state']
        score = risk_scores.get(str(port), 1)  # Default low risk
        print(f'Host: {host}, Port: {port}, State: {state}, Risk Score: {score}')

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This approach gives you a quantitative view of network risks, helping prioritize remediation efforts.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 3: Visualization with Matplotlib&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Visualizing the network can make patterns or anomalies easier to spot:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;import matplotlib.pyplot as plt

hosts = scanner.all_hosts()
scores = []

for host in hosts:
    total_score = sum(risk_scores.get(str(port), 1) 
                      for port in scanner[host]['tcp'].keys())
    scores.append(total_score)

plt.bar(hosts, scores, color='orange')
plt.xlabel('Host')
plt.ylabel('Vulnerability Score')
plt.title('Network Vulnerability Overview')
plt.show()
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Now you can see which devices are most at risk at a glance. Visualization is especially useful for team presentations or reporting to management.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 4: Automatic Alerts&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Combine new device detection and vulnerability scoring to send alerts if thresholds are exceeded:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;import requests

webhook_url = 'https://hooks.slack.com/services/XXX/YYY/ZZZ'

for i, host in enumerate(hosts):
    if scores[i] &amp;gt; 8 or host in new_hosts:
        message = {'text': f'Alert: Host {host} flagged! Risk Score: {scores[i]}'}
        requests.post(webhook_url, json=message)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This ensures your team receives immediate updates when significant events occur.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 5: Scaling the Solution&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Once your script is working, you can:&lt;/p&gt;

&lt;p&gt;Schedule scans to run daily or hourly using cron (Linux) or Task Scheduler (Windows).&lt;/p&gt;

&lt;p&gt;Integrate with databases to store historical scan data for trend analysis.&lt;/p&gt;

&lt;p&gt;Add API integrations to cross-reference CVEs for ports/services detected.&lt;/p&gt;

&lt;p&gt;Use dashboards like Grafana or Plotly for interactive visualizations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Takeaway&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This advanced network monitoring project highlights:&lt;/p&gt;

&lt;p&gt;Automated detection of new devices&lt;/p&gt;

&lt;p&gt;Risk-based vulnerability scoring&lt;/p&gt;

&lt;p&gt;Visualization of network health&lt;/p&gt;

&lt;p&gt;Real-time alerting to Slack&lt;/p&gt;

&lt;p&gt;&lt;em&gt;By sharing these kinds of projects, you demonstrate both technical skill and practical problem-solving, which is exactly what employers and collaborators look for in cybersecurity and cloud security roles.&lt;/em&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Automating Network Monitoring with Python: A Hands-On Example</title>
      <dc:creator>Jessica Arnwine</dc:creator>
      <pubDate>Tue, 02 Sep 2025 01:05:34 +0000</pubDate>
      <link>https://forem.com/jessica_arnwine_cfg/automating-network-monitoring-with-python-a-hands-on-example-53ba</link>
      <guid>https://forem.com/jessica_arnwine_cfg/automating-network-monitoring-with-python-a-hands-on-example-53ba</guid>
      <description>&lt;p&gt;Network monitoring is a critical part of cybersecurity. Knowing which hosts are up, which ports are open, and when unexpected changes occur can prevent security incidents before they escalate. With Python, you can create scripts that perform scans, log results, and even send notifications — all with minimal tools.&lt;/p&gt;

&lt;p&gt;This post will walk through a practical example, including code snippets, to demonstrate real-world cybersecurity automation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 1: Setting Up the Environment&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;First, make sure you have Python 3.x installed. Then, set up a virtual environment and install the necessary packages:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;# Create a virtual environment
python3 -m venv netmon-env

# Activate the environment (Mac/Linux)
source netmon-env/bin/activate

# Activate the environment (Windows)
netmon-env\Scripts\activate

# Install required packages
pip install python-nmap requests

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Step 2: Scanning Hosts and Ports&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We’ll use the python-nmap module to scan hosts on our local network for common open ports:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;import nmap

# Initialize scanner
scanner = nmap.PortScanner()

# Scan a target IP range for ports 22, 80, 443
scanner.scan('192.168.1.0/24', '22,80,443')

# Print results
for host in scanner.all_hosts():
    print(f'Host: {host}, State: {scanner[host].state()}')
    for proto in scanner[host].all_protocols():
        print(f'Protocol: {proto}')
        ports = scanner[host][proto].keys()
        for port in ports:
            print(f'Port {port}: {scanner[host][proto][port]["state"]}')


