🤓 Away Until Early July 👾🛸 I’ll be in a focused learning mode, and away from content creation for a while. — That means, I’ll come up with even more content when I’m back 🤘.
Zero to Hero Weekly | Issue 21 — Change Is the Only Constant …it follows that the whole of reality is like an ever-flowing stream, and that nothing is ever at rest for a moment.
Zero to Hero Weekly | Issue 20 — Words Matter How you frame a problem has a direct impact on whether you can solve it. That means, words are more important than one might think they are. When you pick your words carefully when describing your issue, you’ll have a much better chance in solving it.
Zero to Prod in Half an Hour This series will show how you can rapidly prototype a full-blown production-ready app in under half an hour. Interested? Let’s jump right in.
Zero to Prod in Half an Hour: Part 14 — Onwards to Kubernetes As a final step, we’ll deploy our application to an AWS EKS Kubernetes cluster and make sure that it’s healthy, up, and running.
Zero to Prod in Half an Hour: Part 13 — Containerizing Our Application We have an app that works locally. Now it’s time to put it into a container and yeet it out to a cluster. And that’s what we’ll do.
Zero to Prod in Half an Hour: Part 12 — The Final Touches We are done with the authentication part. We are almost near the end of our application’s initial implementation. We just need a questions handlers, which, in essence, is a glorified file server with some path traversal protection for an added level of security.
Zero to Prod in Half an Hour: Part 7 — A Mild Introduction to Middlewares This section will introduce a middleware layer to our project and we’ll write a sample middleware to see it in action.
Zero to Prod in Half an Hour: Part 11 — Implementing Authentication Handlers Having implemented our middlewares, now it’s time to implement the missing OAuth0 callback, login, and logout handlers.
Zero to Prod in Half an Hour: Part 10 — Authentication and Subscription Middlewares This section will implement middlewares that we need for authentication, authorization, and service subscription.