Vibecoding in practice - An online Dictionary en españolI love words, I compile words and always search what they mean. My native language is español and to my surprise there are not that many on line. México where I'm from has no official online language Mar 12, 2026·4 min read
From Code to Cloud: A Beginner's Guide to Data Analytics with Python & Azure FabricJan 31, 2026·6 min read
How to Automate Azure VM Setup with GitHub Actions and BicepBy Roberto In this post, we'll explore how to automate the creation of a Windows 11 Virtual Machine in Azure's Mexico region using a combination of GitHub Actions and Bicep. This powerful duo enables us to define our infrastructure as code, ensuring ...Jan 29, 2026·2 min read
Role Prompting: Unlocking AI's Full PotentialWelcome to one of the most powerful and intuitive techniques in prompt engineering: Role Prompting. By mastering this skill, you can transform a generalist AI assistant into a team of specialized experts, each ready to tackle your specific needs with...Jan 28, 2026·7 min read
The inners of Large Language ModelsIntroduction Welcome to the inner workings of Large Language Models! In this chapter, Trufa will guide Paula (and you) through the fascinating world of how LLMs actually work. We'll demystify the "black box" and explore the fundamental concepts that ...Jan 25, 2026·8 min read
Introduction: The Art and Science of AI CommunicationINTRODUCTION: THE ART AND SCIENCE OF AI COMMUNICATION Welcome to the exciting world of Prompt Engineering! Whether you are a developer, a writer, a business leader, or simply an AI enthusiast, mastering the art of communication with artificial intell...Jan 25, 2026·6 min read
The Pitfalls of Poor PromptsCHAPTER 1: THE PITFALLS OF POOR PROMPTS WHEN LESS IS LESS: UNDERSTANDING INSUFFICIENT PROMPTS Have you ever asked someone a question so vague that their answer couldn't possibly be helpful? Perhaps you've walked up to a stranger and simply said, "Dir...Jan 23, 2026·11 min read
Architecting the Invisible Fortress: Zero TrustIntroduction In the existing threat landscape, perimeter-based security the digital equivalent of a castle wall has been rendered obsolete by cloud adoption, mobile workforces, and sophisticated adversaries who operate on the assumption that breach i...Jan 23, 2026·3 min read