“Astronomers have confirmed the first example of a galaxy cluster where large numbers of stars are being born at its core.”
Seems simple enough, but it took a couple sessions for me to figure out the magical combination. The context is that at work we have multiple sandboxes. There are personal ones and then a development and staging sandbox everyone pushes to. I wanted to run this simple Alfred workflow I use which pulls from my … Continued
“Recently I tried to create a Slack bot. It’s job was to read messages and, if ‘that would be great’ was detected in the content, respond to the message with a picture of Bill Lumbergh from Office Space (yeah, I’m a funny guy).”
“Yes, varchar(5000) can be worse than varchar(255) if all values will fit into the latter. The reason is that SQL Server will estimate data size and, in turn, memory grants based on the declared (not actual) size of the columns in a table.”
“Jimmy Lai is one of the richest people in Hong Kong. And in some ways, the story of his rise is the story of Hong Kong itself. Jimmy was born in mainland China. In 1960, when he was 12 years old, he snuck out of China and into Hong Kong by hiding in the bottom of a fishing boat.”
“Most serious software development projects use coding guidelines. These guidelines are meant to state what the ground rules are for the software to be written: how it should be structured and which language features should and should not be used. Curiously, there is little consensus on what a good coding standard is. Among the many that have been written there are remarkable few patterns to discern, except that each new document tends to be longer than the one before it.”
I fairly consistently have a bug where there is no audio on my MacBook Pro and switching to a different sound output doesn’t fix it. Until today I always restarted the computer but I did a little searching and found that killing the coreaudiod process in Activity Monitor quickly does the trick. Little victories.
What is the OWASP Top 10 Vulnerabilities list?
First issued in 2004 by the Open Web Application Security Project, the now-famous OWASP Top 10 Vulnerabilities list (included at the bottom of the article) is probably the closest that the development community has ever come to a set of commandments on how to keep their products secure.
“Solution: in terminal, run ‘sudo xcodebuild -license’ and then agree to the terms. Please sign in to leave a comment.”
“How did this get to be standard practice?”
“In the most general sense the term Queen’s Pawn Game can refer to any chess opening which starts with the move 1.d4. It is the second most popular opening move after 1.e4. The name is usually used to describe openings beginning with 1.d4 where White does not play the Queen’s Gambit.”