
Similar Posts
That $47K AWS Bill? Yeah, It Should Be $8K
ByAdilAfter my own expensive lesson, I started obsessively tracking these patterns everywhere. Here are 5 real cases I’ve analyzed—and the debugging steps that could have prevented each one. Two years ago, a $200 AWS surprise nearly ended my tech journey as a student in Lagos. That painful lesson turned into obsessive cost optimization research. Now…
Maintaining Arch Linux AUR Packages: A Dual Update for Python-zconfig and Python-reparser
ByAdilIt’s that time again! As a maintainer of several packages on the Arch Linux User Repository (AUR), keeping my packages up-to-date is a key part of my routine. Today, I’m excited to share that I’ve successfully pushed updates for two more of my Python-based packages: python-zconfig and python-reparser. This post details the update process for…
Kubernetes: Kubernetes API, API groups, CRDs, and the etcd
ByAdilI actually started to write about creating my own Kubernetes Operator, but decided to make a separate topic about what a Kubernetes CustomResourceDefinition is, and how creating a CRD works at the level of the Kubernetes API and the etcd. That is, to start with how Kubernetes actually works with resources, and what happens when…
LG brings Xbox to cars –but you’ll sadly have to put up with Zoom calls too
ByAdilLG will expand its webOS offering in vehicles, with delivery of the Xbox and Zoom apps. 🎬 Watch the Video
South Korean startup, which walked away from Meta’s $800M acquisition bid, partnered with OpenAI to demonstrate the future of sustainable enterprise AI without GPUs
ByAdilFuriosaAI, which rejected Meta’s $800 million buyout offer, presented new sustainable AI demo with OpenAI in Seoul. 🎬 Watch the Video
Here’s what ISO 27001 Is – and Why You Should Care About Your Data Security
ByAdilSo, you want to keep your data safe and steer clear of expensive mistakes? Understanding ISO 27001 is honestly a pretty smart move. ISO 27001 is an international standard that helps you protect your sensitive information from cyber threats and internal slip-ups. It lays out clear rules for managing security risks, which helps you build…