Welcome to Software Development on Codidact!
Will you help us build our independent community of developers helping developers? We're small and trying to grow. We welcome questions about all aspects of software development, from design to code to QA and more. Got questions? Got answers? Got code you'd like someone to review? Please join us.
Activity for Alexei
Type | On... | Excerpt | Status | Date |
---|---|---|---|---|
Answer | — |
A: What is an example for a URI which is not a URL? This article shows in a concise and graphical way the difference between URIs and URLs. > A URI is an identifier of a specific resource. Like a page, or book, or a document. > A URL is special type of identifier that also tells you how to access it, such as HTTPs, FTP, etc.—like https://www.... (more) |
— | over 3 years ago |
Edit | Post #281528 |
Post edited: added relevant tag |
— | over 3 years ago |
Edit | Post #281530 | Initial revision | — | over 3 years ago |
Answer | — |
A: How are we supposed to give feedback for poor questions if such comments are deleted? Providing feedback can be done using comments. However, these comments are supposed to add constructive criticism and/or links to relevant resources. Your first comment does exactly this and it is a useful one. However, the subsequent comments seem to be a debate around available Wikipedia transla... (more) |
— | over 3 years ago |
Comment | Post #281517 |
This is a very relevant article on this topic: https://danielmiessler.com/study/difference-between-uri-url/ . A quick answer to your question: a book identifier (ISBN - ...) is an URI which is not an URL. (more) |
— | over 3 years ago |
Comment | Post #281517 |
I have removed the comments that are not relevant. Please use comments to ask for clarifications or generally speaking, to improve the question. (more) |
— | over 3 years ago |
Comment | Post #281448 |
@artaxerxe If you don't need to compute this too often and the data volume is pretty low (<100K records, also depends on the frequency), you can fetch all the required data in the application layer and implement the algorithm there. Languages such as Java or C# are better equipped for recursivity, t... (more) |
— | over 3 years ago |
Comment | Post #281232 |
@JDB The N/A case is typically approached by having the form field not required. So, you either enter a valid URL or nothing at all. This leads to consistent results (either "" or a valid URL), as people might write things like N/A, - , none etc. (more) |
— | over 3 years ago |
Comment | Post #281506 |
I think the issue is this one: https://github.com/codidact/qpixel/issues/268 (more) |
— | over 3 years ago |
Edit | Post #281486 |
Post edited: |
— | over 3 years ago |
Comment | Post #281491 |
We can [blame the cache](https://shouldiblamecaching.com/) for this issue. Entering edit mode for the questions indeed displays C++ tag in the list. Related: https://software.codidact.com/posts/278952 (more) |
— | over 3 years ago |
Comment | Post #281486 |
@Istiak Code golf is about solving problems with the least amount of code (bytes). The software development community is (among others) about getting solutions to programming problems. (more) |
— | over 3 years ago |
Comment | Post #281484 |
I have edited the title because "really exists" is quite hard to answer objectively. A simple search indicates that they exist, but it is not very clear what they are. Also, it would be useful to indicate the source where you read about these languages. (more) |
— | over 3 years ago |
Edit | Post #281484 |
Post edited: Made the title a little bit clear |
— | over 3 years ago |
Edit | Post #281464 |
Post edited: added relevant tag |
— | over 3 years ago |
Edit | Post #281301 | Nominated for promotion | — | over 3 years ago |
Edit | Post #281341 | Nominated for promotion | — | over 3 years ago |
Edit | Post #281415 | Nominated for promotion | — | over 3 years ago |
Comment | Post #281448 |
@PeterTaylor - While I have experience writing stored procedures, I am also aware of [the many disadvantages](https://stackoverflow.com/a/9483781/2780791) that they might bring in the project. AFAIK, unless there is a really serious reason to incorporate business logic in a stored procedure (e.g. avo... (more) |
— | over 3 years ago |
Edit | Post #281448 | Post undeleted | — | over 3 years ago |
Edit | Post #281448 |
Post edited: |
— | over 3 years ago |
Edit | Post #281448 |
Post edited: |
— | over 3 years ago |
Edit | Post #281448 | Post deleted | — | over 3 years ago |
Edit | Post #281448 |
Post edited: |
— | over 3 years ago |
Edit | Post #281448 |
Post edited: |
— | over 3 years ago |
Edit | Post #281448 | Initial revision | — | over 3 years ago |
Answer | — |
A: How to break infinite loop in CTE Estela's answer provides great insight about how to do it also in SQL Server. Unfortunately, there does not seem to be a build-in array functionality, so one way is to rely on strings as shown here. Basically, instead of accumulating values in an array, a string does this (way less efficiently for... (more) |
— | over 3 years ago |
Edit | Post #281385 |
Post edited: |
— | over 3 years ago |
Comment | Post #281385 |
