Tutorials Page 51

  • By
    Create GitHub Pull Request and Issue Templates

    There's nothing more frustrating than getting an incomplete bug report.  I've often seen bug reports containing a useless "{x} feature doesn't work"; no steps to reproduce, no URL, no browser or device information, just a hopelessly vague message.  Similar is receiving a pull request or patch which doesn't...

  • By
    Fetch and Transform Remote Images with Cloudinary

    Many of my dives into Cloudinary's amazing API like Instagram-like Filters, Image Security, Custom eCommerce, have started with uploading media (images, video, audio) to Cloudinary and then manipulating from there.  As social media and user generated content has taken the web by storm, however, we as...

  • By
    Track Empty Directories with git

    There are times when you'd like to track an empty directory within git but there's a problem: git wont allow you to add a directory that doesn't have a file in it.  The easy solution is putting an empty stub file within the directory, and the industry...

  • By
    Interview with Kyle Simpson, Chair for O’Reilly Fluent Conference

    O'Reilly Fluent Conference, taking place in San Jose on June 19-22, is one of the best conferences if you're a front-end developer like myself. Most of the big names I've known over the past decade have graced Fluent's stage, one of them being...

  • By
    14 Top-Of-The-Line Multipurpose WordPress Themes

    A typical multipurpose WordPress theme is versatile, flexible, loaded with popular features. This enables you to create any type of website, portfolio, or blog you have in mind, or are commissioned to build. Specialty themes have their place too, especially when your design activities are confined...

  • By
    Get Keychain Passwords from Command Line

    One of my favorite command line utilities is Guillermo Rauch's wifi-password, a utility that allows you to get a saved password for the wifi network you're presently connected to (to share with colleagues or creeper in the cafe you're in).  The idea of being able to...

  • By
    Interview with James Turnbull, Chair for O’Reilly Velocity Conference

    O'Reilly's awesome Velocity conference, come to San Jose from June 19-22, focuses on the "magic in the background": DevOps, Security, and Systems Engineers. You'll have a chance to learn from engineers at Dropbox, Slack, Microsoft, Intel, Twitter, and more! As our systems grow...

  • By
    Get Python Requirements Package Hashes

    Python's (pip's) requirements.txt file is the equivalent to package.json in the JavaScript / Node.js world.  This requirements.txt file isn't as pretty as package.json but it not only defines a version but goes a step further, providing a sha hash to compare against to ensure package integrity: Coming from the JavaScript / package.json world, you only need...

  • Media Temple Hosting
  • By
    Protect Sensitive Data in Docker

    Developing authentication code for open source repositories can be a scary task; you're scared that hackers can find loopholes in your code but you're also petrified of accidentally committing sensitive credentials to a public repository.  I've seen unintentional credential commits happen and the panic that ensues throughout an organization will...

  • By
    Powerful Tips and Tools for UX and UI Designers

    Although they are separate entities, UX and UI design are often done by the same individual. This is usually the case with a freelance web designer. Most designers however, are focused on the UI when building a website. This would seem to make sense, in that...