We had previously talked about the Serialization formats and How Serialization is implemented for storing objects in the relational database in the first two parts of the blog series. This article focuses on the various Serializers that prepare and construct API transferable data in Ruby on Rails.
Although Ruby on Rails is the oldest framework, and some claim that it is no longer in use, developers still like it for various reasons. And the reason is most probably the features it offers. So here we've compiled some of the best features of Ruby on rails in nowadays programming 2023.
Outlines are important for keyboard navigation, but maybe you've come up with a replacement and decide to do an outline: none; - instead, you should do an ou...
Pair programming is intimate. It’s the closest collaboration we do as software developers. When it goes well, it feels great! But when it doesn’t, you might ...
Most people know about semantic HTML, but when it comes to CSS, things are a little more wishy-washy most of the time. Rather than relying on arbitrary class...
The Decree pattern helps developers write single-purpose service objects that have a predictable API contract, are composable, are easily tested, and isolate the core logic of your app.
What if your Rails app couldn’t tell who was visiting it? If you had no idea that the same person requested two different pages? If all the data you stored vanished as soon as you returned a response?
Business Intelligence transforms raw data into actionable insights that support business decisions through reports, dashboards, and charts. You can use the `blazer` gem in Ruby on Rails to gather and display business metrics!
When we allow users to upload images, they usually upload files without any optimization for the web. It’s up to us to add some measure to prevent those images from slowing down our app. Luckily, the different gems commonly used to handle user uploads also give us solutions for this...
We demonstrate how the popular "Ransack" library (Ruby on Rails) can be abused to exfiltrate sensitive data via character by character brute-force, allowing for a full application compromise in some cases. An internet wide search identifies several hundred potentially vulnerable applications.