Dominic MacAulayprogrammers-mind.hashnode.dev·Oct 11, 2024Identity: The Root of all ChangeI want to become more athletic, slim down, build some muscle, and achieve everything else that comes with being fit. The problem is that every time I try to start going to the gym, I get tired, find other things I’d rather do, and quickly lose motiva...Discuss·4 likesAtomicHabits
Anand Mauryaanandmaurya.hashnode.dev·Sep 5, 2024Implementing Identity Authentication and Authorization in ASP.NET Core 8 with ScaffoldingIntroduction When building a website, it's important to control who can access certain parts of it. This is where authentication (checking who a user is) and authorization (deciding what they can do) come in. ASP.NET Core 8 makes it easy to handle th...Discuss·123 reads.NET MVCBasicC#
ICU Branding agencyicu.hashnode.dev·Aug 22, 2024Global and local contrast in the 3C technique of design evaluation - Part IIKeeping with our developing questions approach, let's test our design options. In the previous section, we examined two Cs: comprehending the context and the caliber of the project's content. Today's topic will be the last C, or (C)contrast, broken d...DiscussDesign
ICU Branding agencyicu.hashnode.dev·Aug 2, 2024Brand identity: important characteristics and types of visual identityWhat’s the connection between Disney typography, mascots like the Red and Yellow M&Ms, and the turquoise Tiffany box? All of the components of brand identity are there. Quality is no longer seen as a default characteristic and is insufficient for a b...Discussbranding
ICU Branding agencyicu.hashnode.dev·Jul 25, 2024Key parts of visual identity and their role in brand strategyIntroduction The idea of "visual identity" is essential to brand planning.There's one for every well-known name. In other words, there isn't a single case of a great brand that doesn't have its look. Apple and its bit Apple are great examples of this...Discuss·1 likebranding
Mahira Technology Private LimitedPromahiratechnology.hashnode.dev·Jul 10, 2024From Zero to Hero: Creating Secure Cognito Identity Pools Using Terraform Without Prior ExperienceIntroduction :- Welcome! If you’re eager to learn how to set up secure Cognito Identity Pools with Terraform but have no idea where to start, you’re in the right place. This document will guide you from knowing nothing about these technologies to set...DiscussCognito
Facepluginfaceplugin.hashnode.dev·May 9, 2024ID Document Recognition SDK by FacePluginIn today’s fast-paced environment, where time is critical, relying on manual ID document recognition presents considerable challenges. Consider the time spent, not just by individuals but also by businesses, as they struggle to keep up with the deman...Discussidentity-management
Gearoid O’Treasaighthe-iterative-edge.hashnode.dev·Apr 25, 2024A Change in Identity — From Developer to CraftspersonIn this blog article, we’ll explore the principles of software craftsmanship, the benefits of becoming a software craftsperson, and how we can improve our skills. We’ll look at a growth mindset and some resources to help us on our journey. Let’s dive...Discusshabits
Brian Bakerbrianbaker.hashnode.dev·Mar 21, 2024Angular's Ivy Renderer: Performance Boosts and New FeaturesAngular's Ivy renderer, introduced in version 9, has been a game-changer for the popular JavaScript framework. This cutting-edge rendering engine has not only significantly improved performance but has also brought a host of new features to the table...DiscussAspNetCoreSecurity, AuthorizationPolicies
Rizel ScarlettforTBDtbdevs.hashnode.dev·Mar 6, 2024FeaturedA Beginner-Friendly Illustrated Guide to Verifiable CredentialsThis blog post uses storytelling to introduce beginners to Verifiable Credentials, followed by a tutorial on creating them in JavaScript and Kotlin. In Our Last Issue... In our previous issue, we met Dawson Webhart, a junior frontend software enginee...Discuss·12 likes·65 readsweb5