We've Launched "The Suddenly Remote Playbook,"
A Comprehensive Guide for Working Remotely
The Suddenly Remote Playbook
Read Now

Back-end

Showing 249-253 of 253 results

Ruby Concurrency and Parallelism: A Practical Tutorial

by Eqbal Quran

A thorough and practical introduction to concurrent and parallel programming in Ruby, presenting and contrasting a number of techniques and options available, from the standpoints of both performance and complexity. Discusses forking, multithreading, the Global Interpreter Lock (GIL), and more.

10 minute readContinue Reading

How does Shazam work? Music Recognition Algorithms, Fingerprinting, and Processing

by Jovan Jovanovic

You hear a familiar song in the club or the restaurant. You listened to this song a thousand times long ago, and the sentimentality of the song really touches your heart. You desperately want to heart it tomorrow, but you can't remember its name! Fortunately, in our amazing futuristic world, you have a phone with music recognition software installed, and you are saved. But how does this really work? Shazam's algorithm was revealed to world in 2003. In this article we'll go over the fundamentals of that algorithm.

14 minute readContinue Reading

Git Workflows for Pros: A Good Git Guide

by Joe James

Git can support your project not just with version control, but also with collaboration and release management. Understanding how workflow patterns can help or hinder a project will give you the knowledge to evaluate and adapt your project's Git processes effectively.

11 minute readContinue Reading

A Guide to Rails Engines in the Wild: Real World Examples of Rails Engines in Action

by Joe James

Why are Rails Engines not used more often? I don't know the answer, but I do think that the generalization of "Everything is an Engine" has hidden the problem domains that they can help to solve.

12 minute readContinue Reading

10 Most Common Web Security Vulnerabilities

by Gergely Kalman

For all too many companies, it's not until after a breach has occurred that security becomes a priority. An effective approach to IT security must, by definition, be proactive and defensive. This post focuses on 10 common and significant web-related IT security pitfalls to be aware of, including recommendations on how they can be avoided.

12 minute readContinue Reading

Join the Toptal® community.