#insideFE slide with @tokimariri. Web App Checklist😉: 💡Rendering patterns 💡CDN 💡Perf Budget 💡a11y 💡PWA 💡WASM in Web Worker 💡Monitoring tools 💡DX (including LGTM!) and so on! 🙌
タグ検索の該当結果が少ないため、タイトル検索結果を表示しています。
CheckList This is a simple checklist, and while it is useful to any software engineer, it is especially useful to senior engineers. # Task Effort Category Impact Task Career Company
Written by Oren Farhi, Front End Engineer Tech Lead, follow me on This article has been translated: Chinese 1 (by Qlly) Chinese 2 (by Qlly) Korean (by Ykss) I bet the need to tweak perfomance comes in a certain phase of development for every developer, in every app. There are very good resources and articles about how to tweak performance in react and this article is no exception. I thought I will
Doing the basics goes a long way in keeping your company and product secure. This third1 edition of the SaaS CTO Security Checklist provides actionable security best practices CTOs (or anyone for that matter) can use to harden their security. This list is far from exhaustive, incomplete by nature since the security you need depends on your company, product, and assets. (e.hasAttribute('open')) ? e
Rust API Guidelines Checklist Naming (crate aligns with Rust naming conventions) Casing conforms to RFC 430 (C-CASE) Ad-hoc conversions follow as_, to_, into_ conventions (C-CONV) Getter names follow Rust convention (C-GETTER) Methods on collections that produce iterators follow iter, iter_mut, into_iter (C-ITER) Iterator type names match the methods that produce them (C-ITER-TY) Feature names are
MJ (Michael James) mj@seattlescrum.com 2022 2 8 https://scrummasterchecklist.org ( ) ” ” “ ” √, ∆, ?, N/A Part I -- ☐ 1 ☐ ☐ ” ” ☐ / https://scrummaster.jp/why-scrum-isnt-making-your-company-very-agile/ 1 Copyright © 2004-2023 Michael James (MJ). Distribute freely without alteration. ☐ INVEST 2 ☐ (Done) ☐ ☐ ☐ ☐ ☐ PBI 3 PBI ☐ Part II -- ☐ : 4 • • https://xp123.com/articles/invest-in-good-stories-and
Summary Introduction 1. Code Linting & SAST 2. Running a security audit with npm audit 3. Integrity checking for JavaScript (SRI) How does it work? 4. Validations, Validations, Validations! 5. Minify and obfuscate your Javascript Conclusion Introduction Javascript is everywhere, It runs inside your browser, astronaut spacesuit, and most developers use it as a client-side and server-side programmin
I now write regularly at www.spakhm.com. Everything new is there! I’ve been tinkering with different startup ideas and needed a good checklist to think through them. There are great templates for this already: The YC application, Amazon’s internal press release, and Sequoia’s Writing a Business Plan. I found myself mixing and tweaking these templates because they don’t exactly match my model of th
The Ultimate Personal Security ChecklistYour guide to securing your digital life and protecting your privacy View on GitHub CloseNo stats yet You'll see your progress here, once you start ticking items off the checklists Get started, by selecting a checklist below
Send feedback Firebase security checklist Stay organized with collections Save and categorize content based on your preferences. To keep your Firebase resources and your users' data secure, follow these guidelines. Not every item will necessarily apply to your requirements, but keep them in mind as you develop your app. Avoid abusive traffic Set up monitoring and alerting for backend services To d
期のOKRを考えるにあたって見つけた記事が面白そうだったので、勉強を兼ねて日本語(超)訳してみました。 「翻訳してよい?」と著者にメールで尋ねたところ、「Go ahead!」と爆速で返信をいただきました。感謝🙏 元記事は各項目のカテゴリやインパクトなどでのフィルタリングができるリッチなフォーマットです。 littleblah.com 誤訳やより良い表現がありましたら、@todokrまで連絡いただけるとうれしいです:D シニアエンジニアのチェックリスト これはシンプルなチェックリストだが、どんなソフトウェアエンジニアにも役に立つ。特にシニアエンジニアに。 自分の仕事のビジネス的側面、そして何がお金を生んでいるかを理解すること。結局はこれが唯一の問題。 自身のチームや企業の採用活動に巻き込まれること。優れた候補者を採用するための高い基準を整備すること。 規模と拡張性、問題の範囲にふさわしいシ
Router Setup and Security Checklist Since 2016, Modemly® is researching and curating Home WiFi Setup and Security guides for 6700 routers from 440 brands Change your WiFi Password Open your web browser and type the default IP Address 192.168.1.1 or 192.168.0.1 in the address bar You will now land in the router login page where you can type a username and a password. If you don't see this page, mak
Hi HN,Does anyone have a list of IT security stuff that you should setup for your early stage startup? Like for example DNSSEC, VPN, forcing employees to use 2-factor etc. https://latacora.micro.blog/2020/03/12/the-soc-starting.html That is specifically written for startups that may have to do SOC2 compliance in the future. But it is a useful starting point for most people. #1: Single Sign-On #2:
