The case for strong naming .NET assemblies
I’ve observed many .NET open-source projects whose authors either don’t know about strong name signing or are actively opposed to it. In this post, I’ll explain what strong name signing…
Read up on .NET news, tips, cautions... and other areas of technological interest.
Posts that would be primarily interesting to folks in a software engineering field.
I’ve observed many .NET open-source projects whose authors either don’t know about strong name signing or are actively opposed to it. In this post, I’ll explain what strong name signing…
DeepSeek is being hailed as the latest breakthrough in large language models (LLMs), with many calling it "open source." But is it truly open source, and can we trust it?…
I’ve been honored to work on the MessagePack-CSharp library since at least 2019. I’ve learned a lot from its founder in the process. We shared a lot of values, and…
As you work in your local clone of a git repo, you tend to create lots of topic branches. These will often get merged online via pull requests, leaving the…
Azure Pipelines does what it can to prevent accidental logging of secrets. As long as you tell it a particular value is a secret (through marking a variable as a…
Azure Pipelines and GitHub Actions offer generous compute time for OSS repos PR and CI builds. But when your repo is private, the economics change dramatically. For Azure Pipelines as…
In C# programming, magic strings often get a bad reputation. They are seen as a code smell, something to be avoided. The advent of nameof(x) in C# gave us a…
My recently released Nerdbank.Zcash library is available on nuget.org and makes the Zcash cryptocurrency accessible to .NET apps. This library exposes all the APIs necessary to generate seed phrases and…
I’ve programmed primarily in C# for over 20 years. Before that, I did a mix of C++ and VB, and a bit of ruby. While I’m a long-time fan of…
Background into IVKs and internal addresses ZIP-32 describes how to derive accounts and keys for Sapling and Orchard pools. Among these are “internal keys” and “internal addresses”. Internal addresses are…