At home, however, the transition from your pillow to your computer can be much more jarring. When you’re in your own home, it can be tempting to spend time preparing a nice breakfast and lunch for yourself, chopping and cooking included. how to work from home successfully Don’t use precious minutes making your food the […]
They are generally not useful to a user unless that user is attacking your application. In this blog post, you’ll learn more about handling errors in a way that is useful to you and not to attackers. This includes making sure no sensitive data, such as passwords, access tokens, or any Personally Identifiable Information (PII) […]
Next I brought in Ansible to work as an orchestration engine across the ecosystem. For now I managed to setup a good Jenkins pipeline using nested containers https://remotemode.net/ across many nodes, it was not that hard except few docker quirks. Nasty Asian bots trying to clone content and parasitize on the client’s resources. However, it’s […]