Day 3: Stop Writing Dockerfiles From Scratch7 Days of Docker (2026), by Saloni Narang, Docker Captain & CNCF Ambassador I'm a Docker Captain. I've reviewed many Dockerfiles, and I can tell you that every single Dockerfile tutorial on the interApr 24, 2026·15 min read
What Claude Code's Leaked Source Actually Teaches Us About Building AI AgentsLet me start with the honest version of what happened. Yesterday, Anthropic accidentally published a 59.8 MB source map file inside version 2.1.88 of their @anthropic-ai/claude-code npm package. The bApr 1, 2026·9 min read
The Ingress NGINX Migration Just Got Easier: 119 Annotations, 3 Targets, Impact RatingsA few months ago, I built ing-switch and wrote about it on kubesimplify. The response was incredible -- people loved the annotation mapping and the visual dashboard. Since then, ingress-nginx was offiMar 30, 2026·11 min read
clawspark: Your Private OpenClaw AI Assistant That Never Phones HomeBy Saiyam Pathak OpenClaw has 314,000+ GitHub stars. It is the most popular open-source AI agent out there. It connects to WhatsApp and Telegram, does deep research, manages files, writes code, handlMar 15, 2026·18 min read
Here's What I Learned About Nemotron 3 Super -I Ran a 120B Parameter Model on Nvidia DGX SparkThere’s a moment when you’re watching a model load into memory. The progress bar is filling up to 87 gigabytes and it hits you. You’re about to talk to something that has 120 billion parameters. Not tMar 14, 2026·15 min read
ing-switch: Migrate from Ingress NGINX to Traefik or Gateway API in Minutes, Not DaysIf you run Kubernetes, there's a deadline you can't ignore: Ingress NGINX is being deprecated in March 2026. Roughly half of all Kubernetes clusters depend on it. That's a lot of teams who need a migrFeb 25, 2026·10 min read
Exploiting Metasploitable2 Using msfconsole (Kali Linux Lab)Exploiting Metasploitable2 Using msfconsole (Kali Linux Lab) Introduction msfconsole is the heart of the Metasploit Framework and one of the most powerful tools used by penetration testers to identify, exploit, and validate security vulnerabilities. ...Jan 17, 2026·7 min read