TL;DR In the last post, we presented a CIA thinking tool called The Phoenix Checklist. We used it to create a plan for the real problem with the Google Page Rank…
TL;DR Ecto library has an excellent feature called preload,it preloads the schema associations into the result set. We discuss this feature in the context of security when you have associations…
TL;DR The last time we presented the last scheduled game, Schedule Trance. Today we move on to the topic of how to create a Project Team. We start with identifying…
TL;DR In order not to find out that the security of your Windows PC is important to late, we share with you this excellent HackerNews thread, How To Secure Your…
TL;DR A bug magnet story about a fish barcode and Lidl Store Process Workaround. The Context I buy my groceries in Lidl. The reasons are straightforward, it is close to…
TL;DR This post presents you with a free exploratory testing exercise where you can test your critical thinking skills on my issue with balcony blinds. The Context The following picture…
TL;DR In the previous post, we mapped received photos from REST API into our simple Picshare application. Today we will load three Photos into the Picshare application. This post is…
TL;DR In the previous post, we explained how to pattern-match Elixir Maps. Today we explain how to pattern-match Elixir Bitstrings and Binaries. This post is part of the functional language…
TL;DR In the previous post, we explained what is Test-Path in the context of the Directed Graph. Today it is time to do an exercise on Test Paths in Directed…
TL;DR In the last post, we presented a CIA thinking tool called The Phoenix Checklist. We used it to identify the real problem with the Google Page Rank feature. Today we…