I decided that I was spending too much time writing instructions in random Google docs, text files, and GitHub repos. I wanted to have a single location that I could use as a way to publicly document all the things that I tinker with:

  • Kubernetes
  • Docker (who doesnt?)
  • Splunk
  • Raspberry Pi
  • Random tech integrations (this list could go on forever)

With all of that, I felt that it was time to put it all into a blog. As I travel through life building these random things, I intend to document them here and link to any files, repos, or websites that I have created myself or used along the way.

Enjoy!

*Title: Advanced AI-Driven Network Traffic Analysis for Threat Detection

Advanced AI-Driven Network Traffic Analysis for Threat Detection Section 1: Introduction to Advanced AI-Driven Network Traffic Analysis for Threat Detection As the complexity and volume of network traffic continue to grow, so does the challenge of detecting and mitigating threats in real-time. Traditional security measures, such as firewalls and intrusion detection systems, are no longer sufficient to protect against sophisticated attacks. This is where Advanced AI-Driven Network Traffic Analysis comes into play, leveraging the power of artificial intelligence and machine learning to identify and respond to threats more effectively. ...

July 16, 2025 · 9 min · Scott

DevSecOps: Bridging Security and Operations in Modern Development

Introduction to DevSecOps: Bridging the Gap Between Development, Security, and Operations The integration of security practices within the DevOps lifecycle, known as DevSecOps, is crucial for developing secure, reliable, and high-quality software products. DevSecOps bridges the gap between development, security, and operations teams, fostering a culture of collaboration and automation. This approach ensures that security is not an afterthought but an integral part of the software development lifecycle. Understanding the DevOps Lifecycle and Where Security Fits In The DevOps lifecycle encompasses several stages, including planning, coding, building, testing, releasing, deploying, monitoring, and feedback. Security should be integrated into each stage to ensure comprehensive protection. ...

July 15, 2025 · 4 min · Scott

Optimized Blog Post Title

Unfortunately, without the focus area or key research information, I can only provide a general template for the blog post. Please provide the necessary details to create a more tailored and detailed outline. However, here is a general template that you can modify to fit your needs: Introduction to [Focus Area] [Focus Area] is a critical concept in the field of [related field], with a rich history dating back to [time period]. In this blog post, we will delve into the definition, history, and importance of [Focus Area], providing a comprehensive understanding of its significance in the industry. ...

July 13, 2025 · 4 min · Scott

2. A Deep Dive into Google's Gemini CLI: Local AI Model Execution

A Deep Dive into Google’s Gemini CLI: Local AI Model Execution Introduction Google’s Gemini CLI is a powerful, open-source AI agent designed to bring Google’s Gemini models directly into the terminal. This tool allows developers to interact with advanced AI models through natural language prompts, enabling a wide range of tasks beyond traditional coding. In this article, we’ll delve into the features, capabilities, and applications of Gemini CLI, exploring its potential to revolutionize developer productivity and democratize AI. ...

July 1, 2025 · 3 min · Scott

*2. Deep Dive into Passkey Logins: Security Analysis and Implementation

Deep Dive into Passkey Logins: Security Analysis and Implementation Introduction Password-based authentication is a cornerstone in the sphere of authentication and authorization, despite its security challenges. The human factor is often the weakest link in security chains, and users frequently compromise security mechanisms. A shift in focus towards efficient user-centric mechanisms, protocols, and frameworks is necessary to balance security and usability. Passkeys have emerged as a key technology to resolve this tension, offering a secure, seamless, and modern authentication experience. ...

June 24, 2025 · 3 min · Scott