background preloader

General

Facebook Twitter

Single Responsibility Principle. Hemanth/functional-programming-jargon: Jargon from the functional programming world in simple terms! Rule of Silence definition by The Linux Information Project. The rule of silence, also referred to as the silence is golden rule, is an important part of the Unix philosophy that states that when a program has nothing surprising, interesting or useful to say, it should say nothing.

Rule of Silence definition by The Linux Information Project

It means that well-behaved programs should treat their users' attention and concentration as being valuable and thus perform their tasks as unobtrusively as possible. That is, silence in itself is a virtue. There is no single, standardized statement of the Unix philosophy, but perhaps the simplest description would be: "Write programs that are small, simple and transparent. Nick Craver - Stack Overflow: How We Do Deployment - 2016 Edition. This is #3 in a very long series of posts on Stack Overflow’s architecture.

Nick Craver - Stack Overflow: How We Do Deployment - 2016 Edition

Previous post (#2): Stack Overflow: The Hardware - 2016 Edition We’ve talked about Stack Overflow’s architecture and the hardware behind it. 20 lines of code that will beat A/B testing every time. How do you review code? I'm hoping to find ways to improve the code review process at the company where I work.

How do you review code?

My team has a fairly has a fairly standard github PR-based process. When you have some code you want to merge into the master branch you open a PR, ask another developer or two to review it, address any comments they have, and then wait for one of the reviewers to give it an LGTM (looks good to me). The problem is that there can be a lot of lag between asking someone to review the PR and them actually doing it, or between addressing comments and them taking another look.

Rules for Writing Safety Critical Code. Dad and The Ten Commandments of Egoless Programming - Stephen Wyatt Bush's Blog. Dad and I got to talk about programming for two weeks before he died. How to Stop Over-Analyzing Every Conversation. Pick Your Battles « I am Zef. So, you decided to build a real application.

Pick Your Battles « I am Zef

Extreme Programming Rules. Planning User stories are written.

Extreme Programming Rules

Release planning creates the release schedule. Signs that you're a bad programmer - Software Engineering Tips. Why was this written?

Signs that you're a bad programmer - Software Engineering Tips

Most of these faults were discovered the hard way by the author himself, either because he committed them himself or saw them in the work of others. How to be a Programmer: A Short, Comprehensive, and Personal Summary. Debugging is the cornerstone of being a programmer.

How to be a Programmer: A Short, Comprehensive, and Personal Summary

The first meaning of the verb to debug is to remove errors, but the meaning that really matters is to see into the execution of a program by examining it. A programmer that cannot debug effectively is blind. Idealists that think design, or analysis, or complexity theory, or whatnot, are more fundamental are not working programmers. Bad code isn’t Technical Debt, it’s an unhedged Call Option – Steve Freeman. I’d been meaning to write this up for a while, and now Nat Pryce has written up the 140 character version.

Bad code isn’t Technical Debt, it’s an unhedged Call Option – Steve Freeman

Do not use debuggers. Knuth: Computer Programming as an Art. CACM, December 1974 When Communications of the ACM began publication in 1959, the members of ACM'S Editorial Board made the following remark as they described the purposes of ACM'S periodicals [2]:

Knuth: Computer Programming as an Art

The Wrong Abstraction — Sandi Metz. I originally wrote the following for my Chainline Newsletter, but I continue to get tweets about this idea, so I'm re-publishing the article here on my blog.

The Wrong Abstraction — Sandi Metz

This version has been lightly edited. What RESTful actually means. If you do web development, you’ve probably heard of REST. But if you’re like me, you usually just pretend to know what it is, and nod politely when someone asks you if what you’re making is RESTful. Make This In An Hour. The UNIX School: awk - 10 examples to split a file into multiple files. In this article of the awk series, we will see the different scenarios in which we need to split a file into multiple files using awk. The files can be split into multiple files either based on a condition, or based on a pattern or because the file is big and hence needs to split into smaller files. Sample File1: Let us consider a sample file with the following contents: $ cat file1 Item1,200 Item2,500 Item3,900 Item2,800 Item1,600. jQquerysummit - Large-scale JavaScript Application Architecture. Erlang and code style. "Il faut s'appuyer sur les développeurs pour réinventer la France", selon Tariq Krim.

L'Usine Digitale - D'où vous est venue cette idée de liste de "100 développeurs français" ? Tariq Krim – Mon constat de départ est simple : la France possède de vrais talents du code. Beaucoup sont à l'origine des plus grandes sociétés du web, de technologies essentielles. OS X Lion – Terminal Colours. Having recently I upgraded my Mac to OS X Lion the first thing I noticed was my terminal's color theme was no longer working properly! Prior to upgrading I was using a combination of Visor (now replaced by TotalTerminal), SIMBL, and TerminalColors along with the IR_Black theme posted by Todd Werth as detailed in his blog entry A black OS X Leopard Terminal theme that is actually readable. As the method to solve my problem took a bit of searching and trial and error I am posting the process I went through in hopes of helping others whom may stumble upon this post.

Steps taken: Technique informatique. The Absolute Minimum Every Software Developer Absolutely, Positively Must Know About Unicode and Character Sets (No Excuses!) By Joel Spolsky. Scalability. Become a Programmer, Motherfucker. Fundamentals. Recommended Reading. This page lists books that I have found to be highly relevant and useful for learning topics within computer security, digital forensics, incident response, malware analysis, and reverse engineering. These books range from introductory texts to advanced research works. While some of these books may seem dated, the information contained is still very useful to people learning today, and much of the information is essential to becoming proficient in the information security realm. Please note that, in order to avoid ranking individual books, each category is listed in alphabetical order and each book is listed in alphabetical order within its category.

Happy Codings - Programming Sample Code Source Code Search Engine, Example Codes. Peter Norvig. Mastering-emacs-in-one-year-guide/guide-en.org at master · redguardtoo/mastering-emacs-in-one-year-guide.