Blog
Technical notes from the intersection of secure systems, AI products, and engineering craft.
Each section starts with one substantial article and is structured so more writing can be added without redesigning the site.
Categories
Choose a reading path.
Security
Threat modeling an API before the first endpoint ships
Authorization boundaries, attacker workflows, telemetry, and test cases for secure backend design.
AIBuilding retrieval systems that fail predictably
Chunking, embeddings, scoring, evals, and guardrails for practical AI application architecture.
Software EngineeringDesigning service boundaries for small teams
How to choose module seams, contracts, database ownership, and deployment boundaries.
CareerHow I think about becoming a stronger engineer
A practical operating system for learning, projects, security depth, and internship readiness.