Featured post what's this? ✨ I analysed seventeen years of fast food and coffee spending using OpenAI Codex Analysis of credit card history using OpenAI Codex
Software engineering may no longer be a lifetime career I don’t think there’s compelling evidence that using AI makes you less intelligent overall1. However, it seems pretty obvious that using AI to perform a task means you don’t learn as much about performing that task. Some software engineers think this is a...
Your First API Call | DeepSeek API Docs The DeepSeek API uses an API format compatible with OpenAI/Anthropic. By modifying the configuration, you can use the OpenAI/Anthropic SDK or softwares compatible with the OpenAI/Anthropic API to access the DeepSeek API.
The Agent Observability Gap Why agents that look healthy in a playground go sideways the moment they meet real users, and what a useful observability stack for agent-shaped systems has to cover.
Canton vs Public Crypto: A Technical Comparison Canton differs significantly from Ethereum and other L2s, focusing on local agreement and privacy. Transactions involve only relevant parties, enhancing scalability and confidentiality. Its declara…
Cooked By all means, Tim Cook was a better choice for Apple CEO than most people you could pick out of a hat; perhaps even of high executives at Apple working at the time. But this judgement is not unalloyed.
Dear Codebase: A Letter From Your Coding Agent Ten requests from an agent to the codebase it works in — local reasoning, visible boundaries, one way of doing things. None of them are new. All of them matter more now.
Stop Hardcoding Your Timeouts Hardcoded timeouts with no config options are a silent tax on developers outside the wealthy west. A rant about npx skills, Docker Gordon, and the arrogance of assuming everyone has a fast connection.
The end of responsive images Mat Marquis has waited 14 years to write this article. The sizes attribute has been a necessary evil but now, with an auto value capability, it’s completely transformed authoring responsive images on the web.
Cutting Costs, Not Corners: How We Migrated Our AI Document Pipeline from AWS to Cloudfleet Introduction aka TL;DR; In January, we handled almost twice the workload we handled in December at a fifth of the cost. Background In th...
On commenting and approving pull requests After reviewing a lot of pull requests, I’ve settled on a simple default: if my comments are all nitpicks, suggestions, questions, or non-blocking issues, I leave them and approve the PR at the same time.
Trajectory shapes Benchmark scores tell you whether a coding agent solved the task. Trajectory shapes tell you how it worked, and those workflow signatures persist b...
Why I spent years trying to make CSS states predictable — tenphi.me Why predictable CSS state resolution matters, and how Tasty approaches it with state maps and non-overlapping selectors.
Approximating Hyperbolic Tangent Survey of fast tanh approximations using Taylor series, Padé approximants, splines, and bitwise manipulation techniques like K-TanH and Schraudolph
Agency Is Not Autonomy | Mark Lubin Two axes the AI agent field treats as one, and the design rule that follows from splitting them.
Fundamental Theorem of Calculus | David Álvarez Rosa | Personal Website Although the notion of area is intuitive, its mathematical treatment requires a rigorous definition. This post introduces the Riemann integral, and proves the …
Old computers in my university | Mr.UNIX In my previous university, there was a hallway in the department of mathematics and computer science, where they were showcasing some of the old computers that we had.
Context Engineering and the Limits of Agentic Coding | Stephen Fritz My work is context engineering. I didn't know the term until after I'd built a system that turned out to be exactly that.
Making beautiful work is getting harder In the early days of LLMs, we had tools that helped us stay focused and thereby do better work. Then, in late 2024, everything began to change.
Trust Me, I’m a Shortcut Windows’ primary mechanism for shortcuts, LNK files, is frequently abused by threat actors for payload delivery and persistence. This blog post introduces several new LNK file flaws that, amongst other things, allow attackers to fully spoof an LNK’s targe...
The Log is the Database foldb has one source of truth: an append-only, Raft-replicated log. Everything else, the storage layer, the indexes, the materialized query results, is just a fold(log). A pure function applied to a sequence of committed entries in order. A transaction c...
An update on recent Claude Code quality reports Anthropic is an AI safety and research company that's working to build reliable, interpretable, and steerable AI systems.
Introducing GPT-5.5 Introducing GPT-5.5, our smartest model yet—faster, more capable, and built for complex tasks like coding, research, and data analysis across tools.
French govt agency confirms breach as hacker offers to sell data France Titres, the government agency in France for issuing and managing administrative documents has disclosed a data breach after a threat actor claimed the attack and stealing citizen data.
Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain ... Bitwarden CLI 2026.4.0 was compromised in the Checkmarx supply chain campaign after attackers abused a GitHub Action in Bitwarden’s CI/CD pipeline.