Web Developmentlast 24 hours

Hacker Noon:

Courier selection engine for E commerce companies

E commerce companies ship their products to customers via multiple courier partners. Most of them have an automated courier selection process for shipping. At IB one of the major challenges we faced was the increasing logistics cost. Hence we developed a system to automatically recommend the courier to be selected for each package that was shipped from our warehouses and by our sellers spread across India. It is essential for every company who..

Hacker Noon:

How to install Node.js on Ubuntu 16.04/18.04 using NVM (Node Version Manager)


NVM is basically the version manager for Node.js. With the help of NVM we can install and use multiple versions of Node.js along with NPM. If we have multiple Node.js projects having various versions of node and npm then always install node using NVM only.

Installation of NVM

First download the NVM installation script using cURL as follows

$ curl -o- https://r..


XMLHttpRequest vs the Fetch API: What’s Best for Ajax in 2019?

March 2019 celebrates the 20th anniversary of Ajax. Sort of. The first implementation of XMLHttpRequest shipped in 1999 as an IE5.0 ActiveX component (don't ask).

Before then, there had been ways to pull data from a server without a full-..

Hacker Noon:

A Case Study on HUSD

Case Study of Huobi’s HUSD Solution

Huobi recently announced a trial upgrade to their stablecoin service, now titled HUSD Solution V2.0. The intent is for Huobi to help meet user demands when it comes to stablecoins by offering support for interchangeability between Paxos Standard (PAX), True US..

Hacker Noon:

How Audio Could Bring Us the New Einstein

Art by Emma Darwick

Audio has been a hot topic for a few years now. With the rise of voice assistants, audiobooks and podcasts, it seems like everyone is talking about the significance of audio.

I’ll be honest, I didn’t really start thinking about this alleged importance, until my friend told me exactly this:

For the first t..

Hacker Noon:

Essential Reading List for Enterprise Software Developers and Architects

The target audience for this reading list is enterprise software developers and architects. I chose to focus on system design, data modelling, security, devops, process, creativity, and computer science foundations which are essential and generally useful to most software engineers. Enjoy, happy reading, and let me know what you think!

Hacker Noon:

How to Form and Manage a High Functioning Advisory Board

Advisors improve the speed and outcomes for the businesses they advise. Discover what they do, why they’re valuable, and how to best leverage them.

Building a successful business is really hard. So you should do everything you can to improve your likelihood of success. Startup advisors often play an important role in improving the speed and outcomes for the startups they advise. This article explores what advisors are,..


5 Core Elements for Building Award-Winning One-Page Websites

This sponsored article was created by our content partner, BAW Media. Thank you for supporting the partners who make SitePoint possible.

Is your next project a one-page website..

Hacker Noon:

A hacker intercepted your WiFi traffic, stole your contacts, passwords, & financial data.

A hacker intercepted your Wi-Fi traffic and stole your contacts, passwords, and financial data. Here’s how.Introduction

As the holiday season was in full swing, a hacker sporting a hoodie, sitting in a car with antennae on the dashboard and a computer on his lap, sat in a parking lot outside a popular cafe chain. Passersby, busied and high on holiday cheer, buzzed in and out and sometimes even stayed for a while.

As he wa..


Social Cards as a Service

I love the idea of programmatically generated images. That power is close at hand these days for us front-end developers, thanks to the concept of headless browsers. Take Puppeteer, the library for controlling headless Chrome. Generating images from URLs is their default use case:

const puppeteer = require('puppeteer');

(async () => {
  const browser = await..


Don’t Get Clever with Login Forms

Brad points out some UX problems with a variety of apps that are doing things a little outside of the norm when it comes to their login forms. There is already a bunch of things to get right with forms to begin with (e.g. use the right input types, label your inputs, don't have whack password requirements, use SSL, etc.)... OMG why complicate it even more?!

A "password manager test" should be a development best practice here. Does it w..

Hacker Noon:

Four Startup Engineering Killers

Beware these engineering mistakes for your early stage software startup

In 2016, I gave technical advice to a first-time entrepreneur building a seed-funded food delivery marketplace. In my view, every tech choice the company had made was wrong.

The CEO believed in “empowering the engineer.” They then let their first engineer choose the framework (Scala/Play) because it was what the engineer wanted to use,..

Planet PHP:

412 Precondition Failed - Evert Pot

In HTTP it’s possible to do conditional requests. These are requests that only execute if the right conditions are met.

For GET requests, this might be done to only retrieve the resource if it has changed. For those cases 304 Not Modified is returned.

For other cases, 412 Precondition Failed is returned.


This client only wan..

Hacker Noon:

About the Relationship Between Stablecoins and Security Tokens

Crypto news last week were dominated by the headlines of J.P Morgan announcing the intentions to launch its own stablecoin dubbled “JPM Coin”. My initial reaction to the news were mixed. On one hand, the JPM Coin represents a strong validation for the stablecoin market and will certainly pave the way for new banks to join this trend. However, we can’t be oblivious to the fact that commercial-bank-backed stablecoins are likely ..

Web DevelopmentNews