1. 0
    Thread opened Programming Technology 3 months ago
    BeerAndCode
    Here for beer or for code
    What's new in CodeIgniter 4.1.1PHP 8 is now fully and officially supported!4.0.5 is the final version that will support PHP 7.2 - starting with 4.1.x the new requirement will be 7.3, 7.4, or 8.xGenerators are now available to help create components from t...

    hgtyh5rmcjnrz97yvion

    What's new in CodeIgniter 4.1.1

    • PHP 8 is now fully and officially supported!
    • 4.0.5 is the final version that will support PHP 7.2 - starting with 4.1.x the new requirement will be 7.3, 7.4, or 8.x
    • Generators are now available to help create components from the command line, User Guide
    • Updates to the class handling system now allow overriding of core services
    • The beloved "Model" has now been split into a Base and a "SQL-Model" to make space for future NoSQL support
    • Lots of updates to the development toolkit make it easier for you to analyze and test your projects, and use CI/CD pipelines
    • Quite a few of the Config classes have been split out to make it cleaner and clearer where to go to alter service behavior

    More details here: https://forum.codeigniter.com/thread-78507.html

    1. 1
      We created a list of over 5 authentication methods, but the title refers to the Two Factor Authentication (2FA). Our recomendation is to implement at least two factors of authentication and to require all users to use these two auth factors.The most...

      n4itxwny5g6mrmczxzdl

      We created a list of over 5 authentication methods, but the title refers to the Two Factor Authentication (2FA). Our recomendation is to implement at least two factors of authentication and to require all users to use these two auth factors.

      The most secure authentication method is using a hardware authentication device, but, fingerprint and typing biometrics can also be used as a very secure authentication method. There are free OTP mobile apps that you can use, but no matter what you do, if you are storing password into the database, please use a strong encryption algorithm for storing sensitive data.

      Full article: https://protectumus.com/blog/details/the-importanc...




      1. 3
        It's almost 2021 and the cyber security threats are more aggressive than ever. We prepared a website security checklist that will guarantee you that your website is a safe place for your visitors. In order to make your website secure, you need to:Use u...

        rjb3lkudy0zvbgstcsga


        It's almost 2021 and the cyber security threats are more aggressive than ever. We prepared a website security checklist that will guarantee you that your website is a safe place for your visitors. In order to make your website secure, you need to:

        1. Use up to date software
        2. Use strong passwords and change them frequently
        3. Create frequent backups, for both database and files
        4. Use SSL certificate
        5. You should allow restricted access to your users
        6. Prevent SPAM - Use captcha and honeypots on your website forms
        7. If you want someone else to take care of your website security, you should invest in a website security software, in case you're interested, Protectumus can help by offering free website security services. Please visit the following page for more details: https://protectumus.com/signup

        Protectumus is a free website security scanner that checks your website for known vulnerabilities. We use a cloud scanner that scans your website for security issues for free. Protectumus also offers DDOS protection, Web Application Firewall (WAF), Two Factor Authentication (2FA), Uptime and Speed Monitoring, plus many more. You can find a list of detailed security features here: https://protectumus.com/features

        Full article can be found here: https://protectumus.com/blog/details/website-secur...



        1. 4
          EsportsWearable TechnologyBlockchain Technology And CryptocurrenciesArtificial Intelligence For CreativityDigital HealthRPA - Robotic Process AutomationQuantum and Edge ComputingMore explanations for the selection made by me can be found here:https://www....

          zeg63likjhifsl75j90y


          1. Esports
          2. Wearable Technology
          3. Blockchain Technology And Cryptocurrencies
          4. Artificial Intelligence For Creativity
          5. Digital Health
          6. RPA - Robotic Process Automation
          7. Quantum and Edge Computing
          More explanations for the selection made by me can be found here:


          https://www.forbes.com/sites/forbestechcouncil/202...

          https://interactive.hello.global.ntt/story/future-...


          What extra technology trends do you think that should also be added on a "Top 10 technology trends for 20201"?

          1. 2
            Typing AI is a typing biometrics authentication API. The detection accuracy level is very high and there are almost no false positives.This project uses artificial intelligence in order to detect the typing pattern. A unique typing ID is generated for eac...

            Typing AI is a typing biometrics authentication API. The detection accuracy level is very high and there are almost no false positives.

            This project uses artificial intelligence in order to detect the typing pattern. A unique typing ID is generated for each user. There are lots of peoples who tested the API and the accuracy level is over 99.9%.

            I'm targeting big companies such as banks and top 500 businesses, because the API allows me to offer enterprise grade security.

            1. 1
              Thread opened Programming 3 years ago
              Zen
              No title
              GoalsThe goals we have for Go today are the same as in 2007. We want to make programmers more effective at managing two kinds of scale: production scale, especially concurrent systems interacting with many other servers, exemplified today b...
              • Goals

              The goals we have for Go today are the same as in 2007. We want to make programmers more effective at managing two kinds of scale: production scale, especially concurrent systems interacting with many other servers, exemplified today by cloud software; and development scale, especially large codebases worked on by many engineers coordinating only loosely, exemplified today by modern open-source development

              • Constraints

              The goals for Go have not changed since the beginning, but the constraints on Go certainly have. The most important constraint is existing Go usage. We estimate that there are at least half a million Go developers worldwide, which means there are millions of Go source files and at least a billion of lines of Go code. Those programmers and that source code represent Go's success, but they are also the main constraint on Go 2.

              • Process

              In the early days of Go, when there were just five of us, we worked in a pair of adjacent shared offices separated by a glass wall. It was easy to pull everyone into one office to discuss some problem and then go back to our desks to implement a solution. When some wrinkle arose during the implementation, it was easy to gather everyone again. Rob and Robert's office had a small couch and a whiteboard, so typically one of us went in and started writing an example on the board. Usually by the time the example was up, everyone else had reached a good stopping point in their own work and was ready to sit down and discuss it. That informality obviously doesn't scale to the global Go community of today.


              more details - https://blog.golang.org/toward-go2

              1. 1
                Question asked Internet of things 3 years ago
                Administrator
                The Source
                When was the Internet of things invented? He has a new book, How to Fly a Horse: The Secret History of Creation, Invention, and Discovery, out January 20. We spoke to him by email about epiphanies, undervalued inventors, alien life, and more. You co...

                When was the Internet of things invented?

                He has a new book, How to Fly a Horse: The Secret History of Creation, Invention, and Discovery, out January 20. We spoke to him by email about epiphanies, undervalued inventors, alien life, and more. You coined the term "the Internet of Things" in 1999, but it can still seem an odd concept.

                Is it true?