Menu
About me Kontakt

You can filter posts by date, tag or even use natural language to find whatever you want

Most popular tags

Recent posts

Lazy loading vs eager loading - what is the difference?

The article discusses the differences between lazy loading and eager loading. Lazy loading improves page load times by delaying resource loading, while eager loading loads everything up front. Both approaches have their advantages and disadvantages depending on user needs and project specifications.

Analysis of the alleged 'bad' RJ45 adapter

In the article "Investigating an Evil RJ45 Dongle", the author explores a malicious network device, revealing its potential threats and protection methods, providing valuable insights into IT security.

Autocorrection in GIT is useless! - why is it so fast?

The article discusses the autocorrect feature in Git, emphasizing its speed and impact on developer productivity. It highlights that this function is not only helpful but essential in everyday work.

Cosine Similarity - Be Careful with It!

The article critically evaluates the popular similarity measure - cosine similarity. The author highlights its limitations, such as the disregard for word context. Instead, he suggests modern approaches like using language models. He emphasizes the need for a creative approach to textual data analysis. The discussion encourages the search for better methods to achieve more reliable results.

Kagi Search Review After 3 Months of Use

The author reviews Kagi Search and the Orion browser after three months of use, noting their unique features, including personalized search results and the browser's fast performance.

Facebook replaces user links on its pages - why?

The article discusses link shimming on Facebook, a technique for link manipulation. It includes a description of its functionality and ethical considerations in technology.

Creating Aesthetic API Keys - Interesting Reflections

The article "Beautiful API Keys" discusses the importance of aesthetics and usability in designing API keys, highlighting their impact on security and functionality.

Did you know that BASH has support for associative arrays?

The article discusses the use of hashmaps in Bash, demonstrating how to create and manage data in key-value format. A valuable resource for script programmers.

How to Bypass Google Chrome Restrictions and Still Use uBlock Origin

The author discusses how to effectively use uBlock Origin in Google Chrome despite recent changes. Key settings and techniques are presented to enhance ad-blocking performance and privacy protection.

Censorship on the Internet - The Ministry of Digitization is scheming once again

The article discusses a new proposal for the e-services law that could introduce censorship on the internet in Poland. It includes expert opinions and warns about limitations on freedom of speech.

Source of content in this blog is https://news.mrugalski.pl

All content including posts, their short version, tags and video transcriptions is 100% AI generated