Communities

Writing
Writing
Codidact Meta
Codidact Meta
The Great Outdoors
The Great Outdoors
Photography & Video
Photography & Video
Scientific Speculation
Scientific Speculation
Cooking
Cooking
Electrical Engineering
Electrical Engineering
Judaism
Judaism
Languages & Linguistics
Languages & Linguistics
Software Development
Software Development
Mathematics
Mathematics
Christianity
Christianity
Code Golf
Code Golf
Music
Music
Physics
Physics
Linux Systems
Linux Systems
Power Users
Power Users
Tabletop RPGs
Tabletop RPGs
Community Proposals
Community Proposals
tag:snake search within a tag
answers:0 unanswered questions
user:xxxx search by author id
score:0.5 posts with 0.5+ score
"snake oil" exact phrase
votes:4 posts with 4+ votes
created:<1w created < 1 week ago
post_type:xxxx type of post
Search help
Notifications
Mark all as read See all your notifications »

Welcome to Software Development on Codidact!

Will you help us build our independent community of developers helping developers? We're small and trying to grow. We welcome questions about all aspects of software development, from design to code to QA and more. Got questions? Got answers? Got code you'd like someone to review? Please join us.

Activity for Alexei‭

Type On... Excerpt Status Date
Answer A: What is an example for a URI which is not a URL?
This article shows in a concise and graphical way the difference between URIs and URLs. > A URI is an identifier of a specific resource. Like a page, or book, or a document. > A URL is special type of identifier that also tells you how to access it, such as HTTPs, FTP, etc.—like https://www....
(more)
over 3 years ago
Edit Post #281528 Post edited:
added relevant tag
over 3 years ago
Edit Post #281530 Initial revision over 3 years ago
Answer A: How are we supposed to give feedback for poor questions if such comments are deleted?
Providing feedback can be done using comments. However, these comments are supposed to add constructive criticism and/or links to relevant resources. Your first comment does exactly this and it is a useful one. However, the subsequent comments seem to be a debate around available Wikipedia transla...
(more)
over 3 years ago
Comment Post #281517 This is a very relevant article on this topic: https://danielmiessler.com/study/difference-between-uri-url/ . A quick answer to your question: a book identifier (ISBN - ...) is an URI which is not an URL.
(more)
over 3 years ago
Comment Post #281517 I have removed the comments that are not relevant. Please use comments to ask for clarifications or generally speaking, to improve the question.
(more)
over 3 years ago
Comment Post #281448 @artaxerxe‭ If you don't need to compute this too often and the data volume is pretty low (<100K records, also depends on the frequency), you can fetch all the required data in the application layer and implement the algorithm there. Languages such as Java or C# are better equipped for recursivity, t...
(more)
over 3 years ago
Comment Post #281232 @JDB The N/A case is typically approached by having the form field not required. So, you either enter a valid URL or nothing at all. This leads to consistent results (either "" or a valid URL), as people might write things like N/A, - , none etc.
(more)
over 3 years ago
Comment Post #281506 I think the issue is this one: https://github.com/codidact/qpixel/issues/268
(more)
over 3 years ago
Edit Post #281486 Post edited:
over 3 years ago
Comment Post #281491 We can [blame the cache](https://shouldiblamecaching.com/) for this issue. Entering edit mode for the questions indeed displays C++ tag in the list. Related: https://software.codidact.com/posts/278952
(more)
over 3 years ago
Comment Post #281486 @Istiak Code golf is about solving problems with the least amount of code (bytes). The software development community is (among others) about getting solutions to programming problems.
(more)
over 3 years ago
Comment Post #281484 I have edited the title because "really exists" is quite hard to answer objectively. A simple search indicates that they exist, but it is not very clear what they are. Also, it would be useful to indicate the source where you read about these languages.
(more)
over 3 years ago
Edit Post #281484 Post edited:
Made the title a little bit clear
over 3 years ago
Edit Post #281464 Post edited:
added relevant tag
over 3 years ago
Edit Post #281301 Nominated for promotion over 3 years ago
Edit Post #281341 Nominated for promotion over 3 years ago
Edit Post #281415 Nominated for promotion over 3 years ago
Comment Post #281448 @PeterTaylor - While I have experience writing stored procedures, I am also aware of [the many disadvantages](https://stackoverflow.com/a/9483781/2780791) that they might bring in the project. AFAIK, unless there is a really serious reason to incorporate business logic in a stored procedure (e.g. avo...
(more)
over 3 years ago
Edit Post #281448 Post undeleted over 3 years ago
Edit Post #281448 Post edited:
over 3 years ago
Edit Post #281448 Post edited:
over 3 years ago
Edit Post #281448 Post deleted over 3 years ago
Edit Post #281448 Post edited:
over 3 years ago
Edit Post #281448 Post edited:
over 3 years ago
Edit Post #281448 Initial revision over 3 years ago
Answer A: How to break infinite loop in CTE
