102 Matching Annotations
  1. Aug 2025
    1. Unlike traditional degrees, digital credentials allow potential employers to verify skills and students to showcase these skills

      There's no competition with degrees! Degrees are important, are not under attack, and are already good at what they are intended to do. Innovative credentials address needs the degree isn't necessarily intended to address: verifiability of granular skills and the ability for learners to articulate, demonstrate, and narrate their skills.

  2. Jul 2025
    1. The software development world has changed dramatically over the past decade. Developers used to finish their code, throw it over the wall to operations, and hope for the best. Those days are long gone. Today’s competitive landscape demands faster delivery, higher quality, and more reliable systems and that’s where devops best practices become absolutely critical for any serious development team.

      Explore top DevOps best practices and automation strategies that enhance CI/CD pipelines, improve deployment speed, and boost software reliability in real-world projects.

    1. Ensure a seamless, intuitive, and controlled experience when applying coupon codes in the cart drawer by:Clearly displaying applied coupons.Preventing multiple or duplicate coupon entries.Providing users with the option to remove applied coupons.Maintaining synchronization with backend/cart state.

      Learn effective ways to optimize your Shopify cart drawer for faster checkout, better user experience, and increased conversion rates. Discover practical UI/UX tips.

  3. Jun 2025
    1. State management is an integral aspect to handle for building responsive UI in Flutter. It is important to be careful about the state management approach you choose, as it directly affects the scalability, maintainability and performance of your app. Here’s a comparison and guide on using the three most popular options:

      Understand Flutter state management using Provider and BLoC. Learn how to build scalable and maintainable apps with efficient state handling strategies.

  4. Apr 2025
    1. The base of application security starts with proper identity management. ASP.NET Core provides built-in tools to implement secure authentication and authorization that must be configured correctly to meet SOC 2 security requirements.

      Ensure your .NET Core and ASP.NET MVC applications meet rigorous SOC 2 requirements with CMARIX’s comprehensive guide. Discover a step‑by‑step SOC 2 compliance checklist, practical best practices for MVC projects, and tailored strategies for integrating security controls into your .NET Core codebase. Master audit readiness and protect customer data with proven techniques designed for modern Microsoft‑stack applications.SOC 2 compliance

  5. Mar 2025
    1. While React is just the brick of a building, Next.js is the whole package of tools and instructions based on which the building will be made.  In more technical terms, React creates buttons and menus for the website. Whereas Next.js provides extra features that React doesn’t have.  Next.js is the framework of React, which enables developers to take the benefits of full-stack. Next.js is the enhancing factor for React.

      Thinking about upgrading your React project? Learn the 7 essential steps for Migrate React to Next.js project to enhance performance, SEO, and scalability. This guide covers key strategies, potential challenges, and best practices for a smooth transition to Next.js.

  6. Jan 2025
    1. For existing students, the priority is immediate recognition of skills and knowledge in the major or complementary to the major, helping the student earn a fellowship or prepare for graduate school, to encourage persistence and completion, and to help students compete in the job market

      Naming the important learning => encouraging persistence/success => currency that helps access future opportunities

    2. Each microcredential is a substantive learning experience with set learning outcomes and assessments where student work is produced. While community building or participation in meetings or events can be important parts of the student experience, they do not rise to the level of a SUNY microcredential.

      Credentials must be credentialing something.

    3. All work is aligned with key pillars set by SUNY’s Board of Trustees and Chancellor John B. King, Jr., including student success; research and scholarship; diversity, equity, and inclusion; and economic development and upward mobility

      2 Keys: this synthesizes with student success, research, and other existing priorities; and executive sponsorship is baked in.

  7. Dec 2024
    1. employer verification

      In addition, this hints at employMENT verification: this could be a light lift sort of Tier 1 entry point for organizations to be both issuing and consuming credentials. Large employers spend a lot of resources responding to requests to verify former workers' employment histories. If part of off-boarding departing workers includes VCs for official employment verification, that could lead to big savings of time and resources (as long as other employers accept the credentials), as well as accelerate hiring processes that sometimes lead to failed hires bc people find another position that starts sooner. For key HR leaders to start with badging from a place of effortlessly improving their efficiency and costs might be a better place to launch than more involved strategies that offer less immediate value propositions.

  8. Nov 2024
  9. May 2024
  10. Feb 2024
  11. Jan 2024
    1. alternative credential programming and financialmodels are highly decentralized across an institution – so much so that it may bedifficult for an institution to have a good grasp of its entire portfolio. Adding alternativecredentials to an institution’s strategic priorities will firm up program and business modelplanning and execution

      Inconsistent processes for establishing programs, funding programs, and pricing programs

    1. What they say is this is due to is new EU policies about messenger apps. I'm not in the EU. I reckon it's really because there's a new Messenger desktop client for Windows 10, which does have these features. Downloading the app gives FB access to more data from your machine to sell to companies for personalized advertising purposes.
  12. Dec 2023
  13. Oct 2023
    1. When content underlying a DOI is updated, we recommend updating the DOI metadata and, for major changes, assigning a new DOI. For minor content changes, the same DOI may be used with updated metadata. A new DOI is not required. For major content changes, we recommend assigning a new DOI and linking the new DOI to the previous DOI with related identifiers.

