People have been telling me to get out of Ruby for years. It's often delivered as some sort of sage advice, as if the advice-giver has gazed into their crystal ball and is reporting back to me what they saw in 2025. Gee, thanks, dude.
Our deployment process performs database changes about a minute before the related code changes go live. As the usage of our app continues to increase, even sub-second rename migrations bring down several in-flight requests.
Today we will focus on Amazon Rekognition which can help us with automatic moderation of uploaded images. By adding custom validation we can prevent uploading images which contain nudity, violence or other inappropriate content.
I've spent quite a bit of time obsessing over lights and camera, and I wanted to help you—new streamer, podcaster, new remote worker, or someone trying to level up their setup—see a few different types of option for your remote work or streaming setup.
I recently helped a client with serious PostgreSQL problems. The client was having problems with one table in particular, containing about 25,000 rows — quite small, by modern database standards, and thus unlikely to cause problems.
This little article aims to give an introduction to the topic of attacking Ruby on Rails applications. It's neither complete nor dropping a 0 day. It's rather the authors attempt to accumulate the interesting attack paths and techniques in one write up.