Mondays. Mondays may be the time for contemplation and relaxation after the first working day of the week. However, Mondays may also be a good time to find your favourite position in the sofa, lean back and learn talk skills from others presenting. This blog post introduces talk analysis as a tool to be a become a better presenter yourself.
Azure has been growing rapidly in the enterprise in recent years. But its app services offering, which is the most important service for developers, is still mediocre. Kubernetes is, in my opinion, the only viable alternative for running applications in Azure. This blogpost explains how I came to that conclusion after roughly 6 years of working with Azure.
A brief introduction to Reanimated 2's worklet directive and how it can help us animate our apps.
The new version of ECMAScript, ES2021 is expected to be released in June 2021. What new features can we expect from the new release? This article covers some of the features in the upcoming release, and how we can put them to use.
In my experience Functional Programming (FP) can be something that is hard to get your head around. This is particularly true if you're very set in your ways from working in another paradigm. In this short read I hope to explain my journey up the FP mountain, as well as detailing some of my obstacles along the way. While the main goal of the writing is to re-inspire people with disappointing prior experiences, I also hope it will create a spark of curiosity for first timers.
Have you ever realized how important text is in the digital sphere? It’s impossible to avoid text, whether you are to read an article, search for information, watch a video, or complete a task. In fact, it is estimated that about 95 % of the internet is text (1). This vast ocean of text states the need to welcome everyone to read, interpret, and understand - regardless of their abilities or disabilities. If you design or develop digital content, you have a responsibility to do so. And I’m here to help!
Zero Trust is a security model where each component has its own perimeter. This is different from a traditional security model where all components inside of a given perimeter are regarded as safe or trusted. It was introduced as a reaction to the traditional network security model as a measure against lateral movement after a breach.
With Elm's strong types, we must be precise when writing our business code. Precision is a good thing, but it often has the drawback of being verbose. Ad hoc tuples can save the day with clear and precise syntax!
Det legges mye penger i tiltak som skal bidra både til innovasjon i seg selv og til økt innovasjonsevne for bedriften. Men gjøres det innovasjon, eller er det mest teater? Og hvordan kan man unngå teateret?
Get every day's articles delivered to your inbox.