Avatar
TerrestrialOrigin
d23af4ac9bbf3c9e5c5499e132dd252257551a8051a8e414fa59f7417bf07adb
Full-stack software development in JavaScript, React, CSS, HTML, Java, SQL.

With all of the major #socialMedia platforms caving in to the new #UK & #Australian #censorship, there's a new opportunity for small platforms to rise & refuse to do that.

That is very true. Before I learned programming for real I messed with the microsoft outlook (yes, the email program) form bilder thing at work. It had this drag and drop gui builder interface and you could do some simple if statements and concatination.

I built a little thing that had checkboxes for things we had to say when talking to a custmer (it was a customer service job) and built a proper note out of that to put on customer account (we were quality-graded on those).

So then my supervisor asked me how long it would take to make itbdo something else (I don't remember what). I told her a day. She looked at me all condescending like and said, "If I go tell the management that you need a whole day to do this they're gonna call me crazy."

Clients often ask, ā€œHow long will it take to build?ā€ Answer: That depends. A login screen can take 30 minutes… or 3 weeks—if it needs SSO, 2FA, rate limiting, lockout protection, and UI polish. Complexity hides in the details.

#SoftwareDevelopment #AppDev #TechTips #ProductDesign

Tech debt isn’t bad—unless you pretend it doesn’t exist. Like real debt, it’s manageable when tracked, planned for, and paid off regularly. Ignore it, and it starts charging compound interest... in bugs.

#SoftwareDevelopment #TechTips #CodeQuality #DevLife

https://www.youtube.com/watch?v=POLFZdG54Kw

Subscribe to this dude for the best #AI content in the internet!

Every "temporary" workaround is a surprise boss fight waiting in production. If it’s not in the sprint, at least document it like your job depends on it—because one day, it might.

#SoftwareDevelopment #CodeQuality #TechHumor #DevLife

YES! HUGE win for #AI! I was worried that whiny anti-ai bitches would influence the judicial system in the matter. I'm glad that they didn't.

https://www.youtube.com/watch?v=8beAhtbnM4Y

Your app’s onboarding should feel like a good first date: smooth, low-pressure, and no oversharing. Don’t dump every feature on new users—guide them to one success and let curiosity do the rest.

#AppDesign #UXTips #SoftwareDevelopment #TechTips

Every ā€œquick fixā€ in a codebase is a future archaeologist’s dig site.

Want to be kind to your future self (or dev hire)? Leave artifacts: comments, clean commits, and small functions with clear names. (emphasis on clear function names because self-documenting code is better than a shitton of comments)

#SoftwareDevelopment #CodeQuality #DevTips #TechHumor

If your error logging only tells you what failed and not why, congratulations—you’ve built a haunted house for developers. Add context (input, user, env) and watch the ghosts disappear.

#Debugging #SoftwareDevelopment #TechTips #AppDev

MVP ≠ "unfinished" Your first release should solve one painful user problem brilliantly. Everything else goes in a parking lot—future you (and your budget) will thank you. #software #softwareDevelopment #mvp

I think you miss the point. The whole point of Amber is not having to give every nostr app your nsec, that's the service Amber privides now. You don't need to be a power-user to use it. We want to get away from people trusting every Nostr client with their nsec. What you are suggesting sounds like it would do the opposite.

Amber is not a Nostr client that you use to browse content. Amber helps secure your nsec so no one gets access to it.

Let's say you download several Nostr clients (one for browsing written content, one for video, one for voice chat, etc etc). Withoug Amber you would have to give each of those clients youe nsec so that the client can use it to sign the events (posts) that you post through it (that way people know it's from you).

What if one of more of those clients is malicious and shares your nsec with others? What if it's insecurily voded and hackers get access to your nsec through it. The more clients you give your nsec to, the larger the risk.

With Amber (and clients that support it) you DON'T give your nsec to any other client to sign into it. Instead you tell the client to use Amber to sign your posts/events with. So Amber is the ONLY app that knows your nsec. Other apps get hacked, they still can't give hackers your nsec because they don't have it.

Makes sense?

#nostr #grownostr #amber

Replying to Avatar UK

https://www.europesays.com/uk/163334/ Russia’s Central Bank Cuts Key Rate From Historic High as Economy Slows #Business #CentralBank #Economy #UK #UnitedKingdom

Two-decade high, huh? How come we didn't get the news that it was at a two decade high and only got the news when it fell a tiny little bit. šŸ¤” Interesting...

😩 MFW shit was JUST working and you've changed NOTHING in the code that makes it work but now it just randomly quit working for NO reason. 😔

#coding #programming #computerprogrammimg #development

I know, right! I'm a polytheist myself. And I get the kick put of watching supposedly monotheist hardcore Christians on here low-key worship an egregore of a human-made digital tech. Nothing wrong with it, just interesting is all. Of course they'll never admit it..

Intetesting point! Usually, the main issue is poorly structured code and recommending outdated libraries and not invented paclage names.

But I can see how insecure outdated libraries thay AI tends to suggesy could a tool for hackers to know what to concentrate on to spread their malware as far as possible.