I was browsing some pens on Codepen and then I came across this beautiful design and thus I shared this. Have look what will happen if nuclear war starts. Follow her at @sdras by Sarah Drasner The content on this page is of public domain.

I was browsing some pens on Codepen and then I came across this beautiful design and thus I shared this. Have look what will happen if nuclear war starts. Follow her at @sdras by Sarah Drasner The content on this page is of public domain.
In an article before we talked about packages to test dependency security vulnerability for php, node and ROR packages. In this tutorial we are going to talk about python dependency security vulnerability checker which can be very useful for checking security loopholes in python projects which are listed by the open source community. The package we are going to
Micro-interaction animations are the small events that happens when you do some very small things like hover click e.t.c. Today we will see some awesome micro-interaction design. These are not build by me but by different people, you can follow these people mentioned at the end. I am just show casing it here. Everything shown
Role Based Access Control is a system in which you give particular permissions to particular users based on their roles. In this article we will try making simple role based access control for your application. Our RBAC will make use of only 5 tables. I guess this is enough if your making it real simple.
Hey folks so this post is not about technology or history but in this article I will share what I learned in my first 100 days of blogging. Most of these times I kept on experimenting with different things to get better traffic and trust me its not easy as it seems by reading about
[sgmb id=3] When we talk about a software development, it contains the events that start from idea to model designing to first user registration and further improvements. In this article we are gonna talk about the tools that you will need at different stage of software development. Sketch: This is one of the most awesome
[sgmb id=3] In this article we are going to discuss about the packages that we can use to detect the vulnerabilities in dependencies. Most of the packages try to match the packages from the NVD [ National Vulnerability Database ] which is maintained by the US government. Lets start with the packages that we can
[sgmb id=3] So, I have been in one of the tech talks and there I got to know about this methodology named domain driven development. It was first described by Eric Evans and from then the domain driven development philosophy came into picture. So what really is this philosophy The idea is to focus on
[sgmb id=3] By following the below you can optimize the Javascript code for performance. For more insight follow the links mentioned in the article. Minimize DOM access, and try to work as much as possible in JavaScript code. Use local variables to store DOM references you’ll access repeatedly. Be careful when dealing with
Risk, lets define it first in our terms. So risk is something that we intend to do to get out of difficult situation or to achieve something bigger. Everyone in this world is going after money, everyone and if he is saying he is not then I don’t now he may be lying. There is