r/graphic_design - What Graphic Style is Axios Using?
Strategy

What Graphic Style is Axios Using? : graphic_design


I really enjoy the style of art that Axios news (and The Atlantic) is using to illustrate their news articles. But I was wondering if it had a technical name because I’d like to read more about it and maybe find some academic or tutorial articles about it. I haven’t gotten very far with looking for digital collage or pastel gradient collage looking art, or modern flat new illustration.

Anyone in design school wanna share what this style is formally called? 🙂 cheers.

r/graphic_design - What Graphic Style is Axios Using?



Source link

Any feedback/advice on my cloud setup?
Strategy

Any feedback/advice on my cloud setup?


Any feedback/advice on my cloud setup?

I decided to completely modernize the entire stack my website was running in.

And I mean the entire stack. This used to look like: [frontend client] <—–> [backend server*]

*backend server does all the things. Typical LAMP setup.

Does anyone have any advice, tips, or best practices for running a stack that's designed for high throughput? I decided I'm probably not going to be using HTTP2 or web sockets at all, so this is entirely HTTP1.1 and every server is TLS secured and at idle/low volume this setup costs ~ $70/mth in mainly low-end VMs.

I'd be happy to answer any questions about this too

https://preview.redd.it/klefs1ajhnt51.png?width=2102&format=png&auto=webp&s=cb8faa294cd235516c3d6cdc2ffcb51be67e1022

submitted by /u/oromian
[comments]



Source link

r/webdev - I built an online multiplayer Mastermind game to play with friends!
Strategy

I built an online multiplayer Mastermind game to play with f…


r/webdev - I built an online multiplayer Mastermind game to play with friends!

Game in Action

As a project to solidify my (newly-acquired) web development skills, and not finding available options, I decided to implement a multiplayer version of Mastermind online.

Lemme know what you guys think, keeping in mind that I plan to implement

  • window resizing/mobile gameplay. Right now it’s only playable on a computer, at almost full width of the page

  • a database. Right now, if your tab closes, progress is lost and both players have to restart the game

  • score-keeping! This one should be fairly simple but for now, it only displays the number of rounds in which the code was guessed. Users will have to keep track of that and who guessed it in fewer



Source link

Inversion of Code - HTTP Lambda functions
Strategy

Inversion of Code – HTTP Lambda functions


Normally when we create an HTTP REST endpoint, we add code to our server endpoint, and assume the client provides the arguments to our code. What if we could reverse this responsibility, such that the client provides the code the server executes?

Among other things, this implies we can have one endpoint doing “everything”. We wouldn’t need to create dozens of endpoints to expose our API, and we could get away with creating a single endpoint, that clients invokes, regardless of what they want to do. If the client wants to create a record in our database, read records from our database, or count records in our database is irrelevant – He’d still use the same endpoint for all of these tasks. In addition, the client could become much more creative in regards to how he interacts with our API, and do things we couldn’t even imagine as we created our API. The latter of course sums up the problem, which is that clients could inject malicious code into our server.

Securing your lambda functions

However, if we had a method to make sure the client was never able to inject malicious code into our endpoint, we could safely allow him to inject code and execute his code on our server, even without knowing what his code does, or even caring about who the client is for that matter. The latter is actually possible in Hyperlambda due to a feature I just released yesterday called “whitelist”. Whitelisting keywords and functions in Hyperlambda allows me to create an execution context where only the stuff I consider to be safe are allowed to be executed. This allows me to avoid having clients doing stuff such as for instance.

  • Reading passwords from my configuration files
  • Deleting database tables
  • Creating malicious files
  • Etc …

This is only possible in Hyperlambda due to the fact that Hyperlambda is a “virtual execution machine”, kind of like ByteCode or the CLR, only way more structured. This again allows me to create a list of keywords and functions that I allow for being executed within an execution context, and have all other function and keyword invocations throw an exception, never even being executed. Let me show you some code.

The above code is actually Hyperlambda intended to become an HTTP REST endpoint. To invoke it, you can pass in a payload such as the following.

If you put the first code above into a file called e.g. “evaluate.patch.hl” in your modules folder, for then to invoke the endpoint and pass in the second code snippet from above, what will occur is as follows.

  1. Your code will be passed into the HTTP REST endpoint
  2. Your code will be structurally parsed, resulting in a “lambda” structure
  3. The lambda will be added to the above [.lambda] node
  4. A new [whitelist] scope will be created
  5. Your code will be executed within this secured whitelist scope

This process prohibits the user from invoking anything not explicitly declared inside of the above [vocabulary] node, which means that if the user tries to invoke for instance [config.get], to read configuration settings, an exception will be thrown. Only the following functions and keywords are allowed in the client’s code.

  • add
  • unwrap
  • return
  • vocabulary
  • slots.vocabulary
  • signal:magic.google.translate

If the client attempts to invoke anything not found in the above list, my server will throw an exception. And of course, since I whitelisted vocabulary above, the client can query my endpoint, to ask it what functions and keywords he’s allowed to use in his code. Watch me demonstrate the concept in the following video.

This reversed responsibility way of thinking about your HTTP endpoints, results in many interesting scenarios. For instance, the Ethereum cryptocurrency network is exclusively built upon similar ideas, except referring to this is “smart contracts”. However, in Ethereum a client can easily inject malicious code, something Microsoft research proved a long time ago. Once a client injected malicious code, and as a consequence 50 million dollars was lost. Later they patched and forked the network as a consequence, trying to fix the problem – But with Hyperlambda endpoints, such a scenario couldn’t even exist in theory, assuming you trust its [whitelist] functionality, and don’t whitelist dangerous keywords and functions.

Basically, it becomes the very implementation of what we have referred to as the “semantic web”, where web servers and clients can “communicate with each other”, speaking a common language, being the sub set of a vocabulary, explicitly allowed by the server. Resulting in a common language, understood by both parties, allowing them to communicate semantically with each other. Hence, it becomes a common platform of understanding, between two distinctly different parties, that normally have no ideas about what the other party is even trying to communicate. Or to use an analogy.

It allows us to communicate with aliens



Source link