In the comments sections of my debunking videos, people make accusations about specific logical fallacies which only demonstrate that they have no clue what this terminology means. The most common ones are ad hominem, straw man, and argument from authority. It is quite irritating to hear hundreds of
Megahertz, Gigahertz, Registers and Instructions: How does a CPU actually work? - Kendall MillerDon't forget to check out our links below! https://ndcoslo.com/ https://ndcconferences.com/ For decades, we’ve been creating ever higher abstractions between ourselves and the computing hardware we’re programming, but in the end whether you’re writing JavaScript, Haskell, or Python it all com
.NET Core Console App with Dependency Injection, Logging, and Settings.NET Core has brought a lot of great benefits right into the .NET language. We get dependency injection, a much better configuration system, and we get a common logging system that is easy to use. The only problem is that mainly, we only get these things set up for us in web environments. What happe
Things You Want to Do in Git and How to Do ThemGit is a very powerful tool, but infamously it's also a very confusing one. And that has additional effects on how developers use it.
My mission to (almost) eliminate code commentsLong thought impossible, Heydon Pickering has found a way to replicate the idea of container queries using a cool CSS trick / hack using a clever combination of flex-wrap, flex-basis, and flex-grow. It's a really powerful trick. We'll still need media queries for stuff, but this could prove to be r
Anatomy of ASP.NET Core Requests - Steve Gordon - NDC Oslo 2020Don't forget to check out our links below! https://ndcoslo.com/ https://ndcconferences.com/ Have you ever wondered how a browser/client request actually results in a response from ASP.NET Core? Have you ever been constrained by the default behaviour of ASP.NET Core and wanted to change how it works
Return Early PatternWhen I learned about programming, the basic thought process that I had when creating a function was to validate the corresponding requirements until reaching the result. What can be observed in this approach?
How to setup Signed Git Commits with a YubiKey NEO and GPG and Keybase on WindowsThis week in obscure blog titles, I bring you the nightmare that is setting up Signed Git Commits with a YubiKey NEO and GPG and Keybase on Windows. This is one of those "it's good for you" things like diet and exercise and setting up 2 Factor Authentication.
This Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.
This list is compiled from my Pocket list.