278 articles
A complete guide to planning algorithms for AI agents. Learn how to implement efficient task planning and...
Speculative Decoding is a technique for accelerating large language models using a smaller draft model for token...
Learn how to adapt an AI model to your specific data through fine-tuning. A practical guide to techniques and...
Git Flow, GitHub Flow, Trunk-Based Development.
Comparison of the major LLMs — Claude (Anthropic), GPT (OpenAI), Gemini (Google).
Discover how memory works in AI agents and LLM models. A practical guide to context storage techniques, long-term...
Snowflake schema normalizes dimension tables into multiple levels. Storage savings at cost of complex queries.
Soda is a data quality monitoring tool with YAML configuration. Soda Checks Language and alerting.
Incremental backups with rsync, rotation and disaster recovery.
A comprehensive guide to the architecture of LLM-based AI agents. Learn to design and implement intelligent systems...
Software supply chain protection. Signed commits, verified builds, SLSA.
Celery, BullMQ, background jobs. How to process tasks asynchronously.
How to implement streaming LLM responses using Server-Sent Events. Token-by-token rendering, backpressure, error...
How to use Burp Suite for web application testing.
Overview of compliance frameworks. What they require and how to prepare.
Implementing idempotent APIs. Idempotency keys and database techniques.
Strings, Lists, Sets, Sorted Sets, Hashes, Streams.
All important security HTTP headers in one place.
Resource isolation to prevent cascading failures. Thread pools, connection pools.
Cache-aside, write-through, CDN, HTTP cache headers, Redis.
Prompt Injection is a serious security threat to LLM models. Learn how the attack works, its consequences and how to...
Preparing for a technical interview — coding, system design, behavioral questions.
Field types, analyzers and mapping strategies.
A programmer's career path — what is expected at each level.
Match, bool, range, aggregations and full-text search.
Automatic Let's Encrypt certificates in Kubernetes with cert-manager.
Data visualization from Elasticsearch.
How to identify and solve the N+1 query problem. Eager loading, DataLoader.
How to sign container images. Cosign, keyless signing, verify in CI/CD.
RLHF (Reinforcement Learning from Human Feedback) is the key technique that teaches large language models to respond...
Svelte basics. Reactivity without Virtual DOM, stores, SvelteKit.
How to implement TOTP, WebAuthn/FIDO2, SMS fallback.
Learn to build AI agents with the CrewAI framework. A practical guide to creating teams of autonomous agents with...
How to properly handle and return API errors. Error format, logging, retry.
A complete comparison of the most popular vector databases for AI applications and RAG systems. Comparing...
Learn the fundamentals of neural networks and build your first model in Python. A practical beginner's guide with...
Rehost, Replatform, Refactor, Repurchase, Retire, Retain, Relocate. Assessment and planning.
REST API design checklist — naming, versioning, error handling, pagination.
Modes, navigation, editing, macros, and Neovim with Lua.
Server Components, App Router, API routes, SSR/SSG.
Event sourcing, CQRS, message brokers. Event-driven architecture.
OpenTelemetry as the standard for traces, metrics and logs. Instrumentation, Collector and backend integration.
Effective on-call rotations. Alert quality, escalation, compensation, and burnout prevention.
Learn prompt engineering best practices for working with LLMs and AI agents. Tips and tricks for effective...
Centralized logging in 10 minutes with Loki + Promtail + Grafana.
Blob Storage access tiers, lifecycle management, SAS tokens and immutable storage.
Data contracts define agreement between data producers and consumers. Schema, SLA and versioning.
SSH hardening — key authentication, sshd configuration, fail2ban.
Learn to effectively combat overfitting with regularization techniques. Dropout, L1 and L2 regularization explained...
How to perform digital forensic analysis. Evidence, memory dump, disk image.
Docker container security. Image scanning, rootless containers, read-only filesystem and runtime security.
Implementing the Circuit Breaker pattern for resilient microservices. States, configuration, and practical examples.
Identifying and eliminating toil. Automating repetitive tasks, measurement and strategies for reduction.
Python from basics to advanced — syntax, OOP, async, virtual environments, best practices.
Cache-aside, write-through, write-behind and cache invalidation. A complete guide.
Redis — cache, sessions, queues, pub/sub. A complete guide.
