DEV Community

Programming

The magic behind computers. 💻 🪄

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Week 2 – Core Setup, TDD, and Starting Auth

Week 2 – Core Setup, TDD, and Starting Auth

Comments
2 min read
Web Development Is Meant to Be Built, Not Watched

Web Development Is Meant to Be Built, Not Watched

33
Comments 9
4 min read
How to Delete the Un-deletable "nul" File Created by Claude Console on Windows 11

How to Delete the Un-deletable "nul" File Created by Claude Console on Windows 11

Comments
2 min read
The Secret Life of Go: Packages and Structure

The Secret Life of Go: Packages and Structure

6
Comments
5 min read
What role do stablecoins and on-chain identity play in the RWA ecosystem?

What role do stablecoins and on-chain identity play in the RWA ecosystem?

Comments
3 min read
What Is Closure?

What Is Closure?

2
Comments
1 min read
How to Install MinIO on Ubuntu (Without Docker)

How to Install MinIO on Ubuntu (Without Docker)

Comments
3 min read
I Thought Compilers Were Scary. So I Built Sauce.

I Thought Compilers Were Scary. So I Built Sauce.

8
Comments 1
5 min read
How to create a virtual environment in Visual Studio Code with Python

How to create a virtual environment in Visual Studio Code with Python

1
Comments
2 min read
My Go Server was so fast it self-DDoS'd my laptop

My Go Server was so fast it self-DDoS'd my laptop

4
Comments
5 min read
RDBMS: Where Relations Meet Files

RDBMS: Where Relations Meet Files

12
Comments
2 min read
Reason Your Python Code is Hard to Test with Single Responsibility Principle, And How to Fix It! (Portuguese version)

Reason Your Python Code is Hard to Test with Single Responsibility Principle, And How to Fix It! (Portuguese version)

3
Comments
4 min read
🚀 Understanding reverse_merge in Ruby on Rails

🚀 Understanding reverse_merge in Ruby on Rails

Comments
2 min read
Enter rvest: Harvest the Web with R

Enter rvest: Harvest the Web with R

Comments
5 min read
Authentication Methods - OAuth, Basic Auth, and JWT

Authentication Methods - OAuth, Basic Auth, and JWT

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.