Find your internet twin!

This site is currently broken for new queries. It seems like some bot hit it and we ran out of exa credits.

Enter your personal website to find others like you. Powered by Exa's "find similar". Built on Val Town.

Similar Sites:

This history can be used to understand certain bits of code that have been modified by you or someone else in a certain user story.

Since I found very little documentation on how to integrate these things and struggled myself quiet a bit, I decided to make a guide to help others w…

Here's two new types you can use to make your life easier.

I should be able to connect to the machine and login using the same credentials as when I'm at the machine.

Here I provide an example using intrusive lists as containers and where data chunks belong to two lists at the same time.

Let's see a test case to help us to figure out how to work it out.

It is a device control code originally sent to ring a small electromechanical bell on printers and teletypewriters to alert operators at the other en…

I’ve never got a formation that explains how to conduct interviews.

Partial apply by Wikipedia: In computer science, partial application (or partial function application) refers to the process of fixing a number of a…

View previous queries