      Characteristics

  14. Sep 2023
  15. Jun 2023
    1. gauge the value of the microcredentials they offer, a step I suspect many have not yet been brave enough to take. That calls for tracking how often learners claim their awarded microcredential and share it to a professional networking site like LinkedIn, and for collecting feedback on why they did or didn’t. Another suggestion from the primer: track the number of microcredential learners who go on to enroll in a degree program

      Interesting data to collect. Relates to the Equity report from Credential Engine: https://credentialengine.org/credential-transparency/equity/

  16. Nov 2022
    1. Because the official images are intended to be learning tools for those new to Docker as well as the base images for advanced users to build their production releases, we review each proposed Dockerfile to ensure that it meets a minimum standard for quality and maintainability. While some of that standard is hard to define (due to subjectivity), as much as possible is defined here, while also adhering to the "Best Practices" where appropriate.
  17. Aug 2022
  18. Jul 2022
  19. May 2022
    1. memory usage and (lack of) parallelism are concerns

      Memory usage is a concern? wat

      It's a problem, sure, if you're programming the way NPMers do. So don't do that.

      This is a huge problem I've noticed when it comes to people programming in JS—even, bizarrely, people coming from other languages like Java or C# and where you'd expect them to at least try to continue to do things in JS just like they're comfortable doing in their own language. Just because it's there (i.e. possible in the language, e.g. dynamic language features) doesn't mean you have to use it...

      (Relevant: How (and why) developers use the dynamic features of programming languages https://users.dcc.uchile.cl/~rrobbes/p/EMSE-features.pdf)

      The really annoying thing is that the NPM style isn't even idiomatic for the language! So much of what the NodeJS camp does is so clearly done in frustration and the byproduct of a desire to work against the language. Case in point: the absolutely nonsensical attitude about always using triple equals (as if to ward off some evil spirits) and the undeniable contempt that so many have for this.

    1. typeof v === "number"

      Using triple equals to check the results of typeof is totally unnecessary, and a sure sign that someone, somewhere has unthinkingly adopted some dubious advice; it's a code smell/red flag.

      A standard equality comparison (using ==) does exactly the right thing while also avoiding association with questions/doubts about the quality of the surrounding code.

  20. Feb 2022
    1. Appendix F: Questions Universities Can Ask Certification Bodies to Assess Quality of Certifications

      These questions (I believe) are coming from a place of validating certifications. Experts publish these as helpful guides to understand if and to what degree certifications are trustworthy. In other words, are they worth the paper they're printed on? In the case of micro-credentials, most questions are likely overkill for the proposal process, etc. Given the central role and importance of TRUST however, perhaps providing a version of these questions to stakeholders seeking to propose micro-credentials could be beneficial in pushing their thinking, or at least centering these themes in their thinking.

    1. “Public research universities are committed to improving the workforce outcomes of their students and to addressing the workforce needs of local economies. This approach can ensure students that their credentials will have value to the labor market, and it can ensure employers that graduates have the skills required to perform in the workplace.”

      For some, this is reasonable and rationale. It's the point of the whole enterprise. Yet for others, this take is controversial, as it may threaten the ideals and/or visions of the purpose of Public Education. These stakeholders may ask, "Is it the job of public education to serve industry's needs by preparing proper cogs for the workforce wheels?" At the same time, others may wonder, "Is public education willfully performing a disservice to our students if our credentials are not valued by employers?"

      These are important questions to ask, and to answer.

  21. Jan 2022
  22. Nov 2021
  23. Jun 2021
    1. a principle I use is: If you have an accessor, use the accessor rather than the raw variable or mechanism it's hiding. The raw variable is the implementation, the accessor is the interface. Should I ignore the interface because I'm internal to the instance? I wouldn't if it was an attr_accessor.
  24. May 2021
  25. Apr 2021
  26. Mar 2021
    1. here is my set of best practices.I review libraries before adding them to my project. This involves skimming the code or reading it in its entirety if short, skimming the list of its dependencies, and making some quality judgements on liveliness, reliability, and maintainability in case I need to fix things myself. Note that length isn't a factor on its own, but may figure into some of these other estimates. I have on occasion pasted short modules directly into my code because I didn't think their recursive dependencies were justified.I then pin the library version and all of its dependencies with npm-shrinkwrap.Periodically, or when I need specific changes, I use npm-check to review updates. Here, I actually do look at all the changes since my pinned version, through a combination of change and commit logs. I make the call on whether the fixes and improvements outweigh the risk of updating; usually the changes are trivial and the answer is yes, so I update, shrinkwrap, skim the diff, done.I prefer not to pull in dependencies at deploy time, since I don't need the headache of github or npm being down when I need to deploy, and production machines may not have external internet access, let alone toolchains for compiling binary modules. Npm-pack followed by npm-install of the tarball is your friend here, and gets you pretty close to 100% reproducible deploys and rollbacks.This list intentionally has lots of judgement calls and few absolute rules. I don't follow all of them for all of my projects, but it is what I would consider a reasonable process for things that matter.
  27. Feb 2021
    1. step :direct_debit

