How to turn Claude Code into your personal life operating system | Hilary Gridley
Watch now | 🎙️ How a new mom and entrepreneur uses Claude Code to automate life admin—all without complex setup
Hilary Gridley is an entrepreneur, former product leader, and new mom who previously appeared on the podcast discussing AI for managers. She returns to share how she's transformed her approach to personal productivity using Claude Code as her primary tool for managing both professional work and life admin. Hilary demonstrates her "anti-system system"—a philosophy that prioritizes simplicity over complex setup, allowing AI to learn preferences through observation rather than upfront configuration.
- How to capture to-dos instantly using a simple iPhone back-tap shortcut that requires zero app switching
- The “10x impact framework” for deciding what tasks to automate versus where to invest your human effort
- How to use Claude Code’s observation capabilities to build a preference file that improves over time without manual setup
- Why the “yappers API” (talking about what you’re doing while working) eliminates the need for complex OAuth integrations
- A workflow for breaking down overwhelming tasks into 10-minute first steps that actually get completed
- How to create Claude Skills by simply describing problems rather than writing code or following tutorials
- Techniques for using “recording mode” to demo workflows without exposing personal information
WorkOS—Make your app Enterprise Ready today
Lovable—Build apps by simply chatting with AI
(00:00) Introduction to Hilary Gridley
(02:43) The opportunity cost of time as a new mom and entrepreneur
(07:11) Philosophy of the anti-system system
(08:05) Demo: Planning your day with Claude Code
(10:00) Setting up simple iPhone shortcuts for task capture
(11:48) How Claude organizes reminders and learns preferences automatically
(16:19) Breaking down overwhelming tasks into manageable first steps
(23:40) The yappers API: talking to Claude instead of building integrations
(25:28) Daily logging and observation patterns
(27:45) Quick summary
(30:50) The power of screenshots
(32:55) 10x impact framework for automation decisions
(37:51) Applying the framework to different career stages
(39:29) Building a “recording on” skill for anonymizing demos
(44:11) Building a returns tracking skill from scratch
(48:31) Building the muscle memory to reach for AI tools
(50:18) Where to find Hilary
• Claude Code: https://claude.ai/code
• Obsidian: https://obsidian.md/
• iPhone Shortcuts: https://support.apple.com/guide/shortcuts/welcome/ios
• Cursor: https://cursor.sh/
• Figma file Hilary demo’ed: https://www.writerbuilder.com/howiai
Substack: https://hills.substack.com/
Website: https://writerbuilder.com
ChatPRD: https://www.chatprd.ai/
Website: https://clairevo.com/
LinkedIn: https://www.linkedin.com/in/clairevo/
Production and marketing by https://penname.co/. For inquiries about sponsoring the podcast, email [email protected].
lennysnewsletter.com
https://www.lennysnewsletter.com/p/how-to-turn-claude-code-into-yourSign in to highlight and annotate this article

Conversation starters
Daily AI Digest
Get the top 5 AI stories delivered to your inbox every morning.
More about
claudeclaude codeComo o Ataque à Cadeia de Suprimentos do NPM Axios Acontece (E Como Proteger Seus Projetos de API)
<h2> TL;DR </h2> <p>Em 31 de março de 2026, invasores comprometeram a conta npm do mantenedor principal do Axios, o cliente HTTP JavaScript mais popular com 83 milhões de downloads semanais. Eles publicaram versões maliciosas (1.14.1 e 0.30.4) contendo um RAT (Cavalo de Troia de Acesso Remoto) multiplataforma que rouba credenciais, chaves SSH e tokens de nuvem de máquinas de desenvolvedores. Faça downgrade para o Axios 1.14.0 imediatamente, rotacione todos os segredos e escaneie seu sistema em busca de indicadores de comprometimento.</p> <p><a href="https://apidog.com/?utm_source=dev.to&utm_medium=wanda&utm_content=n8n-post-automation" class="crayons-btn crayons-btn--primary">Experimente o Apidog hoje</a> </p> <h2> Introdução </h2> <p>Axios processa mais requisições HTTP do que qua
Setting up a hugo static site hosted with Porkbun
<h2> Content generation </h2> <p>This is a static site generated with <a href="https://gohugo.io/getting-started/quick-start/" rel="noopener noreferrer">hugo</a> with the PaperMod theme. I wanted an easy to use static site generator. I considered <a href="https://jekyllrb.com/" rel="noopener noreferrer">Jekyll</a> and believe it to be a good choice for static sites. There seemed to be slightly more themes I liked with hugo so I went with that. That's a pretty superficial choice but I also don't plan on hacking on the site generation itself so I was agnostic to the Go versus Ruby choice.</p> <h2> Domain hosting </h2> <p>This site uses <a href="https://porkbun.com" rel="noopener noreferrer">porkbun</a> for a domain host. I chose it not least because I do enjoy porkbuns. They also listed stat
Your Production Code Is Training AI Models Right Now (And How to Audit Your Stack)
<p>Every AI coding tool you use needs access to your code to function. Copilot reads your files for completions. Cursor indexes your project for context. LangChain traces log your prompts and outputs for observability.</p> <p>The problem is not that these tools access your code. The problem is that most engineers never ask what happens to that code after the tool processes it. Where does the telemetry go? Who trains on it? Is your proprietary logic ending up in a foundation model's training set?</p> <p>This week, GitHub's decision to opt all users into AI model training by default made this question impossible to ignore. But GitHub is not the only platform doing this. It is the default pattern across the entire AI tooling stack.</p> <h2> The Default Is Always "Opt In" </h2> <p>Here is how
Knowledge Map
Connected Articles — Knowledge Graph
This article is connected to other articles through shared AI topics and tags.
