Web components. Part 3: html templates and imports

Web components. Part 3: html templates and imports
Introduction

 
Greetings colleagues. This article is the third and last article in a series of articles on web components. The first two articles are available on the links:
 
Web components. Part 1: Custom elements
 
Web components. Part 2: The Shadow DOM
 
 
In this article we will talk about
element as well as HTML imports.
 
this algorithm is , the document in which is
and indicates the property value .content created DocumentFragment.
 
That is, property .content the template element contains the DocumentFragment, and the elements that were specified ...[/h]
+ 0 -

The dust storm on Mars reached a planetary scale, affecting even Curiosity

The dust storm on Mars reached a planetary scale, affecting even Curiosity
 

Winter The dust storm came close to Curiosity, closer than ever

 
 
A few days ago on Habré was published. information that the rover Opportunity, which has been operating on the Red Planet for more than 15 years, has entered the "hibernation" regime. In this mode, it has only a few basic functions. From time to time the rover wakes up, checks its own state and the amount of energy generated, finds it all unsatisfactory and goes back into sleep.
 
 
The problem is not caused by software or rover hardware. The fact is that Opportunity does not receive enough energy for normal operation. The ...
+ 0 -

Hakaton as a cure for creative boredom

Hakaton as a cure for creative boredom
 
 
10 years ago SEMrush started as a startup of two SEO-schnikov. Today, the product offers about 40 tools for a digital marketer, and this was due to the fact that the team always encouraged new ideas. Maintaining an environment in which ideas drive the development process is one of the main tasks of the company.
 
 

Creativity outside the working week


 
To creativity is not limited to the framework of the working schedule, we conduct small "shakes": activities that help to cheer people up, awaken in them a startup spirit and motivate to think outside the box.
 
 
In 2016 and 2017 we held the Week ...[/h]
+ 0 -

We disassemble the popular myth: "The substance is 99% composed of emptiness"

We disassemble the popular myth: "The substance is 99% composed of emptiness"

 
When discussing the structure of the atom and matter, it can often be read that the substance at ??? % consists of a void, with different versions of the number of nines. As we shall see, this statement has very shaky grounds, and attempts to estimate the share of emptiness in matter can with equal success give any number from 0 to 100%. A consistent consideration of the problem within the framework of quantum mechanics shows that the substance differs from the void quite strongly.
 
(*) It looks like this: in an atom having a size of about one Angstrom (10 ...
+ 0 -

Transparent authorization for an application on Oracle Weblogic Server

Transparent authorization for an application on Oracle Weblogic ServerIn this article I will describe how we switched from NTLM to Kerberos authorization for applications on Oracle Weblogic Server, thereby simplifying the users' input by eliminating the need to enter a password. All users, as well as the application server, are in the same domain, as well as the domain authorization for Weblogic server applications. All configurations have been tested for WLS ???.
 
 
To start a little theory, very briefly to further understand the process of interaction.
 
 

What is Single Sign-On?


 
Single sign-on (SSO) is a mechanism by which one user authentication action ...[/h]
+ 0 -

TRIZ, Haskell and functional thinking

At the word TRIZ, one often recalls the thesis "an ideal system is one that does not exist (and its function is fulfilled in this case)." As a good administrator, who does not appear in the office, but everything is working at the same time.
 
The function and system are critical concepts in TRIZ, they even speak about the functional style of thinking. True, with these words, I personally have an association with functional programming languages.
 
Let's try to see how organically the ideas of functional thinking of TRIZ are displayed on Haskell, one pure functional languages ​​of general purpose.
 
TRIZ, Haskell and functional thinking
 
Function
 
Function
- mod...
+ 0 -

Richard Hamming: Chapter 17. Digital filters - IV

"The purpose of this course is to prepare you for your technical future."
 
Richard Hamming: Chapter 17. Digital filters - IV Hello, Habr. Remember the awesome article "You and your work" (+21? 2442 in bookmarks, 393k of readings)?
 
 
So Hamming (yes, yes, self-controlling and self-correcting Hamming codes ) Has a whole book based on his lectures. We translate it, because the peasant is talking.
 
 
This book is not just about IT, it's a book about the thinking style of incredibly cool people. "This is not just a charge of positive thinking; it describes ...
+ 0 -

In the activities of Roskosmos violations were found for 760 billion rubles

In the activities of Roskosmos violations were found for 760 billion rubles The other day there was information that the Counting Board was dissatisfied with the financial results of the state corporation Roskosmos. Chairman of the Accounting Chamber Alexei Kudrin said that in 201? a number of violations were detected in state enterprises, and 40% of them are related to the activities of Roskosmos, writes Interfax.
 
 
"The total amount of violations, shortfalls in income and use of funds amounted to ??? trillion. This is almost twice as much as in 2016 and 3.5 times more than in 2015. Immediately I will say that 760 billion of this amount - this is a violation of accounting in ...
+ 0 -

Vulnerability in ICQ allowed to join absolutely to any chat

Hello everyone, today I want to tell you a story about how I discovered a vulnerability in ICQ, which allowed to connect absolutely to any chat on its chat.agent`y.
 
 
The vulnerability was in api.icq.com.
 
Vulnerable method: adding people to the chat.
 
 
mchat /AddChat
Link to the report [/b] Hello everyone, today I want to tell you a story about how I discovered a vulnerability in ICQ, which allowed to connect absolutely to any chat on its chat.agent`y.   The vulnerability was in api.icq.com. Vulnerable method: adding people to the chat.   mchat /AddChat Link to the report ...
+ 0 -

The help of the hall

As usual I'll start from afar. From the monstrous, the unimaginable is far away.
 
 
As I said before, I'm a writer. I write stories, novels, novels. I'm going to write a novel # DASHANALUNE in co-authorship with you. But it's not about him now. # DASHANALUNE - the novel is more serious, realistic as much as an interesting novel about the journey of our compatriot to the moon (As part of the Chinese lunar mission) can be realistic.
 
 
And this big story, with the conventional name "Level Up" over which I work, is much less serious. To be honest - this is a fairy tale in general. With the princess ...
+ 0 -