Build a carrier block list with Twilio Lookup

Bad actors can target phone verification or two-factor authentication flows to artificially inflate SMS traffic. Certain carriers, knowingly or not, allow this to happen and the fraudsters make money off of this inflated traffic. This could lead to higher … more Read More

Teaching as a Side Hustle for Engineers

Even if you’ve only progressed a short way into your development career, your knowledge has value to others. There may be people who know far more than you, but there are always more who are yet to acquire the skills you currently possess. And only a … more Read More

Echo JS

semiconductor history Mom, I wrote the world’s simplest HTTP server! How to Use JavaScript’s Object.values() Function … more Read More

State Management In Next.js

This article is intended to be used as a primer for managing complex states in a Next.js app. Unfortunately, the framework is way too versatile for us to cover all possible use cases in this article. But these strategies should fit the vast majority … more Read More

Node v14.17.6 (LTS)

Notable Changes These are vulnerabilities in the node-tar, arborist, and npm cli modules which are related to the initial reports and subsequent remediation of node-tar vulnerabilities CVE-2021-32803 and CVE-2021-32804. Subsequent internal security review … more Read More

Node v12.22.6 (LTS)

Notable Changes These are vulnerabilities in the node-tar, arborist, and npm cli modules which are related to the initial reports and subsequent remediation of node-tar vulnerabilities CVE-2021-32803 and CVE-2021-32804. Subsequent internal security review … more Read More