Skip to main content

Ry's Git Tutorial BOOK Review

Ry's Git Tutorial BOOK Review

There are many good books about git but Ry's Git Tutorial stands out as an amazing git tutorial book I will describe below why:

http://amzn.to/2pwEuFJ


I want to stress out although I'm going to list below what this books talks about that is not the reason you should read this book.  The reason you should read this book is that it's crystal clear about git! it's just an amazing book, it's fun to read, and I truly get to understand git.

  1. It very clear, Ry's manages to bring us closer to git by making things really clear.
  2. Ry's makes an outstanding effort to bring us from knowing nothing about git to being an expert.
  3. The book starts with the real basics like Initializing the repository on an example website, staging files, exploring the repository.
  4. Then he moves on to undoing changes and he scans various ways you can undo your changes: viewing old revisions, tagging release, undo commit stages etc.
  5. Branches: Viewing branches, renaming branches, Merging and deleting branches, publish hotfix, cleaning up feature branches.
  6. Rebasing: There is a whole chapter about rebasing, publishing new fixes, cleaning up commit history, interactive rebase.
  7. The book moves on with rewrite history, remotes, centralized workflows, distributed workflows, patch workflows, tips and tricks, plumbing.

Comments

  1. Harrah's Cherokee Casino & Hotel - Tripadvisor
    › harrahs-cherokee-casino › harrahs-cherokee-casino Mar 3, 2022 - Find all information and best deals of Harrah's Cherokee Casino & Hotel, Cherokee on Tripadvisor. Rating: 4.5 1,022 reviews Price range: $$ (Based 경산 출장샵 on 광명 출장안마 Average Nightly Rates for a Standard Room from our Partners) What are some of the property amenities 바카라 at Harrah's 군포 출장샵 Cherokee Casino & Hotel? What food & drink options are available 울산광역 출장샵 at Harrah's Cherokee Casino & Hotel?

    ReplyDelete
  2. Even though the game is solely based on probability, there are still differences between the variants. Some give you a lower home edge than others, which is essential to know if you 다파벳 ever wish to play for real cash. As you would possibly count on, we now have loads of deal of} free roulette video games so that you can} play. The most prairie of the prairie provinces did issues slightly a special way|in one other way}.

    ReplyDelete

Post a Comment

Popular posts from this blog

Functional Programming in Scala for Working Class OOP Java Programmers - Part 1

Introduction Have you ever been to a scala conf and told yourself "I have no idea what this guy talks about?" did you look nervously around and see all people smiling saying "yeah that's obvious " only to get you even more nervous? . If so this post is for you, otherwise just skip it, you already know fp in scala ;) This post is optimistic, although I'm going to say functional programming in scala is not easy, our target is to understand it, so bare with me. Let's face the truth functional programmin in scala is difficult if is difficult if you are just another working class programmer coming mainly from java background. If you came from haskell background then hell it's easy. If you come from heavy math background then hell yes it's easy. But if you are a standard working class java backend engineer with previous OOP design background then hell yeah it's difficult. Scala and Design Patterns An interesting point of view on scala, is

Alternatives to Using UUIDs

  Alternatives to Using UUIDs UUIDs are valuable for several reasons: Global Uniqueness : UUIDs are designed to be globally unique across systems, ensuring that no two identifiers collide unintentionally. This property is crucial for distributed systems, databases, and scenarios where data needs to be uniquely identified regardless of location or time. Standardization : UUIDs adhere to well-defined formats (such as UUIDv4) and are widely supported by various programming languages and platforms. This consistency simplifies interoperability and data exchange. High Collision Resistance : The probability of generating duplicate UUIDs is extremely low due to the combination of timestamp, random bits, and other factors. This collision resistance is essential for avoiding data corruption. However, there are situations where UUIDs may not be the optimal choice: Length and Readability : UUIDs are lengthy (typically 36 characters in their canonical form) and may not be human-readable. In URLs,

Bellman Ford Graph Algorithm

The Shortest path algorithms so you go to google maps and you want to find the shortest path from one city to another.  Two algorithms can help you, they both calculate the shortest distance from a source node into all other nodes, one node can handle negative weights with cycles and another cannot, Dijkstra cannot and bellman ford can. One is Dijkstra if you run the Dijkstra algorithm on this map its input would be a single source node and its output would be the path to all other vertices.  However, there is a caveat if Elon mask comes and with some magic creates a black hole loop which makes one of the edges negative weight then the Dijkstra algorithm would fail to give you the answer. This is where bellman Ford algorithm comes into place, it's like the Dijkstra algorithm only it knows to handle well negative weight in edges. Dijkstra has an issue handling negative weights and cycles Bellman's ford algorithm target is to find the shortest path from a single node in a graph t