Configuring AWS Credentials for .NET Applications - Detailed Guide In this article, we will go through the best practices for configuring & managing AWS Credentials for .NET applications. We will walk through various ways
T-Mobile admits to 37,000,000 customer records stolen by “bad actor” Once more, it’s time for Shakespeare’s words: Once more unto the breach…
The LLM productivity puzzle — Andreas Fragner Code generation is arguably one of the most interesting applications of LLMs, and it’s quickly gained traction (Copilot/Codex, Codegen, etc.). If you spend time on the internet these days you’ll see people claim productivity gains ranging from 0 to 100x, ...
Why I Declined $100K Development Funding | Devlog #35 - Project Feline (Prototype) by Raymond Cripps My plan to secure funding for my dream game goes astray when awarded a government grant tied to a dubious funding agreement fraught with legal contradictions and worrying long-term ramifications for m...
Cherishing the Last Time - Nick's Basecamp Optimize your life and live in the moment with the last time principle.
Why Leaders Should Start and End With a Map Lessons I have learned from scaling an organization from an idea to hundreds of people.
Front-end is so much more than building designs I was unfortunately made aware of this tweet today and it felt like a blast from the past. Y’know what I’m talking about: the old days when you’d get a PSD from a designer and bui…
Delimited files are hell-- a comparison of methods to read bad files Here’s a real live example of why I am stuck with R and stuck with data.table. In my work, I often receive various delimited files from customers. Mostly, these delimited files are created from Oracle or MS SQL and have all kinds of gnarly things going on...
New Rails health check endpoint Rails just recently added a default /up route that will return a 200 when the application is running. I've had to implement this in pretty much every Rails app I've ever worked on. This is a nice addition! If you're not familiar. This is useful for load...
Questioning My Approach to Advice Good advice is very difficult to give. This is because it is inherently context dependent. Advice is inextricably linked with the lived experience of the person giving the advice. No matter how well conceived or written, the value of advice is limited by ...
Software that abstracts away a skill Removing the need to know the underlying concepts and making familiarity with the software a desirable skill in itself
Kolja Pluemer | In search of a better Spaced Repetition algorithm #1 My analysis of what the best SR algorithm may be and how many new learning items should be introduced every day
Dear Retro Community, Stop Writing Tools in C People in the retro development community keep choosing to write tools in C. Don’t do it!
34 days of ice cold showers in the dead of winter Today I took the first hot shower I’ve had in over a month. For each of the past 34 days I’ve taken only 3+ minute cold showers. Why would I torture myself like this you ask? I started on a whim, out
The .NET feature I grew to love When "top-level statements" and "minimal hosting pattern" features were released with .NET 6 in 2021 I did everything I could to avoid using them.However, af...
git-sim: Visually simulate Git operations in your own repos git-sim: Visually simulate Git operations in your own repos with a single terminal command
Can we kill the word ‘project’ please? One of the things I do in the realm of strategic architecture is help companies migrate their legacy systems. This can be referred to as ‘modernization’, and generally it means rewritin…
Cloud Fundamentals: AWS Services for C# Developers Everything a C# developer needs to know to get started with the most popular services of AWS
Required Members in C# - Code Maze In this article, we are going to talk about required members in C# and how from C#11 we can use the required keyword.
How can I call a method on a derived class from a base class, say, to get a strong reference to the containing object? A variety of patterns are available.
Smithsonian Open Access The Smithsonian has made over 4 million images available to download, edit, ...
How You Respond to Security Researchers Says Everything About You - Dhole Moments Tails from the Cryptographic Side of Security Research