Featured post what's this? ✨ OpenAI's WebRTC Problem - Media over QUIC Media over QUIC: There are ways to do voice AI without being traumatized by WebRTC.
GitHub - imtomt/ymawky: MacOS Web Server written entirely in ARM64 assembly MacOS Web Server written entirely in ARM64 assembly - imtomt/ymawky
You should read Programming as Theory Building When I finished reading Peter Naur’s Programming as Theory Building my first thought was “How come nobody ever told me to read this?” I ended up reading it multiple times, as I attempted to collect my thoughts on why it makes so much sense.
Apple is increasing my cortisol levels My blog, where I attempt to collect my thoughts and share the occasional interesting topic with others
The Intolerable Hypocrisy of Cyberlibertarianism I like the Internet. I am old enough to remember the pre-Internet era and despite the younger generations pining for those simpler days, I was there. Paper maps were absolutely horrible, just you and a compass in your car on the side of the road in the mi...
GrapheneOS fixes Android VPN leak Google refused to patch GrapheneOS has released a new update that fixes a recently disclosed Android VPN bypass flaw capable of leaking a user’s real IP address.
Please Make Mistakes When your team adopts AI, mistakes are inevitable and necessary. Your job as code owner is to catch them before customers see them, and improve your instruction files so they don't happen twice.
Alex-Dahl I have been a manager for quite some time. I have seen plenty of different behaviors play out. Eagerness. Apathy. Rage. I thought I could navigate all of them and make sure they could direct their feelings to align with the organization's goals. I saw mys...
it's time to talk about agentic "remote control" tldr: skip the vendor remote-control features. roll your own with wireguard, tmux, and ssh. cheaper, more flexible, and you stop handing third parties a live shell into your dev box.
The Mirror Is Part of the Machine | Yusuf Aytas Why telemetry explodes into cost and noise, and how to fix it: treat every signal as a decision, not exhaust, and govern ownership before it's too late.
Write programs you can still hack when you feel dumb … so you can still understand and change them, when you can only work half an hour
I still like Jenkins Before GitHub Actions, before GitLab CI/CD, and before the panoply of startups all promising to help you build your software faster and with less hassle, there was the humble, open source Jenkins. Or perhaps I should say is: Jenkins is still actively main...
The Morse Code Hack That Made an AI Agent Spend $200,000 Dave explains the Grok/Bankrbot exploit that caused an AI Agent to spend almost $200K in tokens!
Money is renewable. Time isn't. We built a whole industry to count our dollars. We barely count our hours. The asymmetry is backwards.
A tale of two artisans – Koas.dev Let me tell you about what alcoholics refer to as a moment of clarity I had last night.
How we accidentally recreated old FB Background We started off with a simple idea for a product; we wanted to re-use the chat interface for everything except chat. It was supposed to be just for photos but expandable later. The idea was that most people already share their photos with others...
Lies, damned lies, and Elastic's benchmarks It's a spicy title, but one that is warranted. Elastic recently published a blog post titled 30x faster than Prometheus, that claimed that Elastic's new TSDS timeseries engine is much better than Prometheus. When I started reading it, I was curious; maybe...
Yesterday I had some news that has left me feeling anxious, happy but also conflicted all at the same time. My very first blog post was written the day before my last counselling session with, Angel,It is called The last day.My counselling sessions with her were a 100 percent positive experience and she …
On becoming competitive when joining a new company Essays, notes, papers, and resources by Ludwig Abap.
The Fast Way to Sweden - BGP Routing Experiments Learning about selectively announcing prefixes with BGP to get traffic to its destination faster
Laptops all have built-in security tokens these days I’ve been a fan of security tokens for a decade now and have accrued quite a collection. This redundancy isn’t a bad thing, as security tokens are easily misplaced and the only way to recover from a lost token is using a second token that is also register...
Internet Archive Switzerland: Expanding a Global Mission to Preserve Knowledge Thirty years ago, Brewster Kahle founded the Internet Archive with an ambitious goal: Universal Access to All Knowledge. Today, that mission continues to grow with an exciting new chapter: the launch of the Internet Archive Switzerland, a non-profit found...
LLMs Corrupt Your Documents When You Delegate Large Language Models (LLMs) are poised to disrupt knowledge work, with the emergence of delegated work as a new interaction paradigm (e.g., vibe coding). Delegation requires trust - the expectation that the LLM will faithfully execute the task without in...
EU calls VPNs “a loophole that needs closing” in age verification push The European Parliamentary Research Service has warned that VPNs are increasingly being used to bypass online age-verification systems.