DEV Community

Programming

The magic behind computers. đŸ’» đŸȘ„

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Best Way To Structure Your .NET Projects with Clean Architecture and Vertical Slices

The Best Way To Structure Your .NET Projects with Clean Architecture and Vertical Slices

2
Comments
9 min read
Everyone keeps saying to document your code, what do they actually mean

Everyone keeps saying to document your code, what do they actually mean

1
Comments
2 min read
Dive into the Wonderful World of Java with this Beginner-Friendly Course! 🚀

Dive into the Wonderful World of Java with this Beginner-Friendly Course! 🚀

Comments
3 min read
Dive into the World of Programming with These Free Resources 🌐

Dive into the World of Programming with These Free Resources 🌐

Comments
3 min read
First Post!

First Post!

Comments
1 min read
Part 3 - Using Claude, Claude-Dev and Aider to Build a Ticketing System (Cursor too!)

Part 3 - Using Claude, Claude-Dev and Aider to Build a Ticketing System (Cursor too!)

15
Comments
20 min read
#52 — Get The Last Row of Each Group

#52 — Get The Last Row of Each Group

6
Comments 2
1 min read
AI Tool Is Now Supporting React, Angular, CSS, Svelte, Vue

AI Tool Is Now Supporting React, Angular, CSS, Svelte, Vue

13
Comments
1 min read
Day 2

Day 2

Comments
1 min read
JSON Compare Online: Streamlining Data Validation and Debugging

JSON Compare Online: Streamlining Data Validation and Debugging

2
Comments
4 min read
JS - All about String Primitive

JS - All about String Primitive

1
Comments
3 min read
Been a while

Been a while

2
Comments
2 min read
Implementing SOLID Principles in React: A Guide for Scalable Development

Implementing SOLID Principles in React: A Guide for Scalable Development

6
Comments 2
4 min read
.NET << { Common Language Runtime CLR!}

.NET << { Common Language Runtime CLR!}

11
Comments
1 min read
Scanning for Vulnerabilities: Linux Tools and Safe Exploitation for Penetration Testing

Scanning for Vulnerabilities: Linux Tools and Safe Exploitation for Penetration Testing

Comments
8 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.