Many things in the tech sound intimidating when you first learn of them than they actually are. ORMs (Object Relational Mappers) are just one of them; we also have quite a number of options for any Nodejs application but I’ll share some incites into getting started with Prisma ORM.
Object-relational mapping conceptualizes the idea of being able to write queries like the one below, as well as much more complicated ones, using the object-oriented paradigm of your preferred programming language. Essentially, ORMs help abstract the complexities of writing custom SQL queries to a database.
SELECT * FROM user where countryId…
For me, coding brings some sense of satisfaction. The skill of being able to program computers to do what you want, learning how applications work under the hood and I loved video games… yea for some techies, that was the spark.. it was exciting! I had a useful skill! 🤩. And The curiosity has kept me relentlessly getting better 😃.
Asides from freelancing and teaching coding, I had my first coding job at a hospitality firm in 2019 and since then I’ve had the resolve, “ Coding every day can be fun until it isn’t 😂! “.
During these years…
The fancy word “isomorphic” means that you can use the library on both the frontend and backend in exactly the same way. — Sergii Stotskyi
Many RBAC (Role-Based Access Control) implementations differ, but the basics are widely adopted since it simulates real-life role (job) assignments. — Onur Yıldırım.
Role-based access control (RBAC) is a method of modifying access and privileges based on the roles of individual users or user groups within an organization.
RBAC lets members of an organization have access, to only the resources they need to do their jobs and restricts or prevents unlimited privileges to resources that don’t pertain to them.
Role-based access control and attribute-based access control (ABAC) are both types of access control methods, but their approaches are different. …
According to Docker docs, Docker is a tool that provides OS-level virtualization to deliver software in packages called containers.
Docker made application containers easy to use by providing a simplified, opinionated wrapper around existing Linux distribution invoked as containers, process control, security, and resource management technologies.
Docker excels in these two key areas:
Docker helps you package and run applications inside isolated little boxes with all platform and application dependencies provided, thus keeping the hosting computer nice and tidy.
Docker solves problems associated with :
There are situations when the allocation of memory to store data cannot be in a contiguous block of memory or stored sequentially in memory, such situations include When :
We implement data structures such as
linked list with nodes…
Many of us love the Linux kernel 💙. It uses the Unix based terminal. it’s super customizable. We thus might choose to run Linux without a desktop environment like GNOME.
Linux works magic ✨ on older hardware and it’s lightweight. We don’t sell or advertise on Linux or have to struggle with a ton of desktop bloatware and its a great platform for back-end engineers.
Another productivity tip I leaned about, was setting up Cron Jobs to schedule time-based operations, to be executed automatically on my computer. …
APIs are everywhere and have many different faces and capabilities.
Essentially APIs act as transports vehicles 🚗 that pull information from one source and feed it to another. For example, Google maps API used in navigation systems or Stripe API used for Online payments, etc.
APIs in a lot of applications serve as data points for client-based applications 🖥️ or other API clients, with read-write permissions; and as such certain endpoints need to be protected to provide access to privileged users of the application.
In this tutorial, we’ll go through a simple implementation of role-based authorization or access control in…
Many times, we have to integrate 3rd party services into our applications; this often prompts the need to store sensitive data for authentication of different modules such as database credentials, secret key, encryption payloads, and API keys.
These sensitive keys should not be hard-coded in the
settings.py file or
views.py file in a Django project. …