Welcome to Software Development on Codidact!
Will you help us build our independent community of developers helping developers? We're small and trying to grow. We welcome questions about all aspects of software development, from design to code to QA and more. Got questions? Got answers? Got code you'd like someone to review? Please join us.
Search
grep is not the right tool for your case. You can use basename: basename a/b/c --> c basename a/b/c/ --> c or, in your case basename branches/features/arm_and_musl --> arm_...
It would seem that the C standard library is a collection of diverse functions that pretty much just ended up in the standard by tradition or "accident", rather than through some careful plan or ra...
How do I delete contents of a specific field, if it matches a pattern, and there is nothing else in the field? I have a several GB tsv file, and I am interested in a specific field (72). If it cont...
Since accessing the memory allocated by malloc beyond the size given to the call is undefined behaviour (which means that the standard poses no restriction to the behaviour of a program that does t...
By "deeply clone", I assume you mean "also make copies of whatever nested structures the object might have". And for those, I guess libraries like Lodash are more reliable and appropriate if you wa...
There are a few reasons for wanting to move computation closer to data. One is performance, which you've mentioned. Another is security. Databases enforce their own security boundary, and data that...
Co I'm a database/desktop dev venturing into programming web apps using Angular and I've been informed 'functional reactive programming' is something I should be aware of. Some other site has a ge...
Currently, there is no consensus about whether to provide tooltips for the voting buttons (especially the downvote one). However, the community now includes quite a lot of questions that attracted ...
As @Quasímodo has shown, the search pattern \(abc.*\)\@<!bird\|bird\(.*xyz\)\@! solves your problem. But, why does it work, and why does your original approach not work? What you want to achi...
Assume this trivial logic puzzle which I have made up: There are three boys, Fred, John and Max. No two of the boys have the same age. Max is older than John. Fred is not the oldest one. Quest...
Given the link where the code comes from (based on your other question), this is just a, let's say, "free-form/pseudo-code/documentation example". It's not a valid JavaScript code. It's more like...
Git's interactive mode has a patch action. This is the shortcut for it: git add --patch <file> It will split the file into hunks and interactively ask which one's to add. It has a plethor...
My actual motivation is to understand the semantics of the .gitignore file syntax in precise detail, for a program which is expected to emulate them as accurately as possible. However, while coming...
RFC 3986 defines a suffix reference as follows (emphasis my own): 4.5. Suffix Reference The URI syntax is designed for unambiguous reference to resources and extensibility via the URI scheme. ...
Passwords are annoying. That's why there are so many "The End of Passwords" articles. I'm looking forward to that day, but in the meantime it's the most common way to do authentication anywhere wit...
I agree. Something that might be more useful is to allow the text boxes to be resizeable by the user. In most places, there's a small tab on the lower-right corner of a text box that allows the use...
When discussing best or safest C programming practices with various C gurus on the Internet, the "MISRA-C guidelines for the use of C language in critical systems" often pops up as a source. This ...
It is true that MISRA-C has a heavy focus on embedded system, though it has become somewhat more generic over time. The MISRA guidelines have been changed and improved several times over the years ...
The current two top questions at https://software.codidact.com/ ( https://software.codidact.com/q/279699 and https://software.codidact.com/q/278674) are marked as coming from luap42: However, wh...
I've got this sample regex: Pattern p = Pattern.compile("(?:([aeiou]+)[0-9]+|([123]+)[a-z]+)\\W+"); It basically has the following parts: one or more lowercase vowels ([aeiou]+), followed by one ...
Why would the second way be faster? Generally speaking, the first form will perform worse (as well as looking a lot worse) than the second. You are hitting an edge case where the opposite is true...
Context Over the years I had a hard time addressing questions about software architecture like these ones . Soon after posting them, they receive a couple of downvotes and close votes which set the...
I saw at least one compiler (Codewarrior for HC12) warn me if I use a function without using it's return value. Other compilers (clang/gcc) do not issue a warning though, even when using the std=90...
I'm trying to make a trait method callable on mutable slices of a type implementing that trait (see main). Rust doesn't like me for it. use core::convert::AsMut; trait A { type B; fn f(m: ...
After enabling two factor authentication (2FA) for my account I'm only notified It is successfully turned On. I think it should include some recovery codes as well (to be used in case I can't acce...