Chris’ Corner: Very Simple Web Components
Let’s do a Web Components issue this week. We gotta do it. As Scott Vandehey says: HTML Web Components Are Having a Moment. Scott links to a pretty healthy stew of other people’s writing where they have their own ah-ha moments where they can picture the usefulness of native Web Components
Read moreFrom prompt attacks to data leaks, LLMs offer new capabilities and new threats
While there’s a lot of dangers out there, it’s not all doom and gloom; we also talk about how to mitigate these threats.
Read moreAddition theorems for Dixon functions
The last couple blog posts have been about Dixon elliptic functions, functions which are analogous in some ways to sine and cosine functions. Whereas sine and cosine satisfy a Pythagorean identity the Dixon functions sm and cm satisfy what you might call a Fermat identity alluding to Fermat’s last theorem.
Read moreClean Architecture: Theming with Tailwind and CSS Variables
Learn the principles of clean architecture by exploring best practices of theming in Tailwind CSS using CSS variables. Continue reading Clean Architecture: Theming with Tailwind and CSS Variables on SitePoint.
Read moreFermat curve
The Fermat curve of order n is the set of points satisfying xn + yn = 1 for a positive integer n. Fermat’s last theorem is equivalent to saying there are no non-trivial rational points on the Fermat curve of order n > 2. (The trivial points have x or y
Read moreConformal map between disk and equilateral triangle
The Dixon elliptic functions sm and cm are in some ways analogous to sine and cosine. However, whereas sine and cosine satisfy the Dixon functions satisfy The exponent 3 foreshadows the fact that these functions have a sort of three-fold symmetry. In particular, the function sm maps an equilateral triangle
Read moreThe tax change that’s hurting startups and developers
In the United States, R&D expenses and software development suddenly got a lot more expensive, leading to surprise layoffs. Plus, what defines shovelware, game developers look towards unionization, and the right way to kill your process.
Read moreHow to Analyze Large Text Datasets with LangChain and Python
Learn how to analyze large text datasets with LangChain and Python to find interesting data in anything from books to Wikipedia pages. Continue reading How to Analyze Large Text Datasets with LangChain and Python on SitePoint.
Read moreIntegrals involving secants and tangents
As a student, I often made the mistake of thinking that if I knew a more powerful theorem, I didn’t need to learn a less powerful theorem. The reason this is a mistake is that the more powerful theorem may be better by one obvious criterion but not be better
Read moreWhat is the point of a public key fingerprint?
Public key cryptography uses two keys: a private key and a public key. The nature of these keys depends on the encryption scheme, such as whether one is using RSA, ECC, or some other method, but you can think of a key as a long number. A key may be
Read more