Skip to main content

Filed under

Programming

  1. Ai·13 min read·

    Down the MCP Rabbit Hole: Building a Standards Server

    Build MCP standards server for Claude AI—implement Model Context Protocol for intelligent code standards and context-aware workflows.

  2. Ai·11 min read·

    Exploring Claude CLI Context and Compliance with My Standards Repository

    Transform Claude CLI with standards integration—achieve 90% token reduction and automate workflows using context-aware MCP server architecture.

  3. Ai·17 min read·

    Fine-Tuning LLMs in the Homelab: A Practical Guide

    Fine-tune LLMs on homelab hardware with QLoRA and 4-bit quantization. Train Llama 3 8B models on RTX 3090 with dataset prep and optimization strategies.

  4. Architecture·12 min read·

    Blockchain Beyond Cryptocurrency: Building the Trust Layer of the Internet

    Deploy blockchain beyond cryptocurrency with Ethereum and smart contracts—build decentralized trust for supply chain and identity verification.

  5. Ai·14 min read·

    Context Windows in Large Language Models: The Memory That Shapes AI

    Understand LLM context windows from 2K to 2M tokens—optimize model performance and prevent hallucinations at 28K token boundaries.

  6. Ai·14 min read·

    Large Language Models for Smart Contract Security: Promise and Limitations

    Test LLM smart contract security with GPT-4 and Claude—achieve 80% reentrancy detection accuracy but manage 38% false positives in production workflows.

  7. Programming·3 min read·

    The Pizza Calculator: A Weekend Project in Humility

    A Saturday afternoon coding project that taught me more about assumptions than algorithms.

  8. Ai·12 min read·

    Learning from Nature: How Biomimetic Robotics is Revolutionizing Engineering

    Design biomimetic robots inspired by nature—implement gecko adhesion, swarm intelligence, and soft robotics using billions of years of evolution.

  9. Devops·12 min read·

    Implementing Zero Trust Security: Never Trust, Always Verify

    Deploy zero trust security with continuous verification and identity-centric controls—implement never-trust-always-verify for Federal EO 14028 compliance.

  10. Programming·10 min read·

    Writing Secure Code: A Developer's Guide to Thwarting Security Exploits

    Master secure code development with input validation, parameterized queries, and secrets management—prevent SQL injection and XSS in production systems.