Coder Survival Guide

Coder Survival Guide

6408 bookmarks
Newest
84 cognitive biases you should exploit to design better products
84 cognitive biases you should exploit to design better products
Learn how to use cognitive biases to increase your product's conversion rates, engagement level, and retention. A must-read article for every entrepreneur and product manager dealing with UX, UI and B2C products.
·mobilespoon.net·
84 cognitive biases you should exploit to design better products
API tooling development: GraphQL, OpenAPI
API tooling development: GraphQL, OpenAPI
API tooling for better developer experience. We create tools to help developers workwith GraphQL and OpenAPI/Swagger.
·apis.guru·
API tooling development: GraphQL, OpenAPI
mike-engel/a11y-css-reset
mike-engel/a11y-css-reset
A small set of global rules to make things accessible and reset default styling - mike-engel/a11y-css-reset
·github.com·
mike-engel/a11y-css-reset
The CEO Cybersecurity Challenge
The CEO Cybersecurity Challenge
The CEO Cybersecurity Challenge (#ceocybersecuritychallenge) is designed to get any organisation to root of their security problems; their people.
·davidfroud.com·
The CEO Cybersecurity Challenge
trekhleb/homemade-machine-learning
trekhleb/homemade-machine-learning
🤖 Python examples of popular machine learning algorithms with interactive Jupyter demos and math being explained - trekhleb/homemade-machine-learning
·github.com·
trekhleb/homemade-machine-learning
mattm/sql-style-guide
mattm/sql-style-guide
An opinionated guide for writing clean, maintainable SQL. - mattm/sql-style-guide
·github.com·
mattm/sql-style-guide
Développeurs : la CNIL met en ligne un kit de bonnes pratiques | CNIL
Développeurs : la CNIL met en ligne un kit de bonnes pratiques | CNIL
Le développement de solutions, de programmes ou encore de sites web est bien souvent associé au traitement de données, du service direct aux objets connectés. Il est nécessaire, dès la conception, de prendre des mesures afin de protéger les données personnelles des potentiels utilisateurs. Dans cette optique, la CNIL lance son « Kit développeur », afin de couvrir l’ensemble des étapes dans le développement:
·cnil.fr·
Développeurs : la CNIL met en ligne un kit de bonnes pratiques | CNIL
Attaques ciblées : le jeu - Protégez vos données. Faites les bons choix.
Attaques ciblées : le jeu - Protégez vos données. Faites les bons choix.
A tout moment, de nombreux concurrents ou individus mal intentionnés aimeraient mettre la main sur les données de votre entreprise. Etes-vous prêts à faire les bons choix ? Avez-vous évaluer le budget dont vous aurez besoin pour mettre en place une politique de sécurité ? Votre compagnie est-elle parée contre toute cyberattaque éventuelle ?
·targetedattacks.trendmicro.com·
Attaques ciblées : le jeu - Protégez vos données. Faites les bons choix.
Learning GraphQL By Doing
Learning GraphQL By Doing
In this guest post, learn about the basic concepts required for app developers to understand GraphQL by actually trying it out.
·blog.digitalocean.com·
Learning GraphQL By Doing
Smallstep
Smallstep
Certificates and public key infrastructure (PKI) are hard. No shit, right? I know a lot of smart people who've avoided this particular rabbit hole. Personally, I avoided it for a long time and felt some shame for not knowing more. The obvious result was a vicious cycle: I was too embarrassed to ask questions so I never learned. Eventually I was forced to learn this stuff because of what it enables: PKI lets you define a system cryptographically. It's universal and vendor neutral. It works everywhere so bits of your system can run anywhere and communicate securely. It's conceptually simple a...
·smallstep.com·
Smallstep
Terms of Service; Didn't Read
Terms of Service; Didn't Read
Terms of Service; Didn't Read (ToS;DR) is an active project to fix the biggest lie on the web. We help you understand the Terms and Conditions and Privacy Policies of websites.
·tosdr.org·
Terms of Service; Didn't Read