More in Models
Como o Ataque à Cadeia de Suprimentos do NPM Axios Acontece (E Como Proteger Seus Projetos de API)
<h2> TL;DR </h2> <p>Em 31 de março de 2026, invasores comprometeram a conta npm do mantenedor principal do Axios, o cliente HTTP JavaScript mais popular com 83 milhões de downloads semanais. Eles publicaram versões maliciosas (1.14.1 e 0.30.4) contendo um RAT (Cavalo de Troia de Acesso Remoto) multiplataforma que rouba credenciais, chaves SSH e tokens de nuvem de máquinas de desenvolvedores. Faça downgrade para o Axios 1.14.0 imediatamente, rotacione todos os segredos e escaneie seu sistema em busca de indicadores de comprometimento.</p> <p><a href="https://apidog.com/?utm_source=dev.to&utm_medium=wanda&utm_content=n8n-post-automation" class="crayons-btn crayons-btn--primary">Experimente o Apidog hoje</a> </p> <h2> Introdução </h2> <p>Axios processa mais requisições HTTP do que qua
Why Domain Knowledge Is the Core Architecture of Fine-Tuning and RAG — Not an Afterthought
<p>--</p> <p>Foundation models are generalists by design. They are trained to be broadly capable across language, reasoning, and knowledge tasks — optimized for breadth, not depth. That is precisely their strength in general use cases. And precisely their limitation the moment you deploy them into a domain that demands depth.</p> <p>Fine-tuning and Retrieval-Augmented Generation (RAG) exist to close that gap. But here is where most teams make a critical mistake: <strong>they treat fine-tuning as a data volume problem and RAG as a retrieval engineering problem.</strong> Neither framing is correct.</p> <p>Both are fundamentally <strong>domain knowledge problems.</strong> This post makes the technical case for why — grounded in architecture, not anecdote.</p> <h2> What Foundation Models Actua
Mercor confirmed it was affected by a recent supply chain attack involving LiteLLM; hacker group Lapsus$ claims it accessed and stole Mercor's data (Jagmeet Singh/TechCrunch)
Jagmeet Singh / TechCrunch : Mercor confirmed it was affected by a recent supply chain attack involving LiteLLM; hacker group Lapsus$ claims it accessed and stole Mercor's data — Mercor, a popular AI recruiting startup, has confirmed a security incident linked to a supply chain attack involving the open-source project LiteLLM.
Claude can now stop conversations - for its own protection, not yours - ZDNET
<a href="https://news.google.com/rss/articles/CBMingFBVV95cUxOa3lmZ1V5dWRaYlFNRGwzUlhYZUN4Qi0xSkczaEd4ZGJzdWFLem9feVRPUWFKejNjSl9CcGZ3bkhzUVRMVHJVTjVETjRBSERROXNIYm4tSU1xUVdGakNwLU9rNUtWa0ZXUEtOQWdLdWhmcjhTUEZCSDNZZ21GZnRqUUloX3VFcWw4TGZNZzVnaElPR0MxM0xNMGgwR2FwZw?oc=5" target="_blank">Claude can now stop conversations - for its own protection, not yours</a> <font color="#6f6f6f">ZDNET</font>
Discussion
Sign in to join the discussion
No comments yet — be the first to share your thoughts!