Codeminer42 Dev Weekly #39

HELLO EVERYONE!!! It’s November 29th 2024 and you are reading the 39th edition of the Codeminer42’s tech news report. Let’s check out what the tech world showed us this week!

Understanding CSS Inheritance: A Guide to Consistent Styling – by Eleftheria Batsou

The article, written by Eleftheria, provides an in-depth understanding of CSS inheritance, its importance in maintaining consistency, improving performance, and enhancing design flexibility. It covers properties that inherit and how to control inheritance using CSS keywords.

Unit Testing in Node.js With Jest – by Antonello Zanini

Unit tests are crucial for enhancing the test coverage of backend applications, ensuring their reliability and robustness. Jest is a popular choice for unit testing in Node due to its user-friendly API, zero-configuration setup, and flexible code transpilation. This guide provided by Zanini will provide insights into Jest, its features, and a complete example to help you become proficient on it.

Server-sent Events and WebSockets in Rack for Ruby – by Ayush Newatia

The web has two main specifications for persistent connections: server-sent events (SSEs) and WebSockets. While WebSockets are popular and widely used, SSEs are less familiar. Check it out how SSEs works.

Single Point of Failure (SPOF) in System Design – by Hayk Simonyan

A Single Point of Failure (SPOF) is a critical component in a system that can cause inoperableness, data loss, and security vulnerabilities. To mitigate SPOFs, designers can use strategies like redundancy, failover, load balancing, geographic distribution, and continuous monitoring. Common mistakes include overlooking load balancers.

How to Use Programming Rules and Guidelines – by Ben Linders

Arne Mertz emphasizes the importance of understanding programming rules and guidelines for better collaboration and code quality. He distinguishes between absolute rules and best practices, arguing that misinterpreting guidelines can lead to cumbersome and less readable code, complicating readability and maintainability.

Unlocking the Web: A Comprehensive Guide to Web Scraping in Python from Beginner to Pro – Md Arman Hossen

The article by Md Arman Hossen provides a comprehensive overview of web scraping, its importance in data collection and analysis, and its role in Python. It highlights the difference between web scraping and web crawling, the importance of Python’s simplicity and powerful libraries, and the ethical considerations involved. Check it out!

Rails is better low code than low code – by Radan Skorić

Radan Skorić’s interesting article compares Ruby on Rails and low-code tools for developing a reservation management application. Check out the result of this comparison.

D-Link says “just buy a new router” after 9.8 critical vulnerability… – by Fireship

In one of the newest videos from our friend Jeff Delaney, he talks about D-Link NAS devices and routers’ critical vulnerabilities, highlighting unauthorized access, data theft, and ransomware attacks. It emphasizes ethical hacking, ethical testing, and obtaining permission before testing. It critiques D-Link’s lack of accountability and promotes an open-source analytics tool, PostHog, for better product development.

Agoda’s Unconventional Client-First Transition from a GraphQL Monolith to Microservices – by Eran Stiller

Agoda transitioned from a monolithic GraphQL API to a microservices architecture using a client-first strategy. The company prepared client applications for both monolith and microservices, using an in-house Smart Orchestrator as a dynamic routing layer. The migration was incremental, tested for data accuracy, and categorized GraphQL queries into simple, moderate, and complex types. The strategy aimed to improve manageability, scalability, and agility in Agoda’s development processes.

Introducing the Model Context Protocol – by Anthropic

The Model Context Protocol (MCP) is an open-source standard designed to connect AI assistants with data sources, aiming to improve AI responses’ relevance and quality. It simplifies integration, allowing secure two-way connections. Early adopters like Block and Apollo have integrated MCP into their systems. The initiative encourages collaboration and community involvement to shape context-aware AI.

Cheaters are breaking the technical interview… how? – by Fireship

In one of the newest videos from our friend Jeff Delaney, he talks about the rise of cheating in technical interviews, especially in remote work and AI tools. Around 10% of candidates attempt cheating, using hidden laptops, leaked questions, or friends. The effectiveness varies, and cheating can lead to job rejection, blacklisting, professional reputation damage, and low performance risk.

Researchers Uncover Malware Using BYOVD to Bypass Antivirus Protections – by The Hacker News

Researchers have discovered a new malware campaign using Bring Your Own Vulnerable Driver (BYOVD) to bypass antivirus protections. The malware drops a legitimate Avast Anti-Rootkit driver, enabling it to disable security processes and gain control. The attack exploits deep access, bypassing tamper protection mechanisms of antivirus solutions. Check it out and be safe.

Using non-root users in Kamal – by Josef Strzibny

The article explains how to create a non-root user for Kamal, a deployment tool. This user gains sudo privileges and adds them to the docker group. Kamal connects using this user, but it may cause issues with directory permissions. Check it out!

And that’s all for this week! Wish you all a great weekend and happy coding!

We want to work with you. Check out our "What We Do" section!