Continuing the series of obfuscation techniques, I thought up a sinister one recently that breaks the best practice of not shadowing built-in functions. I bet you'll have fun with this one!
Category: Code
While considering the various obfuscation techniques, I was thinking about the role comments play in readability. After all, we've all heard that writing comments is a best practice, yet it's very...
As a community, we spend a lot of time debating best practices. Perhaps it's time we establish actual bad practices. Or as I like to put them, obfuscation techniques. To kick off this new series, I...
Now that we're back to school, I figured it was time to talk about another introductory programming concept: unit testing. This time, I bring you some of my favorite tips targeted at folks who may be...
Operator overloading is an amazing feature that I've come to love as someone who came from Java, but it certainly can be abused. I decided to give that a try!
If you know me, you know I love to play around with silly ways to solve problems with programming languages. Today is no different! This time, let's see how many ways we can add two numbers in...