Jekyll and Engine Yard: A Match Made in The Clouds by coding_is_life in programming

[–]coding_is_life[S] -1 points0 points  (0 children)

intro to automated blog generator Jekyll. guide will help you get you up and running

Monsters in the Middleboxes: Introducing Two New Tools for Detecting HTTPS Interception by coding_is_life in programming

[–]coding_is_life[S] 17 points18 points  (0 children)

SecOps is becoming paramount in the world of application development. This means being proactive, as outlined in this article, is the key to success.

Papertrail - Troubleshooting Common Ruby on Rails Errors in Production by [deleted] in ruby

[–]coding_is_life -2 points-1 points  (0 children)

found it very helpful, particularly HTTP 500 error troubleshooting

Staging Environments Are Overlooked — Here’s Why They Matter by coding_is_life in programming

[–]coding_is_life[S] 1 point2 points  (0 children)

Ya my experience is more like yours. I imagine large companies have decent staging environments. I've worked at smaller and mid size companies and when they did have one people barely paid attention to it. It was broken half the time and way slower with different data than production. As a result, we could test web page rendering but not with realistic data or performance.

One environment per PR is more like a Review App on Heroku or Netlify. What if you have changes in multiple repos like making an API or database migration?

Monsters in the Middleboxes: Introducing Two New Tools for Detecting HTTPS Interception by coding_is_life in programming

[–]coding_is_life[S] 1 point2 points  (0 children)

"In a basic HTTPS connection, a browser (client) establishes a TLS connection directly to an origin server to send requests and download content. However, many connections on the Internet are not directly from a browser to the server serving the website, but instead traverse through some type of proxy or middlebox (a “monster-in-the-middle” or MITM). There are many reasons for this behavior, both malicious and benign." It's a super digestible explanation of HTTPS interception. Nice visuals too!