Feeling overwhelmed by AI? Learn the Centaur Mindset. Read More
A balance scale weighing AI speed against human verification

When to Trust (and Verify) AI Output

This is Part 3 of “The Centaur’s Toolkit” series. We’ve covered AI pair programming fundamentals and building AI-assisted security tools. Now we tackle the hardest skill: knowing when to trust what AI tells you. Last week, I asked an AI to help me understand a library I’d never used. It gave me a confident, detailed explanation of the validateSchema() method, complete with parameter descriptions and example usage. The method doesn’t exist. The AI invented it. The explanation was coherent, the examples looked plausible, and if I hadn’t tried to actually use the code, I might have wasted hours debugging a function call to something that was never real. ...

January 16, 2026 · 10 min · Scott Algatt
A security operations center with AI-assisted threat detection visualization

Building AI-Assisted Security Tools

This is Part 2 of “The Centaur’s Toolkit” series. In Part 1, we covered the four collaboration modes for AI pair programming. Now we apply that framework to higher-stakes territory: security. You’ve embraced AI pair programming. You’re using Strategist mode for architecture, Editor mode for refinement, and you feel like a genuine Centaur. Then your manager asks you to build a security tool. Suddenly, the stakes feel different. In regular coding, an AI-suggested bug might waste a few hours of debugging. In security, an AI-suggested bug might become a vulnerability that sits in production for months. The cost of being wrong isn’t just time. It’s trust, data, and potentially your users’ safety. ...

January 9, 2026 · 10 min · Scott Algatt
A developer collaborating with AI, represented as a centaur at a computer

AI Pair Programming: Beyond Code Completion

This is Part 1 of “The Centaur’s Toolkit” series, where we explore practical strategies for human-AI collaboration in technical work. You’ve been using GitHub Copilot for six months. Or maybe it’s Claude, ChatGPT, or Cursor. The tab key has become your best friend. Boilerplate code that used to take twenty minutes now takes two. You feel faster. More productive. Like a coding superhero. But lately, something feels off. You catch yourself accepting suggestions without really reading them. You accept a function completion and realize you’re not entirely sure what it does. Yesterday, you spent an hour debugging code that the AI wrote, code you wouldn’t have written that way yourself. ...

January 2, 2026 · 10 min · Scott Algatt

Using AI to Analyze Log Files for Security Threats

Research-Based Guide: This post synthesizes techniques from security research, documentation, and established practices in AI-powered log analysis. Code examples are provided for educational purposes and should be tested in your specific environment before production use. The Log Analysis Challenge Modern systems generate massive amounts of log data. A typical web server might produce thousands of log entries per hour, while enterprise infrastructure can generate millions of events daily. Traditional log analysis approaches—grep commands, regex patterns, and manual review—simply don’t scale. ...

November 9, 2025 · 8 min · Scott

Understanding the Implications of Open-Sourcing AI Models

Understanding the Implications of Open-Sourcing AI Models Note: This analysis is based on public releases of open-source AI models (Meta’s Llama 2/3, Mistral AI, Stability AI, xAI’s Grok), research from AI governance organizations, and documented licensing frameworks. The landscape evolves rapidly - verify licensing terms and model capabilities from official sources. The open-sourcing of large language models and diffusion models represents a fundamental shift in AI development. Meta’s Llama 2 release (July 2023), Mistral’s series of open models, and subsequent releases have sparked debate about innovation velocity, safety considerations, and competitive dynamics. According to research from Stanford’s HAI, open-source models have enabled thousands of derivative applications while raising concerns about misuse potential and intellectual property frameworks. ...

August 26, 2025 · 10 min · Scott