The Autonomous Paradox In 2026, we’ve moved past simple chatbots. We are building Production-Grade RAG pipelines and autonomous agents that can plan, execute, and iterate. But as an architect, I’ve noticed a glaring hole in our "Agentic" future: Identity Sprawl. We are giving agents non-human identities (NHI) with "Full Admin" permissions just to ensure the RAG works smoothly. We are effectively
I have two NFC chip implants. One in each hand. I put the one in my left hand in myself, on a Saturday afternoon in January 2024, after spending two or three minutes holding the needle against my skin and slowly working out the exact spot. The one in my right hand I drove an hour out to Worcester for, paid a guy $150, and held still while he did the install in a tattoo and piercing studio. Same te
An opinionated list of Python frameworks, libraries, tools, and resources
Becoming a tech lead was the goal from pretty early in my career. I had a clear picture of what the role was. More responsibility, more influence over the work, more of the interesting problems landing on my desk because someone had to figure them out and that someone, finally, would be me. It read like the natural next step. The thing you graduate to once you're good enough. What that picture did
Modern yazılım geliştirme ekosisteminde altyapının kod olarak yönetilmesi hız ve ölçeklenebilirlik açısından devrim yaratırken GitOps yaklaşımı bu süreci merkezi bir doğruluk kaynağına bağlamaktadır. Ancak tüm yapılandırma detaylarının tek bir platformda toplanması kritik siber güvenlik risklerini de beraberinde getirmektedir. Nesil Teknoloji olarak TSE A Sınıfı sızma testi yetkimizle endüstriyel
What if your Kubernetes cluster simply refused to run unsigned images? I spent some time experimenting with enforcing image provenance in a small Kubernetes setup using MicroK8s. The idea was simple: Only container images with valid cryptographic signatures are allowed to run in the cluster. For this I used: GitLab CI/CD (build + signing pipeline) Cosign / Sigstore (image signing) Kyverno (admissi
Most teams I have worked with have one auth test in their suite. It looks like this: test('valid token verifies', () => { const token = signSync({ sub: 'user-1', aud: 'api://backend' }, secret); const result = verify(token, options); expect(result.valid).toBe(true); }); That test is fine. It is also a smoke test, not a regression suite. It catches the case where verification is completely b