How to write effective postmortems — blameless culture, timeline, root cause, action items.
Detailed comparison of SAML and OpenID Connect. Architecture, use cases, security, mobile support and migration...
10 tools for JSON and YAML — jq, yq, fx, gron and more.
How to test Python code. pytest, fixtures, mocking, coverage.
Configuration Management vs Infrastructure as Code.
Comparison of Adam vs SGD optimizers for neural network training. How to choose the right optimizer based on task...
VPC connectivity: peering, Transit Gateway, PrivateLink, VPN and Direct Connect.
How to index properly. B-tree, GIN, partial, covering indexes.
Protecting software supply chain integrity — CI/CD pipeline, auto-update, signatures.
Rate limiting implementation to protect APIs. Token bucket, sliding window and HTTP headers.
Two-factor authentication guide — TOTP, hardware keys, backup codes.
Star schema is foundation of dimensional modeling. Fact and dimension tables for analytical queries.
Design patterns for container orchestration. Sidecar, Ambassador, Adapter, Init Container and more.
How to create a portfolio that helps you get a job — projects, design, content.
10 practical bash tricks — history search, brace expansion, process substitution. Save hours daily.
Secure authentication — session management, MFA, protection against credential stuffing.
BuildKit as next-gen build engine. Parallel builds, cache mount, secret mount and multi-platform builds.
Discover the attention mechanism — the revolutionary technology that changed artificial intelligence. Understand how...
Learn to build intelligent agents with the AutoGen framework. A complete tutorial for working with LLM agents, their...
Disk management — partitioning, LVM, ZFS and monitoring.
Docker security checklist — image scanning, non-root, read-only filesystem.
How to communicate with native code from Flutter via Platform Channels. Method channels, event channels, Pigeon code...
Gradual deployment. Canary, feature flags, automated rollback.
How to properly hash passwords. Comparison of bcrypt, Argon2id, scrypt.
10 mistakes every junior developer makes — and how to avoid them.
How to properly log security events and detect attacks.
Discover Chain-of-Thought prompting — a technique that teaches AI models to solve complex problems step by step....
How to manage database schema. Alembic, Flyway, Prisma migrations.
How to build a gRPC service in Go. Protobuf, streaming, interceptors.
Error budget concept in SRE. Balancing reliability and speed.
Optimizing Docker images with multi-stage builds. Smaller images, faster deploys, more secure containers.
A guide to building a home lab — hardware, OS, services, networking.
Discover effective chunking strategies for RAG systems. Learn to optimally split text for better retrieval and...
Real-time communication technologies — comparison.
Why and how to use a password manager — Bitwarden, 1Password, KeePass.
Complete DNS explanation — hierarchy, record types, resolving, and DNSSEC.
Advanced chaos engineering experiments. Litmus, Chaos Mesh, steady state hypothesis and blast radius.
WireGuard for performance, OpenVPN for compatibility, Tailscale for simplicity.
5 OOP design principles with practical examples in Python.
Checklist pro setup newho projektu — repo, CI/CD, monitoring, documentation.
A practical guide to the most common web vulnerability — Broken Access Control. Examples, prevention and code.
A complete guide to E2E testing with Playwright. Auto-waiting, locators, fixtures, parallel execution, visual...
InfluxDB for metrics, IoT and monitoring.
Cloud migration checklist — assessment, planning, migration, optimization.
Security audit logs. What to log, format, retention, compliance.
Data lake is central repository for raw data in all formats. Architecture and best practices.
Simulated incidents for testing team readiness. Planning, scenarios and lessons learned.
Complete guide to the OpenID Connect protocol. Authorization Code Flow, PKCE, ID tokens, claims, discovery endpoint...
Overview of free and paid tools for developers — when it pays to pay.
A complete guide to Git from basics to advanced techniques — branches, merge, rebase, hooks.
Tracing system calls and library calls.
Medallion architecture organizes data into three quality layers. Bronze (raw), Silver (clean), Gold (business).
Complete production deployment checklist — before, during, and after deployment.
A guide to the Linux directory structure — FHS standard.
How to properly configure a firewall. iptables, nftables, cloud security groups.
Delta Lake adds ACID transactions, schema enforcement and time travel over Parquet files.
Server-side A/B testing. Assignment, tracking, statistical significance.