Estela's answer provides great insight about how to do it also in SQL Server. Unfortunately, there does not seem to be a build-in array functionality, so one way is to rely on strings as shown here. Basically, instead of accumulating values in an array, a string does this (way less efficiently for...
(more)
over 3 years ago
Edit Post #281385 Post edited:
over 3 years ago
Comment Post #281385 Is "What elements should an authentication module include"? a suitable title (summary) for your post? I think the post's body suggestion such a summary (or similar).
(more)
over 3 years ago
Comment Post #281385 Possible interesting reading: https://cybersecurity.ieee.org/blog/2016/06/02/design-best-practices-for-an-authentication-system/
(more)
over 3 years ago
Edit Post #281381 Initial revision over 3 years ago
Question How to work with current entity changes when working with @ngrx/store and @ngrx/entity?
I am fairly new to working with @ngrx pattern in Angular which is a state management pattern relying on Reactive Extensions. One of the convenient structures is @ngrx/entity which helps with managing record collections. One typical scenario in the application is to access of list of Foos and...
(more)
over 3 years ago
Edit Post #281365 Question closed over 3 years ago
Comment Post #281365 Unfortunately, this question is offtopic here as well, since it is not related to software development. Please, read [this help page](https://software.codidact.com/help/on-topic) for more details about what is on-topic and offtopic in this community.
(more)
over 3 years ago
Edit Post #281341 Post edited:
added relevant tag
over 3 years ago
Comment Post #281315 Ideally, always knowing created by and created on behalf of might be useful, but the whole impersonation thing is kind of an edge case. It is a necessary evil to quicker reproduce issues coming from the users and very few are able to activate it. All other flows should be executed with impersonation ...
(more)
over 3 years ago
Comment Post #281308 As currently written, I also think this belongs more to meta than the main site. I will try to figure out a way to migrate it there and reopen it (have an issue with migration due to meta tags).
(more)
over 3 years ago
Comment Post #281304 "As we do it: with logging" - this indeed seems to be the best approach. Just had a conversation with my boss and confirmed that such a solution was used for an important product that was externally audited. The audit said it is fine to allow users to fully impersonate someone else as long everything...
(more)
over 3 years ago
Edit Post #281301 Initial revision over 3 years ago
Question How to properly deal with impersonation in a Web application? (security vs. usefulness for tech support)
Context Our team has begun migrating a pretty old internal application and one aspect that got my attention is the impersonation. This is implemented as follows: - only administrators are allowed to impersonate someone else - impersonation means setting the current session user to the imperso...
(more)
over 3 years ago
Comment Post #281192 @DerekElkins Yes, this can also happen and a smoke is complementary to the deployment using migrations. Also, production has a health monitoring in place which also checks that SELECTs can be performed against the database.
(more)
over 3 years ago
Comment Post #281288 Besides the nice lexicographic order you get by default with YYYY-mm-dd, the timestamps are often extended with hour, minute, seconds, milliseconds. By starting with the year , adding them is done in a consistent way (see [this](https://www.w3.org/TR/NOTE-datetime)).
(more)
over 3 years ago
Comment Post #281253 That playground is awesome. Also, I think that grouping the affected controls in a FormGroup makes perfect sense. Thanks.
(more)
over 3 years ago
Comment Post #281200 Storing function names in string and dynamically invoking those functions is not actually a nice thing (the linter and the transpiler cannot check if these functions actually exist). That's why I am asking if by chance I have missed something and had to rely on such a solution.
(more)
over 3 years ago
Edit Post #281232 Initial revision over 3 years ago
Answer A: Not obligating http:// or https:// in a url field of a contact form
`input type="url"` works like this by design: > An empty string ("") indicating that the user did not enter a value or that the value was removed. > A single properly-formed absolute URL. This doesn't necessarily mean the URL address exists, but it is at least formatted correctly. In simple te...
(more)
over 3 years ago
Comment Post #281202 @JohnDoea The first example (using fetch API) should replace your code using xhr. The example hardcodes the method (POST), but you can replace it if your own.
(more)
over 3 years ago
Edit Post #281202 Post edited:
added the jQuery way
over 3 years ago
Edit Post #281202 Initial revision over 3 years ago
Answer A: Submitting a form via XHR/AJAX causes partial data arrival to email inbox (only HTML without input)
I am guessing a little here. By not preventingdefault, the form will POST the data to the server. If you switch to AJAX you have to provide the body as per documentation. However, I do not remember to ever using the XMLHttpRequest directly, because there are wrappers to help you. One example us...
(more)
over 3 years ago