The Rietta Blog

What is Web Accessibility?

It's important to answer the demand for accessible websites to proactively avoid legal implications after the Supreme Court declined to hear the Domino's Pizza appeal in an ADA case.

Acknowledge Open-Source Contributors with Git Authorship

Alex Piechowski

Even though Git has been the dominant VCS for over a decade, some popular open-source projects don't properly accredit contributors. Open-source projects have a ethical obligation to properly portray the work that was done to the project.

The Clean-up Refactor Deleting ".arel_tables"

Alex Piechowski

Composing queries with ActiveRecord and .arel_tables[] to select individual columns results in long lines. By delegating `arel_tables[] to .[], queries have a more readable interface without losing context. Delete .arel_tables from all usages; gain sanity dealing with complex queries.

Why do Rietta Developers Git Fork?

Forking open source repositories is a standard way of contributing to open source projects. At Rietta, a small agency, all developers fork internal repositories when working on client projects.

Ruby Gems Supply Chain Vulnerability

Learn 5 practical steps to protect yourself from malicious backdoors in Ruby Gems.

The Case for 2FA, Post Rest-client Gem CVE

On 08/19/2019, a CVE was discovered on a popular Ruby gem called Rest-client. Although caught quickly, this could raise the case of 2FA being a requirement for Package Manager accounts like Rubygems and NPM.

What's the Difference Between the 3 Github Merge Methods?

Github's interface makes merging in commits versatile to suit your style of maintaining a clean Git history. The three different styles are Create Commit, Squash, and Rebase.

Best Data Type to store Money in MySQL?

Alex Piechowski

When handling currency in MySQL, use DECIMAL(13,2) for general use and DECIMAL(13,4) if GAAP Compliance is needed.

Account Protection Policies to Cover Business Assets

Utilizing two factor authentication, strong passphrases, password managers, and NIST standards; private company accounts can remain secure. Cover your assets!

Writing Abuser Stories

Lori Hamilton

When writing user stories, user stories are written; but what about malicious actors? Writing Abuser Stories pushes developers to care about security.