Anyone who tells you to focus on adoption metrics with no other guidance doesn't care about the customer no matter what they may say to the contrary. When you solve a real problem or pain point that your customer is…
Parody - I'll Make a Dev Out Of You
One thing led to another and after putting the parody lyrics together, it turned into a full blown parody video. It was a lot of fun to put together and I hope you enjoy! Lyrics Let's get to the office…
PDX Touch-n-Go
Despite getting a little stir crazy in self-isolation, a flight was in short order. With traffic at PDX light and an Approach and Tower controller in a good mood, I was cleared for a touch-n-go between a landing UPS and…
After Action Reviews
Development teams that strive to improve the reliability of their code continuously should always perform an After Action Review (AAR) following any incident or unscheduled outage - regardless of whether it causes an impact to the customer. AARs have many…
The Inner Workings of Engineering Design Reviews
If you haven't already read my "Introduction to Engineering Design Reviews [https://lorenzo.aiello.family/engineering-design-reviews]" blog post, you should read that first. -------------------------------------------------------------------------------- The purpose of an Engineering Design Review (EDR) is to make sure that everyone on the…
An Introduction to Engineering Design Reviews
An engineering design review, or EDR, is intended to protect one of the most precious assets a team has: time. EDRs are a way to proactively get ahead of both documentation and system design to ensure that we are building…
Running Laravel on Kubernetes
Running Laravel on Kubernetes should be relatively straightforward for someone comfortable with both components (especially if you've been running Laravel in containers for some time). For better or for worse, I made the leap from Laravel on VMs to Laravel…
End-to-End Encryption with Nginx and Kubernetes
Getting encryption from your end-user to your load balancer with SSL Termination is usually a piece of cake, and for most applications, it's good enough. But how much more effort is it to get complete end-to-end encryption all the way…