1. Illegal memory access 2. Allocating to much memory 3. Unsolved error handling
Continue readingCategory: Computer
Visitor (Design pattern)
The purpose of that behavioral design pattern is to add a new operation without adding it to the existing object
Continue readingDependency injection (Design pattern)
As the name of this creational design pattern already shows dependencies are getting injected (as parameter) instead of creating them
Continue readingComposite (Design pattern)
That structural design pattern allows to create trees of objects and to interact with them as they are just a
Continue readingCompiler optimization
A compiler with enabled optimization (via flags) will take more time for the generation, but the execution of generated binary
Continue readingCan’t access the UEFI? (Windows)
If you can’t access the UEFI during the bootup (e.g. via F1, F2, F8, F10, Del or Esc), it’s possible
Continue readingRemote debugging (gdbserver)
Remote debugging creates the possibility to debug applications on a remote device. Setup: Host system (gdb) Target system (gdbserver) Precondition
Continue readingDownload HLS streams (PowerShell)
Introduction Some web player are streaming videos in parts and not as a single file. The common reason is to
Continue readingArchitectural vs. Design Pattern
Architectural pattern … Pattern on a high level – Multi-Layer (e.g. Text editor) – Client-Server (e.g. Banking) – Peer-To-Peer (e.g.
Continue readingWorking with different remotes (Git)
Basics Most people I talked to are using origin and remote as an equivalent, but the aren’t. Origin is the
Continue reading