Posts
All the articles I've posted.
MEV — The Dark Forest of Ethereum and How Arbitrage Bots Actually Work
Posted on:August 13, 2024 at 10:00 AMMEV (Maximal Extractable Value) is the profit miners and validators can extract by reordering, inserting, or censoring transactions. This post explains sandwich attacks, arbitrage bots, and the infrastructure behind the multi-billion dollar MEV ecosystem.
Data Science Fundamentals — Why Choosing the Right Average Matters More Than You Think
Posted on:July 23, 2024 at 10:00 AMA companion to my technical article on measures of central tendency: arithmetic, geometric, and harmonic means, median, mode, and when each one is correct. Understanding which average to use — and which one to distrust — is the foundation of honest data analysis.
UniswapV3 Interactive Explorer — Concentrated Liquidity, Ticks, and Capital Efficiency
Posted on:June 25, 2024 at 10:00 AMInteractive explorer for UniswapV3 concentrated liquidity: configure your price range, see capital efficiency vs V2, tick numbers, token composition, and impermanent loss exposure — all live in the browser.
UniswapV3 — Concentrated Liquidity, Ticks, and Why It's Genius
Posted on:June 17, 2024 at 10:00 AMUniswapV3 introduced concentrated liquidity — LPs can now provide liquidity within a specific price range instead of across 0 to infinity. This post explains the tick system, range math, and why V3 can be up to 4000x more capital efficient than V2.
Profiling Node.js with Clinic.js and DoctorJS — A Real Case Study
Posted on:May 20, 2024 at 10:00 AMA hands-on walkthrough of Clinic.js toolchain — Doctor, Flame, and Bubbleprof — diagnosing real performance bottlenecks in a Node.js API. Includes flame graph interpretation, event loop delay analysis, and the actual code fixes.
ERC-20 Standard — Building and Auditing a Token from Scratch
Posted on:April 9, 2024 at 10:00 AMA line-by-line walkthrough of the ERC-20 standard — implementing a compliant token from scratch in Solidity, understanding every state variable and event, and learning the security vulnerabilities that have cost millions in real exploits.