or subscribe with
Join 3,000+ readers for one email each week.
Digests » 322
Join the global community of development, security, & DevOps leaders at SnykCon. Learn to build security into your existing tools and workflows. Attend hands-on workshops to hear how industry experts are building software securely — from the IDE to your Git. Don't miss a chance to compete in 20 hands-on hacking challenges & win great prizes in Fetch the Flag, the SnykCon CTF. RSVP for free today.
this week's favorite
In the previous chapter of this series, we looked at hot code reloading in Elixir and why we should use GenServer to implement long-running processes.
If your data is encrypted, even if it's leaked, no one know what is the data. That's great.
I’m pleased to announce the first release candidate of Phoenix 1.6.0 has landed on the heels of a fresh LiveView 0.16 release! This release brings a number of major additions, quality of life improvements, bug fixes, and a couple deprecations.
In this post, you'll learn how to implement JWT based authentication using Phoenix.Token.
Plug is not the only interface with the middleware layer. Absinthe also comes with a middleware layer of its own and we can use it similarly to implement authorization for queries, mutations, and subscriptions.