Tagged articles
32 articles
Page 1 of 1
Architect
Architect
May 1, 2026 · Artificial Intelligence

From Vibe Coding to Agentic Engineering: How AI Is Redefining the Engineer‑Architect Boundary

Karpathy’s 2026 Sequoia AI Ascent interview shows that while Vibe Coding lowers the barrier for rapid prototyping, the emerging Agentic Engineering paradigm pushes AI agents into the full software‑development lifecycle, demanding new control planes, verification, context handling and blurring the line between senior engineers and architects.

AI EngineeringAgentic EngineeringControl Plane
0 likes · 34 min read
From Vibe Coding to Agentic Engineering: How AI Is Redefining the Engineer‑Architect Boundary
Data STUDIO
Data STUDIO
Mar 31, 2026 · Artificial Intelligence

Agent Architecture: Planner → Executor → Verifier – Adding a “Quality Inspector” to Your AI

This article introduces the PEV (Planner‑Executor‑Verifier) architecture, explains why AI agents need a verification step to avoid blindly trusting faulty tool outputs, demonstrates a full implementation with LangGraph, compares its robustness to a naïve baseline, and discusses its advantages, limitations, and suitable use cases.

AI AgentsLLMLangGraph
0 likes · 23 min read
Agent Architecture: Planner → Executor → Verifier – Adding a “Quality Inspector” to Your AI
o-ai.tech
o-ai.tech
Mar 26, 2026 · Artificial Intelligence

Understanding Superpowers: Like gstack but a System Enforcing Engineering Discipline for AI Agents

The article analyses the Superpowers repository, contrasting it with gstack and showing how Superpowers tightens AI agents' behavior by embedding classic engineering discipline—step‑by‑step planning, testing, verification and review—into the development pipeline rather than merely expanding the agents' capabilities.

AI AgentsSoftware EngineeringTDD
0 likes · 12 min read
Understanding Superpowers: Like gstack but a System Enforcing Engineering Discipline for AI Agents
o-ai.tech
o-ai.tech
Mar 18, 2026 · Artificial Intelligence

7 Proven Techniques to Use AI Like the Top 1% of Users

This article presents a step‑by‑step guide—including the AIM and MAP frameworks, tool selection, prompt debugging, expert‑mode prompting, and five verification methods—to dramatically improve AI interaction quality, backed by research from Anthropic, OpenAI, and Harvard Kennedy School.

AI hallucinationAI promptingAIM framework
0 likes · 14 min read
7 Proven Techniques to Use AI Like the Top 1% of Users
AI Architecture Hub
AI Architecture Hub
Mar 16, 2026 · Artificial Intelligence

Why Claude Code Feels Unstable and How to Build a Reliable AI‑Powered Coding Workflow

The article analyses why Claude Code often produces unstable results, explains that it should be treated as a layered agent system rather than a chatbot, and provides concrete best‑practice steps—including context noise reduction, verification‑first design, hierarchical governance, an eight‑step baseline setup, and advanced multi‑session automation—to turn it into a stable engineering collaborator.

AI AgentAutomationClaude Code
0 likes · 21 min read
Why Claude Code Feels Unstable and How to Build a Reliable AI‑Powered Coding Workflow
Architect
Architect
Feb 20, 2026 · Artificial Intelligence

How Agent Loops Give AI Agents a Personality: Engineering Secrets Revealed

This article explains how the Agent Loop—an engineered while‑loop that repeatedly calls an LLM, decides when to use tools, executes them, and feeds results back—creates persistence, style, memory, judgment, and safety boundaries that together make an AI agent feel like it has its own personality.

AI Agent EngineeringAgent LoopLLM
0 likes · 24 min read
How Agent Loops Give AI Agents a Personality: Engineering Secrets Revealed
PMTalk Product Manager Community
PMTalk Product Manager Community
Feb 4, 2026 · Industry Insights

Why PRDs Are Obsolete: How AI Forces Product Managers to Deliver Verifiable Prototypes

The article argues that AI has shattered traditional product‑manager collaboration costs, shifting power from scheduling to rapid verification, and outlines three possible futures—small‑team empowerment, model‑centric products, and fluid role boundaries—concluding that the era of PRD‑only delivery is over.

AI Impactindustry insightsproduct-management
0 likes · 6 min read
Why PRDs Are Obsolete: How AI Forces Product Managers to Deliver Verifiable Prototypes
Architect
Architect
Jan 20, 2026 · Artificial Intelligence

Turning AI Agents into Reliable Team Members: Practical Engineering Practices

This guide explains how architects can treat AI agents as controllable teammates by establishing clear plans, managing context, creating verification loops, versioning assets, leveraging parallelism, and applying multi‑layer risk governance to make agent‑driven development safe and efficient.

