Hassle-free web app development with Cloudflare Quick Tunnels Discover how to publish your local web server securely with Cloudflare Tunnels. Get the performance, security, and flexibility you need while sharing your projects easily. TryCloudflare simplifies the process, letting you test and share without domain/DNS...
Symbolic vs Connectionist Machine Learning Reasoning and reducing hallucinations in large language models by hybridizing with algorithms.
At What Point Dedication Becomes an Obsession? - This Blog Contains Words Something interesting I was thinking today. Dedication is something important and usually cheered and looked as a positive force, while obsession is looked as not...
Introducing Kotlin/Wasm This blog post is a refined transcription of the presentation Zalim Bashorov and I gave at Wasm I/O 2023 to introduce Kotlin/Wasm. I will later add a video of the recording when available. Zalim Hi, everyone! I’m Zalim. I’m writing Kotlin in Kotlin at Jet...
The age of average — Alex Murrell In the early 1990s, two Russian artists named Vitaly Komar and Alexander Melamid hired a market research firm to survey the public on what they wanted in a work of art. Across 11 countries they then set about painting a piece that reflected the results. E...
Airbnb is worse than a casino addiction Airbnb is worse than a casino addiction. It’s a sucker’s bet. It’s rigged. The house almost always wins. Everybody knows this. And yet, we all still tempt fate, itching for that once-in-a-lifetime, deal-of-the-century, jackpot experience that we’ll never ...
Harvesting Logs for Fun and Profit From a security point of view, application logs are two-sided. On the one hand, it is really important to have good observability, to find out what is happening and what has happened. On the other hand, we don’t want to leak sensitive information. In this...
Agile Is A Glass Cannon A recent shower thought of mine is that agile software development might be similar to the strategic concept of a glass cannon in gaming — specifically, that it’s a high-risk high-reward strategy where the risk can be mitigated by skill/experience.
My workflow Principles and policies I use to organize my tasks. It also includes my own way to handle a kanban board which uses an interesting approach, the metadata.
Fast Unix Commands Fast Unix Commands (FUC) is a project that aims to create the world’s fastest Unix commands. Currently, this means rm and cp replacements named rmz and cpz (the ‘z’ stands for “zippy”). When better performance cannot be achieved, the next highest priority...
(PDF) Security, Privacy and Steganographic Analysis of FaceApp and TikTok PDF | Smartphone applications (Apps) can be addictive for users due to their uniqueness, ease-of-use, trendiness, and growing popularity. The addition... | Find, read and cite all the research you need on ResearchGate
Let’s Talk About TikTok - Black Hills Information Security Derek Banks // I recently heard something on the news that caught my attention. I suppose that isn’t abnormal these days, but this in particular was the first time I […]
Episode 456 - Azure Programmable Connectivity Evan and Sujit talk to Ricardo Villarreal about the new ability to built network-aware applications in Azure. APC provides a unified abstraction layer for accessing network APIs—such as edge discovery, quality on demand, and device location—consistently a...
Custom Event Arguments in Blazor WebAssembly - Code Maze In this article, we are going to learn how we can use custom event arguments in Blazor WebAssembly with C#.
Introducing the Framework Laptop 16 and both Intel and AMD-powered We announced a colossal set of new products and upgrades at our Next Level Event on March 23, 2023.