20+ years of building stuff โ from Linux supercomputers & Top 500 HPC clusters โ Web 2.0 startups โ award-winning AI platforms for the US Navy.
- ๐ญ Now: AI Factory Lead at a Fortune 500 company
- ๐๏ธ Before: Lead AI Infrastructure Engineer at Helix Center for Applied AI โ built an award-winning AI platform for the US Navy (Jan 2025)
- ๐ง Way back: Cycorp Inc. โ reported to Dr. Doug Lenat, worked on symbolic AI for defense & healthcare
- ๐ Early days: Sold Linux supercomputers, built Top 500 HPC systems, infrastructure at LiveJournal & OpenDNS
- ๐ NVIDIA Certified: DGX SuperPOD ยท AI Infrastructure ยท InfiniBand
- ๐ Community: Founder, Detroit AI Collective
| โญ | Project | Lang | What It Does |
|---|---|---|---|
| ๐ฅ | RegicideOS | ๐ฆ Rust | AI-native Linux distribution (Gentoo + Btrfs + Cosmic Desktop) |
| ๐ฅ | zerochain | ๐ฆ Rust | Multi-agent orchestration via plain text files |
| ๐ฅ | merlin | ๐ฆ Rust | RL-based LLM prompt router (sub-ms async routing) |
| ๐ง | opencode-pushguard | ๐ TS | Pre-push git hook for AI-assisted workflows |
| ๐ก๏ธ | opencode-watchtower | ๐ Shell | Safer agent tool calling with utcp isolation |
| ๐ง | opencode-memento | ๐ TS | Preserves project context across AI coding sessions |
| ๐ฎ | Xfiles | ๐ Protocol | Modern Plan 9 protocol with quantum AI reinforcement learning system |
Full list over at PROJECTS.md.
The repos above are just the surface. The full stack spans autonomous agents, distributed systems, LLM infrastructure, OS research, and confidential computing:
| Project | Domain | What It Does |
|---|---|---|
| Nexus | ๐ค Autonomous Agents | Multi-agent orchestration with self-improving capabilities and recursive task decomposition |
| Routage | ๐ Distributed Systems | Intelligent message routing, mesh networking, and fault-tolerant cluster coordination |
| Merlin | ๐ง LLM Infrastructure | End-to-end pipeline for model training, fine-tuning, quantization, and high-throughput serving |
| RegicideOS | ๐ป Operating Systems | Experimental kernel with AI-native syscalls, scheduler awareness for inference workloads, and capability-based security |
| DCAP | ๐ Confidential Computing | Remote attestation frameworks, secure enclaves, and zero-trust verification for AI workloads |
| AAS-Monad | ๐ Formal Methods | Mathematically-grounded scoring framework for self-improving systems |
This work is anchored in the belief that the future of intelligence is unified, not fragmented. It explores ideas around AI Pangaeaโthe convergence of distributed intelligence islands into a more cohesive, secure, and capable continuum.
- Superintelligent Entities โ Implemented agents with advanced cognitive architectures, persistent memory, and recursive self-improvement
- AI Security at Every Layer โ Tool-calling sandboxing, LLM input/output guardrails, multi-agent consensus verification, and confidential execution
- Memory & Continuity โ Long-horizon agent memory systems that persist across sessions, devices, and intelligence islands
Read the paper: AI Pangaea: Unifying Intelligence Islands โ one of many inspirations for me recently.
This repo (awdemos/demos) is where I dump production-grade patterns I actually use:
- Kubernetes โ 100+ deployment patterns, Cilium eBPF, multi-cluster
- LLM Infrastructure โ RAG pipelines, fine-tuning, multimodal benchmarks
- CI/CD โ Dagger Go pipelines with container-native builds
- IaC โ Pulumi (Go/TypeScript) for Azure & AWS multi-tenant infra
- Rust โ Matrix operations, CLI boilerplate, async patterns
git clone https://github.com/awdemos/demos.gitReproducible. Observable. Composable.
I like building from first principles. I design systems the way Unix intended: small, focused tools that do one thing well and compose cleanly. I'm into symbolic AI and systems thinking โ not just chasing the latest hype. I don't trust big tech consolidation much, and I'm a big believer in AI sovereignty: models you own, data you control, infrastructure you can actually audit.
I almost always reach for a general-purpose programming language when solving problems โ no YAML-only solutions if I can help it. I pull in everything I've learned from a decade of DevOps, decades of systems automation, and decades with Linux to keep things reproducible and maintainable.
My formative years were spent on Slashdot and deep in open source culture โ that ethos stuck. I've been contributing to open source for decades.
Memory safety and zero-cost abstractions aren't just Rust features โ they're how I think about infrastructure.
ยฉ 2026 Andrew White

