Finalizers are interesting and dangerous because they are an environment in which everything you know is wrong. I’ve written a lot about the perils of C# finalizers / destructors (either name is fine) over the years, but it’s scattered in little bits over the internet.Behavioral Design Patterns
It is concerned with assignment of responsibilities between the objects. What makes them different from structural patterns is they don't just specify the structure but also outline the patterns for message passing/communication between them.How do .NET delegates work?
Delegates are a fundamental part of the .NET runtime and whilst you rarely create them directly, they are there under-the-hood every time you use a lambda in LINQ (=>) or a Func<T>/Action<T> to make your code more functional.The 68 things the CLR does before executing a single line of your code (*)
Because the CLR is a managed environment there are several components within the runtime that need to be initialised before any of your code can be executed. This post will take a look at the EE (Execution Engine) start-up routine and examine the initialisation process in detail.Four Column ASCII
I found this gem on Hacker News the other day. User soneil posted to a four column version of the ASCII table that blew my mind. I just wanted to repost this here so it is easier to discover.RFC 6143 The Remote Framebuffer Protocol March 2011
Internet Engineering Task Force (IETF) T. Richardson Request for Comments: 6143 J. Levine Category: Informational RealVNC Ltd.Coding Explained in 25 Profound Comics — Free Code Camp — Medium
We asked our open source community to share the comics they found most profoundly described coding, via our news site. Here are their 25 most upvoted comics. We can’t help you learn to code in 21 days, but if you can budget a year of nights and weekends, give us a try: freecodecamp.com.Efficient game updates
A little while ago, I wrote an article on things that can go wrong when downloading, it listed a series of reasons, from network problems to invalid content to imperfect hardware that may occur when initially installing a game.3 Security Headers That Every Site Should Have
Clickjacking, XSS and CSRF, exploits that have been around for 15+ years now and still form the basis for many vulnerabilities on the web today.Miscomputation in software development Learning to live with errors
The discussion takes place in an imaginary class room. The teacher points out that we have been trying to eliminate errors from programs for over 50 years now and the class discusses different kind of errors and different strategies that have been developed over time to deal with errors.
This Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.
This list is compiled from my Pocket list.