Posts
All the articles I've posted.
-
Safe remediation sandboxes for tool-using models
Technical deep dive into Safe remediation sandboxes for tool-using models
-
Designing a tool-callable incident replay harness
Technical deep dive into Designing a tool-callable incident replay harness
-
Designing Evidence Graphs for Network Diagnostic Agents
Technical deep dive into Designing Evidence Graphs for Network Diagnostic Agents
-
From raw CLI to stable entity graphs
Technical deep dive into From raw CLI to stable entity graphs
-
TextFSM, parsers, and LLMs on the same CLI mess
Technical deep dive into TextFSM, parsers, and LLMs on the same CLI mess
-
From flood and learn to proxy resolution
Technical deep dive into From flood and learn to proxy resolution
-
When a hidden bridge loop outruns storm control
Technical deep dive into When a hidden bridge loop outruns storm control
-
Why only large DNS answers fail behind policy
Technical deep dive into Why only large DNS answers fail behind policy
-
Pod to CoreDNS packet walk that explains silent lookup failure
Technical deep dive into Pod to CoreDNS packet walk that explains silent lookup failure
-
Walking a SYN through every stall point
Technical deep dive into Walking a SYN through every stall point