<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: VICTOR KIMUTAI</title>
    <description>The latest articles on Forem by VICTOR KIMUTAI (@vkimutai).</description>
    <link>https://forem.com/vkimutai</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3801154%2Fad969632-a62a-487d-bcf4-77cba2db7f63.jpg</url>
      <title>Forem: VICTOR KIMUTAI</title>
      <link>https://forem.com/vkimutai</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/vkimutai"/>
    <language>en</language>
    <item>
      <title>AI is quietly changing product design and most teams haven’t noticed.</title>
      <dc:creator>VICTOR KIMUTAI</dc:creator>
      <pubDate>Wed, 25 Mar 2026 06:29:25 +0000</pubDate>
      <link>https://forem.com/vkimutai/ai-is-quietly-changing-product-design-and-most-teams-havent-noticed-4ok8</link>
      <guid>https://forem.com/vkimutai/ai-is-quietly-changing-product-design-and-most-teams-havent-noticed-4ok8</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fm3akx60xiemd9m9hbgd5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fm3akx60xiemd9m9hbgd5.png" alt=" " width="800" height="444"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;With tools like Genkit, ADK, and Vertex AI, we are no longer just designing interfaces.&lt;/p&gt;

&lt;p&gt;We are designing intelligence.&lt;/p&gt;

&lt;p&gt;Here’s the shift happening right now:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Before AI&lt;/strong&gt;&lt;br&gt;
• Buttons&lt;br&gt;
• Forms&lt;br&gt;
• Dashboards&lt;br&gt;
• Fixed workflows&lt;br&gt;
User clicks → system responds&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;With AI&lt;/strong&gt;&lt;br&gt;
• Conversations&lt;br&gt;
• Smart suggestions&lt;br&gt;
• Agents that take actions&lt;br&gt;
• Systems that understand context&lt;br&gt;
User asks → AI thinks → AI acts → UI adapts&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Genkit&lt;/strong&gt; helps design AI interaction flows.&lt;br&gt;
&lt;strong&gt;ADK&lt;/strong&gt; helps design intelligent agents that complete tasks.&lt;br&gt;
&lt;strong&gt;Vertex AI&lt;/strong&gt; brings scalable intelligence and multimodal understanding.&lt;/p&gt;

&lt;p&gt;This changes the role of product design completely.&lt;/p&gt;

&lt;p&gt;We move from:&lt;/p&gt;

&lt;p&gt;Designing screens → Designing intelligent systems&lt;br&gt;
Building tools → Building assistants&lt;br&gt;
Creating workflows → Creating adaptive experiences&lt;/p&gt;

&lt;p&gt;The future of product design is not UI-first.&lt;/p&gt;

&lt;p&gt;It’s AI-first.&lt;/p&gt;

&lt;p&gt;The real question is, are we ready to design production systems where AI handles reasoning, decisions, and actions  not just responses?&lt;/p&gt;

</description>
      <category>genkit</category>
      <category>adk</category>
      <category>vertexai</category>
    </item>
    <item>
      <title>Tool Every Developer Should Know: Netcat</title>
      <dc:creator>VICTOR KIMUTAI</dc:creator>
      <pubDate>Sun, 15 Mar 2026 14:12:52 +0000</pubDate>
      <link>https://forem.com/vkimutai/tool-every-developer-should-know-netcat-1a9k</link>
      <guid>https://forem.com/vkimutai/tool-every-developer-should-know-netcat-1a9k</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft1y97a68s3k50nbucmzm.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft1y97a68s3k50nbucmzm.jpg" alt=" " width="720" height="480"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;While exploring networking and security tools recently, I revisited Netcat (nc)  often called the Swiss Army knife of networking.&lt;/p&gt;

&lt;p&gt;Despite being a lightweight command-line utility, Netcat is incredibly useful for developers, system administrators, and cybersecurity practitioners. It allows you to read and write data across TCP or UDP connections, making it perfect for testing and debugging network communication.&lt;/p&gt;

&lt;p&gt;Some practical things you can do with Netcat include:&lt;/p&gt;

&lt;p&gt;• Checking if a port is open&lt;br&gt;
• Testing server connectivity&lt;br&gt;
• Debugging APIs and backend services&lt;br&gt;
• Creating simple client-server communication&lt;br&gt;
• Transferring files across systems&lt;/p&gt;

&lt;p&gt;For example, checking if a server port is open:&lt;/p&gt;

&lt;p&gt;nc -zv example.com 80&lt;/p&gt;

&lt;p&gt;This quickly tells you whether a service is reachable without needing heavier tools.&lt;/p&gt;

&lt;p&gt;What I like about tools like Netcat is that they help developers better understand how systems communicate at the network level, which is essential when building reliable and secure applications.&lt;/p&gt;

&lt;p&gt;As I continue learning more about secure development and system architecture, tools like this remind me that sometimes the simplest utilities provide the most insight.&lt;/p&gt;

&lt;p&gt;Curious to hear from other developers:&lt;/p&gt;

&lt;p&gt;What networking tools do you regularly use when debugging systems?&lt;/p&gt;

</description>
      <category>cli</category>
      <category>networking</category>
      <category>security</category>
      <category>tooling</category>
    </item>
    <item>
      <title>Cybersecurity Is Not Just a Security Team’s Job It’s a Developer’s Responsibility</title>
      <dc:creator>VICTOR KIMUTAI</dc:creator>
      <pubDate>Sat, 14 Mar 2026 08:13:23 +0000</pubDate>
      <link>https://forem.com/vkimutai/cybersecurity-is-not-just-a-security-teams-job-its-a-developers-responsibility-4kda</link>
      <guid>https://forem.com/vkimutai/cybersecurity-is-not-just-a-security-teams-job-its-a-developers-responsibility-4kda</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7hurgm3xf02fy8kway8d.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7hurgm3xf02fy8kway8d.jpg" alt=" " width="541" height="721"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Many developers think cybersecurity begins after the code is written. In reality, security should start the moment you write your first line of code, because every feature we build can either protect users or expose them to risk.&lt;/p&gt;

&lt;p&gt;One of the most common attack vectors is user input, so it is essential to validate and sanitize all inputs to prevent attacks such as SQL injection, cross-site scripting (XSS), and command injection. A simple rule to follow is to treat every input as hostile until it has been properly validated.&lt;/p&gt;

&lt;p&gt;Secrets like API keys, passwords, or tokens should never be stored directly in code. Instead, use environment variables, secret management tools, and rotate keys regularly. Any secret exposed in your Git history should be considered compromised.&lt;/p&gt;

&lt;p&gt;Open-source libraries are extremely useful but can introduce vulnerabilities. It is important to keep dependencies updated, run security scanners like npm audit or pip-audit, monitor security advisories, and remove unused packages.&lt;/p&gt;

&lt;p&gt;Systems and users should operate under the principle of least privilege. Database users should not have administrative access, and APIs should only access the resources they truly need, reducing the potential impact of a compromise.&lt;/p&gt;

&lt;p&gt;Cybersecurity is a continuous process, not a one-time checklist. It requires regular code reviews, security testing, monitoring, logging, and threat modeling. Ultimately, the most secure applications are built by developers who think like attackers.&lt;/p&gt;

&lt;p&gt;Prevention is always cheaper than recovery, so write code, break your own code, and secure your code from the very start.&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>cybersecurity</category>
    </item>
  </channel>
</rss>
