“We predict that serverless will grow rapidly. We also predict that on-premises hybrid cloud applications will shrink over time, although some deployments may persist due to regulatory and data governance constraints.
Serverless computing will become the standard computing paradigm in the cloud age, largely replacing server-side computing and thus ending the client-server era. “
Cloud Programming Simplified: A Berkeley View on Serverless Computing, February 10, 2019
The line between the backend and the frontend is broken! An innovative step in the evolution of state managers.
One of the most difficult tasks in developing web and mobile applications is to synchronize data between devices and perform offline operations. Ideally, when the device is offline, your customers should be able to continue to use your application not only to access data, but also to create and modify it. When the device returns online, the application must reconnect to the backend, synchronize the data and resolve conflicts, if any. …
Since the layout of components takes up to about 60% of the total code of my lessons, I decided to put all the components in a separate library, thereby, in subsequent lessons, we will focus on business logic, and not on typesetting of components.
UI Kit Unicorn supports dark and light mode.
Add the library:
yarn add react-native-unicorn-uikit
yarn add react-native-appearance react-native-screens @react-navigation/native @react-navigation/native-stack react-native-safe-area-context react-native-spinkit yup formik faker
Add a library with icons:
yarn add react-native-vector-icons
Carefully add the icons as written here
cd ios && pod install && cd ..
One of the most requested topics among my channel subscribers is authentication and authorization in the React Native application. Therefore, I decided to devote a separate post to this issue, but before we start coding, it is necessary to deal with the definition of Authentication/Authorization.
Authentication is a verification of the conformity of the subject and the one he is trying to impersonate using some unique information (fingerprints, iris color, voice, etc.), in the simplest case — with the help of mail and password.
Authorization is the verification and determination of the authority to perform certain actions in accordance…
REACT NATIVE + AWS Amplify = 🏆