home.social

Search

7 results for “lotharschulz”

  1. The new Claude Desktop app includes a new diff viewer. I compared three ways to review Claude's code changes: the Desktop app diff viewer, the Claude Code CLI, and plain git diff, with a note on when to reach for each one.

    lotharschulz.info/2026/04/17/c

    #claude_code #diff

  2. The new Claude Desktop app includes a new diff viewer. I compared three ways to review Claude's code changes: the Desktop app diff viewer, the Claude Code CLI, and plain git diff, with a note on when to reach for each one.

    lotharschulz.info/2026/04/17/c

    #claude_code #diff

  3. Claude Code runs with your full user permissions. nono wraps it in a kernel-level sandbox that makes unauthorised filesystem and network operations structurally impossible — not policy-blocked, not permission-dialogo'd: impossible. Five hands-on scenarios tested on macOS: escaping the working directory, reaching for AWS credentials, deleting directories outside the project and blocking outbound network calls. Plus the honest account of what it actually takes to trigger rollback.

    lotharschulz.info/2026/04/11/s

    #claude_code #nono #CLI #AISecurity #sandbox

  4. Claude Code runs with your full user permissions. nono wraps it in a kernel-level sandbox that makes unauthorised filesystem and network operations structurally impossible — not policy-blocked, not permission-dialogo'd: impossible. Five hands-on scenarios tested on macOS: escaping the working directory, reaching for AWS credentials, deleting directories outside the project and blocking outbound network calls. Plus the honest account of what it actually takes to trigger rollback.

    lotharschulz.info/2026/04/11/s

  5. Claude Code runs with your full user permissions. nono wraps it in a kernel-level sandbox that makes unauthorised filesystem and network operations structurally impossible — not policy-blocked, not permission-dialogo'd: impossible. Five hands-on scenarios tested on macOS: escaping the working directory, reaching for AWS credentials, deleting directories outside the project and blocking outbound network calls. Plus the honest account of what it actually takes to trigger rollback.

    lotharschulz.info/2026/04/11/s

    #claude_code #nono #CLI #AISecurity #sandbox

  6. Build Real Time Data Pipelines with #PostgreSQL and Apache #Nifi: #CDC via logical replication and #Outbox via table polling.

    The Outbox Pattern offers simple operations and explicit control over event schemas, making it well-suited for event-driven architectures where you control the source application.

    The CDC Pattern is ideal when you need the complete change history or must capture changes from applications you can't modify. However, it requires more operational overhead (compared to outbox) to manage replication slots and WAL growth.

    Choose CDC (Logical Replication) when:

    You need to include all changed data, including legacy applications you can't modify
    Your schema changes are database-driven
    You build a data lake or audit log is required including complete change history

    Choose Outbox Pattern when:

    You focus simpler operations
    You manage and implement the application that is the source of data changes
    You need explicit control over event schema and content
    You implement event-driven architecture with self- or well-defined domain events

    lotharschulz.info/2026/01/05/b