New codingmarks published in week 45of 2018


Octocat Save up to a workweek a year by efficiently managing your coding bookmarks, aka #codingmarks, on www.codingmarks.org. Share your favorites with the community and they will be published weekly on Github. Help us build the programming-resources location - Star


New codingmarks added in week 45 of 2018. Hot topics include:

agile

James Shore: Agile-Book

Welcome to the The Art of Agile Development book site! Here, you’ll find a cornucopia of bonus material, such as downloadable posters, behind-the-scenes material, and new insights.


Agile in Practice: Pair Programming - YouTube

  • published on:  2011-05-02
  • tags:   agile

This video on pair programming is part of an ongoing series of short videos covering common Agile Practices.


api

The Nuts and Bolts of API Security: Protecting Your Data at All Times - YouTube

Nice introduction (just introduction) to oauth, openid-connect, possible use for securing microservices…


API Keys ≠ Security: Why API Keys Are Not Enough

Youtube video

API Keys are not security. By design they lack granular control, and there are many vulnerabilities at stake: applications that contain keys can be decompiled to extract keys, or deobfuscated from on-device storage, plaintext files can be stolen for unapproved use, and password managers are susceptible to security risks as with any application. In this piece we outline the disadvantages of solely relying on API keys to secure the proper access to your data.


docker

Docker Official Image packaging for MongoDB

Docker Official Image packaging for MongoDB.


Official Docker Image for Node.js

The official Node.js docker image, made with love by the node community.


Dockerizing a Node.js and MongoDB App – XOOR – Medium

Docker has become an extremely popular tool not only among DevOps and Infrastructure people, but also for the daily work of any developer. Simple with examples for beginners.


The Basics of the Docker Run Command

  • published on:  2017-08-22
  • tags:   docker

Get back to the basics and explore a few simple docker run examples. Here, we demonstrate various ways to start a container instance.


docker-compose

Dockerizing a Node.js and MongoDB App – XOOR – Medium

Docker has become an extremely popular tool not only among DevOps and Infrastructure people, but also for the daily work of any developer. Simple with examples for beginners.


expressjs

Dockerizing a Node.js and MongoDB App – XOOR – Medium

Docker has become an extremely popular tool not only among DevOps and Infrastructure people, but also for the daily work of any developer. Simple with examples for beginners.


extreme-programming

Mocks Aren’t Stubs

The article addresses among other things the following:

  • The Difference Between Mocks and Stubs
  • Classical and Mockist Testing
  • driving TDD

free-programming-books

James Shore: Agile-Book

Welcome to the The Art of Agile Development book site! Here, you’ll find a cornucopia of bonus material, such as downloadable posters, behind-the-scenes material, and new insights.


git

linux - Git keeps asking me for my ssh key passphrase - Stack Overflow

Once you have started the SSH agent with:

$ eval $(ssh-agent)

You have to add your private key to it $ ssh-add - this will ask you your passphrase just once, and then you should be allowed to push, provided that you uploaded the public key to Github.

To save key permanently: $ ssh-add -K - this will persist it after you close and re-open it by storing it in user’s keychain.


java

Why getter and setter methods are evil

  • published on:  2003-09-05
  • tags:   java

The getter/setter idiom is a commonplace feature in many Java programs. Most of these accessor methods, however, are unnecessary and can severely impact your systems’ maintainability. Using accessors violates the basic object-oriented (OO) principle of encapsulation, so you should avoid them. This article discusses getter/setter cons and offers an alternative design methodology.


microservices

The Nuts and Bolts of API Security: Protecting Your Data at All Times - YouTube

Nice introduction (just introduction) to oauth, openid-connect, possible use for securing microservices…


mocking

Mocks Aren’t Stubs

The article addresses among other things the following:

  • The Difference Between Mocks and Stubs
  • Classical and Mockist Testing
  • driving TDD

The little mocker

It’s a conversation about mocking where the different test doubles (that is stubs, spies and mocks) and fakes are explained. The author also presents his way of “mocking” things, relying less on mocking frameworks like Mockito and co…


mongodb

Docker Official Image packaging for MongoDB

Docker Official Image packaging for MongoDB.


