Menu
About me Kontakt

You can filter posts by date, tag or even use natural language to find whatever you want

Most popular tags

Recent posts

Junior Developers in the World of AI - Why Their Role Still Matters?

The article discusses how AI affects junior developers, emphasizing the importance of soft skills and creativity. It encourages viewing AI as a support tool rather than a threat.

How Perplexity Acquires Users and Builds Its Growth?

The article discusses the complexity of user acquisition and retention in technology, emphasizing the importance of data analysis and understanding user behaviors.

What Google Showed at the I/O 2025 Conference - Discussion

Google I/O 2023 introduced many exciting innovations, including the new AI model Gemini, Android updates, and advancements in extended reality. These changes aim to enhance user engagement and integrate more advanced technology into daily applications and devices.

Scraperr - self-hosted scraper with a web interface

Scraperr is a simple and efficient open-source project for web data collection.

Simulating Error Scenarios in API Using Mocks

The article discusses simulating API errors using mock APIs, emphasizing their role in application testing and quality improvement.

Manifest - micro-backend in a single YAML file

Manifest is a tool that helps developers manage projects integrated with various systems.

The number of DDoS attacks increased by 358% year-on-year - Cloudflare data for Q1 2025

The Cloudflare article discusses DDoS threats in Q1 2025, focusing on the sophistication of attack techniques and the need for organizational protection. The role of modern technologies in security is also highlighted.

How to faster copy large SQLite databases between computers?

The article presents various methods for copying SQLite databases, highlighting scenarios and data security.

How Barack Obama's BlackBerry Was Secured in 2009

The article discusses how Obama's BlackBerry was secured, focusing on security concerns regarding communication.

SQL Injection in the Era of ORM - Is it Possible?

The article discusses SQL injection risks in ORM environments and protective methods such as input validation and using parameters in SQL queries.

Source of content in this blog is https://news.mrugalski.pl

All content including posts, their short version, tags and video transcriptions is 100% AI generated