Want to read more about Development? Let's take a look-sy:
Refactoring Patterns in Elixir: Replace Conditional with Polymorphism Via Protocols Part 2
Part 2: Replace Conditionals with Polymorphism Via Protocols Use Elixir protocols to bring polymorphism to your data structures This is the second in a series of posts we are doing on refactoring patterns in Elixir, a series that stemmed from working through Martin Fowler’s book Refactoring. In the first part...
"My life has not been the same since I started the Gaslight Apprenticeship Program."
Simply put, the Gaslight Software Development Apprenticeship program changed my life. I graduated high school in 2010. Which is not that long ago, at least I like to think that. But the technology landscape was totally different. mySpace was still hot, facebook wasn’t even a thing yet, blackberries were the...
Intro to Processes in Elixir
Intro to Processes in Elixir As I have been learning Elixir in the past few months, I have heard a lot about processes. Lots of Elixir’s biggest selling points, like its concurrency support, scalability, and fault tolerance, are possible because of the features and characteristics of processes. Processing Processes Elixir...
React Hooks at a Glance
In this post we are going to answer the question why you would want to use React hooks and go over a few of the ones built in. I will be covering the useState and useEffect hooks as I feel these will give you the most bang for your buck...
Refactoring Patterns in Elixir: Replace Conditional with Pattern Matching
Part 1: Replace Conditionals with Pattern Matching Replace Complex Conditionals in Function Bodies with Pattern Matching in Function Heads Several of us developers at Gaslight have been meeting up on Fridays to discuss Martin Fowler’s seminal book, Refactoring. The 2nd edition of his book, which is what we have been...
Two-Factor Authentication in Elixir and Phoenix
Two-Factor Authentication in Elixir and Phoenix Multi-factor authentication relies on the user having two or more pieces of evidence (or factors) in order to gain access into a system. In this example we will implement a two-factor authentication system that requires the user to present two forms of evidence: what...