External Site Monitoring
How did you know that your site is down? From your customers? Then it’s time to start using some external monitoring tool.
How did you know that your site is down? From your customers? Then it’s time to start using some external monitoring tool.
A must-see speech by Robert “Uncle Bob” Martin on programmers responsibilities in digital world and 9 principles every programmer should follow (“The Coders’ Code”).
There are different points of view on how logging levels should be used in code. I will share mine.
My assumption is: “There should be no errors in logs when everything is fine.”
One of the challenges for start-ups or any new project is to reduce the amount of work while still delivering a full-featured product. Agile methodologies address this challenge on the project management level. Let’s discuss another approach to address it on the architecture level: UI-first development.
StackOverflow-driven JS development:
try {
something
} catch (e) {
window.open('https://stackoverflow.com/search?q=[js]+"' + e.message + '"');
}
Making your web application flawless against security attacks is a challenge for every java developer. In this article I will briefly describe common practical development techniques that can help you to achieve it.
Deploying application into secure environment adds some restrictions on logging and log management. OWASP community gives some useful recommendations.