Most PHP developers are familiar with Composer’s power as a package manager, and it’s ability to autoload all the packages it downloads. But what fewer PHP developers know about or use is Composer’s ability to load your code automatically, too.
In fact, developers can use Composer’s autoloader to autoload their own code, even if they don’t use one of the PSR standards for namespacing and path construction.
With Brendan Eich departing Mozilla just two weeks after he was hired as CEO, the Mozilla board is about to undertake a second CEO search, and I imagine they are understandably exhausted from the first one (as well as the backlash). Thus, I have taken the liberty of writing this job ad, which they are free to use in its entirety.
Wanted: New CEO for Mozilla
In 2011, I wrote about the five tools I couldn’t do without at the time. But times change, and so do the essentials we have. While some of those tools still hold true (like issue trackers and the PHP variable output functions), there are other new tools that are essential components of development. Here’s my top five in 2014.
In many development shops where I’ve worked, there’s a consistent struggle between developers who want to “do it right” and management that wants to “just get it shipped.”
The problem stems from the pride developers feel in their work coming up against the business realities faced by managers and company leaders, who are focused on making sure everyone gets a paycheck each Friday.
There’s a lot going around right now about Facades. Laravel introduced the concept, or at least the term, to the PHP community in their framework. Given the popularity of the term, it’s worthwhile to define what a Facade is, and what a Facade is not.
The definition of a Facade
Any web developer writing PHP applications is eventually going to have to store user passwords. Most developers have at least learned that storing a password in plain-text isn’t secure, but for many of us, we still use insecure methods.
The problem is, that if our web application is ever hacked, insecure password hashing algorithms will make it simple, easy and quick for attackers to break our passwords.