List is a Monad: Understanding Map, flatMap, and Maybe in Practice
This story was originally published on HackerNoon at: https://hackernoon.com/list-is-a-monad-understanding-map-flatmap-and-maybe-in-practice.
Monads are more than just containers, and there isn’t the-one-and-only monad.
Check more stories related to programming at: https://hackernoon.com/c/programming.
You can also check exclusive content about #programming, #monad, #monads, #monads-explained, #list-monad-tutorial, #map-vs-flatmap, #unit-and-flatmap, #maybe-monad-guide, and more.
This story was written by: @alexyorke. Learn more about this writer by checking @alexyorke's about page,
and for more stories, please visit hackernoon.com.
Monads are more than just containers, and there isn’t the-one-and-only monad. Monads usually involve generic types, but they require specific operations (`Unit' and 'flatMap')
--------
12:24
--------
12:24
Using ChatGPT Like a Junior Dev: Productive, But Needs Checking
This story was originally published on HackerNoon at: https://hackernoon.com/using-chatgpt-like-a-junior-dev-productive-but-needs-checking.
Treat ChatGPT like a junior dev on your team — helpful, but always needing review.
Check more stories related to programming at: https://hackernoon.com/c/programming.
You can also check exclusive content about #react, #unit-testing, #chatgpt, #ai, #junior-ai-dev, #ai-devs, #ai-developers, #junior-devs, and more.
This story was written by: @heyradcode. Learn more about this writer by checking @heyradcode's about page,
and for more stories, please visit hackernoon.com.
Treat ChatGPT like a junior dev on your team — helpful, but always needing review.
--------
3:59
--------
3:59
15 Common Types of Unethical Behavior Found in Open-Source Projects
This story was originally published on HackerNoon at: https://hackernoon.com/15-common-types-of-unethical-behavior-found-in-open-source-projects.
A groundbreaking study finds 15 different forms of unethical behavior in open source software, ranging from plagiarism to poorly maintained commercial apps.
Check more stories related to programming at: https://hackernoon.com/c/programming.
You can also check exclusive content about #open-source-software-ethics, #oss-unethical-behavior, #software-engineering-ethics, #license-violation, #plagiarism-in-software, #oss-taxonomy, #plagiarism-in-open-source, #github-self-promotion, and more.
This story was written by: @escholar. Learn more about this writer by checking @escholar's about page,
and for more stories, please visit hackernoon.com.
Through an analysis of 316 GitHub problems across 842 repositories, this study investigates unethical behavior in open-source software (OSS) projects. We find 15 different categories of unethical behavior mapped to 11 ethical guidelines using keyword-based thematic analysis. These include copyright violations (plagiarism, soft forking, and missing attribution), licensing abuse, self-promotion, privacy violations, offensive language, and unmaintained paid services.
--------
14:36
--------
14:36
What 316 GitHub Issues Teach Us About the Dark Side of Open Source
This story was originally published on HackerNoon at: https://hackernoon.com/what-316-github-issues-teach-us-about-the-dark-side-of-open-source.
OSS's first extensive investigation of unethical behavior, featuring taxonomy, an ontology-based detection tool (Etor), and an accuracy rate of 74.8%.
Check more stories related to programming at: https://hackernoon.com/c/programming.
You can also check exclusive content about #open-source-software-ethics, #oss-unethical-behavior, #software-engineering-ethics, #etor-ontology-tool, #ethical-ai, #oss-taxonomy, #etor-tool, #hackernoon-top-story, and more.
This story was written by: @escholar. Learn more about this writer by checking @escholar's about page,
and for more stories, please visit hackernoon.com.
From the viewpoint of stakeholders, this paper offers the first thorough analysis of unethical behavior in open-source software (OSS) initiatives. Our analysis of 316 GitHub problems from 301 repositories reveals 15 different forms of unethical activity, including six situations that haven't been examined before, including self-promotion, soft forking, misinformed licensing alterations, and naming confusion.
--------
9:47
--------
9:47
The Tortoise and the Hare: An Unexpected Scheduling Race Between MILP and CP Solvers
This story was originally published on HackerNoon at: https://hackernoon.com/the-tortoise-and-the-hare-an-unexpected-scheduling-race-between-milp-and-cp-solvers.
This paper compares MILP and CP solvers on a new FJS scheduling problem, showing CP is faster and "warm starts" are vital for large instances.
Check more stories related to programming at: https://hackernoon.com/c/programming.
You can also check exclusive content about #constraint-programming, #flexible-job-shop-scheduling, #operations-research, #milp-vs-cp, #optimization-solvers, #warm-start, #computational-optimization, #benchmark-testing, and more.
This story was written by: @instancing. Learn more about this writer by checking @instancing's about page,
and for more stories, please visit hackernoon.com.
This paper compares MILP and CP solvers on a new FJS scheduling problem, showing CP is faster and "warm starts" are vital for large instances.