I love cooking and use my Thermomix a lot. If you hadn’t heard about that amazing innovation, it’s a kitchen robot… Well, it’s a magical super cooking machine. When designing the Thermomix, its designers took the approach of fail-safe instead of fail-fast. This is a smart choice in this case, but it has its drawbacks. …

Project Thoth pulls together many open source tools to automate program builds with security checks as part of the resolution process. Most cyberattacks take advantage of publicly known vulnerabilities. Many programmers can automate builds using Continuous Integration/Continuous Deployment (CI/CD) or DevOps techniques. But how can we automate the checks for security flaws that turn up …

In a world that has to contend with constant cyber threats, this new book by author Bryson Payne is a necessary read for any open source technologist who spends time on the internet. The internet can be a dangerous place. Not a week goes by without a cyber attack taking place. Go H*ck Yourself: A Simple …

The ability to customize applications is one of the great strengths of open source. Disabilities significantly impact people’s lives. As someone with dyspraxia and dyslexia, I can tell you that is true. One thing that mitigates my difficulties is the technology I use, such as a screen-reader and task manager. I’ve set up an ecosystem of sorts that …

“The key to achieving world-class expertise in any skill, is to a large extent, a matter of practicing the correct way, for a total of around 10,000 hours” — Malcolm Gladwell in Outliers. Well, I’m certainly not a world-class expert, but I have put my 10,000 hours of deliberate practice into programming. Where did I …

Knitting as Programming or how I learned programmers owe it all to fiber As part of my bootcamp, I was asked to present for 10 minutes on any topic. I’ve been crocheting since 2013 and knitting since 2018, and I had noticed some similarities between the way I approached a project in either fiber arts …

Most CEOs think they have cybersecurity covered, but many of the people directly in charge of it are less certain. One of many striking findings in the World Economic Forum’s Global Cybersecurity Outlook. This podcast episode hears from Accenture’s cybersecurity expert. And the head of the Forum’s Centre for Cybersecurity explains why ransomware can often be …

Jack Dorsey, Twitter’s co-founder, has spoken out about the problems with a centralized internet — and he admits that he’s partially to blame for it. In a series of tweets, Dorsey summarized that the internet has become too centralized, with a few big companies dominating the space.   He was highlighting that this concentration of …

It sounds dark and mysterious – but it’s just another future Javascript feature. The ShadowRealm is a new feature coming to Javascript, which will let us create a separate global context from which to execute Javascript. In this article, we’ll look at what the ShadowRealm is, and how it works. Support for ShadowRealms in Javascript …

In the beginning, there was JavaScript. The popular scripting language we all know and love. Ever since its creation, it’s been the dominating language for web development. Then two decades later, Microsoft introduced TypeScript, a superset of JavaScript, designed for the development of large web applications. If you know anything about Typescript and JavaScript, you’ll know …