&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This simple script allows you to quickly see which hosts are live and which ports are open, giving you insight into potential vulnerabilities.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 3: Logging Results&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Keeping logs of your scans is essential for tracking changes over time. Here’s how you can write scan results to a CSV file:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;import csv

with open('network_log.csv', 'w', newline='') as file:
    writer = csv.writer(file)
    writer.writerow(['Host', 'Protocol', 'Port', 'State'])

    for host in scanner.all_hosts():
        for proto in scanner[host].all_protocols():
            ports = scanner[host][proto].keys()
            for port in ports:
                writer.writerow([host, proto, port, scanner[host][proto][port]['state']])
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Now you have a persistent record of your network state that you can review or share with your team.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 4: Sending Alerts&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Automation becomes powerful when your script can notify you of unusual events. Here’s an example of sending a Slack alert if a critical port (like SSH 22) is unexpectedly open:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;import requests

webhook_url = 'https://hooks.slack.com/services/XXX/YYY/ZZZ'

for host in scanner.all_hosts():
    if scanner[host].has_tcp(22) and scanner[host]['tcp'][22]['state'] == 'open':
        message = {'text': f'Alert: SSH port open on host {host}!'}
        requests.post(webhook_url, json=message)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;With this setup, you’ll be instantly notified of potential risks — an essential feature for any security professional.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 5: Putting It All Together&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You now have the building blocks for a basic network monitoring tool:&lt;/p&gt;

&lt;p&gt;Scan your network for live hosts and open ports.&lt;/p&gt;

&lt;p&gt;Log results for historical tracking.&lt;/p&gt;

&lt;p&gt;Send alerts for critical issues.&lt;/p&gt;

&lt;p&gt;From here, you can expand the script with:&lt;/p&gt;

&lt;p&gt;Scheduled scans using cron or Windows Task Scheduler&lt;/p&gt;

&lt;p&gt;More detailed vulnerability checks using additional modules&lt;/p&gt;

&lt;p&gt;Email notifications with smtplib&lt;/p&gt;

