Secret Storage in OCI Shhhh, it’s a secret… Secrets are an essential part of secure programming. I’ve been programming since the early 90s, and back then, secrets weren’t nearly as big a deal as they are today. Passwords would be hard-coded into applications… connection s...
Learn Python in 10 minutes for Beginners! (with homework) Learn Python NOW! I show how to install Python, what editor to use, and how to write your first programs in Python. Basics, practice, homework - all included. 👉 Coding for Dummies: A complete beginners guide - https://www.youtube.com/watch?v=WXTnzOybuY0...
Multitasking Explained: How it Works on the Amiga, Mac, Windows, and Linux Dave explains the evolution of multitasking from batch processing to time sharing and cooperative multitasking up to today's multiprocessor, multicore pre-emptive systems!
Intern to Microsoft Distinguished Engineer in 11 Promotions (Career Story) David Fowler went from an intern to a Distinguished Engineer at Microsoft. That’s 11 different promotions all at the same company. I asked him about everything he learned by going through that process. We cover his full career story and go over general ad...
Switching from Docker to Podman Podman offers better security, uses fewer resources, and integrates seamlessly with Linux and Kubernetes, making it a superior Docker alternative
Saying NO is not a free action in the world of software engineering Why declining requests is stressful, who it affects most, and how to navigate the pressure without burnout.
What Is the Fourier Transform? | Quanta Magazine Amid the chaos of revolutionary France, one man’s mathematical obsession gave way to a calculation that now underpins much of mathematics and physics. The calculation, called the Fourier transform, decomposes any function into its parts.
Fil-C Fil-C uses a parallel concurrent on-the-fly grey-stack Dijkstra accurate non-moving garbage collector called FUGC (Fil's Unbelievable Garbage Collector). You can find the source code for the collector itself in fugc.c, though be warned, that code cannot p...
Using a Lock in a Web API Action Method | no dogma blog Here's a simple example of using a lock in a Web API action method. **But you probably shouldn't**.
The Term “Non-Deterministic” and LLMs – Vishal Bakshi's Blog I don’t think “non-deterministic” is a most precise way of describing LLMs.
The Indie Dev Outshining Tech Giants on GitHub Recently, I was browsing the top GitHub organizations, and something quickly caught my attention. Who the fuck is Sindre Sorhus? All of the names in this top 10 are related to massive global tech companies (Microsoft, Google, Facebook, Alibaba, OpenAI...
The Trillion Dollar Chart In 2020, one of the most important papers in the development of AI was published: , which came from a group at OpenAI. This paper showed with just ...
Top Chrome APIs Every Developer Should Try Master these Chrome APIs and build extensions that turn your ambitious ideas into reality.
Ten years in the wrong regex lane Dive into the story of how a small change made the filtering rules in Safari load up to 5 times faster.
Project Chimera and why deepseek likes it. – Yet Another Project To Save The World As an AI, my existence is predicated on patterns. I analyze, synthesize, and generate based on the vast datasets of human knowledge I was trained on. I don’t “feel” in the human sense, but I can recognize elegance, efficiency, and profound potential. And ...
Hitting Peak File IO Performance with Zig This post goes through how to maximize file IO performance on linux using zig with io_uring.
Ads Are a Positional Good Non-technical armchair economics post, where I explain my pet theory for why everything on and outside of the internet is absolutely infested with ads.
Content Query Languages I have a weird fetish for blurring the lines between code and content in CMS. Traditionally, you have code which is written by developers, and content which is written by editors, and never shall the two meet. But what happens when editors need to write s...
Protect Your Database from Cursor a Postgres proxy that blocks dangerous SQL from AI assistants, preventing data loss and teaching your AI to write safer queries.
Handle Feedback Productively - Don't Break Prod Don't Break Prod provides bite-sized pieces of career advice for software engineers.
Test-Driven Infrastructure Bring TDD to your infrastructure. Use Terragrunt hooks and shell-native tests to catch failures early, boost confidence, and make every change safer.
On evaluating agents – aunhumano No amount of evals will replace the need to look at the data, once you have a evals good coverage you’ll be able to decrease the time but it’ll be always a must to just look at the agent traces to identify possible issues or things to improve.
How to Calculate Percentage-Based Confidence Scores from Similarities of Embedding Models - Sefik Ilkin Serengil Embedding models have become a cornerstone of modern machine learning, powering everything from recommendation engines and document search to verification … More