Menu
About me Kontakt

You can filter posts by date, tag or even use natural language to find whatever you want

Most popular tags

Recent posts

Video thumbnail

In his video, Mateusz Chrobok discusses how artificial intelligence can simplify daily life through task automation. He emphasizes that AI agents can accomplish complex tasks without supervision, enabling procedures that previously required human involvement. He also invites viewers to participate in a course teaching how to program and implement AI agents in practice. The video has garnered 43,316 views and 1,849 likes.

Video thumbnail

Phoebe Yu discusses the stark differences in design between Japanese and American websites, exploring cultural factors like 'anshin' that influence these choices. It’s a reminder for designers to consider cultural nuances in their work and what they mean for user experience. Understanding these differences enriches our approach to design.

Video thumbnail

Mateusz Chrobok addresses the subject of spoofing, which is the illegal impersonation of phone numbers. This phenomenon jeopardizes the financial security of many individuals, and Polish regulators and telecom operators are working to counteract such practices. New measures such as lists of numbers that cannot initiate calls and a "safe harbor" that allows for verifying incoming calls are being introduced. Mateusz stresses the importance of vigilance and avoiding hasty decisions. Ultimately, his video has already reached 106,145 views and 4,435 likes, showcasing a growing interest in security issues online.

Video thumbnail

On the "Historia bez Cenzury" channel, the history of Polish computers from the PRL era is presented. The episode discusses key moments such as the creation of the XYX, Odra, and the innovations by Karpiński. Despite difficulties, Polish scientists were able to build intriguing machines that influenced technology development in the country. The episode has gained 777134 views and 26531 likes.

Video thumbnail

Jakub 'unknow' Mrugalski from UW-TEAM.org explains how to use vector databases with just two skills: running a Docker container and working with a JSON API. In practical examples, he shows how to set up a local QUADRANT database, create collections, and add new vectors, as well as how to query in natural language. This accessible approach to advanced technology makes it available to anyone wanting to explore the topic of databases.

Video thumbnail

In July 2024, viewers were treated to a plethora of crazy tech events, from the implement of TypeScript support in Node.js to the significant CrowdStrike disaster affecting 8.5 million machines. The discussed topics included the revolutionary FastHTML framework and significant acquisitions like Stripe’s purchase of LemonSqueezy. Throughout the month, Google introduced an intriguing AI model, while OpenAI previewed a new search engine named SearchGPT. Another highlight was the launch of Mistral Large 2, potentially rivaling existing competition. Fireship emphasizes both the bright and dark sides of technology in today’s world.

Video thumbnail

The PROIDEA Events presentation on Mikrus hosting provided valuable insights into ensuring security in a development environment. The owner, using personal experience, explained how to implement practical solutions to combat threats. Changing standard ports, eliminating unwanted traffic, and strong passwords are among the advanced methods that enhance user security. Knowledge gained during the presentation can be invaluable for anyone working in the IT industry. Statistics – 4929 views and 247 likes – indicate a high interest in the subject.

Video thumbnail

Jakub 'unknow' Mrugalski from UW-TEAM.org presents debugging techniques for Docker containers, particularly those inherited without documentation. In his video, using the example of the 'wywrotka' container, he shows how to quickly identify errors and resolve issues without modifying the container. During the analysis, Jakub employs various commands to examine the container's structure and access key files, demonstrating how crucial it is to adeptly utilize logs and system tools in the debugging process. With these skills, even those with less experience can swiftly tackle similar issues. The video has already garnered 7884 views and 453 likes, affirming its value to the IT community.

Video thumbnail

In his latest video, Mateusz Chrobok highlights a concerning vulnerability in OpenSSH that allows for the remote takeover of millions of devices running on Linux. This issue, known as CVE-2024-6387, is prompting users to update their systems as soon as possible. Mateusz's message is clear: securing servers and implementing additional precautions is crucial for protecting against this serious threat.

Video thumbnail

In his new video, Mateusz Chrobok discusses the phenomenon of sharenting, which has firmly established itself in social media. Sharing photos of one’s children online, often at the expense of their privacy, is becoming the norm for many parents. According to research, 80% of children have a digital footprint before their second birthday. Mateusz warns that these actions may carry far-reaching consequences and encourages reflection before posting any content about children. Currently, the video has 38,886 views and 2,339 likes, highlighting how important this topic is for modern parents.

Source of content in this blog is https://news.mrugalski.pl

All content including posts, their short version, tags and video transcriptions is 100% AI generated