I Built a Privacy-First Collection of Browser-Based Dev Tools
What's included There are 10 tools so far: - JSON Formatter – format, minify, and validate with syntax highlighting - Base64 Codec – encode/decode with full Un...
What's included There are 10 tools so far: - JSON Formatter – format, minify, and validate with syntax highlighting - Base64 Codec – encode/decode with full Un...
markdown !LinkerTube screenshothttps://media2.dev.to/dynamic/image/width=800,height=,fit=scale-down,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.ama...
!Cover image for Secure Remote Access to AWS Resources from On-Premiseshttps://media2.dev.to/dynamic/image/width=1000,height=420,fit=cover,gravity=auto,format=a...
markdown !MaxxMinihttps://media2.dev.to/dynamic/image/width=50,height=50,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuplo...
Here’s the cleaned‑up markdown with all the unnecessary whitespace removed while preserving the original content and formatting: markdown JAN. 28, 2026 Tailor G...
My Journey with Local LLMs for Network‑Analyzer Support Developed in C++, often on‑site with customers. Offline work means no access to ChatGPT, Claude, Gemini...
Code smell is a great challenge in software refactoring, which indicates latent design or implementation flaws that may degrade the software maintainability and...
Release 1.4.0 Overview BlitzBrowser 1.4.0 adds a built‑in authentication layer and enables local‑disk storage of user data by default. Previously, persisting u...
The idea AmpCode → ampcode-connector localhost → Claude Code OAuth free → OpenAI Codex OAuth free → Gemini CLI OAuth free → AmpCode upstream paid, last resort...
Overview Developer Experience DevEx or DX is no longer a soft concept; it is an engineering discipline. AI‑assisted development, distributed teams, platform en...
This post is an elaboration of a shorter post I wrote about five years agohttps://surfingcomplexity.blog/2021/05/29/objectives-and-constraints/. The two managem...
!pichttps://media2.dev.to/dynamic/image/width=256,height=,fit=scale-down,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farti...
FEB. 3, 2026 FunctionGemma is a powerful small language model that enables developers to ship fast and cost‑effective agents that can translate natural language...
Overview This is a follow‑up to the previous article on implementing Zapier OAuth in Spring Boot. After fixing the code issues, the OAuth flow still fails when...
markdown !wellallyTechhttps://media2.dev.to/dynamic/image/width=50,height=50,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2F...
Introduction At the start of my career as a security engineer, I built an allow‑list management system for our web gateway within the security operations cente...
Architecture Overview The suite is designed to run entirely within a non‑root Android userland environment, deliberately exploiting permitted operations rather...
Introduction Until yesterday, my scripts were observers. Today my computer started watching back—monitoring itself instead of scanning a target. That’s actuall...
FEB. 9, 2026 In September 2025, we introduced the Data Commons Model Context Protocol MCP serverhttps://developers.googleblog.com/en/datacommonsmcp/ to provide...
'JAN. 29, 2026
What is the Developer Knowledge API? The Developer Knowledge APIhttps://console.cloud.google.com/start/api?id=developerknowledge.googleapis.com is designed to...
markdown !Cover image for Static Immutability: How Modern P2P Networks Build Trust Without Servers or Blockchainhttps://media2.dev.to/dynamic/image/width=1000,h...
NotesDev – A Minimalist, Secure, Real‑Time Notes App Decentralized identity Mnemonic & WebAuthn Passkeys • P2P security middleware • Live full‑text search • Li...
Say goodbye to connection failures. GenosDB's latest update makes GenosRTC smarter than ever, navigating the Nostr network to ensure your dApps are faster and m...
Designing a Next‑Generation P2P Protocol Architecture for GenosDB !Cover image for Designing a Next‑Generation P2P Protocol Architecture for GenosDBhttps://med...
!Cover image for How GenosDB Solved the Distributed Trust Paradox: A Guide to P2P Securityhttps://media2.dev.to/dynamic/image/width=1000,height=420,fit=cover,gr...
MicroGPT-C A zero-dependency, pure C99 implementation of a GPT-style character-level language model. The algorithm faithfully matches Andrej Karpathy's microgp...
Random MAC Generator - Network Testing Tool Need MAC addresses for network testing, virtualization, or IoT development? Random MAC Generator creates valid MAC...
Something went wrong, but don’t fret — let’s give it another shot. !warninghttps://abs-0.twimg.com/emoji/v2/svg/26a0.svg Some privacy related extensions may cau...
markdown JAN. 28, 2026 Tailor Gemini CLI to Your Workflow with Hooks Efficiency in the age of agents isn’t just about writing code faster; it’s about building c...
Wildex – we built Pokémon Go for real wildlife Only for iPhone – Free – Designed for iPhone Overview Turn every walk into a treasure hunt. Wildex uses your came...
!FreeFlow icon/zachlatta/freeflow/raw/main/Resources/AppIcon-README.png FreeFlow Free and open‑source alternative to Wispr Flowhttps://wisprflow.ai, Superwhispe...
Cost Pattern Overview If you're using Claude Code, Cursor, or any LLM‑based coding agent, there's a cost pattern you should know about: sessions become quadrat...
Ever wonder why your favorite ketchup always tastes the same? It doesn’t. The formula is constantly tweaked due to shifting crops and costs, forcing food scient...
'Tags: aws, architecture, genai, cloud, security
Hamiltonian Each dot represents an electron experiencing pairwise Coulomb repulsion with every other electron while being confined by an external potential Q....
Building event‑driven systems with Cloud Run, Pub/Sub, and Eventarc is a powerful pattern, but the gap between “Hello World” tutorials and production stability...
The Internet is almost anonymous and privacy‑preserving by design. Unless an administrator actively tries to track you, there is no built‑in identity layer. Wha...
The Internet is almost anonymous and privacy‑preserving by design. Unless an administrator actively tries to track you, there is no built-in identity layer. Wha...
Introduction In 2025 the Adobe Content Authenticity Initiative reported that 97 % of organizations have encountered AI‑generated content being used against the...
Researchers spend an absurd amount of time making figures. A colleague of mine spent three days in matplotlib just trying to match color palettes across six fig...
Maintaining residential, commercial, and industrial properties in Singapore requires timely repairs, preventive maintenance, and professional workmanship. From...
Our team builds a lot of MCPs — for ourselves and for external users. Over time, recurring patterns have emerged. Below are the key use cases we see repeatedly,...
Privilege is bad grammar When I got my first real job, I used to get so nervous about writing emails to my boss. I would run spellcheck, triple‑check the gramm...
By Shipra Shreyasi, Aniket Kumar, Manas Agarwal, and Pragya Kumari In our Engineering Energizers Q&A series, we highlight the engineering minds driving innovati...
What started as a weekend experiment turned into one of the most fun things I've shipped this year. After months of tinkering with AI‑assisted game development—...
Overview In February 2026 I took part in a collective investigation based exclusively on open‑source intelligence OSINT to contextualize vague references conta...
1. Introduction {intro} WebMCP API is a new JavaScript interface that allows web developers to expose their web‑application functionality as tools—JavaScript f...