Cards
- Good security is invisible — its consequences only show when it fails. Good architecture at least…
- AI can replace the qualification, knowledge, and tools needed for secure development. But it cannot…
- Anthropic's Project Glasswing: a coalition of 12 companies using Claude Mythos Preview — an…
- AI may enable a form of probabilistic verification — not the 100% guarantee of formal methods, but…
- Between a capability being disclosed and being accessible to defenders, there is a vulnerability…
- A record of problems solved — class of problem, method applied, outcome — is both a reflective…
- Solution methods are the most volatile layer of any practice. Treating yesterday's method as…
- Problem formulation is the irreducibly human act: a machine can propose candidate framings, but…
- Problems outlast every tool built to address them. In a period of rapid technological churn,…
- The selection criterion for what to study is not "is this interesting?" but "what problem does this…
- Everyone is becoming a founder — not of a startup, but of an agent team. You architect,…
- A job interview is not an examination — it is a B2B sale. The candidate is a vendor pitching…
- Technical competence is necessary but no longer sufficient. The market rewards those who can both…
- Karpathy's loop — ingest, compile, query — compounds one person's knowledge. Opening the loop to…
- The value of a knowledge base is proportional to the surface area it exposes. A private wiki…
- Employment and entrepreneurship are the same transaction. Employment is wholesale — long-term…
- Managing device fleets manually does not scale — configurations drift, changes are unauditable, and…
- Text dimensions were a side effect of rendering — to know them, you had to render. Pretext makes…
- ISA defines dead band formally: the range through which an input may vary without initiating an…
- In control theory this is called dead band — the comparator ignores errors below a threshold. Every…