Developer Tools (page 3 of 12)
Workflows, languages, testing, and utilities that speed up everyday development — all aligned with privacy-first, local-first tooling.
- Outlook vs Google Calendar: ICS quirks when importing events
A practical guide to why the same ICS file can behave differently in Outlook and Google Calendar, and how to author safer files for cross-client imports.
- Plain-text descriptions in ICS: links and formatting limits
A practical guide to writing ICS descriptions that survive imports by treating DESCRIPTION as plain text, using URL intentionally, and avoiding unsupported rich formatting assumptions.
- QR code security: phishing patterns and safer defaults
A practical guide to QR code phishing, quishing, public-sign tampering, malicious payment redirects, and safer defaults for scanning, sending, and publishing QR codes.
- QR codes for event check-in: reducing duplicate scans
A practical guide to preventing duplicate QR code check-ins at events, including static vs dynamic tickets, offline scan sync, anti-screenshot design, and check-in system architecture.
- QR codes for restaurant menus: accessibility and contrast basics
A practical guide to restaurant menu QR codes that are easier to scan, easier to read, and less likely to block diners who need larger text, better contrast, or a non-QR fallback.
- QR for packaging: GS1 and standards teams should know
Learn how QR for packaging works with GS1 Digital Link, when to use QR Code versus Data Matrix, what Sunrise 2027 means, and how packaging teams can design 2D barcodes that support POS, traceability, and consumer engagement.
- QR in print: minimum size, quiet zone, and error correction
A practical guide to printed QR code sizing, quiet zones, error correction, contrast, and print-production decisions that affect real scan success.
- QR payloads that break older scanners: length and charset
A practical guide to QR payload compatibility, focused on payload length, character sets, dense symbols, older scanner behavior, and safer defaults for broad scan success.
- Handling Sensitive HR CSV Exports on Shared Machines
A practical guide to opening, validating, and cleaning up sensitive HR CSV exports on shared or borrowed machines without relying on private browsing alone.
- Hashing Identifiers in CSV for Support Tickets
A practical guide to sharing CSV-based repros and support artifacts without exposing raw identifiers that do not need to leave your environment.