Agent planningSoftware Architectureengineering practices
0 likes · 13 min read
Turning AI Agents into Reliable Team Members: Practical Engineering Practices
Architect's Guide
Architect's Guide
Jan 19, 2026 · Artificial Intelligence

Mastering Prompt Engineering: From Blind Prompting to Reliable LLM Solutions

This article explains how to treat prompt engineering as a systematic, experiment‑driven practice—distinguishing it from blind prompting—by defining problems, building demo sets, crafting and testing prompt candidates, evaluating accuracy versus cost, and establishing verification loops for reliable large language model applications.

LLM testingPrompt Engineeringcost‑accuracy tradeoff
0 likes · 16 min read
Mastering Prompt Engineering: From Blind Prompting to Reliable LLM Solutions
PMTalk Product Manager Community
PMTalk Product Manager Community
Jan 10, 2026 · Industry Insights

How AI Is Shifting Product Managers Toward Verifiable Delivery

The article analyzes how AI lowers collaboration costs, turning product managers' power from schedule control to rapid validation, reshaping their role from writing PRDs to building prototypes, evaluating feasibility, and making evidence‑based decisions across fluid, stage‑based responsibilities.

AI Impactartificial intelligenceindustry trends
0 likes · 7 min read
How AI Is Shifting Product Managers Toward Verifiable Delivery
Liangxu Linux
Liangxu Linux
Aug 17, 2025 · Fundamentals

From Specification to Silicon: The Complete Digital Chip Design Flow

This article provides a comprehensive, step‑by‑step overview of digital chip design, covering specification definition, system architecture, front‑end logic design, back‑end physical implementation, verification, sign‑off, and tape‑out, complete with diagrams and practical insights into each stage.

Chip DesignDigital ICEDA
0 likes · 21 min read
From Specification to Silicon: The Complete Digital Chip Design Flow
Liangxu Linux
Liangxu Linux
Jul 14, 2025 · Operations

Master Linux Kernel Tuning: From Theory to Practical Verification

This guide explains why Linux kernel parameters matter, lists key sysctl settings, shows how to apply them temporarily or permanently—including in Docker and Kubernetes—and provides step‑by‑step methods to verify and troubleshoot the changes for optimal system performance.

DockerKernelKubernetes
0 likes · 9 min read
Master Linux Kernel Tuning: From Theory to Practical Verification
Java Captain
Java Captain
Jun 12, 2025 · Information Security

How to Unlock a Restricted WeChat Account: Step‑by‑Step 2025 Guide

This comprehensive 2025 guide explains how to identify WeChat restriction types, prepare necessary evidence and materials, use both client‑side and web‑based self‑service tools, complete assisted verification, and follow new regulations to successfully restore account access.

GuidelinesSecurityWeChat
0 likes · 9 min read
How to Unlock a Restricted WeChat Account: Step‑by‑Step 2025 Guide
Java Captain
Java Captain
Jun 11, 2025 · Information Security

Mastering WeChat Account Unblocking: A Step‑by‑Step Self‑Service Guide

This comprehensive guide explains the types of WeChat account restrictions, preparation steps, the five‑stage self‑service unblocking workflow, common issues and solutions, friend‑assisted verification procedures, advanced appeal strategies for permanent bans, and post‑unblock security measures to help users efficiently restore access.

SecurityUnblockingWeChat
0 likes · 18 min read
Mastering WeChat Account Unblocking: A Step‑by‑Step Self‑Service Guide
Java Captain
Java Captain
Jun 8, 2025 · Operations

Step-by-Step 2025 Guide to Unlocking Your WeChat Account

This comprehensive 2025 guide walks users through identifying restriction types, preparing evidence, using WeChat's self‑service unlocking tools or web‑based appeal, completing assisted verification, handling enterprise account checks, and applying best‑practice safeguards to maximize the chance of successful account restoration.

2025 GuidelinesSecurityWeChat
0 likes · 9 min read
Step-by-Step 2025 Guide to Unlocking Your WeChat Account
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Oct 17, 2024 · Information Security

Security Incident Analysis and Captcha Strategy for Preventing SMS Spam Attacks

After a night-time SMS spam attack that cost 400 RMB, the team analyzed the breach, evaluated various captcha methods—including text, slider, reCAPTCHA v2/v3, and 2FA—implemented temporary throttling, and ultimately adopted a combined reCAPTCHA and two‑factor authentication approach to strengthen account security.

