Keymap of My Split Keyboard
How does a 36-key split keyboard boost productivity? Discover the ergonomic design with QGMLWY layout, thumb-activated layers, and one-handed navigation.
Decoding Digital Anomalies
Sometimes the feature is the bug in the digital rabbit hole, and vice versa
How does a 36-key split keyboard boost productivity? Discover the ergonomic design with QGMLWY layout, thumb-activated layers, and one-handed navigation.
From relational to graph databases - explore the diverse world of data storage systems and learn which database type fits your application's needs.
Discover how Certificate Transparency acts as a public watchdog for HTTPS certificates, preventing fraudulent certificates and making the web safer for everyone through transparent, append-only logs.
Generate professional sequence diagrams effortlessly with ChatGPT and Mermaid, transforming complex system interactions into clear visual documentation.
Tired of accidental key presses? Create your own 3D printed switch blockers for Cherry MX keyboards. Get 40 for $10 from Taobao, or print your own from this free Tinkercad model!
Hit empty tuple errors with feature toggles? Master four solutions: try(), conditional expressions, splat expressions, and for loops to handle empty tuples in Terraform gracefully.
AI isn't replacing jobsāit's creating new ones! Discover emerging roles like Graphics Prompt Engineers and Legal Prompt Engineers. Learn how to become one and what's next.
ChatGPT isn't replacing developersāit's the perfect pair programming partner! Learn the magic question "can you propose better coding?" for meaningful code reviews and refactoring.
From application logs to SIEM - discover how different types of logs work together to keep your systems secure, performant, and compliant. Learn when to use each type and how they form a complete observability strategy.
Explore four architectural patterns for near real-time analytics: Lambda, Kappa, Event-Driven Microservices, and Medallion. Learn when to use each approach and how to implement them effectively.
Multiple applications connecting directly to your databaseāconvenient or catastrophic? Explore why enterprise architects debate this fundamental design decision.
Learn how to use custom validation blocks in Terraform to validate relationships between multiple variables. Ensure your infrastructure configs meet complex requirements. Generated by ChatGPT.
Integrate real-time Hong Kong Observatory weather data into Home Assistant. Monitor temperature, humidity, and wind speed for your local area with ready-to-use sensor configs.
Shift-left moved testing earlier in development. But what comes next? Discover shift-right practices that complete the DevOps cycle with production monitoring, chaos engineering, and continuous learning.
Understand the fundamental differences between git merge and git rebase, learn when to use each approach, and master the techniques that keep your Git history clean and meaningful.
Master semantic versioning to communicate changes clearly and manage dependencies reliably. Learn the MAJOR.MINOR.PATCH format, pre-release identifiers, and how to implement SemVer in your development workflow.
Master Git branching strategies from Git Flow to GitHub Flow, exploring when to use each approach and how to implement them effectively in your development workflow.
Exploring how Site Reliability Engineering has evolved beyond Google's original model, examining modern practices, tools, and the shift toward platform engineering in 2022.
Database backups aren't just SQL dumps. Learn how to design robust database backup strategies that ensure consistency, minimize downtime, and protect against data corruptionābefore disaster strikes.
In Kubernetes, every pod can talk to every other pod by default. For enterprises, that's not securityāthat's a breach waiting to happen. Discover why network policies are your first line of defense.
Backups aren't just about copying files. Learn how to design resilient backup strategies that protect against data loss, ransomware, and disastersābefore you need them.
OAuth 2.0 enables secure delegated access without sharing passwords. Learn how authorization flows work, common pitfalls, and why OAuth is not authentication.
Local Traffic Managers and Global Server Load Balancing form the backbone of high-availability systems. Understand how they work, when to use each, and the trade-offs between complexity and resilience.
Modern credential managers secure passwords, passkeys, and TOTP codes in encrypted vaults. Learn why you need one, how they work, and best practices for self-hosting.