Syed Jafer Kparottasalna.hashnode.dev·Jan 21, 2024Top 15 WGET commands you need to know !WGET cookbook PDF link : Download Here wget is a powerful command-line utility for downloading files from the web. It supports various protocols such as HTTP, HTTPS, FTP, and FTPS. Basic File Download This command downloads the file named file.zip...Discuss·1 likeredterminal
Syed Jafer Kparottasalna.hashnode.dev·Dec 9, 2023Why do we need to maintain same hash in load balancer ?Introduction Have you ever thought of what is that ? when developers discuss like add a server; we need to scale up; we can scale down; implement a load balancer to equally share the request. In this blog post, we can go from basic methodologies in d...DiscussLoad Balancer
Syed Jafer Kparottasalna.hashnode.dev·Dec 8, 2023How Long methods affect code readability ?Introduction What is a lengthy method, first of all? What does "LONG" actually mean? How much time is too much? (5) Lines? Definitely not. Twenty? I suppose not. Forty? Probably, I suppose. Eighty? almost certainly However, there is never a strict ru...DiscussDeveloper
Syed Jafer Kparottasalna.hashnode.dev·Dec 3, 2023Why there is an additional request sent before POST in browser ?On Notice ... During the web application development, when we see the network tab, for every POST, PUT, DELETE, PATCH there is an another request which is sent prior. It's named as OPTIONS. But how come this request is getting triggered automatically...DiscussDeveloper
Syed Jafer Kparottasalna.hashnode.dev·Dec 2, 2023How reed solomon error correction algorithm makes a damaged QR code to work fine ?Amused At Today (02/12/2023), due to fever and cold i went to Ayurvedic medicine store. During the payment , i asked him QR code for digital payment. The QR code sheet is pretty damaged. Before scanning i thought it wouldn't work. But to my surprise...Discusserror correction codes
Syed Jafer Kparottasalna.hashnode.dev·Dec 1, 2023Why we should not use magic numbers ?Introduction A Magic Number is a hard-coded value that may change at a later stage, but that can be therefore hard to update. It's a numeric value that’s encountered in the source but has no obvious meaning. Yet more difficulties arise when you need ...Discusscodesmell
Syed Jafer Kparottasalna.hashnode.dev·Nov 30, 2023Why do we even need cookie's ?Sudden Thought As a full stack developer, i came across reading about cookies. So far i haven't written code to handle it or use it in my applications. While reading about cookies, i came to know its used to transfer state in a stateless HTTP protoco...Discusscookies
Syed Jafer Kparottasalna.hashnode.dev·Nov 30, 2023Why 'origin' is been used as a name for remote repository in GIT ?Sudden Thought As a developer, I always had this question, why the name origin is used in git flows; i meant git repositories. On googling .... The name "origin" is the default name that is given to the remote repository when you first clone it using...DiscussGitHub
Syed Jafer Kparottasalna.hashnode.dev·Nov 30, 2023Userimpersonate from backend to an Azure Blob Storage using MSAL's OnBehalfOf methodAssumptions: All access permissions are given. Problem Faced: We were developing an image based application, where frontend needs to load lot of images. Backend will serve the blob urls, so that from frontend; we will access these images from Azure...Discuss·1 likeonbehalfof
Syed Jafer Kparottasalna.hashnode.dev·Nov 29, 2023Why ADD is preferred than COPY in Dockerfile ?Doubt on Best Practices: While i was reading on the best practices of writing a Dockerfile, its mentioned that COPY is preferred than ADD. Eventhough it performs same operations as COPY. Solution: The COPY and ADD commands in Docker are both used to ...Discussdocker add