Tech
-
Markmap vs Mermaid for Spec-Driven Development (SDD)
Markmap vs Mermaid for Spec-Driven Development You will consider sooner or later. When You have to go “full on AI” documentation stops being a nice-to-have and becomes a must be part of the product. We need to convey a lot of information, with hopefully as little text as possible so we can easily read it and digest the information. Two popular options for Markdown documentation features are Markmap and Mermaid. They solve different problems, and the best choice depends on whether you want fast idea mapping or more structured diagrams for flows. When to use Markmap Markmap turns Markdown headings and bullet points into an interactive mind map. Useful for…
-
Productive struggle vs AI slop
Productive struggle vs AI slop is quite the topic these days. On one hand we have to do the hard, boring, frustrating work. Do it long enough to learn the whole lot, reshape skills, gain confidence. Opposition of escaping to quick fixes with or without AI. When used in conjuction with AI, we should still keep the struggle but without the pointless friction. That way more energy and cognitive power goes into craft and progress, long-term growth… instead of refactoring some legacy code and working over things that should not be that hard in the first place. What is productive struggle? Productive struggle is the time and space where a…
-
Statics VS AI code analysis ~13 tools
Statics VS AI code analysis works best using the pros from both words. Go hybrid ! Static tools understand the syntext, hardcoded parameters and are very strict. On the other hand AI understands context, can figure out business logic, adapt the codebase. Logic flaws or performance bottlenecks rule-based scanners might miss, AI will put more effort into that. Static analysis limits Static tools scan for syntax errors, style violations, and basic security patterns using fixed rules. Always consistenst, very fast but might generate false positives, ignore business logic, and require manual rule overrides. How often did You use @typescript-error 🙂 Do You code for the linter to pass, logic to…
-
Code mode for mcp servers and llms
Code mode for mcp servers is about LLM writing and calling the code to use a proper MCP instead of calling it directly with the whole context. It makes the call a lot smaller, no overhead is passed, just the basics that are required to call the proper MCP method. Just as You do in code, method or a function, proper parameters, everything validated and… BAM ! We are returning a context that LLM uses in further stages. Anthropics wrote… This is really nice looking but only for a huge models with a 1kk tokens of a context. We need to remember that this is not possible on any kind…
-
Data contracts. Building universal data access proxy api
Data contracts usually requires us to build around them a universal data access proxy API for users to consume. API utilizing proper data contracts, negotiated with different teams, acts as a unified gateway providing the necesities. Allows access to data sources like databases, REST APIs, GraphQL endpoints or other file systems. One api to rule them all Steps to build data contracts for proxy api You could try and adopt a similar flow for creating such access points, even make a template in JIRa so You will know where to get proper data and how to acquire it… or maybe expose the library and just aprove properly looking merge requests……
-
Law of Demeter in programming
Law of Demeter in programming You could in short paraphrase as “Don’t talk to strangers!” or “Keep Your hands in your pockets”. A class needing data from a deep chain of objects like – user.getAddress().getStreet().getNumber().It is visible very often in OOP, less in functional approachess ! The Law of Demeter states that method only knows its closest dependencies: itself, passed parameters, created objects, and own fields. Should not be used with dot chains ( they were so fancy when we started Java 8 back in the day). What to Remember? Where Law of Demeter comes from ? Why Demeter ? The Law of Demeter in progamming takes its name from…
-
Burner email
Burner email is number one technique to keep You sane of Your private data… beeing private. This is not about just loosing Your account, it is about loosing, breaching, leaking Your accoun, Your email, profile data You provied and password to the general public. Naughty hackers included. Burner mail address is a smart privacy and security strategy (checkout OWASP ) . It is a temporary, disposable address, and and account You make based on that email, that keeps your true, real life data separated from anything else. Crucially, you should use something You can always loose.. better yet.. Your worst enemy can get their hands on… Burner email services Name…
-
How to check if Your email and password was leaked
Why You need a strong passwords and check if it was breached How to check if Your email and password was leaked ? Just check the security blogs or institutions like https://databreach.com/. Google the title of this blog post. Fix your breached credentials or You will be sorry ! Passwords are Your first line of defense. Multiple factor authentication (MFA) like sms, email verification or authentication application should also be something You do! How to make a good password ? Many different ways to make it happend. I would recommend to consider : This is a simple algorith You can use to remember all of those passwords and every one…
-
Adr vs readme vs changelog
Adr, readme and changelog are the most valueable pieces of documentation that a project could? / should? maintain. They provide us with crucial, core informations we need to star and continue effective development. Let us look at them closely. Usually we can keep everything in plain text or better yet use a Markdown format. You can even try and use some linter, highlgihts for easier writing. ADR (Architectural Decision Record) ADR (Architectural Decision Record): Document that holds a single, significant architectural decision. Includes the context, options that were considered, chosen solution with consequences. Serves as a traceable rationale for future reference as well as new team members. Readme txt or…
-
The Golden Byte. Most valuable data
The Golden Byte. Most valuable data In data engineering, every byte has a cost but not all bytes are made to be equal ( read Animal Farm by George Orwell). We collect terabytes of data in the form of logs, metrics, cookies, text, pictorues and transactions. Yet only a small portion of this information is truly crucial and drives business outcomes. That fraction is what can call the Golden Byte, single most valuable unit of data that fuels strategic insight and decision-making. Data tiers architecture The Golden Byte embodies the essence of a gold layer in modern data architecture: raw ,curated , aggregated, and business-ready information. It is the outcome…
























