The Complete Handbook of AT Commands

  • avatar
  • 7.6K Views
  • 13 Likes
  • 11 mins read
Preview post image

AT commands, short for Attention commands, are a set of instructions used to control modems. These commands originated from the Hayes command set and have become essential for IoT (Internet of Things) devices, especially for managing WiFi modules. They allow users to perform functions such as connecting to a network, sending data, and configuring device settings, making them crucial for IoT applications.

JWT authentication using Laravel middleware

  • avatar
  • 8.2K Views
  • 3 Likes
  • 6 mins read
Preview post image

Security is crucial in web development, and one widely used method for securing APIs and web applications is JSON Web Token (JWT) authentication. Laravel, a powerful PHP framework, offers robust support for JWT authentication, making it a popular choice among developers. In this guide, we'll explore the intricacies of JWT authentication in Laravel, from grasping the basics of JWT to implementing token decoding within Laravel middleware.

Basic authentication using Laravel middleware

  • avatar
  • 6.9K Views
  • 8 Likes
  • 4 mins read
Preview post image

Laravel, the PHP framework renowned for its simplicity and elegance, continues to be a top choice for developers worldwide. Among its many features, Laravel offers robust middleware functionality, allowing for seamless integration of authentication mechanisms. In this article, we'll explore the implementation of basic authentication using middleware in Laravel, investigating its benefits and practical applications.

 Join Our Monthly Newsletter

Get the latest news and popular articles to your inbox every month

We never send SPAM nor unsolicited emails

Binance founder sentenced

  • 384 Views
  • 1 min read
Preview post image

Binance founder Changpeng Zhao received a four-month prison sentence for his failure to establish sufficient anti-money laundering measures. Zhao, formerly the leader of the world's largest cryptocurrency exchange, admitted guilt in November 2023.

Prosecutors sought a three-year prison term, twice the 18-month sentencing guideline, citing the extensive scope and impact of Zhao's wrongdoing in their sentencing memorandum. They also argued that Zhao's sentence should reflect the significant harm to US national security resulting from his criminal actions.

US bans ByteDance and will prohibit TikTok app in US unless it is sold

  • 598 Views
  • 2 mins read
Preview post image

The Senate approved legislation mandating that TikTok's parent company, ByteDance, divest itself of the app within 270 days or risk expulsion from the US market. The bill, previously passed by the House, received President Biden's signature.

Designated as a foreign adversary controlled application, TikTok must be sold to another entity within the specified timeframe. President Biden retains the authority to extend this deadline by up to 90 days if a sale is actively being pursued. This requirement extends to any subsequent applications similarly identified. Failure by ByteDance to comply with the sale mandate would result in the removal of TikTok from US app stores and a prohibition on internet hosting services facilitating its distribution. Violating entities would be subject to civil penalties.

Interfacing USB to Serial converter module

  • avatar
  • 591 Views
  • 1 Like
  • 3 mins read
Preview post image

In electronic communication, the USB to UART serial converter module emerges as a crucial link, facilitating seamless data transfer between computers and UART-enabled devices. This unassuming yet indispensable device bridges the gap between USB and UART protocols. In this article, we will explore the necessity of this module, explain the user-friendly interfacing process, and highlight its critical pinout details.

Popular authentication methods for Applications

  • avatar
  • 1.3K Views
  • 8 mins read
Preview post image

Robust authentication methods are essential for securing access to sensitive information and resources within applications. Authentication serves as the initial barrier, ensuring only authorized users gain entry to protected areas. From traditional password-based authentication to advanced token-based systems and OAuth protocols, developers have a range of options to ensure the security of their applications. This article explores these authentication methods, highlighting their strengths, weaknesses, and best practices to assist developers in implementing secure and user-friendly authentication systems.

TikTok Notes starts rolling out as a new rival to Instagram

  • 1.0K Views
  • 1 min read
Preview post image

TikTok is now introducing its Instagram competitor, TikTok Notes, to specific Android and iOS users in Australia and Canada. This rollout allows users to download the app and participate in limited testing. The announcement was made through a tweet, and the app is also listed on the App Store and Google Play, complete with official images showcasing its features for those who haven't accessed it yet.

Boston Dynamics' Revolutionary All-Electric Humanoid

  • 512 Views
  • 1 Like
  • 2 mins read
Preview post image

The humanoid robotics market is witnessing a surge in activity, prompting Boston Dynamics, the industry pioneer, to take decisive action. Introducing their latest creation, the new humanoid robot dubbed Atlas, the company marks a significant step towards commercial viability.

While both the old and new Atlas share a name, their design and functionality diverge significantly. The previous iteration, renowned for its agility and viral stunts, relied on a complex hydraulic system. In contrast, the new Atlas is entirely electric, boasting a more compact and lightweight construction. Notably, it adopts a consumer-oriented design, featuring protective covers and user-friendly elements such as a prominent status light and an illuminated power button reminiscent of Boston Dynamics' Spot series.

Getting started with Arduino Zero

  • avatar
  • 3.0K Views
  • 6 mins read
Preview post image

Arduino is an open-source electronics platform based on easy-to-use hardware and software. Arduino boards are able to read inputs - light on a sensor, a finger on a button, or a Twitter message - and turn it into an output - activating a motor, turning on an LED, publishing something online. You can tell your board what to do by sending a set of instructions to the microcontroller on the board. To do so you use the Arduino programming language and the Arduino Software (IDE).

Hey visitor! Unlock access to featured articles, remove ads and much more - it's free.