This talk was recorded at NDC's Copenhagen Developer's Festival. #cphdevfest #ndcconferences #dotnet #softwaredeveloper #csharp Attend the next NDC conference near you: https://ndcconferences.com https://cphdevfest.com/ Subscribe to our YouTube channel and learn every day: https://www.youtube.co
58 bytes of css to look great nearly everywhereWhen making this website, i wanted a simple, reasonable way to make it look good on most displays. Not counting any minimization techniques, the following 58 bytes worked well for me:
The Easiest Way to Create PDFs in .NETGet the source code: https://mailchi.mp/dometrain/h20z44c0vn Become a Patreon and get special perks: https://www.patreon.com/nickchapsas Hello, everybody, I'm Nick, and in this video I'll show you the easiest way to create PDFs in .NET using C# and QuestPDF. Give QuestPDF a star on GitHub: https:/
We can create a voice command system!This project utilizes the ESP32-S3 microcontroller and the INMP441 microphone to enable voice command functionality. By leveraging the Espressif Speech Recognition framework, the system can recognize wake-up words like "Hey Siri", and "Ok Google" and execute specific actions associated with those co
The Brand New Way to do Fault Handling in Polly V8?? Check out my Pragmatic Clean Architecture course: https://bit.ly/3PupkOJ ?? Support me on Patreon to access the source code: https://www.patreon.com/milanjovanovic Polly v8 was just released, and it comes with a redesigned API for fault handling. We're no longer using fault handling policie
Everything you need to know about JSON Web TokenBefore we start, I have to admit that this article does not really include everything you need to know about JSW (JSON Web Token). If you want to go into full-nerd mode, you can explore all the information available in the JWT RFC, though even that might not cover everything.
Everything you need to know about configuration and secret management in .NETIf you’ve been writing code for a while, you probably have used configuration in some way.
Bypassing Bitlocker With A Logic AnalzyerSecurity Engineer [Guillaume Quéré] spends the day penetration testing systems for their employer and has pointed out and successfully exploited a rather obvious weakness in the BitLocker full volume encryption system, which as the linked article says, allows one to simply sniff the traffic betwee
Background Tasks Are Finally Fixed in .NET 8Use code ARCH15 and get 15% off the brand new Solution Architecture course on Dometrain: https://dometrain.com/course/getting-started-solution-architecture Become a Patreon and get source code access: https://www.patreon.com/nickchapsas Hello, everybody, I'm Nick, and in this video, I will show yo
.NET Microservices – Full CourseIn this step-by-step tutorial I take you through an introduction on building microservices using .NET. As the name suggests we build everything completely from start to finish –with the full scope of the course outlined in the time-stamp section below. However, at a high-level we’ll cover: •
This Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.
This list is compiled from my Pocket list.