Beyond the OWASP Top 10: How to identify security vulnerabilities in your code
We have all shipped code to production that passed every check. The PR gets approved, the build goes to production,…
We have all shipped code to production that passed every check. The PR gets approved, the build goes to production,…
New platform teams often get their first metrics wrong. They build dashboards with things like CPU usage, memory, and number…
The most dangerous systems in an organization are often the ones no one complains about. They sit there, processing transactions…
Raw counts can be misleading. If one repo changes 10 million lines and another changes 200k, the first will almost…
The initial productivity gains from AI code assistants are starting to come with a cost. The speed is undeniable. You…
The question of whether engineers will be replaced by AI is not new, but this time it feels different. Previous…
Technical debt is part of the game in software development. Ignoring it, however, turns a calculated shortcut into a bottleneck…
You receive a pull request coming from an AI. The code looks clean, follows the prompt, and all unit tests…
The collection of scripts, manual configurations, and unwritten rules that helped your company get started will eventually begin to hold…