Why read or write blogs as a developer in the era of Generative AI?
In the last year, language models have gotten cheaper and faster at the same time. This has led to a situation where we have a proliferation of answer interfaces in a lot of existing apps like Reddit in addition to the standalone apps that focus on giving you answers like Google, ChatGPT or Perplexity. Someone looking for information can easily open any one of these apps, type in a topic and get an eloquent multi-page in-depth answer.
…Hacker News post summarization with a thinking model
If you are anything like me, you spend a lot of time reading through the posts and discussions on the front page of Hacker News each day. Sometimes even after spending an hour or more on Hacker News, I come out with a sense that I haven’t fully caught up on the posts or the discussions.
For the uninitiated, Hacker News is a site that aggregates news and blogs about tech, science and innovation with a social element to it. Users can share stories they find interesting as text or links and have discussions about it. I personally learn a lot by going through a handful of Hacker News posts and the discussions each day. Posts that make it to the coveted front page often have thought provoking discussions, aspects of the topic missed by the original post. The contents of the post combined with the vibrant discussions give a more holistic view of the subject than reading just the post or just the discussion on Hacker News.
…Envoy Proxy: API Key Validation using HTTP Lua Filters
As a continuation of my previous blog post, I was looking for good examples to further explore Envoy’s extension points. During this search, I found an issue on Github asking for a native Envoy Filter to do API Key Validation. I am not very familiar with Envoy’s native C++ filters but, as things stand today, we can already solve this problem using a Lua HTTP Filter. This post will explain how.
What are API Keys?
API Keys are used for authorization by some servers and they are usually a short unique string used to identify client. Although, API Keys are not the most secure form of authorization, they are still commonly used. When a client makes an API call to the server, this unique API Key can be included in the request in the following ways:
…