Outcome Oriented Technologist, Sales Engineer, and Cybersecurity Expert
Browse all software and books with search and filtering.
Transform NegaLog from batch analysis into 24/7 production monitoring. NegaLog Watch continuously tails your log files and evaluates rules in real-time, providing immediate detection of missing logs with production-ready state persistence, alert deduplication, and performance-tested reliability.
Traditional log analysis tools search for patterns that exist. NegaLog inverts the paradigm: define what logs should exist, and it reports what's missing. Detect incomplete transactions, monitor scheduled jobs, and verify error handling - all by identifying the absence of expected log entries. Open source CLI tool written in Go with support for sequence detection, periodic monitoring, and conditional absence detection across multiple log files.
A Model Context Protocol server that provides makefile target inspection and execution capabilities for AI assistants.
A cybersecurity CLI tool and Python library for checksumming Model Context Protocol tools and securing your agents against prompt injection attacks.
A Python framework for building safety-critical operations with arbitrary stage pipelines, audit trails, locking, and approval workflows.
A CLI tool that recursively searches through directories to find and remove all emojis from text files. Useful for testing AI-assisted coding tools.
First in a series about operating complex systems without burning out the people who run them. The book introduces a Safety Continuum, a framework for making day-to-day operations safer and more predictable. Our industry has poured effort into uptime and availability but largely ignored the experience of the humans holding everything together at 3AM with brittle, dangerous tools. Safety is not the same thing as availability, and we have been treating it as an afterthought. This volume (and the ones that follow) is about changing that. The tools and practices exist. Operators just need permission to use them.
A generic golang application skeleton providing a foundation for building API servers with web interfaces and command-line tools.
Test your AI-assisted code for missing implementations, TODOs, and other AI generated artifacts
This guidebook covers Stegalographer, the tool, and steganography more broadly. Stegalographer adds watermarks and attribution markers to log files. If your logs already flow through a pipeline, Stegalographer slots into that pipeline and encodes information you can verify later, without disrupting anything visible. Most people think of steganography as hiding messages in images, but the same idea works anywhere you have controllable variation. Distributed infrastructure already produces massive volumes of logs and metrics with natural variation baked in. That variation is a surface you can write on. The security world has spent decades on encryption and availability. Steganography solves a different problem: provenance and attribution. Who produced this data? Has it been tampered with? These questions matter most in democratic and institutional systems, and they are the ones encryption alone cannot answer.
No items match your search criteria.