Keep track of your migration progress The checklists below are here to help you keep track of your migration work. They define tasks that must be completed with links to instructions. Migration work is broadly divided into five categories as described in the Migration summary. Update the manifest The manifest.json file requires a slightly different format for Manifest V3 than for Manifest V2. This
JSer.info #523 - Snowpack v3.0がリリースされました。 Snowpack 3.0ではPre-bundled Streaming Importsという機能がopt-inで利用できます。 オプションで有効にすると、ローカルでbundleしたファイルではなくSkypackからESM(ECMAScript Modules)をロードできます。 一度ロードしたESMはキャッシュされ、次回からはオフラインでも利用できます。 また、この仕組みでロードするパッケージのバージョンは snowpack.deps.json というファイルで管理できます。 その他には、esbuildを使ったbundleの最適化のサポート、snowpackをJavaScriptから扱うAPIの更新などが含まれています。 Optimize & Bundle for Production JavaScript
Production ChecklistBefore taking your Next.js application to production, there are some optimizations and patterns you should consider implementing for the best user experience, performance, and security. This page provides best practices that you can use as a reference when building your application, before going to production, and after deployment - as well as the automatic Next.js optimization
Team 👫 Responsibilities Skills Must Optional Processes SRE Team Goals SRE Lead New SRE Team Member Production Requirements Provisioning Installation Deployment Configuration Resiliency Technologies 💻 Git Repositories CI Security Automation Cloud Provisioning Tracking and Monitoring Accounts Resources Reliability Kubernetes Resource Management CI/CD Cluster Management GitOps - ArgoCD Git Reposito
Checklist Development environment: Use a stable compilation toolchain (DENV-STABLE) Keep default values for critical variables in cargo profiles (DENV-CARGO-OPTS) Keep default values for compiler environment variables when running cargo (DENV-CARGO-ENVVARS) Use linter regularly (DENV-LINTER) Use Rust formatter (rustfmt) (DENV-FORMAT) Manually check automatic fixes (DENV-AUTOFIX) Libraries: Check f
こんにちは。 DSOC 研究開発部の高橋寛治です。 社内の論文読み会で紹介した評価に関する文献である「Beyond Accuracy: Behavioral Testing of NLP Models with CheckList」について簡単に所感を交えて*1紹介したいと思います。 なお、本文内での図表は基本的に文献から引用したものとなります。 Beyond Accuracy: Behavioral Testing of NLP Models with CHECKLIST 文献情報 Marco Tulio Ribeiro, Tongshuang Wu, Carlos Guestrin, Sameer Singh. Beyond Accuracy: Behavioral Testing of NLP Models with CheckList, Association for Comput
Effective logging is an essential foundation for any cloud application or service. However, just doing print statements of plain text does not lead to effective logging nor the ability to quickly diagnose issues. This checklist is for serverless cloud services and apps with a focus on AWS. It is a simple, aspirational checklist, and by no means addresses all the possible issues. It is not expected
Web App Checklist : シート1ABC1Nogenretitle21UX適切なレンダリングパターンを選択32Perf安定したサーバレスポンス43Perf圧縮したメディアフォーマットを利用54Perf,UXリソースを必要なタイミングで読み込む65PerfWebパフォーマンスを監視76UXOff the main thread87UXオフラインでも利用できる98UXモバイルでもデスクトップでも使える109PWAメタデータを提供1110DXOSSのように開発1211UXProgressive Enhancement1312a11y,SEO画像に代替テキストを設定する1413a11y文字のコントラストは4.5:1以上1514a11y色だけで説明しない1615a11y要素の選択は適切に1716a11yキー操作だけで利用できる1817a11y,UXフォーカスを可視化する1918UXスク
Things that strengthen an IR paper: recommendations from the Program Chairs The paper’s motivation and the potential impact of the addressed problem are discussed.The paper’s original contributions (i.e. the delta over prior art) are clearly stated.The paper’s claims are properly scoped and supported.The paper clearly describes what was done and what was not.The choices made in each step of the re
May 26, 20219 Ways To Secure your GraphQL API — GraphQL Security Checklist So you’ve built out your GraphQL API, and you’re nearly ready to deploy it to production. Fantastic. Let’s talk security: a significant part of every stable application on the internet. It’s worth taking some time to mitigate the most common issues. In this article, we will explore three main areas for how to secure your Gr
Want the TL;DR, or you’ve already been using GitHub for awhile? Skip to the end for a printable checklist that you can use to ensure that you’ve covered all aspects of making your repository collaboration-ready. My daughter has a pair of pet gerbils. They’re awesome, but not the most complex creatures to care for. They need their cage cleaned occasionally, their food and water refilled, and may ne
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く