Categories

Browse articles by topic. From low-level engineering to high-level strategy.

Browse by Date
Category

AI

The AI category covers machine learning engineering and practical applications of artificial intelligence. It focuses on understanding how models work and deploying them in real-world contexts:

  • Model Architecture: How neural networks are designed, trained, and optimized.
    • Topics: Transformers, quantization, inference frameworks, scaling laws.
  • Edge AI: Running models on consumer hardware, browsers, and mobile devices.
    • Topics: bitnet.cpp, WebGPU inference, on-device fine-tuning, memory optimization.
Run a 1-Bit LLM on Your Mac with bitnet.cpp
April 13, 2026

Run a 1-Bit LLM on Your Mac with bitnet.cpp

A first-person walkthrough of running BitNet b1.58 on an M1 Pro: real benchmarks (22.5 tok/s), five real gotchas, a 3B model in under 1 GB of RAM, and the GPU never touched.

Read
How SynthID Was Broken: Three Attacks That Defeated Google's AI Watermark
April 12, 2026

How SynthID Was Broken: Three Attacks That Defeated Google's AI Watermark

Researchers broke Google's SynthID watermark 3 ways. Spectral analysis drops detection by 91.4%, diffusion re-nosing overwrites it, and synonym swaps defeat text marking.

Read
BitNet b1.58: The 1-Bit LLM That Matches Full-Precision Models
April 9, 2026

BitNet b1.58: The 1-Bit LLM That Matches Full-Precision Models

BitNet b1.58 replaces every Transformer weight with -1, 0, or 1, cutting energy use by 71.4x while matching FP16 quality at 3B+ parameters. Here is how.

Read
Category

Algorithms

An algorithm is a finite sequence of well-defined, computer-implementable instructions, typically to solve a class of problems or to perform a computation. They are the fundamental building blocks of any piece of software.

Key aspects include:

  • Efficiency: How well it performs in terms of time and memory ($O(n)$).
  • Correctness: Whether it produces the correct output for all valid inputs.
  • Design Patterns: Common approaches like divide and conquer, dynamic programming, or greedy algorithms.
The Evolution of Password Security: From Basic Storage to Argon2
July 18, 2025

The Evolution of Password Security: From Basic Storage to Argon2

A level-by-level journey into password security. Discover why a simple hash isn't enough and how to defend your users from hackers and data leaks, from salt and pepper to Argon2.

Read
SHA256 and the Length Extension Attack
July 11, 2025

SHA256 and the Length Extension Attack

SHA-256 is a cornerstone of security, but it's not invincible. Discover how its internal structure opens the door to the feared length extension attack and why HMAC is the fundamental solution.

Read
How to Use a Reverse Trie for Fast Disposable Email Domain Detection
December 5, 2022

How to Use a Reverse Trie for Fast Disposable Email Domain Detection

Learn how to use a reverse Trie to efficiently detect disposable email domains. Optimize your domain lookups with a scalable, memory-efficient solution tailored for fast and precise results.

Read
Category

Automation

Automation is the application of technology, programs, and robotics to perform tasks that were previously done by humans. In software development and IT, it is crucial for creating efficient and scalable systems.

Key areas include:

  • CI/CD Pipelines: Automating the build, test, and deployment of software.
  • Infrastructure as Code (IaC): Using code to provision and manage infrastructure.
  • Robotic Process Automation (RPA): Automating routine business processes and user interactions.
EasyPageGo: The Rube Goldberg Website Builder
January 16, 2026

EasyPageGo: The Rube Goldberg Website Builder

How I engineered a Docker-based website builder that solved a problem no one had. A post-mortem of over-engineering, market misreading, and the pre-ChatGPT struggle.

Read
Automatic Subtitles with Whisper and Remotion: A Complete Guide
July 16, 2025

Automatic Subtitles with Whisper and Remotion: A Complete Guide

Discover how to generate automatic subtitles (and translations) for your videos. A step-by-step guide to the workflow with AI Whisper, Remotion, and ffmpeg to save time.

Read
Run n8n and SearXNG Locally with Docker: Build Your Own No-Code AI Playground
April 20, 2025

Run n8n and SearXNG Locally with Docker: Build Your Own No-Code AI Playground

Discover how to set up n8n and SearxNG to build a private AI agent for web searches. You'll have an AI agent that fetches information online without tracking your data. Ideal for those interested in automation and privacy!

Read
Free Online Text to Speech Generator - SpeechStudio.ai
April 18, 2025

Free Online Text to Speech Generator - SpeechStudio.ai

Check out SpeechStudio.ai, a free and powerful text-to-speech tool that provides natural-sounding voices and supports multiple speakers. It's perfect for podcasts, presentations, and creative projects, all without any costs or signups.

Read
Category

Authentication

Authentication (Auth) is the process of verifying that an individual or system is who they claim to be. It is the first step in any security process and is distinct from authorization (what a user is allowed to do).

