Posts

Showing posts from 2020

The Best Web Developers #60

Image
  Know your #JavaScript Variable Data types Conditional Looping Classes Prototypes Prototypal Inheritance Closure Hoisting Lexical Scope Good and bad practices Design pattern   Know your #HTML #CSS DOM Elements CSS selectors Box Model Display and position properties Cantering your elements Flexbox Media queries Web Storage CSS validation Magnification and Obfuscation   Know your framework #React JSX Virtual Dom Function vs Class components Events handling Component life cycle React hooks React performance optimization React suspense Graph   Know the #web HTTP Web services Rest API Web workers Server side rendering Authentication Authorization OAuth JWT CORS Secure coding principal Web Attacks CSRF XSS   Know your tools Text editor: #VS Code, Vim, and are my favourites Extensions: Gitlens Prettier Linters Bracket pair colorizer   Git:...

Artificial Intelligence in Your App #57

Image
  Tensor flow LITE Tensor flow LITE is a Google’s Ai framework for mobile devices. You can use it for on devices machine learning. Pros & Cons of Tensor flow LITE: + No network connection required + Data stays on the devices, ensures privacy + Little power consumption, since no connection needed ~ Mobile processing power is limit   Fire Base ML Kit Google’s cloud solution to implement AI in your app. Pros & Cons Fire base ML Kit: + Super simple to implement + The cloud provides good processing power + No need to be an AI expert ~ Services start to cost after 1000 users   Python Backend Python is the languages for ML. you cloud as well implement a python backend and let your app interact with it via an API. Pros & Cons of Python Backend: + You have the full control + Low cost after implementation + You are free in choosing an ML framework (Tensor flow, pytorch, Etc.) ~ Pros $ Cons of Python Backend ~ Takes a lot of ...

Coding Habits #56

Image
  Habit – 1 Not Using Google I can’t believe how many people use stack overflow or any social media groups as first place to ask their question. If you don’t use google as your first place to look for help, forget about getting a good programmer.   Habit – 2 CTRL + C, CTRL + V The general rule should always be: don’t copy code, you haven’t written on your own. Neither from stack overflow or from GitHub. I always write off new code. That way I remember and understand it much better.   Habit – 3 Having Your Phone Next to You We all know how tempting it is to take a look at your phone when your LED blinks. If you disrupt your coding focus like that, you will never get into the flow state you really need to be in as a programmer.   Habit – 4 Trying to Write Perfect Code Striving for perfection will give you everything but perfection. Don’t spend 80% of your time trying to make 20% of it perfect.   Habit – 5 Not Planning Ahead If y...

Login using Session Cookies Source Code #55

Image
·          Create Database in phpmyadmin . CREATE   DATABASE   loginsesssion ; ·          Create table in loginsesssion . INSERT   INTO   `singup`   ( `username` ,   `password` )   VALUES   ( '' ,   '' ) Config.php   <?php $servername = "localhost"; $username = "root"; $password = ""; $db = "loginsesssion"; // Create connection $conn = mysqli_connect($servername, $username, $password, $db); // Check connection if(!$conn) {   die("Connection failed: " . mysqli_connect_error()); } echo "Connected successfully.."; ?>   login.php   <!DOCTYPE html> <html lang="en"> <head>   <title>Login | Registration</title>   <meta charset="utf-8">   <meta name="viewport" content="width=device-width, initial-scale=1">   <link rel="stylesheet" hre...

Best Data Loss Prevention Software Tools part-2 #54

Image
CLEARSWIFT ADAPTIVE DLP Tamarind DLP will help you to be compliant with GDPR, HIPAA, ISO 27001, and PCI DSS.  The tool starts off by searching your entire system for sensitive data.  The search follows typical data formats, such as Social Security or credit card numbers. It then prioritizes those that contain personally identifiable information, personal financial data, and personal health information.  Scans to spot new instances of these data categories continue during the software's service life.  Key Features: System audit GDPR, HIPAA, ISO 27001, and PCI DSS compliant Ongoing risk assessment     Prevent Secure Data Loss This is a good option if you are having trouble building your DLP security strategy. When you install the software, it will present you with a list of 70 policies that you can activate. Reading everyone's explanations will probably give you some suggestions for data control that you didn't think of. Data loss prevention is...

Best Data Loss Prevention Software Tools part-1 #53

Image
  SOLARWINDS DATA LOSS PREVENTION WITH ARM Solar Winds is a leading manufacturer of IT infrastructure monitoring tools and its DLP security solution is part of its Access Rights Manager. An important starting point in your data loss prevention strategy is to set a company policy on data access. Control. Solar Winds Access Rights Manager supports this task by giving you a clear report on current access permissions. Then you have the opportunity to set better controls, which can be implemented through the Access Rights Manager. Key Features: Access Rights Manager sports suspicious activity, automated responses to compliance with data security standards   COSOSYS ENDPOINT PROTECTOR CoSoSys provides an endpoint protector as an it inside solution, as a cloud-based service and as a standalone software package. The Sight version will protect computers running Windows, OS X and Linux. A central endpoint protector server tool Communicates across the network with client software...

Salary expectation in interview #52

Image
Provide A Range If you do not feel comfortable providing a single number, you can choose to provide a range instead. However, keep in mind that the employer may opt for the lower part of your range, so make sure that your target number is as close to the bottom number as possible. Also keep your range somewhat tight with versions ranging from $ 5000 to $ 10,000. Example: “I am seeking a position that pays between $75,000 and $80,000 annually.” Include negotiation option In addition to your salary, there may be other benefit, perks or forms of compensation you consider just as valuable. An option is also to include possible opportunities for dialogue.   For example, while the employer may not budget enough for your ideal salary range, they may be willing to offer equality in the company to make the compensation package more attractive to you. Example: “I am seeking a position that pays between $75,000 and $80,000 annually, but depending on benefit, bonuses, equal...

Math's Easy Tricks - Part-02 #51

Image
Percentage | squares | Multiplication | Roman Formula 1 = 100% ½ =50% 1/3 = 33.33 % ¼ =25 % 1/5 = 20 % 1/6 = 16.66 % 1/7 = 14.28 % 1/8 = 12.5 % 1/9 = 11.11 % 1/10 = 10 % 1/11 = 9.09 % 1/12 = 8.33 % 1/13 = 7.60 % 1/14 = 7.14 % 2/3 = 66.6 % 5/6 = 83.33 % 2/5 = 40 % 3/5 = 60 % 3/2 = 150% 5/4 = 125 % 3/8 = 37.5 % 1/16 = 6.25 % 7/8 = 87.5 %   (01)2 = 1 (02)2 = 4 (03)2 = 9 (04)2 = 16 (05)2 = 25 (06)2 = 36 (07)2 = 49 (08)2 = 64 (09)2 = 81 (10)2 = 100 (11)2 = 121 (12)2 = 144 (13)2 = 169 (14)2 = 196 (15)2 = 225 (16)2 = 256 (17)2 = 289 (18)2 = 324 (19)2 = 361 (20)2 = 400 (21)2 = 441 (22)2 = 484 (23)2 = 529 (24)2 = 576 (25)2 = 625 (26)2 = 676 (27)2 = 729 (28)2 = 784 (29)2 = 841 (30)2 = 900 (31)2 = 961 (32)2 = 1024 (33)2 = 1089 (34)2 = 1156 (35)2 = 1225 (36)2 = 1296 (37)2 = 1369 (38)2 = 1444 (39)2 = 1521 (40)2 = 1600 (41)2 = 1681 (42)2 = 1769 (43)2 = 1849 (4...