You can filter posts by date, tag or even use natural language to find whatever you want
Most popular tags
Recent posts
Junior Developers in the World of AI - Why Their Role Still Matters?
The article discusses how AI affects junior developers, emphasizing the importance of soft skills and creativity. It encourages viewing AI as a support tool rather than a threat.
How Perplexity Acquires Users and Builds Its Growth?
The article discusses the complexity of user acquisition and retention in technology, emphasizing the importance of data analysis and understanding user behaviors.
What Google Showed at the I/O 2025 Conference - Discussion
Google I/O 2023 introduced many exciting innovations, including the new AI model Gemini, Android updates, and advancements in extended reality. These changes aim to enhance user engagement and integrate more advanced technology into daily applications and devices.
Scraperr - self-hosted scraper with a web interface
Scraperr is a simple and efficient open-source project for web data collection.
Simulating Error Scenarios in API Using Mocks
The article discusses simulating API errors using mock APIs, emphasizing their role in application testing and quality improvement.
Manifest - micro-backend in a single YAML file
Manifest is a tool that helps developers manage projects integrated with various systems.
The number of DDoS attacks increased by 358% year-on-year - Cloudflare data for Q1 2025
The Cloudflare article discusses DDoS threats in Q1 2025, focusing on the sophistication of attack techniques and the need for organizational protection. The role of modern technologies in security is also highlighted.
How to faster copy large SQLite databases between computers?
The article presents various methods for copying SQLite databases, highlighting scenarios and data security.
How Barack Obama's BlackBerry Was Secured in 2009
The article discusses how Obama's BlackBerry was secured, focusing on security concerns regarding communication.
SQL Injection in the Era of ORM - Is it Possible?
The article discusses SQL injection risks in ORM environments and protective methods such as input validation and using parameters in SQL queries.
Source of content in this blog is https://news.mrugalski.pl
All content including posts, their short version, tags and video transcriptions is 100% AI generated