Archives
All the articles I've archived.
-
Securing the AI Agent Revolution: A Guide to Auth in a Multi-Party MCP World
The Model Context Protocol (MCP) promises a future of interconnected AI agents. But how do we secure it? This guide covers the essential security patterns—from API keys to JWTs—for authenticating and authorizing communication in a multi-party MCP ecosystem.
-
Deconstructing the Model Context Protocol - The Lingua Franca for AI Agents
Dive deep into the Model Context Protocol (MCP). Is it a true network protocol? How did it become a standard? This article explores the anatomy of MCP, explaining its core properties and why it represents a foundational shift for building the next generation of interoperable AI applications.
-
The Protocol for AI Agents - Building Scalable, Secure Full-Stack Applications with MCP
Explore the Model Context Protocol (MCP), the "USB-C for AI," and learn how to build secure, scalable, and interoperable AI-powered applications. This deep dive covers the architecture, security best practices, and a practical example using Next.js to create an AI project management assistant.
-
Qwik - The Next Evolution in Frontend Frameworks
Introduction In the ever-evolving landscape of web development, a new player has emerged with the promise of revolutionizing how we think about building web applications - Qwik. This framewor…
-
Exploring the Power of Generator Functions in JavaScript
JavaScript has evolved significantly over the years, enabling more efficient, streamlined coding through ES6+ features. One such feature that has dramatically transformed the way we handle asynchrono…
-
Essential JavaScript Design Patterns - Building Blocks of Web Applications
JavaScript, the lingua franca of the web, has long shed its reputation as a rudimentary scripting language. Today, it's ubiquitous across web, mobile, and server-side development, powering some of th…
-
Doing Internalization in Angular
Creating applications that can effortlessly transcend language barriers has become imperative in our increasingly globalised world. Internalization, also known as internationalization or i18n, is the…
-
Understanding the Difference - Libraries vs SDKs in Software Development
In the realm of software development, the lexicon is filled with terms that are often used interchangeably but have nuanced differences. Two such terms that are crucial to understand are 'library' an…
-
The Bangladesh Bank Heist - A Lesson in Cybersecurity
The Bangladesh Bank heist in February 2016 was one of the most infamous cybercrimes in history. Criminals attempted to steal nearly $1 billion from the central bank of Bangladesh, successfully making…
-
The Enigmatic World of REvil - Unmasking the Hacker Group
In the dark recesses of cyberspace, infamous hacker groups with notorious reputations exist. One such group, REvil, has become synonymous with high-profile cyberattacks and ransomware campaigns. Form…
-
Unveiling Global State Management in Angular using Signals with LocalStorage
Are you looking at how to do state management using angular signals? You came to the right place. State management is an indispensable aspect of any web application. Proper state management ensures…