/Guide

Top 6 Considerations For CSV Import Solutions

tl;dr: When it comes to data import the “build vs. buy“ decision requires an understanding of what functionality is essential for your business. To help, we’ve conducted a survey that identifies the top 6 functionality requirements for import solutions.

featured in #452


CSV Import Solutions: A Build Vs Buy Analysis

tl;dr: Deciding between building or buying a CSV import tool? We surveyed companies on their top considerations when building or evaluating a data import solution, and put together an analysis to help you make the best decision for your team. Get the guide.

featured in #448


How To Write An Effective Progress Report

- Anna Schmunk tl;dr: Well-crafted progress report "helps build trust by actively letting everyone know how things are going, what may have changed, and where you may need support." The article outlines the key elements that should be included in a progress report: Activity Summary, Progress Update, Challenges and Obstacles, and Next Steps and Action Items. Templates are recommended for creating quick and easy-to-read reports and Anna includes tips e.g. outlining sections and using tables for metrics. The article also discusses how to handle negative and positive feedback from stakeholders. 

featured in #445


Authorization Academy

- Sam Scott tl;dr: Authorization Academy is a series of (free) technical guides for building application authorization. Learn about RBAC, ReBAC, authorization enforcement, and authorization in microservices.

featured in #444


Authorization Academy

- Sam Scott tl;dr: Authorization Academy is a series of (free) technical guides for building application authorization. Learn about RBAC, ReBAC, authorization enforcement, and authorization in microservices 

featured in #439


Putting The “You” In CPU

- Lexi Mattick tl;dr: "Curious exactly what happens when you run a program on your computer? Read this article to learn how multiprocessing works, what system calls really are, how computers manage memory with hardware interrupts, and how Linux loads executables."

featured in #438


The 10 Types of Authorization

- Graham Neray tl;dr: The authorization abstractions of RBAC, ABAC and ReBAC don't do enough to provide engineers with the level of detail they require to solve the needs of your application. Learn about the 10 types of authorization and go a level deeper than the standard definitions of RBAC, ABAC and ReBAC.

featured in #436


A Software Engineer's Guide To A/B Testing

- Lior Neu-ner tl;dr: This guide provides an introduction to A/B testing for software engineers. It explains the basics of A/B testing, including how to devise, implement, monitor and analyze tests, and answers common questions about A/B testing. The guide also lists conditions under which you may want to avoid A/B testing, such as lack of traffic, high implementation costs, and ethical considerations. The post concludes with a launch checklist for A/B tests.

featured in #434


Code Documentation In The IDE

- Eden Hermelin tl;dr: Documenting your codebase doesn’t have to suck. Forget code comments or “self-documenting code”. IDE integrated documentation is slowly becoming one of the most convenient ways to manage knowledge about your codebase and this article explains why. 

featured in #415


So You Want To Build End-To-End Tests

- Rebecca Stone tl;dr: A well-built test suite runs faster, gives more reliable results, and makes long-term maintenance easier and cheaper. After thousands and thousands of end-to-end tests, QA Wolf has picked up a few tricks to build fast, stable, and accurate ones. This guide teaches you how.

featured in #414