node
7 articles tagged with "node"
Tech Feeds
Mokup: A Build-Tool-Friendly Visual Mocking Tool for Vite, Webpack, Node.js, and Workers
Mokup: A Build-Tool-Friendly Visual Mocking Tool Hi, I am icebreaker, a frontend developer and open source enthusiast. I want to share a project I have been working on recently: Mokup, a file-based...
Self-Hosted Ngrok Alternative in 200 Lines of Node.js
Self-Hosted Ngrok in 200 Lines of Node.js Problem: Need to tunnel multiple local services. Ngrok free tier = 1 tunnel. Solution: Built my own. Took 4 hours. liptunnel http 3000,8080,5000 --multi C...
Edge Runtime vs Node.js Runtime: When Your Serverless Functions Mysteriously Fail
Edge Runtime vs Node.js Runtime: When Your Serverless Functions Mysteriously Fail You've seen the promise: Edge functions are faster, cheaper, and run closer to your users. Cold starts measured in m...
YAKMESH™ v2.5.0 - Post-Quantum P2P Mesh Network
🦬 YAKMESH™ v2.5.0 Released! A new version of YAKMESH - the post-quantum secure P2P mesh network - has been published! YAKMESH is a high-resiliency, decentralized networking layer with: 🔒 Post-Quan...
Dependency Rollercoaster: Navigating the NPM Theme Park
This article uses an engaging amusement park analogy to explain the complexities of npm dependencies, including dependencies, devDependencies, peerDependencies, and optionalDependencies. It provides practical insights into managing package.json effectively, emphasizing the importance of understanding transitive dependencies and versioning.
NodeJS 101 — Part 3 🗄️MySQL + Sequelize
This tutorial provides a comprehensive guide on building a RESTful API using Node.js, Express, MySQL, and Sequelize. It covers installation, configuration, model creation, and CRUD operations, making it a valuable resource for developers looking to implement a database-driven application.
NodeJS 101 — Part 4 🔐 Authorization with JWT
This article provides a comprehensive tutorial on implementing JWT-based authentication in a Node.js application. It covers key concepts such as token creation, middleware for token verification, and best practices for securing routes, making it a valuable resource for developers looking to enhance their API security.