A teammate and I have created a small tool to modify the titles of the trello card in a trello board.
Technical description It works by applying a function to the existing title (because we wanted to remove a prefix from the existing title).
The modification is done, not through the API, but simulating user interaction:
Click to edit the card Input the new title Save The full code is available here
At a client, we’re converting all projects (i.e., sites, services, libraries) from npm to yarn. Mostly for the speed (as it uses the internal cache).
Step by step guide Install yarn in your local environment * https://yarnpkg.com/lang/en/docs/install/ Run yarn install * This will create a yarn.lock file * Add that file to the repo: git add yarn.lock Modify Dockerfile * Install yarn (in the Dockerfile). Idea: shortcut this execution with yarn --version in case it is installed * Configure the PATH variable (ENV PATH …) * ADD yarn.
¿Volver? I’ve read this article by Raul Avila comparing the options between working in the UK and in Spain (where he’s originally from). Inspired by other professionals (e.g., David Bonilla, Jerónimo Palacios).
Tags: spanish, jeronimo-palacios, david-bonilla, expat, comparison, raul-avila, united-kingdom, spain
Donkey code I’ve read this article by Einar W. Høst in which he introduces the concept of a ‘missing domain term’ with the example of a donkey being ‘closely related to a horse, though not exactly the same’
We explore how to use parametrized tests (example in java, example in c#)
The tests are written using mocha syntax: describe, it. Using chai for expectations: assert.
Note: the example used below (adding to an array) is simple enough to be understood by everybody, without having to explain the domain. The real tests can have a more complicated environment or domain. This is just an example.
Using a custom syntax This is just an example of some possible syntax, not using any (currently) existing framework.
WhatsApp Security Vulnerability I’ve read this article by Bruce Schneier on a security defect in whatsapp, where an ‘unconfirmed’ message can be re-encrypted (with a new key) and resent. This is a vector for some attacks.
Tags: bruce-schneier, security, whatsapp, encryption, attack-vector
Encrypted email service once used by Edward Snowden relaunches I’ve read this article, by Kim Zetter, on Lavabit restablishing its service. Explains the company’s past and the new services they are offering
Translation from Haskell to JavaScript of selected portions of the best introduction to monads I’ve ever read I’ve read this article by James Coglan, introducing monads.
About composability:
The symmetry of the argument and return types is what makes these functions composable
or
symmetric input and output types
Guide to basic monadic functions:
lift, which converts a ‘simple’ function into a debuggable function bind, which converts a debuggable function into a composable form unit, which converts a simple value into the format required for debugging, by placing it in a container