Today’s entry from The Daily Stoic, entitled “The Smoke and Dust of Myth”, discusses how quickly things — particularly trivial and petty things — are quickly forgotten..
Today’s (9 January) Daily Stoic insight is based on a core tenet of Stoic philosophy: accepting there are many things you cannot control, but you are not powerless because you can control your opinions about things outside of your control.
Recently, I was prompted by an entry in my Daily Stoic Journal to consider “What would less look like?”.
The Python programming language has a nice declarative syntax for data sructures known as comprehensions. They provide a quick, concise way to set up lists, sets, generators and dictionaries.
As a species, we like to debate a lot. There are debates over politics, religion, music, art, films, programming languages, ethics, favourite “My Little Pony” character and many more important topics.
One of my favourites in the web engineering world is debates about what “REST” is or is not. While …
Choice of programming language can be a source of religious wars between software engineers and developers. It is one of the many areas where people build a subjective opinion based on how “nice” or “elegant” something is and whether they get joy working with it or whether they find themselves …
Semantic debates are fun, aren’t they? I can build an API and call it a REST API, then someone can say it isn’t truly REST and now we’re back to arguing about what is and isn’t REST. The most common point of contention is whether or …
Facebook has been home to no shortage of awkward or destructive moments for some users with one woman getting fired for speaking ill of her boss, another woman losing insurance benefits after the company dug up photos of her on holiday and thirteen employees of Virgin Atlantic being sacked for …
As stated in the previous article about the difference between authentication and authorisation, it is important to understand the different aspects of security in order to control access to resources in as secure and as user-friendly a way as possible. However, the step of authentication itself — the act of ascertaining …
Page 1 / 2 »