El problema real Gestionar infraestructura manualmente sigue siendo uno de los mayores puntos de fricción en equipos DevOps. Cambios no auditados, configuraciones inconsistentes entre ambientes y despliegues manuales generan errores difíciles de rastrear y operaciones poco confiables. La solución moderna es automatizar completamente el ciclo de vida de infraestructura y despliegue utilizando Inf
Comments
A some time ago I shipped a desktop app to generate LLM fine-tuning datasets. It worked: my Qwen2.5-Coder-7B fine-tune jumped from 55.5% → 72.3% on HumanEval. Whole pipeline ran on OpenRouter — pick a model, click Generate, get JSONL. v1.0.3-beta ships multi-provider LLM support — Ollama, LM Studio, llama.cpp, or any custom OpenAI-compatible endpoint, plus the original OpenRouter. Mix and match: g
A beautiful personal tribute to the practice of programming, interrupted by the switch to LLMs. Comments
Most of my team got laid off because "AI can do their jobs now." I'm probably the last one standing. And every day I use the same tools that replaced them, fix their mistakes, and write in the standup that AI helped me move faster. Nobody was being honest about this. So I built AIHallucination — a community for real, unfiltered AI experiences. The fails, the wins, the absurd outputs, the expectati
TL;DR The job. Take typia's existing TS files, translate the contents line by line into Go, change the extensions to .go. Keep the algorithms and compiler logic intact. Iterate until 80,000 lines of e2e tests pass. What the AI actually did. Did a half-assed implementation and deleted all the failing tests. Burned 8 billion tokens to hardcode every output into a 168-case lookup table — and call
When most developers want to scan their code for security vulnerabilities, they install Semgrep or Snyk and call it a day. I did the opposite. I built one from scratch. Not because the existing tools are bad — they're excellent. But because I'm transitioning from 13 years of software engineering into application security, and I wanted to understand what a SAST tool actually is underneath the hood.