Jaeger for distributed tracing. Architecture, deployment, sampling strategies and latency analysis.
Complete guide to data governance. Policies, roles, data classification and lineage.
Great Expectations is a Python framework for data validation. Expectations, suites and pipeline integration.
A complete guide to jq for filtering, transforming and analysing JSON data.
How to write a README that convinces people to use your project.
Most important design patterns. Factory, Observer, Strategy, Singleton.
Strategy for deploying passkeys in enterprise environments. Migration from passwords, coexistence with MFA, device...
Modern Linux firewall — nftables and firewalld.
A practical guide to implementing SLOs and SLIs. Metric selection, error budget calculation, alerting and burn rate.
Painless mesh VPN — installation, subnet routing, exit nodes, ACL.
Contract testing with the Pact framework. Consumer-driven contracts, provider verification, Pact Broker, and...
Incident management process from detection to resolution. Severity levels, roles, communication and escalation.
Interactive monitoring — htop, btop and glances.
Apache Superset is an open-source BI by Airbnb. SQL Lab, 40+ visualizations and enterprise security.
Open-source embedded vs managed serverless vector DB.
Disaster recovery checklist — RTO/RPO, failover, communication, testing.
How to scale WebSocket connections to millions of users. Redis Pub/Sub, sticky sessions, connection pooling and...
Data partitioning is key for performance. Time-based, hash and range partitioning in data lake and warehouse.
Ownership, borrowing, lifetimes. How Rust guarantees memory safety without GC.
Checklist for AI/ML projects — data, model, deployment, monitoring, ethics.
Effective on-call. Alerting, runbooks, sustainability.
Separating business logic from infrastructure. Ports, adapters, and testable code.
REST API design a implementace — principy, CRUD, autentizace, versioning, best practices.
A complete guide to Apache Airflow. DAGs, operators, scheduling and best practices for production deployment.
Understand the difference between few-shot and zero-shot learning in AI. Practical examples of both approaches in...
Web accessibility checklist (WCAG 2.1) — navigation, colors, forms, screen readers.
Introduction to chaos engineering. Principles, experiments, tools.
Cypress vs Playwright in 2025. Architecture, speed, debugging, cross-browser support, and decision criteria for your project.
Server-Sent Events as a simpler alternative to WebSockets. Implementation, reconnection, event types and comparison...
Effective postmortem. Template and blameless culture.
How to design REST APIs. URL conventions, HTTP methods, status codes, HATEOAS.
Sidecar container for cross-cutting concerns. Logging, monitoring, service mesh.
Git as single source of truth for infrastructure.
Effective runbooks for incident response. Structure, automation and operational documentation maintenance.
Architectural approaches to multi-tenancy. Shared DB, schema per tenant, DB per tenant.
20 tricks for Mac terminal — pbcopy, caffeinate, mdfind, defaults and more.
Design patterns for message queues. Work queues, dead letter queues and examples with RabbitMQ.
Go basics. Structs, interfaces, error handling, goroutines.
10 Linux commands for emergency situations — full disk, zombie processes, network debugging.
Asynchronous programming in Python. asyncio, aiohttp, practical examples.
Session management, split panes, surviving SSH disconnections.
Token Bucket, Leaky Bucket, Fixed/Sliding Window.
Learn to use Function Calling in LLM models and agents. A complete tutorial with practical examples and...
Reliability vs speed — when to use which protocol.
A complete guide to RAG architecture — from basic principles to practical implementation. Learn to build intelligent...
Elastic Compute Cloud on AWS. Instance types, AMI, Auto Scaling, Spot and Reserved instances.
Mixture of Experts (MoE) is an advanced neural network architecture that enables efficient scaling of AI models. It...
20 kubectl commands for everyday Kubernetes work. From basics to debugging.
A practical guide to chaos engineering. Steady state hypothesis, blast radius, game days, Litmus Chaos and...
Latest C# features. Primary constructors, collection expressions, AOT.
Model Context Protocol (MCP) enables AI agents to securely access external data and services. Learn how MCP is...
Comparison of embedding models for production deployment — performance, speed, cost and quality of text vector...
Advanced OTel Collector deployment. Tail sampling, processors, connectors and deployment patterns.
Advanced Compose — profiles, health checks, secrets, resources.
