Over the past year, non-fungible tokens (NFTs) have captured the imagination of digital creators and collectors alike. From acclaimed artworks to viral memes, NFTs have opened new frontiers… Read More
#674 — October 19, 2023Read on the WebRuby WeeklyPasswordless 1.0: Magic Link Auth for Rails Apps — A system to add password-free ‘magic link’ style authentica… Read More
Content
Redis Overview
Why caching matter?
Use cases of Redis as a cache
Industries Leveraging Redis as Cache
When to Use Redis Cache?
When Not to Use Redis Cache?
Integration with spring b… Read More
The US cybersecurity organization CISA has updated its Known Exploited Vulnerabilities catalog to include five new security flaws that are currently being actively exploited.
This means… Read More
In an era where the digital landscape is constantly evolving, cybersecurity has become paramount to protect sensitive information from unauthorized access. Traditional password-based authent… Read More
Posted on Oct 5 Greetings, tech aficionados! Today, we're diving deep into the realms of multiple-column indexes and hashing—critical yet often overlooked aspects in t… Read More
(Read this article on the blog)
CloudFront signed URLs
CloudFront signed URLs rely on a private key to calculate a signature that is added to the URL. This makes them secure: only the backe… Read More
7 min readBlockchain technology can possibly alter how the industrial age achieves huge data and conducts commerce. Initially industrialized to support or assist Bitcoin, Blockchain is show… Read More