Is GraphQL Still a Thing in 2020?

GraphQL has become the most loved tool for API development in a very short span of time, and developers across the world cannot seem to get enough of it. Today I met with the founder of, Pranay Prakash, who has worked on the team behind GraphQL during his time at Facebook. I chatted with him to find out more about his experience working closely with Lee Byron, the creator of GraphQL, and some of GraphQL’s benefits.

SimpleRTApp: Deploying a Node.js App to Heroku

This article is also available on my personal blog. This article is also available on my personal blog. This post is part of a series which aims how to obtain relevant tweets, based on hashtags, as notifications in an iOS app. You can see the main post here. We’re going to see how to upload our app and local database to Heroku.

Express.js & Handlebars — 3 Helpful Features

HTML made more efficient & fun . Templating engines are already a great invention — this is what I noticed again when I was working on a personal project with handlebars.js and Express recently.

What is NGINX?

This article was originally published at

Uploading Files Into Ruby On Rails ActiveStorage

When storing static files in Rails, the first toolsets I reach for are 3rd party gems like: CarrierWave or Paperclip (before they deprecated it in favour of Active Storage). Active Storage was introduced with Rails 5.2.

GraphQL vs REST - API design approach comparison

GraphQL and REST are two of the most popular API design standards on the web these days. REST has been the standard for a long time, while GraphQL is fairly new. What are the main differences? Why are more and more people moving to GraphQL? How is the art of designing APIs changing in 2020 and moving forward? Let’s take a look.

Does Python Skills Equal Getting a Coding Job?

Does Python Skills Equal Getting a Coding Job? Python is one of the most popular programming languages. It is easy to pick up and begin with the basics.

Becoming a Full Stack Developer: Common Tips -

A full stack developer would be a programmer that is very proficient in building the frontend and backend parts of a web app and understands .

How To Create Secure Registration Flow with PHP and Password Hashing

Building a secure user registration form with PHP seems like a scary task. How do I protect myself from MySQL injection and other methods of hacking. Surprisingly, with only a few steps and precautions, you can greatly reduce the chance of success for attacks.

Connecting to Atlas using Robo 3T/Studio 3T

Here’s how to connect Robo 3T or Studio 3T to a MongoDB Atlas cluster. Robo 3T (formerly Robomongo) is a graphical application to connect to MongoDB.

Journey to a Federated GraphQL

Engineers tend to love good stories so hopefully, our 5-year journey of moving towards API composition with GraphQL now in production (serving at peak 110 requests per second at 100ms latency) provides a good story.

Key-Value Pair Database Internals

Alice has the next big idea. She has built every system needed and is now looking for storing data for it in a key-value store. In this article, we’ll explore her journey and learn more about the internals of databases.

How To Connect Ruby on Rails API, PostgreSQL And Heroku

Creating a new Rails app is super easy by itself. And, creating a Rails app set up as an API is not much different. Because we are planning on deploying our app to Heroku we need to set it up with PostgreSQL as the database.

Glossary of Security Terms: Encryption | Hacker Noon

In cryptography, encryption is the conversion of cleartext into a coded text or ciphertext. A ciphertext is intended to be unreadable by unauthorized readers.

Glossary of Security Terms: MitM

A Man-in-the-middle attack (MitM) intercepts a communication between two systems. For example, a Wi-Fi router can be compromised. Comparing this to physical mail: If you're writing letters to each other, the mailman can intercept each letter you mail.

Glossary of Security Terms: HTTPS

HTTPS (HyperText Transfer Protocol Secure) is an encrypted version of the HTTP protocol. It uses SSL or TLS to encrypt all communication between a client and a server. This secure connection allows clients to safely exchange sensitive data with a server.

Glossary of Security Terms: Key

A key is a piece of information used by a cipher for encryption and/or decryption. Encrypted messages should remain secure even if everything about the cryptosystem, except for the key, is public knowledge.

Glossary of Security Terms: HSTS

HTTP Strict Transport Security lets a web site inform the browser that it should never load the site using HTTP and should automatically convert all attempts to access the site using HTTP to HTTPS requests instead.

Are Angular and Angular JS The Same?

In this article, we figure out the key differences between Angular and AngularJS open source tools for front end developers to make the usage of these frameworks, terms, and names more conscious. But before we start to compare, let’s clarify what these names mean.

How To Monitor Your API Server

'Have you developed or are you in the process of creating an API Server that will be used on a production or cloud environment? In this 4th instalment of my Node JS Performance Optimizations series, I show you how to test the availability of your API Server, so that you can understand how many requests per second it can handle whilst performing heavy duty tasks.