Tagged articles
12 articles
Page 1 of 1
Code Mala Tang
Code Mala Tang
Jan 7, 2026 · Fundamentals

When to Use Git Rebase vs Merge: Avoid Losing Code

This article explains the core differences between git rebase and git merge, illustrates how each rewrites or preserves commit history with concrete command examples, outlines safe usage scenarios, and provides practical tips to prevent code loss during collaborative development.

Gitcode safetymerge
0 likes · 6 min read
When to Use Git Rebase vs Merge: Avoid Losing Code
php Courses
php Courses
Sep 28, 2025 · Backend Development

Mastering PHP’s is_callable(): Safely Verify Functions and Methods

This article explains PHP’s is_callable() function, its parameters, and provides clear code examples showing how to verify both standalone functions and class methods before invoking them, helping developers write more robust and maintainable backend code.

BackendPHPcode safety
0 likes · 4 min read
Mastering PHP’s is_callable(): Safely Verify Functions and Methods
Liangxu Linux
Liangxu Linux
Aug 28, 2025 · Fundamentals

When a Hidden Easter Egg Almost Cost an Engineer His Job at Apple

The article recounts John Calhoun's experience at Apple, detailing how his harmless code Easter egg nearly led to his dismissal, and explores the broader implications of embedding hidden features in software within large tech companies.

AppleLegacy Codecode safety
0 likes · 15 min read
When a Hidden Easter Egg Almost Cost an Engineer His Job at Apple
JavaScript
JavaScript
Jul 5, 2025 · Fundamentals

Why Do Top JavaScript Libraries Use void 0 Instead of undefined?

This article explains the historical reason why JavaScript's undefined is not a keyword, how the void operator reliably returns undefined, and why high‑quality libraries prefer the concise void 0 syntax for safety and minification.

JavaScriptcode safetylanguage fundamentals
0 likes · 5 min read
Why Do Top JavaScript Libraries Use void 0 Instead of undefined?
Liangxu Linux
Liangxu Linux
Apr 17, 2025 · Fundamentals

15 Common C Language Pitfalls Every Developer Should Avoid

This article enumerates fifteen frequent C programming traps—from operator precedence and case‑sensitivity to pointer misuse and multithreading issues—provides clear code examples, explains why each error occurs, and offers practical solutions plus a challenging interview question.

Pitfallsc++code safety
0 likes · 13 min read
15 Common C Language Pitfalls Every Developer Should Avoid
Continuous Delivery 2.0
Continuous Delivery 2.0
Jul 15, 2024 · Artificial Intelligence

Safely Repairing Broken Builds with Machine Learning

Google's research demonstrates that a machine‑learning model trained on build logs and code snapshots can automatically suggest safe, high‑quality fixes for broken builds, boosting developer productivity by about two percent without introducing detectable security risks.

Build AutomationML-assisted debuggingcode safety
0 likes · 10 min read
Safely Repairing Broken Builds with Machine Learning
Ops Development & AI Practice
Ops Development & AI Practice
May 9, 2024 · Backend Development

When to Replace Pointer Receivers with Value Receivers in Go?

This article examines the trade‑offs of converting a Go method from a pointer receiver to a value receiver, illustrating the change with concrete code examples, outlining benefits such as simpler logic, zero‑value safety, clearer semantics, and offering guidance on when this refactor is appropriate.

Gocode safetymethod receiver
0 likes · 5 min read
When to Replace Pointer Receivers with Value Receivers in Go?
Liangxu Linux
Liangxu Linux
Sep 21, 2023 · Fundamentals

When to Use {} vs do{…}while(0) vs ({}) in C Function‑like Macros

This article explains the three common techniques for wrapping C function‑like macros—plain braces, do{…}while(0), and the GNU ({}) extension—detailing their syntax, usage pitfalls, advantages, disadvantages, and recommendations for safe macro design.

GNU extensionMacrosc++
0 likes · 8 min read
When to Use {} vs do{…}while(0) vs ({}) in C Function‑like Macros
Programmer DD
Programmer DD
May 15, 2023 · Information Security

How GitHub’s Push Protection Stops Secret Leaks in Public Repos

GitHub’s new Push Protection feature automatically scans and blocks sensitive data like API keys and tokens across all public repositories, dramatically reducing accidental leaks and saving developers thousands of hours, while offering easy enablement through organization or repository settings.

API SecurityGitHubPush Protection
0 likes · 5 min read
How GitHub’s Push Protection Stops Secret Leaks in Public Repos
Python Programming Learning Circle
Python Programming Learning Circle
May 24, 2022 · Information Security

Common Python Vulnerabilities and How to Secure Them

This article outlines the most frequent security flaws in Python—including command injection, outdated versions, unsafe temporary files, misuse of assert statements, and import path issues—while offering practical mitigation strategies to help developers protect their applications.

best practicescode safetyvulnerabilities
0 likes · 6 min read
Common Python Vulnerabilities and How to Secure Them