5 mins
While promising transparency and control, most CMPs are embedded from third-party domains, in theory allowing silent collection of metadata across sites in the same way as the very trackers they claim to regulate. The irony: users are asked to trust a system that itself introduces new risks, all without meaningful technical guarantees. This article dissects how CMPs, especially certified ones, operate within an ecosystem that relies on trust instead of technical safeguards - a flawed model in a world where trust alone is no protection. We explore how true privacy must be built on browser-level enforcement and origin isolation, not legal promises or banner overlays. If we want real control over our data, it’s time to move beyond privacy theater.
10 mins
A mini summary on how to turn your Jupyter notebooks and Markdown files into clean, portable HTML and Markdown documents using nbconvert or pandoc. This mini guide offers practical command-line examples and dives into powerful customization options, including embedding images, compressing large outputs and building your own Jinja2 templates. Whether you are preparing technical reports, blog posts, or self-contained visualizations these tools make it easy to generate high-quality output tailored to your needs. Going beyond the basics, the article also shows how to write custom Python preprocessors for image resizing and output tweaking—ideal for those looking to optimize file size and presentation. If you want fine-grained control over how your notebooks are rendered and shared, this collection of recipes provides a flexible and extensible starting point.
11 mins
How can a simple passive circuit generate higher frequencies without oscillators or phase-locked loops? This short article explores the fascinating basics of diode-based RF frequency doublers—circuits that exploit nonlinearities to produce harmonics, often with surprisingly broadband behavior and no need for biasing or active components. From a quick dive into the Shockley equation to typical basic circuit configurations like anti-parallel diode pairs and single-diode harmonic generators, this short article walks through both the math and the intuition behind passive frequency multiplication. Ideal for RF enthusiasts, circuit designers, or anyone curious about how this stuff works on a basic level.
19 mins
Salvaging lithium-ion cells from old battery packs can be a practical way to repurpose valuable components for hobby electronics, robotics, or backup power projects. This article walks through the careful and methodical process of identifying, testing, and recovering 18650 cells from discarded equipment like laptops and garden tools—highlighting key voltage thresholds, safety procedures, and the tools required to do so responsibly. But make no mistake—working with lithium cells is not without serious risks. Improper handling can lead to fires, explosions, and long-term instability. This project log focuses on safety-first recovery strategies, how to spot dangerous cells, and when to dispose rather than reuse. If you're an experienced DIYer with the right equipment and an eye for caution, this deep dive into battery salvage may be just what you're looking for.
11 mins
Want to write embedded libraries that are both flexible and cleanly overridable? This article dives deep into how weak linkage in ANSI C (via GCC) enables you to provide default implementations—like handlers, configuration values, and hooks—that can be easily overridden by the application, without modifying your library code. You'll learn how to use __attribute__((weak)) for functions and globals, when to prefer traditional function pointers, and how linker flags like --gc-sections help exclude unused code. With a complete AVR-ready Makefile setup, this guide is a practical reference for anyone writing modular microcontroller firmware.
24 mins
In just three decades, the internet has transformed from a vibrant network of personal webpages and forums into a landscape dominated by ultra-short videos, algorithmic curation, and passive scrolling. This article traces the evolution of online content creation—from thoughtful, long-lived expressions to impulsive, ephemeral media—and examines what we've gained and lost along the way. If you've ever wondered why the internet feels faster but emptier, this deep dive connects the dots.
7 mins
As AI-generated images and texts spark fierce debate in the art world, this article offers a different perspective: that AI is not stealing creativity, but unlocking it for countless people who’ve long had ideas but lacked the tools to express them. We explore what makes true art irreplaceable, what types of creative work are genuinely at risk, and why society must support those displaced by change. Rather than marking the end of human creativity, AI may just be its newest, most inclusive chapter.
9 mins
Ever wondered if your compact notebook or mini PC could power serious AI, LLMs, or scientific simulations? In this guide, we show you how to retrofit systems without PCIe slots using M.2 NVMe adapters and GPU expansion boards—enabling multi-GPU setups even on budget hardware. While not a full desktop replacement, this approach offers surprising performance for specific workloads. Perfect for tinkerers, researchers, and hardware hackers.
48 mins
Large Language Models are transforming the way we interact with information—but their real potential is unleashed when they're embedded in agents that can reason, plan, and adapt. This guide explores the emerging architecture patterns behind modern LLM-based systems: from stepwise planning and research workflows to memory-aware decision-making, simulations, and autonomous behaviors. Whether you're building intelligent assistants, automated researchers, or multi-agent systems, this collection distills the key concepts, tools, and interaction models that make LLM agents truly capable. Through detailed explanations, structured pattern summaries, and illustrated diagrams, you'll learn how to compose powerful, reliable, and adaptive agent systems that go far beyond simple prompting.
2 mins
Want to access your internal JupyterLab instance securely over HTTPS? This quick guide shows how to set up Apache 2.4 as a reverse proxy for JupyterLab 4.2.5, with working websocket support and proper configuration on both ends. Learn how to avoid common pitfalls like broken kernels or missing output—and get your lab running smoothly behind your own public facing reverse proxy
Dipl.-Ing. Thomas Spielauer, Wien (webcomplains389t48957@tspi.at)
This webpage is also available via TOR at http://rh6v563nt2dnxd5h2vhhqkudmyvjaevgiv77c62xflas52d5omtkxuid.onion/