Forem

# devops

Content centering around the shifting left of responsibility, deconstruction of responsibility silos, and the automation of repetitive work tasks.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Telegram vs Email for Cron Alerts, and When Webhooks Are Better

Telegram vs Email for Cron Alerts, and When Webhooks Are Better

Comments
3 min read
🚨 S3 Ransomware Response — What to Do in the First Critical Minutes

🚨 S3 Ransomware Response — What to Do in the First Critical Minutes

Comments
6 min read
🚀 From Frustration to Production: Deploying a Full-Stack App with Terraform & Ansible on AWS
Cover image for 🚀 From Frustration to Production: Deploying a Full-Stack App with Terraform & Ansible on AWS

🚀 From Frustration to Production: Deploying a Full-Stack App with Terraform & Ansible on AWS

Comments
3 min read
Running HIPAA-Compliant Workloads in the Cloud: An Infrastructure Engineer's Guide

Running HIPAA-Compliant Workloads in the Cloud: An Infrastructure Engineer's Guide

Comments
5 min read
Why SNMP Monitoring Misses Most Network Problems — And What to Use Instead

Why SNMP Monitoring Misses Most Network Problems — And What to Use Instead

Comments
7 min read
AI made your team code faster. Everything after is still broken.
Cover image for AI made your team code faster. Everything after is still broken.

AI made your team code faster. Everything after is still broken.

5
Comments
4 min read
Assessing the feasibility of developing your own PDM system.

Assessing the feasibility of developing your own PDM system.

Comments
1 min read
[EN] Best Practices for Managing Secrets in Kubernetes

[EN] Best Practices for Managing Secrets in Kubernetes

1
Comments
4 min read
Part 14 - Cloud Deployment and Lessons Learned ☁️

Part 14 - Cloud Deployment and Lessons Learned ☁️

Comments
2 min read
Stop Paying OpenAI to Read Garbage: The Two-Stage Agent Pipeline

Stop Paying OpenAI to Read Garbage: The Two-Stage Agent Pipeline

1
Comments
3 min read
服务网格深度指南:微服务通信的可观测与安全基石

服务网格深度指南:微服务通信的可观测与安全基石

Comments
1 min read
No Application Is Unhackable But Most Developers Are Making It Way Too Easy for Attackers
Cover image for No Application Is Unhackable But Most Developers Are Making It Way Too Easy for Attackers

No Application Is Unhackable But Most Developers Are Making It Way Too Easy for Attackers

Comments
7 min read
Smart LLM Routing in Production: Picking the Optimal Model per Request
Cover image for Smart LLM Routing in Production: Picking the Optimal Model per Request

Smart LLM Routing in Production: Picking the Optimal Model per Request

Comments
7 min read
I Stopped Using Claude Code 'Correctly' and Got 3 Faster

I Stopped Using Claude Code 'Correctly' and Got 3 Faster

Comments
7 min read
Hackers Love Lazy Developers — 19 Security Mistakes You’re Making Right Now
Cover image for Hackers Love Lazy Developers — 19 Security Mistakes You’re Making Right Now

Hackers Love Lazy Developers — 19 Security Mistakes You’re Making Right Now

Comments
13 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.