Tech Blogs Digest 13.10 - 19.10
This week we AI-analysed 7025 posts for you, filtered out the chaff and hand-picked the wheat. Subscribe to stay up to date with future digests!
This week
🏗️ Architecture - Kafka wild western
🤖 LLMs in production - Attack costs reduction, RAG system optimizations, quality failures and other
📊 Data - PostgresQL migrations and queries over millions smart contracts in seconds
🐳 Containers - Memory leaks in Java ECS
💻 AI-assisted coding - Figma, Claude and Playwright experience
🧠 ML - Training stalls
⚙️ DevOps - Zero downtime cluster update
☕ Java - Spliterator rabbit hole
🟨 JavaScript - Speeding up Next.js Docker builds
🛡️ Security - Self-updating malware exploits, WinRAR risks and CSP Bypasses
🏗️ ARCHITECTURE
The Good, The Bad and The AutoMQ | 12 min read
Discover how three different approaches: Apache Kafka’s Tiered Storage, Diskless 2.0, and AutoMQ are reshaping fault-tolerance, cost and cloud-native architecture in streaming systems.
🤖 LLMS IN PRODUCTION
Discover how a clever token-exhaustion attack at 3 AM nearly cost $10K, and how building layered guardrails saved the day and just $147.
Discover how a production RAG system was optimized from 4s to 2.1s and cost was reduced by 28%, through five smart infrastructure tweaks.
When Good AI Goes Bad: Detecting Output Quality Failures | 15 min read
Uncover how modern AI systems sound convincingly correct yet fail silently, and why a multi-layered validation pipeline can save you from catastrophic output mistakes.
When AI Agents Think Together: The Hidden Science of Emergent Coordination in Multi-Agent Systems | 24 min read
Explore how multiple AI agents can collaborate unexpectedly, revealing the hidden science of emergent coordination in multi-agent systems.
The Hidden Complexity of Screenshot Shopping Agents: Lessons from 300+ Automated Grocery Runs | 22 min read
Discover how a weekend project with 300+ automated grocery runs revealed why screenshot-based shopping agents struggle, and how structured data is the real game-changer.
From Local Triumph to Cloud Failure — And the Fix: Build a Reliable Portfolio Chatbot with RAG + Vertex AI | 11 min read
Explore how a prototype chatbot that ran flawlessly locally faltered in the cloud, and learn how the author fixed it with a robust RAG-powered architecture.
Dive into how to super-charge Gemini 2.5 with just a $2 fine-tune and turn chaotic product details into clean JSON in minutes.
📊 DATA
PostgreSQL Migration Part 1: The Great Cleanup | 6 min read
A looming $5,000/month support charge forced this team to overhaul their bloated PostgreSQL setup, revealing a clever “copy & truncate” cleanup one table at a time.
Discover how a team engineered a database to query millions of smart contracts in milliseconds, balancing high-throughput inserts and blazing-fast analytics.
🐳 CONTAINERS
Hunting `Memory Leak` Culprit in Java ECS Application [Java, AWS] | 7 min read
Dive into how one dev tracked down a stealthy memory leak in a Java ECS app: from mystery symptoms to root-cause triumph.
💻 AI-ASSISTED CODING
Experience Story: Figma MCP + Claude Code + Playwright MCP [JavaScript] | 18 min read
See how combining Figma’s MCP server, Claude Code and Playwright transformed component-building through AI-powered design, code-and-test workflows.
🧠 ML
Tracking Down Mysterious ML Training Stalls [Pinterest blog] | 11 min read
See how the Pinterest team tracked down mysterious stalls in ML-training, and uncovered a hidden kernel call that stole 50% throughput.
⚙️ DEVOPS
Learn how one team executed a full-scale Kubernetes cluster upgrade with zero downtime, creating a new “green” cluster, routing traffic seamlessly, and literally bypassing several versions in one go.
☕ JAVA
Spliterating Hairs Results in Spliterating Deja Vu | 8 min read
Curious how a “simple” curiosity about Java’s Spliterator landed in hours-deep rabbit holes and performance benchmarks? Dive in.
🟨 JAVASCRIPT
Discover how a slight shift in your Docker-build cache strategy slashed a 25-minute build down to just 13 minutes — faster reviews, happier devs.
🛡️ SECURITY
Malware that updates itself in real time is turning patch-rollouts into targets, enabling attacks in under a day once a vulnerability is disclosed.
WinRAR’s rar.exe can silently wipe files using the -dw switch, turning trusted utilities into stealthy red-team tools.
A Bug Hunter’s Guide to CSP Bypasses (Part 1) | 9 min read
Finds common CSP misconfigurations and practical bypasses to turn “secure” headers into XSS vectors for big bug bounties.


