# Finds one of several possible polymorphic members from params based on a list # of relations to look in and attributes to look for. # # Each polymorphic member will be tried in turn. If an ID is present that # doesn't correspond to an existing row, or if none of the possible IDs are...
Code Show and Tell: PolymorphicFinder Posted by croaky on January 14, 2014 — 0 comments This refactoring shows a real-world example of the Builder, Decorator, Chain of Responsibility, and Null Object patterns as well as recursion, using a fold/inject, object composition, and immutable...
Yesterday I put out an article explaining Apple's MVC pattern in a way Rails developers could understand, and it got a crazy amount of traffic, well for my standards 600 views in 24 hours seemed impressive for a fairly new blog. Today I've written the second article in the ongoing ser...
Reading Rails - How Validation Are Configured Posted by netghost on January 13, 2014 — 0 comments You use them every day, now it's time to learn what's going on under the hood. Come along and learn how migrations are configured . We'll pick up a few new Ruby idioms, and uncover some f...
We've all come across API documentation that is out of date, lacking details, or just plain wrong! Often times an API’s documentation is entirely separate from the code itself, and there is no verification of the documentation's accuracy. So how do we overcome this? Well, one solution...
The sixth annual Conference will be February 8, 2014 Workshops will be held February 6 and 7 LA Ruby Conf 2014 $199 Early Bird Pricing! ends January 21, 2014 $249.00 Standard after See Workshops page for pricing
Each year, more applications are being written for the browser entirely in JavaScript. Yet, few developers write any automated unit tests of their JavaScript code. If that describes your experience and you're interested in taking front-end web technologies more seriously, then conside...
is Mike Gunderloy's software development weblog, covering Ruby on Rails and whatever else I find interesting in the universe of software. I'm a full-time Rails developer and contributor, available for long- or short-term consulting, with solid experience in working as part of a distri...
Matthew is passionate about delivering quality software at ludicrous speed. He believes in collaborative thinking in an open community based on trust, teamwork and transparency. Thirsty for knowledge, Matthew constantly finds himself at the business end of the firehose. A product of T...
One of the most important changes in the Web over the last ten years is that conversation's moved from private email, community email lists, and writer-owned blogs into various corrals and golden cages. If you were writing code in 2006, particularly "cutting edge" code like Rails apps...
# File '/Users/jbolton/Projects/sass-site/.sass/lib/sass/script/functions.rb', line 286 def self.signature(method_name, arg_arity, kwarg_arity) return unless @signatures[method_name] @signatures[method_name].each do |signature| return signature if signature.args.size == arg_arity + kw...
Storing Data without CoreData in RubyMotion Posted by FluffyJack on January 13, 2014 — 0 comments Episode 6 has just been released for MotionInMotion. If CoreData is overkill for your application, you might be able to just write data out to the disk, or store it in NSUserDefaults. I'm...
Não sou um especialista em segurança, mas em termos leigos o mesmo dado passado pelo TripleDES com a mesma chave gera a mesma saída encriptada. Portanto se eu souber a entrada e saída de alguns dados, posso encontrar padrões que ajudem a decriptar outros dados, e impede o uso de ataqu...
Grails 2.0 Login Create Account Pivotal Home Learn Products & Services Groovy/Grails Tool Suite (IDE) Other Products Consulting Training About SpringSource Community Downloads Plugins Facebook connect Twitter connect Log in Login or Email (forgot login) Password (forgot password) Crea...
Laura Klein offers a number of visual- and interaction-design tips for non-designers working to build their MVP.
Grails 2.0 Login Create Account Pivotal Home Learn Products & Services Groovy/Grails Tool Suite (IDE) Other Products Consulting Training About SpringSource Community Downloads Plugins Facebook connect Twitter connect Log in Login or Email (forgot login) Password (forgot password) Crea...
HTML5 Mode Links Mon 13 Jan 2014 at 17:46 Based on a suggestion by Tim Bray, I converted my board agenda Angular.js application to use html5 mode . The process was straightforward: 1) add the following to your application configuration: $locationProvider.html5Mode(true).hashPrefix('!'...
Paddy3118 , Posted July 14, 2009, 12:46 am Hi wycats, A guiding principal of Python is that the language should strive to be readable. It is why many, many, (many), requests to add syntax modifying features such as macros are rejected. The idea being that when you read one Python prog...
Pivotal Labs is a recognized leader in agile software development practices. We build consumer and enterprise web and mobile applications for global clients. We are currently looking for experienced, creative designers to join our team and help us continue to innovate in the field. We...
Scotland On Rails Presentations Now Online: 27 Awesome Videos By Matthew Lang / May 23, 2009 Did you miss the Scotland on Rails conference this year? No need to fret though, as Engine Yard are hosting videos of all the presentations made at this popular conference. With 27 presentatio...
It is now possible to define a custom importer that can be used to find imports using different import semantics than the default filesystem importer that Sass provides. For instance, you can use this to generate imports on the fly, look them up from a database, or implement different...
Controller actions are protected from Cross-Site Request Forgery (CSRF) attacks by including a token in the rendered html for your application. This token is stored as a random string in the session, to which an attacker does not have access. When a request reaches your application, R...
The largest bit of implementing Prim’s algorithm (for me) seems to go toward managing the interactions with that frontier set. Maybe your experience will be different. You basically need two operations: mark a cell as “in” (which then marks the “out” neighbors as frontier cells), and ...