Supabase Webhooks Deep Dive — Database Triggers, pg_net & Edge Function Patterns Supabase Webhooks let you react to INSERT/UPDATE/DELETE events on any table and call an external endpoint or an Edge Function automatically. Under the hood it uses the pg_net extension to fire non-blocking HTTP requests directly from PostgreSQL triggers. DB change → pg_net (async HTTP) → Edge Function or external en
After running a small online store and working with SEO for over 10 years, I’ve tried many WooCommerce product filter plugins. Honestly, none of them felt 100% right. Some were great at performance but lacked flexibility, others had good UI but were not SEO-friendly. So I decided to build my own plugin tailored exactly to my needs. It focuses on: Better SEO compatibility Flexible filtering logic L
Flutter CustomPaint Deep Dive — Canvas API, Animations & Fragment Shaders When Flutter's standard widgets can't achieve the visual effect you need, CustomPaint unlocks the full power of the Canvas API — and with Fragment Shaders, you can push rendering directly to the GPU. class WaveChart extends StatelessWidget { final List<double> data; const WaveChart({required this.data}); @override
Java LLD: Designing a High-Concurrency Elevator System Designing an elevator system is a classic "Machine Coding" round favorite because it tests concurrency, state management, and algorithmic efficiency simultaneously. At companies like Apple or Amazon, interviewers aren't just looking for a working loop; they are looking for thread safety and optimal scheduling. Using a simple Queue<Integer>
The problem: too many clients, too few discovery hooks We expose Supabase Edge Functions as MCP (Model Context Protocol) servers. The clients that hit them are heterogeneous — Claude Desktop, Codex CLI, Cursor, VS Code Continue, a couple of in-house browser extensions. None of them ship with a hard-coded "use WorkOS AuthKit, scope is tool:ai_chat, audience must contain urn:jibun:tool:<tool>" rec
How I Built a Free Anonymous Email Service — No Phone, No Password, No Logs Every time you sign up for a new email service, you're asked for: A phone number An existing email address Your real name A government ID (in some countries) I asked myself: what if email could work like cash? Anonymous by default. No identity required. No trail left behind. That's how QRYPTY Mail was born — a fully functi
Every team experiences incidents. The teams that grow stronger from them are the ones that take postmortems seriously — not as blame sessions, but as structured learning opportunities. Yet most postmortems end up as a wall of text nobody reads twice, filed away and forgotten until the same incident happens again six months later. This guide walks you through writing postmortems that genuinely chan
The Reality of Being a Man in Your 50s in South Korea