My Digital Garden

A curated collection of useful links and resources

My Weekly Internet Treasures

Curated treasures from the overlooked corners of the internet

Hand-picked resources that algorithms don't prioritize

Thoughtful summaries that respect your time and attention

Weekly delivery with zero spam, ever

Join the readers who value depth over algorithms. Unsubscribe anytime.

React Internals: Which useEffect runs first?

No description available

How Data Travels the World to Reach Your Screen: A Deep Dive into O...

Ever wondered how data travels across the network? In this blog, we’ll break down the OSI model, TCP/IP, protocols like TCP, UDP, HTTP, HTTPS, and dive into HTTP versions, exploring how data is transferred efficiently and securely across networks.

Zhenghao's site

The official site of Zhenghao He, a software engineer and a TypeScript/JavaScript enthusiast.

How to Write Blog Posts that Developers Read

Software bloggers can make the same mistakes for years that prevent readers from discovering their writing. I know because I'm one of them. Over time, I've learned techniques that help some blog posts succeed and the pitfalls that cause others to languish in obscurity.

Yoko (@stuffyokodraws) on X

\[New post\] 🔥A Deep Dive Into MCP and the Future of AI Tooling APIs were the internet’s first great unifier but AI models lack an equivalent\. What are the use cases of MCPs today? Where are the challenges? Here's a technical deep dive & map of the current ecosystem 👇

The Why of technology

Language, agriculture, and unlocking the mysteries of life itself. How does technology enable our progress, and how should we move forward?

The game-changing potential of Model Context Protocol

Unlock the power of Model Context Protocol (MCP) — the future of AI-native apps, seamless service integration, and next-gen accessibility.

The Product Engineer

If you work for a company that builds primarily consumer software, there are, hopefully, three groups of humans who believe they are accountable for the product. They are: Engineering. They build the product. Design. No, they build the product. Product Management. No, really… they build the produc

The 13 software engineering laws

Hyrum's law, Conway’s law, Zawinski's law, and 10 others.

The Best Programmers I Know | Matthias Endler

I have met a lot of developers in my life. Late…

How JavaScript Works Behind the Scenes

Ever wondered how JavaScript handles asynchronous operations with just one thread? Discover how JavaScript actually works behind the scenes. Learn about the Event Loop, Web APIs, Task Queue, MicroTask Queue, and how JS efficiently manages concurrent operations.

Validating Leaked Passwords with k-Anonymity

Today, v2 of Pwned Passwords was released as part of the Have I Been Pwned service offered by Troy Hunt. Containing over half a billion real world leaked passwords, this database provides a vital tool for correcting the course of how the industry combats modern threats against password security.