TL;DR In the last post, we talked about the five W questions that we use for information gathering. Today we present great advice from Tony Bruce, how NOT to do…
TL;DR The last time we presented project team member roles. Today we share Johanna’s advice on how to make a team member make a bond. The post is based on a…
TL;DR The trouble with git starts when you need to use some of its advanced features, like git rebase the command line. I am still on a happy path where…
TL;DR In the last post, we gave you a critical thinking exercise: the root cause of my issue with balcony blinds. Today we present the root cause and critical thinking…
TL;DR In the previous post, we loaded three Photos into the Picshare application. Today we will connect to the WebSocket server using Elm. This post is part of the functional…
TL;DR In the previous post, we explained how to pattern-match Elixir Bitstrings and Binaries. Today we move on to compound pattern matching. This post is part of the functional language series,…
TL;DR In the previous post, we gave an exercise on Test Paths in Directed Graphs. Today we provide the solution for that exercise. We will introduce you to software testing based…
TL;DR In the last post, we presented a CIA thinking tool called The Phoenix Checklist. We used it to create a plan for the real problem with the Google Page Rank…
TL;DR Ecto library has an excellent feature called preload,it preloads the schema associations into the result set. We discuss this feature in the context of security when you have associations…
TL;DR The last time we presented the last scheduled game, Schedule Trance. Today we move on to the topic of how to create a Project Team. We start with identifying…