Dockerizing a Node.js and MongoDB App – XOOR – Medium

Docker has become an extremely popular tool not only among DevOps and Infrastructure people, but also for the daily work of any developer. Simple with examples for beginners.


nodejs

Official Docker Image for Node.js

The official Node.js docker image, made with love by the node community.


Dockerizing a Node.js and MongoDB App – XOOR – Medium

Docker has become an extremely popular tool not only among DevOps and Infrastructure people, but also for the daily work of any developer. Simple with examples for beginners.


oauth2

The Nuts and Bolts of API Security: Protecting Your Data at All Times - YouTube

Nice introduction (just introduction) to oauth, openid-connect, possible use for securing microservices…


openid-connect

The Nuts and Bolts of API Security: Protecting Your Data at All Times - YouTube

Nice introduction (just introduction) to oauth, openid-connect, possible use for securing microservices…


rest

API Keys ≠ Security: Why API Keys Are Not Enough

Youtube video

API Keys are not security. By design they lack granular control, and there are many vulnerabilities at stake: applications that contain keys can be decompiled to extract keys, or deobfuscated from on-device storage, plaintext files can be stolen for unapproved use, and password managers are susceptible to security risks as with any application. In this piece we outline the disadvantages of solely relying on API keys to secure the proper access to your data.


security

The Nuts and Bolts of API Security: Protecting Your Data at All Times - YouTube

Nice introduction (just introduction) to oauth, openid-connect, possible use for securing microservices…


API Keys ≠ Security: Why API Keys Are Not Enough

Youtube video

API Keys are not security. By design they lack granular control, and there are many vulnerabilities at stake: applications that contain keys can be decompiled to extract keys, or deobfuscated from on-device storage, plaintext files can be stolen for unapproved use, and password managers are susceptible to security risks as with any application. In this piece we outline the disadvantages of solely relying on API keys to secure the proper access to your data.


spy

The little mocker

It’s a conversation about mocking where the different test doubles (that is stubs, spies and mocks) and fakes are explained. The author also presents his way of “mocking” things, relying less on mocking frameworks like Mockito and co…


ssh

linux - Git keeps asking me for my ssh key passphrase - Stack Overflow

Once you have started the SSH agent with:

$ eval $(ssh-agent)

You have to add your private key to it $ ssh-add - this will ask you your passphrase just once, and then you should be allowed to push, provided that you uploaded the public key to Github.

To save key permanently: $ ssh-add -K - this will persist it after you close and re-open it by storing it in user’s keychain.


stub

Mocks Aren’t Stubs

The article addresses among other things the following:

  • The Difference Between Mocks and Stubs
  • Classical and Mockist Testing
  • driving TDD

The little mocker

It’s a conversation about mocking where the different test doubles (that is stubs, spies and mocks) and fakes are explained. The author also presents his way of “mocking” things, relying less on mocking frameworks like Mockito and co…


tdd

Mocks Aren’t Stubs

The article addresses among other things the following:

  • The Difference Between Mocks and Stubs
  • Classical and Mockist Testing
  • driving TDD

testing

Mocks Aren’t Stubs

The article addresses among other things the following:

  • The Difference Between Mocks and Stubs
  • Classical and Mockist Testing
  • driving TDD

The little mocker

It’s a conversation about mocking where the different test doubles (that is stubs, spies and mocks) and fakes are explained. The author also presents his way of “mocking” things, relying less on mocking frameworks like Mockito and co…


Adrian Matei

Adrian Matei
Life force expressing itself as a coding capable human being

How I save a workweek a year by efficiently managing my codingmarks

Finding a desired link, you already visited, can be a tedious job and sometimes even frustrating. It normally takes 30 seconds or more to look for a link the traditional way, and I do that at least 20 times a day. With codingmarks.org it takes about 10 seconds, so I get a time saving of around 20 * 20 / 60 = 6.66 minutes a day. Over a year's time this translates to around 40+ hours of saved time. Continue reading

New codingmarks published in week 52 of 2018

Published on January 01, 2019