Automated Backups and Disaster Recovery Part 1
If you haven't tested restore, you don't have a backup
Kubernetes A comprehensive review
In this series, we've glanced on how kubernetes can help you deploy your application reliably, scalably and securely on a cluster. We've learned that are multiple ways to deploy kubernetes in a variety of cloud providers. We've also...
Building a Responsive Email
Build an email template while doing an overview of the best practices for developing emails
2018 Dev skills survey results, modeling Elm API requests, and reducing Ruby’s memory footprint
HackerRank surveyed almost 40,000 developers to produce the 2018 Developer Skills Report. Interesting highlights include: 1/4 of developers were coding before the age of 15, newer generations are using YouTube tutorials over books to learn new...
Designing an Email Template
An overview of the best practices when designing email templates.
CDN with S3/CloudFront and SSL (with LetsEncrypt) + other similar smallish tasks
Getting our app ready for production
Beyond Bitcoin, Vue.js Rising, AI-Curated Garbage
The New York Times isn’t a site we often link to, but in Beyond the Bitcoin Bubble author Steven Johnson dives deep into bitcoin, blockchain, and why that’s important for the future of the internet. He explores why the token infrastructure is...
Monitoring with Scout
Keeping an eye on our app’s performance through monitoring.
Elixir Survey, Why security is difficult, Browser Wars Story time, Quantum computing in 2018
If you clicked here expecting to see the Weekly Drip for Jan. 20, click here. Sorry about that :)
Each year since 2014 I have surveyed the Elixir community about its use of the language and the makeup of the community. You can see the results for...
Log aggregation with LogDna
Shipping logs to a centralized service
Introduction to ECS and Fargate
Running our dockerized app on ECS.
Introduction to Docker
Learn how to Dockerize your first application
Using and Understanding Sagas
API requests using Redux Sagas
ZOMG Processors, Cold Showers for the Hot New Thing, and Browser Security
It was a bad week for processors. Three teams independently discovered the Meltdown attack, and two teams discovered the Spectre attack. Google’s Project Zero has a great writeup on these major vulnerabilities with Intel, AMD, and ARM processors....
Essential programmer's guide to cryptocurrencies
You’ve heard about cryptocurrencies, but do you really understand what they are and how they work?
Cryptocurrencies are digital decentralized currencies that run on the Blockchain technology. The Blockchain runs on millions computers worldwide...
Partial Application of Functions in Elm
A friend of mine recently raised an interesting question. If a function takes two arguments, why is its type annotation
f: a -> b-> c? Wouldn't something like
f: (a, b) -> c make more sense?
A solid understanding of how Elm treats...
Continuous Delivery Pipeline With Kubernetes
Automating the deployment of our app using a CI/CD pipeline.
Operating our cluster
Operating our Kubernetes Cluster & Building a CI pipeline
Building our app with Mori.js
Implementing our tournament app with Mori.js