Framework independent front-end
GoF, Pure Architecture, Perfect Code are the True Programmer’s Handbooks. But in the front-end world, many ideas from these books are not available. At least resemblance to the real world is very difficult to find. Maybe the modern front-end is ahead of time? Maybe “functional”…
Domain Driven Design Tools
The blue whale is a great example of how the design of a complex project went wrong. The whale looks like a fish, but it is a mammal: it feeds the babies with milk, it has hair, and the bones of the forearm and hands…
When to rewrite the project code and how to explain this to the customer
In this article, we will consider a situation where programmers say: “We need to rewrite everything,” but it’s hard to convey it to the customer. We will figure out what to do with this and how to reconcile programmers and business, if you are a…
Kubernetes : our path to microservices and a ready-made template for implementation
It will be interesting to those who develop or transfer the infrastructure to microservices, implement DevOps on top of Kubernetes and go to cloud native in every way. I’ll tell you about our path, at the end of the article I will share our groundwork…
What means “clean code” in 2020?
Developers like to discuss the cleanliness of the code. But at the same time, the very concept of “clean code” does not have a clear definition. The main book on this issue is “Clean Code”, where Robert “Uncle Bob” Martin immediately declares: “how many programmers,…
Features of the assembly and delivery of iOS applications
In this article, we share the experience of assembling and delivering iOS applications to users, which was accumulated in the process of debugging CI / CD. Training Everyone connected with the development of applications for Apple devices has already managed to appreciate the controversial usability…
ActiveDirectory authorization to Kubernetes with Keycloak
In this article I will tell you how to install and configure: Keycloak is an open source project. Which provides a single entry point for applications. It works with many protocols, including the LDAP and OpenID that interest us. Keycloak gatekeeper – reverse proxy application…
Angular: a clear introduction to NGRX
The purpose of this article is to give a clean and clear view of ngrx. To do this, I will explain what you need to know and understand about ngrx, and then we will see it in action with simple and clear code examples. Here…
Service
Categories
- DEVELOPMENT (103)
- DEVOPS (53)
- FRAMEWORKS (26)
- IT (25)
- QA (14)
- SECURITY (13)
- SOFTWARE (13)
- UI/UX (6)
- Uncategorized (8)