or subscribe with
Join 3,000+ readers for one email each week.
Digests » 294
Development teams for companies worldwide are attempting to build large infrastructure codebases. Download this eBook and learn how to effectively use principles, practices, and patterns pioneered by DevOps teams to manage cloud-age infrastructure.
this week's favorite
In this post, my intention is to highlight some common scenarios where we can leverage Erlang's concurrency model as well as Elixir's abstractions to build better, faster and more secure software. Think of it like... A cookbook.
Over the years, strategies to secure static files have ranged from feasible (but slow) to downright laughable. Storing the files in the database and treating them like any other secure data seems fair but leads to performance problems as the database has to shuttle copious amounts of information.
A common occurance in my phoenix applications is the need to render a list of some items – say companies in a job board application. Let's start out simple by using the phoenix generators to build up the first bunch of boilerplate for those companies.
Here is my take on what Elixir Nx could be, based on some Twitter intel and my own speculations.
UUID also known as GUID is an alternative primary key type for SQL databases. It offers some non-obvious advantages compared to standard integer-based keys. Phoenix provides reliable support for working with UUID using its Ecto PostgreSQL adapter. In this tutorial, we will dive deep into UUIDs with all their cons and pros.