      I don't think we would/should really want to make this the "success" (Right) path and :credit_card be the "failure" (Left) track.

      Maybe it's okay to repurpose Left and Right for something other than failure/success ... but only if we can actually change the default semantic of those signals/outputs. Is that possible? Maybe there's a way to override or delete the default outputs?

  28. Jan 2021
    1. When you use target="_blank" with Links, it is recommended to always set rel="noopener" or rel="noreferrer" when linking to third party content. rel="noopener" prevents the new page from being able to access the window.opener property and ensures it runs in a separate process. Without this, the target page can potentially redirect your page to a malicious URL. rel="noreferrer" has the same effect, but also prevents the Referer header from being sent to the new page. ⚠️ Removing the referrer header will affect analytics.
  29. Nov 2020
  30. Oct 2020
    1. Teaching Tolerance offers some clear practices that can help establish connectedness:

      Are these not "techniques", "exercises", "manoeuvers", from the "front of the room"? I suppose the answer is that technique and leadership are necessary but not sufficient for building community, and that unlike a "best practice" in a controllable process, they may or may not resonate (and thus work) for any given person or group.

  31. Sep 2020
  32. Jul 2020
  33. Jun 2020
    1. On April 24, the U.S. National Security Agency published an advisory document on the security of popular messaging and video conferencing platforms. The NSA document “provides a snapshot of best practices,” it says, “coordinated with the Department of Homeland Security.” The NSA goes on to say that it “provides simple, actionable, considerations for individual government users—allowing its workforce to operate remotely using personal devices when deemed to be in the best interests of the health and welfare of its workforce and the nation.” Again somewhat awkwardly, the NSA awarded top marks to WhatsApp, Wickr and Signal, the three platforms that are the strongest advocates of end-to-end message encryption. Just to emphasize the point, the first criteria against which NSA marked the various platforms was, you guessed it, end-to-end encryption.
  34. Apr 2020
    1. In 2017 NIST (National Institute of Standards and Technology) as part of their digital identity guidelines recommended that user passwords are checked against existing public breaches of data. The idea is that if a password has appeared in a data breach before then it is deemed compromised and should not be used. Of course, the recommendations include the use of two factor authentication to protect user accounts too.
  35. Feb 2020
  36. Nov 2019
  37. Oct 2019
    1. Yes, absolutely, no two projects are alike. This step is moving towards a direction where we have a set of best practices for webpack isolated in a bundled package and can be maintained in isolation without impacting upgrades or end-user experience. If you have seen next.js or create-react-app they sort of do they same thing for ease and maintainability. Rails is a great example for this - there are some built-in best practices, opinionated defaults and gems that are hidden behind the scene plus power to do advance things where needed.
  38. Apr 2019
    1. Two commonly used change strategies are clearly not effective: developing and testing “best practice” curricular materials and then making these materials available to other faculty and “top‐down” policy‐making meant to influence instructional practices.

      Would this be predicted by the Cynefin framework? Teaching problems are rarely obvious enough for "best" practices; "better" practices may be the best we can hope for.

  39. Jul 2017
    1. (It's usually a mistake to pass back the concrete type of an error rather than error, for reasons discussed in the Go FAQ, but it's the right thing to do here because ServeHTTP is the only place that sees the value and uses its contents.)

      Good clarifying comment on when to pass back the concrete type of an error.

  40. Jan 2017
  41. Oct 2016
  42. Feb 2014
    1. For example, imagine you are annotating the second page of a New York Times article. You probably want to see your annotation when you are looking at the article later as a single page, right? Or perhaps you've annotated the HTML for a PLOS ONE article. Wouldn't you like to see those annotations when you are looking at the PDF version of the same article? If annotations were only associated with the URL you happened to be looking at in your browser then the scenarios above would not work, because the documents being annotated all have different URLs.

      Publisher Best Practices is a great idea that I would like to see codified in the authoring and publishing tools to make the practices commonplace by default.

      I would like to mix PBP with other techniques, though, for richer connection between source and rendering-- I have some source mapping ideas that make it possible to keep annotations linked even as the original source is edited over time.