Hello, regardless of the current Neil Young vs. Joe Rogan controversy, it’s worth knowing that Spotify uses Phoenix LiveView to manage its artist ad platform. In my new article, I am writing about how Elixir and Phoenix rose from a proof of concept to the level of the actual game-changer, and what it takes to advocate for a particular technology to be employed by a huge company.
Hi Elixir forum, I just published a tutorial on how credential stuffing attacks can occur against a Phoenix application, and some strategies to mitigate them using PlugAttack. The post walks through:
I recently took a look into the macros for Phoenix controllers to see how they work, and wrote some simple examples of how you might go about changing those macros for different use cases.
Neural networks mirror the behaviour of the human brain, enabling computer programmes to recognise patterns and solve common problems in the fields of artificial intelligence, machine learning and deep learning.
What are modules? Why do we use them at all? How to tell the difference between shallow and deep modules? Take a look at the first part of the modular design blog series by Prograils!
Web applications would not have existed without APIs… or, at least, they would have been much more difficult to use. In our new tutorial, we’ll get you a proper introduction to API design. Introduction to web API design
How to retrieve lists of data center IP prefixes when a Phoenix application starts.
Using a radix tree to store IP prefixes for fast lookup.
Why Erlang’s persistent_term module is the best choice for this problem.
Using assigns to store metadata about the IP address.
Writing a plug to block data center IP addresses.
A good amount of bot traffic online comes from data center IP addresses, the post gives the example of a ticket sales website where bots are buying tickets up before users can. The problem of classifying IP addresses is a good example to show some features of Elixir/Erlang, such as persistent_term.