Seven Ineffective Coding Habits of Many Programmers
Recorded at:
Like | by Kevlin Henney on Apr 03, 2015 | 4 Discuss
Share
Share
|
"Read later"
"Reading List"
View Presentation
Download
MP3
|
Slides
|
Android app
01:03:22
Summary
Kevlin Henney examines seven coding habits that are not as effective as many programmers — whether working with Java, .NET, native or scripting languages — might believe, and suggests alternatives.
AboutLibraries is a library to offer some information of libraries.
web based drawing and sketching app
deeplearn.js is an open-source library that brings performant machine learning building blocks to the web, allowing you to train neural networks in a browser or run pre-trained models in inference mode.
GitHub - andyholmes/gnome-shell-extension-mconnect: KDE Connect/MConnect integration for Gnome Shell
This extension provides integration for KDE Connect/MConnect in Gnome Shell, in the most native way possible.
KDE Connect uses an Android app and a desktop server to securely exchange data, allowing file sharing, notification sharing, sending of text messages and many other features.
MConnect is a KDE Connect protocol implementation in Vala/C.
Keycloak is an open source Identity and Access Management solution aimed at modern applications and services. It makes it easy to secure applications and services with little to no code.
This page gives a brief introduction to Keycloak and some of the features. For a full list of features refer to the documentation.
Trying Keycloak is quick and easy. Take a look at the Getting Started tutorial for details.
Hinweis von WW
Unparalleled insights, in real-time, of everything happening on your systems and applications, with stunning, interactive web dashboards and powerful performance and health alarms.
public-apis - A collective list of public JSON APIs for use in web development.
Huginn is a system for building agents that perform automated tasks for you online. They can read the web, watch for events, and take actions on your behalf. Huginn's Agents create and consume events, propagating them along a directed graph. Think of it as a hackable version of IFTTT or Zapier on your own server. You always know who has your data. You do.
Branching strategies