-
To follow logger coding conventions and to optimize performance by avoiding unnecessary object allocations, we should consider adding log flag queries to logging statements, at least to those that cre…
fh-ms updated
1 month ago
-
Problem specification:
https://github.com/exercism/problem-specifications/tree/main/exercises/transpose
TODO:
- generate the exercise with `./bin/fetch-configlet && ./bin/configlet create -…
-
Let's follow the terraform developer [best practices]https://developer.hashicorp.com/terraform/plugin/best-practices/versioning) for versioning provider releases.
This suggests bumping minor when w…
-
Hey all,
I need someone to help me learn how to do a backflip!
-
### Link to the coursework
https://www.frontendpractice.com/
### Why are we doing this?
This useful site has a series of projects you can do to keep your front end skills in shape all the way…
-
-
> Which task is AWS responsible for in the shared responsibility model for security and compliance?
>
> A. Granting access to individuals and services
> B. Encrypting data in transit
> C. Updatin…
-
``` r
my_second_data %
clean_names() %>%
filter(species == "ONCL") %>%
ggplot(aes(x = length1, y = weight)) +
geom_point(aes(shape = 12), color = "purple") +
theme_min…
jorb1 updated
3 months ago
-
Tracking issue for Module 1 of #2044
-
It is best practice for both the Website UI and the CMS Backend to be covered by security headers including a CSP. Damage to a brand can be achieved by via gaining accessing the back end using phishin…