Blog

Entries on system architecture, intent-driven development, and the evolving role of the engineer.

SQLPrivacyHIPAAPHISHA-256Intermediate

Beyond the Scrub: A Technical Guide to De-identification in SQL

Moving from raw PHI to a HIPAA-compliant dataset requires more than just dropping columns. In this guide, we explore the SQL implementation of Safe Harbor de-identification, the nuances of salted SHA-256 hashing, and the critical architectural differences between De-identified and Limited Data Sets.

Kanakadurga KunamneniKanakadurga KunamneniApril 2, 20264 min
Data VisualizationChoropleth MapsPythonTableauApache SupersetGeospatial AnalysisIntermediate

Beyond the Spreadsheet: A Guide to Choropleth Maps

Mapping geographic data is more than just shading regions on a screen; it's about uncovering spatial patterns that standard charts often hide. Whether you are leveraging the speed of Tableau, the precision of Python, or the open-source scale of Apache Superset, the success of your map depends on one critical rule: normalize your data. Discover how to choose the right tools and design principles to ensure your choropleth maps tell the true story behind your data.

Kanakadurga KunamneniKanakadurga KunamneniMarch 1, 20263 min
SQLData ScienceCodingBeginner

The SQL BETWEEN Operator: More Than Just "Syntactic Sugar"

The BETWEEN operator is one of the most common tools in a SQL developer’s kit, yet it is often the source of subtle, production-breaking bugs. From the "inclusive" trap of DATETIME stamps to handling messy strings with TRIM and LEFT, this article explores how to use BETWEEN effectively without sacrificing performance or accuracy.

Kanakadurga KunamneniKanakadurga KunamneniMarch 1, 20263 min
AI codingSoftware ArchitectureReactBeginner

The Velocity Trap: Navigating the Gap Between Code and Context

In a world of infinite code, the bottleneck is no longer production—it’s discernment. Here is how a syntactically perfect tracking pixel turned into a self-inflicted DDoS, and what it teaches us about the shifting role of the architect.

Sreekar SiddulaSreekar SiddulaFebruary 23, 20263 min
PolarsPythonData ScienceProgrammingIntermediate

Why Polars? A Health Data Scientist’s Perspective on Modern Architecture

As clinical datasets grow in complexity, the traditional tools of data science are hitting a performance wall. This article explores the architectural "why" behind Polars from its Rust-based parallelism to its intelligent query optimizer and explains how these features solve the unique data integrity and memory challenges faced by health data scientists today.

Kanakadurga KunamneniKanakadurga KunamneniFebruary 23, 20263 min
CybersecurityAIAgentsIntermediate

Cybersecurity in the Age of Agents: When Software Can Act

In the age of agents, security stops being about what software knows and becomes about what it can do. These tool-using systems don’t just answer questions—they browse internal docs, call APIs, open PRs, trigger CI, message people in Slack, and basically operate like a junior engineer with superpowers… as long as you’ve handed them OAuth scopes and tokens. That collapses the gap between “thinking” and “acting,” which means everyday inputs like emails, tickets, and random webpages can quietly become control channels (hello prompt injection / indirect prompt injection). So the new attack surface isn’t just models—it’s permissions, connectors, skills/plugins, secrets in configs/logs, and workflow-based lateral movement. If we want to use agents safely, we can’t rely on “be careful” or “better prompts.” We need agent-specific controls: least-privilege tool access, short-lived creds, policy gates before/after tool calls, sandboxing + egress controls, DLP, and strong provenance/audit trails so every action is attributable and reviewable.

Saikat MukhopadhyaySaikat MukhopadhyayFebruary 22, 202614 min
SQLPostgreSQLRedshiftStatisticsHealthcareData AnalysisBeginner

Why is "Mode" Missing from Your SQL Toolbox?

Calculating Mean and Median in SQL? Easy. But try finding the Mode (the most frequent value) and the database goes silent. Here's why MODE() never made it into standard SQL, and how to work around it.

Kanakadurga KunamneniKanakadurga KunamneniFebruary 18, 20264 min
CursorAIProductivityDeveloper ToolsBeginner

Cursor Commands vs Rules: When to Use What

Understanding the difference between Cursor commands and rules — and when to use each — will make you significantly more productive with AI-assisted coding.

Sreekar SiddulaSreekar SiddulaFebruary 17, 20264 min
Next.jsTypeScriptDatabasesIntermediate

Building Type-Safe APIs with Next.js 15 and Drizzle ORM

Learn how to build fully type-safe API routes in Next.js 15 using Drizzle ORM, from schema definition to runtime validation.

Sreekar SiddulaSreekar SiddulaFebruary 17, 20268 min
RustWeb DevBeginner

Rust for JavaScript Developers: A Practical Introduction

A hands-on guide to learning Rust, written specifically for developers coming from the JavaScript/TypeScript ecosystem.

Alex DevAlex DevFebruary 16, 202612 min
DevOpsWeb DevBeginner

Docker Compose Patterns for Local Development

Stop fighting environment setup. Learn Docker Compose patterns that make local development reproducible and painless.

Sreekar SiddulaSreekar SiddulaFebruary 15, 20266 min