Menu
About me Kontakt

You can filter posts by date, tag or even use natural language to find whatever you want

Most popular tags

Recent posts

Anti-patterns of error handling in Laravel and how to avoid them

The article discusses an effective approach to using try-catch in Laravel, proposing better error handling and logging practices.

Page with analyses of series, their seasons, and episodes

Breaking Bad is an acclaimed American series about a chemistry teacher who turns to meth production to secure his family's future. It has received widespread recognition.

How does cache warming work and when is it worth using?

The article covers performance optimization techniques for applications, including caching and efficient database queries.

How to prepare an AI agent to work with your code?

The article addresses the onboarding process in IT firms, emphasizing the importance of effectively integrating new employees into the team.

Does Perplexity bypass robots.txt restrictions using hidden bots and variable user agents?

The article discusses the issue of hidden crawlers that disregard indexing rules used by Perplexity. It highlights the importance of ethics in the internet and the need to protect user data.

Token prices are falling, but AI costs are... rising?!

The article highlights the importance of AI subscriptions, which are becoming crucial in the tech market. It emphasizes the flexibility and access to modern tools for companies and users.

My 6 Weeks with Claude Code - A New Work Dynamic?

The article discusses six weeks of using the Claude code generation tool, highlighting both its benefits and drawbacks. The author provides examples of its use and limitations.

How to master time management as a manager?

Application of TMGR model in machine learning.

Good tips for working with PostgreSQL - improve your workflow

The article presents five patterns that can enhance the effectiveness of using PostgreSQL, covering query optimization, index utilization, transaction management, and database migration strategies. Implementing these effective techniques will lead to more efficient applications.

Blue Team: Linux Security - Step by Step, Securing the Live System [sponsored]

The article on Linux security emphasizes the importance of protecting the system from threats through updates and monitoring.

Source of content in this blog is https://news.mrugalski.pl

All content including posts, their short version, tags and video transcriptions is 100% AI generated