Articles
24 articles
Thoughts, tutorials, and insights on software development, technology, and more.
Claude Code Agent Teams: Building Coordinated Swarms of AI Developers
Part 5 of 5 AI Data Infrastructure
2026-02-15
Using parallel Claude agents, we can build software with hundreds of thousands of lines of codes, but this takes thousands of code sessions, billions of tokens, and thousands of dollars. Single agents can’t build this type of software; the interconnected code can’t fit into a single context window without degrading output quality. The team of parallel agents succeeds because each agent has a narrow slice of context and produced better work within their focused scope.
3818 words
|
19 minutes
Claude Code Hooks: The Deterministic Control Layer for AI Agents
Part 4 of 5 AI Data Infrastructure
2026-02-14
Suppose your CLAUDE.md file has instructions to always run the linter (the error analyzer). Your agent follows this instruction most of the time, but when a project is long, requires many sessions, and complex debugging that takes up the context window, the agent doesn’t run it and misses the bug.
3122 words
|
16 minutes
Building Effective Claude Code Agents: From Definition to Production
Part 3 of 5 AI Data Infrastructure
2026-02-12
The most effective AI coding agents aren't the ones with the cleverest prompts. They're the ones with the best-designed environments. Here's how to build agents that reliably ship production software over extended sessions.
2604 words
|
13 minutes
Claude Code Skills: Building Reusable Knowledge Packages for AI Agents
Part 2 of 5 AI Data Infrastructure
2026-02-13
A project with 8 skills and 10,000 lines of domain documentation loads just 500 tokens at startup instead of 70,000, because progressive disclosure means agents pay for knowledge only when they use it.
2700 words
|
14 minutes
Claude Autonomous Coding Overview
Part 1 of 5 AI Data Infrastructure
2026-02-18
An orchestrator breaks a task into pieces. Specialized agents pick up work items, each carrying skills that define what they know and hooks that enforce how they behave. Context flows from session start to task completion through a deterministic pipeline. Here is how the pieces fit together.
3509 words
|
18 minutes
GraphRAG: Enhancing Retrieval with Knowledge Graph Intelligence
Part 4 of 4 Introductory AI
2026-02-11
Traditional RAG finds documents that mention your search terms. GraphRAG follows the relationships between entities to answer questions that flat retrieval cannot.
3018 words
|
15 minutes
Graph Databases
Part 3 of 4 Introductory AI
2026-02-10
Graph databases represent a shift in how we store and query interconnected data
2942 words
|
15 minutes
RAG: Grounding AI with Real-World Knowledge
Part 2 of 4 Introductory AI
2026-02-06
As large language models (LLMs) become more capable they still face a fundamental limitation: they are unable to access information beyond their training cutoff date. When asked about information beyond this cutoff date LLMs will either be unable to answer or confidently hallucinate an answer.
3618 words
|
18 minutes
Vector Databases: The Engine Powering Modern AI Applications
Part 1 of 4 Introductory AI
2026-02-05
As use of articifial intelligence increases, there is a need for more and more unstructured data (text, images, audio, etc.) to use with machine learning models. However, traditional relational databases aren’t designed to handle unstructured data, so another type of database is needed. This is where vector databases come into play; matching the requirments AI applications have for storing, indexing, and retrieving unstructured data. Vector databases have become essential AI infrastructure, enabling everything from advanced semantic search to personalized recommendation systems and multimodal AI applications.
3760 words
|
19 minutes
AES-ECB vs AES-CBC Encryption and Decryption
2026-01-13
A comparison of AES-ECB and AES-CBC encryption modes, and implementation of a key generation algortihm for symmetric encryption/decryption with `RSA`.
939 words
|
5 minutes
Buffer Overflow Attack
2026-01-13
A writeup about performing a buffer oveflow attack on a program to achive a root shell
991 words
|
5 minutes
Country Data Analysis
2026-01-13
Performing preliminary data cleaning along with a mathematical analysis on country data.
4256 words
|
21 minutes
Dijkstra's Algorithm
2026-01-13
An implementation of Dijkstras path finding algorithm.
559 words
|
3 minutes
Environment Variable Attack
2026-01-13
Modifying a system's `PATH` environment variables to execute arbitrary malicious code.
644 words
|
3 minutes
Gershgorin Disks
2026-01-13
Implement functions to calculate Greshgorin Disks and plot them on a cartesian plane.
1135 words
|
6 minutes
Gram-Schmidt and QR Factorization
2026-01-13
Performing QR Factorization using the Gram-Schmidt process, along with some examples.
1386 words
|
7 minutes
Graph Basics
2026-01-13
Some very simple graph functions just to re-familarize myself with basic graphs.
378 words
|
2 minutes
Least Squares Problem
2026-01-13
Implementing Least Squares problem solver, along with some examples of it running.
853 words
|
4 minutes
Line of Best Fit
2026-01-13
Creating a line of best fit to predict future country population
1929 words
|
10 minutes
Markov Chains
2026-01-13
Custom markov chain functions along with computing absorbing states and graph regularity.
1277 words
|
6 minutes
Singular Value Decomposition and Pseudo-Inverse
2026-01-13
Implementing Singular Value Decomposition and Pseudo-Inverse algorithms
1619 words
|
8 minutes
SYN Flooding Attack
2026-01-13
A DOS attack performed using invalid SYN packets to spoof false incoming TCP connections.
1378 words
|
7 minutes
University Graph Analysis
2026-01-13
A mathematical and visual analysis of a graph.
2228 words
|
11 minutes