Elixir Blog Posts

Great title :innocent:

1 Like

I bought the Ash Framework book, and made some notes on the dev lifecycle and include some thoughts and welcome comments.

Ash Framework approaches the TCO (Total Cost of Ownership) argument implicit in LLM AI prompt or vibe coding from a different direction. Ash Framework promises to reduce TCO, with installers, generators, declaration and derivation. Ash gives the TCO of code gen with the precision of SDLC. So lets use the Ash Framework tools!

@zachdaniel

3 Likes

Does @AshFramework provide accelerated lean precision prompt engineering?

Lots of talk about prompts generating code. I like my code-gen “prompts” to be PRECISE and ACCELERATED and carefully considered.

sh <(curl 'https://ash-hq.org/new/store?install=phoenix') \
    && cd store && mix igniter.install ash_phoenix \
    ash_graphql ash_json_api ash_postgres ash_sqlite \
    ash_authentication ash_authentication_phoenix ash_money \
    ash_csv ash_admin ash_oban ash_state_machine \
    ash_double_entry ash_archival ash_paper_trail cloak \
    ash_cloak --auth-strategy password \
    --auth-strategy magic_link --yes && mix ash.setup

It explains how to integrate AG Grid into LiveView projects, enabling features like real-time sorting, filtering, and pagination without full page reloads. The article also covers customizing cell data and implementing efficient updates to ensure a dynamic user experience.

1 Like

Wrote a new post on security best practices, enjoy!

4 Likes

I couldn’t find a complete tutorial for how to set up E2E tests with Cypress and LiveView using Ecto sandboxes. So I wrote on. Hope someone finds it useful!

https://www.danielk.se/post/e2e-testing-with-liveview-1.0-cypress-and-ecto-sandboxes/

3 Likes

Introduction to Contexted - an open-source lib I wrote some time ago that can help you keep the Phoenix Contexts maintainable and clean in long-term :slight_smile:

1 Like

I recently dove into processing large genetic datasets and I utilized a couple of cool tools like Flow and Burrito along the way. The article talks about the why, a bit of genetics background and some considerations I took for working with data this large locally :dna:

https://austinsaunders.io/blog/introducing-clinvar-checker

4 Likes

Internet is dark and full of strange creatures. Some of them impersonate Erlang nodes and may try to connect to your cluster. Who you gonna call if :AAAAAA@AAAAAAA show up? Hide Your Nodes, AAAAAA@AAAAAAA is Coming | Alex Martsinovich

5 Likes

How do you take care of the security in your projects, are you using available tools to their full potential?

We decided to explore security measures for Elixir and Phoenix: :arrow_right: Secure Web Development in Elixir & Phoenix: Key Security Practices | Curiosum

The article includes topics such as:
:white_check_mark: Defending against common threats like XSS, CSRF, and SQL Injection
:white_check_mark: Utilizing Phoenix’s built-in security capabilities effectively
:white_check_mark: Implementing authentication and authorization methods
:white_check_mark: Safing sensitive data to prevent leaks and breaches

1 Like

A deep dive into Elixir compiler compiling Elixir code :man_scientist:

1 Like
1 Like