Dan's Hardware
banner
danshardware.bsky.social
Dan's Hardware
@danshardware.bsky.social
My body is a machine that turns AWS accounts into expensive AWS accounts.
Hey, at least you're making progress. Do your best and ping friends that can help.
August 13, 2025 at 12:47 AM
You are 100% spot on. I have been using Claude for about a year to refine my shitposting game. Sometimes you just need 20 puns about agentic systems to make the parts of your joke come truly alive.

or maybe like 3 beers. I don't know I'm terrible at it.
July 23, 2025 at 2:09 AM
This is perfect and we are truly blessed.
July 17, 2025 at 5:33 PM
Reposted by Dan's Hardware
"What were her results?"

You stupid simple child, Linda doesn’t bring results, she brings *vibes*. The kind of vibes that say “I gave up integrity for proximity to power and all I got was this Slack workspace full of lawsuits.”
July 9, 2025 at 4:27 PM
Ah, yes, the classic AWS conundrum of their instance catalog being more of a wish list than an inventory.
July 8, 2025 at 3:40 PM
Nice! I'm honestly surprised that Anthropic isn't giving away the razor to sell the blades.

I've been using OpenHands for a similar function and been getting great results with that. Currently working on an MCP server for it so I can offload coding tasks to a specialized system design for it.
June 25, 2025 at 6:04 PM
Which is annoying enough, but when you add that they don't even operate the same, now it's just frustrating.

Example: if you have an old parameter in a `deploy` operation that isn't used, it's silently discarded. The the `create-change-set` operation, it's a fatal error.
June 23, 2025 at 3:47 PM
Create change set:

aws cloudformation create-change-set --stack-name blah --template-body blah.yaml --change-set-name "blah" --tags Key=CostCenter,Value=jank --parameters file://params.json
June 23, 2025 at 3:47 PM
Deploy:

aws cloudformation deploy --stack-name blah --template-file blah.yml --parameter-overrides file://params.json --tags "CostCenter=jank"
June 23, 2025 at 3:47 PM
Also I did not realize that you were part of the team releasing this, so I would like to add that ACM is absolutely one of my favorite features in AWS. I have spent a lot of time automating certificate jank for clients, and it's so simple and fast on ACM compared to other CAs.
June 20, 2025 at 2:02 PM
That part is great. Love it.
June 20, 2025 at 1:53 PM
Paying a yearly fee so that I get an AWS event when it's time to renew would be nice, and for any system of scale that needs that it's homeopathic amounts of money. However, the price point just seems.... weird.
June 20, 2025 at 1:51 PM
Shitposting aside, my honest opinion is that

1. This type of Cert consist of infra, math that takes milliseconds, and a few DNS lookups.
2. AWS is already generating them for services that scale down to $0, just not letting you see the private key.
3. Several other registrars offer this for $0
June 20, 2025 at 1:51 PM
I guess that's slightly better. For a random number.
June 20, 2025 at 1:32 PM