#best-practices

[ follow ]
#software-development
React
fromHackernoon
3 months ago

Writing Scalable and Maintainable React Code with SOLID Principles | HackerNoon

Applying SOLID principles enhances React component design by promoting modular and maintainable code.
fromHackernoon
11 months ago
Software development

How Software Quality Assurance (SQA) Turns Chaos Into Clean, Reliable Software | HackerNoon

React
fromHackernoon
3 months ago

Writing Scalable and Maintainable React Code with SOLID Principles | HackerNoon

Applying SOLID principles enhances React component design by promoting modular and maintainable code.
fromHackernoon
11 months ago
Software development

How Software Quality Assurance (SQA) Turns Chaos Into Clean, Reliable Software | HackerNoon

#risk-management
Information security
fromThe Hacker News
4 days ago

Top 10 Best Practices for Effective Data Protection

Data protection is essential for organizational productivity and evolving cyber threats.
Defining clear data protection goals is the first step in safeguarding sensitive information.
Automation in data classification is vital for managing data effectively.
Information security
fromThe Hacker News
4 days ago

Top 10 Best Practices for Effective Data Protection

Data protection is essential for organizational productivity and evolving cyber threats.
Defining clear data protection goals is the first step in safeguarding sensitive information.
Automation in data classification is vital for managing data effectively.
#nextjs
fromblog.logrocket.com
6 days ago

Async standups: Pros, cons, do they make sense for you? - LogRocket Blog

Sara Rossio emphasizes the importance of creating a 90-day plan when starting a new leadership role in product management. This plan not only sets clear objectives but also helps align the team’s expectations from the outset.
Marketing tech
fromSearch Engine Roundtable
1 week ago

Google Says Stop Using Different URLs For Same Image

If an image is referenced on multiple pages within a larger website, consider the site's overall crawl budget. In particular, consistently reference the image with the same URL.
Mobile UX
#refactoring
#email-marketing
Writing
fromLitmus
2 months ago

How to Write with Accessible Language

Accessible language ensures easy understanding for all audiences.
Accessible email marketing improves inclusivity and reach.
Misconceptions exist about the difficulty of email accessibility.
fromAWeber
1 week ago
Online marketing

Best Time to Send a Marketing Email: Optimizing Your Email Campaigns for Maximum Engagement

Writing
fromLitmus
2 months ago

How to Write with Accessible Language

Accessible language ensures easy understanding for all audiences.
Accessible email marketing improves inclusivity and reach.
Misconceptions exist about the difficulty of email accessibility.
fromAWeber
1 week ago
Online marketing

Best Time to Send a Marketing Email: Optimizing Your Email Campaigns for Maximum Engagement

#productivity
#machine-learning
fromInfoQ
1 week ago
Artificial intelligence

Best Practices to Build Energy-Efficient AI/ML Systems

fromInfoQ
1 week ago
Artificial intelligence

Best Practices to Build Energy-Efficient AI/ML Systems

fromBusiness Insider
2 weeks ago

I'm a wedding planner. Here are 8 ways to be the best guest at any ceremony and reception.

It's important to double-check the information provided by couples before reaching out, especially close to the wedding date, as answers are often already available.
Relationships
#cybersecurity
Information security
fromHackernoon
1 year ago

How You're Compromising Your Company's Cybersecurity Without Realizing It | HackerNoon

Understanding everyday habits that compromise cybersecurity is essential for protecting both personal and company information.
Information security
fromInfoQ
2 months ago

OpenSSF Publishes Security Baseline for Open-Source Projects

The OpenSSF has developed the Open Source Project Security Baseline to help open-source projects enhance security practices and meet varying project needs.
fromZDNET
2 weeks ago
Privacy professionals

5 things to do on World Password Day to keep your accounts safe

Information security
fromHackernoon
1 year ago

How You're Compromising Your Company's Cybersecurity Without Realizing It | HackerNoon

Understanding everyday habits that compromise cybersecurity is essential for protecting both personal and company information.
Information security
fromInfoQ
2 months ago

OpenSSF Publishes Security Baseline for Open-Source Projects

The OpenSSF has developed the Open Source Project Security Baseline to help open-source projects enhance security practices and meet varying project needs.
fromZDNET
2 weeks ago
Privacy professionals

5 things to do on World Password Day to keep your accounts safe

#innovation
Artificial intelligence
fromFast Company
2 months ago

Playing by the rules of AI

Organizations must proactively establish AI best practices to ensure compliance and leverage growth opportunities.
The evolving regulatory environment surrounding AI necessitates careful navigation by creators, adapters, and consumers.
Artificial intelligence
fromFast Company
2 months ago

