Similar Articles

Articles similar to the selected content.

Domain: lukeplant.me.uk Added: 2025-07-13 Status: βœ“ Success
lukeplant.me.uk
The other day I got a question about some old code I had written which, instead of raising an exception for an error condition as the reader expected, returned an error object: With your EmailVerifyTo...
Similar Articles (10 found)
πŸ” 49.4% similar
Better Bayesian Filtering
http://www.paulgraham.com/better.html
January 2003 (This article was given as a talk at the 2003 Spam Conference. It describes the work I've done to improve the performance of the algorith...
πŸ” View Similar Articles 🟠 HN
πŸ” 47.4% similar
Three ways formally verified code can go wrong in practice
https://buttondown.com/hillelwayne/archive/three-ways-formally-verified-code-can-go-wrong-in/
Three ways formally verified code can go wrong in practice "Correct" doesn't mean "correct" when correctly using "correct" New Logic for Programmers R...
πŸ” View Similar Articles 🟠 HN
πŸ” 44.9% similar
Writing an LLM from scratch, part 22 -- finally training our LLM!
https://www.gilesthomas.com/2025/10/llm-from-scratch-22-finally-training-our-llm
Writing an LLM from scratch, part 22 -- finally training our LLM! This post wraps up my notes on chapter 5 of Sebastian Raschka's book "Build a Large ...
πŸ” View Similar Articles 🟠 HN
πŸ” 43.6% similar
How to Validate Datatypes in Python
https://www.startdataengineering.com/post/how-to-validate-datatypes-in-python/
How to Validate Datatypes in Python - Introduction - Using Native Python - Using Pydantic - Pydantic Caveats - Conclusion - Further reading - Referenc...
πŸ” View Similar Articles
πŸ” 43.1% similar
Why you should not use JWT - API Bakery
https://apibakery.com/blog/tech/no-jwt/
Technology Why you should not use JWT October 26th, 2021 In this article: How do you handle user authentication in your web app or API? When it comes ...
πŸ” View Similar Articles 🟠 HN
πŸ” 42.3% similar
There is no longer any such thing as Computer Security
https://blog.codinghorror.com/there-is-no-longer-any-such-thing-as-computer-security/
There is no longer any such thing as Computer Security Remember β€œcybersecurity”? Mysterious hooded computer guys doing mysterious hooded computer guy....
πŸ” View Similar Articles 🟠 HN
πŸ” 40.8% similar
Should Data Pipelines in Python be Function based or Object-Oriented (OOP)?
https://www.startdataengineering.com/post/python-fp-v-oop/
Should Data Pipelines in Python be Function based or Object-Oriented (OOP)? - 1. Introduction - 2. Data transformations as functions lead to maintaina...
πŸ” View Similar Articles
πŸ” 40.8% similar
Vibe Coding as a Coding Veteran
https://levelup.gitconnected.com/vibe-coding-as-a-coding-veteran-cd370fe2be50
Vibe Coding as a Coding Veteran From 8-bit Assembly to English-as-Code By now, we’ve all heard about this β€œvibe coding” thing: you let an AI assistant...
πŸ” View Similar Articles 🟠 HN
πŸ” 40.7% similar
A Plan for Spam
http://www.paulgraham.com/spam.html
August 2002 (This article describes the spam-filtering techniques used in the spamproof web-based mail reader we built to exercise Arc. An improved al...
πŸ” View Similar Articles 🟠 HN
πŸ” 40.7% similar
Writing memory efficient data pipelines in Python
https://www.startdataengineering.com/post/writing-memory-efficient-dps-in-python/
Writing memory efficient data pipelines in Python - Introduction - 1. Using generators - 2. Using distributed frameworks - Conclusion - Further readin...
πŸ” View Similar Articles