&lt;p&gt;Integration with dashboards like Grafana for visualization&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Takeaway&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This project demonstrates how Python can turn a repetitive, manual security task into an automated workflow. Even at a beginner-intermediate level, these skills showcase your technical ability, problem-solving mindset, and practical approach to cybersecurity.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Tip: Including multiple working code snippets like this in your portfolio shows prospective employers or collaborators that you can build real-world tools, not just talk about theory.&lt;/em&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>My Journey in Cybersecurity, Cloud, and Data</title>
      <dc:creator>Jessica Arnwine</dc:creator>
      <pubDate>Mon, 01 Sep 2025 18:14:53 +0000</pubDate>
      <link>https://forem.com/jessica_arnwine_cfg/my-journey-in-cybersecurity-cloud-and-data-2jod</link>
      <guid>https://forem.com/jessica_arnwine_cfg/my-journey-in-cybersecurity-cloud-and-data-2jod</guid>
      <description>&lt;p&gt;For me, this isn’t just a career path but it is a passion. I’m constantly building projects, learning advanced security practices, and documenting the journey along the way. My mission is simple: to make technology knowledge accessible, practical, and engaging for anyone who wants to grow.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cybersecurity: Protecting What Matters Most&lt;/strong&gt;&lt;br&gt;
Cybersecurity isn’t just about firewalls and antivirus software, it’s about resilience. Threats evolve daily, from phishing emails to ransomware attacks, and the best defense is layered knowledge. I focus on practical security: applying real-world solutions that can protect businesses, families, and communities. Sharing these practices makes technology feel less intimidating and more empowering.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cloud Technologies: The Future of Innovation&lt;/strong&gt;&lt;br&gt;
The cloud is no longer “new.” It’s the foundation of modern business. From scalability to cost efficiency, cloud computing transforms how we store, share, and secure information. But it also introduces new challenges, misconfigurations, access controls, and compliance concerns. By building projects in the cloud, I’m learning how to optimize security while unlocking the full potential of these platforms.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Data-Driven Problem Solving: From Insight to Action&lt;/strong&gt;&lt;br&gt;
At the heart of every major decision is data. But data by itself isn’t powerful, it’s what you do with it that matters. I approach problem solving by using data to guide decisions, uncover patterns, and build smarter systems. Whether it’s identifying unusual network activity or streamlining processes, data is the compass that points the way forward.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why I Share the Journey&lt;/strong&gt;&lt;br&gt;
One thing I’ve noticed is that tech knowledge often feels locked away behind jargon and gatekeeping. I want to break that barrier. By documenting my learning process, project builds, and lessons from the field, I aim to create a roadmap that others can follow, whether they’re just starting out or looking to advance.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Technology should feel like an open door, not a closed one.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Goal Ahead&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;&lt;em&gt;My ultimate goal is to keep growing while helping others grow alongside me. By making complex ideas simple, practical, and engaging, I hope to inspire more people to see technology as something they can master. Cybersecurity, cloud, and data are the future and the more people we empower with this knowledge, the safer and smarter that future will be.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>wecoded</category>
      <category>womenintech</category>
      <category>workplace</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>My Tech Stack</title>
      <dc:creator>Jessica Arnwine</dc:creator>
      <pubDate>Mon, 01 Sep 2025 18:12:58 +0000</pubDate>
      <link>https://forem.com/jessica_arnwine_cfg/my-tech-stack-3ne</link>
      <guid>https://forem.com/jessica_arnwine_cfg/my-tech-stack-3ne</guid>
      <description>&lt;p&gt;When it comes to technology, I believe in using tools that are not only powerful but also practical for real-world problem solving. My stack is built around security, efficiency, and flexibility, helping me learn, build, and continuously push boundaries. Here’s what I use and why:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Linux&lt;/strong&gt;&lt;br&gt;
At the core of my workflow is Linux. It gives me the freedom to customize, automate, and truly understand what’s happening under the hood. From server management to scripting, Linux is the foundation of my security and development environment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Python&lt;/strong&gt;&lt;br&gt;
Python is my go-to language. Its versatility makes it ideal for automation, penetration testing, data analysis, and security scripting. Whether I’m building custom tools or analyzing data, Python allows me to turn ideas into reality quickly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cloud Security&lt;/strong&gt;&lt;br&gt;
With organizations moving workloads to the cloud, security has to evolve. I’m focused on understanding identity management, zero-trust principles, and securing workloads in platforms like AWS and Azure. Cloud security isn’t just about defense, it is about enabling businesses to innovate safely.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Vulnerability Management&lt;/strong&gt;&lt;br&gt;
Staying ahead of threats means constantly identifying, assessing, and remediating risks. I use vulnerability management tools and frameworks to monitor systems and reduce the attack surface. It’s not just about finding issues, it is about fixing them strategically.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Penetration Testing&lt;/strong&gt;&lt;br&gt;
To truly understand security, you have to think like an attacker. Pen testing allows me to explore weaknesses, exploit them in a controlled way, and then apply those lessons to strengthen defenses. It’s a blend of creativity, problem-solving, and technical skill.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;My Philosophy&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;&lt;strong&gt;Each piece of my stack supports the other. Linux provides control, Python builds automation, cloud security protects evolving infrastructures, vulnerability management identifies risks, and pen testing challenges me to think critically. Together, they form a toolkit that’s not just about technology, but about building resilience.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>womenintech</category>
      <category>wecoded</category>
    </item>
    <item>
      <title>What I Am Available For</title>
      <dc:creator>Jessica Arnwine</dc:creator>
      <pubDate>Mon, 01 Sep 2025 18:11:21 +0000</pubDate>
      <link>https://forem.com/jessica_arnwine_cfg/what-i-am-available-for-4c04</link>
      <guid>https://forem.com/jessica_arnwine_cfg/what-i-am-available-for-4c04</guid>
      <description>&lt;p&gt;Technology is more than a career path for me, it’s a space where curiosity meets problem-solving. I thrive at the intersection of cybersecurity, cloud technologies, and data-driven decision-making. Here’s what I bring to the table and what I’m available to collaborate on:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Exploring Cloud &amp;amp; AI&lt;/strong&gt;&lt;br&gt;
I’m deeply engaged in exploring the evolving landscape of cloud computing and artificial intelligence. From understanding emerging tools to testing real-world applications, I’m driven to turn complex concepts into clear, practical solutions.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Turning Curiosity Into Code&lt;/strong&gt;&lt;br&gt;
For me, coding isn’t just about syntax, it’s about building answers to real problems. I enjoy experimenting with projects that push boundaries, whether that’s automating workflows, creating data-driven insights, or improving system security. Curiosity fuels my learning, and every project is an opportunity to discover something new.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cybersecurity &amp;amp; Cloud Security Analyst&lt;/strong&gt;&lt;br&gt;
Security is at the heart of my work. I specialize in protecting data and infrastructure in cloud environments by applying advanced security practices, monitoring systems, and designing defenses against evolving threats. I aim to make organizations more resilient while keeping security approaches accessible and understandable.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Threat Detection &amp;amp; Response&lt;/strong&gt;&lt;br&gt;
Cyber threats evolve daily, and so must our defenses. I focus on detecting vulnerabilities early, analyzing potential threats, and implementing rapid response strategies that minimize risk. My goal is not only to respond to threats but to stay ahead of them.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Penetration Testing&lt;/strong&gt;&lt;br&gt;
I take a hands-on approach to security by simulating real-world attacks through penetration testing. This allows me to uncover weaknesses before malicious actors can exploit them and provide clear, actionable steps for strengthening defenses.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Vulnerability Management&lt;/strong&gt;&lt;br&gt;
Security doesn’t stop at finding problems, it’s about solving them. I work on identifying, prioritizing, and addressing vulnerabilities in systems, ensuring organizations maintain strong, ongoing protection against risks.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why This Matters&lt;/strong&gt;&lt;br&gt;
The digital world runs on trust, and every system, application, and piece of data needs to be safeguarded. My focus is on making cybersecurity knowledge and practices accessible, practical, and effective—helping individuals and organizations grow with confidence in a secure digital environment.&lt;/p&gt;

