Software development blog

ReasonML – the new way of escaping JavaScript runtime exceptions

3 votes, average: 5.00 out of 53 votes, average: 5.00 out of 53 votes, average: 5.00 out of 53 votes, average: 5.00 out of 53 votes, average: 5.00 out of 5
screenshot-2
JavaScript is a great tool for quick prototyping and developing smallscale applications, but this speed comes at a price. Dynamic types have a huge impact on the codebase. This starts from a significant amount of manual type checking and tests to ...

Using private DNS-server with Bind 9

1 vote, average: 5.00 out of 51 vote, average: 5.00 out of 51 vote, average: 5.00 out of 51 vote, average: 5.00 out of 51 vote, average: 5.00 out of 5
image1
DNS or Domain Name System handles translating domain names to IP-addresses. We can also configure it to do the opposite — resolve IP-addresses to domain names. BIND or BIND 9 is an open source implementation of DNS, available for almost all ...

Reactive Programming with Java

1 vote, average: 4.00 out of 51 vote, average: 4.00 out of 51 vote, average: 4.00 out of 51 vote, average: 4.00 out of 51 vote, average: 4.00 out of 5
java
Most of the conversations about reactive programming didn’t accurately convey its meaning. In fact, reactive programming is aimed at effective resource use, asynchrony and non-blocking. Reactive Stream API Reactive streams are ...

Graphic Pipeline in Game Dev: Concept Art

4 votes, average: 3.00 out of 54 votes, average: 3.00 out of 54 votes, average: 3.00 out of 54 votes, average: 3.00 out of 54 votes, average: 3.00 out of 5
ascqc
The wonderful world of computer games seems to a layman a beautiful fairy tale. But the creation of beautiful and juicy games is a complicated and long process that requires the work of an army of artists. The development adheres to the concept ...

Functional Programming in Swift

6 votes, average: 5.00 out of 56 votes, average: 5.00 out of 56 votes, average: 5.00 out of 56 votes, average: 5.00 out of 56 votes, average: 5.00 out of 5
1_nbub8ojskeqw7tjctcgxfw
When and why functional programming(FP)? Swift combines several programming paradigms like object-oriented, protocol-oriented and functional programming. In this article, we will discuss the last one which provides flexibility in developing ...

MongoDB Atlas — Cloud Solution

0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5
mongodbatlas
MongoDB Atlas is a fully managed cloud database as a service. Pricing MongoDB Atlas provides you with a free tier(permanent usage) and gives you 512mb disk storage, so it should be enough for you to test it in different ways, understand what ...

Comparison of Relational and Graph Databases on the Example of Neo4j and PostgreSQL in the Context of Spring Data

2 votes, average: 5.00 out of 52 votes, average: 5.00 out of 52 votes, average: 5.00 out of 52 votes, average: 5.00 out of 52 votes, average: 5.00 out of 5
pic
Conceptual Differences of Models First, let’s have a look at these two approaches and determine why and when we need to use graph databases instead of relational ones in enterprise Java products. A relational model is a collection of data which ...

How to Use Android Fingerprint Security

2 votes, average: 5.00 out of 52 votes, average: 5.00 out of 52 votes, average: 5.00 out of 52 votes, average: 5.00 out of 52 votes, average: 5.00 out of 5
1
PIN authentication fades into the background because fingerprint authentication is more quickly and comfortable for application users. According to Androidauthority, over 70 percent of smartphones shipped in 2018 will have fingerprint sensors ...

Ways to Attack Your Web Application

1 vote, average: 3.00 out of 51 vote, average: 3.00 out of 51 vote, average: 3.00 out of 51 vote, average: 3.00 out of 51 vote, average: 3.00 out of 5
ways-to-attack
There are a lot of security issues web developers have to keep in mind during constructing a web application. If your application works with personal data, banks or cryptocurrencies – this information is a good starting point. Every vulnerability ...
Share
Share