Say you built an AI agent and customers are starting to pay for it. Sooner or later you'll want to charge them by what they actually use, because some customers hammer the agent all day while others send a handful of messages a week. A single flat fee loses money on the heavy users and overcharges the light ones. The billing problem is the same whether your agent runs on your own model (self-hoste
Book: The Complete Guide to Go Programming Also by me: Thinking in Go (2-book series) — Complete Guide to Go Programming + Hexagonal Architecture in Go My project: Hermes IDE | GitHub — an IDE for developers who ship with Claude Code and other AI coding tools Me: xgabriel.com | GitHub You write a validation function. Five rules. Email format, password length, age range, country code, ter
I Sniped a Solana Token in 400ms — Here's the Full Tech Stack Sniping a newly launched token on Solana is a high-stakes game that requires precision, speed, and a deep understanding of the ecosystem. Recently, I successfully sniped a Solana token in just 400ms — and I want to share the exact tech stack and strategies I used to make it happen. This article will dive deep into Jito MEV bundles, Ju
Book: PHP to TypeScript — A Bridge for Modern PHP 8+ Developers Also by me: The TypeScript Library — the 5-book collection My project: Hermes IDE | GitHub — an IDE for developers who ship with Claude Code and other AI coding tools Me: xgabriel.com | GitHub A PHP developer opens a TypeScript codebase, finds three classes that all need a timestamps() behaviour, types trait, and gets a red
🧠 Introduction (Context Setting) Modern JavaScript development is no longer just about writing code—it’s about managing an ecosystem of dependencies, tools, and workflows. At the center of this ecosystem are package managers like npm, Yarn, and pnpm, along with newer entrants like Bun. These tools define how you: Install libraries Manage dependencies Execute scripts Optimize performance and dis
Metasploitable2 - FTP Exploitation using vsftpd 2.3.4 Backdoor 1. Objective To identify and exploit a known vulnerability in an FTP service running on a vulnerable target machine using industry-standard reconnaissance and exploitation techniques. 2. Lab Environment Component Description Attacker Machine Kali Linux Target Machine Metasploitable2 Network Type Host-only / NAT
🗺️⁀જ✈️ The Journey of a Single Click Every great story has a journey. A hero who sets out, faces challenges, crosses through different worlds, and finally returns home with something valuable. Your click is that hero. And this is its story. 🌍 The World Your Eyes See It starts with you. You’re on an app — maybe you’re trying to log into your favorite platform after a long day. You find the login
I tested Claude's consistency across prompts — here's what I found Every developer building an AI-powered app assumes their LLM gives consistent answers. I did too — until I actually measured it. I built llm-test-kit, an open source test suite for LLM-powered applications. While building it, I ran hundreds of tests against Claude Sonnet and discovered something that surprised me. Claude is conte