Use Fetch API for web apps

Use Fetch API for web apps

Blog
Fetch API has become the standard for web API requests for a while now and it is supported in almost any modern browsers nowadays. Let’s use Fetch API and implement it for the web Use Fetch API Previously, there are many existing solutions for handling API requests for the web, ex. jQuery Ajax, request (node), axios (node) … why there needs another? Why Fetch API? Fetch API is the standard API being supported native in most of today web browsers. Fetch API is widely supported – caniuse.com Hmm, IE is not supported, you ask? Since Microsoft stopped support for IE, no more development for IE in future, and we will expect very less number of users use IE. Fetch API Specifications The specs of Fetch API is described here, https://fetch.spec.whatwg.org/ Check…
Read More
Introducing Ionic 4

Introducing Ionic 4

Blog
By Max Lynch Today I am thrilled to announce the 4.0 release of Ionic Framework, lovingly known as “Ionic for Everyone.” Ionic 4 represents the culmination of more than two years of research and hard work transforming Ionic from “mobile for Angular” into a powerful UI Design System and app framework for every web developer in the world. There are so many things to talk about with this release, but first I’d like to talk about how we got here. The Angular Years Back in 2013 when we started working on Ionic Framework, we sought to build rich JavaScript-powered components for building quality mobile apps with web technologies, and distribute them as custom HTML tags that any web developer could use in their apps. Unfortunately, there was no standard way…
Read More
Fundamentals Of Web Applications Security .

Fundamentals Of Web Applications Security .

Blog
Over the past ten years, we have heard much about the security of web applications, and the threats that can come from using them. For better or worse, modern businesses have become increasingly dependent on the use of web applications developed agile; from complex infrastructure systems to IoT devices. Attacks on web applications provide intruders with ample opportunities such as: -Access to a company's internal resources and sensitive information; -The opportunity to disrupt the functioning of an application or bypass business logic; -Financial gains for the attacker, and losses, both financial and reputational, for the owner of web applications. Users of web applications are at risk, because if an attack is successful, the intruder can steal credentials, perform actions on websites on behalf of users, and infect a system with…
Read More