Jibba Jabba: Page 3 of 9
Posted byon June 30, 2017, 2:22 p.m.
There's a misconception that security can be added with a product or service, or worked into an existing codebase as an afterthought. However, achieving security requires conscious thought at every step of designing and implementing software, and every decision should take security considerations into account.
Posted byon June 27, 2017, 3:11 p.m.
This summer, I was fortunate to attend the PMI Women in Project Management Leadership Conference. The keynote and panel speakers spoke on a variety of relevant topics, but there was a common theme present: facilitating innovation. The conference provided some valuable insights on how we as project managers can act as effective facilitators to get the most from our teams.
Posted byon June 23, 2017, 3:48 p.m.
Django offers developers the ability to create custom fields that use custom html widgets, but is it possible to build a field that asks a user to provide a number of inputs undetermined before runtime? I'll take a project—the development of a field that allows a user to resolve any URL on the site—and try to answer that question, digging deep into the internals of Django's fields and widgets along the way.
Posted byon June 9, 2017, 2:24 p.m.
There is no "best tool" for project management, but here are some considerations to make sure you choose the right one!
Posted byon April 10, 2017, 5:02 p.m.
Posted byon March 21, 2017, 1:10 p.m.
Sometimes you need to restrict access to a resource without requiring authentication. While authentication is best when possible, Django makes it easy to do either way.
Posted byon Feb. 24, 2017, 11:02 a.m.
Iain Watts gives a talk about what happens in a Python dictionary when you use this seemingly simple object at the Denver Python meetup hosted by Fusionbox.
Posted byon Jan. 27, 2017, 8:40 a.m.
Implementing persistent dynamically generated avatars in Django is super simple!
Posted byon Jan. 26, 2017, 3:09 p.m.
Surprisingly, databases can be used to do graph algorithms. Using Postgres, this post pushes SQL to its Turing Complete limits by using a powerful device called a Recursive CTE to traverse complicated foreign key relationships as if they were directed graphs. It starts out simple and builds up to a query that will topologically sort any acyclic graph.
Posted byon Dec. 12, 2016, 1:26 p.m.
Frequently, logging that an event has taken place is just as important as the event being triggered in the first place. Here's how to use two-phase logging in order to avoid any important gaps in your e-commerce code.