Avatar

petey

petey@aussie.zone
Joined
1 posts • 32 comments
Direct message

That sounds unpleasant. I plan to use mine on my lap a lot so I hope this isn’t an issue for me. Just got the email about my final payment too

permalink
report
reply

Batch 12. Ordered September 24th and got the payment email on April 23rd

permalink
report
parent
reply

Effortlessly cool

permalink
report
reply

His take strangely acknowledges that defects are caused by programmers, yet doesn’t want to improve the tools we use to help us not make these mistakes. In summary, git gud.

Experience has taught me that I’m awfully good at finding and firing foot guns, and when I use a language that has fewer foot guns along with good linting, I write reliable code because I tend to focus on what I want the code to do, not how to get there.

Declarative functional programming suits me down to the ground. OOP has been friendly to me, mostly, but it also has been the hardest to understand when I come back to it. Experience has given me an almost irrational aversion to side effects, and my simple mind considers class members as side effects

permalink
report
parent
reply

I feel like this is a perfect encapsulation of how an experienced self-aware developer thinks. Experience really beats the hard stances out of you. I find myself saying “it depends” and “a bit of column A, bit of column B” often, like a cheap kids toy

permalink
report
parent
reply

Nice article! I’m a fan of the “don’t optimise early” mantra, which seems particularly relevant here regarding clone

permalink
report
reply

Oh wow, this is amazing info. Thanks!

permalink
report
parent
reply

I love that you’re thinking about how to secure sensitive parts of JS applications, however I wonder what threat this is guarding against. Can you give an example? Surely if an attacker can modify the source to call the sensitive functions, then they could modify the allow list

permalink
report
reply

Ah ok, the name implies it’s a security guard

permalink
report
parent
reply