Playing by the rules of AI

Organizations must proactively establish AI best practices to ensure compliance and leverage growth opportunities.
The evolving regulatory environment surrounding AI necessitates careful navigation by creators, adapters, and consumers.
#user-experience
Design
fromMedium
3 months ago

Design tokens: A double-edged sword in design systems

Over-engineering design tokens increases complexity and decreases usability.
Clear naming conventions are crucial for managing design tokens effectively.
Reducing token choices minimizes cognitive load and enhances developer efficiency.
Streamlining design tokens prevents redundancy and system bloat.
Design
fromMedium
3 months ago

Design tokens: A double-edged sword in design systems

Over-engineering design tokens increases complexity and decreases usability.
Clear naming conventions are crucial for managing design tokens effectively.
Reducing token choices minimizes cognitive load and enhances developer efficiency.
Streamlining design tokens prevents redundancy and system bloat.
fromInfoQ
3 weeks ago

AWS Promotes Responsible AI in the Well-Architected Generative AI Lens

The Generative AI Lens enables users to build responsible and efficient generative AI solutions by following best practices that address unique challenges in this evolving field.
Artificial intelligence
#web-development
fromInfoWorld
10 months ago

10 big devops mistakes and how to avoid them

One of the significant challenges with devops is ensuring seamless communication and collaboration between development and operations teams. Historically, these units have worked in silos, leading to inefficiencies and misunderstandings.
DevOps
#elearning
fromClickUp
1 month ago

How to Create an Effective Cancellation Policy (Examples)

Cancellations and no-shows can significantly affect businesses, making a cancellation policy essential for managing client expectations and protecting revenue.
Mental health
#javascript
#python
Python
fromPythonmorsels
2 months ago

Alternatives to Python's "break" statement

Utilizing Python's in operator and built-in functions simplifies code that traditionally relied on break statements in loops.
Python
fromPythonmorsels
2 months ago

Alternatives to Python's "break" statement

Utilizing Python's in operator and built-in functions simplifies code that traditionally relied on break statements in loops.
fromLogRocket Blog
1 month ago

Progressive disclosure in UX design: Types and use cases - LogRocket Blog

Progressive disclosure is a UX design technique that reduces users' cognitive load by gradually revealing information as needed, simplifying complex content for better user understanding.
Mobile UX
#scala
fromMedium
2 months ago
Scala

21 Days of Spark Scala: Day 8-Implicit Parameters and Conversions: Making Scala Code More Elegant

fromMedium
2 months ago
Scala

21 Days of Spark Scala: Day 8-Implicit Parameters and Conversions: Making Scala Code More Elegant

fromMedium
2 months ago

Five Things Vibe Coders Should Know (From A Software Engineer)

Users must ensure that the code generated—especially by 'vibe coders'—is scrutinized for security vulnerabilities before deployment. Ignorance can lead to severe consequences.
Mobile UX
#dependency-injection
Angular
fromHackernoon
2 months ago

Refactoring 024 - Replace Global Variables with Dependency Injection | HackerNoon

Replacing global variables with dependency injection improves testability and reduces coupling.
Remote teams
fromHackernoon
2 months ago

Effective One-on-One Meetings: 5 Practices to Implement | HackerNoon

One-on-one meetings are essential for team performance but often mismanaged by managers.
#automation
fromHackernoon
2 months ago
DevOps

Here's the 7-Step Framework I Use to Get Ahead in Automation Testing | HackerNoon

Automation testing streamlines the testing process, allowing coders to focus on quality over quantity.
UX design
fromLogRocket Blog
2 months ago

UX user interviews: Tips, best practices, and resources - LogRocket Blog

User interviews are essential for gathering user insights that inform effective product design.
React
fromLogRocket Blog
2 months ago

A complete guide to TypeScript enums in React Native - LogRocket Blog

TypeScript enums enhance the management of constants in React Native, improving readability and maintenance.
Online learning
fromeLearning Industry
3 months ago

L&D Next 2025

L&D Next 2025 offers critical insights into the future of learning and development.
The conference features sessions and speakers focused on performance-driven L&D strategies.
Attendance is free, promoting accessibility for L&D practitioners.
fromMedium
3 months ago

Level up your UX micro-animations with Phase

To begin animating with Phase, it is important to create text and simple shapes natively within the platform for better manipulation and control.
Web design
fromHackernoon
1 year ago

Tips For Managing Terraform Variables | HackerNoon

Using a variables.tf file centralizes your variable declarations, which makes it easier to manage dynamic data in infrastructure code.
JavaScript
fromClickUp
5 months ago

How to Call in Sick with Text Message (+Examples) | ClickUp

Calling in sick is essential for maintaining honesty and professionalism in team communication and adhering to company policy, especially on days when feeling unwell.
Miscellaneous
[ Load more ]