AWS KMS XKS Without an HSM: Threshold Cryptography Across Cloud Providers
In a previous post, I backed AWS KMS with a SoftHSM on my local machine via an SSH tunnel, based on the AWS XKS proxy sample. It proved the concept: the encr...
In a previous post, I backed AWS KMS with a SoftHSM on my local machine via an SSH tunnel, based on the AWS XKS proxy sample. It proved the concept: the encr...
A proof of concept demonstrating AWS KMS encryption backed by a local SoftHSM key, using the XKS Proxy API. The cryptographic master key lives on a machine I...
A RAG chatbot for personal notes using S3 Vectors and Bedrock Agents. Features true multi-agent collaboration with critique-driven feedback loop and multi-tu...
The Resume Problem
In my previous post about building a Local Knowledge Base MCP Server, I landed on Fusion RAG (BM25 + Vector) as the winning pattern. It caught both keywords ...
The classic Spring PetClinic is everyone’s first Spring app. Simple, clean, easy to follow. But as codebases grow it might turn differently. Business logic s...
After reading Accelerate by Nicole Forsgren, Jez Humble, and Gene Kim, I started rethinking what CD actually means. For years, I worked in environments where...
One of the most common misconceptions in AI engineering is that you always need a Python runtime to execute models.
After the python version, I wanted to verify if you can build a Retrieval-Augmented Generation (RAG) system from scratch in Java.
Spoiler Alert: It depends…
Building a Local Knowledge Base MCP Server: When Your Documentation Won’t Fit in Context
My mind is constantly running, and it’s a form of cognitive offloading to put these ideas down, almost like placing them in a mental drawer that I can come b...