314: Pixy Review - Snap's Mini Drone Our brand new Pixy drone by Snap is here and we break down every positive and negative of this adorable little drone.
The deep learning obesity crisis Deep learning have made dramatic improvements over the last decades. Part of this is attributed to improved methods that allowed training wider and deeper neural networks. This can also be attributed to better hardware, as well as the development of techn...
Build an LVGL Touchscreen App with Zig Can we use Zig to build an LVGL Touchscreen App for Apache NuttX RTOS? Also wrap the LVGL API in Zig to build simpler, safer LVGL Apps? Let's find out!
Hashed and Hierarchical Timing Wheels Today’s paper was written in 1987 by George Varghese and Tony Lauck from Digital Equipment Corporation (!), and has withstood the test of time. It’s about how to efficiently implement a timer facility that allows you to start a fixed length timer and perf...
Stylometric fingerprinting redux Avoid de-anonymization through analysis of your writing style. Defend against machine- and human-driven stylometric identification.
.NET Project Folders Structure We read very often how to have a good architecture for a .NET project, but I don't read very often...
Avoiding <img> layout shifts: aspect-ratio vs width & height attributes Two ways to do the same thing, but which is best?
AWS Streamlines .NET App Deployment with Visual Studio Tool -- Visual Studio Magazine Amazon Web Services has made it easier to deploy .NET applications to its cloud platform via its Visual Studio toolkit or the .NET CLI (command-line interface).
Alan Howard-Backed Cryptography Investor Geometry Emerges From Stealth Tom Walton-Pocock, the former CEO of zero-knowledge proofs shop Aztec, is heading up Geometry.
Easier Jupyter Notebook Setup for Python in VS Code Tooling -- Visual Studio Magazine In the regular monthly update to Python tooling for Visual Studio Code, Microsoft announced an improved setup experience for Jupyter notebooks, along with new inlay type hints for the Pylance language server.
Securing Web APIs with Azure AD: A Case Study Posts in this series: A Case StudyRecently, I was on a project where the company had a big push towards a "Zero Trust" security model. This concept was new to me, and I'd always been on clients where we had to secure APIs. What was quite a bit different w...
Your compliance obligations under the UK’s Online Safety Bill; or, welcome to hell – Hi, I'm Heather Burns Last month I wrote a post about the UK’s “world-leading” vision for age-gating the open web. It got a bit of attention. That post, sadly, encompassed only one aspect of your compliance obligations under the Online Safety Bill. In this post, I’m going to t...
VS2022 Performance Enhancements: Git Branch Switching Have you experienced delays when switching between your Git branches in Visual Studio? Did you have to wait for your solution and projects to reload after switching between branches in a Git repository? We are happy to announce performance enhancements to...
How does git work? In this blog post I will show you how git works. Or better we will see how git works on the example of some of the commands. Are you confused about origin, remote, rebase or merge? You see stuff like origin/main and origin main and just question marks app...
Production postmortem: Out of memory on a clear sky A customer opened a support call telling us that they reached the scaling limits of RavenDB. Given that they had a pretty big machine specifically to handle ...
Replace characters in a string using Vectorization - Gérald Barré In this post, I describe how to replace characters in a string using Vectorization in .NET.
Mangatoon data breach exposes data from 23 million accounts Manga comic reading app Mangatoon has suffered a data breach that exposed the account information of 23 million users after a hacker stole it from an Elasticsearch database.
Introducing Location-Aware DDoS Protection Location-Aware DDoS Protection is now available in beta for Cloudflare Enterprise customers that are subscribed to the Advanced DDoS service
Building Neural Networks With TensorFlow.NET TensorFlow is an open-source framework developed by Google scientists and engineers for numerical computing. TensorFlow.NET is a library that provides a .NET Standard binding for TensorFlow. In this article, the author explains how to use Tensorflow.NET t...
calibre - New in calibre 6.0 calibre: The one stop solution for all your e-book needs. Comprehensive e-book software.
On-device browser translations with Firefox Translations Firefox can now do offline and privacy-preserving translation of eight languages with more on the way. Powered by open-source and machine-learning.
Typing API Responses With Zod - CodeJourney.net How to make TypeScript API calls nicely typed? How to validate incoming data from an API? Typing API responses with zod
Invite external users to Azure AD using Microsoft Graph and ASP.NET Core This post shows how to invite new Azure AD external guest users and assign the users to Azure AD groups using an ASP.NET Core APP Connector to import or update existing users from an external IAM a…
Unsafe Code in C# (unsafe keyword) - Code Maze C# supports an unsafe context where we can write code whose security is unverifiable by the CLR. Unsafe code allows the use of pointers.
Implementing & Testing Repository Pattern using Entity Framework In this article, we explore one of the most contraversial design patterns - Repository Pattern.
How To Convert Class Components to Hooks—Modernize React App This article covers how to convert common use cases from class components to hooks, so you can modernize your React apps.
Learning .NET MAUI – Part 9 Once again, we’ll pick up where we left off. But today we’re in for some big changes. Let’s add an IsBusy property to use in the MainViewModel. We’ll use the same trick we d…
Tag Helper for Display Templates ASP.NET Core doesn’t include a declarative way to call a display template. Let’s fix that.
The VS Code Server Securely connect to and develop on any remote machine with the VS Code Server private preview.
Understanding the Stack and Heap in C# | endjin The stack and heap are central components of memory management in C# programs. This post aims to introduce the topic, with a number of worked examples.
Pernicious Nulls - using and abusing nulls in C# This post looks at nulls - when to use them and when not to
Scrum Teams are often Coached to Death, while the Problems are With Management Team-level coaching isn’t enough
Report: Assassin's Creed Liberation Delisted & to Be Unplayable Even to Owners Starting September 1 on Steam Assassin's Creed Liberation has been delisted on Steam, and what's more, "will not be accessible" starting Sept. 1 even to owners.
GitHub - clarkerubber/irwin: irwin - the protector of lichess from all chess players villainous irwin - the protector of lichess from all chess players villainous - GitHub - clarkerubber/irwin: irwin - the protector of lichess from all chess players villainous
Field Notice: FN - 70545 - SSD Will Fail at 40,000 Power-On Hours - BIOS/Firmware Upgrade Recommended Certain Solid State Drive (SSD) models will experience data loss.