After reading Ayende’s blog about GetHashCode file about the pitfalls of GetHashCode. 

I’ve coded it in a Java class but have yet to apply it anywhere else.

I don’t believe I’ve used any objects as keys in my applications.  I mainly use value objects.  From a friend, I’ve heard that .NET automatically prevents collisions by doing chaining (if two objects have the same hashcode, the values are link-listed off that key)

Hash collision resolved by chaining.
Hash collision resolved by chaining.

Image borrowed from Wikipedia

Jason Meridth


My name is Jason Meridth. I am a continuously learning senior software developer/devops/team lead/development manager trying to not let best be the enemy of better. I reserve the right to change my mind upon obtaining more information. I am also the owner and principal software consultant at Meridth, LLC. If you have any software, hardward, networking, process, etc needs please don't hesitate to reach out to me.

Raspberry Pi Kubernetes Cluster - Part 2

Howdy again.Alright, my 8 port switch showed up so I was able to connect my raspberry 3B+ boards to my home network. I plugged it in wit...… Continue reading

Raspberry Pi Kubernetes Cluster - Part 1

Published on April 07, 2018

SSH - Too Many Authentication Failures

Published on March 28, 2018