or subscribe with
Join 3,000+ readers for one email each week.
Digests » 139
Rollbar detects when code breaks in real-time. Get stack trace + diagnostic data to defeat errors.
this week's favorite
We have a bunch of embedded models on an Ecto model. They’re self-contained and don’t need to be normalized or unique. They need to be flexible and lightweight and not have a lot of overhead in either UX or code.
Authentication solutions are broad. They contain registration and login functionality, as well as Email confirmation, password recovery, update user’s profile etc. We are going to cover the most valuable part and implement registration and login functionality. You can find some existing libraries for that. Addict for example. But we are learning, right? It would be better for us to understand how everything works under the hood.
Everyday we went through the routine of checking multiple classified advertisements websites, looking for apartments that matched our criteria. When we found a posting that we liked, we then rushed to call to schedule a visit. And, unfortunately, the outcome would be that the house was already rented or reserved. Generally, good houses would be rent on the same day of the advertisement posting or the first day that allowed visits. We started checking the same websites everyday, first thing in the morning. But still, the outcome would be the same every time. Finding a nice place to live started to look like an impossible task. We needed to change tactics.
FIPS (Federal Information Processing Standards) are a set of standards defined by the NIST (National Institute of Standards and Technology) to provide a means to govern and control how computer systems inter-operate in industry approved, credible and acceptable methods. FIPS-140 isn’t a necessity across the board, but if you’re operating in uncompromising sectors such as those found in governmental systems, I highly recommend you work to become FIPS-140 compliant. The FIPS-140 publication defines the standard requirements pertaining to cryptographic modules and functions employed in a computer systems, in all phases inclusive of, but not limited to, the design, implementation, installation, and usage.
A guide to building and running zero-dependency Phoenix (Elixir) deployments with Docker. Works with Phoenix 1.2 and 1.3.