Chukwuemeka Nelson Nwauche
“Everyone thinks MCP is for making AI assistants smarter. You know, "Claude, please read my files and understand my soul." And sure, it does that. But here's what they put in the documentation that made me spit out my morning tea:
"MCP provides a standardized way to connect AI models to...
Read more...“But as I worked, and thought about what I was doing, it began to dawn on me that the technique I was using has been more than half forgotten in these latter days. A little web research confirmed that programmers don’t seem to talk about it much any more, at least not where a search engine can...
Read more...“Did you know your favorite website can detect when you’re browsing it in public transport and when you scroll it laying in your bed? ”
Article
In this article, the author goes over the different ways that websites use to detect bots. It's quite detailed with some extra resources at the end...
Read more...“Now my curiosity is piqued and the evil mode kicks in. It feels like arbitrary data can be pushed to the checksum database without a connection to Go. Why is the data being pushed? And how is it being pushed? I go to bed thinking about this, which is the most dangerous moment for security...
Read more...“When it comes to debounce and throttle developers often confuse the two. Choosing the right one is, however, crucial, as they bear a different effect. ”
Article
In this article, the author explain the difference between debouncing and throttling. Debouncing is akin to waiting until you stop...
Read more...“The value of the Broadcom T4 design was its ability to work at high speeds on horrible cables. In many cases, you could use it on the cables you already had without upgrading. To demonstrate the power of what it felt was the world's best chip, Broadcom demonstrated its operation using the...
Read more...“tl;dr two portable SSDs, synced with rsync; and a Backblaze bucket synced with restic”
Article
In this article, the author talks about his setup for backing up his laptop data. It's a quick read but the info is valuable. Everyone should have some sort of backup off their data because...
Read more...“Is this the right way to approach the uncertainty of a new system? It's enormously difficult to elicit the right logical boundaries in the beginning. The key is to make decisions as late as you can responsibly wait, because that is when you have the most information on which to base the...
Read more...“At the right, the ticket appears to have golden smart-card contacts, like a credit card with an EMV chip. However, those contacts are completely fake, just printed onto the card with ink, and there is no chip there. Presumably, the makers thought that making the card look like a smart card would...
Read more...“Wi-Fi-based Positioning Systems (WPSes) are used by modern mobile devices to learn their position using nearby Wi-Fi access points as landmarks. In this work, we show that Apple's WPS can be abused to create a privacy threat on a global scale. We present an attack that allows an unprivileged...
Read more...From the title, your first question is probably why?
Well, let me tell you why...
I'm building an app called mulVid. It's a Collaborative Video Production and Asset Managment Suite but more importantly it's completely web-based. Anyone who knows anything about video internals will tell you that...
Read more...Article - https://stevelosh.com/blog/2018/08/a-road-to-common-lisp/
I came for the information on Lisp and stayed for the discussion on language design. Language design has always fascinated me because at one point or the other over the last few years I’ve used every major language either...
Article - https://tjaart.substack.com/p/the-curious-case-of-the-missing-period
As a card carrying member of "Team Open Source", I'll readily admit that modern email is by far the best (and maybe the only) example of "walled gardens" being a net benefit to the internet.
This blog post is another...
Article - https://github.com/ohbarye/pbt
Having written thousands of unit tests, I can confidently say this has a lot of alpha.
With traditional unit tests, there will always be edge-cases that are not immediately (or vaguely) obvious and so won't be considered but with PBT that isn't a...
“A glance at Thorpe’s activities as an editor and translator (a full overview is provided below) shows an admirable range: from poems to law texts, psalms, chronicles and homilies. Thorpe also strikes as a humble man. His humility, as well as his intended purpose for most of his books, are made...
Read more...Step 0
You need to have working knowledge of the language(s) the software is written in and it's dev/deployment ecosystem. E.g. if you're dealing with a Python project,you should know what a requirements.txt file is.
You have no business dissecting a project if you can't even program in the...
Read more...“This post will be about some source-level techniques for speeding up C++ compilation, and their (dis)advantages. It will not talk about things external to C++, such as buying better hardware, using a better build system, or using smarter...
Read more...“Now, in a world where AI is replacing programmers by the minute, taking their jobs and revolutionizing the way we think about code, maybe we should be more open to the thoughts of the fresh new blood of the industry? In fact, the above code is a perfect example of a time-memory tradeoff. You’re...
Read more...“Major system issues that affect the reliability of our services are detected and mitigated quickly. However, there are several minor issues that take a longer time to detect and mitigate. Such minor issues can collectively result in poor user experiences and revenue loss over time. This is where...
Read more...“As a mediocre engineer, I took Internet and HTTPS communication for granted and never dove any deeper. Today we’re improving as engineers and learning a rough overview of how internet communication works, specifically focusing on HTTP and TLS.”
Article -...
Read more...© 2025 3commaass.com. All rights reserved.