Weekend bricolage: an aroma picker for the Le Nez du Vin game The Le Nez du Vin MasterKit 54 is a set of 54 aromas found in wine varieties across the world and is designed to help you develop your abil...
Bring your existing .NET Microsoft Teams app to Teams Toolkit in Visual Studio 2022 James is joined by Garry Trinder who is here to walk us through how to bring your existing .NET Microsoft Teams app to Teams Toolkit in Visual Studio 2022.Te...
What's New for GitHub Copilot Chat in Visual Studio Code v1.82 -- Visual Studio Magazine One new feature of the tool is the ability to create workspaces from a natural language description.
How AES Is Implemented The AES algorithm is widely used today, whether it’s for encrypting a connection to a website, encrypting data on your hard drive, or storing passwords in your favorite password manager. It has been battle-tested for many decades and is still recommended ...
Please, don’t stretch your text across the entire screen – reasoning.page I read a lot of blogs on the internet. I find this extremely enjoyable – there are so many people out there with interesting things to say, and different perspectives to my own.
Who blocks OpenAI? — News Homepages documentation The 392 news organizations listed below have instructed OpenAI’s GPTBot to not scan their sites, according to a continual survey of 1,119 online publishers conducted by the homepages.news archive. That amounts to 35.0% of the total.
Why am I not Dirac? Of course, I can’t be Dirac. Dirac was one of the greatest physicists of the 20th century. I am the author of Boogie Math, a silly website about mathematics.
Logging with OpenTelemetry and Loki A step-by-step guide to using OpenTelemetry's Logging SDK with Grafana Loki and NodeJS
Hidings Symbols Of Elf Files This blog post describes how to hide symbols in ELF files from static analysis. While this may seem like a curious gadget, this approach is used in the real world to prevent software from being analyzed, e.g., in software protection mechanisms or malware.
Factorio, Mutation, & Lossiness On Factorio, the high-level term "data transforms", how data transforms are practically implemented, and tradeoffs to consider in various implementation styles.
LinkAce vs Linkding - What's the Best Self-Hosted Link Archiving Application? When it comes to saving website links, these two self-hosted applications are definitely at the top of the list.
Steam local network game transfers are a game-changer Setting up a Steam LAN cache has never been this easy, so I went ahead and did some testing with different configurations.
Developing OCaml with Nix Lately, I've been writing a significant amount of OCaml as part of my PhD. Instead of using the OCaml package manager (opam) command-line interface (CLI) for these projects, I prefer to use Nix to provide declarative and reproducible development environme...
Deploying Django with Kamal (mrsk) In this post I'll walk you through my template to deploy a Django monolith using Kamal (mrsk), but you could also adapt it for Rails or Laravel.
It's Not about Finding Your Niche, It's about Developing Your Niche A writing piece on finding your niche by Scott P. Scheper.
I made a transformer by hand (no training!) To better understand how transformers work, I hand-assigned all the weights to predict a simple sequence.
Visualizing the CPython Release Process Last week I met with the CPython Developer-in-Residence and Release Manager Łukasz Langa to discuss the release process for CPython (detailed in PEP 101). Everything I learned I've documented below...
We need deterministic installs, not just immutable OS's Immutable OS's are just a minor step towards reliable OS installations. However, for a complete solution we also need reproducible and thus deterministic installations, which implies cleaning-up and modernizing our package managers.
avoiding the trap of originality Not only original ideas are worth sharing. Ideas that have existed are still worth the effort. Your readers change their context daily. Past ideas hit differ...
Notes on Self-hosted Transactional Email Since a little more than two months ago, Healthchecks.io has been sending transactional email (~300'000 emails per month) through its own SMTP server. Here are my notes on setting it up. The Before Before going self-hosted, Healthchecks sent email u...
Eternal Robustness "Look, you can trust us. We can be depended upon. We are serious about our products and we take great care to provide you with excellence year after year. Your involvement with us will be predictable and stable."
Update Conference Prague 2023 Update Conference Prague is the biggest developer conference organized yearly, offering sessions delivered by the top experts from all around the world. In relation to that, we also organize a few smaller events every year, each of them concentrating deep...
The Easiest Way To Get Started With Java on AWS Lambda Hi, I'm James! And in this video you are going to learn about the easiest way you can get started building Lambda functions on AWS with Java. That is using t...
Confidential Computing - ACM Queue Confidential Computing (CC) fundamentally improves our security posture by drastically reducing the attack surface of systems. While traditional systems encrypt data at rest and in transit, CC extends this protection to data in use. It provides a novel, c...
