tl:dr; Brainstorm stuff, generate a readme, plan a plan, then execute using LLM codegen. Discrete...
This is the second post in a series explaining how uniqkey.eu does git-driven infrastructure-as-code...
At uniqkey.eu we automatically deploy all of the Kubernetes configuration running our applications on...
Passwords are kryptonite to security so they need to be strong and never reused. Developers agree wit...
Passwords are kryptonite to security and they should never leave the client application or web browse...
In this post, I will give a run down of a youtube video by David Schmitz of anti-patterns and tips to...
Many clients will require me to work on a Windows laptop for access to their networks. Fortunately, I...