The fact that we're slowly removing the apprenticeship layer and passing it off as "productivity gains" should be far more alarming. Just imagine. The kind of work that is best suited for AI, such as boilerplate code, simple CRUD endpoints, and basic component wiring, is actually similar to the work that helps in training junior developers. It was not that we were working on those tasks because th
What if your Kubernetes cluster simply refused to run unsigned images? I spent some time experimenting with enforcing image provenance in a small Kubernetes setup using MicroK8s. The idea was simple: Only container images with valid cryptographic signatures are allowed to run in the cluster. For this I used: GitLab CI/CD (build + signing pipeline) Cosign / Sigstore (image signing) Kyverno (admissi
Applicant Tracking Systems used to be boring. For most of the 2010s, an ATS was essentially a database with a careers page bolted on top: a place to dump resumes, push them through a pipeline of stages, and email rejections in bulk. The interesting work happened around it, not inside it. That has shifted in the last two years, and the shift is deeper than the marketing pages suggest. I have spent
Most teams I have worked with have one auth test in their suite. It looks like this: test('valid token verifies', () => { const token = signSync({ sub: 'user-1', aud: 'api://backend' }, secret); const result = verify(token, options); expect(result.valid).toBe(true); }); That test is fine. It is also a smoke test, not a regression suite. It catches the case where verification is completely b
The on-call alert at 02:14 said auth_5xx_rate spiked from 0.01 to 31.4. Not a deploy window. Not a traffic spike. Just thirty-one percent of authenticated requests failing for ~four minutes, then back to baseline. The cause was a JWKS rotation on the issuer side. New keys came in. Old keys went out. Caches in our service didn't refresh fast enough. Tokens signed with the new key were rejected beca