On building scalable systems | Kislay Verma A deep dive into software scalability, strategies for building a scalable system, and adopting distributed system design as the key to scalability
Use a message envelope Event-driven architectures have various styles of communication. In my previous post I described a couple of event types you may see in these kinds of architectures. In this post I'd like to go over a supporting practice that benefits virtually all types ...
csharplang/pattern-match-span-of-char-on-string.md at main · dotnet/csharplang The official repo for the design of the C# programming language - csharplang/pattern-match-span-of-char-on-string.md at main · dotnet/csharplang
Low Process Culture, High Process Culture When I changed jobs in 2020, I went from a low-process culture to a high-process culture (or: what I perceive as high-process, all things are relative). It was a bit of a culture shock. The process…
I practice typing in Workman today. Here is my experience. I practice typing in Workman at the time of this post. Here is my experience.
Hedonism, Asceticism and the Hermetic Answer – Luke Smith The modern world more or less gives you the philosophical choice of either Hedonism or Asceticism. You never really hear it in those terms, but that's how it is.
How to Best Use Twitter [Note: While I do intend to write more about Russia’s invasion of Ukraine, this post is intended to address this only indirectly rather than directly, by helping illustrate how to find other source…
We Cannot Live Without Cryptography! The word cryptography evokes images of spies, secret messages and covert agencies. But what is cryptography? Cryptography is the method of scrambling data so that it looks...
How to get the most out of your 1:1s As a Director of Engineering, I have monthly 1:1s with all of my direct reports. A 1:1 (one-on-one) is a recurring meeting with no set agenda between a manager and one of their reports. The internet is full of valuable insight into how to run them from my...
Go Playground - The Go Programming Language Go is an open source programming language that makes it easy to build simple, reliable, and efficient software.
iMac G4 to M1 conversion progress Hey guys, I wanted to share a little project I've been working on over the holidays. I'm new to this forum and I am not a professional at this by any means, I just like to challenge myself with projects like this. I'll share the details of my ongoing proj...
PowerShell Plans Unveiled After .NET 7 Hiccup -- Visual Studio Magazine 'We continue to work closely with the .NET team to align our releases, however we found some issues in .NET 7 preview 1 so we couldn't ship PowerShell 7.3 preview 2 with .NET 7.'
micropolisJS Play micropolisJS and build a virtual city in your browser! micropolisJS is a handwritten HTML5/Javascript port of Micropolis, the open-source release of SimCity (the 1989 version).
Edge Developer Tools for Visual Studio (Preview) When developing web apps, it’s common to use the browser developer tools to perform various tasks like; modifying the CSS, inspecting network traffic, etc. Because the browser is disconnected from the IDE, if you make changes to the running application in...
Editing stuff in prod Here's a concept: "ssh to prod and edit directly on the machine" is generally bad news.
Tutorial: Hello World with Microsoft Orleans This topic is a bit of a divergence from regular content regarding building mobile, desktop and web apps using cross platform technologies like Uno and Flutter. However, you shouldn’t underestimate the complexity of building scalable backend services to s...
The Dirty Pipe Vulnerability — The Dirty Pipe Vulnerability documentation Max Kellermann <max.kellermann@ionos.com>
State of Developer Recruitment 2021 | HackerEarth Get a clear look at developer recruiting in a post-pandemic world with opinions and insights from nearly 2500 HR and Engineering leaders.
Executing code before Main in .NET - Gérald Barré In this post, I describe how to execute code before the Main method in a .NET application.
Webinar: Database Security in a Hostile World On March 9, I’m going to be talking about Database Security in a Hostile World. Please join me, I promise it will be interesting.
GW-BASIC Source Notes | OS/2 Museum When I learned that Microsoft released the GW-BASIC source code, I was mildly curious to find out what is or isn’t there. The short answer is that there’s a whole lot, but a lot is also missing. Spelling note: Both “GW-BASIC” and “GW BASIC” can be found i...
Cloudflare, CrowdStrike, and Ping Identity launch the Critical Infrastructure Defense Project Today, Cloudflare is launching the Critical Infrastructure Defense Project. The Project was born out of conversations with cybersecurity and government experts concerned about potential retaliation to the sanctions that resulted from the Russian invasion ...
