I Got Tired of Debugging Curl at 2 AM, So I Built a CLI
(Tue, 03 Mar 2026)
If your team owns online API endpoints, chances are you — or someone on your on-call rotation — runs curl commands a lot. Curl is a fantastic tool: it's tiny, ubiquitous, and scriptable. But when you're bleary-eyed at 2 AM, it can
be too easy to make mistakes with curl. Which header did I forget this time? Did I remember to URL-encode that JSON field? What was the exact syntax for the
authorization token? And how do I reliably pipe the result from one command into another without mangling it?
Picture this scenario: It's the middle of the night, and an incident has kicked you out of bed. You’re troubleshooting an API issue with curl commands.
First, you need to fetch a user session via a GET request, then use that session ID in a follow-up POST request to revoke the session. In your half-asleep state, you might do something like this:
>> Read More
Network Fundamentals Every Backend Developer Must Know
(Tue, 03 Mar 2026)
You write code that talks to databases, calls external APIs, and serves thousands of users simultaneously. But when something breaks, do you really understand what happens between your
application and the outside world? Most backend developers focus entirely on application logic and forget that their code depends heavily on network infrastructure.
I learned this the hard way three years ago. My REST API worked perfectly in development but failed randomly
in production. Users complained about timeouts and connection errors. I spent days checking my code logic, database queries, and server configurations. The problem turned out to be a simple
network issue that took my senior colleague five minutes to identify. That day taught me something important: understanding networks is not optional for backend developers.
>> Read More
What Actually Breaks During Large-Scale S/4HANA Conversions (And How to Prevent It)
(Tue, 03 Mar 2026)
Broken Custom ABAP Code in S/4HANA
From an engineer’s vantage point, one of the first headaches in a brownfield S/4HANA conversion is custom ABAP code that no longer runs correctly. S/4HANA isn’t a mere upgrade; it introduces a
new architecture with a simplified data model and revised logic. Many classic tables and transactions simply vanish or behave differently. As a
result, existing Z-programs can dump or produce wrong results what worked fine in ECC may outright fail in S/4HANA,
potentially breaking core business processes.
Common breakage patterns include:
>> Read More
Open-Source GitOps at the Edge: Deploying to Thousands of Clusters With Rancher Fleet
(Tue, 03 Mar 2026)
The Edge Deployment Challenge
Modern microservice applications are moving beyond central data centers and the cloud to the edge to provide ultra-low latency and real-time processing.
This enables real-time responsiveness for applications powering autonomous vehicles, remote healthcare, and IoT solutions.
A fundamental operational challenge exists when you attempt to deploy code to distributed edge computing environments. Each time that you are
deploying code to containerized workloads at thousands of different edge locations, it will require coordination across unreliable networks, heterogeneous hardware, and edge locations with
no technical staff available to correct failed deployments.
>> Read More
DevOps Cafe Ep 79 - Guests: Joseph Jacks and Ben Kehoe
(Mon, 13 Aug 2018)
Triggered by Google Next 2018, John and Damon chat with Joseph Jacks (stealth startup) and Ben Kehoe (iRobot) about their public disagreements — and agreements — about Kubernetes and
Serverless.
>> Read More
DevOps Cafe Ep 78 - Guest: J. Paul Reed
(Mon, 23 Jul 2018)
John and Damon chat with J.Paul Reed (Release Engineering Approaches) about the field of Systems Safety and Human Factors that studies why accidents happen and how to minimize the occurrence and
impact.
Show notes at http://devopscafe.org
>> Read More
DevOps Cafe Ep. 77 - Damon interviews John
(Wed, 20 Jun 2018)
A new season of DevOps Cafe is here. The topic of this episode is "DevSecOps." Damon interviews John about what this term means, why it matters now, and the overall state of security.
Show notes at http://devopscafe.org
>> Read More