This is really unbelievable that Firebase Firestore doesn’t have kind of db.collection.count()… But it’s not a reason to drop firebase.

You currently have 3 options:

Option 1: Client-side

Select all from the collection and count on the client-side. This works well enough for small datasets but obviously doesn’t work if the dataset is larger. Handling this on the front end should be fine as long as you are not doing too much logic with this returned array.

db.collection(‘…’).get().then(snap => snap.size) — will return the collection size

Option 2: Write-time best-effort

Medium collection (100 to 1000 documents)

Use with care —…


INTRODUCTION

It is considered to be that security on the Internet rests on three pillars, this is confidentiality, integrity and availability. These three components serve as a reliable foundation for network protection. Confidentiality and integrity mean that only certain persons have access to information and only they can change this data. Accessibility is a guarantee that users can always access information. Unfortunately, it is at the accessibility stage that many security problems of the modern Internet arise. According to Internet creators, it was supposed to be a reliable system for the exchange of operational information capable of operating in a nuclear…


Modern society can no longer do without information technology. Information technology has penetrated into all areas of human life. Their integral part is the global Internet. Of course, one of the main tasks is to ensure the security of information circulation within the network. One of the security risks is hacker attacks. Many people have already become victims of intruders. So, there are two obvious questions: “What types of hacker attacks are there? How to resist them?

Hacking methodology

“Network attacks” — today this phrase is familiar to any computer user. Meanwhile, the general and vague designation “network attacks” hides…


— What? How can code “smell”??

— Well it doesn’t have a nose… but it definitely can stink!` (SourceMaking.com, 2007–2020).

If your code smells, hackers will come for you. This formula should be the first on your list to learn anything about programming. If any part of the code is leaking or rotting, the payday shall not scape. It is a litmus test for cyber crooks. They are of the same programming origin. They know that the code can smell, that it smells and the smell is deviating. …


Data Communications and Networks

Content

  1. Overview
  2. Goals
  3. General
  4. The range of ICMPv6 operations
  5. The general message format
  6. Determination of a message source address
  7. Calculating checksums
  8. Error processing
  9. Authentication and encryption of ICMPv6 messages
  10. Multicast and Anycast
  11. Auto-configuration
  12. Neighbour Discovery Protocol
  13. Duplicate Address Detection
  14. Packet Fragmentation prevention
  15. Implementation of the ICMPv4 functionality by the ICMPv6
  16. Similarities between versions
  17. Entirely new functionality
  18. Summary
  19. Bibliography
  20. References

1. Overview

This article describes the Internet Control Message Protocol (ICMP) for the 6th version of IP addressing (IPv6). …


- Well it doesn’t have a nose… but it definitely can stink!` (SourceMaking.com, 2007–2020).

If your code smells, hackers will come for you. This formula should be the firston your list to learn anything about programming. If any part of the code is leaking or rotting, the payday shall not scape. It is a litmus test for cyber crooks. They are of the same programming origin. They know that the code can smell, that it smells and the smell is deviating. …


— What? How can code “smell”??

— Well it doesn’t have a nose… but it definitely can stink!` (SourceMaking.com, 2007–2020).

If your code smells, hackers will come for you. This formula should be the first on your list to learn anything about programming. If any part of the code is leaking or rotting, the payday shall not scape. It is a litmus test for cyber crooks. They are of the same programming origin. They know that the code can smell, that it smells and the smell is deviating. …

Kristina Volk

Web-developer and dancer :)

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store