Programming

Dubious security vulnerability: Once I have tricked the...

Yes, that's sort of the point. The post Dubious security vulnerability: Once I h...

Porting song recommendations to F#

A C# code base translated to F#. This article is...

The case of the feature flag that didn’t stay on long e...

Understanding scope and order of destruction. The post The case of the feature f...

Characterising song recommendations

Using characterisation tests and mutation testing to describe exis...

Alternative ways to design with functional programming

A catalogue of FP solutions to a sample problem. ...

Ports and fat adapters

Is it worth it having a separate use-case layer? ...

The case of the UI thread that hung in a kernel call

I did tell you not to do that. The post The case of the UI thread that hung in a...

Phased breaking changes

Giving advance warning before breaking client code. ...

Appeal to aithority

No, it's not a typo. A few months ago, I was lis...

Reactive monad

IObservable is (also) a monad. This article is a...

Easier encapsulation with static types

A metaphor. While I'm still struggling with the ...

In defence of multiple WiP

Programming isn't like factory work. I was recen...

Node v22.5.1 (Current)

Node v22.5.0 (Current)

Node v22.4.1 (Current)

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.