(Ben Nadel) As a side-project to learn more about Docker and Redis, I’ve been working on an application that will help me write poetry. A big part of writing poetry is understanding rhyme schemes, syllable counts, and words that have similar meanings.
(SanketBa) Firstly, let the title of this blog post not fool you. VC++ is very much alive. Take a quick look at the VC++ blog and you will see that there is continuous investment still happening with VC++.
(Peter Vogel) You have a Contoller class called Adminstration that only admins should use. There’s about a dozen Action methods in the Controller class and they all should only be accessed by users in the Admin or SuperAdmin roles.
(Hannes DuPreez) Letters form words. Words form sentences. Sentences form paragraphs. Paragraphs form books. Books form libraries. Each language makes use of its own letters and symbols, but each language does have similarities when it comes to writing.
(K. Scott Allen) “An unexpected error occurred” is the least informative error message of all error messages. It is as if cosmic rays have transformed your predictable computing machinery into a white noise generator.
(Yacoub Massad) This C# tutorial describes approaches for making methods/functions more honest. A more honest method makes it easier for readers to understand what the method does by reading its signature, i.e., without reading its implementation.
(Ben Nadel) About a month ago, I discovered that you could use Plain Text in a Data URI when programmatically prompting a user to download content. Prior to that, I had assumed that all Data URIs had to be Base64-encoded.
(Daniel Puterman) Suppose you’ve built a new Android app and want to build some visual test automation scripts to ensure that it appears correctly on the devices it might run on. Not all the Android devices out there — just the top 20 for now.
(James McCaffrey) The goal of a regression problem is to make a prediction of a numeric value. For example, you might want to predict the price of a house based on its square footage, age, ZIP code and so on.
(Mircea Oprea) In a previous article of mine, JWT Authentication for Microservices in .NET, I have looked into creating an authentication microservice. This would be used to validate the identity of the user’s identity before performing any action in other components of the system.