-
RAG: A (mostly) no-buzzword explanation

Retrieval-Augmented Generation (RAG) is a pattern that fixes the knowledge cutoff and hallucination problems by giving an LLM access to the right data at answer time. Instead of asking the model to “remember everything”, RAG lets it look things up first, then answer.
-
When speed becomes strategy 💨

Startups thrive on speed and hustle. But when everything feels urgent, how can you tell what actually matters?
-
A pint with Jimothy: on fear, ego, and hiring smarter

☕️ We started with coffee, like most chats do. Black for me, cappuccino for Jimothy (he actually prefers Jim, or James). Corner terrace, Singelgracht. One of those confusing Amsterdam afternoons where the sky can’t decide − sunlight breaks through the clouds, then ducks back behind them. Just long enough to let a few leaves blow
-
When Slack starts to feel like a DDoS attack

In software engineering, we often rely on “exponential back-off” when retrying failed network requests − a technique where each subsequent attempt is spaced out further in time to avoid overloading the system. Oddly enough, I’ve found myself applying a similar concept to human communication. As a Engineering lead, I’m frequently on the receiving end of
-
Unikernels, without the marketing

It all started when I saw Prisma put “serverless” and “no cold starts” in the same sentence describing their “Prisma Postgres” product 🤔
-
Solving the Openfire Lab Blue team challenge

As a cybersecurity analyst, you are tasked with investigating a data breach targeting your organization’s Openfire messaging server. Attackers have exploited a vulnerability in the server, compromising sensitive communications and potentially exposing critical data.
-
Solving the ShadowCitadel Lab Blue team challenge

Today, we dive into a host-based forensics investigation − a curious case of a breach inside the enterprise environment of a company called TechSynergy. They have detected an anomaly after an employee engaged with an unexpected email attachment. This triggered a series of covert operations within the network, including unusual account activity and system alterations.
Looking for more posts?
For contact options, head to About and Contact