&lt;p&gt;Whether it’s collaborating on cloud security initiatives, testing defenses, or exploring AI-driven solutions, I’m available to work on projects that challenge the status quo and build safer, smarter systems.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Above all&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;&lt;strong&gt;I am available for all things God and Jesus Christ, letting my faith guide my work, my learning, and my service to others.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>programming</category>
      <category>webdev</category>
      <category>javascript</category>
      <category>ai</category>
    </item>
    <item>
      <title>Faith in a Decentralized World</title>
      <dc:creator>Jessica Arnwine</dc:creator>
      <pubDate>Mon, 25 Aug 2025 17:19:13 +0000</pubDate>
      <link>https://forem.com/jessica_arnwine_cfg/faith-in-a-decentralized-world-4p7m</link>
      <guid>https://forem.com/jessica_arnwine_cfg/faith-in-a-decentralized-world-4p7m</guid>
      <description>&lt;p&gt;Lessons from Atproto, Cybersecurity, and Trust in God. Technology is shifting again. With Atproto, a decentralized protocol behind platforms like Bluesky, the goal is to give people back control, over identity, data, and digital communities. It’s part of a bigger movement toward transparency and freedom online.&lt;/p&gt;

&lt;p&gt;In many ways, it mirrors what wealth and faith already teach us:&lt;/p&gt;

&lt;p&gt;Cybersecurity reminds us to guard what matters most.&lt;/p&gt;

&lt;p&gt;Wealth management teaches stewardship and wise planning.&lt;/p&gt;

&lt;p&gt;Faith calls us to build on a foundation that cannot be shaken.&lt;/p&gt;

&lt;p&gt;Decentralization promises independence, but independence without wisdom can still lead to chaos. That’s why we need discernment — the same way Scripture calls us to test every spirit and every foundation.&lt;/p&gt;

&lt;p&gt;Atproto shows us that control is valuable, but true security isn’t in protocols, passwords, or platforms. It’s in God. He is the ultimate anchor, the one system that never crashes and never corrupts.&lt;/p&gt;

&lt;p&gt;When we align our digital lives, financial plans, and daily choices with His wisdom, we gain not just freedom, but peace.&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>programming</category>
      <category>javascript</category>
      <category>ai</category>
    </item>
    <item>
      <title>Strength in the Storm</title>
      <dc:creator>Jessica Arnwine</dc:creator>
      <pubDate>Mon, 25 Aug 2025 17:11:53 +0000</pubDate>
      <link>https://forem.com/jessica_arnwine_cfg/strength-in-the-storm-2070</link>
      <guid>https://forem.com/jessica_arnwine_cfg/strength-in-the-storm-2070</guid>
      <description>&lt;p&gt;Storms come in many forms — a cyberattack that steals peace of mind, an unexpected bill that strains finances, or a season of doubt that tests faith. But storms also reveal where our foundation lies.&lt;/p&gt;

&lt;p&gt;Cyber teaches us vigilance. Wealth teaches us stewardship. Faith teaches us trust. Together, they form an anchor that holds steady when the winds rise.&lt;/p&gt;

&lt;p&gt;In a digital world, protecting data matters. In a financial world, managing money matters. But in every world, faith matters most, because it gives us strength when everything else feels uncertain.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>productivity</category>
      <category>beginners</category>
    </item>
  </channel>
</rss>
