Why Jujutsu (jj) Is Perfect for AI-Generated Code
If you're using AI to write code, you need better version control. Git wasn't designed for the iterative, experimental nature of AI-assisted development. Jujutsu is. The Problem: Git Fights AI
Architecting Secure Software | Building with Rust | Automating LLM Flows | Embedded Future
If you're using AI to write code, you need better version control. Git wasn't designed for the iterative, experimental nature of AI-assisted development. Jujutsu is. The Problem: Git Fights AI
last update: 03/2025This catalog covers the essential known tools and platforms that AI engineers use to optimize workflows, accelerate development, and streamline ML operations. From fine-tuning optimization platforms like
Associative thinking creates webs instead of ladders
Infrastructure SecurityYour team needs to provide access to a Linux instance shell using AWS Systems Manager Session Manager. The instance does not have Internet access. What is the minimum configuration
This week I was asked a really fundamental question and I totally flunked. I didn't grasp its importance and here is my attempt to correct that mistake: What advice would
ChallengesTraditional tools aren't fit to secure containers (and kubernetes): too heavy handed such, e.g., EDR, vulnerability scanners, hostbased firewalls, network forensics, security analytics.Alternative dedicated lightweight tools are being
Cloud security posture managementWhat is it?Cloud security posture management validates your configuration in cloud environments (usually public clouds), it includes but not limited to: Auditing and monitoring of cloud
from Darwin to MungerWisdom seeker makes an attempt to understand how the likes of naturalist Charles Darwin and super investor Charles Munger have achieved incredible clear thinking and the ideas
2020Zero Trust: An AWS perspective – Quint Van DemanTen easy and effective ways to secure your AWS environment – Becky WeissSecurity best practices the AWS Well-Architected way – Ben Potter2019CI/CD for serverless
AWS Well-Architected FrameworkDesign PrinciplesAWS...Cost OptimizationCost OptimizationPerformance EfficiencyPerformance Effi...OperationalExcellenceOperational...SecuritySecurityReliabilityReliabilityPerform OperationsAs CodePerform Operations...Annotate Documentation Annotate Documen...Make Frequent, Small Reversible ChangesMake Frequent, S...Refine Operations Procedures FrequentlyRefine Operations
Intro[TK] Reports Snyk - State of Cloud Native Application SecurityCloud Native Application Security Report | SnykNew research reveals 60% of organizations have increased security concerns since adopting cloud native. Read
I took the daily stoic challenge this summer. It is a 10-day program developed by author Ryan Holiday that will encourage you to implement ideas from the stoics into your