Have I Been Pwned? • Troy Hunt • GOTO 2023 This presentation was recorded at GOTO Aarhus 2023. #GOTOcon #GOTOaarhttps://gotoaarhus.comTroy Hunt - Information Security Author & Instructor at Pluralsigh...
Discovering Multi Triggers - .NET MAUI 101 Change the appearance of controls or enable/disable them altogether based on multiple conditions, that's what you can do with Multi Triggers in .NET MAUI! Cu...
The "Terrible" Keyword You Didn’t Know C# Had Check out my courses: https://dometrain.comBecome a Patreon and get source code access: https://www.patreon.com/nickchapsasHello, everybody, I'm Nick, and in...
Filtering negative numbers, fast: Scalar While working deep on the guts of RavenDB, I found myself with a seemingly simple task. Given a list of longs, I need to filter out all negative numbers as q...
Listing Windows virtual desktops using .NET - Gérald Barré In this post, I describe how to list virtual desktops on Windows using .NET.
Any sufficiently advanced uninstaller is indistinguishable from malware - The Old New Thing The common pattern of trying to delete yourself.
Google Chrome just rolled out a new way to track you and serve ads. Here's what you need to know Google is paving the way to serve you ads based directly on your browsing history, instead of cookies.
OOP and Interfaces in C#: How To Use Them Effectively Are you learning about Object Oriented Programming (OOP) and using C#? Let's look at OOP and interfaces in C# to learn about when we should use them!
Viva Air Leak: 26 millones de datos privados de clientes de la aerolínea de bajo costo estarían en línea desde hace nueve meses El 14 de marzo de 2022 fue publicado en un sitio web de la web profunda varias bases de datos robadas supuestamente a la compañía Viva Air. El atacante, un reconocido fabricante de…
Visual Studio 2022 - Update 17.7 Let's go through the most important new features of Visual Studio 2022 17.7 that I believe have the biggest impact on .NET developers.
Rockin’ the Code World Season 4: Special Guest Mads Torgersen I hope you will join me on Saturday, October 7th, 2023, at 10:00 PST on C# Corner TV for show #89 that starts season 4! My very special guest will be Mads Torgersen, Principal Architect on the Micr…
375: Buying an electric vehicle in 2023 Buying a new car is difficult any time, but in 2023 we have a lot of options, gas, hybrid, all electric. Frank is out shopping for a new vehicle, what path did he go down, and how was his experience?
Implement a secure web application using nx Standalone Angular and an ASP.NET Core server This article shows how to implement a secure web application using Angular and ASP.NET Core. The web application implements the backend for frontend security architecture (BFF) and deploys both tec…
Building a Resilient Email Sending Method in .NET with SmtpClient, Retry Support, and the Outbox Pattern Learn how to build a resilient email sending method in .NET using the SmtpClient class. This guide covers implementing retry logic for better reliability and introduces the Outbox pattern to preserve email content in case of failure. Master these techniqu...
Running ASP.NET Core Web Server on Arm64 This article demonstrates how you can use ASP.NET Core with Windows 11 to build a web server for a headless IoT application. You will gain insights into harnessing Arm64-powered devices that offer high performance while consuming minimal power for your Io...
.NET Performance on Arm64 This article demonstrates how to use Arm64 to run .NET applications, acquiring advantages of native architecture like power efficiency and a speed gain.
The Power of Automation: Enhancing Your Manual Code Review Process | The Qodana Blog Code reviews help you strategically dig deeper into your work. They enable you to identify bugs, potential fixes, vulnerabilities, and much more to ultimately
Introducing MSAL.Browser v3: What developers need to know | Microsoft Entra Identity Developer Blog MSAL.Browser releases a v3 with performance improvements, updated framework support, and minimal breaking changes.
NuGet - Package Source Mappings With NuGet 6.0, a new feature Package Source Mapping was introduced. Goal of this feature is to help improve security by safeguarding your s...
Microsoft has not stopped forcing Edge on Windows 11 users Microsoft announces vague changes to the default web browser setting for Windows Insider. Nothing but wishful thinking. Still force-opens web links in Edge.
how does linux nat a ping? A few months ago, I found myself wondering how a command like ping 1.1.1.1 works from within a private network. In most private networks, multiple hosts connect to the Internet through a router. For IPv4, the router performs network address translation (N...
Knightmare: A DevOps Cautionary Tale In the first 45-minutes the market was open the faulty software deployment sent millions of child orders into the market resulting in 4 million transactions against 154 stocks for more than 397 mil…