I was out walking with my dog Dexter, daydreaming on the first properly warm day of the year. I was lost in my own mind mulling over a conversation I'd had with a fellow Game Developer about how we've adapted to the use of AI as software engineers. None of the existing labels fit. "Vibe coding", Karpathy's term, elicits a culture of care-free one-shotting with little to no regard for the code qual
Generative AI is no longer just an emerging technology. It is becoming a core business capability across software development, customer support, analytics, content generation, automation, knowledge management, and enterprise productivity. For cloud professionals, developers, data teams, and solution architects, learning Generative AI on AWS is now a high-value career move. AWS provides a growing e
Most "self-hosting" articles are basically a list of Docker Compose files. They tell you what to run. They don't tell you why the smart money is moving away from managed cloud services — or what a real production stack looks like when you do it right. The shift isn't about being cheap. It's about control. Your data. Your pipeline. Your infra. No vendor lock-in, no surprise pricing changes, no term
The Model Context Protocol has transformed how we connect AI to tools. But connecting agents to tools is only half the battle — connecting agents to each other is where the real challenge begins. I recently read @raviteja_nekkalapu_'s excellent article "I built an AI security Firewall and made it open source because production apps were leaking SSNs to OpenAI" and it resonated deeply with challeng
A deeply-synthesized, opinionated reference distilled from five canonical sources: donnemartin/system-design-primer · ByteByteGoHq/system-design-101 · karanpratapsingh/system-design · ashishps1/awesome-system-design-resources · binhnguyennus/awesome-scalability Use it as: a study guide for interviews, a checklist for design reviews, and a vocabulary for cross-team discussions. 📖 How to Use This
Your requests may look like a real browser, but they’re still getting blocked. Even when requests include realistic headers, they can still be detected if HTTP/2 behavior, such as header ordering, pseudo-header structure, and frame sequencing, does not match real browsers. These low-level inconsistencies reduce stability and reliability, making automated traffic easier to identify. In HTTP/2, head
Technical Beauty — Episode 34 Open the sudo CHANGELOG and search for the word "security". Make a cup of tea first. The list is rather long for a tool whose entire job is to ask three questions: who are you, what would you like to run, and may you. In July 2015, Ted Unangst grew tired of negotiating with the sudo configuration on OpenBSD and wrote his own. He called it doas: dedicated OpenBSD appli
Vendredi matin, 9 h 15. Françoise est dans son cockpit — trois écrans, à gauche l'Excel-pointeuse qu'elle tient à jour depuis quinze ans, à droite Sage, et au milieu Rembrandt depuis trois semaines. Sa tasse à la main, celle avec sa tête imprimée dessus que quelqu'un lui a offerte à Noël. Elle pivote sur sa chaise et me lance depuis son bureau : « Michel, combien on a d'inscrits pour la rentrée, d