Engineering

Mongo in Node JS second part
Mongo in Node JS second part
||
Hello, I hope you find well, and in these days of isolation I recommend you use your time to learn something new or an affected skill, that's why I come to bring you the second part of how to use...
continue reading
DDoS attacks prevention with Nginx
DDoS attacks prevention with Nginx
||
A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt legitimate traffic of a targeted server, service or network, by bombarding it with so much traffic from multiple machines.  Typically, the attacker tries to saturate a system with so...
continue reading
Back-end Integration Testing using Postman
Back-end Integration Testing using Postman
||
One of the tools I find essential for back-end development is Postman. Simply put, it works as an API client and allows you to design, mock, document and test restful services, if you are not already using it I cannot...
continue reading
Face recognition from scratch
Python – Face recognition from scratch
||
How to make a Face recognition from scratch? As one of the most successful applications of image analysis, facial recognition allows a person to be identified by analyzing the biometric characteristics of their face and has recently received significant attention....
continue reading
Firebase Remote Config
||
Hi again! Eduardo Rodriguez here with a little explanation about Remote Config. Before we start, remember to check my previous post about Firestore. Why Firebase Remote Config? This is the scenario: We needed to build a dynamic survey with branching on...
continue reading
Mongo in Node JS
Mongo in Node JS
||
In my previous article we were talking about mongodb, this time we will talk about how to use mongo in Node JS, first of all we will need to install node in our machine, if you want to know how...
continue reading
Email protection & authentication methods
Email protection & authentication methods
||
Just like real-world criminals, online thieves can use impersonation to gain our confidence to steal important information, get access to a system, steal private data or spread malware. This practice is called spoofing, important reason for email protection & authentication...
continue reading
Discover Innovation The key to innovation is a good story. There’s a growing number of connected business leaders with big dreams and even bigger appetites for stories about the digital revolution. We aim to supply our share.
Node.js using different configurations per environment
||
Modern development practices and quality assurance procedures usually require our code to go through a series of environments in order to actually be released to production. Each environment on this pipeline can have different configuration values like database credentials, different...
continue reading
How to practice for coding interview
How to practice for coding interview
||
If you are close to having your coding interview to some company, this may mean that you are in the final filters to get the job, congratulations!. Today we are going to practice coding interviews The interviews of code, normally,...
continue reading
How to generate strong passwords
How to generate strong passwords
||
What is a password and what are they for? To start we must be very clear that a password is personal and non-transferable since a password is a form of authentication with which we access a space where we have...
continue reading