Ollama — local AI models, installation, API, models, integration.
A complete guide to API versioning strategies. URL versioning, header versioning, content negotiation, sunset...
Data mesh is architectural approach based on domain ownership and data products.
Secure use of JWT. Signatures, expiration, refresh tokens, common mistakes.
Discover how AI understands text through embedding models. Learn the basics of vector representations, semantic...
What are vector DBs, how they work and when to use.
How to detect and prevent hallucinations in large language models (LLMs). Practical methods and techniques for...
How to implement passkeys (WebAuthn/FIDO2) in web applications. Registration, authentication, platform vs...
When to use ORM and when raw SQL. Advantages, disadvantages, hybrid approach.
Zero-downtime release using two identical environments.
DPO (Direct Preference Optimization) is an advanced method for training AI models based on human preferences. A more...
How to build data quality framework. Quality dimensions, metrics, processes and tools.
Gradual deployment of a new version to a small subset of users. Monitoring, rollback, and automation.
30 VS Code shortcuts — navigation, multi-cursor, refactoring, debugging.
Jailbreak prevention for LLMs and AI agents — security measures against misuse, detection of harmful prompts and...
A practical guide to sed and awk — text editing, data extraction and log transformation.
Discover LoRA and QLoRA techniques for efficient AI model fine-tuning. Learn how to adapt large language models with...
MAJOR.MINOR.PATCH software versioning.
Gradual rollout of new features. Kill switches, percentage rollout, and A/B testing.
Discover how backpropagation works — the key algorithm that enables neural networks to learn from errors and...
Passwordless authentication with WebAuthn and passkeys. Implementation and UX.
In-memory store comparison — Redis vs Memcached.
Certificate lifecycle. Automatic renewal, monitoring, cert-manager.
Secure containers. Image scanning, runtime security, best practices.
A detailed comparison of three major orchestration tools. Architecture, strengths and when to choose each.
A complete guide to evaluating large language models. Metrics, methods and tools for assessing LLM performance in practice.
Learn to work with the LangChain framework for building AI agents and applications with large language models. A...
Data Vault 2.0 — hubs, links, satellites and auditability principles for enterprise warehouse.
Columnar analytical database — billions of rows per second.
Discover the power of multi-agent orchestration with LLMs and AI agents. Learn to coordinate multiple intelligent...
How to perform a pentest. Methodology, tools, reporting.
Grafana Loki for centralized log collection. Architecture, LogQL queries, label design and integration.
Production incident procedure. Severity, roles, communication.
Incident response checklist — detection, communication, mitigation, postmortem.
Goroutines, channels, select, sync. Concurrent programming in Go.
Apache Hudi is a table format optimised for upserts and CDC. Copy-on-write and merge-on-read.
Code review checklist — what to focus on when reviewing pull requests.
Regex cheat sheet — basic characters, quantifiers, lookahead, practical examples.
How to protect login, API, and forms against brute force attacks.
SQL from basics to advanced — SELECT, JOIN, subqueries, window functions, CTEs.
How to implement rate limiting. Token bucket, sliding window, distributed rate limiting.
Building an internal developer platform. Self-service, golden paths, developer experience and Backstage.
Batch Normalization is a key technique for stabilising deep neural network training. It accelerates convergence and...
A complete guide to the Transformer architecture — the revolutionary AI technology behind GPT, BERT and other...
Performance testing checklist — load testing, stress testing, baseline, metrics.
What is SBOM, why you need it, and how to generate it.
Automatic pod scaling based on CPU, memory or custom metrics.
Build artifact management. Docker registry, npm, Maven.
Offset vs cursor pagination. Keyset pagination, infinite scroll.
Transfer Learning enables leveraging pre-trained models for new tasks with less data. Learn how to effectively apply...
FinOps framework, showback/chargeback, budgeting and cultural change.
Minimalistic container images without OS. Maximum security, minimal attack surface.
Riverpod is a modern state management solution for Flutter. Learn providers, code generation, AsyncValue and...
A complete guide to loss functions for machine learning. Learn to choose the right loss function for classification,...
A collection of practical Bash one-liners for everyday administration.
Advanced offline strategies for PWA. Cache-first, network-first, stale-while-revalidate, background sync and...
