What programming language should be taught in 2018 and why exactly?

What programming language should be taught in 2018 and why exactly?If you persistently want to get into the team of compiler developers or into the "world of the wild West" - then boldly choose and teach top language programming from TIOBE and best of all: at the level of its specification. But seriously, now in the industry everything is so confusing with logic and conclusions, so much marketing and water, that the most winning strategy is to include your own brains and make an express re-evaluation of the technical values ​​that we are so used to. In my post, I will try to orient the developers who are starting their career as clearly as possible on the ...
+ 0 -

Google and HTTP

Google and HTTPI oppose Google's efforts to discredit the HTTP protocol. Here is a generalization of the reasons why I adhere to this point of view.
 
stop on this , requiring the user to consent to the opening of such pages, and then simply blocking them.
 
 

It's not fair


 
Many of the sites that they designate as "unreliable" do not ask the user for any information. Of course, users will not understand this. Many will seriously take the warning and press the "Back" button, not knowing why they do it. Of course, Google in the course. This is such a dirty political tactic that we expect from corrupt ...[/h]
+ 0 -

BIF pattern: clean front-end code and convenient work with server data

In the material, the translation of which we publish today, it will go on what to do in a situation where the data received from the server does not look like the client needs. Namely, first we will consider a typical problem of this kind, and then we will analyze several ways to solve it.
 
 
BIF pattern: clean front-end code and convenient work with server data
 
 


The problem of the failed server API is


 
Consider a conditional example, which is based on several real projects. Suppose we are developing a new website for some organization that has existed for some time. It already has REST endpoints, but they are not fully calculated on what we are going to create...[/h]
+ 0 -

Useful commands for checking the size of directories and files

Useful commands for checking the size of directories and files  
 
Often there is a need to check the size of directories and files in the project and estimate the space occupied in dev /live environments.
 
 
Here is a list of useful commands that you can use to make sure that there is enough free disk space on the machine, and that the size of the node_modules of your project is not crazy: D
 
 

We will use command du , the explanations below:


 
inodes in your system:
 
 
$ df -i
 
 
If you have more useful commands, share them in the comments!   Often there is a need to check the size of directories and files in the project and estimate the space occupied in dev /live environments.  Here is a list of useful commands that you can use to make sure that there is enough free disk space on the machine, and that the size of the node_modules of your project is not crazy: D   We will use command du , the explanations below:   inodes in your system:  $ df -i  If you have more useful commands, share them in the comments!...[/h]
+ 0 -

Useful methods for arrays and objects in JavaScript

The author of the article, whose translation we are publishing today, says that her idea was prompted to him by one of the issues of podcast Syntax FM , which gave an overview of useful methods of objects and arrays in jаvascript. These methods help developers write clean and readable code. Their use reduces the need for third-party libraries like Lodash .
 
 
Useful methods for arrays and objects in JavaScript
 
Array.prototype.filter ...
+ 0 -

CSRF vulnerabilities are still valid

CSRF vulnerabilities are still validCSFR (Sross Site Request Forgery) in translation into Russian is a forgery of cross-site requests.
Mikhail Egorov
( .0ang3el ) In his report at 3-3r38. Highload ++
2017 talked about CSRF-vulnerabilities, about what protection mechanisms are commonly used, and how they can still be circumvented. And in the end, he brought a number of tips on how to properly defend against CSFR-attacks. Under the cut decoding of this speech.
 
 
+ 0 -

The practice of using proxy objects in JavaScript

Perhaps you've heard that new objects have appeared in jаvascript ES6 - the so-called proxies. Those who know what proxy objects are and can work with them, they can bring a lot of benefit. Today we publish a translation of the material, which is aimed at explaining to everyone who wants to work with JS proxy objects on a lot of examples.
 
 
The practice of using proxy objects in JavaScript
 
 
Also open our previous post in the new tab: jаvascript-proxy: and beautiful, and useful
 
...
+ 0 -

How to customize the reference block in a group in VKontakte

How to customize the reference block in a group in VKontakte

 
Content, though the king, but to attract the audience into your publics, one is not enough. Good design of groups, suitable high-quality images, tailored to the specifics of the social network - play an equally important role in the promotion of your accounts.
 
On the example of our group in Vkontakte, I want to show how you can nicely design a link unit.
 
Postman , which allows you to make requests to the server and pass the necessary parameters.
 
 
Chrome browser, you can and any other, but it has a convenient built-in development tool. Right-click and select "Inspect" in the context menu ...
+ 0 -

How to deploy artifacts Adaptavist ScriptRunner

How to deploy artifacts Adaptavist ScriptRunner In the software development process, several environments are commonly used: environments for development, testing, and industrial use. In this article, we'll talk about how to transfer the Adaptavist ScriptRunner artifacts between the Atlasian Jira environments.
 
 
The source code of the plug-in developed in this article can be viewed here .
 
here . An example of a script plugin can be viewed ...
+ 0 -

Summer vacation: how not to worry about the work of your site in vain

Soon the summer, and everyone wants to rest. But, as statistics show, not everyone can afford it, and it's not only and not so much in the means. And then, to go to the seaside, but sitting there with a laptop in the room, solving the questions of the category "without-me-not-sort it out" is also a rather popular approach. What to do? Delegate, delegate and delegate. Why a full vacation is so important, and how can you take care of sites /servers with a special site accessibility monitoring service - We will tell below.
 
 
Summer vacation: how not to worry about the work of your site in vain ...
+ 0 -