This is really unbelievable that Firebase Firestore doesn’t have kind of db.collection.count()… But it’s not a reason to drop firebase.

You currently have 3 options:

Option 1: Client-side

Select all from the collection and count on the client-side. This works well enough for small datasets but obviously doesn’t work if…


INTRODUCTION

It is considered to be that security on the Internet rests on three pillars, this is confidentiality, integrity and availability. These three components serve as a reliable foundation for network protection. Confidentiality and integrity mean that only certain persons have access to information and only they can change this data…


Modern society can no longer do without information technology. Information technology has penetrated into all areas of human life. Their integral part is the global Internet. Of course, one of the main tasks is to ensure the security of information circulation within the network. One of the security risks is…


— What? How can code “smell”??

— Well it doesn’t have a nose… but it definitely can stink!` (SourceMaking.com, 2007–2020).

If your code smells, hackers will come for you. This formula should be the first on your list to learn anything about programming. If any part of the code is…


Data Communications and Networks

Content

  1. Overview
  2. Goals
  3. General
  4. The range of ICMPv6 operations
  5. The general message format
  6. Determination of a message source address
  7. Calculating checksums
  8. Error processing
  9. Authentication and encryption of ICMPv6 messages
  10. Multicast and Anycast
  11. Auto-configuration
  12. Neighbour Discovery Protocol
  13. Duplicate Address Detection
  14. Packet Fragmentation prevention
  15. Implementation of the ICMPv4 functionality…

- Well it doesn’t have a nose… but it definitely can stink!` (SourceMaking.com, 2007–2020).

If your code smells, hackers will come for you. This formula should be the firston your list to learn anything about programming. If any part of the code is leaking or rotting, the payday shall not…


— What? How can code “smell”??

— Well it doesn’t have a nose… but it definitely can stink!` (SourceMaking.com, 2007–2020).

If your code smells, hackers will come for you. This formula should be the first on your list to learn anything about programming. If any part of the code is…

Kristina Volk

Web-developer and dancer :)

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store