Discover the power of multi-node communication in Elixir with Mika Kalathil. Learn how to connect nodes, manage clusters, and leverage built-in tools for scalable applications.
Pedro shares his journey of choosing Elixir for his side project and discusses his experiences with this powerful language. Learn why Elixir was the right choice for him and how it can benefit your projects too.
A new authorization library for Elixir designed to simplify and unify authorization processes. In this session, Michał shared the progress made on Permit, detailed its current status, and discussed future plans for the library.
The answer of a curious IT Recruiter. A lot of sites that give solutions to the dilemma of many developers - which type of company to choose. Most of those examples are from the CEO or a long-term employee perspective.
Learn about strategies for perfecting local and remote CI pipelines in Elixir projects. Know the importance of automating checks to reduce developer time spent on repetitive tasks, ultimately leading to more efficient and productive development.
Adolfo Neto presented on leveraging two powerful learning resources, Exercism and Advent of Code, to master Elixir and Erlang. Adolfo shared his experiences and provided practical tips for utilizing these platforms to enhance programming skills.
Miguel Cobá presented an engaging session on deploying Elixir applications using Kubernetes and Minikube. Miguel shared his expertise on setting up a local Kubernetes cluster, deploying an Elixir application, and scaling it seamlessly.
Learn about the limitations of existing authorization libraries and presented a more flexible and comprehensive solution designed to integrate seamlessly with Plug, LiveView, and other frameworks.
At Elixir Meetup #4, Bartosz Górka delivered an informative session on tracking Elixir apps using Telemetry and Metrics. He shared his insights on implementing Telemetry, capturing meaningful metrics.
At Elixir Meetup #4, Michael Lubas presented the importance of protecting applications from credential stuffing attacks and shared practical strategies to mitigate such attacks using PlugAttack.
This website uses cookies for analytics and to improve provided services. By closing this box, you consent to our use of them and other tracking technologies according to our
Privacy Policy.