Menu
About me Kontakt

You can filter posts by date, tag or even use natural language to find whatever you want

Most popular tags

Recent posts

How to Avoid Pitfalls with Data Indexing in PostgreSQL?

The article discusses data indexing techniques and their crucial importance for query performance in databases.

Keep Track - 3D tool for satellite tracking

KeepTrack is a task management app that enables effective project tracking and team collaboration.

Let's build a computer that will last 50 years - is it possible?

Ploum's article 'The Computer Built to Last 50 Years' highlights the importance of designing long-lasting computers. It emphasizes material quality and thoughtful architecture in electronics. The article calls for a more sustainable approach in computer engineering.

Squoosh - online image optimizer

Squoosh is an online image compression tool that allows quality preservation while minimizing file size.

Do not store sensitive data in environment variables and .ENV files

The article warns against using secrets in environment variables, highlighting risks and suggesting better management methods.

Guide to Increasing Router Security

RouterSecurity.org focuses on router security and network protection. It provides information, tips, and tools for securing internet connections.

Smart glasses from Meta - how are they built?

The article discusses Meta's AR glasses and the waveguide technology enabling effective image display. The author outlines the advantages and challenges of this technology.

HTMX - example of creating a SPA application

The article discusses building a Single Page Application (SPA) using HTMX, a tool that eases the addition of interactivity to web pages. The author outlines steps from basics, illustrated with practical examples.

Cap - self-hosted tool for screen recording

Cap is a versatile application creation tool that supports multiple languages, featuring good documentation and flexibility.

New phishing campaign using SharePoint

The article discusses the latest phishing techniques used by cybercriminals to steal data, emphasizing the need for education and caution online.

Source of content in this blog is https://news.mrugalski.pl

All content including posts, their short version, tags and video transcriptions is 100% AI generated