Common methods include:

  • Something you know: Passwords or PINs.
  • Something you have: Security tokens, mobile phones (for OTPs).
  • Something you are: Biometrics like fingerprints or facial recognition.
  • Multi-Factor Authentication (MFA), which combines two or more of these methods.
The Evolution of Password Security: From Basic Storage to Argon2
July 18, 2025

The Evolution of Password Security: From Basic Storage to Argon2

A level-by-level journey into password security. Discover why a simple hash isn't enough and how to defend your users from hackers and data leaks, from salt and pepper to Argon2.

Read
SHA256 and the Length Extension Attack
July 11, 2025

SHA256 and the Length Extension Attack

SHA-256 is a cornerstone of security, but it's not invincible. Discover how its internal structure opens the door to the feared length extension attack and why HMAC is the fundamental solution.

Read
GitHub App and OAuth ~ Disjointed flow
April 28, 2022

GitHub App and OAuth ~ Disjointed flow

Discover how to integrate GitHub App functionality into an existing OAuth-based authentication system. This guide explains how to authenticate as a GitHub App using JWT, retrieve installation IDs, and access repositories associated with the app.

Read
OAuth popup ~ Practical Guide
April 27, 2022

OAuth popup ~ Practical Guide

Enhance your GitHub OAuth implementation by using a popup approach for authentication in single-page applications (SPAs). This guide walks you through the process of spawning a popup for user authentication and securely handling the access token.

Read
Category

Git

Git is a free and open-source distributed version control system designed to handle everything from small to very large projects with speed and efficiency. Created by Linus Torvalds, it has become the de facto standard for modern software development.

Core concepts include:

  • Repositories (.git): The database tracking all changes.
  • Commits: Snapshots of your files at a specific point in time.
  • Branches: Independent lines of development.
  • Merging & Rebasing: Combining changes from different branches.
How to Safely Delete All Local Git Branches
May 18, 2022

How to Safely Delete All Local Git Branches

Learn how to quickly and safely remove all local Git branches except the ones you choose (like dev and main) using a simple one-liner command. This guide breaks down each part of the command, provides examples, and tips for a tidier Git workflow.

Read
Category

Web

The Web category covers all aspects of creating and maintaining websites and web applications. It is traditionally split into two main areas, though the lines are increasingly blurred:

  • Front-End: The client-side, what the user sees and interacts with in their browser.
    • Technologies: HTML, CSS, JavaScript, and frameworks like React, Angular, or Vue.
  • Back-End: The server-side, responsible for logic, databases, and authentication.
    • Technologies: Languages like Node.js, Python, PHP, Java, and databases like PostgreSQL or MongoDB.
Three.js Static Shadow Baking: One Flag That Saves 20-40% GPU
April 20, 2026

Three.js Static Shadow Baking: One Flag That Saves 20-40% GPU

I posted a Three.js perf thread and got a sharp question back about whether 'baking' was even the right word. The source code said yes and no. Here is what the exchange taught me about `autoUpdate = false`, runtime caching, and a 20-40% GPU win.

Read
JSON-LD Structured Data for Blogs: A Real Implementation
April 7, 2026

JSON-LD Structured Data for Blogs: A Real Implementation

Pages with structured data are 2.3x more likely to appear in AI Overviews. Here is how I added BlogPosting JSON-LD to my Astro blog with real code.

Read
Running SQLite in the Browser with OPFS and Web Workers
March 12, 2026

Running SQLite in the Browser with OPFS and Web Workers

Discover how to set up SQLite in the browser using the Origin Private File System (OPFS) and Web Workers. Build high-performance, local-first applications with relational power and zero server costs.

Read
LinkPreview AI: The Privacy-First, Client-Side QR Code Generator
January 20, 2026

LinkPreview AI: The Privacy-First, Client-Side QR Code Generator

Most QR code generators track you. LinkPreview AI enables zero-knowledge, client-side QR generation with no database. Here is how it works.

Read
Category

Cyber Security

Security in the digital realm encompasses all measures taken to protect data, networks, and computer systems from unauthorized access, use, disclosure, disruption, modification, or destruction. It’s a broad field aimed at ensuring confidentiality, integrity, and availability (the “CIA Triad”).

Topics often covered are:

  • Vulnerability Assessment: Identifying weaknesses in systems.
  • Penetration Testing: Simulating attacks to find exploitable flaws.
  • Secure Coding Practices: Writing code that is resilient to common attacks like SQL Injection and XSS.
  • Network Security: Protecting the underlying infrastructure with firewalls, VPNs, and monitoring.
The Evolution of Password Security: From Basic Storage to Argon2
July 18, 2025

The Evolution of Password Security: From Basic Storage to Argon2

A level-by-level journey into password security. Discover why a simple hash isn't enough and how to defend your users from hackers and data leaks, from salt and pepper to Argon2.

Read
SHA256 and the Length Extension Attack
July 11, 2025

SHA256 and the Length Extension Attack

SHA-256 is a cornerstone of security, but it's not invincible. Discover how its internal structure opens the door to the feared length extension attack and why HMAC is the fundamental solution.

Read
Throttling Explained: A Guide to Managing API Request Limits
December 4, 2024

Throttling Explained: A Guide to Managing API Request Limits

Learn how to implement a simple and effective throttling system in TypeScript to protect your APIs from overload. This guide covers rate-limiting strategies, IP tracking, and periodic cleanup to manage stale records and optimize performance.

Read