11 mins
How can a simple passive circuit generate higher frequencies without oscillators or phase-locked loops? This short article explores the fascinating basics of diode-based RF frequency doublers—circuits that exploit nonlinearities to produce harmonics, often with surprisingly broadband behavior and no need for biasing or active components. From a quick dive into the Shockley equation to typical basic circuit configurations like anti-parallel diode pairs and single-diode harmonic generators, this short article walks through both the math and the intuition behind passive frequency multiplication. Ideal for RF enthusiasts, circuit designers, or anyone curious about how this stuff works on a basic level.
19 mins
Salvaging lithium-ion cells from old battery packs can be a practical way to repurpose valuable components for hobby electronics, robotics, or backup power projects. This article walks through the careful and methodical process of identifying, testing, and recovering 18650 cells from discarded equipment like laptops and garden tools—highlighting key voltage thresholds, safety procedures, and the tools required to do so responsibly. But make no mistake—working with lithium cells is not without serious risks. Improper handling can lead to fires, explosions, and long-term instability. This project log focuses on safety-first recovery strategies, how to spot dangerous cells, and when to dispose rather than reuse. If you're an experienced DIYer with the right equipment and an eye for caution, this deep dive into battery salvage may be just what you're looking for.
11 mins
Want to write embedded libraries that are both flexible and cleanly overridable? This article dives deep into how weak linkage in ANSI C (via GCC) enables you to provide default implementations—like handlers, configuration values, and hooks—that can be easily overridden by the application, without modifying your library code. You'll learn how to use __attribute__((weak)) for functions and globals, when to prefer traditional function pointers, and how linker flags like --gc-sections help exclude unused code. With a complete AVR-ready Makefile setup, this guide is a practical reference for anyone writing modular microcontroller firmware.
24 mins
In just three decades, the internet has transformed from a vibrant network of personal webpages and forums into a landscape dominated by ultra-short videos, algorithmic curation, and passive scrolling. This article traces the evolution of online content creation—from thoughtful, long-lived expressions to impulsive, ephemeral media—and examines what we've gained and lost along the way. If you've ever wondered why the internet feels faster but emptier, this deep dive connects the dots.
7 mins
As AI-generated images and texts spark fierce debate in the art world, this article offers a different perspective: that AI is not stealing creativity, but unlocking it for countless people who’ve long had ideas but lacked the tools to express them. We explore what makes true art irreplaceable, what types of creative work are genuinely at risk, and why society must support those displaced by change. Rather than marking the end of human creativity, AI may just be its newest, most inclusive chapter.
9 mins
Ever wondered if your compact notebook or mini PC could power serious AI, LLMs, or scientific simulations? In this guide, we show you how to retrofit systems without PCIe slots using M.2 NVMe adapters and GPU expansion boards—enabling multi-GPU setups even on budget hardware. While not a full desktop replacement, this approach offers surprising performance for specific workloads. Perfect for tinkerers, researchers, and hardware hackers.
48 mins
Large Language Models are transforming the way we interact with information—but their real potential is unleashed when they're embedded in agents that can reason, plan, and adapt. This guide explores the emerging architecture patterns behind modern LLM-based systems: from stepwise planning and research workflows to memory-aware decision-making, simulations, and autonomous behaviors. Whether you're building intelligent assistants, automated researchers, or multi-agent systems, this collection distills the key concepts, tools, and interaction models that make LLM agents truly capable. Through detailed explanations, structured pattern summaries, and illustrated diagrams, you'll learn how to compose powerful, reliable, and adaptive agent systems that go far beyond simple prompting.
2 mins
Want to access your internal JupyterLab instance securely over HTTPS? This quick guide shows how to set up Apache 2.4 as a reverse proxy for JupyterLab 4.2.5, with working websocket support and proper configuration on both ends. Learn how to avoid common pitfalls like broken kernels or missing output—and get your lab running smoothly behind your own public facing reverse proxy
20 mins
Whether you're debugging a simple script or building a scalable application, this article walks you through the fundamentals of logging, the use of named and hierarchical loggers, configuration via dictConfig, and advanced handlers like HTTP, syslog, and rotating files. Learn how to go beyond print() and implement a long-term, structured, and maintainable instrumentation layer for your software — one that helps today and scales for tomorrow.
24 mins
Is social media really fueling hate on purpose? Contrary to popular belief, there’s no solid evidence of deliberate harmful intent. Instead, algorithms amplify whatever sparks the most engagement—often divisive or emotional posts—simply because we, as users, pay more attention to them. This dynamic functions more like a mirror of society’s existing biases than a direct manipulation scheme. The real tension emerges when the rush for clicks collides with long-term user well-being, revealing that negativity thrives largely through our own online behaviors rather than calculated corporate strategy.
Dipl.-Ing. Thomas Spielauer, Wien (webcomplains389t48957@tspi.at)
This webpage is also available via TOR at http://rh6v563nt2dnxd5h2vhhqkudmyvjaevgiv77c62xflas52d5omtkxuid.onion/