Recently Updated Pages
Displaying transcoded media efficiently
For both page loading times and CDN costs, you need to ensure that you serve images and videos at...
Options for implementing image and video transcoding
When it comes to transcoding media, you have two main options you can choose from in terms of how...
The execution flow for image and video transcoding
In basic form, the way both image and video transcoding is implemented involves using 'serverless...
Generating Credentials: secure data sources
If you have a use case where you need to give a user a one-time password or key to authenticate f...
Displaying user-inputted content on webpages
XSS (Cross-Site Scripting) generally results from bad practices regarding user input. For example...
WebSockets-specific security practices: JSON Web Tokens
When using the WebSockets protocol, there are a lot of potential pitfalls to bear in mind that ca...
JavaScript does not support 64-bit integers
In most languages, a long is a 64-bit integer, for use when a 32-bit integer isn't big enough. Ja...
Deprecated or incorrect usage of functions
A lot of older PHP functions and constants are effectively deprecated or not recommended for use,...
Composer
Homepage https://getcomposer.org/ What is it? A dependency manager for PHP projects. Why did ...
Feedback
Feedback is when something reacts to the user, giving them some indication that an action occurre...
Overview & Libraries
Overview I am no expert in interface design, but I do know the basics (and thankfully, there are...
Space efficiency: Modals
Space efficiency: Tooltips
Responsiveness
AJAX request considerations
What's this "AJAX" you speak of? For non-developers, AJAX stands for "Asynchronous JavaScript an...
Controlling whether images are displayed or downloaded in new tabs
When you want a user to be able to view an image in a new tab when they right click and select "O...
Financial Costs Overview
Ultimately, an art website faces mostly similar costs to other websites (and extra bandwidth cost...
Introduction and Critical Points
Defending against security threats, such as XSS (Cross-Site Scripting) and CSRF (Cross-Site Reque...
Storing Credentials for Cloud Services
Your webservers usually have to connect to various services, like your database and cache servers...
Generating SSL/TLS Certificates via LetsEncrypt
Generating SSL certificates when your webservers are behind a load balancer In situations where ...