ai
Building a Bayesian Spam Classifier from First Principles
We work through the original Bayesian Spam Classifier paper from Microsoft Research. And then make it practical by applying to the Enron spam dataset
ai
We work through the original Bayesian Spam Classifier paper from Microsoft Research. And then make it practical by applying to the Enron spam dataset
clamav
If you run a server with limited resources—specifically, standard 4GB RAM and 2 vCPU setup- you are likely familiar with the constant, stressful balancing act between performance and security. You know you need antivirus protection and system audits. You know the risks of leaving a server vulnerable to intruders,
ufw
Many of us believe that the combination of UFW and Docker is the standard stack for deploying applications securely without exposing docker container ports. Configuring UFW via provisioning tools like Ansible is usually seamless, giving us confidence that our servers are secure. However, there is a massive, often overlooked security
llms
If you’re tired of hitting limits, waiting on slow responses, or paying monthly just to use an online model, there’s a better option. With Ollama, you can run powerful LLMs directly on your own machine.
web performance
Learn how render blocking CSS slows your site and how Critical CSS can help you boost your PageSpeed score.
svg
When building logos, icons, or illustrations for the web, SVG (Scalable Vector Graphics) is one of the most powerful tools in a developer’s toolkit. Unlike raster images (PNG, JPEG, WebP), SVG is mostly resolution-independent and code-driven, meaning your graphics almost always stay sharp, lightweight, and infinitely scalable without quality
linux
This post traces a TCP packet’s journey through Linux, explaining interfaces, iptables tables and chains, and the networking stack with an analogy, example, and technical details for engineers.
We work through the original Bayesian Spam Classifier paper from Microsoft Research. And then make it practical by applying to the Enron spam dataset
If you run a server with limited resources—specifically, standard 4GB RAM and 2 vCPU setup- you are likely familiar with the constant, stressful balancing act between performance and security. You know you need antivirus protection and system audits. You know the risks of leaving a server vulnerable to intruders,
Many of us believe that the combination of UFW and Docker is the standard stack for deploying applications securely without exposing docker container ports. Configuring UFW via provisioning tools like Ansible is usually seamless, giving us confidence that our servers are secure. However, there is a massive, often overlooked security
Learn how render blocking CSS slows your site and how Critical CSS can help you boost your PageSpeed score.
Philosophy x Engineering blog by hexmos.com
How does data travel from a server to your screen in a split second? What is the logic behind it? What rules and protocols does it use that make it all work?
Learn how to distribute work across multiple goroutines and merge their results back into a single stream using Go's Fan-Out and Fan-In patterns. We'll break down these powerful concurrency patterns with practical examples you can use right away.
A practical guide to metadata, sitemaps, authority, search engines, and how it all actually connects
How to build a reliable task queue in Go using PostgreSQL’s built-in features—no extra infrastructure needed.
Hello, I'm Maneshwar. I'm building *Free DevTools*, a single hub for developers with 50,000+ free resources, icons, cheat sheets, and TLDRs. No login, unlimited downloads.
Want to know if your website is fast enough? Google's Core Web Vitals measure three key things: how quickly your page loads, how fast it responds to clicks, and whether it jumps around while loading. Fix these, and you'll rank better while giving users a smoother experience.
When building modern applications, especially for mobile devices, how you get data from the server to the client is everything. For years, REST has been the standard for API design, but it often comes with frustrations. Let's look at the problems that led to a new way of
eBPF has revolutionized Linux observability and security by allowing sandboxed programs to run in the kernel without changing kernel source code or loading modules
For decades, computers were built for logic -- branching decisions, compilers, databases. But AI flipped the script: today's machines are being rebuilt for one thing above all else -- multiplying matrices at massive scale
Instead of just treating LLMs as black boxes, RML helps us understand which parts of the model contribute to specific outputs.
You’re in the middle of a Teams call with your DevOps crew when a service starts throwing alerts. Requests are piling up, some users are getting errors, and the backend logs look like they’ve been hit by a firehose. You could spin up more servers, but that’s
Meilisearch is a really powerful search engine; it’s fast, open-source, and easy to set up. But if you don’t configure it properly, especially the indexing and attributes, it can start to feel slow. Let’s say you set up an index with a few thousand records and start