AI Unleashed (Part 1): Build Your First MCP Server
In this post, we explore how to build a Model Context Protocol (MCP) server using FastAPI. In future posts, we’ll build an AI agent that communicates with this MCP server
Read moreIn this post, we explore how to build a Model Context Protocol (MCP) server using FastAPI. In future posts, we’ll build an AI agent that communicates with this MCP server
Read moreMicro Frontends are a design pattern that allow teams a way to break down monolithic applications into smaller independent modules, improving development speed, autonomy, and maintainability.
In this two-part article, we’ll explore the design and implementation of an MFE architecture that leverages Lit-Element for creating custom web components.
Read moreCustom elements offer many advantages, but they have a significant downside: versioning. Since custom elements are defined globally, if multiple micro frontends […]
Read moreIn this post we will design a simple UX to build upon the previous posts where we set up an MCP Server […]
Read moreClean, consistent, and secure code is essential—especially in modern web applications where performance, accessibility, and maintainability intersect. With ESLint’s flat config now […]
Read moreMaintaining a strict Content Security Policy can be quite challenging. Ensuring a robust linting policy is in place can help keep your codebase free from any potential violations. This article will demonstrate how to do this.
Read moreMicro Frontends are a design pattern that allow teams a way to break down monolithic applications into smaller independent modules, improving development speed, autonomy, and maintainability.
In this second part of a two-part series, we will dive deeper into the code behind this Micro Frontend architecture.
Read moreContent Security Policy (CSP) stands as an essential element in bolstering the security of web applications. In this article, I will demonstrate different approaches for harnessing ESLint to proactively identify common programming patterns that can lead to CSP breaches.
Read moreContent Security Policy (CSP) is a crucial component for securing web applications. One common practice is to disallow the use of the ‘setAttribute(“style”, …)’ command, which can introduce security vulnerabilities.
In this article, I’ll guide you through the process of creating an Eslint rule to detect and prevent it’s use.
Read moreThe article will demonstrate a technique to separate lit-html code, typically housed within the render method, into an external .html file.
Read more