Links
AddHurl, run and test HTTP requests with plain text and curl. Hurl can run fast automated integration tests.
Turning Outlook into a keylogger via VBA macros
Select, put and delete data from JSON, TOML, YAML, XML and CSV files with a single tool. Supports conversion between formats and can be used as a Go package. - TomWright/dasel
Explore Boundary product documentation, tutorials, and examples.
Artificial Intelligence (AI) and machine learning systems are becoming increasingly competent at doing jobs that previously, only humans could do. Here, we look at the key soft skills everyone should be focusing on to compete well in the job market of the future.
Unimog is the Layer 4 Load Balancer for Cloudflare’s edge data centers. This post explains the problems it solves and how it works.
A wise colleague once told me I should never have anything on in the background just to have it on. He’s probably right, but I still like to pop on a show
In an ideal world you wouldn't have to perform multiple steps for the rendering, but unfortunately we... Tagged with kubernetes, devops, tutorial, argocd.
Open source alternative to Auth0 / Firebase Auth / AWS Cognito - GitHub - supertokens/supertokens-core: Open source alternative to Auth0 / Firebase Auth / AWS Cognito
After almost 10 years since its first appearance, Minecraft players will finally be able to visit the world of the famous background panorama, the one we are all familiar with from Minecraft's title screen.
Interactive learning is the fastest way to learn a new technology. Because you're not just reading about it. You're also manipulating it in real time to discover how it works.
A test-automation framework is a set of best practices, common tools, and libraries that help quality-assurance testers assess the functionality, security, usability, and a
In this post, I’ll show you how to build a continuous integration and continuous delivery (CI/CD) pipeline using AWS Developer Tools, as well as Aqua Security‘s open source container vulnerability scanner, Trivy. You’ll build two Docker images, one with vulnerabilities and one without, to learn the capabilities of Trivy and how to send all vulnerability […]