Undocumented "backdoor" found in Bluetooth chip used by a billion devices The ubiquitous ESP32 microchip made by Chinese manufacturer Espressif and used by over 1 billion units as of 2023 contains an undocumented "backdoor" that could be leveraged for attacks.
RLAMA | Retrieval-Augmented Local Assistant Model Agent Retrieval-Augmented Local Assistant Model Agent
Terraform Evolution: Growing Your Infrastructure Without the Chaos - Chris Woody Woodruff Terraform is amazing for spinning up infrastructure fast, but what happens when your small project grows into a full-blown production system?
Kill your Feeds - Stop letting algorithms dictate how you think We are being boiled like frogs. It happened gradually, one algorithmic tweak at a time. What started as a way to connect with friends has become a system that gives the corporations that run social media control over what we consume and the ability to sub...
My Manager REFUSES To Give Feedback! - Dev Leader Weekly 86 Welcome to another issue of Dev Leader Weekly! In this issue, I discuss how to approach getting feedback form your manager.
My Manager REFUSES To Give Feedback! - Engineering Manager AMA As software developers trying to advance in our careers, we constantly hear that it's important to get feedback from your manager. But... what happens when your manager isn't giving you feedback?! As with all livestreams, I'm looking forward to answering...
Weekly Recap - 2025-03-07 Check out this week from Dev Leader! Here's a list including articles and videos on software engineering, career development, and programming in C#!
Introducing command and commandfor | Blog | Chrome for Developers Learn about the new capabilities for declarative behavior on buttons.
Better Request Tracing with User Context in ASP.NET Core Adding user context to request tracing in ASP.NET Core helps track issues and understand user behavior. This article shows how to implement middleware that enriches logs with user IDs for better troubleshooting and performance monitoring.
GitHub - vxfemboy/purrcrypt: A fur-ociously secure encryption tool that encodes your secrets as adorable cat and dog sounds, using real elliptic curve cryptography with a playful disguise. A fur-ociously secure encryption tool that encodes your secrets as adorable cat and dog sounds, using real elliptic curve cryptography with a playful disguise. - vxfemboy/purrcrypt
Threat modeling: PhaaS, platform abuses, and content moderation ❗️Disclosure: I work at Pitch since December 2021. This write-up aggregates public knowledge previously shared by third parties (e.g., security firms, infosec community, etc.) or us. I hope this can be helpful for younger security teams that need to unde...
Multi-Agents Are Out, PID Controllers Are In My hottest take is that multi-agents are a broken concept and should be avoided at all cost. My only caveat is PID controllers; A multi agent system that does a 3-step process that looks something like **Plan, Act, Verify** in a loop. That can work. Every...
Synchronising files across machines – The Dan MacKinlay stable of variably-well-consider’d enterprises Dropbox for Dropbox haters
Least squares fitting with functional programming - AlexandreHTRB blog Find out more about the Least Ordinary Squares method, how it can help you and how to implement it with functional programming.
There's no excuse to be boring anymore I'm 40 years old with a family (3 kids), demanding job, and other life responsibilities. It's hard to find time to for creative side projects.
Microsoft is reportedly plotting a future without OpenAI - Tech Startups Microsoft’s AI head is plotting a future without OpenAI. According to a report from The Information, Mustafa Suleyman, the head of Microsoft’s AI division, has set his sights on a bold objective: reducing the company’s dependence on OpenAI. In a report ti...
Online Safety | Mehtaverse Identifying misleading information and designing technology to support the public auditing of online information
Binary search isn't about search Suppose you’re trying to track down a bug that appeared in a series of Git commits. You’ve been idly keeping track of where this bug appears in your lucky commits by hand, while busy with other things. So far you’ve compiled this table: 1 2 3 4 5 6 7 8 9 ...
Why Elixir/OTP doesn't need an Agent framework: Part 1 | Goto Code Exploration of using mechanisms provided by Elixir/OTP to build LLM powered applications
Why Developers Build Unfinished Calculators Every developer knows the rush. You are driving and suddenly you’re struck by a “life-altering” idea (your 14th this week). At the next red light, you record an audio while driving, avoiding eye