Build

Development guides and tutorials

DRY Applies to Agents Too

DRY Applies to Agents Too

I used to manage all my agent instructions in one file. It worked at first, but it didn’t scale. Splitting them into modular files by domain made my workflows faster, easier to maintain, and way less fragile. Here’s how I made the shift and what I’m experimenting with next.

Make Background Coding Agents Actually Work For You

Make Background Coding Agents Actually Work For You

Background coding agents are finally affordable and accessible, but most still produce low-quality output. The issue isn’t the models — it’s the missing context. In this post, I share how adding a simple swarm.notes.md file to every repo turned my AI agents into actual contributors, not cleanup jobs.

The hidden lever that makes AI agents actually useful

The hidden lever that makes AI agents actually useful

After building my own AI swarm for over a year, I realized the most important variable is the trigger. In this post, I break down how to design agent execution loops that actually get things done, without needing constant attention.

Your instructions are probably a mess. Mine were too. XML fixed it.

Your instructions are probably a mess. Mine were too. XML fixed it.

Most AI agents break because their instructions are too long, too vague, or too human. I used to write like that too — until I switched to XML and finally got the control I needed.

AI at the Point of Work — How Browser-Based Assistants Unlock 10x Output

AI at the Point of Work — How Browser-Based Assistants Unlock 10x Output

Most AI tools sit outside the flow of work. PailFlow brings AI into the browser, where real work happens. Here's what makes that so effective—and how it changed the way I build.

How to understand OAuth in 5 steps

How to understand OAuth in 5 steps

If your product connects with platforms like DocuSign, Google, or Notion, OAuth is the protocol that makes secure integrations possible. It allows apps to access user data from other platforms without requiring passwords to be shared. Here's how it works in 5 steps.