2FACaptchaSMS attack
0 likes · 8 min read
Security Incident Analysis and Captcha Strategy for Preventing SMS Spam Attacks
High Availability Architecture
High Availability Architecture
Dec 20, 2023 · Information Security

API Anti‑Crawling and Security Architecture: Risk Detection, Strategy, and Effectiveness at Bilibili

This article details Bilibili's comprehensive anti‑crawling system, covering the background of API abuse, the data‑flow framework, risk perception, strategy iteration, verification mechanisms, gateway signing design, and the measurable impact on normal and special‑case interfaces.

BilibiliRisk Detectionanti‑crawling
0 likes · 19 min read
API Anti‑Crawling and Security Architecture: Risk Detection, Strategy, and Effectiveness at Bilibili
MaGe Linux Operations
MaGe Linux Operations
Jul 19, 2022 · Backend Development

Build a Go‑Based SMS Verification Login with Gin and Viper

This guide walks through creating a phone‑number SMS verification login system in Go using Gin, Viper, and Tencent Cloud SMS, covering service registration, configuration loading, client implementation with functional options, code generation, sending, and Redis‑based verification.

BackendGinSMS
0 likes · 8 min read
Build a Go‑Based SMS Verification Login with Gin and Viper
Top Architect
Top Architect
Oct 7, 2021 · Backend Development

Implementation of Image and SMS Captcha Service in .NET Core

This article walks through the design and implementation of a complete captcha solution—including image and SMS verification—using .NET Core, covering background context, code details for generating graphics, unsafe handling, noise lines, caching strategies, rate limiting, validation logic, runtime results, and a link to the full source repository.

BackendCaptchaSecurity
0 likes · 14 min read
Implementation of Image and SMS Captcha Service in .NET Core
ByteDance Dali Intelligent Technology Team
ByteDance Dali Intelligent Technology Team
Jun 23, 2021 · Mobile Development

Optimizing Android Class Loading and Verification to Reduce Cold Start Latency

This article analyzes Android's class loading and verification process, identifies optimization opportunities to speed up cold starts, compares industry approaches, and presents a semi‑automated analysis tool along with practical solutions for handling verification failures in mobile apps.

AndroidMobile Developmentclass loading
0 likes · 6 min read
Optimizing Android Class Loading and Verification to Reduce Cold Start Latency
Java Architect Essentials
Java Architect Essentials
Feb 18, 2021 · Information Security

How Behavior‑Based Captchas Boost Security and User Experience

This article introduces a behavior‑based captcha solution that replaces traditional text captchas with slide‑puzzle and click‑word challenges, explains its terminology, interaction flow, project directory layout, and provides online demo links for both web and mobile implementations.

BackendSecuritySpring Boot
0 likes · 5 min read
How Behavior‑Based Captchas Boost Security and User Experience
Top Architect
Top Architect
Jun 22, 2020 · Fundamentals

Understanding the Seven Stages of Java Class Loading and Initialization

This article explains the seven stages of Java class loading—Loading, Verification, Preparation, Resolution, Initialization, Using, and Unloading—detailing each step, the underlying mechanisms, code examples, and practical considerations such as class initialization triggers and the distinction between symbolic and direct references.

InitializationJVMJava
0 likes · 14 min read
Understanding the Seven Stages of Java Class Loading and Initialization
MaGe Linux Operations
MaGe Linux Operations
Mar 22, 2020 · Backend Development

How to Build a Custom CAPTCHA Service with Python Sanic

This tutorial shows how to generate a simple image‑based CAPTCHA using Python's Pillow library and the Sanic web framework, store the code in a session, and validate user input, with notes on adding asynchronous refresh functionality.

CaptchaPythonWeb Development
0 likes · 6 min read
How to Build a Custom CAPTCHA Service with Python Sanic
FunTester
FunTester
Dec 21, 2019 · Backend Development

A Reusable Java Verification Utility for Automated Testing

This article presents a reusable Java verification class that centralizes common validation logic for automated testing, handling JSON responses, code checks, numeric and boolean assertions, array detection, and regex matching, while also fixing hidden bugs and extending array validation capabilities.

JSONJavaautomation testing
0 likes · 7 min read
A Reusable Java Verification Utility for Automated Testing
FunTester
FunTester
Sep 26, 2019 · Backend Development

A Generic Verification Utility Class in Java for Automated Testing

This article introduces a reusable Java verification utility class designed for automated testing, detailing its structure, key methods for code validation, value extraction, type checks, and JSON parsing, and provides the full source code for developers to integrate and extend in their projects.

Javatestingverification
0 likes · 9 min read
A Generic Verification Utility Class in Java for Automated Testing