JawCoding's profile picture. Software Engineer, .NET Enthusiast, Programming, Web, Mobile, Techy, Motorbike Lover

coding-jaw

@JawCoding

Software Engineer, .NET Enthusiast, Programming, Web, Mobile, Techy, Motorbike Lover

Es gibt gute Gründe, warum sich #vibecoding (furchtbarer Begriff btw) nicht durchgesetzt hat und sich in naher Zukunft auch nicht durchsetzen wird

Wenn CEOs v. KI Unternehmen solchen Stumpfsinn prognostizieren, dann ist das nichts anderes, als ein erbärmlicher Versuch den Umsatz für sein eigenes "Produkt" anzukurbeln #kihype #AI #coding t3n.de/news/anthropic…



Wenn CEOs v. KI Unternehmen solchen Stumpfsinn prognostizieren, dann ist das nichts anderes, als ein erbärmlicher Versuch den Umsatz für sein eigenes "Produkt" anzukurbeln #kihype #AI #coding t3n.de/news/anthropic…


#VibeCoding doesn't refer to developing complex software systems, but rather weekend projects that you do for fun. & you're either so lazy or unknowledgeable that you just use #AI until it somehow works > 'Vibe'. This means it's not about replacing #softwaredeveloper


coding-jaw repostou

What is the cleanest way to get configuration values in .NET? I use the Options pattern. Here's why you should know about it. App configuration lives in: - Environment variables - JSON files - User secrets - Other config providers You can get individual values using the…

mjovanovictech's tweet image. What is the cleanest way to get configuration values in .NET?

I use the Options pattern.

Here's why you should know about it.

App configuration lives in:

- Environment variables
- JSON files
- User secrets
- Other config providers

You can get individual values using the…

The idea is great and the tools "might be helpful" ... but this was it then. I would not call it "coding" or "programming" because it's not. Simple apps, POCs: fine; but still far away from production ready or complex solutions. #vibecoding #programming #SoftwareDevelopment

There's a new kind of coding I call "vibe coding", where you fully give in to the vibes, embrace exponentials, and forget that the code even exists. It's possible because the LLMs (e.g. Cursor Composer w Sonnet) are getting too good. Also I just talk to Composer with SuperWhisper…



coding-jaw repostou

Es gibt Hoffnung, dass wir den linken, woken Wahnsinn bald beenden. Einmal im Jahr das Geschlecht ändern. Unleserliche Texte durch Gender*innen. Männer Boxen als Frau. Biologische Fakten wurden ignoriert und Ideologien subventioniert. In einigen Jahren werden wir uns fragen: Wie…


coding-jaw repostou

machineProducesSmoke redd.it/1gd32rb

PR0GRAMMERHUM0R's tweet image. machineProducesSmoke redd.it/1gd32rb

There is a really annoying bug in #warhammer40000spacemarine2 this tip is quite useful in case you don't want to restart the whole mission 😉 #warhammer40k #warhammer40000 youtube.com/watch?v=OW-Dh-…


coding-jaw repostou

Security Patch for IdentityServer blog.duendesoftware.com/posts/20240731…


coding-jaw repostou

We are investigating an issue impacting the Azure portal. More details will be provided as they become available.


coding-jaw repostou

Top 4 Forms of Authentication Mechanisms 1. SSH Keys: Cryptographic keys are used to access remote systems and servers securely 2. OAuth Tokens: Tokens that provide limited access to user data on third-party applications 3. SSL Certificates: Digital certificates ensure…

bytebytego's tweet image. Top 4 Forms of Authentication Mechanisms 

1. SSH Keys: 
Cryptographic keys are used to access remote systems and servers securely 
 
2. OAuth Tokens: 
Tokens that provide limited access to user data on third-party applications 
 
3. SSL Certificates: 
Digital certificates ensure…

coding-jaw repostou

How would you implement API Key authentication? This kind of authentication mechanism is common in Server-to-Server (S2S) communication. When your API serves other server-side applications to consume and integrate with. Here's an implementation using an auth filter. 👇

mjovanovictech's tweet image. How would you implement API Key authentication?

This kind of authentication mechanism is common in Server-to-Server (S2S) communication.

When your API serves other server-side applications to consume and integrate with.

Here's an implementation using an auth filter. 👇

coding-jaw repostou

Explaining 8 Popular Network Protocols in 1 Diagram. Network protocols are standard methods of transferring data between two computers in a network. 1. HTTP (HyperText Transfer Protocol) HTTP is a protocol for fetching resources such as HTML documents. It is the foundation…

bytebytego's tweet image. Explaining 8 Popular Network Protocols in 1 Diagram.
 
Network protocols are standard methods of transferring data between two computers in a network. 
 
1. HTTP (HyperText Transfer Protocol) 
HTTP is a protocol for fetching resources such as HTML documents. It is the foundation…

Loading...

Something went wrong.


Something went wrong.