If we think about advanced website development, sooner or later we’ll deal with JavaScript Task Runners. One of them is Gulp – a library available in NPM, which enables us to significantly automate our work. Gulp facilitates a compilation of Sass or Less files to CSS format; it allows to use Autoprefixer (a tool that will ensure the compatibility of our CSSs with multiple browsers) as well as to watch the progress of our work in many browsers/ devices in real time.
Strona głównaUżytkownik
FutureProcessing | użytkownik
The current state of front-end software development is great, and considering how active the open source community is, the future looks very promising. In this article we will show how to transfer back-end practices to front-end development and list the benefits of doing so.
The previous article presented virtualization as an amazing tool ensuring optimal conditions for application development so that the local environment reflect the configurations of the production infrastructure. In addition, this application is extremely useful for administrators who want to test planned changes to the configuration and correctness of provisioning processes.
The previous part presented information about provisioning and the tools allowing automating configuration management process. This software, beside preparing server infrastructure, can also be used to prepare developers’ local working environment.
The following article is the first one of a series of three texts raising the subject of automation of distributed infrastructure in web projects. In recent years, DevOps has gained significant popularity because it allows to use best practices known by developers in the world of system administrators and vice versa.
During this year’s Testwarez 2015, we had opportunity to lead a panel discussion about testing in agile teams.
In this short article I would like to say a few words about the phenomenon of code biodegradation and present you some tips on how to deal with it, so that your everyday work doesn’t become a real ordeal over time.
This is the second one of two posts concerning approach to build cost effective, but prepared for scaling, systems using ASP.NET Web API and Azure.
Architektura 3345 dni, 19 godzin, 51 minut temu 175 źrodło rozwiń
This is the first one of two posts concerning approach to build cost effective, but prepared for scaling systems, using ASP.NET Web API and Azure. In the era of building systems that aim to provide services at global scale, requirements for scalability and high availability are becoming our bread and butter. What is more, it is absolutely normal that stakeholders want first shippable version of software as soon as possible.
Architektura 3360 dni, 7 godzin, 1 minutę temu 170 źrodło rozwiń
In this post we’ll focus on security. We’ll try to prove that claims base authentication is safe. As we remember SAML tokens are issued by “trusted” STS. But what exactly does “trusted” issuer mean? In this post, we’ll try to find definition of “trusted issuer”, a list of attributes which decide that issuer is trusted.
Architektura 3365 dni, 9 godzin, 18 minut temu 104 źrodło rozwiń
In 1994 Robert “Uncle Bob” Martin proposed a group of object-oriented metrics that are popular until now. Those metrics, unlike other object-oriented ones don’t represent the full set of attributes to assess individual object-oriented design, they only focus on the relationship between packages in the project.
In this article we focus on sample service based on WCF (Windows Communication Foundation), as we will only try to build sample service with claims-based authentication and authorization. All technical aspects connected with security e.g. configuration, certificates, encryption, signature or CRL will be described in details in the next posts.
Architektura 3436 dni, 7 godzin, 59 minut temu 146 źrodło rozwiń
Have you ever written a program with such a complex algorithm that despite of using all processor cores the implementation wasn’t efficient enough? If yes, this is the moment you should consider using a more efficient device than CPU.
Sztuka programowania 3442 dni, 6 godzin, 19 minut temu 209 źrodło rozwiń
My motivation for writing this article is to show that even a small new feature can have impact on the overall site availability. You can try to use right technology. How to do this? The answer is as usual ‘it all depends’. What I would like to do, in this article, is not to provide the final answer, but to show you options, solutions and ideas for a given use case.
In the previous article basic information about authentication and authorization process on .Net has been presented. Security Token Service is an integral part of claim based approach. As we remember from the previous article, STS is responsible for handling user’s requests and creating tokens; it can also work in two modes: active and passive. In this article we focus on Active STS, as we will only try to build sample STS.
Architektura 3470 dni, 19 godzin, 22 minuty temu 167 źrodło rozwiń
I have started to think, what is the reason that people see it as hard and complex at the beginning? I have a theory: it has rules! Entering the world with rules is always uncomfortable, we need to adjust to rules. In this post I’d like to prove that in this case those rules are quite digestible.On the way to CQRS… Basically, we can say that CQRS is an implementation of Command Query Separation principle to the architecture of software. What I noticed during my work in this approach is that there is a c...
Architektura 3499 dni, 19 godzin, 40 minut temu 304 źrodło rozwiń
TL;DR 1. Define events in the system Define sources (commands, process managers) and actors Group commands around aggregates Implement… Post-it, long piece of paper and people…Let’s play Generally speaking „event storming” is about extracting domain from events which describe it. In most of the complex domains there are events that represent important changes in the state of our domain, simply begin with them. We’ll need the following things:Unlimited modelling space – sounds impossibl...
Architektura 3515 dni, 7 godzin, 23 minuty temu 197 źrodło rozwiń
Stylistic conventions My approach to them is the following: as far as they are, their content is of minor importance to me, however it is more comfortable to use standards that apply in a given environment. In example, in C#, brackets usually appear in the new line, contrary to JS/Java. In my opinion, stylistic conventions should be practical, which means that they should be supported by tools that we use, such as VS, R#, StyleCop, jsHint etc. It is important not to stand up against the default IDE fo...
Sztuka programowania 3537 dni, 7 godzin, 4 minuty temu 98 źrodło rozwiń
Authentication and Authorization Authentication and authorization are two closely related concepts, which are used to build security mechanism in systems and applications. Information security is the practice of protecting information from unauthorized access, use or even modification. Confidentiality, integrity and availability (known as CIA triad) is a model designed to guide policies of information security within an organization. In this article we are focusing on confidentiality, which refers to re...
Architektura 3541 dni, 5 godzin, 51 minut temu 125 źrodło rozwiń
A set of Selenium Grid 2, WebDriver, Gallio and Mbunit may very well prove themselves as a distributed automated testing environment and alternative for Jenkins Slave. Once properly configured environment enables to obtain information on the quality of the product throughout the SDLC. Thus, solving the problem of time testing and the diversity of environment in which those tests were run.