Search

Nalezeno "::part": 1784

Bitcoin History Part 16: The First Mt. Gox Hack


No one remembers the first Mt. Gox hack. It was a small sum, even by 2011’s standards, and the exchange reimbursed all users. The incident was to prove significant, however, for it set in motion a string of attacks on other bitcoin platforms that began the very next day. By the time the dust...

Data URIs


We’re all familiar with traditional URI protocols like https, http, ftp, and file, but data URIs have become a large part of our online strategy. We can use them to display images, the Mac camera and webcams, and more. But what if we simply want to use a data URI to convey basic data? Typing...

Bitcoin History Part 15: Silk Road Is Born


Silk Road launched in February 2011 as the darknet’s first bitcoin-based marketplace. Within four months, it would be the darknet’s most notorious site whose reputation extended all the way to the U.S. Senate. The origins of the drugs marketplace can be traced back further, however,...

Bitcoiners Brace for More Performance Art and Another ‘Satoshi Reveal’


On Friday, a variety of paid press releases were published stemming from a company called Satoshi Nakamoto Renaissance Holdings, a firm that claims a big “reveal” is coming on Sunday, August 18. According to the announcement, Satoshi Nakamoto will divulge his “real-life...

Bitcoin History Part 14: The 1,000 BTC Poker Game


Bitcoin and poker have a history that stretches back to the very start. Perhaps, even, to before the start of Bitcoin as we know it, for there is evidence that Satoshi had a background in poker. What’s beyond dispute is that in March 2010, the world’s first bitcoin poker tournament took...

The Guide to Understanding Crypto: How Cryptocurrency Works [Part 1]


Introducing The Crypto Demystified Series Welcome to your guide on cryptocurrency! If you’re new to the world of cryptocurrencies and are looking to learn more about them without the complicated jargon, you’ve come to the right place. You might have […] The post The Guide to Understanding...

Fetching Data in React using React Async


You’re probably used to fetching data in React using axios or fetch. The usual method of handling data fetching is to: Make the API call. Update state using the response if all goes as planned. Or, in cases where errors are encountered, an error message is displayed to the user. There will always...

Crypto Is Part of Free Speech, and Free Speech Is Everything


On July 23, U.S. Attorney General William Barr gave a speech demanding big players in the tech industry work with government agencies in providing backdoor entry points for encrypted devices and software. Per his reasoning, certain devices and messaging services pose a safety threat by providing...

My New Mac Setup and Why I Switched


I want to start this article by saying that I'm not here to start or take part in any brand war between Microsoft and Apple. I like both companies and have switched between operating systems occasi

So, you think you’ve got project management nailed down


(This is a sponsored post.) Who needs a project manager? You're an organized person who can keep track of your own work, right? Wrong. Well, wrong if you're part of a team. The thing about being self-organized is that it's related to project management but not synonymous with it. Case in point:...

Detect Cryptocurrency by Wallet Address


I’ve always been a massive advocate of cryptocurrency. I love the technology, the ease of use, and the freedom that cryptocurrencies bring to the world. Despite my love of crypto, I know that adoption will take a long time and that the state of crypto is not friendly to new adopters. One scary part...

Managing Multiple Backgrounds with Custom Properties


One cool thing about CSS custom properties is that they can be a part of a value. Let's say you're using multiple backgrounds to pull off a a design. Each background will have its own color, image, repeat, position, etc. It can be verbose! You have four images: body { background-position: ...

Protecting Vue Routes with Navigation Guards


Authentication is a necessary part of every web application. It is a handy means by which we can personalize experiences and load content specific to a user — like a logged in state. It can also be used to evaluate permissions, and prevent otherwise private information from being accessed...

Developing a robust font loading strategy for CSS-Tricks


Zach Leatherman worked closely with Chris to figure out the font loading strategy for this very website you're reading. Zach walks us through the design in this write-up and shares techniques that can be applied to other projects. Spoiler alert: Font loading is a complex and important part of...

Nahoru
Tento web používá k poskytování služeb a analýze návštěvnosti soubory cookie. Používáním tohoto webu s tímto souhlasíte. Další informace