Prologue A while ago, I decided to develop a fully accessible main navigation component in React after a fruitless search through third-party component libraries, npm packages and even GitHub repositories. A complex component needs requirements around all aspects of the component, and this article begins the process of defining those requirements. Note: This article is one of a series demonstrat
I have used AI in two very different contexts. First, I used AI to build an OSS project largely by myself. Second, I applied AI to brownfield development inside an organization. In the second case, I did not use AI only for code generation. I used AI across a much wider part of the development process: source code design documents implementation plans test specifications test cases release procedu
Metric Value Django Average Response Time 287ms Node.js Average Response Time 193ms Django Memory Usage (1000 users) 1.8GB We tested Django 4.2 and Node.js 18.16 under identical conditions to measure their performance for reporting dashboard workloads. The test environment consisted of AWS EC2 m5.2xlarge instances (8 vCPUs, 32GB RAM) running Ubuntu 22.04. Both frameworks connected to th
They call me a Support Tech, but I see myself as a Value Architect. I don’t just "install apps"—I engineer the logic that makes them deploy at scale. Recently, my flow was interrupted when our MDT image decided to stop cooperating. What should have been a routine laptop setup quickly turned into a high-stakes deep dive into systems integrity and deployment architecture. The Glitch: The Logic Break
Generative AI is no longer just an emerging technology. It is becoming a core business capability across software development, customer support, analytics, content generation, automation, knowledge management, and enterprise productivity. For cloud professionals, developers, data teams, and solution architects, learning Generative AI on AWS is now a high-value career move. AWS provides a growing e
The Model Context Protocol has transformed how we connect AI to tools. But connecting agents to tools is only half the battle — connecting agents to each other is where the real challenge begins. I recently read @raviteja_nekkalapu_'s excellent article "I built an AI security Firewall and made it open source because production apps were leaking SSNs to OpenAI" and it resonated deeply with challeng
A deeply-synthesized, opinionated reference distilled from five canonical sources: donnemartin/system-design-primer · ByteByteGoHq/system-design-101 · karanpratapsingh/system-design · ashishps1/awesome-system-design-resources · binhnguyennus/awesome-scalability Use it as: a study guide for interviews, a checklist for design reviews, and a vocabulary for cross-team discussions. 📖 How to Use This
Technical Beauty — Episode 34 Open the sudo CHANGELOG and search for the word "security". Make a cup of tea first. The list is rather long for a tool whose entire job is to ask three questions: who are you, what would you like to run, and may you. In July 2015, Ted Unangst grew tired of negotiating with the sudo configuration on OpenBSD and wrote his own. He called it doas: dedicated OpenBSD appli