Developer Tools (page 26 of 32)
Workflows, languages, testing, and utilities that speed up everyday development — all aligned with privacy-first, local-first tooling.
- Deep Links vs HTTPS URLs in QR: Platform Behavior Notes
A practical guide to choosing deep links or HTTPS URLs in QR codes, with real platform behavior notes, app-open pitfalls, and safer fallback patterns.
- Deterministic CSV for Tests: Seeds, Timestamps, and IDs
A practical guide to building deterministic CSV test fixtures with seeded data, stable timestamps, predictable identifiers, and fewer flaky test failures.
- Differential Privacy at CSV Scale: When It Is (and Isn’t) Relevant
A practical guide to differential privacy for CSV-scale data, including when it helps, when it is the wrong tool, and how to think about privacy risk in real tabular workflows.
- All-day events vs timed events: ICS patterns that confuse clients
A detailed guide to all-day vs timed ICS events, with examples, edge cases, and fixes for the import mistakes that confuse clients.
- Apple Calendar Import Issues: Common ICS Fixes
A practical guide to fixing Apple Calendar ICS import problems, including malformed files, timezone mistakes, all-day event bugs, and subscription confusion.
- Branding QR Codes: Logo Placement Without Killing Scan Reliability
A practical guide to branded QR codes that still scan reliably across phones, print materials, packaging, signage, and campaigns.
- Browser Storage Limits: Practical Caps for Large CSV Workflows
A practical guide to browser storage limits for large CSV workflows, including localStorage caps, IndexedDB and OPFS quotas, Safari eviction behavior, and when to use direct file access instead.
- Building a CSV linter CLI that matches your web validator rules
A practical guide to building a CSV linter CLI that stays in lockstep with your browser-based CSV validator.
- Cancelled Events: STATUS and METHOD Fields in Practice
A practical guide to cancelled ICS events, including STATUS, METHOD, UID, SEQUENCE, recurrence cases, and real-world client behavior.
- Client-side CSV Processing: Threat Model Basics for Product Teams
A practical guide to threat modeling browser-based CSV tools for product teams building privacy-first validation, cleaning, and transformation workflows.