Is an ANEMIC Domain Model really that BAD? Is an anemic domain model a bad thing? Most would probably call it an anti-pattern, and it should be avoided. But is that really true?
.NET Data Community Standup - EF Core Architecture: Internal Dependency Injection Join Arthur Vickers and others from the EF Team as we start a deep dive into the architecture of Entity Framework Core. This won’t be a formal talk, but rath...
Who Needs Modern Emacs? The tools we use have a profound (and devious) influence on our thinking habits, and, therefore, on our thinking abilities. — Edsger W. Dijkstra
Gmail accepts forged YouTube emails This morning I woke up to an official-looking email from YouTube in my inbox, addressed to an address that isn't mine.
Why I'm hyped about Julia for Bioinformatics | Next.js Blog Example with Org A statically generated blog example using Next.js and Org.
Mojeek Blog Post – Stoutner Mojeek recently wrote a blog post about Privacy Browser Android. I thought it would be interesting to share some thoughts both about Mojeek and about how that post came to be published.
Async destructors, async genericity and completion futures The main focus of this article will be on attempting to design a system to support asynchronous destructors in the Rust programming language, figuring the exact semantics of them and resolving any issues encountered along the way. By side effect, it also ...
Optimizely CMS: List content recursively on a page - and list the visitor groups used Quite often a lot of the content on pages in Optimizely Content cloud (aka Episerver CMS) is structured in blocks placed in content areas. And often even blocks in blocks. Sometimes it's needed to quickly get a list of all the content items on a page - an...
Probit Regression Using C# -- Visual Studio Magazine Dr. James McCaffrey of Microsoft Research explains the classical machine learning technique typically used for binary classification -- predicting an outcome that can only be one of two discrete values.
GitHub - mxgmn/MarkovJunior: Probabilistic PL based on pattern matching and constraint propagation, 148 examples Probabilistic PL based on pattern matching and constraint propagation, 148 examples - GitHub - mxgmn/MarkovJunior: Probabilistic PL based on pattern matching and constraint propagation, 148 examples
WebKit/Documentation.md at main · WebKit/WebKit Official git mirror of the WebKit repository, https://svn.webkit.org/repository/webkit, future canonical repository. - WebKit/Documentation.md at main · WebKit/WebKit
Improved doc management personalization Visual Studio's new doc management capabilities can help you become more productive and organized.
Manual? … MANUAL?? Let me share with you the audacity… the audacity of programmers. You would assume that being programmers we would have a preference for programming solutions, but — and I’m not so…
I got hacked and Facebook banned me What do you think happens if your personal Facebook profile gets hacked? Until last week I naively thought it would be a simple matter of letting Meta know, and them helping me reclaim my account… The actual process has been upsettingly opaque.
WikiShootMe! You can filter Wikidata results (?q) by changing the partial SPARQL below. Optionally, also use ?location for your own coordinates
Why science needs more research software engineers Ten years after their profession got its name, research software engineers seek to swell their ranks.
Pull requests · dotnet/runtime .NET is a cross-platform runtime for cloud, mobile, desktop, and IoT apps. - Pull requests · dotnet/runtime
How to Tie a Tie (Mirrored / Slowly) - Full Windsor Knot How to tie a tie step by step tutorial. If you want quick and easy you can use the gear icon to adjust the settings to "speed 1.5" to view it faster and/or c...
Long-Running Tasks in a Microservices Architecture - Code Maze One way to execute long-running tasks in a system that is designed using the microservices architecture pattern.
Hacking Ham Radio: WinAPRS – Part 5 This installment will review and demonstrate functional exploits for WinAPRS on both Windows XP SP3 and Windows 10.
Bookmark these 10 Essential NuGet Libraries for ASP.NET Core | Pro Code Guide In this article, we will discuss the top 10 essential NuGet libraries for ASP.NET Core which every developer should know to develop better ASP.NET Core
Change C# Record Comparison with Source Generators Using Source Generators we can modify C# records’ value comparison
Response Caching in ASP.NET Core - Code Maze Response Caching is the mechanism of caching a server's response for future requests by a browser or other clients.
Monsters Weekly 252 - Building a WebComponent In a previous episode, we looked at how we can use the Template element to reuse a block of HTML. Now, let’s take that a step further and use a few other native browser technologies (Shadow DOM, Custo
AWS SNS vs. SQS - What are the main differences? This post introduces you to both AWS SNS and SQS and shows you the differences. It also shows examples when you should use which service.
Dev Box, A Cloud-Based IDE Service for Developers : C# 411 Microsoft announced the Microsoft Dev Box during their recent conference. Over the last Construct convention, Microsoft introduced the Microsoft Dev Field. This new cloud service offers builders safe, coding-ready developer workstations for hybrid groups ...
Consuming SOAP Services in .NET Core Today I ran into the need to consume an older SOAP web service in .NET Core. I was really fortunate in my timing because Core WCF was just released and it makes the whole process much easier. Taking a
Solo Show (Tesla doc; RS3 lies; updates; Q&A)- TST Podcast #731 Its a solo show! While Zack is in Germany, Matt clears some misconceptions about the Audi RS3 launch, the Porsche 911 Turbo LW, motorcycles, the new Tesla do...
CTARS Data Breach — CTARS If you have not heard of CTARS before, we are a cloud based client management system provider for NDIS, disability services, out of home care, and children’s services.