Where randomness meets reason
Tag
5 posts
A technical teardown of Cursor: the models, infrastructure, and engineering decisions behind the product.
Taxonomy of prompt injection attacks and the layered defenses — input validation, output filtering, guardrails — that actually work at scale.
What happens between your API call and a streamed token — routing, batching, KV cache, quantization, and speculative decoding explained.
A comprehensive rundown of function calling, Model Context Protocol, agent frameworks, and the patterns that actually work in production — across every major provider.