Go profiling with pprof — CPU, memory, goroutine profiling, flame graphs.
Slowly Changing Dimensions (SCD) Type 1, 2, and 3. Implementation in dbt and warehouse.
How to comply with GDPR technically. Pseudonymization, encryption, data retention, data subject rights.
Most common mistakes in server, framework, and cloud service configuration.
A complete guide to system prompt design for LLMs and AI agents. Learn to create effective instructions that improve...
OpenMetadata is an open-source catalog focused on collaboration. Active metadata, profiler, and governance.
Route 53 routing policies, health checks, DNS failover and DNSSEC.
A guide to AI model quantization: GPTQ, GGUF and AWQ methods for running large language models efficiently with...
Design-first approach to API development. OpenAPI specifications, automatic code generation, API linting, style...
Blameless postmortems in practice. Structure, facilitation, action plans and building a learning culture.
What is SIEM, how it works, open-source vs commercial solutions.
Difference between pub/sub and point-to-point messaging. When to use which model.
A complete overview of load testing strategies. Smoke, load, stress, spike, soak tests — when to use each type and...
Index types, compound, explain and optimization.
Overview of deployment strategies. Rolling update, Recreate, Blue-Green, Canary, A/B testing and Shadow deployment.
How to properly encrypt data and avoid cryptographic mistakes.
How to optimize database queries. EXPLAIN, rewrite, materialized views.
Discover Human-in-the-Loop patterns for LLMs and AI agents. Practical approaches for combining human intelligence...
Local LLM inference — Ollama for simplicity, vLLM for performance.
Why and how to rotate encryption keys. Automation, grace period, re-encryption.
Persistent storage in Kubernetes. PV, PVC, StorageClass and cloud provider integration.
Discover the power of hybrid search combining BM25 and vector embeddings. Learn to implement advanced search systems...
MongoDB setup, CRUD, schema design and indexes.
Managing releases. Release trains, feature flags, rollback.
Proper implementation of retry logic. Exponential backoff, jitter and when NOT to retry.
A complete guide to text tokenisation in AI — BPE, WordPiece algorithms and their use in modern language models....
CI/CD pipeline checklist — build, test, security, deploy, monitoring.
Performance optimization — CPU, memory, I/O, network, kernel parameters.
What is eventual consistency and how to work with it in UI and backend.
Embedded SQL database in single file.
Will AI replace programmers? A realistic look at Copilot, GPT and the future of programming.
How to define bounded contexts in Domain-Driven Design. Context mapping and ubiquitous language.
How to write fast SQL queries. EXPLAIN, indexes, query patterns.
Comparison of batch and stream processing. Latency, throughput and typical use cases.
Falco, Tetragon, runtime threat detection and response.
How to implement visual regression testing. Playwright screenshots, Percy, Chromatic, pixel comparison and...
Modern Data Stack overview. Ingestion, warehouse, transformation, orchestration, quality and visualization.
Reverse ETL syncs data from the warehouse back to CRM and marketing tools.
Fargate autoscaling, EFS volumes, blue-green deploy and pricing.
How to set up alerting that doesn't cause alert fatigue — symptoms vs causes, severity, runbooks.
Kubernetes from the basics — pods, services, deployments, ingress, monitoring.
Python for productivity, Go for performance and simplicity.
How to write documentation people will actually read — types, structure, tools.
Discover effective tool use patterns for large language models and AI agents. Practical approaches for optimising...
Image hardening, supply chain, runtime protection and scanning.
Service Level Indicators and Objectives. Measuring reliability.
Progressive delivery strategies. Canary with metrics, blue-green with rollback and feature flags.
Comparison of Flask and FastAPI. Performance, ecosystem, learning curve.
Detailed comparison of PWA and native applications. Performance, features, distribution, UX and decision framework...
Comparing cron and systemd timers for task scheduling.
Advanced SSH tricks — tunnelling, multiplexing, jump hosts, SOCKS proxy.
Secure application design from the start. Threat modeling, security requirements and secure by design principles.
SAML 2.0 for enterprise SSO. Assertion flow, metadata, SP-initiated vs IdP-initiated login, certificates and...
How OIDC extends OAuth with identity. ID Token, UserInfo, discovery.
WebSocket server and client. Chat, notifications, live updates.