Menu
About me Kontakt

You can filter posts by date, tag or even use natural language to find whatever you want

Most popular tags

Recent posts

How We Deleted 4195 Code Files in 9 Hours

The article outlines how to organize a 'cleanathon' for the community, focusing on planning, location, and engaging participants.

Effective Phishing Attack Using Slack AI

The article addresses data exfiltration from Slack via AI, highlighting information security threats. It offers practical data protection tips.

Three Forces Motivating Programmers to Work

Ben Nortrop's article addresses key aspects of developer motivation, focusing on the importance of autonomy, growth opportunities, and recognition at work. He emphasizes the necessity of creating a supportive workplace culture for team effectiveness.

PostgreSQL as a replacement for most types of databases?

The article "8-16-24 - Just Use Postgres" advocates for using PostgreSQL as a stable and flexible database solution. The author presents its advantages, various application scenarios, and the active community, making PostgreSQL a significant solution for many IT projects.

Good refactoring vs. bad refactoring

The article discusses the differences between good and bad refactoring. Good refactoring improves code quality and performance, while bad refactoring focuses on cosmetic changes, which may worsen the situation.

Effective Changelogs - how to write them?

The article discusses the importance of effective changelogs in IT projects. It highlights how changelogs enhance transparency and communication within the team and with users. It suggests creating changelogs systematically and integrating them with project tools. The author recommends tailoring the language of changelogs to make them understandable for different user groups.

Time-based attacks usable in real life

The article discusses the dangers of timing attacks that exploit differences in server response times to leak data. It highlights the increasing complexity of these attacks, provides practical examples, and offers tips on how to defend against them.

Bug Squash - An Underestimated Form of Recruitment Task

The article discusses the importance of detecting and fixing software bugs, presenting testing methods and principles for a proactive approach to bug management.

How One Checkbox Generated $100 Million in Losses

Adrian's article critiques the U.S. Navy's $100 million checkbox expenditure, highlighting issues of budget wastage and lack of transparency in purchasing decisions.

Micro-libraries in programming should cease to exist

The Bvisness article describes microlibraries, which are small, standalone libraries simplifying application development. They offer ease and flexibility in adding functionality to projects.

Source of content in this blog is https://news.mrugalski.pl

All content including posts, their short version, tags and video transcriptions is 100% AI generated