How I Use Work Tools To Organize Personal Life Senior Production Engineer at Uber, making Uber’s Payment systems more secure and reliable.
Should billionaires exist? – Part 1 Though it’s been mostly overshadowed by recent world events, there has been an ongoing debate in the media concerning the morality of billionaires and their existence. These debates often tur…
My dev super power is "I can build anything" so what the heck should I build?! The idea is the easy part. Picking one with a good founder fit is not.
Obfuscating your email on the web In this article, I discuss methods for hiding your email from bots while keeping it available to readers.
A Guide to Autodidactism | Jack Kinsella In Faust: The First Part of the Tragedy, Goethe, the German author esteemed as highly in German literature as Shakespeare is in English literature, portrays a character named Faust who strived to learn everything that can be known:
Implementing 'focus and reply' for Fastmail with JMAP Implementing 'focus and reply' for Fastmail with JMAP
Buildstarted/PuppeteerSharpBypassingBotDetection Bypassing bot detection checks with PuppeteerSharp. - Buildstarted/PuppeteerSharpBypassingBotDetection
chris124567/puppeteer-bypassing-bot-detection Bypassing bot detection checks with Puppeteer. Contribute to chris124567/puppeteer-bypassing-bot-detection development by creating an account on GitHub.
Post | theheadless.dev - Learn Puppeteer & Playwright While automation tools are fundamental to modern software development, they also have the innate potential to be used for malicious purposes. This applies to Puppeteer and Playwright, too. As a consequence, some user flows are made purposely hard to autom...
569936821221962380720 - Numberphile A number of galactic proportions... See more #MegaFavNumbers on this playlist - https://bit.ly/MegaFavNumbers - and read below to contribute your own. More links & stuff in full description below ↓↓↓ See our full collection of video on the sum of three c...
Pixel 4xl stuck on 50% ,Switches off randomly,Has a battery symbol with a ? This post is a trending issue.
MediatR: how to use Decorators to add retry policies - Davide Guida Today we'll see how we can leverate the Decorator Pattern in conjunction with Polly and Scrutor to add retry policies to MediatR.
Bring the best of the Web to your .NET desktop applications with WebView2 | .NET Blog This blog post was written together with Palak Goel, Program Manager on Edge Product Development team. Last year at Build, we introduced WebView2, a browser control that renders web content (HTML / CSS / JavaScript) with the new Chromium-based Microsoft E...
minvws/nl-covid19-notification-app-backend Contribute to minvws/nl-covid19-notification-app-backend development by creating an account on GitHub.
Most "mandatory requirements" in corporations are imaginary In my day job I work as a consultant. Roughly six months ago my current client had a non-negotiable requirement that consultants are not all...
The Reason For The Weird PHP Function Names Programming book reviews, programming tutorials,programming news, C#, Ruby, Python,C, C++, PHP, Visual Basic, Computer book reviews, computer history, programming history, joomla, theory, spreadsheets and more.
ASP.NET Core 5: Make your options immutable Introduction If you’ve been using ASP.NET Core 5 for a while, you’ll be delighted to learn that...
Simulate Mobile Devices with Device Mode in Microsoft Edge DevTools - Microsoft Edge Development Use Device Mode to approximate how your page looks and performs on a mobile device.
Porting a Golang and Rust CLI tool to D A few days ago, in the programming subreddit, Paulo Henrique Cuchi shared his experience writing a command line tool in both Rust and Go . T...
Researchers Can Duplicate Keys from the Sounds They Make in Locks Researchers have demonstrated that they can make a working 3D-printed copy of a key just by listening to how the key sounds when i
A Cloudflare worker to redirect image requests from dickhead content scraper's site to a Rick Roll A Cloudflare worker to redirect image requests from dickhead content scraper's site to a Rick Roll - rick-roll-content-scraper.js
Symmetric and Asymmetric Encryption in .NET Core This post looks at symmetric and asymmetric encryption and how this could be implemented in .NET Core. Symmetric encryption is fast and can encrypt or decrypt large amounts of text, streams or file…
Kowainik - Haskell mini-patterns handbook Collection of small Haskell patterns with detailed description, examples and exercises
The Death Of Corporate Research Labs In American innovation through the ages , Jamie Powell wrote: who hasn’t finished a non-fiction book and thought “Gee, that could have bee...
Introducing C# 9: Native-sized integers Introduction First what are native-sized integers ? They are designed to be a integer whose...
ShinyHunters Serving up 21 New Compromised Databases - Binary Defense ShinyHunters: ShinyHunters is showing no signs of slowing their slew of attacks anytime soon. Early yesterday, 21 new databases were listed for sale by ShinyHunters on RaidForums. The new collection of victims from the threat group appears to be a random...
$5 DIY "Smart" Garage Door Opener using Sonoff SV READ THIS UPDATE!!!! Tasmota updates have changed some necessary settings! Here's what you need now: (Thanks Chris Norton) Switchretain 1 Powerretain 1 switchtopic2 garagestate switchmode1 0 switchmode2 2 GPIO 14 to 10 Switch2 GPIO 4 to 22 Relay2 co...