When building modern applications, one problem shows up everywhere: How do I uniquely identify data across systems? That’s where UUIDs (Universally Unique Identifiers) come in. A UUID is a 128-bit unique identifier used to identify information in distributed systems. Example: 550e8400-e29b-41d4-a716-446655440000 It looks random - and that’s the point. Traditional IDs (like auto-increment integers
I got tired of not knowing why users were dropping off in my app. Heatmaps show you where people click. Analytics show you when they leave. But nothing tells you how they felt while using it. So I built SessionMood API — a REST API that scores user mood in real time based on behavioral events. You send behavioral events from your frontend: fetch("https://session-mood-api-production.up.railway.app/
A lot of online businesses eventually run into the same problem: traditional payment processors don’t always scale well for every type of business model. Over the past months, I’ve been exploring how modern payment infrastructure works, especially from a technical and architectural perspective. This is not a guide or a product pitch — just a breakdown of what I’ve been learning while building and
The Model Context Protocol (MCP) has become the default standard for connecting AI agents to external tools and APIs. Governed by the Linux Foundation since early 2025 and adopted by OpenAI, Anthropic, Microsoft, and Vercel, MCP is the USB-C port of the AI ecosystem — one protocol that lets any LLM application talk to any tool server. But there's a gap between reading the spec and building somethi
If you have spent any real time with Claude Code, you have probably noticed the same problem I did. You write the same instructions in the prompt every other day. "Use four-space indentation here." "Always run the linter after edits." "Format commit messages this way." After the third or fourth repeat, it stops feeling like a prompt and starts feeling like missing config. Skills are how Claude Cod
In the previous parts, we explored SSL pinning across Android and iOS, including both certificate and public key approaches. But here’s the uncomfortable truth: Even perfectly implemented pinning is not enough. In this final part, we move beyond the client and look at what truly defines a secure mobile architecture: Mutual TLS (mTLS) Backend access control Defense in depth When mobile security act
SQLite Internals & PostgreSQL Multi-Master Replication Updates Today's Highlights This week's database highlights include critical technical discussions from the SQLite forum regarding optimizer behavior and trigger affinity changes, alongside the release of Spock 5.0.7, bringing enhanced logical multi-master replication to PostgreSQL. Source: https://sqlite.org/forum/info/819f2d6627c
The Work Is Too Specific for Enterprise Software Small and mid-sized teams run on operational content. A law firm receives NDAs, contracts, court filings, and client intake forms. A dental clinic handles referral letters, insurance documents, treatment plans, invoices, and patient forms. An accounting firm processes supplier invoices, receipts, bank statements, and monthly reports. A real estate