Join us

ContentUpdates and recent posts about GPT-5.3-Codex..
Link
@varbear shared a link, 2 months, 3 weeks ago
FAUN.dev()

The challenges of soft delete

"Soft delete" sounds gentle. It isn't. Slapping adeleted_atcolumn on every table pollutes queries, drags down migrations, and leaves tombstones all over production. This post digs into saner options:PostgreSQL triggers,event archiving in the app layer, andCDC via WAL. Each separates the dead stuff f.. read more  

Link
@varbear shared a link, 2 months, 3 weeks ago
FAUN.dev()

How I Taught GitHub Copilot Code Review to Think Like a Maintainer

Vibe coding has made contributing to open source easier, but the high number of contributions to the AI agent framework goose has posed a challenge. An AI Code Review agent like Copilot can help review PRs, but tuning its feedback is crucial for reducing noise and increasing value. By providing clea.. read more  

Link
@kaptain shared a link, 2 months, 3 weeks ago
FAUN.dev()

Experimenting with Gateway API using kind

A new guide shows how to runGateway APIlocally withkindandcloud-provider-kind. It spins up a one-node Kubernetes cluster in Docker - complete with LoadBalancer Services and a Gateway API controller. Cloud vibes, zero cloud bill. Fire it up to deploy demo apps, test routing, or poke around with CRD e.. read more  

Link
@kaptain shared a link, 2 months, 3 weeks ago
FAUN.dev()

Cluster API v1.12: Introducing In-place Updates and Chained Upgrades

Cluster API v1.12.0 addsin-place updatesandchained upgrades, so machines can swap parts without going down, and clusters can jump versions without drama. KubeadmControlPlaneandMachineDeploymentsnow choose between full rollouts or surgical patching, depending on what changed. The goal: keep clusters .. read more  

Link
@kaptain shared a link, 2 months, 3 weeks ago
FAUN.dev()

Ingress NGINX: Statement from the Steering and Security Response Committees

Kubernetes is cutting offIngress NGINXin March 2026. No more updates. No bug fixes. No security patches. Done. Roughly half of cloud-native setups still rely on it, but it's been understaffed for years. If you're one of them, it's time to move. There’s no plug-and-play replacement, but the ecosystem.. read more  

Link
@kaptain shared a link, 2 months, 3 weeks ago
FAUN.dev()

Run a Private Personal AI with Clawdbot + DMR

Clawdbot just plugged intoDocker Model Runner (DMR). That means you can now run your own OpenAI-compatible assistant, locally, on your hardware. No cloud. No per-token fees. No data leaking into the void!.. read more  

Run a Private Personal AI with Clawdbot + DMR
Link
@kaptain shared a link, 2 months, 3 weeks ago
FAUN.dev()

New Conversion from cgroup v1 CPU Shares to v2 CPU Weight

A new quadratic formula now mapscgroup v1 CPU sharestocgroup v2 CPU weight. Why? Because the old linear approach messed with CPU fairness; especially at low share values. This fix nails prioritization where it counts. It lands at theOCI runtime layer, live inrunc v1.3.2andcrun v1.23, so containers f.. read more  

Link
@kala shared a link, 2 months, 3 weeks ago
FAUN.dev()

AWS Frontier Agents: Kiro, DevOps Agent, and Security Agent

“Frontier Agents” drop straight into incident workflows. They kick off investigations on their own, whether triggered by alarms or a human hand, pulling together logs, metrics, and deployment context fast. Findings show up where they’re needed: Slack threads, tickets, operator dashboards. No shell c.. read more  

AWS Frontier Agents: Kiro, DevOps Agent, and Security Agent
Link
@kala shared a link, 2 months, 3 weeks ago
FAUN.dev()

Securing Agents in Production (Agentic Runtime, #1)

Palantir's AIP Agentic Runtime isn't just another agent platform, it's a control plane with teeth. Think tight policy enforcement, ephemeral autoscaling with Kubernetes (Rubix), and memory stitched in from the jump viaOntology. Tool usage? Traced and locked down with provenance-based security. Every.. read more  

Securing Agents in Production (Agentic Runtime, #1)
Link
@kala shared a link, 2 months, 3 weeks ago
FAUN.dev()

Is that allowed? Authentication and authorization in Model Context Protocol

TheModel Context Protocol (MCP) 2025-11-25spec tightens up remote agent auth. It leans intoOAuth 2.1 Authorization Code grants, PKCE required, step-up auth backed. No token passthrough allowed. What’s new: experimental extensions forclient credentialsandclient ID metadata. These smooth out agent reg.. read more  

Is that allowed? Authentication and authorization in Model Context Protocol
GPT-5.3-Codex is OpenAI’s advanced agentic coding model, designed to go beyond writing code and operate as a general-purpose collaborator on a computer. It builds on GPT-5.2-Codex by combining stronger coding performance with improved reasoning and professional knowledge, while running about 25% faster. The model is optimized for long-running tasks that involve research, tool use, and complex execution, and it performs at the top of industry benchmarks such as SWE-Bench Pro and Terminal-Bench.

Unlike earlier Codex models that focused primarily on code generation and review, GPT-5.3-Codex can reason, plan, and act across the full software lifecycle. It supports activities such as debugging, deploying, monitoring, writing product requirement documents, creating tests, and analyzing metrics. It can also autonomously build and iterate on complex applications and better interpret underspecified prompts, producing more complete and production-ready results by default.

A defining feature of GPT-5.3-Codex is its interactive, agentic workflow. Users can steer the model while it is working, receive progress updates, and adjust direction without losing context, making it feel more like a teammate than a batch automation tool. The model was even used internally to help debug its own training and deployment processes. GPT-5.3-Codex is available through paid ChatGPT plans in the Codex app, CLI, IDE extension, and web, with API access planned for the future.