Series: AI Isn’t an Engineering Problem Anymore (Part 2) In the last post, I talked about hitting a usage limit while debugging my robot and realizing how repetitive my own AI usage had become. When we use LLMs, whether through APIs or tools, it feels like every request is new. The inefficiency isn’t from using AI too much. You don’t ask once, you iterate. These are the most interesting ones. Some
Series: How Machines Learn: A Complete Guide from Zero to AI Engineer Phase 6: Machine Learning (The Core) You've been hearing "machine learning" for years now. Your phone uses it. Netflix uses it. Your spam filter uses it. Every tech company puts it in their job posts. And yet, if someone asked you right now to explain what machine learning actually is in plain words, you might freeze up a little
I have a confession: I used react-i18next for years and genuinely never questioned it. It worked. It was everywhere. Every project I joined during my internships at DNB had it set up. You install it, you configure it, you wrap your app in a provider, and you ship. Done. But then I started building more things on my own, projects where I got to choose the stack from scratch, and I started noticing
If this is useful, a ❤️ helps others find it. Everything I keep looking up when building Tauri v2 apps — in one place. // Define #[tauri::command] fn greet(name: String) -> String { format!("Hello, {}!", name) } // With error handling #[tauri::command] fn read_file(path: String) -> Result { std::fs::read_to_string(path).map_err(|e| e.to_string()) } // Async #[tauri::command] async fn fet
The 3 AM Nightmare Last week, I let an AI agent run loose on my production server. It was fine — until 3 AM. To interact with the agent, a user must first authenticate across Gmail, a support desk, and a payment platform — all before the agent takes its first action. Permission denied. Permission denied. Permission denied. Three different connectors. Three different auth systems. One very tired
On April 7 Anthropic published technical Mythos report,as well as announced Claude Mythos Preview and Project Glasswing. The claim was that their newest model could autonomously identify and exploit real vulnerabilities in major open-source projects at unprecedented scale. One of Anthropic's public showcase examples was the Linux kernel, which is not some toy repo but the operating system underne
Tbh I had no idea this was even a thing until recently. I've been working with Rails for a while now and somehow never came across it. So let me explain it the way I understood it. You know how we normally do associations in Rails, User has many Posts, Post belongs to User. Two different models, two different tables. Simple. But what if a model needs to reference itself? Like same table, same mode
In today’s busy Kubernetes setups, downtime hits hard. A single hour of outage can cost big companies millions in lost sales and fixes. Traditional monitoring tools often leave teams scrambling, with mean time to recovery (MTTR) stretching to hours or even days in tangled microservices. You know the drill — alerts flood in, but the real problem hides in the noise. This article shows you how AI for