Digests » 373
Looking to upgrade your programming skills? Here’s something that will really help—Manning Publications are offering an exclusive 40% off your entire order at manning.com! Just use the code nlprogramming when you checkout.
With the digital equivalent of trowels and shovels, archaeologists are digging into the code of early video games to uncover long forgotten secrets that could have relevance today.
The Windows Subsystem for Linux (WSL) enables Windows users to run native, unmodified Linux command-line tools directly on Windows. WSL usage has grown a lot since it was first announced 4 years ago, at Microsoft Build 2016, and now runs on more than 3.5 million monthly active devices!
Storing and managing secrets like API keys and other credentials can be challenging, even the most careful policies can sometimes be circumvented in exchange for convenience. We have compiled a list of some of the best practices to help keep secrets and credentials safe. Secrets management doesn’t have a one-size-fits-all approach so this list considers multiple perspectives so you can be informed in deciding to, or not to, implement strategies.
I optimize my setup to showing really, really good letters. A good monitor is essential for that. Not nice to have. A MUST. And in “good” I mean, as good as you can get. These are my thoughts, based on my own experience, on what monitors work best for programming.
An SQLite database file with a defined schema often makes an excellent application file format.