The Three Enterprise Layers Are Collapsing Into One | Walsenburg Tech For twenty years, enterprise software separated CRM, orchestration, and back-office into three layers with three vendor contracts. A confidence-gated decisioning layer is collapsing all three — and the vendors know it.
A shared state system for plugins When it comes to extending user applications via plugins, the quality of an API can make or break the process. If the API is too obtuse to use, it may alienate people and can curb the popularity of your project.
The Exception Butterfly An overview of gracefully composing Maybe/Either/Transformers within Haskell.
I ran Gemma 4 as a local model in Codex CLI I wanted to know whether Gemma 4 could replace a cloud model for my day-to-day agentic coding. Not in theory, in practice. I use Codex CLI…
Chess - an analogy for conversation Visualizing conversation as a game of chess could make it more tangible.
The Closing of the Frontier — Tanya Verma The Anthropic Mythos announcement is the first time in my life I’ve felt truly poor. Maybe because I grew up on the internet and it was the one permissionless place where you could have leverage and a shot at uncapped exploration and ambition. That is now...
a perfectable programming language — Soter at a party, Sydney Von Arx asked if i could name 40 programming languages. yeah, that's the bay for you. racket, agda, clean, elm, typescript, sh, ASP, verilog, javascript, scheme, rust, nim, intercal, sed, isabelle, visual basic, zsh, alokscript, coq, id...
More Vetoes, Less Vision | Scribe by Hemanth Why software coherence degrades with the number of decision-makers - a pattern across startups, FOSS, and enterprise, grounded in real data.
Being a Junior Scientist in the current administration My thoughts on Hermit Tech after 15 hours of pair programming with Nikhil Suresh.
I want a better action graph serialization Makefiles and Ninja files have limitations, separate from the implementing tool. How can we fix them?
How Claude Changes My Code Claude writes all my code now, but the bigger shift is in *what* code I produce.
Paying Google to Hack macOS Users? Installing software with curl | sh is a bad habit - unfortunately common nowadays. This is an attack vector exploited through malvertising. The article describes what happens when someone blindly installs a tool from a sponsored website.
The Shelf Life of Intelligence Martin Casado, GP at a16z, put it plainly last week: It's only a matter of time before only the model creators have access to the most powerful models. The ...
Plato and Software Engineering A small translation note that reveals a much deeper distinction about change, state, and what our systems really are.
Mount Lebanon Find local businesses, get place recommendations, view maps and get driving directions on Apple Maps.
Your AWS Certificate Makes You an AWS Salesman AWS certification masquerades as an engineering skill. Instead, it's a sales tool to encroach your employer in a moat. AWS complexity is to sell you on more.
Apple update turns Czech mate for locked-out iPhone user : Lock-screen keyboard no longer accepts háček in student's alphanumeric passcode
Your RAM Has a 60 Year Old Design Flaw. I Bypassed It. Modern DRAM is based on a brilliant design from IBM. But, we're still paying for a latency penalty that's existed since the 60s! In this video, I'm introducing my personal research project (Tailslayer) that immensely reduces p99.99 latency on traditiona...
20 Years on AWS and Never Not My Job I created my first AWS account at 10:31 PM on April 10th, 2006. I had seen the announcement of Amazon S3 and had been thinking vaguely about the problem of secure backups — even though I didn't start Tarsnap until several months later — and the idea of a...
The Future of Everything is Lies, I Guess: Annoyances This is a long article, so I'm breaking it up into a series of posts which will be released over the next few days. You can also read the full work as a PDF or EPUB; these files will be updated as each section is released.