Adding feature flags to an ASP.NET Core app This post is about Adding feature flags to an ASP.NET Core app.Feature flags (also known as feature toggles or feature switches) are a software development technique that turns certain functionality on and off during runtime, without deploying new code. I...
Introduction to Unit Testing With NUnit in C# - Code Maze In this article, we are going to talk about the NUnit testing framework that we can use to write tests in our C# applications.
296: NSUrl, Security Scope, & Bookmarks Who doesn't love security? Who doesn't love security inside of the app sandbox?!?! We break down file-access and all of its complexity when building sandboxed apps for iOS, macOS, Android, and Windows!
C++ Cheat Sheets & Infographics Graphics and cheat sheets, each capturing one aspect of C++: algorithms/containers/STL, language basics, libraries, best practices, terminology (信息图表和备忘录).
MAZEPIN FIRED!!! IM BACK After more than a year I am sitting at the desk again. news about f1 and the nfl and one new topic.
DevOps 101: What, who, why, and how? What exactly is DevOps and what does it mean for you and your organization? Grant Fritchey aims to explain in our new monthly webinar series, DevOps 101.
Steps we've taken around Cloudflare's services in Ukraine, Belarus, and Russia At Cloudflare, we've watched in horror the Russian invasion of Ukraine. As the possibility of war looked more likely, we began to carefully monitor the situation on the ground, with the goal of keeping our employees, our customers, and our network safe
Microsoft DDoS protection response guide Receiving Distributed Denial of Service (DDoS) attack threats? This guide provides an overview of what Microsoft provides at the platform level, information on recent mitigations, and best practices.
Polly with .NET 6, Part 3 - Dependency Injection of a Policy into a Minimal API Endpoint | no dogma blog This post shows how to use Polly with .NET 6 if you are taking advantage of top-level statements.
Windows Package Manager 1.2 We’ve been busy improving the Windows Package Manager. Today I have the pleasure of announcing the availability of Windows Package Manager 1.2. It has been released to the Microsoft Store as an automatic update to the “App Installer” this morning if you’r...
PowerShell and OpenSSH team investments for 2022 It’s time to discuss the team investments for 2022. For some areas we’ll be completing work we’ve already started, and in others we’ll be beginning on new projects. Executive Order on Cybersecurity One of the areas we’ve already spent significant effort o...
Implementing a defaultable collection in C# This post looks at implementing a defaultable collection, which might be useful when binding to configuration
My lizard brain is no match for infinite scroll · Caffeinspiration I’m declaring defeat. Infinite scroll has won.
Binary search with confidence I’ve never intuitively understood binary search—–at least, I’ve never understood its usual presentation. For example, take a quick glance at Wikipedia’s binary search code:
The unofficial yet comprehensive FAQ for LoongArch (last updated 2022-03-06) Things you probably should know about the LoongArch, compiled and written by an independent developer. Translated from the Chinese version with the addition of some helpful language and cultural background.
Tear Down This Wall, Mr. BBC! When I opened my Overcast podcast app to listen to the latest episode of In Our Time, BBC Radio 4’s excellent show on the history of ideas, I was presented with this: Release dates matter. If…
I Can No Longer Compile My First Flash Game A tale about game development and techonlogy obsolescence
Escaping privileged containers for fun Despite the fact that it is not a 'real' vulnerability, escaping privileged Docker containers is nevertheless pretty funny. And because there will always be people who will come up with reasons or excuses to run a privileged container (even though you rea...
Building a generate routes function using Terraform test Welcome to the next episode of thinking out loud to route in the cloud with style. Earlier this season we abstracted a TGW Centralized Router. Part of it’s responsibility is to manage routes between Tiered VPCs within a single region. Looking forward, it ...
The rise of WebAssembly WASM initially promised performance gains and greater portability for web applications, but now is making an impact across a growing number of environments.
Windows Defender is enough, if you harden it This article is not intended to convince you to abandon your current antivirus solutions. In this post I would like to share my observations and ways to improve the effectiveness of Defender. You don’