Gaslight Blog

Want to read more about Development? Let's take a look-sy:

08/05/19

Refactoring Patterns in Elixir: Replace Conditional with Polymorphism Via Protocols Part 2

Part 2: Replace Conditionals with Polymorphism Via Protocols Use Elixir protocols to bring polymorphism to your data structures This is the second in a series of posts we are doing on refactoring patterns in Elixir, a series that stemmed from working through Martin Fowler’s book Refactoring. In the first part...

Read More →

07/25/19

"My life has not been the same since I started the Gaslight Apprenticeship Program."

Simply put, the Gaslight Software Development Apprenticeship program changed my life. I graduated high school in 2010. Which is not that long ago, at least I like to think that. But the technology landscape was totally different. mySpace was still hot, facebook wasn’t even a thing yet, blackberries were the...

Read More →

06/17/19

Intro to Processes in Elixir

Intro to Processes in Elixir As I have been learning Elixir in the past few months, I have heard a lot about processes. Lots of Elixir’s biggest selling points, like its concurrency support, scalability, and fault tolerance, are possible because of the features and characteristics of processes. Processing Processes Elixir...

Read More →

05/20/19

React Hooks at a Glance

In this post we are going to answer the question why you would want to use React hooks and go over a few of the ones built in. I will be covering the useState and useEffect hooks as I feel these will give you the most bang for your buck...

Read More →

04/15/19

Refactoring Patterns in Elixir: Replace Conditional with Pattern Matching

Part 1: Replace Conditionals with Pattern Matching Replace Complex Conditionals in Function Bodies with Pattern Matching in Function Heads Several of us developers at Gaslight have been meeting up on Fridays to discuss Martin Fowler’s seminal book, Refactoring. The 2nd edition of his book, which is what we have been...

Read More →

03/18/19

Two-Factor Authentication in Elixir and Phoenix

Two-Factor Authentication in Elixir and Phoenix Multi-factor authentication relies on the user having two or more pieces of evidence (or factors) in order to gain access into a system. In this example we will implement a two-factor authentication system that requires the user to present two forms of evidence: what...

Read More →

Like what you're seeing? Let's keep in touch.

Subscribe to Our Newsletter