Is "What elements should an authentication module include"? a suitable title (summary) for your post? I think the post's body suggestion such a summary (or similar). (more) |
— | over 3 years ago |
Comment | Post #281385 |
Possible interesting reading: https://cybersecurity.ieee.org/blog/2016/06/02/design-best-practices-for-an-authentication-system/ (more) |
— | over 3 years ago |
Edit | Post #281381 | Initial revision | — | over 3 years ago |
Question | — |
How to work with current entity changes when working with @ngrx/store and @ngrx/entity? I am fairly new to working with @ngrx pattern in Angular which is a state management pattern relying on Reactive Extensions. One of the convenient structures is @ngrx/entity which helps with managing record collections. One typical scenario in the application is to access of list of Foos and... (more) |
— | over 3 years ago |
Edit | Post #281365 | Question closed | — | over 3 years ago |
Comment | Post #281365 |
Unfortunately, this question is offtopic here as well, since it is not related to software development. Please, read [this help page](https://software.codidact.com/help/on-topic) for more details about what is on-topic and offtopic in this community. (more) |
— | over 3 years ago |
Edit | Post #281341 |
Post edited: added relevant tag |
— | over 3 years ago |
Comment | Post #281315 |
Ideally, always knowing created by and created on behalf of might be useful, but the whole impersonation thing is kind of an edge case. It is a necessary evil to quicker reproduce issues coming from the users and very few are able to activate it. All other flows should be executed with impersonation ... (more) |
— | over 3 years ago |
Comment | Post #281308 |
As currently written, I also think this belongs more to meta than the main site. I will try to figure out a way to migrate it there and reopen it (have an issue with migration due to meta tags). (more) |
— | over 3 years ago |
Comment | Post #281304 |
"As we do it: with logging" - this indeed seems to be the best approach. Just had a conversation with my boss and confirmed that such a solution was used for an important product that was externally audited. The audit said it is fine to allow users to fully impersonate someone else as long everything... (more) |
— | over 3 years ago |
Edit | Post #281301 | Initial revision | — | over 3 years ago |
Question | — |
How to properly deal with impersonation in a Web application? (security vs. usefulness for tech support) Context Our team has begun migrating a pretty old internal application and one aspect that got my attention is the impersonation. This is implemented as follows: - only administrators are allowed to impersonate someone else - impersonation means setting the current session user to the imperso... (more) |
— | over 3 years ago |
Comment | Post #281192 |
@DerekElkins Yes, this can also happen and a smoke is complementary to the deployment using migrations. Also, production has a health monitoring in place which also checks that SELECTs can be performed against the database. (more) |
— | over 3 years ago |
Comment | Post #281288 |
Besides the nice lexicographic order you get by default with YYYY-mm-dd, the timestamps are often extended with hour, minute, seconds, milliseconds. By starting with the year , adding them is done in a consistent way (see [this](https://www.w3.org/TR/NOTE-datetime)). (more) |
— | over 3 years ago |
Comment | Post #281253 |
That playground is awesome. Also, I think that grouping the affected controls in a FormGroup makes perfect sense. Thanks. (more) |
— | over 3 years ago |
Comment | Post #281200 |
Storing function names in string and dynamically invoking those functions is not actually a nice thing (the linter and the transpiler cannot check if these functions actually exist). That's why I am asking if by chance I have missed something and had to rely on such a solution. (more) |
— | over 3 years ago |
Edit | Post #281232 | Initial revision | — | over 3 years ago |
Answer | — |
A: Not obligating http:// or https:// in a url field of a contact form `input type="url"` works like this by design: > An empty string ("") indicating that the user did not enter a value or that the value was removed. > A single properly-formed absolute URL. This doesn't necessarily mean the URL address exists, but it is at least formatted correctly. In simple te... (more) |
— | over 3 years ago |
Comment | Post #281202 |
@JohnDoea The first example (using fetch API) should replace your code using xhr. The example hardcodes the method (POST), but you can replace it if your own. (more) |
— | over 3 years ago |
Edit | Post #281202 |
Post edited: added the jQuery way |
— | over 3 years ago |
Edit | Post #281202 | Initial revision | — | over 3 years ago |
Answer | — |
A: Submitting a form via XHR/AJAX causes partial data arrival to email inbox (only HTML without input) I am guessing a little here. By not preventingdefault, the form will POST the data to the server. If you switch to AJAX you have to provide the body as per documentation. However, I do not remember to ever using the XMLHttpRequest directly, because there are wrappers to help you. One example us... (more) |
— | over 3 years ago |