Welcome to Software Development on Codidact!
Will you help us build our independent community of developers helping developers? We're small and trying to grow. We welcome questions about all aspects of software development, from design to code to QA and more. Got questions? Got answers? Got code you'd like someone to review? Please join us.
Posts by Michael
Passwords are annoying. Nobody really enjoys passwords, which is why "The End of Passwords" articles keep circulating. I'm looking forward to the day the prediction comes true, but in the meantime ...
There are two major sections to this answer: the Git part and the conflict resolution part. It wasn't clear at first which one was intended by the question, but both are important for a full answer...
Each of them has an analog to another Git command. But instead of objects in the repository, these take text file(s) created either by you or someone else. git apply Think of this as Applying a g...
This sounds to me like someone had a problem once and they've decided upon a somewhat silly way to keep that from ever happening again. The big repository hosts have a different way of addressing ...
First you want to make your new branch at HEAD (current main). Then you want to point main back to origin/main. # Create new branch git branch new_branch_name # Point main back at origin git ...
GitHub has a setting wherein they offer to "anonymize" your user email from, say, somebody@example.com to somebody@users.noreply.github.com. I presume this is to prevent you from getting spam from ...
Sylvester's answer is great, but I wanted to point out that interpolation only happens in double-quoted strings ("), not in single-quoted ones ('). If you have lines that don't need any variable o...
It doesn't change commit data when you push. You have to set your local email address to the noreply one. About commit email addresses […] If you'd like to keep your personal email address pri...
The answer by hkotsubo is correct. But just in case you're being very specific about fast-forwarding, it's worth stressing that you can use --ff-only as an option on the merge to abort if it requir...
Matthew's list is pretty good, although I don't think one has to do all the things on it as a "minimum." I offer one minimum and a couple nice-to-haves. Some of these I have learned as a contributo...
I'm not sure how much this helps or inspires you, but there's an XML schema for the US Code and for bills and amendments to change it. See xml.house.gov and the GitHub repository for United States ...
This is not exactly what you're asking for, but you could use bat, which has source code syntax highlighting and just use the raw Markdown.
Specification You understand correctly. Matrix is an interface for federated encrypted communication. From the first page of the spec: Matrix defines a set of open APIs for decentralised commun...
You're right about the recalculation, as you can see from some easy experimentation by rigging two (dynamic) properties and logging what each one gives you. public long TimeStamp1 { get; } = DateT...
The documentation for git stash list says list [<log-options>] List the stash entries that you currently have. Each stash entry is listed with its name (e.g. stash@{0} is the latest entry...
In SQL Server 2022+, there's a dedicated binning function called DATE_BUCKET. Each of these statements increments DATE_BUCKET with a bucket width of 1 from the origin time: DECLARE @date DATETI...
Does GnuTLS support CA Name Constraints (RFC 5280, 4.2.1.10), so you can limit the valid domains directly in the root CA? I'm not aware of any CAs that self-limit this way,[1] except for when the ...
You could explicitly match the other whitespace, too, to see if that gets around an existing rule.[1] Here are two ways to do that:[2] Match the other whitespace in another rule You could use a \...
Does bat work for this, as well as for your other question? I see you have tagged your question as Python, but I'm not sure I understand how it's relevant. Sources: this issue comment and also tha...
With bcrypt, the salt is stored in the same string as the hash. This is done so that you have everything you need to get that hash identifier if you know the password.[1] Wikipedia breaks down the ...
I don't understand your "Venn Diagram" explanation. Are you wanting the image behind the text? If you mean wrapping around the image, you can do this: Instead of cells of a big table, put the imag...