With all of the major #socialMedia platforms caving in to the new #UK & #Australian #censorship, there's a new opportunity for small platforms to rise & refuse to do that.
š³ WTF? What could he possibly have against FIREFIGHTERS?
Test Gemini CLI vs Claude Code https://blossom.primal.net/58b6b74704d270d98d9ed746d544e92ef5b3d71caa1932edc3ef384ada341cd1.mp4
That is SO helpful! Thank you for posting that! Where can I find more of this person's content? (youtube?)
That is very true. Before I learned programming for real I messed with the microsoft outlook (yes, the email program) form bilder thing at work. It had this drag and drop gui builder interface and you could do some simple if statements and concatination.
I built a little thing that had checkboxes for things we had to say when talking to a custmer (it was a customer service job) and built a proper note out of that to put on customer account (we were quality-graded on those).
So then my supervisor asked me how long it would take to make itbdo something else (I don't remember what). I told her a day. She looked at me all condescending like and said, "If I go tell the management that you need a whole day to do this they're gonna call me crazy."
Clients often ask, āHow long will it take to build?ā Answer: That depends. A login screen can take 30 minutes⦠or 3 weeksāif it needs SSO, 2FA, rate limiting, lockout protection, and UI polish. Complexity hides in the details.
#SoftwareDevelopment #AppDev #TechTips #ProductDesign
Tech debt isnāt badāunless you pretend it doesnāt exist. Like real debt, itās manageable when tracked, planned for, and paid off regularly. Ignore it, and it starts charging compound interest... in bugs.
#SoftwareDevelopment #TechTips #CodeQuality #DevLife
https://www.youtube.com/watch?v=POLFZdG54Kw
Subscribe to this dude for the best #AI content in the internet!
Beautiful work!
Every "temporary" workaround is a surprise boss fight waiting in production. If itās not in the sprint, at least document it like your job depends on itābecause one day, it might.
#SoftwareDevelopment #CodeQuality #TechHumor #DevLife
YES! HUGE win for #AI! I was worried that whiny anti-ai bitches would influence the judicial system in the matter. I'm glad that they didn't.
Your appās onboarding should feel like a good first date: smooth, low-pressure, and no oversharing. Donāt dump every feature on new usersāguide them to one success and let curiosity do the rest.
#AppDesign #UXTips #SoftwareDevelopment #TechTips
Every āquick fixā in a codebase is a future archaeologistās dig site.
Want to be kind to your future self (or dev hire)? Leave artifacts: comments, clean commits, and small functions with clear names. (emphasis on clear function names because self-documenting code is better than a shitton of comments)
#SoftwareDevelopment #CodeQuality #DevTips #TechHumor
If your error logging only tells you what failed and not why, congratulationsāyouāve built a haunted house for developers. Add context (input, user, env) and watch the ghosts disappear.
#Debugging #SoftwareDevelopment #TechTips #AppDev
MVP ā "unfinished" Your first release should solve one painful user problem brilliantly. Everything else goes in a parking lotāfuture you (and your budget) will thank you. #software #softwareDevelopment #mvp
I think you miss the point. The whole point of Amber is not having to give every nostr app your nsec, that's the service Amber privides now. You don't need to be a power-user to use it. We want to get away from people trusting every Nostr client with their nsec. What you are suggesting sounds like it would do the opposite.
Why?
Amber is not a Nostr client that you use to browse content. Amber helps secure your nsec so no one gets access to it.
Let's say you download several Nostr clients (one for browsing written content, one for video, one for voice chat, etc etc). Withoug Amber you would have to give each of those clients youe nsec so that the client can use it to sign the events (posts) that you post through it (that way people know it's from you).
What if one of more of those clients is malicious and shares your nsec with others? What if it's insecurily voded and hackers get access to your nsec through it. The more clients you give your nsec to, the larger the risk.
With Amber (and clients that support it) you DON'T give your nsec to any other client to sign into it. Instead you tell the client to use Amber to sign your posts/events with. So Amber is the ONLY app that knows your nsec. Other apps get hacked, they still can't give hackers your nsec because they don't have it.
Makes sense?
#nostr #grownostr #amber
https://www.europesays.com/uk/163334/ Russiaās Central Bank Cuts Key Rate From Historic High as Economy Slows #Business #CentralBank #Economy #UK #UnitedKingdom

Two-decade high, huh? How come we didn't get the news that it was at a two decade high and only got the news when it fell a tiny little bit. š¤ Interesting...
š© MFW shit was JUST working and you've changed NOTHING in the code that makes it work but now it just randomly quit working for NO reason. š”
#coding #programming #computerprogrammimg #development
I know, right! I'm a polytheist myself. And I get the kick put of watching supposedly monotheist hardcore Christians on here low-key worship an egregore of a human-made digital tech. Nothing wrong with it, just interesting is all. Of course they'll never admit it..
Intetesting point! Usually, the main issue is poorly structured code and recommending outdated libraries and not invented paclage names.
But I can see how insecure outdated libraries thay AI tends to suggesy could a tool for hackers to know what to concentrate on to spread their malware as far as possible.


