Bookmarks, page 42 of 73
Blazing fast, structured, leveled logging in Go.
The corrective bash syntax highlighter.
How to use Private Routes in React Router 6 (alias Protected Routes) by using conditions (e.g. authentication, permissions, roles) to authorize users for guarded pages.
Data within a database exists across multiple tables, JOINs allow you to combine datasets into new tables for analysis. Learn more.
Managed Kubernetes designed for you and your small business. Free control plane, simple scaling and rapid deployments. Starting at $12/mo.
The design system that powers GitHub
LiqPay ruby sdk.
Describes how to make your app content searchable in iOS.
Docker implemented in around 100 lines of bash.
An n:m multiplexer that gathers messages from different sources and broadcasts them to a set of destinations.
Troubleshooting in Kubernetes can be a daunting task. In this article you will learn how to diagnose issues in Pods, Services and Ingress.
Within a lazily executed method chain, a single object is updated and passed from one method to the next, until it's finally transformed into its output value.
Stripe Identity lets you programmatically confirm the identity of global users so you can prevent attacks from fraudsters while minimizing friction for legitimate customers.
Free online logo maker
Usually there are two ways the images are used in a web application — using the <img> tag in the HTML or thru css by setting ‘background-image’ property in an HTML element’s css class or style. The…
Using a programmable SQL interface such as an ORM (Object Relational Mapping) is a good way to reduce risk of SQL Injection, which is a very bad vulnerability to have. However, ORM packages are not bullet proof. This post explains why you shouldn’t put all your SQL Injection protection eggs in the ORM basket, and what more can you do.